Font Size: a A A

Research And Implementation Of The Trusted Network Connection Authentication Model Based On 802.1X

Posted on:2011-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:C Y LiFull Text:PDF
GTID:2178330332988219Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Network access control is checking the terminal in accordance with the security strategy when the terminal accessing to the network. According to the situation in line with the strategy, the ability of the terminal to access the network is dynamic controlled. The central idea of network access control is "first checking then accessing to". As the demand of network access control technology becoming clear, many companies and research institutions at home and abroad have conducted research in this area, and in this paper, an authentication model of trusted network is designed and implemented based on 802.1X.First, on the basis of the analysis and research of network access control technology and the trusted network architecture technology, the trusted network connect architecture is built on the use of open source software libtnc and TNC@FHH. The relationship between the 802.1X and the realization of Trusted Network Connect architecture authentication model is deeply analyzed, and why using the 802.1X protocol to achieve the certification model is analyzed too. Second, policy sever is implemented on the use of the open source software FreeRADIUS which supports EAP-TNC data packet. Finally, the Trusted Network Connection authentication model is designed and implemented on the based of 802.1X. Experimental results show that the model can ensure the credibility access of the terminal, and effectively solve the identity authentication, platform authentication and integrity authentication.
Keywords/Search Tags:Network Access Control, Trusted Network Connection, 802.1X, EAP-TNC
PDF Full Text Request
Related items