Axis Communications M1034-W Security Camera User Manual


 
AXIS M1034-W Network Camera
System Options
For more information on certicates for wireless networks, see
Certicates, on page 47
.
EAP-PEAP/MSCHAPv2
The authentication protocol EAP-PEAP/MSCHAPv2 (Extensible Authentication Protocol - Protected Extensible Authentication
Protocol/Microsoft Challenge Handshake Authentication Protocol) allows the client to authenticate the network using a digital
certicate provided by a Certication Authority. The network authenticates the client using an identity and a password. To gain
access to the protected network, the Axis product presents its identity and password to the network access point. If these credentials
are approved, the access point allows access on a precongured port.
Important
To ensure successful certicate validation, time synchronization should be performed on all clients and servers prior to
conguration.
To congure the wireless settings using the WPA
TM
-/WPA-Enterprise security method and EAP-PEAP/MSCHAPv2:
1. Enter the user Identity associated with your certicate.
2. Enter the Password foryouruseridentity.
3. Select the PEAP Version (0 or 1) as used in the access point.
4. Select the PEAP Label that the access point uses when using PEAP version 1. Select 1 to use client EAP encryption; select
2 to use client PEAP encryption.
5. Select the EAPOL version (1 or 2) as used in the a ccess point.
6. Click Save.
For more information on certicates for wireless networks, see
Certicates, on page 47
.
WEP
The security method WEP (Wired Equiva lent P rivacy) can be used to help secu
re a wireless network. However, WEP has some aws,
which makes it more vulnerable to attacks and WPA
TM
-WPA-Enterprise or WPA-/WPA2
TM
–PSK a better choice.
To congure the wireless settings using the WEP security method:
1. Select the network type being used by the access point, Master or Ad-Hoc.
2. Select the Authentication type, Open or Shared Key depending on the method used by the access point. N ot all access
points have this option, in which case they probably use open system, also sometimes called SSID Authentication.
3. Select the Key length, 64 bit or 128 bit used for the wireless encryption.
4. Select the Key type, depending on the key type used by the access point and enter the key in the corresponding key elds.
Manual allows you to manually enter the hex key. ASCII requires the string to be exactly ve characters for 64–bit WEP and
13 characte
rs for 128–bit WEP. The Passphrase can contain up to 31 characters. In 64–bit WEP the passphrase generates
four different keys. For 128–bit WEP, only one key is generated, which then is replicated for all four keys.
The Active transmit key selects which of the four keys the Axis product uses when transm itting information.
5. Click Save.
No Security
The No security option provides no protection against attacks. It is not a recommended method and should only be used during
short periods and exceptional cases.
To congure the wireless settings with no security:
46