The user, such as a workstation or a front end processor acting as a concentrator for station or even networks, will be required to make a physical connection at a NIM port and then identify itself via its MAN name, virtual network identification, and password security.