User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings
- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring SNMP Settings
- 6.3.6 Configuring 802.1X Settings
- 6.3.7 Configuring QoS Settings
- 6.3.8 Configuring UPnP™ Settings
- 6.3.9 Configuring Wireless Dial Settings
- 6.3.10 Email Sending Triggered by Alarm
- 6.3.11 Configuring NAT (Network Address Translation) Settings
- 6.3.12 Configuring FTP Settings
- 6.3.13 Platform Access
- 6.3.14 HTTPS Settings
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Parameters
- 6.6 Configuring and Handling Alarms
- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Video Tampering Alarm
- 6.6.3 Configuring Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Configuring Other Alarm
- 6.6.7 Configuring Audio Exception Detection
- 6.6.8 Configuring Defocus Detection
- 6.6.9 Configuring Scene Change Detection
- 6.6.10 Configuring Face Detection
- 6.6.11 Configuring Line Crossing Detection
- 6.6.12 Configuring Intrusion Detection
- 6.6.13 Configuring Region Entrance Detection
- 6.6.14 Configuring Region Exiting Detection
- 6.6.15 Configuring Unattended Baggage Detection
- 6.6.16 Configuring Object Removal Detection
- 6.7 VCA Configuration
- Chapter 7 Storage Settings
- Chapter 8 Counting
- Chapter 9 Road Traffic
- Chapter 10 Playback
- Chapter 11 Log Searching
- Chapter 12 Others
- Appendix
User Manual of Network Camera
102
6. Set the time threshold, detection sensitivity and object percentage for intrusion
detection.
Threshold: Range [0s-10s], the threshold for the time of the object loitering in
the region. If you set the value as 0, alarm is triggered immediately after the
object entering the region.
Sensitivity: Range [1-100]. The value of the sensitivity defines the size of the
object which can trigger the alarm. When the sensitivity is high, a very small
object can trigger the alarm.
Percentage: Range [1-100]. Percentage defines the ratio of the in-region part of
the object which can trigger the alarm. For example, if the percentage is set as
50%, when the object enters the region and occupies half of the whole region, the
alarm is triggered.
7. Repeat the above steps to configure other regions. Up to 4 regions can be set. You
can click the Clear button to clear all pre-defined regions.
8. Click the Edit button to set the arming schedule.
9. Select the linkage methods for intrusion detection, including Notify Surveillance
Center, Send Email, Upload to FTP, Trigger Channel and Trigger Alarm Output.
10. Click Save to save the settings.
Figure 6-63 Configuring Intrusion Area