<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 3.0 logging detection in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37394#M9586</link>
    <description>&lt;P&gt;Does ACS 3.0 has a logging that detects any changes done on the switches or routers? Can someone point me a right direction? I noticed it only logged who is login and on what time. Thank you in advance.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 18:02:49 GMT</pubDate>
    <dc:creator>ROBERT TOGONON</dc:creator>
    <dc:date>2020-02-21T18:02:49Z</dc:date>
    <item>
      <title>ACS 3.0 logging detection</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37394#M9586</link>
      <description>&lt;P&gt;Does ACS 3.0 has a logging that detects any changes done on the switches or routers? Can someone point me a right direction? I noticed it only logged who is login and on what time. Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37394#M9586</guid>
      <dc:creator>ROBERT TOGONON</dc:creator>
      <dc:date>2020-02-21T18:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 3.0 logging detection</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37395#M9587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACS 3.0 will log all accounting packets, depending on what the NAS is capable of sending.  If you need to log commands that are processed on the NAS, you will need to utilise command authorization.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command Authorization works only with Tacacs and will query the ACS server every time someone enters a command to ensure they are allowed to run the command.  Accounting can then be done when the requests are approved by the ACS server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Aug 2002 23:49:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37395#M9587</guid>
      <dc:creator>albadger</dc:creator>
      <dc:date>2002-08-12T23:49:07Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 3.0 logging detection</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37396#M9588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, Alison. Do you happen to know the links of documentation for basic command authorization for me to look at? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Aug 2002 15:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37396#M9588</guid>
      <dc:creator>ROBERT TOGONON</dc:creator>
      <dc:date>2002-08-13T15:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: ACS 3.0 logging detection</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37397#M9589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are two choices in as far as the ACS 3.0 configuration is concerned - you can either implement shared profile components or you can simply add the command authorization straight to the group settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shared Profile Components (for Command Authorization Sets):  &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/csnt30/user/c.htm#xtocid1001113" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/csnt30/user/c.htm#xtocid1001113&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuring a Shell Command Authorization Set for a User Group:  &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/csnt30/user/g.htm#xtocid1197921" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/csnt30/user/g.htm#xtocid1197921&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for a NAS sample config, there is not one currently on the Cisco website, however the following is one that I had working in the lab:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;manning#wr t&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 1251 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.1&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname manning&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;aaa authentication login default group tacacs+&lt;/P&gt;&lt;P&gt;aaa authentication login console none&lt;/P&gt;&lt;P&gt;aaa authorization config-commands&lt;/P&gt;&lt;P&gt;aaa authorization exec default group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization exec console none&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 default group tacacs+&lt;/P&gt;&lt;P&gt;aaa authorization commands 15 console none&lt;/P&gt;&lt;P&gt;aaa accounting exec default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 1 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;aaa accounting commands 15 default start-stop group tacacs+&lt;/P&gt;&lt;P&gt;enable secret 5 $1$KdQu$nA9WcTUL295k9jp7jpVsK.&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; --More-- &lt;/P&gt;&lt;P&gt;2w6d: %SYS-5-CONFIG_I: Configured from console !        e&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip audit notify log&lt;/P&gt;&lt;P&gt;ip audit po max-events 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; ip address 10.64.21.251 255.255.255.240&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.64.21.241&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tacacs-server host 10.64.21.242 key cisco123&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; authorization commands 15 console&lt;/P&gt;&lt;P&gt; authorization exec console&lt;/P&gt;&lt;P&gt; login authentication console&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; authorization exec test&lt;/P&gt;&lt;P&gt; login authentication test&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no scheduler allocate&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Aug 2002 22:21:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-3-0-logging-detection/m-p/37397#M9589</guid>
      <dc:creator>albadger</dc:creator>
      <dc:date>2002-08-13T22:21:35Z</dc:date>
    </item>
  </channel>
</rss>

