Axis 2N Access Unit Configuration Manual page 87

Hide thumbs Also See for 2N Access Unit:
Table of Contents

Advertisement

Encryption Key Administration
The
2N Access Unit
secondary ones. A mobile device can use any of the 4 keys for communication
encryption. The encryption keys are fully controlled by the system administrator. It is
recommended that the encryption keys should be periodically updated for security
reasons, especially in the event of a mobile device loss or intercom configuration leak.
Note
The encryption keys are generated automatically upon the 2N Access
Unit
first launch and saved into the
recommend you to re-generate the encryption keys manually before the
first use to enhance security.
The primary key can be re-generated any time. Thus, the original primary key
becomes the first secondary key, the first secondary key becomes the second
secondary key and so on. Secondary keys can be deleted any time.
When a key is deleted, the
to authenticate themselves unless they have updated the encryption keys in their
mobile devices before deletion. The mobile device keys are updated at every use of
®
the
2N
Mobile Key
List of Parameters
Location ID – set a unique identifier for the location in which the selected
encryption key set is valid.
Export – push the button to export the location ID and current encryption keys
into a file. Subsequently, the exported file can be imported to another device.
Devices with identical location IDs and encryption keys form a so-called location.
Import – push the button to import the location ID and current encryption keys
from a file exported from another
location IDs and encryption keys form a so-called location.
2N TELEKOMUNIKACE a.s., www.2n.cz
can keep up to 4 valid encryption keys: 1 primary and up to 3
®
2N
Mobile Key
application.
2N Access Unit
users that still use this key will not be able
2N Access Unit
. Devices with identical
configuration file. We
87/128

Advertisement

Table of Contents
loading

Table of Contents