Method for binding link layer information based on network access authentication information carrying protocol

A technology for network access and authentication information, applied in the field of link layer information binding based on PANA protocol, can solve the problems of unable to bind link layer information, unable to bind PANA client link layer information, etc. safety effect

Inactive Publication Date: 2008-05-14
ZTE CORP
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can only bind the PANA client and its own link layer information, but cannot bind the link layer information of the PANA client and the network device it is connected to.
When there is an intermediate access device connection between the PANA client and the enforcement point, this method cannot bind the link layer information of the PANA client and the intermediate access device, especially the enforcement point it accesses. Link layer information of the device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for binding link layer information based on network access authentication information carrying protocol
  • Method for binding link layer information based on network access authentication information carrying protocol
  • Method for binding link layer information based on network access authentication information carrying protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0046] Such as image 3 As shown, the network structure of the embodiment of the present invention is composed of host 10, home gateway 20, DSLAM30 (Digital Subscriber Line Access Multiplexer, digital subscriber line access multiplexer), NAS 40, Internet / Intranet 50 and AAA server 60. Among them, the home gateway 20 has a PANA client function, the NAS 40 has a PANA authentication agent and an execution point function, the DSLAM 30 is an intermediate access device between the home gateway 20 and the NAS 40, and AAA (Authentication, Authorization, Accounting, authentication, authorization, billing) server 60 has an authentication server function.

[0047] The followi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for binding the information on the data link layer based on the Protocol for carrying Authentication for Network Access (PANA), which can enhance the safety of the network access based on the PANA protocol. The invention comprises the following steps: (a) an enforcement point obtains the information on the link layer of the network equipment that a PANA client accesses through the IP address of the PANA client; (b)a PANA authentication agent obtains the information on the data link layer of the network equipment that the PANA client accesses from the enforcement point through the IP address of the PANA client; (c) the PANA client and the binding of the information on the data link layer of the network equipment that the PANA client accesses are verified.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to a method for binding link layer information based on the PANA (Protocol forcarrying Authentication for Network Access, Network Access Authentication Information Bearing Protocol) protocol. Background technique [0002] The PANA protocol carries the EAP (Extensible Authentication Protocol, Extensible Authentication Protocol) authentication protocol on the IP (Internet Protocol, Internet Protocol), so that it can apply any authentication method on any link. In other words, PANA is an access authentication protocol at the network layer, and PANA can be applied to any link layer that supports IP. PANA runs between clients who want to access the network and servers located on the network side. PANA is intended to be used in any access network, regardless of underlying security. For example, the applicable network may be physically secure, or it may be secured u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/56H04L29/12
Inventor 曹文利
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products