Avigilon H4VI-RO1-IR Interface User Manual page 17

Video intercom camera
Table of Contents

Advertisement

Note:
 
FIPS 140-2 Level 1 requires the purchase of a FIPS camera license.
l
 
FIPS 140-2 Level 3 on cameras with an onboard TPM requires the purchase of a FIPS camera
l
license.
 
FIPS 140-2 Level 3 on cameras without an onboard TPM requires the purchase of a CRYPTR
l
micro card. The CRYPTR card must be inserted into the camera's SD card slot before it can be
enabled.
 1. Go to the Security Settings page.
 2. In the Encryption Engine drop-down list, select the type of encryption to use:
 
OpenSSL is the default option for encryption.
l
 
FIPS 140-2 enables FIPS 140-2 level 1 encryption.
l
 
NXP TPM enables the onboard trusted platform module (TPM) to securely store your
l
encryption keys. Only cameras that come with the onboard NXP TPM will display this option.
 
CRYPTR micro enables the installed CRYPTR card to securely store your keys, meeting FIPS
l
140-2 level 3 requirements.
Important: Switching the setting to CRYPTR micro will cause the camera to generate a
new key and self-signed certificate. Some certificate and key management may be
required when you enable this setting. If your previous keys were signed by a
certificate authority (CA), the newly generated keys will also need to be signed by the
CA to keep the connection to your camera secure.
The Camera Configuration Tool (CCT) can be used to generate a Certificate Signing
Request (CSR) from the camera and to upload the signed certificate back to the
camera. For more information, see the Camera Configuration Tool User Guide.
 3. Click Apply to save your settings.
Important: Changing this setting on your camera will require your camera to reboot and you
will lose the video stream for that time. Avigilon recommends that you apply this setting
during non-critical operating times.
Once CRYPTR encryption is enabled, you can access the CryptR Log page by selecting it in the side menu.
When the CRYPTR micro's internal audit log reaches 80% capacity, entries are automatically pulled from the
CRYPTR micro, logged to the camera's syslog, and the CRYPTR micro's audit log is cleared out. The CryptR
Log page will only show entries that haven't been logged to the camera's syslog yet.
Security Settings
13

Advertisement

Table of Contents
loading

This manual is also suitable for:

H4

Table of Contents