User Manual of E Series Network Speed Dome
5.3
5.3.1
Detecting Audio Exception ................................................................................................. 50
5.3.2
5.3.3
5.3.4
5.3.5
Region Entrance Detection ................................................................................................. 55
5.3.6
Region Exiting Detection .................................................................................................... 56
5.4
5.4.1
5.4.2
Configuring PTZ Limits ....................................................................................................... 59
5.4.3
5.4.4
Configuring Park Actions.................................................................................................... 61
5.4.5
Configuring Privacy Mask .................................................................................................. 61
5.4.6
5.4.7
5.4.8
5.4.9
Prioritize PTZ ...................................................................................................................... 65
6.1
6.1.1
Basic Settings ..................................................................................................................... 66
6.1.2
Advanced Settings .............................................................................................................. 72
6.2
V
6.2.1
6.2.2
6.2.3
Configuring ROI Settings .................................................................................................... 82
6.2.4
Dual-VCA Settings .............................................................................................................. 84
6.3
6.3.1
6.3.2
Configuring OSD Settings ................................................................................................... 91
6.3.3
6.3.4
6.4
6.4.1
System Settings .................................................................................................................. 94
6.4.2
Maintenance ...................................................................................................................... 98
6.4.3
Security ............................................................................................................................ 101
6.4.4
User Management ........................................................................................................... 103
APPENDIX ...................................................................................................................................... 107
..................................................................................................... 49
.................................................................................................................. 57
................................................................................................ 66
..................................................................................... 80
..................................................................................................... 84
................................................................................................... 94
............................................................................................................ 107
vi