User`s manual

42
AXIS 210A/211A - System Options
Referrals - To prevent unauthorized clients from including the video stream from the
cameras into external Web pages, check the Referrals checkbox and enter the IP address or
host name of the computer that hosts the Web pages with the included video stream.
Several IP addresses/host names can be defined and are separated by semicolons (;). This
option is only applicable to Motion JPEG video streams.
Notes:
If the referrals feature is enabled and you wish to also allow normal access to the Live View page, the
product's own IP address or host name must be added to the list of allowed referrers.
Restricting referrers has no effect on an MPEG-4 video stream. To restrict an MPEG-4 stream, IP address fil-
tering must be enabled.
Restricting referrers is of greatest value when not using IP address filtering. If IP address filtering is used,
then the allowed referrers are automatically restricted to those allowed IP addresses.
HTTPS
The AXIS 210A and the AXIS 211A both support encrypted browsing using HTTPS.
A self-sign
ed certificate can be used until a Certificate Authority-issued certificate has
been obtained. Click the Create self-signed Certificate button to install a self-signed
certificate. Although self-signed certificates are free and offer some protection, true
security is implemented after the installation of a signed certificate issued by a certificate
authority.
A signed certificate can be obtain
ed from an issuing Certificate Authority by clicking the
Create Certificate Request button. When the signed certificate is returned, click the Install
signed certificate button to import the certificate. The properties of any certificate request
currently resident in the camera or installed can also be viewed by clicking the
Properties... button. The HTTPS Connection Policy must also be set in the drop-down lists
to enable HTTPS in the camera.
For more information, please refer to the online help.
IEEE 802.1x
IEEE 802.1x is an IEEE standard for port-based Network Admission Control. It provides
authentication to devices attached to a network port (wired or wireless), establishing a
point-to-point connection, or, if authentication fails, preventing access on that port.
802.1x is based on EAP (Extensible Authentication Protocol).
In a 802.1x enabled network switch, clients equipped with the
correct software can be
authenticated and allowed or denied network access at the Ethernet level.