User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- 6.1 Configuring Local Parameters
- 6.2 Configuring System Settings
- 6.3 Configuring Network Settings
- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring NAT (Network Address Translation) Settings
- 6.3.6 Configuring SNMP Settings
- 6.3.7 Configuring FTP Settings
- 6.3.8 Email Settings
- 6.3.9 Configuring HTTPS Settings
- 6.3.10 Configuring QoS Settings
- 6.3.11 Configuring 802.1X Settings
- 6.3.12 Configuring Platform Access
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Parameters
- 6.6 Configuring Event Settings
- Chapter 7 Storage Settings
- Chapter 8 Playback
- Chapter 9 Picture
- Appendix
User Manual of Network Fisheye Camera
30
Identity - Enter the user ID to present to the network.
Private key password – Enter the password for your user ID.
EAPOL version - Select the version used (1 or 2) in your access point.
CA Certificates - Upload a CA certificate to present to the access point for
authentication.
EAP-PEAP:
User Name - Enter the user name to present to the network.
Password - Enter the password of the network.
PEAP Version - Select the PEAP version used at the access point.
Label - Select the label used by the access point.
EAPOL Version - Select version (1 or 2) depending on the version used at the
access point.
CA Certificates - Upload a CA certificate to present to the access point for
authentication.
For your privacy and to better protect your system against security risks, we
strongly recommend the use of strong passwords for all functions and network
devices. The password should be something of your own choosing (using a
minimum of 8 characters, including at least three of the following categories:
upper case letters, lower case letters, numbers and special characters) in order to
increase the security of your product.
Proper configuration of all passwords and other security settings is the
responsibility of the installer and/or end-user.