CN101714927A - Network access control method for comprehensive safety management of inner network - Google Patents

Network access control method for comprehensive safety management of inner network Download PDF

Info

Publication number
CN101714927A
CN101714927A CN201010300360A CN201010300360A CN101714927A CN 101714927 A CN101714927 A CN 101714927A CN 201010300360 A CN201010300360 A CN 201010300360A CN 201010300360 A CN201010300360 A CN 201010300360A CN 101714927 A CN101714927 A CN 101714927A
Authority
CN
China
Prior art keywords
terminal
security
intranet
network
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201010300360A
Other languages
Chinese (zh)
Other versions
CN101714927B (en
Inventor
许元进
黄聪泉
杨小焰
吴滨华
肖健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Original Assignee
FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd filed Critical FUJIAN ETIM INFORMATION TECHNOLOGY Co Ltd
Priority to CN2010103003605A priority Critical patent/CN101714927B/en
Publication of CN101714927A publication Critical patent/CN101714927A/en
Application granted granted Critical
Publication of CN101714927B publication Critical patent/CN101714927B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to a network access control method for the comprehensive safety management of an inner network. The network access control method is characterized in that the safety control of a network access terminal is realized by the linkage among a comprehensive inner network safety management system, a switch and a Radius server. The network access control method is realized by the following steps: firstly, pointing an 802.1 X authentication server to the Radius server and dividing into three vlans of a working area, an access area and a repairing area by a switch with the 802.1X access authentication function; and then, configuring the access control strategies of the vlans on the Radius server and the linkage configuration with the comprehensive inner network safety management. The invention can manage and control the terminal safety and saves network resources by freeing detection in a continuous scanning mode.

Description

The access control method of intranet security integrated management
Technical field
The present invention relates to Terminal Security Management, the secret technical field of information data, particularly a kind of network insertion control technology of intranet security integrated management.
Background technology
Along with the fast development of informatization, the internal institution terminal is more and more, and how internally divulging a secret of the network security access-in management of network termination, and end message data become the first-selected problem of enterprise.
The network of present most of intranet security management systems connects people's control technology, mostly based on the mode of operation of " scanning one find a blocking-up ", administrative center by network access control system, network is constantly scanned, and to scanning computer carry out validity checking, judge whether this terminal is legal terminal.When finding that this terminal is illegal terminal, adopt ARP deception mode, block this accessing terminal to network.
Above-mentioned technology exists following deficiency:
1, illegal terminal can be survived a period of time on the net
Owing to need scan to all addresses of the whole network, there is certain sweep spacing cycle each address, and therefore, the certain hour of surviving in network illegally accesses terminal in during this period of time, and during this period of time, the assailant might finish the part attack.
2, in some cases. system can not find the illegal terminal that inserts
Owing to need the network range of invisible scanning, when outside the sweep limits of address in appointment of using that illegally access terminal, system can't " find " illegality equipment that inserts.
3, the Internet resources of consume valuable
Connecing people's control system need constantly scan in the hope of finding the illegal terminal that inserts network, and this can consume the Internet resources of a large amount of preciousnesses, and especially in catenet, this problem is more outstanding.
Summary of the invention
In view of the deficiency of above-mentioned technology, the purpose of this invention is to provide a kind of access control method of intranet security integrated management, can realize the management and control of terminal security.
The present invention adopts following scheme to realize: a kind of access control method of intranet security integrated management, it is characterized in that: by the security control of the realization of the interlock between Intranet Integrated Security Management System, switch and the Radius server the network insertion terminal, may further comprise the steps realization: the switch that at first has 802.1X access authentication function points to the Radius server with the 802.1X certificate server, and is divided into service area, visiting district and repairs three vlan in district; Then on the Radius server access control policy of each vlan of configuration and and the interlock of intranet security management system configuration;
Described service area is for the legal terminal visit, and promptly normal authorization authenticates and passes through and installation intranet security system client, and the terminal security inspection meets Intranet Integrated Security Management System regulation, normally all resources of accesses network;
Described reparation district is for the illegal terminal visit, i.e. normal authorization authentication is passed through and the intranet security system client is installed, but the terminal security inspection does not meet the requirement of Intranet Integrated Security Management System, can only visit remediation server;
Described visiting district is for the illegal terminal visit, and promptly unauthorized authentication or the terminal that the intranet security system client is not installed can only be visited the client downloads page of intranet security management system.
The present invention has following beneficial effect:
In case finding has the illegal terminal access network, promptly blocks at once, avoid the illegal terminal access network after, the security threat that is caused in the time-to-live.
Do not belong to when terminal address under the scope situation of appointment, so long as illegal terminal, do not obtain the user of proper authorization, system forbids access network.
System need not to adopt " constantly scanning " mode, but by the authorization between switch and the system, illegal terminal is blocked.
Description of drawings
Fig. 1 is a principle of the invention schematic diagram.
Embodiment
The present invention will be further described below in conjunction with drawings and Examples.
As shown in Figure 1, the present invention utilizes the network insertion control technology that controlled target has been turned to terminal, set about from terminal, security strategy by keeper's appointment, the main frame that inserts internal network is carried out fail safe detect, refuse unsafe computer automatically and insert internal network till these computers meet security strategy in the network.Its framework that adopts is client/server (C/S) pattern, and browser/server (B/S) pattern is then adopted in management, and the keeper can login the intranet security management system and terminal is issued security strategy by the webpage mode, realizes the management and control of terminal security.In particular, the invention is characterized in: by the security control of the realization of the interlock between Intranet Integrated Security Management System, switch and the Radius server the network insertion terminal, may further comprise the steps realization: the switch that at first has 802.1X access authentication function points to the Radius server with the 802.1X certificate server, and is divided into service area, visiting district and repairs three vlan in district; Then on the Radius server access control policy of each vlan of configuration and and the interlock of intranet security management system configuration;
Described service area is for the legal terminal visit, and promptly normal authorization authenticates and passes through and installation intranet security system client, and the terminal security inspection meets Intranet Integrated Security Management System regulation, normally all resources of accesses network;
Described reparation district is for the illegal terminal visit, i.e. normal authorization authentication is passed through and the intranet security system client is installed, but the terminal security inspection does not meet the requirement of Intranet Integrated Security Management System, can only visit remediation server;
Described visiting district is for the illegal terminal visit, and promptly unauthorized authentication or the terminal that the intranet security system client is not installed can only be visited the client downloads page of intranet security management system.
Its concrete operation principle comprises following mode:
Behind accessing terminal to network, do not carry out 802.1X authentication at the appointed time, the vlan state that terminal connects switch ports themselves can jump to visiting district automatically, and the port that connects switch is to be in the logic closed condition, promptly refuses accessing terminal to network.
To authenticating by 802.1X, this moment, whether the intranet security management system can automatic sense terminals install client-side program, to the terminal of client is not installed, system's meeting and Radius server link, by sending instructions under the Radius server, the port vlan state exchange that connects switch is become visiting district, and promptly this terminal can only be visited the client downloads page of intranet security Tomcat-AdminPortal, so that carry out the installation of client-side program.
To client-side program is installed, but not by the terminal of 802.1X access authentication, switch ports themselves can jump to visiting district, closes because switch ports themselves is a logic, promptly refuses accessing terminal to network.In the case, may be that terminal local network configuration does not meet the scope that network regulation or IP do not belong to network insertion.
To client-side program and the terminal by 802.1X authentication are installed, but the terminal security inspection does not meet the requirement of system safety strategy, as Anti-Virus, system are not installed are had leak, software etc. is installed in violation of rules and regulations; This moment, switch ports themselves can jump to automatically repaired the district, promptly only allows the terminal access remediation server by the interlock between the server, and the leak that system is existed, Anti-Virus, software etc. is repaired or installed in violation of rules and regulations.
To client-side program is installed, by the terminal that 802.1X authentication and safety check compliance with system security strategy require, this moment, switch ports themselves belonged to the service area, promptly network is let pass, and can visit the server zone or the resource of Intranet.
Be noted that in addition the 802.1x agreement is a kind of network insertion control (port based networkaccess control) agreement based on port." based on the network insertion control of port " is meant that this one-level of port at the local area network (LAN) access control equipment authenticates and controls the equipment that is inserted.If the subscriber equipment that is connected on the port can just can be visited the resource in the local area network (LAN) by authentication; If can not be, then can't visit resource in the local area network (LAN) and grab to be equivalent to connect and disconnected by physics by authentication.
Radius is the abbreviation of Remote Authentication Dial In User Service, i.e. remote authentication dial-in user's service.Want by certain network (as Ethernet) and NAS (network access server) as the user thus connect when obtaining the right of accesses network, NAS can be chosen in and carry out the local authentication charging on the NAS, or user profile passed to radius server, carry out authentication and accounting by Radius; Radius protocol has stipulated how to transmit user profile and accounting information between NAS and the radius server; Radius server is responsible for receiving user's connection request, finishes checking, and returns to NAS for passing service the required configuration information of user.
The present invention has following advantage:
1, assists in ensuring that all user network equipments all meet security strategy, thereby increase substantially the fail safe of network, be not subjected to the influence of scale and complexity.
2, detection and control attempt to connect all terminals of network, are not subjected to the influence of its access method, thereby improve enterprise security and extensibility.
3, prevent not meet strategy and the terminal equipment that can not manage influences network availability or customer productivity.
4, reduce with identification and repair and do not meet the operating cost relevant strategy, that can not manage with infected system.
5, when accessing terminal to network, just carry out access control, do not have the time-to-live point of terminal on network.
6, reduce the offered load ability, need not terminal to be detected, can directly carry out access control illegal terminal by " scanning " mode.
The above only is preferred embodiment of the present invention, and all equalizations of being done according to the present patent application claim change and modify, and all should belong to covering scope of the present invention.

Claims (6)

1. the access control method of an intranet security integrated management, it is characterized in that: by the security control of the realization of the interlock between Intranet Integrated Security Management System, switch and the Radius server the network insertion terminal, may further comprise the steps realization: the switch that at first has 802.1X access authentication function points to the Radius server with the 802.1X certificate server, and is divided into service area, visiting district and repairs three vlan in district; Then on the Radius server access control policy of each vlan of configuration and and the interlock of intranet security management system configuration;
Described service area is for the legal terminal visit, and promptly normal authorization authenticates and passes through and installation intranet security system client, and the terminal security inspection meets Intranet Integrated Security Management System regulation, normally all resources of accesses network;
Described reparation district is for the illegal terminal visit, i.e. normal authorization authentication is passed through and the intranet security system client is installed, but the terminal security inspection does not meet the requirement of Intranet Integrated Security Management System, can only visit remediation server;
Described visiting district is for the illegal terminal visit, and promptly unauthorized authentication or the terminal that the intranet security system client is not installed can only be visited the client downloads page of intranet security management system.
2. the access control method of intranet security integrated management according to claim 1, it is characterized in that: behind accessing terminal to network, do not carry out the 802.1X authentication at the appointed time, the vlan state that terminal connects switch ports themselves can jump to visiting district automatically, and the port of connection switch is to be in the logic closed condition.
3. the access control method of intranet security integrated management according to claim 1, it is characterized in that: to authenticating by 802.1X, whether the intranet security management system can automatic sense terminals install client-side program, to the terminal of client is not installed, system's meeting and Radius server link, by sending instructions under the Radius server, the port vlan state exchange that connects switch is become visiting district.
4. the access control method of intranet security integrated management according to claim 1 is characterized in that: to client-side program is installed, but not by the terminal of 802.1X access authentication, switch ports themselves can jump to visiting district.
5. the access control method of intranet security integrated management according to claim 1, it is characterized in that: to the terminal of client-side program being installed and authenticating by 802.1X, but the terminal security inspection does not meet the requirement of system safety strategy, as Anti-Virus, system are not installed are had leak, software in violation of rules and regulations is installed; This moment, switch ports themselves can jump to automatically repaired the district by the interlock between the server.
6. the access control method of intranet security integrated management according to claim 1, it is characterized in that: to the terminal of client-side program being installed, requiring by 802.1X authentication and safety check compliance with system security strategy, this moment, switch ports themselves belonged to the service area, be that network is let pass, can visit the server zone or the resource of Intranet.
CN2010103003605A 2010-01-15 2010-01-15 Network access control method for comprehensive safety management of inner network Active CN101714927B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010103003605A CN101714927B (en) 2010-01-15 2010-01-15 Network access control method for comprehensive safety management of inner network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010103003605A CN101714927B (en) 2010-01-15 2010-01-15 Network access control method for comprehensive safety management of inner network

Publications (2)

Publication Number Publication Date
CN101714927A true CN101714927A (en) 2010-05-26
CN101714927B CN101714927B (en) 2012-04-18

Family

ID=42418219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010103003605A Active CN101714927B (en) 2010-01-15 2010-01-15 Network access control method for comprehensive safety management of inner network

Country Status (1)

Country Link
CN (1) CN101714927B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932244A (en) * 2012-10-25 2013-02-13 中国航天科工集团第二研究院七〇六所 Trusted access gateway based on bidirectional trustiness verification
CN103634119A (en) * 2013-12-13 2014-03-12 北京星网锐捷网络技术有限公司 Authentication method, application client, application server and authentication server
CN103973678A (en) * 2014-04-28 2014-08-06 刘建兵 Access control method for terminal computer
CN105025016A (en) * 2015-06-30 2015-11-04 公安部第一研究所 Internal-network terminal admission control method
CN105636029A (en) * 2015-06-30 2016-06-01 巫立斌 Wireless network safety protection method
US9413553B2 (en) 2012-10-31 2016-08-09 International Business Machines Corporation Network access control based on risk factor
CN106411929A (en) * 2016-11-08 2017-02-15 西安云雀软件有限公司 Method for placing illegal terminal into corresponding isolation area according to terminal safety level
CN107277040A (en) * 2017-07-20 2017-10-20 西安云雀软件有限公司 A kind of method for carrying out terminal Access Control in Intranet
CN107770119A (en) * 2016-08-15 2018-03-06 台山市金讯互联网络科技有限公司 A kind of control method of network admittance specified domain
CN109101789A (en) * 2018-06-28 2018-12-28 中译语通科技股份有限公司 A kind of data safety control method
CN109617892A (en) * 2018-12-26 2019-04-12 北京城强科技有限公司 A kind of Intranet boundary management-control method
CN113285929A (en) * 2021-05-10 2021-08-20 新华三技术有限公司 Terminal validity detection method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141448A (en) * 2007-09-28 2008-03-12 西安大唐电信有限公司 Method for implementing IEEE802.1x user port authentication in ethernet passive optical network
CN101232509A (en) * 2008-02-26 2008-07-30 杭州华三通信技术有限公司 Equipment, system and method for supporting insulation mode network access control
CN101272627B (en) * 2008-04-30 2010-12-22 杭州华三通信技术有限公司 Network access control method and apparatus for implementing roaming
CN101374110B (en) * 2008-10-22 2011-05-11 成都市华为赛门铁克科技有限公司 Method, system and equipment for processing packet of wireless service network

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932244B (en) * 2012-10-25 2015-08-12 中国航天科工集团第二研究院七〇六所 Based on the trusted access gateway of two-way Trusting eBusiness
CN102932244A (en) * 2012-10-25 2013-02-13 中国航天科工集团第二研究院七〇六所 Trusted access gateway based on bidirectional trustiness verification
US9413553B2 (en) 2012-10-31 2016-08-09 International Business Machines Corporation Network access control based on risk factor
CN103634119B (en) * 2013-12-13 2017-02-15 北京星网锐捷网络技术有限公司 Authentication method, application client, application server and authentication server
CN103634119A (en) * 2013-12-13 2014-03-12 北京星网锐捷网络技术有限公司 Authentication method, application client, application server and authentication server
CN103973678A (en) * 2014-04-28 2014-08-06 刘建兵 Access control method for terminal computer
CN103973678B (en) * 2014-04-28 2017-04-26 刘建兵 Access control method for terminal computer
CN105025016A (en) * 2015-06-30 2015-11-04 公安部第一研究所 Internal-network terminal admission control method
CN105636029A (en) * 2015-06-30 2016-06-01 巫立斌 Wireless network safety protection method
CN107770119A (en) * 2016-08-15 2018-03-06 台山市金讯互联网络科技有限公司 A kind of control method of network admittance specified domain
CN106411929A (en) * 2016-11-08 2017-02-15 西安云雀软件有限公司 Method for placing illegal terminal into corresponding isolation area according to terminal safety level
CN107277040A (en) * 2017-07-20 2017-10-20 西安云雀软件有限公司 A kind of method for carrying out terminal Access Control in Intranet
CN109101789A (en) * 2018-06-28 2018-12-28 中译语通科技股份有限公司 A kind of data safety control method
CN109617892A (en) * 2018-12-26 2019-04-12 北京城强科技有限公司 A kind of Intranet boundary management-control method
CN109617892B (en) * 2018-12-26 2021-12-17 北京城强科技有限公司 Intranet boundary management and control method
CN113285929A (en) * 2021-05-10 2021-08-20 新华三技术有限公司 Terminal validity detection method and device

Also Published As

Publication number Publication date
CN101714927B (en) 2012-04-18

Similar Documents

Publication Publication Date Title
CN101714927B (en) Network access control method for comprehensive safety management of inner network
CN101227468B (en) Method, device and system for authenticating user to network
CN100539501C (en) Unified Identity sign and authentication method based on domain name
CN100496025C (en) Ternary equal identification based reliable network access control method
CN103179130B (en) A kind of information system intranet security management platform and management method
CN101355459B (en) Method for monitoring network based on credible protocol
CN104202338B (en) A kind of safety access method being applicable to enterprise-level Mobile solution
CN102724186B (en) Phishing website detection system and detection method
US20140020067A1 (en) Apparatus and method for controlling traffic based on captcha
US20120324545A1 (en) Automated security privilege setting for remote system users
WO2018157247A1 (en) System and method for securing communications with remote security devices
CN102035838B (en) Trust service connecting method and trust service system based on platform identity
CN101540755B (en) Method, system and device for recovering data
CN102355467B (en) Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission
CN106899561B (en) TNC (network node controller) authority control method and system based on ACL (Access control List)
CN102045310B (en) Industrial Internet intrusion detection as well as defense method and device
CN103069767A (en) Consigning authentication method
CN102972005A (en) Consigning authentication method
Tsow Phishing with Consumer Electronics-Malicious Home Routers.
CN204697072U (en) A kind of secure accessing managing and control system of network end nodes
CN103067343B (en) Prevent from distorting the method and system of usage of ActiveX control
AlZomai et al. Strengthening sms-based authentication through usability
CN101394394A (en) Centralized authentication access mode for cipher server
KR101997181B1 (en) Apparatus for managing domain name servide and method thereof
CN101562620B (en) Method of terminal exchange access and control device thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Network access control method for comprehensive safety management of inner network

Effective date of registration: 20161118

Granted publication date: 20120418

Pledgee: CITIC Bank Limited by Share Ltd. Fuzhou branch

Pledgor: FUJIAN ETIM INFORMATION & TECHNOLOGY Co.,Ltd.

Registration number: 2016350000134

PLDC Enforcement, change and cancellation of contracts on pledge of patent right or utility model
PP01 Preservation of patent right

Effective date of registration: 20220816

Granted publication date: 20120418

PP01 Preservation of patent right