| Configuring the Security Features | 196Enabling the User RoleProcedure1. On your web user interface, go to Security > Security.2. Configure and save the following settings:Parameter Description Configuration MethodUser Type Select User. Web user interfaceUser Mode Enables the user role. Web user interfaceUser Password Configure a user password.Note: the system supports ASCIIcharacters 32-126 (0x20-0x7E).You can also leave the passwordblank.Web user interfaceConfiguring the Auto Logout TimeThe system will log out of the web user interface automatically after being inactive for a period of time. You need tore-enter the login credentials to login. You can change the auto logo time.Procedure1. On your web user interface, go to Setting > General > General Information > ReLogOffTime(1-1000min).2. Configure and save the following settings:Parameter Description Configuration MethodReLogOffTime (1-1000min) Specify the inactive time (inminutes) before the system logsout of the web user interfaceautomatically.Default: 5 minutes.Web user interfaceTransport Layer Security (TLS)Transport Layer Protocol (TLS) is a commonly used protocol for ensuring communications privacy and managingthe security of the message transmission. When secured by the TLS protocol, the device can transmit the data andcommunicate safely.The TLS protocol includes two protocol groups: the TLS handshake protocol and the TLS record protocol. The TLShandshake protocol allows the server and the client to authenticate with each other before negotiating about the data,the encryption algorithms and the encrypted keys. The TLS Record Protocol completes the actual data transmissionand ensures the data integrity and confidentiality. The TLS protocol uses an asymmetric encryption algorithm toexchange keys, a symmetric encryption algorithm to ensure data confidentiality, and the MAC algorithms to ensuredata integrity.• Supported Cipher Suites• TLS Transport Protocol• Managing the Trusted Certificates List