<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AAA, Prvileged Level, Role-Based views in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/aaa-prvileged-level-role-based-views/m-p/4049062#M1067979</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;For your login using privileges you can add the command aaa authorization exec default local.&lt;BR /&gt;It will bring the user directly to the right enable mode with its privilege.&lt;BR /&gt;For views, i don't see your views config. Anyways, here is link that explains it well: &lt;A href="https://www.networkworld.com/article/2229853/easy-role-based-access-on-cisco-routers-cli-views.html" target="_blank"&gt;https://www.networkworld.com/article/2229853/easy-role-based-access-on-cisco-routers-cli-views.html&lt;/A&gt;&lt;BR /&gt;And you're right, you need to login into your view to access what you're granted to have.&lt;BR /&gt;The aaa authentication enable is required if you want people to still type in an enable password to access the device. This enable can be checked using the local enable password or checking it into tacacs for example&lt;BR /&gt;</description>
    <pubDate>Fri, 20 Mar 2020 03:08:02 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2020-03-20T03:08:02Z</dc:date>
    <item>
      <title>AAA, Prvileged Level, Role-Based views</title>
      <link>https://community.cisco.com/t5/network-security/aaa-prvileged-level-role-based-views/m-p/4047679#M1067886</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm learning about AAA, and i have a hard to correlate with what i have learned at Privileg Level and Role-Based Views . All i can test is in Packet Tracer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's take a scenario and assume I will use privilege levels 5, 10 and 15 on my router for 3 employes. We will call them user5, user10, user15 and all of them will have the password "userXpw" where X is the level. I configured the privilege levels ( what can every level do ).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do i configur local AAA Authentication ? It will be something like this ? :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;en&lt;BR /&gt;conf t&lt;BR /&gt;&lt;BR /&gt;username user5 privilege 5 password user5pw&lt;BR /&gt;username user10 privilege 10 password user01pw&lt;BR /&gt;username user15 privilege 15 password user15pw&lt;BR /&gt;&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa authentication login default local&lt;BR /&gt;&lt;BR /&gt;line vty 0 15&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; login authentication default&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;But if i do this every time i log in into the router, i got at prvilege level 1, dosen't matter what user i use, what am i missing ?&lt;/P&gt;&lt;P&gt;Why when i log with a user that has level 10 i get at level 1 ? I expect to be at privilege level 5 ,10 ,15, depending on what user i use. Also, what effect in this case will have the command (config-line)#privilege level X&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now let's assume the same scenario, but i want server-based AAA. How do i config the router ? Some thing like this ?&lt;/P&gt;&lt;LI-SPOILER&gt;en&lt;BR /&gt;conf t&lt;BR /&gt;&lt;BR /&gt;aaa new-model&lt;BR /&gt;radius-server host 192.168.0.5 auth-port 1812&lt;BR /&gt;radius-server key aaasecret&lt;BR /&gt;&lt;BR /&gt;aaa authentication login default group radius enable&lt;BR /&gt;&lt;BR /&gt;line vty 0 15&lt;BR /&gt;&amp;nbsp; login authentication default&lt;BR /&gt;&lt;BR /&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;But now when i configure the RADIUS server i dont specify a privilege levels. And when i log in into the router, i get at privilege level 1, again. So again, what am i missing ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should i make enable passwords for every level and when people log in with their user they would be at level 1 and after that they use "enable X" command ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That was on privileged level. Now with Role-Based views. Let's assume i configured 3 views for 3 employes : view1, view2, view3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For local base AAA it will be something like this ?&lt;/P&gt;&lt;LI-SPOILER&gt;en&lt;BR /&gt;conf t&lt;BR /&gt;aaa new-model&lt;BR /&gt;exit&lt;BR /&gt;enable root&lt;BR /&gt;conf t&lt;BR /&gt;&lt;BR /&gt;Commands//VIEW Configuration&lt;BR /&gt;&lt;BR /&gt;username user1 password user1&lt;BR /&gt;username user2 password user2&lt;BR /&gt;username user3 password user3&lt;BR /&gt;&lt;BR /&gt;line vty 0 15&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; login local&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; privilege level 1 // (or 0 maybe ? )&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;Now kinda makes sense that you log in the router with your credentials and then you log into your view with "enable view X" where X is the name of the view.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And with server-based AAA it will be the same. I would configure 3 users and after they log in into the router, they would log in into the view.&lt;/P&gt;&lt;P&gt;Am I right, am&amp;nbsp; I missing something ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2)&lt;/P&gt;&lt;P&gt;When i configured the list for authentication, i can configure fallbacks option. For exemple&lt;/P&gt;&lt;LI-SPOILER&gt;aaa authentication login LIST-FOR-SSH group radius local&lt;/LI-SPOILER&gt;&lt;P&gt;If the radius server is unreacheable, i can log in with a local user. But when i get at login , how do i know that it asks me for the credentials from the radius server or&amp;nbsp; from local date base ? Do i just try the second one if the first doesn't work ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3)&lt;/P&gt;&lt;P&gt;With AAA, I see i can configure a authentication list for the enable:&lt;/P&gt;&lt;P&gt;(config)aaa authentication enable default ____ { group / enable / none }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the purpouse, how would that look in a plausible scenario, how would i use it ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your time reading this and trying to help me,&lt;/P&gt;&lt;P&gt;Radu&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2020 21:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-prvileged-level-role-based-views/m-p/4047679#M1067886</guid>
      <dc:creator>radumihai</dc:creator>
      <dc:date>2020-03-17T21:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: AAA, Prvileged Level, Role-Based views</title>
      <link>https://community.cisco.com/t5/network-security/aaa-prvileged-level-role-based-views/m-p/4049062#M1067979</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;For your login using privileges you can add the command aaa authorization exec default local.&lt;BR /&gt;It will bring the user directly to the right enable mode with its privilege.&lt;BR /&gt;For views, i don't see your views config. Anyways, here is link that explains it well: &lt;A href="https://www.networkworld.com/article/2229853/easy-role-based-access-on-cisco-routers-cli-views.html" target="_blank"&gt;https://www.networkworld.com/article/2229853/easy-role-based-access-on-cisco-routers-cli-views.html&lt;/A&gt;&lt;BR /&gt;And you're right, you need to login into your view to access what you're granted to have.&lt;BR /&gt;The aaa authentication enable is required if you want people to still type in an enable password to access the device. This enable can be checked using the local enable password or checking it into tacacs for example&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Mar 2020 03:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/aaa-prvileged-level-role-based-views/m-p/4049062#M1067979</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2020-03-20T03:08:02Z</dc:date>
    </item>
  </channel>
</rss>

