
Local Basic Operation
299
Parameter
Description
○
?
Security Event monitoring explanation. It indicates the type of
attacks that can trigger security exception.
Unauthorized executable program trying to run
Web URL brute-force attack
Session connection overload
Seesion ID brute-force attack
Step 3 Click
Apply
to complete the settings.
4.15.6.2 Illegal Login
Step 1 Select
Main Menu
>
SECURITY
>
SECURITY WARNING
>
Illegal Login
.
The
Illegal Login
interface is displayed. See Figure 4-251..
Figure 4-251 Illegal login
Step 2 Select
Enable
and configure parameters. See Table 4-77.
Table 4-77
Illegal login parameters
Parameter
Description
Alarm Out
The alarm device (such as lights, sirens) is connected to the alarm
output port. When an alarm occurs, the NVR device transmits the
alarm information to the alarm device.
Latch
When the alarm ends, the alarm extended for a period of time. The
time range is from 0 seconds to 300 seconds.
Buzzer
Select the check box to activate the buzzer when an alarm occurs.
Voice Prompts
Check the box and then select the corresponding audio file from the
dropdown list. System plays the audio file when the alarm occurs.
See " 4.18.1File Manage" to add audio file first.
Log
Select the check box, the NVR device records the alarm information in
the log when an alarm occurs.