<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS+ server config file example in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167094#M563321</link>
    <description>&lt;P&gt;On your TACACS server you need to define the shell profiles for each privilege level, and associate them with the respective privilege levels. On the network device side, the most relevant commands for authorization would be:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TACACS&lt;BR /&gt;&amp;nbsp;server &amp;lt;TACACS primary IP&amp;gt;&lt;BR /&gt;&amp;nbsp;server &amp;lt;TACACS secondary IP&amp;gt;&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group TACACS local&lt;BR /&gt;aaa authorization commands 0 default group TACACS local&lt;BR /&gt;aaa authorization commands 1 default group TACACS local&lt;BR /&gt;aaa authorization commands 5 default group TACACS local&lt;BR /&gt;aaa authorization commands 15 default group TACACS local&lt;/P&gt;</description>
    <pubDate>Wed, 14 Oct 2020 22:31:48 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2020-10-14T22:31:48Z</dc:date>
    <item>
      <title>TACACS+ server config file example</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167023#M563317</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone share few example files of tacacs+ server?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we configure the tacacs server to allocate privilege level (5-7) with option of allowing few configuration parameters under the interface? For example privilege level 5 user should be able to run all show, clear, show tech commands and they should have authorization to shutdown and no shutdown capabilities along with duplex change. Wondering what would tacacs+ server config file would look like?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't want to give user privilege level of 15 to have full configuration control.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 20:33:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167023#M563317</guid>
      <dc:creator>devang_etcom</dc:creator>
      <dc:date>2020-10-14T20:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ server config file example</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167045#M563318</link>
      <description>&lt;P&gt;Are you using ISE as your TACACS server?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 21:15:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167045#M563318</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-14T21:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ server config file example</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167055#M563319</link>
      <description>&lt;P&gt;no its different TACACS+ server/software.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 21:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167055#M563319</guid>
      <dc:creator>devang_etcom</dc:creator>
      <dc:date>2020-10-14T21:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ server config file example</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167067#M563320</link>
      <description>&lt;P&gt;Look at the below example : ( add your own commands, if you doing local, you need to do hard work to all commands)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13860-PRIV.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/13860-PRIV.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 21:40:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167067#M563320</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-10-14T21:40:52Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ server config file example</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167094#M563321</link>
      <description>&lt;P&gt;On your TACACS server you need to define the shell profiles for each privilege level, and associate them with the respective privilege levels. On the network device side, the most relevant commands for authorization would be:&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa group server tacacs+ TACACS&lt;BR /&gt;&amp;nbsp;server &amp;lt;TACACS primary IP&amp;gt;&lt;BR /&gt;&amp;nbsp;server &amp;lt;TACACS secondary IP&amp;gt;&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;BR /&gt;aaa authorization exec default group TACACS local&lt;BR /&gt;aaa authorization commands 0 default group TACACS local&lt;BR /&gt;aaa authorization commands 1 default group TACACS local&lt;BR /&gt;aaa authorization commands 5 default group TACACS local&lt;BR /&gt;aaa authorization commands 15 default group TACACS local&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2020 22:31:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4167094#M563321</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-14T22:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ server config file example</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4177085#M563599</link>
      <description>&lt;P&gt;I wasn't looking for router/sw config!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 00:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4177085#M563599</guid>
      <dc:creator>devang_etcom</dc:creator>
      <dc:date>2020-11-02T00:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ server config file example</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4177086#M563600</link>
      <description>&lt;P&gt;I found not exact but close by on one of the older cisco external community email discussion.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Nov 2020 00:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4177086#M563600</guid>
      <dc:creator>devang_etcom</dc:creator>
      <dc:date>2020-11-02T00:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS+ server config file example</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4180423#M563674</link>
      <description>&lt;P&gt;There are MANY examples of TACACS configuration at &lt;A href="https://community.cisco.com/t5/security-documents/ise-device-administration-tacacs/ta-p/3621655" target="_self"&gt;ISE Device Administration resources for TACACS+ and RADIUS&lt;/A&gt; with both documents and videos.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Nov 2020 05:26:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-server-config-file-example/m-p/4180423#M563674</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-11-08T05:26:16Z</dc:date>
    </item>
  </channel>
</rss>

