User's Manual
Table Of Contents
- Software Installation on page 10
- Overview
- VIVOTEK’s FE9380 and FE9382 are two H.265 fisheye fixed dome network cameras, both featuring a detailed 5-Megapixel CMOS sensor that produces superb image clarity. By employing H.265 compression technology and VIVOTEK’s Smart Stream III technology, these
- The cameras are both equipped with a removable IR-cut filter and WDR Pro technology, empowering the cameras to maintain optimal image quality around the clock and unparalleled visibility in high-contrast lighting environments. Moreover, the cameras are de
- * Depending on scene being monitored.
- Revision History
- Read Before Use
- Package Contents
- Symbols and Statements in this Document
- Physical Description
- LED Definition
- Hardware Installation
- Software Installation
- Network Deployment
- Accessing the Network Camera
- Using RTSP Players
- Using 3GPP-compatible Mobile Devices
- Using VIVOTEK Recording Software
- Main Page
- Client Settings
- Configuration
- System > General settings
- System > Homepage layout
- System > Logs
- System > Parameters
- System > Maintenance
- Media > Image
- Media > Video
- Media > Audio
- Media profiles
- Network > General settings
- Network > Streaming protocols
- Network > QoS (Quality of Service)
- Network > SNMP (Simple Network Management Protocol)
- Network > FTP
- Bonjour
- Security > User accounts
- Security > HTTPS (Hypertext Transfer Protocol over SSL)
- Security > Access List
- Security > IEEE 802.1x
- PTZ > PTZ settings
- Event > Event settings
- Applications > Motion detection
- Applications > Smart VCA
- Applications > DI and DO
- Applications > Tampering detection
- Applications > Audio detection
- Applications > Shock detection
- Applications > Package management - a.k.a., VADP (VIVOTEK Application Development Platform)
- Recording > Recording settings
- Storage
- Storage > SD card management
- Storage > NAS management
- Storage > Content management
- Appendix
VIVOTEK
134 - User's Manual
■ Camera tampering detection
This option allows the Network Camera to trigger when the camera detects that is is being tampered
with. To enable this function, you need to congure the Tampering Detection option rst. Please refer
to page 154 for detailed information.
■ Manual Trigger
This option allows user to enable event triggers manually by clicking the on/off button on the
homepage. Please congure 1 ~ 3 events before using this function.
■ Audio detection
A preset threshold can be congured with an external microphone as the trigger to system event. The
triggering condition can be an input exceeding or falling below a threshold. Audio detection can take
place as a complement to motion detection or as a method to detect activities not covered by the
camera's view.
■ Shock detection
A shock accelerometer comes with the camera. If impact to the camera occurs, such as someone tries
to destroy the camera, the impact can be detected and reported. The Shock detection conguration is
found in Conguration > Applications > Shock detection.