Font Size: a A A

Implementation Of Triple Authentication Technology Based On Port Security

Posted on:2018-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:B Q MaFull Text:PDF
GTID:2348330518996825Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
Network security technology is an important strategy to ensure the healthy and greeny development of network, the switch and other access devices as a bridge between the user and the network is the most direct way to protect the security of the network and users. Safety features can be detected by access equipment to allow users to use the network source or to limit. Hackers or criminals usually use security vulnerabilities of access equipment on the ports to attack, which make the personal information and accounts received a threat, so it is particularly important to ensure the safety of the port.For MAC address authentication, 802.1x authentication and web authentication, the traditional switch cannot meet the three authentication methods. Triple authentication technology is the integration of the three authentication technologies, and the user's MAC address as the only sign of user identity authentication and information management. When the port is in the security policy mode, it controls the triggering of different authentication functions and processes the request of the user access network. It can not only verify the user information but also monitor the network traffic in real time to ensure bidirectional security.This paper firstly analyzes the requirements of Triple authentication technology from function and performance based on the basic authentication theory. Secondly, it proposes the framework of triple authentication technology, and the frame protocol, theory. Triggering process of the three authentication technologies are introduced in detail.Then, beginning with the requirements of Triple authentication, the basic protocol framework and the server authentication protocol are designed and implemented. Fourth, based on the strategy of port mode, switch network operating system through the C/C++ programming language provides the users with local server and remote server message interaction, which makes the ports to ensure that the security of both the user and the network. Protocol platform also implements the priority strategy in the three authentication methods, and meets the user to choose according to their own needs different ways to authenticate the function.Finally, the platform environment is built to test the system, and at the same time verify the function and performance to meet the practical application.
Keywords/Search Tags:port security, MAC address, authentication technology, triple authentication
PDF Full Text Request
Related items