<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PRIVILEGE LEVELS FOR ACS WITH AD DATABASE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777448#M420463</link>
    <description>&lt;P&gt;How do I configure two separate privilige levels for two groups. These groups exist in the AD database i.e. my ACS (Pri &amp;amp; Backup) are looking in AD for authentication.&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 22:12:10 GMT</pubDate>
    <dc:creator>htaluja_2</dc:creator>
    <dc:date>2019-03-10T22:12:10Z</dc:date>
    <item>
      <title>PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777448#M420463</link>
      <description>&lt;P&gt;How do I configure two separate privilige levels for two groups. These groups exist in the AD database i.e. my ACS (Pri &amp;amp; Backup) are looking in AD for authentication.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777448#M420463</guid>
      <dc:creator>htaluja_2</dc:creator>
      <dc:date>2019-03-10T22:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777449#M420465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;If you are using TACACS ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bring users/groups in at level needed&lt;/P&gt;&lt;P&gt;	1.  Go to user or group setup in ACS&lt;/P&gt;&lt;P&gt;	2.  Drop down to "TACACS+ Settings"&lt;/P&gt;&lt;P&gt;	3.  Place a check in "Shell (Exec)"&lt;/P&gt;&lt;P&gt;	4.  Place a check in "Privilege level" and enter " priv "(1 to 15) in the adjacent field&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using RADIUS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius local&lt;/P&gt;&lt;P&gt;aaa authorization exec default group radius local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;radius-server host X.X.X.X key XXXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following is the configuration required in the Radius Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AV pair in the ACS --&amp;gt;group setup--&amp;gt; IETF RADIUS Attributes&lt;/P&gt;&lt;P&gt;[006] Service-Type = Login&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/* Following is for getting the user straight in privledge mode */ to set priv 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AV pair in Cisco IOS/PIX RADIUS Attributes&lt;/P&gt;&lt;P&gt;[009\001] cisco-av-pair = shell:priv-lvl=15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For more information on above commands, please refer to the following link :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsec" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsec&lt;/A&gt;&lt;/P&gt;&lt;P&gt;ur_c/fsaaa/index.htm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please try the above and let me know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 18:26:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777449#M420465</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2007-06-08T18:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777450#M420466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! I'll try these and get back to you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 18:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777450#M420466</guid>
      <dc:creator>htaluja_2</dc:creator>
      <dc:date>2007-06-08T18:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777451#M420467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that you have,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization exec default group radius....&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or something similar EXEC authorization command in your configuration along with authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2007 21:42:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777451#M420467</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2007-06-08T21:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777452#M420468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did and it works. I just get the following message though:&lt;/P&gt;&lt;P&gt;AAA/Author: config command authorization not enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as soon as I enter it. Following is the list of commands I have on the Switch. This is a test switch for ACS. Let me know if anything is amiss.&lt;/P&gt;&lt;P&gt;____________________________________&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login NO_AUTH none&lt;/P&gt;&lt;P&gt;aaa authentication login RADIUS line&lt;/P&gt;&lt;P&gt;aaa authentication login LOC_AUTH group radius line&lt;/P&gt;&lt;P&gt;aaa authentication enable default enable&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting send stop-record authentication failure&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting connection default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting system default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;_________________________&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2007 16:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777452#M420468</guid>
      <dc:creator>htaluja_2</dc:creator>
      <dc:date>2007-06-12T16:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777453#M420469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice to know that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please add one more command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should fix it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Jagdeep &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: If that answers your question, then please mark this thread as resolved, so that others can benefit from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2007 16:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777453#M420469</guid>
      <dc:creator>Jagdeep Gambhir</dc:creator>
      <dc:date>2007-06-12T16:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777454#M420470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I shall, just as soon as I find out what the command does? Please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2007 16:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777454#M420470</guid>
      <dc:creator>htaluja_2</dc:creator>
      <dc:date>2007-06-12T16:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777455#M420471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A MAJOR problem. Upon executing the two commands:&lt;/P&gt;&lt;P&gt;aaa author exec def group tacacs+ none..I can no longer goto priv mode from my console connection. The workaround that I have created two sets of authorization execs:&lt;/P&gt;&lt;P&gt;aaa authorization exec NO_AUTH none&lt;/P&gt;&lt;P&gt;aaa authorization exec TAC_AUTH group tacacs+ none&lt;/P&gt;&lt;P&gt;Applied NO_AUTH to console&lt;/P&gt;&lt;P&gt;applied LOC_AUTH to vty.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously, when you proposed the use of aaa authorization exec def group tacacs+, you did not intend the user to be unable to login to console port. So what would be the course in that case. In addition, is my solution 'best practices' or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2007 17:18:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777455#M420471</guid>
      <dc:creator>htaluja_2</dc:creator>
      <dc:date>2007-06-12T17:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: PRIVILEGE LEVELS FOR ACS WITH AD DATABASE</title>
      <link>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777456#M420472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authorization is not enabled on console by default, and no matter which authorization method list you apply on console it wont take effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Untill you specify "aaa authorization console" command, its a hidden command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont do it, as it will enable command authorization to be applied on console as well. If you want to keep console apart from command authorization, then dont specify the command. If you want console to work the way telnet/ssh does, then yes go for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as your issue goes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you have "aaa authentication enable default enable"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you must be landing,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Switch&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that you have enable password configured on switch, and you are using the same enable password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jun 2007 22:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/privilege-levels-for-acs-with-ad-database/m-p/777456#M420472</guid>
      <dc:creator>Premdeep Banga</dc:creator>
      <dc:date>2007-06-12T22:31:46Z</dc:date>
    </item>
  </channel>
</rss>

