Quasar CM-4251 Series User And Installation Manual page 75

Mini-dome camera
Table of Contents

Advertisement

Quasar CM-4251 Series User and Installation Guide
Triggered Action
The Administrator can specify multiple alarm actions to be taken when tampering is detected. All
options are listed as follows:
 Enable alarm output – Check this box and select the predefined type of alarm output
(high or low) to enable alarm relay when tampering is detected.
 Record stream to sd card – Select this box in order to save the alarm-triggered recording
into a microSD/SDHC card. Enter the number of seconds for the pre-trigger buffer. Select
the first radial button to upload for a specified length of time and enter the number of
seconds. Alternatively, select the second radial button to upload during the active trigger.
See Figure 53: Application – Record Stream to SD Card.
Note:
Make sure the local recording (with a microSD/SDHC card) is activated so that
this function can be implemented. See
 Send Alarm Message by FTP/E-Mail – The Administrator can select whether to send an
alarm message by FTP and/or E-Mail when tampering is detected.
 Upload Image by FTP – Selecting this option enables you to assign an FTP site and
configure various parameters, as shown in Figure 54: Application – Upload Image by FTP.
When tampering is detected, event images will be uploaded to the designated FTP site.
Specify the FTP address to use from the drop-down menu. Select the number of frames
for the pre-trigger and post-trigger buffers from the drop-down menu of 1-20 frames.
Check the box for Continue image upload if you wish to use this option. To specify the
length of time for the upload, click on this radial button and enter the number of
seconds. To upload during the active trigger, click on this radial button.
Finally, select the number of frames per second from the drop-down menu next to Image
frequency.
 Upload Image by E-Mail – Selecting this option enables you to assign an e-mail address
and configure various parameters, as shown in Figure 55: Application – Upload Image by
E-Mail. When tampering is detected, event images will be sent to the designated e-mail
address.
Specify two e-mail addresses to use from the drop-down menu. Select the number of
frames for the pre-trigger and post-trigger buffers from the drop-down menu of 1-20
frames.
Check the box for Continue image upload if you wish to use this option. To specify the
length of time for the upload, click on this radial button and enter the number of
seconds. To upload during the active trigger, click on this radial button. Finally, select the
number of frames per second from the drop-down menu next to Image frequency.
Note:
Make sure SMTP or FTP configuration has been completed. See section
FTP
for further details.
 Send HTTP notification – Check this option, select the destination HTTP address, and
specify the parameters for HTTP notifications. When the tampering alarm is triggered, the
HTTP notifications can be sent to the specified HTTP server. See Figure 56: Application –
Send HTTP Notification.
64
Recording
for further details.
Mail
and

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents