Perimeter Protection Analysis and Capture by Device
When perimeter protection events are analyzed by the device, the device will send you 3
images with target frames and rule frames in the alarm triggered email.
Note
Perimeter Protection Analysis and Capture by Device is only available for /X and /S series.
3. Optional: Enable the alternate SMTP, and configure the required parameters for alternate SMTP.
When the preferred SMTP is invalid, the device will use alternate SMTP to send emails.
4. Optional: Click Test to send a test email.
5. Click Apply.
12.6 Configure Port
You can configure different types of ports to enable relevant functions.
Steps
1. Go to System → Network → Advanced → More Settings .
2. Configure port settings as needed.
Alarm Host IP/Port
With a remote alarm host configured, the device will send the alarm event or exception
message to the host when an alarm is triggered. The remote alarm host must have the client
Network Video Recorder User Manual
Figure 12-5 Port Settings
150