User Manual

Table Of Contents
Modify Modify the selected IP address in the list.
Delete Delete the selected IP address in the list.
5. Click Save.
12.13.4 Set SSH
SSH is a protocol to ensure security of remote login. This seng is reserved for professional
maintenance personnel only.
Steps
1. Go to Conguraon → System → Security → Security Service .
2. Check Enable SSH.
3. Click Save.
12.13.5 Set HTTPS
HTTPS is a network protocol that enables encrypted transmission and identy authencaon,
which improves the security of remote access.
Steps
1. Go to Conguraon → Network → Advanced Sengs → HTTPS .
2. Check Enable .
3. Click Delete to recreate and install
cercate.
Create and install self-signed
cercate Refer to Create and Install Self-signed
Cercate
Create cercate request and install
cercate
Refer to Install CA Cercate
4. Click Save.
Create and Install Self-signed
Cercate
Steps
1. Check Create Self-signed Cercate.
2. Click Create.
3. Follow the prompt to enter Country, Hostname/IP, Validity and other parameters.
4. Click OK.
Result
The device will install the self-signed
cercate by default.
Thermal & Opcal Bi-spectrum Network Camera User Manual
71