Loading ...
Loading ...
Loading ...
Network Camera User Manual
70
9.14.8 Search Security Audit Logs
You can search and analyze the security log files of the device so as to find out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This function is only supported by certain camera models.
1. Go to Configuration → System → Maintenance → Security Audit Log.
2. Select log types, Start Time, and End Time.
3. Click Search.
The log files that match the search conditions will be displayed on the Log List.
4. Optional: Click Export to save the log files to your computer.
9.14.9 SSH
Secure Shell (SSH) is a cryptographic network protocol for operating network services over an
unsecured network.
Go to Configuration → System → Security → Security Service, and check Enable SSH.
The SSH function is disabled by default.
Caution
Use the function with caution. The security risk of device internal information leakage exists when
the function is enabled.
9.15 Certificate Management
It helps to manage the server/client certificates and CA certificate, and to send an alarm if the
certificates are close to expiry date, or are expired/abnormal.
Note
The function is only supported by certain device models.
9.15.1 Create Self-signed Certificate
Steps
1. Click Create Self-signed Certificate.
2. Follow the prompt to enter Certificate ID, Country/Region, Hostname/IP, Validity and other
parameters.
Loading ...
Loading ...
Loading ...