Network Camera Web 5.0 Operation Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.
Operation Manual Foreword General This manual introduces the functions, configuration, general operation, and system maintenance of network camera. Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
Operation Manual Important Safeguards and Warnings Electrical Safety ● All installation and operation shall conform to your local electrical safety codes. ● The power source shall conform to the Safety Extra Low Voltage (SELV) standard, and supply power with rated voltage which conforms to Limited Power Source requirement according to IEC60950-1. Note that the power supply requirement is subject to the device label. ● Make sure that the power supply is correct before operating the device.
Operation Manual mild detergent. To avoid possible damage on device body coating which could cause performance to decrease, do not use volatile solvent such as alcohol, benzene, diluent and so on to clean the device body, nor can strong, abrasive detergent be used. ● Dome cover is an optical component. Do not touch or wipe the cover with your hands directly during installation or operation.
Operation Manual Table of Contents Foreword .................................................................................................................................................... I Important Safeguards and Warnings ..................................................................................................... II 1 Overview ................................................................................................................................................. 1 1.1 Introduction .
Operation Manual 6.2.2.2.9 Configuring Face Detection .............................................................................. 30 6.2.2.2.10 Configuring Face Recognition ........................................................................ 30 6.2.2.2.11 Configuring Face Statistics............................................................................. 31 6.2.2.3 ROI................................................................................................................................
Operation Manual 6.4.3.1 Setting Motion Detection ........................................................................................... 60 6.4.3.2 Setting Video Tampering ........................................................................................... 62 6.4.3.3 Setting Scene Changing ............................................................................................ 62 6.4.4 Setting Audio Detection ...................................................................................
Operation Manual 8.1.2 Rule Configuration.............................................................................................................. 86 8.2 Setting Face Recognition ........................................................................................................... 87 8.2.1 Setting Face Detection ....................................................................................................... 88 8.2.2 Setting Face Database .....................................................
Operation Manual 12.4.2 Installing Trusted CA Certificate ................................................................................... 123 12.5 A/V Encryption ........................................................................................................................ 124 12.6 Security Warning..................................................................................................................... 125 13 Record ....................................................................
Operation Manual 1 Overview 1.1 Introduction IP camera (Internet Protocol camera), is a type of digital video camera that receives control data and sends image data through internet. They are commonly used for surveillance, requiring no local recording device, but only a local area network. IP camera is divided into single-channel camera and multi-channel camera according to the channel quantity. For multi-channel camera, you can set the parameters for each channel. 1.
Operation Manual ● Record abnormality of monitoring image for subsequent view and processing. ● Configure coding parameters, and adjust live view image. Alarm ● Set alarm prompt mode and tone according to alarm type. ● View alarm prompt message. Exception ● SD card error, network disconnection, illegal access, voltage detection and security exception. ● When SD card error or illegal access is triggered, the system links alarm output and sending email.
Operation Manual Face Detection ● Detect face and display the related attributes on the live interface. ● When an alarm is triggered, the system performs linkages such as recording, alarm output, sending email, PTZ operation, and snapshot. Face Recognition ● After detecting face, make comparison between the detected face with the face in face database, and activates alarm output. ● Query the recognition result.
Operation Manual 2 Configuration Flow For the device configuration flow, see Figure 2-1. For details, see Table 2-1. Configure the device according to the actual situation. Figure 2-1 Configuration flow Table 2-1 Description of flow Configuration Description Reference Login Open IE browser and enter IP address to log in to the web interface, The camera IP address is 192.168.1.108 by default. "4 Login". Initialization Initialize the camera when you use it for the first time.
Operation Manual 3 Device Initialization Device initialization is required for the first-time use. This manual is based on the operation on the web interface. You can also initialize device through ConfigTool, NVR, or platform devices. ● To ensure the device safety, keep the password properly after initialization and change the password regularly. ● When initializing device, keep the PC IP and device IP in the same network.
Operation Manual Figure 3-2 Disclaimer Step 3 Select the I have read and agree to the terms of the Software License Agreement and Privacy Policy check box, and then click Next. Figure 3-3 Time zone setting Step 4 Configure the time parameters, and then click Next.
Operation Manual Figure 3-4 Password setting Step 5 Set the password for admin account. Table 3-1 Description of password configuration Parameter Description Username The default username is admin. Password The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). Set a high security level password according to the password security notice.
Operation Manual Figure 3-5 P2P 8
Operation Manual 4 Login 4.1 Device Login This section introduces how to log in to and log out of the web interface. This section takes Chrome as an example. ● You need to initialize the camera before logging in to the web interface. For details, see "3 Device Initialization". ● When initializing the camera, keep the PC IP and device IP in the same network. ● Follow the instruction to download and install the plug-in for the first login. Step 1 Open IE browser, enter the IP address of the camera (192.168.
Operation Manual Figure 4-2 Live interface 4.2 Resetting Password When you need to reset the password for the admin account, there will be a security code sent to the entered email address which can be used to reset the password. Prerequisites You have enabled password resetting service. For details, see "6.6.2.1.2 Resetting Password". Procedure Step 1 Open IE browser, enter the IP address of the device in the address bar and press Enter.
Operation Manual that is set during the initialization.
Operation Manual 5 Main Interface Click at the left-upper corner of the interface to display the main interface. Figure 5-1 Main interface ● Live: View the real-time monitoring image. ● AI: Configure AI functions of the camera. ● Camera: Configure camera parameters, including image parameters, encoder parameters, and audio parameters. ● Event: Configure general events, including alarm linkage exception, video detection, and audio detection.
Operation Manual 6 Setting This section introduces the basic setting of the camera, including the configuration of Local, Camera, Network, Event, Storage, System, System Information and Log. 6.1 Local You can select protocol and configure the storage path for live snapshot, live record, playback snapshot, playback download, and video clips. Step 1 Select > Local.
Operation Manual Parameter Description Live Record The recorded video of live interface. The default path is C:\Users\admin\WebDownload\LiveRecord. Playback Download The downloaded video of playback interface. The default path is C:\Users\admin\WebDownload\PlaybackRe cord. Video Clips The clipped video of playback interface. C:\Users\admin\WebDownload\VideoClips. Live Snapshot The snapshot of live interface. The default path is C:\Users\admin\WebDownload\LiveSnapsh ot.
Operation Manual Figure 6-2 Interface layout (self-adaptive) ● Customized scene: You can select the profile as needed. Select the profile in Time Plan Setting and drag the slide block to set certain time as the selected profile. For example, set 8:00–18:00 as day, and 0:00–8:00 and 18:00–24:00 as night Figure 6-3 Interface layout (customized scene) ● Day/night switch: You can select Day or night in Profile and the surveillance system works under Day/Night.
Operation Manual Figure 6-4 Interface layout (Day/night switch) 6.2.1.2 Image You can configure picture parameters as needed. Step 1 Select > Camera > Image. Figure 6-5 Image Step 2 Configure picture parameters. Table 6-2 Description of picture parameters Parameter Description Style Select the picture style from soft, standard and vivid. ● Soft: Default image style, displays the actual color of the image. ● Standard: The hue of the image is weaker than the actual one, and contrast is smaller.
Operation Manual Parameter Description Saturation Makes the color deeper or lighter. The higher the value is, the deeper the color will be, and the lower the lighter. Saturation value does not change image brightness. Sharpness Changes the sharpness of picture edges. The higher the value is, the clearer the picture edges will be, and if the value is set too big, picture noises are more likely to appear. Gamma Changes the picture brightness and improves the picture dynamic range in a non-linear way.
Operation Manual Table 6-3 Description of exposure parameters Parameter Description Anti-flicker You can select from 50 Hz, 60 Hz and Outdoor. ● 50 Hz: When the electric supply is 50 Hz, the system adjusts the exposure according to ambient light automatically to ensure that there is no stripe appears. ● 60 Hz: When the electric supply is 60 Hz, the system adjusts the exposure according to ambient light automatically to ensure that there is no stripe appears.
Operation Manual Parameter Description 3D NR Works with multi-frame (no less than 2 frames) images and reduces noise by using the frame information between previous and latter frames. Level This configuration is available only when the 3D NR is enabled. The higher the level is, the better the result will be. Step 3 Click Apply. 6.2.1.4 Backlight You can select backlight mode from Auto, BLC, WDR, and HLS. Step 1 Select > Camera > Backlight.
Operation Manual Step 3 Click Apply. 6.2.1.5 WB WB function makes the image color display precisely as it is. When in WB mode, white objects would always display white color in different environments. Step 1 Select > Camera > WB. Figure 6-8 WB Step 2 Configure WB parameters. Table 6-5 Description of WB parameters WB mode Description Auto The system compensates WB according to color temperature to ensure color precision.
Operation Manual Figure 6-9 Day/night Step 2 Configure day and night parameters. Table 6-6 Description of day and night parameters Parameter Description You can select device display mode from Color, Auto, and B/W. Day/Night configuration is independent from profile management configuration. Mode ● Color: The system displays color image. ● Auto: The system switches between color and black-and-white display according to the actual condition. ● B/W: The system displays black-and-white image.
Operation Manual Table 6-7 Description of illuminator parameters Parameter Description Fill Light Set Fill Light for sound and siren cameras. ● IR Mode: Enable the IR illuminator, and the white light is disabled. When an alarm is triggered, the system will link white light. ● White Light: Enable the white light, and the IR illuminator is disabled. When an alarm is triggered, the system will link white light.
Operation Manual Figure 6-11 Light Step 2 Configure defog parameters. Table 6-8 Description of defog parameters Defog Description Manual Configure function intensity and atmospheric light mode manually, and then the system adjusts image clarity accordingly. Atmospheric light mode can be adjusted automatically or manually. Auto The system adjusts image clarity according to the actual condition. Off Step 3 Defog function is disabled. Click Apply. 6.2.
Operation Manual Figure 6-12 Encode Step 2 Configure encode parameters. Table 6-9 Description of encode parameters Parameter Description Click to enable sub stream, it is enabled by default. Sub Stream You can enable multiple sub streams simultaneously. Compression Select encode mode. ● H.264: Main profile encode mode. Compared with H.264B, it requires smaller bandwidth. ● H.264H: High profile encode mode. Compared with H.264, it requires smaller bandwidth. ● H.264B: Baseline profile encode mode.
Operation Manual Parameter Bit Rate Type Description The bit rate control type during video data transmission. You can select bit rate type from: ● CBR (Constant Bit Rate): The bit rate changes a little and keeps close to the defined bit rate value. ● VBR (Variable Bit Rate): The bit rate changes as monitoring scene changes. The Bit Rate Type can be only be set as CBR when Encode Mode is set as MJPEG. Quality This parameter can be configured only when the Bit Rate Type is set as VBR.
Operation Manual Step 1 Select > Camera > Encode > Overlay > Privacy Masking. Figure 6-13 Privacy masking Step 2 Configure privacy masking. 1) Click cover. next to Enable, and then drag the block to the area that you need to ● You can drag 4 rectangles at most. ● Click Clear to delete all the area boxes; select one box, and then click delete it. 2) Adjust the size of the rectangle to protect the privacy. 3) Click Apply. 6.2.2.2.
Operation Manual 6.2.2.2.3 Configuring Time Title You can enable this function when you need to display time in the video image. Step 1 Select > Camera > Encode > Overlay > Time Title. Figure 6-15 Time title Step 2 Click next to Enable. Step 3 Click next to Week Display to display the day of week. Step 4 Step 5 Move the time box to the position that you want in the image. Click Apply. 6.2.2.2.4 Configuring Location You can enable this function if you need to display text in the video image.
Operation Manual 6.2.2.2.5 Configuring Font Properties You can enable this function if you need to adjust the font size in the video image. Step 1 Select > Camera > Encode > Overlay > Font Properties. Figure 6-17 Font properties Step 2 Step 3 Select the font color and size. You can set the RGB value to customize the font color. Click Apply. 6.2.2.2.6 Configuring Picture Overlay You can enable this function if you need to display picture information on the video image.
Operation Manual Step 1 Select > Camera > Encode > Overlay > Custom Title Figure 6-19 Custom Title Step 2 Click next to Enable, enter the text that you want to display, and then select the text alignment. Click Step 3 Step 4 to add the text overlay, and you can add 1 line at most. Move the custom box to the position that you want in the image. Click Apply. 6.2.2.2.8 Configuring Target Statistics After configuring the target statistics, the number of target statistics will be displayed in the image.
Operation Manual 6.2.2.2.9 Configuring Face Detection The image displays face statistics information. When the overlay function enabled during intelligent rules configuration, this function is enabled simultaneously. Step 1 Select > Camera > Encode > Overlay > Face Detection. Figure 6-21 Face detection Step 2 Step 3 Step 4 Click next to Enable, and select the text alignment. Click Reset to clear the statistics data. Move the statistics box to the position that you want in the image. Click Apply.
Operation Manual Step 3 Step 4 Click Reset to clear the statistics data. Move the statistics box to the position that you want in the image. Click Apply. The information will be displayed on the image after the face recognition function is enabled. 6.2.2.2.11 Configuring Face Statistics The image displays face statistics information. When the overlay function enabled during intelligent rules configuration, this function is enabled simultaneously.
Operation Manual Figure 6-24 ROI Step 2 Click next to Enable, draw an area on the image, and then configure the image quality of ROI. ● You can draw 4 area boxes at most. ● The higher the image quality value is, the better the quality will be. ● Click Clear to delete all the area boxes; select one box, and then click Step 3 to delete it. Click Apply. 6.2.3 Setting Audio Parameters This section introduces audio parameters, including encode mode, sampling frequency, audio in type, and noise filter.
Operation Manual Step 3 Configure audio parameters. Table 6-10 Description of audio parameters Parameter Description Compression You can select audio Encode Mode from PCM, G.711A, G.711Mu, G.726, AAC, G.723. The configured audio encode mode applies to both audio and intercom. The default value is recommended. Sampling Frequency Sampling number per second. The higher the sampling frequency is, the more the sample in a second will be, and the more accuracy the restored signal will be.
Operation Manual Figure 6-26 TCP/IP Step 2 Configure TCP/IP parameters. Table 6-11 Description of TCP/IP parameters Parameter Description Host Name Enter the host name, and the maximum length is 15 characters.
Operation Manual Parameter Description Click to enable ARP/Ping to set IP address service. Get the camera MAC address, and then you can change and configure the device IP address with ARP/ping command. This is enabled by default. During restart, you will have no more than 2 minutes to configure the device IP address by a ping packet with certain length, the server will be turned off in 2 minutes, or it will be turned off immediately after the IP address is successfully configured.
Operation Manual Parameter Description MAC Address Displays host MAC address. IP Version Select IPv4 or IPv6. IP Address When you select Static in Mode, enter the IP address and subnet mask that you need. Subnet Mask Default Gateway ● IPv6 does not have subnet mask. ● The default gateway must be in the same network segment with the IP address. Preferred DNS IP address of the preferred DNS Alternate DNS Step 3 Click Apply. IP address of the alternate DNS 6.3.
Operation Manual ● 0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, 42323 are occupied for specific uses. ● Do not use the same value of any other port during port configuration. Table 6-12 Description of port parameters Parameter Description Max Connection The max number of users (web client, platform client or mobile phone client) that can connect to the device simultaneously. The value is 10 by default. TCP Port Transmission control protocol port. The value is 37777 by default.
Operation Manual The configuration of Max Connection takes effect immediately, and others will take effect after reboot. 6.3.3 PPPoE Point-to-Point Protocol over Ethernet, is one of the protocols that device uses to connect to the internet. Get the PPPoE username and password from the internet service provider, and then set up network connection through PPPoE, the camera will acquire a WAN dynamic IP address. Prerequisites ● The camera has connected to the network.
Operation Manual ● Third party server might collect your device information after DDNS is enabled. ● Register and log in to the DDNS website, and then you can view the information of all the connected devices in your account. Figure 6-29 DDNS Step 2 Step 3 Click to enable the function. Configure DDNS parameters. Table 6-13 Description of DDNS parameters Parameter Description Type The name and web address of the DDNS service provider, see the matching relationship below: ● CN99 DDNS web address: www.
Operation Manual Step 1 Select > Network > Email. Figure 6-30 Email Step 2 Step 3 Click to enable the function. Configure email parameters. Table 6-14 Description of email parameters Parameter Description SMTP Server SMTP server address Port The port number of the SMTP server. Username The account of SMTP server. Password The password of SMTP server. Anonymity Click email. Sender Sender’s email address. For details, see Table 6-15.
Operation Manual Parameter Description Receiver ● Receiver’s email address. Supports 3 addresses at most. ● After entering the receiver's email address, the Test button is display. Click Test to test whether the emails can be sent and received successfully. The system sends test mail to check if the connection is Health Mail successfully configured. Click and configure the Sending Interval, and then the system sends test mail as the set interval. For the configuration of major mailboxes, see Table 6-15.
Operation Manual Mailbox SMTP server Authentication none Port Description 25 ● You need to enable SMTP service in your mailbox. ● The authentication code is required; the email password is not applicable. Authentication code: the code you receive when enabling SMTP service. smtp.sina.co m Sina 126 Step 4 smtp.126.co m Click Apply. SSL 465 none 25 none 25 Enable SMTP service in your mailbox. Enable SMTP service in your mailbox. 6.3.
Operation Manual Figure 6-31 UPnP Step 2 Click next to Enable, and there are two mapping modes: Custom and Default. ● Select Custom, click Step 3 and then you can change external port as needed. ● Select Default, and then the system finishes mapping with unoccupied port automatically, and you cannot edit mapping relation. Click Apply. Open web browser on PC, enter http:// wide area IP address: external port number, and then you can visit the local area device with corresponding port. 6.3.
Operation Manual Figure 6-32 SNMP (1) Figure 6-33 SNMP (2) Step 2 Select SNMP version to enable SNMP. ● Select V1, and the system can only process information of V1 version. ● Select V2, and the system can only process information of V2 version. ● Select V3, and then V1 and V2 become unavailable. You can configure username, password and authentication type.
Operation Manual and authentication type to visit your device from the server. Step 3 Using V1 and V2 might cause data leakage, and V3 is recommended. In Trap Address, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB Browser installed, and leave other parameters to the default. Table 6-16 Description of SNMP parameters Parameter Description SNMP Port The listening port of the software agent in the device. The read and write community string that the software agent supports.
Operation Manual 6.3.8 Bonjour Enable this function, and the OS and clients that support Bonjour would find the camera automatically. You can have quick visit to the camera with Safari browser. Bonjour is enabled by default. Procedure Step 1 Select > Network > Bonjour. Figure 6-34 Bonjour Step 2 Step 3 Click , and then configure server name. Click Apply. Result In the OS and clients that support Bonjour, follow the steps below to visit the network camera with Safari browser. 1.
Operation Manual Table 6-17 Description of multicast parameters Parameter Description Multicast Address The multicast IP address of Main Stream/Sub Stream is 224.1.2.4 by default, and the range is 224.0.0.0– 239.255.255.255. Port The multicast port of corresponding stream: Main Stream: 40000; Sub Stream1: 40016; Sub Stream2: 40032, and all the range is 1025–65500. Step 3 Click Apply.
Operation Manual Step 1 Select > Network > QoS. Figure 6-37 QoS Step 2 Configure QoS parameters. Table 6-19 Description of QoS parameters Parameter Description Realtime Monitor Configure the priority of the data packets that used for network surveillance. 0 for the lowest and 63 the highest. Command Configure the priority of the data packets that used for configure or checking. Step 3 Click Save. 6.3.12 Platform Access 6.3.12.
Operation Manual Step 2 Step 3 Step 4 Step 5 cancel Enable selection to reject the collection. Log in to mobile phone client and tap Device management. Tap + at the upper-right corner. Scan the QR code on the P2P interface. Follow the instructions to finish the settings. 6.3.12.2 ONVIF The ONVIF verification is enabled by default, which allows the network video products (including video recording device and other recording devices) from other manufacturers to connect to your device.
Operation Manual Figure 6-40 RTMP Step 2 Click . Step 3 Make sure that the IP address is trustable when enabling RTMP. Configure RTMP parameters. Table 6-20 Description of RTMP parameters Parameter Description Stream Type The stream for live view. Make sure that the video format is H.264, H.264 B and H.264H, and the audio format is AAC. Address Type ● Non-custom: Enter the server IP and domain name. ● Custom: Enter the path allocated by the server.
Operation Manual Figure 6-41 Basic service Step 2 Enable the basic service according to the actual needs. Table 6-21 Description of basic service parameters Function Description SSH You can enable SSH authentication to perform safety management. Multicast/Broadcast Search Enable this function, and then when multiple users are viewing the device video image simultaneously through network, they can find your device with multicast/broadcast protocol.
Operation Manual 6.4 Event 6.4.1 Setting Alarm Linkage 6.4.1.1 Setting Alarm-in When an alarm is triggered by the device connected to the alarm-in port, the system performs the defined alarm linkage. Step 1 Select > Event > Alarm. Step 2 Click next to Enable to enable alarm linkage. Figure 6-42 Alarm linkage Step 3 Step 4 Step 5 Select an alarm-in port and a sensor type. ● Sensor Type: NO or NC. ● Anti-Dither: Only record one alarm event during the anti-dither period.
Operation Manual 6.4.1.2 Alarm Linkage When configuring alarm events, select alarm linkages (such as record, snapshot). When the corresponding alarm is triggered in the configured arming period, the system will alarm. Select > Event > Alarm, and then click next to Enable to enable alarm linkage. Figure 6-43 Alarm linkage 6.4.1.2.1 Adding Schedule Set arming periods. The system only performs corresponding linkage action in the configured period. Step 1 Click Add Schedule next to Schedule.
Operation Manual Figure 6-44 Schedule Step 2 Step 3 Step 4 Press and drag the left mouse button on the timeline to set arming periods. Alarms will be triggered in the time period in green on the timeline. ● Click Copy next to a day, and select the days that you want to copy to in the prompt interface, you can copy the configuration to the selected days. Select the Select All check box to select all days to copy the configuration. ● You can set 6 time periods per day. Click Apply.
Operation Manual Figure 6-45 Record linkage 6.4.1.2.3 Snapshot Linkage After snapshot linkage is configured, the system can automatically alarm and take snapshots when an alarm is triggered. Prerequisites After the corresponding alarm type (Normal, Motion, or Alarm) is enabled, the snapshot channel links capturing picture. For details, see "13.3 Setting Record Plan". Setting Record Linkage On the Alarm interface, click needed.
Operation Manual Figure 6-48 Email linkage 6.4.1.3 Subscribing Alarm 6.4.1.3.1 About Alarm Types For alarm types and preparations of alarm events, see Table 6-22. Table 6-22 Description of alarm types Alarm Type Description Preparation Motion Detection The alarm is triggered when moving object is detected. Motion detection is enabled. For details, see "6.4.3.1 Setting Motion Detection". Disk Full The alarm is triggered when the free space of SD card is less than the configured value.
Operation Manual Functions of different devices might vary, and the actual product shall prevail. Step 1 Click at the right-upper corner of the main interface. Figure 6-49 Alarm (subscription) Step 2 Step 3 Click next to Enable Alarm. Select alarm type according to the actual need. For details, see "6.4.1.3.2 Subscribing Alarm Information". The system prompts and records alarm information according to actual conditions.
Operation Manual Only the device with SD card has the abnormality functions, including No SD Card, SD Card Error, and Capacity Warning. 6.4.2.1 Setting SD Card Exception In case of SD card exception, the system performs alarm linkage. The event types include No SD Card, Low SD Card Space, and SD Card Error. Functions might vary with different models, and the actual interface shall prevail. Step 1 Select > Event > Exception > SD Card Exception.
Operation Manual Figure 6-51 Network exception Step 2 Click to enable the network detection function. Step 3 Step 4 Set alarm linkage actions. For details, see "6.4.1.2 Alarm Linkage". Click Apply. 6.4.2.3 Setting Voltage Detection When the input voltage is higher than or lower than the rated value of the device, the system performs alarm linkage. Step 1 Select > Event > Exception > Voltage Detection.
Operation Manual Figure 6-52 Voltage detection Step 2 Step 3 Step 4 Click to enable the voltage detection function. When enabling Overlay, the alarm icon is displayed by overlapping when the alarm is triggered. Set alarm linkage actions. For details, see "6.4.1.2 Alarm Linkage". Click Apply. 6.4.3 Setting Video Detection Check whether there are considerable changes on the video by analyzing video images.
Operation Manual Figure 6-53 Motion detection Step 2 Step 3 Click to enable the motion detection function. Set the area for motion detection. 1) Click Setting next to Area. Figure 6-54 Area 2) Select a color and set the region name. Select an effective area for motion detection in the image and set Sensitivity and Threshold. ● Select a color on ● ● ● ● to set different detection parameters for each region. Sensitivity: Sensitive degree of outside changes.
Operation Manual Step 4 Step 5 and threshold according to the waveform. 3) Click OK. Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". If the exiting schedules cannot meet the scene requirement, you can click Add Schedule to add a new schedule. For details, see "6.4.1.2.1 Adding Schedule". Anti-dither: After the Anti-dither time is set, the system only records one motion detection event in the period. Click Apply. 6.4.3.
Operation Manual Step 1 Select > Event > Video Detection > Scene Changing. Figure 6-56 Scene changing Step 2 Step 3 Select the schedule and arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". If the exiting schedules cannot meet the scene requirement, you can click Add Schedule to add a new schedule. For details, see "6.4.1.2.1 Adding Schedule". Click Apply. 6.4.
Operation Manual Figure 6-57 Audio detection Step 2 Step 3 Step 4 Set parameters. ● Input abnormal: Click next to Audio Abnormal, and the alarm is triggered when the system detects abnormal sound input. ● Intensity change: Click next to Intensity Change, and then set Sensitivity and Threshold. The alarm is triggered when the system detects that the sound intensity exceeds the configured threshold. ◇ It is easier to trigger the alarm with higher sensitivity or smaller threshold.
Operation Manual Functions might vary with different models, and the actual product shall prevail. Select ● ● ● ● > Storage. Click Read-Only, and then the SD card is set to read only. Click Read & Write, and then the SD card is set to read & write. Click Hot Swap, and then you can pull out the SD card. Click Format, and you can format the SD card. When reading SD card on PC, if the SD card capacity is much less than the nominal capacity, you need to format the SD card.
Operation Manual Parameter Description Video Standard Step 3 Click Apply. Select video standard from PAL and NTSC. 6.6.1.2 Date & Time You can configure date and time format, time zone, current time, DST (Daylight Saving Time) or NTP server. Step 1 Select > System > General > Date & Time. Figure 6-60 Date and time Step 2 Configure date and time parameters. Table 6-24 Description of date and time parameters Parameter Description Date Format Configure the date format.
Operation Manual Parameter Description Current Time Configure system time. Click Sync PC, and the system time changes to the PC time. DST Enable DST as needed. Click , and configure start time and end time of DST with Date or Week. Step 3 Click Apply. 6.6.2 Account You can manage users, such as add, delete, or edit them. Users include admin, added users and ONVIF users. Managing users and groups are only available for administrator users.
Operation Manual Figure 6-61 User Step 2 Click Add.
Operation Manual Figure 6-63 Add user (restricted login) Step 3 Configure user parameters. Table 6-25 Description of user parameters (1) Parameter Description Username User’s unique identification. You cannot use existed username. Password Enter password and confirm it again. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &).
Operation Manual Parameter Description Restricted Login Set the PC address that allows the defined user to log in to the camera and the validity period and time range. You can log in to the web interface with the defined IP in the defined time range of validity period. ● IP address: You can log in to web through the PC with the set IP. ● Validity period: You can log in to web in the set validity period. ● Time range: You can log in to web in the set time range. Set as follows 1.
Operation Manual Step 3 Step 4 camera. Enter the reserved email address. Click Apply. 6.6.2.2 Adding User Group You have two groups named admin and user by default, and you can add new group, delete added group or edit group authority and memo. Step 1 Select > System > Account > Group. Figure 6-65 Group name Step 2 Click Add. Figure 6-66 Add group Step 3 Step 4 Enter the group name and memo, and then select group authorities. Click OK to finish configuration.
Operation Manual 6.6.2.3 ONVIF User You can add, delete ONVIF user, and change their passwords. Step 1 Select > System > Account > ONVIF User. Figure 6-67 ONVIF user Step 2 Click Add. Figure 6-68 Add ONVIF user Step 3 Configure user parameters. Table 6-26 Description of ONVIF user parameters Parameter Description Username User’s unique identification. You cannot use existed username. Password Confirm Password Group Name Step 4 Enter password and confirm it again.
Operation Manual The admin account cannot be deleted. 6.6.3 Manager 6.6.3.1 Requirements To make sure the system runs normally, maintain it as the following requirements: ● Check surveillance images regularly. ● Clear regularly user and user group information that are not frequently used. ● Change the password every three months. For details, see "6.6.2 Account". ● View system logs and analyze them, and process the abnormity in time. ● Back up the system configuration regularly.
Operation Manual Step 3 When you enable and confirm the Auto Delete function, the deleted files cannot be restored. Operate it carefully. Click Apply. 6.6.3.3 Import/Export ● Export the system configuration file to back up the system configuration. ● Import system configuration file to make quick configuration or recover system configuration. Step 1 Select > System > Manager > Import/Export. Figure 6-70 Import/Export Step 2 Import and export.
Operation Manual Figure 6-71 Default 6.6.4 Upgrade Upgrading to the latest system can refine camera functions and improve stability. If wrong upgrade file has been used, restart the device; otherwise some functions might not work properly. Step 1 Select > System > Upgrade. Figure 6-72 Upgrade Step 2 Step 3 Click Browse, and then upload upgrade file. The upgrade file should be a .bin file. Click Upgrade. The upgrade starts. 6.
Operation Manual 6.7.2 Online User Select > System Info > Online User to view all the current users logging in to web. 6.8 Setting Log 6.8.1 Log You can view and back up logs. Step 1 Select Step 2 Configure Start Time and End Time, and then select the log type. The start time should be later than January 1st, 2000, and the end time should be earlier than December 31, 2037. The log type includes All, System, Setting, Data, Event, Record, Account, and Safety.
Operation Manual Figure 6-73 Log 6.8.2 Remote Log Configure remote log, and you can get the related log by accessing the set address. Step 1 Select > Log > Remote Log. Step 2 Click to enable remote log function. Step 3 Step 4 Set address, port and device number. Click Apply.
Operation Manual 7 Live This section introduces the layout of the interface and function configuration. 7.1 Live Interface Log in and click the Live tab. Interface might vary with different models, and the actual interface shall prevail. Figure 7-1 Live (single-channel) Figure 7-2 Live (multi-channels) Table 7-1 Description of function bar No. Function Description 1 Display mode You can select the display mode from General Mode and Face Mode. 2 Channel list Displays all channels.
Operation Manual No. Function Description 5 Live view Displays the real-time monitoring image. 6 Live view function bar Functions and operations in live viewing. 4 7.2 Setting Encode Click , and then select the stream as needed. Figure 7-3 Encode bar ● Main Stream: It has large bit stream value and image with high resolution, but also requires large bandwidth. This option can be used for storage and monitoring. For details, see "6.2.2.1 Encode".
Operation Manual Icon Function Description Click the icon to capture one picture of the current image, and it will be saved to the configured storage path. / Snapshot About viewing or configuring storage path, see "6.1 Local". Click the icon to capture three pictures of the current image, and they will be saved to the configured storage path. / Triple Snapshot About viewing or configuring storage path, see "6.1 Local".
Operation Manual Icon Function Description Full Screen Click the icon to enter full screen mode; double-click or press Esc to exit. W:H Click the icon to resume original ratio or change ratio. Fluency Adjustment Click the icon to select the fluency from Realtime, General and Fluent. ● Realtime: Guarantees the real time of the image. When the bandwidth is not enough, the image might not be smooth. ● General: It is between Realtime and Fluent. ● Fluent: Guarantees the fluency of the image.
Operation Manual The focus would adjust automatically after zooming in or out. Figure 7-4 Zoom and focus Table 7-4 Description of zoom and focus parameter Parameter Description Zoom Speed Changes the focal length of the camera to zoom in or out the image. 1. Set the speed value. The Zoom Speed is the adjustment range in one click. The larger the value is, the more the image would zoom in or out in one click. 2. Click or hold + or– button, or drag the slider to adjust zoom.
Operation Manual 7.4.3 Image Adjustment Click Image Adjustment at the lower-left corner of Live interface, and click + or– button, or drag to adjust image parameters, including brightness, contrast, hue, and saturation. The adjustment is only available on the web interface, and it does not adjust the camera parameters. Figure 7-5 Image adjustment ● (Brightness adjustment): Adjusts the overall image brightness, and changes the value when the image is too bright or too dark.
Operation Manual Make sure that you have enabled face detection function. Figure 7-6 Face mode ● Select Metadata Mode from the display mode drop-down list. Make sure that you have enabled video metadata detection function. Figure 7-7 Metadata mode Table 7-5 Description of face mode layout No. Function Description 1 Live view Displays the real-time monitoring image. For details, see "7.4.1 Adjustment". 2 Details Displays the captured image and details.
Operation Manual 8 AI 8.1 Setting Crowd Distribution Map You can view crowd distribution on the map in real time for timely arming, to prevent stampede and other accidents. 8.1.1 Global Configuration Set the calibration parameters of panoramic cameras. Calibration Purpose Determine corresponding relationship between 2D image captured by the camera and 3D actual object according to one horizontal ruler and three vertical rulers calibrated by the user and the corresponding actual distance.
Operation Manual 8.1.2 Rule Configuration When the number of people or the crowd density in the detection area exceeds the configured threshold, the system performs alarm linkages. Prerequisites ● Select AI > Smart Plan, and enable Crowd Distribution Map. ● You have configured the parameters on the Global Config interface. Procedure Step 1 Select AI > Smart Plan Step 2 Step 3 Click next to Crowd Distribution Map, and then click Next. Click the Rule Config tab.
Operation Manual Parameter Description The system detects crowd distribution in the global area. When the crowd density exceeds the configured threshold, the system Crowd Density performs alarm linkages. Step 7 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". Click + Event Linkage to set the linkage action. Step 8 Click Apply. To view alarm information on the alarm subscription tab, you need to subscribe relevant alarm event. For details, see "6.4.1.3.
Operation Manual Figure 8-5 Face recognition flowchart 8.2.1 Setting Face Detection When a face is recognized in the detection area, the system performs alarm linkage. Procedure Step 1 Select AI > Smart Plan. Step 2 Click next to Face Recognition to enable face recognition of the corresponding channel, and then click Next. Figure 8-6 Face detection Step 3 Step 4 Click next to Enable to enable the face detection function.
Operation Manual ● Click to draw the minimum size of the target, and click to draw the maximum size of the target. Only when the target size between the maximum size and the minimum size, can the alarm be triggered. ● Click , and then press and hold the left mouse button to draw a rectangle, the pixel size is displayed. ● Click Step 5 to delete the detection line. Set parameters.
Operation Manual Parameter Description Properties Click Face Exposure Click next to Face Exposure. When a face is detected, the camera can enhance brightness of the face to make the face image clear. Face Target Brightness Set the face target brightness. It is 50 by default. Face Exposure Detection Interval Set the face exposure detection interval to prevent image flickering caused by constant adjustment of face exposure. It is five seconds by default.
Operation Manual Figure 8-7 Face database configuration Step 4 Step 5 Click Add Face Database. Set the name of the face database. Figure 8-8 Add face database Step 6 Click OK. Figure 8-9 Face database successfully added ● Edit the name of the face database. Click the text box under Name to edit the name of the face database. ● Arm Alarm Click to configure the parameters of arm alarm. For details, see "8.2.2.5 Setting Arm Alarm". ● Manage face database Click to manage the face database.
Operation Manual 8.2.2.2 Adding Face Picture Add face picture to the created face database. Single adding and batch importing are supported. Requirements on face pictures. ● A single face picture size is 50K–150K in JPEG format. The resolution is less than 1080p. ● Face size is 30%–60% of the whole picture. Pixel should be no less than 100 pixels between the ears. ● Taken in full-face view directly facing the camera without makeup, beautification, glasses, and fringe.
Operation Manual Figure 8-10 Register Step 4 Step 5 Enter the information about face picture according to the actual situation. Click Add to task list. Step 6 Click , and then click Operation. ● If the operation is successful, the system prompts that stored successfully, modeled successfully. ● If adding user fails, the error code is displayed on the interface. For details, see Table 8-3. For face modeling operation, see "8.2.2.
Operation Manual Parameter Error Description 3 Multiple faces in the picture. Change the picture. 4 Failed to decode the picture. Change the picture. 5 The picture is not suitable to be imported to the face database. Change the picture. 6 The database error. Restart the camera and model faces again. 7 Fails to get the picture. Import the picture again. 8 System error. Restart the camera and model faces again. 8.2.2.2.2 Batch Importing Import face pictures in batches.
Operation Manual Figure 8-11 Task list Step 4 Step 5 Click Import to import the face pictures. After the importing is completed, the result will be displayed. ● If the picture is imported successfully, click Next to do modeling operation. ● If the picture importing failed, click Query to view the details of the pictures and error code. For details, see Table 8-3. Click Export to export the error details. Click Next to do modeling operation. The modeling result is displayed.
Operation Manual Figure 8-12 Face information modification Step 5 Click , and then click Operation. 8.2.2.3.2 Deleting Face Picture On the Face Database Config interface, click next to the face database to be configured. Click Query, set the search criteria as needed, click Search, select the face information that needs to be deleted and delete it. ● Single delete: Select the row where the face picture or the personnel information is located, and click to delete the face picture.
Operation Manual establish relevant face feature models. Through this function, the face recognition and other intelligent detections can be realized. ● The more the selected face pictures are, the longer time the face modeling takes. Please wait patiently. ● During modeling, some intelligent detection functions (such as face recognition) are not available temporarily, and will be available after modeling.
Operation Manual The snapshot will be compared to the pictures in the armed face database. 2) Set the similarity. The detected face matches the face database only when the similarity between the detected face and the face feature in face database reaches the configured similarity threshold. After successful match, the comparison result is displayed on the Live interface. Figure 8-14 Failed modeling Step 3 Step 4 Step 5 Select alarm mode.
Operation Manual Figure 8-15 Face recognition result 8.3 Setting Face Detection When a face is detected in the detection area, the system performs an alarm linkage. Procedure Step 1 Select AI > Smart Plan. Step 2 Click next to Face Detection to enable face detection of the corresponding channel, and then click Next. Figure 8-16 Face detection Step 3 Step 4 Click next to Enable to enable the face detection function.
Operation Manual ● Click to draw an exclusion area for face detection in the image. ● Click to draw the minimum size of the target, and click to draw the maximum size of the target. Only when the target size between the maximum size and the minimum size, can the alarm be triggered. ● Click , and then press and hold the left mouse button to draw a rectangle, the pixel size is displayed. ● Click Step 5 to delete the detection line. Set parameters.
Operation Manual Parameter Description Advanced ● Snapshot Angle Filter: Set snapshot angle to be filtered during the face detection. ● Snapshot Sensitivity: Set snapshot sensitivity during the face detection. It is easier to detect face with higher sensitivity. ● Optimized Time: Set a time period to capture the clearest picture after the camera detects face. Face Exposure Click next to Face Exposure. When a face is detected, the camera can enhance brightness of the face to make the face image clear.
Operation Manual ● ● ● ● object in the image should be no less than 15 × 15 pixels (CIF image). The target height and width should no more than a third of the image height and width. The recommended target height is 10% of the image height. The brightness difference of the target and the background should be no less than 10 gray levels.
Operation Manual Procedure 1. Select AI > Smart Plan. 2. Click next to IVS to enable IVS of the corresponding channel, and then click Next. 3. Click the Global Config tab. Figure 8-18 Global configuration of IVS 4. Set calibration area and ruler. a. Click and draw a calibration area in the image, and right-click to finish the drawing. b. Click the ruler icon to draw one horizontal ruler and three vertical rulers in the calibration area.
Operation Manual Table 8-6 Description of IVS functions Rule Description Applicable Scene Tripwire When the target crosses tripwire from the defined motion direction, an alarm is triggered, and then the system performs configured alarm linkages. Intrusion When the target enters, leaves, or appears in the detection area, an alarm is triggered, and the system performs configured alarm linkages.
Operation Manual Rule Description Applicable Scene Parking detection When the target stays over the configured time, an alarm is triggered, and then the system performs configured alarm linkages. Road monitoring and traffic management. Crowd gathering When the crowd gathers or the crowd density is large, an alarm is triggered, and then the system performs configured alarm linkages. Scenes with medium or long distance, such as outdoor plaza, government entrance, station entrance and exit.
Operation Manual Rule Description triggered if pedestrian or vehicle stays for a long time. If the abandoned object is smaller than pedestrian and vehicle, Fast moving set the target size to filter pedestrian and vehicle or properly Parking detection extend the duration to avoid false alarm triggered by Crowd gathering transient staying of pedestrian.
Operation Manual Parameter Description ● For fast moving, sensitivity is related to the triggering speed. Lower sensitivity requires faster moving speed to trigger the alarm. Sensitivity ● For crowd gathering, sensitivity is related to the alarm triggering time. It is easier to trigger the alarm with higher sensitivity. Step 8 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". Click + Event Linkage to set the linkage action. Step 9 Click Apply.
Operation Manual Figure 8-20 Global configuration of video metadata Table 8-9 Description of scene set parameters (video metadata) Parameter Description Target Box Overlay Overlay target box on the captured pictures to mark the target position. Four types of target boxes are supported. Select the target box as needed. The captured pictures are stored in SD card or the configured storage path. For details, see "6.1 Local".
Operation Manual Procedure Step 1 Step 2 Step 3 Step 4 Select AI > Smart Plan Click next to Video Metadata, and then click Next. Click the Rule Config tab. Click Add Rule to select rules. The added rules will be display in the list. Click the text box under Name to edit the rule name. The rule is enabled by default. Figure 8-21 Rule Configure (Video Metadata) Step 5 Configure Picture. 1) Click . 2) Set overlay of motor vehicle, non-motor vehicle and people and the box position.
Operation Manual Step 7 Set parameters. Table 8-10 Description of crowd map parameters Parameter Description People Flow Statistics Click next to People Flow Statistics to count the number of people in the detection area. Flow Statistics (Non-motor Vehicle) Click next to Flow Statistics (Non-motor Vehicle) to count the number of non-motor vehicles in the detection area. Traffic Flow Stat Click next to Traffic Flow Statistics to count the number of motor vehicles in the detection area.
Operation Manual Figure 8-23 Video metadata report 111
Operation Manual 9 Camera Click Camera to configure camera parameters, including image parameters, encoder parameters, and audio parameters. For details, see "6.2 Camera".
Operation Manual 10 Event Click Event to configure general events, including alarm linkage exception, video detection, and audio detection. For details. see "6.4 Event".
Operation Manual 11 System Click System, and you can configure system parameters, including general, date & time, account, safety, PTZ settings, default, import/export, remote, auto maintain and upgrade. For details, see "6.6 System".
Operation Manual 12 Security 12.1 Security Status Background Information Detect the user and service, and scan the security modules to check the security status of the camera, so that when abnormality appears, you can process it timely. ● User and service detection: Detect login authentication, user status, and configuration security to check whether the current configuration conforms to recommendation.
Operation Manual Figure 12-2 Security Status 12.2 System Service 12.2.1 802.1x Cameras can connect to LAN after passing 802.1x authentication. Step 1 Select Security > System Service > 802.1x. Step 2 Step 3 Select the NIC name as needed, and click to enable it. Select the authentication mode, and then configure parameters. ● PEAP: Protected EAP protocol. 1. Select PEAP as the authentication mode. 2. Enter the username and password that has been authenticated on the server. 3.
Operation Manual If there is no certificate in the list, click Certificate Management at the left navigation bar. For details, see "12.4.2 Installing Trusted CA Certificate". Figure 12-4 802.1x (TLS) Step 4 Click Apply. 12.2.2 HTTPS Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS with your PC. The HTTPS can protect page authenticity on all types of websites, secure accounts, and keep user communications, identity, and web browsing private.
Operation Manual 12.3 Attack Defense 12.3.1 Firewall Configure firewall to limit access to the camera. Step 1 Select Security > Attack Defense > Firewall. Step 2 Click to enable the firewall function. Figure 12-6 Firewall Step 3 Step 4 Select the mode: Allowlist and Blocklist. ● Allowlist: Only when the IP/MAC of your PC in the allow list, can you access the camera. Ports are the same. ● Blocklist: When the IP/MAC of your PC is in the block list, you cannot access the camera. Ports are the same.
Operation Manual 12.3.2 Account Lockout If you consecutively enter a wrong password more than the configured value, the account will be locked. Step 1 Select Security > Attack Defense > Account Lockout. Step 2 Configure the login attempt and lock time for device account and ONVIF user. ● Login attempt: Upper limit of login attempts. If you consecutively enter a wrong password more than the configured value, the account will be locked.
Operation Manual Figure 12-9 Anti-DoS attack 12.4 CA Certificate 12.4.1 Installing Device Certificate Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS with your PC. 12.4.1.1 Creating Certificate Creating certificate in the device. Step 1 Select Security > CA Certificate > Device Certificate. Step 2 Select Installing Device Certificate. Step 3 Select Create Certificate, and click Next. Step 4 Enter the certificate information.
Operation Manual Figure 12-10 Certificate information (1) Step 5 Click Create and install certificate. After the certificate is created successfully, you can view the created certificate on the Device Certificate interface. Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ● Click to download the certificate. ● Click to delete the certificate. 12.4.1.2 Applying for and Importing CA Certificate Import the third-party CA certificate to the camera.
Operation Manual Figure 12-11 Certificate information (2) Step 5 Step 6 Step 7 Click Create and Download. Save the request file to your PC. Apply the CA certificate from the third-party certificate authority. Import the signed CA certificate. 1) Save the CA certificate to the PC. 2) Do Step1 to Step3, and click Browse to select the signed CE certificate. 3) Click Install and Import. After the certificate is created successfully, you can view the created certificate on the Device Certificate interface.
Operation Manual Figure 12-12 Certificate and private key Step 5 Click Import and Install. After the certificate is created successfully, you can view the created certificate on the Device Certificate interface. Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ● Click to download the certificate. ● Click to delete the certificate. 12.4.2 Installing Trusted CA Certificate CA certificate is a digital certificate for the legal identity of the camera.
Operation Manual 12.5 A/V Encryption The device supports audio and video encryption during data transmission. You are recommended to enable A/V Encryption function. There might be safety risk if this function is disabled. Step 1 Select Security > A/V Encryption. Step 2 Configure the parameters. Figure 12-14 A/V encryption Table 12-1 A/V encryption parameter Area Parameter Description Enables stream frame encryption by using private protocol.
Operation Manual 12.6 Security Warning When security exception event is detected, the camera sends a warning to remind you to process it timely, to avoid security risk. Step 1 Select Security > Security Warning. Step 2 Click next to Enable to enable security warning. Step 3 Configure the parameters. Figure 12-15 Security warning Step 4 Step 5 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". Click + Event Linkage to set the linkage action. Click Apply.
Operation Manual 13 Record This section introduces the functions and operations of video playback. 13.1 Playback 13.1.1 Playing Back Video This section introduces the operation of video playback. Prerequisites ● This function is available on the camera with SD card. ● Before playing back video, configure record time range, record storage method, record schedule and record control. For details, see "13.2 Setting Record Control", "13.3 Setting Record Plan", and "13.4 Storage".
Operation Manual Figure 13-2 Video playback Table 13-1 Description of video playback interface No 1 Function Description Recorded video list Displays all searched recorded video files. Click any files to play back it. Click Back at the upper-left corner to go to the Search Video interface. Digital Zoom You can zoom video image of the selected area through two operations. ● Click the icon, and then select an area in the video image to zoom in; right-click on the image to resume the original size.
Operation Manual No Function Description Sound Controls the sound during playback. ● : Mute mode. ● : Vocal state. You can adjust the sound. Click to capture one picture of the current image, and it will be saved to the configured storage path. Snapshot About viewing or configuring storage path, see "6.1 Local". 3 Video clip Click , and clip a certain recorded video and save it. For details, see "13.1.2 Clipping Video".
Operation Manual Figure 13-4 Clipping video Step 5 Click Start Download. The playback stops and the clipped file is saved in the configured storage path. For details of storage path, see "6.1 Local". 13.1.3 Downloading Video Download videos to a defined path. You can download a single video, or download them in batches. ● Playback and downloading at the same time is not supported. ● Operations might vary with different browsers, and the actual product shall prevail.
Operation Manual Figure 13-6 Downloading video Step 6 Click Start Download. The downloaded files are saved in the configured storage path. For details of storage path, see "6.1 Local". 13.2 Setting Record Control Set parameters such as pack duration, pre-event record, disk full, record mode, and record stream. Step 1 Click Record in the main interface, and then click the Record Control tab. Figure 13-7 Record control Step 2 Set parameters.
Operation Manual Parameter Description The time to record the video in advance of a triggered alarm event. For example, if the pre-event record is set to be 5 s, the system saves the recorded video 5 s before the alarm is triggered. Pre-Record When an alarm or motion detection links recording, and the recording is not enabled, the system saves the video data within the pre-event record time to the video file. Record Mode Record Stream Step 3 Click Apply.
Operation Manual Step 3 Step 4 ● Click Copy next to a day, and select the days that you want to copy to in the prompt interface, you can copy the configuration to the selected days. Select the Select All check box to select all day to copy the configuration. ● You can set 6 time periods per day. Click Apply. Click Holiday to set holidays. Figure 13-9 Time plan Step 5 Click to enable the holiday configuration, and select the days that you need to set as holiday Click Clear to cancel the selection.
Operation Manual Figure 13-10 Live Step 2 Select the storage method that you need for different types of recorded videos. Table 13-3 Description of storage parameters Parameter Description Event Type Select from Scheduled, Motion Detection and Alarm. Disk Full Recording strategy when the disk is full. ● Overwrite: Cyclically overwrite the earliest video when the disk is full. ● Stop: Stop recording when the disk is full.
Operation Manual 13.4.2 Network Storage You can select from FTP and NAS. When the network does not work, you can save all the files to the internal SD card for emergency. 13.4.2.1 FTP Enable this function, and you can save all the files in the FTP server. Step 1 Select Record > Storage. Step 2 Select the recording strategy in Disk Full. ● Overwrite: Cyclically overwrite the earliest video when the disk is full. ● Stop: Stop recording when the disk is full.
Operation Manual Table 13-4 Description of FTP parameters Parameter Description Server IP The IP address of the FTP server. Port The port number of the FTP server. Username The username to log in to the FTP server. Password The password to log in to the FTP server. Storage Path The destination path in the FTP server.
Operation Manual Figure 13-13 FTP Step 5 Configure NAS parameters. Table 13-5 Description of NAS parameters Parameter Description Server IP The IP address of the NAS server. Storage Path The destination path in the NAS server. Username When selecting SMB protocol, you are required to enter username and password. Enter them as needed. Password Step 6 Click Apply.
Operation Manual 14 Picture This section introduces the related functions and operations of picture playback. 14.1 Playback 14.1.1 Playing Back Picture This section introduces the operation of picture playback. Prerequisites ● This function is available on the camera with SD card. ● Before playing back picture, configure snapshot time range, snapshot storage method, snapshot plan. For details, see"14.3 Setting Snapshot Plan". Procedure Step 1 Step 2 Select Record > Picture Query.
Operation Manual Figure 14-2 Picture playback Table 14-1 Description of playback interface No 1 Function Description Snapshot list Displays all searched snapshots. Click any files to play back it. Click Back at the upper-left corner to go to the Picture Query interface. ● Click 2 Manual display to display the previous snapshot in the snapshot list. ● Click to display the nest snapshot in the snapshot list. 3 Slide show Click to display the snapshots list one by one in slide show mode.
Operation Manual Figure 14-3 Selecting picture file Step 4 Step 5 Click Download. Select the download format and storage path. Figure 14-4 Downloading picture Step 6 Click Start Download. The downloaded pictures are saved in the configured storage path. For details of storage path, see "6.1 Local". 14.2 Setting Snapshot Parameters Set the snapshot parameters, including type, size, quality and Interval. Step 1 Select Picture > Snapshot. Step 2 Select the channel and set the parameters.
Operation Manual Figure 14-5 Snapshot Table 14-2 Description of snapshot parameters Parameter Description Type You can select from Scheduled and Event. ● Scheduled: Capture images in configured period. For details, see ● Event: Capture images when configured event is triggered, such as Motion Detection, Video Tamper and Scene Changing. Make sure that you have enable the corresponding event detection and the snapshot function. Size It is same with the resolution of the main stream.
Operation Manual 15 Report You can search the result of face detection. Step 1 Select Report > Face Detection. Step 2 Select the channel, and set the time. Click Advance, and you can set face attributes. Step 3 Click Search. Figure 15-1 Face detection Report Step 4 Click the picture, and you can view the details.
Operation Manual Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system.
Operation Manual between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing. 8.
Operation Manual device.
Operation Manual