<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 13029 Requested privilege level too high in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4101530#M561140</link>
    <description>&lt;P&gt;I'm running ISE 2.7 and testing a read-only account to scan a network device (2960 switch) to do vulnerability scans.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ext Id Source is Active Directory and following TACACS setup below:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TACACS Command Set&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Permit All w/Permit any command that is not listed below&lt;/LI&gt;&lt;LI&gt;Read Only with PERMIT SHOW defined. Box is unchecked “Permit any command that is not listed below”&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TACACS Profile&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Privilege 0 = default 0 and max is 0&lt;/LI&gt;&lt;LI&gt;Privilege 1 = default is 0 and max is 1&lt;/LI&gt;&lt;LI&gt;Privilege 7 = default is 0 and max is 7&lt;/LI&gt;&lt;LI&gt;Privilege 15 = default is 15 and max is 15&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Device Admin Policy Set&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Authentication&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Default - AD (external Identity source)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Authorization&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Device RW = Network-ReadWrite + Permit all &amp;nbsp;&amp;amp; Shell Privilege 15&lt;/LI&gt;&lt;LI&gt;Device RO = Network-ReadOnly + Read Only &amp;amp; Shell Privilege 0&lt;/LI&gt;&lt;LI&gt;Default – DENY ALL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;And when I drill down to the detailed information in TACACS Log it stops with 13209 Requested privilege level too high.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure what the next steps are if I need to change Shell Privilege on Authorization? or is this directed at something else.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jun 2020 13:19:33 GMT</pubDate>
    <dc:creator>JaVa808</dc:creator>
    <dc:date>2020-06-11T13:19:33Z</dc:date>
    <item>
      <title>13029 Requested privilege level too high</title>
      <link>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4101530#M561140</link>
      <description>&lt;P&gt;I'm running ISE 2.7 and testing a read-only account to scan a network device (2960 switch) to do vulnerability scans.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ext Id Source is Active Directory and following TACACS setup below:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TACACS Command Set&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Permit All w/Permit any command that is not listed below&lt;/LI&gt;&lt;LI&gt;Read Only with PERMIT SHOW defined. Box is unchecked “Permit any command that is not listed below”&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;TACACS Profile&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Privilege 0 = default 0 and max is 0&lt;/LI&gt;&lt;LI&gt;Privilege 1 = default is 0 and max is 1&lt;/LI&gt;&lt;LI&gt;Privilege 7 = default is 0 and max is 7&lt;/LI&gt;&lt;LI&gt;Privilege 15 = default is 15 and max is 15&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Device Admin Policy Set&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Authentication&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Default - AD (external Identity source)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Authorization&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Device RW = Network-ReadWrite + Permit all &amp;nbsp;&amp;amp; Shell Privilege 15&lt;/LI&gt;&lt;LI&gt;Device RO = Network-ReadOnly + Read Only &amp;amp; Shell Privilege 0&lt;/LI&gt;&lt;LI&gt;Default – DENY ALL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;And when I drill down to the detailed information in TACACS Log it stops with 13209 Requested privilege level too high.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure what the next steps are if I need to change Shell Privilege on Authorization? or is this directed at something else.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 13:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4101530#M561140</guid>
      <dc:creator>JaVa808</dc:creator>
      <dc:date>2020-06-11T13:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: 13029 Requested privilege level too high</title>
      <link>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4101649#M561147</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/556218"&gt;@JaVa808&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Privilege means nothing when you have Command Authorization. Remove Privilege 0, and give Priv 15.&lt;/P&gt;
&lt;P&gt;You can verify that the user will not be able to run anything except the show command (that you allowed).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I personally do not recommend various privileges when all control is delivered through Command Authorization. The 'show' command is actually really tricky such that 'show clock' is priv 1 but 'show run' is priv 15. So, it's not a good approach.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try it out. If you have another use-case, we can discuss here.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 16:04:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4101649#M561147</guid>
      <dc:creator>Anurag Sharma</dc:creator>
      <dc:date>2020-06-11T16:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: 13029 Requested privilege level too high</title>
      <link>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4103525#M561235</link>
      <description>&lt;P&gt;Thanks Anurag for your reply.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in the policy - change it to Priv 15&lt;/P&gt;&lt;P&gt;then TACACS Command Set define the commands that the scanner needs to do a deep dive on?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I did stumble upon this read,&amp;nbsp;&lt;A href="https://www.ipbalance.com/security/why-tenable-nessus-requires-full-level-15-access-for-cisco-devices-dont-need-it/" target="_blank"&gt;https://www.ipbalance.com/security/why-tenable-nessus-requires-full-level-15-access-for-cisco-devices-dont-need-it/&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wonder if at this point i define all those or just give it Priv 15. probably the second for less work.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 16:24:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4103525#M561235</guid>
      <dc:creator>JaVa808</dc:creator>
      <dc:date>2020-06-15T16:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: 13029 Requested privilege level too high</title>
      <link>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4103578#M561240</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/556218"&gt;@JaVa808&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's (assigning priv 15 and restrictive command-set) not a "hack" (workaround). It's a legit method of doing things while maintaining access control.&lt;/P&gt;
&lt;P&gt;In the article you linked, they mentioned the following:&lt;/P&gt;
&lt;PRE&gt;If you have Cisco ACS (TACACS+) server, it would be easy to control permitted commands with the dedicated user account for the Nessus scanner.

If you don’t have Cisco ACS server, try the following way to achieve the goal.&lt;/PRE&gt;
&lt;P&gt;The method was simply assigning custom privileges to certain commands like 'show run'. There are many reasons why this method should not be adopted in the presence of a TACACS server. But the best one was the one that made you open the case &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 17:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/13029-requested-privilege-level-too-high/m-p/4103578#M561240</guid>
      <dc:creator>Anurag Sharma</dc:creator>
      <dc:date>2020-06-15T17:27:47Z</dc:date>
    </item>
  </channel>
</rss>

