<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TACACS command exception for device in ISE profile in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753671#M579193</link>
    <description>&lt;P&gt;Good stuf...thank you for the feedback and marked as solution...&lt;/P&gt;</description>
    <pubDate>Thu, 12 Jan 2023 14:02:29 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2023-01-12T14:02:29Z</dc:date>
    <item>
      <title>TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753173#M579180</link>
      <description>&lt;P&gt;We are usinf Cisco ISE as TACACS server and i need to allow some commands to work on our read only profile .&lt;/P&gt;
&lt;P&gt;Can you please let me know how can i give exception for command&amp;nbsp;show cable-diagnostics tdr int Gi1/0/14 through ISE.&lt;/P&gt;
&lt;P&gt;End user having read only access and cannot go to enable mode but need to check the outputs of this command.&lt;/P&gt;
&lt;P&gt;Can anyone suggest&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 20:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753173#M579180</guid>
      <dc:creator>rakesh nair</dc:creator>
      <dc:date>2023-01-11T20:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753193#M579181</link>
      <description>&lt;P&gt;May be you need to elevate user to a higher priv level and restricts the commands and allow any additional command required for the user :&lt;/P&gt;
&lt;P&gt;below example guide provide some steps and concept for your to try using test user.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200208-Configure-ISE-2-0-IOS-TACACS-Authentic.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200208-Configure-ISE-2-0-IOS-TACACS-Authentic.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 20:38:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753193#M579181</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-01-11T20:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753201#M579182</link>
      <description>&lt;P&gt;By default this is a Level15 command and I am not sure if we can change that. The following approach would work:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use Priv15 in the RO-Shell-Profile&lt;/LI&gt;
&lt;LI&gt;Use a Command set that only allows the needed commands&lt;/LI&gt;
&lt;LI&gt;Add Level15 command authorization to the switch config&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Perhaps someone suggests a different way to achieve this.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 20:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753201#M579182</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-01-11T20:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753491#M579188</link>
      <description>&lt;P&gt;Can you tell me how to perform these steps in ISE and switch&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Use Priv15 in the RO-Shell-Profile&lt;/LI&gt;
&lt;LI&gt;Use a Command set that only allows the needed commands&lt;/LI&gt;
&lt;LI&gt;Add Level15 command authorization to the switch config&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 12 Jan 2023 08:49:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753491#M579188</guid>
      <dc:creator>rakesh nair</dc:creator>
      <dc:date>2023-01-12T08:49:23Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753518#M579189</link>
      <description>&lt;P&gt;I think creating a new shell profile with privilege 15 may help, right&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 09:41:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753518#M579189</guid>
      <dc:creator>rakesh nair</dc:creator>
      <dc:date>2023-01-12T09:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753569#M579190</link>
      <description>&lt;P&gt;yes that what we suggested before....test with new user ..rather mess up with exiting users.&lt;/P&gt;
&lt;P&gt;if that works you can replicate for other user if needed more users same requirement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 11:18:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753569#M579190</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-01-12T11:18:45Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753574#M579191</link>
      <description>&lt;P&gt;please update us last status&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 11:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753574#M579191</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-12T11:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753608#M579192</link>
      <description>&lt;P&gt;I have created another user and gave him priv 15 &lt;SPAN&gt;shell profile&amp;nbsp;&lt;/SPAN&gt;with conf terminal deny and it worked&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 12:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753608#M579192</guid>
      <dc:creator>rakesh nair</dc:creator>
      <dc:date>2023-01-12T12:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: TACACS command exception for device in ISE profile</title>
      <link>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753671#M579193</link>
      <description>&lt;P&gt;Good stuf...thank you for the feedback and marked as solution...&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 14:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/tacacs-command-exception-for-device-in-ise-profile/m-p/4753671#M579193</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2023-01-12T14:02:29Z</dc:date>
    </item>
  </channel>
</rss>

