<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ACS 5.4: Selective authentication (authorization) based on remot in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/acs-5-4-selective-authentication-authorization-based-on-remote/m-p/2347453#M97618</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will have to work with HP to have this remote address AV pair added. this does seem like a bug within TACACS on the HP side which will have to be addressed by them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 19 Sep 2013 05:18:10 GMT</pubDate>
    <dc:creator>Tarik Admani</dc:creator>
    <dc:date>2013-09-19T05:18:10Z</dc:date>
    <item>
      <title>ACS 5.4: Selective authentication (authorization) based on remote address.</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-selective-authentication-authorization-based-on-remote/m-p/2347452#M97592</link>
      <description>&lt;P&gt;Hi everyone!&lt;/P&gt;&lt;P&gt;Lets say I have a management pc in my network located in the same subnet as management addresses of switches (e.g. both hp and cisco; 192.168.10.0/24 is management network); &lt;SPAN style="font-size: 10pt;"&gt;PCs ip is 10.254. &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;Access to switches is controlled by the tacacs on acs 5.4;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;On the mgmt pc there is Kiwi Cattools which saves running-configs of devices to a tftp server based on a regular schedule (e.g. every 2 weeks). &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;For this purpose there is a special user &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;on the acs &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;account called "cattools", which is used by that soft to access devices and save running-configs.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Now my purpose is to disallow the usage of "cattools" for any usage from anywhere, &lt;SPAN style="text-decoration: underline;"&gt;except when the access request comes from mgmt pc 10.254 (i.e. kiwi).&lt;/SPAN&gt; The account should not be used to access devices from any other location. Here`s what I did:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the log messages from acs I notices Remote Address field contaninig an ip address of the device/pc, from which access is being made. So I created an End Station filter list (name "mgmtonly") on the acs with a single value of 192.168.10.254; Then in the access services for tacacs protocol in the Identity section I created an Identity policy saying that &lt;STRONG&gt;"if system.username=cattools AND end station filter DOESN`T MATCH &lt;SPAN style="font-size: 10pt;"&gt;mgmtonly, then Identity source is DenyAccess"; &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;This rule is followed by other rules permiiting access with the other user accounts. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;And this scheme is working: when access is being made from mgmt pc with username cattools, access is granted. From any other location it is denied.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Unfortunately, it is working &lt;STRONG&gt;only for Cisco devices&lt;/STRONG&gt; because through monitoring logs I noticed that they always send remote address to the acs server. But Hp switches lack this ability. Every time procurves access the acs server, its remote address field is empty, i.e. it doesn`t relay an ip address to the server. So the above rule is not matched and not working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Is there any solution to his, or is there more suitable solution?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 03:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-selective-authentication-authorization-based-on-remote/m-p/2347452#M97592</guid>
      <dc:creator>ILKIN GASIMOV</dc:creator>
      <dc:date>2019-03-11T03:55:12Z</dc:date>
    </item>
    <item>
      <title>ACS 5.4: Selective authentication (authorization) based on remot</title>
      <link>https://community.cisco.com/t5/network-access-control/acs-5-4-selective-authentication-authorization-based-on-remote/m-p/2347453#M97618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will have to work with HP to have this remote address AV pair added. this does seem like a bug within TACACS on the HP side which will have to be addressed by them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarik Admani &lt;BR /&gt;*Please rate helpful posts*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Sep 2013 05:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/acs-5-4-selective-authentication-authorization-based-on-remote/m-p/2347453#M97618</guid>
      <dc:creator>Tarik Admani</dc:creator>
      <dc:date>2013-09-19T05:18:10Z</dc:date>
    </item>
  </channel>
</rss>

