Configuring Illegal Access Event Settings; Figure 7-14 Network Event; Figure 7-15 Illegal Access Configuration; Table 7-5 Network Configuration - Honeywell HED2PER3 Configuration Manual

Performance series ip cameras
Hide thumbs Also See for HED2PER3:
Table of Contents

Advertisement

Performance Series IP Camera Software Configuration Guide

Figure 7-14 Network Event

Table 7-5 Network Configuration

Parameter
Function
Event
Select a network event type in the dropdown list.
Type
Enable
Check to enable the selected network event type.
Record
If Record is enabled, the selected event type can activate recording.
Record
The system will wait for the specified time before it begins recording. Select
Delay
from 10s to 300s.

Configuring Illegal Access Event Settings

Go to Setup Video Analytics Event Illegal Access.
You can specify how many unsuccessful login attempts can be made before the system
triggers an illegal access alarm.

Figure 7-15 Illegal Access Configuration

Table 7-6 Illegal Access Configurations

Parameter
Function
Enable
Check to enable the illegal access event.
Failed
Login
Enter the number of times a user can attempt to log in. Select from 3 to 10.
Attempts
58

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents