MAC authentication method and apparatus
A technology for authentication equipment and authentication methods, applied in the network field, can solve problems such as unusable ports, increased costs, and network complexity, and achieve the effects of reducing workload, saving costs, and enhancing flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0050]The core idea of the present invention is to divide the VLAN under the authentication port of the authentication device into two types of virtual VLANs, authentication VLAN and non-authentication VLAN. Among them, for the message from the terminal in the authentication VLAN, it is forbidden to send any message in the unauthorized state without MAC authentication, and the message can be transmitted in the authorized state with MAC authentication; for the terminal from the non-authenticated VLAN Messages are always allowed to pass.
[0051] As shown in Figure 3, a MAC authentication method of the present invention includes the following steps:
[0052] Step s301, configure the authentication device and its authentication port.
[0053] Specifically, the authentication device is configured to have the MAC authentication function, and its port is configured as an authentication port with the MAC authentication function.
[0054] Step s302, configure the VLAN under the authenti...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap