09-14-2016 07:29 AM - edited 03-11-2019 12:04 AM
We have a service account in our ACS that will need to do a show running-config in our devices and nothing else. I've been trying to have ACS dictate what commands the account can and cannot use but it seems I can't get the system to lock down the user's permissions without having those permissions explicitly defined in a custom privilege level in each device. Which, with hundreds of devices, isn't exactly feasible.
Anyone have any suggestions?
09-14-2016 07:35 AM
This requires configuration on both ACS, and the target devices.
On your routers, switches, etc., configure exec authorization, for example:
aaa authorization exec default group tacacs+ local
On ACS, create a command set, then associate it with the corresponding authorization policy. In the command set, list the commands you wish to allow (in this case "show running-config"), and disallow all other commands (it's a checkbox in the same config screen).
Javier Henderson
Cisco Systems
09-14-2016 08:36 AM
Ok, we already have AAA configured in this manner on all devices.
But even after defining explicit commands in the command set I can still log in with the account in question and perform any command I want despite what I told ACS to authorize.
It would seem that ACS is letting the account log in then not dictating what it can or cannot do past that. I've also tried creating a whole new authorization policy specifically for this user account and it didn't make a difference.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide