Security; Authentication; Security Audit Log - HIKVISION DS-2TD2137-7P User Manual

Thermal network camera
Hide thumbs Also See for DS-2TD2137-7P:
Table of Contents

Advertisement

DS-2TD2137-7P Thermal Network Camera User Manual
Steps
1. Go to Configuration → System → System Settings → Unit Settings.
2. Check Use Same Unit.
3. Set the temperature unit and distance unit.
4. Click Save.

Security

You can improve system security by setting security parameters.

Authentication

You can improve network access security by setting RTSP and Web authentication.
Go to Configuration → System → Security → Authentication to choose authentication protocol and method
according to your needs.
• RTSP Authentication: Digest and digest/basic are supported, which means authentication information
is needed when an RTSP request is sent to the device. If you select digest/basic, it means the device
supports digest or basic authentication. If you select digest, the device supports only digest
authentication.
• RTSP Digest Algorithm: MD5, SHA256, and MD5/SHA256 encrypted algorithm in RTSP authentication. If
you enable the digest algorithm except for MD5, the third-party platform might not be able to log in to
the device or enable live view because of compatibility. The encrypted algorithm with high strength is
recommended.
• WEB Authentication: Digest and digest/basic are supported, which means authentication information
is needed when a Web request is sent to the device. If you select digest/basic, it means the device
supports digest or basic authentication. If you select digest, the device supports only digest
authentication.
• WEB Digest Algorithm: MD5, SHA256, and MD5/SHA256 encrypted algorithm in Web authentication. If
you enable the digest algorithm except for MD5, the third-party platform might not be able to log in to
the device or enable live view because of compatibility. The encrypted algorithm with high strength is
recommended.
NOTE:
Refer to the specific content of protocol to view authentication requirements.

Security Audit Log

The security audit logs refer to the security operation logs. You can search and analyze the security log
files of the device to find out illegal intrusions and troubleshoot security events.
Security audit logs can be saved on the device's internal storage. The log will be saved every half hour
after device booting. Due to limited storage space, you can also save the logs on a log server.
UM DS-2TD2137-7P 042021NA
65

Advertisement

Table of Contents
loading

Table of Contents