User Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Speed Dome
- Chapter 4 Live View
- Chapter 5 PTZ Configuration
- Chapter 6 Speed Dome Configuration
- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings
- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring SNMP Settings
- 6.3.6 Configuring 802.1X Settings
- 6.3.7 Configuring QoS Settings
- 6.3.8 Configuring FTP Settings
- 6.3.9 Configuring UPnP™ Settings
- 6.3.10 Configuring NAT (Network Address Translation) Settings
- 6.3.11 Configuring Email Settings
- 6.3.12 Configuring Platform Access Settings
- 6.3.13 Configuring HTTPS Settings
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Settings
- 6.6 Configuring and Handling Alarms
- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Video Tampering Alarm
- 6.6.3 Configuring External Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Detecting Audio Exception
- 6.6.7 Configuring Dual-VCA
- 6.6.8 Configuring Intrusion Detection
- 6.6.9 Configuring Line Crossing Detection
- Chapter 7 Record Settings
- Chapter 8 Playback
- Chapter 9 Log Searching
- Chapter 10 Others
- Appendix
User Manual of E Series Network Speed Dome
© Hikvision
72
by clicking it.
4. Draw area.
1) Select the Region No.in dropdown list.
2) Click to draw a rectangle on the image as a defense region.
3) Click on the image to specify a corner of the rectangle, and right-click the mouse after
four corners are configured.
Up to four areas are supported.
You can click to clear the areas you drawn.
5. Configure the parameters for each defense region separately.
Threshold: Range [0-10s], the threshold for the time of the object loitering in the region. If
you set the value as 0, alarm is triggered immediately after the object entering the region.
Sensitivity: Range [1-100]. The value of the sensitivity defines the size of the object which
can trigger the alarm, when the sensitivity is high, a very small object can trigger the
alarm.
6. Click to edit the arming schedule for tampering. The arming schedule
configuration is the same as the setting of the arming schedule for motion detection. Refer to
Step 2 in Section 6.6.1 Configuring Motion Detection
7. Check the checkbox to select the linkage method taken for the intrusion detection. Notify
surveillance center, send email, trigger channel, smart tracking and trigger alarm output are
selectable. Please refer to Step 3 in Section 6.6.1 Configuring Motion Detection.
8. Click to save the settings.
6.6.9 Configuring Line Crossing Detection
The virtual plane detection can be adopted for the intrusion detection. Once the virtual plane is
detected being traversed according to the configured direction, a set of alarm action is triggered.
Steps:
1. Enter the Line Crossing Detection interface:
Configuration > Advanced Configuration > Events > Line Crossing Detection
2. Check the Line Crossing Detection checkbox.
3. Select the Line in dropdown list to configure.
4. The event triggered and park action related PTZ movement will be locked for 180 seconds