<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ACS command authorization sets in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-acs-command-authorization-sets/m-p/359092#M433112</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For#1 - No idea on catOS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For #2 - &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/c.htm#wp697557" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/c.htm#wp697557&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(only a bit of pattern matching)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For #3 you can look in TACACS+ Administration file or Failed Attempts active.csv  on your ACS to what the AAA client is sending to the ACS for authorization&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Dec 2004 00:08:33 GMT</pubDate>
    <dc:creator>risgro</dc:creator>
    <dc:date>2004-12-08T00:08:33Z</dc:date>
    <item>
      <title>Cisco ACS command authorization sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-command-authorization-sets/m-p/359091#M433111</link>
      <description>&lt;P&gt;I need help on the following please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. - I am using ACS as TACACS server to control IOS authorization on all our Switches, However I can not deny telnet sessions to other devices from within CatOS - does anyone know the command authorization set to deny this within ACS ????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Does anyone know where I can read up on command authorizations sets for ACS ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. What is the debug command for CatOS to see cli output ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rod&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 20:55:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-command-authorization-sets/m-p/359091#M433111</guid>
      <dc:creator>rod.blackie</dc:creator>
      <dc:date>2019-03-10T20:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS command authorization sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-command-authorization-sets/m-p/359092#M433112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For#1 - No idea on catOS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For #2 - &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/c.htm#wp697557" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/c.htm#wp697557&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(only a bit of pattern matching)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For #3 you can look in TACACS+ Administration file or Failed Attempts active.csv  on your ACS to what the AAA client is sending to the ACS for authorization&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2004 00:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-command-authorization-sets/m-p/359092#M433112</guid>
      <dc:creator>risgro</dc:creator>
      <dc:date>2004-12-08T00:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACS command authorization sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-acs-command-authorization-sets/m-p/359093#M433113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your info. I have solved my problem - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I enabled tacacs administration logging using command on switch aaa authorization commands 15 default group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This let me see what what happening everytime I entered a command on CatOS - via the logging monitor on ACS. From here i was able to see that when i was trying to telnet to a device from CatOS it was doing it on Privilage mode 1. I then entered this command aaa authorization commands 1 default group tacacs+ which solved my telnet problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2004 09:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-acs-command-authorization-sets/m-p/359093#M433113</guid>
      <dc:creator>rod.blackie</dc:creator>
      <dc:date>2004-12-08T09:51:36Z</dc:date>
    </item>
  </channel>
</rss>

