摘要 |
<p>A peer-to-peer access control method based on ports, includes the steps: 1) activate the authentication control entities; 2) two authentication control entities authenticate each other; 3) configure the state of the controlled ports. This method can further include that activate the authentication server entities, two authentication subsystems perform key negotiation and other steps. By means of changing the non peer-to-peer of background arts, the present invention has the advantages that peer-to-peer control, the authentication control entities have distinguishability, excellent expandability and security, the simple key negotiation, the system is relatively integral and high flexibility, which can satisfy the require of concentrated management, also can solve the technology problems of the known network access control methods that the complex process, bad expandability and security, and ensure that safely access the network.</p> |