Method for carrying out 802.1X authentication cross equipment, access equipment and access control equipment

An access control device and access device technology, applied in the field of authentication, can solve problems such as inability to combine WLAN security architecture, inability to enable WLAN security configuration, and inability to support key transmission.

Active Publication Date: 2014-05-14
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The disadvantages of the above three solutions are: only wired authentication can be performed for wireless users, and cannot be combined with the WLAN security architecture; Encrypted data transmission is required, so it does not conform to the security framework of wireless user authentication. The reason for this phenomenon is: In schemes 1, 2, and 3, only Layer 2 message transmission is supported between AC and BRAS, while the current BRAS and AC The Layer 2 protocol does not support key transmission, so the BRAS cannot deliver the key information to the AC, and key negotiation cannot be performed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for carrying out 802.1X authentication cross equipment, access equipment and access control equipment
  • Method for carrying out 802.1X authentication cross equipment, access equipment and access control equipment
  • Method for carrying out 802.1X authentication cross equipment, access equipment and access control equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0045] image 3 It is a flowchart of a method for performing 802.1X authentication across devices provided in Embodiment 1 of the present invention, as shown in image 3 As shown, the specific steps are as follows:

[0046] Step 301: Enable the WLAN security template on the access device in advance, and establish an 802.1X authentication tunnel between the access device and the access control device, enable the 802.1X client template on the access device, and Enable the 802.1X device-side profile on the tunnel interface of the device.

[0047] The tunnel may be a Light Weight Access Point (LWAP, Light Weight Access Point) tunnel.

[0048] Enable the 802.1X client template on the access device, that is, configure the 802.1X client on the access device so that the access device can perform the function of the 802.1X client instead of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In a method for 802.1X authentication, used in a network which comprises an access device and an access control device, a WLAN security template and a 802.1X client template is enabled at the access device, a 802.1X client template is enabled at the access device, and a 802.1X device template is enabled at a tunnel port of the access control device. The access control device establishes a 802.1X authentication tunnel with the access device, receive a packet transmitted by a client at the access control device through the 802.1X authentication tunnel, authenticates the client after receiving the packet, and assists the access device through the 802.1X authentication tunnel to obtain a session key.

Description

technical field [0001] The invention relates to the technical field of authentication, in particular to a method for performing 802.1X authentication across devices, an access device, and an access control device. Background technique [0002] The Institute of Electrical and Electronics Engineers (IEEE, Institute of Electrical and Electronics Engineers) 802 Local Area Network / Wide Area Network (LAN / WAN, Local Area Network / Wide Area Network) committee proposed the 802.1X protocol in order to solve the security problem of the wireless local area network. Later, the 802.1X protocol was widely used in Ethernet as a common access control mechanism for LAN ports, mainly to solve the problems of authentication and security in Ethernet. [0003] The 802.1X protocol is a port-based network access control protocol. "Port-based network access control" refers to the authentication and control of the accessed user equipment at the port level of the LAN access equipment. If the user equ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04W12/06H04W12/04H04W84/12H04W12/068H04L63/0892
Inventor 柴永富徐勇刚
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products