<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tacas+ limit specific commands under one command layer in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762592#M487316</link>
    <description>&lt;P&gt;Should "?" be replace with "." to denote a single character?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the regex reads starting with g any other valid character and in the second position and any number of characters after that?&lt;/P&gt;
&lt;P&gt;I was reading the using g* would only look for a continuous repeat of the letter g.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ej&lt;/P&gt;</description>
    <pubDate>Thu, 13 Dec 2018 06:55:25 GMT</pubDate>
    <dc:creator>Eric R. Jones</dc:creator>
    <dc:date>2018-12-13T06:55:25Z</dc:date>
    <item>
      <title>Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3761309#M487248</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our customer would like to use ISE (TACACS) to control the CLI command authorization.&lt;/P&gt;
&lt;P&gt;However, they are using HUAWEI data center switch, and they want to limit “shutdown” command under ospf process, but allow this command under interface configuration, for example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Interface 10GE1/1/1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;shutdown &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;## Legal command&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ospf 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;shutdown&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ## Illegal command, disallowed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can ISE satisfy this requirement?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image001.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/25744iB4820BB3CD8526BA/image-size/large?v=v2&amp;amp;px=999" role="button" title="image001.png" alt="image001.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Dec 2018 14:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3761309#M487248</guid>
      <dc:creator>yongwli</dc:creator>
      <dc:date>2018-12-11T14:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3761320#M487249</link>
      <description>A command is a command for ISE. There is no provision in TACACS+ Protocol to mention the mode under which this is being executed. Network device sends the command and the arguments and ISE will simply do a regex match.&lt;BR /&gt;</description>
      <pubDate>Tue, 11 Dec 2018 14:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3761320#M487249</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-11T14:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3761704#M487251</link>
      <description>&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 06:14:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3761704#M487251</guid>
      <dc:creator>yongwli</dc:creator>
      <dc:date>2018-12-12T06:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762093#M487253</link>
      <description>&lt;P&gt;While a command is a command so you can't tell where the shutdown is being issued you can definitely control access to the modes. Simply don't allow the user into OSPF or more to the point only allow them into "interface gig*".&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also just for clarification you don't need to put "*" in the arguments.&amp;nbsp; If you don't put anything in there it assumes all arguments.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 15:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762093#M487253</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2018-12-12T15:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762446#M487255</link>
      <description>&lt;P&gt;Hello, I read your post and I'm dealing with something similar with ISE and ACS TACACS+ Command Sets. I need to restrict Tier1 and Tier2 Admins from specific interfaces. Prior to now I use deny int* g*1/1/1, deny int* g*1/1/2 etc.. being specific to each interface; however, that no longer works. I created a few regex e.g. g?*^([1-4]\/[1-4]\/[1-4])&amp;amp; and it works in regex101.com however it's unrecognized in ACS or ISE command sets. All Cisco documentation points to this being a properly formatted regex.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Is there a difference between how ISE handles regex in Command Sets?&lt;/P&gt;
&lt;P&gt;2. Is there a definitive document on regex for Cisco devices?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Wed, 12 Dec 2018 23:25:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762446#M487255</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2018-12-12T23:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762589#M487258</link>
      <description>This Regex is not valid g?*^([1-4]\/[1-4]\/[1-4]).&lt;BR /&gt;&lt;BR /&gt;? is not quantifiable.&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Dec 2018 06:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762589#M487258</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-13T06:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762592#M487316</link>
      <description>&lt;P&gt;Should "?" be replace with "." to denote a single character?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the regex reads starting with g any other valid character and in the second position and any number of characters after that?&lt;/P&gt;
&lt;P&gt;I was reading the using g* would only look for a continuous repeat of the letter g.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2018 06:55:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762592#M487316</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2018-12-13T06:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762597#M487317</link>
      <description>g.* is the right way to do it.&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Dec 2018 07:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3762597#M487317</guid>
      <dc:creator>Surendra</dc:creator>
      <dc:date>2018-12-13T07:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3789886#M487318</link>
      <description>&lt;P&gt;Found what I was looking for.&lt;/P&gt;
&lt;P&gt;It doesn't work under ACS Command sets but it works under ISE so that's good enough for me.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jan 2019 03:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3789886#M487318</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2019-01-29T03:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Tacas+ limit specific commands under one command layer</title>
      <link>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3820505#M487319</link>
      <description>&lt;P&gt;Very late update here but I did find the solution I was looking for to put in the command set on ISE.&lt;/P&gt;
&lt;TABLE id="grid-view1345" class="table table-bordered table-responsive table-striped table-hover" width="988"&gt;
&lt;TBODY&gt;
&lt;TR class="even" data-row-id="2"&gt;
&lt;TD&gt;&lt;SPAN class="td-span"&gt;deny interface gigabitethernet [1-4]/1/[1-4]&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE id="grid-view1345" class="table table-bordered table-responsive table-striped table-hover" width="988"&gt;
&lt;TBODY&gt;
&lt;TR class="even" data-row-id="2"&gt;
&lt;TD&gt;&lt;SPAN class="td-span"&gt;permit interface gigabitethernet [1-4]/0/[1-4]&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I danced around this config with all manner of regex format&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ej&lt;/P&gt;</description>
      <pubDate>Sat, 16 Mar 2019 01:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacas-limit-specific-commands-under-one-command-layer/m-p/3820505#M487319</guid>
      <dc:creator>Eric R. Jones</dc:creator>
      <dc:date>2019-03-16T01:14:23Z</dc:date>
    </item>
  </channel>
</rss>

