| Security Features | 86
Permitted Values
0-Disabled, the device will trust the server no matter whether the certificate sent by the
server is valid or not.
1-Enabled, the device will authenticate the server certificate based on the trusted
certificates list. Only when the authentication succeeds, will the device trust the server.
Default 1
Web UI Security > Trusted Certificates > Only Accept Trusted Certificates
Parameter static.security.ca_cert
[1]
<y0000000000xx>.cfg
Description It configures the type of certificates in the Trusted Certificates list for the device to
authenticate for TLS connection.
Permitted Values
0-Default Certificates
1-Custom Certificates
2-All Certificates
Default 2
Web UI Security > Trusted Certificates > CA Certificates
Parameter static.security.cn_validation
[1]
<y0000000000xx>.cfg
Description It enables or disables the device to mandatorily validate the CommonName or
SubjectAltName of the certificate sent by the server.
Permitted Values
0-Disabled
1-Enabled
Default 0
Web UI Security > Trusted Certificates > Common Name Validation
Parameter static.trusted_certificates.url <y0000000000xx>.cfg
Description
It configures the access URL of the custom trusted certificate used to authenticate the
connecting server.
Example:
static.trusted_certificates.url = http://192.168.1.20/tc.crt
Note: The certificate you want to upload must be in *.pem, *.crt, *.cer or *.der format.
Permitted Values URL within 511 characters
Default Blank
Web UI Security > Trusted Certificates > Upload Trusted Certificate File
Parameter static.trusted_certificates.delete <y0000000000xx>.cfg
Description
It deletes all uploaded trusted certificates.
Permitted Values http://localhost/all
Default Blank
Parameter static.security.dev_cert
[1]
<y0000000000xx>.cfg
Description It configures the type of the device certificates for the device to send for TLS
authentication.