i
Table of Content
1 Triple Authentication Configuration········································································································1-1
Triple Authentication Overview ···············································································································1-1
Background ·····································································································································1-1
Triple Authentication Mechanism ····································································································1-1
Extended Functions·························································································································1-2
Triple Authentication Configuration·········································································································1-3
Triple Authentication Configuration Example··························································································1-3
Network Requirement······················································································································1-3
Network Diargram····························································································································1-3
Configuration Procedure··················································································································1-4