cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1238
Views
0
Helpful
1
Replies

AAA NX-OS

supercell29
Level 1
Level 1

Hello,

  Trying to add the following from a SAN-OS fabric switch to a NX-OS switch:

  1. aaa new-model

aaa authentication login default group tacacs+ local

aaa authentication enable default group tacacs+ enable

aaa authentication ppp default local

aaa authorization exec default group tacacs+ local

aaa authorization commands 15 default group tacacs+ local

aaa accounting exec default start-stop group tacacs+

aaa accounting commands 1 default start-stop group tacacs+

aaa accounting commands 15 default start-stop group tacacs+

NX-OS took aaa authorization exec default group tacacs+ local, but does not like aaa authorization commands 15 default group tacacs+ local. How does one assign priviledges to tacacs+ logins?

Thank you in advance.

1 Reply 1

Tarik Admani
VIP Alumni
VIP Alumni

Here is the reference guide for the most recent release of NX-OS, please keep in mind that RBAC is already configured so you dont need to enable command authorization if you are satisfied with the roles that nexus comes with. If you wish to setup command authorization sets on the ACS then the command that you are looking for is:

http://www.cisco.com/en/US/docs/switches/datacenter/sw/5_x/nx-os/security/command/reference/sec_cmds_a.html#wp1068057

Let me know if that helps:

Here is a guide that may help you with integrating ACS with nexus using RBAC - https://supportforums.cisco.com/docs/DOC-14273

keep in mind the attribute is set to mandatory since this is a dedicate av-pair for the nexus authorizatoin profile.

Thanks.

Tarik