<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Device Admin with RO and RW Command Sets in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/device-admin-with-ro-and-rw-command-sets/m-p/4455639#M569296</link>
    <description>&lt;P&gt;This depends entirely on the device you're trying to manage, but most devices require a TACACS Profile of some sort to specify the basic privileges of the admin logging in.&lt;/P&gt;
&lt;P&gt;See the &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365" target="_blank" rel="noopener"&gt;Cisco ISE Device Administration Prescriptive Deployment Guide&lt;/A&gt; for more info and examples.&lt;/P&gt;</description>
    <pubDate>Thu, 26 Aug 2021 22:53:36 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2021-08-26T22:53:36Z</dc:date>
    <item>
      <title>Device Admin with RO and RW Command Sets</title>
      <link>https://community.cisco.com/t5/network-access-control/device-admin-with-ro-and-rw-command-sets/m-p/4455433#M569280</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I am creating a policy for device admin purposes. I would like to check if it is mandatory to create a shell profile and associate it to the policy or command sets alone will do? I just want to have a read-write, read-only, and custom command sets in my device admin policy.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 26 Aug 2021 15:22:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-admin-with-ro-and-rw-command-sets/m-p/4455433#M569280</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2021-08-26T15:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Device Admin with RO and RW Command Sets</title>
      <link>https://community.cisco.com/t5/network-access-control/device-admin-with-ro-and-rw-command-sets/m-p/4455639#M569296</link>
      <description>&lt;P&gt;This depends entirely on the device you're trying to manage, but most devices require a TACACS Profile of some sort to specify the basic privileges of the admin logging in.&lt;/P&gt;
&lt;P&gt;See the &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365" target="_blank" rel="noopener"&gt;Cisco ISE Device Administration Prescriptive Deployment Guide&lt;/A&gt; for more info and examples.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Aug 2021 22:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-admin-with-ro-and-rw-command-sets/m-p/4455639#M569296</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2021-08-26T22:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Device Admin with RO and RW Command Sets</title>
      <link>https://community.cisco.com/t5/network-access-control/device-admin-with-ro-and-rw-command-sets/m-p/4455664#M569299</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/303946"&gt;@fatalXerror&lt;/a&gt;&amp;nbsp; - command sets apply for Authorization (aaa authorization ....) whereas the shell profile sets the priv level. You can set a priv level to level 15, and then restrict commands. Likewise, set level to 7 and restrict commands. But you have to tell the IOS which level the EXEC is authorized to after authentication.&lt;/P&gt;
&lt;P&gt;I always wondered what Read-Only means in the context of IOS. On the AireOS WLC there was a category called MONITOR - it means you can see everything but you can't add/edit/delete. So for IOS I assume you would say, allow level 15 and then deny the commands like "conf*" and "relo*"&lt;/P&gt;
&lt;P&gt;Remember that commands use wildcards (* and ?) whereas arguments use regular expression syntax (e.g. ^[1234]. etc.)&lt;/P&gt;</description>
      <pubDate>Fri, 27 Aug 2021 00:31:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/device-admin-with-ro-and-rw-command-sets/m-p/4455664#M569299</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2021-08-27T00:31:22Z</dc:date>
    </item>
  </channel>
</rss>

