07-10-2013 05:22 AM - edited 03-10-2019 08:38 PM
Hello,
I am running ACS 5.4.0.46.4. I am creating command sets to restrict access for a certain group of users. Is there any way to restrict them from accessing a specific interface (Gi1/1/1 for instance)? I tried putting a "deny interface GigabitEthernet1/1/1" into the command set rules, but I am still able to access that interface?
07-10-2013 05:34 AM
Please post the screen shot of command set that you have created on ACS under policy elements.
From the end network device, get the following o/p
-debug tacacs
-debug aaa authen
-debug aaa author
-show run | in aaa
From ACS 5.4 > monitoring and logging > tacacs authorization > find the user failed attempt > clcik on the magnifying glass in front of it and attach the screen shot of that page.
~BR
Jatin Katyal
**Do rate helpful posts**
07-10-2013 05:56 AM
Actually I figured it out. I left out the space between the interface type (Gi) and number (1/1/1) in the argument.
07-10-2013 06:01 AM
Alright, that's a good news.
Here is a link to configure command authorization on ACS 5. You may want to bookmark it.
http://www.cisco.com/en/US/products/ps9911/products_configuration_example09186a0080bc8514.shtml#ade
~BR
Jatin Katyal
**Do rate helpful posts**
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide