The objective of this article is to show you how to perform a basic configuration of change of authorization (CoA) feature in Catalyst 1300 switches using the command line interface (CLI).
Change of Authorization (CoA) is an extension to the RADIUS protocol, that allows you to change the properties of an authentication, authorization, and accounting (AAA) or dot1x user session after it has been authenticated. When a policy for a user or group in AAA changes, administrators can transmit RADIUS CoA packets from the AAA server, such as a Cisco Identity Services Engine (ISE), to reinitialize authentication and apply the new policy.
The Cisco Identity Services Engine (or ISE) is a fully featured Network Based Access Control and Policy Enforcement Engine. It provides security analysis and enforcement, RADIUS and TACACS services, policy distribution, and more. Cisco ISE is currently the only supported CoA Dynamic Authorization Client for Catalyst 1300 switches. Refer to the ISE Admin guide for more information.
The CoA support has been added to the Catalyst 1300 switches in firmware version 4.1.3.36. This includes support for disconnecting users and changing authorizations applicable to a user session. The device supports the following CoA actions:
In this article, you will find the commands for a basic CoA configuration in Catalyst 1300 switches using CLI. The steps could vary based on the user settings and requirements.
To configure the RADIUS server, from global config mode, use the following commands:
Use the radius-server key command to set the authentication key for RADIUS communications between the device and the RADIUS daemon.
switch(config)#radius-server key <key-string>
Use the radius-server host command to configure a RADIUS server host.
switch(config)# radius-server host<ISE Server IP Address> key <key-string> priority 1 usage dot1.x
switch(config)# aaa accounting dot1x start-stop group radius
From the global configuration mode, enter the CoA configuration mode by running the command:
switch (config)# aaa server radius dynamic-author
To configure the RADIUS key to be shared between the device and a CoA client (Range: 0–128 characters), use the command server-key <key-string> in dynamic authorization local server configuration mode. The key provided in the CoA request must match this key.
switch (config-locsvr-da-radius) # server-key <key-string>
For ISE, the key-string will be the same key string you specified for the RADIUS server key-string when configuring RADIUS.
Enter the CoA client host IP address. The IP address can be an IPv4, IPv6 or IPv6z address.
switch (config-locsvr-da-radius) #client <ISE Server IP Address>
switch(config) # Exit
To enable 802.1X globally, use the dot1x system-auth-control command.
switch(config) # dot1x system-auth-control
Enter the Interface configuration and select the interface ID by using the command interface GigabitEthernet<Interface ID>.
switch(config)# interface gi1/0/1
To enable manual control of the port authorization state, use the dot1x port-control command. Auto mode enables 802.1X authentication on the port and causes it to transition to the authorized or unauthorized state, based on the 802.1X authentication exchange between the device and the client.
switch(config-if) # dot1x port-control auto
To initiate manually re-authentication of all 802.1X-enabled ports or the specified 802.1X-enabled port, use the dot1x re-authenticate command in privileged EXEC mode.
switch#dot1x re-authenticate gi1/0/1
To configure the port security learning mode, use the port security mode Interface (Ethernet, Port Channel) configuration mode command. Secure delete-on-reset parameter is a secure mode with limited learning secure MAC addresses with the delete-on-reset time-of-live.
switch(config-if)# port security mode secure delete-on-reset
To exit the interface configuration, enter the following:
switch(config-if)#exit
Here are some of the other CoA commands that can be used based on your configuration and set up.
Switch010203(config-locsvr-da-radius )# attribute event-timestamp drop-packet
Switch010203(config)#authentication command bounce-port ignore
Switch010203(config)# authentication command disable-port ignore
Switch010203(config-locsvr-da-radius)#domain delimiter $
In this example the $ character is configured as a delimiter.
Switch010203(config-locsvr-da-radius)#domain stripping right-to-left
Switch010203(config-locsvr-da-radius)#ignore server-key
From privilege exec mode, you can run show commands on the authenticated clients, clear the client counters, and show Dynamic Authorization Server configuration.
Switch010203#show aaa clients
Switch010203#show aaa server radius dynamic-author
Switch010203#clear aaa clients counters
You have now completed a basic change of authorization (CoA) configuration in Catalyst 1300 switch using CLI.
For more information on the CLI commands for the Catalyst 1300 switches, refer to the Cisco Catalyst 1300 Switches Series CLI Guide.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
23-Oct-2024 |
Initial Release |