Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access control method, device and core equipment

A network access and control method technology, applied in the field of network access control methods, devices and core equipment, can solve the problems of low authentication processing efficiency, heavy authentication server load, and low system performance, so as to improve system performance and authentication processing Efficiency, load reduction effect

Active Publication Date: 2015-06-17
RUIJIE NETWORKS CO LTD
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a network access control method, device, and core equipment, which are used to solve the problems existing in the prior art, such as heavy load on the authentication server, low system performance, and low The problem of inefficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method, device and core equipment
  • Network access control method, device and core equipment
  • Network access control method, device and core equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] image 3 The flow chart of the network access control method provided in Embodiment 1 of the present invention specifically includes the following processing steps:

[0050] Step 301, the core device obtains the message packet of the user terminal.

[0051] In this step, the message packet of the user terminal is sent to the core device by the access device and the aggregation device.

[0052] Step 302, determine whether there is internal virtual local area network identification (IVID, Innert VLAN ID) and external virtual local area network identification (OVID, Out VLAN ID) in this message message, if not, enter step 303, if yes, enter step 304.

[0053] Wherein, the IVID is the identifier of the virtual local area network to which the access device of the network belongs, and the OVID is the identifier of the virtual local area network to which the convergence device belongs. The access device can be a 24-port switch, and each port is assigned an independent VLAN. ...

Embodiment 2

[0074] Based on the same inventive concept, according to the network access control method provided by the above-mentioned embodiments of the present invention, correspondingly, Embodiment 2 of the present invention also provides a network access control device, the structural diagram of which is as follows Figure 4 shown, including:

[0075] An obtaining unit 401, configured to obtain a message message of a user terminal;

[0076]The comparison unit 402 is configured to compare the virtual local area network identifier in the message message with the virtual local area network identifier corresponding to the user terminal identifier in the pre-stored user authentication entry, and the user authentication entry stores the user terminal identifier and The corresponding relationship of the virtual local area network identification of the access network;

[0077] A replacement unit 403, configured to use the virtual local area network identifier in the message message when the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network access control method, device and core equipment. The network access control method includes the steps that the core equipment obtains an information message of a user terminal; virtual local area network identification in the information message is compared with virtual local area network identification corresponding to user terminal identification in a preset user authentication table entry, and the corresponding relation between the user terminal identification and virtual local area network identification of an access network is saved in the user authentication table entry; when the virtual local area network identification in the information message is different from the virtual local area network identification corresponding to the user terminal identification in the preset user authentication table entry, the virtual local area network identification in the information message is used for replacing the virtual local area network identification corresponding to the user terminal identification in the preset user authentication table entry, and the user terminal is allowed to get access to the network. By the adoption of the scheme, loads of an authentication server are reduced, the system performance of the authentication server is improved, and therefore the user terminal can get access to the network in a seamless mode when a place is changed.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a network access control method, device and core equipment. Background technique [0002] With the increasing popularity of smart devices such as mobile terminals, the security issues of mobile users accessing the Internet have attracted more and more attention from operators, enterprises and universities. Moreover, due to the dense and active user groups, the requirements for network access methods and security are getting higher and higher. [0003] Identity authentication is a prerequisite for building a secure and trusted network. Therefore, when a user accesses the network, access authentication must be performed on the user. When a user terminal accesses the network, it passes through the access layer, aggregation layer, and core layer of the network, and the user access control is completed on the access layer. In order to facilitate management, most unive...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04W12/08
Inventor 吴世奇
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products