Re: [OSL | CCIE_Security] Role Based CLI

2012-10-08 Thread Jay McMickle
kingsley.char...@gmail.com To: GuardGrid guardg...@gmail.com Cc: ccie_security ccie_security@onlinestudylist.com Sent: Sunday, October 7, 2012 9:43 PM Subject: Re: [OSL | CCIE_Security] Role Based CLI Configure the CLI view and then enable the default method. With regards Kings CCNA,CCSP,CCNP,CCIP,CCIE

Re: [OSL | CCIE_Security] Role Based CLI

2012-10-08 Thread Guardgrid
:43 PM Subject: Re: [OSL | CCIE_Security] Role Based CLI Configure the CLI view and then enable the default method. With regards Kings CCNA,CCSP,CCNP,CCIP,CCIE 35914 (Security) On Mon, Oct 8, 2012 at 3:47 AM, GuardGrid guardg...@gmail.com wrote: It looks like when you enable aaa and then set

[OSL | CCIE_Security] Role Based CLI

2012-10-07 Thread GuardGrid
It looks like when you enable aaa and then set the default method to none, so that we do not accidentally do not lock the console access and proceed to configuring the view by entering the enable view command you get this below error message. *Oct 7 18:08:39.990: %AAA-6-USER_BLOCKED: Enable

Re: [OSL | CCIE_Security] Role Based CLI

2012-10-07 Thread Kingsley Charles
Configure the CLI view and then enable the default method. With regards Kings CCNA,CCSP,CCNP,CCIP,CCIE 35914 (Security) On Mon, Oct 8, 2012 at 3:47 AM, GuardGrid guardg...@gmail.com wrote: It looks like when you enable aaa and then set the default method to none, so that we do not

[OSL | CCIE_Security] role based cli

2012-07-29 Thread Krishna Nagam
Hi All, i am doing a configuration on Role Based CLI here i am attaching the configuration also, i have some doubts 1) cli-view-naem=user1=== this we need to enable on the default group or in user1 profile on ACS 2) i am able to sucessfully configured the view but i thing its not working

Re: [OSL | CCIE_Security] role based cli

2012-07-29 Thread waleed '
actually it is just version issue Regards Date: Sun, 29 Jul 2012 18:19:07 +1000 From: nag...@gmail.com To: ccie_security@onlinestudylist.com Subject: [OSL | CCIE_Security] role based cli Hi All, i am doing a configuration on Role Based CLI here i am attaching the configuration also, i have

Re: [OSL | CCIE_Security] Role Based

2012-06-18 Thread Bruno Silva
database. Mike Date: Fri, 15 Jun 2012 06:47:46 -0400 Subject: Re: [OSL | CCIE_Security] Role Based From: fawa...@gmail.com To: mike_c...@hotmail.com CC: ccie_security@onlinestudylist.com Do you mean the '' prompt, then yes it's normal. It's dependent inwhere you are applying

Re: [OSL | CCIE_Security] Role Based

2012-06-18 Thread Mike Rojas
:21:03 -0300 To: ccie_security@onlinestudylist.com Subject: Re: [OSL | CCIE_Security] Role Based Hi Mike, did you configure the aaa authorizarion exec command and aaa authorization command [level] ? Br, Bruno Silva Enviado via iPhone Em 15/06/2012, às 16:40, Mike Rojas mike_c...@hotmail.com

Re: [OSL | CCIE_Security] Role Based

2012-06-15 Thread Eugene Pefti
ccie_security@onlinestudylist.commailto:ccie_security@onlinestudylist.com Subject: [OSL | CCIE_Security] Role Based Hello, Is the user sign normal when configuring Role based access? Router1conf t Enter configuration commands, one per line. End with CNTL/Z. Router1(config)? Configure commands: do

Re: [OSL | CCIE_Security] Role Based

2012-06-15 Thread waleed '
can you please paste your aaa and line configuration regards From: mike_c...@hotmail.com To: ccie_security@onlinestudylist.com Date: Thu, 14 Jun 2012 21:06:33 -0600 Subject: [OSL | CCIE_Security] Role Based Hello, Is the user sign normal when configuring Role based access? Router1conf t

Re: [OSL | CCIE_Security] Role Based

2012-06-15 Thread Fawad Khan
Do you mean the '' prompt, then yes it's normal. It's dependent inwhere you are applying the privilege 15 I.e at the privilege level box I the user profile or through the aaa attribute priv-lvl=15? On Thursday, June 14, 2012, Mike Rojas wrote: Hello, Is the user sign normal when configuring

Re: [OSL | CCIE_Security] Role Based

2012-06-15 Thread Mike Rojas
It was on the username and the privilege is 15... the list is attached to local database. Mike Date: Fri, 15 Jun 2012 06:47:46 -0400 Subject: Re: [OSL | CCIE_Security] Role Based From: fawa...@gmail.com To: mike_c...@hotmail.com CC: ccie_security@onlinestudylist.com Do you mean the '' prompt

Re: [OSL | CCIE_Security] role based cli - Superview

2012-04-30 Thread Eugene Pefti
@onlinestudylist.commailto:ccie_security@onlinestudylist.com Subject: [OSL | CCIE_Security] role based cli - Superview Hi, I have the following configuration: aaa authentication login default group radius aaa authorization exec default group radius parser view CONFIG secret 5 $1$PyAk

[OSL | CCIE_Security] role based cli - Superview

2012-04-28 Thread Imre Oszkar
Hi, I have the following configuration: aaa authentication login default group radius aaa authorization exec default group radius parser view CONFIG secret 5 $1$PyAk$qO1E4azmj32QGiSlc1d7F/ commands interface exclude ip address commands interface include ip commands interface exclude

[OSL | CCIE_Security] Role-based authentication and Radius Attribute 6 Service-type NAS Prompt

2012-04-25 Thread Eugene Pefti
Guys, I'm scratching my head and trying to understand the solution in the task for Role-based access control. It says that we have to use Radius Attribute 6 and assign it to NAS Prompt in conjunction with cisco-av-pair shell:cli-view-name=NAME. What's this NAS Prompt is about ? I tried to

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-19 Thread Eugene Pefti
@onlinestudylist.commailto:ccie_security@onlinestudylist.com Subject: Re: [OSL | CCIE_Security] Role-Based CLI. Seems you are in the view still. What does show privilege print? With regards Kings On Wed, Jan 18, 2012 at 8:03 PM, joshdu...@yahoo.commailto:joshdu...@yahoo.com wrote: Hi, Eugene and Piotr; I may be missing

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-18 Thread joshdughi
.   Thank you. Sincerely, Joshua Dughi joshdu...@yahoo.com Tel. 307-752-5891 --- On Tue, 1/17/12, Piotr Kaluzny pio...@ipexpert.com wrote: From: Piotr Kaluzny pio...@ipexpert.com Subject: Re: [OSL | CCIE_Security] Role-Based CLI. To: Eugene Pefti eug...@koiossystems.com Cc: CCIE Security Maillist

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-18 Thread Kingsley Charles
: From: Piotr Kaluzny pio...@ipexpert.com Subject: Re: [OSL | CCIE_Security] Role-Based CLI. To: Eugene Pefti eug...@koiossystems.com Cc: CCIE Security Maillist ccie_security@onlinestudylist.com Date: Tuesday, January 17, 2012, 12:17 PM Eugene, Did you enable shell (execution shell) authorization

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread Eugene Pefti
Hello guys, I know that this topic has been discussed many times and it seemed that everyone made some mental adjustments as to how this RBAC/views should function. Still, I'd like to refresh and maybe understand what I miss. I have this view configured on the router: parser view HTTP secret 5

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread Piotr Kaluzny
Eugene, Did you enable shell (execution shell) authorization? Also if you want to see the # - privilege exec mode, you must assign the user to at least privilege level 2. Regards, -- Piotr Kaluzny CCIE #25665 (Security), CCSP, CCNP Sr. Support Engineer - IPexpert, Inc. URL:

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread HA Ali
Subject: Re: [OSL | CCIE_Security] Role-Based CLI. Hello guys, I know that this topic has been discussed many times and it seemed that everyone made some mental adjustments as to how this RBAC/views should function. Still, I'd like to refresh and maybe understand what I miss. I have this view

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread Piotr Matusiak
Hi, You must have exec authorization enabled locally: aaa authorization exec default local Regards, Piotr 2012/1/17 Eugene Pefti eug...@koiossystems.com Hello guys, I know that this topic has been discussed many times and it seemed that everyone made some mental adjustments as to how this

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread Eugene Pefti
Current privilege level is 1 Eugene From: Piotr Matusiak [mailto:pi...@howto.pl] Sent: Tuesday, January 17, 2012 12:14 PM To: Eugene Pefti Cc: CCIE Security Maillist Subject: Re: [OSL | CCIE_Security] Role-Based CLI. Hi, You must have exec authorization enabled locally: aaa authorization exec default

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread Piotr Matusiak
** ** *From:* Piotr Matusiak [mailto:pi...@howto.pl] *Sent:* Tuesday, January 17, 2012 12:14 PM *To:* Eugene Pefti *Cc:* CCIE Security Maillist *Subject:* Re: [OSL | CCIE_Security] Role-Based CLI. ** ** Hi, You must have exec authorization enabled locally: aaa authorization

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread Eugene Pefti
Thanks, Piotr, And what's your router software version ? From: Piotr Matusiak [mailto:pi...@howto.pl] Sent: Tuesday, January 17, 2012 1:34 PM To: Eugene Pefti Cc: Piotr Kaluzny; HA Ali; CCIE Security Maillist Subject: Re: [OSL | CCIE_Security] Role-Based CLI. I pased your config and it works

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread Eugene Pefti
scratched my head and attributed it to IOS gremlins... Thanks everyone again. Eugene From: Piotr Matusiak [mailto:pi...@howto.pl] Sent: Tuesday, January 17, 2012 1:34 PM To: Eugene Pefti Cc: Piotr Kaluzny; HA Ali; CCIE Security Maillist Subject: Re: [OSL | CCIE_Security] Role-Based CLI. I pased

Re: [OSL | CCIE_Security] Role-Based CLI.

2012-01-17 Thread parvees . m
...@onlinestudylist.com Date: Tue, 17 Jan 2012 21:37:39 To: Piotr Matusiakpi...@howto.pl Cc: CCIE Security Maillistccie_security@onlinestudylist.com Subject: Re: [OSL | CCIE_Security] Role-Based CLI. ___ For more information regarding industry leading CCIE

[OSL | CCIE_Security] Role-based Access control using Radius

2011-10-05 Thread Dnyaneshwar Gore
Hi All, Can we apply role based access control view name using radius? Can we define cli-view-name in cisco AV pair attribute? or is there any other method? Regards, DMG ___ For more information regarding industry leading CCIE Lab training, please

Re: [OSL | CCIE_Security] Role-based Access control using Radius

2011-10-05 Thread Piotr Matusiak
Hi, RADIUS AVP: shell:cli-view-name= Regards, Piotr 2011/10/5 Dnyaneshwar Gore swap.gore2...@gmail.com Hi All, Can we apply role based access control view name using radius? Can we define cli-view-name in cisco AV pair attribute? or is there any other method? Regards, DMG

[OSL | CCIE_Security] Role based CLI - Authorization question... !

2011-02-03 Thread kamran shakil
*As per CISCO DOC CD: * When RADIUS authorization is enabled it's necessary to supply parser view name using Cisco AV-Pair which is *009\001*. This attribute should contain: *RADIUS* shell:cli-view-name= shell:priv-lvl=15 and my question is for TACACS + ? *For Tacacs+* Use custom

Re: [OSL | CCIE_Security] Role based CLI - Authorization question... !

2011-02-03 Thread Tyson Scott
: Thursday, February 03, 2011 2:48 PM To: ccie_security@onlinestudylist.com Subject: [OSL | CCIE_Security] Role based CLI - Authorization question... ! As per CISCO DOC CD: When RADIUS authorization is enabled it's necessary to supply parser view name using Cisco AV-Pair which is 009\001

[OSL | CCIE_Security] Role Based Access Control Questions

2010-04-22 Thread Brian Almond
I can't seem to get RBAC working with the ACS. I have tried the example in Yusuf's lab with tacacs and the Lab 4 example with radius. I have configured per the solution guides, but when I log in with the user from ACS I don't get a view, I get user exec mode. Am I missing something? -- Brian

Re: [OSL | CCIE_Security] Role Based Access Control Questions

2010-04-22 Thread Stuart Hare
Brian, I take it your referring to Role Based CLI Access for IOS Routers. If so take a look at the config guide: http://www.cisco.com/en/US/docs/ios/sec_user_services/configuration/guide/sec_role_base_cli_ps6441_TSD_Products_Configuration_Guide_Chapter.html This is also a snippet from the

Re: [OSL | CCIE_Security] Role Based Access Control Questions

2010-04-22 Thread Tyson Scott
...@onlinestudylist.com] On Behalf Of Brian Almond Sent: Thursday, April 22, 2010 1:18 PM To: ccie_security@onlinestudylist.com Subject: [OSL | CCIE_Security] Role Based Access Control Questions I can't seem to get RBAC working with the ACS. I have tried the example in Yusuf's lab with tacacs and the Lab 4

[OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7)

2010-04-08 Thread Terry Little (terlittl)
Just looking for clarification on the use of the root view. When I config as shown in the solution guide I can get back into root view if I exit out (on the console). I get the error: Terry Little terli...@cisco.com Phone: +1 425 468 1057 Mobile: +1 425 894 4109 Cisco

Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7)

2010-04-08 Thread Brandon Carroll
What error Terry? Regards, Brandon Carroll - CCIE #23837 Senior Technical Instructor - IPexpert Mailto: bcarr...@ipexpert.com Telephone: +1.810.326.1444 Live Assistance, Please visit: www.ipexpert.com/chat eFax: +1.810.454.0130 IPexpert is a premier provider of Self-Study Workbooks, Video on

Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7)

2010-04-08 Thread Terry Little (terlittl)
] Sent: Thursday, April 08, 2010 9:51 AM To: Terry Little (terlittl) Cc: CCIE Sec Subject: Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7) What error Terry? Regards, Brandon Carroll - CCIE #23837 Senior Technical Instructor - IPexpert Mailto: bcarr...@ipexpert.com

[OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7)

2010-04-08 Thread Terry Little (terlittl)
Second Try. Just looking for clarification on the use of the root view. When I config as shown in the solution guide I can get back into root view if I exit out (on the console). I get the error: Apr 8 12:41:08.354: %AAA-6-USER_BLOCKED: Enable view requires to be authenticated

Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7)

2010-04-08 Thread Brandon Carroll
Thats correct. It's because of the way that IOS associates a view name to a user, in this case the view called root. You have to have a method other than none for it to authenticate the user and tie you to a view. View Authentication via a New AAA Attribute View authentication is performed by

Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7)

2010-04-08 Thread Terry Little (terlittl)
[mailto:bcarr...@ipexpert.com] Sent: Thursday, April 08, 2010 10:08 AM To: Terry Little (terlittl) Cc: CCIE Sec Subject: Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7) Thats correct. It's because of the way that IOS associates a view name to a user, in this case the view called

Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7)

2010-04-08 Thread Brandon Carroll
since the problem only refers to radius authentication? Terry Little (425) 894-4109 (m) (425) 468-1057 (o) From: Brandon Carroll [mailto:bcarr...@ipexpert.com] Sent: Thursday, April 08, 2010 10:08 AM To: Terry Little (terlittl) Cc: CCIE Sec Subject: Re: [OSL | CCIE_Security] Role based

Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7)

2010-04-08 Thread Terry Little (terlittl)
To: Terry Little (terlittl) Cc: CCIE Sec Subject: Re: [OSL | CCIE_Security] Role based Authentication (vol 1, sec 5.7) Here is my understanding: You are on the console and in enable mode. You want to access the root view. You type to following: R7#enable view R7# Apr 8 17:32:12.592

[OSL | CCIE_Security] Role Based CLI Issues

2009-12-03 Thread Badar Farooq
Here is what I am trying to do I am creating two users ADMIN and Operator. ADMIN has all the rights and for OPERATOR i am restricting the access through role based CLI using a view HTTP. I am using local authentication and authorization, placing both users at privilege level 15 and placing

Re: [OSL | CCIE_Security] Role Based CLI Issues

2009-12-03 Thread Kingsley Charles
I think, you need to configure privilege level 15 under the vty line. The privilege level that you associate with the username might be used for backup, if the parserv view is not configured for the user. With regards Kings On Thu, Dec 3, 2009 at 4:39 PM, Badar Farooq badarfar...@gmail.com

Re: [OSL | CCIE_Security] Role Based CLI Issues

2009-12-03 Thread Badar Farooq
Did that the same result Rack1R5#telnet 150.1.4.4 Trying 150.1.4.4 ... Open User Access Verification Username: OPERATOR Password: *Rack1R4* The debug is stranger Mar 5 16:53:46.883: AAA/AUTHEN/LOGI N (000F): Pick method list 'VTY' Mar 5 16:53:53.498: AAA/AUTHOR (0xF): Pick method list

Re: [OSL | CCIE_Security] Role Based CLI Issues

2009-12-03 Thread Tyson Scott
at www.ipexpert.com From: ccie_security-boun...@onlinestudylist.com [mailto:ccie_security-boun...@onlinestudylist.com] On Behalf Of Kingsley Charles Sent: Thursday, December 03, 2009 7:53 AM To: Badar Farooq Cc: ccie_security@onlinestudylist.com Subject: Re: [OSL | CCIE_Security] Role Based CLI Issues I

Re: [OSL | CCIE_Security] Role Based CLI Issues

2009-12-03 Thread Badar Farooq
Well... Without authorizing exec on VTY i wont be able to trigger the view (configured in username command) unless I use enable view HTTP. And before that OPERATOR will have full access that would defeat the purpose of config altogether as the restrcited user will choose whether to have full

Re: [OSL | CCIE_Security] Role Based CLI Issues

2009-12-03 Thread Badar Farooq
] *On Behalf Of *Kingsley Charles *Sent:* Thursday, December 03, 2009 7:53 AM *To:* Badar Farooq *Cc:* ccie_security@onlinestudylist.com *Subject:* Re: [OSL | CCIE_Security] Role Based CLI Issues I think, you need to configure privilege level 15 under the vty line. The privilege level