User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- Chapter 7 Network Settings
- 7.1 Configuring Basic Settings
- 7.2 Configure Advanced Settings
- 7.2.1 Configuring SNMP Settings
- 7.2.2 Configuring FTP Settings
- 7.2.3 Configuring Email Settings
- 7.2.4 Platform Access
- 7.2.5 Wireless Dial
- 7.2.6 HTTPS Settings
- 7.2.7 Configuring QoS Settings
- 7.2.8 Configuring 802.1X Settings
- 7.2.9 Integration Protocol
- 7.2.10 Bandwidth Adaptation
- 7.2.11 Network Service
- 7.2.12 Smooth Streaming
- 7.2.13 Security Control Panel Configuration
- Chapter 8 Video/Audio Settings
- Chapter 9 Image Settings
- Chapter 10 Event Settings
- Chapter 11 Storage Settings
- Chapter 12 Playback
- Chapter 13 Picture
- Appendix
- Appendix 1 SADP Software Introduction
- Appendix 2 Port Mapping
- Appendix 3
Network Camera User Manual
59
5. Click Save to save the settings.
6.4.3 Security Service
To enable the remote login, and improve the data communication security, the camera
provides the security service for better user experience.
Note: Only certain camera models support the function.
Steps:
1. Enter the security service configuration interface: Configuration > System >
Security > Security Service.
Security Service
2. Check the checkbox of Enable Illegal Login Lock.
Illegal Login Lock: it is used to limit the user login attempts. Login attempt from the
IP address is rejected if admin user performs 7 failed user name/password
attempts (5 times for the operator/user).
Note: If the IP address is rejected, you can try to login the device after 30 minutes.
Advanced Security
Purpose:
Advanced security offers options to manage more network security settings of the
device.
Security Reinforce
Check the checkbox to enable the function. Security reinforce is a solution to
enhance network security. With the function enabled, risky functions, protocols,
ports of the device are disabled and more secured alternative functions, protocols
and ports are enabled.
Control Timeout Settings