当前位置:网站首页>Brief description of 802.1x Protocol
Brief description of 802.1x Protocol
2022-06-29 01:14:00 【PolarDay.】
802.1x Brief description of the agreement
Reprint an article : Article to read 802.1x agreement
Protocol Brief
802.1x The protocol is based on C/S Access to structure 「 Control agreement 」, Working at the data link layer , That is, layer 2 protocol .
- 「C/S structure 」:server/client For short , It is divided into two layers: server and client , The server is responsible for data management , The client is responsible for user interaction
- 「 Access control 」: A technique for controlling access rights , Specify who can access who , Who can't access who
- 「 agreement 」: Short for network protocol , It's essentially a series of rules , For example, how to establish a connection between two computers , How to identify each other , All need to abide by certain rules . Because the network environment is quite responsible , Therefore, the whole network is divided into seven parts , That's what we often say 0SI Seven layer model , Each layer has a corresponding protocol , When the protocol of a layer changes , It will not affect the protocols of other layers
802.1x The role of the agreement
Restrictions without 「 to grant authorization 」 Users of / The device accesses through the access port LAN/WLAN, To ensure the security of the network
- 「 port 」: The outlet for communication between the equipment and the outside world , It is divided into virtual port and physical port , Virtual ports are invisible ports , Like the computer's 21,23,80 port ; Physical ports are also called interfaces , Is a visible port , Such as computer / Telephone network cable interface
- 「LAN」: LAN , That is to connect computers through network cables , Form a local network range , Computers in range can communicate with each other
- 「WLAN」:Wireless Local Area Network For short , That is, WLAN , Use wireless communication technology instead of network cable to connect computers
Logical port
IEEE 802.1Xx The protocol divides ports into 「 Controllable port 」 and 「 Uncontrollable port 」, The switch uses uncontrollable ports to complete user authentication and control , Service messages are exchanged through controllable ports , So as to realize the separation of business and authentication
802.1x Protocol authentication principle
- The user enters the user name and password , Initiate connection request , The client program sends a message requesting authentication to the switch , Open authentication
- After the switch receives the data frame requesting authentication , A request frame will be issued asking the client to send the user name entered by the user
- The client program responds to the request of the switch , Send a data frame containing the user name to the switch , After receiving the data frame, the switch will packet it and send it to the authentication server for processing
- After the authentication server receives the user name sent by the switch , Query the database for matching , After successful matching, find the password corresponding to the user name , Encrypt it with randomly generated encrypted words , Send the encrypted word to the switch , The switch then transmits the encrypted word to the client program
- The client program uses the received encrypted word to encrypt the password entered by the user , And send the encrypted password to the switch , Sent by the switch to the authentication server
- The authentication server compares the received passwords , If it is the same, it is an authorized user , Return the authentication information , And send the command to open the port to the switch , Allow users to access the network through ports ; Otherwise, it is an unauthorized user , Only authentication information data is allowed to pass, but business data is not allowed to pass
边栏推荐
- 企业和IT领导者对创新的误解
- The function of Schottky diode in preventing reverse connection of power supply
- UI highly adaptive modification scheme
- What is the difference between the history and Western blotting
- [eight part essay] MySQL
- To the interface problems we have encountered
- 最新Justnews主题源码6.0.1开心版+社交问答插件2.3.1+附教程
- EasyCVR新建用户后,视频调阅页面不能点击的问题修复
- XML and other file contents in idea cannot be highlighted, and the file becomes gray
- Notes on the infrastructure of large websites
猜你喜欢

Cocoscrreator dynamically switches skeletondata to update bones

Seven mistakes in IT Governance and how to avoid them
![User login (remember the user) & user registration (verification code) [using cookie session technology]](/img/31/c84c1e15aa1c73814c4ad643e3dd36.png)
User login (remember the user) & user registration (verification code) [using cookie session technology]

FSS object storage how to access the Intranet
![[staff] pedal mark (step on pedal ped mark | release pedal * mark | corresponding pedal command in MIDI | continuous control signal | switch control signal)](/img/2b/e358b22d62ce6d683ed93418ff39fe.jpg)
[staff] pedal mark (step on pedal ped mark | release pedal * mark | corresponding pedal command in MIDI | continuous control signal | switch control signal)

Check the open source projects of yyds in June!

Mask wearing face data set and mask wearing face generation method

Difference between applying for trademark in the name of individual and company

Breadth first search to catch cattle
![[image processing] image curve adjustment system based on MATLAB](/img/9c/176473a0083f075e54a45fbb4ed6ea.png)
[image processing] image curve adjustment system based on MATLAB
随机推荐
一条update语句到底加了多少锁?带你深入理解底层原理
流媒体集群应用与配置:如何在一台服务器部署多个EasyCVR?
Qt est basé sur le système de gestion RFID (peut être appliqué à la plupart des systèmes de gestion RFID)
3D, point cloud splicing
[js practice every m days] JS export object analysis based on libcef application (steam)
Redis common command manual
Uvm:factory mechanism
XML and other file contents in idea cannot be highlighted, and the file becomes gray
Hello i am back
Do280 allocating persistent storage
成功解决(机器学习分割数据问题):ModuleNotFoundError: No module named ‘sklearn.cross_validation‘
[temperature detection] thermal infrared image temperature detection system based on Matlab GUI [including Matlab source code 1920]
2022年启牛商学院证券账户开户安全的嘛?
立创eda学习笔记:铺铜死区?孤岛?死铜?
[RRT 3D path planning] rapid expansion of random tree UAV 3D path planning based on MATLAB [including Matlab source code phase 1914]
Hello i am back
The function of Schottky diode in preventing reverse connection of power supply
Is Huatai Securities safe
使用.Net驱动Jetson Nano的OLED显示屏
How to handle a SIGTERM - how to handle a SIGTERM