802.1X authentication method and equipment

An authentication method and AP device technology, applied in the communication field, can solve the problems of not being able to perceive the client and difficult management of the client, and achieve the effect of precise management and control

Active Publication Date: 2012-10-31
NEW H3C TECH CO LTD
View PDF2 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] With the development of wireless technology, 802.1X authentication system can be applied in wireless local area network, such as figure 2 As shown, it is an 802.1X authentication system based on wireless LAN, figure 2 The Layer 2 switch in the network is the access device. In this application scenario, the AP (Access Point, access point) device is the medium of the wireless connection, and the AP device itself does not perform access control; and for the 802.1X authentication For Layer 2 switches, due to the particularity of wireless access air interface transmission, Layer 2 switches cannot perceive which AP device the client accesses from, which makes it difficult to manage the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 802.1X authentication method and equipment
  • 802.1X authentication method and equipment
  • 802.1X authentication method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] by figure 2 It is a schematic diagram of the application scenario of the present invention. When the 802.1X authentication function is configured on the access device (that is, the Layer 2 switch), the 802.1X protocol message will be issued to report the discarding rule of the unknown source MAC address. When the client fails to pass the authentication , only the 802.1X protocol packets are sent to the upper-layer 802.1X module, and other packets will be discarded; after the client passes the authentication, it will issue the MAC forwarding entry. Exists, if it exists, forward the packet normally.

[0042] in the above figure 2 In the application scenario shown, after the client and the AP device are successfully connected, the AP device only forwards the packet. Therefore, when the authentication packet reaches the access device, the access device cannot know exactly whether the client is connected wirelessly. It is still connected in a wired way, and it is impossi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an 802.1X authentication method and equipment. The method comprises the following steps that: access equipment receives an EAPOL-Start (extensible authentication protocol over lan-Start) message from AP (access point) equipment, and the EAPOL-Start message carries the MAC (media access control) address of the AP equipment, an SSID (service set identifier) corresponding to the client and the MAC address of the client; the access equipment sends an authentication request message to an authentication server, and the authentication request message carries the MAC address of the AP equipment, the SSID corresponding to the client and the MAC address of the client; and the authentication server performs 802.1X authentication on the client by utilizing the information carried in the authentication request message. In the 802.1X authentication method and equipment, the access equipment can accurately acquire the AP equipment accessed in the client.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an 802.1X authentication method and equipment. Background technique [0002] In order to solve the network security problem of WLAN, the 802.1X protocol is proposed, which is widely used in Ethernet as the access control mechanism of LAN ports, and it is used to solve the problems of authentication and security in Ethernet; 802.1 Protocol X is a port-based network access control protocol, and port-based network access control refers to the authentication and control of the connected client at the port of the LAN access device. If the client can pass the authentication, it can access the resources in the LAN; if it cannot pass the authentication, it cannot access the resources in the LAN. [0003] Such as figure 1 As shown, it is a structural diagram of the 802.1X authentication system, including: client (Client), access device (Device) and authentication server (Server); ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/16H04W84/12H04L29/12H04L12/56
Inventor 徐勇刚卢宇
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products