<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 13036 Selected Shell Profile is DenyAccess in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3479000#M519523</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Krishnan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have figured out where the authorisation policies can be specified (via the view option in the policy set). Now, I can allow or deny a shell access for a internal user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second issue that I'm facing now is, to provide limited shell access to a particular user. To test this scenario, I firstly created a Guest-User identity group and added a guest user (Eg, Guest_User1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, I created a TACACS+ command set (TACACS-Guest-Command-Set) with Grant: PERMIT -&amp;gt; Command: ping. Haven't ticket the option "Permit any command that is not listed below). I believe with this, the Guest_User1 when associated with TACACS-Guest-Command-Set in policy should be able to access only ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, I created a TACACS Profile (TACACS_Profile_Guest). Here, common task as shell with Default Privilege: 1 and Maximum Privilage: 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I go the policy set that works, under which, I create a new authorisation policy as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule Name: Guest-User&lt;/P&gt;&lt;P&gt;Conditions: IdentityGroup = User Identity Groups: Guest-User&lt;/P&gt;&lt;P&gt;Command Sets:&amp;nbsp; TACACS-Guest-Command-Set&lt;/P&gt;&lt;P&gt;Shell Profiles: TACACS_Profile_Guest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication is successful for the Guest_User1, while the authorisation does not seem to block all the commands expect ping. I can basically run all of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any reason why this might be happening?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Deepak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Nov 2017 04:45:02 GMT</pubDate>
    <dc:creator>deepakramanath</dc:creator>
    <dc:date>2017-11-28T04:45:02Z</dc:date>
    <item>
      <title>13036 Selected Shell Profile is DenyAccess</title>
      <link>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3478997#M519517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subsequent to my earlier question, I have managed a Avaya switch talk to the CISCO ISE 2.3 Tacacs+ server. When I try logging into the switch, the access is basically denied with the message "Permission denied, please try again".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the CISCO ISE Tacacs+ logs, I could look at the steps that have been performed and where the access gets failed. The step that its failing is: 13036 Selected Shell Profile is DenyAccess&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been searching on Google for this 13036 and DenyAccess, but haven't been able to successfully troubleshoot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help in this regard would be highly appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2017 05:57:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3478997#M519517</guid>
      <dc:creator>deepakramanath</dc:creator>
      <dc:date>2017-11-27T05:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: 13036 Selected Shell Profile is DenyAccess</title>
      <link>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3478998#M519518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deepak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check the authentication policy and authorization policy.&lt;/P&gt;&lt;P&gt;In the authorization policy, make sure you allow access in your policy via shell profile. If authentication fails then you will get deny access as well.&lt;/P&gt;&lt;P&gt;Please check out &lt;A href="https://community.cisco.com/docs/DOC-64031"&gt;ISE Device Administration (TACACS+)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;for detailed information how to configure ISE for TACACS+.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Krishnan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2017 21:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3478998#M519518</guid>
      <dc:creator>kthiruve</dc:creator>
      <dc:date>2017-11-27T21:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: 13036 Selected Shell Profile is DenyAccess</title>
      <link>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3478999#M519520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Krishnan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response. Since I am very new to ISE, I will provide a brief of what I have configured for AA. Please do feel free to correct me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Device Administration -&amp;gt; Policy Elements -&amp;gt; Results -&amp;gt; TACACS Profiles, I have created a new one, called TACACS Profile. In here, I have chosen Common Task Type to be Shell and both Default Privilege and Maximum Privilege to be 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Device Administration -&amp;gt; Policy Elements -&amp;gt; Results -&amp;gt; TACACS Command Sets, I have created a new one, called TACACS Command Sets and I have ticked the option, "Permit any command that is not listed below"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Policy -&amp;gt; Policy Sets, I have created two policies as listed below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy Name: Wired-Avaya-Switch&lt;/P&gt;&lt;P&gt;Conditions: DEVICE.Device Type = All Devices Types#Avaya Switch&lt;/P&gt;&lt;P&gt;Allowed Protocols: avaya-switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy Name: Avaya-Switch-Location&lt;/P&gt;&lt;P&gt;Condition: DEVICE.Location = All Locations#Avaya-Switch-Location&lt;/P&gt;&lt;P&gt;Allowed Protocols: avaya-switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note that the avaya-switch protocol has the following Authentication Protocols Enabled:&lt;/P&gt;&lt;P&gt;Allow PAP/ASCII, Allow CHAP, Allow MS-CHAPv1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not exactly sure where I can specify the shell profile access for authorisation as you have suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Deepak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Nov 2017 23:23:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3478999#M519520</guid>
      <dc:creator>deepakramanath</dc:creator>
      <dc:date>2017-11-27T23:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: 13036 Selected Shell Profile is DenyAccess</title>
      <link>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3479000#M519523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Krishnan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have figured out where the authorisation policies can be specified (via the view option in the policy set). Now, I can allow or deny a shell access for a internal user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second issue that I'm facing now is, to provide limited shell access to a particular user. To test this scenario, I firstly created a Guest-User identity group and added a guest user (Eg, Guest_User1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, I created a TACACS+ command set (TACACS-Guest-Command-Set) with Grant: PERMIT -&amp;gt; Command: ping. Haven't ticket the option "Permit any command that is not listed below). I believe with this, the Guest_User1 when associated with TACACS-Guest-Command-Set in policy should be able to access only ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next, I created a TACACS Profile (TACACS_Profile_Guest). Here, common task as shell with Default Privilege: 1 and Maximum Privilage: 15&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I go the policy set that works, under which, I create a new authorisation policy as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule Name: Guest-User&lt;/P&gt;&lt;P&gt;Conditions: IdentityGroup = User Identity Groups: Guest-User&lt;/P&gt;&lt;P&gt;Command Sets:&amp;nbsp; TACACS-Guest-Command-Set&lt;/P&gt;&lt;P&gt;Shell Profiles: TACACS_Profile_Guest&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authentication is successful for the Guest_User1, while the authorisation does not seem to block all the commands expect ping. I can basically run all of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any reason why this might be happening?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Deepak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2017 04:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3479000#M519523</guid>
      <dc:creator>deepakramanath</dc:creator>
      <dc:date>2017-11-28T04:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: 13036 Selected Shell Profile is DenyAccess</title>
      <link>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3479001#M519526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think here is the key :&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/113809_pastedImage_0.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2017 09:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13036-selected-shell-profile-is-denyaccess/m-p/3479001#M519526</guid>
      <dc:creator>ognyan.totev</dc:creator>
      <dc:date>2017-11-28T09:59:38Z</dc:date>
    </item>
  </channel>
</rss>

