User's Manual

Cipherium Repeater
Administrators Manual
18
access right, so that the user can use the network. The concept of the operation of the whole
Public LAN procedure is shown in the following figure.
Figure 3-1 The Repeater User Public LAN Flow
If the online user remains idle without using the network for a time exceeding a predetermined
time on the Repeater or the online user logs out of the system, the Repeater will exit the
working stage of such user, and terminate the users access right for the network.
In the system, the Repeater is responsible for authorization and management functions. The
user account information is stored in the Repeater database, or other specified external Public
LAN databases. The process of authenticating the users identity is executed via the SSL
encrypted webpage. Using the web interface can ensure that the system is compatible to most
desktop devices and palm computers.
3.2.2. Connecting Network Devices
Figure 3-2 provides a simple example of setting up a small enterprise network.
bonalinx-W 5101bonalinx-W 5101bonalinx-W 5101
bonalinx W-5101
W-5101