4.2.1
4.2.2
4.2.3
4.2.4
Config cámara........................................................................................................................ 30
4.3
Configuración de PTZ .......................................................................................................................... 31
4.3.1
4.3.2
Restablecer ............................................................................................................................. 32
4.3.3
Función PTZ .......................................................................................................................... 32
4.4
Configuración de alarmas ..................................................................................................................... 32
4.4.1
Detección de movimiento ..................................................................................................... 32
4.4.2
Otras alarmas ......................................................................................................................... 33
4.4.3
Entrada de alarma .................................................................................................................. 35
4.4.4
Salida de alarma..................................................................................................................... 36
4.4.5
Servidor de alarma ................................................................................................................. 37
4.5
Configuración de eventos ..................................................................................................................... 38
4.5.1
Eliminación de objeto ........................................................................................................... 38
4.5.2
Excepción ............................................................................................................................... 40
4.5.3
Cruce de línea ........................................................................................................................ 42
4.5.4
Intrusión ................................................................................................................................. 43
4.5.5
4.5.6
Intrusión de personas ............................................................................................................. 47
4.5.7
Conteo de personas ................................................................................................................ 48
4.6
Configuración de red ............................................................................................................................. 50
4.6.1
TCP/IPv4................................................................................................................................ 50
4.6.2
Puerto ..................................................................................................................................... 52
4.6.3
Servidor .................................................................................................................................. 52
4.6.4
DDNS ..................................................................................................................................... 52
4.6.5
SNMP ..................................................................................................................................... 53
4.6.6
802.1X .................................................................................................................................... 54
4.6.7
RTSP ...................................................................................................................................... 55
4.6.8
UPnP ...................................................................................................................................... 56
4.6.9
E-mail ..................................................................................................................................... 56
4.6.10
FTP ......................................................................................................................................... 57
4.6.11
HTTPS ................................................................................................................................... 58
4.6.12
P2P (opcional) ........................................................................................................................ 59
4.6.13
QoS ......................................................................................................................................... 60
4.7
Configuración de seguridad .................................................................................................................. 60
4.7.1
Configuración de usuario ...................................................................................................... 60
4.7.2
Usuario en línea ..................................................................................................................... 62
4.7.3
4.7.4
4.8
Mantenimiento ...................................................................................................................................... 63
4.8.1
4.8.2
Reinicio .................................................................................................................................. 63
4