User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings
- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring SNMP Settings
- 6.3.6 Configuring 802.1X Settings
- 6.3.7 Configuring QoS Settings
- 6.3.8 Configuring UPnP™ Settings
- 6.3.9 Configuring Wireless Dial Settings
- 6.3.10 Email Sending Triggered by Alarm
- 6.3.11 Configuring NAT (Network Address Translation) Settings
- 6.3.12 Configuring FTP Settings
- 6.3.13 Platform Access
- 6.3.14 HTTPS Settings
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Parameters
- 6.6 Configuring and Handling Alarms
- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Video Tampering Alarm
- 6.6.3 Configuring Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Configuring Other Alarm
- 6.6.7 Configuring Audio Exception Detection
- 6.6.8 Configuring Defocus Detection
- 6.6.9 Configuring Scene Change Detection
- 6.6.10 Configuring Face Detection
- 6.6.11 Configuring Line Crossing Detection
- 6.6.12 Configuring Intrusion Detection
- 6.6.13 Configuring Region Entrance Detection
- 6.6.14 Configuring Region Exiting Detection
- 6.6.15 Configuring Unattended Baggage Detection
- 6.6.16 Configuring Object Removal Detection
- 6.7 VCA Configuration
- Chapter 7 Storage Settings
- Chapter 8 Counting
- Chapter 9 Road Traffic
- Chapter 10 Playback
- Chapter 11 Log Searching
- Chapter 12 Others
- Appendix
User Manual of Network Camera
60
Attached Image: Check the checkbox of Attached Image if you want to send
emails with attached alarm images.
Interval: The interval refers to the time between two actions of sending attached
pictures.
Authentication (optional): If your email server requires authentication, check
this checkbox to use authentication to log in to this server and enter the login user
Name and password.
For your privacy and to better protect your system against security risks, we
strongly recommend the use of strong passwords for all functions and
network devices. The password should be something of your own choosing
(using a minimum of 8 characters, including upper case letters, lower case
letters, numbers and special characters) in order to increase the security of
your product.
Proper configuration of all passwords and other security settings is the
responsibility of the installer and/or end-user.
Choose Receiver: Select the receiver to which the email is sent. Up to 2 receivers
can be configured.
Receiver: The name of the user to be notified.
Receiver’s Address: The email address of user to be notified.
4. Click Save to save the settings.
6.3.11 Configuring NAT (Network Address Translation) Settings
Purpose:
1. Enter the NAT settings interface.
Configuration >Advanced Configuration > Network > NAT
2. Choose the port mapping mode.
To port mapping with the default port numbers:
Choose Port Mapping Mode as Auto.