<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE AAA TACACS+ authentication with NX-OS and IOS - My policy set in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/5269757#M595422</link>
    <description>&lt;P&gt;Hi Poongarg, could you give me an idea here please? I'm configuring cisco ISE(Radius) for nexus 9300 switch but after I have done all policy and authorization it doesn't give me access, couldn't authenticate even when i check the log. I just chose Cisco device profile when creating a device,&amp;nbsp;i couldn't found separate Cisco nexus profile in the list. Does this cause the problem? If so, how do I add new device profile for Nexus and what are the parameters? Or should i import dictionary like 3rd party devices?&lt;/P&gt;</description>
    <pubDate>Tue, 11 Mar 2025 04:36:47 GMT</pubDate>
    <dc:creator>LearnerNewbee</dc:creator>
    <dc:date>2025-03-11T04:36:47Z</dc:date>
    <item>
      <title>ISE AAA TACACS+ authentication with NX-OS and IOS - My policy set appears to accept one or the other</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4080875#M560183</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I can't seem to figure out the logic behind the policy set to authenticate and authorize my users based on the privilege and device type. Sorry for the lengthy description.&lt;/P&gt;&lt;P&gt;I have a couple of ISE 3615 appliances, running version 2.6. Only one of the appliances is configured. Planning on configuring the second one later.&lt;/P&gt;&lt;P&gt;In my network I have multiple Catalyst 9300/9500 and Nexus 9300 switches. They are all happy and have L3 reach ability and I am currently using local account on each one of them.&lt;/P&gt;&lt;P&gt;My ISE-T1 is configured and joined to my domain successfully. It is running all the personas.&lt;/P&gt;&lt;P&gt;I have two users groups OU that I have pulled down.&lt;/P&gt;&lt;P&gt;Domain User - (The users in this OU will have limited read only access)&lt;/P&gt;&lt;P&gt;Domain Admin - (The user in the OU will have full R/W access)&lt;/P&gt;&lt;P&gt;I have created the following TACACS command sets profiles:&lt;/P&gt;&lt;P&gt;AD-NXOS-Admin&lt;/P&gt;&lt;P&gt;AD-NXOS-Op ((Can issue the following commands: show int status, show vpc brief, sho run, etc)&lt;/P&gt;&lt;P&gt;AD-IOS-Admin&lt;/P&gt;&lt;P&gt;AD-IOS-Op (Can issue the following commands: show int status, sho ip int b, sho run, etc)&lt;/P&gt;&lt;P&gt;I have also created the following TACACS Profiles&lt;/P&gt;&lt;P&gt;AD-NXOS-Admin-shell&lt;/P&gt;&lt;P&gt;AD-NXOS-Op-shell&lt;/P&gt;&lt;P&gt;AD-IOS-Admin-shell&lt;/P&gt;&lt;P&gt;AD-IOS-Op-shell&lt;/P&gt;&lt;P&gt;The problem I am running into, and I hope I can explain it clearly is, the device Admin policy Sets that I create appears to only accept the first two rules, and it doesn't matter if I have specific for each type of user (NXOS or IOS)&lt;/P&gt;&lt;P&gt;Here's the Policy set: There are two of them:&lt;/P&gt;&lt;P&gt;AD-NXOS-ACCESS : DEVICE:DevicetypeEQUALS all device types#Cisco NX-OS default Device Admin &amp;gt;&lt;/P&gt;&lt;P&gt;AD-IOS-ACCESS: DEVICE:DevicetypeEQUALSall device types : Default Device Admin &amp;gt;&lt;/P&gt;&lt;P&gt;Now the configs for the authentication and Authorization for each one&lt;/P&gt;&lt;P&gt;This if for the IOS devices&lt;/P&gt;&lt;P&gt;Authentication policy (1) - It points to my my.AD&lt;/P&gt;&lt;P&gt;Authorization policy (3)&lt;/P&gt;&lt;P&gt;AD-IOS-ADMIN - my.AD.ExternalGroupsEQUALS my.AD/Users/Domain Admins - AD-IOS-Admin - AD-IOS-Admin-shell&lt;/P&gt;&lt;P&gt;AD-IOS-Operator my.AD.ExternalGroupsEQUALS my.AD/Users/Domain Users - AD-IOS-Op - AD-IOS-Op-Shell&lt;/P&gt;&lt;P&gt;Default - DenyAllCommands&lt;/P&gt;&lt;P&gt;This is for NX-OS device&lt;/P&gt;&lt;P&gt;Authentication policy (1) - It points to my my.AD&lt;/P&gt;&lt;P&gt;Authorization policy (3)&lt;/P&gt;&lt;P&gt;AD-NXOS-ADMIN my.AD.ExternalGroupsEQUALS my.AD/Users/Domain Admins -AD-NXOS-Admin - AD-NXOS-Admin-Shell&lt;/P&gt;&lt;P&gt;AD-NXOS-Operator my.AD.ExternalGroupsEQUALS my.AD/Users/Domain Users -AD-NXOS-Op - AD-NXOS-Op-shell&lt;/P&gt;&lt;P&gt;Default - DenyAllCommands&lt;/P&gt;&lt;P&gt;Even though I have two separate policies in the Policy Sets, it seems that I only use the AD-IOS-Admin or AD-IOS-Op and not the Nexus specific.&lt;/P&gt;&lt;P&gt;I am able to successfully login as Operator User to IOS device and issue the limited commands.&lt;/P&gt;&lt;P&gt;I am able to successfully login as Admin to both NXOS and IOS switches and I have full access to everything.&lt;/P&gt;&lt;P&gt;I am able to successfully login as Operator user to NXOS, but I can't issue any show commands as I have listed.&lt;/P&gt;&lt;P&gt;When I looked at the Operations logs under TACACS+, I noticed only the IOS policies were being used even though I was logging into the NX-OS switches.&lt;/P&gt;&lt;P&gt;I guess I am trying to figure out what logic (AND / OR) i need to put in my policy to distinguish and forward to specific rules.&lt;/P&gt;&lt;P&gt;Be glad to provide any other info if needed.&lt;/P&gt;&lt;P&gt;Thank you kindly for reading and providing feedbacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Raman Azizian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 22:50:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4080875#M560183</guid>
      <dc:creator>RAMAN AZIZIAN</dc:creator>
      <dc:date>2020-05-06T22:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AAA TACACS+ authentication with NX-OS and IOS - My policy set appears to accept one or the other</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4080903#M560184</link>
      <description>IMO you have a couple of options to accomplish what you are trying to do.  One of those options would be to group devices by device type (This can be found here: Administration-&amp;gt;Network Resources-&amp;gt;Network Device Groups).  Then use DEVICE: Device Type as an additional authz condition.  Essentially you would group your IOS NADs in one group and your NX-OS devices in another and rely on that group condition to steer policy that way.  HTH!</description>
      <pubDate>Wed, 06 May 2020 23:28:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4080903#M560184</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2020-05-06T23:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AAA TACACS+ authentication with NX-OS and IOS - My policy set appears to accept one or the other</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4080956#M560185</link>
      <description>&lt;P&gt;Adding to above, On Nexus we prefer to have role based access instead of command authorization.&lt;/P&gt;
&lt;P&gt;Although command authorization via Tacacs is allowed on the Nexus but Command authorization disables user role based authorization control (RBAC), including the default role.&lt;/P&gt;
&lt;P&gt;Do not use "Default Shell Profile" instead create a new shell profile to be used for Nexus device.&lt;/P&gt;
&lt;P&gt;New shell profile &amp;gt; Task Attribute view&amp;gt;Go to "Common Task Type" &amp;gt; Nexus. Set attributes as "mandatory" Network Role "Administrator (Read Write)" and VDC Role "Administrator (Read Write)"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once saved, you will see below profile attributes under raw view&lt;/P&gt;
&lt;P&gt;shell:roles="network-admin vdc-admin"&lt;/P&gt;
&lt;P&gt;shell:roles="network-operator vdc-operator" &amp;gt;&amp;gt;&amp;gt; This will appear if you will select operator read-only role.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 02:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4080956#M560185</guid>
      <dc:creator>poongarg</dc:creator>
      <dc:date>2020-05-07T02:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AAA TACACS+ authentication with NX-OS and IOS - My policy set appears to accept one or the other</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4081573#M560201</link>
      <description>&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;Thank you for your suggestion and I'm able to now allow specific access based on the RBAC and user access.&lt;/P&gt;&lt;P&gt;I created two groups&lt;/P&gt;&lt;P&gt;IOS-Devices&lt;/P&gt;&lt;P&gt;NXOS-Device&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 21:57:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4081573#M560201</guid>
      <dc:creator>RAMAN AZIZIAN</dc:creator>
      <dc:date>2020-05-07T21:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AAA TACACS+ authentication with NX-OS and IOS - My policy set appears to accept one or the other</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4081576#M560202</link>
      <description>&lt;P&gt;Hello Poongarg,&lt;/P&gt;&lt;P&gt;I took your suggestion and I set Mandatory to both admin RBAC and Operator RBAC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also used Mike's suggestion for separation of the devices to further differentiate and steer the connection to the correct policy.&lt;/P&gt;&lt;P&gt;Now it's time to go figure out how HA works and what all I need to do to make that work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you again for both of you for helping me solve this problem.&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Raman&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 22:01:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/4081576#M560202</guid>
      <dc:creator>RAMAN AZIZIAN</dc:creator>
      <dc:date>2020-05-07T22:01:32Z</dc:date>
    </item>
    <item>
      <title>Re: ISE AAA TACACS+ authentication with NX-OS and IOS - My policy set</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/5269757#M595422</link>
      <description>&lt;P&gt;Hi Poongarg, could you give me an idea here please? I'm configuring cisco ISE(Radius) for nexus 9300 switch but after I have done all policy and authorization it doesn't give me access, couldn't authenticate even when i check the log. I just chose Cisco device profile when creating a device,&amp;nbsp;i couldn't found separate Cisco nexus profile in the list. Does this cause the problem? If so, how do I add new device profile for Nexus and what are the parameters? Or should i import dictionary like 3rd party devices?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2025 04:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-aaa-tacacs-authentication-with-nx-os-and-ios-my-policy-set/m-p/5269757#M595422</guid>
      <dc:creator>LearnerNewbee</dc:creator>
      <dc:date>2025-03-11T04:36:47Z</dc:date>
    </item>
  </channel>
</rss>

