<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4192178#M564119</link>
    <description>&lt;P&gt;I couldn't get the TACACs client to login directly to TACP-15 but was able to get the account to access TACP-15 after login with TACP-0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The fix was to go into Cisco ISE&lt;/P&gt;&lt;P&gt;Work Centers&amp;gt; Device Administration&amp;gt; Policy Elements&amp;gt;Results&amp;gt;TACACS Profiles&amp;gt;&lt;/P&gt;&lt;P&gt;Create a TACACS Profile for GAIA_OS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under Common Tasks:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check "Maximum Privilege" and set to 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under custom Attributes:&lt;/P&gt;&lt;P&gt;Click add&lt;/P&gt;&lt;P&gt;Type= MANDATORY Name = CheckPoint-SuperUser-Access Value=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue was identified on ISE Operations&amp;gt; TACACS&amp;gt;Live logs and received error stating shell misconfigured for associated user thou the user was authenticated the user was not authorized due to shell TACAS policy being misconfigured. I hope it helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Dec 2020 16:20:13 GMT</pubDate>
    <dc:creator>Adam Peters</dc:creator>
    <dc:date>2020-12-02T16:20:13Z</dc:date>
    <item>
      <title>Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/3190223#M555508</link>
      <description>&lt;P&gt;&lt;FONT size="3"&gt;&lt;STRONG&gt;Configuration Done ON ISE&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Policy Elements::&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Device Administration&lt;/SPAN&gt;&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Tacacs+ Profiles&lt;/SPAN&gt;&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;CheckPoint&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;1.&amp;nbsp;&lt;STRONG&gt;General tab&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Name:&amp;nbsp;CheckPoint&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Description:&amp;nbsp;CheckPoint Firewall&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;2.&amp;nbsp;&lt;STRONG&gt;Custom Attibutes tab&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;EM&gt;Attribute/Requirement/Valu&lt;/EM&gt;e:&lt;/SPAN&gt;&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;CheckPoint-SuperUser-Access=1&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Mandatory&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;1&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;EM&gt;Attribute/Requirement/Value:&lt;/EM&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Checkpoint-User-Role=adminRole&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Mandatory&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;adminRole&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configuration on CheckPoint&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H4&gt;Configure Gaia OS&lt;/H4&gt;&lt;P&gt;To be able to login to Gaia OS with TACACS+ user, configure the role TACP-0, and for every privileged level "X" that will be used with&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;tacacs_enable&lt;/EM&gt;, define the rule TACP-"X".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;PRE&gt;HostName&amp;gt; &lt;STRONG&gt;add rba role TACP-0 domain-type System readwrite-features tacacs_enable&lt;/STRONG&gt;
&lt;/PRE&gt;Notes:&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;Use the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;enable&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;password configured on the ACS server.&lt;/LI&gt;&lt;LI&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;enable&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;password is valid for all privileged levels.&lt;/LI&gt;&lt;/UL&gt;&lt;PRE&gt;HostName&amp;gt; &lt;STRONG&gt;add rba role TACP-15 domain-type System all-features&lt;/STRONG&gt;
HostName&amp;gt; &lt;STRONG&gt;save config&lt;/STRONG&gt;
HostName&amp;gt; &lt;STRONG&gt;show configuration rba&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;PRE&gt;HostName&amp;gt; &lt;STRONG&gt;add aaa tacacs-servers priority 1 server &amp;lt;IP_ADDRESS_of_ACS_SERVER&amp;gt; key &amp;lt;KEY&amp;gt; timeout 3&lt;/STRONG&gt;
HostName&amp;gt; &lt;STRONG&gt;set aaa tacacs-servers state on&lt;/STRONG&gt;
HostName&amp;gt; &lt;STRONG&gt;set aaa tacacs-servers user-uid 0&lt;/STRONG&gt;
HostName&amp;gt; &lt;STRONG&gt;save config&lt;/STRONG&gt;
HostName&amp;gt; &lt;STRONG&gt;show configuration aaa&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I had done the above configuration I am able to authenticate but the user is not able to get Level 15 privilege.&lt;/P&gt;&lt;P&gt;I tried to find out documents related to this didn't find out anything on both side ie Cisco and CheckPoint. Please help me in regard to this. If anyone having any case study related to this kindly share with me.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/3190223#M555508</guid>
      <dc:creator>pankaj</dc:creator>
      <dc:date>2020-02-21T18:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/3332123#M555512</link>
      <description>&lt;P&gt;Has anyone been able to get TACACS to work with CheckPoint 80.11 and CISE 2.2?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Feb 2018 23:27:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/3332123#M555512</guid>
      <dc:creator>Louis Gonzales</dc:creator>
      <dc:date>2018-02-15T23:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/3335032#M555515</link>
      <description>&lt;P&gt;perhaps using this guide : &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101573" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101573&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;it states : "After login, you can use the Gaia Clish command '&lt;CODE&gt;&lt;STRONG&gt;tacacs_enable TACP-15&lt;/STRONG&gt;&lt;/CODE&gt;' to gain full privileges."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Didn't tried for now, feedback appreciated&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 12:35:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/3335032#M555515</guid>
      <dc:creator>Guillaume BARBEROT</dc:creator>
      <dc:date>2018-02-21T12:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/3873358#M555517</link>
      <description>&lt;P&gt;I was in GUI. Tried leverage the privilege by clicking the TACACS+ Enable command. I selected the TACP-15. But it shows authentication failed. On ISE, I am not able to see the authentication request coming in.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2019 19:56:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/3873358#M555517</guid>
      <dc:creator>Hua Pan</dc:creator>
      <dc:date>2019-06-14T19:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4058321#M559386</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;We have similar problem. We use ISE as a TACACS server and R80 GAIA as client.&lt;BR /&gt;We were able to get basic authentication working but no matter what is configured on ISE it always goes to TACP-0 mode.&lt;BR /&gt;So if you want expert you need to escalate to TACP-15 and from there to expert. For this purpose there is an "set aaa radius-servers default-shell /bin/bash" command not present for tacacs, which is ok, but event direct login to TACP-15 doesn't work.&lt;/P&gt;&lt;P&gt;On GAIA we have config similar to the above one.&lt;BR /&gt;On ISE we tried many combination with these attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;priv-lvl=15&lt;BR /&gt;CP-Gaia-SuperUser-Access = 1&lt;BR /&gt;CP-Gaia-User-Role =TACP-15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;priv-lvl=15&lt;BR /&gt;CheckPoint-SuperUser-Access=1&lt;BR /&gt;Checkpoint-User-Role=adminRole&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However we always get only TACP-0, and actually there is no authorization request, only authentication ones and none of the mentioned attributes is ever being sent to the GAIA. The only thing that is being sent is below in the authentication reply:&lt;BR /&gt;{Authen-Reply-Status=Pass; }&lt;/P&gt;&lt;P&gt;If anyone has made it work to login directly to TACP-15 or expert mode and share the setup on the CheckPoint and ISE side would be really appreciated.&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 03 Apr 2020 12:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4058321#M559386</guid>
      <dc:creator>MiroslavStefanov9752</dc:creator>
      <dc:date>2020-04-03T12:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4140092#M562466</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Were you able to get this working? We are running into the same issue&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 01:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4140092#M562466</guid>
      <dc:creator>adias1287</dc:creator>
      <dc:date>2020-08-24T01:45:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4147265#M562725</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;unfortunately not, which is quite disappointing. Not much to add here.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2020 11:01:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4147265#M562725</guid>
      <dc:creator>MiroslavStefanov9752</dc:creator>
      <dc:date>2020-09-07T11:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4192178#M564119</link>
      <description>&lt;P&gt;I couldn't get the TACACs client to login directly to TACP-15 but was able to get the account to access TACP-15 after login with TACP-0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The fix was to go into Cisco ISE&lt;/P&gt;&lt;P&gt;Work Centers&amp;gt; Device Administration&amp;gt; Policy Elements&amp;gt;Results&amp;gt;TACACS Profiles&amp;gt;&lt;/P&gt;&lt;P&gt;Create a TACACS Profile for GAIA_OS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under Common Tasks:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check "Maximum Privilege" and set to 15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under custom Attributes:&lt;/P&gt;&lt;P&gt;Click add&lt;/P&gt;&lt;P&gt;Type= MANDATORY Name = CheckPoint-SuperUser-Access Value=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue was identified on ISE Operations&amp;gt; TACACS&amp;gt;Live logs and received error stating shell misconfigured for associated user thou the user was authenticated the user was not authorized due to shell TACAS policy being misconfigured. I hope it helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Dec 2020 16:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4192178#M564119</guid>
      <dc:creator>Adam Peters</dc:creator>
      <dc:date>2020-12-02T16:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4597381#M574306</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to do it the same way you did, however, I'm always connected to TACP-0 first. Afterwards I have to enter my password to get to TACP-15.&lt;/P&gt;&lt;P&gt;If this has worked for you without the step through TACP-0, can you share your shell policy?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Christian&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 10:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4597381#M574306</guid>
      <dc:creator>cedelmann</dc:creator>
      <dc:date>2022-04-22T10:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4597935#M574313</link>
      <description>&lt;P&gt;Hi Christian,&lt;BR /&gt;&lt;BR /&gt;Can’t share the shell with you, company policy, but potentially you haven't created the RBA role yet and pointed to the ISE TACACS Server:&lt;BR /&gt;I would run through these steps:&lt;BR /&gt;Step 1: Login into Check Point Gaia Portal at &amp;lt;IP&amp;gt;&lt;BR /&gt;Step 2: Navigate to User Management &amp;gt; Authentication Servers&lt;BR /&gt;Step 3: Scroll down to “TACACS+ Servers and click “add”&lt;BR /&gt;Step 4: Fill in information&lt;BR /&gt;Note* Pre-share key needs to be the same on both the Checkpoint Firewall and ISE server&lt;BR /&gt;Step 5: Add Rule Based Access&lt;BR /&gt;(RBA) roles object by navigating to User Management &amp;gt; Roles&lt;BR /&gt;Step 6: Add RBA role TACP-0&lt;BR /&gt;Select features "Authentication Servers" and "TACACS_Enable" in drop down select Read/Write&lt;BR /&gt;Step 7: Add RBA role TACP-15 and configure as below:&lt;BR /&gt;Note* TACP-15 is highest level privilege, which will be mapped out in the ISE authorization policy for the GaiaOS.&lt;BR /&gt;Note* Select all 105 possible elements, all must be given Read write priv.&lt;BR /&gt;Step 8: In the TACP-15 RBA role select “Extended Commands” and click all options for all 45 commands&lt;BR /&gt;&lt;BR /&gt;Give this a shot and see if it fixes it.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;Adam&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2022 14:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4597935#M574313</guid>
      <dc:creator>Adam Peters</dc:creator>
      <dc:date>2022-04-22T14:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4600902#M574389</link>
      <description>&lt;P&gt;Hi Adam,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for the commands. Unfortunately it is still not working as expcted. I am able to login to TACP-0 and after that with privilege escallation to TACP-15. But the first step with TACP-0 is always needed, I have not made it directly to TACP-15.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which ISE and CheckPoint version are you using?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Christian&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2022 14:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4600902#M574389</guid>
      <dc:creator>cedelmann</dc:creator>
      <dc:date>2022-04-27T14:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4975767#M585653</link>
      <description>&lt;P&gt;We were running into same issue where ISE logs show user entered wrong password. This was fixed after users are added on Checkpoint Firewalls. We stopped sending parameters from ISE and defined user access on Checkpoints locally. Only authentication is being handled by ISE.&lt;BR /&gt;below is what we used under shell profile on ISE&lt;/P&gt;
&lt;P&gt;Maximum privilage level = 15&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;EM&gt;Attribute/Requirement/Valu&lt;/EM&gt;e:&lt;/SPAN&gt;&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;CheckPoint-SuperUser-Access=1&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Mandatory&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;1&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 12 Dec 2023 04:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/4975767#M585653</guid>
      <dc:creator>Sri Harsha Dasari</dc:creator>
      <dc:date>2023-12-12T04:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE Tacacs+ Authorization and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/5259156#M594902</link>
      <description>&lt;P&gt;On Gaia you need to specify RBA roles for different types of privileges. For example, if you want that the user automatically lands into full admin access then configure the following:&lt;/P&gt;
&lt;P&gt;add rba role &lt;U&gt;&lt;STRONG&gt;TACP-0&lt;/STRONG&gt; &lt;/U&gt;domain-type System &lt;U&gt;&lt;STRONG&gt;readwrite-features&lt;/STRONG&gt;&lt;/U&gt; tacacs_enable, cdt,certificate_authority,chassis,clock-date,cluster_ha,command,configuration,consent-flags,core-dump,cpnano-status,cron,dhcp,distribution,dns,domainname,dynamic-balancing,environment,expert,expert-authentication-method,expert-password,expert-password-hash,expert_api_Cluster,expert_api_Interfaces,expert_api_Messages,expert_api_Misc,expert_api_NTP,expert_api_aaa,expert_api_allowed-clients,expert_api_arp,expert_api_asset,expert_api_backup&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features expert_api_bgp,expert_api_bootp,expert_api_cluster,expert_api_cphaprob,expert_api_cpview,expert_api_cron,expert_api_dhcp6-config,expert_api_dhcp-server,expert_api_dhcpv6-server,expert_api_diagnostics,expert_api_dns,expert_api_dynamic_content,expert_api_expertPassword,expert_api_expertpassword,expert_api_extended-commands,expert_api_features,expert_api_files,expert_api_ftw,expert_api_global-params,expert_api_groups,expert_api_grubPassword&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features expert_api_grubpassword,expert_api_hostname,expert_api_igmp,expert_api_inbound-route-filter,expert_api_interface,expert_api_interfaces,expert_api_ioc-feeder,expert_api_ip_conflicts,expert_api_ipv6,expert_api_isis,expert_api_keyboard-layout,expert_api_license,expert_api_lightshots,expert_api_lightshots-partition,expert_api_lldp,expert_api_maestro,expert_api_messages,expert_api_misc,expert_api_mld,expert_api_nat-pool,expert_api_nfs,expert_api_ntp&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features expert_api_open-telemetry,expert_api_ospf,expert_api_passwordcontrols,expert_api_pim,expert_api_pim6,expert_api_provisioning,expert_api_proxy,expert_api_rba-roles,expert_api_route,expert_api_route-redistribution,expert_api_routemap,expert_api_router-id,expert_api_routes,expert_api_runScript,expert_api_runscript,expert_api_serial-number,expert_api_server-status,expert_api_show-connections,expert_api_show-connections-presets,expert_api_simulate_packet&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features expert_api_snapshot,expert_api_snmp,expert_api_ssh-server,expert_api_static-mroute,expert_api_syslog,expert_api_system,expert_api_users,expert_api_versions,expert_api_vsx,export,fcd,file,firewall_management,format,ftw,group,grub2-password,grub2-password-hash,host,host-access,hostname,hw-monitor,igmp,import,inactto,installer,installer_conf,interface,interface-name,ip-conflicts-monitor,iphelper,ipreachdetect,ipsec-routing,ipv6-state,isis,lcd,license&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features license_activation,lldp,location-led,lom,maestro,management_interface,mdps,message,mfc-static,mgmt-gui-clients,nat-pool,neighbor,netaccess,netflow,ntp,ospf,password-controls,pbr-combine-static,perf,pim,prefix,prod-maintain,proxy,raid-monitor,rba,rdisc,reboot_halt,rip,route,route-injection,route-options,routed-cluster,routemap,routing-event-trigger,sam,scheduled_backup,scratchpad,sdwan-status,securexl,security-gateway,selfpasswd,show-route-all&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features smart-console,smo,snapshot,snapshot_scheduled,snmp,spike-detective,ssh-client,ssl,ssm,ssmtp,static-mroute,static-route,sysconfig,sysenv,syslog,system,upgrade,user,users-access-log,version,virtual-system,vpnt,vrrp,vsx,web&lt;BR /&gt;add rba role scpRole domain-type System readonly-features expert&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;EM&gt;On the other hand, if you want to give access to all the features but with read-only access then you must do the following:&lt;/EM&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;add rba role &lt;U&gt;&lt;STRONG&gt;TACP-0 domain-type System readwrite&lt;/STRONG&gt;&lt;/U&gt;-features tacacs_enable&lt;BR /&gt;add rba role&lt;U&gt;&lt;STRONG&gt; TACP-0 domain-type System readonly&lt;/STRONG&gt;&lt;/U&gt;-features cdt,certificate_authority,chassis,clock-date,cluster_ha,command,configuration,consent-flags,core-dump,cpnano-status,cron,dhcp,distribution,dns,domainname,dynamic-balancing,environment,expert,expert-authentication-method,expert-password,expert-password-hash,expert_api_Cluster,expert_api_Interfaces,expert_api_Messages,expert_api_Misc,expert_api_NTP,expert_api_aaa,expert_api_allowed-clients,expert_api_arp,expert_api_asset,expert_api_backup&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features expert_api_bgp,expert_api_bootp,expert_api_cluster,expert_api_cphaprob,expert_api_cpview,expert_api_cron,expert_api_dhcp6-config,expert_api_dhcp-server,expert_api_dhcpv6-server,expert_api_diagnostics,expert_api_dns,expert_api_dynamic_content,expert_api_expertPassword,expert_api_expertpassword,expert_api_extended-commands,expert_api_features,expert_api_files,expert_api_ftw,expert_api_global-params,expert_api_groups,expert_api_grubPassword&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features expert_api_grubpassword,expert_api_hostname,expert_api_igmp,expert_api_inbound-route-filter,expert_api_interface,expert_api_interfaces,expert_api_ioc-feeder,expert_api_ip_conflicts,expert_api_ipv6,expert_api_isis,expert_api_keyboard-layout,expert_api_license,expert_api_lightshots,expert_api_lightshots-partition,expert_api_lldp,expert_api_maestro,expert_api_messages,expert_api_misc,expert_api_mld,expert_api_nat-pool,expert_api_nfs,expert_api_ntp&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features expert_api_open-telemetry,expert_api_ospf,expert_api_passwordcontrols,expert_api_pim,expert_api_pim6,expert_api_provisioning,expert_api_proxy,expert_api_rba-roles,expert_api_route,expert_api_route-redistribution,expert_api_routemap,expert_api_router-id,expert_api_routes,expert_api_runScript,expert_api_runscript,expert_api_serial-number,expert_api_server-status,expert_api_show-connections,expert_api_show-connections-presets,expert_api_simulate_packet&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features expert_api_snapshot,expert_api_snmp,expert_api_ssh-server,expert_api_static-mroute,expert_api_syslog,expert_api_system,expert_api_users,expert_api_versions,expert_api_vsx,export,fcd,file,firewall_management,format,ftw,group,grub2-password,grub2-password-hash,host,host-access,hostname,hw-monitor,igmp,import,inactto,installer,installer_conf,interface,interface-name,ip-conflicts-monitor,iphelper,ipreachdetect,ipsec-routing,ipv6-state,isis,lcd,license&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features license_activation,lldp,location-led,lom,maestro,management_interface,mdps,message,mfc-static,mgmt-gui-clients,nat-pool,neighbor,netaccess,netflow,ntp,ospf,password-controls,pbr-combine-static,perf,pim,prefix,prod-maintain,proxy,raid-monitor,rba,rdisc,reboot_halt,rip,route,route-injection,route-options,routed-cluster,routemap,routing-event-trigger,sam,scheduled_backup,scratchpad,sdwan-status,securexl,security-gateway,selfpasswd,show-route-all&lt;BR /&gt;add rba role TACP-0 domain-type System readonly-features smart-console,smo,snapshot,snapshot_scheduled,snmp,spike-detective,ssh-client,ssl,ssm,ssmtp,static-mroute,static-route,sysconfig,sysenv,syslog,system,upgrade,user,users-access-log,version,virtual-system,vpnt,vrrp,vsx,web&lt;/P&gt;
&lt;P&gt;You can optionally add access to expert commands as well. The most intuitive way to configure all of this above including access to expert commands is from Gaia web GUI.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Igor&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 15:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-authorization-and-checkpoint-firewall/m-p/5259156#M594902</guid>
      <dc:creator>igor.mamuzic</dc:creator>
      <dc:date>2025-02-11T15:01:12Z</dc:date>
    </item>
  </channel>
</rss>

