Description of the illustration atn_per.gif

This graphic shows how perimeter authentication is performed. An explanation in the text preceeds this graphic.