Configuring Illegal Access Event Settings
Go to Setup Video Analytics
You can specify how many unsuccessful login attempts can be made before the system
triggers an illegal access alarm.
Figure 7-14 Illegal Access Configuration
Table 7-9 Illegal Access Configurations
Parameter
Function
Enable
Check to enable the illegal access event.
Login
Enter the number of times a user can attempt to log in. Select from 3 to 10.
Error
Select the Relay-out check box, and when alarm is triggered, the system
Relay-out
interacts with the linked alarm devices.
Alarm
The Alarm linkage keeps running for the configured time after alarm is
Delay
ended.
Send
Check to send an email to a specified receiver if someone attempts to
Email
illegally access the camera.
Configuring Voltage Detection Settings
When the input voltage is higher than or lower than the rated value of the device, the
system performs alarm linkage.
Go to Setup Video Analytics
Abnormality
Illegal Access.
Abnormality
Voltage Detection.
Configuring Video Analytics Settings
65