EasyManuals Logo

2N IP intercom User Manual

2N IP intercom
198 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #178 background imageLoading...
Page #178 background image
2N TELEKOMUNIKACE a.s., www.2n.cz 178/198
1.
a.
b.
c.
d.
5.5.4 Certificates
Some network services use the Transaction Layer Security (TLS) 2N IP intercom
protocol for communication with other LAN devices to prevent third parties from
monitoring and/or modifying the communication contents. Unilateral or bilateral
authentication based on certificates and private keys is needed for establishing
connections via TLS.
The following intercom services use the TLS protocol:
Web server (HTTPS)
E-mail (SMTP)
802.1x (EAP-TLS)
SIP
The allows you to load up to three sets of trusted certificates, which 2N IP intercom
help authenticate LAN devices for communication with the intercom, and three sets of
user certificates and private keys for communication encryption.
Each certificate-requiring service can be assigned one of the three certificate sets
available; refer to the , and subsections. The certificates Web Server E-Mail Streaming
can be shared by the services.
2N IP accepts the DER (ASN1) and PEM certificate formats.intercom
Upon the first power up, the intercom automatically generates the Self Signed
for the and without forcing you to load a certificate and private key Web Server E-Mail
certificate and private key of your own.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the 2N IP intercom and is the answer not in the manual?

2N IP intercom Specifications

General IconGeneral
Tamper SwitchYes
DimensionsVaries by model
WeightVaries by model
ConnectivityWi-Fi
Power Supply12V DC
Operating Temperature60°C
ProtocolsSIP, ONVIF
InterfacesEthernet
KeypadOptional
Card ReaderOptional
DisplayYes (selected models)

Related product manuals