VII
5.14 Setting Stereo Analysis ........................................................................................................... 165
5.14.1 Setting Rules for Stereo Analysis ................................................................................. 165
5.14.2 Calibration Configuration .............................................................................................. 168
5.15 Setting ANPR .......................................................................................................................... 168
5.15.1 Scene Configuration ..................................................................................................... 169
5.15.2 Setting Picture Overlay ................................................................................................. 170
5.15.3 Viewing ANPR Report................................................................................................... 171
5.16 Setting Video Structuralization ................................................................................................ 172
5.16.1 Scene Configuration ..................................................................................................... 172
5.16.2 Setting Picture Information ........................................................................................... 175
5.16.3 Viewing Video Structuralization Report ........................................................................ 176
5.17 Setting Relay-in ....................................................................................................................... 176
5.18 Setting Abnormality ................................................................................................................. 177
5.18.1 Setting SD Card ............................................................................................................ 177
5.18.2 Setting Network ............................................................................................................ 178
5.18.3 Setting Illegal Access .................................................................................................... 179
5.18.4 Setting Voltage Detection ............................................................................................. 179
5.18.5 Setting Security Exception ............................................................................................ 180
6 Maintenance ....................................................................................................................................... 181
6.1 Requirements ............................................................................................................................ 181
6.2 Auto Maintain ............................................................................................................................ 181
6.3 Resetting Password .................................................................................................................. 182
6.4 Backup and Default ................................................................................................................... 184
6.4.1 Import/Export .................................................................................................................. 184
6.4.2 Default ............................................................................................................................. 185
6.5 Upgrade .................................................................................................................................... 185
6.6 Information ................................................................................................................................ 186
6.6.1 Version ............................................................................................................................ 186
6.6.2 Log .................................................................................................................................. 186
6.6.3 Remote Log .................................................................................................................... 188
6.6.4 Online User ..................................................................................................................... 188
Appendix 1 Cybersecurity Recommendations ................................................................................. 190