Method for access to control address through media and learning control equipment access to Ethernet

A technology for controlling equipment and Ethernet, applied in the field of Ethernet communication, it can solve the problems of complex configuration, adding new equipment and management complexity, and high cost, and achieve the effect of preventing private access.

Inactive Publication Date: 2008-01-23
ZTE CORP
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Among the methods of controlling illegal access in the prior art, one requires equipment other than switches to support, such as broadband authentication servers, etc., the cost is quite high, and the configuration is relatively complicated, which is not realistic for enterprises or small networks. The method is that switches support authentication protocols such as 802.1X, while simple and small Layer 2 switches generally do not support these protocols
At the same time, if the authentication protocol is enabled, a dedicated authentication server is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for access to control address through media and learning control equipment access to Ethernet
  • Method for access to control address through media and learning control equipment access to Ethernet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The invention controls the communication of the fixed legal user under a certain port of the access switch by controlling the formation of the hardware MAC address table.

[0019] After the Ethernet network is established, there may be one or several network devices under a certain port of the user access switch closest to the user, and these network devices are approved by the administrator of this switch.

[0020] The processing method of controlling access through MAC address learning in the present invention will be described below in conjunction with the accompanying drawings.

[0021] As shown in Figure 1, it is a schematic diagram of a simple network. In the figure, it shows a small network with autonomous management rights. The administrator needs to control the legal access of users in this area, but there are no other networks outside the dotted line. administrative privileges. There are two legal users PC1 and PC2 under the hub HUB of port 1 of switch A, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for controlling the access of a device into the Ethernet, which comprises the following steps that (a) access grant equipments or MAC addresses of the valid user are obtained, the corresponding ports of the MAC addresses are deployed to restricted ports on an exchanger, and an association relationship between the restricted ports and the valid user MAC addresses is built and kept; (b) when the device is accessed into the exchanger, the exchanger learns the MAC addresses of the device and the PORT of the exchanger entered by the data frame through the data frame sent by the equipment; (c) when the PORT is a restricted port and that the MAC addresses are the corresponding valid user MAC addresses is learned, the access of the user is prevented. The present invention can prevent the unauthorized access of invalid devices, unauthorized network changing and network attack of the invalid user, without adding a new device.

Description

technical field [0001] The invention relates to Ethernet communication technology, more specifically, a method for controlling user access in an Ethernet switch. Background technique [0002] With the rapid development of the Internet, the Ethernet network has gradually become an indispensable tool in people's daily work and life. At the same time, as the use of the Ethernet network increases, the network becomes larger and more difficult to manage. After the management personnel have built and debugged the network for users, preventing users from accessing and changing lines without authorization has become a concern. Access switches are generally relatively simple, without complicated control strategies, and with simple functions, just by learning the MAC (media access control) address of the data frame (the MAC address is the address used on the media access layer, also called the physical address), and realize the forwarding of Layer 2 data frames by learning the formed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/12H04L12/28
Inventor 杨自鹏
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products