5 Mega-pixel Vandalproof IR PoE IP Camera
ICA-E5550V
37
There are two methods to create certificates –
Certificate Signing Request (CSR)
and
Self-Signed Certificate
.
Certificate Signing Request (CSR)
: User uses a signed certificate issued by trusted
Certification Authority (CA).
Self-Signed Certificate
: User wants to use the certificate created and issued by user himself.
Press
Create
or
Create Self-Signed Certificate
button and configure settings in the pop-up
screen to install the certificate.
Note that the new setting will only take effect after
Save & Reboot
.
3.7.4 IEEE
802.1X
IEEE 802.1X is an IEEE standard for port-based Network Access Control. 802.1X
authentication involves three parties: a supplicant, an authenticator, and an authentication
server.
The supplicant is a client device (such as an IP camera) that wishes to attach to the
LAN/WLAN. The authenticator is a network device, such as an Ethernet switch or wireless
access point; and the authentication server is typically a host running software supporting the
RADIUS and EAP protocols.
The authenticator acts like a security guard to a protected network. The supplicant (i.e., client
device) is not allowed access through the authenticator to the protected side of the network
until the supplicant’s identity has been validated and authorized. An analogy to this is providing
a valid passport at an airport before being allowed to pass through security to the terminal.
With 802.1X port-based authentication, the supplicant provides credentials, such as user
name/password or digital certificate, to the authenticator, and the authenticator forwards the
credentials to the authentication server for verification. If the authentication server determines
the credentials are valid, the supplicant (client device) is allowed to access resources located
on the protected side of the network.