User Manual
Table Of Contents
- Legal Information
- About this Manual
- Trademarks
- Disclaimer
- Symbol Conventions
- Safety Instruction
- Contents
- Chapter 1 System Requirements
- Chapter 2 Device Activation and Accessing
- Illegal Login Lock
- Chapter 3 Live View
- 3
- 3.1 Live View Parameters
- 3.1.1 Enable and Disable Live View
- 3.1.2 Adjust Aspect Ratio
- 3.1.3 Live View Stream Type
- 3.1.4 Select Third-Party Plug-in
- 3.1.5 Window Division
- 3.1.6 Light
- 3.1.7 Count Pixel
- 3.1.8 Start Digital Zoom
- 3.1.9 Auxiliary Focus
- 3.1.10 Lens Initialization
- 3.1.11 Quick Set Live View
- 3.1.12 Lens Parameters Adjustment
- 3.1.13 Conduct 3D Positioning
- 3.2 Set Transmission Parameters
- 3.3 Set Smooth Streaming
- Chapter 4 Video and Audio
- Chapter 5 Video Recording and Picture Capture
- Chapter 6 Events and Alarms
- 6
- 6.1 Basic Event
- 6.2 Smart Event
- 6.2.1 Detect Audio Exception
- 6.2.2 Set Defocus Detection
- 6.2.3 Detect Scene Change
- 6.2.4 Set Face Detection
- 6.2.5 Set Video Loss
- 6.2.6 Set Intrusion Detection
- 6.2.7 Set Line Crossing Detection
- 6.2.8 Set Region Entrance Detection
- 6.2.9 Set Region Exiting Detection
- 6.2.10 Set Unattended Baggage Detection
- 6.2.11 Set Object Removal Detection
- 6.2.12 Draw Area
- 6.2.13 Set Size Filter
- Chapter 7 Network Settings
- Chapter 8 Arming Schedule and Alarm Linkage
- Chapter 9 System and Security
- 9
- 9.1 View Device Information
- 9.2 Search and Manage Log
- 9.3 Simultaneous Login
- 9.4 Import and Export Configuration File
- 9.5 Export Diagnose Information
- 9.6 Reboot
- 9.7 Restore and Default
- 9.8 Upgrade
- 9.9 View Open Source Software License
- 9.10 Time and Date
- 9.11 Set RS-485
- 9.12 Set RS-232
- 9.13 External Device
- 9.14 Security
- 9.15 Certificate Management
- 9.16 User and Account
- Chapter 10 Allocate VCA Resource
- Chapter 11 Open Platform
- Chapter 12 Set EPTZ
- Chapter 13 Smart Display
- Appendix A: Device Command
- Appendix B: Device Communication Matrix
iDS-2CD7xxG0-xxxxx Network Bullet Camera User Manual
UM iDS-2CD7xxG0-xxxxx 021021NA 80
1. Go to Configuration → System → Security → Advanced Security to complete settings.
Search Security Audit Logs
You can search and analyze the security log files of the device so as to find out illegal intrusions and
troubleshoot security events.
Steps
This function is supported only by certain camera models.
1. Go to Configuration → System → Maintenance → Security Audit Log.
2. Select log types, Start Time, and End Time.
3. Click Search. The log files that match the search conditions will be displayed on the Log List.
4. Optional: Click Export to save the log files to your computer.
Security Reinforcement
Security reinforce enhances network security. With the function enabled, risky functions, protocols, and
ports of the device are disabled and more secured alternative functions, protocols and ports are enabled.
1. Go to Configuration → System → Security → Advanced Security.
2. Check Security Reinforcement.
3. Click Save.
Certificate Management
This manages server/client certificates and CA certificate, and sends an alarm if the certificates are close
to expiration date or are expired/abnormal.
Create Self-Signed Certificate
Steps
1. Click Create Self-signed Certificate.
2. Follow the prompt to enter Certificate ID, Country, Hostname/IP, Validity, and other parameters.
The certificate ID should be digits or letters and be no more than 64 characters.
3. Click OK.
4. Optional: Click Export to export the certificate, or click Delete to delete the certificate to recreate a
certificate, or click Certificate Properties to view the certificate details.