9
When you click the “Update”, the device will try to enable / disable the selected ports on the network router.
The status indicator icons will show the progress of the operation. Hovering over the status icon will display more
status information.
5.5.3 HTTPS
The user interface of the device can be accessed via the secure HTTPS protocol. Requirement for HTTPS:
• Device must have internet access to automatically renew the certificate;
• Device must be accessed using a domain URL (not IP address);
The domain name created for each device contains the unique serial number. See “HTTPS URL” in Figure
14. Use this field’s value to access the device securely.
Figure 14. HTTPS configuration.
The domain name points to the local IP address of the device (it is not necessary to have a public IP
address). This secure access feature works even if the DHCP client is used. As soon as the device IP address is
changed, the DNS records of the domain name are changed automatically. An hour or more may be required for
updates of these records for your internet provider.
The SSL certificate is valid for 3 months and is automatically issued for the device domain and will be
renewed automatically. Default HTTPS port 443 is used for a secure connection, but can be changed by the user.
The domain can also point to the public IP address as well (see DNS type parameter in Figure 14). Additional
router forwarding is required.
The “Force redirection” flag will automatically redirect your WEB browser to a secure connection, even if you
try to access it using an IP address. Otherwise, a secure connection link will be displayed on the login page for
simpler access.
NOTE: If the redirection fails for any reason (certificate expired, incorrect router forwarding, etc), forced
redirection can be disabled by adding a question mark after the URL. For example: http://192.168.1.10/?
5.6 System menu
This menu provides additional system parameters related to system management. Depending on the user
access rights, some items in this menu may not be available.
5.6.1 Event logs
Various important events, errors, warnings will be displayed in the system log (see Figure 15). Each record
has its own type that can be used to filter only certain messages.
Figure 15. Logs filtering.
Just check the “Logs filtering” checkboxes. Messages will be filtered automatically. The “Erase logs” button
will delete all logs from the system.