With With With With the the the the development development development development of of of of IP IP IP IP broadband broadband broadband broadband system, system, system, system, the the the the network network network network transfer transfer transfer transfer from from from from a a a a trusted trusted trusted trusted network network network network to to to to a a a a non-trusted non-trusted non-trusted non-trusted network. network. network. network. The The The The security security security security is is is is an an an an important important important important topic topic topic topic in in in in network network network network research research research research and and and and development. development. development. development. This This This This paper paper paper paper introduces introduces introduces introduces some some some some security security security security methods methods methods methods in in in in access access access access network, network, network, network, just just just just like like like like ATM ATM ATM ATM dsl dsl dsl dsl network network network network ,EPON ,EPON ,EPON ,EPON system. system. system. system. An An An An comparison comparison comparison comparison has has has has been been been been done done done done aimed aimed aimed aimed at at at at these these these these security security security security methods. methods. methods. methods. -security security security security churning churning churning churning ONU ONU ONU ONU access access access access network network network network I.INTRODUCTION In recent years, because of the development of IP technology, the ETHERNET has replaced ATM to be the best data link layer protocol. And the PON is a more perfect technology in access network. The new optical access network binds the ETHERNET technology in data link layer and PON technology in physical layer to form a more broad band and less cost and more strong service process ability ,which is EPON. The EPON omits the complexity of IP mapping to ATM. It is the hottest technology in recent years.With development of IP broadband router technology and the discuss of IP network, the MAN has rapidly been the load-carrying network of future telecommunication services. The router with large capacity, High bandwidth, High process large capacity will be the load-carrying network core. The IP MAN and Layer2 broadband access network structure with clear of matter and logic is essential. The structure need distributed structure hardware Component Architecture and line-rate hardware switch to meet the requirement of MAN.Over the years, network-security technology and deployments have had to adapt to constant changes in the surrounding security foundations. To date, this has commonly resulted in firewall and other technologies being deployed on the network's border and in front of core resources. This has successfully stopped many external threats and served trusted internal users. However, the past few years have introduced several environmental factors which invalidate the inside vers...