VIVOTEK
Group:
| NAME |
|
| VALUE |
|
| DEFAULT |
|
| SECURITY |
|
| DESCRIPTION |
|
|
|
|
|
|
|
|
|
|
| (get/set) |
|
|
|
|
|
|
| <boolean> | 0 |
| 4/4 |
|
| Enable profile 1 ~ | |||||
|
|
|
|
|
|
|
|
|
|
| ||||
|
| day, |
| night |
| 4/4 |
|
| The mode which the | |||||
|
|
|
| night, |
|
|
|
|
|
|
| profile is applied to. | ||
|
|
|
| schedule |
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| ||||
|
|
| hh:mm | 18:00 |
| 4/4 |
|
| Begin time of schedule | |||||
|
|
|
|
|
|
|
|
|
|
|
|
| mode. | |
|
|
|
|
|
|
|
|
|
|
| ||||
|
|
| hh:mm | 06:00 |
| 4/4 |
|
| End time of schedule | |||||
|
|
|
|
|
|
|
|
|
|
|
|
| mode. | |
|
|
|
|
|
|
|
|
|
|
| ||||
|
|
| <boolean> | 0 |
| 4/4 |
|
| Enable motion window. | |||||
|
|
|
|
|
|
|
|
|
|
| ||||
|
| string[14] |
| <blank> |
| 4/4 |
|
| Name of motion window. | |||||
|
|
|
|
|
|
|
|
|
| |||||
|
| 0 ~ 320,0 ~ | 0 |
| 4/4 |
|
| Coordinate of polygon | ||||||
|
|
| 240, 0 ~ |
|
|
|
|
|
|
|
| window position. | ||
|
|
| 320,0 ~ |
|
|
|
|
|
|
|
| (4 points: | ||
|
|
| 240, 0 ~ |
|
|
|
|
|
|
|
| x0,y0,x1,y1,x2,y2,x3,y3) | ||
|
|
| 320,0 ~ |
|
|
|
|
|
|
|
|
|
| |
|
|
| 240, 0 ~ |
|
|
|
|
|
|
|
|
|
| |
|
|
| 320,0 ~ |
|
|
|
|
|
|
|
|
|
| |
|
|
| 240 |
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
| ||||
|
| 0 ~ 100 |
| 0 |
| 4/4 |
|
| Percent of motion | |||||
|
|
|
|
|
|
|
|
|
|
|
|
| detection window. | |
|
|
|
|
|
|
|
|
|
|
| ||||
|
| 0 ~ 100 |
| 0 |
| 4/4 |
|
| Sensitivity of motion | |||||
|
|
|
|
|
|
|
|
|
|
|
|
| detection window. | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7.17 Tempering detection settings
Group:
| NAME |
|
| VALUE |
|
| DEFAULT |
|
| SECURITY |
|
| DESCRIPTION |
|
|
|
|
|
|
|
|
|
|
| (get/set) |
|
|
|
|
| enable |
|
| <boolean> |
| 0 |
| 4/4 |
|
| Enable or disable tamper detection. |
| ||
|
|
|
|
|
|
|
|
|
|
|
| |||
| threshold |
| 0 ~ 255 |
| 32 |
| 1/6 |
|
| Threshold of tamper detection. |
| |||
|
|
|
|
|
|
|
|
|
|
|
| |||
| duration |
| 10 ~ 600 |
| 10 |
| 4/4 |
|
| If tampering value exceeds the ‘threshold’ for |
| |||
|
|
|
|
|
|
|
|
|
|
|
|
| more than ‘duration’ second(s), then tamper |
|
|
|
|
|
|
|
|
|
|
|
|
|
| detection is triggered. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
174 - User's Manual