The present invention relates to a gateway suitably used to control access from, for example, a terminal having a Web browser to a Web server, a network system and a method of controlling access to the server.
Conventionally, accessing a dedicated Web server which includes charged sites and dedicated sites from a private network constructed in a home via a gateway requires access control such that access is restricted according to a user's right to access or the like.
Currently, a method of providing an account for each user, setting a right for each account and controlling access according to the right constitutes a mainstream of control over access to a Web server (e.g., see Patent Document 1). Such access control is realized by providing an application program in the Web server with a function to perform access control according to the user right.
Here, an example of conventional access control of Web server will be explained with reference to
When terminal 12 of private network 10 accesses dedicated Web server 21-1 or 21-2, the user inputs the domain name of dedicated Web server 21-1 or 21-2 to the Web browser of terminal 12 first. That is, when accessing a Web server on the Internet, it is necessary to specify the IP address of the Web server and then access it, but since the IP address is a string of numbers which is difficult for people to understand, a domain name is generally used which is easy for people to understand. The domain name is associated with the IP address of the server device and managed by a DNS (Domain Name System) server 32.
When the user inputs a domain name to the Web browser of terminal 12, the Web browser inquires of DNS server (IP address: yyy.yyy.yyy.aaa) 32 set in terminal 12 beforehand about the IP address which corresponds to the domain name (hereinafter, this will be referred to as “DNS resolution”) . DNS server 32 which has received the DNS resolution searches the corresponding IP address through recursive search and sends back the IP address (suppose, for example, xxx.xxx.xxx.2) to the Web browser of terminal 12 which is the access source. The Web browser of terminal 12 which has received the IP address sends out a display request of a Web page to the server device (dedicated Web server 21-1 in this case) at IP address (xxx.xxx.xxx.2).
Dedicated Web server 21-1 which has received the display request reports to terminal 12 that authentication is required. More specifically, dedicated Web server 21-1 shows a display prompting input of a user identification number (user ID) and a password on the Web browser of terminal 12. When the user inputs the user ID and password, the information input is sent to dedicated Web server 21-1. In dedicated Web server 21-1, access right is set in association with the user ID and the password and dedicated Web server 21-1 judges whether user ID and the password sent from terminal 12 have an access right or not and thereby judges whether or not to authorize the access. Dedicated Web server 21-1 transmits the content to terminal 12 only when the user is authorized to access dedicated Web server 21-1 is authorized and causes the Web browser of terminal 12 to display the content.
However, according to the conventional method of controlling access to a Web server, an access right of a user is set for each Web server, and therefore such a setting is complicated. Furthermore, for every access to the Web server, the Web server authenticates the user and judges whether or not to authorize access to the Web server, which involves a problem that access control becomes complicated.
It is an object of the present invention to provide a gateway, network system and method of controlling access to a server capable of realizing easy access control without requiring any complicated setting of user access right to each server (e.g., Web server) or the like and without requiring user authentication for every access to each server (e.g., Web server).
When a dedicated DNS server for managing domain names in a private network is arranged and a gateway arranged between the dedicated DNS server and a terminal sets an IP address in the terminal, depending on whether the terminal is authenticated or not by an authentication server, the gateway sets an address of the dedicated DNS server only in the authenticated terminal and in this way the dedicated DNS server performs a DNS resolution on the authenticated terminal.
According to the present invention, only a terminal authenticated by the authentication server can access the dedicated server by reporting the dedicated DNS server address depending on whether the terminal is authenticated or not. As a result, it is possible to realize control of access to the server (e.g., Web server) without requiring any complicated setting of user access right or the like for each server (e.g., Web server).
Hereinafter, embodiments of the present invention will be explained in detail with reference to the attached drawings.
As shown in
During a DNS resolution from each terminal 12, inquiries about IP addresses from DNS server 32 in IP public network 30 to dedicated DNS server 52 in dedicated network 50 are prohibited. For terminal 12 authenticated by authentication server 53 in dedicated network 50, dedicated DNS server 52 is set as a DNS server and for terminal 12 not authenticated, DNS server 32 in public network 30 is set as a DNS server.
A method of setting a DNS server address for terminal 12 based on the status of authentication will be explained below.
User authentication processing section 403 processes an authentication frame from the user used in IEEE.802.1x authentication and an authentication frame from authentication server 53. Furthermore, user authentication processing section 403 also maintains information as to whether terminal 12 succeeded or failed in the authentication for each terminal 12 and reports this information to terminal management section 406. According to IEEE802.1x, when a communication is started, authentication is performed between terminal 12 and authentication server 53 using EAP (Extensible Authentication Protocol) prescribed in RFC2284. EAP includes EAP-MD5 whereby authentication is performed using a password only on the user side, EAP-TLS whereby mutual authentication is performed between an authentication server and a client using an electronic certificate and EAP-PEAP/EAP-TTLS whereby mutual authentication is performed using an electronic certificate for the authentication server and ID/password for the client or the like. IEEE802.1x was standardized as a wired LAN specification but it is currently used mainly as a wireless LAN authentication specification.
DHCP processing section 404 processes a DHCP message received from terminal 12 and reports the IP address, subnet mask, DNS server address, effective period of the IP address, default gateway address or the like set at address setting section 405 to terminal 12 using the DHCP message.
Address setting section 405 selects an IP address and a DNS server address to be set in terminal 12 based on the authentication status information of terminal 12 and reports those addresses to DHCP processing section 404. Information on the range of allocatable addresses, subnet mask, address of the DNS server or the like are set in address setting section 405 when the gateway is started.
Terminal management section 406 manages the MAC (Media Access Control Address) address of terminal 12, IP address and authentication status information using a terminal management table shown in
Here, the method of setting the DNS server address of terminal 12 at gateway 40 will be explained using a sequence shown in
When terminal 12 is connected to gateway 40, authentication processing of IEEE802.1x is performed between terminal 12 and gateway 40 and between gateway 40 and authentication server 53 ((1) in
Next, terminal management section 406 registers the MAC address and authentication status information in the terminal management table shown in
Here, the address setting processing by address setting section 405 will be explained using an address setting processing flow chart in
Address setting section 405 acquires the authentication status information of the MAC address with reference to the terminal management table at terminal management section 406 (step S700). Address setting section 405 then selects a candidate of the IP address to be assigned to terminal 12 from the range of IP addresses that can be assigned (step S701).
Next, address setting section 405 judges the authentication status of terminal 12 based on the acquired authentication status information (step S702) and when terminal 12 has been authenticated, address setting section 405 selects the IP address of dedicated DNS server 52 in dedicated network 50 as the DNS server address to be set in terminal 12 (step S703) and when terminal 12 has not been authenticated, address setting section 405 selects the IP address of DNS server 32 in IP public network 30 (step S704) ((4) in
After the above described processing, DHCP processing section 404 sets the candidate of the IP address of the client, the IP address of gateway 40 or the like in DHCPOFFER which is a response message of DHCPDISCOVER based on the address setting response and sets the IP address of the selected DNS server, subnet mask, default gateway address, lease period of the IP address or the like in the option area. Gateway 40 broadcasts DHCPOFFER in which the information is set. The terminal 12 which has received DHCPOFFER broadcasts DHCPREQUEST and requests an IP address. In response to this, gateway 40 checks whether or not other terminal 12 is using the requested IP address and when other terminal 12 is not using the requested IP address, gateway 40 broadcasts DHCPACK ((5) in
When terminal 12 receives DHCPACK, terminal 12 sets the IP address specified by DHCPACK, and when receiving DHCPNACK, terminal 12 transmits DHCPDISCOVER once again and acquires an IP address. Upon broadcasting DHCPACK, DHCP processing section 404 reports the IP address set to terminal management section 406 and registers it in the terminal management table ((6) in
In this way, according to this embodiment, gateway 40 is provided with terminal management section 406 that manages authentication status information indicating whether or not terminal 12 has been authenticated by authentication server 53 and address setting section 405 that selects any one of the address of dedicated DNS server 52 that manages the domain names of dedicated Web servers 51-1, 51-2 which only a terminal authenticated by authentication server 53 is able to access, and the address of DNS server 32 that manages the domain names of Web servers 31-1, 31-2 which terminal 52 that has not been authenticated by authentication server 53 according to authentication status information is able to access and sets it as the DNS server address, and automatically sets a DNS server (32 or 52) to be used by terminal 12 for a DNS resolution according to the authentication status of terminal 12. This allows authenticated terminal 12 to use dedicated DNS server 52 to acquire IP addresses of dedicated Web servers 51-1, 51-2 from the domain names of dedicated Web servers 51-1, 51-2, but unauthenticated terminal 12 does not use dedicated DNS server 52 and therefore cannot acquire the IP addresses of dedicated Web servers 51-1, 51-2 from the domain names of dedicated Web servers 51-1, 51-2. Therefore, unauthenticated terminal 12 cannot access dedicated Web servers 51-1, 51-2 in dedicated network 50.
Thus, it is possible to realize easy access control without requiring any complicated setting of a user access right to dedicated Web servers 51-1, 51-2 or the like and without the necessity for user authentication in dedicated network 50 for every access to dedicated Web servers 51-2, 51-2.
As shown in
In this embodiment, during a DNS resolution from terminal 12, inquiries about the IP address from DNS server 32 to dedicated DNS server 52 are prohibited. For terminal 12 authenticated by authentication server 53, dedicated DNS server 52 is set as the DNS server, whereas for unauthenticated terminal 12, DNS server 32 is set as the DNS server. The DNS server address is set based on an authentication status using DHCP as in the case of above described Embodiment 1. Furthermore, the functional block diagram of gateway 40 is also the same as that in Embodiment 1. DNS server 32 and Web server 31 in this embodiment may also be arranged in IP public network 30 outside dedicated network 60 as in the case of Embodiment 1.
According to this embodiment in this way, unauthenticated terminal 12 cannot access dedicated Web server 51 as in the case of above described Embodiment 1. Furthermore, when different IP addresses are registered in DNS server 32 and dedicated DNS server 52 under the same domain name, in a case where authenticated or unauthenticated terminal 12 accesses under the same domain name, viewing of a content may be allowed according to the authentication status of terminal 12, which is suitable. In this case, it naturally goes without saying that the contents are different when authenticated and when not authenticated. This allows contents of different qualities to be viewed under one domain name according to the authentication status of the terminal.
In the above described embodiments, dedicated DNS server 52 is arranged in dedicated networks 50, 60, but since it is only necessary to manage the domain names of dedicated Web servers 51-1, 51-2 and 51, dedicated DNS server 52 need not always be arranged in dedicated networks 50, 60 and dedicated DNS server 52 maybe arranged, for example, in IP public network 30.
Furthermore, the above described embodiments have the case where layer 2 authentication is performed as an example, but authentication of terminal 12 needs only to be performed before an automatic address setting by DHCP, and therefore layer 2 authentication is not always required.
Furthermore, the above described embodiments have explained the Web server as an example of the server accessed after a DNS resolution is realized, but the server is not always limited to the Web server if it is at least a server accessed after a DNS resolution is realized.
Furthermore, the above described embodiments have explained the case where one dedicated DNS server 52 and one DNS server 32 are provided, but the present invention is also applicable to a case where two or more dedicated DNS servers and DNS servers are provided respectively.
One aspect of the gateway of the present invention adopts a configuration having: a terminal management section that manages authentication status information indicating whether or not a terminal is authenticated by an authentication server; and an address setting section that selects one of an address of a dedicated domain name system server, the dedicated domain name system server managing a domain name of a dedicated server only a terminal authenticated by the authentication server is allowed to access, and an address of a domain name system server, the domain name system server managing a domain name of a server a terminal not authenticated by the authentication server is allowed to access, according to the authentication status information, and sets the selected address as the domain name system server address for the terminal.
Another aspect of the gateway of the present invention adopts a configuration in which the address setting section sets the address of the dedicated domain name system server for the terminal authenticated by the authentication server and sets the address of the domain name system server for the terminal not authenticated by the authentication server on the other.
An aspect of the network system of the present invention adopts a configuration having: a dedicated domain name system server that is provided in a dedicated network where a dedicated server having a pay site or a dedicated site exists and that manages a domain name of a dedicated server provided in the dedicated network; an authentication server that performs authentication of a terminal upon access to the dedicated server; and a gateway that is provided between the dedicated network and the terminal and that sets the address of the dedicated domain name system server only for a terminal authenticated by the authentication server as a domain name system server address of the terminal.
An aspect of the method of controlling access to a server of the present invention includes: a step by an authentication server of authenticating access to a dedicated server of a terminal; a step of setting an address of a dedicated domain name system server that manages a domain name of the dedicated server for only an authenticated terminal as a domain name system server address of the terminal; and a step by a terminal that accesses the dedicated domain name system server of acquiring an address for accessing the dedicated server from the dedicated domain name system server and accessing the dedicated server.
According to these configurations and method, the dedicated DNS server or DNS server is selectively set as the DNS server address of the terminal according to an authentication status of the terminal, and therefore only the terminal authenticated by the authentication server can obtain an IP address to access the dedicated server in the dedicated network through the dedicated DNS server and access the dedicated server. As a result, it is no longer necessary to make any complicated setting such as a user access right for each dedicated server and it is possible to realize easy access control. In addition, the IP address to access the dedicated server is obtained through the dedicated DNS server, and therefore it is possible to realize easy access control without the need for user authentication for every access to each dedicated server.
The present application is based on Japanese Patent Application No. 2004-369693 filed on Dec. 21, 2004, the entire content of which is expressly incorporated by reference herein.
The present invention is suitably used to control access to a Web server from a terminal having a Web browser.
Number | Date | Country | Kind |
---|---|---|---|
2004-369693 | Dec 2004 | JP | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/JP05/23314 | 12/20/2005 | WO | 00 | 6/19/2007 |