<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using TACACS+ / RAIDUS for ISE CLI login in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4618982#M575006</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1171789"&gt;@SMD28316&lt;/a&gt;&amp;nbsp; - RADIUS is a valid option for Device Admin in my opinion, if you don't need all that fancy command auth and command accounting that TACACS+ offers. It works great.&lt;/P&gt;
&lt;P&gt;Use the following RADIUS Authentication logic (notice the RADIUS Attributes used in each case)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE RADIUS DEVICE ADMIN.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/152139iB42ED39FE0D7C71F/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE RADIUS DEVICE ADMIN.PNG" alt="ISE RADIUS DEVICE ADMIN.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for the results, you return the usual priv level 15 (or whatever you need) in the Cisco AV Pair - might have to google that - I don't have a copy of what I used back in the day&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 27 May 2022 05:41:16 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2022-05-27T05:41:16Z</dc:date>
    <item>
      <title>Using TACACS+ / RAIDUS for ISE CLI login</title>
      <link>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4618554#M574982</link>
      <description>&lt;P&gt;So on the ISE CLI I found the option to enable TACACS+:&lt;/P&gt;&lt;P&gt;ise/admin(config)# aaa authentication tacacs+ server ?&lt;BR /&gt;&amp;lt;WORD&amp;gt; Server ip or hostname (Max Size - 31)&lt;/P&gt;&lt;P&gt;ise/admin(config)# aaa authentication tacacs+ server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can I use TACACS+ for CLI login? I didn't find a useful document for this commnad, also can I use RADIUS instead? if not I would like to know if there are plans to enable it in the future,&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 12:21:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4618554#M574982</guid>
      <dc:creator>SMD28316</dc:creator>
      <dc:date>2022-05-26T12:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: Using TACACS+ / RAIDUS for ISE CLI login</title>
      <link>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4618719#M574987</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1171789"&gt;@SMD28316&lt;/a&gt;&amp;nbsp; since ISE 2.6 version,&amp;nbsp; the CLI Access to ISE by External Identity Store is added.&lt;/P&gt;
&lt;P class="p"&gt;ISE supports authentication of CLI administrators by external identity sources, such as Active Directory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/release_notes/b_ise_26_RN.html#id_97053" target="_self"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/release_notes/b_ise_26_RN.html#id_97053&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is better to use TACACS to control CLI access rather than RADIUS. This is because simply RADIUS does not separate authentication and authorization while TACACS does, in other words RADIUS cannot manage per command CLI authorization.&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 16:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4618719#M574987</guid>
      <dc:creator>Meddane</dc:creator>
      <dc:date>2022-05-26T16:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: Using TACACS+ / RAIDUS for ISE CLI login</title>
      <link>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4618982#M575006</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1171789"&gt;@SMD28316&lt;/a&gt;&amp;nbsp; - RADIUS is a valid option for Device Admin in my opinion, if you don't need all that fancy command auth and command accounting that TACACS+ offers. It works great.&lt;/P&gt;
&lt;P&gt;Use the following RADIUS Authentication logic (notice the RADIUS Attributes used in each case)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ISE RADIUS DEVICE ADMIN.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/152139iB42ED39FE0D7C71F/image-size/large?v=v2&amp;amp;px=999" role="button" title="ISE RADIUS DEVICE ADMIN.PNG" alt="ISE RADIUS DEVICE ADMIN.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for the results, you return the usual priv level 15 (or whatever you need) in the Cisco AV Pair - might have to google that - I don't have a copy of what I used back in the day&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 05:41:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4618982#M575006</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-05-27T05:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using TACACS+ / RAIDUS for ISE CLI login</title>
      <link>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4619082#M575013</link>
      <description>&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes I understand this, but can I use RADIUS for ISE CLI authentication? it doesn't seem available for now.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 07:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4619082#M575013</guid>
      <dc:creator>SMD28316</dc:creator>
      <dc:date>2022-05-27T07:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using TACACS+ / RAIDUS for ISE CLI login</title>
      <link>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4619234#M575024</link>
      <description>&lt;P&gt;That is correct.&amp;nbsp; Local CLI admin user or Active Directory only.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 12:25:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/using-tacacs-raidus-for-ise-cli-login/m-p/4619234#M575024</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2022-05-27T12:25:32Z</dc:date>
    </item>
  </channel>
</rss>

