Cisco N7K view ACL log

This example displays how view logs of the mgmt0-access ACL:

# sh ip access-lists
IP access list mgmt0-access
 statistics per-entry
 10 permit tcp addrgroup NOC addrgroup RouterBlock eq 22 [match=2611]
 20 permit udp addrgroup NOC addrgroup RouterBlock eq snmp [match=0]
 40 permit udp addrgroup NOC eq ntp addrgroup RouterBlock [match=0]
 50 permit tcp addrgroup NOC eq tacacs addrgroup RouterBlock [match=2055]
60 permit tcp addrgroup NOC addrgroup RouterBlock eq www [match=0]
 500 permit ip addrgroup NOC addrgroup RouterBlock log [match=818]

To view the log, you need to use the following command :

# sh log ip access-list cache
Src IP Dst IP S-Port D-Port Src Intf Protocol
 Hits
--------------------------------------------------------------------------------
----------------
10.200.0.20 10.200.0.11 40196 161 mgmt0 (6)TCP
 65
10.200.0.20 10.200.0.11 56267 80 mgmt0 (6)TCP
 0
Number of cache entries: 2
--------------------------------------------------------------------------------

 

Nexus RBAC

When logging into a N5K or a N7K system VDC, the default User-Roles assigned is “network-operator”. When logging into a VDC, the default User-Roles is “vdc-operator”.

You need to add a new shell role or you also can add multiple roles:

shell:roles="\"network-admin vdc-admin\""
# sh user-account
user:admin
 this user account has no expiry date
roles:vdc-admin
user:account1
 roles:vdc-operator
account created through REMOTE authentication
Credentials such as ssh server key will be cached temporarily only for this user
 account
Local login not possible

After modify your tacacs+ configuration, you need to clear the user account cached.

(config)# no username account1

Your user in cache disappears

# sh user-account
user:admin
 this user account has no expiry date
 roles:vdc-admin

Verification :

# sh user-account
user:admin
 this user account has no expiry date
 roles:vdc-admin
user:account1
 roles:vdc-admin

Now your user have the good right.