62
higher threshold. Settable Tampering Duration time range is from 10 to 3600
seconds.
Triggered Action (Multi-option)
The Administrator can specify alarm actions that will take when tampering is
detected. All options are listed as follows:
•
Enable Alarm Output
Check the item and select the predefined type of alarm output to enable
alarm relay output when tampering is detected.
•
Record stream to SD Card
Select this item, and the Tampering Alarm recording will be stored in
Micro SD/ SDHC card when tampering is detected.
NOTE: Please make sure the local recording (with Micro SD/
SDHC card) is activated so that this function can be implemp-
nted. See section
5.3.12 Recording
for further details.
•
Send Alarm Message by FTP/E-Mail
The Administrator can select whether to send an alarm message by
FTP and/or E-Mail when tampering is detected.
•
Upload Image by FTP
Select this item, and the Administrator can assign a FTP site and
configure various parameters as shown in the figure below. When
tampering is detected, event images will be uploaded to the appointed
FTP site.
Содержание ICS-20F
Страница 1: ...Full HD IP Box Camera User Manual Ver1 4...
Страница 7: ...6 Dimensions...
Страница 13: ...12 The popup window for confirmation will come out as shown below Click OK to start deleting the files...
Страница 29: ...28...
Страница 74: ...73 5 3 17 View Parameters Click on this item to view the entire system s parameter setting...
Страница 108: ...108 Step 5 Click Next in the Windows Components Wizard page Step 6 Click Finish to complete installation...