Background technology
Be accompanied by the fast development of network application technology, network information security problem also becomes increasingly conspicuous.Safe, the prevention that guarantee user terminal threaten the invasion network, user's access to netwoks behavior controlled effectively, and be the prerequisite that guarantees the enterprise network security operation, also be present enterprise network security is managed urgent problem.
At present, as the important technology and the management means that solve network security problem, the network access authentication technology is also popularized rapidly.Traditional user network access authentication mode mainly contains 802.1x (based on the access-control protocol of port) authentication, PPPoE (point-to-point protocol on the Ethernet) authentication and Portal (door) authentication.Network organizing mode difference, user's authentication mode are also different.802.1x mode and PPP over Ethernet need client usually; Web page logging in network is used in Portal authentication, is subjected to the user and welcomes because it is simple to operate, need not client, is widely used.
PPPoE is incorporated into broadband ethernet from the arrowband net based on ATM (asynchronous transfer mode), be applied to broadband ethernet, must have its limitation, though its mode is more flexible, more rich application experience is arranged, but its packaged type has also caused the variety of problems of broadband ethernet in the arrowband net.In PPPoE authentication, Verification System must be disassembled each bag whether could judge and discern the user legal, in case the user increases or the packet increase, package speed can influence network efficiency; Next a large amount of like this unpacking is separated packet procedures and must be finished by an expensive equipment of powerful in function while, this equipment is exactly traditional BAS (BAS Broadband Access Server), each packet BAS that each user sends must unpack and discern and encapsulate forwarded, implementation efficiency is low, and equipment cost is higher.
Traditional Web/Portal based on http (HTML (Hypertext Markup Language)) or https (Secure Hypertext Transfer Protocol) agreement authenticates the authentication that is based on type of service, do not need to install other client softwares, only need browser just can finish, comparatively convenient with regard to the user.The user is when online, and whether gateway detects initiates http/https requesting users terminal by authentification of user, if not by authentication, then forces to release certification page to user terminal, requires the authentification of user online.This authentication realizes based on IP (Internet Protocol) address of user terminal, the authentication gateway inspection is by the source IP address of gateway http/https protocol massages, if this IP address in the IP address list of authenticated user, does not think that then the terminal use who has this IP address is unverified.
This authentication mode can not be taken precautions against behaviors such as IP address spoofing, MAC (medium access control) address spoofing only by " usemame/password " authenticate user identity, can't realize the user identity binding information such as MAC and access device port that access terminal; And only respond the http/https access request, for non-http/htps visit, then can't force users authenticate; Also can't distinguish the resource that needs controlled access simultaneously at purpose IP address, port.
In order to realize the access control based on subscriber endpoints, the 802.1x agreement need adopt specific client.Its application architecture comprises as shown in Figure 1: client, access device and certificate server.802.1x client be installed on the user terminal usually; Certificate server resides in AAA (charging, the authentication and authorization) center of operator usually.When the user surfs the Net at every turn, initiate ID authentication request by the 802.1x client, access device is by transmitting this authentication request to certificate server, identifying user identity.
When being implemented the 802.1x authentication, network access user require in the network Access Layer or convergence-level switch to support the 1x function, at access interface or converge port and start the 1x authentication.The user is before finishing authentication, and the port of switch is a slave mode, has only the 1x message to be forwarded; After authenticating user identification was finished, controlled ports was opened, and the user is accesses network normally.In a single day the 1x function is activated, and the user can't carry out normal access to netwoks before authentication is passed through.There is following shortcoming in this authentication mode:
(1) needs particular clients, and need carry out necessary configuration, use complicated according to the user network environment;
(2) networking restriction.802.1x authentication need be carried out network insertion control at user access point, has only access-layer switch or the support of BAS equipment usually;
(3) can't carry out access control according to the safe condition access side point that accesses terminal.802.1x authentication mode uses EAP (PPP Extensible Authentication Protocol) protocol massages to carry user authentication information, can only finish authenticating user identification, can't obtain the user terminal safety state information, therefore also just can't control subscriber network access according to the user terminal installment state;
(4) can't carry out authority to access resources distinguishes.
Recently, fast development along with network technology, the demand of network access authentication no longer only has been confined to user's authentication, terminal use for access network, the network manager also wishes user's terminal is carried out the safe condition inspection, the butt joint access customer is according to the identity control of authority that conducts interviews, and state information, the visit behavior of supervisory user online in real time.Existing authentication mode can't satisfy this demand.
Summary of the invention
The purpose of this invention is to provide a kind of access control method, can not carry out the force users authentication to non-http/https protocol access to overcome under the existing web authentication mode, and the 802.1x authentication mode needs particular clients, and the shortcoming that can't carry out access control according to the safe condition access side point that accesses terminal, realize access control simply, safely, guarantee the user identity of access network and the fail safe of terminal subscriber endpoints.
Another object of the present invention provides a kind of network access control system, with the fail safe of control access subscriber endpoints effectively, reduces the system maintenance cost, ensures that network is safe in utilization.
For this reason, the invention provides following technical scheme:
A kind of access control method, by the visit of network access equipment control user terminal to Internet resources, described method comprises:
The user's of the page web authentication online of A, restricted passage door Portal server access rights make it can only visit the limited network resource;
B, user download and install security client by the Web page;
C, when user capture protected network resource, use described security client that user terminal is carried out safety certification;
D, user's free access protected network resource that safety certification is passed through.
Alternatively, described method further comprises:
E, in described safety certification process, user terminal uses described security client that described Portal server is carried out legitimate verification.
Preferably, described step e comprises:
E1, in described security client, preset cryptographic algorithm and encryption key;
E2, when user terminal is received the message of described Portal server, verify the legitimacy of this message by described cryptographic algorithm and encryption key.
Described steps A comprises:
A1, user are during by network access equipment accesses network resource, and network access equipment is checked user's identity state;
A2, to not passing through the user of authentication, force it to carry out authenticating user identification to the authentication Web page that the door Portal server provides;
After A3, authentication are passed through, control described user by access control list ACL and can only visit the limited network resource.
Alternatively, described steps A 2 comprises:
A21, network access equipment are initiated ID authentication request and are obtained subscriber identity information the user of not process authentication;
A22, send the subscriber identity information that obtains to certificate server;
A23, certificate server authenticate described subscriber identity information, and described ACL is carried in transmission in authentication success message.
Alternatively, before described steps A 1, also comprise step:
In described network access equipment, set in advance described ACL.
Described step B comprises:
B1, Portal server provide the security client download function for the user on the web authentication page;
B2, user download and install user terminal by the link that the client downloads function provides with described security client.
Described step C comprises:
C1, user are when the shielded Internet resources of visit, and network access equipment forces to initiate the access authentication of user request;
C2, described security client obtain the safety state information of user terminal, and forwarding it to network access equipment by Portal server, described safety state information comprises mac address information, IP address information, the operating system relevant information of described user terminal at least;
C3, network access equipment send described safety state information to certificate server;
C4, certificate server carry out safety certification according to described safety state information to described user terminal;
After C5, safety certification are passed through,, remove access authority limitation to this user by corresponding user's list item among the network access equipment change ACL.
Preferably, described method also comprises:
When Portal server is received the message of user terminal, use shared unsymmetrical key that described message is carried out legitimate verification.
A kind of network access control system is used to realize comprise not with the access control of the user terminal of 802.1x client: the network access equipment, Portal server and the certificate server that link to each other by network, wherein,
Network access equipment links to each other with user terminal, is used to control the visit of user to the heterogeneous networks resource;
Portal server is used for obtaining user's ID authentication information when user access network, and send it to certificate server by network access equipment, provide the security client link by the Web page to the user simultaneously, obtain the safety state information of user terminal, and send it to certificate server by network access equipment;
Certificate server is used for finishing authentication to user identity according to described user's ID authentication information, and finishes safety certification to user terminal according to the safety state information of described user terminal.
Described Portal server comprises:
Client link port is used for providing the security client link to the user;
Client memory links port with client and links to each other, and is used to store client application.
By above technical scheme provided by the invention as can be seen, the present invention is by merging the web authentication mode mutually with client certificate, authentication is expanded to conventional P ortal, realized under the web authentication mode non-http/https protocol access being carried out the authentication of force users identity, made things convenient for terminal use's use.The present invention has the following advantages:
(1) for only by the user of web authentication online, control its access rights, make the isolated area that it can only the calling party network, thereby guaranteed that user network is not subjected to the threat of dangerous terminal;
(2) by privately owned Portal+ agreement, solved the force users authentication of non-http/https protocol access protected network, make the user such as http, ftp (file transfer protocol (FTP)), telnet (telnet) etc., visit shielded Internet resources by any way;
(3) by downloading security client from the Web page, client safe in utilization is checked the user terminal safe condition, and initiate authentification of user again by security client, realize the strong authentication measure such as MAC binding, access device port binding of authentification of user, guaranteed the user identity of access network and the fail safe of access network terminal;
(4) adopt default asymmetric-key encryption to carry out the message validity checking by communication between client and Portal server, guaranteed the legitimacy of Portal server, thereby guaranteed the identity legitimacy of aaa server indirectly, further guaranteed the safety of network authentication;
(5) by web authentication page distribution security client, simplified the distribution and the deployment of client, and reduced the maintenance cost of system.
Utilize the present invention, can carry out the authentication management of subscriber endpoints access control simpler, effectively, guarantee network security.
Embodiment
Core of the present invention is the advantage of comprehensive conventional P ortal/Web authentication and client certificate, adopts the portal protocol of expansion under the web authentication mode non-http/https protocol access to be carried out the authentication of force users identity.By the user of web authentication online, control its access rights for only, make the isolated area that it can only the calling party network, that is to say the Internet resources that only allow this user capture limited, such as name server, patch server, virus server etc.; Provide the security client download link by the Web page for the user; And user terminal is carried out the safe condition inspection by this security client, in case of necessity, make products such as user terminal and patch server, anti-virus software Central Management Server carry out the safety interaction operation, user terminal is carried out operations such as virus base repairing, patch installation; The non-http/https agreement access of user is forced safety certification, user's free access protected network resource that safety certification is passed through.
In order to guarantee the legitimacy of aaa server, between client and Portal server, adopt default asymmetric-key encryption to carry out the message validity checking during communication.
In order to make those skilled in the art person understand the present invention program better, the present invention is described in further detail below in conjunction with drawings and embodiments.
With reference to Fig. 2, Fig. 2 shows the realization flow of first embodiment of the inventive method, may further comprise the steps:
Step 201: the user's of the page web authentication online of restricted passage door Portal server access rights make it can only visit the limited network resource.
Usually, user terminal need pass through the network access equipment access network, and network access equipment is switch or router.In the present invention, in order to support the user by any way, such as agreements such as http, ftp and telnet, the accesses network resource, need traditional portal protocol to expand, that is to say the employing proprietary protocol, therefore, correspondingly switch or the router as network access equipment also needs to support this agreement.
The present technique field personnel know, the basic process of traditional Portal authentication is: user terminal at first gets access to IP address (also can use static ip address) by DHCP (DHCP) agreement, but the user uses the IP address that gets access to can not climb up Internet (internet), the authentication by before can only visit the specific I P address, this address is the IP address of Portal server normally.Adopt the access device of Portal authentication must possess this ability.Generally can accomplish by the ACL (access control list) that revises access device.
After the user signs in to Portal server, can browse top content, such as free informations such as advertisement, news, the user can also import username and password on webpage simultaneously, they can be passed to Portal server by the Web client application, again by the authentication that realizes the user between Portal server and the NAS (network access server) alternately.
Portal server also can obtain user's IP address outside the username and password that obtains the user, be that index comes identifying user with it.Use the portal protocol direct communication then between Portal server and the NAS, and NAS finishes user's authentication and last line process with the direct communication of Radius (authentication) server.This authentication mode does not need special client software, can reduce the network operation workload, but its application is limited, only responds the http/https access request, and can not solve end points access problem.
Therefore, the present invention is on traditional Portal authentication infrastructure, portal protocol is expanded, make in Portal server and the user terminal reciprocal process, can obtain version information, the mac address information of subscription client, Portal server is forwarded to network access equipment with authentification of user relevant information (client release, user terminal MAC Address, user name, password etc.) with the portal protocol of expanding, and directly finishes authenticating user identification alternately by network access equipment and certificate server.After authentication is passed through, only allow some limited Internet resources of this user capture, such as; resources such as name server, patch server, virus server; like this, can avoid unsafe user terminal that network is exerted an influence, fully guarantee the fail safe of some protected network resources.
Be implemented as follows:
When the user passes through network access equipment accesses network resource, network access equipment is checked user's identity state, to not passing through the user of authentication, force it to carry out authenticating user identification to the web authentication page that Portal server provides, after authentication is passed through, control this user by ACL and can only visit the limited network resource.
The present technique field personnel know, ACL is a kind of access control technology, use the packet filtering technology, on router/switch, read the information in the 3rd layer and the 4th layer of packet header, as source address, destination address, source port, destination interface etc., according to the rule that pre-defines bag is filtered, thereby reach the purpose of access control.Utilize the ACL on the one hand can the resource conservation node, stop the visit of disabled user, limit the access rights that specific user node can possess on the other hand resource node.
Can be in network access equipment pre-configured ACL, this ACL is controlled ACL, its tabulation comprises the IP address or the network segment of limited network resources such as DNS (name server), patch server, virus server, after authenticating user identification passes through, make this user can only visit the listed Internet resources of ACL.
Can also in authentication success message, ACL be sent to network access equipment by certificate server, network access equipment is provided with user's ACL according to the ACL that receives, this ACL is the ACL that connects based on user network, in order to the control user network access authorities, this user's online is controlled by this ACL.
Step 202:Portal server provides the security client download function for the user on the web authentication page.
Security client can be kept on the Portal server, also can be kept on other servers of network, for the user provides download link, the user directly clicks peer link to Portal server on the web authentication page, downloads and install this security client to user terminal.
Step 203: the user downloads and installs user terminal by the link that the client downloads function provides with security client.
Step 204: when user capture protected network resource, client safe in utilization is carried out safety certification to user terminal.
After the client installation; the user is when the shielded Internet resources of visit; network access equipment forces to be directed to Portal server with user terminal; initiate the access authentication of user request by Portal server by client software; after user terminal is received this request; obtain the safety state information of user terminal by its client, comprising: whether the mac address information of user terminal, IP address information, operating system relevant information, terminal use two network interface cards, whether use information such as acting server.Then these information are forwarded to network access equipment by Portal server.User terminal and Portal server carry out when mutual, use the portal protocol of expansion.Network access equipment sends these safety state information to certificate server once more, and certificate server carries out safety certification according to these safety state information to this user terminal, finishes the user identity access authentication of enhancing.After safety certification is passed through, user terminal and certificate server are exchangeed subscriber terminal security status information supplying, comprise virus base definition information, system mend information etc., if desired, safety products such as user terminal and patch server, anti-virus software Central Management Server can also be carried out combined operation, finish the operation such as installation automatically of virus base upgrading, patch.
After certificate server confirmed that the user terminal safe condition is qualified, the informing network access device was revised user's list item corresponding among the ACL, removed the access authority limitation to this user.
Certainly, also can be by the SetPolicy order of Session Control (session control) message in the Radius agreement, send the user access control strategy to network access equipment, network access equipment is the open corresponding access rights of user according to corresponding user's list item among this strategy change ACL.
Step 205: user's free access protected network resource that safety certification is passed through.
Fig. 3 shows the interaction flow between each network equipment in the inventive method implementation procedure:
1. user terminal uses any IP message to carry out access to netwoks by network access equipment;
2. after network access equipment detects unverified IP address, send ID authentication request message to user terminal, the web authentication page that force users to Portal server provides carries out authenticating user identification;
3. user terminal is responded the ID authentication request message that comprises user name and password to Portal server;
4.Portal server sends to network access equipment with user name and the password of receiving;
5. network access equipment will send authentication request to certificate server, comprise the user name and the password of request authentication in this authentication request message;
Can adopt Radius (remote customer dialing authentication system) agreement to carry out communication between network access equipment and the certificate server.The basic functional principle of Radius: the user inserts NAS (network access server), NAS uses the Access-Require packet to submit user profile to the Radius server, comprise relevant informations such as user name, password, wherein user cipher is through md5 encryption, both sides use shared key, and this key is without Internet communication; Radius server is tested to the legitimacy of username and password, also can similarly authenticate NAS; If legal, return the Access-Accept packet to NAS, allow the user to carry out further work, otherwise return the Access-Reject packet, the refusing user's visit; If allow visit, NAS proposes charging request Account-Require to radius server, and radius server response Account-Accept begins user's charging, and the user can carry out the associative operation of oneself simultaneously.Radius server and nas server communicate by UDP (user datagram protocol) agreement, and 1812 ports of Radius server are responsible for authentication, and 1813 ports are responsible for charging work.
6. after the authenticating user identification success, certificate server sends authentication success message to network access equipment;
The 2011-21-26 attribute agency's safe to carry of the Access-Accept message by the Radius protocol definition URL (unified resource identifier), carry ACL information by 11 attributes, this ACL is controlled ACL, and its tabulation comprises the IP address or the network segment information of limited network resource;
7. network access equipment sends authentication success message to user terminal by Portal server;
8. download and install security client in the link that user terminal provides by Portal server;
9. once more user terminal is carried out security authentication process by security client by certificate server;
10. behind the authentication success, certificate server sends the message of changing ACL to network access equipment, can be by the order of the SetPolicy in the Session Control message, and announcement apparatus change user's ACL, releasing is to this user's restriction, and the ACL of this moment is generally not limited;
11. network access equipment sends authentication success message to user terminal.
By above flow process as can be seen, the present invention has realized under the web authentication mode, and non-http/https protocol access is carried out the authentication of force users identity, has solved authentication management, the client distribution problem of subscriber endpoints access control simply, effectively.
The present technique field personnel know, under traditional Portal authentication mode, therefore the legitimacy that the user can't the authentication verification server also just exists certain influence to user security.Because Portal service permission client and Portal server are directly mutual, therefore in the present invention, by in client, pre-seting cryptographic algorithm and encryption key, finish the checking of client to Portal server, the alternative client of the legitimate verification of Portal server identity is directly carried out authentication to certificate server, thereby can guarantee the legitimacy of certificate server, avoid the certificate server spoofing attack.
With reference to Fig. 4, Fig. 4 shows the realization flow of the inventive method second embodiment, may further comprise the steps:
Step 401: the user's of the page web authentication online of restricted passage door Portal server access rights make it can only visit the limited network resource.
Step 402:Portal server provides the security client download function for the user on the web authentication page.
Step 403: the user downloads and installs user terminal by the link that Portal server provides with security client, and whether default unsymmetrical key in this client is used for the message of the Portal server that receives is decrypted, legal to verify this message.
Step 404: user terminal client safe in utilization is carried out legitimate verification to Portal server.The message that Portal server sent uses default encrypted private key to generate the checking summary, and security client uses default PKI to realize the checking of message digest, if be proved to be successful, thinks that then Portal server is credible.
Step 405: when user capture protected network resource, client safe in utilization is carried out safety certification to user terminal.Can be mutual with safe client by Security Policy Server, check the user terminal safe condition, and determine user network access authorities according to security state of terminal.
Step 406: user's free access protected network resource that safety certification is passed through.
In this embodiment, use the pre-unsymmetrical key of sharing between client and the Portal server, realized the legitimate verification of communication packet, guaranteed Portal server identity safety, thereby guaranteed the legitimacy of certificate server identity.
Fig. 5 shows the networking schematic diagram of system of the present invention:
This system is used for not with the access control of the user terminal of 802.1x client.Wherein, network access equipment 51, Portal server 52 and certificate server 53 link to each other by network, and user terminal 50 links to each other with the net access device.
Portal server and network access equipment are all supported the portal protocol expanded.
In order to support to provide the client downloads function to the user, Portal server also provides: client link port 521 and client memory 522.Wherein, client link port 521 is used for providing the security client link to the user; Client memory 522 links port with client and links to each other, and is used to store client application.
Network access equipment can be switch or router, and certificate server can use common aaa server.
When the user when the network access equipment accesses network resource, network access equipment is checked user's identity state, to not passing through the user of authentication, forces it to carry out authenticating user identification to the web authentication page that Portal server provides; After Portal server obtains user's ID authentication information, subscriber identity information is sent to certificate server, finish authentication the user by certificate server by network access server.
After authentication was passed through, certificate server informing network access device is controlled this user can only visit the limited network resource, i.e. resource in the isolated area 54 is such as resources such as patch server, virus servers.
At the authentication Web page, Portal server provides the security client download function by client link port 521 to the user, and the user downloads and is installed on the local terminal by the security client that client link port 521 will be stored in the client memory 522.
After the client installation; the user is when the shielded Internet resources of visit; network access equipment forces to initiate the access authentication of user request by security client; after user terminal is received this request; obtain the safety state information of user terminal by its client, comprising: whether the mac address information of user terminal, terminal use two network interface cards, whether use information such as acting server.Then these information are forwarded to network access equipment by Portal server.User terminal and Portal server carry out when mutual, can use the portal protocol of expansion.Network access equipment sends these safety state information to certificate server once more, and certificate server carries out safety certification according to these safety state information to this user terminal, finishes the user identity access authentication of enhancing.
After certificate server confirmed that the user terminal safe condition is qualified, the informing network access device was removed the access authority limitation to this user, makes this user can visit shielded Internet resources.
Though described the present invention by embodiment, those of ordinary skills know, the present invention has many distortion and variation and do not break away from spirit of the present invention, wish that appended claim comprises these distortion and variation and do not break away from spirit of the present invention.