Table of Contents
1Introduction.........................................................................................................1
2IE Remote Access.................................................................................................2
2.1 LAN...............................................................................................................................2
2.1.1 Access through IP-Tool......................................................................................2
2.1.2 DirectlyAccess through IE.................................................................................3
2.2 WAN..............................................................................................................................5
3Remote Preview...................................................................................................8
4Remote Live Surveillance.....................................................................................9
4.1System Configuration .......................................................................................................9
4.1.1 Basic Information..............................................................................................9
4.1.2 Date and Time ..................................................................................................9
4.1.3 Local Config ..................................................................................................10
4.2 Image Configuration.......................................................................................................10
4.2.1 Display Configuration......................................................................................10
4.2.2 Video / Audio Configuration............................................................................. 11
4.2.3 OSD Configuration .........................................................................................13
4.2.4 Video Mask....................................................................................................13
4.2.5 ROI Configuration ..........................................................................................14
4.3 Alarm Configuration.......................................................................................................15
4.3.1 Motion Detection............................................................................................15
4.3.2 Alarm Server..................................................................................................17
4.4 Event Configuration........................................................................................................17
4.4.1 Object Removal..............................................................................................17
4.4.2 Exception.......................................................................................................19
4.4.3 Line Crossing.................................................................................................21
4.4.4 Intrusion ........................................................................................................23
4.5 Network Configuration....................................................................................................26
4.5.1 TCP/IP ..........................................................................................................26
4.5.2 Port...............................................................................................................27
4.5.3 Server Configuration .......................................................................................27
4.5.4 DDNS ...........................................................................................................28
4.5.5 SNMP ...........................................................................................................29
4.5.6 RTSP.............................................................................................................30
4.5.7 UPNP............................................................................................................30
4.5.8 Email ............................................................................................................31
4.5.9 FTP...............................................................................................................32
4.6 Security Configuration....................................................................................................32
4.6.1 User Configuration..........................................................................................32
4.6.2 Online User....................................................................................................34