User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Live View
- Chapter 5 Network Camera Configuration
- Chapter 6 Network Settings
- Chapter 7 Video/Audio Settings
- Chapter 8 Configuring Image Parameters
- Chapter 9 Configuring Event Settings- 9.1 Configuring Motion Detection
- 9.2 Configuring Video Tampering Alarm
- 9.3 Configuring Alarm Input
- 9.4 Configuring Alarm Output
- 9.5 Handling Exception
- 9.6 Configuring Audio Exception Detection
- 9.7 Configuring Intrusion Detection
- 9.8 Configuring Line Crossing Detection
- 9.9 Configuring Region Entrance Detection
- 9.10 Configuring Region Exiting Detection
- 9.11 Configuring Unattended Baggage Detection
- 9.12 Configuring Object Removal Detection
 
- Chapter 10 Storage Settings
- Chapter 11 People Counting
- Chapter 12 Heat Map
- Chapter 13 Intersection Analysis
- Chapter 14 Playback
- Chapter 15 Picture
- Chapter 16 Application
- Appendix
User Manual of Network Fisheye Camera 
112 
the events, including motion detection, alarm input, line crossing detection 
and intrusion detection. For details, please refer to Section 5.6. 
(4)  Select  the  picture  format,  resolution,  quality,  capture  interval,  and  capture 
number. 
5.  Set the time interval between two snapshots. 
6.  Click Save to save the settings. 
7.  (Optional) To upload the captured pictures to the FTP server, configure the FTP 
parameters and check Upload Picture checkbox in FTP Settings interface. For 
details, please refer to Section 5.3.7 Configuring FTP Settings. 
10.3 Configuring Net HDD 
Before you start: 
The network disk should be available within the network and properly configured to 
store the recorded files, log files, etc. 
Steps:   
1.  Add Net HDD. 
(1) Enter the Net HDD settings interface, Configuration > Storage > Storage 
Management > Net HDD. 
Figure 10-5 Add Network Disk 
(2) Enter the IP address of the network disk, and enter the file path. 
(3) Select the mounting type. NFS and SMB/CIFS are selectable. And you can set 
the  user  name  and  password  to  guarantee  the  security  if  SMB/CIFS  is 
selected. 










