<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks Ian, that has helped in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452207#M87837</link>
    <description>&lt;P&gt;Thanks Ian, that has helped me figure out my issue.&lt;/P&gt;&lt;P&gt;I had admin and monitor as allowed values in the VSA setting, so it was sending a 1 or a 2 as the index for these allowed values which obviously the Steelhead didn't recognise.&lt;/P&gt;&lt;P&gt;I removed these and manually entered admin and monitor for Local-User in the Authorization Profiles and have confirmed it is now working.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Jul 2014 23:19:54 GMT</pubDate>
    <dc:creator>mojocoops</dc:creator>
    <dc:date>2014-07-29T23:19:54Z</dc:date>
    <item>
      <title>ISE v1.2 RADIUS - Authentication of access to a Riverbed Steelhead</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452201#M87830</link>
      <description>&lt;P&gt;VENDOR RBT 17163&lt;/P&gt;&lt;P&gt;ATTRIBUTE Local-User 1 string RBT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TACACS+ docs&lt;/P&gt;&lt;P&gt;TACACS+ (Shell Profile) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attribute(s): service ; local-user-name &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Value(s): rbt-exec ; &amp;lt;username&amp;gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usage: In order to grant the user read-only access, the &amp;lt;username&amp;gt; value must be set to monitor. In order to grant the user read-write access, the &amp;lt;username&amp;gt; value must be set to admin. If you have another account defined in addition to admin and monitor, configure that name to be returned. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example – Add Attributes to a Shell Profile (for read-only access) &lt;/P&gt;&lt;P&gt; Attribute Requirement Attribute Value &lt;/P&gt;&lt;P&gt;service Mandatory rbt-exec &lt;/P&gt;&lt;P&gt;local-user-name Mandatory monitor &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example – Add Attributes to a Shell Profile (for read-write access) &lt;/P&gt;&lt;P&gt; Attribute Requirement Attribute Value &lt;/P&gt;&lt;P&gt;service Mandatory rbt-exec &lt;/P&gt;&lt;P&gt;local-user-name Mandatory &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I have successfully achieved getting the profile to identify the unit and to apply the correct Result.&lt;/P&gt;&lt;P&gt;But my 'Result' is clearly incorrectly defined.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The dictionary attribute value for Riverbed 17163&lt;/P&gt;&lt;P&gt;local-user-name 1 STRING BOTH&amp;nbsp; NO &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure this is wrong!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;/P&gt;&lt;P&gt;local-user-name = shell:local-username=admin&lt;/P&gt;&lt;P&gt;Service-Type = 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the authenttication log it would appear it doesn't send this at all to the device&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ian Cowley&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:26:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452201#M87830</guid>
      <dc:creator>Ian Cowley</dc:creator>
      <dc:date>2019-03-11T04:26:12Z</dc:date>
    </item>
    <item>
      <title>Hi Ian,Did you ever resolve</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452202#M87831</link>
      <description>&lt;P&gt;Hi Ian,&lt;/P&gt;&lt;P&gt;Did you ever resolve this issue?&lt;/P&gt;&lt;P&gt;I am trying to get the same working on ISE 1.1.2 (soon upgrading to 1.2.1).&lt;/P&gt;&lt;P&gt;I have the Authorization Profile configured to send local-user=admin attribute (at recommendation of Riverbed support) but this is not sent by ISE according to packet captures. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Sending Access Accept gives full access to Steelhead web GUI.&lt;/P&gt;&lt;P&gt;I think the attribute ID configured in the dictionary entry could be wrong (I currently have ID as 1).&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2014 00:47:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452202#M87831</guid>
      <dc:creator>mojocoops</dc:creator>
      <dc:date>2014-07-22T00:47:14Z</dc:date>
    </item>
    <item>
      <title>Attributes DetailsService</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452203#M87832</link>
      <description>&lt;P&gt;Attributes Details&lt;BR /&gt;Service Template&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; false&lt;BR /&gt;Access Type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ACCESS_ACCEPT&lt;BR /&gt;Radius:Service-Type&amp;nbsp;&amp;nbsp; Administrative(6)&lt;BR /&gt;Riverbed:Local-User &amp;nbsp;&amp;nbsp; admin&lt;/P&gt;&lt;P&gt;Local user Dictionary Attribute ID is also '1'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The AuthProfile sends this if user is in correct AD group and device is Riverbed.&lt;/P&gt;&lt;P&gt;Seems to work.&amp;nbsp; RiOS 8.5.2 through 8.6.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IanC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2014 13:18:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452203#M87832</guid>
      <dc:creator>Ian Cowley</dc:creator>
      <dc:date>2014-07-22T13:18:36Z</dc:date>
    </item>
    <item>
      <title>Thanks Ian.I've changed my</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452204#M87834</link>
      <description>&lt;P&gt;Thanks Ian.&lt;/P&gt;&lt;P&gt;I've changed my authorization profile to have Radius:Service-Type as Administrative(6), still works.&lt;/P&gt;&lt;P&gt;Packet capture shows ISE sending AVP type 6 as Shell-User.&lt;/P&gt;&lt;P&gt;Riverbed user logs don't show anything pertaining to role being admin, apart from CLI login:&lt;/P&gt;&lt;P&gt;user stephencooper.adm: CLI launched for user stephencooper.adm and rbm admin&lt;/P&gt;&lt;P&gt;I tried creating an authorization profile for monitor, same settings but set local-user to monitor and Service-Type to NAS-Prompt (only going on Cisco WLC access example). &amp;nbsp;This causes ISE to send AVP type 6 as Exec-user, and same entry in user logs for CLI login. &amp;nbsp;I get full access to the web GUI.&lt;/P&gt;&lt;P&gt;Could you please advise how you confirmed role access upon login, and also provide your config for monitor access?&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2014 22:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452204#M87834</guid>
      <dc:creator>mojocoops</dc:creator>
      <dc:date>2014-07-22T22:26:40Z</dc:date>
    </item>
    <item>
      <title>StephenLet me check...I might</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452205#M87835</link>
      <description>&lt;P&gt;Stephen&lt;/P&gt;&lt;P&gt;Let me check...&lt;/P&gt;&lt;P&gt;I might not have been as thorough as you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IanC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 14:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452205#M87835</guid>
      <dc:creator>Ian Cowley</dc:creator>
      <dc:date>2014-07-29T14:53:39Z</dc:date>
    </item>
    <item>
      <title>OK it works..though perhaps</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452206#M87836</link>
      <description>&lt;P&gt;OK&amp;nbsp;it works..though perhaps not as granularly as I'd like.&lt;/P&gt;&lt;P&gt;2 Authorization Rules; both identify the Riverbed device; VTY, PAP, Riverbed Device Group.&lt;/P&gt;&lt;P&gt;and either AD Group for Admins, or Service Desk (in my case).&lt;/P&gt;&lt;P&gt;The Permsisions&amp;nbsp;responses [Policy - Results - Authorization - Authorization Profiles]&amp;nbsp; are:&lt;/P&gt;&lt;P&gt;Riverbed Admins:&lt;/P&gt;&lt;P&gt;Radius:Service-Type = Administrative&lt;/P&gt;&lt;P&gt;Riverbed:Local-User = admin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;[Policy - Policy Elements - Dictionary - System - Radius - RADIUS Vendors - Riverbed (17163) - Dictionary Attrubutes - Local-User 1 STRING BOTH ]&lt;/P&gt;&lt;P&gt;[result of this is Service Type =6, Local-User=admin]&lt;/P&gt;&lt;P&gt;Riverbed Monitor&lt;/P&gt;&lt;P&gt;Radius:Service-Type = Administrative&lt;/P&gt;&lt;P&gt;Riverbed:Local-User = monitor&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[result of this is Service Type =6, Local-User=monitor]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It greys out the Configuration - Network and Optimization pages&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IanC&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 15:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452206#M87836</guid>
      <dc:creator>Ian Cowley</dc:creator>
      <dc:date>2014-07-29T15:16:40Z</dc:date>
    </item>
    <item>
      <title>Thanks Ian, that has helped</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452207#M87837</link>
      <description>&lt;P&gt;Thanks Ian, that has helped me figure out my issue.&lt;/P&gt;&lt;P&gt;I had admin and monitor as allowed values in the VSA setting, so it was sending a 1 or a 2 as the index for these allowed values which obviously the Steelhead didn't recognise.&lt;/P&gt;&lt;P&gt;I removed these and manually entered admin and monitor for Local-User in the Authorization Profiles and have confirmed it is now working.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Stephen.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jul 2014 23:19:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/2452207#M87837</guid>
      <dc:creator>mojocoops</dc:creator>
      <dc:date>2014-07-29T23:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: Thanks Ian, that has helped</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/3945190#M87838</link>
      <description>&lt;P&gt;Hello together,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have the same problem and i don't unterstand how to remove the index 1 and 2 manually.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I try several settings and i always have &lt;STRONG&gt;admin&lt;/STRONG&gt; access.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only &lt;STRONG&gt;monitor&lt;/STRONG&gt; don't work for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What means VSA settings?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jacob&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2019 10:20:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-v1-2-radius-authentication-of-access-to-a-riverbed-steelhead/m-p/3945190#M87838</guid>
      <dc:creator>jacob.parker</dc:creator>
      <dc:date>2019-10-22T10:20:16Z</dc:date>
    </item>
  </channel>
</rss>

