TruVision Series 5 IP Camera Configuration Manual P/N 1073340-EN • REV A • ISS 27JUN17
Copyright © 2017 United Technologies Corporation. Interlogix is part of UTC Climate, Controls & Security, a unit of United Technologies Corporation. All rights reserved. Trademarks and patents Manufacturer Trade names used in this document may be trademarks or registered trademarks of the manufacturers or vendors of the respective products. Interlogix 2955 Red Hill Avenue, Costa Mesa, CA 92626-5923, USA Authorized EU manufacturing representative: UTC Building & Industrial Systems B.V.
Content Introduction 3 Network access 4 Checking your web browser security level 4 Activating the camera 5 Overview of the camera web browser 7 Camera configuration 9 Configuration menu overview 9 Local configuration 10 System time 11 Network settings 12 Recording parameters 20 Video image 23 OSD (On Screen Display) 27 Text Overlay 28 Privacy masks 29 Motion detection alarms 30 Tamper-proof alarms 36 Exception alarms 37 Alarm inputs and outputs 38 Face detection 39 Cross line detection 41 Intrusion detectio
Searching event logs 66 Index 69 2 TruVision Series 5 IP Camera Configuration Manual
Introduction This is the user manual for the following TruVision IP camera models: TVB-5501 (3MPX IP bullet camera) TVB-5502 (8MPX IP bullet camera) TVT-5501 (3MPX IP turret camera) TVT-5502 (8MPX IP turret camera) TVD-5501 (3MPX IP dome camera) TVD-5502 (8MPX IP dome camera) TruVision Series 5 IP Camera Configuration Manual 3
Network access This manual explains how to configure the camera over the network with a web browser. TruVision IP cameras can be configured and controlled using Microsoft Internet Explorer (IE) and other browsers. The procedures described use Microsoft Internet Explorer (IE) web browser. Checking your web browser security level When using the web browser interface, you can install ActiveX controls to connect and view video using Internet Explorer.
To add the camera’s IP address to Internet Explorer’s list of trusted sites: 1. Open Internet Explorer. 2. Click Tools, and then Internet Options. 3. Click the Security tab, and then select the Trusted sites icon. 4. Click the Sites button. 5. Clear the “Require server verification (https:) for all sites in this zone box. 6. Enter the IP address in the “Add this website to the zone” field. 7. Click Add, and then click Close. 8. Click OK in the Internet Options dialog window. 9.
Note: A valid password range must be between 8 and 16 characters. You can use a combination of numbers, lower and upper case letters, and special characters : _ - , . * & @ / $ ? Space. The password must contain characters from at least two of these groups. We also recommend that you reset your password regularly. For high security systems, it is particularly recommended to reset the password monthly or weekly for better protection. 4. Confirm the password. 5.
6. Input the password and click the Save button to activate your IP address modification. Overview of the camera web browser The camera web browser lets you view, record, and play back recorded videos as well as manage the camera from any PC with Internet access. The browser’s easy-to-use controls give you quick access to all camera functions. See Figure 1 below. If there is more than one camera connected over the network, open a separate web browser window for each individual camera.
Table 1: Overview of the web browser interface Name Description 1. Live view Click to view live video. 2. Playback Click to play back video. 3. Log Click to search for event logs. There are three main types: Alarm, Exception and Operation. 4. Configuration Click to display the configuration window for setting up the camera. 5. Viewer View live video. Time, date and camera name are displayed here. 6. Current user Displays current user logged on. 7.
Camera configuration This chapter explains how to configure the cameras through a web browser. Once the camera hardware has been installed, configure the camera’s settings through the web browser. You must have administrator rights in order to configure the cameras over the internet. The camera web browser lets you configure the camera remotely using your PC. Web browser options may vary depending on camera model.
Configuration menus Description 3. Video/Audio Defines recording parameters. 4. Image Defines the image parameters, OSD settings, overlay text, and privacy mask. See “Video image” on page 23 for further information on the setup. 5. Security Defines who can use the camera, their passwords and access privileges, RTSP authentication, IP address filter, and telnet access. 6. Basic Event Defines motion detection, tamper-proof, alarm input/output, and exception.
Table 3: Overview of the Local configuration window Parameters Description Live View Parameters 1. Protocol Specifies the network protocol used. Options include: TCP, UDP, MULTICAST and HTTP. 2. Live View Performance Specifies the transmission speed. Options include: Shortest Delay or Auto. 3. Rules It refers to the rules on your local browser. Specify whether or not to display the colored marks when motion detection, face detection, and intrusion detection are triggered.
To define the system time and date: 1. From the menu toolbar, click Configuration > System > Time Settings. 2. From the Time Zone drop-down list, select the time zone that is the closest to the camera’s location. 3. Under Time Sync, check one of the options for setting the time and date: Synchronize with an NTP server: Check the NTP enable box and enter the server NTP address. The time interval can be set from 1 to 10080 minutes.
Figure 4: Network window (TCP/IP tab shown) Table 4: Network parameters Menu tabs Description 1. NIC Type: Enter the NIC type. Default is Auto. Other options include: 10M Half-dup, 10M Full-dup, 100M Half-dup and 100M Full-dup. TCP/IP DHCP: Enable to automatically obtain an IP address and other network settings from that server. IPv4 Address: Enter the IPv4 address of the camera. IPv4 Subnet Mask: Enter the IPv4 subnet mask. IPv4 Default Gateway: Enter the IPv4 gateway IP address.
Menu tabs Description See page 15 for setup information. 2. Port HTTP Port: The HTTP port is used for remote internet browser access. Enter the port used for the Internet Explorer (IE) browser. Default value is 80. RTSP Port: RTSP (Real Time Streaming Protocol) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers. Enter the RTSP port value. The default port number is 554.
Menu tabs Description 10. Email Enter the email address to which messages are sent when an alarm occurs. See page 17 for setup information. 11. NAT A NAT (Network Address Translation) is used for network connection. Select the port mapping mode: auto or manual. See page 18 for setup information. 12. HTTPS Specifies authentication of the web site and its associated web server, which protects against Man-in-the-middle attacks. To define the TCP/IP parameters: 1.
the port number (443 (HTTPS)), and your user name and password used to log into your DDNS account. The domain name displayed under “Host Name” is that which you created on the DynDNS web site. • NO-IP: Enter the address of the NO-IP, host name for your camera, the port number, your user name and password.. 4. Click Save to save changes. To define the PPPoE parameters: 1. From the menu toolbar, click Configuration > Network > PPPoE. 2. Check Enable PPPoE to enable this feature. 3.
To define the FTP parameters: 1. From the menu toolbar, click Configuration > Network > FTP. 2. Configure the FTP settings, including server address, port, user name, password, directory, and upload type. Anonymous: Check the check box to enable the anonymous access to the FTP server. Directory: In the Directory Structure field, you can select the root directory, Main directory and Subdirectory.
Sender’s Address: The email address of the sender. SMTP Server: The SMTP Server, IP address or host name. SMTP Port: The SMTP port. The default is 25. E-mail Encryption: Encrypt via SSL, TLS. NONE is default. Attached Snapshot: Check the check box of Attached Snapshot if you want to send emails with attached alarm images. Interval: This is the time between two actions of sending attached images.
2. To create a self-signed certificate: Click the Create button beside “Create Self-signed Certificate”. Enter the country, host name/IP, validity and the other information requested. Click OK to save the settings. -OrTo create a certificate request: Click the Create button beside “Create Certificate Request”. Enter the country, host name/IP and the other information requested.
3. Click OK to save the settings. Download the certificate request and submit it to the trusted certificate authority for signature, such as Symantec or RSA. After receiving the signed valid certificate, upload the certificate to the device Recording parameters You can adjust the video and audio recording parameters to obtain the picture quality and file size best suited to your needs. Figure 5 and Table 5 below list the video and audio recording options you can configure for the camera.
Tab Parameter descriptions Video Type: Specifies the stream type you wish to record. Select Video Stream to record video stream only. Select Video&Audio to record both video and audio streams. Note: Video&Audio is only available for those camera models that support audio. Resolution: Specifies the recording resolution. A higher image resolution provides a higher image quality but also requires a higher bit rate.
To configure audio settings: 1. From the menu toolbar, click Configuration > Video/Audio > Audio. To configure ROI settings: 1. From the menu toolbar, click Configuration > Video/Audio > ROI. 2. Select the desired channel from the drop-down list. 3. Draw the region of interest on the image. Up to four regions can be drawn. 4. Choose the stream type to set the ROI encoding. 5. Enable Fixed Region to manually configure the area. Region No.: Select the region.
Region Name: Set the desired region name. Dual-VCA (Video Content Analysis) When Dual-VCA mode is enabled, the camera sends video analytics results (metadata) to an NVR or other platforms to generate a VCA alarm. For example, with an Interlogix NVR (please check Interlogix website for the latest NVR models supporting this feature), you can draw a virtual line in the NVR playback window, and search the objects or people crossing this virtual line.
Figure 6: Camera image settings menu – Display Settings tab Parameter Description 1. Image Settings Auto D/N Switch The camera automatically switches between day and night mode. All image settings remain the same for both modes. The image settings are: Image Adjustment, Exposure Settings, Day/Night Switch, Backlight Settings, White Balance, Image Enhancement, and Video Adjustment. Common: Set each image parameter individually for D/N switch. Default: Only use default settings.
Parameter Description Common: The settings are identical for both day and night modes for Exposure Settings, Day/Night Switch, and Video Adjustment. Day: Image Adjustment, Exposure Settings, Backlight Settings, White Balance, and Image Enhancement for day mode only. Night: Image Adjustment, Exposure Settings, Backlight Settings, White Balance, and Image Enhancement for night mode only. 2.
Parameter IR Light Description Select On/OFF to Enable/disable IR. Enable: The IR LEDs are ON when the camera changes to night mode. Disable: The IR LEDs are OFF when the camera changes to night mode Note: The IR LEDs are always OFF in day mode. 5. Backlight Settings BLC Area This function improves image quality when the background illumination is high. It prevents the object in the center of the image from appearing too dark. Select OFF, Up, Down, Left, Right, or Center.
Parameter Hallway View Description This function adjusts the image to suit long narrow scenes, such as corridors. Produces an image with a 9:16 ratio aspect to avoid including walls. During installing, turn the camera to 90 degrees or rotate the 3-axis lens to 90 degrees, and then set the rotate mode as ON. You will get a normal view of the scene with 9:16 aspect ratio that ignores needless information such as the walls. Default is OFF.
7. Select a display mode for the camera from the Display Mode drop-down list box. Display modes include: • Transparent & Not flashing. The image appears through the text. • Transparent & Flashing. The image appears through the text. The text flashes on and off. • Not transparent & Not flashing. The image is behind the text. This is default. • Not transparent & Flashing. The image is behind the text. The text flashes on and off. 8. Select the desired OSD size. 9. Select the desired font color. 10.
To add on-screen text: 1. From the menu toolbar, click Configuration > Image > Text Overlay. 2. Select the check box for the first line of text. 3. Enter the text in the text box. 4. Use the mouse to click and drag the red text in the live view window to adjust the text overlay position. 5. Repeat steps 2 to 4 for each extra line of text, selecting the next string number. Note: Remove an overlay text by deselecting its text line. 6. Click Save to save changes.
5. Click Stop Drawing to finish drawing, or click Clear All to clear all of the areas you set without saving them. 6. Click Save to save changes. Motion detection alarms You can define motion detection alarms. A motion detection alarm refers to an alarm triggered when the camera detects motion. However, the motion alarm is only triggered if it occurs during a programmed time schedule.
Figure 9: Motion detection window Defining a motion detection alarm requires the following tasks: 1. Area settings: Define the on-screen area that can trigger a motion detection alarm and the detection sensitivity level (see Figure 9, item 1). 2. Arming schedule: Define the schedule during which the system detects motion (see Figure 9, item 2). 3. Recording schedule: Define the schedule during which motion detection can be recorded. See “Recording Schedule” on page 51 for further information. 4.
To set up motion detection in normal mode: 1. From the menu toolbar, click Configuration > Basic Event > Motion Detection. 2. Select the Enable Motion Detection check box. Select the Enable Dynamic Analysis for Motion check box if you want to see real-time motion events. Note: If you do not want the detected object to be marked with the green frame, select Disable from Configuration > Local Configuration > Live View Parameters > Rules. 3. Select Normal mode from the drop-down list. 4. Click Draw Area.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Send an email to a specified address when there is a motion detection alarm. Note: You must configure email settings before enabling this option. See “To set up the email parameters” on page 17 for further information. If you want to send the event snapshot together with the email, check the Attached Snapshot option.
4. Under Image Settings, select OFF, Auto D/N Switch or Scheduled D/N settings. Default is OFF. Auto D/N Switch and Scheduled D/N settings allow you to set different settings for day and night as well as different periods. 5. Select Area No. and click Draw Area. Click and drag the mouse on the live video image to draw an area sensitive to motion detection. Note: You can draw up to eight motion detection areas on the same image. Stop Drawing shows up after Draw Area is clicked. 6.
12. Choose the day and click schedule to other days. to set the detailed time period. You can copy the 13. Click OK to save changes. 14. Specify the linkage method when an event occurs. Check one or more response methods for the system when a motion detection alarm is triggered. Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Sends an email to a specified address when there is a motion detection alarm.
Tamper-proof alarms You can configure the camera to trigger an alarm when the lens is covered and to take an alarm response action. Figure 10: Tamper-proof alarm window To set up tamper-proof alarms: 1. From the menu toolbar, click Configuration > Basic Event > Tamper-proof. 2. Check the Enable Tamper-proof box. 3. Move the Sensitivity slider to set the detection sensitivity. 4. Click Edit to edit the arming schedule for tamper-proof alarms.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Sends an email to a specified address when there is an alarm triggered. Note: You must configure email settings before enabling this option. See “To set up the email parameters” on page 17 for further information. If you want to send the event snapshot together with the email, check the Attached Snapshot option. Trigger Alarm Output Trigger external alarm outputs when an event occurs.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Sends an email to a specified address when there is an exception alarm. Note: You must configure email settings before enabling this option. See “To set up the email parameters” on page 17 for further information. If you want to send the event snapshot together with the email, check the Attached Snapshot option.
Upload Snapshot Capture the image when an alarm is triggered and upload the picture to NAS or FTP server. Note: To upload the snapshot to NAS, you must first configure the NAS settings. See “NAS settings” on page 49 for further information. To upload the snapshot to an FTP, you must first configure the FTP settings. See “To define the FTP parameters” on page 17 for further information. Enable the Upload Type option.
Figure 12: Face detection window To define face detection: 1. From the menu toolbar, click Configuration > Smart Event > Face Detection. 2. Select the Enable Face Detection check box to enable the function. 3. Select the Enable Dynamic Analysis check box for Face Detection if you want the face detected to be marked with a green rectangle in live view.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Sends an email to a specified address when there is a face detection alarm. Note: You must configure email settings before enabling this option. See “To set up the email parameters” on page 17 for further information. If you want to send the event snapshot together with the email, check the Attached Snapshot option.
To define cross line detection: 1. From the menu toolbar, click Configuration > Smart Event > Cross Line. 2. Check the Enable Cross Line detection check box (1) to enable the function. 3. Click Draw Area (2), and a crossing plane will show on the image. 4. Click the line and two red squares appear at each end. Drag one of the red squares to define the arming area. Select the direction as A<->B, A ->B, or B->A from the drop-down list (3): A<->B: Only the arrow on the B side is displayed.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Send an email to a specified address when there is a cross line detection alarm. Note: You must configure email settings before enabling this option. See “To set up the email parameters” on page 17 for further information. If you want to send the event snapshot together with the email, check the Attached Snapshot option.
To define intrusion detection: 1. From the menu toolbar, click Configuration > Smart Event > Intrusion Detection. 2. Select the Enable Intrusion Detection check box to enable the function. 3. Click Draw Area, and then draw a rectangle on the image as the defense region. When you draw the rectangle, all lines should connect end-to-end to each other. Up to four areas are supported. Click Clear to clear the areas you have drawn. The defense region parameters can be set up separately.
7. Click Save to save changes. Unattended Baggage Detection Unattended baggage detection function detects the objects left over in the pre-defined region such as the baggage, purse, dangerous materials, etc. A series of actions can be taken when the alarm is triggered. Figure 20: Unattended baggage detection window To define unattended baggage detection: 1. From the menu toolbar, click Configuration > Smart Event > Unattended Baggage Detection. 2.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Send an email to a specified address when there is a motion detection alarm. Note: You must configure email settings before enabling this option. See “To set up the email parameters” on page 17 for further information. If you want to send the event snapshot together with the email, check the Attached Snapshot option.
To define object removal detection: 1. From the menu toolbar, click Configuration > Smart Event > Object Removal Detection. 2. Select the Enable Unattended Baggage Detection check box to enable the function. 3. Click Draw Area, and then draw a rectangle on the image as the defense region. When you draw the rectangle, all lines should connect end-to-end to each other. Up to four areas are supported. Click Clear to clear the areas you have drawn. The defense region parameters can be set up separately.
Snapshot parameters You can configure scheduled snapshots and event-triggered snapshots. The captured snapshots can be stored in the SD card (if supported) or the NAS. You can also upload the snapshots to an FTP server. You can set up the format, resolution and quality of the snapshots. The quality can be low, medium, or high. You must enable the option Enable Timing Snapshot if you want snapshots to be uploaded to the FTP.
To set up scheduled snapshots: 1. From the menu toolbar, click Configuration > Storage > Snapshot. 2. Select Enable Timing Snapshot check box to enable continuous snapshots. 3. Select the desired format of the snapshot, such as JPEG. 4. Select the desired resolution and quality of the snapshot. 5. Enter the time interval between two snapshots. Select the unit of time from the dropdown list: milliseconds, seconds, minutes, hour, or day. 6. Set the schedule for when you want snapshots to be taken.
Figure 22: NAS menu To set up a NAS system: 1. From the menu toolbar, click Configuration > Storage > NAS. 2. Enter the IP address of the network disk, and the NAS file path. 3. Click Save to save changes. Storage devices Use the storage management window to display the capacity, free space available, and the working status of the HDD of the NAS and the SD card in the camera. You can also format these storage devices. Before formatting the storage device, stop all recording.
Figure 14: Storage window To format the storage devices: 1. From the menu toolbar, click Configuration > Storage > Storage Management. 2. Check the HDD Number column to select the storage. 3. Define the quota percentage for snapshots and recordings, modify the values for each in Percentage of Snapshot and Percentage of Record. 4. Click Format. A window appears to check your formatting permission. 5. Click OK to start formatting.
Pre-record time The pre-record time is set to start recording before the scheduled time or event. For example, if an alarm triggers recording at 10:00, and the pre-record time is set to 5 seconds, the camera starts to record at 9:59:55. The pre-record time can be configured as No Pre-record, 5 s, 10 s, 15 s, 20 s, 25 s, 30 s, or Not Limited. Post-record time The post-record time is set to stop recording after the scheduled time or the event.
4. Select whether the recording will be for the whole week (All Day recording) or for specific days of the week. If you have selected “All day”, select one of the record types to record from the dropdown list box: • Continuous: This is continuous recording. • Motion Detection: Video is recorded when the motion is detected. • Motion & Alarm: Video is recorded when motion and alarms are triggered at the same time. • Face Detection: Video is recorded when a face is detected.
6. Set the recording periods for the other days of the week if required. Click Copy to copy the recording periods to another day of the week. 7. Click OK and Save to save changes. Note: If you set the record type to “Motion detection” or “Alarm”, you must also define the arming schedule in order to trigger motion detection or alarm input recording.
Camera management This chapter describes how to use the camera once it is installed and configured. The camera is accessed through a web browser. User management This section describes how to manage users. You can: Add or delete users Modify permission Modify passwords Only the administrator can manage users. The administrator can create up to 31 individual users for the cameras listed in this manual.
Operator: This user can only change the configuration of his/her own account. An operator cannot create or delete other users. Viewer: This user has the permission of live view, playback and log search. However, they cannot change any configuration settings. Add and delete users The administrator can create up to 31 users. Only the system administrator can create or delete users. To add a user: 1. From the menu toolbar, click Configuration > Security > User. 2. Select the Add button.
Basic Permissions Camera Configuration Alarm Output Remote: Video Output Control Remote: Serial Port Control 7. Click OK to save the settings. To delete a user: 1. Select the desired user under the User tab. 2. Click Delete button. A message box appears. Note: Only the administrator can delete a user. 3. Click Save to save the changes. Modify user information You can easily change the information about a user such as their name, password and permissions. To modify user information: 1.
To define RTSP authentication: 1. From the menu toolbar, click Configuration > Security > RTSP Authentication. 2. Select the Authentication type Enable or Disable in the drop-down list to enable or disable the RTSP authentication. 3. Click Save to save the changes. IP address filter This function allows you to give or deny access rights to defined IP addresses. For example, the camera is configured so that only the IP address of the server hosting the video management software is allowed to be accessed.
Defining the security service This function enables Telnet and let you define its password. It is only used by Technical Support. Figure 18: Security service window To enable the illegal login lock: 1. Click Configuration > Security > Security Service. 2. Check the Enable Illegal Login Lock check box 3. Click Save to save the changes. Note: 1. The IP address will be locked if the admin user performs seven failed user name/password attempts (10 attempts for the operator/user). 2.
Note: If the video standard is changed, it will not be restored to its original setting when Restore or Default is used. To restore default settings: 1. From the menu toolbar, click Configuration > System> Maintenance. 2. Click either Restore or Default. A window showing user authentication appears. 3. Enter the admin password and click OK. 4. Click OK in the pop-up message box to confirm restoring operation.
3. From the menu toolbar, click Configuration > System > Maintenance. Select the Firmware or Firmware Directory option. Then click the Browse button to locate latest firmware file on your computer. • Firmware directory – Locate the upgrading folder of Firmware files. The camera will choose the corresponding firmware file automatically. • Firmware – Locate the firmware file manually for the camera. Note: Please select Interlogix_Gen_3_ipc.dav for camera models listed in the “Introduction” on page 3. 4.
Reboot camera It is easy to reboot the camera remotely. To reboot the camera through the web browser: 1. In Configuration > System, click the Maintenance tab. 2. Click the Reboot button to reboot the device. 3. Click OK in the pop-up message box to confirm reboot operation.
Camera operation This chapter describes how to use the camera once it is installed and configured. Logging on and off You can easily log out of the camera browser window by clicking the Logout button on the menu toolbar. You will be asked each time to enter your user name and password when logging in. You can change the language of the interface from the drop-down menu in the top right corner of the window.
Playing back recorded video You can easily search and play back recorded video in the playback interface. Note: You must configure the NAS or insert an SD card in the dome camera to be able to use the playback functions. See “Storage devices” on page 50 for more information. To search recorded video stored on the camera’s storage device for playback, click Playback on the menu toolbar. The Playback window displays. See Figure 20 below. Figure 20: Playback window Name Description 1.
Name Description Enable digital zoom. Capture a snapshot image of the playback video. Start/Stop clipping video files. 7. Recording type The color code displays the recording type. Recording types are schedule recording, alarms recording and manual recording. The recording type name is also displayed in the current status window. 8. Time moment Vertical bar shows where you are in the playback recording. The current time and date are also displayed. 9.
To archive recorded snapshots: 1. Click to open the snapshots search window. 2. Select the snapshot type as well as the start and end time. 3. Click Search to search for the snapshots. 4. Select the desired snapshots, and click Download to download them. Searching event logs You must configure NAS or insert a SD card in the dome camera to be able to use the log functions. The number of event logs that can be stored on NAS or SD card depends on the capacity of the storage devices.
Figure 21: Log window 1. Major Type 4. Start search 2. Minor Type 5. Save searched logs 3. Start and end search time You can search for recorded logs by the following criteria: Major type: There are four types of logs: All Types, Alarm, Exception, and Operation. See Table 6 below for their descriptions. Minor type: Each major type log has some minor types. See Table 6 below for their descriptions. Date and Time: Logs can be searched by start and end recording time.
Main log type Minor log types: Description of events included Operation Power On, Abnormal Shutdown, Remote Reboot, Remote Login, Remote Logout, Remote Configure parameters, Remote Start Record, Remote Stop Record, Remote PTZ Control, Remote Initialize HDD, Remote Playback by File, Remote Playback by Time, Remote Export Config file, Remote import config file, Remote Get Parameters, Remote Get Working Status, Establish Transparent Channel, Disconnect Transparent Channel, Start Bidirectional Audio, Stop Bi
Index A Alarm inputs set up, 38 Alarm outputs set up, 38 Alarm types motion detection, 30 Archive files recorded files, 65 snapshots of recorded files, 65 Archived files play back, 65 Audio parameters, 20 Events searching logs, 66 Exception alarms types, 37 F Firmware upgrade, 60 using TruVision Navigator, 61 H Backlight setup, 26 HDD capacity, 50 HDD error alarm, 37 HDD full alarm, 37 HTTPS parameters set up, 18 C I Camera image set up, 23 Camera name display, 27 Certificate request, 19 Configurati
SNMP, 16 TC/IP, 15 UPnP, 17 NTP synchronization, 11 O Snapshot, 48 Snapshots archive snapshots from recorded files, 65 save during live view mode, 63 System time set up, 11 Object removal detection, 46 T P Tamper-proof alarms set up, 36 Text overlay, 28 Time format set up, 27 TruVision Navigator upgrade firmware, 61 Password activation, 5 Passwords modify, 57 Playback play back recorded files, 65 screen, 64 search recorded video, 64 Post-recording times description, 52 Pre-recording times description