User's Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- Chapter 7 Network Settings- 7.1 Configuring Basic Settings
- 7.2 Configure Advanced Settings- 7.2.1 Configuring SNMP Settings
- 7.2.2 Configuring FTP Settings
- 7.2.3 Configuring Email Settings
- 7.2.4 Platform Access
- 7.2.5 Wireless Dial
- 7.2.6 HTTPS Settings
- 7.2.7 Configuring QoS Settings
- 7.2.8 Configuring 802.1X Settings
- 7.2.9 Integration Protocol
- 7.2.10 Bandwidth Adaptation
- 7.2.11 Network Service
- 7.2.12 Smooth Streaming
 
 
- Chapter 8 Video/Audio Settings
- Chapter 9 Image Settings
- Chapter 10 Event Settings- 10.1 Basic Events
- 10.2 Smart Events- 10.2.1 Configuring Audio Exception Detection
- 10.2.2 Configuring Defocus Detection
- 10.2.3 Configuring Scene Change Detection
- 10.2.4 Configuring Face Detection
- 10.2.5 Configuring Intrusion Detection
- 10.2.6 Configuring Line Crossing Detection
- 10.2.7 Configuring Region Entrance Detection
- 10.2.8 Configuring Region Exiting Detection
- 10.2.9 Configuring Unattended Baggage Detection
- 10.2.10 Configuring Object Removal Detection
 
- 10.3 VCA Configuration
 
- Chapter 11 Storage Settings
- Chapter 12 Playback
- Chapter 13 Picture
- Chapter 14 Application
- Appendix
Network Camera User Manual 
90 
The IEEE 802.1X standard is supported by the network cameras, and when the feature 
is  enabled,  the  camera  data  is  secured  and  user  authentication  is  needed  when 
connecting the camera to the network protected by the IEEE 802.1X. 
Before you start: 
The authentication server must be configured. Please apply and register a user name 
and password for 802.1X in the server. 
  For  your  privacy  and  to  better  protect  your  system  against  security  risks,  we 
strongly  recommend  the  use  of  strong  passwords  for  all  functions  and  network 
devices.  The  password  should  be  something  of  your  own  choosing  (using  a 
minimum  of  8  characters,  including  at  least  three  of  the  following  categories: 
upper case letters, lower case letters, numbers and special characters) in order to 
increase the security of your product. 
  Proper  configuration  of  all  passwords  and  other  security  settings  is  the 
responsibility of the installer and/or end-user. 
Steps: 
1.  Enter  the  802.1X  Settings  interface,  Configuration  >  Network  >  Advanced 
Settings > 802.1X 
 802.1X Settings 
2.  Check the Enable IEEE 802.1X checkbox to enable the feature. 
3.  Configure the 802.1X settings, including Protocol, EAPOL version, User Name, 










