241
Figure 5-59
5.8.3.1.3 Tampering
The tampering interface is shown as in Figure 5-60.
After analysis video, system can generate a tampering alarm when the detected moving signal reached
the sensitivity you set here.
For detailed setups, please refer to chapter 5.8.3.1.1 motion detect for detailed information.
Figure 5-60
5.8.3.2 Alarm
Before operation, please make sure you have properly connected alarm devices such as buzzer. The
input mode includes local alarm and network alarm.
5.8.3.2.1 Local Alarm
The local alarm interface is shown as in Figure 5-61. It refers to alarm from the local device.
Содержание NVR-ELM-8-POE-8-DH
Страница 84: ...147 Figure 4 74 Figure 4 75...
Страница 85: ...148 Figure 4 76 Figure 4 77...
Страница 91: ...154 Figure 4 82 Figure 4 83...
Страница 92: ...155 Figure 4 84 Figure 4 85...
Страница 93: ...156 Figure 4 86 Figure 4 87...
Страница 95: ...158 Figure 4 89 Figure 4 90...
Страница 98: ...161 Figure 4 92 Figure 4 93 4 11 1 1 Connection The connection setup interface is shown as in Figure 4 94...
Страница 118: ...181 Figure 4 116 In Figure 4 116 click one HDD item the S M A R T interface is shown as in Figure 4 117 Figure 4 117...
Страница 133: ...196 Figure 4 136 Figure 4 137 4 14 3 1 Add Modify Group...
Страница 174: ...237 Figure 5 53 Figure 5 54...
Страница 175: ...238 Figure 5 55 Figure 5 56 Figure 5 57...
Страница 179: ...242 Figure 5 61 Figure 5 62...