Intelligent control method for realizing city Ethernet exchanger switch-in security

An intelligent control and switch technology, applied in the computer field, can solve problems such as complex configuration and insufficient functions, and achieve the effect of strengthening network security, simple configuration, and improving security

Inactive Publication Date: 2007-08-22
WUHAN FIBERHOME NETWORKS
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0077] The purpose of the present invention is to propose an intelligent control method for realizing the access security of a metropolitan Ethernet switchboard in view o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent control method for realizing city Ethernet exchanger switch-in security
  • Intelligent control method for realizing city Ethernet exchanger switch-in security
  • Intelligent control method for realizing city Ethernet exchanger switch-in security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0105] ●Adopt IEEE802.1x protocol

[0106]The protocol is based on Client / Server access control and authentication protocol. It can restrict unauthorized user equipment from accessing LAN / WAN through the access port. Before obtaining various services provided by switches or LANs, 802.1x authenticates users connected to switch ports. Before the authentication is passed, 802.1x only allows EAPoL (Extensible Authentication Protocol for LAN) data to pass through the switch port connected to the device; after the authentication is passed, normal data can pass through the switch port.

[0107] ● Anti-proxy based on switch port authentication and application binding

[0108] The user identity authentication technology represented by 802.1X cannot prevent illegal user PCs from accessing the Internet through proxy software on legitimate user PCs, because af...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An intelligently controlling method for realizing city Ethernet switch-board access safety integrates functions of certificating user legality, exerting illegal agent proof of legal user, controlling P2P flow rate and DHCP SNOOP together in said method for controlling and monitoring user in order to raise safety of network.

Description

technical field [0001] The invention belongs to the technical field of computers, and relates to a security control technology of an Ethernet switch, in particular to an intelligent control method for realizing the access security of a metropolitan Ethernet switch. Background technique [0002] Currently, several commonly used security control technologies for Ethernet switches are as follows: [0003] ●User legitimacy authentication [0004] The most commonly used user legality authentication function on an Ethernet switch is IEEE 802.1x (hereinafter referred to as 802.1x). The protocol is based on Client / Server access control and authentication protocol. It can restrict unauthorized user equipment from accessing LAN / WAN through the access port. Before obtaining various services provided by switches or LANs, 802.1x authenticates users connected to switch ports. Before the authentication is passed, 802.1x only allows EAPoL (Extensible Authentication Protocol for LAN) dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/28
Inventor 李松罗婷
Owner WUHAN FIBERHOME NETWORKS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products