<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS+ for Device Management Security in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188576#M437010</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do you mean by CLI mode, is it the console connection, in certain version authorization is disabled in console and that could be the reason.&lt;/P&gt;&lt;P&gt;Have you addedd the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and see if there is any difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Mar 2003 11:25:13 GMT</pubDate>
    <dc:creator>sghosh</dc:creator>
    <dc:date>2003-03-26T11:25:13Z</dc:date>
    <item>
      <title>TACACS+ for Device Management Security</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188575#M437008</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just would like to ask your assistance and more ideas about the above subject. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When TACACS+ is used for device management ( example; in a router ), when a user is defined in the ACS that he should not be able to use reload/copy commands inside the router. After defining it, why at CLI mode the authorization commands being defined which is to deny it will not take effect. It took effect only at telnet mode. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What security commands can be applied at the router side or at the ACS side that even at CLI mode, a user is also controlled what commands he is allowed to input/used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank   you and looking forward for your suggestions/work arounds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vivira Alastra&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 14:12:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188575#M437008</guid>
      <dc:creator>valastra</dc:creator>
      <dc:date>2019-03-10T14:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ for Device Management Security</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188576#M437010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do you mean by CLI mode, is it the console connection, in certain version authorization is disabled in console and that could be the reason.&lt;/P&gt;&lt;P&gt;Have you addedd the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and see if there is any difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Mar 2003 11:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188576#M437010</guid>
      <dc:creator>sghosh</dc:creator>
      <dc:date>2003-03-26T11:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ for Device Management Security</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188577#M437013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are referring CLI to be EXEC (privileg mode) then probably you are missing command authorization lines missing.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization  exec default  tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 0 default  tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default  taccas+ local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have the above commands and still if it doesn't work, then my suggestion would be give us the profile, possibility that profile was not created properly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Mar 2003 08:50:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188577#M437013</guid>
      <dc:creator>mhoda</dc:creator>
      <dc:date>2003-03-27T08:50:31Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ for Device Management Security</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188578#M437016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To make your authorization work while connected to the console, use this hidden command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization console&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are accessing the console using a reverse telnet connection, use this published command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization reverse-access default / list-name method1..method2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Apr 2003 03:57:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-for-device-management-security/m-p/188578#M437016</guid>
      <dc:creator>ciscotopgun</dc:creator>
      <dc:date>2003-04-02T03:57:51Z</dc:date>
    </item>
  </channel>
</rss>

