User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Basic Configuration- 4.1 Login
- 4.2 Live
- 4.3 PTZ Operation
- 4.4 Playback
- 4.5 Camera- 4.5.1 Conditions
- 4.5.2 Setting Video Parameters- 4.5.2.1 Video
- 4.5.2.2 Snapshot
- 4.5.2.3 Overlay- 4.5.2.3.1 Configuring Privacy Masking
- 4.5.2.3.2 Configuring Channel Title
- 4.5.2.3.3 Configuring Time Title
- 4.5.2.3.4 Configure Text Overlay
- 4.5.2.3.5 Configure Font Attribute
- 4.5.2.3.6 Configure Picture Overlay
- 4.5.2.3.7 Configure Custom Overlay
- 4.5.2.3.8 Configuring OSD Info
- 4.5.2.3.9 Configuring Counting
- 4.5.2.3.10 Configuring Structured Statistics
- 4.5.2.3.11 Configuring Ranging
- 4.5.2.3.12 Configuring ANPR
- 4.5.2.3.13 Configuring Face Statistics
 
- 4.5.2.4 ROI
- 4.5.2.5 Path
 
- 4.5.3 Audio
 
- 4.6 Network
- 4.7 Storage
- 4.8 System
 
- 5 Event- 5.1 Setting Alarm Linkage
- 5.2 Setting Smart Track
- 5.3 Setting Panoramic Calibration
- 5.4 Setting Video Detection
- 5.5 Setting Smart Motion Detection
- 5.6 Setting Audio Detection
- 5.7 Setting Smart Plan
- 5.8 Setting IVS
- 5.9 Setting Crowd Map
- 5.10 Setting Face Recognition
- 5.11 Setting Face Detection
- 5.12 Setting People Counting
- 5.13 Setting Heat Map
- 5.14 Setting Stereo Analysis
- 5.15 Setting ANPR
- 5.16 Setting Video Structuralization
- 5.17 Setting Relay-in
- 5.18 Setting Abnormality
 
- 6 Maintenance
- Appendix 1 Cybersecurity Recommendations
User’s Manual 
103 
The newly added user displays in the user name list. 
  After adding  user,  click    to  modify password, group,  memo or  authorities; 
click    to delete the added user. Admin user cannot be deleted. 
  Click    in the admin row to modify its username and email address. 
4.8.5 Safety 
You can configure system service, HTTPS, and Firewall. 
4.8.5.1 System Service 
Configure the IP hosts (devices with IP address) that are allowed to visit the device. Only the 
hosts in the trusted sites list can log in to the web interface. This is to enhance network and 
data security. 
  Select Setting > System > Safety > System Service. Step 1
The System Service interface is displayed. See Figure 4-99. 
 System service Figure 4-99
  Enable the system service according to the actual needs. For details, see Table 4-39. Step 2
Table 4-39 Description of system service parameters 
Function 
Description 
SSH 
You can enable SSH authentication to perform safety management. 
Multicast/Broadcast 
Search 
Enable this function, and then when multiple users are previewing the 
device  video  image  simultaneously  through  network,  they  can  find 










