10-16-2012 07:48 AM - edited 03-10-2019 07:40 PM
Everyone,
I have a question reguarding the Cisco Secure ACS 5.2 and network access vs device admin access. We have our switches,routers,and firewall configured to use TACACS+. We also have configured our Wireless LAN Controller to use RADIUS for allowing for 802.1X authentication to the wireless network. We are using Active Directory for the backend user database and have assigned the users to different groups in AD. We have a Network Admins group to access the network devices and a Wireless Users to access the WLAN. The problem that we have is that everyone in the Wireless Users group can access the devices and run full commands on them. We want to limit the Wireless Users group from being able to do this. Is there a policy or config change that we will need to make for this?
Thanks for any help you can provide.
JC
10-16-2012 07:58 AM
Hi,
You are sending back the wrong attributes for all user in your condition, my suggestion would be to leverage the Service-Type Radius attribute to determine which user can get the av-pair for administrative access.
The service-type attribute for dot1x users should be "framed" for admin login it should be "Login". You should be able to see this in the monitoring and reports section. Once you find this attribute then couple this with domain user group to build the correct policy.
You can also switch and use tacacs for your WLC (are these Cisco)? If so then the attribute role1=ALL should be sent back.
Thanks,
Tarik Admani
*Please rate helpful posts*
10-16-2012 08:01 AM
These are Cisco WLCs. I will try these sugguestions. I will have to wait until after hours to make the change to the WLC policy as this will knock the users off the WLAN.
10-16-2012 08:02 AM
That will work and good luck!
Tarik Admani
*Please rate helpful posts*
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide