<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE 2.1 - TACACS/Device Admin - Authorization rule not working in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474096#M537377</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi George, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply - config wise:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login Use_Tacacs group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authentication login No_Tacacs line&lt;/P&gt;&lt;P&gt;aaa authorization exec Use_Tacacs group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 Tacacs_Auth group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 Tacacs_Auth group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 5 0&lt;/P&gt;&lt;P&gt; password .......&lt;/P&gt;&lt;P&gt; authorization commands 1 Tacacs_Auth&lt;/P&gt;&lt;P&gt; authorization commands 15 Tacacs_Auth&lt;/P&gt;&lt;P&gt; authorization exec Use_Tacacs&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication Use_Tacacs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As an update I've got the command restrictions to work, by taking off&amp;nbsp;&amp;nbsp;&amp;nbsp; ' * '&amp;nbsp; in the arguments field. I put a star in there thinking it will include all subcommands which i can use with a permit. I took it off and the permit command was working as expected. What isn't working is if I put 'deny_always' (or deny) under the Grant column, and 'enable' under the Command column (with or without an argument).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although command restrictions are working the user can still go into priviledged exec mode/15, even if default privilege &amp;amp; maximum privilege is set to 1 on the tacacs profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the detailed tacacs log I get this when logging in:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3 class="title"&gt;Authorization Attributes&lt;/H3&gt;&lt;TABLE border="0" class="content_table"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="31%"&gt; All Request Attribues &lt;/TD&gt;&lt;TD width="69%"&gt;&amp;nbsp; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="31%"&gt; All Response Attribues &lt;/TD&gt;&lt;TD width="69%"&gt; priv-lvl=1 &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H3 class="title"&gt;Other Attributes&lt;/H3&gt;&lt;P&gt;Response {Author-Reply-Status=PassAdd; AVPair=priv-lvl=1; }&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Oct 2016 12:26:41 GMT</pubDate>
    <dc:creator>IP Team</dc:creator>
    <dc:date>2016-10-06T12:26:41Z</dc:date>
    <item>
      <title>ISE 2.1 - TACACS/Device Admin - Authorization rule not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474094#M537371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Hi All, &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;I’m hoping you can help with an issue I have with TACACS Device Admin on ISE 2.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;In Device Administration &amp;gt; Device Admin Policy Sets , I’ve created a new policy which has:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL style="list-style-type: disc;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Status: enabled, conditions: device type – allow all device types&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;An Authentication rule that checks users based on an external AD source – this works fine as indicated by the TACACS live log. Allow protocols: default device admin.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;An Authorization rule which again checks users based on an external AD group then applies the following elements with an ‘AND’ statement:&lt;/SPAN&gt;&lt;OL style="list-style-type: lower-alpha;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Command set: permit – ping, show, traceroute commands with all arguments ( using * ). Permit ‘exit’.&lt;/SPAN&gt;&lt;UL style="list-style-type: disc;"&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;I have not ticked the box ‘permit any command that is not listed below’, so I have not needed use a deny statement. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt; TACACS profile: In common tasks, type ‘Shell’ only two options selected, a default and maximum priviledge both set to ‘1’.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;There are no global/local exception rules. &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;The TACACS live log shows that authentication passed with the intended authentication rule (checking through AD), it also shows the correct&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Authorization rule being called upon (which also checks a user based on an AD group) however the only thing working from that is when a user &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;logs in the default priviledge is set to 1. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Commands are not restricted based on the command set and using the enable command the user can still go into priviledge level 15.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;It seems somehow the Authorization rule (command set/profile) is not being utilized fully?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Essentially I just need the authorization rule to restrict the users within that specific AD group to have access to priviledge level 1, and only able to execute read only commands.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Arial','sans-serif'; color: black;"&gt;Shams&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Oct 2016 11:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474094#M537371</guid>
      <dc:creator>IP Team</dc:creator>
      <dc:date>2016-10-06T11:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 - TACACS/Device Admin - Authorization rule not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474095#M537374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you share the aaa configuration from your nad?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Warning: I either dictated this to my device, or typed it with my thumbs. Erroneous words are a feature, not a typo.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Oct 2016 11:20:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474095#M537374</guid>
      <dc:creator>gbekmezi-DD</dc:creator>
      <dc:date>2016-10-06T11:20:26Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 - TACACS/Device Admin - Authorization rule not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474096#M537377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi George, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply - config wise:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login Use_Tacacs group tacacs+ line&lt;/P&gt;&lt;P&gt;aaa authentication login No_Tacacs line&lt;/P&gt;&lt;P&gt;aaa authorization exec Use_Tacacs group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 1 Tacacs_Auth group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 Tacacs_Auth group tacacs+ if-authenticated none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 5 0&lt;/P&gt;&lt;P&gt; password .......&lt;/P&gt;&lt;P&gt; authorization commands 1 Tacacs_Auth&lt;/P&gt;&lt;P&gt; authorization commands 15 Tacacs_Auth&lt;/P&gt;&lt;P&gt; authorization exec Use_Tacacs&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; login authentication Use_Tacacs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As an update I've got the command restrictions to work, by taking off&amp;nbsp;&amp;nbsp;&amp;nbsp; ' * '&amp;nbsp; in the arguments field. I put a star in there thinking it will include all subcommands which i can use with a permit. I took it off and the permit command was working as expected. What isn't working is if I put 'deny_always' (or deny) under the Grant column, and 'enable' under the Command column (with or without an argument).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although command restrictions are working the user can still go into priviledged exec mode/15, even if default privilege &amp;amp; maximum privilege is set to 1 on the tacacs profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the detailed tacacs log I get this when logging in:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3 class="title"&gt;Authorization Attributes&lt;/H3&gt;&lt;TABLE border="0" class="content_table"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="31%"&gt; All Request Attribues &lt;/TD&gt;&lt;TD width="69%"&gt;&amp;nbsp; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="31%"&gt; All Response Attribues &lt;/TD&gt;&lt;TD width="69%"&gt; priv-lvl=1 &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;H3 class="title"&gt;Other Attributes&lt;/H3&gt;&lt;P&gt;Response {Author-Reply-Status=PassAdd; AVPair=priv-lvl=1; }&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Oct 2016 12:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474096#M537377</guid>
      <dc:creator>IP Team</dc:creator>
      <dc:date>2016-10-06T12:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 - TACACS/Device Admin - Authorization rule not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474097#M537380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-64031" style="font-size: 10pt;"&gt;ISE Device Administration (TACACS+)&lt;/A&gt;&lt;SPAN style="font-size: 10pt;"&gt; might help you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your configuration seems missing "aaa authentication enable ..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once that in, we would expect it failing right after issuing "enable". Below is a result I got in our lab setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2016-10-06 at 7.41.32 PM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/100981_Screen Shot 2016-10-06 at 7.41.32 PM.png" style="height: auto; width: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2016-10-06 at 7.41.42 PM.png" class="jive-image image-2" src="/legacyfs/online/fusion/100982_Screen Shot 2016-10-06 at 7.41.42 PM.png" style="height: 542px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Other Attributes&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2016-10-06 at 7.42.06 PM.png" class="jive-image image-3" src="/legacyfs/online/fusion/100983_Screen Shot 2016-10-06 at 7.42.06 PM.png" style="height: 60px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Oct 2016 02:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474097#M537380</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-10-07T02:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: ISE 2.1 - TACACS/Device Admin - Authorization rule not working</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474098#M537383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent thanks very much, fixed it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Oct 2016 08:34:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-2-1-tacacs-device-admin-authorization-rule-not-working/m-p/3474098#M537383</guid>
      <dc:creator>IP Team</dc:creator>
      <dc:date>2016-10-07T08:34:15Z</dc:date>
    </item>
  </channel>
</rss>

