EasyManua.ls Logo

Digital Watchdog DWC-MTT4Wi36 - Default Chapter; Table of Contents

Digital Watchdog DWC-MTT4Wi36
44 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
1 Product & Accessories..................................................................................... 5
2 Parts and Description....................................................................................... 6
3 Installation......................................................................................................... 7
4 Cabling............................................................................................................... 8
5 Remote Preview ................................................................................................ 9
6 Remote Live Surveillance...............................................................................10
6.1 System Configuration.....................................................................................................10
6.1.1 Basic Information............................................................................................10
6.1.2 Date and Time................................................................................................ 11
6.1.3 Local Config................................................................................................... 11
6.2 Image Configuration ...................................................................................................... 11
6.2.1 Display Configuration ..................................................................................... 11
6.2.2 Video / Audio Configuration ............................................................................13
6.2.3 OSD Configuration..........................................................................................14
6.2.4 Video Mask ....................................................................................................15
6.2.5 ROI Configuration...........................................................................................15
6.3 Alarm Configuration.......................................................................................................16
6.3.1 Motion Detection ...........................................................................................16
6.3.2 Alarm Server ..................................................................................................18
6.4 Event Configuration .......................................................................................................19
6.4.1 Object Removal..............................................................................................19
6.4.2 Exception ......................................................................................................21
6.4.3 Line Crossing ................................................................................................. 22
6.4.4 Intrusion........................................................................................................24
6.5 Network Configuration...................................................................................................26
6.5.1 TCP/IP ...........................................................................................................26
6.5.2 Port...............................................................................................................28
6.5.3 Server Configuration.......................................................................................28
6.5.4 DDNS ............................................................................................................28
6.5.5 SNMP ............................................................................................................30
6.5.6 RTSP..............................................................................................................31
6.5.7 UPNP.............................................................................................................31
6.5.8 Email.............................................................................................................32
6.5.9 FTP ...............................................................................................................32
6.6 Security Configuration....................................................................................................33
6.6.1 User Configuration .........................................................................................33
6.6.2 Online User....................................................................................................35
6.6.3 Block and Allow Lists.......................................................................................35
6.7 Maintenance Configuration ............................................................................................35
6.7.1 Backup and Restore ........................................................................................35
6.7.2 Reboot ..........................................................................................................36
6.7.3 Upgrade ........................................................................................................36
6.7.4 Operation Log................................................................................................37
7 Record Search................................................................................................. 38
8 Appendix..........................................................................................................39
9 Dimensions......................................................................................................41
10 Warranty Information..............................................................................42
11 Limits and Exclusions ....................................................................................43