Cisco Cisco IOS Software Release 12.2(27)SBC

Page de 32
RADIUS-Based Lawful Intercept
  client
15
Cisco IOS Security Configuration Guide
client
To specify a RADIUS client from which a device will accept Change of Authorization (CoA) and 
disconnect requests, use the client command in dynamic authorization local server configuration mode. 
To remove this specification, use the no form of this command.
client {name | ip-address} [key [0 | 7word] [vrf vrf-id
no client {name | ip-address} [key [0 | 7 ] word] [vrf vrf-id]
Syntax Description
Command Default
CoA and disconnect requests are dropped.
Command Modes
Dynamic authorization local server configuration
Command History
Usage Guidelines
A device (such as a router) can be configured to allow an external policy server to dynamically send 
updates to the router. This functionality is facilitated by the CoA RADIUS extension. CoA introduced 
peer-to-peer capability to RADIUS, enabling a router and external policy server each to act as a RADIUS 
client and server. Use the client command to specify the RADIUS clients for which the router will act 
as server.
Examples
The following example configures the router to accept requests from the RADIUS client at IP address 
10.0.0.1:
aaa server radius dynamic-author
client 10.0.0.1 key cisco
name
Hostname of the RADIUS client.
ip-address 
IP address of the RADIUS client.
key 
(Optional) Configures the RADIUS key to be shared between a device and a 
RADIUS client.
0
(Optional) Specifies that an unencrypted key will follow.
7
(Optional) Specifies that a hidden key will follow. 
word
(Optional) Unencrypted server key.
vrf vrf-id
(Optional) Virtual Routing and Forwarding (VRF) ID of the client.
Release
Modification
12.2(28)SB
This command was introduced.