User Manual

Table Of Contents
11.12.8 SSH
Secure Shell (SSH) is a cryptographic network protocol for operang network services over an
unsecured network.
The SSH
funcon is disabled by default.
Cauon
Use the funcon with cauon. The security risk of device internal informaon leakage exists when
the funcon is enabled.
11.12.9 Control Timeout Sengs
If this funcon is enabled, you will be logged out when you make no operaon (not including
viewing live image) to the device via web browser within the set meout period.
Go to Conguraon → System → Security → Advanced Security to complete sengs.
11.12.10
Cercate Management
It manages the server/client cercates and CA cercate of the device.
Server
Cercate/Client Cercate
Note
The device has default self-signed server/client cercate installed. The cercate ID is default.
Create and Install Self-signed Cercate
Steps
1.
Go to Conguraon → System → Security Cercate Management .
2.
Click Create Self-signed
Cercate.
3.
Input cercate informaon.
Note
The input cercate ID cannot be the same as the exisng ones.
4.
Click OK to save and install the cercate.
The created cercate is displayed in the Server/Client Cercate list.
If the cercate is used by certain funcons, the funcon name is shown in the column
Funcons.
Network Speed Dome User Manual
92