Port based authentication method and network device

A network equipment and port authentication technology, applied in the field of network communication, can solve the problems of network equipment without authentication and encryption, easy to appear security problems, etc., to prevent private access and improve security.

Inactive Publication Date: 2014-05-07
HUAWEI TECH CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the case of private connection of network devices, usually there is no authentication and encryption between network devices, so security problems are prone to occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Port based authentication method and network device
  • Port based authentication method and network device
  • Port based authentication method and network device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0045] figure 1 A schematic diagram of interconnection of network devices. Such as figure 1 As shown, the first network device 11 is connected to the second network device 12, the port connected to the second network device 12 on the first network device 11 is port A, and the port connected to the first network device 11 on the second network de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a port based authentication method and a network device. The port based authentication method comprises: a first network device monitors a port within specified time when the first network device monitors that the physical port on the first network device for connecting to a second network device is available so as to wait to receive LLDP messages that the second network deice transmits, wherein the LLDP message comprises identifier information of the second network device and a security certificate; if the LLDP message is received within specified time, the first network device determines whether the trusted network device with the identifier information and the security certificate matching with the identifier information and the security certificate of the second network exists among the trusted network devices which are stored in advance; if yes, the first network device sets the state of the port as a connection state. This invention performs authentication on the network device based on the port, which increases the security of the network device.

Description

technical field [0001] The invention relates to network communication technology, in particular to a port authentication-based method and network equipment. Background technique [0002] With the rapid development of Internet services, the security of network devices in the Internet has become a concern. The security of network devices can be divided into several categories: basic security, access security, secure connection and threat protection. Among them, in terms of access security, it mainly includes authentication, authorization, accounting (Authentication, Authorization, Accounting, referred to as AAA), remote user dial-up authentication (Remote Authentication Dial In User Service, referred to as RADIUS), terminal access controller access control System (Terminal Access Controller Access-Control System, TACACS for short) and other technical means, most of these technical means are aimed at access users. For the interaction between network devices, authentication is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCY02D30/00
Inventor 栗明
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products