<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Control access to network device with ACS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/control-access-to-network-device-with-acs/m-p/561206#M427773</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for the help.  I looked at the failed attempts log and found the NAS-Port to be tty53.  I created an IP-based NAR for the security group in ACS and used port tty53 for the AAA client.&lt;/P&gt;&lt;P&gt;Problem sovled!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 13 Feb 2006 16:52:09 GMT</pubDate>
    <dc:creator>dwhisinnand</dc:creator>
    <dc:date>2006-02-13T16:52:09Z</dc:date>
    <item>
      <title>Control access to network device with ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/control-access-to-network-device-with-acs/m-p/561204#M427762</link>
      <description>&lt;P&gt;Hi all!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently I have in place a Cisco Secure ACS Appliance using Windows as the back end authentication.  Cisco Secure is acting as TACACS+ server.  I have two groups defined in Cisco Secure: Netadmins and ITD Security.  The users in the Netadmins group need access to all switches and routers on the network.  ITD Security only needs access to async line 53 on a 2611 router for an out of band connection to a firewall and no other access to any network devices.  How can I limit access for the Cisco Secure group &amp;#147;ITD Security&amp;#148; to line 53 only?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My current config on this router is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login netadmins group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authentication login ITDSEC group tacacs+ line&lt;/P&gt;&lt;P&gt;tacacs-server host 10.30.X.X&lt;/P&gt;&lt;P&gt;tacacs-server host 10.18.X.X&lt;/P&gt;&lt;P&gt;tacacs-server key XXXXXXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line 53&lt;/P&gt;&lt;P&gt; no exec&lt;/P&gt;&lt;P&gt; login authentication ITDSEC&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt; stopbits 1&lt;/P&gt;&lt;P&gt; speed 115200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 30 0&lt;/P&gt;&lt;P&gt; timeout login response 120&lt;/P&gt;&lt;P&gt; login authentication netadmins&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the users in the &amp;#147;ITD Security&amp;#148; can still gain access by vty and then reverse telnet to any async line on the router.  Additionally, users in the &amp;#147;ITD Security&amp;#148; can still access any other switch or router using telnet: what should my configuration on those device be?  Do I need to do some configuration in ACS?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All other devices:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login netadmins group tacacs+ line&lt;/P&gt;&lt;P&gt;tacacs-server host 10.30.X.X&lt;/P&gt;&lt;P&gt;tacacs-server host 10.18.X.X&lt;/P&gt;&lt;P&gt;tacacs-server key XXXXXXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; password 7 141C015C5806&lt;/P&gt;&lt;P&gt; login authentication netadmins&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; password 7 11020A524310&lt;/P&gt;&lt;P&gt; login authentication netadmins&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; password 7 11020A524310&lt;/P&gt;&lt;P&gt; login authentication netadmins&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be greatly appriciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/control-access-to-network-device-with-acs/m-p/561204#M427762</guid>
      <dc:creator>dwhisinnand</dc:creator>
      <dc:date>2019-03-10T21:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Control access to network device with ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/control-access-to-network-device-with-acs/m-p/561205#M427769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Security group I would create an IP Network Access Restriction with a permit entry. Basically to allow access to the single port on 2611 only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AAA Client field is the name you've given to the 2611 in network config. Address will be * unless you want to restrict access to one or ip address. Port... never quite sure with async whether the port value should be "async 53" or "line 53". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you look in passed/failed attempts for the nas-port attribute you'll see what T+ is sending to ACS. This should help you know what to put in the NAR.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darran &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2006 14:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/control-access-to-network-device-with-acs/m-p/561205#M427769</guid>
      <dc:creator>darpotter</dc:creator>
      <dc:date>2006-02-13T14:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Control access to network device with ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/control-access-to-network-device-with-acs/m-p/561206#M427773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Darren&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for the help.  I looked at the failed attempts log and found the NAS-Port to be tty53.  I created an IP-based NAR for the security group in ACS and used port tty53 for the AAA client.&lt;/P&gt;&lt;P&gt;Problem sovled!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2006 16:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/control-access-to-network-device-with-acs/m-p/561206#M427773</guid>
      <dc:creator>dwhisinnand</dc:creator>
      <dc:date>2006-02-13T16:52:09Z</dc:date>
    </item>
  </channel>
</rss>

