Pelco P2230L-FW Spectra 2MP 30X In-Ceiling PTZ Camera

Pelco Spectra Pro 2 PTZ Operations User Manual - Page 25

For P2230L-FW.

PDF File Manual, 85 pages, Read Online | Download pdf file

P2230L-FW photo
Loading ...
Loading ...
Loading ...
25
6. Click the Save button to save the settings and create a new user (the new user profile appears in the box on the
left side of the page), or click the Reset button to clear all of the information you entered without saving it.
Deleting a User
1. Click the user profile that you want to delete from the defined users section located in the box on the left side of the
page.
2. Click the Delete User button. A dialog box appears with the message “Are you sure you want to delete this user?”
3. Click OK. The user profile is deleted from the defined user profiles section.
NOTE: The defaultadmin” user cannot be deleted.
Security
Pelco API
Select “Closed Authentication” will request video clients to conform to Pelco API (Application Programming Interface)
protocol in order to access to the camera, while selecting “Open Authenticationwill make API protocol of the camera fully
open to various intrusions, which is not suggested due to security concerns.
RTSP/JPEG
Select “Require Authentication” will request video clients to conform to RTSP (Real Time Streaming Protocol) or JPEG
protocol in order to access to the camera, while selecting “Open Authenticationwill make RTSP/JPEG protocol of the
camera fully open to various intrusions, which is not suggested due to security concerns.
Inactivity Timeout
Enter a period of time (in minutes) during which a user can be inactive without any impact on user’s session. After the
timeout expires, the user is locked out of the session, and the user must log back in to continue with the session.
2.2.2.3 TLS
To ensure security on the Internet, all Web browsers provide several security levels that can be adjusted for sites that use TLS
technology to transmit data. TLS encrypts communications, making it difficult for unauthorized users to intercept and view user
names and passwords.
TLS requires signed certificates to determine if the Web browser accessing the camera has the required authentication. The
camera can generate a certificate signing request (CSR) that can be sent to a certificate authority for a signature (for example,
VeriSign®), or it can generate a self-signed certificate using the Generate Self-Signed Certificate option.
FIGURE 2-15: TLS CONFIGURATION
TLS Configuration
Select one of the following modes:
Required: A signed Transport Layer Security (TLS) certificate must be installed, and a secure URL that begins with the
protocol name “https:must be used to access the camera. Sensitive data is always encrypted during transmission. A URL
that begins with the “http:” protocol rather than the “https:” protocol will be redirected to the secure URL automatically.
Loading ...
Loading ...
Loading ...