<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: aaa authorization exec default group radius in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718879#M420728</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're trying to set authorization for each type or level of command - that is called "remote command authorization" and is done through TACACS+. RADIUS command authorization is not supported; this is a limitation of the RADIUS protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source: &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800949d6.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800949d6.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, while RADIUS command authorization is not supported. Telnet and enable authentication is possible with ACS using RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try "aaa authentication enable default group radius local"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will require RADIUS authentication before enable mode will be granted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: If you found this post helpful - please rate it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 15 May 2007 18:40:57 GMT</pubDate>
    <dc:creator>jeremyault</dc:creator>
    <dc:date>2007-05-15T18:40:57Z</dc:date>
    <item>
      <title>aaa authorization exec default group radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718878#M420727</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a simple config on my router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius local&lt;/P&gt;&lt;P&gt;aaa authorization exec default group radius&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ACS user account is a member of an unmodified group on the ACS server.  I have not set a privilege level in the Cisco-AV pair nor have I set the Service Type.  The user is able to log in but does not go directly to privilege exec.  The enable secret must still be supplied.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I successfully capture the RADIUS Access Request and Accept messages on the ACS server.  If I configure the priv level and frame type on ACS, they are returned in the Accept message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I don't configure the priv level or the frames protocol shouldn't authorization fail?  I don't see why the exec session is being granted if it is not specified in ACS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any insight on my config is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:09:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718878#M420727</guid>
      <dc:creator>itdojo</dc:creator>
      <dc:date>2019-03-10T22:09:47Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorization exec default group radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718879#M420728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you're trying to set authorization for each type or level of command - that is called "remote command authorization" and is done through TACACS+. RADIUS command authorization is not supported; this is a limitation of the RADIUS protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source: &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800949d6.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00800949d6.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, while RADIUS command authorization is not supported. Telnet and enable authentication is possible with ACS using RADIUS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try "aaa authentication enable default group radius local"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will require RADIUS authentication before enable mode will be granted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: If you found this post helpful - please rate it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2007 18:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718879#M420728</guid>
      <dc:creator>jeremyault</dc:creator>
      <dc:date>2007-05-15T18:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorization exec default group radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718880#M420729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jeremy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate the benefits of using TACACS+ for admin control and recognize that it is preferable.  I am just trying to develop a better idea of what to expect when RADIUS is used (not that it should be).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS returns the priv-lvl value in the RADIUS accept message independant of the configuration of exec authorization on the router.  It makes sense that the router ignorers it when authorization is not configured.  A user authenticated by ACS without authorization is initially granted level 1 privelege.  After enabling authorization on the router and configuring ACS to return level 7 for a specific group I see that the user, immediately upon authentication, is authorized and given level 7 privilege.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What bugs me is that RADIUS appears to allow ANY ACS authenticated user to have level 1 access to the router.  The absence of a privilege level in ACS when authorization is enabled on the router is ignored.  If that is the case how, when using radius for authentication AND authorization, do I prevent "sally" in accounting from getting into user exec on my router?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2007 20:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718880#M420729</guid>
      <dc:creator>itdojo</dc:creator>
      <dc:date>2007-05-15T20:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: aaa authorization exec default group radius</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718881#M420730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand I little better now what you're saying.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In RADIUS, the authentication and authorization are always "together" and occur at the same time. If the username is found and the password is correct, the RADIUS server returns an Access-Accept response, including a list of Attribute-Value pairs that describe the parameters to be used for this session. Typical parameters include service type, protocol type, ip address assignment, access lists, or static routes to name a few. Also, as you mentioned, it can assign a priv-lvl value for the user's session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are right -- "ACS returns the priv-lvl value in the RADIUS accept message independant of the configuration of exec authorization on the router."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My guess is that if you don't have a specific value set for that attribute on the ACS server, it will return a default value - maybe 1 in this case. When that happens, the user should have that privelege level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The typical solution is to create user groups in the ACS server. One group you configure with the priv-lvl=15 and the other group will have priv-lvl=1. Then put the users in the different groups based on what privelege levels you want them to have.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 May 2007 21:47:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authorization-exec-default-group-radius/m-p/718881#M420730</guid>
      <dc:creator>jeremyault</dc:creator>
      <dc:date>2007-05-15T21:47:33Z</dc:date>
    </item>
  </channel>
</rss>

