Инструкции По Установке для 3com S7906E

Скачать
Страница из 2621
 
1-2 
Resource access limit: A user passing identity authentication can access only network resources 
like the anti-virus server or OS patch server, which are called the restricted resources. Only users 
passing security authentication can access more network resources, which are called the 
unrestricted resources.  
Portal System Components 
As shown in 
, a typical portal system consists of five basic components: authentication client, 
access device, portal server, authentication/accounting server, and security policy server. 
Figure 1-1 Portal system components 
 
 
Authentication client 
Client system of a user to be authenticated. It can be a browser using the Hypertext Transfer Protocol 
(HTTP) or Hypertext Transfer Protocol Secure (HTTPS), or a host running the portal client software. 
The security authentication of a client depends on the communications between the portal client and the 
security policy server.  
Access device 
Device for broadband access. It can be a switch or a router that provides the following three functions: 
Before authentication, redirecting all HTTP requests from users in the subnet to be authenticated to 
the portal server. 
During authentication, interacting with the portal server, security policy server and the 
authentication/accounting server for identity authentication, security authentication and 
accounting. 
After authentication, allowing users to access granted Internet resources. 
Portal server 
Server that listens to authentication requests from portal clients and exchanges client authentication 
information with the access device. It provides free portal services and a web-based authentication 
interface. 
Authentication/accounting server 
Server that implements user authentication and accounting through interaction with the access device.