
Transcendent IP Cameras v4: Operation Manual
Table of Contents
1Introduction ...................................................................................................................... 4
2IE Remote Access ............................................................................................................ 5
2.1LAN ........................................................................................................................ 5
1.1.1 Access through IP-Tool ................................................................................................................... 5
1.1.2 Directly Access through IE .............................................................................................................. 6
2.2WAN....................................................................................................................... 8
3Remote Preview ............................................................................................................. 11
4Remote Live Surveillance.............................................................................................. 12
1.2 System Configuration ............................................................................................... 12
1.2.1 Basic Information........................................................................................................................... 12
1.2.2 Date and Time............................................................................................................................... 12
1.2.3 Local Config .................................................................................................................................. 13
1.2.4 Storage.......................................................................................................................................... 13
1.3 Image Configuration ................................................................................................. 14
1.3.1 Display Configuration .................................................................................................................... 14
1.3.2 Video / Audio Configuration........................................................................................................... 15
1.3.3 OSD Configuration ........................................................................................................................ 17
1.3.4 Video Mask.................................................................................................................................... 17
1.3.5 ROI Configuration.......................................................................................................................... 18
1.4 Alarm Configuration.................................................................................................. 19
1.4.1 Motion Detection ........................................................................................................................... 19
1.4.2 Alarm Server ................................................................................................................................. 21
1.5 Event Configuration .................................................................................................. 21
1.5.1 Object Removal............................................................................................................................. 21
1.5.2 Exception....................................................................................................................................... 23
1.5.3 Line Crossing ................................................................................................................................ 25
1.5.4 Intrusion......................................................................................................................................... 26
1.6 Network Configuration.............................................................................................. 28
1.6.1 TCP/IP........................................................................................................................................... 28
1.6.2 Port................................................................................................................................................ 29
1.6.3 Server Configuration ..................................................................................................................... 30
1.6.4 DDNS ............................................................................................................................................ 30
1.6.5 SNMP ............................................................................................................................................ 31
1.6.6 RTSP............................................................................................................................................. 32
1.6.7 UPNP ............................................................................................................................................ 33
1.6.8 Email ............................................................................................................................................. 33
1.6.9 FTP................................................................................................................................................ 34
4.1Security Configuration....................................................................................... 35
1.6.10 User Configuration ...................................................................................................................... 35
1.6.11 Online User ................................................................................................................................. 37
1.6.12 Block and Allow Lists................................................................................................................... 37