MAC authentication method and apparatus

A technology for authentication equipment and authentication methods, applied in the network field, can solve problems such as unusable ports, increased costs, and network complexity, and achieve the effects of reducing workload, saving costs, and enhancing flexibility

Inactive Publication Date: 2008-06-11
NEW H3C TECH CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] When using this method, the existing problems are as follows: the method of adding an access layer switch increases the cost and network complexity, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MAC authentication method and apparatus
  • MAC authentication method and apparatus
  • MAC authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0050]The core idea of ​​the present invention is to divide the VLAN under the authentication port of the authentication device into two types of virtual VLANs, authentication VLAN and non-authentication VLAN. Among them, for the message from the terminal in the authentication VLAN, it is forbidden to send any message in the unauthorized state without MAC authentication, and the message can be transmitted in the authorized state with MAC authentication; for the terminal from the non-authenticated VLAN Messages are always allowed to pass.

[0051] As shown in Figure 3, a MAC authentication method of the present invention includes the following steps:

[0052] Step s301, configure the authentication device and its authentication port.

[0053] Specifically, the authentication device is configured to have the MAC authentication function, and its port is configured as an authentication port with the MAC authentication function.

[0054] Step s302, configure the VLAN under the authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an MAC authentication method which comprises the following steps: when an authentication port of an authentication device receives a message which is transmitted by exchange equipment, a source MAC address of a terminal which transmits the message and a VLAN which the source MAC address belongs to are acquired; the authentication device processes the message according to the source MAC address of the terminal which transmits the message and the VLAN which the source MAC address belongs to. The invention also discloses an MAC authentication system. By utilization of the invention, detailed division of surfing user terminals in MAC authentication is realized, and user terminals without necessity for authentication also can access networks through the authentication port; moreover, the invention has the advantages of reinforcement of networking flexibility, conservation of cost, and reduction of network management and maintenance work load.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a MAC authentication method and equipment. Background technique [0002] MAC (Medium Access Control, Media Access Control) authentication is a method to control the user's network access rights based on port and MAC address. The user does not need any client software to cooperate. The switch detects the user's MAC address for the first time. After address, start authentication for this user. After the authentication is initiated, the user's MAC address is passed to the RADIUS (Remote Authentication Dial In User Service) Client as the user name, and then the RADIUS Client interacts with the RADIUS Server through the RADIUS protocol message, and finally the Sever completes the authentication. Authentication for this MAC user. When adding a MAC authentication user, it can be configured in two ways: one is to specify that the user name and password are both the user's MAC address ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L29/06H04L12/46
Inventor 郭振华
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products