10-09-2019 02:03 AM - edited 02-21-2020 11:10 AM
I have created a TACACS policy that allows Helpdesk User group from AD to access switches with a shell profile of default privilege 1 and max privilge of 15 and command sets with limited options.
On testing this policy, its giving the user full access on the switch. I am unable to determine whats the cause and how to fix this.
ISE version - 2.4.0.357 and patch - 5,9.
Below is summary of my troubleshooting attempts,
Switch config :
aaa authentication login default group tacacs+ local aaa authentication login DeviceMan group DeviceMan_ISE local enable aaa authentication dot1x default group ise-group aaa authorization exec DeviceMan group DeviceMan_ISE local aaa authorization exec vty local none aaa authorization network default group ise-group aaa authorization commands 15 DeviceMan group DeviceMan_ISE local none aaa authorization auth-proxy default group ise-group aaa authorization config-commands aaa accounting auth-proxy default start-stop group ise-group aaa accounting dot1x default start-stop group ise-group aaa accounting update periodic 5
Can anyone please assist me finding the rootcause of this issue and a possible solution ?
Thanks in advance!
Update: Added Switch config
10-09-2019 07:05 AM
First, verify in the ISE TACACS Live Logs that you are hitting the correct authorization rule and that you are seeing the switch send the command authorization request to ISE for when you are typing commands. Your configuration looks fine assuming that you have the "DeviceMan" group assigned to the correct lines on the switch. For SSH, vty 0 15.
In the Live Logs, you should see a request for your user typing the command "shutdown" and ISE should show whether it was allowed or denied and what rule was hit.
Can you send screenshots of your Live Logs and your command set?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide