Cisco AAA/Identity/Nac :: Configuring ACS 5.x For Restricted Dev Admin Command Set?

Apr 25, 2013

this is the first time I am about to configure ACS 5.3 to authorize user group from doing some commands in the "configure mode" while permitting them some other commands. As example, I want to deny them from doing "reload" but give them access to configure "time-range", what happen is, they are denied access to "reload" on the exec mode, but once they went into "configure" mode, they would be able to "do reload"I mean to say, is it possible to manage the subsequent commands to "configure terminal" ?

View 4 Replies


ADVERTISEMENT

Cisco AAA/Identity/Nac :: Configure Guest Vlan And Restricted On 2960

Apr 17, 2011

I would like to configure a guest-vlan and restricted-vlan on a 2960 switch, but I can not.
 
I am trying to configure the interface using the following commands: [code] similar result is obtained while trying to configure a auth-fail vlan. the full configuration file is attached.

View 4 Replies View Related

Cisco Switching/Routing :: OSPF Subnet Admin Distance Command On Nexus 7K

Jun 20, 2012

I am trying to modify the OSPF admin distance for a specific subnet under version 5.1(5) of  the Nexus 7K, but this command does not appear to be available. 

View 1 Replies View Related

Cisco Switching/Routing :: 2960 SI Lan Lite ACLs - Configuring For Admin And Guest Access

Jan 26, 2013

I have a 2960 SI lan lite switch that I am configuring for admin and guest access.  I have wireless AP's plugged into trunked ports 2 and 3.  I am using two vlan's (in addition to the native VLAN).  Vlan 5 for Admin and Vlan 10 for guest access.  I have ACL configured on the router preventing guest users from accessing the Admin network.  I want to prevent those on the guest network from seeing other hosts in the vlan however the lan lite software does not support port ACL's. Any way to accomplish this with this switch. 

version 12.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
[Code]...

View 5 Replies View Related

Cisco AAA/Identity/Nac :: ACS5.3 - Configuring Multiple Identity Sources

Aug 28, 2012

I have an ACS 5.3 cluster, that is configured to use AD. There are a few wireless devices, and monitoring tools that do not have AD accounts. I would like to configure ACS to first check AD for the user authentication, and if that fails to roll over to the local (Internal Users) identity source where I can define these user accounts.
 
It seems that when the authentication hits the initial Identity Policy rule, it never moves onto the next one if the first fails.
 
Attached are screen shots that show how i'm configured for the test, i have a local user defined and I'm trying to log into the firewalls.
 
- Identity Definition : Screen shot of the main ACS definition for the rule i'm testing that's not working
- Identity Rule 1 : The configuration of rule 1 that if it fails i need it to move onto rule 2.
- Log Output : Screen shot for one of the failed attempts from the ACS View Log server.
 
Reason I need to configure it this way is:

- Wireless users authenticate to wireless using AD user accounts. Some hand held scanners do not support that and will need to authenticate using the MAC address.
- Authentication to Network devices for managment uses AD accounts. We have some monitoring tools that do not have AD accounts, and will need to    be able to log into Network devices to issue some commands (Examples: Cisco Prime LMS and NCS, Infoblox NetMRI).

View 4 Replies View Related

Cisco Firewall :: Command For Configuring NAT On ASA5505?

Dec 5, 2012

want to know the command for configuring NAT on My ASA5505.

Local IP - 192.168.1.0/241

Public IP - 182.73.109.118 255.255.255.252

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Can't Ssh Into ACS 5.2 By Using The Admin Account

Jun 5, 2011

We created the admin account during the setup and were able to log into the Web GUI, but we can't use this admin to access the CLI by using ssh, always said permission denied.

View 3 Replies View Related

Cisco AAA/Identity/Nac :: Use AD Authentication For ACS 5.2 Admin Accounts?

Jul 7, 2011

I want to set it up so that when you log into any of the ACS 5.2 servers you have to use your AD credentials to log in and define what access you have. Is this possible? If so, how can this be set up?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: ASA5500 / ACS 5.1 Radius For VPN And Admin?

Feb 27, 2011

I am trying to configure ACS 5.1 to authenticate SSL VPNs on an ASA5500 and aslo to provide admin access to the ASA5500 both via radius.I want to authenticate the VPN against a SeureID appliance and the admin login against a different database (using internal for testing but will use LDAP in the end).I cant seem to get the ACS to distinguish between the two authentication types. If I create a rule that says match protocol radius I can point that at either database but if I try saying match radius and service type 5 it doesnt match the VPN and falls through to the default authentication service. I have also tried matching service type 6 for admin and that doesnt seem to work either.In the end what I want to acheive is to authenticate teh ASA5500 VPN against the SecureID appliance and then admin access to all devices on teh newtork (a mixture of Cisco, F5 and Juniper) to active directory via LDAP where if the user is a member of the "admin" group they get access.I was intending to use specific devices for the ASA5500s (there aretwo) and then creat a device group based on IP address range for everything else.

View 4 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.x Admin Users Authentication Against AD

Apr 23, 2012

Do you know if it's possible to use ACS 5.x in such manner that the admin users (so not the end users, but the administrator users of ACS) are authenticated against and external database, like Active Directory?

View 2 Replies View Related

AAA/Identity/Nac :: ACS 5.4 And User Admin Roles

May 8, 2012

we have created some administration accounts which should only have the possibility to work on the user database.  the useradmin role is to limited to create a user and set a fixed password only, but not able to enable the users authentication against a predefined external identity store. Other roles which makes this possible are far  to powerful for a second level adminstrator.The adminstrator should have the possibility the create an user and set the password check against an external database. This is not possible with the predefine role "UserAdmin". Other roles do have to many rights for these users.

View 4 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.1 Device Admin Privilege Assignment?

Dec 1, 2011

my admin user is still being assigned privilege level 1, as shown in AAA Protocol > TACACS+ Authentication Details report.The report seems to show that the user is getting the right shell profile (Selected Shell Profile: Net-Admin -- is the one I setup for this user's group with both Default Privilege and Maximum Privilege set to Static 15). But still not the right privilege (Privilege Level: 1).Also, I found this document via Google: [URL] The router configuration examples all show this "aaa authorization exec tacacs+|radius local" command, which my device does not have.So I am wondering if I am not reading the ACS report right, or the device actually was assigned the correct privilge but that does not work without the "aaa authorization exec" command in the configuration?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Configure ACS 5.2 And Checkpoint For Firewall Admin

Aug 5, 2012

how to configure ACS 5.2 for device administration of Checkpoint firewalls and security management servers?

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Banner For ACS 5.3 Admin Login Page

Feb 20, 2012

Is there a way to put a login banner on the ACS admin web page?  Either display it directly on the web page or do a redirect to a banner page?  Can I edit the admin pages directly or does ACS provide a mechanism to add this type of feature?
 
We are using ACS 5.3 running on VMWare.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 Logged User Cannot Access To Admin Parameters

Sep 9, 2012

After upgrade  to ACS 5.2 appliance ,  we are trying to configure AAA between Ciscoworks  and ACS. Authentication is working but authorization fails , logged user cannot access to admin parameters. I've configured attributes manually but it doesn't work.Does ACS 5.2 support integration with CiscoWorks?

View 1 Replies View Related

Cisco AAA/Identity/Nac :: 3355 / Reset / Recover ISE Admin-CLI Password

Jul 30, 2012

I have to reset/recover admin-CLI password. I had posed the question in [URL]Now as per the CLI-admin password recovery procedure at [URL] I have inserted DVD in the hardware appliance, but I don't see any prompt with these options:

"Welcome to Cisco Identity Services Engine - ISE 3355
  #
To boot from hard disk press <Enter>
  #
Available boot options: "
 
I  just see login prompt ( and of course, I cannot login because I don't  know the password). I am using serial console connection to the  appliance.

View 2 Replies View Related

AAA/Identity/Nac :: ACS 5.2 Creation Of Network Admin Policy For Nx-os Devices?

May 28, 2012

i have acs 5.2 i need to create a network admin policy to our nx-os devices such as nexus switches, how this will be done on acs 5.2?

View 0 Replies View Related

AAA/Identity/Nac :: ACS V5.1 View Not Showing Full Admin Logs?

May 18, 2011

I am having trouble viewing all the Administration logs in ACS View. I have my Local Log Target set to a Maximum log retention period of 90 days. In ACS View I can display authentications that go back 90 days + However when I try and display the "ACS_Configuration_Audit" in View and perform a Custom query that goes back 90 days it will only display about 35 days of Admin logs.I know the logs are there because when I go into CLI and do a search like "show logging | i "ObjectType=Administrator Account" the Administration logs go back over a year.why ACS View cannot display all the Admin logs?The ACS is running v5.1.0.44 Patch 6 (Also experiencing this in a v5.2 ACS as well)

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.1 Using Active Directory To Manage Network Device Admin

Jun 14, 2012

we've configured an ACS 5.1 and integrated it with active directory Win2K3, we created two groups in the AD for managing network devices one for Administrators and the other for operators (read-only),  so we configured a device admin policy and both groups work fine, but now we are facing a little problem any user who exists in the AD can login (user exec mode) in the network devices and we want to restric the login with the policy, but we just don't know how. Is there a way to get a user be authenticated against external group or internal acs but at user level, just like you can do it in the ACS 4.X?

View 8 Replies View Related

Cisco AAA/Identity/Nac :: ISE 1.1.3 Authenticate Wireless Users / Admin Access To WLC / Switches

Mar 13, 2013

Deployed two Cisco ISE 1.1.3. ISE will be used to authenticate wireless users, admin access to WLC and switches. Backend database is Microsoft AD running on Windows Server 2012. Existing Cisco ACS 4.2 still running and authenticating users. There are two Cisco WLCs version 7.2.111.3.Wireless users authenticates to AD through ACS 4.2 works. Admin access to WLC and switches to AD through ISE works. Wireless authentication using PEAP-MSCHAPv2 and admin access wtih PAP/ASCII.

Wireless users cannot authenticate to AD through ISE. The below is the error message "11051 RADIUS packet contains invalid state attribute" & "24444 Active Directory operation has failed because of an unspecified error in the ISE".Conducted a detailed test of AD from ISE. The test was successful and the output seems all right except for the below: [code]

Update:

1) Built another Cisco ISE 1.1.3 sever in another datacentre that uses the same domain but different domain controller. Thais domain controller is running Windows Server 2008. This works and authentication successful.

2) My colleague tested out in a lab environment of Cisco ISE 1.1.2 with Windows Server 2012. He got the same problem as described.

View 6 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 / Authenticating Device Admin Users Against AD Specific Groups

Jan 28, 2013

I am using ACS 5.3 What I am about is setting user authentication against existence of the user in specific AD group, not just being a member in any AD. What is happening now, users get authenticated as long as they exists in the AD, luckily they fail on authorization, as it is bound to specific AD group.
 
how can I bind the authentication aginst specific group in AD, not just using AD1 as the identity source.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Web Admin Password Recovery For Nac Server Applicance 3355

Jul 8, 2012

What is the procedure for web admin password recovery for nac server applicance 3355?

View 14 Replies View Related

AAA/Identity/Nac :: ACS 5.2 Using AD To Manage Network Device Admin Policy Creation

May 22, 2012

we managed to integrate our newly setup ACS 5.2 to our regional domain.  now im creating a Device Admin access Policy for Regional Network Admin group and Regional Network Operators group. each having full  and read access respectively. 
 
i already have the default  identity policy and authorization policy with with command sets  fullaccess and showonly for each group, now i dont know how can i match the AD group regionaladm and regionalops so that  each user falls under one of these groups will have a correct  read/write access.

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Backup Admin Requested To Install VMWare Tools On ACS 5.3 Server

Nov 11, 2012

to backup an ACS 5.3 vm running on ESXi 5.0 our backup admin requested to install vmware tools on the acs server.

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.3 Configuring 802.1x

Jan 17, 2012

Trying to configure 802.1x with ACS 5.3, have some general doubts about how to make it, this is what I got for the moment:
 
ACS 5.3 = 192.168.240.28
AD = 192.168.251.97
Switch = 192.168.240.171
 
IOS device config Already configured and running Device Administration using Tacacs, mising with Radius aaa commands:
 
aaa group server tacacs+ TACACS_PLUS
server 192.168.240.28
!
aaa group server radius RADIUS_1x

[Code]......

View 15 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.1 / This Command Is Not Authorized

Feb 5, 2013

We have an issue with ACS server 5.1.0.44.X. We want make a one user with few commands: show ip route static-table(deny other show commands)configure terminal, terminal length 0 ip route (with all possible arguments). All works fine except ip route command, when i try to type it I see - "This command is not authorized".

View 1 Replies View Related

Cisco AAA/Identity/Nac :: (command Set) Not Working In ACS 5.3?

Mar 4, 2013

I have to created command set under "Policy Elements>Authorization and Permissions>Device Administration" for limited access user in ACS 5.3. Like i triyed to give them permission to only few show commands. I have set user priviledge 1, 7, 10 however either of the priviledge level user was able to run those commands. I works like the shell priviledge level.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: What Is Command To Launch GUI On ACS 5.x

Mar 10, 2013

After logging in to the ACS, what is the command to launch the GUI on a Cisco ACS 5.x.

View 1 Replies View Related

Cisco AAA/Identity/Nac :: Setup A Command Set In ACS 5.3?

Nov 26, 2012

I'm trying to set up a command set in Cisco ACS 5.3, I can't get i to work no mather who I try What I'm trying to accomplish is that some users, say Bob can run every priv. level 1 command + show run, or just to specify which commands Bob will be able to run, whatever is easiest to set up.
 
In my switch I have the commands:

aaa new-model
aaa authentication login default group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization config-commands
aaa authorization commands 1 default group tacacs+ 
aaa authorization commands 15 default group tacacs+ <--- tried diffrent apporaches whith priv level..
(and specied a tacacs server)
  
is the "default" under "aaa authorization commands 1x default group tacacs+" the name of the command set?
 
In the ACS I have specied a Authorization group and binded it to the command set, should the user have priv 15 for this to work or priv 1?(I have also specied a user and an identity group and specied ip ranges under "Network Devices and AAA Clients")

View 2 Replies View Related

Cisco AAA/Identity/Nac :: ACS 5.2 - Command Set Is Empty

Jan 15, 2012

I have a problem with the ACS 5.2 configuration: I am trying to use the AAA authorization to centralize privileges and commands but only the privilege level is sent to router, the command set aren't sent.
 
The test cenary is this:
 
ACS 5.2Router 2900 family IOS 15.0 
The ACS is configured with:
 
Shell Profiles (to match with a privilege level), Command Sets (with the command list), Service Selection Rules (to set to one service) and Authorization (to assign one shell profile and one command set).
 
The router is configured with the follows commands:
 
[code]....

View 4 Replies View Related

Cisco AAA/Identity/Nac :: Configuring 802.1x With ACS 4.2 (RADIUS)?

Mar 25, 2013

I am trying to configure AAA authentication and authorization with Cisco 3725 (IOS 12.4(17)) for 802.1x and ACS 4.2 with VLAN assignment to my Windows XP client. (trying to assign VLAN 100 in my scenario).When user connects to the Router, it passes the authentication process (EAP-MD5). In my debug i see that Router recieves the Radius Attributes BUT does not apply anything!My running config:

Building configuration... 
Current configuration : 1736 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec

[code]......
 
As a result the vlan-switch data based does not change.

View 3 Replies View Related

Cisco AAA/Identity/Nac :: 3750 - Configuring NPS AA

Jan 4, 2012

I am struggling with configuring NPS AA for our 3750 array ... authentication and authorization. I tried almost every config i could find online but the most i got out of it is a simple authentication. What i need is quite simple: we have several AD groups.

1- Admin
2- Read only with few privileges for ping, show, trace route and telnet
 
I need my switches to be able to recognize the groups and assign them the correct priv. But it doesn't seem to be happening. Any clean config for  the switch and for NPS ?

View 8 Replies View Related

Cisco AAA/Identity/Nac :: Configuring AAA On ASA 5520

Dec 15, 2012

We have an IAS (Internet Authentication Server) to authenticate all our network devices. This server is integrated with our local AD server so that we can use our domain credentials to login into the netwoerk devices. i have successfully configured all our L2 & L3 switches with IAS but facing issue with ASA 5520. Below is the config i have applied on ASA. When i am testing the authentication with IAS server, i am getting "Authentication Successful" message.
 
aaa-server AAA protocol radius
aaa-server AAA host 10.91.38.70
key *****

[Code]....

Also when i am trying to telnet the Firewall, i am directly getting password promt. I should first get the username promt wherein i can enter my domain username.

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved