4/4/2022
SEEK200
79
14.13 Authentication
You can improve network access security by setting RTSP and WEB authentication.
Go to
Configuration
System
Security
Authentication
to choose
authentication protocol and method according to your needs.
RTSP Authentication
Digest and digest/basic are supported, which means authentication information is needed
when
RTSP request is sent to the device. If you select
digest/basic
, it means the device
supports digest or basic authentication. If you select
digest
, the device only supports
digest authentication.
RTSP Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in RTSP authentication. If you
enable the digest algorithm except for MD5, the third-party platform might not be able to
log in to the device or enable live view because of compatibility. The encrypted algorithm
with high strength is recommended.
WEB Authentication
Digest and digest/basic are supported, which means authentication information is needed
when WEB request is sent to the device. If you select
digest/basic
, it means the device
supports digest or basic authentication. If you select
digest
, the device only supports digest
authentication.
WEB Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in WEB authentication. If you
enable the digest algorithm except for MD5, the third-party platform might not be able to
log in to the device or enable live view because of compatibility. The encrypted algorithm
with high strength is recommended.
Note
Refer to the specific content of protocol to view authentication requirements.
14.13.1 Security Audit Log
The security audit logs refer to the security operation logs. You can search and analyze the
security log files of the device so as to find out the illegal intrusion and troubleshoot the security
events. Security audit logs can be saved on device internal storage. The log will be saved