<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Admin access scenario in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702539#M421433</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks but i have just one qtn, i'm using the Cisco ACS Appliance(CSACSE-1113-K9). correct me if i'm wrong but is DCS available on that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Mar 2007 12:23:24 GMT</pubDate>
    <dc:creator>echelon360</dc:creator>
    <dc:date>2007-03-08T12:23:24Z</dc:date>
    <item>
      <title>Admin access scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702535#M421425</link>
      <description>&lt;P&gt;Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what's the best way to deploy the below-mentioned setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's setup on tacacs&lt;/P&gt;&lt;P&gt;-NDGs containing list of AAA devices classfied by country.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an administrator that needs to access only 3 of the NDG and be denied access to the rest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do i achieve this with&lt;/P&gt;&lt;P&gt;-New group setup restricting TACACS+ and Enable Options to just the 3 NDGs?&lt;/P&gt;&lt;P&gt;-create this new administrator and have him assgined to this new group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also,am i able to do the following :&lt;/P&gt;&lt;P&gt;-make a user be part of several Groups&lt;/P&gt;&lt;P&gt;-allow a user acces to 1 NDG and several standalone AAA clients that are not part of a group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 22:01:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702535#M421425</guid>
      <dc:creator>echelon360</dc:creator>
      <dc:date>2019-03-10T22:01:26Z</dc:date>
    </item>
    <item>
      <title>Re: Admin access scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702536#M421427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have a couple of choices. If this admin belongs to a group and they have similar profiles you could create a group with an IP based NAR allowing access to only the named NDGs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or, if its a special case you can assign NARs directly to the admin user in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User cannot be in several groups. However using NDG-&amp;gt;NAR and NDG-&amp;gt;DCS mappings you can make users of a group get different authorisations based on the devices being managed, eg NDG1-&amp;gt;full access, NDG2-&amp;gt;read only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NARs can contain NDGs, NAFs and individual devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darran&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Mar 2007 12:18:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702536#M421427</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2007-03-06T12:18:50Z</dc:date>
    </item>
    <item>
      <title>Re: Admin access scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702537#M421428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the notes on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've created two Shell Command authorization Set&lt;/P&gt;&lt;P&gt;-Full Rights&lt;/P&gt;&lt;P&gt;-Read Only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've assigned a user access to specific NDG with full rights.When i use his credentials to log into another switch that is not part of his NDG allow list,i'm puzzled. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i can't get into enable mode (that's the intended purpose) but i can run show ip/trace/ping w/o going to enable mode. It seems that this user has been assigned the Read-only shell command authorization set for all other switches. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way i can stop this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Mar 2007 08:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702537#M421428</guid>
      <dc:creator>echelon360</dc:creator>
      <dc:date>2007-03-08T08:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Admin access scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702538#M421430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm, interesting in theory the default position should always be to deny.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway you could force this. Create a new empty DCS with default cmd = deny.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add an entry at the bottom of the NDG-&amp;gt;DCS mapping table using the special &lt;DEFAULT&gt; entry, ie &lt;DEFAULT&gt; --&amp;gt; DENYALL.&lt;/DEFAULT&gt;&lt;/DEFAULT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesnt fix it... then, um.. I'll eat my hat!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Mar 2007 12:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702538#M421430</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2007-03-08T12:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Admin access scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702539#M421433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks but i have just one qtn, i'm using the Cisco ACS Appliance(CSACSE-1113-K9). correct me if i'm wrong but is DCS available on that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Mar 2007 12:23:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702539#M421433</guid>
      <dc:creator>echelon360</dc:creator>
      <dc:date>2007-03-08T12:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Admin access scenario</title>
      <link>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702540#M421438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, DCSs are available. You might have to switch them on in interface config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Mar 2007 15:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/admin-access-scenario/m-p/702540#M421438</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2007-03-08T15:17:10Z</dc:date>
    </item>
  </channel>
</rss>

