User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Basic Configuration
- 4.1 Login
- 4.2 Live
- 4.3 PTZ Operation
- 4.4 Playback
- 4.5 Camera
- 4.5.1 Conditions
- 4.5.2 Setting Video Parameters
- 4.5.2.1 Video
- 4.5.2.2 Snapshot
- 4.5.2.3 Overlay
- 4.5.2.3.1 Configuring Privacy Masking
- 4.5.2.3.2 Configuring Channel Title
- 4.5.2.3.3 Configuring Time Title
- 4.5.2.3.4 Configure Text Overlay
- 4.5.2.3.5 Configure Font Attribute
- 4.5.2.3.6 Configure Picture Overlay
- 4.5.2.3.7 Configure Custom Overlay
- 4.5.2.3.8 Configuring OSD Info
- 4.5.2.3.9 Configuring Counting
- 4.5.2.3.10 Configuring Structured Statistics
- 4.5.2.3.11 Configuring Ranging
- 4.5.2.3.12 Configuring ANPR
- 4.5.2.3.13 Configuring Face Statistics
- 4.5.2.4 ROI
- 4.5.2.5 Path
- 4.5.3 Audio
- 4.6 Network
- 4.7 Storage
- 4.8 System
- 5 Event
- 5.1 Setting Alarm Linkage
- 5.2 Setting Smart Track
- 5.3 Setting Panoramic Calibration
- 5.4 Setting Video Detection
- 5.5 Setting Smart Motion Detection
- 5.6 Setting Audio Detection
- 5.7 Setting Smart Plan
- 5.8 Setting IVS
- 5.9 Setting Crowd Map
- 5.10 Setting Face Recognition
- 5.11 Setting Face Detection
- 5.12 Setting People Counting
- 5.13 Setting Heat Map
- 5.14 Setting Stereo Analysis
- 5.15 Setting ANPR
- 5.16 Setting Video Structuralization
- 5.17 Setting Relay-in
- 5.18 Setting Abnormality
- 6 Maintenance
- Appendix 1 Cybersecurity Recommendations
User’s Manual
109
When the IP addresses of the camera and your PC are in the same LAN, MAC verification
takes effect.
When you access the camera through internet, the camera verifies the MAC address
according to the router MAC.
This section takes Network Access as an example.
Step 1 Select Setting > System > Safety > Firewall.
The Firewall interface is displayed. See Figure 4-109.
Firewall Figure 4-109
Step 2 Select Network Access from Rule Type list, and then select the Enable check box.
Enable PING prohibited and Prevent Semijoin, and click Save. You do not need
to configure parameters.
Enable Network Access, and configure trust list and banned list.
1) Select the mode: TrustList and BannedList.
2) Click Add IP/MAC.
The Add IP/MAC interface is displayed. See Figure 4-110.
Add IP/MAC
Figure 4-110