Pelco P2230L-FW Spectra 2MP 30X In-Ceiling PTZ Camera

Pelco Spectra Pro 2 PTZ Operations User Manual - Page 28

For P2230L-FW.

PDF File Manual, 85 pages, Read Online | Download pdf file

P2230L-FW photo
Loading ...
Loading ...
Loading ...
28
1. Once you successfully upload a certificate, Delete Certificate button will appear at the bottom of the TLS
Configuration page.
2. If you want to delete the certificate, click the Delete Certificate and the following progress message appears on the
page: “Deleting certificate file…”
3. Click Save.
2.2.2.4 SSH
SSH is a user-enabled protocol that allows Pelco Product Support to log on to and service the camera for advanced
troubleshooting purposes.
From this page, users with the appropriate permissions can enable or disable SSH access to the camera.
FIGURE 2-20: ENABLING SECURE SHELL
SSH Settings
1. Select the Enabled check box.
2. Click in the Password box and type a password (4 to 16 alphanumeric characters). Passwords are case-sensitive.
NOTE: The default username is “root” and cannot be changed. The username and password are required when
accessing the camera through a third-party SSH client.
3. Click in the “Re-type Passwordbox and retype your password.
4. Click the Save button to save the password and enable SSH, or click the Reset button to clear all of the information
you entered without saving it.
2.2.2.5 802.1x
802.1x is a port security that authenticates devices that want to establish a point-to-point access through a wired or wireless
port using Extensible Authentication Protocol (EAP). This port-based authentication method prevents unauthorized access to a
Local Area Network (LAN) through a physical port. For example, when a device is connected to a network port, the network
switch will ask the device for authentication.
If the credential is accepted when the device sends a credential to the network switch, the network switch will open the port for
normal use.
If authentication fails, the device is prevented from accessing information on the port.
FIGURE 2-21: CONFIGURING THE 802.1X PORT SECURITY SETTINGS
Loading ...
Loading ...
Loading ...