Supercharge Your Innovation With Domain-Expert AI Agents!

User based control method in IEEE802.1x authentication

A control method and user's technology, applied in electrical components, transmission systems, etc., can solve problems such as uncontrollable illegal access and security risks

Inactive Publication Date: 2004-12-29
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with Ethernet with shared channels, this feature has great security risks. After the port is opened, other users can freely access without authentication, resulting in the problem of uncontrollable illegal access.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] User-based control method in IEEE 802.1x authentication of the present invention:

[0016] First, enable the 802.1x authentication function on a certain port of the switch, and perform the following initialization work:

[0017] (1) Clear the FDB entry of this port;

[0018] (2) Send the authentication message that the Ethernet type received by this port is 0x888e to the CPU for processing;

[0019] (3) Set the source MAC address learning function of this port to no learning, no forwarding, and no CPU processing. At this time, all service packets appearing on this port will be discarded during the source MAC address learning process.

[0020] After a certain user passes the authentication, a logical port based on the user is set on this port, and this logical port is only open to the user. The specific implementation method is: set a static FDB entry of the user's MAC address on the port. The source MAC address needs to be learned, so it will not be discarded during ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user based controlling method in IEEE 802.1x identification which comprises, when a port enables the 802.1x identification function, subjecting the port to related initialization, the user passes the identification on the port and arranging a logic port on the port based on the user, in IEEE 802.1x identification, the logic port only opens to users which passes identification, whose business messages can go through the physical port normally.

Description

Technical field [0001] The invention belongs to the field of computer network communication, and in particular relates to a method for respectively opening logic ports based on users in IEEE 802.1x authentication. Background technique [0002] IEEE 802.1x is called Port based network access control protocol, which provides a means of authenticating and authorizing devices or users connected to a LAN based on the advantages of IEEE 802 LAN. [0003] The 802.1x protocol is derived from IEEE 802.11 wireless Ethernet, and its original design is to provide point-to-point physical or logical port access authentication for wireless LANs. Therefore, after it is introduced into broadband Ethernet, it inevitably has certain limitations. The most prominent problem is that the operation object of 802.1x authentication technology is the port. As a port-based network access control technology, the 802.1x protocol only focuses on the switch of the LAN port. When the authentication is passe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/10
Inventor 高旭东
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More