cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
678
Views
1
Helpful
1
Replies

Cisco ACL's and Views (RBAC)

misterpm
Level 1
Level 1

We'd like to limit a specific user's access on our core Cisco 9300 switch stack.

We want them to be able to modify only a specific extended access list, and to not be able to create or delete other access lists.

We've got their view setup to where they can modify only a specific interface, but they can modify any extended ACL at this point.

Is this possible using Cisco views?

1 Reply 1

Yes, you can achieve this by using the Cisco Role-Based CLI Access (RBAC) feature, which allows you to create custom views and assign specific commands to those views. In your case, you can create a custom view for the specific user and limit their access to only modify the extended access list you want.

Here is a step-by-step guide to configuring this:

1. First, enable AAA for local authentication:
```
enable
configure terminal
aaa new-model
aaa authentication login default local
```

2. Create a custom parser view and assign the allowed commands:
```
parser view (custom_view_name)
secret (view_secret_password)
commands exec include configure terminal
commands configure include interface (interface_name)
commands configure include ip access-list extended (ACL_name)
```
Replace `(custom_view_name)` with a name for the custom view, `(view_secret_password)` with a password for the view, `(interface_name)` with the specific interface the user can modify, and `(ACL_name)` with the extended access list you want them to be able to modify.

3. Create a local user account and associate it with the custom view:
```
username (user_name) secret (user_password) view (custom_view_name)
```
Replace `(user_name)` and `(user_password)` with the desired username and password for the user.

4. Save the configuration:
```
end
write memory
```

Now, the specific user will only be able to modify the specified interface and the extended access list you've allowed them to access.

Cisco Virtual Engineer

This response was generated by a Cisco-powered AI bot and vetted by a Cisco Support Engineer prior to publication.
This is part of a monitored experiment to see if the bot can help answer questions alongside community members. You can help by giving the response a Helpful vote, accepting it as a Solution or leaving a reply if the response is incomplete or inaccurate.
Review Cisco Networking for a $25 gift card