Cisco Router and Security Device Manager (Role-Based Command-Line Interface (CLI) Access) - NetwaxLab

Breaking

Facebook Popup

BANNER 728X90

Saturday, May 23, 2015

Cisco Router and Security Device Manager (Role-Based Command-Line Interface (CLI) Access)

Cisco routers are doing so many more things today other than routing that I frequently get
Role Based Views
 asked how can I give such and such group limited, specific access to my router? A common example of this I run into is a customer has routers that are running multiple services: firewall, IPS, VPN, QoS, Voice Gateway, oh and of course routing. The network team typically owns exclusive admin privileges to the router but is frequently in need of providing other groups with limited, controlled access to their gear. The security team wants access to the IPS configuration, the voice group wants access to the voice gateway, the NOC support guys want access for troubleshooting, etc. etc. The bottom line is folks want to know how to configure their cisco routers to perform easy, yet granular, role-based access control.

Available in Cisco IOS® Software Release 12.3(7)T. Up to Sixteen CLI Views-
  • Role-based views,
  • One “root” view,
  • Up to fifteen custom views,
  • Standard feature in all Cisco IOS Software images.

The Cisco® Router and Security Device Manager (SDM) can create and delete four predefined views for Cisco SDM users:

  1. SDM_Administrator(root)- A user associated to this view type has complete access to the Cisco SDM, and  can perform all operations supported by the Cisco SDM.
  2. SDM_Monitor- A user associated to this view type can monitor all the features supported by the Cisco SDM, but cannot deliver configurations using the Cisco SDM. The user can navigate the various areas of  Cisco SDM, such as the Interfaces and Connections, Firewall, and VPN features. However, the user interface components in these areas are disabled.
  3. SDM_Firewall- A user associated to this view type can use the Cisco SDM Firewall and Monitor features. The user can configure firewalls and access control lists (ACLs) using the Firewall wizard, Firewall Policy View, Inspect Rule Editor, and the ACL Editor. The user can associate or disassociate ACLs and Inspect rules from Interfaces and Connections; user interface components in other areas are disabled for this user.
  4. SDM_EasyVPN_Remote- A user associated to this view type can use the Cisco SDM Easy VPN Remote features. The user can create Easy VPN Remote connections and edit them. User interface components in other areas are disabled for this user.


There are four types of views:
  • CLI view- where you configure your view policy for a particular role.
  • Root View- the mode you must be in on the router in order to configure a cli view (must be in privilege 15).
  • Super View- collection and merging of multiple cli views.
  • Lawful Intercept View- Lawful Intercept user can only access lawful intercept commands that are held within the TAP-Management Information Base (MIB).

Prerequisite Configuration:


• The “enable” password must exist

         Password encryption is recommended 
         For better security, use “enable secret” password
         To access root view the passwords are:
         Enable secret (if present) 
         Enable password (if enable secret is not present)
• AAA must first be enabled with the aaa new-modelcommand
• Root view user must have privilege fifteen level assigned via the privilege command 

Solve Lab 22: Role Based CLI

Configuration:

R1#enable view
% AAA must be configured.

R1#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#aaa new-model
R1(config)#end

R1#enable view root
Please enter your password:
prompted for the enable password

R1#
Sep  7 22:51:47.297: %PARSER-6-VIEW_SWITCH: successfully set to view 'root'.
R1#sh privilege
Currently in View Context with view 'root'
R1#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#parser view HELPDESK
R1(config-view)#
Sep  7 23:16:40.889: %PARSER-6-VIEW_CREATED: view 'HELPDESK' successfully created.

R2(config-view)#commands exec ?
  exclude            Exclude the command from the view
  include            Add command to the view
  include-exclusive  Include in this view but exclude from others

R1(config-view)#commands exec include show version
% Password not set for the view HELPDESK
Initailly, I am unable to configure commands. Configuring a secret is mandatory prior to allowing any commands.
R1(config-view)#secret cisco1
R1(config-view)#commands exec include show version
R2(config-view)#commands exec include show ip interface
R2(config-view)#exit


R2#enable view HELPDESK
Please enter your password:


R2#
Sep  8 06:02:17.324: %PARSER-6-VIEW_SWITCH: successfully set to view 'HELPDESK'.
R2#?
Exec commands:
  enable  Turn on privileged commands
  exit    Exit from the EXEC
  show    Show running system information


R2#show ?
  flash:  display information about flash: file system
  ip      IP information
  parser  Show parser commands


R2#show ip ?
  interface  IP interface status and configuration


R2#show ip interface
FastEthernet0/0 is up, line protocol is up
  Internet address is 10.1.4.4/24
  Broadcast address is 255.255.255.255
  Address determined by setup command
  MTU is 1500 bytes
  Helper address is not set
  Directed broadcast forwarding is disabled
  Multicast reserved groups joined: 224.0.0.9
  Outgoing access list is not set
  Inbound  access list is not set
  Proxy ARP is enabled
  Local Proxy ARP is disabled
  Security level is default
  Split horizon is enabled
  ICMP redirects are always sent
  ICMP unreachables are always sent
  ICMP mask replies are never sent
  IP fast switching is enabled
  IP fast switching on the same interface is disabled
  IP Flow switching is disabled
  IP CEF switching is enabled
  IP CEF switching turbo vector
  IP multicast fast switching is enabled


No comments:

Post a Comment