<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ACS4.2, NX-OS and Cisco AV-Pair Question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385174#M372539</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Javier&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've the same problem. I configured everything as you recommended in your posting, but i still end up in the deault role "network-operator"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS 4.2 Configuration:&lt;/P&gt;&lt;P&gt;user config&lt;/P&gt;&lt;P&gt;shell exec (enabled)&lt;/P&gt;&lt;P&gt;shell:roles*"network-admin"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After Login - the output of the command "show user-account" says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user:ude3964&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; roles:network-operator &lt;BR /&gt;account created through REMOTE authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AAA Configuration:&lt;/P&gt;&lt;P&gt;rzsgwu3s097# sh run aaa&lt;BR /&gt;version 4.1(3)N2(1a)&lt;BR /&gt;aaa authentication login default group tacacs local &lt;BR /&gt;aaa authentication login console group tacacs local &lt;BR /&gt;aaa authorization config-commands default group tacacs &lt;BR /&gt;aaa authorization commands default group tacacs &lt;BR /&gt;aaa authentication login error-enable &lt;BR /&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rzsgwu3s097# sh run tacacs+ &lt;BR /&gt;version 4.1(3)N2(1a)&lt;BR /&gt;feature tacacs+&lt;/P&gt;&lt;P&gt;tacacs-server timeout 3&lt;BR /&gt;tacacs-server host 172.28.193.34 key 7 "wg$yscmfv1" &lt;BR /&gt;tacacs-server host 172.28.193.35 key 7 "wg$yscmfv1" &lt;BR /&gt;aaa group server tacacs+ tacacs &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server 172.28.193.35 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-interface Vlan501&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the debug aaa all - there is not much to see. NX-OS in this case is not as good as IOS.&lt;/P&gt;&lt;P&gt;In the ACS passed Authentication Report everything looks fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any idea how to go further?&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Apr 2010 06:44:32 GMT</pubDate>
    <dc:creator>pat1848</dc:creator>
    <dc:date>2010-04-27T06:44:32Z</dc:date>
    <item>
      <title>ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385171#M372533</link>
      <description>&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I have some Nexus switches deployed in my network.&amp;nbsp; They are authenticating user access via TACACS/ACS (4.2).&amp;nbsp; I would like to get the user role part working as currently any users logging in get defaulted to a network-operator role so doen't have full configuration ability.&amp;nbsp; Reading the Nexus guide I see that this is achieved by somehow using, the following cisco vsa :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: Courier; "&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;shell:roles=“network-operator vdc-admin”&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Can anyone help me to understand specifically how to get this configured.&amp;nbsp; I guess that on the ACS somewhere I need to return this attribute for a user. However I can't see where its configured.&amp;nbsp; I have been through the ACS admin guide but its not clear to me.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Many Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;RK&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 00:04:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385171#M372533</guid>
      <dc:creator>rkoudmani</dc:creator>
      <dc:date>2019-03-11T00:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385172#M372535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure this attribute per user or per group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, go to Interface Configuration -&amp;gt; TACACS+ and enable "Display a window for each service selected in which you can enter customized TACACS+ attributes".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, go to the user or group where you want to grant this role and check the box next to "Shell (exec)" and in the custom attributes field below add the role assignment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: if you will be authenticating on both NX-OS and IOS devices, use * instead of = to make the role optional or the IOS devices will fail authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ie:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shell:roles*"network-admin"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Apr 2010 16:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385172#M372535</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2010-04-19T16:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385173#M372536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Javier,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That worked perfectly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Apr 2010 10:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385173#M372536</guid>
      <dc:creator>rkoudmani</dc:creator>
      <dc:date>2010-04-20T10:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385174#M372539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Javier&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've the same problem. I configured everything as you recommended in your posting, but i still end up in the deault role "network-operator"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS 4.2 Configuration:&lt;/P&gt;&lt;P&gt;user config&lt;/P&gt;&lt;P&gt;shell exec (enabled)&lt;/P&gt;&lt;P&gt;shell:roles*"network-admin"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After Login - the output of the command "show user-account" says:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user:ude3964&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; roles:network-operator &lt;BR /&gt;account created through REMOTE authentication&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AAA Configuration:&lt;/P&gt;&lt;P&gt;rzsgwu3s097# sh run aaa&lt;BR /&gt;version 4.1(3)N2(1a)&lt;BR /&gt;aaa authentication login default group tacacs local &lt;BR /&gt;aaa authentication login console group tacacs local &lt;BR /&gt;aaa authorization config-commands default group tacacs &lt;BR /&gt;aaa authorization commands default group tacacs &lt;BR /&gt;aaa authentication login error-enable &lt;BR /&gt;tacacs-server directed-request&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rzsgwu3s097# sh run tacacs+ &lt;BR /&gt;version 4.1(3)N2(1a)&lt;BR /&gt;feature tacacs+&lt;/P&gt;&lt;P&gt;tacacs-server timeout 3&lt;BR /&gt;tacacs-server host 172.28.193.34 key 7 "wg$yscmfv1" &lt;BR /&gt;tacacs-server host 172.28.193.35 key 7 "wg$yscmfv1" &lt;BR /&gt;aaa group server tacacs+ tacacs &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server 172.28.193.35 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-interface Vlan501&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the debug aaa all - there is not much to see. NX-OS in this case is not as good as IOS.&lt;/P&gt;&lt;P&gt;In the ACS passed Authentication Report everything looks fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any idea how to go further?&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Apr 2010 06:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385174#M372539</guid>
      <dc:creator>pat1848</dc:creator>
      <dc:date>2010-04-27T06:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385175#M372553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are using both IOS en NX-OS switches.&amp;nbsp; The av-pair&amp;nbsp; used for&amp;nbsp; IOS = shell:priv-lvl-15 and for NX-OS shell:role*"network-admin"&amp;nbsp;&amp;nbsp; After configuring ;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;" cisco av-pair = shell:priv-lvl-15 shell:role*"network-admin"&amp;nbsp; "&amp;nbsp; I can login on de IOS switch in enable mode en only network-operator mode on the NX-OS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After configuring;&amp;nbsp; "cisco av-pair =shell:role*"network-admin" shell:priv-lvl-15 "&amp;nbsp; only NX-OS as network-admin&amp;nbsp; and IOS in exec mode&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any idea how to configure the correct config for av-pair for NX-OS and IOS switches&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jun 2010 13:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385175#M372553</guid>
      <dc:creator>fwim</dc:creator>
      <dc:date>2010-06-10T13:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385176#M372576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you capture the traffic between the TACACS+ server and the switches and post it here, so we can see what is actually being sent?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will want to capture both instances, ie, when NX-OS works right and when IOS works right.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jun 2010 13:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385176#M372576</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2010-06-10T13:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385177#M372607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try removing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization config-commands default group tacacs &lt;BR /&gt;aaa&amp;nbsp; authorization commands default group tacacs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe with Nexus you can only do rbac OR command authorization not both.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jun 2010 18:21:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385177#M372607</guid>
      <dc:creator>Elly Bornstein</dc:creator>
      <dc:date>2010-06-11T18:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385178#M372707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does anybody know if this can be done in ACS 5.1 as I am looking for TACACS+ VSA options to do this, but all I can find is RADIUS VSA options to be configured?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2010 13:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385178#M372707</guid>
      <dc:creator>Nicholas Poole</dc:creator>
      <dc:date>2010-11-18T13:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: ACS4.2, NX-OS and Cisco AV-Pair Question</title>
      <link>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385179#M372755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can send custom AV pairs with ACS 5.1, by creating a custom shell profile under policy elements, then you would tie this shell profile to an authorization policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2010 13:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs4-2-nx-os-and-cisco-av-pair-question/m-p/1385179#M372755</guid>
      <dc:creator>Javier Henderson</dc:creator>
      <dc:date>2010-11-18T13:55:06Z</dc:date>
    </item>
  </channel>
</rss>

