level of privilege with ACS

I am trying to set up a group of users for read only access on our equipment (routers and switches) and specifically display run or show beginning. I put the set command to allow these 2 commands and I created a rule for this group, but it does not work as you wish.

any ideas?  Thank you.

There are two ways that you can accomplish what you want to do.  What you need to remember, is that when showing the running-config, you can see what you have permission to configure so just of allowing it to user RO run the show run command won't show them much.

One thing you could do is to lower the level of privilege required to run the command "view configuration".  The command is 'privilege exec level 1 see the configuration' and must be applied to all your devices.  This would allow privileges users of level 1 display the startup-config, but not the running-config.

Since you run ACS another solution would be to create a rule to allow these RO users to connect and actually allow to level 15, which, by default, allows to configure everything (remember to be able to see in the running-config you must have permission to configure).  Then create a set of limit orders that only allows the commands they need to use.

Hope this helps,

Greg

Tags: Cisco Security

Similar Questions

  • Level of privilege of the ACS and sets of commands

    Hi all

    I was in charge of the implementation of 5.6 ACS in order to allow members of the groups of domain security MS Access of specific order to our equipment. I the area association and groups added, I have an access policy with a rule that works so my field trial account can connect to the switch and perform only the commands in my command set.

    The problem is that when I assign a Shell profile with privilege level 7 min/max to the rule and the user logs on with this level, they are unable to see the commands that I welcomed in the Set command. Is it possible to have the ACS to say IOS to automatically change the visible commands to a specific privilege level when the user connects, even if they are not at this level of privilege?

    Any help greatly appreciated,

    Chris Menuey

    Because you're using command authorization and restrict the user to some orders, why do we use privilege 7 and not 15?

    ~ Jousset

  • WLC 4402 impossible to authenticate correctly with ACS 5.2

    For some reason, I can't WLC to authenticate correctly with ACS 5.2. It's very strange in the sense that when I checked the log. ACS authenticates and authorizes the WLC 4402, but I can't log on the WLC. login screen appears, if I typed the username that he jumped

    Controller of >

    user:

    password:

    No matter what I typed (internal or external users), nothing seems to work.

    It comes to my frustration, I have no problem with authentication of routers and switches except WLC 4402.

    Hello

    Please delete privilege on the ACS level settings.

    Elements of strategy > authorization and permissions > peripheral Administration > Shell profiles > common tasks

    By default the privilege - do not use.

    Maximum privilege - not in use

    I hope this helps.

    Kind regards

    Anisha

    P.S.: Please mark this thread as answered if you feel that your query is resolved. Note the useful messages

  • Permission of AAA with ACS Shell-games

    Hi all

    I use a router cisco 871 running that version 12.4 (11) T advanced IP Services.

    I have difficulty getting permission to AAA to work properly with ACS.

    I am able to configure ACS fine users and assign them shell and private level 7.

    I then install a set of Shell Auth and enter the issuance of orders and configure.

    When I log in as a user, I get an exec with a level of 7 priv no problem, but I never seem to be able to

    to access global configuration mode by typing in conf (or set up) terminal or t.

    If I type con? It is the only command connect, configure is never an option...

    The only way I can get this to work is by entering the command:

    privilege exec level 7 Configure terminal

    I thought the whole purpose of the ACS Shell Set to provide this information to the router?

    It's frustrating

    The ACS server is set up with the Shell Set named Level_7 order authorization

    It is attributed to the relevant groups and I have the 'Unmatched orders' option selected in the 'license '.

    The "unmatched Args allowed" is also selected.

    See an extract of my IOS config below:

    AAA new-model

    !

    !

    AAA group Ganymede Server + ACS

    Server 10.90.0.11

    !

    AAA authentication login default group local ACS

    AAA authorization exec default group ACS

    AAA authorization commands 7 by default local ACS group

    !

    Cisco radius-server host 10.90.0.11 keys

    !

    !

    privilege exec level 7 Configure terminal

    privilege exec level 7 set up

    privilege exec level 7 show running-config

    privileges exec level 7 show

    !

    Hope you can help me with this one...

    PS I tried with orders of privilege on the router and remove the router and just keep getting the same results!

    Hello

    So now,

    You're actually using two different options and trying to couple then together. What I would say is you either use authorization Command Shell function or play with level privileges. Not mixed together both.

    Above scenario might work, if you move orders to focus on level 6 and give the 7 user privilege level. He couldn't be sure. Try it and share the results.

    That's what I suggest that orders back to a normal level.

    Provided below are the steps to set up the shell command authorization:

    -------------------------------------------

    Follow these steps on the router:

    -------------------------------------------

    ! - is the desired username

    ! - is the password

    ! create - us a local user name and password

    ! - in case we are not able to get authenticated via

    ! - our Ganymede server +. To provide a backdoor.

    password username 15 privilege

    ! - To apply the aaa on the router model

    AAA new-model

    ! - Following command is to specify our ACS

    ! - location of the server, where is the

    ! - ip address of the ACS server. And

    ! - is the key which must be the same during the FAC and the router.

    radius-server host key

    ! - To get the authentication of users through ACS, when they try to log - in

    ! - If our router is unable to join the ACS, we will use

    ! - our local user name & the password that we created above. This

    ! - we prevent locking.

    AAA authentication login default group Ganymede + local

    AAA authorization exec default group Ganymede + local

    AAA authorization config-commands

    AAA authorization commands 0 default group Ganymede + local

    AAA authorization commands 1 default group Ganymede + local

    AAA authorization commands 15 default group Ganymede + local

    ! - Sequence of commands are for posting to the activity of the user.

    ! - When the user connects to the device.

    AAA accounting exec default start-stop Ganymede group.

    AAA accounting system default start-stop Ganymede group.

    orders accounting AAA 0 arrhythmic default group Ganymede +.

    orders accounting AAA 1 by default start-stop Ganymede group.

    orders accounting AAA 15 by default start-stop Ganymede group.

    --------------------

    ACS configuration

    --------------------

    [1] Goto 'Profile components shared' a-> 'Shell command authorization sets'-> 'Add '.

    Provide any name at all.

    provide sufficient description (if necessary)

    (a) for full administrative access set.

    In the unmatched controls, select 'allow '.

    (b) for all access limited.

    In the unmatched controls, select "decline."

    And in the field above 'Add a command' box, type in the box below and the main command "permit unmatched Args" Order under allow.

    For example: If we want the user to only have access to the following commads:

    opening of session

    Logout

    output

    Enable

    Disable

    Show

    Then, the configuration should be:

    -----------------------------------------------

    -Allowed unparalleled Args.

    -----------------------------------------------

    connection permit

    permit disconnection

    exit permits

    Select the permit

    disable the permit

    license terminal configuration

    ethernet interface license

    permits 0

    to see the running-config

    ------------------------------------------------

    in example above, user will be allowed to run only from commands. If the user tries to run the interface ethernet 1', the user will get "failed command authorization.

    [2] press 'submit '.

    [3] Goto Group on which we want to apply these command authorization set. Select 'change settings '.

    (more...)

  • Integration of ASA with ACS

    Hi all

    I try to incorporate some ASA (8,6) with ACS (5,7), here is the configuration of the SAA.

    SH run | in aaa
    RADIUS Protocol RADIUS AAA server
    GANYMEDE + Protocol Ganymede + AAA-server
    AAA-server GANYMEDE + (management) host 10.243.14.24
    GANYMEDE + LOCAL console for AAA of http authentication
    authentication AAA ssh console GANYMEDE + LOCAL
    Console telnet authentication GANYMEDE + LOCAL AAA
    AAA accounting console GANYMEDE + ssh
    AAA accounting command 15 GANYMEDE privilege +.
    Console telnet accounting AAA GANYMEDE +.
    AAA authorization exec-authentication server
    AAA authorization GANYMEDE + loCAL command

    The problem is that I can get connected to ASA, but I can't type all commands in the CLI, I get the error message "failure of command approval.

    I have the same sets of commands and the shell profiles created for switches and it works perfectly.

    This is the behavior of ACS journals

    1. once I am having authenticated, I can see the logs in ACS with my username
    2 but when I type any commnds, is put down my permission and I see in the newspapers of the authorization of the CSA that this username is "enable_15".

    Can someone help me identify what the problem is

    Thank you
    Reverchon

    This happens when we have control permission enabled on ASA and try to run any command level 15 on SAA. To correct this problem you must check enable authentication of a user against GBA / GANYMEDE.

    AAA authentication enable console LOCAL + GANYMEDE

    After above listed licensing order, ASA will start to check the enable password against ACS/Ganymede and you use Ganymede activate the password that we can put on by user.

    ~ Jousset

  • What level of privilege is necessary...

    We are looking for possibly delegate implementation AnyConnect with our Helpdesk (limited to ASDM, adding UDIDs Apple to a strategy of access.)  The question I have, is what level of privilege must be assigned, which will allow them to add the UDID and limit other changes (as much as possible)?

    You will need to set the permission of local control to the privilege level to a level between 1-15 and assign commands (for example Access-list configure, cmd in your example). Then assign your user Helpdesk names this level of privilege.

    I don't think that you can restrict the access lists they can edit - that's outside the scope of what you can do with ASDM (or cli). you will need to move to MSC or an external portal with several tools of the built-in role-based access control to get that granular.

    See this section of the ASDM Configuration Guide for more details.

  • Q: I have transferred all my iPhone 6 more apps to my iPad Pro. When I went in Clash of Clans I expected to be at the point, (level) I am with my phone?

    Q: I have transferred all my iPhone 6 more apps to my iPad Pro. When I went in Clash of Clans I expected to be at the point, (level) I am with my phone? Rather than start from the beginning!

    Any tips?

    Are you signed the same center of game username and password?

    The other thing I can think is clash of Clans a universal application? The button 'get' was a sign? If it isn't then you can play a different game... by that I mean, there's game has scaled for iPHones and game set B nationally for iPads... they have the same game but different - just like a cover can be the same brand and color but different model for different iPads.

    You can contact the support of the COC and see if they can transfer progress from one device to another or if there is something you need to do to move your progress to the wire

  • Assign the level of privilege by RADIUS

    I use Microsoft IAS as my RADIUS server. We have a number of Cisco 2800 routers running the latest IOS which also act as VPN servers for our connection to remote user using their laptops via IPSec and Cisco VPN Client. How can I set the level of privilege for authenticated users so that remote VPN users privilege level 0 and administrators receive the privilege level 15, in order to be able to connect to the routers and manage them.

    Please see the attached document.

    Kind regards

    Prem

  • Select orders accounting aaa for all levels of privilege?

    Here is the syntax of the command:

    AAA accounting {auth-proxy | system | network | exec | login | orders level} {default | name-list} {arrhythmic | stop only | none} group [broadcast] name of

    The accounting type 'command' must include the privilege level of the orders that you log on. How can I connect all orders?

    Consider the following example:

     aaa accounting commands 15 default start-stop group mygroup

    If I run this command will mean that command that the user runs which have a level of less than 15 privilege are not registered? Or only commands that require exactly the privilege level 15 will be connected?

    How can I connect all orders regardless of the privilege level?

    Hey red,

    If you customize the command privilege level by using the command of privilege, you can limit who commands the unit accounts for by specifying a minimum privilege level. The security apparatus does not account for orders that are below the minimum privilege level.

    The default privilege level is 0. So if you do not specify a level of privilege then all should be counted.

    You can find the details of the order to. It's good for the SAA.

    http://www.Cisco.com/c/en/us/TD/docs/security/ASA/asa80/command/referenc...

    Kind regards

    Kanwal

    Note: Please check if they are useful.

  • 6513 isn't intergrating with ACS

    Hello

    I have a problem with one of the devices, switch 6513. the acs server is directly connected to the switch inside the fwsm.

    I am able to ping the MSFC and FWSM ACS server, but it does not take the ACS. I have other 6513 and many other switches and router integrated normally with ACS.

    Please I need help.

    Kind regards

    Incase you are using Ganymede and deliver "Ganymede source control interface ip.

    User interface that is listed in the acs network---> switch---> IP address configuration

    Switch must use this IP address as the source for the packages of Ganymede

    Kind regards

    ~ JG

    Note the useful messages

  • Admin Auth LMS with ACS 5.3

    Hey people, I need to integrate LMS4 with ACS 5.x for LMS user auth. 2 roles are necessary, Admin and monitor. Y at - it all Documentation, example Configuration, or other useful information? Any help welcome.

    Best regards, Michael

    Hi Michael,

    Perhaps these threads will give you enough details:

    https://supportforums.Cisco.com/message/3484567

    Best regards

    André

  • Cisco 1121 unit installed with ACS 4.2 SE version

    Hi all

    Sorry, we could install version to 4.2 on the Cisco 1121 device acs?

    Could we use 1120 ACS 4.2 image DVD to install on 1121?

    Or any workaround?

    THX!

    Calvin Su

    Hi Calvin,

    Unfortunately, 1121 hardware doesn't support version 4.2.0 acs so downgrade is not an option for 1121. It can only be used with ACS 5.x

    Kind regards

    Jousset

    The rate of useful messages-

  • Authentication EAP - TLS with ACS 5.2

    Hi all

    I have question on EAP - TLS with ACS 5.2.

    If I want to implement the EAP - TLS with Microsoft CA, how authentication computer and user will be held?

    Understand that the cert is required on the client and the server end, but is this certificate to the computer links or links to individual users?

    If the links to the user, and I have a shared PC connection by few users, is that each user account will have their own certificates?

    And each individual user will have to manually get the CA cert? is there another method that my environment has more than 3000 PCs.

    And also if it binds to the user, any user can get their CA cert with their AD username and password, if they bring in their own device and try to get the CA certificate, they will be able to properly install the cert in their device on the right?

    I hope you guys can help with that. Thank you.

    Hope this will answer most of your questions:

    Client certificate or user

    http://www.Cisco.com/en/us/Partner/Tech/tk59/technologies_tech_note09186a00804b976b.shtml#T10

    Computer certificate

    http://www.Cisco.com/en/us/Partner/Tech/tk59/technologies_tech_note09186a00804b976b.shtml#T15

    In the case of EAP - TLS we have the certificate of computer and user installed on the machines.

    Kind regards

    Jousset

    The rate of useful messages-

  • How can I set my own level of text with fonts, sizes etc.

    How can I set my own level of text with fonts, dimensions etc. instead of the default one?

    Is that what you want to do?

    Adobe Premiere Elements help. Apply styles to the text and graphics

  • How to turn off turn on privilege for ACS Ganymede +.

    I have an MSFC with the following configuration.

    AAA new-model

    AAA authentication login default group Ganymede + local

    AAA authorization exec default group Ganymede + local

    orders accounting AAA 15 by default start-stop Ganymede group.

    I have an ACS v3.0 under NT.

    I have setup an advanced option of GANYMEDE + in the ACS which can activate the privileges for users. However, the user can still connect to the MSFC and question 'enable the command '.

    Is there a better way on the ACS to refuse a user to run the 'enable' command so that it can not go mode even though it may have the secret password that is located in the MSFC.

    Thank you

    David

    David

    You can make consent orders and refuse this command 'enable '.

    So now the router, you will have:

    AAA authorization commands 0 default local taca group

    The GBA, so that the user, under the authority of command, add the command like enable, deny arguments. '. Make sure you also unlisted arguments have denied.

    Once permission to order had been enabled on the router, each user will be checked for authorization. So for other users, in the GBA box, make sure that you have - unmatched orders Cisco IOS updated allowed and also arguments unlisted allowed nec.

    Make first Chang on GBA and then add the router config.

    Thank you

    Nisha

Maybe you are looking for