H3c-technologies H3C SecPath F1000-E Manual de usuario Pagina 2

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 182
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 1
1
Portal Configuration
This chapter includes these sections:
Portal Overview
Portal Configuration Task List
Displaying and Maintaining Portal
Portal Configuration Examples
Troubleshooting Portal
Portal Overview
This section covers these topics:
Introduction to Portal
Introduction to Extended Portal Functions
Portal System Components
Portal Authentication Modes
Layer 3 Portal Authentication Process
Introduction to Portal
Portal authentication, as its name implies, helps control access to the Internet. Portal authentication is also
called web authentication and a website implementing portal authentication is called a portal website.
With portal authentication, an access device redirects all users to the portal authentication page. All
users can access the free services provided on the portal website; but to access the Internet, a user must
pass portal authentication.
A user can access a known portal website, enter username and password for authentication. This
authentication mode is called active authentication. There is still another authentication mode, namely
forced authentication, in which the access device forces a user trying to access the Internet through HTTP
to log on to a portal website for authentication.
The portal feature provides the flexibility for Internet service providers (ISPs) to manage services. A portal
website can, for example, present advertisements, and deliver community services and personalized
services. In this way, broadband network providers, equipment vendors, and content service providers
form an industrial ecological system.
Introduction to Extended Portal Functions
By forcing users to implement patching and anti-virus policies, extended portal functions help users to
defend against viruses. The main extended functions are described as follows:
Security check: Works after identity authentication succeeds to check whether the required
anti-virus software, virus definition file, and operating system (OS) patches are installed, and no
unauthorized software is installed on the host of a user.
Vista de pagina 1
1 2 3 4 5 6 7 ... 181 182

Comentarios a estos manuales

Sin comentarios