Setting Smart Plan
Overview of smart plans including face detection, heat map, IVS, and people counting.
Basic Smart Plan
Selecting desired smart functions like face detection or crowd map.
Schedule
Configuring time periods for Smart Plans to be active.
Setting IVS
Steps to optimize IVS rule setup and avoid false positive alerts.
Rule Configuration
Setting IVS parameters like direction, action, object tracking, and track linkage.
People Counting
Counting people entering/leaving detection area and creating events.
Setting Heat Map
Creating statistics on object movements and viewing heat map reports.
Setting Relay-in
Performing alarm linkage when an alarm is triggered at the alarm-in port.
Relay-in (1)
Enabling alarm linkage function for relay-in ports.
Relay-in (2)
Selecting alarm or arming/disarming mode for external alarm systems.
Setting Abnormality
Handling abnormalities like SD card, network, illegal access, voltage, security.
Setting SD Card
Performing alarm linkage for SD card abnormalities: No SD Card, Capacity Warning, Error.
Setting Network
Performing alarm linkage for network abnormalities like disconnection or IP conflict.
Setting Disarming
Disabling linkage actions via smart phone app, but still generating alarm records.
6 Maintenance
Covers requirements, auto maintain, password reset, backup, default, upgrade.
6.1 Requirements
Steps to ensure reliable camera system operation and maintenance.
6.2 Auto Maintain
Restarting system manually, setting auto reboot, and auto deletion of old files.
6.4.2 Default
Restoring the device to default or factory settings.
6.5 Upgrade
Upgrading firmware for security, compatibility, and stability improvements.
6.6.1 Version
Viewing hardware, system, and web version information.
6.6.2 Log
Viewing and backing up system logs.
6.6.3 Remote Log
Configuring remote log access by setting address, port, and device number.
6. Enable HTTPS
Enabling HTTPS for secure communication channels for web services.
11. Secure Auditing
Regularly checking online users and equipment logs for unauthorized access.
12. Network Log
Enabling network log function for long duration log storage and tracing.
More information
Information on visiting the official website for security announcements.
Need help?
Do you have a question about the Elite IPEL-DL80F-IRW1 and is the answer not in the manual?
Questions and answers