User Manual
Table Of Contents
- Legal Information
- Symbol Conventions
- Safety Instruction
- Chapter 1 System Requirement
- Chapter 2 Device Activation and Accessing
- Chapter 3 Live View
- 3.1 Live View Parameters
- 3.1.1 Enable and Disable Live View
- 3.1.2 Adjust Aspect Ratio
- 3.1.3 Live View Stream Type
- 3.1.4 Select the Third-Party Plug-in
- 3.1.5 Window Division
- 3.1.6 Light
- 3.1.7 Count Pixel
- 3.1.8 Start Digital Zoom
- 3.1.9 Auxiliary Focus
- 3.1.10 Lens Initialization
- 3.1.11 Quick Set Live View
- 3.1.12 Lens Parameters Adjustment
- 3.1.13 Conduct 3D Positioning
- 3.2 Set Transmission Parameters
- 3.3 Set Smooth Streaming
- 3.1 Live View Parameters
- Chapter 4 Video and Audio
- Chapter 5 Video Recording and Picture Capture
- Chapter 6 Event and Alarm
- 6.1 Basic Event
- 6.2 Smart Event
- 6.2.1 Detect Audio Exception
- 6.2.2 Set Defocus Detection
- 6.2.3 Detect Scene Change
- 6.2.4 Set Face Detection
- 6.2.5 Set Video Loss
- 6.2.6 Set Intrusion Detection
- 6.2.7 Set Line Crossing Detection
- 6.2.8 Set Region Entrance Detection
- 6.2.9 Set Region Exiting Detection
- 6.2.10 Set Unattended Baggage Detection
- 6.2.11 Set Object Removal Detection
- 6.2.12 Draw Area
- 6.2.13 Set Size Filter
- Chapter 7 Network Settings
- Chapter 8 Arming Schedule and Alarm Linkage
- Chapter 9 System and Security
- 9.1 View Device Information
- 9.2 Search and Manage Log
- 9.3 Simultaneous Login
- 9.4 Import and Export Configuration File
- 9.5 Export Diagnose Information
- 9.6 Reboot
- 9.7 Restore and Default
- 9.8 Upgrade
- 9.9 View Open Source Software License
- 9.10 Wiegand
- 9.11 Metadata
- 9.12 Time and Date
- 9.13 Set RS-485
- 9.14 Set RS-232
- 9.15 Power Consumption Mode
- 9.16 External Device
- 9.17 Security
- 9.18 Certificate Management
- 9.19 User and Account
- Chapter 10 Allocate VCA Resource
- Chapter 11 Smart Display
- Chapter 12 EPTZ
- Appendix A. Device Command
- Appendix B. Device Communication Matrix
Go to Conguraon → System → Security → Advanced Security . Check Security Reinforcement,
and click Save.
9.17.9 SSH
Secure Shell (SSH) is a cryptographic network protocol for operang network services over an
unsecured network.
The SSH funcon is disabled by default.
Cauon
Use the funcon with cauon. The security risk of device internal informaon leakage exists when
the funcon is enabled.
9.18 Cercate Management
It helps to manage the server/client cercates and CA cercate, and to send an alarm if the
cercates are close to expiry date, or are expired/abnormal.
Note
The funcon is only supported by certain device models.
9.18.1 Create Self-signed Cercate
Steps
1. Click Create Self-signed Cercate.
2. Follow the prompt to enter
Cercate ID, Country/Region, Hostname/IP, Validity and other
parameters.
Note
The cercate ID should be digits or leers and be no more than 64 characters.
3. Click OK.
4. Oponal: Click Export to export the cercate, or click Delete to delete the cercate to
recreate a
cercate, or click Cercate Properes to view the cercate details.
9.18.2 Create
Cercate Request
Before You Start
Select a self-signed
cercate.
Network Camera User Manual
82