| Configuring the Security Features |
196
Enabling the User Role
Procedure
1.
On your web user interface, go to
Security
>
Security
.
2.
Configure and save the following settings:
Parameter
Description
Configuration Method
User Type
Select User.
Web user interface
User Mode
Enables the user role.
Web user interface
User Password
Configure a user password.
Note
: the system supports ASCII
characters 32-126 (0x20-0x7E).
You can also leave the password
blank.
Web user interface
Configuring the Auto Logout Time
The system will log out of the web user interface automatically after being inactive for a period of time. You need to
re-enter the login credentials to login. You can change the auto logo time.
Procedure
1.
On your web user interface, go to
Setting
>
General
>
General Information
>
ReLogOffTime(1-1000min)
.
2.
Configure and save the following settings:
Parameter
Description
Configuration Method
ReLogOffTime (1-1000min)
Specify the inactive time (in
minutes) before the system logs
out of the web user interface
automatically.
Default
: 5 minutes.
Web user interface
Transport Layer Security (TLS)
Transport Layer Protocol (TLS) is a commonly used protocol for ensuring communications privacy and managing
the security of the message transmission. When secured by the TLS protocol, the device can transmit the data and
communicate safely.
The TLS protocol includes two protocol groups: the TLS handshake protocol and the TLS record protocol. The TLS
handshake protocol allows the server and the client to authenticate with each other before negotiating about the data,
the encryption algorithms and the encrypted keys. The TLS Record Protocol completes the actual data transmission
and ensures the data integrity and confidentiality. The TLS protocol uses an asymmetric encryption algorithm to
exchange keys, a symmetric encryption algorithm to ensure data confidentiality, and the MAC algorithms to ensure
data integrity.
•
•
•