Chapter 4 Common Scenarios Using ACS

Overview of Device Administration

Step 5 Configure an access service policy. See Access Service Policy Creation, page 10-4.

Step 6 Configure a service selection policy. See Service Selection Policy Creation, page 10-4.

Step 7 Configure an authorization policy (rule table). See Configuring a Session Authorization Policy for Network Access, page 10-29.

Command Authorization

This topic describes the flow for an administrator to issue a command to a network device.

Note The device administration command flow is available for the TACACS+ protocol only.

1.An administrator issues a command to a network device.

2.The network device sends an access request to ACS.

3.ACS optionally uses an identity store (external Lightweight Directory Access Protocol [LDAP], Active Directory, RADIUS Identity Server, or internal ACS identity store) to retrieve user attributes which are included in policy processing.

4.The response indicates whether the administrator is authorized to issue the command.

To configure a command authorization policy (device administration rule table) to allow an administrator to issue commands to a network device:

Step 1 Configure the TACACS+ protocol global settings and user authentication option. See Configuring TACACS+ Settings, page 18-1.

Step 2 Configure network resources. See Network Devices and AAA Clients, page 7-5.

Step 3 Configure the users and identity stores. See Managing Internal Identity Stores, page 8-4or Managing External Identity Stores, page 8-22.

Step 4 Configure command sets according to your needs. See Creating, Duplicating, and Editing Command Sets for Device Administration, page 9-28.

Step 5 Configure an access service policy. See Access Service Policy Creation, page 10-4. Step 6 Configure a service selection policy. See Service Selection Policy Creation, page 10-4.

Step 7 Configure an authorization policy (rule table). See Configuring Shell/Command Authorization Policies for Device Administration, page 10-34.

Related Topics

Network Devices and AAA Clients, page 7-5

Configuring System Administrators and Accounts, page 16-3

Managing Users and Identity Stores, page 8-1

Managing External Identity Stores, page 8-22

Managing Policy Conditions, page 9-1

Managing Access Policies, page 10-1

User Guide for Cisco Secure Access Control System 5.3

4-4

OL-24201-01

 

 

Page 68
Image 68
Cisco Systems OL-24201-01 manual Command Authorization, Related Topics