This graphic shows how perimeter authentication is performed. An explanation in the text preceeds this graphic.