Prerequisites for IKEv2 Change of Authorization Support
- IKEv2 must be registered as a component, via a registry entry, on Cisco AAA component.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The FlexVPN - IKEv2 CoA for QoS and ACL feature supports RADIUS Change of Authorization (CoA) on an active IKEv2 crypto session.
Information About IKEv2 Change of Authorization Support
The RADIUS Change of Authorization (CoA) provides a mechanism to change the attributes of an authentication, authorization, and accounting (AAA) session after it is authenticated. When a policy changes for a user or user group in AAA, administrators can send the RADIUS CoA packets from the AAA server such as a Cisco Secure Access Control Server (ACS) to reinitialize authentication and apply the new policy.
A standard RADIUS interface is typically used in a pulled model, in which the request originates from a device attached to a network and the response is sent from the queried servers. Cisco software supports the RADIUS CoA request defined in RFC 5176 that is used in a pushed model, in which the request originates from the external server to the device attached to the network, and enables the dynamic reconfiguring of sessions from external authentication, authorization, and accounting (AAA) or policy servers.
Fore more information on RADIUS CoA, see Authentication, Authorization, and Accounting Configuration Guide, Cisco IOS Release 15M&T or Authentication, Authorization, and Accounting Configuration Guide, Cisco IOS XE Release 3S
The FlexVPN - IKEv2 CoA for QoS and ACL feature allows to change attributes of an active IKEv2 crypto session to apply a new authorization attributes. The Cisco AAA component receives a Change of Authorization (CoA) packet from a AAA server and checks if the received CoA packet is meant for any of the components registered with it. If a component sees that the CoA packet is meant for itself, it processes it further. Based on the fields in the CoA packet, if the packet is relevant for a given component, such as IKEv2, the packet is consumed by that component. AAA will not forward the packet to the next component in the list.
In case of this feature, after IKEv2 receives a CoA packet, IKEv2 verifies the CoA packet for the Cisco (AV) pairs. IKEv2 identifies the session based on the audit-session-id which is already stored in the RADIUS server.
If the CoA packet contains attributes not supported by IKEv2, IKEv2 discards the packet and sends a CoA-NACK to AAA component.
The FlexVPN - IKEv2 CoA for QoS and ACL feature supports the following Cisco AV pairs:
ip:interface-config
ip:sub-policy-In
ip:sub-policy-Out
ip:sub-qos-policy-in
ip:sub-qos-policy-out
ipsec:inacl
ipsec:outacl
How to Configure IKEv2 Change of Authorization Support
There is no IKEv2-specific configuration required for this feature. on the FlexVPN server for the IKEv2 Change of Authorization (CoA) Support feature. You only need to configure the RADIUS Change of Authorization on the FlexVPN server. For more information on AAA configuration, see the RADIUS Change of Authorization feature module in the Authentication, Authorization, and Accounting Configuration Guide, Cisco IOS Release 15M&T.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable Example:
|
Enables privileged EXEC mode. Enter your password, if prompted. |
||
Step 2 |
configure terminal Example:
|
Enters the global configuration mode. |
||
Step 3 |
aaa new-model Example:
|
Enables authentication, authorization, and accounting (AAA) globally. |
||
Step 4 |
aaa server radius dynamic-author Example:
|
Enters dynamic authorization local server configuration mode and specifies a RADIUS client from which a device accepts Change of Authorization (CoA) and disconnect requests. Configures the device as a AAA server to facilitate interaction with an external policy server. |
||
Step 5 |
client {ip-address | name [vrf vrf-name]} server-key [0 | 7] string Example:
|
Configures the RADIUS key to be shared between a device and RADIUS clients. |
||
Step 6 |
port port-number Example:
|
Specifies the port on which a device listens for RADIUS requests from configured RADIUS clients.
|
||
Step 7 |
auth-type {any | all | session-key} Example:
|
Specifies the type of authorization that the device must use for RADIUS clients. The client must match the configured attributes for authorization. |
||
Step 8 |
ignore session-key Example:
|
(Optional) Configures the device to ignore the session key. |
||
Step 9 |
ignore server-key Example:
|
(Optional) Configures the device to ignore the server key. |
||
Step 10 |
exit Example:
|
Returns to the global configuration mode. |
Use the following show commands to view the success of change of authorization (CoA) on Cisco Devices.
Step 1 |
enable Example:
Enables privileged EXEC mode.
|
Step 2 |
show platform hardware qfp active feature qos all output all Example:
Displays platform-specific information if CoA was successful. |
Step 3 |
show platform hardware qfp active feature qos all input all Example:
Displays the feature status. |
Configuration Examples for IKEv2 Change of Authorization Support
The following sample output is displayed when an administrator triggers a change of authorization (CoA). The session is identified based on the audit-session-id, a dynamic string, which is an encoded form of 6 tuple information of a session with peer.
IKEv2 receives a change of authorization (CoA) packet from a RADIUS server. The session is identified based on audit-session-id.
*Oct 6 23:38:55.250: RADIUS: COA received from id 125 10.106.210.176:58712, CoA Request, len 257
*Oct 6 23:38:55.251: COA: 10.106.210.176 request queued
*Oct 6 23:38:55.251: RADIUS: authenticator BD 97 5E BA B2 EB C1 C5 - 1A 14 51 3D C2 C8 66 3F
*Oct 6 23:38:55.251: RADIUS: Vendor, Cisco [26] 62
*Oct 6 23:38:55.251: RADIUS: Cisco AVpair [1] 56 "audit-session-id=L2L44D010102ZO2L44D010101ZI1F401F4ZO2"
*Oct 6 23:38:55.251: RADIUS: Vendor, Cisco [26] 52
*Oct 6 23:38:55.251: RADIUS: Cisco AVpair [1] 46 "ip:interface-config=service-policy input pol"
*Oct 6 23:38:55.251: RADIUS: Vendor, Cisco [26] 35
*Oct 6 23:38:55.251: RADIUS: Cisco AVpair [1] 29 "ip:sub-qos-policy-out=2M-IN"
*Oct 6 23:38:55.251: RADIUS: Vendor, Cisco [26] 36
*Oct 6 23:38:55.251: RADIUS: Cisco AVpair [1] 30 "ip:sub-qos-policy-in=aaa-pol"
*Oct 6 23:38:55.251: RADIUS: Vendor, Cisco [26] 52
*Oct 6 23:38:55.251: RADIUS: Cisco AVpair [1] 46 "ip:interface-config=service-policy output 2M"
*Oct 6 23:38:55.251: COA: Message Authenticator missing or failed decode
*Oct 6 23:38:55.251: ++++++ CoA Attribute List ++++++
*Oct 6 23:38:55.251: 421C9694 0 00000089 audit-session-id(819) 37 L2L44D010102ZO2L44D010101ZI1F401F4ZO2
*Oct 6 23:38:55.251: 421C9584 0 00000081 interface-config(222) 24 service-policy input pol
*Oct 6 23:38:55.251: 421C95B8 0 00000081 sub-qos-policy-out(423) 5 2M-IN
*Oct 6 23:38:55.251: 421C95EC 0 00000081 sub-qos-policy-in(421) 7 aaa-pol
*Oct 6 23:38:55.251: 421C9620 0 00000081 interface-config(222) 24 service-policy output 2M
*Oct 6 23:38:55.251:
*Oct 6 23:38:55.251: COA: Added NACK Error Cause: Success
Related Topic |
Document Title |
---|---|
Cisco IOS commands |
|
Security commands |
Description |
Link |
---|---|
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password. |
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Information |
---|---|---|
FlexVPN - IKEv2 CoA for QoS and ACL |
The FlexVPN - IKEv2 CoA for QoS and ACL feature supports RADIUS Change of Authorization (CoA) on an active IKEv2 crypto session. No commands were modified or updated by this feature. |