Unlock instant, AI-driven research and patent intelligence for your innovation.

Security policy management and control method and device

A security strategy and purpose technology, applied in the field of communication, can solve problems such as low efficiency and difficult network operation and maintenance, and achieve the effect of improving operation and maintenance efficiency and reducing operation and maintenance difficulty

Active Publication Date: 2021-06-18
RUIJIE NETWORKS CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a security policy management and control device to solve the problems of difficult network operation and maintenance and low efficiency existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy management and control method and device
  • Security policy management and control method and device
  • Security policy management and control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Aiming at the problems of difficulty in network operation and maintenance and low efficiency in the prior art, an embodiment of the present invention provides a security policy management and control method, which is applied to a security policy unified management and control device, and the security policy unified management and control device can be set in such as figure 1 shown in the core device, it can also be set in such as figure 1 On any of the NAS devices shown, the execution method is the same regardless of the scenario. The procedure of this method is as follows figure 2 As shown, the execution steps are as follows:

[0044] S21: After sniffing the RADIUS authentication request message sent by the first terminal, record the first Media Access Control (Media Access Control Address, MAC) address and the first Packet identification information.

[0045]When a terminal wants to perform RADIUS authentication, it will send a RADIUS authentication request messa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and device for managing and controlling a security policy. The method includes: after sniffing a RADIUS authentication request message sent by a first terminal, recording the information carried in the RADIUS authentication request message in an information base. The first MAC address and the first message identification information of the first terminal; after sniffing the RADIUS authentication response message sent by the RADIUS authentication server, obtain the first user group information and the second user group information carried in the RADIUS authentication response message. Message identification information; acquire a second MAC address corresponding to the second message identification information from the information base; perform security corresponding to the first user group information for the second terminal corresponding to the second MAC address Strategy. This solution greatly reduces the difficulty of network operation and maintenance, and greatly improves the efficiency of network operation and maintenance.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a security policy management and control method and device. Background technique [0002] In today's world, with the rapid development of Internet technology and the rapid growth of the number of people using the Internet, network security issues have become increasingly prominent. To ensure network security, users need to be authenticated to access the network. The user uses the terminal to send a remote authentication dial-in user service (Remote Authentication DialIn Service, RADIUS) authentication request message to the RADIUS authentication server through the network access server (Network Access Server, NAS) for authentication. [0003] Different users play different roles in the network and belong to different user groups. For example, in a campus network scenario, different users may belong to teacher groups, student groups of different grades, etc.; in a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/205
Inventor 章健伟
Owner RUIJIE NETWORKS CO LTD