User based control method in IEEE802.1x authentication
A control method and user's technology, applied in electrical components, transmission systems, etc., can solve problems such as uncontrollable illegal access and security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0015] User-based control method in IEEE 802.1x authentication of the present invention:
[0016] First, enable the 802.1x authentication function on a certain port of the switch, and perform the following initialization work:
[0017] (1) Clear the FDB entry of this port;
[0018] (2) Send the authentication message that the Ethernet type received by this port is 0x888e to the CPU for processing;
[0019] (3) Set the source MAC address learning function of this port to no learning, no forwarding, and no CPU processing. At this time, all service packets appearing on this port will be discarded during the source MAC address learning process.
[0020] After a certain user passes the authentication, a logical port based on the user is set on this port, and this logical port is only open to the user. The specific implementation method is: set a static FDB entry of the user's MAC address on the port. The source MAC address needs to be learned, so it will not be discarded during ...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com