Vivotek IP3112/IP3122 manual Build a security application

Models: IP3112/IP3122

1 65
Download 65 pages 21.18 Kb
Page 31
Image 31

Build a security application

The Administrator can combine options on the application page to perform many useful security applications. There are two

trigger sources coming from attached devices such as for motion detection. There are also two kinds of actions responding to such events, including uploading snapshots over the Internet and driving other attached devices. To upload the snapshots, users can choose either email or FTP according to user’s needs. Both e-mail and FTP use the network settings on the network page. Refer to the definition section for detail configuration.

1.Click on “Configuration” on homepage,

2.Click on “Application” at the left column,

3.Check the weekdays as you need and give the period of "Snapshots begin" time and "Snapshots end" time to monitor the trigger conditions every day,

4.Check the “Event operation”. The trigger condition can be set to detected motion or status of the attached device,

-30 -

www.vivotek.com

Page 31
Image 31
Vivotek IP3112/IP3122 manual Build a security application