Chapter 2. Overview; Introduction Of Dsa-6100; System Concept - D-Link DSA-6100 User Manual

Wireless access controller
Table of Contents

Advertisement

DSA-6100 User Guide
Chapter 2.
Overview

2.1 Introduction of DSA-6100

The DSA-6100 is a Network Access Controller designed for medium to large network environments to provide
network "manageability", "efficiency" and a "friendly interface" suitable for campuses, libraries, gymnasiums,
small and middle enterprises, factories, hotspots and community hospitals.

2.2 System Concept

The DSA-6100 is built for the purpose of controlling all network data passing through its system. Users, under the
managed network, must be authenticated in order to access the network beyond the managed area. The
authentication mechanism at the user's end is provided by the DSA-6100 server using SSL encryption to protect
the webpage. The DSA-6100 is responsible for the authentication, authorization, and management functions in the
system. User account information may be stored in the DSA-6100 database or in other specified external
authentication databases.
The process of authenticating the user's identity is executed via the SSL encrypted webpage. The use of web
interface ensures the system is compatible to most desktop systems and palm computers. When a user
authentication is requested, the DSA-6100 server software checks the authentication database at the rear end to
confirm the user's access right. The authentication database may be the local database of the DSA-6100 or any
external database that the DSA-6100 supports. If the user is not an authorized user, the DSA-6100 will refuse the
user's request for access and block the user from accessing the network. If the user is an authorized user, the
DSA-6100 will grant the user appropriate access right so that the user can use the network. If the online user
remains idle without using the network for a time exceeding a predetermined idle time on the DSA-6100, or if the
online user logs out of the system, the DSA-6100 will exit the working stage of the user and terminate the user's
access right of the network.
2

Advertisement

Table of Contents
loading

Table of Contents