07-21-2005 04:54 PM
Hi Guys
I have my SecureACS working well with Cisco devices, and have just completed a basic tacacs setup that works on my Juniper routers.
I want to use the groups already defined in ACS to deploy permit/deny commands to for the Juniper routers - how is this done within Secure ACS for windows?
I can see how its done in unix:
To specify these attributes, include a service statement in the TACACS+ server configuration file of the following form:
service = junos-exec {
local-user-name = <username-local-to-router>
allow-commands = "<allow-commands-regexp>"
deny-commands = "<deny-commands-regexp>"
}
Any ideas? Thank you guys
07-27-2005 11:02 AM
In addition to supporting a set of predefined RADIUS vendors and vendor-specific attributes (VSAs), CiscoSecure ACS supports RADIUS vendors and VSAs that you define. Cisco Secure ACS also supports up to 10 RADIUS VSAs that you define. You can use the -addUDV option to add up to ten custom RADIUS vendors and VSA sets to CiscoSecure ACS. Each RADIUS vendor and VSA set is added to one of ten possible user-defined RADIUS vendor slots.
http://www.cisco.com/univercd/cc/td/doc/product/access/acs_soft/csacs4nt/acs31/acsuser/ad.htm#984536
07-27-2005 02:23 PM
I am not using RADIUS, I am using TACACS - the links only provide information on RADIUS
08-08-2005 03:08 AM
We have do some tests ACS with Juniper.
I "Interface configuration" add new servies junos-exec without anu protocol, set user and groups (what you prefer), and you can see at user/group configuration new service.
Mark junos-exec as active, mark Custom attributes and enter e.g.:
local-user-name=users1
allow-commands=(show version)|(show configuration)
It should work. :)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide