EasyManua.ls Logo

HIKVISION DS-2TD2637T-7/P - Authentication; Security Audit Log

HIKVISION DS-2TD2637T-7/P
106 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
10.14.1 Authencaon
You can improve network access security by seng RTSP and WEB authencaon.
Go to Conguraon → System → Security Authencaon to choose authencaon protocol
and method according to your needs.
RTSP Authencaon
Digest and digest/basic are supported, which means authencaon informaon is needed when
RTSP request is sent to the device. If you select digest/basic, it means the device supports
digest or basic authencaon. If you select digest, the device only supports digest
authencaon.
RTSP Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in RTSP authencaon. If you enable the
digest algorithm except for MD5, the third-party plaorm might not be able to log in to the
device or enable live view because of compability. The encrypted algorithm with high strength
is recommended.
WEB
Authencaon
Digest and digest/basic are supported, which means authencaon informaon is needed when
WEB request is sent to the device. If you select digest/basic, it means the device supports digest
or basic
authencaon. If you select digest, the device only supports digest authencaon.
WEB Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in WEB authencaon. If you enable the
digest algorithm except for MD5, the third-party plaorm might not be able to log in to the
device or enable live view because of
compability. The encrypted algorithm with high strength
is recommended.
Note
Refer to the specic content of protocol to view authencaon requirements.
10.14.2 Security Audit Log
The security audit logs refer to the security operaon logs. You can search and analyze the security
log les of the device so as to nd out the illegal intrusion and troubleshoot the security events.
Security audit logs can be saved on device internal storage. The log will be saved every half hour
aer device boong. Due to limited storage space, you can also save the logs on a log server.
Search Security Audit Logs
You can search and analyze the security log les of the device so as to nd out the illegal intrusion
and troubleshoot the security events.
Thermal Opcal Bi-spectrum Network Camera User Manual
82

Table of Contents

Related product manuals