Hikvision DS-2CD8433F-E(I) [58/95] Configuring tamper proof alarm
![Hikvision DS-2CD8433F-E(I) [58/95] Configuring tamper proof alarm](/views2/1115840/page58/bg3a.png)
User Manual of Network Camera
57
You can specify the linkage method when an event occurs. The following
contents are about how to configure the different types of linkage method.
Figure 6-27 Linkage Method
Steps:
(1) Check the checkbox to select the linkage method. Audible warning, notify
surveillance center, send email, upload to FTP, trigger channel and trigger
alarm output are selectable (Optional).
Audible Warning
Trigger the audible warning locally.
Notify Surveillance Center
Send an exception or alarm signal to remote management software when
an event occurs.
Send Email
Send an email with alarm information to a user or users when an event
occurs.
Note: To send the Email when an event occurs, you need to refer to Section
6.6.6 to set the related parameters.
Upload to FTP
Capture the image when an alarm is triggered and upload the picture to a
FTP server.
Note: Set the FTP address and the remote FTP server first. Refer to Section
6.3.8 for detailed information.
Trigger Channel
The video will be recorded when the motion is detected. You have to set the
recording schedule to realize this function. Please refer to Section 7.2 for
detailed information.
Trigger Alarm Output
Trigger one or more external alarm outputs when an event occurs.
Note: To trigger an alarm output when an event occurs, please refer to
Section 6.6.4 to set the related parameters.
6.6.2 Configuring Tamper-proof Alarm
Purpose:
Содержание
- User manual p.1
- Network camera p.1
- Regulatory information p.4
- Safety warnings and cautions p.5
- Safety instruction p.8
- Contents p.10
- Chapter 1 system requirement p.13
- Chapter 2 network connection p.14
- Setting the network camera over the lan p.14
- Wiring over the lan p.14
- Detecting and changing the ip address p.15
- Static ip connection p.16
- Setting the network camera over the wan p.16
- Dynamic ip connection p.17
- Camera p.19
- Chapter 3 access to the network camera p.19
- Chapter 3 access to the network p.19
- Accessing by web browsers p.19
- Accessing by ivms 4200 software p.21
- Accessing by client software p.21
- Chapter 4 wi fi settings p.22
- Accessing by ivms 4500 software p.22
- Configuring wi fi connection in manage and ad hoc modes p.23
- Configuring wi fi connection in manage and p.23
- Ad hoc modes p.23
- Easy wi fi connection with wps function p.27
- Ip property settings for wireless network connection p.29
- Ip property settings for wireless network p.29
- Connection p.29
- Live view page p.30
- Chapter 5 live view p.30
- Starting live view p.31
- Recording and capturing pictures manually p.31
- Operating ptz control p.32
- Ptz control panel p.32
- Setting calling a preset p.33
- Configuration p.34
- Configuring local parameters p.34
- Configuring live view parameters p.34
- Chapter 6 network camera configuration p.34
- Chapter 6 network camera p.34
- Configuring time settings p.36
- Configuring tcp ip settings p.38
- Configuring network settings p.38
- Configuring pppoe settings p.39
- Configuring port settings p.39
- Configuring ddns settings p.40
- Configuring snmp settings p.42
- Configuring 802 x settings p.43
- Configuring qos settings p.44
- Configuring ftp settings p.45
- Configuring upnp settings p.46
- Configuring video and audio settings p.47
- Configuring video settings p.47
- Configuring audio settings p.48
- Configuring image parameters p.49
- Configuring roi encoding p.49
- Configuring display settings p.49
- Descriptions of parameter configuration p.50
- Configuring osd settings p.51
- Configuring text overlay settings p.53
- Configuring privacy mask p.53
- Configuring picture overlay p.54
- Configuring and handling alarms p.55
- Configuring motion detection p.55
- Configuring tamper proof alarm p.58
- Configuring external alarm input p.60
- Configuring alarm output p.61
- Handling exception p.62
- Email sending triggered by alarm p.63
- Configuring snapshot settings p.64
- Face detection p.65
- Configuring other alarms p.66
- Arming or disarming the camera p.71
- Configuring nas settings p.73
- Chapter 7 storage settings p.73
- Configuring recording schedule p.74
- Chapter 8 playback p.79
- Chapter 9 log searching p.81
- Chapter 10 others p.82
- Managing user accounts p.82
- Configuring rtsp authentication p.84
- Anonymous visit p.84
- Ip address filter p.85
- Viewing device information p.87
- Restoring default settings p.88
- Rebooting the camera p.88
- Maintenance p.88
- Importing exporting configuration file p.88
- Rs 232 settings p.89
- Upgrading the system p.89
- Rs 485 settings p.90
- Search active devices online p.91
- Description of sadp v 2 p.91
- Appendix 1 sadp software introduction p.91
- Appendix p.91
- Restore default password p.92
- Modify network parameters p.92
- Appendix 2 port mapping p.93
Похожие устройства
-
Hikvision DS-2TD2366-100Инструкция по эксплуатации -
Hikvision DS-2TD2336-75Инструкция по эксплуатации -
Hikvision DS-2TD2336-50Инструкция по эксплуатации -
Hikvision DS-2TD2336-100Инструкция по эксплуатации -
Hikvision DS-2TD2166T-25Инструкция по эксплуатации -
Hikvision DS-2TD2166T-15Инструкция по эксплуатации -
Hikvision DS-2TD2166-7/V1Инструкция по эксплуатации -
Hikvision DS-2TD2166-35SИнструкция по эксплуатации -
Hikvision DS-2TD2166-35Руководство пользователя -
Hikvision DS-2TD2166-35Инструкция по эксплуатации -
Hikvision DS-2TD2166-35Краткое руководство -
Hikvision DS-2TD2166-25Инструкция по эксплуатации