User manual
51
Figure 7.21 Tamper-proof Alarm Settings
3. Click checkbox of Enable Tamper-proof.
4. Set the tamper-Proof area. Please refer to Step 1 Set the Motion Detection Area in Chapter 8.3.1.
6. Click Edit to edit the arming schedule for tamper-proof. The arming schedule configuration is the
same as the Setting of the Arming Schedule for Motion Detection. Please refer to Step 2 Set the Arming
Schedule for Motion Detection in Section 7.3.1 Configuring Motion Detection.
7. Click the Linking Method tab to set the actions taken for the tamper-proof alarm. Please refer to
Step 3 Set the Alarm Actions Taken for Motion Detection in Section 7.3.1 Configuring Motion
Detection.
7.3.5 Handling Exception
The exception type can be HDD full, HDD error, network disconnected, IP address conflict, illegal access,
video standard mismatch, video signal exception, record/capture exception and video resolution
mismatch.
Note: When the selected resolution under Remote Configuration > Camera Settings >Video Settings
and the actual video input resolution are mismatched, the exception alarm will occur. Please refer to
Section 7.2 Configuring Video Settings.
Steps:
1. Click Remote Configuration> Exception to enter the Exception Settings interface.
2. Check the checkbox to set the actions taken for the Exception alarm. Please refer to Step 3 Set the
Alarm Actions Taken for Motion Detection in Section 7.3.1 Configuring Motion Detection.