<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD Shell Restrictions with RADIUS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229091#M1117799</link>
    <description>&lt;P&gt;above was for FMC GUI&lt;/P&gt;
&lt;P&gt;for FTD Yes you need NAS prompt&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Tue, 26 Nov 2024 15:28:07 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2024-11-26T15:28:07Z</dc:date>
    <item>
      <title>FTD Shell Restrictions with RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5228705#M1117786</link>
      <description>&lt;P&gt;Model: FPR1120&lt;BR /&gt;Version: 7.4.2&lt;BR /&gt;&lt;BR /&gt;I am in the process of attempting to lock down shell access to basic so that our ACAS system can safely access the FTD per our scan policy.&lt;/P&gt;
&lt;P&gt;We have configured RADIUS to work with both the FMC and FTD and can successfully login. When accessing the FTD shell my account is returning config level permissions.&lt;/P&gt;
&lt;P&gt;RADIUS Attributes configured on ISE:&lt;/P&gt;
&lt;P&gt;Access Type = ACCESS_ACCEPT&lt;/P&gt;
&lt;P&gt;Class = ReadUser&amp;nbsp;&amp;nbsp; (This is for FMC access specifically)&lt;/P&gt;
&lt;P&gt;cisco-av-pair = shell:level=0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suspect that my AV pair is wrong but the documentation seems to be elusive. I cannot configure the account type manually via the local admin or my standard (admin) RADIUS account.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any and all assistance is greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2024 22:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5228705#M1117786</guid>
      <dc:creator>stephan.l.martin1</dc:creator>
      <dc:date>2024-11-25T22:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Shell Restrictions with RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5228851#M1117788</link>
      <description>&lt;P&gt;is this radius server ISE or any other vendor&lt;/P&gt;
&lt;P&gt;you can create a different profile and use it as admin or read-only check this guide :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/221009-configure-fmc-and-ftd-external-authentic.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-user-service-radius/221009-configure-fmc-and-ftd-external-authentic.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 08:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5228851#M1117788</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2024-11-26T08:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Shell Restrictions with RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229071#M1117795</link>
      <description>&lt;P&gt;Greetings!&lt;/P&gt;
&lt;P&gt;We are using ISE as the RADIUS server and have it fully operational/configured for RADIUS authentication with the FMC and FTD. The current issue that I am running into (and will review the document you provided) is that even when forcing the profile to use the ReadOnly authorization profile I still have expert level access which I am looking to lock down. The RADIUS attributes above are configured on the ReadOnly profile.&lt;/P&gt;
&lt;P&gt;I will review the document and come back with any results.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 14:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229071#M1117795</guid>
      <dc:creator>stephan.l.martin1</dc:creator>
      <dc:date>2024-11-26T14:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Shell Restrictions with RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229074#M1117796</link>
      <description>&lt;P&gt;friend FMC dont use privilege level it use role&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (198).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/234596i31B193C10FA445A6/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (198).png" alt="Screenshot (198).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 15:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229074#M1117796</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-26T15:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Shell Restrictions with RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229088#M1117798</link>
      <description>&lt;P&gt;Unfortunately the document provided is almost explicitly for GUI access. I followed this guide to configure RADIUS authentication initially.&lt;BR /&gt;&lt;BR /&gt;This guide:&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/710/fdm/fptd-fdm-config-guide-710/fptd-fdm-mgmt.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/710/fdm/fptd-fdm-config-guide-710/fptd-fdm-mgmt.html&lt;/A&gt; does reference a separate AV-Pair (service-type:NAS Prompt) which I am digging into.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 15:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229088#M1117798</guid>
      <dc:creator>stephan.l.martin1</dc:creator>
      <dc:date>2024-11-26T15:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Shell Restrictions with RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229091#M1117799</link>
      <description>&lt;P&gt;above was for FMC GUI&lt;/P&gt;
&lt;P&gt;for FTD Yes you need NAS prompt&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 15:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229091#M1117799</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-11-26T15:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD Shell Restrictions with RADIUS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229102#M1117800</link>
      <description>&lt;P&gt;Solution:&lt;/P&gt;
&lt;P&gt;Configuring administrative CLI user access list under external authorization servers overrides RADIUS attributes that are sent. I removed all users from the list and configured Service-Type:Administrative for my RW group and NAS Prompt for the RO group. I will work with Cisco to update the documentation so that this behavior is identified/documented.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 15:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-shell-restrictions-with-radius/m-p/5229102#M1117800</guid>
      <dc:creator>stephan.l.martin1</dc:creator>
      <dc:date>2024-11-26T15:50:05Z</dc:date>
    </item>
  </channel>
</rss>

