Axis P3925-LRE User Manual page 45

Hide thumbs Also See for P3925-LRE:
Table of Contents

Advertisement

AXIS P3925-LRE Network Camera
The web interface
Analytics metadata
Metadata producers
Metadata producers lists the apps that stream metadata and the channels they use.
Producer: The app that produces the metadata. Below the app is a list of the types of metadata the app streams from the device.
Channel: The channel that the app uses. Check to enable the metadata stream. Uncheck to disable the stream for compatibility
or resources management reasons.
Detectors
Camera tampering
The camera tampering detector generates an alarm when the scene changes, for example, when the lens is covered, sprayed
or severely put out of focus, and the time in Trigger delay has passed. The tampering detector only activates when the camera
has not moved for at least 10 seconds. During this period, the detector sets up a scene model to use as a comparison to detect
tampering in current images. For the scene model to be set up properly, make sure that the camera is in focus, the lighting
conditions are correct, and the camera doesn't point at a scene that lacks contours, for example, a blank wall. Camera tampering
can be used as a condition to trigger actions.
Trigger delay: Enter the minimum time that the tampering conditions must be active before the alarm triggers. This can help
prevent false alarms for known conditions that affect the image.
Trigger on dark images: It is very difficult to generate alarms when the camera lens is sprayed, since it is impossible to distinguish
that event from other situations where the image turns dark in a similar way, for example, when the lighting conditions change.
Turn on this parameter to generate alarms for all cases where the image turns dark. When it's turned off, the device doesn't
generate any alarm when the image turns dark.
Note
For detection of tampering attempts in static and non-crowded scenes.
Shock detection
Shock detector: Turn on to generate an alarm if the device is hit by an object or if it is tampered with.
Sensitivity level: Move the slider to adjust the sensitivity level at which the device should generate an alarm. A low value
means that the device only generates an alarm if the hit is powerful. A high value means that the device generates an alarm
even with mild tampering.
Logs
Reports and logs
Reports
• View the device server report: View information about the product status in a pop-up window. The Access Log is
automatically included in the Server Report.
• Download the device server report: It creates a .zip file that contains a complete server report text file in UTF–8
format, as well as a snapshot of the current live view image. Always include the server report .zip file when you
contact support.
• Download the crash report: Download an archive with detailed information about the server's status. The crash report
contains information that is in the server report as well as detailed debug information. This report might contain
sensitive information such as network traces. It can take several minutes to generate the report.
Logs
• View the system log: Click to show information about system events such as device startup, warnings, and critical
messages.
45

Advertisement

Table of Contents
loading

Table of Contents