04-02-2014 09:36 AM
I am trying to set up TACACS authentication for management of our Avaya Switches.
When my enforcement policies are applied and a privilidge level is sent to the switch, all users, regardless of privilidge level are only getting read-only access.
I am using the "Shell" TACACS Service dictionary to send the priv-lvl service attribute.
I played with checking the "Enable to Permit Unmatched Commands" under the commands tab with the command list empty.
This gives rw access to all. even those at priv-lvl 1.
Not sure what to try next.