<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE  Tacacs Policies Set in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3353652#M555130</link>
    <description>&lt;P&gt;Hi&lt;BR /&gt;&lt;BR /&gt;Can you share the policy you're pushing from your tacacs server?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Just for your information. If you want to use privilege levels it has to be configured locally the device if you're pushing level 7 from tacacs.&lt;/P&gt;
&lt;P&gt;Using tacacs you can push level 15 and filter commands for users using command-sets&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Mar 2018 02:38:49 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2018-03-23T02:38:49Z</dc:date>
    <item>
      <title>Cisco ISE  Tacacs Policies Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3353644#M555126</link>
      <description>&lt;P&gt;I have configure Cisco ISE for TACACS server. I configured command set to limit some show command and shell profile to maximum the privilege to 7 for HelpDesk Admin. The command set policy is working fine but shell profile seem not working. I logged into the switch and show privilege, I'm still in privilege 15.I'm not sure where I'm wrong. Please kindly see the switch configuration as below:&lt;/P&gt;
&lt;P&gt;tacacs-server timeout 1&lt;BR /&gt;tacacs-server host 10.156.141.69&lt;BR /&gt;tacacs-server key 0 P@ssw0rd&lt;/P&gt;
&lt;P&gt;aaa authentication login default group tacacs+ local none&lt;BR /&gt;aaa authentication enable default group tacacs+ local none&lt;BR /&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec ISE group tacacs+ local none&lt;BR /&gt;aaa authorization commands 0 default group tacacs+ local none&lt;BR /&gt;aaa authorization commands 1 default group tacacs+ local none&lt;BR /&gt;aaa authorization commands 7 default group tacacs+ local none&lt;BR /&gt;aaa authorization commands 15 default group tacacs+ local none&lt;BR /&gt;aaa accounting exec default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 0 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 7 default start-stop group tacacs+&lt;BR /&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;line vty 0 4&lt;BR /&gt;authorization exec ISE&lt;BR /&gt;transport preferred ssh&lt;BR /&gt;transport input ssh&lt;/P&gt;
&lt;P&gt;line vty 5 15&lt;BR /&gt;authorization exec ISE&lt;BR /&gt;transport preferred ssh&lt;BR /&gt;transport input ssh&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3353644#M555126</guid>
      <dc:creator>PutmanoAIT</dc:creator>
      <dc:date>2020-02-21T18:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  Tacacs Policies Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3353652#M555130</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;&lt;BR /&gt;Can you share the policy you're pushing from your tacacs server?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Just for your information. If you want to use privilege levels it has to be configured locally the device if you're pushing level 7 from tacacs.&lt;/P&gt;
&lt;P&gt;Using tacacs you can push level 15 and filter commands for users using command-sets&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 02:38:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3353652#M555130</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-03-23T02:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  Tacacs Policies Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3353658#M555145</link>
      <description>&lt;P&gt;Please kindly see the configuration as attach file.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank for your kindly support.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 02:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3353658#M555145</guid>
      <dc:creator>PutmanoAIT</dc:creator>
      <dc:date>2018-03-23T02:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE  Tacacs Policies Set</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3354273#M555156</link>
      <description>How do you connect on the switch?&lt;BR /&gt;&lt;BR /&gt;Your command authentication enable should be:&lt;BR /&gt;aaa authentication enable default group tacacs+ enable&lt;BR /&gt;&lt;BR /&gt;On ISE, your user should have the password set on enable field.&lt;BR /&gt;When you're logged in, you need to type enable 7 and type your password. If you try enable, by default it will be enable 15 and you shouldn't be able to log in</description>
      <pubDate>Fri, 23 Mar 2018 23:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-policies-set/m-p/3354273#M555156</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-03-23T23:47:15Z</dc:date>
    </item>
  </channel>
</rss>

