
4
4.1.4 Storage..........................................................................................25
4.2 Image Configuration.................................................................................27
4.2.1 Video / Audio Configuration...........................................................27
4.2.2 OSD Configuration........................................................................29
4.2.3 Video Mask (Privacy) ....................................................................29
4.2.4 Camera Setup...............................................................................30
4.3 PTZ Configuration ....................................................................................31
4.3.1 PTZ and Password Setting............................................................31
4.3.2 Restore..........................................................................................32
4.3.3 PTZ Function.................................................................................32
4.4 Alarm Configuration..................................................................................32
4.4.1 Motion Detection ...........................................................................32
4.4.2 Other Alarms.................................................................................33
4.4.3 Alarm Input....................................................................................35
4.4.4 Alarm Out......................................................................................36
4.4.5 Alarm Server .................................................................................37
4.5 Event Configuration..................................................................................38
4.5.1 Object Removal.............................................................................38
4.5.2 Exception ......................................................................................40
4.5.3 Line Crossing ................................................................................42
4.5.4 Intrusion ........................................................................................43
4.5.5 Crowd Density Detection...............................................................45
4.5.6 People Intrusion ............................................................................47
4.5.7 People Counting............................................................................48
4.6 Network Configuration..............................................................................50
4.6.1 TCP/IPv4.......................................................................................50
4.6.2 Port................................................................................................52
4.6.3 Server............................................................................................52
4.6.4 DDNS............................................................................................52
4.6.5 SNMP............................................................................................53
4.6.6 802.1X...........................................................................................54
4.6.7 RTSP.............................................................................................55
4.6.8 UPnP.............................................................................................56
4.6.9 E-mail............................................................................................56
4.6.10 FTP ...............................................................................................57
4.6.11 HTTPS ..........................................................................................58
4.6.12 P2P (optional)................................................................................59
4.6.13 QoS...............................................................................................60
4.7 Security Configuration..............................................................................60
4.7.1 User Configuration ........................................................................60
4.7.2 Online user....................................................................................62
4.7.3 Block and Allow Lists.....................................................................62
4.7.4 Security Management ...................................................................62
4.8 Maintenance.............................................................................................63