With a built in database for authentication a firewall contains a built in authentication database. A user can authenticate against this database for access. The database is usually configured with multiple usernames and passwords .
With a built in database for authentication a firewall contains a built in authentication database. A user can authenticate against this database for access. The database is usually configured with multiple usernames and passwords .