Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring SNMP Settings
- 6.3.6 Configuring 802.1X Settings
- 6.3.7 Configuring QoS Settings
- 6.3.8 Configuring UPnP™ Settings
- 6.3.9 Configuring Wireless Dial Settings
- 6.3.10 Email Sending Triggered by Alarm
- 6.3.11 Configuring NAT (Network Address Translation) Settings
- 6.3.12 Configuring FTP Settings
- 6.3.13 Platform Access
- 6.3.14 HTTPS Settings
 
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Parameters
- 6.6 Configuring and Handling Alarms- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Video Tampering Alarm
- 6.6.3 Configuring Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Configuring Other Alarm
- 6.6.7 Configuring Audio Exception Detection
- 6.6.8 Configuring Defocus Detection
- 6.6.9 Configuring Scene Change Detection
- 6.6.10 Configuring Face Detection
- 6.6.11 Configuring Line Crossing Detection
- 6.6.12 Configuring Intrusion Detection
- 6.6.13 Configuring Region Entrance Detection
- 6.6.14 Configuring Region Exiting Detection
- 6.6.15 Configuring Unattended Baggage Detection
- 6.6.16 Configuring Object Removal Detection
 
- 6.7 VCA Configuration
 
- Chapter 7 Storage Settings
- Chapter 8 Counting
- Chapter 9 Road Traffic
- Chapter 10 Playback
- Chapter 11 Log Searching
- Chapter 12 Others
- Appendix
User Manual of Network Camera 
102 
6.  Set the time threshold, detection sensitivity and object percentage for intrusion 
detection. 
Threshold: Range [0s-10s], the threshold for the time of the object loitering in 
the  region.  If  you  set  the  value  as  0,  alarm  is  triggered  immediately  after  the 
object entering the region. 
Sensitivity: Range [1-100]. The value of the sensitivity defines the size of the 
object which  can trigger  the alarm.  When  the  sensitivity is  high,  a  very  small 
object can trigger the alarm. 
Percentage: Range [1-100]. Percentage defines the ratio of the in-region part of 
the object which can trigger the alarm. For example, if the percentage is set as 
50%, when the object enters the region and occupies half of the whole region, the 
alarm is triggered. 
7.  Repeat the above steps to configure other regions. Up to 4 regions can be set. You 
can click the Clear button to clear all pre-defined regions. 
8.  Click the Edit button to set the arming schedule. 
9.  Select the linkage methods for intrusion detection, including Notify Surveillance 
Center, Send Email, Upload to FTP, Trigger Channel and Trigger Alarm Output. 
10.  Click Save to save the settings. 
Figure 6-63 Configuring Intrusion Area 










