beautypg.com

Portal configuration, Portal overview, Introduction to portal – H3C Technologies H3C SecPath F1000-E User Manual

Page 2: Introduction to extended portal functions

background image

1

Portal Configuration

This chapter includes these sections:

Portal Overview

Portal Configuration Task List

Displaying and Maintaining Portal

Portal Configuration Examples

Troubleshooting Portal

Portal Overview

This section covers these topics:

Introduction to Portal

Introduction to Extended Portal Functions

Portal System Components

Portal Authentication Modes

Layer 3 Portal Authentication Process

Introduction to Portal

Portal authentication, as its name implies, helps control access to the Internet. Portal authentication is also

called web authentication and a website implementing portal authentication is called a portal website.
With portal authentication, an access device redirects all users to the portal authentication page. All
users can access the free services provided on the portal website; but to access the Internet, a user must

pass portal authentication.
A user can access a known portal website, enter username and password for authentication. This

authentication mode is called active authentication. There is still another authentication mode, namely

forced authentication, in which the access device forces a user trying to access the Internet through HTTP

to log on to a portal website for authentication.
The portal feature provides the flexibility for Internet service providers (ISPs) to manage services. A portal

website can, for example, present advertisements, and deliver community services and personalized

services. In this way, broadband network providers, equipment vendors, and content service providers

form an industrial ecological system.

Introduction to Extended Portal Functions

By forcing users to implement patching and anti-virus policies, extended portal functions help users to

defend against viruses. The main extended functions are described as follows:

Security check: Works after identity authentication succeeds to check whether the required
anti-virus software, virus definition file, and operating system (OS) patches are installed, and no

unauthorized software is installed on the host of a user.