User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- Chapter 7 Network Settings
- Chapter 8 Video/Audio Settings
- Chapter 9 Image Settings
- Chapter 10 Event Settings- 10.1 Basic Events
- 10.2 Smart Events- 10.2.1 Configuring Audio Exception Detection
- 10.2.2 Configuring Defocus Detection
- 10.2.3 Configuring Scene Change Detection
- 10.2.4 Configuring Face Detection
- 10.2.5 Configuring Intrusion Detection
- 10.2.6 Configuring Line Crossing Detection
- 10.2.7 Configuring Region Entrance Detection
- 10.2.8 Configuring Region Exiting Detection
- 10.2.9 Configuring Unattended Baggage Detection
- 10.2.10 Configuring Object Removal Detection
 
- 10.3 VCA Configuration
 
- Chapter 11 Storage Settings
- Chapter 12 Playback
- Chapter 13 Picture
- Chapter 14 Application
- Appendix
Network Camera User Manual 
146 
11.3 Configuring Net HDD 
Before you start: 
The network disk should be available within the network and properly configured to 
store the recorded files, log files, pictures, etc. 
Steps:   
1.  Add Net HDD. 
(1)  Enter the Net HDD settings interface, Configuration > Storage > Storage 
Management > Net HDD. 
Figure 11-6 Add Network Disk 
(2)  Enter the IP address of the network disk, and enter the file path. 
(3)  Select the mounting type. NFS and SMB/CIFS are selectable. And you can 
set the  user name and  password to  guarantee the security if SMB/CIFS  is 
selected. 
Note: Please refer to the NAS User Manual for creating the file path. 
  For your privacy and to better protect your system against security risks, 
we strongly recommend the use of strong passwords for all functions and 
network  devices.  The  password  should  be  something  of  your  own 
choosing (using a minimum of 8 characters, including at least three of 
the following categories: upper case letters, lower case letters, numbers 
and special characters) in order to increase the security of your product. 
  Proper configuration of all passwords and other security settings is the 










