
Chapter 2. Overview
Air Live IAS-2000 User’s Manual V1.0
.
16
functions. The user account information is stored in the IAS-2000 database, or other specified external
authentication databases.
The process of authenticating the user’s identity is executed via the SSL encrypted webpage. Using the web
interface, it can be ensured that the system is compatible to most desktop systems and palm computers. When a
user authentication is requested, the IAS-2000 server software will check the authentication database at the rear
end to confirm the user’s access right. The authentication database can be the local database of IAS-2000 or any
external database that IAS-2000 supports. If the user is not an authorized user, IAS-2000 will refuse the user’s
request for the access. In the meantime, IAS-2000 will also continue blocking the user from accessing the network.
If the user is an authorized user, then IAS-2000 will authorize the user with an appropriate access right, so that the
user can use the network. If the online user remains idle without using the network for a time exceeding a
predetermined idle time on IAS-2000 or the online user logs out of the system, IAS-2000 will exit the working stage
of such user and terminate the user’s access right of the network.
The following figure provides a simple example of setting up a small enterprise network. IAS-2000 is set to control a
part of the company’s intranet. The whole managed network includes cable network users and wireless network
users. In the beginning, any user located at the managed network is unable to access the network resource without
permission. If the access right to the network beyond the managed area is required, an Internet browser such as the
Internet Explorer must be opened and a connection to any website must be performed. When the browser attempts
to connect to a website, IAS-2000 will force the browser to redirect to the user login webpage. The user must enter
the username and password for authentication. After the identity is authenticated successfully, the user will gain
proper access right defined on IAS-2000.