User's Manual
AXIS M1043–W Network Camera
System Options
EAP-TLS
The authentication protocol EAP-TLS (Extensible Authentication Protocol - Transport Layer Se cur ity) allow s the client and server to
authenticate each other using digital certificates provided by a Certification Authority. To gain access to the protected network, the
Axis product presents its certificate to the network access point. Access is granted if the certificate is approved.
To configure the wireless setting s using the WPA
TM
-/WPA-Enterprise security method and EAP-TLS:
1. Enter the user Identity associated with your certificate.
2. Enter the Private key password foryouruseridentity.
3. Select the EAPOL version (1 or 2) as used in the access point.
4. Click Save .
Note
To ensure successful certificate validation, time synchronization s hould be performed on all clients and servers prior to
configuration.
For more information on certificates for wireless networks, see
Certificates, on page 44
.
EAP-PEAP/MSCHAPv2
The authentication protocol EAP-PEAP/MSCHAPv2 (Extensible Authentication Protocol - Protected Extensible Authentication
Protocol/Microsoft Challenge Handshake Authentication Protocol) allows the client to authenticate the network using a digital
certificate provided by a Certification Authority. The network authenticates the client using an identity and a password. To gain
access to the protected network, the Axis product presents its identity and password to the network access point. If these credentials
are approved, the access point allows access on a preconfigured port.
To configure the wireless settings using the WPA
TM
-/WPA-Enterprise security method an
d EAP-PEAP/M SCHAPv2:
1. Enter the user Identity associated with your certificate.
2. Enter the Password foryouruseridentity.
3. Select the P EAP Version (0 or 1) as used in the access point.
4. Select the PEAP Label that the access point
uses when using PEAP version 1. Select 1 to use client EAP encryption; select
2 to use client PEAP encryption.
5. Select the EAPOL version (1 or 2) as used in the access point.
6. Click Save .
Note
To ensure successful certificate validation, time synchronization s hould be performed on all clients and servers prior to
configuration.
For more information on certificates for wireless networks, see
Certificates, on page 44
.
WEP
The security method WEP (Wired Equiva lent Privacy) can be used to help secure a wireless network. However, WEP has some flaws,
which makes it more vulnerable to attacks and WPA
TM
-WPA-Enterprise or WPA-/WPA2
TM
–PSK a better choice.
To configure the wireless settings using the WEP security method:
1. Select the network type being used by the access point, Master or Ad-Hoc.
2. Select the Authentication type, Open or Shared Key depending on the method used by the access p oint. Not all access
points have this option, in which case t hey probably u se open system, also sometimes c alled SSID Authentication.
43