04-29-2009 01:44 PM - edited 03-06-2019 05:27 AM
Customer requires read only login access. This read only account should be able to run all 'show' commands on a catalyst 3560 switch
04-29-2009 04:11 PM
Colm,
I do not have the list handy for all the priviledge level 0-15 specification, perhaps someone could provide that link.
I do know however that using proviledge level 5 will only give the user the ability to issue
You can use for that priv level 5
username
line vty 0 4
login local
line vty 5 15
login local
Regards
04-29-2009 05:24 PM
you can implement this using Cisco's IOS role-based CLI either with AAA or parser view command.
04-30-2009 04:57 AM
The only two levels defined by default are:
Level 0: User exec mode
Level 15: Privileged Exec (enable) mode
Levels 1-14 are UNDEFINED, by default. You have to manually define commands for each of these levels.
Please note you will have issues with commands like show running-config, because the commands shown in the config might be blocked by priviledged level.
If you had an ACS server, you could give that user level 15 access then RESTRICT the commands they are able to use to the subset you require.
Here are some helpful links:
http://www.cisco.com/en/US/docs/ios/12_2/security/configuration/guide/scfpass.html
http://www.cisco.com/en/US/docs/ios/12_2t/12_2t13/feature/guide/ftprienh.html
08-26-2009 11:47 AM
Making show running-config a separate level 15 command was just STUPID Cisco. WTF were you thinking? You already created all these priviledge levels so why not just let us assign what we want at the privledge we set? Dumb Asses. So how do I give our PCI auditors READ ONLY access to see the running config?
04-16-2010 02:36 PM
Do your PCI auditors need to see the running config? Or would the start-up config be sufficient? If so you can just do:
10-29-2018 10:45 AM
This does not work
10-29-2018 11:21 AM
Typically, a parser view or CLI role based configuration would be used.
What are you after ?
10-29-2018 01:52 PM
Here is a sample config for a parser view that would include all 'show' commands:
aaa new-model
!
aaa authentication login default local
aaa authentication enable default enable
aaa authorization exec default local
!
username HELPDESK view READ_ONLY secret 5 $1$/dM0$UdkfJLS9nJtUVNrf.o9dr1
!
parser view HELPDESK
secret 5 $1$Ih.f$BXcbZmeoB3sBUBdyD6oN0.
commands exec include show startup-config
commands exec include all show
!
line vty 0 4
transport input all
login authentication default
02-23-2019 02:25 AM - edited 02-23-2019 02:26 AM
This is what we use on similar IOS and Catalyst devices to allow rancid to pull config:
username readonly privilege 4 secret BLAH
privilege exec level 4 dir all-filesystems
privilege exec level 4 dir
privilege exec level 4 more
privilege exec level 4 write terminal
privilege exec level 4 write
privilege exec level 4 show inventory raw
privilege exec level 4 show inventory
privilege exec level 4 show vlan
privilege exec level 4 show vtp status
privilege exec level 4 show vtp
privilege exec level 4 show idprom
privilege exec level 4 show env all
privilege exec level 4 show env
privilege exec level 4 show boot
privilege exec level 4 show version
privilege exec level 4 show debugging
privilege exec level 4 show controllers
privilege exec level 4 show running-config
privilege exec level 4 show
You need to specify the entire command the user can run. For instance you can't just allow "show" to enable all show commands, has to be the entire command. Seems stupid.
This works for us with Radius too, we return the priv level from Radius.
Unfortunately this approach has stopped working on some of our IOS-XE devices since we upgraded to IOS 16.6 Everest, and I haven't been able to find a way around it. Same for NXOS can't find a way to do it.
It seems odd to me that there isn't a read-only user option. I understand the config is delicate, but there are numerous cases where you might want to allow someone on to view the config and show things, but not modify configuration.
03-25-2021 05:55 AM
I ran into this problem recently since for PCI reasons we have to read / track any changes to the switch configs via a readonly account, we recently updated a couple of our switches to IOS-XE with 16.x on and hit this problem and this seems to be the top google result.
The answer seems to be parser views.
First setup a parser view via an elevated 15 account
config term parser view MonitorView secret test1234 commands exec include show startup-config commands exec include all show commands exec include terminal length 0
Next when logging on as a lower privilege user run the following to switch to the view
enable view MonitorView
it'll now ask for a password, this might be the secret mentioned above
but if you have radius enabled then it's more likely to be the radius password you logged on with
the following should then work
terminal length 0
show startup-config show running-config view full show version
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide