Loading ...
Loading ...
Loading ...
Table 5-82 Security exception parameters
Parameter Description
Alarm-out Port
The alarm device (such as lights, sirens, etc.) is connected to
the alarm output port. When an alarm occurs, the DVR device
transmits the alarm information to the alarm device.
Post-Alarm
When the alarm ends, the alarm extended for a period of time.
The time range is from 0 seconds to 300 seconds.
Show Message Checkbox to enable a pop-up message in your local host PC.
Buzzer
Select the checkbox to activate the buzzer when an alarm
occurs.
Alarm Tone
Check the box and then select the corresponding audio le
from the dropdown list. System plays the audio le when the
alarm occurs.
Log
Select the checkbox, the DVR device records the alarm
information in the log when an alarm occurs.
Send Email
Select the checkbox. When an alarm occurs, the DVR device
sends an email to the set mailbox to notify the user.
To use this function, make sure the email function is enabled in
Main Menu > NETWORK > Email.
Security Event monitoring explanation. It indicates the type of
attacks that can trigger security exception.
●
Unauthorized executable program trying to run
●
Web URL brute-force attack
●
Session connection overload
●
Session ID brute-force attack
Step 3 Click Apply.
5.19.6.2 Illegal Login
Procedure
Step 1 Select Main Menu > SECURITY > Security Warning > Illegal Login.
User's Manual
335
Loading ...
Loading ...
Loading ...