Information
AOS-CX switches include three different built-in local user groups: administrators, operators, auditors. Administrators have full read-write access, operators have read-only access, and auditors can read the logs. There may be scenarios where customers need a local administrator user with a different set of permissions. User-defined local user groups allow customers to create their own user group with specific CLI commands allowed for members of that group, including access to the underlying OS shell.
The built-in local user groups may not be sufficient to meet customer needs in how they assign permissions to different local user administrator accounts. This can be utilized to allow customers to create users with access to administrator-level commands while limiting access to the underlying OS shell.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
Create local user groups as needed:
switch(config)# user-group group
switch(config-usr-grp-group)# 10 permit cli command "<command>"
switch(config-usr-grp-group)# 20 permit cli command "<command>"
switch(config-usr-grp-group)# exit
switch(config)#
Create user group rules to restrict access to underlying shell, and ability to modify the user-group rules:
switch(config)# user-group custom-admin
switch(config-usr-grp-admin2)# 10 deny cli command "start-shell"
switch(config-usr-grp-admin2)# 20 deny cli command "user .*"
switch(config-usr-grp-admin2)# 30 deny cli command "user-group .*"
switch(config-usr-grp-admin2)# 500 permit cli command ".*"
switch(config-usr-grp-admin2)# exit
switch(config)#
Impact:
The underlying Linux OS allows full access to all features of the AOS-CX system. Many administrative functions do not require access to this level of control. Limiting access to the shell helps limit exposure to both malicious and unintentionalsystem changes.