Hi Kingsley,
 
Yes I can bring the "clear line" command to a user having level15 access
manually using the "privilege..." command on IOS. But i was looking for
a way to implement this on ACS. My idea of bringing a particular level15
command to level14 borne by a specific usergroup in the Shell Command
Authorization in ACS.
 
In summary: (as i intend to use)
Groupname: clearlinegroup
username: clearlineuser
priv-lvl to assign: level14
level15 command to bring to this group: "clear line" ONLY
other privileges: all commands for level14 and below must still be
accessible to this group  <----- in practice, all the commands must
still be manually added to the SCA. which makes it impossibly
prohibitive.
 
Is this capability something that needs to be improved on the tacacs+
server or am i wishing to much?
 
________________________________

From: [email protected]
[mailto:[email protected]] On Behalf Of Kingsley
Charles
Sent: Friday, February 05, 2010 10:09 PM
To: Peter Debye
Cc: [email protected]
Subject: Re: [OSL | CCIE_Security] Shell Command Authorization
inconsistencyin IOS


Hi Peter 
 
I agree with you but Lorenzo was telling that the "clear line" command
of priv can't be brought down to priv 14. But that's not true, priv 14
can have any commands with it. Priv 2 to 14 are custome levels and can
have any commands.
 
Hence lorenzo should have some configuration mistake which is not
getting "clear line" cmd to priv 14.
 
 
 
 
With regards
Kings


On Fri, Feb 5, 2010 at 6:06 PM, Peter Debye <[email protected]> wrote:


        Kingsley, Lorenzo is seeking the way to workaround the necessity
to
        configure privilege level commands
        on each router manually, but to have a list on ACS instead, AND
to
        play with user's privileges
        assigned via tacacs+.
        Let me say that using privileges on user without local (on
router)
        list of "privilege ... command"
        doesn't have much sense because the first check which IOS
performs
        (with or without aaa configured)
        is "Current user privilege >= command privilege?". If yes
continue, if
        not - it prints "% Invalid input
         detected at '^' marker" and stops.
        As most commads are priv 15 (max) by default then users with
priv < 15
        will not pass the check,
        and the only way to change that  - is to lower the command
privilege locally.
        The advent of the Role-based Access Control cancelled the notion
of
        privilege, but still the
        per-role commands are stored locally on the router.
        
        In real life, if you want a centrally administered user rights
(Shell
        commads author set on tacacs)
        you would assign privilege 15 to each user, and configure "aaa
        authoriz commands 15..."
        to control which commands are permitted for each user. With that
you
        just pass the role
        of arbiter to tacacs. (Of course, you must decide how to act in
case
        of tacacs down, in that case
        you'd probably need some local command authoriz local set.)
        
        ======================================================
        
        ______________________________________
        Date: Fri, 5 Feb 2010 17:12:37 +0530
        From: Kingsley Charles <[email protected]>
        Subject: Re: [OSL | CCIE_Security] Shell Command Authorization
                   inconsistency   in IOS
        To: "Tating, Lorenzo C. Jr." <[email protected]>
        Cc: [email protected]
        Message-ID:
        
<[email protected]>
        Content-Type: text/plain; charset="iso-8859-1"
        
        Hi Lorenz
        
        The privilege level is something that is being used by the IOS.
The ACS will
        send the priv-level for the user and the IOS will authorize the
commands
        based on the priv level. Priv 15 is something that can't be
configured is
        available by default. Priv 14 is something that we should
configure.
        
        If the ACS sends priv 14, then the user will have commands
configured for
        priv 14.
        
        If you don't have "aaa authorization exec", then the IOS will
expect enable
        password or secret with the privilege to be configured. Without
enable
        secret or password, you will be locked in the exec mode. Instead
of enable
        password or secret, you can configure
        
        enable secret level 14
        privilege exec level 14 clear line
        
        With these two commands, you will get what you desire.
        
        
        But, if you need to have aaa authorization for exec without
enable password
        or secret, then you need to configure "aa authorization exec".
With this,
        directly placed based on the priv level. For 0 and 1, you will
always placed
        in exec. From 2 to 15, you will be placed in priv exec mode and
have command
        privilege based on the priv level given to you.
        
        
        For your case, just have priv level 14 in ACS and privilege 14
configured as
        following
        
        aaa authentication login vty group tacacs+
        aaa authorization exec vty group tacacs+
        privilege exec level 14 clear line
        
        
        If you still need command authorization for commands of priv 4,
use the
        following and configure shell command authorization set.
        
        
        aaa new-model
        !
        !
        aaa authentication login vty group tacacs+
        aaa authorization exec vty group tacacs+
        aaa authorization commands 14 vty group tacacs+
        
        
        line vty 0 4
         exec-timeout 0 0
         authorization commands 14 vty
         authorization exec vty
         login authentication vty
        
        
        
        Note : If you have priv 15 under vty, the user will get priv 15
no matter
        what the ACS gives
        
        
        
        With regards
        Kings
        
        On Fri, Feb 5, 2010 at 2:53 PM, Tating, Lorenzo C. Jr. <
        [email protected]> wrote:
        
        >  I am trying to do Shell Command Authorization on my routers
using Tacacs.
        >
        > I have one user that i place under privilege level 14. I want
a level 15
        > command (clear line) to be used by that user. Using the
"privilege exec
        > level 14 clear line" works, but I need to implement it on ACS
to save me
        > time from having to enter the command over and over again to
many routers.
        > But I noticed that once my user logged under privilege level
14 (Tacacs
        > Setting, Privilege Level = 14), the Command Authorization. I
cannot bring
        > the "clear line" command to that level. I tried using this on
ASA and it
        > works, it just seems the router wont allow bringing a level 15
command down
        > to level 14, without manually configuring "privilege exec
level 14 clear
        > line"
        >
        > ACS config:
        > Per Group Command Authorization
        > Unmatched Cisco IOS commands
        > (deny)
        >
        > [check] Command:
        > clear
        >
        > Arguments:
        > (none)
        >
        > Unlisted arguments:
        > permit
        >
        >
        > Any help will be appreciated.
        >
        > Sincerely,
        > Lorenz
        >
        > _______________________________________________
        


_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to