<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE - problem with TACACS command sets in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138634#M590365</link>
    <description>&lt;P&gt;I have a feeling that your IOS device is not performing command authorization, hence, ISE is not getting involved in the command authorization. Can you please share your&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show run | in aaa&lt;/LI-CODE&gt;
&lt;P&gt;Command authorization can be enabled for any and every priv level you give your admins. I always give everyone priv15 because that is needed for a "show run".&amp;nbsp; Therefore, the command authorization would look like this (my example uses the TACACS+ group "tacacs_group" and the "default" method list ... adjust as necessary to suit your scenario)&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa authorization commands 15 default group tacacs_group if-authenticated&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 01 Jul 2024 20:46:25 GMT</pubDate>
    <dc:creator>Arne Bier</dc:creator>
    <dc:date>2024-07-01T20:46:25Z</dc:date>
    <item>
      <title>Cisco ISE - problem with TACACS command sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138448#M590352</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've been given a task to provide administrative access for local IT guys so that they are able to execute limited set of commmands.&amp;nbsp; The following TACACS command sets has been configured to achieve that objective:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="lnwteam_0-1719835492782.png" style="width: 666px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/222066i2034DFD93757931E/image-dimensions/666x488?v=v2" width="666" height="488" role="button" title="lnwteam_0-1719835492782.png" alt="lnwteam_0-1719835492782.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, it does not work the way it's supposed to. After logging to the device and hitting appropriate authorizatation policy, I'm unable to execute the following commands (which is desired outcome):&amp;nbsp;&lt;/P&gt;&lt;P&gt;- reload&lt;BR /&gt;- debug&lt;BR /&gt;- traceroute&lt;BR /&gt;- show running-config&lt;BR /&gt;- configure terminal&amp;nbsp;&lt;/P&gt;&lt;P&gt;All allowed commands (ping, terminal monitor, terminal no monitor, show interface status, show logging) are working fine. However, I've noticed that other show commands such as "show spanning-tree", "show spanning-tree root", or "show ntp packets" can also be executed although they should be denied. Could anyone explain this? I'll add that I've tried several options with "Deny" and "Deny always".&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 12:12:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138448#M590352</guid>
      <dc:creator>lnw-team</dc:creator>
      <dc:date>2024-07-01T12:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - problem with TACACS command sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138634#M590365</link>
      <description>&lt;P&gt;I have a feeling that your IOS device is not performing command authorization, hence, ISE is not getting involved in the command authorization. Can you please share your&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show run | in aaa&lt;/LI-CODE&gt;
&lt;P&gt;Command authorization can be enabled for any and every priv level you give your admins. I always give everyone priv15 because that is needed for a "show run".&amp;nbsp; Therefore, the command authorization would look like this (my example uses the TACACS+ group "tacacs_group" and the "default" method list ... adjust as necessary to suit your scenario)&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa authorization commands 15 default group tacacs_group if-authenticated&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 20:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138634#M590365</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-01T20:46:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - problem with TACACS command sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138747#M590375</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;in my case it's slightly different, It looks like this:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default local group TACACS if-authenticated&lt;/P&gt;&lt;P&gt;Do you think it might be cause od the issue?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 05:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138747#M590375</guid>
      <dc:creator>lnw-team</dc:creator>
      <dc:date>2024-07-02T05:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - problem with TACACS command sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138753#M590376</link>
      <description>&lt;P&gt;Yes - if you use the built-in help (question mark) you can see that the "local" is not correct&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;switch(config)#aaa authorization commands 15 default ?
  cache             Use Cached-group
  group             Use server-group.
  if-authenticated  Succeed if user has authenticated.
  local             Use local database.
  none              No authorization (always succeeds).
&lt;/LI-CODE&gt;
&lt;P&gt;We don't want to perform command authorization using local accounts - therefore, assuming your TACACS+ aaa group is called "TACACS" (as your example shows), then change the command to look like this&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa authorization commands 15 default group TACACS if-authenticated&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 05:57:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138753#M590376</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-02T05:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - problem with TACACS command sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138765#M590377</link>
      <description>&lt;P&gt;But I'm also using local accounts as a backup authentication method. Furthermore, I'm wondering why it's working fine for most of the commands. As I mentioned before, I'm unable to execute "debug", "reload" or "conf t" command. Local authorization should also be enbled as a backup.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 06:55:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5138765#M590377</guid>
      <dc:creator>lnw-team</dc:creator>
      <dc:date>2024-07-02T06:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - problem with TACACS command sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5139075#M590384</link>
      <description>&lt;P&gt;Did you also configure "aaa authorization config-commands"&lt;/P&gt;&lt;P&gt;Been working on a similar implementation and the above command needs to be configured on my network devices (Cisco) for ISE to get granular with authorized commands.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 17:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5139075#M590384</guid>
      <dc:creator>Larry Sullivan</dc:creator>
      <dc:date>2024-07-02T17:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE - problem with TACACS command sets</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5139126#M590387</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/520091"&gt;@lnw-team&lt;/a&gt;&amp;nbsp;- do you see the ISE Command authorization attempts in the ISE TACACS Live Logs?&amp;nbsp; If not, then check the vty line settings because you also need - e.g.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;vty 0 15
  authorization commands 15 VTY_Name&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also keep forgetting that the IOS exec shell doesn't pass ALL commands to the AAA for evaluation unless you specify the exact priv level used by that command&lt;/P&gt;
&lt;P&gt;E.g. show running-config is sent to AAA for eval because it's a priv level 15 command.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But commands like "show version", "show users" etc. are priv 1 commands.&lt;/P&gt;
&lt;P&gt;Therefore you must configure aaa authorization commands in global and line vty for all possible priv levels.&lt;/P&gt;
&lt;P&gt;I tested it just now and forgot priv level 1, which is used for show users, etc.&lt;/P&gt;
&lt;P&gt;I wish there was a list that showed us which priv level is used for which command.&lt;/P&gt;
&lt;P&gt;Your DENY_ALWAYS rule is a dangerous one.&amp;nbsp; It takes precedence over ALL the other commands, and just because you put it at the end of the rules, doesn't mean it gets executed last - it gets evaluated FIRST! Always ... dangerous command.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 21:26:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-problem-with-tacacs-command-sets/m-p/5139126#M590387</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-07-02T21:26:37Z</dc:date>
    </item>
  </channel>
</rss>

