User's Manual

Table Of Contents
Modify Modify the selected IP address in the list.
Delete Delete the selected IP address in the list.
5. Click Save.
12.13.4 Set SSH
SSH is a protocol to ensure security of remote login. This seng is reserved for professional
maintenance personnel only.
Steps
1. Go to Conguraon → System → Security → Security Service .
2. Check Enable SSH.
3. Click Save.
12.13.5 Set HTTPS
HTTPS is a network protocol that enables encrypted transmission and identy authencaon,
which improves the security of remote access.
Steps
1. Go to Conguraon → Network → Advanced Sengs → HTTPS .
2. Check Enable .
3. Click Delete to recreate and install
cercate.
Create and install self-signed
cercate Refer to Create and Install Self-signed
Cercate
Create cercate request and install
cercate
Refer to Install CA Cercate
4. Click Save.
Create and Install Self-signed
Cercate
Steps
1. Check Create Self-signed Cercate.
2. Click Create.
3. Follow the prompt to enter Country, Hostname/IP, Validity and other parameters.
4. Click OK.
Result
The device will install the self-signed
cercate by default.
Thermal & Opcal Bi-spectrum Network Camera User Manual
71