Axis Communications axis q6042s ptz dome network camera Security Camera User Manual


 
AXIS Q6042–S PTZ Dome Network Camera
Events
3. Select Detectors from the Trigger drop-down list.
4. Select Motion Detection from the drop-down list. Select the motion detection window to use.
5. Optionally, select a Schedule and Additional conditions. See below.
6. Under Actions, select Record Video from the Type drop-down list.
7. Select a Stream prole and congure the Duration settings as described below.
8. Select Network Share from the Storage drop-down list.
To add additional criteria, select the Additional conditions option and add additional triggers. To prevent an action from being
triggered repeatedly, a Wait at least time can be set. Enter the time in hours, minutes and seconds, during which the trigger
should be ignored before the action rule can be activated again.
The recording Duration of some actions can be set to include time immediately before and after the event. Select Pre-trigger time
and/or Post-trigger time and enter the number of seconds. When While the rule is active is enabled and the action is triggered
again during the post-trigger time, the recording time will be extended with another post-trigger time period.
For more information, see the online help
.
Fallback Action
A fallback action is started if the primary action cannot be started, for example if connection to a recipient cannot be established.
Fallback actions are typically used to send email notications on failed actions or to upload images to a secondary recipient.
Recipients
Recipients receive media les and notication messages. The following recipients are available:
Recipient Use with action
Email
1
Send Images
Send Notication
Send Video Clip
FTP
Send Images
Send Video Clip
HTTP
Send Images
Send Notication
Send Video Clip
HTTPS Send Images
Send Notication
Send Video Clip
Network Share
2
Send Images
Send Video Clip
TCP Send Notication
1. Some email providers have security lters that prevent users from receiving or viewing large amount of attachments, from receiving scheduled
emails and similar. Check the email provider’s security policy to avoid delivery problems and locked email accounts.
40