Axis 233D User Manual page 44

Network dome camera
Hide thumbs Also See for 233D:
Table of Contents

Advertisement

AXIS 233D - System Options
44
Clients and servers in an 802.1X network may need to authenticate each other by some
means. In the Axis implementation this is done with the help of digital certificates
provided by a Certification Authority (CA). These are then validated by a third-party
entity, such as a RADIUS server, examples of which are Free Radius and Microsoft Internet
Authentication Service.
To perform the authentication, the RADIUS server uses various EAP methods/protocols, of
which there are many. The one used in the Axis implementation is EAP-TLS
(EAP-Transport Layer Security).
The AXIS network video device presents its certificate to the network switch, which in turn
forwards this to the RADIUS server. The RADIUS server validates or rejects the certificate
and responds to the switch, and sends its own certificate to the client for validation. The
switch then allows or denies network access accordingly, on a pre-configured port.
The authentication process
3
1. A CA server provides the required signed certificates.
2. The Axis video device requests access to the protected network at the network
switch. The switch forwards the video device's CA certificate to the RADIUS server,
which then replies to the switch.
3. The switch forwards the RADIUS server's CA certificate to the video device, which
also replies to the switch.
Axis video device
Q: Certificate OK?
A: OK
Protected network
2
Q: Certificate OK?
Network
A: OK
switch
4
RADIUS
server
Certificate
1
Certificate
Authority (CA)
Certificate

Advertisement

Table of Contents
loading

Table of Contents