AXIS M1075-L Box Camera
Learn more
3. In the list of authentication methods, select
WPA-Enterprise EAP-PEAP/MSCHAPv2
.
4. Enter the SSID associated with your certificate.
5. Enter the password for your user identity.
6. Select the
EAPoL version
(1, 2 or 3) as used in the access point.
7. Select the
Peap version
(0 or 1) as used in the access point.
8. Select the
Label
that the access point uses when using Peap version 1. Select 1 to use client EAP encryption; select
2 to use client PEAP encryption.
9. Select the
CA certificate
with which to validate the network/AP certificate.
10. Click
Save
.
Wireless certificates
Wireless network certificates are used to authenticate devices on a wireless network. Wireless networks using the WPA
TM
Enterprise
security method are protected by EAPoL (Extensible Authentication Protocol over Lan), which is part of the IEEE 802.1X standard. The
client authenticates the server using digital certificates. The server authenticates the client using digital certificates or a password
depending on the selected WPA Enterprise type.
Security
Signed firmware
Signed firmware is implemented by the software vendor signing the firmware image with a private key. When a firmware has this
signature attached to it, a device will validate the firmware before accepting to install it. If the device detects that the firmware
integrity is compromised, the firmware upgrade will be rejected.
Secure boot
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable
memory (boot ROM). Being based on the use of signed firmware, secure boot ensures that a device can boot only with authorized
firmware.
Axis Edge Vault
Axis Edge Vault is a secure cryptographic compute module which can be used for cryptographic operations on securely stored
certificates. Edge Vault provides tamper protected storage, enabling each device to protect its secrets. It sets a foundation for safe
implementation of more advanced security features.
TPM module
The TPM (Trusted Platform Module) is a component that provides cryptographic features to protect information from unauthorized
access. It is always activated and there are no settings you can change.
Axis device ID
Axis device ID works like a digital passport, unique for each device unit. It is securely and permanently stored in Edge Vault as a
certificate signed by Axis root certificate. Axis device ID is designed to prove the origin of the device, enabling a new level of
device trust through the life cycle of the product.
Signed video
Signed video ensures that video evidence can be verified as untampered without proving the chain of custody of the video file. Each
camera uses its unique Axis device ID, securely kept in Axis Edge Vault, to add a signature into the video stream. When the video
51