User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Live View
- Chapter 5 Network Camera Configuration
- Chapter 6 Network Settings
- Chapter 7 Video/Audio Settings
- Chapter 8 Configuring Image Parameters
- Chapter 9 Configuring Event Settings
- 9.1 Configuring Motion Detection
- 9.2 Configuring Video Tampering Alarm
- 9.3 Configuring Alarm Input
- 9.4 Configuring Alarm Output
- 9.5 Handling Exception
- 9.6 Configuring Audio Exception Detection
- 9.7 Configuring Intrusion Detection
- 9.8 Configuring Line Crossing Detection
- 9.9 Configuring Region Entrance Detection
- 9.10 Configuring Region Exiting Detection
- 9.11 Configuring Unattended Baggage Detection
- 9.12 Configuring Object Removal Detection
- Chapter 10 Storage Settings
- Chapter 11 People Counting
- Chapter 12 Heat Map
- Chapter 13 Intersection Analysis
- Chapter 14 Playback
- Chapter 15 Picture
- Chapter 16 Application
- Appendix
User Manual of Network Fisheye Camera
44
2. Slide the slide bar to set the simultaneous login. If the number of the illegal
login attempts exceeds the set threshold, your access will be denied.
As Operator or User
Operator or user can modify password. Old password is required for this action.
5.5.2 Online Users
Purpose:
You can see the current users who are visiting the device through this interface. User
information, such as user name, level, IP address, and operation time, is displayed in
the User List.
Click Refresh to refresh the list.
Figure 5-16 View the Online Users