<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA Authorization design in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036057#M406509</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the config required for setting up aaa authentication and authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router(config)# username [username] password [password]&lt;/P&gt;&lt;P&gt;		tacacs-server host [ip]&lt;/P&gt;&lt;P&gt;		tacacs-server key [key]&lt;/P&gt;&lt;P&gt;		aaa new-model&lt;/P&gt;&lt;P&gt;		aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;		aaa authorization exec default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;		aaa authorization commands 1 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;		aaa authorization commands 15 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;		aaa authorization config-commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 Jul 2008 16:15:33 GMT</pubDate>
    <dc:creator>Jagdeep Gambhir</dc:creator>
    <dc:date>2008-07-24T16:15:33Z</dc:date>
    <item>
      <title>AAA Authorization design</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036053#M406505</link>
      <description>&lt;P&gt;I'm configuring several switches and routers for TACACS with ACS SE.  I have a need to do three levels of access, the groups are as follows:&lt;/P&gt;&lt;P&gt;1. Normal read-only access.&lt;/P&gt;&lt;P&gt;2. Full access with the exception of config t.&lt;/P&gt;&lt;P&gt;3. Full access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the best way to achieve this goal, I can see that if I create Shell Command Authorization sets on the ACS, I can configure one for group 1 and one for group 3.  But will I be able to for Group 2?  Is there a way to allow all, but explicitly block one command?  Following this page: &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_configuration_example09186a00808d9138.shtml&lt;/A&gt; leads me to believe that the capability may exist, but I have no way to confirm at the moment.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:59:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036053#M406505</guid>
      <dc:creator>mbonner</dc:creator>
      <dc:date>2019-03-10T22:59:34Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authorization design</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036054#M406506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With command authorization you can control every single command that you want user should be allowed. It covers all mode, enable , user and config mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will post the screen shot shortly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jul 2008 11:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036054#M406506</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2008-07-24T11:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authorization design</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036055#M406507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see the attachment. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the implementation user will be able to do every thing except config t.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jul 2008 12:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036055#M406507</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2008-07-24T12:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authorization design</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036056#M406508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Quick follow-up question, what configuration is required on the switch/router for that functionality?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jul 2008 15:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036056#M406508</guid>
      <dc:creator>mbonner</dc:creator>
      <dc:date>2008-07-24T15:49:54Z</dc:date>
    </item>
    <item>
      <title>Re: AAA Authorization design</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036057#M406509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the config required for setting up aaa authentication and authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router(config)# username [username] password [password]&lt;/P&gt;&lt;P&gt;		tacacs-server host [ip]&lt;/P&gt;&lt;P&gt;		tacacs-server key [key]&lt;/P&gt;&lt;P&gt;		aaa new-model&lt;/P&gt;&lt;P&gt;		aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;		aaa authorization exec default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;		aaa authorization commands 1 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;		aaa authorization commands 15 default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;		aaa authorization config-commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jul 2008 16:15:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-design/m-p/1036057#M406509</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2008-07-24T16:15:33Z</dc:date>
    </item>
  </channel>
</rss>

