基于802.1X和DFW的网络安全研究及NAC系统的设计与(3)

时间:2026-01-20

基于802.1X和DFW的网络安全研究及NAC系统的设计与实现

Abstract

Network security technology attracts more and more attention with the development of information technology, which prompts the prosperity of the firewall, access control and other several techniques related to network security. Per the requirement of security and accounting, the 802.1x based on port control becomes the mainstream of authentication, meanwhile, the distributed firewall characterized by “centralized management and distributed protection” turns into an important solution via efficient port aegis. Almost more than 70% security threat comes from the intranet, the authenticated hosts sometimes work as the attack source unconsciously or desperately, which is difficult for the network managers to prevent. So they wish to control all the hosts when they accessing the intranet via a new trust mode both authentication and host’s security status are implemented. The thesis conduct the research based on the 802.1x authentication and distributed firewall, then provides a real solution for it.

First, systematical analysis is laid on the protocols of 802.1X, EAP, RADIUS. Construing the principle of 802.1X, the paper carries out the extension from based on port to based on user. Construing the workflow of EAP, RADIUS, packet format, the carrying of private information is implemented via the EAPOL frame.

Second, much emphasis is placed on the research of the principle and flowchart of firewall system. Through the analysis on policy server, host firewall and boundary firewall, the combination of host integrity check and 802.1X authentication is advanced. Comparing several packet holding technologies, and combined EAPOL’s carrying private information, the legal transfer of HI results is achieved.

At last, a new trust mode is defined based on the authentication and host integrity, in which the author makes use of the security deficiency of current 802.1X, and realized the “transparent” span of HI-Judge Server. In the implement, WMI is used to check the host integrity, NDIS to hold up the 802.1X packet. And the detailed authentication process in NAC system is introduced.

Keywords:802.1X; Distributed Firewall; EAP; Host Firewall; HI-Judge Server; Network

Access Control

…… 此处隐藏:243字,全部文档内容请下载后查看。喜欢就下载吧 ……
基于802.1X和DFW的网络安全研究及NAC系统的设计与(3).doc 将本文的Word文档下载到电脑

精彩图片

热门精选

大家正在看

× 游客快捷下载通道(下载后可以自由复制和排版)

限时特价:4.9 元/份 原价:20元

支付方式:

开通VIP包月会员 特价:19元/月

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信:fanwen365 QQ:370150219