| With the development of science technology and the popularity of the Internet, Internet has been a part of our work and life. The requirement of different kinds of identity authentication method is getting more and more, then network administrator will need more skills to implement the identity authentication method in the network. Network administrator need to configure related authentication method, so that only authenticated user can access the network and the hackers cannot be allowed to access the network.Based on the development of identity authentication technology until now, PPPo E identity authentication method, WEB identity authentication method and 802.1X identity authentication method are considered as the main identity authentication technology now. 802.1X identity authentication method become a choice for network administrator due to its low investment and easy deployment. In this thesis, the main point is the research of identity authentication system based on 802.1X protocol. Based on the understanding of 802.1X related protocol and deficiency analysis of each module in the entire identity authentication system, the entire identity authentication system based on 802.1X protocol is designed, some optimization is also implemented on some modules in the system. The goad of optimization is to improve the security and efficiency. On the realization of the entire identity authentication system based on 802.1X protocol aspect, open source software is mainly used in supplicant and it achieves the combination of EAP-MD5 and EAP-TLS authentication methods. Configuring switch can make the switch as an authenticator. And Linux Red Hat Enterprise is used for server. Editing system file can realize the function of authentication server. It also can implement RAMDISK and MAC binding on the server. These two technology can optimize the server.In the end, conducting some functional test and performance test on the entire system. The test result of functional test indicates that the function of the entire identity authentication system based on 802.1X protocol is okay. And the test result of performance test indicates that the entire system is reliable when the amount of user increase. |