<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE TACACS Deny All Shell Profile Still Not Working Correctly in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558095#M537865</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ISE 2.0 bug [CSCuy46322&amp;nbsp;&amp;nbsp;&amp;nbsp; DefaultDeny access present in ACS is missing in ISE's TACACS feature] is found with NX-OS and it should already resolve in ISE 2.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which Nexus devices did you try? I only have access to N1Kv so I can try that in my lab.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Aug 2016 17:44:34 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2016-08-17T17:44:34Z</dc:date>
    <item>
      <title>ISE TACACS Deny All Shell Profile Still Not Working Correctly</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558092#M537857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There has been a fundamental issue with ISE TACACS since the start that it doesn't allow us to deny the connection during the Authz phase like ACS did.&amp;nbsp; The main issue here is any users from your identity source is allowed to log into the device.&amp;nbsp; For example if you allow AD as an identity source, ANY AD user can log into your network devices and you have to use other methods like autocommand logout or command authorization to stop them from doing anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Deny All Shell Profile was supposed to fix the issue, but it only works for systems that have an exec authorization phase like routers and switches.&amp;nbsp; For systems running Nexus OS the user still gets in.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to me like the main issue is the ISE decouple the authentication phase from the authorization phase something I don't believe ACS did (but could be wrong) and something RADIUS doesn't have a concept of.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if there is a clean way to fix this. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2016 16:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558092#M537857</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2016-08-17T16:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: ISE TACACS Deny All Shell Profile Still Not Working Correctly</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558093#M537861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your ISE 2.1 upgraded from ISE 2.0, then you might have hit this bug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CSCva04654&amp;nbsp;&amp;nbsp;&amp;nbsp; Restore/Upgrade of ISE 2.0 to 2.1 Removes Default DenyShell Profile&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are addressing it in the upcoming patch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is not the case, please give more details or open a TAC case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2016 17:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558093#M537861</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-08-17T17:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: ISE TACACS Deny All Shell Profile Still Not Working Correctly</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558094#M537863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes we have seen this bug on our upgrades.&amp;nbsp; The deployment I am working on is a fresh 2.1 build and the Deny All Shell Profile is there.&amp;nbsp; I guess the title of my post may be misleading.&amp;nbsp; I am not saying the Deny All Shell Profile doesn't work I am saying it only works if the authentication device has an exec shell authorization phase.&amp;nbsp; Nexus OS doesn't have an exec shell authorization phase like switches and routers do, i.e there is no "aaa authorization exec default group ISE-TACACS if-authenticated" on the Nexus.&amp;nbsp; You only have the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;US-DCPR-CS02(config)# aaa authorization ?&lt;/P&gt;&lt;P&gt;&amp;nbsp; commands&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authorization for all exec-mode commands&lt;/P&gt;&lt;P&gt;&amp;nbsp; config-commands&amp;nbsp; Authorization for config commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without a exec shell authorization phase the Deny All Shell Profile work around doesn't work.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't remember any of this being an issue in ACS.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2016 17:33:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558094#M537863</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2016-08-17T17:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: ISE TACACS Deny All Shell Profile Still Not Working Correctly</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558095#M537865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ISE 2.0 bug [CSCuy46322&amp;nbsp;&amp;nbsp;&amp;nbsp; DefaultDeny access present in ACS is missing in ISE's TACACS feature] is found with NX-OS and it should already resolve in ISE 2.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which Nexus devices did you try? I only have access to N1Kv so I can try that in my lab.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2016 17:44:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558095#M537865</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-08-17T17:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE TACACS Deny All Shell Profile Still Not Working Correctly</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558096#M537868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nexus 7K and MDS 9148&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the MDS login from a local user not in one of the allowed MDS admin groups:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login as: testuser&lt;/P&gt;&lt;P&gt;User Access Verification&lt;/P&gt;&lt;P&gt;Using keyboard-interactive authentication.&lt;/P&gt;&lt;P&gt;Password:&lt;/P&gt;&lt;P&gt;Cisco Nexus Operating System (NX-OS) Software&lt;/P&gt;&lt;P&gt;&amp;lt;removed the TAC and license verbiage&amp;gt;&lt;/P&gt;&lt;P&gt;US-DCPR-MDS-A#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can see the in the logs below I am clearly getting denied in the authorization phase, but I am at the # prompt of the MDS&amp;gt;&lt;IMG alt="TACACS Logs.JPG" class="image-1 jive-image" src="/legacyfs/online/fusion/99503_TACACS Logs.JPG" style="height: 30px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Aug 2016 18:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558096#M537868</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2016-08-17T18:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: ISE TACACS Deny All Shell Profile Still Not Working Correctly</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558097#M537871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am seeing the same problem on my ISE 2.1 and N1Kv so have asked our engineering teams to investigate. One workaround I have right now is to use ISE as a RADIUS token server and define a &lt;STRONG&gt;RADIUS&lt;/STRONG&gt; policy set to deny access by default unless matching specific user groups. Additionally, a NAD created for ISE itself with the same shared secret as the token server object.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screen Shot 2016-08-17 at 5.13.16 PM.png" class="image-1 jive-image" src="/legacyfs/online/fusion/99501_Screen Shot 2016-08-17 at 5.13.16 PM.png" style="height: 249px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, update the T+ policy set for NX-OS to use this loop-back RADIUS token server as the identity source, instead.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2016 00:16:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558097#M537871</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2016-08-18T00:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: ISE TACACS Deny All Shell Profile Still Not Working Correctly</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558098#M537873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.  I have used the RADIUS callback trick for portal AD group enforcement.  In this case I am doing command authorization on the MDS and Nexus switches so even though the user gets in they can’t do anything.  I was bring this up as a discussion to point out that the deny during authorization is not working right on all platforms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2016 14:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-tacacs-deny-all-shell-profile-still-not-working-correctly/m-p/3558098#M537873</guid>
      <dc:creator>paul</dc:creator>
      <dc:date>2016-08-18T14:12:19Z</dc:date>
    </item>
  </channel>
</rss>

