<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enable authentication only through ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084812#M560364</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;A title="TelltheBell" href="https://www.tellthebell.one/" target="_blank" rel="noopener"&gt;TelltheBell&lt;/A&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Command authorization via Tacacs is allowed on the Nexus but Command authorization disables user role based authorization control (RBAC), including the default roles. As you are configuring command set, I believe below config is there on your Nexus switch:&lt;/P&gt;&lt;P&gt;—aaa authorization commands default &amp;lt;ISE&amp;gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;—aaa authorization config-commands default &amp;lt;ISE&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In such case, this config, looks good to me, although I don't see the need for custom attributes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Thank you for sharing article and information. this is very helpful for beginner.&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2020 11:28:32 GMT</pubDate>
    <dc:creator>Sheeneattigrm3</dc:creator>
    <dc:date>2020-05-14T11:28:32Z</dc:date>
    <item>
      <title>Enable authentication only through ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084752#M560355</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have this situation where I need to authenticate a particular user on Nexus devices via ISE, but the user should not be permitted to do anything else on the device.&lt;/P&gt;&lt;P&gt;I have configured a new Tacacs Profile with the following:&lt;/P&gt;&lt;P&gt;Common Task Type -&amp;gt; Nexus&lt;/P&gt;&lt;P&gt;Set Attribute as: Optional&lt;/P&gt;&lt;P&gt;Network Role --&amp;gt; None&lt;/P&gt;&lt;P&gt;VDC Role --&amp;gt; None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Custom Attribures&lt;/P&gt;&lt;P&gt;Mandatory priv-lvl:0&lt;/P&gt;&lt;P&gt;Mandatory max_priv_lvl:0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also created a TACACS Command Set that denies any configure and any show commands.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the Policy Sets for the explicit user, when trying to access the Nexus Devices, the authorization policy is tied with the above command sets and the profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The end result is what I am expecting... user can log in and nothing can be run. Is this the correct way to go about it or do I need to do something different. To be frank I got a bit confused with the Profile settings...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;Katerina&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 10:19:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084752#M560355</guid>
      <dc:creator>katerina.dardoufa</dc:creator>
      <dc:date>2020-05-13T10:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: Enable authentication only through ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084758#M560357</link>
      <description>&lt;P&gt;That looks pretty good to me. So in effect, this is like a TCP keep alive for Nexus to check whether TACACS+ server is still alive?&lt;/P&gt;
&lt;P&gt;Why is this feature so important? If you have two TACACS+ servers defined in your config Group, then surely that would suffice? If a request to server 1 times out after 3 attempts, then use server 2, etc.&lt;/P&gt;
&lt;P&gt;The keepalive feature might make things happen a bit faster/deterministic - but if it causes your auditors to have a coronary, then you could probably leave it out.&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 10:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084758#M560357</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2020-05-13T10:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: Enable authentication only through ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084781#M560360</link>
      <description>&lt;P&gt;Command authorization via Tacacs is allowed on the Nexus but Command authorization disables user role based authorization control (RBAC), including the default roles. As you are configuring command set, I believe below config is there on your Nexus switch:&lt;/P&gt;
&lt;P&gt;&amp;#151;aaa authorization commands default &amp;lt;ISE&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;#151;aaa authorization config-commands default &amp;lt;ISE&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In such case, this config, looks good to me, although I don't see the need for custom attributes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 10:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084781#M560360</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2020-05-13T10:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: Enable authentication only through ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084812#M560364</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;A title="TelltheBell" href="https://www.tellthebell.one/" target="_blank" rel="noopener"&gt;TelltheBell&lt;/A&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Command authorization via Tacacs is allowed on the Nexus but Command authorization disables user role based authorization control (RBAC), including the default roles. As you are configuring command set, I believe below config is there on your Nexus switch:&lt;/P&gt;&lt;P&gt;—aaa authorization commands default &amp;lt;ISE&amp;gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;—aaa authorization config-commands default &amp;lt;ISE&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In such case, this config, looks good to me, although I don't see the need for custom attributes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Thank you for sharing article and information. this is very helpful for beginner.&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2020 11:28:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084812#M560364</guid>
      <dc:creator>Sheeneattigrm3</dc:creator>
      <dc:date>2020-05-14T11:28:32Z</dc:date>
    </item>
    <item>
      <title>Re: Enable authentication only through ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084821#M560366</link>
      <description>&lt;P&gt;Hi Arne,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is indeed a sort of keepalive for the Nexus... If the auditors don't like it, and aren't satisfied with our explanations, then we will live it out. If we can keep it though and it works, even better!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 11:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084821#M560366</guid>
      <dc:creator>katerina.dardoufa</dc:creator>
      <dc:date>2020-05-13T11:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: Enable authentication only through ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084830#M560367</link>
      <description>&lt;P&gt;So I understand that I could remove the priv-level etc altogether and everything would still be ok, since I am limiting access through the command sets.&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2020 11:52:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/enable-authentication-only-through-ise/m-p/4084830#M560367</guid>
      <dc:creator>katerina.dardoufa</dc:creator>
      <dc:date>2020-05-13T11:52:26Z</dc:date>
    </item>
  </channel>
</rss>

