Cisco WVC210 - Small Business Wireless-G PTZ Internet Video Camera Administration Manual page 45

Wireless-g ptz internet video camera with 2-way audio
Hide thumbs Also See for WVC210 - Small Business Wireless-G PTZ Internet Video Camera:
Table of Contents

Advertisement

Configuring the Cisco WVC210 Internet Camera Software
Setup > Basic Settings
WVC210 Wireless-G PTZ Internet Video Camera With 2-Way Audio Administration Guide
WPA Personal
This method offers two encryption methods, TKIP (default) and AES with dynamic
encryption keys. Select the type of encryption method you want to use, TKIP or
AES. Enter the Shared Key, which can have 8 to 63 characters. Then enter the Key
Renewal Timeout, which instructs the device how often it should change the
encryption keys.
WPA2 Personal
This method always set to AES encryption methods, with dynamic encryption
keys. Enter the Shared Key, which can have 8 to 63 characters. Then enter the Key
Renewal Timeout, which instructs the device how often it should change the
encryption keys.
WPA/WPA2 Enterprise
WPA2 Enterprise requires some advanced expertise because it involves setting
up a RADIUS server for authentication and, in some cases, creation of certificates
for both the RADIUS server and the camera.
If you are using WPA/WPA2 Enterprise security, you will need to upload security
certificates to the camera. Certificates must be in the following format:
Root certificate: DER encoded binary x.509 (CER/PEM)
User certificate: Personal Information Exchange (PKCS#12(.PFX))
In WPA/WPA2 Enterprise, you can choose your protocol type. Select between
EAP-TLS and EAP-TTLS.
EAP-TLS
With EAP-TLS you enter the User ID and Password for the RADIUS server and
choose where the camera should check for the Server and User certificate.
User ID—The user ID used to login to your RADIUS server.
Root CA—A root certificate is an unsigned public key certificate, or a self-
signed certificate, which implies that you trust your browser's publisher to
include correct root certificates, and in turn the certificate authorities it
trusts, and anyone to whom the CA may have issued a certificate-issuing-
certificate, to faithfully authenticate the users of all their certificates.
User CA—A user certificate is a signed private key certificate, which
implies that you trust your browser's publisher to include correct user
certificates, and in turn the certificate authorities it trusts, and only user to
8
39

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents