CN101651697A - Method and equipment for managing network access authority - Google Patents

Method and equipment for managing network access authority Download PDF

Info

Publication number
CN101651697A
CN101651697A CN200910176763A CN200910176763A CN101651697A CN 101651697 A CN101651697 A CN 101651697A CN 200910176763 A CN200910176763 A CN 200910176763A CN 200910176763 A CN200910176763 A CN 200910176763A CN 101651697 A CN101651697 A CN 101651697A
Authority
CN
China
Prior art keywords
user terminal
equipment
access
external network
switch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910176763A
Other languages
Chinese (zh)
Inventor
杨柳
刘如冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN200910176763A priority Critical patent/CN101651697A/en
Publication of CN101651697A publication Critical patent/CN101651697A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method and equipment for managing network access authority, and the access control among different host computers and the arrangement of route matrix priority are realized through route matrices, so as to supervise the flow capacity of the integral network; because the route matrices can be simply realized through software and can be combined with a plurality of application systems, simplifying the monitoring of networks and improving the flexibility of network monitoring.

Description

A kind of management method of network access authority and equipment
Technical field
The present invention relates to communication technical field, particularly a kind of management method of network access authority and equipment.
Background technology
Widely used IEEE 802.1x agreement is based on the access to netwoks control protocol of port in the present local area network (LAN), and the physics that is used for the network switch inserts level and authenticates and control inserting client.802.1x the application architecture of agreement as shown in Figure 1, comprising: subscriber equipment, switch, AAA (Authentication, Authorization and Accounting, authentication) server.
At the switch of User Access Layer Ethernet switch, be positioned at an entity of local area network (LAN) or WLAN (wireless local area network) point-to-point link one end as 802.1x; 802.1x subscriber equipment be an entity that is positioned at the local area network (LAN) or the online point-to-point link other end of wireless local as authentication requester, be installed in the personal computer usually; 802.1x aaa server be usually located at the authentication center of operator.
802.1x subscriber equipment and switch between the Extensible Authentication Protocol EAPoL based on local area network (LAN) (Extensible Authentication Protocol over LANs) of operation IEEE 802.1x definition; Same operation Extensible Authentication Protocol EAP (Extensible AuthenticationProtocol) between switch and the aaa server.There are controlled ports and uncontrolled port in Ethernet switch inside, and wherein, uncontrolled port is in the diconnected state all the time, and controlled ports is only just opened under the state that authentication is passed through, and is used for delivery network resource and service.Under above-mentioned architecture, if the subscriber equipment that is connected on the ethernet switch port can be by authentication, just can the accesses network resource; If can not pass through authentication, then can't the accesses network resource.
The general flow of subscriber equipment authentication online may further comprise the steps as shown in Figure 2:
Step S201, user reach the standard grade, the input username and password;
Step S202, switch send authentication request packet according to the information of obtaining such as username and password to aaa server;
Step S203, aaa server are analyzed this user profile and database information, if authentication success, then the authority information with the user sends to switch with the authentication response message; If authentification failure, the then response message of return authentication failure;
Step S204, switch are according to the authentication result access/refusing user's that receives.If can insert the user, then switch sends charging starting request message to aaa server;
Step S205, aaa server return the beginning response message that charges;
Step S206, user offline, switch send to charge to aaa server and stop request message;
Step S207, aaa server return to charge and finish response message.
In the prior art, subscriber equipment is initiated authentication request by switch to aaa server, at first subscriber equipment will with information such as switch interactive user name and password, switch is issued aaa server with these information then, at last judge by aaa server whether the user of subscriber equipment is legal, if the user of subscriber equipment is legal, the authentication request by subscriber equipment then, and carry out flow processs such as follow-up mandate, charging, if the user of subscriber equipment is illegal, authentification failure then, the user can't reach the standard grade.
Further expand above-mentioned authentication method, this certification policy is applied in as shown in Figure 3 the network system, at switch, if receive fly-by-night main frame (Untrusted Host) access internet (Internet) or local area network (LAN) (Local Area Network, LAN) request, then can not allow the visit of this class pass through, this class main frame should at first authenticate to certificate server, authentication by after become main frame trusty (Trusted Host) and could visit Internet or LAN;
In realizing process of the present invention, the inventor finds that there is following problem at least in prior art:
In the whole network, sometimes need preferentially to guarantee the communications access between some crucial main frame, and the flow between the non-key main frame of other is limited, and such strategy does not have clear and definite implementation in the prior art, so above-mentioned access control and priority control can't realize by existing technology.
Summary of the invention
The invention provides a kind of management method and equipment of network access authority, carry out access control and priority control by the form of route matrix.
For achieving the above object, one aspect of the present invention provides a kind of management method of network access authority, be applied to comprise in the system of a switch, at least one user terminal and a certificate server, described switch is connected respectively with described certificate server with described at least one user terminal, and be connected with external network, it is characterized in that, preserve access rights between each equipment in the described system and/or the external network by the form of route matrix in the described switch, described method comprises:
When described switch received an access request, whether described switch is inquired about described access request in described route matrix transmitting apparatus had the access rights with the destination device of described access request;
When described Query Result when being, described switch allows described transmitting apparatus to visit described destination device, when described Query Result for not the time, described switch is refused described transmitting apparatus and is visited described destination device.
Preferably, when adding new user terminal in the described system, described method also comprises:
Described switch identifies described user terminal and has the access rights of described certificate server in described route matrix, but do not have with described system in the access rights of other equipment or external network;
When the authentication of described user terminal by described certificate server, described switch identifies access rights between other equipment in described user terminal and the described system and/or the external network according to default device access authority Provisioning Policy in described route matrix.
Preferably, when adding new user terminal in the described system, described method also comprises:
When described switch receives the information of the miscellaneous equipment of specifying in described user terminal and the described system and/or the access rights between the external network, directly in described route matrix, identify access rights between other equipment in described user terminal and the described system and/or the external network according to described information.
Preferably, the access rights of other equipment or external network in described user terminal and the described system are specially:
Allow or refuse the sign of other equipment in the described system of described user terminal access or external network; Or,
The priority tag of other equipment or external network in the described system of described user terminal access, wherein, other priority tag of lowermost level represents to refuse other equipment or external network in the described system of described user terminal access.
Preferably, when the access rights of other equipment or external network in described user terminal and the described system are specially the priority tag of other equipment in the described system of described user terminal access or external network, whether described switch is inquired about described access request in described route matrix transmitting apparatus has after the access rights with the destination device of described access request, specifically comprises:
Described switch is controlled the flowing of access of described user terminal according to the rank of the priority tag of user terminal had and the purpose terminal described access request that sends described access request.
Preferably, when the access rights of other equipment or external network in described user terminal and the described system were specially the priority tag of other equipment in the described system of described user terminal access or external network, described method also comprised:
When described switch judged that there is potential safety hazard in user terminal, described switch reduced the rank of the priority tag of other equipment in the described system of the pairing visit of described user terminal or external network;
When described switch judged that the potential safety hazard of user terminal is eliminated, described switch improved the rank of the priority tag of other equipment in the described system of the pairing visit of described user terminal or external network.
On the other hand, the present invention also provides a kind of switch, be applied to comprise in the system of a switch, at least one user terminal and a certificate server, wherein, described switch is connected respectively with described certificate server with described at least one user terminal, and be connected with external network, comprising:
Memory module is used for storing the route matrix of preserving the access authority information between each equipment of described system and/or the external network;
Communication module is used for receiving the communication information that each equipment sent of described system;
Enquiry module, be connected with described memory module with described communication module, be used for when described communication module receives an access request, whether the transmitting apparatus of the described access request of inquiry has the access rights with the destination device of described access request in the route matrix that described memory module is stored;
Control module is connected with described enquiry module, when the Query Result of described enquiry module when being, allow described transmitting apparatus to visit described destination device, when the Query Result of described enquiry module for not the time, refuse described transmitting apparatus and visit described destination device.
Preferably, the access rights of other equipment or external network in user terminal that is comprised in the route matrix that described memory module is stored and the described system are specially:
Allow or refuse the sign of other equipment in the described system of described user terminal access or external network; Or,
The priority tag of other equipment or external network in the described system of described user terminal access, wherein, other priority tag of lowermost level represents to refuse other equipment or external network in the described system of described user terminal access.
Preferably, when the access rights of other equipment or external network in user terminal that is comprised in the route matrix that described memory module is stored and the described system are specially the priority tag of other equipment in the described system of described user terminal access or external network
Described control module also is used for the rank of priority tag of user terminal had and the purpose terminal described access request of the described access request of transmission that inquires according to described enquiry module, and the flowing of access of described user terminal is controlled.
Preferably, when the access rights of other equipment or external network in user terminal that is comprised in the route matrix that described memory module is stored and the described system were specially the priority tag of other equipment in the described system of described user terminal access or external network, described switch also comprised:
Judge module is used for judging whether each user terminal of described system exists potential safety hazard;
Adjusting module, be connected with described memory module with described judge module, be used for when described judge module judges that there is potential safety hazard in user terminal, reduce described in the route matrix that described memory module stores the rank of the priority tag of other equipment in the described system of the pairing visit of user terminal or external network, or when described judge module judges that the potential safety hazard of user terminal is eliminated, improve described in the route matrix that described memory module stores the rank of the priority tag of other equipment in the described system of the pairing visit of user terminal or external network.
Compared with prior art, the present invention has the following advantages:
By using technical scheme of the present invention, can realize the access control between different main frames and the setting of route matrix priority by route matrix, thereby the flow to whole network is supervised, because route matrix can very simply be realized by software, can combine with multiple application system, simplify the monitoring of network, and improved the flexibility of network monitoring.
Description of drawings
Fig. 1 is the application architecture schematic diagram of 802.1x agreement in the prior art;
Fig. 2 is the schematic flow sheet of client certificate online in the prior art;
Fig. 3 is that a kind of typical case of the prior art uses the structural representation of networking;
Fig. 4 is the schematic flow sheet of the management method of a kind of network access authority provided by the invention;
Fig. 5 is the schematic flow sheet of the initialization procedure of access rights in a kind of route matrix provided by the invention;
Fig. 6 is the schematic flow sheet that a kind of priority provided by the invention is adjusted flow process;
Fig. 7 is the structural representation of a kind of switch of the present invention's proposition.
Embodiment
As stated in the Background Art, priority treatment for the communications access between some crucial main frame, and the flow restriction between the non-key main frame of other there is not clear and definite implementation in the prior art, therefore, can't realize above-mentioned access control and priority control by existing technology.
In order to address the above problem, one aspect of the present invention provides a kind of management method of network access authority, be applied to comprise in the system of a switch, at least one user terminal and a certificate server, switch is connected respectively with certificate server with at least one user terminal, and be connected with external network, in the switch by the access rights between each equipment in the form saved system of route matrix and/or the external network.
As shown in Figure 4, the schematic flow sheet for the management method of a kind of network access authority proposed by the invention specifically may further comprise the steps:
Step S401, switch receive an access request.
It is pointed out that before this step, also comprise the access rights initialization procedure in the route matrix in the technical program, specify as follows:
When adding new user terminal in the system, switch identifying subscriber terminal in route matrix has the access rights of certificate server, but do not have with system in the access rights of other equipment or external network.
Such processing can guarantee that this user terminal has the conduct interviews right of purview certification of access registrar server, and still, before the security row of not verifying this user terminal, this user terminal can not be visited miscellaneous equipment or the external network in this system.
And when the authentication of user terminal by certificate server, switch is according to default device access authority Provisioning Policy access rights between other equipment and/or the external network in identifying subscriber terminal and the system in route matrix.
It is to be noted, if the new user terminal that inserts has directly been specified access rights, promptly when switch receives the information of miscellaneous equipment in designated user terminal and the system and/or the access rights between the external network, switch can be directly according to information access rights between other equipment and/or the external network in identifying subscriber terminal and the system in route matrix, and no longer need to carry out the access authority authentication process of certificate server.
Whether the transmitting apparatus of step S402, switch queried access request in route matrix has the access rights with the destination device of access request.
When Query Result when being, execution in step S403;
When Query Result for not the time, execution in step S404.
What need specifically note is that the access rights of other equipment or external network in user terminal and the system specifically comprise following two kinds of situations:
The sign of other equipment or external network in situation one, permission or the refusing user's terminal access system.
Only identify user terminal and whether be allowed to other equipment or external network in the access system, promptly only had " permission " and " refusal " two kinds of situations.
The priority tag of other equipment or external network in situation two, the user terminal access system, wherein, other priority tag of lowermost level is represented other equipment or external network in the refusing user's terminal access system.
In this case, no longer simply be divided into two kinds of situations, but divide for a plurality of access levels according to the significance level and/or the level of security of equipment room visit, the lowest priority rank is represented denied access, and priority-level is high more, then the visit process of the pairing equipment room of this priority is got over meeting by priority treatment, or is assigned with the visit process that more system resource is used for high priority.
Based on above-mentioned situation two, the judged result of step S402 has also had concrete adjustment accordingly, and is specific as follows:
When Query Result is not lowest priority for the rank of the pairing priority tag of this access request, execution in step S403;
When Query Result is lowest priority for the rank of the pairing priority tag of this access request, execution in step S404.
Step S403, switch allow transmitting apparatus visit destination device.
In this step, if when having the priority division of visit process according to above-mentioned situation two, need in this step according to the system resource scheduling that the priority treatment and/or be used for of process carries out in the orientation that conducts interviews of corresponding priority level rank, thereby realize corresponding flow control.
Step S404, switch refusal transmitting apparatus visit destination device.
In concrete application scenarios, when the access rights of other equipment or external network in user terminal and the system are specially the priority tag of other equipment in the user terminal access system or external network, technical scheme of the present invention also comprises the adjustment process of priority-level, specifies as follows:
When switch judges that there is potential safety hazard in user terminal, the rank of the priority tag of other equipment or external network in the pairing access system of switch reduction user terminal;
When switch judges that the potential safety hazard of user terminal is eliminated, the rank of the priority tag of other equipment or external network in the pairing access system of switch raising user terminal.
Compared with prior art, the present invention has the following advantages:
By using technical scheme of the present invention, can realize the access control between different main frames and the setting of route matrix priority by route matrix, thereby the flow to whole network is supervised, because route matrix can very simply be realized by software, can combine with multiple application system, simplify the monitoring of network, and improved the flexibility of network monitoring.
Below, in conjunction with concrete application scenarios, technical scheme proposed by the invention is described.
The present invention proposes a kind of method that " route matrix " realizes the management of network access authority of passing through, can carry out three layers of forwarding and access control and traffic policing simply and flexibly.
As shown in table 1, be a kind of schematic diagram of simple route matrix.
The simple route matrix schematic diagram of table 1
Figure G2009101767630D00081
Wherein, Y represents addressablely in the table 1, and N represents inaccessible.
By this route matrix, the access rights that can be illustrated between each equipment in the current system are specific as follows:
(1) device A cannot access means B;
(2) equipment B can access means A.
At in the current system for the access control demand of each equipment, the notion of route matrix is incorporated in three layers of route control and management.Specifically as shown in table 2, with identical in the table 1, ' Y ' expression can be visited, and ' N ' represents inaccessible.
Table 2 route matrix schematic diagram
Figure G2009101767630D00091
This route matrix comprises following information:
(1) can exchange visits between All hosts and certificate server;
(2) fly-by-night main frame does not allow to visit other main frame except that certificate server;
(3) trusted host accessible other All hosts except that fly-by-night main frame;
(4) trustless main frame is by behind the certificate server, can revise that corresponding node is switching to the trusted main frame for " Y " in the matrix.
By above-mentioned explanation, can draw under this kind application scenarios, a parameter in the route matrix is defined as follows:
Row (source IP just) has been represented the reliability of the main frame that will initiate to visit, has represented the confidentiality of accessed main frame and to the attention degree of safety and be listed as (purpose IP).Certain the row in ' N ' more multilist show that this main frame is unreliable more, certain row in ' N ' more multilist show that this main frame is secret more high more to security requirement.Based on this rule, can carry out safe access control to network by " route matrix " and dispose.
Need be pointed out that further that above-mentioned route matrix format restriction only is a preferred embodiment of the present invention, the adjustment of form does not influence protection scope of the present invention.
As shown in Figure 5, the schematic flow sheet for the initialization procedure of access rights in the route matrix specifically may further comprise the steps:
Step S501, route matrix initialization.
Can by the user directly dispose which destination host be give tacit consent to all addressable.
For example: it is all addressable main frame of All hosts that the user has disposed certain certificate server, so, at first the corresponding row and column of certificate server is made as full Y, and in LAN or Internet (external network) row except that certificate server and and all the other settings ' N ' self, specifically as shown in table 3:
The initial route matrix of table 3
Figure G2009101767630D00101
Add new main frame in step S502, the system, its initial condition is set can only the access registrar server.
Give tacit consent to that promptly initiate main frame is defined as distrusting main frame, only allow its access registrar server, specifically as shown in table 4:
Table 4 adds the route matrix behind the distrust main frame
Step S503, initiate main frame is carried out safety certification, and adjust route matrix according to corresponding authentication result.
For example, distrust main frame 1 not authenticate and pass through, distrust main frame 2 authentications to pass through, become " trusted main frame ", therefore,, this main frame is set visits external network (LAN/Internet) distrusting the access level of main frame 2 to improve.
This process also can be specified by the user and be realized, promptly the user thinks certain initiate main frame trusted, and need not arrive the certificate server authentication can be directly with its configuration " trusted main frame ".
Specifically as shown in table 5 through the route matrix that authentication is adjusted:
Route matrix after table 5 authentication
Figure G2009101767630D00112
So far just finished the security deployment in the network, and can control the visit between each equipment in the system according to corresponding access rights by " route matrix ".
On the other hand, on the basis of above-mentioned route matrix Provisioning Policy, can increase the weighted value of node in the route matrix, thereby be applied to the Limit Rate supervision.
Suppose and think and represent access privileges respectively from low to high from 0~3, think do not allow to visit be lowest priority (0 grade), the exchanging visit of trusting between main frame is limit priority (3 grades), preferentially very 1 grade of access registrar server, visit LAN/Internet priority is 2 grades, and corresponding priority level is provided with specifically as shown in table 6:
The route matrix that table 6 cum rights is heavy
Figure G2009101767630D00121
On this basis, can carry out flow control to the visit between each equipment according to the height of priority-level, for example, the exchanging visit of trusting between the main frame can obtain maximum assignment of traffic, to be that 0 visit process is then actual be denied access to priority, can not obtain any assignment of traffic, by such setting, flow adjustment between the visit that can realize different brackets is carried out, the resource allocation in the realization system.
Have in the application scenarios of priority division at this kind, can further include the adjustment flow process of priority.
The action that improves priority can realize by modes such as acl rules.Can realize the flow of different source addresses and destination address is carried out speed limit and current limliting by this model, thereby the visit that guarantees limit priority meets with a response at first.
Specifically as shown in Figure 6, in technical scheme proposed by the invention, the priority in the route matrix can be passed through Network Intrusion Detection System, and (Network Intrusion Detection System NIDS) waits the output result of network monitoring device to obtain.
Come the flow existence of main frame since then to attack if network monitoring device is thought, will notify switch that the priority of the corresponding node in the route matrix is reduced, improve its priority again after waiting to eliminate attack.
Can improve internet security very flexibly in this way, concrete steps no longer describe in detail.
Compared with prior art, the present invention has the following advantages:
By using technical scheme of the present invention, can realize the access control between different main frames and the setting of route matrix priority by route matrix, thereby the flow to whole network is supervised, because route matrix can very simply be realized by software, can combine with multiple application system, simplify the monitoring of network, and improved the flexibility of network monitoring.
In order to realize above-mentioned technical scheme proposed by the invention, the invention allows for a kind of switch, be applied to comprise in the system of a switch, at least one user terminal and a certificate server, wherein, switch is connected respectively with certificate server with at least one user terminal, and is connected with external network.
Specifically as shown in Figure 7, the structural representation of a kind of switch that proposes for the present invention comprises:
Memory module 71 is used for storing the route matrix of the access authority information between each equipment of the system of preserving and/or the external network;
In concrete application scenarios, the access rights of other equipment or external network specifically comprise following two kinds of situations in user terminal that is comprised in the route matrix that memory module 71 is stored and the system:
The sign of other equipment or external network in situation one, permission or the refusing user's terminal access system.
Only identify user terminal and whether be allowed to other equipment or external network in the access system, promptly only had " permission " and " refusal " two kinds of situations.
The priority tag of other equipment or external network in situation two, the user terminal access system, wherein, other priority tag of lowermost level is represented other equipment or external network in the refusing user's terminal access system.
In this case, no longer simply be divided into two kinds of situations, but divide for a plurality of access levels according to the significance level and/or the level of security of equipment room visit, the lowest priority rank is represented denied access, and priority-level is high more, then the visit process of the pairing equipment room of this priority is got over meeting by priority treatment, or is assigned with the visit process that more system resource is used for high priority.
Communication module 72 is used for the communication information that each equipment sent of receiving system;
Enquiry module 73, be connected with memory module 71 with communication module 72, be used for when communication module 72 receives an access request, whether the transmitting apparatus of queried access request has the access rights with the destination device of access request in the route matrix that memory module 71 is stored;
Control module 74 is connected with enquiry module 73, when the Query Result of enquiry module 73 when being, allow transmitting apparatus visit destination device, when the Query Result of enquiry module 73 for not the time, refusal transmitting apparatus visit destination device.
Need further be pointed out that, when the access rights of other equipment or external network in user terminal that is comprised in the route matrix that memory module 71 is stored and the system are specially the priority tag of other equipment in the user terminal access system or external network, control module 74 also is used for the rank of priority tag of user terminal had and purpose terminal access request of the transmission access request that inquired according to enquiry module 73, and the flowing of access of user terminal is controlled.
In concrete application scenarios, when the access rights of other equipment or external network in user terminal that is comprised in the route matrix that memory module 71 is stored and the system were specially the priority tag of other equipment in the user terminal access system or external network, switch also comprised:
Judge module 75 is used for judging whether each user terminal of system exists potential safety hazard;
Adjusting module 76, be connected with memory module 71 with judge module 75, be used for when judge module 75 judges that there is potential safety hazard in user terminal, reduce in the route matrix that memory module 71 stored the rank of the priority tag of other equipment in the pairing access system of user terminal or external network, or when judge module 75 judges that the potential safety hazard of user terminals is eliminated, improve in the route matrix that memory module 71 stored the rank of the priority tag of other equipment in the pairing access system of user terminal or external network.
Compared with prior art, the present invention has the following advantages:
By using technical scheme of the present invention, can realize the access control between different main frames and the setting of route matrix priority by route matrix, thereby the flow to whole network is supervised, because route matrix can very simply be realized by software, can combine with multiple application system, simplify the monitoring of network, and improved the flexibility of network monitoring.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by hardware, also can realize by the mode that software adds necessary general hardware platform.Based on such understanding, technical scheme of the present invention can embody with the form of software product, it (can be CD-ROM that this software product can be stored in a non-volatile memory medium, USB flash disk, portable hard drive etc.) in, comprise some instructions with so that computer equipment (can be personal computer, server, the perhaps network equipment etc.) each implements the described method of scene to carry out the present invention.
It will be appreciated by those skilled in the art that accompanying drawing is a preferred schematic diagram of implementing scene, module in the accompanying drawing or flow process might not be that enforcement the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device of implementing in the scene can be distributed in the device of implementing scene according to implementing scene description, also can carry out respective change and be arranged in the one or more devices that are different from this enforcement scene.The module of above-mentioned enforcement scene can be merged into a module, also can further split into a plurality of submodules.
The invention described above sequence number is not represented the quality of implementing scene just to description.
More than disclosed only be several concrete enforcement scene of the present invention, still, the present invention is not limited thereto, any those skilled in the art can think variation all should fall into protection scope of the present invention.

Claims (10)

1, a kind of management method of network access authority, be applied to comprise in the system of a switch, at least one user terminal and a certificate server, wherein, described switch is connected respectively with described certificate server with described at least one user terminal, and be connected with external network, it is characterized in that preserve access rights between each equipment in the described system and/or the external network by the form of route matrix in the described switch, described method comprises:
When described switch received an access request, whether described switch is inquired about described access request in described route matrix transmitting apparatus had the access rights with the destination device of described access request;
When described Query Result when being, described switch allows described transmitting apparatus to visit described destination device, when described Query Result for not the time, described switch is refused described transmitting apparatus and is visited described destination device.
2, the method for claim 1 is characterized in that, when adding new user terminal in the described system, described method also comprises:
Described switch identifies described user terminal and has the access rights of described certificate server in described route matrix, but do not have with described system in the access rights of other equipment or external network;
When the authentication of described user terminal by described certificate server, described switch identifies access rights between other equipment in described user terminal and the described system and/or the external network according to default device access authority Provisioning Policy in described route matrix.
3, method as claimed in claim 2 is characterized in that, when adding new user terminal in the described system, described method also comprises:
When described switch receives the information of the miscellaneous equipment of specifying in described user terminal and the described system and/or the access rights between the external network, directly in described route matrix, identify access rights between other equipment in described user terminal and the described system and/or the external network according to described information.
As any described method of claim 1 to 3, it is characterized in that 4, the access rights of other equipment or external network in described user terminal and the described system are specially:
Allow or refuse the sign of other equipment in the described system of described user terminal access or external network; Or,
The priority tag of other equipment or external network in the described system of described user terminal access, wherein, other priority tag of lowermost level represents to refuse other equipment or external network in the described system of described user terminal access.
5, method as claimed in claim 4, it is characterized in that, when the access rights of other equipment or external network in described user terminal and the described system are specially the priority tag of other equipment in the described system of described user terminal access or external network, whether described switch is inquired about described access request in described route matrix transmitting apparatus has after the access rights with the destination device of described access request, specifically comprises:
Described switch is controlled the flowing of access of described user terminal according to the rank of the priority tag of user terminal had and the purpose terminal described access request that sends described access request.
6, method as claimed in claim 4, it is characterized in that, when the access rights of other equipment or external network in described user terminal and the described system were specially the priority tag of other equipment in the described system of described user terminal access or external network, described method also comprised:
When described switch judged that there is potential safety hazard in user terminal, described switch reduced the rank of the priority tag of other equipment in the described system of the pairing visit of described user terminal or external network;
When described switch judged that the potential safety hazard of user terminal is eliminated, described switch improved the rank of the priority tag of other equipment in the described system of the pairing visit of described user terminal or external network.
7, a kind of switch is applied to comprise in the system of a switch, at least one user terminal and a certificate server, wherein, described switch is connected respectively with described certificate server with described at least one user terminal, and be connected with external network, it is characterized in that, comprising:
Memory module is used for storing the route matrix of preserving the access authority information between each equipment of described system and/or the external network;
Communication module is used for receiving the communication information that each equipment sent of described system;
Enquiry module, be connected with described memory module with described communication module, be used for when described communication module receives an access request, whether the transmitting apparatus of the described access request of inquiry has the access rights with the destination device of described access request in the route matrix that described memory module is stored;
Control module is connected with described enquiry module, when the Query Result of described enquiry module when being, allow described transmitting apparatus to visit described destination device, when the Query Result of described enquiry module for not the time, refuse described transmitting apparatus and visit described destination device.
8, switch as claimed in claim 7 is characterized in that, the access rights of other equipment or external network in user terminal that is comprised in the route matrix that described memory module is stored and the described system are specially:
Allow or refuse the sign of other equipment in the described system of described user terminal access or external network; Or,
The priority tag of other equipment or external network in the described system of described user terminal access, wherein, other priority tag of lowermost level represents to refuse other equipment or external network in the described system of described user terminal access.
9, switch as claimed in claim 8, it is characterized in that, when the access rights of other equipment or external network in user terminal that is comprised in the route matrix that described memory module is stored and the described system are specially the priority tag of other equipment in the described system of described user terminal access or external network
Described control module also is used for the rank of priority tag of user terminal had and the purpose terminal described access request of the described access request of transmission that inquires according to described enquiry module, and the flowing of access of described user terminal is controlled.
10, switch as claimed in claim 8, it is characterized in that, when the access rights of other equipment or external network in user terminal that is comprised in the route matrix that described memory module is stored and the described system were specially the priority tag of other equipment in the described system of described user terminal access or external network, described switch also comprised:
Judge module is used for judging whether each user terminal of described system exists potential safety hazard;
Adjusting module, be connected with described memory module with described judge module, be used for when described judge module judges that there is potential safety hazard in user terminal, reduce described in the route matrix that described memory module stores the rank of the priority tag of other equipment in the described system of the pairing visit of user terminal or external network, or when described judge module judges that the potential safety hazard of user terminal is eliminated, improve described in the route matrix that described memory module stores the rank of the priority tag of other equipment in the described system of the pairing visit of user terminal or external network.
CN200910176763A 2009-09-21 2009-09-21 Method and equipment for managing network access authority Pending CN101651697A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910176763A CN101651697A (en) 2009-09-21 2009-09-21 Method and equipment for managing network access authority

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910176763A CN101651697A (en) 2009-09-21 2009-09-21 Method and equipment for managing network access authority

Publications (1)

Publication Number Publication Date
CN101651697A true CN101651697A (en) 2010-02-17

Family

ID=41673804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910176763A Pending CN101651697A (en) 2009-09-21 2009-09-21 Method and equipment for managing network access authority

Country Status (1)

Country Link
CN (1) CN101651697A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102185859A (en) * 2011-05-09 2011-09-14 北京艾普优计算机***有限公司 Computer system and data interaction method
CN102299859A (en) * 2011-09-20 2011-12-28 北京星网锐捷网络技术有限公司 Mutual information forwarding method and device
CN103491056A (en) * 2012-06-12 2014-01-01 中兴通讯股份有限公司 Control method and device for permission of application
CN104410644A (en) * 2014-12-15 2015-03-11 北京国双科技有限公司 Data configuration method and device
CN106603523A (en) * 2016-12-09 2017-04-26 北京东土军悦科技有限公司 Message forwarding method and network switching device
CN106982217A (en) * 2017-04-13 2017-07-25 西安莫贝克半导体科技有限公司 A kind of network security management mode of decentralization
CN107391095A (en) * 2016-05-16 2017-11-24 广州市动景计算机科技有限公司 Icon generating means right management method, data request method, device and terminal
CN107483483A (en) * 2017-08-31 2017-12-15 中国农业银行股份有限公司 The customer information access control method and device of a kind of financial circles information system
CN110475133A (en) * 2019-08-15 2019-11-19 天脉聚源(杭州)传媒科技有限公司 A kind of authority distributing method, device and storage medium
CN110995586A (en) * 2019-11-15 2020-04-10 锐捷网络股份有限公司 BGP message processing method and device, electronic equipment and storage medium

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102185859A (en) * 2011-05-09 2011-09-14 北京艾普优计算机***有限公司 Computer system and data interaction method
CN102299859A (en) * 2011-09-20 2011-12-28 北京星网锐捷网络技术有限公司 Mutual information forwarding method and device
CN103491056A (en) * 2012-06-12 2014-01-01 中兴通讯股份有限公司 Control method and device for permission of application
CN104410644A (en) * 2014-12-15 2015-03-11 北京国双科技有限公司 Data configuration method and device
CN107391095A (en) * 2016-05-16 2017-11-24 广州市动景计算机科技有限公司 Icon generating means right management method, data request method, device and terminal
CN106603523A (en) * 2016-12-09 2017-04-26 北京东土军悦科技有限公司 Message forwarding method and network switching device
CN106982217A (en) * 2017-04-13 2017-07-25 西安莫贝克半导体科技有限公司 A kind of network security management mode of decentralization
CN107483483A (en) * 2017-08-31 2017-12-15 中国农业银行股份有限公司 The customer information access control method and device of a kind of financial circles information system
CN110475133A (en) * 2019-08-15 2019-11-19 天脉聚源(杭州)传媒科技有限公司 A kind of authority distributing method, device and storage medium
CN110475133B (en) * 2019-08-15 2023-11-03 北京拉近众博科技有限公司 Authority distribution method, device and storage medium
CN110995586A (en) * 2019-11-15 2020-04-10 锐捷网络股份有限公司 BGP message processing method and device, electronic equipment and storage medium
CN110995586B (en) * 2019-11-15 2022-07-15 锐捷网络股份有限公司 BGP message processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN101651697A (en) Method and equipment for managing network access authority
US10630725B2 (en) Identity-based internet protocol networking
US8239929B2 (en) Multiple tiered network security system, method and apparatus using dynamic user policy assignment
US9774633B2 (en) Distributed application awareness
US8280058B2 (en) Wireless network having multiple security interfaces
US8800006B2 (en) Authentication and authorization in network layer two and network layer three
US9438630B2 (en) Network access control using subnet addressing
US9231911B2 (en) Per-user firewall
US9288193B1 (en) Authenticating cloud services
EP2352323A1 (en) Method and system for controlling context-based wireless access to secured network resources
US20050188211A1 (en) IP for switch based ACL's
WO2016200656A1 (en) System, apparatus and method for access control list processing in a constrained environment
US10135942B2 (en) Differentiated priority level communication
EP2859700A1 (en) Using neighbor discovery to create trust information for other applications
US20100023618A1 (en) System and method for supplicant based accounting and access
KR100707805B1 (en) Authentication system being capable of controlling authority based of user and authenticator
US8272043B2 (en) Firewall control system
TW202137735A (en) Programmable switching device for network infrastructures
CN102271120A (en) Trusted network access authentication method capable of enhancing security
US20170230374A1 (en) Secure communication system and method
CN114915534A (en) Network deployment architecture facing trust enhancement and network access method thereof
JP5622088B2 (en) Authentication system, authentication method
US20170331838A1 (en) Methods and computing devices to regulate packets in a software defined network
KR20210123811A (en) Apparatus and Method for Controlling Hierarchical Connection based on Token
CN114640512B (en) Security service system, access control method, and computer-readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100217