06-11-2020 06:19 AM
I'm running ISE 2.7 and testing a read-only account to scan a network device (2960 switch) to do vulnerability scans.
Ext Id Source is Active Directory and following TACACS setup below:
TACACS Command Set
TACACS Profile
Device Admin Policy Set
Authentication
Authorization
And when I drill down to the detailed information in TACACS Log it stops with 13209 Requested privilege level too high.
Not sure what the next steps are if I need to change Shell Privilege on Authorization? or is this directed at something else.
Solved! Go to Solution.
06-11-2020 09:04 AM
Hi @JaVa808
Privilege means nothing when you have Command Authorization. Remove Privilege 0, and give Priv 15.
You can verify that the user will not be able to run anything except the show command (that you allowed).
I personally do not recommend various privileges when all control is delivered through Command Authorization. The 'show' command is actually really tricky such that 'show clock' is priv 1 but 'show run' is priv 15. So, it's not a good approach.
Try it out. If you have another use-case, we can discuss here.
06-15-2020 10:27 AM
It's (assigning priv 15 and restrictive command-set) not a "hack" (workaround). It's a legit method of doing things while maintaining access control.
In the article you linked, they mentioned the following:
If you have Cisco ACS (TACACS+) server, it would be easy to control permitted commands with the dedicated user account for the Nessus scanner. If you don’t have Cisco ACS server, try the following way to achieve the goal.
The method was simply assigning custom privileges to certain commands like 'show run'. There are many reasons why this method should not be adopted in the presence of a TACACS server. But the best one was the one that made you open the case :)
06-11-2020 09:04 AM
Hi @JaVa808
Privilege means nothing when you have Command Authorization. Remove Privilege 0, and give Priv 15.
You can verify that the user will not be able to run anything except the show command (that you allowed).
I personally do not recommend various privileges when all control is delivered through Command Authorization. The 'show' command is actually really tricky such that 'show clock' is priv 1 but 'show run' is priv 15. So, it's not a good approach.
Try it out. If you have another use-case, we can discuss here.
06-15-2020 09:24 AM
Thanks Anurag for your reply.
So in the policy - change it to Priv 15
then TACACS Command Set define the commands that the scanner needs to do a deep dive on?
Also I did stumble upon this read, https://www.ipbalance.com/security/why-tenable-nessus-requires-full-level-15-access-for-cisco-devices-dont-need-it/.
I wonder if at this point i define all those or just give it Priv 15. probably the second for less work.
06-15-2020 10:27 AM
It's (assigning priv 15 and restrictive command-set) not a "hack" (workaround). It's a legit method of doing things while maintaining access control.
In the article you linked, they mentioned the following:
If you have Cisco ACS (TACACS+) server, it would be easy to control permitted commands with the dedicated user account for the Nessus scanner. If you don’t have Cisco ACS server, try the following way to achieve the goal.
The method was simply assigning custom privileges to certain commands like 'show run'. There are many reasons why this method should not be adopted in the presence of a TACACS server. But the best one was the one that made you open the case :)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide