1. Field of the Invention
The present invention relates to a system and a method for changing a virtual local area network (VLAN) to which a computer belongs.
2. Description of the Related Art
In recent years, a problem of computer viruses (hereinafter referred to as “viruses”) has been becoming serious. Many computers have become capable of obtaining data easily from other computers via a network so that infection routes of viruses have expanded, and this is the main reason of the problem. In addition, a defect called a “security hole” of an operating system or a Web browser concerning securities can be another reason of the problem.
Therefore, antivirus software is used widely. This software can remove a virus and prevent infection when the virus has been downloaded to a computer. In addition, a software company distributes a virus definition file to users of the software for dealing with newly discovered viruses.
Companies that provide an operating system or a Web browser are trying to distribute a patch file to users for correcting a security hole promptly upon finding it.
In the case of computers that are used in an office of a government or a company, it is necessary to take measures more effectively for maintaining citizens' or customers' confidence. Many computers may be used in an office, and only one of them may affect other computers if it has a problem of security.
Therefore, a network system called a “quarantine network” is proposed as described in a first document “What is a quarantine network”, N+0 NETWORK Guide, September, 2004, pp. 26-35, Softbank Publishing Company, Sep. 1, 2004, Atsuo Masaki. According to this quarantine network, it is checked whether or not a latest virus definition file or a latest patch file is installed correctly in each computer in an office, for example. Then, if there is found a computer in which the latest virus definition file or the latest patch file is not installed, a necessary file or the like is distributed to the computer so as to remove the problem of security.
If a computer with a problem is found, it is desirable to isolate the computer promptly because the computer may affect other computers as described above.
Therefore, a method for isolating a computer using a dynamic host configuration protocol (DHCP) is proposed as described in a second document “Four methods and forms of quarantine networks”, N+I NETWORK Guide, September, 2004, pp. 36-45, Softbank Publishing Company, Sep. 1, 2004, Takaya Sato, Ken Takahashi, Kouji Nishimura, Yoshitugu Kuroda. According to this method, it is possible to use an existing network environment and to isolate a computer having a problem from a normal business VLAN to a VLAN for isolation. Then, the problem of the computer can be solved by installing a latest virus definition file or the like in the computer on the VLAN for isolation.
When the DHCP method described in the second document is used, and even when an authentication switch method or an IEEE 802.1X method is used, it is necessary to set the computer to accept an IP address that is assigned temporarily by the DHCP as long as the method adopts isolation of the computer from a normal VLAN to another VLAN. Therefore, it is difficult for the DHCP method to isolate a computer that is given a fixed or static IP address.
However, the method of controlling computers by assigning a static IP address to each of them is used very often. In addition, if the computer is a host computer or a server that provides information or services to other computers, the DHCP method is not used ordinarily because the IP address should be fixed.
An object of the present invention is to provide a method and a system that can isolate a computer from a normal VLAN to another VLAN when a static IP address is assigned to the computer.
An IP address assigning method according to the present invention is used for assigning to a computer a second IP address instead of a first IP address that is assigned to the computer statically in advance. The IP address assigning method includes the following steps. In order to assign the second IP address to the computer, the second IP address is assigned to the computer by notifying the same before the computer starts communication at the layer 3, a storage portion is made to store the second IP address and the first IP address of the computer in association with each other and the computer is controlled to start the communication at the layer 3 under conditions where the second IP address is used as an IP address of the computer itself. In order to return the IP address of the computer to the first IP address, the computer is controlled to reset a network connection, the computer is notified of the first IP address that corresponds to the second IP address that is assigned to the computer before the computer starts the communication at the layer 3, and the computer is controlled to start the communication at the layer 3 under conditions where the notified first IP address is used as an IP address of the computer itself.
According to the IP address assigning method, another IP address can be assigned to a computer to which an IP address is assigned statically. Therefore, the IP address assigning method can be used preferably for changing a VLAN to which the computer belongs.
Alternatively, a device as described below may be used for changing a VLAN. A VLAN changing device performs a process for changing a VLAN to which a computer belongs from a first VLAN to a second VLAN. The computer is assigned a first IP address statically in advance that is an IP address of the first VLAN. The VLAN changing device includes a first reception portion for receiving first data that the computer has transmitted to other computers, a sender rewriting portion for rewriting sender information that is added to the received first data so as to indicate that a second IP address that is an IP address of the second VLAN is an IP address of a sender of the first data, a first transferring portion for transferring the first data to which the rewritten sender information is added so that a destination computer can receive the first data, an IP address association storing portion for storing an IP address before rewriting the sender information and an IP address after rewriting the same in association with each other, a second reception portion for receiving second data transmitted by another computer, a destination rewriting portion for rewriting destination information so as to indicate that the first IP address corresponding to the second IP address is a destination of the second data if the second IP address is indicated in the destination information that is added to the received second data, and a second transferring portion for transferring the second data to which the rewritten destination information is added so that a device of the destination can receive the second data.
According to the present invention, a computer to which an IP address is assigned statically can be isolated from a normal VLAN to another VLAN. According to one embodiment of the present invention, even if an IP address is assigned statically, a computer having a problem can be isolated to a VLAN for isolation so as to make the computer comply with a security policy securely.
a) and 12(b) are diagrams showing an example of ARP response information.
a) and 13(b) are diagrams showing an example of a translation process of an IP address.
Hereinafter, the present invention will be explained more in detail with reference to embodiments and drawings.
As shown in
The wireless LAN access points 21 and switch 22 are LAN switches for switching in accordance with a MAC address on a layer 2 (a data link layer). However, the wireless LAN access points 21 communicate with the terminal devices TR that have wireless LAN cards, and the switch 22 communicates with the terminal devices TR via cables.
Each of the wireless LAN access points 21 and the switches 22 is equipped with a known network access authentication function. According to this function, a plurality of virtual LANs (hereinafter referred to as a “virtual LAN” or a “VLAN”) can be formed in the quarantine network system KNS, and each of the servers and the terminal devices TR can belong to one of the VLANs. Hereinafter the wireless LAN access point 21 or the switch 22 having this function is generally called a “switch with authentication function 2”.
The switch 23 is a LAN switch for switching in accordance with a MAC address on the layer 2 similarly to the switch 22, but it does not necessarily have the network access authentication function.
It is supposed in this embodiment that there are formed five VLANs including a VLAN-A to which a device for performing a process concerning the quarantine mainly belongs, a VLAN-B to which a device for performing an authentication process or the like at start of access of the terminal device TR mainly belongs, a VLAN-C to which a device such a server for commercial use mainly belongs, a VLAN-D to which a terminal device for commercial use or the like mainly belongs, and a VLAN-E for isolating a device that does not comply with a policy that will be described later.
The policy management server 10, the virus management server 11, the patch management server 12 and the assets management server 13 belong to the VLAN-A. The RADIUS server 17, the LDAP server 18, and the DHCP server 19 belong to the VLAN-B. The commercial server 15 belongs to the VLAN-C, and the terminal devices TR belong to the VLAN-D. Each of the wireless LAN access points 21, the switches 22 and 23, the server and the terminal devices TR is set appropriately so as to belong to the corresponding VLAN. For example, the terminal device TR is set to have one of IP addresses assigned to the VLAN-D, a sub net mask and a default gateway. It is supposed in this embodiment that one of available IP addresses is not lent to the terminal device TR every time like a DHCP method but a predetermined IP address is assigned statically to it. Hereinafter, the IP address that is statically assigned to the terminal device TR is referred to as a “static IP address”.
Moreover, the switch with authentication function 2 is equipped with a table management portion 201, an IP address translation process portion 202, an ARP process portion 203, an IP translation table TL1 and the like as shown in
The router 30 is a device (a router or a switch) for routing by the IP addresses on the layer 3 (a network layer). The router 30 of this embodiment is set to have routing permissible information RTJ that indicates relationship to available virtual LANs as shown in
Each of the servers 10-13 including the policy management server 10 and the assets management server 13 performs a process for quarantining each of the terminal devices TR or the servers that are provided to the quarantine network system KNS. Hereinafter, a case will be described where the terminal device TR is quarantined.
The policy management server 10 performs a process for managing several states that include an installation state of a virus definition file or the like as an application program for countermeasure against a computer virus (hereinafter referred to as a “virus” simply) in the terminal device TR, an installation state of a patch file or the like for fixing bugs, removing security holes or improving functions in an operating system (OS), and an installation state of business application programs. In other words, it is checked whether or not the terminal device TR conforms to requirements of security (i.e., a security policy) prescribed in this quarantine network system KNS and whether or not application programs that are necessary for jobs are installed. Then, if the requirements (hereinafter referred to as a “policy”) are not satisfied, the terminal device TR is instructed to install a necessary file or application program. Furthermore, the policy management server 10 also performs a process for isolating the terminal device TR into the VLAN-E.
The virus management server 11 has a virus definition file or the like that is necessary for satisfying an antivirus policy, and it distributes the file to a terminal device TR when receiving a request. The patch management server 12 has a patch file or the like that is necessary for satisfying an OS policy, and it distributes the file to a terminal device TR when receiving a request. The assets management server 13 has an application program or the like that is necessary for satisfying a business policy, and it distributes the program to a terminal device TR when receiving a request.
The commercial server 15 is utilized by a user of the terminal device TR for performing an ordinary business. For example, a file server, a WWW server, a mail server, a database server or the like corresponds to the commercial server 15.
The RADIUS server 17 is a server for performing user authentication by a RADIUS protocol. The LDAP server 18 is a server for performing accesses management by the LDAP protocol. The DHCP server 19 is a server for automatic setting of an IP address or the like for a terminal device TR by a DHCP protocol. In this embodiment, each of the terminal devices TR is assigned a unique IP address (a static IP address) as described above. Therefore, the DHCP server 19 is not used for these terminal devices TR.
The terminal device TR is a personal computer or a workstation having a TCP/IP network function, and an operating system, a business application program, an antivirus application program and the like are installed in the terminal device TR. In addition, a static IP address is assigned to the terminal device TR so that the terminal device TR belongs to the VLAN-D as described above.
A hard disk drive of the policy management server 10 stores programs and data for realizing a policy information obtaining portion 101, a terminal inspection process portion 102, an IP information obtaining portion 103, a temporary IP address management portion 104, an address lending information transmission portion 105, a VLAN set instruction portion 106, a policy management table TL2, an IP management table TL3 and the like as shown in
Next, processes and the like of the policy management server 10 shown in
As shown in
The IP management table TL3 stores a plurality of records including temporary IP information, static IP information and NAS information as shown in
The “temporary IP address” means an IP address that is lent to a terminal device TR temporarily when the terminal device TR is isolated into the VLAN-E, and it is prepared in advance. The “state of use” indicates whether or not the temporary IP address is currently lent to any one of terminal devices TR. If the temporary IP address is lent (i.e., if it is used), a value indicating “occupied” is stored. If it is not lent (i.e., if it is not used), a value indicating “vacant” is stored.
Similarly to the case of the DHCP method, a temporary IP address is lent to a terminal device TR dynamically. Accordingly, it is not always true that the same IP address is lent to the same terminal device TR every time. Further, it is not possible to lend one temporary IP address to plural terminal devices TR simultaneously.
The static IP information indicates a static IP address, a sub net mask and a default gateway of the terminal device TR to which the temporary IP address is lent at present. The NAS information is about the switch with authentication function 2 to which the terminal device TR is connected. The “port number” indicates a port (such as a connector or a channel of the wireless communication) of the switch with authentication function 2 to which the terminal device TR is connected. The “NAS-IP address” is an IP address that is assigned to the switch with authentication function 2.
With reference to
The terminal inspection process portion 102 compares the policy information 71 obtained from the terminal device TR with the policy management table TL2, so as to inspect whether or not the terminal device TR complies with the policy of the quarantine network system KNS. On this occasion, it finds out a portion that does not match the policy. For example, if a version of the virus definition file indicated in the policy information 71 does not match a version indicated in the policy management table TL2, it is determined that the virus definition file does not match the policy.
The IP information obtaining portion 103 obtains IP information 72 from the terminal device TR via the switch with authentication function 2 or other device. The IP information 72 indicates the IP address, the sub net mask, the default gateway and the like that are set in the terminal device TR currently.
The temporary IP address management portion 104 performs a process for management of the temporary IP address including a process for lending a temporary IP address registered in the IP management table TL3 to the terminal device TR and a process for releasing a temporary IP address that becomes unnecessary for lending.
The address lending information transmission portion 105 transmits information about lending the temporary IP address to the switch with authentication function 2. The VLAN set instruction portion 106 provides the switch with authentication function 2 with an instruction for setting affiliation of the terminal device TR with a VLAN.
In
The table management portion 201 includes an address lending information reception portion 241, a record add process portion 242 and a record erase process portion 243 as shown in
The IP address translation process portion 202 includes an up data reception portion 251, a calling IP translation process portion 252, an up data transmission portion 253, a down data reception portion 254, a destination IP translation process portion 255, and a down data transmission portion 256 as shown in
The ARP process portion 203 includes an ARP request reception portion 261, an ARP response setting portion 262 and an ARP response transmission portion 263 as shown in
Next, a procedure of a process of each device of the quarantine network system KNS when the quarantine is performed for a terminal device TR will be described with reference to the flowchart.
When the power of the terminal device TR is turned on and the terminal device TR is connected to the switch with authentication function 2 (#101 in
The RADIUS server 17 performs a tunnel establishment sequence by TLS (Transport Layer Security) in EAP (Extensible Authentication Protocol) authentication prescribed in IEEE802.1X, for example (#103). Thus, the communication among the terminal device TR, the switch with authentication function 2, the policy management server 10 and the RADIUS server 17 becomes an encryption communication until EAP success is transmitted to the terminal device TR later.
Information for authentication including a user ID and a password is transmitted from the terminal device TR to the policy management server 10 via the switch with authentication function 2, and it is further transmitted to the RADIUS server 17, the LDAP server 18 and the like (#104). The information for authentication is received by the RADIUS server 17 and the LDAP server 18 by the encryption communication as described above.
Each server that received the information for authentication performs a process for authenticating the terminal device TR and transmits to the policy management server 10 a result of the authentication and VLAN identification information of the terminal device TR corresponding to the user ID (#105).
If a result indicating that the authentication is done successfully is obtained, the policy information obtaining portion 101 of the policy management server 10 (see
In parallel with this or about that time, the IP information obtaining portion 103 of the policy management server 10 obtains the IP information 72 from the terminal device TR. In other words, the IP information 72 is requested from the terminal device TR via the switch with authentication function 2 (#108). Then, the terminal device TR transmits to the policy management server 10 the IP information 72 that indicates the static IP address, the sub net mask, the default gateway and the like of the terminal device TR itself (#109).
The terminal inspection process portion 102 inspects a state of policy matching in the terminal device TR in accordance with the latest policy management table TL2 and the policy information 71 obtained from the terminal device TR (#110).
Responding to a result of the inspection, each device of the quarantine network system KNS performs the following process. If a result indicating that the terminal device TR complies with the policy is obtained, the VLAN set instruction portion 106 of the policy management server 10 permits acceptance of the terminal device TR as a member of the VLAN-D as usual, and it instructs the switch with authentication function 2 to perform setting for it. Then, the switch with authentication function 2 performs setting of VLAN-D to the port to which the terminal device TR is connected, and it transmits the EAP success. Then, after various necessary processes are performed in the same way as the conventional method, the terminal device TR becomes capable of communicating at layer 3 level and becomes a device that belongs to the VLAN-D. Thus, the user will be able to use the terminal device TR for business or the like as usual.
Note that if the authentication is not completed successfully in the process of steps #101-105, the user of the terminal device TR is warned and is requested to enter again the user ID and the password, so that a process for re-authentication is performed. Connection to the VLAN-D is not permitted until the successful result of authentication is obtained.
If a result of inspection indicating that the terminal device TR does not comply with the policy is obtained, the user is warned about it. After that each device of the quarantine network system KNS performs the process for matching the terminal device TR to the policy in the procedure as shown in
As shown in
The temporary IP address management portion 104 fills the items of the static IP address, the sub net mask and the default gateway in the record of the unused temporary IP address with the IP information 72 of the terminal device TR obtained in the step #109 in
When the address lending information reception portion 241 (see
The VLAN set instruction portion 106 of the policy management server 10 instructs the switch with authentication function 2 to set its port so that the terminal device TR belongs to the VLAN-E (#126 and #127). After the setting, the switch with authentication function 2 transmits the EAP success to the terminal device TR (#128).
It is necessary for the terminal device TR to perform IP communication with the virus management server 11, the patch management server 12 and the assets management server 13 for downloading necessary files and application programs so as to comply with the policy. Therefore, it is necessary to know a MAC address of the default gateway for reaching the virtual LAN to which these servers belong. However, the IP address of the default gateway that the terminal device TR recognizes usually is an IP address in a business network, i.e., the VLAN-D. Therefore, the terminal device TR cannot perform the IP communication with these servers in this situation. Thus, the switch with authentication function 2 performs the following process for representing the default gateway.
The terminal device TR requests the switch with authentication function 2 for ARP (Address Resolution Protocol) so as to obtain information about a MAC address of the default gateway (#129). When the ARP request reception portion 261 of the ARP process portion 203 (see
The terminal device TR recognizes that the MAC address of the default gateway is the MAC address of the switch with authentication function 2 in accordance with the received ARP response information. Then, the terminal device TR starts communication on the layer 3.
Note that if a temporary IP address is not lent to the terminal device TR, the MAC address of the original default gateway is set in the ARP response information as shown in
The terminal device TR starts a process for applying the policy (hereinafter it may referred to as a “treatment” or “curing”) (#132). The treatment is performed as follows, for example.
The terminal device TR requests the virus management server 11, the patch management server 12 and the assets management server 13 for a latest virus definition file, a batch file and a business application program. Then, these servers transmit a file or an application program that is lacking in the terminal device TR.
On this occasion, however, the following process is performed by the IP address translation process portion 202 of the switch with authentication function 2 on the packet that is transmitted and received between the terminal device TR and each server.
When the up data reception portion 251 receives a packet from the terminal device TR (for example, a packet of information requesting a virus definition file) in
The up data transmission portion 253 transfers the packet in which the calling IP address is transformed to the default gateway (L3-SW/Router) of the switch with authentication function 2 itself in accordance with the destination IP address on the packet. Then, the packet is received by the destination server via the default gateway and other nodes.
The server that received the packet recognizes that the packet has been transmitted from a device that belongs to the VLAN-E. Then, it transmits a file, an application program and the like that are necessary for the treatment to the calling IP address of the received packet in the same way as the conventional method. Here, a temporary IP address is used as the calling IP address of the received packet, so the file and the application program are relayed by the switch with authentication function 2.
When the down data reception portion 254 receives the packet of the file or the application program that is transmitted from the server, the destination IP translation process portion 255 rewrites the IP address of the destination (the destination IP address) from the temporary IP address of the terminal device TR to the static IP address in accordance with the IP translation table TL1. For example, if the destination IP address received from the server is “192.168.11.11”, it is rewritten into “192.168.10.21” as shown in
In this way, according to the translation process of the IP address by the IP address translation process portion 202, the devices including the virus management server 11, the patch management server 12 and the assets management server 13 apparently have setting of a temporary IP address as the IP address of the terminal device TR.
With reference to
After the curing process, the terminal device TR is restarted if necessary. Then, it is inspected again whether the virus definition file or the like is installed correctly or not. The procedure of the inspection process is as described above with reference to
If it is decided that the terminal device TR complies with the policy correctly as a result of this reinspection, the policy management server 10 and the switch with authentication function 2 perform a process for letting the terminal device TR belong again to the normally belonging virtual LAN, i.e., the VLAN-D in the procedure as shown in
When the policy management server 10 receives the notice indicating that the terminal device TR complies with the policy correctly, it searches a temporary IP address that is lent to the terminal device TR in accordance with the IP management table TL3 (see
The record erase process portion 243 (see
When the policy management server 10 receives a notice from the switch with authentication function 2, the static IP information and the NAS information that are stored in the IP management table TL3 and are associated with the temporary IP address are deleted, and the state of use is updated from “occupied” to “vacant” (#145).
The policy management server 10 instructs the switch with authentication function 2 to set its port so that the terminal device TR belongs to the VLAN-D (#146 and #147). After the setting, the switch with authentication function 2 transmits the EAP success to the terminal device TR (#148).
Then, the terminal device TR receives the EAP success and performs various necessary processes similarly to the conventional method. After that, it starts communication at the layer 3 level. Thus, the terminal device TR becomes a device that belongs to the VLAN-D, and the user can use the terminal device TR for business by connecting it with the commercial server 15 or the like (#149).
Note that the terminal device TR becomes in the state where no temporary IP address is lent after the process in steps #143 and #147. Therefore, the switch with authentication function 2 does not perform the process for changing the MAC address shown in
According to this embodiment, a terminal device TR that does not comply with the policy can be isolated to the VLAN-E for treatment without changing setting about the IP address or the like in the terminal device TR.
In the first embodiment, as shown in
The general structure of the quarantine network system KNS in the second embodiment is basically the same as that in the first embodiment shown in
The switch with authentication function 2B has a function of setting its port so that the terminal device TRB belongs to one of the VLAN-A through the VLAN-E in accordance with an instruction from the policy management server 10B. The functions of the table management portion 201, the IP address translation process portion 202, the ARP process portion 203 and the IP translation table TL1 described in the first embodiment are not necessary.
Programs and data are installed in the hard disk drive of the policy management server 10B for realizing functions of a policy information obtaining portion 1B1, a terminal inspection process portion 1B2, an IP information obtaining portion 1B3, a temporary IP address management portion 1B4, a temporary IP address lending portion 1B5, a VLAN set instruction portion 1B6, a policy management table TL2′ and an IP management table TL4 as shown in
The policy information obtaining portion 1B1, the terminal inspection process portion 1B2, the IP information obtaining portion 1B3, the temporary IP address management portion 1B4, the VLAN set instruction portion 1B6 and the policy management table TL2′ perform the same processes as the policy information obtaining portion 101, the terminal inspection process portion 102, the IP information obtaining portion 103, the temporary IP address management portion 104, the VLAN set instruction portion 106 and the policy management table TL2 (see
The temporary IP address lending portion 1B5 performs a process for lending a temporary IP address to the terminal device TRB that was decided not to comply with the policy by the inspection, so that the terminal device TRB is isolated into the VLAN-E.
The IP management table TL4 stores information about the temporary IP address or the like that is lent to the terminal device TRB for isolating the same to the VLAN-E as shown in
Next, procedures of processes will be described that are performed by devices of the quarantine network system KNS when the quarantine of the terminal device TRB is performed in the second embodiment, with reference to the flowcharts.
The flow of the process until the inspection of the terminal device TRB is the same as that in the first embodiment, which was explained above with reference to
Note that in the process shown in
If it is decided that the terminal device TRB does not comply with the policy as a result of the inspection, the terminal device TRB is isolated to the VLAN-E for treatment. In the second embodiment, the devices of the quarantine network system KNS perform these processes by following the procedure shown in
The policy management server 10B checks whether the IP address that is set in the terminal device TRB at present is a static IP address or a temporary IP address in accordance with the IP information 72 of the terminal device TRB (#151 in
Therefore, the policy management server 10B searches one of temporary IP addresses that are not lent at present (i.e., in which the state of use is “vacant”) from the IP management table TL4 shown in
In parallel with the process in the step #153 or about that time, the policy management server 10B notifies the terminal device TRB of the lent temporary IP address and the corresponding sub net mask and default gateway via the switch with authentication function 2B, so as to request the same to use the temporary IP address or the like (#154).
The terminal device TRB uses the temporary IP address, the sub net mask and the default gateway that were notified from the policy management server 10B as a network setting of the terminal device TRB itself (#155). In other words, if the OS of the terminal device TRB is Windows (registered trademark) for example, the temporary IP address, the sub net mask and the default gateway are written to the IP address information on the registry. Thus, the IP address of the terminal device TRB is changed from the static IP address to the temporary IP address. Then, the terminal device TRB notifies the policy management server 10B of completion of application of the temporary IP address via the switch with authentication function 2B (#156).
The policy management server 10B instructs the switch with authentication function 2B to set its port so that the terminal device TRB belongs to the VLAN-E (#157 and #158). The switch with authentication function 2B transmits the EAP success to the terminal device TRB (#159).
The terminal device TRB receives the EAP success and performs various necessary processes similarly to the conventional method. Then, the terminal device TRB starts the communication at layer 3 level. Thus, the terminal device TRB becomes a device that belongs to the VLAN-E. Then, a file, an application program or the like is downloaded from the virus management server 11, the patch management server 12 and the assets management server 13 if necessary. The file or the application program is used for treatment (#160). After the treatment, the terminal device TR is restarted so as to perform reset of the current communication or the like (#161).
After the restart of the terminal device TRB, similarly to the case of the first embodiment, it is inspected again whether or not a virus definition file or the like is installed in the terminal device TRB correctly by following the procedure shown in
If it is decided that the policy is applied correctly as a result of the inspection, the policy management server 10B and the switch with authentication function 2B perform a process for making the terminal device TRB belong to the normal virtual LAN, i.e., the VLAN-D by following the procedure as shown in
The policy management server 10B checks whether the IP address set in the terminal device TRB at present is a static IP address or a temporary IP address in accordance with the IP information 72 of the terminal device TRB (#171 in
The temporary IP address set in the terminal device TRB at present is searched from the IP management table TL4 shown in
The terminal device TRB uses the static IP address, the sub net mask and the default gateway that are notified by the policy management server 10B as a network setting of the terminal device TRB itself (#174). In other words, if the OS of the terminal device TRB is Windows for example, the temporary IP address or the like is written to the IP address information on the registry as described above. In this way, the IP address of the terminal device TRB is changed to the static IP address. Then, the terminal device TRB notifies the policy management server 10B of completion of application of the static IP address via the switch with authentication function 2B (#175).
When the policy management server 10B receives the notification, it deletes the static IP information from the record of the temporary IP address that had been lent to the terminal device TRB (see
Then, the terminal device TRB receives the EAP success and performs various necessary processes similarly to the conventional method. After that, it starts communication at the layer 3 level. Thus, the terminal device TRB becomes a device that belongs to the VLAN-D. The user can connect the terminal device TRB to the commercial server 15 or the like so as to use it for business (#180).
According to the second embodiment, it is possible to apply an IP address of the VLAN-E to the terminal device TR to which an IP address of the VLAN-D is given statically.
Although the case where the terminal device TR is quarantined is described above as the first and the second embodiments, it is also possible to apply the present invention to quarantine a server such as the commercial server 15 or other communication device.
Furthermore, the structure of the whole or a part of the quarantine network system KNS, the policy management server 10, the switch with authentication function 2, the process contents thereof, the order of processes and contents of the tables can be modified in accordance with the spirits of the present invention if necessary.
The present invention can be utilized particularly for isolating a terminal device and a server in a network system in which a dynamic host configuration protocol (DHCP) cannot be used.
While example embodiments of the present invention have been shown and described, it will be understood that the present invention is not limited thereto, and that various changes and modifications may be made by those skilled in the art without departing from the scope of the invention as set forth in the appended claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2005-077369 | Mar 2005 | JP | national |
This application is a Divisional application of Ser. No. 11/166,274, filed Jun. 27, 2005 and claims priority to Japanese Application No. 2005-077369 filed Mar. 17, 2005.
Number | Date | Country | |
---|---|---|---|
Parent | 11166274 | Jun 2005 | US |
Child | 12413299 | US |