Table of Contents
1Product & Accessories.....................................................................................5
2Parts and Description.......................................................................................6
3Installation.........................................................................................................7
4Cabling...............................................................................................................8
5Remote Preview ................................................................................................9
6Remote Live Surveillance...............................................................................10
6.1 System Configuration.....................................................................................................10
6.1.1 Basic Information............................................................................................10
6.1.2 Date and Time................................................................................................11
6.1.3 Local Config...................................................................................................11
6.2 Image Configuration ......................................................................................................11
6.2.1 Display Configuration .....................................................................................11
6.2.2 Video / Audio Configuration ............................................................................13
6.2.3 OSD Configuration..........................................................................................14
6.2.4 Video Mask ....................................................................................................15
6.2.5 ROI Configuration...........................................................................................15
6.3 Alarm Configuration.......................................................................................................16
6.3.1 Motion Detection ...........................................................................................16
6.3.2 Alarm Server ..................................................................................................18
6.4 Event Configuration .......................................................................................................19
6.4.1 Object Removal..............................................................................................19
6.4.2 Exception ......................................................................................................21
6.4.3 Line Crossing .................................................................................................22
6.4.4 Intrusion........................................................................................................24
6.5 Network Configuration...................................................................................................26
6.5.1 TCP/IP ...........................................................................................................26
6.5.2 Port...............................................................................................................28
6.5.3 Server Configuration.......................................................................................28
6.5.4 DDNS ............................................................................................................28
6.5.5 SNMP ............................................................................................................30
6.5.6 RTSP..............................................................................................................31
6.5.7 UPNP.............................................................................................................31
6.5.8 Email.............................................................................................................32
6.5.9 FTP ...............................................................................................................32
6.6 Security Configuration....................................................................................................33
6.6.1 User Configuration .........................................................................................33
6.6.2 Online User ....................................................................................................35
6.6.3 Block and Allow Lists.......................................................................................35
6.7 Maintenance Configuration ............................................................................................35
6.7.1 Backup and Restore ........................................................................................35
6.7.2 Reboot ..........................................................................................................36
6.7.3 Upgrade ........................................................................................................36
6.7.4 Operation Log................................................................................................37
7Record Search.................................................................................................38
8Appendix..........................................................................................................39
9Dimensions......................................................................................................41
10 Warranty Information..............................................................................42
11 Limits and Exclusions....................................................................................43