Trusted network access method and system based on EAP
A network access and trusted technology, applied in the field of communication networks, can solve the problems of authentication security to be improved, and achieve the effects of improving compatibility, enhancing network security, and enhancing accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] An optional description of the present invention will be made below in conjunction with the accompanying drawings and specific embodiments.
[0045] TNC's network access layer is based on existing network access technologies, mainly including 802.1x, VPN and P2P. 802.1x provides port-based access control for LANs, and can control network connections through controlled ports and uncontrolled ports. This is currently the most widely used network access method. Therefore, this embodiment is implemented based on the IEEE802.1x standard protocol.
[0046] figure 1 Schematically shows a flow chart of an EAP-based trusted network access method according to an embodiment of the present invention, as shown in figure 1 As shown, it specifically includes the following steps:
[0047] Step 101, the NAC server performs preliminary identity authentication on the terminal, such as figure 2 shown;
[0048] Specifically, the following sub-steps are included:
[0049] Step 1011: T...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


