Alternatively, the identification information for both the user and the terminal can be communicated to a authentication server that has been replicated to a local server. [0046] In one embodiment, a user database is queried to determine whether the user is an authorized user of the network.