Axis 02457-001 User Manual page 44

Dome camera
Hide thumbs Also See for 02457-001:
Table of Contents

Advertisement

M3057-PLR Mk II Dome Camera
The web interface
Metadata producers lists the channels used by apps and the metadata they are streaming from the device.
Producer: The app producing the metadata.
Channel: The channel used by the app. Check to enable the metadata stream. Uncheck to disable the stream for compatibility
or resources management reasons.
Detectors
Camera tampering
The camera tampering detector generates an alarm when the scene changes, for example because the lens is covered, sprayed or
severely put out of focus, and the time in Trigger delay has passed. The tampering detector only activates when the camera
has not moved for at least 10 seconds. During this period the detector sets up a scene model to use as a comparison to detect
tampering in current images. For the scene model to be set up properly, make sure that the camera is in focus, the lighting
conditions are correct, and the camera doesn't point at a scene that lacks contours, for example a blank wall. Camera tampering
can be used as a condition to trigger actions.
Trigger delay: Enter the minimum time that the tampering conditions must be active before the alarm triggers. This can help
prevent false alarms for known conditions that affect the image.
Trigger on dark images: It is very difficult to generate alarms when the camera lens is sprayed, since it is impossible to distinguish
that event from other situations where the image turns dark in a similar way, for example when the lighting conditions change.
Turn on this parameter to generate alarms for all cases where the image turns dark. When it's turned off, the device doesn't
generate any alarm when the image turns dark.
Note
For detection of tampering attempts in static and non-crowded scenes.
Logs
Reports and logs
Reports
• View the device server report: Click to show information about the product status in a pop-up window. The Access
Log is automatically included in the Server Report.
• Download the device server report: Click to download the server report. It creates a .zip file that contains a complete
server report text file in UTF–8 format, as well as a snapshot of the current live view image. Always include the server
report .zip file when you contact support.
• Download the crash report: Click to download an archive with detailed information about the server's status. The
crash report contains information that is in the server report as well as detailed debug information. This report might
contain sensitive information such as network traces. It can take several minutes to generate the report.
Logs
• View the system log: Click to show information about system events such as device startup, warnings and critical
messages.
• View the access log: Click to show all failed attempts to access the device, for example when a wrong login
password is used.
Network trace
Important
A network trace file might contain sensitive information, for example certificates or passwords.
A network trace file can help you troubleshoot problems by recording activity on the network.
Trace time: Select the duration of the trace in seconds or minutes, and click Download.
44

Advertisement

Table of Contents
loading

This manual is also suitable for:

M3057-plr mk ii

Table of Contents