Font Size: a A A

Design And Implemention Of Access Authentication System Of Campus Network Under IPv6 Environment

Posted on:2016-09-14Degree:MasterType:Thesis
Country:ChinaCandidate:F HuangFull Text:PDF
GTID:2308330482479925Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Safety control on network access is of vital consideration for the safety of network system. ISP is comparatively mature in the safety and control technology of WAN access. As for LAN, protective measures seem to be quite weak in such network resources as some inner information that needs to be protected or concerned with expenses. The first reason is that, compared with PPP WAN, LAN itself is given enough openness because it users are relatively constant and the initial design of Ethernet takes this constant group into controllable consideration instead of worrying about its safety. The second reason is that realization of LAN safety control will produce extra burden of communication and network construction cost. The third reason is that current technology needs improvement and design. The last but not least, new network technology standard of IPv6 will bring greater challenge on safety.By aiming at the factors above, this paper takes the safety access of LAN under IPv6 environment as main research object and bases on thorough analysis of current IPv6 network safety access technology to conduct exploratory research and practice on technological realization of safety access. Its main contents include:1. It carefully studies the theory of main ID authentication technology at present. By thoroughly analyzing various technological realization of ID authentication, it proposes suggestions on measures and technology suitable for this paper.2. Design a campus network security access billing management system. Based on application layer, the method is flexible and the method is flexible. Software from the application layer to achieve the use of C/S framework to achieve the management and control of computer users, can effectively prevent illegal users access to computer systems and access to network resources, and should be accompanied by the fire of charging function, reducing the burden of public computer network resources.3. The thesis makes a thorough study and analysis on data-link-layer-based 802.1x protocol. Aiming at current controllable data-link layer access technology and conducting under the premise of controlling hardware cost and management cost, the paper also designs and realizes controllable and interactive access authentication according to different types of users by using 802.1x protocol and combing PVLAN technology as well as providing complete solution examples.
Keywords/Search Tags:IPv6, safety access, DHCPv6, 802.1x
PDF Full Text Request
Related items