User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Device Activation and Accessing
- Chapter 3 Live View
- 3.1 Live View Parameters
- 3.1.1 Enable and Disable Live View
- 3.1.2 Adjust Aspect Ratio
- 3.1.3 Live View Stream Type
- 3.1.4 Select the Third-Party Plug-in
- 3.1.5 Light
- 3.1.6 Count Pixel
- 3.1.7 Start Digital Zoom
- 3.1.8 Auxiliary Focus
- 3.1.9 Lens Initialization
- 3.1.10 Quick Set Live View
- 3.1.11 Lens Parameters Adjustment
- 3.1.12 Conduct 3D Positioning
- 3.2 Set Transmission Parameters
- 3.3 Set Smooth Streaming
- 3.1 Live View Parameters
- Chapter 4 Video and Audio
- Chapter 5 Video Recording and Picture Capture
- Chapter 6 Event and Alarm
- 6.1 Basic Event
- 6.2 Smart Event
- 6.2.1 Detect Audio Exception
- 6.2.2 Set Defocus Detection
- 6.2.3 Detect Scene Change
- 6.2.4 Set Face Detection
- 6.2.5 Set Video Loss
- 6.2.6 Set Intrusion Detection
- 6.2.7 Set Line Crossing Detection
- 6.2.8 Set Region Entrance Detection
- 6.2.9 Set Region Exiting Detection
- 6.2.10 Set Unattended Baggage Detection
- 6.2.11 Set Object Removal Detection
- 6.2.12 Draw Area
- 6.2.13 Set Size Filter
- Chapter 7 Network Settings
- Chapter 8 Arming Schedule and Alarm Linkage
- Chapter 9 System and Security
- 9.1 View Device Information
- 9.2 Search and Manage Log
- 9.3 Simultaneous Login
- 9.4 Import and Export Configuration File
- 9.5 Export Diagnose Information
- 9.6 Reboot
- 9.7 Restore and Default
- 9.8 Upgrade
- 9.9 View Open Source Software License
- 9.10 Wiegand
- 9.11 Metadata
- 9.12 Time and Date
- 9.13 Set RS-485
- 9.14 Set RS-232
- 9.15 Power Consumption Mode
- 9.16 External Device
- 9.17 Security
- 9.18 Certificate Management
- 9.19 User and Account
- Chapter 10 Allocate VCA Resource
- Chapter 11 Open Platform
- Chapter 12 Smart Display
- Chapter 13 Set EPTZ
- Chapter 14 Pattern Linkage
- A. Device Command
- B. Device Communication Matrix
Network Camera User Manual
81
Protocol
EAP-LEAP, EAP-TLS, and EAP-MD5 are selectable
EAP-LEAP and EAP-MD5
If you use EAP-LEAP or EAP-MD5, the authentication server must be configured. Register a
user name and password for 802.1X in the server in advance. Input the user name and
password for authentication.
EAP-TLS
If you use EAP-TLS, input Identify, Private Key Password, and upload CA Certificate, User
Certificate and Private Key.
EAPOL Version
The EAPOL version must be identical with that of the router or the switch.
9.17.6 Control Timeout Settings
If this function is enabled, you will be logged out when you make no operation (not including
viewing live image) to the device via web browser within the set timeout period.
Go to Configuration → System → Security → Advanced Security to complete settings.
9.17.7 Search Security Audit Logs
You can search and analyze the security log files of the device so as to find out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This function is only supported by certain camera models.
1. Go to Configuration → System → Maintenance → Security Audit Log.
2. Select log types, Start Time, and End Time.
3. Click Search.
The log files that match the search conditions will be displayed on the Log List.
4. Optional: Click Export to save the log files to your computer.
9.17.8 Security Reinforcement
Security reinforce is a solution to enhance network security. With the function enabled, risky
functions, protocols, ports of the device are disabled and more secured alternative functions,
protocols and ports are enabled.
Go to Configuration → System → Security → Advanced Security. Check Security Reinforcement,
and click Save.