- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello guys, I set up tacacs to my firewalls and I wanted to know if there is a way to log in straight to expert mode?
Thanks!
This can be done via the clish mode with:
set user admin shell /bin/bash
Not 100% sure, but, TACACS user always "starts" in clish mode, or not?
Of course, you always set the default privilage (not the maximum), which is CLISH
https://support.checkpoint.com/results/sk/sk98733
Akos
Ah yes this is true
After login, you can use the Gaia Clish command 'tacacs_enable TACP-15' to gain full privileges.
The security goal is to require a different password after logging in to deter malicious activities.
An Expert password that differs from all TACACS passwords, provides even more security.
HostName> add rba role TACP-15 domain-type System readwrite-features backup,clock-date,cluster_ha,configuration,expert,export,hw-monitor,message,perf,reboot_halt,revert,show-route-all,snapshot,static-route,syslog,tacacs_enable
Thank you very much for the help! So just to be clear there is no way for a tacacs user to log in to expert mode directly?
All "non local" users are impacted by this entry in /etc/passwd:
_nonlocl:x:96:100:Non-local user:/home/_nonlocl:/etc/cli.sh
You can change this by editing /etc/passwd manually, but it impacts all TACACS+ and RADIUS servers.
Thank you.
Is there something else I need to do afterwards? I changed it but it still connects to clish first.
May not be supported to change that.
In any case, a TAC case may be in order here.
Understood, thank you!
Another thing I was wondering is if it is possible to make the expert password tacacs based?
Not as far as I know.
TAC should also be able to confirm this.
To be clear, what Check Point calls "expert mode" is really two separate things: a full shell like BASH and root-level permissions. You can set both of these things for RADIUS ("set aaa radius-servers default-shell VALUE" for all users, and "set aaa radius-servers super-user-uid VALUE" for users defined as superusers), but not for TACACS.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 15 | |
| 9 | |
| 8 | |
| 8 | |
| 6 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 3 |
Wed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY