<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IOS-XR AAA Issue in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ios-xr-aaa-issue/m-p/806764#M420755</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think probably priv lvl mappings work for TACACS only, switching over ot TACACS may help you. Following links may help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008009465c.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008009465c.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps5845/products_command_reference_chapter09186a00806afb36.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps5845/products_command_reference_chapter09186a00806afb36.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 May 2007 18:27:24 GMT</pubDate>
    <dc:creator>carenas123</dc:creator>
    <dc:date>2007-05-17T18:27:24Z</dc:date>
    <item>
      <title>IOS-XR AAA Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-xr-aaa-issue/m-p/806763#M420754</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will have to describe our infrastructure if I want to explain our&lt;/P&gt;&lt;P&gt;problem. In our network, we are running both Cisco IOS and Cisco IOS-XR.&lt;/P&gt;&lt;P&gt;Every device is configured for RADIUS authentication and authorization&lt;/P&gt;&lt;P&gt;(exec).  This is the used configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco IOS:&lt;/P&gt;&lt;P&gt;--- cut ---&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default radius local&lt;/P&gt;&lt;P&gt;aaa authorization exec default radius local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius-server host &amp;lt;omitted output&amp;gt;&lt;/P&gt;&lt;P&gt;radius-server key &amp;lt;omitted output&amp;gt;&lt;/P&gt;&lt;P&gt;--- cut ---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco IOS-XR:&lt;/P&gt;&lt;P&gt;--- cut ---&lt;/P&gt;&lt;P&gt;aaa authorization exec default group radius local&lt;/P&gt;&lt;P&gt;aaa authentication login default group radius local&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;radius-server host &amp;lt;omitted output&amp;gt;&lt;/P&gt;&lt;P&gt;radius-server key &amp;lt;omitted output&amp;gt;&lt;/P&gt;&lt;P&gt;--- cut ---&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the problem description. It is enough to send attribute type 6&lt;/P&gt;&lt;P&gt;(Service-Type) with value 6 (Administrative) to login on Cisco-IOS and get&lt;/P&gt;&lt;P&gt;administrator privilege. But to get administrator privilege on Cisco IOS-XR&lt;/P&gt;&lt;P&gt;I have to send Cisco-AVPair = ?shell:tasks=#root-system? or some other&lt;/P&gt;&lt;P&gt;definition of task list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And actually the problematic point is when I want to use single admin&lt;/P&gt;&lt;P&gt;account to log on both Cisco IOS and Cisco IOS-XR. IOS-XR can handle this&lt;/P&gt;&lt;P&gt;account configuration, but once I send that Cisco-AVPair  to cisco IOS, I&lt;/P&gt;&lt;P&gt;got access-reject.&lt;/P&gt;&lt;P&gt;Attached the debug's file.&lt;/P&gt;&lt;P&gt;So I was trying to find solution for this (basically other method how to&lt;/P&gt;&lt;P&gt;log on IOS-XR and not send task list). I found this web page:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps5845/products_configuration_guide_chapter09186a00806f9eb4.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps5845/products_configuration_guide_chapter09186a00806f9eb4.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;?AAA supports a mapping between privilege levels defined for the user in&lt;/P&gt;&lt;P&gt;the external TACACS+ server configuration file and local user groups.&lt;/P&gt;&lt;P&gt;Following TACACS+ authentication, the task map of the user group that has&lt;/P&gt;&lt;P&gt;been mapped from the privilege level returned from the external TACACS+&lt;/P&gt;&lt;P&gt;server is assigned to the user. For example, if a privilege level of 5 is&lt;/P&gt;&lt;P&gt;returned from the external TACACS server, AAA attempts to get the task map&lt;/P&gt;&lt;P&gt;of the local user group priv5. This mapping process is similar for other&lt;/P&gt;&lt;P&gt;privilege levels from 1 to 13. For privilege level 15, the root-system user&lt;/P&gt;&lt;P&gt;group is used; privilege level 14 maps to the user group owner-sdr. ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was trying to send priv-lvl to Cisco IOS-XR, but nothing like this&lt;/P&gt;&lt;P&gt;mapping happened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So finally the questions:&lt;/P&gt;&lt;P&gt;     ?         Is this priv-lvl mapping working only for TACACS+ and not&lt;/P&gt;&lt;P&gt;     for RADIUS or is there any special configuration needed on Cisco&lt;/P&gt;&lt;P&gt;     IOS-XR ?&lt;/P&gt;&lt;P&gt;     ?         What will be your recommendation to solve this issue&lt;/P&gt;&lt;P&gt;     (shared RADIUS server for both Cisco IOS and IOS-XR) ? Use of two&lt;/P&gt;&lt;P&gt;     separate accounts (one for IOS and one for IOS-XR) is not an option&lt;/P&gt;&lt;P&gt;     here, because we are using RSA tokens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any comments on that..&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-xr-aaa-issue/m-p/806763#M420754</guid>
      <dc:creator>balsheikh</dc:creator>
      <dc:date>2019-03-10T22:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: IOS-XR AAA Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-xr-aaa-issue/m-p/806764#M420755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think probably priv lvl mappings work for TACACS only, switching over ot TACACS may help you. Following links may help you&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008009465c.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008009465c.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps5845/products_command_reference_chapter09186a00806afb36.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps5845/products_command_reference_chapter09186a00806afb36.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2007 18:27:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-xr-aaa-issue/m-p/806764#M420755</guid>
      <dc:creator>carenas123</dc:creator>
      <dc:date>2007-05-17T18:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: IOS-XR AAA Issue</title>
      <link>https://community.cisco.com/t5/network-access-control/ios-xr-aaa-issue/m-p/806765#M420756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In RADIUS protocol, authorization settings are passed to the device, at the time of authentication, in the form of attribute value pairs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is different from how TACACS works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Essentially, what you want to do is to pass a vendor-specific attribute value pair to the router or switch at the time of login that specifies the user's privelege level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following example causes a user logging in from a network access server to have immediate access to EXEC commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cisco-avpair= "shell:priv-lvl=15"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to Assign Privilege Levels with TACACS+ and RADIUS&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008009465c.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk59/technologies_tech_note09186a008009465c.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 May 2007 20:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ios-xr-aaa-issue/m-p/806765#M420756</guid>
      <dc:creator>jeremyault</dc:creator>
      <dc:date>2007-05-17T20:12:24Z</dc:date>
    </item>
  </channel>
</rss>

