AWAN 3883/4/5 Access Server Configuration and Management Manual
Configuring Remote Access Connections
AWAN 3883/4/5 Access Server Configuration and Management Manual—424242-001
9-9
Step 4: Configuring Remote Access Security
Step 4: Configuring Remote Access Security
You can set up authentication and authorization for remote access users.
Authentication is a function in which a user’s identity is verified. Authorization is the
creation of specific rights for a user once the user has been authenticated.
Configuring remote access security is described in Section 13, Configuring Security for
Remote Access Users.
Figure 9-4. Port Properties Screen—Adv. Line Tab Dialog Box