User Manual

Table Of Contents
DS-2TD8167-190ZE2F/W Thermal & Optical Bi-Spectrum PTZ Network Camera User Manual
UM DS-2TD8167-190ZE2F/W 040521NA 84
13.13 Set Same Unit
Set the same temperature unit and distance unit. When you enable this function, the unit cannot be
configured separately in other setting pages
Steps
1. Go to Configuration System System Settings Unit Settings.
2. Check Use Same Unit.
3. Set the temperature unit and distance unit.
4. Click Save.
13.14 Security
You can improve system security by setting security parameters.
13.14.1 Authentication
You can improve network access security by setting RTSP and Web authentication.
Go to Configuration System Security Authentication to choose authentication protocol and method
according to your needs.
RTSP Authentication: Digest and digest/basic are supported, which means authentication information
is needed when an RTSP request is sent to the device. If you select digest/basic, it means the device
supports digest or basic authentication. If you select digest, the device supports only digest
authentication.
RTSP Digest Algorithm: MD5, SHA256, and MD5/SHA256 encrypted algorithm in RTSP authentication. If
you enable the digest algorithm, except MD5, the third-party platform might not be able to log in to the
device or enable live view because of compatibility. The encrypted algorithm with high strength is
recommended.
Web Authentication: Digest and digest/basic are supported, which means authentication information
is needed when a Web request is sent to the device. If you select digest/basic, it means the device
supports digest or basic authentication. If you select digest, the device supports only digest
authentication.
Web Digest Algorithm: MD5, SHA256, and MD5/SHA256 encrypted algorithm in Web authentication. If
you enable the digest algorithm, except for MD5, the third-party platform might not be able to log in to
the device or enable live view because of compatibility. The encrypted algorithm with high strength is
recommended.
Refer to the specific content of protocol to view authentication requirements.
13.14.2 Security Audit Log
The security audit logs refer to the security operation logs. You can search and analyze the security log
files of the device to find illegal intrusions and troubleshoot security events.