2n Helios IP Configuration Manual v2.7 Manuel d'utilisateur Page 100

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 115
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 99
1002N TELEKOMUNIKACE a.s., www.2n.cz
®
a.
b.
c.
d.
5.5.4 Certificates
Some network services use the Transaction Layer Security (TLS)2N Helios IP
®
protocol for communication with other LAN devices to prevent third parties from
monitoring and/or modifying the communication contents. Unilateral or bilateral
authentication based on certificates and private keys is needed for establishing
connections via TLS.
The following intercom services use the TLS protocol:
Web server (HTTPS)
E-mail (SMTP)
802.1x (EAP-TLS)
SIP
The intercom allows you to load up to three sets of trusted certificates,2N Helios IP
®
which help authenticate LAN devices for communication with the intercom, and three
sets of user certificates and private keys for communication encryption.
Each certificate-requiring service can be assigned one of the three certificate sets
available; refer to the , and subsections. TheWeb Server E-Mail Streaming
certificates can be shared by the services.
2N Helios IP
®
accepts the DER (ASN1) and PEM certificate formats.
Upon the first power up, the intercom automatically generates the Self Signed
for the and without forcing you tocertificate and private key Web Server E-Mail
load a certificate and private key of your own.
Refer to the tables below for the current list of trusted and user certificates:
Note
If you use the Self Signed certificate for encryption of the intercom web
server browser communication, the communication is secure, but the
browser will warn you that it is unable to verify the intercom certificate
validity.
Vue de la page 99
1 2 ... 95 96 97 98 99 100 101 102 103 104 105 ... 114 115

Commentaires sur ces manuels

Pas de commentaire