<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Service arguments value when ISE 3rd party equipment tacacs are se in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998988#M586454</link>
    <description>&lt;P&gt;I think it's useful to not only provide the Service-Arguments, but also some example values. It's tricky though, due to the RBAC nature of this - each role needs to have its own specific value.&lt;/P&gt;
&lt;P&gt;I'll list here what I know from my customers (the list is not exhaustive but it's a good starting point) - the values shown in the courier font box is the Raw Shell data that I put into an ISE TACACS Profile. Note that the "=" sign denotes that an attribute is MANDATORY. If an attribute were OPTIONAL, then the '*' character is used instead.:&lt;/P&gt;
&lt;H1&gt;F5&lt;/H1&gt;
&lt;H2&gt;Big-IP LTM Admin Role&lt;/H2&gt;
&lt;LI-CODE lang="markup"&gt;F5-LTM-User-Info-1=ADMIN_ROLE
F5-LTM-User-Console=1
F5-LTM-User-Role=0
F5-LTM-User-Partition=all&lt;/LI-CODE&gt;
&lt;H2&gt;Big-IQ Admin Role&lt;/H2&gt;
&lt;LI-CODE lang="markup"&gt;F5-BIGIQ-User-Info-01=bigiq-admin&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Fortigate&lt;/H1&gt;
&lt;LI-CODE lang="markup"&gt;admin_prof=super_admin
memberof=Fortinet_Admins&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Riverbed&lt;/H1&gt;
&lt;H2&gt;SteelHead/SteelFusion/SteelCentral&lt;/H2&gt;
&lt;LI-CODE lang="markup"&gt;riverbed-roles-list=System Administrator
service=system&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jan 2024 23:58:35 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-01-17T23:58:35Z</dc:date>
    <item>
      <title>Service arguments value when ISE 3rd party equipment tacacs are set</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4996561#M586343</link>
      <description>&lt;P&gt;When setting up third-party equipment tacacs in ise&lt;BR /&gt;If you look at the live log details, different service arguments are imported from vendor to vendor, such as cisco is shell and juniper is junos-exec.&lt;/P&gt;
&lt;P&gt;Does anyone have any knowledge of Cisco-provided documents or personal knowledge of other third-party equipment (Alcatel) service devices?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jan 2024 06:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4996561#M586343</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-15T06:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4997914#M586387</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1430508"&gt;@CCC3&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is a common issue I also face from time to time. I recently had to implement TACACS+ on a bunch of Riverbed equipment and I have never logged into one or knew what the various device types were used for.&lt;/P&gt;
&lt;P&gt;Solution: I used various search engines queries to drill into vendor documentation (mostly insufficient information there) and then picked up little bits of info in community chat forums (not only Cisco's). To find a needle in a haystack, I often used the terms TACACS and avpair in the same query.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alcatel documentation should be pretty decent though (at least from my experience of their Omnivista and OXE PBX RADIUS stuff). Try asking the vendor for some documentation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 20:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4997914#M586387</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-16T20:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998048#M586396</link>
      <description>&lt;P&gt;Thank you for your answer.&lt;/P&gt;
&lt;P&gt;My client company uses equipment from various vendors.&lt;/P&gt;
&lt;P&gt;So, when writing the tacacs policy, we will divide it by the service arguments value by vendor.&lt;/P&gt;
&lt;P&gt;As a result, cisco is shell&lt;BR /&gt;Juniper confirmed that it comes out as junos-exec&lt;/P&gt;
&lt;P&gt;It's hard to see how other vendors' equipment comes out.&lt;BR /&gt;(Altheon, F5, etc.)&lt;/P&gt;
&lt;P&gt;I needed to check if anyone had a cisco document or knew about it.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 02:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998048#M586396</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-17T02:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998061#M586399</link>
      <description>&lt;P&gt;One great place to start is &lt;A href="https://cs.co/ise-guides" target="_blank" rel="noopener"&gt;https://cs.co/ise-guides&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt;&amp;nbsp;&amp;nbsp;maintains this list and in this case there isn't a nice hash-tag short cut for what you're looking for. But. If you open that link and then search the page (cmd/ctrl-F) and search for keyword tacacs, you will find a few page hits on how to do TACACS+ on certain 3rd party devices. Your mileage may vary - e.g.&lt;/P&gt;
&lt;P&gt;Juniper -&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200890-Configure-and-Troubleshoot-External-TACA.html" target="_blank" rel="noopener"&gt;Configure and Troubleshoot External TACACS Servers on ISE - Cisco&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;However, Thomas, I noticed that this link under the #Juniper section takes you to a generic TACACS article - it's probably a mistake?&lt;/P&gt;
&lt;P&gt;It would be cool though to keep adding 3rd party vendor links in here on how their little nuances regarding RADIUS and TACACS+&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 03:33:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998061#M586399</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-17T03:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998072#M586401</link>
      <description>&lt;P&gt;It's a really cool site.&lt;/P&gt;
&lt;P&gt;However, I can't find any information about service instruments.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 04:31:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998072#M586401</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-17T04:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998094#M586403</link>
      <description>&lt;P&gt;What is "service instruments" ?&lt;/P&gt;
&lt;P&gt;When asking a question on this community forum you must give us useful details to help us to help you.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Each vendor can have multiple products that all behave slightly differently with TACACS+ - e.g. Alcatel is a classic case of a massive vendor with many different products. You need to tell us what the product is called, and what version of code etc.&amp;nbsp; The next thing is then to do a bunch of google searches - I can give it a stab if you give me some useful breadcrumbs to work off ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 06:00:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998094#M586403</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-17T06:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998103#M586404</link>
      <description>&lt;P&gt;Service instruments are incorrect in translation&lt;BR /&gt;It is officially service-argument. If you successfully authenticate tacacs and look at the details of the live log, the service-argument will appear as in the attached picture.&lt;BR /&gt;It has not been confirmed whether this has a unique value for each vendor&lt;BR /&gt;When we tested the cisco and juniper equipment&lt;BR /&gt;cisco는 shell&lt;BR /&gt;The juniper has a value of junos-exec.&lt;/P&gt;
&lt;P&gt;You need to verify that this value has a unique value for each vendor.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 06:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998103#M586404</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-17T06:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998523#M586416</link>
      <description>&lt;P&gt;This is a great suggestion! I am happy to create a list of TACACS+ Service-Arguments for various vendors! I will add it to our existing &lt;SPAN class="lia-message-read"&gt;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/security-knowledge-base/ise-device-administration-attributes/ta-p/3630165" target="_blank"&gt;ISE Device Administration Attributes&lt;/A&gt; document since it lists the many variables and now I can add these as values. I will also mention Service-Argument in&lt;/SPAN&gt;&lt;LI-MESSAGE title="Cisco ISE Device Administration Prescriptive Deployment Guide" uid="3738365" url="https://community.cisco.com/t5/security-knowledge-base/cisco-ise-device-administration-prescriptive-deployment-guide/m-p/3738365#U3738365" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt; since that is the most comprehensive guide we have for TACACS+ and reference the list in &lt;SPAN class="lia-message-read"&gt;&lt;A id="link_7" class="page-link lia-link-navigation lia-custom-event" href="https://community.cisco.com/t5/security-knowledge-base/ise-device-administration-attributes/ta-p/3630165" target="_blank"&gt;ISE Device Administration Attributes&lt;/A&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;But since I do not have any other vendors gear for testing, we will need to &lt;STRONG&gt;&lt;EM&gt;community source&lt;/EM&gt;&lt;/STRONG&gt; this list starting with what has already been provided in this thread. If I need to add a column for product-specific Service-Arguments, please let me know. Please respond with other vendors and their respective Service Arguments in this thread! &lt;/P&gt;
&lt;TABLE border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;&lt;STRONG&gt;Vendor&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="50%"&gt;&lt;STRONG&gt;Service-Argument&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Avaya&lt;/TD&gt;
&lt;TD&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Brocade&lt;/TD&gt;
&lt;TD&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Checkpoint&lt;/TD&gt;
&lt;TD&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Cisco&lt;/TD&gt;
&lt;TD width="50%"&gt;shell&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Juniper&lt;/TD&gt;
&lt;TD width="50%"&gt;junos-exec&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Alcatel&lt;/TD&gt;
&lt;TD width="50%"&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Altheon&lt;/TD&gt;
&lt;TD width="50%"&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;F5&lt;/TD&gt;
&lt;TD width="50%"&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Extreme&lt;/TD&gt;
&lt;TD width="50%"&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Fortinet&lt;/TD&gt;
&lt;TD&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;HP&lt;/TD&gt;
&lt;TD width="50%"&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Huawei&lt;/TD&gt;
&lt;TD width="50%"&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;MicroTik&lt;/TD&gt;
&lt;TD&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="50%"&gt;Omnivista&lt;/TD&gt;
&lt;TD width="50%"&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Palo Alto&lt;/TD&gt;
&lt;TD&gt;?&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 14:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998523#M586416</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-01-17T14:45:51Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998988#M586454</link>
      <description>&lt;P&gt;I think it's useful to not only provide the Service-Arguments, but also some example values. It's tricky though, due to the RBAC nature of this - each role needs to have its own specific value.&lt;/P&gt;
&lt;P&gt;I'll list here what I know from my customers (the list is not exhaustive but it's a good starting point) - the values shown in the courier font box is the Raw Shell data that I put into an ISE TACACS Profile. Note that the "=" sign denotes that an attribute is MANDATORY. If an attribute were OPTIONAL, then the '*' character is used instead.:&lt;/P&gt;
&lt;H1&gt;F5&lt;/H1&gt;
&lt;H2&gt;Big-IP LTM Admin Role&lt;/H2&gt;
&lt;LI-CODE lang="markup"&gt;F5-LTM-User-Info-1=ADMIN_ROLE
F5-LTM-User-Console=1
F5-LTM-User-Role=0
F5-LTM-User-Partition=all&lt;/LI-CODE&gt;
&lt;H2&gt;Big-IQ Admin Role&lt;/H2&gt;
&lt;LI-CODE lang="markup"&gt;F5-BIGIQ-User-Info-01=bigiq-admin&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Fortigate&lt;/H1&gt;
&lt;LI-CODE lang="markup"&gt;admin_prof=super_admin
memberof=Fortinet_Admins&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1&gt;Riverbed&lt;/H1&gt;
&lt;H2&gt;SteelHead/SteelFusion/SteelCentral&lt;/H2&gt;
&lt;LI-CODE lang="markup"&gt;riverbed-roles-list=System Administrator
service=system&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 23:58:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998988#M586454</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-17T23:58:35Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998996#M586455</link>
      <description>&lt;P&gt;Do you happen to know the difference between mandatory and option?&lt;/P&gt;
&lt;P&gt;I know it's simply the difference between necessity and choice&lt;/P&gt;
&lt;P&gt;When tested with the juniper equipment, different results came out for the two cases.&lt;/P&gt;
&lt;P&gt;In the case of mandatory, the tacacs account connects normally&lt;BR /&gt;If you set it to optional, it seems to be authenticated on the live log&lt;BR /&gt;Actual connection failed.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 00:10:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4998996#M586455</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-18T00:10:46Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999056#M586459</link>
      <description>&lt;P&gt;I have to admit I am also still learning the finer nuances of TACACS+, but I can tell you that in the production environment, I have seen the Fortigate stuff work well with optional.&lt;/P&gt;
&lt;P&gt;When I login to the Fortigate, I can see the TACACS+ Authorization Log Details in ISE returning the AVPair=memberof*Fortinet_admins; AVPair=admin_prof*super_admin&lt;/P&gt;
&lt;P&gt;And the same in the Fortigate. I didn't set this up and I don't want to set it to MANDATORY in ISE for fear of breaking something. But it would be good to know the impact and differences of doing either.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 02:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999056#M586459</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-18T02:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999072#M586460</link>
      <description>&lt;P&gt;When authenticating tacacs, the portigate equipment is used&lt;BR /&gt;Can you check how the service-argument value comes out in the live log detail?&lt;/P&gt;
&lt;P&gt;And do you mean that you set the fortigate equipment as optional?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 04:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999072#M586460</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-18T04:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999075#M586461</link>
      <description>&lt;P&gt;Yes so in my reply to Thomas I show the example where the "=" is used - which means MANADTORY. I always assumed that in my production ISE, the Fortigate service-argument was misconfigured as "optional" because in my mind that makes no sense - there is nothing optional about it. But it works. Perhaps the Fortis are not that concerned - they just expect some hint about the role for that user.&amp;nbsp; I don't have a lab to test this with.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 04:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999075#M586461</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-18T04:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999088#M586462</link>
      <description>&lt;P&gt;What I was trying to make up is&lt;BR /&gt;Assume that each vendor has its own service-argument&lt;/P&gt;
&lt;P&gt;When configuring the policy sets, we intended to give vendor-specific policies under those conditions.&lt;/P&gt;
&lt;P&gt;However, if the fortigate does not have its own service-argument&lt;BR /&gt;I'll need to think again.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 04:28:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999088#M586462</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-18T04:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999118#M586466</link>
      <description>&lt;P&gt;I don't understand what you mean by "&lt;SPAN&gt;However, if the fortigate does not have its own service-argument.&amp;nbsp;I'll need to think again."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The way I do it, is to create ISE Network Device Device-Types for each vendor, and sub-types for various vendor products. Then in TACACS Policy Set overall condition, I check the Device-Type == Fortigate&amp;nbsp; &amp;nbsp; &amp;nbsp;or another Policy Set to check Device-Type == Cisco IOS&amp;nbsp; &amp;nbsp;... etc.&amp;nbsp; When you add Network Devices (NADs) into ISE, you assign a Device-Type to them. This is how it's commonly done.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 05:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999118#M586466</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-18T05:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999119#M586467</link>
      <description>&lt;P&gt;I know it's effective to use the device type&lt;BR /&gt;but It is difficult to determine the device list currently in use.&lt;/P&gt;
&lt;P&gt;Therefore, we will probably proceed with default device.&lt;BR /&gt;That's why I didn't mention the device type.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 05:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/4999119#M586467</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-18T05:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/5001176#M586567</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt; , I'm confused now.&lt;/P&gt;
&lt;P&gt;Is each line you show a unique Service-Argument value depending on the vendor + product + role ?&lt;/P&gt;
&lt;P&gt;I can put each of these in my table for Service-Arguments directly?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 16:16:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/5001176#M586567</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2024-01-19T16:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/5001372#M586568</link>
      <description>&lt;P&gt;Those are examples from working solutions after much digging around the internet - unlike TACACS+ on IOS/IOS-XE, other vendor products have their own nuances.&amp;nbsp; Most vendors only publish how to configure their systems to talk to a TACACS+ server - but 95% of the time they don't tell you what attributes the TACACS+ server should return. If you're lucky, you'll see some references to how Vendor X implemented TACACS+ on some ancient Cisco ACS system, or FreeRADIUS and then translate that into ISE.&lt;/P&gt;
&lt;P&gt;I find that even a few keywords such as the ones I published, might be a good start for others to search for more details.&amp;nbsp; I remember searching high and low for the F5 stuff.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jan 2024 02:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/5001372#M586568</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-01-20T02:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Service arguments value when ISE 3rd party equipment tacacs are se</title>
      <link>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/5004148#M586695</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;The fortinet, f5, and Riverbed in the ISE Device Administration attributes seem to be the tacacs profile custom attribute value for the tacacs setting of the third party equipment on the rise, not the service argument.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 05:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/service-arguments-value-when-ise-3rd-party-equipment-tacacs-are/m-p/5004148#M586695</guid>
      <dc:creator>CCC3</dc:creator>
      <dc:date>2024-01-24T05:49:31Z</dc:date>
    </item>
  </channel>
</rss>

