DocumentCode :
3105583
Title :
Application of Trusted Boundary Based on Port Trust Value in Campus Area Network
Author :
Jiang, Ning ; Shan, Liancheng ; Zhu, Hongfeng ; Yu, Jian
Author_Institution :
Coll. of Educ. Technol., Shenyang Normal Univ., Shenyang, China
fYear :
2010
fDate :
26-28 Sept. 2010
Firstpage :
97
Lastpage :
100
Abstract :
In this paper, the technology of trusted boundary based on port trust value is discussed. When IP phones are connected to the existing switch-based campus area network, PC is connected to the access port of IP phone. To avoid IP phone is disconnected from the network and PC is directly into the switch port, trusted boundary based on port trust value is applied. In an IP PBX, trusted mode or untrusted mode are supported by IP phone, which is trusted and untrusted. The final run-time port trust on any port is dependent on five decisive factors: Quality of Service, Common Open Policy Service, trust-device type, Cisco Discovery Protocol and phone´s presence on the port. In a typical campus area network with IP phones, trusted boundary based on port trust value is configured. Trusted boundary can ensure the security of the port to which IP phone is connected.
Keywords :
Internet telephony; computer network security; protocols; Cisco discovery protocol; IP PBX; IP phones; campus area network; common open policy service; port trust value; switch based campus area network; trust device type; trusted boundary; IP networks; Lifting equipment; Protocols; Quality of service; Security; Servers; Switches; QoS; VoIP; network security; trusted boundary;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Aspects of Social Networks (CASoN), 2010 International Conference on
Conference_Location :
Taiyuan
Print_ISBN :
978-1-4244-8785-1
Type :
conf
DOI :
10.1109/CASoN.2010.29
Filename :
5636798
Link To Document :
بازگشت