
Network Camera User Manual
UM Network Camera 072221NA
77
•
EAP-TLS
: If you use EAP-TLS, input Identify, Private Key Password, and upload CA Certificate, User
Certificate, and Private Key.
•
EAPOL Version
: The EAPOL version must be identical with that of the router or the switch.
Control Timeout Settings
If this function is enabled, you will be logged out if you perform no operation (not including viewing live
image) to the device via a Web browser within the set timeout period.
Go to
Configuration
→
System
→
Security
→
Advanced Security
to complete settings.
Search Security Audit Logs
You can search and analyze the security log files of the device to find illegal intrusions and troubleshoot
security events.
Steps
NOTE:
This function is supported only by certain camera models.
1.
Go to
Configuration
→
System
→
Maintenance
→
Security Audit Log
.
2.
Select
log types
,
Start Time
, and
End Time
.
3.
Click
Search
.
The log files that match the search conditions will be displayed on the Log List.
4.
Optional:
Click
Export
to save the log files to your computer.
SSH
Secure Shell (SSH) is a cryptographic network protocol for operating network services over an unsecured
network.
The SSH function is disabled by default.
CAUTION!
Use this function with caution. The security risk of device internal information
leakage exists when the function is enabled.
9.18
Certificate Management
This manages the server/client certificates and CA certificate, and sends an alarm if the certificates are
close to expiry date or are expired/abnormal.
NOTE:
The function is supported only by certain device models.
Содержание IDS-2CD7A46G0-IZHSY 8-32
Страница 1: ...Network Camera User Manual...
Страница 90: ......