📘CompTIA Security+ (SY0-701)
What is CoA?
- CoA stands for Change of Authorization.
- It is a method used in network access control to change the permissions or policies applied to a device or user after they are already connected to the network.
- In other words, the user or device is already on the network, and you want to update their access privileges without disconnecting them.
Think of it as changing the rules for a user mid-session based on new security requirements or user behavior.
How CoA Works in IT Networks
- Network Devices Involved:
- Authenticator: This is typically a switch or wireless access point where the device connects to the network.
- Authentication Server: Usually a RADIUS server (like Cisco ISE), which decides what access a device or user should have.
- Supplicant: The device trying to access the network (like a laptop or phone).
- Process Flow:
- A device connects to the network and is authenticated using 802.1X, MAB, or WebAuth.
- The authentication server assigns an initial policy (e.g., VLAN assignment, access to certain resources).
- Later, if the user’s role or status changes, the server can send a CoA message to the switch or access point.
- The network device then updates the user’s session dynamically—for example:
- Moving the user to a different VLAN
- Applying stricter ACLs (firewall rules)
- Restricting or revoking access entirely
- Allowing more privileges
Key point: The user does not need to disconnect or log in again. CoA applies changes in real-time.
Types of CoA Messages
CoA messages are sent from the RADIUS server to the network device (switch/AP) to enforce changes. Cisco networks commonly use these RADIUS message types:
- Reauthenticate (Reauth)
- Forces the network device to reauthenticate the user.
- Can trigger a new 802.1X authentication session.
- Example: A user’s role changes from “guest” to “employee,” and they now need full access.
- Disconnect
- Forces the device to disconnect the user immediately.
- Example: A device is detected as infected with malware; network access is revoked.
- Change of VLAN
- Moves the user to a different VLAN without disconnecting.
- Example: A guest initially has internet-only access and is moved to a VLAN with corporate resources after approval.
- ACL or QoS Update
- Changes firewall rules, ACLs, or Quality of Service dynamically.
How CoA is Implemented in Cisco Networks
- Cisco uses Cisco ISE (Identity Services Engine) as the central authentication and policy server.
- Network devices (switches, APs) must support RADIUS CoA and be configured to accept CoA messages.
- Key steps:
- Enable CoA on the RADIUS server (ISE).
- Enable CoA on the network device. For example, on a Cisco switch:
aaa new-model aaa authorization network default group radius radius-server host <ISE-IP> auth-port 1812 acct-port 1813 coa-port 3799 - Define policies in ISE that trigger CoA based on conditions like:
- Device posture (compliant or noncompliant)
- User role changes
- Security events (malware detected, high-risk activity)
- Test CoA to ensure changes apply in real-time without disconnecting sessions.
Why CoA is Important
- Dynamic Security
- Adjusts user/device permissions immediately in response to security events.
- Example: Endpoint fails posture check → CoA moves it to a restricted VLAN.
- Minimizes Disruption
- Users do not need to disconnect and reconnect for policy changes.
- Supports Guest and BYOD
- Helps manage temporary access for guests and personal devices efficiently.
- Enforces Compliance
- Automatically applies security policies if devices are noncompliant.
Example Scenarios in IT Networks
- Endpoint Posture
- A laptop connects and passes initial checks. Later, antivirus becomes outdated.
- CoA moves it to a restricted VLAN until it updates.
- Role Changes
- Employee gets promoted → CoA updates ACLs to allow access to sensitive resources.
- Security Threat
- Device shows unusual traffic → CoA disconnects it immediately or limits access.
Exam Tips for 350-701
- Remember the main purpose: CoA changes access policies after the device is already connected.
- Know the types of CoA messages: Reauth, Disconnect, VLAN change, ACL/QoS update.
- Understand the flow: Device → Authenticator → RADIUS Server → CoA message back → Policy enforcement.
- Be familiar with real Cisco commands for enabling CoA on switches and ISE.
- Associate CoA with dynamic security and posture enforcement.
✅ Key Takeaways
- CoA = Change of Authorization, dynamic policy changes for connected users.
- Works without user disconnection.
- Triggered by RADIUS server (ISE) using CoA messages.
- Types of actions: Reauthenticate, Disconnect, VLAN change, ACL/QoS update.
- Essential for security, compliance, and dynamic network access control.
