<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tacacs Authorization on ACS in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284583#M434304</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your respons!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't been able to test this configuration since it has been a very busy day today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I can test it tomorrow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help, and I keep you informed about the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Koen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 27 May 2004 15:12:01 GMT</pubDate>
    <dc:creator>SDWorx_2</dc:creator>
    <dc:date>2004-05-27T15:12:01Z</dc:date>
    <item>
      <title>Tacacs Authorization on ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284581#M434302</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm new to authorization on Cisco ACS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm wrestling a couple of days on getting the authorization working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would like to archive is limit the commands executed on our Cisco material.  I would like to have an "any" for us, and a limited command set for other users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I already configured:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ if-authenticated (any explanation on this? )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tacacs-server host x.x.x.x&lt;/P&gt;&lt;P&gt;tacacs-server key "hidden"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; password "hidden"&lt;/P&gt;&lt;P&gt; login authentication default&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt; password "hidden"&lt;/P&gt;&lt;P&gt; login authentication default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ACS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PPP and Shell (exec) checked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Koen&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 14:50:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284581#M434302</guid>
      <dc:creator>SDWorx_2</dc:creator>
      <dc:date>2019-03-10T14:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs Authorization on ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284582#M434303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is a configuration that works quite well. It will use TACACS for authentication and authorization.  It is a good idea to have a backup authentication and authorization scheme  such as Line or None, in case your Tacacs server goes down or is misconfigured.  That way you can still get into your router in an emergency. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login vtymethod group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authorization exec vtymethod group tacacs+ none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 vtymethod group tacacs+ none &lt;/P&gt;&lt;P&gt;aaa authorization commands 15 vtymethod group tacacs+ none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; password 7 *omitted*&lt;/P&gt;&lt;P&gt; authorization commands 15 vtymethod&lt;/P&gt;&lt;P&gt; authorization exec vtymethod&lt;/P&gt;&lt;P&gt; login authentication vtymethod&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using Cisco Secure ACS 3.2 for Windows.&lt;/P&gt;&lt;P&gt;On the ACS you must have shell exec checked, and also privilege level selected with the level set to 15.  &lt;/P&gt;&lt;P&gt;Then you need to create a IOS command set to either permit or deny certain commands. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can run debug aaa authorization on your router to troubleshoot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give that a try and see how it goes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 May 2004 15:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284582#M434303</guid>
      <dc:creator>ecaballero</dc:creator>
      <dc:date>2004-05-26T15:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs Authorization on ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284583#M434304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your respons!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I haven't been able to test this configuration since it has been a very busy day today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I can test it tomorrow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help, and I keep you informed about the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Koen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 May 2004 15:12:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284583#M434304</guid>
      <dc:creator>SDWorx_2</dc:creator>
      <dc:date>2004-05-27T15:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: Tacacs Authorization on ACS</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284584#M434305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for you help!!  This configuration works very well as you already mentioned!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This only thing I'm not really happy with is the fact that when I logon I'm immediate in enable mode.  This is very handy, but not really secure.  I'll look around for disabling this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An other (maybe stupid) question is why you have to configure the 2 different levels on the switch.  This is not really clear to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks for your help and have a very nice weekend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Koen&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 May 2004 10:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-authorization-on-acs/m-p/284584#M434305</guid>
      <dc:creator>SDWorx_2</dc:creator>
      <dc:date>2004-05-28T10:22:06Z</dc:date>
    </item>
  </channel>
</rss>

