Which protocol is allowed to pass through before a device is authenticated?