
AXIS T8705 Video Decoder
The device interface
Client certificate
: Select a client certificate to use IEEE 802.1x. The authentication server uses the certificate to validate the
client’s identity.
CA certificate
: Select a CA certificate to validate the authentication server’s identity. When no certificate is selected, the device
tries to authenticate itself regardless of what network it is connected to.
EAP identity
: Enter the user identity associated with the client certificate.
EAPOL version
: Select the EAPOL version that is used in the network switch.
Use IEEE 802.1x
: Select to use the IEEE 802.1x protocol.
Users
Add user
: Click to add a new user. You can add up to 100 users.
Username
: Enter a unique username.
New password
: Enter a password for the user. Passwords must be 1 to 64 characters long. Only ASCII printable characters (code
32 to 126) are allowed in the password, for example letters, numbers, punctuation, and some symbols.
Repeat password
: Enter the same password again.
Role
:
•
Administrator
: Has full access to all settings. Administrators can also add, update, and remove other users.
•
Operator
: Has access to all settings except:
-
All
System
settings.
•
Viewer
: Has access to:
-
Status
-
Display
The context menu contains:
Update user
: Edit the user’s properties.
Delete user
: Delete the user. You can’t delete the root user.
Logs
Reports and logs
Reports
•
View the device server report
: Click to show information about the product status in a pop-up window. The Access
Log is automatically included in the Server Report.
•
Download the device server report
: Click to download the server report. It creates a .zip file that contains a complete
server report text file in UTF–8 format, as well as a snapshot of the current live view image. Always include the server
report .zip file when you contact support.
Logs
•
View the system log
: Click to show information about system events such as device startup, warnings and critical
messages.
•
View the access log
: Click to show all failed attempts to access the device, for example when a wrong login
password is used.
14