10-02-2004 07:29 AM - edited 03-10-2019 01:50 PM
I use the CISCO Secure ACS 3.3 for windows and 2511 as a Network Access Server with sixteen host map for reverse-telnet. All people use the reverse-telnet connect to my routers. i just want some people can login a part of the routers. I look for some case. but all configuration is for UNIX version. How can config the Windows version ACS authorization user use some host map.
thanks.
10-07-2004 01:27 PM
This might give you some idea,
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs33/user/index.htm
10-08-2004 06:30 AM
If you only want certian people to have access to certian devices or certian commands on certian devices, you are going to have to do several things. FIrst you are going to have to use TACASS+ because RADIUS does not support "SHELL COMMAND AUTHORIZATION SETS". You can set this up through the "Shared Profile Components" tab. Here you can specifiy what commands people have access to. Next you have to assign the devices to "Network Device Groups" and users to specific groups. Under the group settings, go to "TACACS+ Setting". Check the Shell(Exec) box and the Privilege level box and assign it to 15. Scroll down to the Shell Command Authorization Set area. Choose the "Assign a Shell Command Authorization Set on a per Network Device Group Basis" option. Here you can assign a specific shell command authorization set to a specific network device group.
Then you must configure you device(s) to use this function. Your config should look something like this:
!
aaa new-model
aaa authentication login default group tacacs+ line
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting exec default start-stop group tacacs+
aaa authorization config-commands
aaa authorization commands 0 default group tacacs+ if-authenticated
aaa authorization commands 1 default group tacacs+ if-authenticated
aaa authorization commands 15 default group tacacs+ if-authenticated
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 0 default stop-only group tacacs+
aaa accounting commands 1 default stop-only group tacacs+
aaa accounting commands 15 default stop-only group tacacs+
!
tacacs-server host x.x.x.x key ***********
!
end
10-19-2005 06:40 AM
What if I don't have access to a TACACS+ server? Can it be done in IOS on the box?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide