To specify a RADIUS client from which a device will accept Change of Authorization (CoA) and disconnect requests, use the
client command in dynamic authorization local server configuration mode. To remove a client, use the no form of this command.
Syntax
client ip-address
[server-key key-string]
encrypted client ip-address server-key encrypted-key-string
no client
ip-address
Parameters
-
ip-address - Specifies the CoA client host IP address. The IP address can be an IPv4, IPv6 or IPv6z address
-
server-key
key-string – (optional) - Configures the RADIUS key to be shared between the device and a CoA client (Range: 0–128 characters). To specify
an empty string, enter "".
-
server-key
encrypted-key-string - Same as the key-string parameter, but the key is in encrypted form.
-
ignore-nas-id-attributes (optional) - Ignores attribute included in CoA requests that identify the NAS.
Default Configuration
CoA clients are not configured on the device.
Command Mode
Radius Change of Authorization Configuration mode
User Guidelines
Change of Authority (CoA) introduced peer-to-peer capability to RADIUS, enabling the device to act as a CoA server and an
external policy server to act as a CoA client. Use the client command to specify the CoA clients for which the device will
act as a server.
Use the optional server-key parameter to specify the key for RADIUS communications between the device and the specified CoA
client. This key must match the key used by the CoA client. To specify an empty string, enter "".
If the client server-key parameter is omitted, then the global CoA key (command server-key) will be used. If both the client
server-key and the global server-key were not configured, then the RADIUS exchange between the device and CoA client will
fail.
If the ignore server-key command is configured then the RADIUS exchange between the device and CoA client will succeed even
if there is a key mismatch or if a key was not configured.
Use the ignore-nas-id-attributes parameter to prevent CoA (Change of Authorization) requests from being dropped when NAS identifier
attributes differ from the actual device identifiers. This is useful in NAT environments where address translation modifies
NAS identifiers. The following attributes are ignored:
-
NAS-Identifier (RADIUS attribute 32)
-
NAS-IP-Address (RADIUS attribute 4)
-
NAS-IPv6-Address (RADIUS attribute 95)
When ignore-nas-id-attributes is enabled, CoA requests are accepted even if one or more of NAS identifier attributes included
in the CoA requests do not match the device.
Examples
Example 1
In the following example a CoA client with IP address 1.1.1.1 is added with a server key of "key1" and configured to ignore
NAS identifier attributes:
switchxxxxxx(config)# aaa server radius dynamic-author
switchxxxxxx(config-locsvr-da-radius)# client 1.1.1.1 server-key key1 ignore-nas-id-attributes
Example 2
. In the following example a CoA client with IP address 2.2.2.2 is added without configuring a client server-key. In this
case the global server-key (if configured) will be used:
Switch010203(config)# aaa server radius dynamic-author
Switch010203(config-locsvr-da-radius)# client 2.2.2.2