10-06-2016 04:15 AM
Hi All,
I’m hoping you can help with an issue I have with TACACS Device Admin on ISE 2.1
In Device Administration > Device Admin Policy Sets , I’ve created a new policy which has:
The TACACS live log shows that authentication passed with the intended authentication rule (checking through AD), it also shows the correct
Authorization rule being called upon (which also checks a user based on an AD group) however the only thing working from that is when a user
logs in the default priviledge is set to 1.
Commands are not restricted based on the command set and using the enable command the user can still go into priviledge level 15.
It seems somehow the Authorization rule (command set/profile) is not being utilized fully?
Essentially I just need the authorization rule to restrict the users within that specific AD group to have access to priviledge level 1, and only able to execute read only commands.
Regards
Shams
Solved! Go to Solution.
10-06-2016 07:44 PM
ISE Device Administration (TACACS+) might help you.
Your configuration seems missing "aaa authentication enable ..."
Once that in, we would expect it failing right after issuing "enable". Below is a result I got in our lab setup:
Other Attributes
...
10-06-2016 04:20 AM
Can you share the aaa configuration from your nad?
Warning: I either dictated this to my device, or typed it with my thumbs. Erroneous words are a feature, not a typo.
10-06-2016 05:26 AM
Hi George,
Thanks for your reply - config wise:
aaa authentication login Use_Tacacs group tacacs+ line
aaa authentication login No_Tacacs line
aaa authorization exec Use_Tacacs group tacacs+ if-authenticated none
aaa authorization commands 1 Tacacs_Auth group tacacs+ if-authenticated none
aaa authorization commands 15 Tacacs_Auth group tacacs+ if-authenticated none
line vty 0 4
exec-timeout 5 0
password .......
authorization commands 1 Tacacs_Auth
authorization commands 15 Tacacs_Auth
authorization exec Use_Tacacs
logging synchronous
login authentication Use_Tacacs
As an update I've got the command restrictions to work, by taking off ' * ' in the arguments field. I put a star in there thinking it will include all subcommands which i can use with a permit. I took it off and the permit command was working as expected. What isn't working is if I put 'deny_always' (or deny) under the Grant column, and 'enable' under the Command column (with or without an argument).
Although command restrictions are working the user can still go into priviledged exec mode/15, even if default privilege & maximum privilege is set to 1 on the tacacs profile.
In the detailed tacacs log I get this when logging in:
All Request Attribues | |
All Response Attribues | priv-lvl=1 |
Response {Author-Reply-Status=PassAdd; AVPair=priv-lvl=1; }
10-06-2016 07:44 PM
ISE Device Administration (TACACS+) might help you.
Your configuration seems missing "aaa authentication enable ..."
Once that in, we would expect it failing right after issuing "enable". Below is a result I got in our lab setup:
Other Attributes
...
10-07-2016 01:34 AM
Excellent thanks very much, fixed it!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide