IC Realtime HDVR-MX0402-1U5MP-AI2-WEB Product Manual - Page 215

Illegal Login

Page 215 highlights

○? Step 3 Security Event monitoring explanation. It indicates the type of attacks that can trigger security exception. ● Unauthorized executable program trying to run ● Web URL brute-force attack ● Session connection overload ● Session ID brute-force attack Click Apply to complete the settings. 5.19.6.2 Illegal Login Step 1 Select Main Menu > Advanced Settings> Network > Cyber Security > Security Warning > Illegal Login. The Illegal Login interface will be displayed. Figure 5-130 Step 2 Select Enable and configure parameters. Parameter Description Alarm-out Port Post-Alarm Buzzer Alarm Tone The alarm device (such as lights, sirens) is connected to the alarm output port. When an alarm occurs, the NVR device transmits the alarm information to the alarm device. When the alarm ends, the alarm extended for a period of time. The time range is from 0 seconds through 300 seconds. Select the check box to activate the buzzer when an alarm occurs. System will play an audio file when the alarm occurs. Check the box and then select the corresponding audio file from the dropdown list. See 5.17 to add audio file first. Select the check box, the NVR device records the alarm information Log in the log when an alarm occurs. Select the check box. When an alarm occurs, the NVR device sends an email to the set mailbox to notify the user. Send Email To use this function, make sure the email function is enabled in Main Menu > Advanced Settings > Network > Email.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253

?
Security Event monitoring explanation. It indicates the type of
attacks that can trigger security exception.
Unauthorized executable program trying to run
Web URL brute-force attack
Session connection overload
Session ID brute-force attack
Step 3
Click
Apply
to complete the settings.
5.19.6.2
Illegal Login
Step 1
Select
Main Menu
>
Advanced Settings
>
Network > Cyber Security >
Security Warning
>
Illegal Login
.
The
Illegal Login
interface will be displayed.
Figure 5-130
Step 2
Select
Enable
and configure parameters.
Parameter
Description
Alarm-out Port
The alarm device (such as lights, sirens) is connected to the alarm
output port. When an alarm occurs, the NVR device transmits the
alarm information to the alarm device.
Post-Alarm
When the alarm ends, the alarm extended for a period of time. The
time range is from 0 seconds through 300 seconds.
Buzzer
Select the check box to activate the buzzer when an alarm occurs.
Alarm Tone
System will play an audio file when the alarm occurs. Check the box
and then select the corresponding audio file from the dropdown
list.
See 5.17 to add audio file first.
Log
Select the check box, the NVR device records the alarm information
in the log when an alarm occurs.
Send Email
Select the check box. When an alarm occurs, the NVR device sends
an email to the set mailbox to notify the user.
To use this function, make sure the email function is enabled in
Main Menu > Advanced Settings > Network > Email
.