
Table of Contents
1Introduction ...................................................................................................................1
2Network Connection......................................................................................................2
2.1 LAN...................................................................................................................2
2.1.1 Access through IP-Tool ............................................................................2
2.1.2 Directly Access through IE.......................................................................4
2.2 WAN..................................................................................................................5
3Live View........................................................................................................................8
4Configuration.................................................................................................................9
4.1 System Configuration ........................................................................................9
4.1.1 Basic Information .....................................................................................9
4.1.2 Date & Time.............................................................................................9
4.1.3 Local Configuration................................................................................10
4.2 Image Configuration........................................................................................10
4.2.1 Display Configuration ............................................................................10
4.2.2 Video Stream..........................................................................................12
4.2.3 OSD Configuration.................................................................................13
4.2.4 Video Mask ............................................................................................14
4.2.5 ROI Configuration..................................................................................15
4.3 Alarm Configuration........................................................................................16
4.3.1 Motion Detection....................................................................................16
4.3.2 Alarm Server ..........................................................................................18
4.4 Event Configuration (Optional) .......................................................................18
4.4.1 Exception................................................................................................18
4.4.2 Line Crossing..........................................................................................20
4.4.3 Intrusion..................................................................................................21
4.5 Network Configuration....................................................................................23
4.5.1 TCP/IP....................................................................................................23
4.5.2 Port .........................................................................................................25
4.5.3 Server Configuration ..............................................................................25
4.5.4 DDNS Configuration..............................................................................25
4.5.5 802.1x.....................................................................................................27
4.5.6 RTSP.......................................................................................................27
4.5.7 UPNP......................................................................................................28
4.5.8 Mail Configuration .................................................................................29
4.5.9 HTTPS....................................................................................................30
4.5.10 QoS ....................................................................................................31
4.6 Security Configuration.....................................................................................31
4.6.1 User Configuration .................................................................................31
4.6.2 Online Video User ..................................................................................33
4.6.3 Block and Allow List..............................................................................33