![HP Compaq Presario,Presario 1910 Скачать руководство пользователя страница 408](http://html.mh-extra.com/html/hp/compaq-presario-presario-1910/compaq-presario-presario-1910_user-manual_161851408.webp)
395
the access port according to the authorized ACL. You must configure the authorized ACLs on the access
device if you specify authorized ACLs on the authentication server. To change the access right of a user,
you can specify a different authorized ACL on the authentication server or change the rules of the
corresponding authorized ACL on the device.
Layer 3 portal authentication process
Direct authentication and cross-subnet authentication share the same authentication process.
Direct authentication/cross-subnet authentication process (with CHAP/PAP authentication)
Figure 371
Direct authentication/cross-subnet authentication process
The direct authentication/cross-subnet authentication process is as follows:
1.
A portal user initiates an authentication request through HTTP. When the HTTP packet arrives at the
access device, the access device allows it to pass if it is destined for the portal server or a
predefined free website, or redirects it to the portal server if it is destined for other websites. The
portal server provides a Web page for the user to enter the username and password.
2.
The portal server and the access device exchange Challenge Handshake Authentication Protocol
(CHAP) messages. For Password Authentication Protocol (PAP) authentication, this step is skipped.
3.
The portal server assembles the username and password into an authentication request message
and sends it to the access device. Meanwhile, the portal server starts a timer to wait for an
authentication acknowledgment message.
4.
The access device and the RADIUS server exchange RADIUS packets to authenticate the user.
5.
The access device sends an authentication reply to the portal server.
6.
The portal server sends an authentication success message to the authentication client to notify it of
logon success.
7.
The portal server sends an authentication reply acknowledgment to the access device.
With extended portal functions, the process includes additional steps:
8.
The security policy server exchanges security check information with the authentication client to
check whether the authentication client meets the security requirements.
Содержание Compaq Presario,Presario 1910
Страница 35: ...22 Figure 16 Sort display based on MAC address in the ascending order ...
Страница 54: ...41 Figure 27 Configuration finishes ...
Страница 70: ...57 Figure 42 Configuring idle timeout period 3 Set the idle timeout period for logged in users 4 Click Apply ...
Страница 98: ...85 Figure 67 Displaying the rate settings of ports ...
Страница 114: ...101 Figure 82 Port traffic statistics NOTE When the bandwidth utilization is lower than 1 1 is displayed ...
Страница 158: ...145 Field Description OutErrors Number of invalid packets sent through the interface ...
Страница 202: ...189 Figure 177 Creating a static MAC address entry ...
Страница 230: ...217 Figure 193 Configuring MSTP globally on Switch D ...
Страница 359: ...346 5 View the operation result in the Summary area Figure 316 IPv6 traceroute operation result ...