Network Access Control

Cisco Access Control Server (ACS), Identity Services Engine (ISE), Zero Trust Workplace
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
This community is for technical, feature, configuration and deployment questions.
For production deployment issues, please contact the TAC! We will not comment or assist with your TAC case in these forums.
Please see How to Ask the Community for Help for other best practices.

Labels

Forum Posts

HI,I have created a one line downloadble access-list in Cisco ACS to deny a host. deny tcp any host 192.168.115.1 eq 22 and assinged it to a user and group. when I try ssh it should be denied but it works. Thx for the help in advance

kanwar by Level 1
  • 1964 Views
  • 4 replies
  • 0 Helpful votes

Hi all,I am/will be beginning a deployment of dot1x to our campus. We will be authenticating to a Windows 2003 IAS Domain Controller, but I have a few questions before we begin:1) I have found no documentation as to the setup of switchports in rega...

aaronr by Level 1
  • 857 Views
  • 2 replies
  • 0 Helpful votes

I would like to use TACACS+ authorization for allowing some limited allowed commands for a particular group, on a TACACS+ authenticated user. When i allow the group enable, i can't seem to limit the command level. aaa-server TACACS_SVR protocol tacac...

I have enabled "aaa authentication exclude" commad statement on PIX (6.3).This excludes the Hosts for which the Firewall doesnot prompt for authentication.What is the best way to add more lines into it.Do i have to remove all the commands and then al...

rpsrekhi3 by Level 1
  • 950 Views
  • 1 replies
  • 0 Helpful votes

Dear Friends.... i am facing a problem in my ACS System .... the thing is thati am giving access through VPN and users can access to local resource and they are been Authinticate through the WINDOWS ACTIVE DIRECTORY but suddenly they can not access w...

Hello Team,Please let me know whether I can configure Show Running-config at level 10 login. How can I see what all commands are available at a level other than 15. In other words what all command can be authorized at a level other than 15?Can I conf...

s.surani by Level 1
  • 486 Views
  • 1 replies
  • 0 Helpful votes

Okay here is a weird one:We use ASA'es for both IPSec and SSL VPN. The device use Radius against ACS for user authentication. The user database pulls from Active Directory. We also use the same ACS for TACACS for routers (also pulling passwords fro...

jlefko by Level 1
  • 569 Views
  • 3 replies
  • 0 Helpful votes