Port authentication method for authentication server, server, switch and storage medium

An authentication server and port authentication technology, which is applied in the field of servers, switches and storage media, and the port authentication method of authentication servers, and can solve problems such as potential safety hazards

Active Publication Date: 2018-10-26
北京东土军悦科技有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the authentication server does not authenticate the agent (that is, the switch directly connected to the authentication server). In this case, the network port of the authentication server is not controlled, and any network device connected to the network port can access Authentication server, so there are certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Port authentication method for authentication server, server, switch and storage medium
  • Port authentication method for authentication server, server, switch and storage medium
  • Port authentication method for authentication server, server, switch and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] figure 2 It is a flow chart of the port authentication method of the authentication server provided in Embodiment 1 of the present invention, image 3 It is a schematic diagram of the network topology structure of the existing authentication server directly connected to the switch, such as image 3 As shown, if the switch is directly connected to the authentication server, the switch, as the applicant, requests the authentication server to open the port directly connected to the switch on the authentication server, and the authentication server also acts as an agent in this process. Once the authentication server passes its authentication, the switch as the applicant will be upgraded to an authentication device and provide an agent for other switches that need authentication. At this time, the network topology becomes figure 1 As shown in the structure, the switch is upgraded to figure 1 The second switch in acts as a proxy, and the other switches are equivalent to ...

Embodiment 2

[0100] Figure 4 A flowchart of a port authentication method for an authentication server provided in Embodiment 2 of the present invention, such as image 3 As shown in the figure, if the switch is directly connected to the authentication server, the switch, as an applicant, first requests the authentication server to open the port directly connected to the switch on the authentication server. The authentication server also acts as an agent in this process. Once the authentication server passes the authentication, the switch as the applicant is upgraded to an authentication device to provide an agent for other switches that need authentication. At this time, the network topology becomes figure 1 The structure shown, i.e. the switch is upgraded to figure 1 The second switch in as a proxy, the other switches are equivalent to figure 1 The first switch is the applicant, and the first switch, as the applicant, applies to the authentication server to join the network where the s...

Embodiment 3

[0108] Figure 5 It is a schematic diagram of the composition and structure of the network topology provided by the third embodiment of the present invention, refer to Figure 5 , According to the above network topology, a total of 4 authentication servers are used. In order to ensure the security of the network, the authentication server enables the port authentication function. The directly connected switches include 0-0, 1-0, 2-0, 3-0, These switches all need to initiate authentication to their directly connected authentication servers as applicants to open the ports directly connected to the authentication servers. If the authentication passes, switches 0-0, 1-0, 2-0, and 3-0 are upgraded to proxies. The switch or terminal connected to switches 0-0, 1-0, 2-0, and 3-0 can be used as a new applicant to request to join the network where the agent is located. If the authentication fails, it will cause any one connected to it. Switches cannot access the network, and terminals ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a port authentication method for an authentication server, a server, a switch and a storage medium. The port authentication method for an authentication server is applied to the scene that the switch applies to open a port, directly connected with the switch, of the authentication server to the authentication server. The method comprises the steps that after passing identity authentication on the switch directly connected with the authentication server, the authentication server sends a request message for reporting configuration information to the switch; the authentication server receives a configuration response message of the switch, wherein the configuration response message comprises configuration information queried by the switch according to the request message; and the authentication server matches the configuration information with set switch configuration information and opens the port directly connected with the switch after matching succeeds. According to the method, it is guaranteed that the switch to be serving as an agent works according to configuration set by the authentication server, and therefore the potential securityhazard possibility caused by tampering of the configuration information is effectively decreased.

Description

technical field [0001] Embodiments of the present invention relate to network communication technologies, and in particular, to a port authentication method for an authentication server, a server, a switch, and a storage medium. Background technique [0002] The trusted switching network system requires each access user to perform authentication and control to ensure the trusted relationship and control between communication entities. For the existing terminal equipment, the existing Institute of Electrical and Electronics Engineers (Institute of Electrical and Electronics Engineers, IEEE for short) 802.1x protocol has been standardized and implemented. The IEEE802.1x protocol is called a port-based access control protocol, and its main purpose is to solve the access authentication problem of wireless local area network users, to receive legitimate user input, and to protect network security. [0003] figure 1 It is a schematic diagram of the composition and structure of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876H04L63/102
Inventor 王立文郭冰
Owner 北京东土军悦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products