User Manual
Table Of Contents
- Legal Information
- Symbol Conventions
- Safety Instruction
- Chapter 1 System Requirement
- Chapter 2 Device Activation and Accessing
- Chapter 3 Live View
- 3.1 Live View Parameters
- 3.1.1 Enable and Disable Live View
- 3.1.2 Adjust Aspect Ratio
- 3.1.3 Live View Stream Type
- 3.1.4 Select the Third-Party Plug-in
- 3.1.5 Window Division
- 3.1.6 Light
- 3.1.7 Count Pixel
- 3.1.8 Start Digital Zoom
- 3.1.9 Auxiliary Focus
- 3.1.10 Lens Initialization
- 3.1.11 Quick Set Live View
- 3.1.12 Lens Parameters Adjustment
- 3.1.13 Conduct 3D Positioning
- 3.2 Set Transmission Parameters
- 3.3 Set Smooth Streaming
- 3.1 Live View Parameters
- Chapter 4 Video and Audio
- Chapter 5 Video Recording and Picture Capture
- Chapter 6 Event and Alarm
- 6.1 Basic Event
- 6.2 Smart Event
- 6.2.1 Detect Audio Exception
- 6.2.2 Set Defocus Detection
- 6.2.3 Detect Scene Change
- 6.2.4 Set Face Detection
- 6.2.5 Set Video Loss
- 6.2.6 Set Intrusion Detection
- 6.2.7 Set Line Crossing Detection
- 6.2.8 Set Region Entrance Detection
- 6.2.9 Set Region Exiting Detection
- 6.2.10 Set Unattended Baggage Detection
- 6.2.11 Set Object Removal Detection
- 6.2.12 Draw Area
- 6.2.13 Set Size Filter
- Chapter 7 Network Settings
- Chapter 8 Arming Schedule and Alarm Linkage
- Chapter 9 System and Security
- 9.1 View Device Information
- 9.2 Search and Manage Log
- 9.3 Simultaneous Login
- 9.4 Import and Export Configuration File
- 9.5 Export Diagnose Information
- 9.6 Reboot
- 9.7 Restore and Default
- 9.8 Upgrade
- 9.9 View Open Source Software License
- 9.10 Wiegand
- 9.11 Metadata
- 9.12 Time and Date
- 9.13 Set RS-485
- 9.14 Set RS-232
- 9.15 Power Consumption Mode
- 9.16 External Device
- 9.17 Security
- 9.18 Certificate Management
- 9.19 User and Account
- Chapter 10 Allocate VCA Resource
- Chapter 11 Smart Display
- Chapter 12 EPTZ
- Appendix A. Device Command
- Appendix B. Device Communication Matrix
Protocol
EAP-LEAP, EAP-TLS, and EAP-MD5 are selectable
EAP-LEAP and EAP-MD5
If you use EAP-LEAP or EAP-MD5, the
authencaon server must be congured. Register a
user name and password for 802.1X in the server in advance. Input the user name and
password for authencaon.
EAP-TLS
If you use EAP-TLS, input Idenfy, Private Key Password, and upload CA Cercate, User
Cercate and Private Key.
EAPOL Version
The EAPOL version must be idencal with that of the router or the switch.
9.17.6 Control Timeout
Sengs
If this funcon is enabled, you will be logged out when you make no operaon (not including
viewing live image) to the device via web browser within the set
meout period.
Go to Conguraon → System → Security → Advanced Security to complete sengs.
9.17.7 Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This funcon is only supported by certain camera models.
1. Go to Conguraon → System → Maintenance → Security Audit Log .
2. Select log types, Start Time, and End Time.
3. Click Search.
The log
les that match the search condions will be displayed on the Log List.
4. Oponal: Click Export to save the log les to your computer.
9.17.8 Security Reinforcement
Security reinforce is a
soluon to enhance network security. With the funcon enabled, risky
funcons, protocols, ports of the device are disabled and more secured alternave funcons,
protocols and ports are enabled.
Network Camera User Manual
81