<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: cisco ise 2.3   command set &amp;amp; shell profile can work together? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4539704#M572424</link>
    <description>&lt;P&gt;Thanks for the clarification. It was not clear that you were trying to enable command authorization on a Cisco switch.&lt;/P&gt;
&lt;P&gt;It sounds like you may not have the switch configured correctly for command authorization. I would suggest reviewing your ISE and switch configurations against the examples in the &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-759088769" target="_blank" rel="noopener"&gt;Device Admin Prescriptive Deployment Guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;If it is still not working, the community would need more information to help including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hardware/Software version of the switch&lt;/LI&gt;
&lt;LI&gt;Switch configuration related to AAA, TACACS+, and VTY lines&lt;/LI&gt;
&lt;LI&gt;Screenshots of Device Admin AuthC/AuthZ policy conditions&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If the issue is urgent, please open a TAC case to investigate the issue in more detail.&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jan 2022 21:56:59 GMT</pubDate>
    <dc:creator>Greg Gibbs</dc:creator>
    <dc:date>2022-01-26T21:56:59Z</dc:date>
    <item>
      <title>cisco ise 2.3   command set &amp; shell profile can work together?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4537107#M572378</link>
      <description>&lt;P&gt;Hi friends, I created a new user going through the TUFFIN system in ISE with privilege of 3, in addition I limited the user to specific commands through the COMMAND SET.&lt;BR /&gt;But it does not work, when I check in the logs&amp;nbsp; I see that the request goes to SHELL PROFILE but does not go to MATCHED COMMAND SET.&lt;/P&gt;&lt;P&gt;command set &amp;amp; shell profile can work together?&lt;BR /&gt;In ISE 2.3.&lt;/P&gt;&lt;P&gt;Thank&amp;nbsp;&lt;/P&gt;&lt;P&gt;Shlomo Yitzhak&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 17:54:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4537107#M572378</guid>
      <dc:creator>shlomoi</dc:creator>
      <dc:date>2022-01-24T17:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ise 2.3   command set &amp; shell profile can work together?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4537514#M572383</link>
      <description>&lt;P&gt;Yes, ISE TACACS+ Authorization Policies can use a combination of Shell Profile and Command Sets. You can see an example of this for Cisco IOS Switches/Routers in the &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId--1348517127" target="_blank" rel="noopener"&gt;Device Administration Prescriptive Deployment Guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;The system or network device using ISE, however, must support TACACS+ Command Authorization. Doing a Google search, I could only find external &lt;STRONG&gt;Authentication&lt;/STRONG&gt; for Tufin. You will need to confirm if Tufin supports external Authorization or if you need to configure local Authorization in Tufin based on the privilege level returned by the Shell Profile.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 22:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4537514#M572383</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-01-24T22:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ise 2.3   command set &amp; shell profile can work together?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4537862#M572390</link>
      <description>&lt;P&gt;Hi Greg really thanks for the help.&lt;BR /&gt;I have set up a local user for TUFFIN with 3 privileges, but I want to allow TUFFIN to access only 5 commands.&lt;BR /&gt;show clock&lt;BR /&gt;show version&lt;BR /&gt;show access-lists&lt;BR /&gt;show ip route&lt;BR /&gt;show ip interface&lt;BR /&gt;And block everything else.&lt;BR /&gt;I have set in COMMAND SET the policy with the commands I want to enable but I see&amp;nbsp; (image attached) that the request goes to SHELL PROFILE but does not go to COMMAND SET. There may be a bug in the version ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ise_2.3.PNG" style="width: 766px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/142077iCDF085A3F21002F0/image-size/large?v=v2&amp;amp;px=999" role="button" title="ise_2.3.PNG" alt="ise_2.3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 08:19:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4537862#M572390</guid>
      <dc:creator>shlomoi</dc:creator>
      <dc:date>2022-01-25T08:19:47Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ise 2.3   command set &amp; shell profile can work together?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4538741#M572404</link>
      <description>&lt;P&gt;As I said in my earlier post, the system or network device (i.e. TACACS+ client) using ISE must support TACACS+ Command Authorization.&lt;/P&gt;
&lt;P&gt;TACACS+ is essentially a suite of protocols and uses separate mechanisms for Authentication, Authorization, and Account. Just because a client supports external TACACS+ &lt;STRONG&gt;Authentication&lt;/STRONG&gt;, does not mean it supports external TACACS+ &lt;STRONG&gt;Authorization&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;From the &lt;A href="https://datatracker.ietf.org/doc/html/rfc8907" target="_blank" rel="noopener"&gt;RFC 8907&lt;/A&gt; standard for TACACS+:&lt;/P&gt;
&lt;P&gt;"In command-based authorization, the &lt;STRONG&gt;client&lt;/STRONG&gt; requests that the server determine whether a command is allowed by making an authorization request for each command. The "cmd" argument will have the command name as its value."&lt;/P&gt;
&lt;P&gt;As this communication is initiated by the &lt;STRONG&gt;client&lt;/STRONG&gt; (Tufin, in this case), you need to verify that Tufin supports this external command authorization. You could also try to capture traffic from Tufin to confirm if you see the Authorization request being initiated.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jan 2022 22:17:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4538741#M572404</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-01-25T22:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ise 2.3   command set &amp; shell profile can work together?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4539176#M572417</link>
      <description>&lt;P&gt;Hi Greg Thanks for the help.&lt;/P&gt;&lt;P&gt;I do not know the ISE so well and probably did not explain myself so well . TUFFIN asked me to make a user for it so they could access my Cisco switches and see&amp;nbsp; a number of RUN commands. I'm not interested in connecting the TUFFIN to ISE. All they asked for was a local user on the ISE with privilege&amp;nbsp; 3, and this user was limited to only 5 commands. I set up a user on the ISE with privilege 3 and limited through the COMMAND SET the SHOW commands I want.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All I need is a local user on the ISE with privilege 3&amp;nbsp; so that TUFFIN can access my Cisco switches and see 5&amp;nbsp; SHOW commands. Because privilege 3 allow more RUN commands that I do not want the TUFFIN to see so I try to restrict it via the COMMAND SET and it does not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks shlomo itzhak&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 10:50:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4539176#M572417</guid>
      <dc:creator>shlomoi</dc:creator>
      <dc:date>2022-01-26T10:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: cisco ise 2.3   command set &amp; shell profile can work together?</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4539704#M572424</link>
      <description>&lt;P&gt;Thanks for the clarification. It was not clear that you were trying to enable command authorization on a Cisco switch.&lt;/P&gt;
&lt;P&gt;It sounds like you may not have the switch configured correctly for command authorization. I would suggest reviewing your ISE and switch configurations against the examples in the &lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-device-administration-prescriptive-deployment-guide/ta-p/3738365#toc-hId-759088769" target="_blank" rel="noopener"&gt;Device Admin Prescriptive Deployment Guide&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;If it is still not working, the community would need more information to help including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Hardware/Software version of the switch&lt;/LI&gt;
&lt;LI&gt;Switch configuration related to AAA, TACACS+, and VTY lines&lt;/LI&gt;
&lt;LI&gt;Screenshots of Device Admin AuthC/AuthZ policy conditions&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If the issue is urgent, please open a TAC case to investigate the issue in more detail.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jan 2022 21:56:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-2-3-command-set-amp-shell-profile-can-work-together/m-p/4539704#M572424</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-01-26T21:56:59Z</dc:date>
    </item>
  </channel>
</rss>

