Font Size: a A A

The Design And Implementation Of Net Acces Control System Based On 802.1x

Posted on:2012-07-27Degree:MasterType:Thesis
Country:ChinaCandidate:Q XuFull Text:PDF
GTID:2178330335477782Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Network access control system through the control of the access point for the entire network in order to achieve protection, access control technology after another, which most industry-recognized IEEE802.1x technology. Industry-standard 802.lx access control as a high degree of flexibility and security, it uses the EAPOL protocol technology can be extended according to actual needs. In this paper, Bureau of Meteorology for the special needs of the network after the environment and the actual proposed 802.1x-based access control system. This paper first introduces the basic concepts of access control technology and the current development at home and abroad, and then made the source of subjects given in the thesis research; then analyzes a variety of mainstream access control technology 802. 1x deeper analysis of the relevant principles and techniques; then given the problem of network security solutions, including design and 802.1x network access control endpoint security protection for the design of each module; Finally, the system related tests and data analysis. This design is mainly used to resolve internal network connections and the authentication of the security of network connection terminal, different from traditional access control system, this paper has the following two innovations:1. Most of the emphasis on access control systems access control authentication, this paper strengthen the authentication features on the one hand, on the other terminals for access to a higher security requirements, using policy configuration model guidelines for network equipment end security. Token through technology policy, thereby protecting the entire network system.2.different from other technologies such as 802.1x authentication, dynamic password technology for 802.1x authentication, not only saving the cost of doing business and to enhance the reliability of the authentication and security. Access control access to the core and not just emphasize the identity of legitimacy, should be emphasized that the safety of the access point. Legitimate and accurate identification, healthy and secure network access terminal is where the access control system requirements.
Keywords/Search Tags:802.lx, net access control, network access point security, One time password
PDF Full Text Request
Related items