Cisco WVC200 - Wireless-G PTZ Internet Camera Administration Manual page 13

Small business wireless-g ptz internet video camera with 2-way audio
Hide thumbs Also See for WVC200 - Wireless-G PTZ Internet Camera:
Table of Contents

Advertisement

Planning Your Wireless Network
Security Threats Facing Wireless Networks
WVC210 Wireless-G PTZ Internet Video Camera With 2-Way Audio Administration Guide
MAC Addresses—Enable MAC Address filtering. MAC addresses are unique
identification numbers that are assigned to a device at the factory. MAC Address
filtering allows you to provide access only to devices that you specify. This feature
makes it harder for a hacker to access your network with a random MAC Address.
WEP Encryption—Wired Equivalent Privacy (WEP) is an older encryption method
that is not considered to be secure and can easily be broken. Select this option
only if you need to allow access to devices that do not support WPA or WPA2.
If you must use WEP, take the following precautions to make a hacker's job more
difficult:
Use the highest level of encryption possible
Use "Shared Key" authentication
Change your WEP key regularly
WPA/WPA2 Personal—WPA stands for Wi-Fi Protected Access, which is a
security standard stronger than WEP encryption. A network encrypted with WPA/
WPA2 is more secure than a network encrypted with WEP, because WPA/WPA2
uses dynamic key encryption. To protect the information as it passes over the
airwaves, you should enable the highest level.
WPA/WPA Enterprise—Enterprise refers to using RADIUS server for
authentication, while RADIUS stands for Remote Authentication Dial-In User
Service. This type of authentication requires some advanced expertise because it
involves setting up a RADIUS server for authentication and, in some cases,
creation of certificates for both the RADIUS server and the camera.
If you are using WPA/WPA2 Enterprise security, you will need to upload security
certificates to the camera. Certificates must be in the following format:
Root certificate: DER encoded binary x.509 (CER/PEM)
User certificate: Personal Information Exchange (PKCS#12(.PFX))
Implementing encryption may have a negative impact on your network's
performance, but if you are transmitting sensitive data over your network,
encryption should be used.
These security recommendations should help keep your mind at ease while you
are enjoying the most flexible and convenient technology Cisco has to offer.
2
7

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wvc210

Table of Contents