User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- Chapter 7 Network Settings
- Chapter 8 Video/Audio Settings
- Chapter 9 Image Settings
- Chapter 10 Event Settings- 10.1 Basic Events
- 10.2 Smart Events- 10.2.1 Configuring Audio Exception Detection
- 10.2.2 Configuring Defocus Detection
- 10.2.3 Configuring Scene Change Detection
- 10.2.4 Configuring Face Detection
- 10.2.5 Configuring Intrusion Detection
- 10.2.6 Configuring Line Crossing Detection
- 10.2.7 Configuring Region Entrance Detection
- 10.2.8 Configuring Region Exiting Detection
- 10.2.9 Configuring Unattended Baggage Detection
- 10.2.10 Configuring Object Removal Detection
 
- 10.3 VCA Configuration
 
- Chapter 11 Storage Settings
- Chapter 12 Playback
- Chapter 13 Picture
- Chapter 14 Application
- Appendix
Network Camera User Manual 
70 
connecting the camera to the network protected by the IEEE 802.1X. 
Before you start: 
The authentication server must be configured. Please apply and register a user name 
and password for 802.1X in the server. 
  For  your  privacy  and  to  better  protect  your  system  against  security  risks,  we 
strongly recommend the use of strong passwords for all functions and  network 
devices.  The  password  should  be  something  of  your  own  choosing  (using  a 
minimum  of 8  characters,  including  at  least  three  of  the following  categories: 
upper case letters, lower case letters, numbers and special characters) in order to 
increase the security of your product. 
  Proper  configuration  of  all  passwords  and  other  security  settings  is  the 
responsibility of the installer and/or end-user. 
Steps: 
1.  Enter  the  802.1X  Settings  interface,  Configuration  >  Network  >  Advanced 
Settings > 802.1X 
Figure 7-14 802.1X Settings 
2.  Check the Enable IEEE 802.1X checkbox to enable the feature. 
3.  Configure the 802.1X settings, including Protocol, EAPOL version, User Name, 
Password and Confirm. 
Note: The EAPOL version must be identical with that of the router or the switch. 










