Font Size: a A A

Analysis & Optimization Of Enterprise Network Security Based On Access Control Technology

Posted on:2015-04-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y LinFull Text:PDF
GTID:2308330461474995Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
In the past twenty years, dramatic changes have taken place in the information development of China’s financial enterprises, which experience a process from simple to complicate as well as from the partial to the overall. In the twenty year’s development, information platform based on computer technology and network technology has become the basis of normal operation of financial enterprises. The high demand on reliability of its network has been taken into consideration in its core network design and planning. However, with the constant change of security issues, it is impossible to solve the problems once for all.Access control is a new type of security defending technology. Through security defending on customer terminal, it can effectively solve the problems brought by terminal’s insecure access to network. Generally speaking, access control technology is a set of technology combination for protecting customer and network security. Its core is to start with security control of customer terminal and minimize all insecure and uncertain factors so as to protect network and terminal security.This project, with current condition of financial enterprise’s network as model, elaborates the theory of access control technology and its basic characteristics. It makes analysis on the demand of enterprise’s different network layers, access modes and business applications and undertakes application research on 802.1X protocol access control technology and brings forward access control plan based on 802.1X access control technology, specifically on network structure, ID authentication and security strategies. Focusing on access problems of 802.1X access control technology in the environments of WLAN and WWAN, this project brings forward solution and application plan with security technology and digital certificate authentication technology such as L2TP, IPSEC, WAP2 etc.On the basis of the design plan and through large amount of market investigation, this project makes research and assessment on main products in market and selects the most suitable product. And based on the plan, implementation rules are made for practical application as so to solve enterprise’s security problems.
Keywords/Search Tags:802.1X, VPDN, IPSEC, EAP
PDF Full Text Request
Related items