Axis Communications M1004-W Security Camera User Manual


 
AXIS M1004–W Network Camera
System Options
WPA
TM
-/WPA2
TM
-PSK
The security method WPA-/WPA2–PSK is designed for small networks and does not require an authentication server. The Axis
product uses a PSK (Pre-Shared Key) to authenticate with the access point. The key can be entered either as manual hex — a 64
hexdecimal number (0–9, A-F) — or a passphrase using 8–63 ASCII characters. The longer the passphrase, the more secure is the key.
To congure the wireless settings using the WPA-/WPA2–PSK security method:
1. Enter the required Passphrase for the access point.
2. Click Save.
WPA
TM
-/WPA-Enterprise
The security method WPA-/WPA-Enterprise is designed for large networks and requires an authentication server. The network is
protected by EAPOL (Extensible Authentication Protocol Over Lan).
Select the WPA-Enterprise type being used by the access point:
EAP-TLS. See page 49.
EAP-PEAP/MSCHAPv2. See page 49.
EAP-TLS
The authentication protocol EAP-TLS (Extensible Authentication Protocol - Transport Layer Security) allows the client and server to
authenticate each other using digital certicates provided by a Certication Authority. To gain access to the protected network, the
Axis product presents its certicate to the network access point. Access is granted if the certicate is approved.
Important
To ensure successful certicate validation, time synchronization should be performed on all clients and servers prior to
conguration.
To congure the wireless settings using the WPA
TM
-/WPA-Enterprise security method and EAP-TLS:
1. Enter the user Identity associated with your certicate.
2. Enter the Private key password for your user identity.
3. Select the EAPOL version (1 or 2) as used in the access point.
4. Click Save.
For more information on certicates for wireless networks, see Certicates on page 50.
EAP-PEAP/MSCHAPv2
The authentication protocol EAP-PEAP/MSCHAPv2 (Extensible Authentication Protocol - Protected Extensible Authentication
Protocol/Microsoft Challenge Handshake Authentication Protocol) allows the client to authenticate the network using a digital
certicate provided by a Certication Authority. The network authenticates the client using an identity and a password. To gain
access to the protected network, the Axis product presents its identity and password to the network access point. If these credentials
are approved, the access point allows access on a precongured port.
Important
To ensure successful certicate validation, time synchronization should be performed on all clients and servers prior to
conguration.
To congure the wireless settings using the WPA
TM
-/WPA-Enterprise security method and EAP-PEAP/MSCHAPv2:
1. Enter the user Identity associated with your certicate.
2. Enter the Password for your user identity.
49