08-25-2011 01:29 AM - edited 03-10-2019 06:20 PM
I've my ACS linked with AD to give administration access to few network devices and I've created an access policy to link my AD groups with those network devices and command sets.
Unfortunately I found I can use any user from my AD to login to my devices. Only LOGIN, the authorization definition is restricting the command set for those users.
How can I restrict the LOGIN to an specific AD group?
Thanks in advance.
Solved! Go to Solution.
08-26-2011 12:45 AM
Can you detail your policy configuration ?
Are you doing radius or tacacs ?
If you return an authorization profile "deny access" it should be good enough in radius. Not sure about tacacs though.
08-26-2011 12:45 AM
Can you detail your policy configuration ?
Are you doing radius or tacacs ?
If you return an authorization profile "deny access" it should be good enough in radius. Not sure about tacacs though.
08-26-2011 12:59 AM
You were right in my policy the default rule had a permit access insted of deny. I can confirm it works now and I'm using TACACS by the way.
Thanks a lot!!!!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide