A method for realizing zero-terminal network access
A network access and zero-terminal technology, applied in the field of computer networks, can solve problems such as the inability to use zero-terminal network access and waste of network resources, and achieve the effects of enhancing security, saving network resources, and enhancing reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] All the features disclosed in this specification, except mutually exclusive features and / or steps, can be combined in any way.
[0019] The present invention will be described in detail below in conjunction with the accompanying drawings.
[0020] A method for realizing network access of a zero terminal, the network access system is based on the 802.1x network access control protocol, after the zero terminal sends a network access request, the switch sends authentication information to an authentication server, and the authentication server The digital certificate in the terminal is authenticated, and the authorization and access of the network can be realized through the authentication.
[0021] The network framework adopted by the present invention is shown in Figure 1. Assuming that the invention is applied to enterprise network configuration, since the enterprise is divided into several areas, each area adopts a switch, and all switches are connected to the AD domai...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
