Font Size: a A A

Design And Implementation Of Security Authentication Client In Enterprise LAN Based On802.1X Protocol

Posted on:2015-05-08Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z YanFull Text:PDF
GTID:2308330452956880Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology, networks have played anincreasingly important role in the daily operation and management of venture.Meanwhile, With the sharp increase of end-user number and network structurecomplexity in internal corporate network, enterprise networks become ever more criticaland vulnerable to be attacked. Such as the spread of the virus, system vulnerabilities andmany other issues have directly impacted the normal operation of the enterprise.Traditional means of enterprise network security are to install and run a firewall, IPS andother network security devices in order to provide security protection for networks.Actually, simply relying on network device is unable to ensure the safety, becausenetwork device can not protect the internal network. Furthermore, most enterprisenetwork security incidents are caused by weak user terminal and "out of control" networkusage behavior.Basing on the above understanding and analysis with the common enterprise LANas background, this paper proposes the endpoint admission defense mechanisms(Endpoint Access Defense, EAD) on the basis of traditional network security techniques.The mechanism uses802.1X authentication protocol as carrier to achieve safetycertification through the user terminal access control. Enterprise LAN user terminalsperform safety checks according to the security policy established by the networkadministrator. Then the user terminal network access will be authorized and controlledaccording to results.The mechanism is based on the user terminal security access in corporate network,enforce corporate security policies. It can effectively enhance the robustness and securityof enterprise networks by strict end-user’s network usage behavior control, providing aneffective and handy management tools for enterprise network administrator.
Keywords/Search Tags:Enterprise Network Security, 802.1XAuthentication Protocol, Network Usage Behavior, Security Policies
PDF Full Text Request
Related items