Axis Communications M3007P Security Camera User Manual


 
AXIS M3007–P
Events
For more information, see the online help .
Triggers
Available action rule triggers and conditions include:
Applications – Use installed applications to trigger the rule. See Applications on page 32.
Detectors
- Day/Night Mode – Trigger the rule when the product switches between day mode (IR cut lter on) and night
mode (IR cut lter off). This can for example be used to control an external infrared (IR) light connected
to an output port.
- Live Stream Accessed Trigger the rule when any stream is accessed and during edge storage playback.
This can for example be used to send notications.
- Motion Detection – Trigger the rule when motion is detected. See Motion Detection onpage 29.
- Tampering – Trigger the rule when tampering is detected. See Camera Tampering onpage 29.
Hardware
- Network Trigger the rule if network connection is lost or restored. This can for example be used to start
recording to the SD card.
Input Signal
- Manual Trigger – Trigger the rule using the Manual Trigger button in the Live View page. See Controls on
the Live ViewPage on page10. This can for example be used to validate actions during product installation
and conguration.
- Virtual Inputs – can be used by a VMS (Video Management System) to trigger actions. Virtual inputs can, for
example, be connected to buttons in the VMS user interface.
PTZ
- Moving – Trigger the rule when the camera view moves due to a PTZ operation. This can for example be used
as an additional condition to prevent an action rule triggered by motion detection to record video while the
camera view moves due to a PTZ operation.
- Preset Reached – Trigger the rule when the camera stops at a preset position. This can be for example be used
with the Send Images action to upload images from the preset position.
Storage
- Available – Trigger the rule when the storage device is unmounted or removed. This can for example be used to
send maintenance notications.
- Disruption – Trigger the rule if storage problems are detected, for example if the storage device is unavailable,
removed, full, locked or if other read or write problems occur. This can for example be used to send maintenance
notications.
- Full – Trigger the rule when the storage device is full. Under normal operation, the oldest recordings will be
overwritten to prevent the storage device from becoming full.
- Locked – Trigger the rule if the storage device is locked (write protected).
System
- System Ready – Trigger the rule when the product has been started and all services are running. This can for
example be used to send a notication when the product restarts.
Time
35