<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Device Admin for Non-Cisco Devices in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4460943#M569568</link>
    <description>&lt;P&gt;I have no experience with FortiGate, however, for Palo Alto you can define the Admin Roles as you with, and then you just reference their names on ISE TACACS Profiles custom attributes. For example, if you created two Admin Roles, one you called it RW-Admins, and another RO-Admins, then from ISE TACACS Profiles custom attributes, you can reference those two by creating two TACACS profiles, one for the RW and another for the RO. In both profiles you will use the MANDATORY Type, the VSA, in this case will be PaloAlto-Admin-Role and/or PaloAlto-Panorama-Admin-Role, and the value. The value is the Admin Roles Profiles you created, in this case would be RW-Admins and RO-Admins.&lt;/P&gt;
&lt;P&gt;To restrict the CLI accesses, you will have a tab called Command Line in the Admin Role Profile. When you go there you can select one of the supported options:&lt;/P&gt;
&lt;P&gt;None: No CLI access at all, this is the default I think.&lt;/P&gt;
&lt;P&gt;superuser: Full access.&lt;/P&gt;
&lt;P&gt;superreader: Read only access.&lt;/P&gt;
&lt;P&gt;deviceadmin: Full access to all firewall settings with the exception for creating new accounts or vsys which are only allowed by a super users.&lt;/P&gt;
&lt;P&gt;devicereader: Read only access to all the firewall settings except for the password profiles and the other admin accounts.&lt;/P&gt;
&lt;P&gt;For Panorama it is very similar to the firewalls, however, Panorama wouldn't have the deviceadmin and the devicereader roles as those are more related to the firewalls. Panorama has also a role called panorama-admin which is very similar to the superuser role with the exception for creating, editing or deleting the Panorama admins and some restrictions when it comes to push and export configs.&lt;/P&gt;
&lt;P&gt;You should also set the Admin Role Profile to read only for the UI, you can do that from the main tab which is called Web UI. Some of the menus won't support read only, in that case you can just suppress them if you want.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Sep 2021 10:11:13 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2021-09-07T10:11:13Z</dc:date>
    <item>
      <title>ISE Device Admin for Non-Cisco Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4458735#M569412</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I was able to integrate my FortiGate and Palo Alto firewalls to my ISE TACACS and it is working with the GUI. I would like to ask, if it possible also to restrict CLI commands using the command sets for the FortiGate and PA firewalls?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 10:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4458735#M569412</guid>
      <dc:creator>fatalXerror</dc:creator>
      <dc:date>2021-09-02T10:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Device Admin for Non-Cisco Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4458772#M569414</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/303946"&gt;@fatalXerror&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;worth the shot to check the following link:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&amp;amp;lang=en_US%E2%80%A9" target="_blank" rel="noopener"&gt;How to configure TACACS authentication against Cisco ISE&lt;/A&gt;.&lt;/P&gt;&lt;P class="lia-align-justify"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-align-justify"&gt;Hope this helps !!!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 11:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4458772#M569414</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2021-09-02T11:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Device Admin for Non-Cisco Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4458852#M569415</link>
      <description>&lt;P&gt;It's going to depend on the other device. Either command accounting, or limiting the user via av-pair or the like back to the device. We limit F5 that way, but it's done on the F5, not bi ISE other than the user level sent back.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Sep 2021 14:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4458852#M569415</guid>
      <dc:creator>Dustin Anderson</dc:creator>
      <dc:date>2021-09-02T14:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Device Admin for Non-Cisco Devices</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4460943#M569568</link>
      <description>&lt;P&gt;I have no experience with FortiGate, however, for Palo Alto you can define the Admin Roles as you with, and then you just reference their names on ISE TACACS Profiles custom attributes. For example, if you created two Admin Roles, one you called it RW-Admins, and another RO-Admins, then from ISE TACACS Profiles custom attributes, you can reference those two by creating two TACACS profiles, one for the RW and another for the RO. In both profiles you will use the MANDATORY Type, the VSA, in this case will be PaloAlto-Admin-Role and/or PaloAlto-Panorama-Admin-Role, and the value. The value is the Admin Roles Profiles you created, in this case would be RW-Admins and RO-Admins.&lt;/P&gt;
&lt;P&gt;To restrict the CLI accesses, you will have a tab called Command Line in the Admin Role Profile. When you go there you can select one of the supported options:&lt;/P&gt;
&lt;P&gt;None: No CLI access at all, this is the default I think.&lt;/P&gt;
&lt;P&gt;superuser: Full access.&lt;/P&gt;
&lt;P&gt;superreader: Read only access.&lt;/P&gt;
&lt;P&gt;deviceadmin: Full access to all firewall settings with the exception for creating new accounts or vsys which are only allowed by a super users.&lt;/P&gt;
&lt;P&gt;devicereader: Read only access to all the firewall settings except for the password profiles and the other admin accounts.&lt;/P&gt;
&lt;P&gt;For Panorama it is very similar to the firewalls, however, Panorama wouldn't have the deviceadmin and the devicereader roles as those are more related to the firewalls. Panorama has also a role called panorama-admin which is very similar to the superuser role with the exception for creating, editing or deleting the Panorama admins and some restrictions when it comes to push and export configs.&lt;/P&gt;
&lt;P&gt;You should also set the Admin Role Profile to read only for the UI, you can do that from the main tab which is called Web UI. Some of the menus won't support read only, in that case you can just suppress them if you want.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 10:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-device-admin-for-non-cisco-devices/m-p/4460943#M569568</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2021-09-07T10:11:13Z</dc:date>
    </item>
  </channel>
</rss>

