<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I create a non-administrative RADIUS user? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839110#M547851</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/835623"&gt;@alemanetz&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe this discussion of the community can help you:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/firewalls/privilege-level-assignment-via-radius/td-p/2221818" target="_blank"&gt;https://community.cisco.com/t5/firewalls/privilege-level-assignment-via-radius/td-p/2221818&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Tue, 16 Apr 2019 00:10:33 GMT</pubDate>
    <dc:creator>luis_cordova</dc:creator>
    <dc:date>2019-04-16T00:10:33Z</dc:date>
    <item>
      <title>How do I create a non-administrative RADIUS user?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839074#M547849</link>
      <description>&lt;P&gt;Hello, I have some Cisco 2960X switches in which I authenticate using RADIUS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was wondering if there's a way to create a non-administrative user for them using a RADIUS server?&lt;/P&gt;&lt;P&gt;This user should only execute the following commands: &lt;STRONG&gt;show interface status&lt;/STRONG&gt;, &lt;STRONG&gt;duplex &amp;lt;mode&amp;gt;, switchport&lt;/STRONG&gt;, &lt;STRONG&gt;description&lt;/STRONG&gt;,&amp;nbsp;&lt;STRONG&gt;shutdown&lt;/STRONG&gt;&amp;nbsp;and &lt;STRONG&gt;no shutdown&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this possible?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 19:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839074#M547849</guid>
      <dc:creator>alemanetz</dc:creator>
      <dc:date>2020-02-21T19:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: How do I create a non-administrative RADIUS user?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839110#M547851</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/835623"&gt;@alemanetz&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe this discussion of the community can help you:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/firewalls/privilege-level-assignment-via-radius/td-p/2221818" target="_blank"&gt;https://community.cisco.com/t5/firewalls/privilege-level-assignment-via-radius/td-p/2221818&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2019 00:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839110#M547851</guid>
      <dc:creator>luis_cordova</dc:creator>
      <dc:date>2019-04-16T00:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: How do I create a non-administrative RADIUS user?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839139#M547852</link>
      <description>If the RADIUS server that you are using is ISE, then it is commonly done with TACACS.  &lt;BR /&gt;&lt;BR /&gt;You create a shell profile for the device, a command set (limiting commands), and then an authentication and authorization rule that the user/switch matches.  This is a good graphical guide showing an example. &lt;BR /&gt;&lt;A href="https://networkproguide.com/configure-cisco-ise-tacacs-server/" target="_blank"&gt;https://networkproguide.com/configure-cisco-ise-tacacs-server/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If the RADIUS server you are using doesn't offer TACACS, it still possible to restrict authentication users from accessing config t, just a different guide.</description>
      <pubDate>Tue, 16 Apr 2019 00:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839139#M547852</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2019-04-16T00:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: How do I create a non-administrative RADIUS user?</title>
      <link>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839512#M547853</link>
      <description>&lt;P&gt;Thanks for your answer!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm using NPS as my RADIUS server. How would I go around this?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2019 13:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/how-do-i-create-a-non-administrative-radius-user/m-p/3839512#M547853</guid>
      <dc:creator>alemanetz</dc:creator>
      <dc:date>2019-04-16T13:39:32Z</dc:date>
    </item>
  </channel>
</rss>

