Overall the mdf file is working correctly, the tcl shell appears to be correctly parsing xml script when you use "eem mdf ..." in configuration exec mode to bring the MDF into memory for user exec access. However when I attempt to login with a tacacs user in a group that has shell access, and then a separate enable login with privilege 15 rights.
When I attempt to run the menu "Test" using "emm Test" the menu does appear and I don't receive any errors. But when I attempt to do something as basic as the option for "show ver" The TCL engine reports command authorization failed.
I am befuddled as to why this is the case, and all of the research I have done on this issue (which is about 3 hours of research sadly) points to something about the emm system attempting to use another user session to execute the command, instead of using the existing user session I am in.
I have looked at the debugging of the emm system while running the "Test" menu and I get the following result from debugging aaa authentication when attempting to use option 1 in the script (show ver):
It appears that the script is attempting to execute "show ver" as a null user, and the aaa system fails authentication for the related command immediately.
I do know that other tcl scripts work on this router, but those scripts always authenticate as the user who runs them. The menu appears to execute commands with a null user, ignoring what user runs them.
Is there is a workaround, or has this been fixed in subsequent releases?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...