User Manual

72
IV. Set SSH
SSH is a protocol to ensure security of remote login. This setting is reserved for professional maintenance personnel only.
Steps
1. Go to Configuration System Security Security Service.
2. Check Enable SSH.
3. Click Save.
V. Set HTTPS
HTTPS is a network protocol that enables encrypted transmission and identity authentication, which improves the security of remote
access.
Steps
1. Go to Configuration Network Advanced Settings HTTPS.
2. Check Enable.
3. Click Delete to recreate and install certificate.
Create and install self-signed
certificate
Refer to Create and Install Self-signed Certificate
Create certificate request
and install certificate
Refer to Install Authorized Certificate
4. Click Save.
Create and Install Self-signed Certificate
Steps
1. Check Create Self-signed Certificate.
2. Click Create.
3. Follow the prompt to enter Country, Hostname/IP, Validity and other parameters.
4. Click OK.
Result
The device will install the self-signed certificate by default.
Install Authorized Certificate
If the demand for external access security is high, you can create and install authorized certificate via HTTPS protocol to ensure the
data transmission security.
Steps
1. Select Create certificate request first and continue the installation.
2. Click Create.
3. Follow the prompt to input Country, Hostname/IP, Validity and other parameters.
4. Click Download to download the certificate request and submit it to the trusted authority for signature.
5. Import certificate to the device.
Select Signed certificate is available, start the installation directly. Click Browse and Install to import the certificate to the
device.
Select Create the certificate request first and continue the installation. Click Browse and Install to import the certificate to
the device.
6. Click Save.