Font Size: a A A

Design And Implementation Of Access Authentication System For Switch

Posted on:2018-03-23Degree:MasterType:Thesis
Country:ChinaCandidate:X YangFull Text:PDF
GTID:2348330512993127Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of large data,cloud computing,and mobile networks,and with the continuous improvement of enterprise's technology information,which have brought new security risks to the network.So cybersecurity is becoming increasingly important and has risen to a global problem.The traditional network boundary protection measures effectively prevent the hacker attacks from outside the enterprise,but it can not effectively prevent the security threats of enterprise LAN.Most of the network security threats are caused by unsafe end-users and illegal network usage.How to effectively control the computer system's network access authentication and authorized access to enterprise resources has become an important aspect of enterprise network security management.In order to meet the growing needs of the network market,open up the access layer of the switch market segments,consolidate and enhance market competitiveness,the company decided to research and develop access layer switches.I participate in the exchange project in the exchange project from the needs analysis to the testing of the various stages of the work.In this paper,the 802.1X architecture and authentication process are analyzed,and the EAP protocol and RADIUS protocol are described in detail.On the basis of theoretical analysis,the requirements of the system are analyzed,the functional and non-functional requirements of the system are determined.The functional requirements of the system include 802.IX authentication,RADIUS authentication,local authentication,extended authentication and configuration management.Then,the software architecture and function module design of the system are studied in depth.The system is divided into functional modules such as basic service,authentication processing,extended authentication and configuration management,and the function modules are designed and implemented in detail.And finally set up a network test environment for functional testing and non-functional testing of the system.The access authentication system of the switch has been deployed in the enterprise network and the campus network to run,authenticate the end user,strictly control the network behavior it uses,and then combine the RADIUS authentication and the extended authentication function to carry on the centralized management and the implementation of the security policy,effectively enhance the local area network security and robustness.
Keywords/Search Tags:Network Security, Switch, Access authentication, 802.1X Authentication, RADIUS protocol
PDF Full Text Request
Related items