Basic Shell authorization is all that can be controlled locally.  This task
would be better suited for role based authentication.

 

Regards,

 

Tyson Scott - CCIE #13513 R&S, Security, and SP

Managing Partner / Sr. Instructor - IPexpert, Inc.

Mailto: [email protected]

Telephone: +1.810.326.1444, ext. 208

Live Assistance, Please visit: www.ipexpert.com/chat

eFax: +1.810.454.0130

 

IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
CCIE (R&S, Voice, Security & Service Provider) certification(s) with
training locations throughout the United States, Europe, South Asia and
Australia. Be sure to visit our online communities at
www.ipexpert.com/communities and our public website at www.ipexpert.com
<http://www.ipexpert.com/> 

 

From: [email protected]
[mailto:[email protected]] On Behalf Of Kingsley
Charles
Sent: Thursday, December 09, 2010 2:59 AM
To: [email protected]
Subject: [OSL | CCIE_Security] Command authorization with local

 

Hi all

I don't think exec and command authorization works well with local. Any
thoughts?

Let's say I want to allow only int g0/0 configurations only with the
following:

aaa authentication login king local
aaa authorization exec king local
aaa authorization commands 2 king local


privilege exec level 2 configure terminal
privilege exec level 2 configure
privilege exec level 2 show running-config
privilege configure level 2 interface

With regards
Kings

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to