<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194346#M591835</link>
    <description>&lt;P&gt;Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1789068"&gt;@Jhonleo02&lt;/a&gt; one problem... I have read/write access and I cannot get cli or ssh to type any commands for example "config system admin" any ideas what i need to allow on ISE for this?&lt;/P&gt;</description>
    <pubDate>Fri, 13 Sep 2024 13:51:16 GMT</pubDate>
    <dc:creator>RG78874</dc:creator>
    <dc:date>2024-09-13T13:51:16Z</dc:date>
    <item>
      <title>Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configuration</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194016#M591821</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am working on some Fortinet's and for anyone that has connected Fortinet's to Cisco ISE using tacacs+ I could really do with some help.&lt;/P&gt;&lt;P&gt;TACACS+ &amp;gt; Active Directory &amp;gt; Separate Read Only group and Read/Write Group&lt;/P&gt;&lt;P&gt;Article that I am using to configure this - &lt;A href="https://sharifulhoque.blogspot.com/2019/09/fortigate-using-radius-server-windows_4.html" target="_blank" rel="noopener"&gt;https://sharifulhoque.blogspot.com/2019/09/fortigate-using-radius-server-windows_4.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(Yes it says Radius but it's got Tacacs+ config steps)&lt;/P&gt;&lt;P&gt;Can you see anything in the guide that I would be missing from my configuration.&lt;/P&gt;&lt;P&gt;I've got a successful connection to tacacs+&lt;/P&gt;&lt;P&gt;I have a connection to Active Directory.&lt;/P&gt;&lt;P&gt;I have Read / Write and Read Only AD groups, I'm not sure what else I am missing or if anyone can help.&lt;/P&gt;&lt;P&gt;I'm using version 3.1 and Fortigate version 7.4.x&lt;/P&gt;&lt;P&gt;Fortinet Guide hasn't got much info, but Fortinet side is configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Sep 2024 21:24:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194016#M591821</guid>
      <dc:creator>RG78874</dc:creator>
      <dc:date>2024-09-12T21:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194068#M591824</link>
      <description>&lt;P&gt;what is the behavior you are seeing ? are you able to login ?&lt;/P&gt;
&lt;P&gt;have you run the diagnose command as per the example ?&lt;/P&gt;
&lt;P&gt;Please attach the relevant config for fortigate and also screenshots of how it is configured in ISE&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 02:04:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194068#M591824</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-09-13T02:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194170#M591828</link>
      <description>&lt;P&gt;Screen shots are not available. I can see Tacacs Live Log errors show&lt;/P&gt;&lt;P&gt;Authentication Details section:&lt;/P&gt;&lt;P&gt;Message text Failed-Attempt: Authentication failed&lt;/P&gt;&lt;P&gt;Failure Reason 13036 Selected Shell profile is DenyAccess&lt;/P&gt;&lt;P&gt;The Shell profile is configured as per article in my post.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 08:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194170#M591828</guid>
      <dc:creator>RG78874</dc:creator>
      <dc:date>2024-09-13T08:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194208#M591831</link>
      <description>&lt;P&gt;&lt;A href="https://youtu.be/2WPuc7r_Qe4?si=lREegAb0cWIXCE-Y" target="_blank"&gt;https://youtu.be/2WPuc7r_Qe4?si=lREegAb0cWIXCE-Y&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 10:02:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194208#M591831</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-09-13T10:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194220#M591832</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;Thanks I checked it, but this is Radius setup. I am using Tacacs+&lt;BR /&gt;&lt;BR /&gt;ISE setup for this is different&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 10:25:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194220#M591832</guid>
      <dc:creator>RG78874</dc:creator>
      <dc:date>2024-09-13T10:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194254#M591833</link>
      <description>&lt;P&gt;All fixed, device policy admin set&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 11:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194254#M591833</guid>
      <dc:creator>RG78874</dc:creator>
      <dc:date>2024-09-13T11:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194255#M591834</link>
      <description>&lt;P&gt;Ensure the user roles in Cisco ISE are correctly mapped to your AD groups for both read-only and read/write access. Also, verify that TACACS+ policies are properly assigning these roles. Discover more by reviewing detailed role-mapping configurations for any missing &lt;A href="https://smart-play.app/" target="_self"&gt;steps&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 07:52:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194255#M591834</guid>
      <dc:creator>Jhonleo02</dc:creator>
      <dc:date>2024-09-23T07:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194346#M591835</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1789068"&gt;@Jhonleo02&lt;/a&gt; one problem... I have read/write access and I cannot get cli or ssh to type any commands for example "config system admin" any ideas what i need to allow on ISE for this?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2024 13:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5194346#M591835</guid>
      <dc:creator>RG78874</dc:creator>
      <dc:date>2024-09-13T13:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5197464#M591924</link>
      <description>&lt;P&gt;TACACS+ policies might not be assigning the correct privilege level for CLI access. Double-check the command sets and ensure that the read/write group is permitted to execute CLI commands like "config system admin." Additionally, confirm that your user roles in Cisco ISE are properly configured to provide the necessary administrative access.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 07:51:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5197464#M591924</guid>
      <dc:creator>Jhonleo02</dc:creator>
      <dc:date>2024-09-23T07:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5282321#M595999</link>
      <description>&lt;P&gt;Based on your description, it seems you've configured the essential components: successful TACACS+ connection, Active Directory integration, and defined Read/Write and Read-Only AD groups. However, to ensure proper role assignment on the FortiGate, verify that the attribute-value pairs sent by Cisco ISE match FortiGate's expected values. Specifically, check that the TACACS+ service custom attributes in ISE correspond to the appropriate admin profiles on the FortiGate. If these attributes are misconfigured or missing, FortiGate may not assign the correct permissions.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 12:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5282321#M595999</guid>
      <dc:creator>gordonmckenna6</dc:creator>
      <dc:date>2025-04-17T12:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5286329#M596149</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1165320"&gt;@RG78874&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am working on some Fortinet's and for anyone that has connected Fortinet's to Cisco ISE using tacacs+ I could really do with some help.&lt;/P&gt;&lt;P&gt;TACACS+ &amp;gt; Active Directory &amp;gt; Separate Read Only group and Read/Write Group&lt;/P&gt;&lt;P&gt;Article that I am using to configure this - &lt;A href="https://sharifulhoque.blogspot.com/2019/09/fortigate-using-radius-server-windows_4.html" target="_blank" rel="noopener"&gt;https://sharifulhoque.blogspot.com/2019/09/fortigate-using-radius-server-windows_4.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(Yes it says Radius but it's got Tacacs+ config steps)&amp;nbsp;&lt;A href="https://seovancouveragency.ca/content-writing-vencover/" target="_self"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;&lt;SPAN&gt;writing seo content vancouver&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Can you see anything in the guide that I would be missing from my configuration.&lt;/P&gt;&lt;P&gt;I've got a successful connection to tacacs+&lt;/P&gt;&lt;P&gt;I have a connection to Active Directory.&lt;/P&gt;&lt;P&gt;I have Read / Write and Read Only AD groups, I'm not sure what else I am missing or if anyone can help.&lt;/P&gt;&lt;P&gt;I'm using version 3.1 and Fortigate version 7.4.x&lt;/P&gt;&lt;P&gt;Fortinet Guide hasn't got much info, but Fortinet side is configured.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Based on your description, it seems you've configured the essential components: successful TACACS+ connection, Active Directory integration, and defined Read/Write and Read-Only AD groups. However, to ensure proper role assignment on the FortiGate, verify that the attribute-value pairs sent by Cisco ISE match FortiGate's expected values. Specifically, check that the TACACS+ service custom attributes in ISE correspond to the appropriate admin profiles on the FortiGate. If these attributes are misconfigured or missing, FortiGate may not assign the correct permissions.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 29 Apr 2025 18:24:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5286329#M596149</guid>
      <dc:creator>gordonmckenna6</dc:creator>
      <dc:date>2025-04-29T18:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5331553#M598237</link>
      <description>&lt;P&gt;you’ve got most of it right. The bit people usually miss is the ISE authorization rules and command sets. Make sure your AD groups are actually mapped to the right TACACS+ profiles in ISE&lt;A href="https://ushapedsofastore.co.uk/" target="_self"&gt;,&lt;/A&gt; and check the live logs to see which rule is being hit when you log in. Usually it’s just the group match that trips things up.&lt;/P&gt;</description>
      <pubDate>Sat, 27 Sep 2025 21:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5331553#M598237</guid>
      <dc:creator>dennymorkal</dc:creator>
      <dc:date>2025-09-27T21:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ISE TACACS+ to Fortigate Read/ Write and Read Only configura</title>
      <link>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5349776#M599084</link>
      <description>&lt;P&gt;Hey, the blog mixes RADIUS/TACACS – the real fix is on ISE:&lt;/P&gt;&lt;P&gt;Create TACACS Device Admin policy set → two authz rules:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Read-Write AD group → Shell Profile with Privilege 15&lt;/LI&gt;&lt;LI&gt;Read-Only AD group → Shell Profile with Privilege 1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://aireviewhq.com/" target="_self"&gt;aireviewhq&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2025 11:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/cisco-ise-tacacs-to-fortigate-read-write-and-read-only/m-p/5349776#M599084</guid>
      <dc:creator>andrewhannells</dc:creator>
      <dc:date>2025-11-25T11:33:37Z</dc:date>
    </item>
  </channel>
</rss>

