![E-line ELI-SIP2-NVR8 Скачать руководство пользователя страница 186](http://html.mh-extra.com/html/e-line/eli-sip2-nvr8/eli-sip2-nvr8_user-manual_518295186.webp)
274
Figure 5-60
5.8.3.1.3 Tampering
The tampering interface is shown as in Figure 5-61.
After analysis video, system can generate a tampering alarm when the detected moving signal reached
the sensitivity you set here.
For detailed setups, please refer to chapter 5.8.3.1.1 motion detect for detailed information.
Figure 5-61
5.8.3.2 Alarm
Before operation, please make sure you have properly connected alarm devices such as buzzer. The
input mode includes local alarm and network alarm.
5.8.3.2.1 Local Alarm
The local alarm interface is shown as in Figure 5-62. It refers to alarm from the local device.
Содержание ELI-SIP2-NVR8
Страница 84: ...172 Figure 4 81 Figure 4 82 ...
Страница 85: ...173 Figure 4 83 Figure 4 84 ...
Страница 91: ...179 Figure 4 89 Figure 4 90 ...
Страница 92: ...180 Figure 4 91 Figure 4 92 ...
Страница 93: ...181 Figure 4 93 Figure 4 94 ...
Страница 95: ...183 Figure 4 96 Figure 4 97 ...
Страница 121: ...209 Figure 4 125 In Figure 4 125 click one HDD item the S M A R T interface is shown as in Figure 4 126 Figure 4 126 ...
Страница 182: ...270 The motion detect interface is shown as in Figure 5 54 Figure 5 54 Figure 5 55 ...
Страница 183: ...271 Figure 5 56 Figure 5 57 Figure 5 58 ...
Страница 187: ...275 Figure 5 62 Figure 5 63 ...