Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access control method for comprehensive safety management of inner network

A technology for network access and comprehensive management, applied in the field of network access control in the comprehensive management of intranet security, which can solve the problems of consuming network resources, unable to "discover illegal devices, and the system unable to find illegal terminals."

Active Publication Date: 2010-05-26
FUJIAN ETIM INFORMATION & TECH
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Since it is necessary to scan all addresses on the entire network, there is a certain scan interval for each address. Therefore, during this period of time, illegal access terminals can survive in the network for a certain period of time, and during this period, attackers may Part of the attack has been completed
[0007] 2. In some cases, the system cannot find the illegal terminal connected
[0008] Due to the need to specify the scanning network range, when the address used by the illegal access terminal is outside the specified scanning range, the system cannot "discover" the illegal access device
[0009] 3. Consume valuable network resources
[0010] The access control system needs to continuously scan the network in order to find illegal access terminals, which will consume a lot of valuable network resources, especially in large networks, this problem is more prominent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method for comprehensive safety management of inner network
  • Network access control method for comprehensive safety management of inner network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings and implementation examples.

[0022] Such as figure 1 As shown, the present invention uses the network access control technology to shift the control target to the computer terminal. Starting from the terminal, through the security policy specified by the administrator, the security detection is performed on the host computer connected to the internal network, and the unsafe computer access is automatically rejected. into the internal network until these computers comply with the security policy within the network. The architecture adopted is the client / server (C / S) mode, and the management adopts the browser / server (B / S) mode. The administrator can log in to the intranet security management system through the webpage and issue security policies to the terminal. Realize terminal security management and control. More specifically, the present invention is characterized ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network access control method for the comprehensive safety management of an inner network. The network access control method is characterized in that the safety control of a network access terminal is realized by the linkage among a comprehensive inner network safety management system, a switch and a Radius server. The network access control method is realized by the following steps: firstly, pointing an 802.1 X authentication server to the Radius server and dividing into three vlans of a working area, an access area and a repairing area by a switch with the 802.1X access authentication function; and then, configuring the access control strategies of the vlans on the Radius server and the linkage configuration with the comprehensive inner network safety management. The invention can manage and control the terminal safety and saves network resources by freeing detection in a continuous scanning mode.

Description

technical field [0001] The invention relates to the technical field of terminal security management and information data security, in particular to a network access control technology for comprehensive management of internal network security. Background technique [0002] With the rapid development of informatization construction, there are more and more computer terminals in the unit. How to manage the network security access of intranet terminals and the leakage of terminal information and data has become the first choice for enterprises. [0003] At present, the network access control technology of most intranet security management systems is mostly based on the working mode of "scan-discover-block". Through the management center of the network access control system, the network is continuously scanned, and the scanned The computer performs a legality check to determine whether the terminal is a legal terminal. When the terminal is found to be illegal, the ARP spoofing m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
Inventor 许元进黄聪泉杨小焰吴滨华肖健
Owner FUJIAN ETIM INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products