<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Default Device Admin (Tacacs+) in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681265#M345775</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Master Vader &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were correct, my default authorization rule had permit access in it.&amp;nbsp; Once i changed it to Deny Access it worked flawlessly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas how i set groups to get level 15 access by default?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Jun 2011 15:21:42 GMT</pubDate>
    <dc:creator>thanmad</dc:creator>
    <dc:date>2011-06-24T15:21:42Z</dc:date>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681261#M345771</link>
      <description>&lt;P&gt;ACS 5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default Device Admin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identity:&lt;/P&gt;&lt;P&gt;Single Result (internal list and AD1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Group Mapping:&lt;/P&gt;&lt;P&gt;Rule1:(anyone in AD/Administrators=Group/AdminGroup)&lt;/P&gt;&lt;P&gt;Default: Standard user&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authorization:&lt;/P&gt;&lt;P&gt;Rule1: (anyone in Group/AdminGroup, permit all commands)&lt;/P&gt;&lt;P&gt;Default: Deny All Commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's my situation:&lt;/P&gt;&lt;P&gt;User1 (AD/Administrator)&lt;/P&gt;&lt;P&gt;UserBob (NOT in AD/Administrator)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User1 Logs into a switch, types "enable" is asked to authenticate again, and can then run all commands (this is what i'm looking for, though i dislike the second login)&lt;/P&gt;&lt;P&gt;UserBob Logs into a switch, types "enable" is asked to authenticate again, but gets error "% Error in Authentication" (i do not want UserBob to even be able to log into the switch to begin with)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do i keep UserBob from being able to log into the switch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I get User1 to enter level 15 (Switch# instead of Switch&amp;gt;) automatically without being prompted to enter their password a second time after typing "enable"?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As i understand it, "Default Device Admin" is different than "Default Network Access" which i liken to "logging into switches" vs. "authenticating against VPN server or Wireless" respectively.&amp;nbsp; So i should be able to restrict users from logging into switches, but still allow them to authenticate for access to things like VPN, so i don't think what i'm asking above will keep me from being able to do that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 01:10:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681261#M345771</guid>
      <dc:creator>thanmad</dc:creator>
      <dc:date>2019-03-11T01:10:39Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681262#M345772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Q1 : How do i keep UserBob from being able to log into the switch?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure NAR [network access restriction] and restrict the user to "not-to" access switch. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Q2 : How do I get User1 to enter level 15 (Switch# instead of Switch&amp;gt;)&amp;nbsp; automatically without being prompted to enter their password a second&amp;nbsp; time after typing "enable"?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You need to configure exec authorization on switch and push "privlege level = 15" to make User1 fall on switch# mode. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command on switch will be :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; aaa authorization exec default group tacacs local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if it helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Devashree&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 06:46:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681262#M345772</guid>
      <dc:creator>Devashree Chakrabarti</dc:creator>
      <dc:date>2011-06-21T06:46:13Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681263#M345773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You've lost me, on both fronts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q1:&amp;nbsp; i knew where NAR was in 4.x, but there's nothing called NAR in 5.1.&amp;nbsp; I see Policy Elements&amp;gt;Session Conditions&amp;gt;NetworkConditions&amp;gt;End Station Filters, but no way to tie that to users...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2:&amp;nbsp; I have this command in my switch, i see no way to specify level 15 in ACS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jun 2011 20:45:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681263#M345773</guid>
      <dc:creator>thanmad</dc:creator>
      <dc:date>2011-06-21T20:45:24Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681264#M345774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is no NAR in ACS 5. Forget about that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, you are authenticating the user but not authorizing him to any commands for the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said your default authorization rule returns "denyallcommands". That is good but it should also return the shell profile "deny access". Did you verify that ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jun 2011 05:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681264#M345774</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-06-22T05:41:32Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681265#M345775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Master Vader &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were correct, my default authorization rule had permit access in it.&amp;nbsp; Once i changed it to Deny Access it worked flawlessly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas how i set groups to get level 15 access by default?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Jun 2011 15:21:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681265#M345775</guid>
      <dc:creator>thanmad</dc:creator>
      <dc:date>2011-06-24T15:21:42Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681266#M345776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Instead of returning "permit access", return a shell profile that you will have created. That's where you can define the privilege level and other common shell properties.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nicolas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2011 05:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681266#M345776</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-06-27T05:57:14Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681267#M345777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Nico ......5+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vinay Sharma&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Community Manager - Wireless&lt;/P&gt;&lt;P&gt;Cisco Support Community&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2011 09:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681267#M345777</guid>
      <dc:creator>Vinay Sharma</dc:creator>
      <dc:date>2011-06-27T09:59:20Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681268#M345778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I have two entries in my shell profile for privelige level:&amp;nbsp; Default Privilege and Maximum Privilege.&amp;nbsp; Maximum Privelige was already set to 15.&amp;nbsp; Setting both to 15 does not fix the issue.&amp;nbsp; Setting only Default Privilege to 15 results in me not being able to access enable on the switch (error in authentication).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2011 16:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681268#M345778</guid>
      <dc:creator>thanmad</dc:creator>
      <dc:date>2011-06-27T16:29:30Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681269#M345779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the particular problem of logging twice, it is actually the command "aaa authorization exec" which allows users to land directly in enable mode or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2011 16:32:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681269#M345779</guid>
      <dc:creator>Nicolas Darchis</dc:creator>
      <dc:date>2011-06-27T16:32:28Z</dc:date>
    </item>
    <item>
      <title>Default Device Admin (Tacacs+)</title>
      <link>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681270#M345780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ahh, found the problem.&amp;nbsp; This apparently only works on VTY connections, i've been doing my testing with the console connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;once i tried this on my VTY session it works flawlessly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again for sharing your dark side of the force &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Jun 2011 18:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/default-device-admin-tacacs/m-p/1681270#M345780</guid>
      <dc:creator>thanmad</dc:creator>
      <dc:date>2011-06-27T18:55:27Z</dc:date>
    </item>
  </channel>
</rss>

