User Manual of Explosion-Proof Bullet Camera
39
Figure 5-15
Tampering Alarm
2.
Check
Enable
checkbox to enable the tampering detection.
3.
Click
tab to enter the arming schedule setting interface. The arming
schedule configuration is the same as the setting of the arming schedule for motion detection.
Refer to
Section
5.2.1 Configuring Motion Detection
4.
Click
tab to select the linkage method taken for tampering, notify
surveillance center, send email and trigger alarm output are selectable. Refer to
Section
5.
Click
to save the settings.
5.2.3
Configuring Alarm Input
Steps:
1.
Enter the Alarm Input settings interface:
Configuration > Event > Basic Event > Alarm
Input
2.
Choose the alarm input No. and the Alarm Type. The alarm type can be NO (Normally Open)
and NC (Normally Closed).
3.
Edit the name in
to set a name for the
alarm input (optional).