LevelOne WCS-2010 User Manual

Page 27

Advertising
background image

21

Building a Security Application

The Administrator can combine options on the application page to perform many useful
security applications. There are two trigger sources coming from attached devices, such as
for motion detection. There are also two kinds of actions responding to such events,
including uploading snapshots over the Internet and driving other attached devices. To
upload the snapshots, the User can choose either email or FTP according to user’s needs.
Both e-mail and FTP use the network settings on the network page. Refer to the definition
section for detail configuration.

1. Click on “Configuration” on homepage,
2. Click on “Application” in the left column,
3. Check the weekdays as you need and give the period of "Snapshots begin" time and
"Snapshots end" time to monitor the triggering conditions every day,
4. Check the “Event operation”. The triggering condition can be set to detected motion or
status of the attached device,
5. Set the delay before detecting next event to avoid continuous false alarms following the
original event,
6. Set the delay to take snapshots after event to capture the direction of the moving
objects,

Advertising