Transcendent IP Cameras v4: Operation Manual
2
Table of Contents
1
Introduction ...................................................................................................................... 4
2
IE Remote Access ............................................................................................................ 5
2.1
LAN ........................................................................................................................ 5
1.1.1 Access through IP-Tool ................................................................................................................... 5
1.1.2 Directly Access through IE .............................................................................................................. 6
2.2
WAN ....................................................................................................................... 8
3
Remote Preview ............................................................................................................. 11
4
Remote Live Surveillance .............................................................................................. 12
1.2
System Configuration ............................................................................................... 12
1.2.1 Basic Information ........................................................................................................................... 12
1.2.2 Date and Time ............................................................................................................................... 12
1.2.3 Local Config .................................................................................................................................. 13
1.2.4 Storage .......................................................................................................................................... 13
1.3
Image Configuration ................................................................................................. 14
1.3.1 Display Configuration .................................................................................................................... 14
1.3.2 Video / Audio Configuration ........................................................................................................... 15
1.3.3 OSD Configuration ........................................................................................................................ 17
1.3.4 Video Mask .................................................................................................................................... 17
1.3.5 ROI Configuration .......................................................................................................................... 18
1.4
Alarm Configuration .................................................................................................. 19
1.4.1 Motion Detection ........................................................................................................................... 19
1.4.2 Alarm Server ................................................................................................................................. 21
1.5
Event Configuration .................................................................................................. 21
1.5.1 Object Removal ............................................................................................................................. 21
1.5.2 Exception ....................................................................................................................................... 23
1.5.3 Line Crossing ................................................................................................................................ 25
1.5.4 Intrusion ......................................................................................................................................... 26
1.6
Network Configuration .............................................................................................. 28
1.6.1 TCP/IP ........................................................................................................................................... 28
1.6.2 Port ................................................................................................................................................ 29
1.6.3 Server Configuration ..................................................................................................................... 30
1.6.4 DDNS ............................................................................................................................................ 30
1.6.5 SNMP ............................................................................................................................................ 31
1.6.6 RTSP ............................................................................................................................................. 32
1.6.7 UPNP ............................................................................................................................................ 33
1.6.8 Email ............................................................................................................................................. 33
1.6.9 FTP ................................................................................................................................................ 34
4.1
Security Configuration ....................................................................................... 35
1.6.10 User Configuration ...................................................................................................................... 35
1.6.11 Online User ................................................................................................................................. 37
1.6.12 Block and Allow Lists ................................................................................................................... 37