Portal Configuration; Portal Overview; Introduction To Portal; Introduction To Extended Portal Functions - HP 4800G Series Configuration Manual

24/48 port
Table of Contents

Advertisement

1

Portal Configuration

When configuring portal, go to these sections for information you are interested in:

Portal Overview

Portal Configuration Task List
Displaying and Maintaining Portal
Portal Configuration Examples
Troubleshooting Portal
Portal Overview
This section covers these topics:

Introduction to Portal

Introduction to Extended Portal
Portal System Components
Portal Authentication Modes
Portal Authentication Process
Introduction to Portal
Portal authentication, as its name implies, helps control access to the Internet. Portal authentication is
also called web authentication and a website implementing portal authentication is called a portal
website.
With portal authentication, an access device forces all users to log into the portal website at first. Every
user can access the free services provided on the portal website; but to access the Internet, a user must
pass portal authentication on the portal website.
A user can access a known portal website, enter username and password for authentication. This
authentication mode is called active authentication. There is still another authentication mode, namely
forced authentication, in which the access device forces a user trying to access the Internet through
HTTP to log in to a portal website for authentication.
The portal feature provides the flexibility for Internet service providers (ISPs) to manage services. A
portal website can, for example, present advertisements, and deliver community services and
personalized services. In this way, broadband network providers, equipment providers, and content
service providers form an industrial ecological system.

Introduction to Extended Portal Functions

By forcing users to implement patching and anti-virus policies, extended portal functions help users to
defend against viruses. The main extended functions are described as follows:
Security authentication mechanism: The security authentication mechanism works after the
identity authentication process to check that the required anti-virus software, virus definition
updates and OS patches are installed, and no unauthorized software is installed on the terminal of
a user.
1-1

Advertisement

Chapters

Table of Contents
loading

Table of Contents