User's Manual
Administrator’s Manual
20
the user with an appropriate access right, so that the user can use the network.
Figure 3-1 The User Public LAN Flow
If the online user remains idle without using the network for a time exceeding a
predetermined time or the online user logs out of the system, the system will exit the
working stage of such user, and terminate the user’s access right for the network.
In the system, the device is responsible for authorization and management functions.
The user account information is stored in the database, or other specified external
Public LAN databases. The process of authenticating the user’s identity is executed
via the SSL encrypted webpage. Using the web interface can ensure that the system is
compatible to most desktop devices and palm computers.
3.2.2. Connecting Network Devices
Figure 3-2 provides a simple example of setting up a small enterprise network.
Figure 3-2 Example of Setting up a Small Enterprise Network