User's Manual
Table Of Contents
- Legal Information
- Symbol Conventions
- Safety Instruction
- Chapter 1 Overview
- Chapter 2 Device Activation and Accessing
- Chapter 3 Temperature Measurement
- Chapter 4 Fire Source Detection
- Chapter 5 Behavior Analysis
- Chapter 6 Event and Alarm
- Chapter 7 Arming Schedule and Alarm Linkage
- Chapter 8 Live View
- Chapter 9 Video and Audio
- 9.1 Video Settings
- 9.2 Display Settings
- 9.2.1 Image Adjustment
- 9.2.2 Image Adjustment (Thermal Channel)
- 9.2.3 Exposure Settings
- 9.2.4 Day/Night Switch
- 9.2.5 Set Supplement Light
- 9.2.6 BLC
- 9.2.7 WDR
- 9.2.8 White Balance
- 9.2.9 DNR
- 9.2.10 Defog
- 9.2.11 Set Palette
- 9.2.12 Set Target Color
- 9.2.13 DDE
- 9.2.14 Brightness Sudden Change
- 9.2.15 Enhance Regional Image
- 9.2.16 Mirror
- 9.2.17 Video Standard
- 9.2.18 Digital Zoom
- 9.2.19 Scene Mode
- 9.3 OSD
- 9.4 Set Privacy Mask
- 9.5 Overlay Picture
- 9.6 Set Manual DPC (Defective Pixel Correction)
- 9.7 Set Picture in Picture
- Chapter 10 Video Recording and Picture Capture
- Chapter 11 Network Settings
- Chapter 12 System and Security
- 12.1 View Device Information
- 12.2 Search and Manage Log
- 12.3 Import and Export Configuration File
- 12.4 Export Diagnose Information
- 12.5 Reboot
- 12.6 Restore and Default
- 12.7 Upgrade
- 12.8 View Open Source Software License
- 12.9 Time and Date
- 12.10 Set RS-232
- 12.11 Set RS-485
- 12.12 Set Same Unit
- 12.13 Security
- 12.14 User and Account
- Chapter 13 Appendix
Note
Refer to the specic content of protocol to view authencaon requirements.
12.13.2 Security Audit Log
The security audit logs refer to the security operaon logs. You can search and analyze the security
log les of the device so as to nd out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
aer device boong. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This funcon is only supported by certain camera models.
1. Go to Conguraon → System → Maintenance → Security Audit Log .
2. Select log types, Start Time, and End Time.
3. Click Search.
The log
les that match the search condions will be displayed on the Log List.
4.
Oponal: Click Export to save the log les to your computer.
12.13.3 Set IP Address Filter
IP address lter is a tool for access control. You can enable the IP address lter to allow or forbid
the visits from the certain IP addresses.
IP address refers to IPv4.
Steps
1. Go to
Conguraon → System → Security → IP Address Filter .
2. Check Enable IP Address Filter.
3. Select the type of IP address lter.
Forbidden
IP addresses in the list cannot access the device.
Allowed Only IP addresses in the list can access the device.
4. Edit the IP address lter list.
Add
Add a new IP address to the list.
Thermal & Opcal Bi-spectrum Network Camera User Manual
70