Description of the illustration atn_per.gif
This graphic shows how perimeter authentication is performed. An explanation in the text preceeds this graphic.
This graphic shows how perimeter authentication is performed. An explanation in the text preceeds this graphic.