Cisco Systems 4300E manual 802.1x Settings Window

Page 51

Chapter 3 Configuring and Managing the IP Camera

Network Setup Windows

802.1x Settings Window

The 802.1x Settings window provides options for configuring 802.1x authentication for the IP camera. These settings require that RADIUS be configured on your network to provide the client authentication.

To display the 802.1x Settings window, access the configuration windows as described in the “Performing the Initial Setup of the IP Camera” section on page 2-5, click Network Setup, then click 802.1x (RADIUS).

If you change any options in this window, you must click the Save Settings button to save the changes. If you do not click this button, changes are not retained when you exit the window. Save Settings appears at the bottom of the window. You may need to scroll down to it.

Table 3-14describes the options in the 802.1x Settings window.

Table 3-14 802.1x Settings Window Options

 

 

Option

Description

 

 

 

 

 

 

 

 

 

802.1x Settings Area

 

 

 

 

 

 

 

 

 

 

Enable 802.1x

Check this check box to enable 802.1x authentication for the IP camera.

 

 

 

 

 

 

Protocol Type

Choose the protocol for 802.1x authentication. Options are EAP-TLS,

 

 

 

EAP-TTLS,EAP-PEAP, and EAP-FAST.

 

 

 

The remaining fields in this window change depending on the protocol type

 

 

 

that you choose.

 

 

 

 

 

 

EAP-TLS Configuration Options

 

 

Note These options appear if you select the protocol type EAP-TLS.

 

 

 

 

 

 

User Name

Enter the user name that the IP camera uses to access the RADIUS server.

 

 

 

 

 

 

Device (Client)

Path and folder where the device certificate for the IP camera is stored. You

 

 

Certificate

can click Browse to find this location.

 

 

 

After you enter this information, click Upload to upload the certificate to the

 

 

 

IP camera.

 

 

 

 

 

 

Password (for Private

If the private key in the device certificate is password protected, enter the

 

 

Key)

password that is required to unlock the private key.

 

 

 

 

 

 

Root CA Certificate

Path and folder where the root certificate that is required for 802.1x

 

 

 

authentication is stored. You can click Browse to find this location.

 

 

 

After you enter this information, click Upload to upload the certificate to the

 

 

 

IP camera.

 

 

 

 

 

 

EAP-TTLS Configuration Options

 

 

Note These options appear if you select the protocol type EAP-TTLS.

 

 

 

 

 

 

Inner Authentication

Choose an inner authentication method for EAP-TTLS. Options are

 

 

 

MS-CHAP,MS-CHAP v2, PEAP, and EAP-MDS.

 

 

 

 

 

 

User Name

Enter the user name that the IP camera uses to access the RADIUS server.

 

 

 

 

 

 

Password

Enter the password that the IP camera uses to access the RADIUS server.

 

 

 

 

 

 

Anonymous ID

Optional. Unsigned public identifier to be used instead of a user name for

 

 

 

logging in to the RADIUS server.

 

 

 

 

 

 

Validate Server

Check this check box if you want the identity of the RADIUS server to be

 

 

Certificate

validated.

 

 

 

 

 

 

 

 

 

Cisco Video Surveillance 4300E and 4500E High-Definition IP Camera User Guide

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OL-25230-02

 

 

3-25

 

 

 

 

 

Image 51
Contents Text Part Number OL-25230-02 Americas HeadquartersCopyright 2009-2011 Cisco Systems, Inc. All rights reserved N T E N T S Log Windows Organization OverviewOL-25230-02 Overview IP Camera FeaturesOverview IP Camera Features IP Camera Physical Details Adjusting Back Focus on the IP Camera section onRear of IP Camera Side of IP Camera Described in the Resetting the IP Camera section onPackage Contents DC Auto Iris Lens Connector PinoutsGetting Started Installing the IP CameraAction Explanation Action Explanation OL-25230-02 Performing the Initial Setup of the IP Camera ProcedureBefore you Begin Protocol//ipaddress Accessing the IP CameraHttp//203.70.212.521024 Https//192.168.0.100Https//203.70.212.521024 Http//203.70.212.52Understanding the IP Camera User Interface IP Camera Window LinksLink Description Network Status IP Camera WindowsField Description General InformationChannel 1 and Channel Adjusting Back Focus on the IP CameraManaging the Local Storage Powering the IP Camera On or OffResetting the IP Camera Reset Type Procedure RemarksClick the Video Surveillance IP Camera Utility link Formatting the USB Flash DriveWhat to Do Next Downloading Encrypted Video Files from the USB Flash DriveDeleting Encrypted Video Files from the USB Flash Drive Click Format USBDecrypting Encrypted Video Files Accessing Navigating the Configuration Windows Configuring and Managing the IP CameraSnmp Feature Setup WindowsStreaming Settings Window Resolution Primary fps Secondary fpsStreaming Streaming Setup Area Option DescriptionCurrent Channel Area Video Area Camera Settings Window Analog Video AreaAudio Area Day Night Filter Area Video Adjustments AreaMicrophone Area Described in , Viewing Live VideoVideo Overlay Settings Window Video OverlayText Overlay Area IO Ports Settings Window Input Ports AreaOutput Ports Pan Tilt Settings Window RS-232 SettingsPan/Tilt Area Event Notification Window Event Triggering Area Clear All button Event Scheduling AreaUndo Set All buttonEmail Notification Area FTP Notification Area Patrol Sequence Window Patrol Sequence Area Network Setup Windows Basic Settings WindowAnalytics Windows Basic Settings Area IP Addressing WindowBasic Device Operations Area IP Addressing Area Time Settings WindowClone PC Time button Set Time Mode AreaYou click Save Settings Local Time AreaShow Neighbors button Discovery Settings WindowNTP Server Settings Area Cisco Discovery Protocol CDP AreaSnmp Settings Window Snmp v2c AreaSnmp v3 Area 8000000901IPv4addresshex 802.1x Settings Window IP Filter Settings Window EAP-PEAP Configuration OptionsEAP-FAST Configuration Options Filter Entries Area QoS Settings WindowClass of Service CoS Area IP Filter AreaAdministration Windows Differentiated Services DiffServ AreaAccount Initialization Window Administrator Accounts Area Access Protocols AreaSSH User List Area User Settings WindowMaintenance Settings Window Change buttonDelete button Device Configuration Area Factory Default Area Restore buttonReset button Reboot Area Reboot buttonFirmware Settings Window Addressing Window section onDevice Information Area Details button Firmware Maintenance AreaUpgrade button Device Processes WindowPassword Complexity Window Log Setup Settings Window, Local Log Window,Log Windows Log Setup Settings Window Local Log Settings AreaSyslog Settings Area Option Description Local Log Window Log List AreaLog messages, see -25 on Codeclost AuthenticationfailedAuthorizationfailed Explanation SeverityConfiguploaded ConfigsavefailedConfigsaved ConfiguploadfailedOutputtworeset InputtworesetLogin OutputoneresetServerlost TimedstswitchTimeregswitch ServercontactedVideo controls Control DescriptionVideo image controls Streaming Settings Window section onMirror button Image tools Hotspot Zoom buttonHotspot Pan/Tilt Save Snapshot buttonAudio controls Full Screen buttonPreset button Presets controlsSet Current Preset as Add Preset PositionMotion detection Pan/tilt speed controlsMotion detection controls Enable Motion Detection check box Full Screen check Save Settings buttonTroubleshooting Troubleshooting Numerics IN-2 Https HttpLED See also videoIN-5 IN-6 IN-7 IN-8
Related manuals
Manual 86 pages 63.52 Kb

4300E specifications

The Cisco Systems 4300E Series is an advanced integrated service router designed to deliver high-performance, scalable, and secure networking solutions for enterprises. This versatile platform caters to a wide range of applications while ensuring reliability and flexibility in dynamic environments.

One of the standout features of the Cisco 4300E is its modular architecture, which allows organizations to tailor the router to their specific needs by adding or changing modules. This modularity is crucial for enterprises that require agility to adapt to evolving network demands. The router supports various network interface modules (NIMs), service modules (SMs), and high-speed WAN interface cards (HWICs), enabling seamless integration of various interfaces and features.

The Cisco 4300E is designed with performance in mind, capable of delivering high throughput and low latency, which is essential for applications such as voice, video, and data traffic. It supports robust performance with the capability of handling up to 2 Gbps of throughput, making it suitable for mid-sized to large enterprise branch offices.

Another key technology associated with the 4300E is Cisco’s Unified Communications and Collaboration suite. This integration facilitates voice, video, and messaging services across the network, ensuring efficient communication within organizations. Security features include advanced threat protection through Cisco’s integrated security services, such as firewall capabilities, VPN support, and intrusion prevention, ensuring that sensitive data remains secure.

The Cisco 4300E also supports Cisco’s DNA (Digital Network Architecture) capabilities, allowing for automation, analytics, and enhanced network visibility. This integration empowers network administrators to manage their infrastructure proactively, ensuring optimal performance and quick resolution of issues.

Additionally, the router is equipped with enhanced Quality of Service (QoS) capabilities, enabling prioritization of critical applications and traffic types. This feature is vital for maintaining high performance across diverse application requirements.

In conclusion, the Cisco 4300E Series routers stand out for their modular architecture, high performance, integrated security, and support for advanced networking technologies. These characteristics make them ideal for enterprises seeking a robust, flexible, and secure solution to meet their networking needs in an ever-evolving digital landscape. With the ability to seamlessly integrate various services and applications, the 4300E is a reliable choice for any organization looking to future-proof its network infrastructure.