iTable of Content1 Triple Authentication Configuration ········································································································1-1Triple Authentication Overview ···············································································································1-1Background ·····································································································································1-1Triple Authentication Mechanism ····································································································1-1Extended Functions·························································································································1-2Triple Authentication Configuration·········································································································1-3Triple Authentication Configuration Example··························································································1-3Network Requirement······················································································································1-3Network Diargram····························································································································1-3Configuration Procedure··················································································································1-4