05-31-2022 03:10 AM
hi everyone
i configure AAA all command deny and permit working will but the specific interface not be deny
05-31-2022 03:30 AM
- On which platform(/model) are you trying this ?
M.
05-31-2022 09:53 PM
i use ISE 3.1
05-31-2022 03:32 AM
That should work, what ISE version, waht Device is this :
check other example as below :
How do you create TACACS+ policies that can be applied to the Network device?
https://ciscocustomer.lookbookhq.com/iseguidedjourney/ISE-device-admin-policy-sets
05-31-2022 09:53 PM
i use ISE version 3.1
06-01-2022 08:13 PM
The argument for the interface should replace / with a space character and G should be in capital, like this:
GigabitEthernet 1 0 1
06-01-2022 10:58 PM
06-02-2022 09:21 AM
Check the T+ livelog or reports and see how the command is coming in as. You may also try capturing the packets and then AskF5: K40341514: How to decrypt the encrypted portion of TACACS+ traffic.
06-04-2022 12:06 AM
06-05-2022 03:57 PM
Try
GigabitEthernet 1\/0\/1
marce1000 asked you earlier
> On which platform(/model) are you trying this ?
I tried it in one of our lab pods with a Cisco Catalyst 3650 on IOS-XE 3.6.10E and ISE able to reject a command as expected.
I used two command sets when the user logged-in:
1) helpDeskCmds
2) iosSecCmds
When the user issued a command like "interface g1/0/2" and the authZ failed.
3k-access#conf t Enter configuration commands, one per line. End with CNTL/Z. 3k-access(config)#interface g1/0/2 Command authorization failed.
The switch I tested sent the command as "interface GigabitEthernet 1 0 2"
06-08-2022 12:43 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide