<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: command authorization by ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/command-authorization-by-ise/m-p/3577204#M519733</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Each of the CLI commands has its own privilege level and its command authorization is sent based on this privilege level rather than that of the user who attempting to run it. By default or in most implementations of Cisco IOS, commands are assigned to Level 0, 1, and 15. If not sure which ones are in use, you may specify them (0 ~ 15) all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network devices might allow changing the privilege levels of commands. For example, &lt;A href="https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfpass.html#wp1001038"&gt;Setting the Privilege Level for a Command in Cisco IOS&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 18 Nov 2017 16:28:01 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2017-11-18T16:28:01Z</dc:date>
    <item>
      <title>command authorization by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/command-authorization-by-ise/m-p/3577202#M519727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I deploy an ISE for tacacs server and command authorization is used to control which command sets are allowed to execute for different privilege level.&lt;/P&gt;&lt;P&gt;Users in "FMC-admin" AD group will assigned to privilege 15 by shell profiles and permit to execute all commands by command sets result. Once one command is executed by admin users, a tacacs log was poped up and show which command is entered.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;Users in "HR" AD group will assigned to privilege 6 by shell profiles and only allow to execute "show access-list" by command sets result. But HR user could execute any privilege level 6 commands and I can't see any logs like what happened for admin user when I enter commands .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;It is a little confused me that does command sets authorization is only available for privilege 15?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AAA configuration:&lt;/P&gt;&lt;P&gt;aaa authentication login default group ise local&lt;/P&gt;&lt;P&gt;aaa authentication enable default group ise&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec default group ise&lt;/P&gt;&lt;P&gt;aaa authorization commands 5 default group ise&lt;/P&gt;&lt;P&gt;aaa authorization commands 6 default group ise&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group ise&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="113436" alt="AAA.png" class="image-1 jive-image" src="https://community.cisco.com/legacyfs/online/fusion/113436_AAA.png" style="font-size: 13.3333px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Nov 2017 09:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/command-authorization-by-ise/m-p/3577202#M519727</guid>
      <dc:creator>xili5</dc:creator>
      <dc:date>2017-11-17T09:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: command authorization by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/command-authorization-by-ise/m-p/3577203#M519730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the command authorization request comes into ISE and matched the correct command sets, then ISE should send Access-Reject or fail the request. If that is not the case, we need to check why ISE not authorizing it correctly.&lt;/P&gt;&lt;P&gt;Otherwise, this might be how your target NAD platform implementing its T+ enforcement or a bug on that platform.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Nov 2017 17:23:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/command-authorization-by-ise/m-p/3577203#M519730</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-11-17T17:23:50Z</dc:date>
    </item>
    <item>
      <title>Re: command authorization by ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/command-authorization-by-ise/m-p/3577204#M519733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Each of the CLI commands has its own privilege level and its command authorization is sent based on this privilege level rather than that of the user who attempting to run it. By default or in most implementations of Cisco IOS, commands are assigned to Level 0, 1, and 15. If not sure which ones are in use, you may specify them (0 ~ 15) all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network devices might allow changing the privilege levels of commands. For example, &lt;A href="https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/configuration/guide/fsecur_c/scfpass.html#wp1001038"&gt;Setting the Privilege Level for a Command in Cisco IOS&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Nov 2017 16:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/command-authorization-by-ise/m-p/3577204#M519733</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2017-11-18T16:28:01Z</dc:date>
    </item>
  </channel>
</rss>

