Enabling Privilege Levels when ACS is Down

Hi,
I have a requirement to fall back to local accounts when ACS is down. These accounts will have specific privilege levels. I have two local users - adminro and adminrw.
adminro is read only and will have a privilege level of 7.
adminrw is a full access account with a priv level of 15.
I can login with adminro when ACS is down, but when I attempt to enable using "enable 7" I receive the following ouput:
PPD-ELPUF5/pri/act> en 7
Enabling to privilege levels is not allowed when configured for
AAA authentication. Use 'enable' only.
If I login using "enable", my read only account now has full configuration access which is not desireable.
My AAA configuration is as follows:
aaa authentication ssh console ADMIN LOCAL
aaa authentication enable console ADMIN LOCAL
aaa authentication http console ADMIN LOCAL
aaa authentication telnet console ADMIN LOCAL
aaa authentication serial console ADMIN LOCAL
aaa authorization command ADMIN LOCAL
aaa accounting ssh console ADMIN
aaa accounting command privilege 15 ADMIN
aaa accounting enable console ADMIN
aaa accounting serial console ADMIN
aaa accounting telnet console ADMIN
aaa authorization exec authentication-server
username adminro password <REMOVED> encrypted privilege 7
username adminrw password <REMOVED> encrypted privilege 15
enable password <REMOVED> level 7 encrypted
enable password <REMOVED> encrypted
Is there anyway to enable the user or automatically elevate the user to privilege 7 post login like you can with a router? I cannot have the adminro account to be able to run configuration commands on the device. Running ASA version 8.2(3).
Thanks!

PPD-ELPUF5/pri/act# sh curpriv
Username : adminro
Current privilege level : 7
Current Mode/s : P_PRIV
Server Group:    ADMIN
Server Protocol: tacacs+
Server Address:  1.150.1.80
Server port:     49
Server status:   FAILED, Server disabled at 15:02:37 EDT Wed Oct 12 2011
Number of pending requests              0
Average round trip time                 2ms
Number of authentication requests       38
Number of authorization requests        373
Number of accounting requests           149
Number of retransmissions               0
Number of accepts                       307
Number of rejects                       19
Number of challenges                    0
Number of malformed responses           0
Number of bad authenticators            0
Number of timeouts                      234
Number of unrecognized responses        0
PPD-ELPUF5/pri/act(config)# name 1.1.1.1 TEST description TEST CHANGE
PPD-ELPUF5/pri/act(config)# sh run name
name 1.1.1.1 TEST description TEST CHANGE
As you can see above, my user was able to perform a change even though it should not be allowed.
PPD-ELPUF5/pri/act(config)# sh run privilege
privilege cmd level 7 mode exec command show
privilege cmd level 7 mode exec command ping
privilege cmd level 7 mode exec command traceroute

Similar Messages

  • PRIVILEGE LEVELS FOR ACS WITH AD DATABASE

    How do I configure two separate privilige levels for two groups. These groups exist in the AD database i.e. my ACS (Pri & Backup) are looking in AD for authentication.

    Hi ,
    If you are using TACACS ,
    Bring users/groups in at level needed
    1. Go to user or group setup in ACS
    2. Drop down to "TACACS+ Settings"
    3. Place a check in "Shell (Exec)"
    4. Place a check in "Privilege level" and enter " priv "(1 to 15) in the adjacent field
    If you are using RADIUS,
    aaa new-model
    aaa authentication login default group radius local
    aaa authorization exec default group radius local
    radius-server host X.X.X.X key XXXX
    Following is the configuration required in the Radius Server
    The AV pair in the ACS -->group setup--> IETF RADIUS Attributes
    [006] Service-Type = Login
    /* Following is for getting the user straight in privledge mode */ to set priv 15
    The AV pair in Cisco IOS/PIX RADIUS Attributes
    [009\001] cisco-av-pair = shell:priv-lvl=15
    For more information on above commands, please refer to the following link :-
    http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsec
    ur_c/fsaaa/index.htm
    Please try the above and let me know if this helps.
    Thanks

  • Privilege level with ACS

    I am trying to configure a group of users to get read only access onto our equipement ( switches and routers) and specifically show run or show start. i set the command set to permit those 2 commands and i created a rule for that group but it does work as desired.
    any ideas?  Thank you.

    There are a couple of ways that you can accomplish what you are looking to do.  What you need to remember is that when showing the running-config you can only see what you have authorization to configure so just allowing a RO user to execute the show run command isn't going to show them much.
    One thing you could do is to lower the privilege level required to run the "show configuration" command.  The command is "privilege exec level 1 show configuration" and would need to be applied to all your devices.  This would allow privilege level 1 users to view the startup-config but not the running-config.
    Since you are running ACS another solution would be to create a rule to permit these RO users to login and actually authorize at level 15 which by default allows one to configure everything (remember to be able see it in the running-config you must be authorized to configure it).  Then create a limited command set that only allows the commands they need to use.
    Hope this helps,
    Greg

  • Privilege level when accessing via telnet

    I've just set up telnet access using RADIUS authentication. I'm using Microsoft IAS for the radius server.
    I can access the router but when I try to get into the enable prompt, it says "% Error in authentication."
    I should mention that when I connect directly via console port, I can login using the radius. It doesn't drop me into an enable prompt but it allows me to enter into it by typing "enable". doesn't work for telnet however.
    any ideas what I did wrong?

    The command reference for "aaa authentication enable default" says that requests sent to a RADIUS Server will include the username "$enab15$".
    Have you configured a user named "$enab15$" on the RADIUS server?
    e.g.:
    If you were using Cisco Secure ACS, and did not configure such a user, the log would indicate an Authentication Failure Code of "CS user unknown", and the username listed would be "$enab15$".

  • RSA SecurID authentication and privilege level

    Hello,
    I'm new working with Cisco ACS, learning by seat of pants; most of the documentation on Cisco's website is fairly cryptic and does not use many pictures. Therefore,I would appreciate some help setting up privileges. We have ACS v5.2 which I have set up using RSA SecurID and appears to be working correctly. However, I'm having problems with the privilege level when I access a router it lands me in user mode. I'm trying to set up a administrator group for the routers and switches to have each member dropped in privilege level 15, exec mode but I'm having difficulty doing this.
    Unfortunately, I'm unable to find any real useful information in reference to setting up RSA SecurID. It seems more of the information is geared around radius servers. Any help would be greatly appreciated. Thank you much!

    Hello.
    Remember AAA means authentication, authorization and accounting. In your case you authenticate with RSA , but you authorize with ACS policies. For TACACS+ and traditional IOS from routers and switches you can use a ACS policy element called "shell profile" which you can use to specify some attributes like privilege level. Then you can use the "shell profile" to create an authorization policy.
    I'm attaching some screenshots. In this example I'm using AD instead of RSA because I don't have a RSA available. Please rate if it helps.

  • AAA & Privilege Levels on Console Session

    While configuring users with different privilege levels and using AAA, we've found that the privilege level when logging in via console port will always be level 1, whereas with telnet we're able to log in directly into levels 0 and 2 thru 15. Has anyone experienced this or have an explanation as to why this happens?
    TIA.

    Console port authorization was not added as a feature until Bug ID CSCdi82030 was implemented. Console port authorization is off by default to lessen the likelihood of accidentally being locked out of the router. If a user has physical access to the router via the console, console port authorization is not extremely effective. However, for images in which Bug ID CSCdi82030 has been implemented, console port authorization can be turned on under line con 0 with the hidden command aaa authorization console in config mode.
    If you turn on debug aaa authorization and log into console you will see there is no AAA kicked in.
    R/Yusuf

  • ACS with RSA for privilege level 'enable' authentication

    Has anyone experienced problems with privilege level "Enable" password authentication via ACS using RSA two factor authentication? We have recently deployed ACS and use RSA two factor authentication for the telnet connection without any problems. When configuring the networking device and ACS to use RSA for the privelledge level authentication "enable" this fails. We get prompted to enter the token code and the RSA server indicates that authentication is succesful however the network device (ASA or switch) seems to reject it.
    Are there any tricks to this?
    Thanks in advance!

    David
    Like Collin the first thing that I think of is that you can not use the same token code to authenticate enable mode that was used to authenticate user mode. Beyond that I am not aware of things that should prevent this working. Are you sure that the ACS authentication server is configured to allow that user access to privilege mode?
    Perhaps it would be helpful if you would post the config (especially all the aaa related parts) of a device that is having that problem. And it might help find the issue if you would run debug for authentication, try to login to enable mode, and post the output.
    HTH
    Rick

  • Setting privilege level for logging into ASA through ACS

    Hi!,
    In my environment i implemented AAA for logging into switches, routers, asa etc through ACS which is being configured TACACS+.
    I have set different privilege levels like readonly, readwrite etc into ACS. There are working fine when i try to login into switch or router.
    But in ASA i am unable to restrict the privilege levels of different users.
    Can someone plz guide me with ASA & ACS setting to solve this issue!!!!!

    Hi!!
    I tried this option. It is working fine with routers & switches. But for ASA privilege access it is not functioning.
    I created 3 profiles in "Shared Profiles" & added 1 of them in Group setting & added users to this group with mentioning group authentication. This way i am able to control access to the switches & routers with proper privilege. But the same way when i tried to impolement ASA it's not happening.
    Can u plz check it out...

  • Default Privilege Level for ASA users authenticated by Radius or TACACS when using ASDM

    Hello,
    I'm trying to figure out what the default privilege level is for users that are authenticated to the ASA via a remote authentication server when using the ASDM.
    the command "aaa authentication http console TACACS+ LOCAL" is used in the ASA config.
    The remote server is NOT setting any privilege levels for users.  There are also no aaa authorization commands present in the config.
    So what privilege level do the users receive when they login with the ASDM?  I'm being told that the users receive admin access which includes config write, reboot, and debug.  But I cannot find any documentation stating hte default level.
    Please advise.  And providing links to cisco documentation would be great too.
    Thanks,
    Brendan

    Hi Berendan,
    Hope the below exerpt from document clarifies your query. also i have provided the link to refer.
    About Authorization
    Authorization controls access per user after users authenticate. You can configure the security appliance to authorize the following items:
    •Management commands
    •Network access
    •VPN access
    Authorization controls the services and commands available to each authenticated user. Were you not to enable authorization, authentication alone would provide the same access to services for all authenticated users.
    If you need the control that authorization provides, you can configure a broad authentication rule, and then have a detailed authorization configuration. For example, you authenticate inside users who attempt to access any server on the outside network and then limit the outside servers that a particular user can access using authorization.
    The security appliance caches the first 16 authorization requests per user, so if the user accesses the same services during the current authentication session, the security appliance does not resend the request to the authorization server.
    http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/asdm60/user/guide/usrguide/aaasetup.html
    Regards
    Karthik

  • Username with privilege level 15 bypass enable

    Hi experts,
    I guess I never really understand the authentication process on Cisco routers and devices lol. Anyway I want users with privilege level 15 to be put in the enable mode right away after login without having to type in "enable" command and enable password. Users with other privilege levels will still be put in the EXEC mode.
    AAA has to be enabled because I'm using it for 802.1x as well.
    The privilege level eventually will be assigned by Radius server but right now the user is created locally on the switch. Right now I have:
    aaa new-model
    username admin privilege 15 secret 5 $1$2bdl$VIp53G4/zpo4f9aHh.t5v0
    username cisco secret 5 $1$NGdD$ehTUzwappJFMxgA7tM/YW.
    line vty 0 5
    access-class 100 in
    exec-timeout 30 0
    logging synchronous
    transport input ssh
    And it's not working lol. No matter I log in with "admin" or "cisco" I'm put in EXEC mode... What do I have to do to achieve this?
    Thanks!

    Hi,
    The with default keyword authorization will get applied on all the lines i.e. CONSOLE, VTY, AUX.
    In case you want it for users who are trying to login to via ssh or telnet use the following:
    EXEC AUTHORIZATION
    Router
    router(config)#aaa authorization exec TEL GRoup radius local
    router(config)#line vty 0 15
    router(config-line)#authorization exec TEL
    ACS
    Interface configuration
    Check  user & group for cisco av-pair.
    User setup à cisco ios/pix 6.x radius attributes àcisco av-pair [ shell:priv-lvl=15]
    OR
    Group setup à ios/pix 6.x radius attributes à shell:priv-lvl=15
    In case of radius if exec authorization is enabled  and if have not specified any privilege level in the ACS server. Then user will fall under the privilege level 1 and if enable authentication is enabled  or enable password is defined  on the router then we can go to enable mode by typing en or en
    Regards,
    Anisha
    P.S.: please mark this thread as resolved if you think your query is answered.

  • How to Assign Privilege Levels with CiscoSecure ACS TACACS+

    how to assign privilege level to a user in secure ACS TACACS+ user exist in external database
    Regards,
    Bilal

    Hi Bilal,
    Bring users/groups in at level 15
        1.  Go to user or group setup in ACS
        2.  Drop down to "TACACS+ Settings"
        3.  Place a check in "Shell (Exec)"
        4.  Place a check in "Privilege level" and enter "15" in the adjacent field
    Regards,
    ~JG
    Do rate helpful posts

  • Enable mode using privilege levels

    Hi All,
    We use TACACS+ for telnet access and enable secret password for privileged access. An user would like to enter the enable mode without entering the enable secret password. Is it possible to do this using privilege levels and shell exec on the AAA server?

    I have configured a user on AAA server and under the enable options, I have selected level 15 and under shell exec, I have selected privilege level 15.
    The router has following config
    aaa authorization exec default tacacs+ if-authenticated
    aaa authorization commands 1 default tacacs+ if-authenticated
    aaa authorization commands 15 default tacacs+ if-authenticated
    Am I missing any other commands?

  • Unable to login to Switch & Router through secondary Acs ,when primary ACS is down.

    Dear All,
      i have configured primary ACS in DC data center and secondary ACS in DR data center, i have configured replication , and it is working well, but when we put down primary ACS , we are unable to login in switch and router through secondary ACS , i ahve  dedicated link between core dc sw to core dr sw through which all traffic is getting replicated . All user , mgmt vlan are created in FWSM firewall.Kindly help.
    Regards
    Amit Kulshrestha

    Hi Bro
    I'm assuming you've configured your ACS correctly and the Cisco network devices correctly. Perhaps, this could be a bug. The reason I say this is because last week, I was implementing 2 units of Cisco ACS 1121 v5.3 (in HA mode) for a client, and i had similar issues myself. When I down the primary ACS, I'm unable to login to my network devices, eventhough my secondary ACS is UP and PINGable from all network devices.
    Hence, I downloaded and applied the latest cummulative patch from the CCO website 5-3-0-40-4.tar.gpg (Release Date: 27/May/2012) and my problem solved.
    Perhaps, your ACS version isn't 5.3, but the morale of the story here is, maybe patching is required for your case!!
    Please do let me know the outcome. May the force be with you, bro!

  • Enable aaa accounting commands for all privilege levels?

    Here is the command's syntax:
    aaa accounting {auth-proxy | system | network | exec | connection | commands level} {default | list-name} {start-stop | stop-only | none} [broadcast] group groupname
    The "command" accounting type must include the privilege level of the commands you are logging. How do I log ALL commands?
    Take the following example:
    aaa accounting commands 15 default start-stop group mygroup
    If I issue this command will that mean commands the user executes that have a privilege level lower than 15 will not be logged? Or only commands that require exactly privilege level 15 will be logged?
    How can I log all commands regardless of privilege level?

    Hi Red,
    If you customize the command privilege level using the privilege command, you can limit which commands the appliance accounts for by specifying a minimum privilege level. The security appliance does not account for commands that are below the minimum privilege level.
    The default privilege level is 0. So if you don't specify any privilege level then all should be accounted for.
    You can find the command detail at. This is for ASA though.
    http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/command/reference/cmd_ref/a1.html#wp1535253
    Regards,
    Kanwal
    Note: Please mark answers if they are helpful.

  • Privilege Level for Tacacs Account in Nexus 7000

    Hi,
    I have configured the Tacacs (ACS 4.2v) on Nexus 7000 (as mentioned below) and works fine but unlike IOS (6509) It's doesn't prompt that you are in userexec mode (>) and then need to type enable and password for full privilege.
    In n7k when I entered into "configure terminal" It won't allow me to access other commands.
    How to login into level 15 privilege mode after authenticating from tacacs
    (config)# show running-config tacacs+
    tacacs-server key 7 "xxxxx"
    tacacs-server host x.x.x.x key 7 "xxxx"
    aaa group server tacacs+ TacServer
        server x.x.x.x (same ip as tacacs-server host)
        use-vrf management
        source-interface Vlan2
    (config)# show running-config aaa
    aaa authentication login default group TacServer
    aaa authentication login console local
    aaa user default-role
    Here below are the commands accessible in "Terminal" currently
    (config)# ?
      no        Negate a command or set its defaults
      username  Configure user information.
      end       Go to exec mode
      exit      Exit from command interpreter
    isb.n7k-dcn-agg-1-sw(config)#

    Hi Jan.nielsen
    Issue is resolved but by another way.
    I have found the same resolution too of custom attirbute command but the Custom attribute Option for shell command wasn't available in ACS v4.2, so after enabling shell for users and by clicking exec--> Shell Exec and enabling priviledge level 15 in the same box of Shell options, It start working without any command

Maybe you are looking for

  • End routine help

    Hi Experts, I have an CUBE which is loading once in a week(full load). In that cube i have plant and material and some other fields . My requirement is 1) i have to delete some materials from all the plants from the cube like mat1,mat2,mat3..etc from

  • Problems Moving Time Machine to New Hard Drive, Error -8062

    I'm in 10.8.5, trying to copy my Backups.backupsb folder from my current 2TB ext drive to a new 4TB drive, following Apples instructions for changing the Time Machine drive.  Both are Seagates, single partitioned (GUIDE) formatted Mac OS Extended (Jo

  • 2010 Macbook Air with 4GB RAM or 2011 Macbook Air with 2GB RAM

    So I am looking a the following 2 Reforebished Macbook Air models: Refurbished MacBook Air 1.6GHz dual-core Intel Core i5 http://store.apple.com/ca/product/FC968LL/A Originally released July 2011 11.6-inch (diagonal) high-resolution LED-backlit gloss

  • Flex Developers Needed ASAP - Charlotte, NC

    Open  Systems Technologies has been involved in the recruitment of technologists for  various industries of North Carolina, South Carolina, Tampa, Virginia, DC and  other centers around the world for over 20 years. Our client is a large  financial fi

  • Created New User but Can't...

    I have created a database 'ABC' with some tables. Currently, only one user can access this dtatbase (The user who created it). I have created another user and gave him privileges (SELECT) to view all tables. He can view them in SQL but can't view the