ISCW Notes – Role-based Views

I’m at training for the ISCW test this week, and this topic came up yesterday.  Since it came up last week at the office, I figure it was a sign from $deity that it was time for a blog entry.

An admin in another business unit was trying to set up command access for some of his techs.  He was going through a couple of routers and assigning commands to privilege levels so that his techs could access them.  He was having a boat load of problems, though, and couldn’t get it to work

He was trying to allow his guys to run a show ip route, but they also wanted to run show ip route x.x.x.x.  He was assigning commands to privilege level 7 then giving his tech’s user accounts the same privilege.

For some reason, this wasn’t working, though.  The user could log into the router, but they couldn’t get authorized to run the subcommands as expected.  I blamed it on his non-standard 7600 running a non-standard IOS version (sorry, I can’t give any more detail without revealing too much about the company), but I came across a much easier way to do it today in class with role-based views.

A view is a set of commands that can be assigned to users, and, to give a user access to those commands, you make them a member of that view.  You’ll see that in a second.  You also have a superview, which is a set of views, so a user can be a member of multiple views.

There are some prerequisites to using views.  First of all, you have to have the enable secret set.  You should already have that on a production router, but, if you’re working in a lab or something, you may have issues.  You also need to have AAA enabled.  That’s beyond the scope here, but I’m sure you can figure it out.

To configure a view, you must first be in the root view.  How do you do that?  Just enable to it.

You’ll enter the enable secret, and nothing special will happen, but now you can use the parser view command to create a new view.  This takes you into the view submode which is where you list what commands you want to let users run.  You also set a secret (password) so you can call up the view later.

Let’s create a view called “TechView” for my guy.  We’ll give members of that view access to the “show ip route” commands to include all the subcommands.  We’ll put the user “tech1” in that view, too.

Every time that “tech1” logs in, that user will have access to all the show ip route commands.  If you have a user who is not in that view but wants access to it, they can run the enable view TechView command and enter the secret.  On the console, you’ll see a message saying that user has switched to the view.  If the user does a show parser view, they can see what view they’re in.

Send any test vouchers questions my way.

Aaron Conaway

I shake my head around sometimes and see what falls out. That's what lands on these pages.

More Posts

Follow Me:
Twitter

4 comments for “ISCW Notes – Role-based Views

  1. Andy
    November 11, 2009 at 11:15 pm

    Doesn’t seem to work for me. I copied your example but instead gave tech1 access to the show run command.

    router(config)#parser view TechView
    router(config-view)#secret view.pass
    router(config-view)#command exec inc all show running-config
    router(config)#username tech1 view TechView secret tech.pass

    —–

    router>enable view TechView
    Password:

    router#show parser view
    Current view is ‘TechView’

    router#sh running-config
    Building configuration…

    Current configuration : 93 bytes
    !
    ! Last configuration change at 15:10:38 AEDT Thu Nov 12 2009 by abcdefg
    !
    !
    !
    !
    !
    !
    !
    end

  2. November 12, 2009 at 8:32 am

    Hey, Andy.

    I get the same thing in my lab running 12.4.(25b) on a 3640 in Dynagen. I’ll do some research and see what I can find. I would say that since it deals with the config, it’s probably a little more protected, but I can add “show start” to the view and see the whole things. Weird.

  3. November 23, 2009 at 6:05 pm

    I can’t find a solution, Andy. Can anyone help out?

Leave a Reply

Your email address will not be published. Required fields are marked *