User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Live View
- Chapter 5 Network Camera Configuration
- Chapter 6 Network Settings
- Chapter 7 Video/Audio Settings
- Chapter 8 Configuring Image Parameters
- Chapter 9 Configuring Event Settings
- 9.1 Configuring Motion Detection
- 9.2 Configuring Video Tampering Alarm
- 9.3 Configuring Alarm Input
- 9.4 Configuring Alarm Output
- 9.5 Handling Exception
- 9.6 Configuring Audio Exception Detection
- 9.7 Configuring Intrusion Detection
- 9.8 Configuring Line Crossing Detection
- 9.9 Configuring Region Entrance Detection
- 9.10 Configuring Region Exiting Detection
- 9.11 Configuring Unattended Baggage Detection
- 9.12 Configuring Object Removal Detection
- Chapter 10 Storage Settings
- Chapter 11 People Counting
- Chapter 12 Heat Map
- Chapter 13 Intersection Analysis
- Chapter 14 Playback
- Chapter 15 Picture
- Chapter 16 Application
- Appendix
User Manual of Network Fisheye Camera
39
5.4.1 Authentication
Purpose:
You can specifically secure the stream data of live view.
Steps:
1. Enter the Authentication interface: Configuration > System > Security >
Authentication.
Figure 5-10 Authentication
2. Set up authentication method for RTSP authentication and WEB authentication.
Caution:
Digest is the recommended authentication method for better data security. You
must be aware of the risk if you adopt basic as the authentication method.
3. Click Save to save the settings.
5.4.2 IP Address Filter
Purpose:
This function makes it possible for access control.
Steps:
1. Enter the IP Address Filter interface: Configuration > System > Security > IP
Address Filter