Authentication method based on configuration information, server, switch and memory medium
A technology for authenticating servers and configuration information, applied to switches and storage media, an authentication method based on configuration information, in the server field, which can solve problems such as potential safety hazards
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0080] figure 2 It is a flow chart of the authentication method based on configuration information provided by Embodiment 1 of the present invention. This embodiment is applicable to figure 1 In the shown IEEE802.1x authentication system, the first switch, as the applicant, applies to the authentication server to join the network where the second switch is located, for example figure 1 As shown, the second switch converts the EAPoL message from the first switch into a RADIUS message and sends it to the authentication server, and converts the RADIUS message returned by the authentication server into an EAPoL message and sends it to the first switch. The authentication method based on configuration information specifically includes the following steps:
[0081] Step 101, after the authentication server passes the identity authentication of the first switch, it sends a request message for reporting configuration to the first switch through the second switch;
[0082] For examp...
Embodiment 2
[0100] image 3 It is a flow chart of the authentication method based on configuration information provided in Embodiment 2 of the present invention. This embodiment is applicable to figure 1 In the shown IEEE802.1x authentication system, the first switch, as the applicant, applies to the authentication server to join the network where the second switch is located, for example figure 1 As shown, the second switch converts the EAPoL message from the first switch into a RADIUS message and sends it to the authentication server, and converts the RADIUS message returned by the authentication server into an EAPoL message and sends it to the first switch. The authentication method based on configuration information specifically includes the following steps:
[0101] Step 201, the first switch receives the report configuration request message sent by the authentication server through the second switch after passing the identity authentication of the authentication server;
[0102] T...
Embodiment 3
[0109] Figure 5 For the schematic diagram of the composition structure of the network topology provided by Embodiment 3 of the present invention, refer to Figure 5 , a total of 3 switches and 1 server are used, wherein trusted switch 1 and trusted switch 2 are used as applicants (equivalent to the above-mentioned first switch), and trusted switch 3 is used as an agent (equivalent to the above-mentioned second switch) , the trusted switch 1, the trusted switch 2 and the server perform message transfer through the trusted switch 3. Trusted switch 1 and trusted switch 2 are connected to lower-layer terminal network devices, but in order to prevent direct mutual access between each terminal network device, ports 1, 2, and 3 of trusted switch 1 and trusted switch 2 are connected to each other. VLANs are set up separately, and the three ports are divided into different LANs. The configuration information of the trusted switch 1 and the trusted switch 2 can be saved in the server...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


