TLS
For security reasons, your AirServer Connect is set up to serve out all requests over HTTPS. By default, AirServer connect will use a self-signed certificate, but this comes with certain drawbacks. Most noticeably, browsers will present you with the familiar certificate warning page when you first visit, and they will refuse to send any further requests until you dismiss the warning. Also, tools such as curl, and various programming language libraries, will refuse to send the requests until you dismiss their own warnings.
You have a few methods by which you can avoid this issue.
The simplest one is to use our IP address to hostname mapping. For example, if we have an AirServer Connect
which has been issued the 10.0.3.30 IP address. You can then visit http://10.0.3.30 which
will redirect you to a hostname that looks like https://10-0-3-30.int.airserver.com/. You can then use
10-0-3-30.int.airserver.com as your AirServer Connect hostname, so long as the device's IP address
remains the same.
Alternatively, you can install a TLS certificate on your AirServer Connect, which has been signed by a trusted Certificate Authority. Either one that is locally managed, or something like a wildcard certificate if you have that option available.
If you are unable to install a TLS certificate with a trusted root, your remaining option is to configure your tools to ignore the certificate errors.
For curl, you can use the --insecure command line argument to tell it to ignore TLS certificate errors.
If you are using the fetch API from a webbrowser, then you can work around the problem by first visiting any page on the AirServer Connect (such as the Device Management page) and instructing your browser to add a security exception for the self-signed certificate.
If you are using the fetch API from a node.js project, you can set an environment variable
NODE_TLS_REJECT_UNAUTHORIZED='0' or you can disable strict TLS npm config set strict-ssl=false.
If you are using https.request from node.js then you can use the ca option to trust the self-signed
certificate from your device.