User's Manual

AXIS M1043–W Network Camera
System Options
EAP-TLS
The authentication protocol EAP-TLS (Extensible Authentication Protocol - Transport Layer Se cur ity) allow s the client and server to
authenticate each other using digital certicates provided by a Certication Authority. To gain access to the protected network, the
Axis product presents its certicate to the network access point. Access is granted if the certicate is approved.
To congure the wireless setting s using the WPA
TM
-/WPA-Enterprise security method and EAP-TLS:
1. Enter the user Identity associated with your certicate.
2. Enter the Private key password foryouruseridentity.
3. Select the EAPOL version (1 or 2) as used in the access point.
4. Click Save .
Note
To ensure successful certicate validation, time synchronization s hould be performed on all clients and servers prior to
conguration.
For more information on certicates for wireless networks, see
Certicates, on page 44
.
EAP-PEAP/MSCHAPv2
The authentication protocol EAP-PEAP/MSCHAPv2 (Extensible Authentication Protocol - Protected Extensible Authentication
Protocol/Microsoft Challenge Handshake Authentication Protocol) allows the client to authenticate the network using a digital
certicate provided by a Certication Authority. The network authenticates the client using an identity and a password. To gain
access to the protected network, the Axis product presents its identity and password to the network access point. If these credentials
are approved, the access point allows access on a precongured port.
To congure the wireless settings using the WPA
TM
-/WPA-Enterprise security method an
d EAP-PEAP/M SCHAPv2:
1. Enter the user Identity associated with your certicate.
2. Enter the Password foryouruseridentity.
3. Select the P EAP Version (0 or 1) as used in the access point.
4. Select the PEAP Label that the access point
uses when using PEAP version 1. Select 1 to use client EAP encryption; select
2 to use client PEAP encryption.
5. Select the EAPOL version (1 or 2) as used in the access point.
6. Click Save .
Note
To ensure successful certicate validation, time synchronization s hould be performed on all clients and servers prior to
conguration.
For more information on certicates for wireless networks, see
Certicates, on page 44
.
WEP
The security method WEP (Wired Equiva lent Privacy) can be used to help secure a wireless network. However, WEP has some aws,
which makes it more vulnerable to attacks and WPA
TM
-WPA-Enterprise or WPA-/WPA2
TM
–PSK a better choice.
To congure the wireless settings using the WEP security method:
1. Select the network type being used by the access point, Master or Ad-Hoc.
2. Select the Authentication type, Open or Shared Key depending on the method used by the access p oint. Not all access
points have this option, in which case t hey probably u se open system, also sometimes c alled SSID Authentication.
43