User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Login
- 5 Main Interface
- 6 Setting- 6.1 Local
- 6.2 Camera- 6.2.1 Setting Image Parameters
- 6.2.2 Setting Encode Parameters- 6.2.2.1 Encode
- 6.2.2.2 Overlay- 6.2.2.2.1 Configuring Privacy Masking
- 6.2.2.2.2 Configuring Channel Title
- 6.2.2.2.3 Configuring Time Title
- 6.2.2.2.4 Configuring Location
- 6.2.2.2.5 Configuring Font Properties
- 6.2.2.2.6 Configuring Picture Overlay
- 6.2.2.2.7 Configuring Custom Title
- 6.2.2.2.8 Configuring Target Statistics
- 6.2.2.2.9 Configuring Face Detection
- 6.2.2.2.10 Configuring Face Recognition
- 6.2.2.2.11 Configuring Face Statistics
 
- 6.2.2.3 ROI
 
- 6.2.3 Setting Audio Parameters
 
- 6.3 Network
- 6.4 Event
- 6.5 Storage
- 6.6 System
- 6.7 System Information
- 6.8 Setting Log
 
- 7 Live
- 8 AI
- 9 Camera
- 10 Event
- 11 System
- 12 Security
- 13 Record
- 14 Picture
- 15 Report
- Appendix 1 Cybersecurity Recommendations
Operation Manual 
48 
Step 1  Select    > 
Network
 > 
QoS
. 
Figure 6-37 QoS 
Step 2  Configure QoS parameters. 
Table 6-19 Description of QoS parameters 
Parameter 
Description 
Realtime Monitor 
Configure the priority of the data packets that used for network 
surveillance. 0 for the lowest and 63 the highest. 
Command 
Configure the priority of the data packets that used for configure or 
checking. 
Step 3  Click 
Save
. 
6.3.12 Platform Access 
6.3.12.1 P2P 
P2P (peer-to-peer) technology enables users to manage devices easily without requiring 
DDNS, port mapping or transit server. 
Scan the QR code with your smartphone, and then you can add and manage more devices on 
the mobile phone client. 
Step 1  Select    > 
Network
 > 
Platform Access
 > 
P2P
. 
Figure 6-38 P2P 
●  When P2P is enabled, remote management on device is supported. 
●  When P2P is enabled and the device accesses to the network, the status shows 
online. The information of the IP address, MAC address, device name, and device 
SN will be collected. The collected information is for remote access only. You can 










