<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using ACS to deny show tech-support  in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201062#M419011</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are three default command levels in IOS: 0, 1, and 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I beleive that "show tech-support" is not a level 15 command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this Document ID: 13860 for a better explanation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Apr 2009 12:25:30 GMT</pubDate>
    <dc:creator>ansalaza</dc:creator>
    <dc:date>2009-04-15T12:25:30Z</dc:date>
    <item>
      <title>Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201052#M418982</link>
      <description>&lt;P&gt;I am trying to deny the show tech-support command using Cisco Secure ACS command authorization sets (picture included). All other deny commands are working (is show running-config) but no matter what I do the show tech is un-successful. Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 23:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201052#M418982</guid>
      <dc:creator>junpati</dc:creator>
      <dc:date>2019-03-10T23:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201053#M418987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does it fail too if you complete the argument? &lt;/P&gt;&lt;P&gt;command=show&lt;/P&gt;&lt;P&gt;argument=tech-support&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Apr 2009 21:54:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201053#M418987</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-04-13T21:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201054#M418990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you see any hits on acs failed attempts when show tech command fails? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also check debug aaa authorization output and see if the device is sending show tech to ACS for authorization. It could be due to bug where in some commands are not sent to tacacs server for authorization check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 12:37:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201054#M418990</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-04-14T12:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201055#M418992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JG,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No hits on the failed attempts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no output from the debug when issuing the show tech. However check out the attached xls which shows the actual commands that are being sent after issuing the show tech.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I issue those commands separately (see attached notepad) they are in fact denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this looks like a bug.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 17:17:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201055#M418992</guid>
      <dc:creator>junpati</dc:creator>
      <dc:date>2009-04-14T17:17:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201056#M418995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have these authorization commands configured?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ local&lt;/P&gt;&lt;P&gt;tacacs-server host 10.1.1.1 key cisco123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug aaa author should display:&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/CMD: tty2 (2846421758) user='switchuser'&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/CMD (2846421758): send AV service=shell&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/CMD (2846421758): send AV cmd=show&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/CMD (2846421758): send AV cmd-arg=tech-support&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/CMD (2846421758): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/CMD (2846421758): found list "default"&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/CMD (2846421758): Method=tacacs+ (tacacs+)&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/TAC+: (2846421758): user=switchuser&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/TAC+: (2846421758): send AV service=shell&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/TAC+: (2846421758): send AV cmd=show&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/TAC+: (2846421758): send AV cmd-arg=tech-support&lt;/P&gt;&lt;P&gt;AAA/AUTHOR/TAC+: (2846421758): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;TAC+: Using default tacacs server-group "tacacs+" list.&lt;/P&gt;&lt;P&gt;TAC+: Opening TCP/IP to 10.1.1.1/49 timeout=5&lt;/P&gt;&lt;P&gt;TAC+: Opened TCP/IP handle 0x2E8FEA4 to 10.1.1.1/49&lt;/P&gt;&lt;P&gt;TAC+: 10.1.1.1 (2846421758) AUTHOR/START queued&lt;/P&gt;&lt;P&gt;TAC+: (2846421758) AUTHOR/START processed&lt;/P&gt;&lt;P&gt;TAC+: (-1448545538): received author response status = FAIL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure to modify the original ACS Shell Command Authorization...&lt;/P&gt;&lt;P&gt;deny tech-support instead of deny tech.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 19:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201056#M418995</guid>
      <dc:creator>ansalaza</dc:creator>
      <dc:date>2009-04-14T19:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201057#M418998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So it seems that the device is not sending show tech command to ACS for authorization check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show tech is not listed in tacacs admin logs and nor in debugs aaa authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most likely a bug in IOS. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 20:14:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201057#M418998</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-04-14T20:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201058#M419000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;BINGO!!! That was it. Thanks ansalaza.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the following commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization exec default group TACACS_ADMIN local if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group TACACS_ADMIN if-authenticated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but not&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 default group tacacs+ local &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you elaborate a little more on what those commands do and also what do I need the if-authenticated keyword, I still am not quite sure what exactly that does or if it is needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 20:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201058#M419000</guid>
      <dc:creator>junpati</dc:creator>
      <dc:date>2009-04-14T20:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201059#M419003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you use 'if-authenticated' any authentication method (line, local, etc.) will allow for successful authorization.  However, if the TACACS+ server goes down during a session, all author will fail until a new authen occurs (log out and log back in).  This allows for an extra security measure so that a user with low privileges cannot suddenly run any command if the AAA server goes down.  They must have access to the backup authen method.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 20:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201059#M419003</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-04-14T20:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201060#M419007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So are you saying that the if-authenticated keyword essentially bypasses command authorization and as long as a user is able to authenticate they can use all commands?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 20:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201060#M419007</guid>
      <dc:creator>junpati</dc:creator>
      <dc:date>2009-04-14T20:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201061#M419008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, it provides extra security measure so that a user with low privileges cannot suddenly run any command if the AAA server goes down. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Apr 2009 20:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201061#M419008</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-04-14T20:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201062#M419011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are three default command levels in IOS: 0, 1, and 15.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I beleive that "show tech-support" is not a level 15 command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this Document ID: 13860 for a better explanation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Apr 2009 12:25:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201062#M419011</guid>
      <dc:creator>ansalaza</dc:creator>
      <dc:date>2009-04-15T12:25:30Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201063#M419014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jg -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am testing and I think you have it wrong. What I find is that if the TACACS server becomes unavailable an authenticated user has access to any commands. See for yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;02:16:01: tty1 AAA/AUTHOR/CMD (3085690506): Port='tty1' list='' service=CMD&lt;/P&gt;&lt;P&gt;02:16:01: AAA/AUTHOR/CMD: tty1 (3085690506) user='temp'&lt;/P&gt;&lt;P&gt;02:16:01: tty1 AAA/AUTHOR/CMD (3085690506): send AV service=shell&lt;/P&gt;&lt;P&gt;02:16:01: tty1 AAA/AUTHOR/CMD (3085690506): send AV cmd=show&lt;/P&gt;&lt;P&gt;02:16:01: tty1 AAA/AUTHOR/CMD (3085690506): send AV cmd-arg=running-config&lt;/P&gt;&lt;P&gt;02:16:01: tty1 AAA/AUTHOR/CMD (3085690506): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;02:16:01: tty1 AAA/AUTHOR/CMD (3085690506): found list "default"&lt;/P&gt;&lt;P&gt;02:16:01: tty1 AAA/AUTHOR/CMD (3085690506): Method=TACACS_ADMIN (tacacs+)&lt;/P&gt;&lt;P&gt;02:16:01: AAA/AUTHOR/TAC+: (3085690506): user=temp&lt;/P&gt;&lt;P&gt;02:16:01: AAA/AUTHOR/TAC+: (3085690506): send AV service=shell&lt;/P&gt;&lt;P&gt;02:16:01: AAA/AUTHOR/TAC+: (3085690506): send AV cmd=show&lt;/P&gt;&lt;P&gt;02:16:01: AAA/AUTHOR/TAC+: (3085690506): send AV cmd-arg=running-config&lt;/P&gt;&lt;P&gt;02:16:01: AAA/AUTHOR/TAC+: (3085690506): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;02:16:11: AAA/AUTHOR (3085690506): Post authorization status = ERROR&lt;/P&gt;&lt;P&gt;02:16:11: tty1 AAA/AUTHOR/CMD (3085690506): Method=IF_AUTHEN&lt;/P&gt;&lt;P&gt;02:16:11: AAA/AUTHOR (3085690506): Post authorization status = PASS_ADD&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Apr 2009 18:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201063#M419014</guid>
      <dc:creator>junpati</dc:creator>
      <dc:date>2009-04-15T18:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using ACS to deny show tech-support</title>
      <link>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201064#M419017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you are correct. I messed up here. If we use "if-authenticated" the user would be allowed to access the requested function provided the user has been authenticated successfully. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the confusion here and thanks for correcting me. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;~JG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Apr 2009 19:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-acs-to-deny-show-tech-support/m-p/1201064#M419017</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2009-04-15T19:29:27Z</dc:date>
    </item>
  </channel>
</rss>

