Loading ...
Loading ...
Loading ...
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Steps
Note
This funcon is only supported by certain camera models.
1.
Go to Maintenance and Security → Maintenance → Security Audit Log .
2.
Select log types, Start Time, and End Time.
3.
Click Search.
The log les that match the search condions will be displayed on the Log List.
4.
Oponal: Click Export to save the log les to your computer.
Set Log Server
The log server should support syslog (RFC 3164) over TLS.
Before You Start
●
Install client and CA cercates before conguraon. Refer to Cercate Management for
detailed informaon.
●
Select cercates according to the requirement of the log server. If two-way authencaon is
required, select the CA cercate and the client cercate. If one-way authencaon is
required, select the CA cercate only.
Steps
1.
Click Advanced Conguraon.
2.
Check Enable Log Upload Server.
3.
Oponal: Check Enable Encrypted Transmission if you want the log data to be encrypted.
4.
Input Log Server IP and Log Server Port.
5.
Oponal: Click Test to test the sengs.
6.
Oponal: Select a client cercate.
7.
Select a CA cercate to the device.
8.
Click Save.
11.13.4 Set QoS
QoS (Quality of Service) can help improve the network delay and network congeson by seng
the priority of data sending.
Network Speed Dome User Manual
120
Loading ...
Loading ...
Loading ...