Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring SNMP Settings
- 6.3.6 Configuring 802.1X Settings
- 6.3.7 Configuring QoS Settings
- 6.3.8 Configuring UPnP™ Settings
- 6.3.9 Configuring Wireless Dial Settings
- 6.3.10 Email Sending Triggered by Alarm
- 6.3.11 Configuring NAT (Network Address Translation) Settings
- 6.3.12 Configuring FTP Settings
- 6.3.13 Platform Access
- 6.3.14 HTTPS Settings
 
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Parameters
- 6.6 Configuring and Handling Alarms- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Video Tampering Alarm
- 6.6.3 Configuring Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Configuring Other Alarm
- 6.6.7 Configuring Audio Exception Detection
- 6.6.8 Configuring Defocus Detection
- 6.6.9 Configuring Scene Change Detection
- 6.6.10 Configuring Face Detection
- 6.6.11 Configuring Line Crossing Detection
- 6.6.12 Configuring Intrusion Detection
- 6.6.13 Configuring Region Entrance Detection
- 6.6.14 Configuring Region Exiting Detection
- 6.6.15 Configuring Unattended Baggage Detection
- 6.6.16 Configuring Object Removal Detection
 
- 6.7 VCA Configuration
 
- Chapter 7 Storage Settings
- Chapter 8 Counting
- Chapter 9 Road Traffic
- Chapter 10 Playback
- Chapter 11 Log Searching
- Chapter 12 Others
- Appendix
User Manual of Network Camera 
89 
Figure 6-51 Video Tampering Alarm 
2.  Check  Enable  Video  Tampering  checkbox  to  enable  the  video  tampering 
detection. 
3.  Set the video tampering area. Refer to Task 1 Set the Motion Detection Area in 
Section 6.6.1. 
4.  Click Edit to edit the arming schedule for video tampering. The arming schedule 
configuration  is  the  same  as  the  setting  of  the  arming  schedule  for  motion 
detection.  Refer  to  Task  2  Set  the  Arming  Schedule  for  Motion  Detection  in 
Section 6.6.1. 
5.  Check the checkbox to select the linkage method taken for the video tampering. 
Audible warning, notify surveillance center, send email and trigger alarm output 
are selectable. Please refer to Task 3 Set the Alarm Actions for Motion Detection 
in Section 6.6.1. 
6.  Click Save to save the settings. 
6.6.3  Configuring Alarm Input 
Steps: 
1.  Enter the Alarm Input Settings interface: 
Configuration > Advanced Configuration> Basic Event > Alarm Input: 










