01-19-2011 06:03 AM
hi
i'm trying to implement the following scripts :
alias exec cc event manager run CLEAR-COUNTRZ
event manager applet CLEAR-COUNTRZ
event none
action 1.0 cli command "enable"
action 2.0 cli command "clear counters" pattern "\[confirm\]"
action 3.0 cli command "y"
or another applet:
event manager applet tester
event cli pattern "^show beep" mode "exec" enter
action 1.0 syslog msg "BEEEp!"
action 1.1 puts "beeep!"
action 2.0 cli command "enable"
action 3.0 cli command "configure terminal"
action 4.0 cli command "int GigabitEthernet0/1 shut "
action 5.0 cli command "shut"
action 6.0 cli command "end"
action 7.0 exit 0
or
event manager applet tester
event cli pattern "^show beep" mode "exec" enter
action 1.0 syslog msg "BEEEp!"
action 1.1 puts "beeep!"
action 2.0 cli command "enable"
action 3.0 cli command "configure terminal"
action 4.0 cli command "hostnam" pattern "hh"
action 5.0 cli command "end"
action 6.0 exit 0
with no luck, i can't make the cli commands to work (the syslog and puts commands do work)
can anyone point me at a direction, what should i do?
got any working applet that u can send me to check
thanks
ran
the machine is :
C3560E Software (C3560E-UNIVERSALK9-M), Version 12.2(53)SE2, RELEASE SOFTWARE (fc3)
License Level: ipservices
License Type: Permanent
cisco WS-C3560E-24TD (PowerPC405) processor (revision G0) with 131072K bytes of memory.
Processor board ID FDO1431R15M
Embedded Event Manager Version 3.20
Component Versions:
eem: (v320_throttle)2.1.50
eem-gold: (v320_throttle)1.0.4
eem-call-home: (v320_throttle)1.0.4
Solved! Go to Solution.
01-19-2011 10:57 AM
Add the command:
event manager session cli username USER
Where USER is a username authorized to run all CLI commands in your EEM policies.
01-19-2011 06:27 AM
my problem is with authorization
as i cancel aa new-model , the appletts runs perfect
any suggestions how to make them work together?
my aaa configuration is:
aaa new-model
!
!
aaa authentication login default group tacacs+ local
aaa authorization exec default group tacacs+ local
aaa authorization commands 0 default group tacacs+ local
aaa authorization commands 1 default group tacacs+ local
aaa authorization commands 2 default group tacacs+ local
aaa authorization commands 3 default group tacacs+ local
aaa authorization commands 4 default group tacacs+ local
aaa authorization commands 5 default group tacacs+ local
aaa authorization commands 6 default group tacacs+ local
aaa authorization commands 7 default group tacacs+ local
aaa authorization commands 8 default group tacacs+ local
aaa authorization commands 9 default group tacacs+ local
aaa authorization commands 10 default group tacacs+ local
aaa authorization commands 11 default group tacacs+ local
aaa authorization commands 12 default group tacacs+ local
aaa authorization commands 13 default group tacacs+ local
aaa authorization commands 14 default group tacacs+ local
aaa authorization commands 15 default group tacacs+ local
aaa authorization configuration default group tacacs+
aaa accounting commands 0 default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 2 default start-stop group tacacs+
aaa accounting commands 3 default start-stop group tacacs+
aaa accounting commands 4 default start-stop group tacacs+
aaa accounting commands 5 default start-stop group tacacs+
aaa accounting commands 6 default start-stop group tacacs+
aaa accounting commands 7 default start-stop group tacacs+
aaa accounting commands 8 default start-stop group tacacs+
aaa accounting commands 9 default start-stop group tacacs+
aaa accounting commands 10 default start-stop group tacacs+
aaa accounting commands 11 default start-stop group tacacs+
aaa accounting commands 12 default start-stop group tacacs+
aaa accounting commands 13 default start-stop group tacacs+
aaa accounting commands 14 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
!
!
!
aaa session-id common
01-19-2011 10:57 AM
Add the command:
event manager session cli username USER
Where USER is a username authorized to run all CLI commands in your EEM policies.
01-23-2011 07:56 AM
thanks , it works
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide