User Manual of Network Camera
10
6.3.10 Email Sending Triggered by Alarm ................................................................................56
6.3.11 Configuring NAT (Network Address Translation) Settings............................................58
6.3.12 Configuring FTP Settings...............................................................................................59
6.3.13 Platform Access ..............................................................................................................60
6.3.14 HTTPS Settings..............................................................................................................61
6.4 Configuring Video andAudio Settings............................................................... 63
6.4.1 Configuring Video Settings ............................................................................................63
6.4.2 Configuring Audio Settings ............................................................................................66
6.4.3 Configuring ROI Encoding.............................................................................................67
6.4.4 Display Information on Stream.......................................................................................69
6.4.5 Configuring Target Cropping..........................................................................................69
6.5 Configuring Image Parameters .......................................................................... 70
6.5.1 Configuring Display Settings .........................................................................................70
6.5.2 Configuring OSD Settings..............................................................................................76
6.5.3 Configuring Text Overlay Settings .................................................................................77
6.5.4 Configuring Privacy Mask..............................................................................................78
6.5.5 Configuring Picture Overlay...........................................................................................79
6.6 Configuring and Handling Basic Events............................................................ 80
6.6.1 Configuring Motion Detection........................................................................................80
6.6.2 Configuring Video Tampering Alarm .............................................................................87
6.6.3 Configuring Alarm Input ................................................................................................88
6.6.4 Configuring Alarm Output..............................................................................................89
6.6.5 Handling Exception........................................................................................................90
6.6.6 Configuring Other Alarm................................................................................................91
6.7 Configuring and Handling Smart Events.......................................................... 94
6.7.1 Configuring Audio Exception Detection ........................................................................94
6.7.2 Configuring Defocus Detection......................................................................................96
6.7.3 Configuring Scene Change Detection.............................................................................96
6.7.4 Configuring Face Detection............................................................................................97
6.7.5 Configuring Line Crossing Detection.............................................................................99
6.7.6 Configuring Intrusion Detection...................................................................................101
6.7.7 Configuring Region Entrance Detection.......................................................................103
6.7.8 Configuring Region Exiting Detection.........................................................................104
6.7.9 Configuring Unattended Baggage Detection................................................................105
6.7.10 Configuring Object Removal Detection .......................................................................107
6.8 VCAConfiguration............................................................................................ 109
6.8.1 Behavior Analysis.........................................................................................................109
6.8.2 Face Capture.................................................................................................................116
6.8.3 People Counting ...........................................................................................................119
6.8.4 Heat Map ......................................................................................................................122
6.8.5 Counting .......................................................................................................................125
Chapter 7 Storage Settings.....................................................................................129