<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Use ISE to limit access to specific VRFs in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193273#M591780</link>
    <description>&lt;P&gt;Thanks I'll try this. Documentation suggested using REGEX when building command sets.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Sep 2024 14:11:00 GMT</pubDate>
    <dc:creator>Nerd_Herd</dc:creator>
    <dc:date>2024-09-11T14:11:00Z</dc:date>
    <item>
      <title>Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192163#M591718</link>
      <description>&lt;P&gt;One of my clients would like to limit access of user to their specific VRFs. Since the VRFs span multiple devices its not possible to restrict by network access device, We're using TACACS so I tried to limit commands pertaining to other VRFs but all commands were blocked regardless of the argument given. Ex command = sh argument= ^vrf vrfname$ I used the ^$ symbols to get the start and stop of the string but it hit on every vrf. Any examples doing something would be appreciated.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2024 15:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192163#M591718</guid>
      <dc:creator>Nerd_Herd</dc:creator>
      <dc:date>2024-09-09T15:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192273#M591719</link>
      <description>&lt;P&gt;I don't understand what you mean by "users limited to their VRFs" - unless you're doing SDA where users end up in a specific VN (VRF), access-sessions are authorized on a VLAN level, not VRF. If you're talking about AAA command authorization (TACACS+) then I also don't quite understand the reasoning for this. The "vrf" keyword is interspersed in arcane little places all over various parts of the command syntax. There is no single "vrf mode" for a user.&amp;nbsp; Restricting the command syntax to only issue (for example) one specific VRF for a particular user (group) would be quite messy.&lt;/P&gt;
&lt;P&gt;Just some examples of the 'vrf' keyword used with aaa:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa group server radius dnac-client-radius-group

 ip vrf forwarding MANAGEMENT&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa group server tacacs+ dnac-client-tacacs-group

 ip vrf forwarding MANAGEMENT&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa server radius dynamic-author

 client 1.2.3.4 vrf MANAGEMENT server-key 7 *******&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's never in one consistent place. Perhaps I didn't understand your use case. Can you give some examples of what you're trying to allow, versus what you're trying to disallow?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2024 21:05:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192273#M591719</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-09T21:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192853#M591761</link>
      <description>&lt;P&gt;what vrf do you want to allow .. i think it should be something like this . Please show your command set..&lt;/P&gt;
&lt;P&gt;it shoud allow all other commands..&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ccieexpert_0-1725996675185.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228884i57209D77D8E7F611/image-size/medium?v=v2&amp;amp;px=400" role="button" title="ccieexpert_0-1725996675185.png" alt="ccieexpert_0-1725996675185.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 19:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192853#M591761</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-09-10T19:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192858#M591763</link>
      <description>&lt;P&gt;also you can use specific command like "show" if you want..&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 19:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192858#M591763</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-09-10T19:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192907#M591768</link>
      <description>&lt;P&gt;Valid point&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1481123"&gt;@ccieexpert&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had to modify the command and arguments a bit, because the ISE Commands processing supports &lt;EM&gt;wildcards&lt;/EM&gt; (not regex) and the Arguments support &lt;EM&gt;regex&lt;/EM&gt;. Also, your regex contained white spaces that caused this not to work.&amp;nbsp; I tested on &lt;A href="http://www.regex101.com" target="_blank"&gt;www.regex101.com&lt;/A&gt;&amp;nbsp;until I got it right.&lt;/P&gt;
&lt;P&gt;So, my example is a user (or member of a group) who can only work with the vrf ACME, and no other vrf.&lt;/P&gt;
&lt;P&gt;In the Arguments, there are no white spaces.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1726004595007.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/228890i62A556D77C903235/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1726004595007.png" alt="ArneBier_0-1726004595007.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The priv level 1 commands are important, because that is where a lot of show commands are authorized from - even if your user is authorized to priv 15, when they issue certain show commands, the IOS classifies them as priv 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;aaa group server tacacs+ dnac-network-tacacs-group
aaa authentication login VTY_authen group dnac-network-tacacs-group local
aaa authorization exec VTY_author group dnac-network-tacacs-group local if-authenticated
aaa authorization commands 1 VTY_author group dnac-network-tacacs-group if-authenticated
aaa authorization commands 15 VTY_author group dnac-network-tacacs-group if-authenticated
aaa authorization config-commands
!
line vty 0 4
 authorization commands 1 VTY_author
 authorization commands 15 VTY_author
 authorization exec VTY_author
 login authentication VTY_authen
 transport input ssh

&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only problem with the ISE Arguments, is that they don't seem to understand standard regex. For example, my example will not allow the command "show vrf" (assuming you wanted to allow that for this user).&amp;nbsp; I was unable to get ISE to process the regex pattern&amp;nbsp; &lt;STRONG&gt;^vrf$&lt;/STRONG&gt; which should have allowed this. If you know how to do this, please let me know.&lt;/P&gt;
&lt;P&gt;In other words&lt;/P&gt;
&lt;P&gt;allow "show vrf"&lt;/P&gt;
&lt;P&gt;allow vrf commands containing "ACME"&lt;/P&gt;
&lt;P&gt;deny all other commands containing "vrf"&lt;/P&gt;
&lt;P&gt;permit all remaining commands&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2024 23:10:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5192907#M591768</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-10T23:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193269#M591778</link>
      <description>&lt;P&gt;That is what the user was asking for. Basically limiting user to only running commands related to their specific vrf. Example groups A,B,C belong to VRFs A,B,C. The client wants the users to only be able to run commands related to their specific VRF.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 14:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193269#M591778</guid>
      <dc:creator>Nerd_Herd</dc:creator>
      <dc:date>2024-09-11T14:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193272#M591779</link>
      <description>&lt;P&gt;I'll try this.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 14:10:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193272#M591779</guid>
      <dc:creator>Nerd_Herd</dc:creator>
      <dc:date>2024-09-11T14:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193273#M591780</link>
      <description>&lt;P&gt;Thanks I'll try this. Documentation suggested using REGEX when building command sets.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 14:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193273#M591780</guid>
      <dc:creator>Nerd_Herd</dc:creator>
      <dc:date>2024-09-11T14:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193289#M591781</link>
      <description>&lt;P&gt;Do you have a period at the end of the VRF name before the *?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 14:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193289#M591781</guid>
      <dc:creator>Nerd_Herd</dc:creator>
      <dc:date>2024-09-11T14:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193295#M591782</link>
      <description>&lt;P&gt;How ISE know this user from this VRF abd this user from other VRF' from there you need to start.&lt;/P&gt;
&lt;P&gt;After that add command with vrf-aware.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 14:35:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193295#M591782</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-11T14:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193438#M591791</link>
      <description>&lt;P&gt;You would return the appropriate command restrictions to the user during TACACS+ authorization.&amp;nbsp; Depending on how many tenants they need, you'd create an ISE Identity Group (or use an AD Group) and then use that in the TACACS+ Authorization Policy Set.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2024 20:53:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193438#M591791</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-11T20:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193439#M591792</link>
      <description>&lt;P&gt;The "." (period) in regex means "match zero or more occurrences" - a common usage is dot-star, which matches anything before and up to that point.&amp;nbsp; Have a play on regex101.com website - it's a great regular expression teacher&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;.*vrf ACME.*
.*vrf.*&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 11 Sep 2024 20:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193439#M591792</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-11T20:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193503#M591798</link>
      <description>&lt;P&gt;How Tacacs (ISE) know this user from this vrf-a or vrf-b&lt;/P&gt;
&lt;P&gt;As I know there is no vrf attribute send between SW/R and AAA server.&lt;/P&gt;
&lt;P&gt;That my concern here.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 04:47:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193503#M591798</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-12T04:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193511#M591800</link>
      <description>&lt;P&gt;I don't know exactly how&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/989756"&gt;@Nerd_Herd&lt;/a&gt;&amp;nbsp;plans to do this, but I assume that he has users/tenants in different AD groups, and then when those users authenticate via TACACS, ISE can return the appropriate command set.&amp;nbsp; &amp;nbsp;The assumption is that whatever command set is returned for those "groups" of users, is correct. Basically, if bob from GroupA logs into a switch, then he gets profile for GroupA - all users in that group are restricted to only accessing their appropriate Vrf.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 05:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5193511#M591800</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2024-09-12T05:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5197410#M591922</link>
      <description>&lt;P&gt;Correct. I plan on having various security groups tied to specific VRFs. They will have command sets that limit them to vrf commands that only apply to their specific vrf. They can still do standard commands but not interact with another vrf.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 00:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5197410#M591922</guid>
      <dc:creator>Nerd_Herd</dc:creator>
      <dc:date>2024-09-23T00:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5197427#M591923</link>
      <description>&lt;P&gt;If that So it will work' keep in mind dont select permit any command not list option.&lt;/P&gt;
&lt;P&gt;Goodluck&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 04:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5197427#M591923</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-23T04:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5197494#M591926</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_ise_tacacs_device_admin.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_ise_tacacs_device_admin.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;By the way did you check this guide&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It have nice table for command regex&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 10:04:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5197494#M591926</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-23T10:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: Use ISE to limit access to specific VRFs</title>
      <link>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5197631#M591932</link>
      <description>&lt;P&gt;That's one of the things we discovered is that regex does not seem to work.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 13:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/use-ise-to-limit-access-to-specific-vrfs/m-p/5197631#M591932</guid>
      <dc:creator>Nerd_Herd</dc:creator>
      <dc:date>2024-09-23T13:16:41Z</dc:date>
    </item>
  </channel>
</rss>

