Hikvision DS-2TD2117-10/PAI Thermal Network Bullet Camera

User Manual - Page 87

For DS-2TD2117-10/PAI.

PDF File Manual, 96 pages, Read Online | Download pdf file

DS-2TD2117-10/PAI photo
Loading ...
Loading ...
Loading ...
10.14.1 Authencaon
You can improve network access security by seng RTSP and WEB authencaon.
Go to Conguraon → System → Security Authencaon to choose authencaon protocol
and method according to your needs.
RTSP Authencaon
Digest and digest/basic are supported, which means authencaon informaon is needed when
RTSP request is sent to the device. If you select digest/basic, it means the device supports
digest or basic authencaon. If you select digest, the device only supports digest
authencaon.
RTSP Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in RTSP authencaon. If you enable the
digest algorithm except for MD5, the third-party plaorm might not be able to log in to the
device or enable live view because of compability. The encrypted algorithm with high strength
is recommended.
WEB
Authencaon
Digest and digest/basic are supported, which means authencaon informaon is needed when
WEB request is sent to the device. If you select digest/basic, it means the device supports digest
or basic
authencaon. If you select digest, the device only supports digest authencaon.
WEB Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in WEB authencaon. If you enable the
digest algorithm except for MD5, the third-party plaorm might not be able to log in to the
device or enable live view because of
compability. The encrypted algorithm with high strength
is recommended.
Note
Refer to the specic content of protocol to view authencaon requirements.
10.14.2 Security Audit Log
The security audit logs refer to the security operaon logs. You can search and analyze the security
log les of the device so as to nd out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
aer device boong. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Thermal Network Camera User Manual
73
Loading ...
Loading ...
Loading ...