<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: user restrictions via tac+ in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/user-restrictions-via-tac/m-p/906224#M408474</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the reason that you are able to use ping command is, because "ping" command level is not being authorized.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e. by default on IOS device we have three level, namely 0, 1 and 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At level zero you have command: disable, enable, exit, help, and logout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think ping command is either at level 1 or 15, given you have not changed the level of command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would suggest following,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 AUTHO-VTY group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 AUTHO-VTY group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 AUTHO-VTY group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 903&lt;/P&gt;&lt;P&gt; no authorization commands 0 en0&lt;/P&gt;&lt;P&gt; no authorization commands 5 RESTRICT&lt;/P&gt;&lt;P&gt; authorization commands 0 AUTHO-VTY&lt;/P&gt;&lt;P&gt; authorization commands 1 AUTHO-VTY&lt;/P&gt;&lt;P&gt; authorization commands 15 AUTHO-VTY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then configure permitted or denied commands accordingly on Tacacs server user profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Oct 2007 22:33:22 GMT</pubDate>
    <dc:creator>Premdeep Banga</dc:creator>
    <dc:date>2007-10-25T22:33:22Z</dc:date>
    <item>
      <title>user restrictions via tac+</title>
      <link>https://community.cisco.com/t5/network-access-control/user-restrictions-via-tac/m-p/906223#M408473</link>
      <description>&lt;P&gt;hi @all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm trying to restrict a user with tacacs+. the relevant router &amp;amp; tac.-config are as following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ios:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login console group tacacs+ local enable&lt;/P&gt;&lt;P&gt;aaa authentication login vty group tacacs+ local enable&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 en0 group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 5 RESTRICT group tacacs+&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication console&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 903&lt;/P&gt;&lt;P&gt; authorization commands 0 en0&lt;/P&gt;&lt;P&gt; authorization commands 5 RESTRICT&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication vty&lt;/P&gt;&lt;P&gt; transport input ssh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    user = guck {&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      login = cleartext guck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        service = shell { priv_level = 5 }&lt;/P&gt;&lt;P&gt;        cmd = enable { deny .* }&lt;/P&gt;&lt;P&gt;        cmd = show { permit ver deny .* }&lt;/P&gt;&lt;P&gt;        cmd = traceroute { permit .* }&lt;/P&gt;&lt;P&gt;        cmd = exit { permit .* }&lt;/P&gt;&lt;P&gt;        }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it's partially working, so i can't execute the enable command, but i can do a lot more than "show ver" as intended, and more than traceroute and exit. i can execute ping as well and various other commands. now i'd like to know if it's possible at all to restrict a user to the above mentioned commands in conjunction with tacacs, or doesn't this work that way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tia&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;erik&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-restrictions-via-tac/m-p/906223#M408473</guid>
      <dc:creator>erik.neuwirth</dc:creator>
      <dc:date>2019-03-10T22:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: user restrictions via tac+</title>
      <link>https://community.cisco.com/t5/network-access-control/user-restrictions-via-tac/m-p/906224#M408474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the reason that you are able to use ping command is, because "ping" command level is not being authorized.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e. by default on IOS device we have three level, namely 0, 1 and 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At level zero you have command: disable, enable, exit, help, and logout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think ping command is either at level 1 or 15, given you have not changed the level of command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would suggest following,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 AUTHO-VTY group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 AUTHO-VTY group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 AUTHO-VTY group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 903&lt;/P&gt;&lt;P&gt; no authorization commands 0 en0&lt;/P&gt;&lt;P&gt; no authorization commands 5 RESTRICT&lt;/P&gt;&lt;P&gt; authorization commands 0 AUTHO-VTY&lt;/P&gt;&lt;P&gt; authorization commands 1 AUTHO-VTY&lt;/P&gt;&lt;P&gt; authorization commands 15 AUTHO-VTY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then configure permitted or denied commands accordingly on Tacacs server user profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2007 22:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-restrictions-via-tac/m-p/906224#M408474</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2007-10-25T22:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: user restrictions via tac+</title>
      <link>https://community.cisco.com/t5/network-access-control/user-restrictions-via-tac/m-p/906225#M408477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Prem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you very much for your help! you hit the bull's-eye!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;erik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Oct 2007 07:15:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/user-restrictions-via-tac/m-p/906225#M408477</guid>
      <dc:creator>erik.neuwirth</dc:creator>
      <dc:date>2007-10-26T07:15:04Z</dc:date>
    </item>
  </channel>
</rss>

