| Security Features |
86
Permitted Values
0
-Disabled, the device will trust the server no matter whether the certificate sent by the
server is valid or not.
1
-Enabled, the device will authenticate the server certificate based on the trusted
certificates list. Only when the authentication succeeds, will the device trust the server.
Default
1
Web UI
Security
>
Trusted Certificates
>
Only Accept Trusted Certificates
Parameter
static.security.ca_cert
[1]
<y0000000000xx>.cfg
Description
It configures the type of certificates in the Trusted Certificates list for the device to
authenticate for TLS connection.
Permitted Values
0
-Default Certificates
1
-Custom Certificates
2
-All Certificates
Default
2
Web UI
Security
>
Trusted Certificates
>
CA Certificates
Parameter
static.security.cn_validation
[1]
<y0000000000xx>.cfg
Description
It enables or disables the device to mandatorily validate the CommonName or
SubjectAltName of the certificate sent by the server.
Permitted Values
0
-Disabled
1
-Enabled
Default
0
Web UI
Security
>
Trusted Certificates
>
Common Name Validation
Parameter
static.trusted_certificates.url
<y0000000000xx>.cfg
Description
It configures the access URL of the custom trusted certificate used to authenticate the
connecting server.
Example
:
static.trusted_certificates.url = http://192.168.1.20/tc.crt
Note
: The certificate you want to upload must be in *.pem, *.crt, *.cer or *.der format.
Permitted Values
URL within 511 characters
Default
Blank
Web UI
Security
>
Trusted Certificates
>
Upload Trusted Certificate File
Parameter
static.trusted_certificates.delete
<y0000000000xx>.cfg
Description
It deletes all uploaded trusted certificates.
Permitted Values
http://localhost/all
Default
Blank
Parameter
static.security.dev_cert
[1]
<y0000000000xx>.cfg
Description
It configures the type of the device certificates for the device to send for TLS
authentication.
Содержание T58A Teams
Страница 1: ......