User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Live View
- Chapter 5 Network Camera Configuration
- Chapter 6 Network Settings
- Chapter 7 Video/Audio Settings
- Chapter 8 Configuring Image Parameters
- Chapter 9 Configuring Event Settings- 9.1 Configuring Motion Detection
- 9.2 Configuring Video Tampering Alarm
- 9.3 Configuring Alarm Input
- 9.4 Configuring Alarm Output
- 9.5 Handling Exception
- 9.6 Configuring Audio Exception Detection
- 9.7 Configuring Intrusion Detection
- 9.8 Configuring Line Crossing Detection
- 9.9 Configuring Region Entrance Detection
- 9.10 Configuring Region Exiting Detection
- 9.11 Configuring Unattended Baggage Detection
- 9.12 Configuring Object Removal Detection
 
- Chapter 10 Storage Settings
- Chapter 11 People Counting
- Chapter 12 Heat Map
- Chapter 13 Intersection Analysis
- Chapter 14 Playback
- Chapter 15 Picture
- Chapter 16 Application
- Appendix
User Manual of Network Fisheye Camera 
41 
Figure 5-13 Modify an IP 
(3) Click the OK to finish modifying. 
  Delete an IP Address or IP Addresses. 
Select the IP address(es) and click Delete. 
5.  Click Save to save the settings. 
5.4.3  Security Service 
To enable the remote login, and improve the data communication security, the camera 
provides the security service for better user experience. 
Steps: 
1.  Enter  the  security  service  configuration  interface:  Configuration  >  System  > 
Security > Security Service.   
Figure 5-14 Security Service 
2.  Check the checkbox of Enable Illegal Login Lock. 
Illegal Login Lock: it is used to limit the user login attempts. Login attempt from 
the  IP  address  is  rejected  if  admin  user  performs  7  failed  user  name/password 
attempts (5 times for the operator/user). 
Note: If the IP address is rejected, you can try to login the device after 30 minutes. 










