<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need to restrict certain commands for TACACS+ users in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485117#M427837</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the links, &lt;/P&gt;&lt;P&gt;but i cant see any example which will allow me to create my own group with permit and deny commands for pri level of 15. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All i want is , one group can change the interface settings and should have the ability to save the config. But they should not be able to issue a sh run or any other command other than the allowed in the list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will appriciate if some one can give me some examples. The current one which i have allows a user to issue a sh conf command in a CATOS system even though my configuraton on the tacacs server denies that and also its not allowing the user to issue a conf t command, it denies saying command authorisation failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure it should be the configuration .Dont know where i'm doing wrong &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Jan 2006 08:46:02 GMT</pubDate>
    <dc:creator>trackme</dc:creator>
    <dc:date>2006-01-25T08:46:02Z</dc:date>
    <item>
      <title>Need to restrict certain commands for TACACS+ users</title>
      <link>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485115#M427833</link>
      <description>&lt;P&gt;I have a tacacs+ server and i need to create a group where a user can only work on the interface paramaters and deny other commands. For example i dont want the user to use "sh run" or "sh start" but can use the "sh interface" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also allow him to issue "conf t" ,command ,but need to restrict only to the interface and deny any thing else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you send me some examples with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more thing should i create two groups one for CATOS and IOS or can i club both commands in a single group&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 21:27:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485115#M427833</guid>
      <dc:creator>trackme</dc:creator>
      <dc:date>2019-03-10T21:27:06Z</dc:date>
    </item>
    <item>
      <title>Re: Need to restrict certain commands for TACACS+ users</title>
      <link>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485116#M427834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I feel you are looking something inline with different privilege levels for different set of users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In which you have the advantage of assisigning different command executing acess to different privilege levels..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AFAIK issuing config level commands and issuing show run can only work in EXEC Privilege level which is 15 in other mode i dont think you can give access to work with the configurations.But you can very well give the permissions to view the configs and clear the counters to the privilege levels..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do find this link for more info on the same..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_chapter09186a00803f3bb7.html#wp1049664" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6350/products_configuration_guide_chapter09186a00803f3bb7.html#wp1049664&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2006 08:05:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485116#M427834</guid>
      <dc:creator>spremkumar</dc:creator>
      <dc:date>2006-01-25T08:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Need to restrict certain commands for TACACS+ users</title>
      <link>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485117#M427837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the links, &lt;/P&gt;&lt;P&gt;but i cant see any example which will allow me to create my own group with permit and deny commands for pri level of 15. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All i want is , one group can change the interface settings and should have the ability to save the config. But they should not be able to issue a sh run or any other command other than the allowed in the list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will appriciate if some one can give me some examples. The current one which i have allows a user to issue a sh conf command in a CATOS system even though my configuraton on the tacacs server denies that and also its not allowing the user to issue a conf t command, it denies saying command authorisation failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure it should be the configuration .Dont know where i'm doing wrong &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2006 08:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485117#M427837</guid>
      <dc:creator>trackme</dc:creator>
      <dc:date>2006-01-25T08:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Need to restrict certain commands for TACACS+ users</title>
      <link>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485118#M427838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use a single group for the users - reason being here is that a user can only inherit from a single group. I personally would stay away from apply commands under the user profile - rther the group.&lt;/P&gt;&lt;P&gt;In the group under the section "Shell Command Authorization Set" choose "Per Group Command Authorization" and choose deny for unmatched commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you then have to do is check the box next to command and enter configure. Under arguments enter permit terminal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only problem is that you have to enter a command at a time and then submit and go back into the group and add the second time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2006 09:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485118#M427838</guid>
      <dc:creator>a-larkins</dc:creator>
      <dc:date>2006-01-25T09:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: Need to restrict certain commands for TACACS+ users</title>
      <link>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485119#M427840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;i use the free TACACS+ server from cisco, all i use is a user file which contains the various groups in that file. I dont have a menu based system where i can add those commands, i have seen that in Cisco ACS but not here &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router or the switch reads information from that file only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know how to add these commands via the CLI in this file meaning i dont the exact syntax of adding these commands you mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one group which has a default permit any working fine, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the issue is with this group only where some commands work which i dont want to work and some dont work which i want to work &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will appriciate a example with the syntax.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example my files shows like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cmd = show { deny "config" }&lt;/P&gt;&lt;P&gt;        cmd = show { deny "run" }&lt;/P&gt;&lt;P&gt;        cmd = show { deny "start" }&lt;/P&gt;&lt;P&gt;        cmd = show { permit ".*" }&lt;/P&gt;&lt;P&gt;        cmd = enable { permit ".*" }&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i dont whether is correct or not,but users logged into catOS are able to issue sh conf command &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but at the same time users logged into IOS are not able to issue sh run or sh conf and denies them command authorisation failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what i want ,but one is allowed in catos and denied in IOS and hence i'm confused for the same user.&lt;/P&gt;&lt;P&gt;can you help me to fix this so that i dont want any user to issue sh conf in CATOS as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i want to limit the user in IOS to change the interface parameters only which is currently denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also send me some links so that i can do some research on that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jan 2006 09:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/need-to-restrict-certain-commands-for-tacacs-users/m-p/485119#M427840</guid>
      <dc:creator>trackme</dc:creator>
      <dc:date>2006-01-25T09:40:27Z</dc:date>
    </item>
  </channel>
</rss>

