User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Live View
- Chapter 5 Network Camera Configuration
- 5.1 Configuring Local Parameters
- 5.2 Configuring System Settings
- 5.2.1 Viewing Basic Information
- 5.2.2 Time and DST Settings
- 5.2.3 RS-232 Settings
- 5.2.4 RS-485 Settings
- 5.2.5 Upgrade and Maintenance
- 5.2.6 Log Searching
- 5.2.7 System Service Settings
- 5.2.8 Authentication
- 5.2.9 IP Address Filter
- 5.2.10 Security Service
- 5.2.11 User Management
- 5.2.12 Open Source Software License
- 5.3 Configuring Network Settings
- 5.3.1 Configuring TCP/IP Settings
- 5.3.2 Configuring Port Settings
- 5.3.3 Configuring PPPoE Settings
- 5.3.4 Configuring DDNS Settings
- 5.3.5 Configuring NAT (Network Address Translation) Settings
- 5.3.6 Configuring SNMP Settings
- 5.3.7 Configuring FTP Settings
- 5.3.8 Email Settings
- 5.3.9 Configuring HTTPS Settings
- 5.3.10 Configuring QoS Settings
- 5.3.11 Configuring 802.1X Settings
- 5.4 Configuring Video and Audio Settings
- 5.5 Configuring Image Parameters
- 5.6 Configuring Event Settings
- 5.7 Configuring Heat Map
- Chapter 6 Storage Settings
- Chapter 7 Playback
- Chapter 8 Picture
- Chapter 9 Application
- Appendix
User Manual of Network Fisheye Camera
64
pictures.
Authentication (optional): If your email server requires authentication, check
this checkbox to use authentication to log in to this server and input the login user
name and password.
For your privacy and to better protect your system against security risks, we
strongly recommend the use of strong passwords for all functions and
network devices. The password should be something of your own choosing
(using a minimum of 8 characters, including at least three of the following
categories: upper case letters, lower case letters, numbers and special
characters) in order to increase the security of your product.
Proper configuration of all passwords and other security settings is the
responsibility of the installer and/or end-user.
The Receiver table: Select the receiver to which the email is sent. Up to 3
receivers can be configured.
Receiver: The name of the user to be notified.
Receiver’s Address: The email address of user to be notified.
4. Click Save to save the settings.
5.3.9 Configuring HTTPS Settings
Purpose:
HTTPS provides authentication of the web site and associated web server that one is
communicating with, which protects against Man-in-the-middle attacks. Perform the
following steps to set the port number of https.
E.g., if you set the port number as 443 and the IP address is 192.168.1.64, you may
access the device by inputting https://192.168.1.64:443 via the web browser.
Steps:
1. Enter the HTTPS settings interface.