Font Size: a A A

Research On Technology Of Network Terminal Security Access Control

Posted on:2016-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:D DuanFull Text:PDF
GTID:2308330476451402Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the popularity of Internet applications, information and network security has increasingly become the focus of people’s attention, there are many kinds of threats to network security and the terminal is the main source, therefore, solving the network security problem fundamentally, providing users with a safe online environment and the establishment of a terminal security access control system is particularly important.In this paper,we analyze and research the existing authentication technology, encryption technology and authentication protocol aiming at improving the security problem existing in the prior art, and by combining with the actual situation we develop a relatively perfect authentication system, and the system can not only satisfy with the security, at the same time with the controllability and safety management function.This paper is based on the combination of methods of the CA and 802.1x authentication technology, and confirms the identity of the user through a certification issued by CA USBKey and CA Certification Center linkage information, the USBKey contains the identity of the user information, the digital certificate, the key and the network number and other information. The 802.1x obtains USBKey user’s sinformation and initiates through certification standards, and combine with the authentication system(802.1x switch), authentication server(RADIUS server) interact to permit or deny the user access to the network, and for the user who is allowed into accessing the network, the RADIUS server will accesse and authorie him by the authentication device, so to prevent the illegal user to access and destroy the cyber sourc,and at the same time, according to different types of users for it can be assigned different access, so it organizes the legitimate use to access and tamper the access and tampering. On this basis, this paper also adds the user registration, security management, access control and other functions to make the whole system more perfect.Depending on the above description of the mechanism and function about the system, standard, controllability, safety principles etc., this paper designes the network terminal security access control system and accomplishes the system scheme by building the specific environment and tests the system comprehensively and ultimately realize the goal of network terminal security access control.
Keywords/Search Tags:network security, 802.1x certification, CA certification, control and management
PDF Full Text Request
Related items