<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Neno, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953338#M911096</link>
    <description>&lt;P&gt;Neno,&lt;/P&gt;
&lt;P&gt;Here are the AAA commands we're using. The attributes we are returning&amp;nbsp;are TACACS+ and the secret key. It looks if I enable the "feature privilege" command from global config this might prompt me for the enable login? Also, you notice that my privilege level is currently -1 when logged in.&lt;/P&gt;
&lt;P&gt;aaa group server tacacs+ #######&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server ##.#.#.### &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-interface Vlan###&lt;BR /&gt;aaa authentication login default group ###### &lt;BR /&gt;aaa authentication login console local &lt;BR /&gt;aaa authorization commands default group ####### &lt;BR /&gt;aaa accounting default group ###### &lt;BR /&gt;aaa authentication login error-enable &lt;BR /&gt;tacacs-server directed-request&lt;/P&gt;
&lt;P&gt;------------------------------------------------&lt;/P&gt;
&lt;P&gt;tacacs-server key 7 "#########"&lt;BR /&gt;ip tacacs source-interface Vlan##&lt;BR /&gt;tacacs-server timeout 3&lt;BR /&gt;tacacs-server host ##.#.#.### key 7 "#########"&lt;BR /&gt;aaa group server tacacs+ groupname&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server ##.#.#.###&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-interface Vlan##&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;# show privilege&lt;BR /&gt;User name: ###########&lt;BR /&gt;Current privilege level: -1&lt;BR /&gt;Feature privilege: Disabled&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;--------------------------------------------&lt;BR /&gt;# show tacacs-server&lt;BR /&gt;Global TACACS+ shared secret:########&lt;BR /&gt;timeout value:3&lt;BR /&gt;deadtime value:0&lt;BR /&gt;source interface:Vlan##&lt;BR /&gt;total number of servers:1&lt;/P&gt;
&lt;P&gt;following TACACS+ servers are configured:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##########:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; available on port:49&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TACACS+ shared secret:#######&lt;/P&gt;</description>
    <pubDate>Wed, 24 Aug 2016 21:18:08 GMT</pubDate>
    <dc:creator>douglas.mckee</dc:creator>
    <dc:date>2016-08-24T21:18:08Z</dc:date>
    <item>
      <title>NEXUS 9396PX authentication through ACS 5.4 issue</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953336#M911094</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We just purchased three Nexus-9396PX switches and can currently authenticate through our ACS 5.4 server. The issue is it drops straight into the enable mode without prompting for the "enable" password. Also, when you try to save a config change it states you're in the wrong context. The settings in our ACS 5.4 server is the same for all our IOS devices but didn't see any "login authentication" command for the vty lines on our Nexus switches. Is there another equivalent command or something else we need to change to prompt for the "enable" password when logging in?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;***We can save config changes when logged in directly through the console port***&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank You,&lt;/P&gt;
&lt;P&gt;Doug&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953336#M911094</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2020-02-21T13:53:24Z</dc:date>
    </item>
    <item>
      <title>Hi Doug, the AAA process on</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953337#M911095</link>
      <description>&lt;P&gt;Hi Doug, the AAA process on NX-OS is a bit different than IOS. Can you provide me with:&lt;/P&gt;
&lt;P&gt;1. The attributes that you are returning with the authorization profile&lt;/P&gt;
&lt;P&gt;2. The AAA related commands that you have configured on the switch&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 00:37:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953337#M911095</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-08-24T00:37:51Z</dc:date>
    </item>
    <item>
      <title>Neno,</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953338#M911096</link>
      <description>&lt;P&gt;Neno,&lt;/P&gt;
&lt;P&gt;Here are the AAA commands we're using. The attributes we are returning&amp;nbsp;are TACACS+ and the secret key. It looks if I enable the "feature privilege" command from global config this might prompt me for the enable login? Also, you notice that my privilege level is currently -1 when logged in.&lt;/P&gt;
&lt;P&gt;aaa group server tacacs+ #######&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server ##.#.#.### &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-interface Vlan###&lt;BR /&gt;aaa authentication login default group ###### &lt;BR /&gt;aaa authentication login console local &lt;BR /&gt;aaa authorization commands default group ####### &lt;BR /&gt;aaa accounting default group ###### &lt;BR /&gt;aaa authentication login error-enable &lt;BR /&gt;tacacs-server directed-request&lt;/P&gt;
&lt;P&gt;------------------------------------------------&lt;/P&gt;
&lt;P&gt;tacacs-server key 7 "#########"&lt;BR /&gt;ip tacacs source-interface Vlan##&lt;BR /&gt;tacacs-server timeout 3&lt;BR /&gt;tacacs-server host ##.#.#.### key 7 "#########"&lt;BR /&gt;aaa group server tacacs+ groupname&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; server ##.#.#.###&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-interface Vlan##&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;# show privilege&lt;BR /&gt;User name: ###########&lt;BR /&gt;Current privilege level: -1&lt;BR /&gt;Feature privilege: Disabled&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;--------------------------------------------&lt;BR /&gt;# show tacacs-server&lt;BR /&gt;Global TACACS+ shared secret:########&lt;BR /&gt;timeout value:3&lt;BR /&gt;deadtime value:0&lt;BR /&gt;source interface:Vlan##&lt;BR /&gt;total number of servers:1&lt;/P&gt;
&lt;P&gt;following TACACS+ servers are configured:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ##########:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; available on port:49&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TACACS+ shared secret:#######&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 21:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953338#M911096</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2016-08-24T21:18:08Z</dc:date>
    </item>
    <item>
      <title>Thank you for providing the</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953339#M911097</link>
      <description>&lt;P&gt;Thank you for providing the info! My comments below:&lt;/P&gt;
&lt;P&gt;- NX-OS does not have/use the concept of "enable password/secret" This is a function of IOS. Thus, NX-OS only offers two different shell levels while IOS offers three. Instead, NX-OS controls privileges through "roles" that you must return in your Authorization Profiles. Her is a good link describing this in more detail:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/guide_c07-665160.html"&gt;http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/guide_c07-665160.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;- If you use TACACS+ you can still create command based Authorization and restrict command usage via command-set profiles&lt;/P&gt;
&lt;P&gt;- For instance, if you are not using VDCs and you want to have a &lt;STRONG&gt;full admin&lt;/STRONG&gt; and a &lt;STRONG&gt;read-only&lt;/STRONG&gt; account you would return the following attributes:&lt;/P&gt;
&lt;P&gt;Admin:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;shell:roles="network-admin"&lt;/PRE&gt;
&lt;P&gt;Read-Only:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;shell:roles="network-operator"&lt;/PRE&gt;
&lt;P&gt;- Now let's say do use VDCs and want to have a full admin and read-only account for the admin VDC. Then you would return the following attributes:&lt;/P&gt;
&lt;P&gt;Admin:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;shell:roles="vdc-admin"&lt;/PRE&gt;
&lt;P&gt;Read-Only:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;shell:roles="vdc-operator"&lt;/PRE&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Aug 2016 01:24:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953339#M911097</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-08-27T01:24:37Z</dc:date>
    </item>
    <item>
      <title>Good Morning Neno,</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953340#M911098</link>
      <description>&lt;P&gt;Good Morning Neno,&lt;/P&gt;
&lt;P&gt;Thanks for the info! The path listed below I found 2 "rules". The 2nd rule pertains to Nexus and when I move it to the top position I have "admin" access to the Nexus devices but lose login capability to the rest of our network. There's an exception policy link listed above in our TACACS+ server but not sure if this would remedy this situation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Path:&lt;/P&gt;
&lt;P&gt;ACCESS Policies&amp;gt;&amp;gt;Access Services&amp;gt;&amp;gt;Authorization&lt;/P&gt;
&lt;P&gt;"Device Administration Authorization Policy"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Manual:&lt;/P&gt;
&lt;P&gt;TACACS+ and RADIUS Attributes for Various Cisco and Non-Cisco Devices Configuration Example&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/secure-access-control-system/115926-tacacs-radius-devices-00.html#cex&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2016 15:21:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953340#M911098</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2016-08-29T15:21:51Z</dc:date>
    </item>
    <item>
      <title>Hi Doug-</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953341#M911099</link>
      <description>&lt;P&gt;Hi Doug-&lt;/P&gt;
&lt;P&gt;What you need to do is create two different rules and make them unique enough so they don't overlap. For instance, I have always used "Device Type" in my authorization policies to distinguish between: IOS, ASA, WLCs, NX-OS, etc. So for your example, you can have:&lt;/P&gt;
&lt;P&gt;Authorization Rule #1: NDG:Device Type = Nexus &amp;gt;&amp;gt; Then NX-OS_Authorization_Profile&lt;/P&gt;
&lt;P&gt;Authorization Rule #2: NDG:Device Type = IOS &amp;gt;&amp;gt; Then IOS_Authorization_Profile&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 23:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953341#M911099</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2016-08-31T23:09:58Z</dc:date>
    </item>
    <item>
      <title>Good Morning Neno,</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953342#M911101</link>
      <description>&lt;P&gt;Good Morning Neno,&lt;/P&gt;
&lt;P&gt;We currently have unique authorization policies such as IOS, ASA, WLCs, NX-OS.&lt;/P&gt;
&lt;P&gt;Under "Device Administration&amp;gt;&amp;gt;Shell Profiles I added the attributes listed below but still no luck. Should I try changing the Authorization rule to TACACS+ for the "Dictionary"?&lt;/P&gt;
&lt;P&gt;Changed First:&lt;/P&gt;
&lt;P&gt;Nexus attributes Attribute:cisco-av-pair&lt;/P&gt;
&lt;P&gt;Value:shell:roles*"network-admin vdc-admin"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Changed 2nd: Device Administration&amp;gt;&amp;gt;Shell Profiles&amp;gt;&amp;gt;"Common Tasks"&lt;/P&gt;
&lt;P&gt;Default Privilege 1&lt;/P&gt;
&lt;P&gt;Maximum Privilege 15&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Current privilege level when logged in:&lt;/P&gt;
&lt;P&gt;Current privilege level: -1&lt;/P&gt;
&lt;P&gt;Feature privilege: Disabled&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank You,&lt;/P&gt;
&lt;P&gt;Doug&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2016 16:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953342#M911101</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2016-09-02T16:06:01Z</dc:date>
    </item>
    <item>
      <title>Neno,</title>
      <link>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953343#M911103</link>
      <description>&lt;P&gt;Neno,&lt;/P&gt;
&lt;P&gt;When I do the show user-account on our Nexus switch I get the below output.&lt;/P&gt;
&lt;P&gt;user:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; roles:network-admin vdc-admin&lt;BR /&gt;account created through REMOTE authentication&lt;BR /&gt;Credentials such as ssh server key will be cached temporarily only for this user account&lt;BR /&gt;Local login not possible&lt;/P&gt;
&lt;P&gt;***My current privilege level is still -1***&lt;/P&gt;
&lt;P&gt;The enable command according to documentation I've been reading only shows up if you have the "Feature Privilege" command enabled. Do you think I need to enable this command to elevate my privileges?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Doug&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2016 17:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nexus-9396px-authentication-through-acs-5-4-issue/m-p/2953343#M911103</guid>
      <dc:creator>douglas.mckee</dc:creator>
      <dc:date>2016-09-02T17:59:23Z</dc:date>
    </item>
  </channel>
</rss>

