User Manual
Table Of Contents
- Chapter 1 System Requirement
 - Chapter 2 Network Connection
 - Chapter 3 Access to the Network Camera
 - Chapter 4 Wi-Fi Settings
 - Chapter 5 Live View
 - Chapter 6 Network Camera Configuration
 - Chapter 7 Network Settings
- 7.1 Configuring Basic Settings
 - 7.2 Configure Advanced Settings
- 7.2.1 Configuring SNMP Settings
 - 7.2.2 Configuring FTP Settings
 - 7.2.3 Configuring Email Settings
 - 7.2.4 Platform Access
 - 7.2.5 Wireless Dial
 - 7.2.6 HTTPS Settings
 - 7.2.7 Configuring QoS Settings
 - 7.2.8 Configuring 802.1X Settings
 - 7.2.9 Integration Protocol
 - 7.2.10 Bandwidth Adaptation
 - 7.2.11 Network Service
 - 7.2.12 Smooth Streaming
 - 7.2.13 Security Control Panel Configuration
 
 
 - Chapter 8 Video/Audio Settings
 - Chapter 9 Image Settings
 - Chapter 10 Event Settings
 - Chapter 11 Storage Settings
 - Chapter 12 Playback
 - Chapter 13 Picture
 - Appendix
 - Appendix 1 SADP Software Introduction
 - Appendix 2 Port Mapping
 - Appendix 3
 
Network Camera User Manual 
59 
5.  Click Save to save the settings. 
6.4.3  Security Service 
To enable the remote login, and improve the data communication security, the camera 
provides the security service for better user experience. 
Note: Only certain camera models support the function.   
Steps: 
1.  Enter  the  security  service  configuration  interface:  Configuration  >  System  > 
Security > Security Service.   
 Security Service 
2.  Check the checkbox of Enable Illegal Login Lock. 
Illegal Login Lock: it is used to limit the user login attempts. Login attempt from the 
IP  address  is  rejected  if  admin  user  performs  7  failed  user  name/password 
attempts (5 times for the operator/user). 
Note: If the IP address is rejected, you can try to login the device after 30 minutes. 
  Advanced Security 
Purpose: 
Advanced security  offers  options to manage  more  network security  settings  of  the 
device. 
  Security Reinforce 
Check  the  checkbox  to  enable  the  function.  Security  reinforce  is  a  solution  to 
enhance network security. With the function enabled, risky functions, protocols, 
ports of the device are disabled and more secured alternative functions, protocols 
and ports are enabled. 
  Control Timeout Settings 










