Font Size: a A A

A Research And Implementation Of The Access Security Technology Of Network Communication Equipment's Datalink Layer

Posted on:2015-10-26Degree:MasterType:Thesis
Country:ChinaCandidate:H Y LiFull Text:PDF
GTID:2348330542952425Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of computer network technology,the popularization and application of the Internet increasingly affects people's production and life,and has been an important symbol and guarantee of social development.However,the security of network has been widespread attention since the birth of the network.It tends to be more emphasis on the security about Application Layer and Network Layer than Medium Access Control Layer when people consider the network security protection.Using the network-cable to connect each device is is a major feature of traditional Ethernet LANs.However this feature also has a potential security vulnerability which unauthenticated users may attack the computer throw the local area network.On the basis of the access authentication control cechnology research for the current domestic and foreign situation,this paper designed and realized the security access method of network communication equipment's datalink layer which is derived from the engineering project This paper introduced the key authentication protocol technologies and their work service processes,including AAA technology,802.1x authentication technology,MAC address authentication technology and port security technology.In the requirement analysis,the certification function modes and features were analyzed and explained in two aspects which are system's function and system's performace.This design requires to finish and achieve the basic function of 802.1x authentication in both port-based method and MAC-based method,the basic function of MAC address authentication and the basic function of port security.Requirement analysis made the specific criteria and direction of design in this paper.The overall design of the system and software architecture are described,and it and do a detailed analysis of the exchange drive module.In this paper.The paper also designed five processing operations for the unknown source MAC address packet of the switch chip and interface functions.In the detailed design of this paper,it contains the design and implementation of 802.1x authentication,MAC address authentication and port security.In order to make the system worke at the normal operation and keep the reliability and stability of the system,this paper take a detailed test for each of the access authentication modes' function and performance.It is verified that the system meet its expected designs and requirements after analyzing the test results.Today,with the rapid development of computer networks,and widespread transmission of Internet information,the importance of network security become more prominent.We should not only pay attention to security techniques computer operating system and application software in the top,and ignore the most basic research and implementation of the link layer access security,We need do the overall planning,comprehensive consideration and use the security technology of network equipment rationally,to protect the security of comper network more comprehensive and multi-angle.Therefore the research and implementation of the Access security technology of Network Communications Equipment's Datalink Layer is of great significance.
Keywords/Search Tags:MAC layer, 802.1x authentication, MAC address authentication, port security
PDF Full Text Request
Related items