<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Looking for example authorization command sets for mid-privilege users in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034418#M558263</link>
    <description>&lt;P&gt;TACACS+ Command Sets should be based on specific business requirements, so they are rarely "one size fits all"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can find some examples in the following video, but you'll need to use the same methodology to develop your required Command Sets. You would typically want to test these extensively in a non-Prod environment as well before deploying into Production.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=qbnvjzr_zi4" target="_self"&gt;ISE 2.0: TACACS+ Command Authorization&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 23 Feb 2020 22:18:33 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2020-02-23T22:18:33Z</dc:date>
    <item>
      <title>Looking for example authorization command sets for mid-privilege users</title>
      <link>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034317#M558256</link>
      <description>&lt;P&gt;We recently started moving our devices back to TACACS authentication from RADIUS. We had this on ACS, but when we migrated to ISE it only supported RADIUS at the time. Now that we can do authorization sets again, I am curious as to what command sets you consider safe for Contractors or Junior Admins. I know this can vary by platform, but just looking for some ideas as we look to lock down these users command sets.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 13:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034317#M558256</guid>
      <dc:creator>CommKeeper</dc:creator>
      <dc:date>2020-02-23T13:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: Looking for example authorization command sets for mid-privilege users</title>
      <link>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034319#M558257</link>
      <description>&lt;P&gt;There are plenty of resource on cisco website &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200208-Configure-ISE-2-0-IOS-TACACS-Authentic.html" target="_self"&gt;here&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 13:34:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034319#M558257</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-02-23T13:34:44Z</dc:date>
    </item>
    <item>
      <title>Re: Looking for example authorization command sets for mid-privilege users</title>
      <link>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034323#M558258</link>
      <description>&lt;P&gt;Thanks for sharing this link. I do understand how to set this up, but I'm just looking for some command sets others have used for roles such as these. I did not see that type of examples in the document link outside of 'show'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;Junior Admin&lt;/P&gt;&lt;P&gt;Permitted&lt;/P&gt;&lt;P&gt;#show&lt;/P&gt;&lt;P&gt;(config)# hostname&lt;/P&gt;&lt;P&gt;(config-if)# switchport&lt;/P&gt;&lt;P&gt;(config-if)# authentication&lt;/P&gt;&lt;P&gt;(config-if)# dot1x&lt;/P&gt;&lt;P&gt;(config-if)# service-policy&lt;/P&gt;&lt;P&gt;Denied&lt;/P&gt;&lt;P&gt;(config)# ip route&lt;/P&gt;&lt;P&gt;(config)# interface vlan&lt;/P&gt;&lt;P&gt;(config)# aaa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;...etc.etc..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 13:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034323#M558258</guid>
      <dc:creator>CommKeeper</dc:creator>
      <dc:date>2020-02-23T13:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: Looking for example authorization command sets for mid-privilege users</title>
      <link>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034324#M558259</link>
      <description>&lt;P&gt;check this page it has all the required information might be helpful for you &lt;A href="https://www.cisco.com/c/en/us/support/security/identity-services-engine/products-configuration-examples-list.html" target="_self"&gt;here&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 13:54:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034324#M558259</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-02-23T13:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: Looking for example authorization command sets for mid-privilege users</title>
      <link>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034418#M558263</link>
      <description>&lt;P&gt;TACACS+ Command Sets should be based on specific business requirements, so they are rarely "one size fits all"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can find some examples in the following video, but you'll need to use the same methodology to develop your required Command Sets. You would typically want to test these extensively in a non-Prod environment as well before deploying into Production.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=qbnvjzr_zi4" target="_self"&gt;ISE 2.0: TACACS+ Command Authorization&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2020 22:18:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/looking-for-example-authorization-command-sets-for-mid-privilege/m-p/4034418#M558263</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-02-23T22:18:33Z</dc:date>
    </item>
  </channel>
</rss>

