Font Size: a A A

Ipv6 Network Access Control Method To Achieve

Posted on:2008-09-06Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2208360215997848Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the great development of IP technology especially IPv6, and appearanceof various access technology, both fixed and mobile network users increase fast. Useraccess control is a very important security mechanism that arouses more and moreattention. In traditionally, each security domain has special access control mechanism, andthe user identity vary from domain to domain, so does the authentication method. Thusmakes it hard to realize interoperation among different applications in different domain.That limits operators to use network resource effectively, optimize the network, and unifythe management of users. It also cannot make operators give single bill to a user who hasaccess diverse networks. So there should be an inter-domain, wired and wireless unifiedaccess authentication platform for operators aim to solve these problems.This dissertation analyzes the related technology and presents an inter-domain andwired and wireless unified access control solution. This solution allows users access fromwired or wireless access networks, and allows users roam away from their home domains.So it is compatible with the trend of wireless mobile Internet. Based on the solution thedissertation design and realize an IPv6 network access control system, that system achievesthe bidirectional authentication, which prevent lawless user access network and at the sametime prevent hostile network spreads lawless information; this system implements IPaddress formation using user identity, which makes the authentication base on real address;this system also implements user accounting and billing, and supports management andconfiguration through web.Strict test is deployed for that access control system. The results reveal that it can meetall requirements defined in related standards, and work steadily. What' has been achievedwill be valuable to today's network operation.
Keywords/Search Tags:Access Control, Authentication, ID, Account, IPv6
PDF Full Text Request
Related items