首页> 外文会议>International Conference on Computational Aspects of Social Networks >Application of Trusted Boundary Based on Port Trust Value in Campus Area Network
【24h】

Application of Trusted Boundary Based on Port Trust Value in Campus Area Network

机译:基于端口信任值的可信边界在园区网中的应用

获取原文

摘要

In this paper, the technology of trusted boundary based on port trust value is discussed. When IP phones are connected to the existing switch-based campus area network, PC is connected to the access port of IP phone. To avoid IP phone is disconnected from the network and PC is directly into the switch port, trusted boundary based on port trust value is applied. In an IP PBX, trusted mode or untrusted mode are supported by IP phone, which is trusted and untrusted. The final run-time port trust on any port is dependent on five decisive factors: Quality of Service, Common Open Policy Service, trust-device type, Cisco Discovery Protocol and phone's presence on the port. In a typical campus area network with IP phones, trusted boundary based on port trust value is configured. Trusted boundary can ensure the security of the port to which IP phone is connected.
机译:本文讨论了基于端口信任值的信任边界技术。将IP电话连接到现有的基于交换机的园区网络时,PC将连接到IP电话的访问端口。为避免IP电话与网络断开连接且PC直接进入交换机端口,将应用基于端口信任值的可信边界。在IP PBX中,受信任和不受信任的IP电话支持受信任模式或不受信任模式。任何端口上的最终运行时端口信任取决于五个决定性因素:服务质量,通用开放策略服务,信任设备类型,Cisco发现协议和电话在端口上的状态。在具有IP电话的典型园区网络中,将配置基于端口信任值的信任边界。可信边界可以确保IP电话所连接端口的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号