User Manual
Pearl-2 User Guide                                      Configure network security
Configure network security
Pearl-2 supports 802.1x network security. You can choose the authentication method, upload user 
certificates and private key, as well as manage signed CA certificates using the Admin panel. You can also 
configure Pearl-2 to use HTTPS.
Topics include:
l Configure 802.1x network security and manage user certificates
l Manage CA and self-signed certificates
l Configure HTTPS
For higher security, we recommend setting admin, operator and viewer-level passwords on Pearl-2, see Set or 
change user passwords.
Configure 802.1x network security and manage user certificates
You can enable  802.1x security and configure the EAP method for Pearl-2 to use for secure network access 
using the Admin panel.  Supported EAPmethods include:
l PEAP (default)
l EAP-TLS
l EAP-TTLS
Important considerations
l If TLS authentication is used on the network, then you need to get a user certificate and a user private 
key from the network administrator and  upload those to Pearl-2 as part of this procedure. 
l Before you proceed with this setup, check that the network server's signed CA certificate appears in the 
list of CA certificates on Pearl-2 and is valid, see Manage CA and self-signed certificates. 
l If the network server's CA certificate doesn't appear in the list of signed CA certificates and you can't 
obtain a valid signed CA certificate for network server authentication, do not check Verify server's 
identity when performing this setup.
To configure 802.1x and upload the user certificate and user private key using the Admin panel:
1.  Login to the Admin panel as admin, see Connect to the Admin panel.
2.  From the Configuration menu, select Network. The Network configuration page opens.
3.  Under IEEE 802.1x, check Enabled and select an EAPmethod: PEAP, EAP-TLS, or EAP-TTLS.
103










