System Manual

System Manual

System manual ABUS VMS Basic, Professional, Enterprise Web application © 2012 ABUS Security-Center GmbH & Co. KG ABUS VMS ABUS Security-Center GmbH & Co. KG System manual Contents Introduction ......................................................................................................................... 6 Safety information ............................................................................................................... 6 Areas of application ............................................................................................................ 7 Information symbols ........................................................................................................... 7 Upgrades .............................................................................................................................. 8 System requirements .......................................................................................................... 8 1. Setting up / putting into operation .............................................................................. 9 1.1 Starting the software .............................................................................................................. 10 1.1.1 The setup wizard .......................................................................................................................................... 10 1.2 Log-in ..................................................................................................................................... 13 1.3 User interface ........................................................................................................................ 13 1.3.1 Interface layout............................................................................................................................................. 13 1.3.2 The CPU utilization indicator ........................................................................................................................ 15 1.3.3 The network utilization indicator ................................................................................................................... 16 1.3.4 Logging out and exiting the software ............................................................................................................ 17 2. Software operation ......................................................................................................17 2.1 Switching system modes ....................................................................................................... 17 2.1.1 Using the search function ............................................................................................................................. 22 2.1.2 Voiding archives ........................................................................................................................................... 23 2.2 Switching the slide elements ................................................................................................. 24 2.3 System status indicator ......................................................................................................... 26 2.4 Working with the cameras ..................................................................................................... 26 2.4.1 Activating and deactivating the cameras....................................................................................................... 27 2.4.2 Switching the image geometry...................................................................................................................... 29 2.4.3 Using the zoomstick ..................................................................................................................................... 31 2.4.4 Using the numeric field (keyboard) ............................................................................................................... 32 2.4.5 Saving camera positions (presets) ............................................................................................................... 32 2.4.6 Using the sequencer function ....................................................................................................................... 33 2.4.7 Using manual recording (Panic Record) ....................................................................................................... 34 2.4.8 Using the alarm lists ..................................................................................................................................... 35 2.5 Creating backups ................................................................................................................... 37 2.5.1 Local backup (database export) ................................................................................................................... 37 2.5.2 Local backup (AVI export) ............................................................................................................................ 38 2.5.3 Remote backup ............................................................................................................................................ 39 2.5.4 Single frame export (storage, printing, e-mailing) ......................................................................................... 39 2.6 Creating favourites................................................................................................................. 42 2.6.1 Deleting favourites ....................................................................................................................................... 44 2.7 Connecting to a host .............................................................................................................. 45 2.7.1 Automatically redialing hosts after the connection is interrupted ................................................................... 46 Version 7.1 2 ABUS VMS ABUS Security-Center GmbH & Co. KG System manual 2.8 Reference image comparison ................................................................................................ 47 2.9 Shell mode (safe mode) ........................................................................................................ 49 2.9.1 Activating the shell mode.............................................................................................................................. 49 2.9.2 Deactivating the shell mode ......................................................................................................................... 49 3. System configuration ..................................................................................................50 3.1 Opening the system configuration ......................................................................................... 51 3.2 Camera configuration ............................................................................................................ 52 3.2.1 Setting up an analogue camera .................................................................................................................... 52 3.2.2 Setting up a pan/tilt camera .......................................................................................................................... 55 3.2.3 Setting up an network camera ...................................................................................................................... 56 3.2.4 Setting up the camera anti-swivel protection ................................................................................................ 59 3.2.5 Monitoring the camera focus ........................................................................................................................ 60 3.2.6 Displaying a camera name in the live image ................................................................................................. 61 3.2.7 Saving reference images .............................................................................................................................. 61 3.2.8 The mask dialog ........................................................................................................................................... 62 3.2.8.1 Setting a permanent mask ............................................................................................................................ 64 3.2.8.2 Setting a privacy mask ................................................................................................................................. 65 3.2.8.3 Activating the adaptive mask ........................................................................................................................ 66 3.2.8.4 Configuring the sensitivity of activity detection .............................................................................................. 66 3.2.8.5 Using multiple-zone alarms .......................................................................................................................... 67 3.2.9 Setting up camera groups ............................................................................................................................ 68 3.3 Database settings (Database / Storage) ............................................................................... 69 3.3.1 Setting the storage drives (drive settings) ..................................................................................................... 70 3.3.2 Creating database fields ..............................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    172 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us