User Manual

Table Of Contents
Go to Conguraon → System → Security → Advanced Security . Check Security Reinforcement,
and click Save.
9.17.9 SSH
Secure Shell (SSH) is a cryptographic network protocol for operang network services over an
unsecured network.
The SSH funcon is disabled by default.
Cauon
Use the funcon with cauon. The security risk of device internal informaon leakage exists when
the funcon is enabled.
9.18 Cercate Management
It helps to manage the server/client cercates and CA cercate, and to send an alarm if the
cercates are close to expiry date, or are expired/abnormal.
Note
The funcon is only supported by certain device models.
9.18.1 Create Self-signed Cercate
Steps
1. Click Create Self-signed Cercate.
2. Follow the prompt to enter
Cercate ID, Country/Region, Hostname/IP, Validity and other
parameters.
Note
The cercate ID should be digits or leers and be no more than 64 characters.
3. Click OK.
4. Oponal: Click Export to export the cercate, or click Delete to delete the cercate to
recreate a
cercate, or click Cercate Properes to view the cercate details.
9.18.2 Create
Cercate Request
Before You Start
Select a self-signed
cercate.
Network Camera User Manual
82