<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Users authorized commands in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161906#M438420</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try quoting "running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesn't work, try just permitting "run".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pasting debug aaa authorization and debug tacacs+ may help identify the issue.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Jan 2003 00:57:04 GMT</pubDate>
    <dc:creator>4brown</dc:creator>
    <dc:date>2003-01-16T00:57:04Z</dc:date>
    <item>
      <title>Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161901#M438415</link>
      <description>&lt;P&gt;I want to restrict some users to "show running-config" command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created a Shell Command Authorization Set with "show" command "permit running-config".  Under the TACACS+ setting the Shell (exec) is selected and Privilege level with a value of 5. The SCAS is associated to the username.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config on a Router:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login vty group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login console line&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization exec vty group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization commands 5 vty group tacacs+&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 30 0&lt;/P&gt;&lt;P&gt; password ***Deleted****&lt;/P&gt;&lt;P&gt; authorization exec vty&lt;/P&gt;&lt;P&gt; login authentication vty&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The user gets the privilege of 5 when logged in but is unable to execute the command show running-config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 14:06:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161901#M438415</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2019-03-10T14:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161902#M438416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sh run is a priv lvl 15 command by default.  You can change it to level 5 with the:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;privilege exec level 5 show running-config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2003 19:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161902#M438416</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-15T19:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161903#M438417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes that does work, but I would rather set this up using the Shell Command Authorization Set  with the ACS server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are many more commands to include for  different users and configuring every router and switch with each command required is a very large task.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How is this done with Shell Command Authorization Sets?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2003 20:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161903#M438417</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-15T20:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161904#M438418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;authorization commands 5 vty&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the line vty ports?  Wasn't specified in your earlier post.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2003 20:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161904#M438418</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-15T20:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161905#M438419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry - yes it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2003 21:29:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161905#M438419</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-15T21:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161906#M438420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try quoting "running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesn't work, try just permitting "run".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pasting debug aaa authorization and debug tacacs+ may help identify the issue.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jan 2003 00:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161906#M438420</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-16T00:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161907#M438421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using quotes does not work. The parameters inclosed in quotes disappears.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I tried just permit run.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I logged in with username "username".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I gain access and get a priv of 5 and a # sign prompt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue a sho run and receive an error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------ Login Session ----------&lt;/P&gt;&lt;P&gt;Username: username&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;LabrtrB#sho priv&lt;/P&gt;&lt;P&gt;Current privilege level is 5&lt;/P&gt;&lt;P&gt;LabrtrB#&lt;/P&gt;&lt;P&gt;LabrtrB#sho run&lt;/P&gt;&lt;P&gt;             ^&lt;/P&gt;&lt;P&gt;% Invalid input detected at '^' marker.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LabrtrB#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the debugs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LabrtrB#debug aaa authorization &lt;/P&gt;&lt;P&gt;AAA Authorization debugging is on&lt;/P&gt;&lt;P&gt;LabrtrB#&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: tty2 AAA/AUTHOR/EXEC (3878016830): Port='tty2' list='vty' service=EXEC&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: AAA/AUTHOR/EXEC: tty2 (3878016830) user='username'&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: tty2 AAA/AUTHOR/EXEC (3878016830): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: tty2 AAA/AUTHOR/EXEC (3878016830): send AV cmd*&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: tty2 AAA/AUTHOR/EXEC (3878016830): found list "vty"&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: tty2 AAA/AUTHOR/EXEC (3878016830): Method=tacacs+ (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: AAA/AUTHOR/TAC+: (3878016830): user=username&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: AAA/AUTHOR/TAC+: (3878016830): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.728: AAA/AUTHOR/TAC+: (3878016830): send AV cmd*&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.932: AAA/AUTHOR (3878016830): Post authorization status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.932: AAA/AUTHOR/EXEC: Processing AV service=shell&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.932: AAA/AUTHOR/EXEC: Processing AV cmd*&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.932: AAA/AUTHOR/EXEC: Processing AV priv-lvl=5&lt;/P&gt;&lt;P&gt;Jan 15 22:11:52.932: AAA/AUTHOR/EXEC: Authorization successful&lt;/P&gt;&lt;P&gt;Jan 15 22:12:49.963: AAA/MEMORY: free_user (0x629A26BC) user='username' ruser='' &lt;/P&gt;&lt;P&gt;port='tty2' rem_addr='x.x.x.x' authen_type=ASCII service=LOGIN priv=1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LabrtrB#debug tacacs            &lt;/P&gt;&lt;P&gt;TACACS access control debugging is on&lt;/P&gt;&lt;P&gt;LabrtrB#&lt;/P&gt;&lt;P&gt;Jan 15 22:13:50.599: TAC+: send AUTHEN/START packet ver=192 id=1365478173&lt;/P&gt;&lt;P&gt;Jan 15 22:13:50.599: TAC+: Using default tacacs server-group "tacacs+" list.&lt;/P&gt;&lt;P&gt;Jan 15 22:13:50.599: TAC+: Opening TCP/IP to x.x.x.x/49 timeout=5&lt;/P&gt;&lt;P&gt;Jan 15 22:13:50.599: TAC+: Opened TCP/IP handle 0x62A8E470 to x.x.x.x/49&lt;/P&gt;&lt;P&gt;Jan 15 22:13:50.599: TAC+: x.x.x.x (1365478173) AUTHEN/START/LOGIN/ASCII queued&lt;/P&gt;&lt;P&gt;Jan 15 22:13:50.799: TAC+: (1365478173) AUTHEN/START/LOGIN/ASCII processed&lt;/P&gt;&lt;P&gt;Jan 15 22:13:50.799: TAC+: ver=192 id=1365478173 received AUTHEN status = GETUSER&lt;/P&gt;&lt;P&gt;Jan 15 22:13:53.499: TAC+: send AUTHEN/CONT packet id=1365478173&lt;/P&gt;&lt;P&gt;Jan 15 22:13:53.503: TAC+: x.x.x.x (1365478173) AUTHEN/CONT queued&lt;/P&gt;&lt;P&gt;Jan 15 22:13:53.703: TAC+: (1365478173) AUTHEN/CONT processed&lt;/P&gt;&lt;P&gt;Jan 15 22:13:53.703: TAC+: ver=192 id=1365478173 received AUTHEN status = GETPASS&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.435: TAC+: send AUTHEN/CONT packet id=1365478173&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.435: TAC+: x.x.x.x (1365478173) AUTHEN/CONT queued&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.635: TAC+: (1365478173) AUTHEN/CONT processed&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.635: TAC+: ver=192 id=1365478173 received AUTHEN status = PASS&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.635: TAC+: Closing TCP/IP 0x62A8E470 connection to x.x.x.x/49&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.635: TAC+: using previously set server x.x.x.x from group tacacs+&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.635: TAC+: Opening TCP/IP to x.x.x.x/49 timeout=5&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.639: TAC+: Opened TCP/IP handle 0x62A8E8FC to x.x.x.x/49&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.639: TAC+: Opened x.x.x.x index=1&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.639: TAC+: x.x.x.x (305665778) AUTHOR/START queued&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.839: TAC+: (305665778) AUTHOR/START processed&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.839: TAC+: (305665778): received author response status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.839: TAC+: Closing TCP/IP 0x62A8E8FC connection to x.x.x.x/49&lt;/P&gt;&lt;P&gt;Jan 15 22:13:55.839: TAC+: Received Attribute "priv-lvl=5"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jan 2003 03:28:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161907#M438421</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-16T03:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161908#M438422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The IOS doesn't recognize the command because you are coming in at Privilege Level 5.  If you don't want to use the Privilege Exec command,  try this.  Assign this group Privilege Level 15, and enforce authorization for priv 15:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 vty tacacs+&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;authorization commands 15 vty&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, for this group, deny all the commands you want.  sh run will be permitted since they are priv 15, but the commands you deny in the ACS will be denied.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jan 2003 23:33:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161908#M438422</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-16T23:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161909#M438423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I assigned the priv level 15 to the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;router config:&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 vty group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 30 0&lt;/P&gt;&lt;P&gt; password 7 082C5F4B05180719171F&lt;/P&gt;&lt;P&gt; authorization commands 15 vty&lt;/P&gt;&lt;P&gt; authorization exec vty&lt;/P&gt;&lt;P&gt; login authentication vty&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then for the user I allow the command sho running-config. Since this is the only priv level 15 command the user can run, it shows the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the commands don't have to be assigned to a different level. This process assigns the onyl commands the user can execute.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Understanding this now lets me customize the commands any user can execute. This is what I was wanting to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help!   I have a much better understanding now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jan 2003 23:13:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161909#M438423</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-17T23:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161910#M438424</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I spoke too soon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not able to control the configuration commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example letting a user only change description on a line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jan 2003 23:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161910#M438424</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-17T23:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161911#M438425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Command authorization for config mode commands needs to be permitted:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is not enabled, once in config mode, no requests are sent to the AAA server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Jan 2003 23:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161911#M438425</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-17T23:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161912#M438426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've added  aaa authorization config-commands  to no avail. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume it will authorize config-commands against the command authorization set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only config-command that I have in the command authorization set is "location"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2003 00:36:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161912#M438426</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-18T00:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161913#M438427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Post debug aaa author showing it fail...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2003 00:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161913#M438427</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-18T00:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161914#M438428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the login session and debug. I have allowed "config" with "permit term"  and "location".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't want the user to access the interfaces or lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Login:&lt;/P&gt;&lt;P&gt;Unauthorized access is strictly prohibited! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User Access Verification&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Username: username&lt;/P&gt;&lt;P&gt;Password: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LabrtrB#config t&lt;/P&gt;&lt;P&gt;Enter configuration commands, one per line.  End with CNTL/Z.&lt;/P&gt;&lt;P&gt;LabrtrB(config)#line vty 0 4&lt;/P&gt;&lt;P&gt;LabrtrB(config-line)#ex&lt;/P&gt;&lt;P&gt;% Ambiguous command:  "ex"&lt;/P&gt;&lt;P&gt;LabrtrB(config-line)#exit&lt;/P&gt;&lt;P&gt;LabrtrB(config)#&lt;/P&gt;&lt;P&gt;LabrtrB(config)#&lt;/P&gt;&lt;P&gt;LabrtrB(config)#end&lt;/P&gt;&lt;P&gt;LabrtrB#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug:&lt;/P&gt;&lt;P&gt;LabrtrB#debug aaa authorization &lt;/P&gt;&lt;P&gt;AAA Authorization debugging is on&lt;/P&gt;&lt;P&gt;LabrtrB#&lt;/P&gt;&lt;P&gt;Jan 21 11:51:02.300: AAA: parse name=tty3 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Jan 21 11:51:02.300: AAA: name=tty3 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=3 channel=0&lt;/P&gt;&lt;P&gt;Jan 21 11:51:02.300: AAA/MEMORY: create_user (0x629B4624) user='' ruser='' port='tty3' rem_addr='16.47.225.189' authen_type=ASCII service=LOGIN priv=1&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: tty3 AAA/AUTHOR/EXEC (559394384): Port='tty3' list='vty' service=EXEC&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: AAA/AUTHOR/EXEC: tty3 (559394384) user='username'&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: tty3 AAA/AUTHOR/EXEC (559394384): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: tty3 AAA/AUTHOR/EXEC (559394384): send AV cmd*&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: tty3 AAA/AUTHOR/EXEC (559394384): found list "vty"&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: tty3 AAA/AUTHOR/EXEC (559394384): Method=tacacs+ (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: AAA/AUTHOR/TAC+: (559394384): user=username&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: AAA/AUTHOR/TAC+: (559394384): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 11:51:11.960: AAA/AUTHOR/TAC+: (559394384): send AV cmd*&lt;/P&gt;&lt;P&gt;Jan 21 11:51:12.164: AAA/AUTHOR (559394384): Post authorization status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 21 11:51:12.164: AAA/AUTHOR/EXEC: Processing AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 11:51:12.164: AAA/AUTHOR/EXEC: Processing AV cmd*&lt;/P&gt;&lt;P&gt;Jan 21 11:51:12.164: AAA/AUTHOR/EXEC: Processing AV priv-lvl=15&lt;/P&gt;&lt;P&gt;Jan 21 11:51:12.164: AAA/AUTHOR/EXEC: Authorization successful&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.188: tty3 AAA/AUTHOR/CMD (3225337257): Port='tty3' list='vty' service=CMD&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.188: AAA/AUTHOR/CMD: tty3 (3225337257) user='username'&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: tty3 AAA/AUTHOR/CMD (3225337257): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: tty3 AAA/AUTHOR/CMD (3225337257): send AV cmd=configure&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: tty3 AAA/AUTHOR/CMD (3225337257): send AV cmd-arg=terminal&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: tty3 AAA/AUTHOR/CMD (3225337257): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: tty3 AAA/AUTHOR/CMD (3225337257): found list "vty"&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: tty3 AAA/AUTHOR/CMD (3225337257): Method=tacacs+ (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: AAA/AUTHOR/TAC+: (3225337257): user=username&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: AAA/AUTHOR/TAC+: (3225337257): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: AAA/AUTHOR/TAC+: (3225337257): send AV cmd=configure&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: AAA/AUTHOR/TAC+: (3225337257): send AV cmd-arg=terminal&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.192: AAA/AUTHOR/TAC+: (3225337257): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;Jan 21 11:51:15.392: AAA/AUTHOR (3225337257): Post authorization status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 21 11:51:20.420: AAA/AUTHOR: config command authorization not enabled&lt;/P&gt;&lt;P&gt;Jan 21 11:51:26.816: AAA/AUTHOR: config command authorization not enabled&lt;/P&gt;&lt;P&gt;Jan 21 11:51:32.408: AAA/AUTHOR: config command authorization not enabled&lt;/P&gt;&lt;P&gt;Jan 21 11:51:32.408: %SYS-5-CONFIG_I: Configured from console by username on vty1 (16.47.225.189)&lt;/P&gt;&lt;P&gt;Jan 21 11:51:42.128: %SYS-4-SNMP_WRITENET: SNMP WriteNet request. Writing current configuration to 16.22.4.5un all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: tty2 AAA/AUTHOR/CMD (1731012520): Port='tty2' list='vty' service=CMD&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: AAA/AUTHOR/CMD: tty2 (1731012520) user='admin'&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: tty2 AAA/AUTHOR/CMD (1731012520): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: tty2 AAA/AUTHOR/CMD (1731012520): send AV cmd=undebug&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: tty2 AAA/AUTHOR/CMD (1731012520): send AV cmd-arg=all&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: tty2 AAA/AUTHOR/CMD (1731012520): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: tty2 AAA/AUTHOR/CMD (1731012520): found list "vty"&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: tty2 AAA/AUTHOR/CMD (1731012520): Method=tacacs+ (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: AAA/AUTHOR/TAC+: (1731012520): user=admin&lt;/P&gt;&lt;P&gt;All possible debugging has been turned off&lt;/P&gt;&lt;P&gt;LabrtrB#&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: AAA/AUTHOR/TAC+: (1731012520): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: AAA/AUTHOR/TAC+: (1731012520): send AV cmd=undebug&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: AAA/AUTHOR/TAC+: (1731012520): send AV cmd-arg=all&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.048: AAA/AUTHOR/TAC+: (1731012520): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;Jan 21 11:51:48.252: AAA/AUTHOR (1731012520): Post authorization status = PASS_ADD&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2003 16:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161914#M438428</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-21T16:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161915#M438430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to have config-command authorization as specified in the previous post so it sends commands in config mode to the aaa server for approval.  Note in your post, config command authorization is not configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once it is, it will send each command in config mode to be permitted or denied to the AAA server.  So if you want to deny access to line or interfaces, then specify these commands denied in the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you enable it, look at your debug aaa authorization, you should see if the command is allowed or denied in the authorization status.  That tells you if you have configuration issues in the AAA server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2003 17:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161915#M438430</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-21T17:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161916#M438431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;- config - session - debug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;allows "line vty 0 4"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login vty group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authentication login console line&lt;/P&gt;&lt;P&gt;aaa authentication enable default group tacacs+ enable&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec vty group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization exec console local&lt;/P&gt;&lt;P&gt;aaa authorization commands 5 vty group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 vty group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unauthorized access is strictly prohibited! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Username: username&lt;/P&gt;&lt;P&gt;Password: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LabrtrB#config t&lt;/P&gt;&lt;P&gt;Enter configuration commands, one per line.  End with CNTL/Z.&lt;/P&gt;&lt;P&gt;LabrtrB(config)#line vty 0 4&lt;/P&gt;&lt;P&gt;LabrtrB(config-line)#end&lt;/P&gt;&lt;P&gt;LabrtrB#quit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LabrtrB#debug aaa authorization &lt;/P&gt;&lt;P&gt;AAA Authorization debugging is on&lt;/P&gt;&lt;P&gt;LabrtrB#&lt;/P&gt;&lt;P&gt;Jan 21 13:47:34.842: AAA: parse name=tty3 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Jan 21 13:47:34.842: AAA: name=tty3 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=3 channel=0&lt;/P&gt;&lt;P&gt;Jan 21 13:47:34.842: AAA/MEMORY: create_user (0x629C5BEC) user='' ruser='' port='tty3' rem_addr='16.47.207.61' authen_type=ASCII service=LOGIN priv=1&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: tty3 AAA/AUTHOR/EXEC (1080771678): Port='tty3' list='vty' service=EXEC&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: AAA/AUTHOR/EXEC: tty3 (1080771678) user='username'&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: tty3 AAA/AUTHOR/EXEC (1080771678): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: tty3 AAA/AUTHOR/EXEC (1080771678): send AV cmd*&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: tty3 AAA/AUTHOR/EXEC (1080771678): found list "vty"&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: tty3 AAA/AUTHOR/EXEC (1080771678): Method=tacacs+ (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: AAA/AUTHOR/TAC+: (1080771678): user=username&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: AAA/AUTHOR/TAC+: (1080771678): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.362: AAA/AUTHOR/TAC+: (1080771678): send AV cmd*&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.566: AAA/AUTHOR (1080771678): Post authorization status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.566: AAA/AUTHOR/EXEC: Processing AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.566: AAA/AUTHOR/EXEC: Processing AV cmd*&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.566: AAA/AUTHOR/EXEC: Processing AV priv-lvl=15&lt;/P&gt;&lt;P&gt;Jan 21 13:47:38.566: AAA/AUTHOR/EXEC: Authorization successful&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: tty3 AAA/AUTHOR/CMD (1219681448): Port='tty3' list='vty' service=CMD&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: AAA/AUTHOR/CMD: tty3 (1219681448) user='username'&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: tty3 AAA/AUTHOR/CMD (1219681448): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: tty3 AAA/AUTHOR/CMD (1219681448): send AV cmd=configure&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: tty3 AAA/AUTHOR/CMD (1219681448): send AV cmd-arg=terminal&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: tty3 AAA/AUTHOR/CMD (1219681448): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: tty3 AAA/AUTHOR/CMD (1219681448): found list "vty"&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: tty3 AAA/AUTHOR/CMD (1219681448): Method=tacacs+ (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: AAA/AUTHOR/TAC+: (1219681448): user=username&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: AAA/AUTHOR/TAC+: (1219681448): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: AAA/AUTHOR/TAC+: (1219681448): send AV cmd=configure&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: AAA/AUTHOR/TAC+: (1219681448): send AV cmd-arg=terminal&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.790: AAA/AUTHOR/TAC+: (1219681448): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;Jan 21 13:47:40.994: AAA/AUTHOR (1219681448): Post authorization status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 21 13:47:45.006: AAA: parse name=tty4 idb type=-1 tty=-1&lt;/P&gt;&lt;P&gt;Jan 21 13:47:45.006: AAA: name=tty4 flags=0x11 type=5 shelf=0 slot=0 adapter=0 port=4 channel=0&lt;/P&gt;&lt;P&gt;Jan 21 13:47:45.006: AAA/MEMORY: create_user (0x62AAF52C) user='' ruser='' port='tty4' rem_addr='x.x.x.x' authen_type=ASCII service=LOGIN priv=1&lt;/P&gt;&lt;P&gt;Jan 21 13:47:45.606: AAA/MEMORY: free_user (0x62AAF52C) user='' ruser='' port='tty4' rem_addr='x.x.x.x' authen_type=ASCII service=LOGIN priv=1&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): Port='tty3' list='vty' service=CMD&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: AAA/AUTHOR/CMD: tty3 (1403778660) user='username'&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): send AV cmd=line&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): send AV cmd-arg=vty&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): send AV cmd-arg=0&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): send AV cmd-arg=4&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): found list "vty"&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: tty3 AAA/AUTHOR/CMD (1403778660): Method=tacacs+ (tacacs+)&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: AAA/AUTHOR/TAC+: (1403778660): user=username&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.490: AAA/AUTHOR/TAC+: (1403778660): send AV service=shell&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.494: AAA/AUTHOR/TAC+: (1403778660): send AV cmd=line&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.494: AAA/AUTHOR/TAC+: (1403778660): send AV cmd-arg=vty&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.494: AAA/AUTHOR/TAC+: (1403778660): send AV cmd-arg=0&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.494: AAA/AUTHOR/TAC+: (1403778660): send AV cmd-arg=4&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.494: AAA/AUTHOR/TAC+: (1403778660): send AV cmd-arg=&lt;CR&gt;&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;Jan 21 13:47:47.694: AAA/AUTHOR (1403778660): Post authorization status = PASS_ADD&lt;/P&gt;&lt;P&gt;Jan 21 13:48:09.890: %SYS-5-CONFIG_I: Configured from console by username on vty1 (x.x.x.x)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2003 19:00:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161916#M438431</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-21T19:00:12Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161917#M438432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Note, the output shows the TAC+ server allowing the commands.  Did you explicitly deny them? If so, check your configuration.  I  have never did this in CSNT but this is where the issue lies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Jan 2003 19:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161917#M438432</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-21T19:06:08Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161918#M438433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I configured the commands that I want the users to be able to execute. I checked the box that deny and unmatched commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Commands allowed:&lt;/P&gt;&lt;P&gt;config - permit term&lt;/P&gt;&lt;P&gt;help&lt;/P&gt;&lt;P&gt;traceroute&lt;/P&gt;&lt;P&gt;ping&lt;/P&gt;&lt;P&gt;show &lt;/P&gt;&lt;P&gt;location &lt;/P&gt;&lt;P&gt;logout&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jan 2003 18:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161918#M438433</guid>
      <dc:creator>rrcarter79</dc:creator>
      <dc:date>2003-01-23T18:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161919#M438434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just tested in the lab, worked fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created a SCAS permitting the commands you want to permit. Unmatched commands was checked and the Permit Unmatched Arguments was not selected. The SCAS was assigned to the group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the location command, enter location as the command and whatever you argument you wish to permit, eg. , permit NMS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only difference, is I did not use a list for the vty ports, I used default. Here is my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+ local&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+ local if-authenticated&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+ local if-authenticated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Jan 2003 23:47:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161919#M438434</guid>
      <dc:creator>4brown</dc:creator>
      <dc:date>2003-01-26T23:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: Users authorized commands</title>
      <link>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161920#M438435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want to do something similar to what you are doing, i want to have two groups in ACS, one that has a number of users that have full access to routers and, another group that can only do a show log, version and interfaces&lt;/P&gt;&lt;P&gt;After messing around for some time I came here and saw that I am not alone!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the working router config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll buy you a cold one next time you are in Ozz &lt;/P&gt;&lt;P&gt;regards Richard.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2003 06:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/users-authorized-commands/m-p/161920#M438435</guid>
      <dc:creator>rbradfield</dc:creator>
      <dc:date>2003-02-04T06:12:45Z</dc:date>
    </item>
  </channel>
</rss>

