I have created a user in ACS 5.0 i want to give piriviledge level 15 to that user,which TAB i have to route to give permission of privilege 15,i have worked on ACS 4.2 ,,ACS 5.0 is very much new for me
It is a HP switch with manager access (that means privi 15) i want to enable privi 15 on user in ACS,There aaa authorization exec default group tacacs+ authorization configured on switch hence it is a HP switch, and except username nothing configured for user in ACS,i want to enable privilege level 15.
No such configuration in user profile how it will reflect to user when he login's in, I do have a cisco switches also, As in ACS 4.2 we use to do.
Enable the following TACACS+ settings in the user’s profile. (Make sure they are enabled for user’s profile in the ACS interface configuration). On the TACACS+ Settings section of the page check the Shell (exec) checkbox and set the Privilege Level field to 15.
Can u explore more for 5.0,, And where is custom attribute tab
Hi. In ACS 5.x there are no "user profiles" or "group profiles" anymore. Instead you'll use "policy elements" and "access policies". By default you have two access policies "default device admin" and "default network access". Since you're working with switches you can choose "default device admin" and click "authorization". That's where you can link the policy to the "shell profile" I told you in the previous post.
By the way, ACS 5.0 is too old now. it's better if you use ACS 5.1 or ACS 5.2
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :