9.16.4 Set HTTPS
..................................................................................................................
72
9.16.5 Set QoS
......................................................................................................................
72
9.16.6 Set IEEE 802.1X
.........................................................................................................
72
9.16.7 Control Timeout
Se²ngs
..........................................................................................
73
9.16.8 Search Security Audit Logs
........................................................................................
73
9.16.9 SSH
............................................................................................................................
73
9.17
Cer°ficate
Management
....................................................................................................
74
9.17.1 Create Self-signed
Cer°ficate
....................................................................................
74
9.17.2 Create
Cer°ficate
Request
........................................................................................
74
9.17.3 Import
Cer°ficate
......................................................................................................
74
9.17.4 Install Server/Client
Cer°ficate
.................................................................................
75
9.17.5 Install CA
Cer°ficate
..................................................................................................
75
9.17.6 Enable
Cer°ficate
Expira°on
Alarm
..........................................................................
76
9.18 User and Account
...............................................................................................................
76
9.18.1 Set User Account and Permission
.............................................................................
76
9.18.2 Simultaneous Login
...................................................................................................
77
9.18.3 Online Users
..............................................................................................................
77
Chapter 10 Allocate VCA Resource
............................................................................................
78
10.1 Face Capture
......................................................................................................................
78
10.1.1 Set Face Capture
.......................................................................................................
78
10.1.2 Overlay and Capture
.................................................................................................
79
10.1.3 Face Capture Algorithms Parameters
........................................................................
80
10.1.4 Set Shield Region
......................................................................................................
82
10.2
Mul°-Target-Type
Detec°on
(Capture Target With Feature)
.............................................
82
10.2.1 Set
Mul°-Target-Type
Detec°on
Rule
.......................................................................
82
10.2.2 Overlay and Capture
.................................................................................................
83
10.2.3
Mul°-Target-Type
Detec°on
Algorithm Parameters
.................................................
84
10.2.4 Set Shield Region
......................................................................................................
85
Network Camera User Manual
xv