In this paper, on the basis of these studies, combing with the latest Internet security research, on the basis of Mobile Agent's effective authentication, CA mechanism, via Mobile Agent's hierarchical management and authentication, a regional breakdown of the network hosts and security level classification of its resources, We built an effective security scheme of the network host control mechanisms, the better solution to the security issues of network host supporting Mobile Agent.