<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA authentication and authorization question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637221#M421772</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You sound like a sale guy.  I am not interested&lt;/P&gt;&lt;P&gt;in Cisco Secure ACS.  I am using Freeware &lt;/P&gt;&lt;P&gt;TACACS and I would like to know how I can do &lt;/P&gt;&lt;P&gt;this with Freeware TACACS.  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 10 Feb 2007 03:15:13 GMT</pubDate>
    <dc:creator>daviddtran</dc:creator>
    <dc:date>2007-02-10T03:15:13Z</dc:date>
    <item>
      <title>AAA authentication and authorization question</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637219#M421766</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a situation that is driving me crazy.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using Cisco Freeware TACACS running on RedHat&lt;/P&gt;&lt;P&gt;Enterprise Linux 3.  I've modified the source code&lt;/P&gt;&lt;P&gt;so that I can assign each individual users his/her&lt;/P&gt;&lt;P&gt;own enable password.  So far so good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I create two groups:  group_A and group_S.  group_A&lt;/P&gt;&lt;P&gt;is for advanced users and group_S is for super&lt;/P&gt;&lt;P&gt;users.  Users that belong to group_A can have &lt;/P&gt;&lt;P&gt;privilege level 15 but there are certain commands&lt;/P&gt;&lt;P&gt;that they can not perform such as "write mem"&lt;/P&gt;&lt;P&gt;or "reload".  users that belong to group_S can do&lt;/P&gt;&lt;P&gt;EVERYTHING.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my configuration on the TACACS configuration&lt;/P&gt;&lt;P&gt;file:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user =   xyz   {&lt;/P&gt;&lt;P&gt;         member = admin&lt;/P&gt;&lt;P&gt;         name = "User X"&lt;/P&gt;&lt;P&gt;         login = des 6.z8oIm9UGHo&lt;/P&gt;&lt;P&gt;                   }&lt;/P&gt;&lt;P&gt;user =   $xyz$ {&lt;/P&gt;&lt;P&gt;         member = admin&lt;/P&gt;&lt;P&gt;         name = "User X"&lt;/P&gt;&lt;P&gt;         login = des c2bUC43cmsac.&lt;/P&gt;&lt;P&gt;                }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;user =   abc   {&lt;/P&gt;&lt;P&gt;         member = advanced&lt;/P&gt;&lt;P&gt;         name = "User abc"&lt;/P&gt;&lt;P&gt;         login = cleartext "cisco123"&lt;/P&gt;&lt;P&gt;                   }&lt;/P&gt;&lt;P&gt;user =   $abc$ {&lt;/P&gt;&lt;P&gt;         member = advanced&lt;/P&gt;&lt;P&gt;         name = "User abc"&lt;/P&gt;&lt;P&gt;         login = cleartext "cisco123"&lt;/P&gt;&lt;P&gt;                   }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group =  advanced {&lt;/P&gt;&lt;P&gt;    default service = deny&lt;/P&gt;&lt;P&gt;         cmd = show { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = copy { permit flash }&lt;/P&gt;&lt;P&gt;         cmd = copy { permit running }&lt;/P&gt;&lt;P&gt;         cmd = ping { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = configure { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = enable { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = disable { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = telnet { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = disconnect { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = where { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = set { permit .* }&lt;/P&gt;&lt;P&gt;         cmd = clear { permit line }&lt;/P&gt;&lt;P&gt;         cmd = exit  { permit .* }&lt;/P&gt;&lt;P&gt;                 }&lt;/P&gt;&lt;P&gt;group = admin {&lt;/P&gt;&lt;P&gt;         default service = permit&lt;/P&gt;&lt;P&gt;              }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configuration of the router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login notac none&lt;/P&gt;&lt;P&gt;aaa authentication login VTY group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login web local enable&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec notac none&lt;/P&gt;&lt;P&gt;aaa authorization exec VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization network VTY group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa accounting exec TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting exec VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 0 TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 0 VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 10 TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 TAC start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting network VTY start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 15&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; authorization commands 0 VTY&lt;/P&gt;&lt;P&gt; authorization commands 1 VTY&lt;/P&gt;&lt;P&gt; authorization commands 15 VTY&lt;/P&gt;&lt;P&gt; authorization exec VTY&lt;/P&gt;&lt;P&gt; accounting commands 0 VTY&lt;/P&gt;&lt;P&gt; accounting commands 1 VTY&lt;/P&gt;&lt;P&gt; accounting commands 15 VTY&lt;/P&gt;&lt;P&gt; accounting exec VTY&lt;/P&gt;&lt;P&gt; login authentication VTY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, what I would like to do is to assign users&lt;/P&gt;&lt;P&gt;in group_A the ability to go into "configuration t"&lt;/P&gt;&lt;P&gt;but I do NOT want them to have the ability to peform&lt;/P&gt;&lt;P&gt;"no tacacs-server host x.x.x.x key cisco".  Furthermore,&lt;/P&gt;&lt;P&gt;I would like to do everything via TACACS, I don't &lt;/P&gt;&lt;P&gt;want configure "privilege level" on the router itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that possible?  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:58:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637219#M421766</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2019-03-10T21:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication and authorization question</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637220#M421770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Command Authorization Sets?Command authorization sets provide a centralized mechanism to manage TACACS+ administrative control. Driven by some of the largest enterprise and service provider networks that use Cisco Secure ACS, command authorization sets provide a method to group and name device command profiles that can be paired with users, groups of users, or network device groups. A key benefit of command authorization sets is the ability to remove any requirement of individual privilege level or command restrictions on each AAA client. This feature greatly enhances the scalability and manageability of setting device command authorization restrictions for network administrators. &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2086/prod_release_note09186a00800ada4c.html" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2086/prod_release_note09186a00800ada4c.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Feb 2007 18:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637220#M421770</guid>
      <dc:creator />
      <dc:date>2007-02-09T18:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication and authorization question</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637221#M421772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You sound like a sale guy.  I am not interested&lt;/P&gt;&lt;P&gt;in Cisco Secure ACS.  I am using Freeware &lt;/P&gt;&lt;P&gt;TACACS and I would like to know how I can do &lt;/P&gt;&lt;P&gt;this with Freeware TACACS.  Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 10 Feb 2007 03:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637221#M421772</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-10T03:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication and authorization question</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637222#M421774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First you will need "aaa authorization config-commands" on the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next you will have to setup group_a to permit everything except deny "write mem", "tacacs-server" etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2007 15:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637222#M421774</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-02-13T15:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication and authorization question</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637223#M421775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vivek,&lt;/P&gt;&lt;P&gt;your provided worked wonderfully.  It works very well with my Freeware TACACS+.  Check this&lt;/P&gt;&lt;P&gt;out:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CiscoIOS#conf t&lt;/P&gt;&lt;P&gt;Enter configuration commands, one per line.  End with CNTL/Z.&lt;/P&gt;&lt;P&gt;CisciIOS(config)#int lo0&lt;/P&gt;&lt;P&gt;Command authorization failed.&lt;/P&gt;&lt;P&gt;                   ^&lt;/P&gt;&lt;P&gt;% Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CiscoIOS(config)#no tacacs-server host 192.168.15.101 key cisco&lt;/P&gt;&lt;P&gt;Command authorization failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% Incomplete command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CiscoIOS(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Feb 2007 18:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637223#M421775</guid>
      <dc:creator>daviddtran</dc:creator>
      <dc:date>2007-02-14T18:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication and authorization question</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637224#M421777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad it worked. Do rate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vivek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Feb 2007 18:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637224#M421777</guid>
      <dc:creator>Vivek Santuka</dc:creator>
      <dc:date>2007-02-14T18:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: AAA authentication and authorization question</title>
      <link>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637225#M421779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David,&lt;/P&gt;&lt;P&gt;I have some questions about authorization commands set using in CS ACS.&lt;/P&gt;&lt;P&gt;I want to control many line commands in global configuration mode such as aaa, username, crypto. ACS don't permit this with authorization commands set. do you know how i can control these commands&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Apr 2007 15:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/aaa-authentication-and-authorization-question/m-p/637225#M421779</guid>
      <dc:creator>edi_nabil</dc:creator>
      <dc:date>2007-04-03T15:18:12Z</dc:date>
    </item>
  </channel>
</rss>

