<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.4 Command set not working in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3941026#M456474</link>
    <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I meant to ask why the initial config for denying 'enable' after login doesn't work.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Oct 2019 15:39:00 GMT</pubDate>
    <dc:creator>Firepowered</dc:creator>
    <dc:date>2019-10-15T15:39:00Z</dc:date>
    <item>
      <title>ISE 2.4 Command set not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3940855#M456463</link>
      <description>&lt;P&gt;I want a simple command set, permit some commands (eg: show, dir, ping, traceroute ) but deny en or enable, intended that the user should never go to enable mode. My command set is as follows&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="deny.png" style="width: 257px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/46910i36595D186A0EBE98/image-size/large?v=v2&amp;amp;px=999" role="button" title="deny.png" alt="deny.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;TACACS Profile&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tacacs profile.png" style="width: 634px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/46911iD84B06275568ABB7/image-size/large?v=v2&amp;amp;px=999" role="button" title="tacacs profile.png" alt="tacacs profile.png" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;PS: Doesn't matter what priv level I use here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Configuration on the ASA&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;aaa-server TACACS protocol tacacs+&lt;BR /&gt;aaa-server TACACS (inside) host x.x.x.x&lt;BR /&gt;aaa authentication ssh console TACACS LOCAL&lt;BR /&gt;aaa authentication http console TACACS LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authorization command TACACS LOCAL&lt;BR /&gt;aaa accounting ssh console TACACS&lt;BR /&gt;aaa authorization exec authentication-server&lt;BR /&gt;aaa authentication login-history&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I read somewhere to enable 'aaa authorization config-commands' but I don't have that on my ASA (9.8)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What am I&amp;nbsp; doing wrong?&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 12:47:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3940855#M456463</guid>
      <dc:creator>Firepowered</dc:creator>
      <dc:date>2019-10-15T12:47:00Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Command set not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3940878#M456464</link>
      <description>&lt;P&gt;In my opinion the concept of enable mode is a legacy concept that I haven't used in years with any of my customers.&amp;nbsp; If you have command authorization enabled via TACACS it doesn't matter what mode you are in, you are authorizing and accounting for everything that is typed in.&amp;nbsp; I have my customers send all users to the # prompt and then we authorize from there.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 13:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3940878#M456464</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-10-15T13:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Command set not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3940896#M456467</link>
      <description>&lt;P&gt;Thank you, this is good.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I allowed priv users to enter exec mode on login and restricted commands, this works as expected. Do you know what the min / max priv level required for user to auto move to exec upon login? (1 didn't work, I moved to 5 and it worked, but that was random)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Btw, I am curious, why does the existing command set not work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 13:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3940896#M456467</guid>
      <dc:creator>Firepowered</dc:creator>
      <dc:date>2019-10-15T13:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Command set not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3940983#M456470</link>
      <description>Just send everyone to priv 15 (min and max) and do command authorization.  On the ASA you need to add.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;aaa authorization exec authentication-server auto-enable&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;You had the command but didn't have the auto-enable key word at the end.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;That will allow users directly into the # prompt.  I am not sure why your command set didn't work.  Would have to do further analysis on that.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 15 Oct 2019 14:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3940983#M456470</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2019-10-15T14:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.4 Command set not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3941026#M456474</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I meant to ask why the initial config for denying 'enable' after login doesn't work.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 15:39:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-4-command-set-not-working/m-p/3941026#M456474</guid>
      <dc:creator>Firepowered</dc:creator>
      <dc:date>2019-10-15T15:39:00Z</dc:date>
    </item>
  </channel>
</rss>

