Network Fisheye Camera User Manual UD04808B
User Manual of Network Fisheye Camera User Manual COPYRIGHT ©2017 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings, pictures, graphs are the properties of Hangzhou Hikvision Digital Technology Co., Ltd. or its subsidiaries (hereinafter referred to be “Hikvision”).
User Manual of Network Fisheye Camera FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
User Manual of Network Fisheye Camera responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
User Manual of Network Fisheye Camera 2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see: www.recyclethis.info.
User Manual of Network Fisheye Camera does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: —Reorient or relocate the receiving antenna. —Increase the separation between the equipment and receiver. —Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
User Manual of Network Fisheye Camera information. The battery is marked with this symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see: www.recyclethis.info. Industry Canada ICES-003 Compliance This device meets the CAN ICES-3 (B)/NMB-3(B) standards requirements. This device complies with Industry Canada licence-exempt RSS standard(s).
User Manual of Network Fisheye Camera between the radiator and your body. Cet équipement doit être installéet utiliséàune distance minimale de 20 cm entre le radiateur et votre corps. Safety Instruction These instructions are intended to ensure that the user can use the product correctly to avoid danger or property loss. The precaution measure is divided into ‘Warnings’ and ‘Cautions’: Warnings: Serious injury or death may be caused if any of these warnings are neglected.
User Manual of Network Fisheye Camera If the product does not work properly, please contact your dealer or the nearest service center. Never attempt to disassemble the camera yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.) Cautions: Make sure the power supply voltage is correct before using the camera. Do not drop the camera or subject it to physical shock. Do not touch sensor modules with fingers.
User Manual of Network Fisheye Camera the dome cover film until the installation is finished. If there is dust or grease on the dome cover, clean the dome cover with clean soft cloth and isopropyl alcohol. Make certain the installation location does not have reflective surfaces of objects too close to the camera. The IR light from the camera may reflect back into the lens causing reflection.
User Manual of Network Fisheye Camera Table of Contents Chapter 1 System Requirement ..........................................................................12 Chapter 2 Network Connection ..........................................................................13 2.1 Setting the Network Camera over the LAN ...................................................... 13 2.1.1 Wiring over the LAN........................................................................................................ 13 2.1.
User Manual of Network Fisheye Camera 6.3.2 Configuring Port Settings ................................................................................................ 59 6.3.3 Configuring PPPoE Settings ............................................................................................. 60 6.3.4 Configuring DDNS Settings.............................................................................................. 61 6.3.5 Configuring NAT (Network Address Translation) Settings ...............
User Manual of Network Fisheye Camera Chapter 1 System Requirement Operating System: Microsoft Windows XP SP1 and above version CPU: 2.0 GHz or higher RAM: 1G or higher Display: 1024×768 resolution or higher Web Browser: Internet Explorer 8.0 and above version, Apple Safari 5.0.2 and above version, Mozilla Firefox 5.
User Manual of Network Fisheye Camera Chapter 2 Network Connection Note: You shall acknowledge that the use of the product with Internet access might be under network security risks. For avoidance of any network attacks and information leakage, please strengthen your own protection. If the product does not work properly, please contact with your dealer or the nearest service center.
User Manual of Network Fisheye Camera Refer to the Figure 2-2 to set network camera over the LAN via a switch or a router. Figure 2-1 Connecting Directly Figure 2-2 Connecting via a Switch or a Router 2.1.2 Creating a Password You are required to activate the camera first by setting a strong password for it before you can use the camera. Creating a Password via Web Browser, Creating a Password via SADP, and Creating a Password via Client Software are all supported.
User Manual of Network Fisheye Camera Figure 2-3 Creating a Password via Web Browser 3. Create a password and input the password into the password field. STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
User Manual of Network Fisheye Camera Select inactive device. Input and confirm password. Figure 2-4 SADP Interface 3. Create a password and input the password in the password field, and confirm the password.
User Manual of Network Fisheye Camera Figure 2-5 Modify the IP Address 6. Input the admin password and click Modify to activate your IP address modification. The batch IP address modification is supported by the SADP. Refer to the user manual of SADP for details. Creating a Password via Client Software The client software is versatile video management software for multiple kinds of devices.
User Manual of Network Fisheye Camera 1. Run the client software and the control panel of the software pops up, as shown in the figure below. Figure 2-6 Control Panel 2. Click the Device Management icon to enter the Device Management interface, as shown in the figure below.
User Manual of Network Fisheye Camera Figure 2-7 Device Management Interface 3. Check the device status from the device list, and select an inactive device. 4. Click the Activate button to pop up the Activation interface. 5. Create a password and input the password in the password field, and confirm the password.
User Manual of Network Fisheye Camera Figure 2-8 Activation Interface (Client Software) 6. Click OK button to start activation. 7. Click the Modify Netinfo button to pop up the Network Parameter Modification interface, as shown in the figure below. Figure 2-9 Modifying the Network Parameters 8. Change the device IP address to the same subnet with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP. 9.
User Manual of Network Fisheye Camera 2.2 Setting the Network Camera over the WAN Purpose: This section explains how to connect the network camera to the WAN with a static IP or a dynamic IP. 2.2.1 Static IP Connection Before you start: Please apply a static IP from an ISP (Internet Service Provider). With the static IP address, you can connect the network camera via a router or connect it to the WAN directly. Connecting the network camera via a router Steps: 1.
User Manual of Network Fisheye Camera without using a router. Refer to Section 2.1.2 for detailed IP address configuration of the network camera. Figure 2-11 Accessing the Camera with Static IP Directly 2.2.2 Dynamic IP Connection Before you start: Please apply a dynamic IP from an ISP. With the dynamic IP address, you can connect the network camera to a modem or a router. Connecting the network camera via a router Steps: 1. Connect the network camera to the router. 2.
User Manual of Network Fisheye Camera configure the PPPoE parameters of the network camera. Refer to Section 6.3.3 Configuring PPPoE Settings for detailed configuration. Figure 2-12 Accessing the Camera with Dynamic IP Note: The obtained IP address is dynamically assigned via PPPoE, so the IP address always changes after rebooting the camera. To solve the inconvenience of the dynamic IP, you need to get a domain name from the DDNS provider (E.g. DynDns.com).
User Manual of Network Fisheye Camera Chapter 3 Access to the Network Camera 3.1 Accessing by Web Browsers Steps: 1. Open the web browser. 2. Input the IP address of the network camera in the address bar, e.g., 192.168.1.64 and press the Enter key to enter the login interface. 3. Input the user name and password and click Login. Figure 3-1 Login Interface Note: Switch the display language from the upper-right corner among different languages. 4.
User Manual of Network Fisheye Camera 3.2 Accessing by Client Software The product CD contains the iVMS-4200 client software. You can view the live video and manage the camera with the software. Follow the installation prompts to install the software. The control panel interface of iVMS-4200 client software is shown as bellow. Figure 3-3 iVMS-4200 Client Software Note: For detailed information about the software, please refer to the user manual of the iVMS-4200 Client Software.
User Manual of Network Fisheye Camera Chapter 4 Wi-Fi Settings Purpose: By connecting to the wireless network, you don’t need to use cable of any kind for network connection, which is very convenient for the actual surveillance application. Two connection modes are supported. Choose a mode as desired and perform the steps to configure the Wi-Fi. Note: This chapter is only applicable for the cameras with the built-in Wi-Fi module. Wireless Connection in Manage Mode Steps: 1.
User Manual of Network Fisheye Camera Figure 4-2 Wi-Fi Setting- Manage Mode 4. Check the radio button to select the Network mode as Manage, and the Security mode of the network is automatically shown when you select the wireless network, please don’t change it manually. Note: These parameters are exactly identical with those of the router. 5. Enter the key to connect the wireless network. The key should be that of the wireless network connection you set on the router.
User Manual of Network Fisheye Camera 4. Enable the wireless connection function for your PC. 5. On the PC side, search the network and you can see the SSID of the camera listed. Figure 4-4 Ad-hoc Connection Point 6. Choose the SSID and connect. Security Mode Description: Figure 4-5 Security Mode You can choose the Security Mode as not-encrypted, WEP, WPA-personal, WPA-enterprise, WPA2-personal, and WPA2-enterprise.
User Manual of Network Fisheye Camera Authentication. Key length - This sets the length of the key used for the wireless encryption, 64 or 128 bit. The encryption key length can sometimes be shown as 40/64 and 104/128. Key type - The key types available depend on the access point being used. The following options are available: HEX - Allows you to manually enter the hex key. ASCII - In this method the string must be exactly 5 characters for 64-bit WEP and 13 characters for 128-bit WEP.
User Manual of Network Fisheye Camera Identity - Enter the user ID to present to the network. Private key password – Enter the password for your user ID. EAPOL version - Select the version used (1 or 2) in your access point. CA Certificates - Upload a CA certificate to present to the access point for authentication. EAP-PEAP: User Name - Enter the user name to present to the network. Password - Enter the password of the network.
User Manual of Network Fisheye Camera Chapter 5 Live View 5.1 Live View Page Purpose: The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters. Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page. Note: You can also visit the fisheye camera to get the live view in different live view modes via iVMS-4200 client software.
User Manual of Network Fisheye Camera Menu Bar: Click the tab to enter Live View, Playback, Picture and Configuration page respectively. Display Control: The display control area allows you to select mount type and display mode of live view. Mount Type Select ceiling mounting, wall mounting and table mounting according to the actual mount type you adopted for your camera. Table 5-1 Description of Mount Types Mount Type Icon Description Ceiling mounting. Wall mounting. Table mounting.
User Manual of Network Fisheye Camera Table 5-2 Description of Display Modes Mode Description Mode Fisheye view. Description 180 degrees panorama view. 360 degrees panorama view. Live view with a 360 degrees panorama view and 3 PTZ views. Live view with a 360 degrees panorama view and a PTZ view. Live view with a 360 degrees panorama view and 6 PTZ views. Live view with a 360 degrees panorama view and 8 PTZ views. Live view with 2 PTZ views. Live view with into 4 PTZ views.
User Manual of Network Fisheye Camera 5.2 Starting Live View Figure 5-2 Live View Interface Table 5-3 Descriptions of Live View Icons Icon Description Start all live view. Stop all live view. Set aspect ratio as 1:1. Set aspect ratio as 4:3. Set aspect ratio as 16:9. Window size for original video stream. Stream Type: Select Main Stream or Sub Stream Self-adaptive window size. / Manually start/stop recording. Audio on and adjust the volume. Mute. / Start/stop two-way audio.
User Manual of Network Fisheye Camera / Show/hide the PTZ panel. Notes: Toolbar icons on the live view page vary according to camera models. 5.3 Recording and Capturing Pictures Manually In the live view interface, click on the toolbar to capture the live pictures or click to record the live video. The saving paths of the captured pictures and record files can be set on the Configuration > Local Configuration page. To configure remote scheduled recording, please refer to Section 6.
User Manual of Network Fisheye Camera Figure 5-3 PTZ Control Note: If Fisheye View or Panorama View is selected for live view together with the PTZ View, when you click on a random PTZ view, a navigation box indicating the location of the PTZ view will be shown on the fisheye or panorama view. SeeFigure 5-2. 5.4.1 PTZ Control Panel On the live view page, you can click to show the PTZ control panel, and click hide it.
User Manual of Network Fisheye Camera Figure 5-4 PTZ Control Panel Table 5-4 Descriptions of PTZ Control Panel Icon Description Direction buttons Start/stop auto scan / Zoom out/Zoom in Focus -/Focus + Iris -/Iris + Adjust speed of pan/tilt movements Enable/disable light Auxiliary Focus Enable/disable wiper Lens initialization Start manual tracking Start 3D zoom Click to set presets Click to set patrol 37
User Manual of Network Fisheye Camera Steps: 1. Click to select a PTZ View on the display window, and then the navigation box appears on the Fisheye View and Panorama View. 2. Click the direction arrows on the PTZ control panel. The navigation box will move in the corresponding pan/tilt direction. 3. Adjust zoom, focus and iris level of the PTZ view image. 4. Click-and-drag the slider on the speed bar to adjust the moving speed of PTZ View when auto scan is enabled. 5.
User Manual of Network Fisheye Camera Figure 5-5 Setting a Preset Note: Up to 256 presets are supported. Calling a Preset: Purpose: The PTZ View of the fisheye camera can directly and quickly move to the area of interest, which is defined as a preset. Before you start: Set the preset. The icons ( , and ) will appear on the preset list. Steps: 1. Click to select a PTZ View on the display window. 2. Select the preset number from the list. 3. Click the icon to call the selected preset.
User Manual of Network Fisheye Camera The preset name turns from black to grey. 5.4.3 Setting/Calling/Deleting a Patrol Purpose: A patrol is a scanning track specified by a group of defined presets, with the duration time at each preset separately programmable. Before you start: At least 2 presets are required to set a patrol. Setting a Patrol Steps: 1. Click the icon to enter the patrol configuration interface. Figure 5-6 Patrol Configuration (1) 2. Select a path No.
User Manual of Network Fisheye Camera most. Calling a Patrol Steps: 1. Click to select a PTZ View on the display window. 2. Select the patrol path number from the drop-down list. 3. Click the icon to start the selected patrol and to stop it. Deleting a Patrol 1. Select the patrol path number from the drop-down list. 2. Click the icon to delete the patrol path.
User Manual of Network Fisheye Camera Chapter 6 Network Camera Configuration 6.1 Configuring Local Parameters Purpose: Local configuration provides live view parameters settings, record file settings and picture and clip settings. The recorded videos and captured pictures can be saved on the local PC that runs the web browser. Steps: 1. Enter the Local Configuration interface: Configuration > Local Figure 6-1 Local Configuration Interface 2.
User Manual of Network Fisheye Camera for streaming under some network environments. MULTICAST: It’s recommended to select MCAST type when using the Multicast function. For detailed information about Multicast, refer to Section 5.3.1 Configuring TCP/IP Settings. Live View Performance: Set the live view performance to Shortest Delay or Auto.
User Manual of Network Fisheye Camera And click Open to open the selected folder. 3. Click Save to save the settings. 6.2 Configuring System Settings 6.2.1 Viewing Basic Information Enter the Basic Information interface: Configuration > System > System Settings > Basic Information In the Basic Information interface, you can edit the Device Name or Device No.. Other information of the network camera, such as Model, Serial No.
User Manual of Network Fisheye Camera 6.2.2 Time and DST Settings Purpose: You can follow the instructions in this section to configure the time synchronization and DST settings. Time Settings Steps: 1. Enter the Time Settings interface: Configuration > System > System Settings > Time Settings Figure 6-3 Time Settings 2. Select the Time Zone of your location from the drop-down list. Synchronizing Time by NTP Server. (1) Check the NTP item to enable the NTP function.
User Manual of Network Fisheye Camera (3) (Optional) You can click the Test button to test the time synchronization function via NTP server. Figure 6-4 Time Sync by NTP Server Note: If the camera is connected to a public network, you should use a NTP server that has a time synchronization function, such as the server at the National Time Center (IP Address: 210.72.145.44). If the camera is set in a customized network, NTP software can be used to establish a NTP server for time synchronization.
User Manual of Network Fisheye Camera of the device with that of the local PC. 3. Click Save to save the settings. DST Purpose: For region using the summer time, DST (daylight saving time) settings can be configured according to the actual needs. Steps: 1. Enter DST Settings interface: Configuration > System > System Settings > DST 2. Check the checkbox of Enable DST to enable daylight saving time. 3. Set the start time and end time for the DST period. 4. Select the DST bias from the drop-down list. 5.
User Manual of Network Fisheye Camera Steps: 1. Enter RS-232 Port Setting interface: Configuration> System > System Settings > RS232 Figure 6-7 RS-232 Settings Note: If you want to connect the camera by the RS-232 port, the parameters of the RS-232 should be exactly the same with the parameters you configured here. 2. Click Save to save the settings. 6.2.4 RS-485 Settings Purpose: The RS-485 serial port is used to control the PTZ of the camera.
User Manual of Network Fisheye Camera the same as the PTZ camera parameters. Figure 6-8 RS-485 Settings 6.2.5 Upgrade and Maintenance Purpose: On Upgrade & Maintenance interface, you can reboot the camera, restore camera parameters, export/import configuration parameters, and upgrade firmware.
User Manual of Network Fisheye Camera Rebooting the Camera Click Reboot to reboot the network camera. Restoring Default Settings Click Restore or Default to restore the default settings. Note: After restoring the default settings, the IP address is also restored to the default IP address, please be careful for this action.
User Manual of Network Fisheye Camera Please configure network disk for the camera or insert a memory card in the camera. Steps: 1. Enter log searching interface: Configuration > System > Maintenance > Log Figure 6-10 Log Searching Interface 2. Set the log search conditions to specify the search, including the Major Type, Minor Type, Start Time and End Time. 3. Click Search to search log files. The matched log files will be displayed on the Log interface. 4.
User Manual of Network Fisheye Camera 6.2.8 Authentication Purpose: You can specifically secure the stream data of live view. Steps: 1. Enter the RTSP Authentication interface: Configuration > System > Security > Authentication Figure 6-12 RTSP Authentication 2. Select the Authentication type basic or disable in the drop-down list to enable or disable the RTSP authentication. Note: If you disable the RTSP authentication, anyone can access the video stream by the RTSP protocol via the IP address. 3.
User Manual of Network Fisheye Camera Figure 6-13 IP Address Filter Interface 2. Check the checkbox of Enable IP Address Filter. 3. Select the type of IP Address Filter in the drop-down list, Forbidden and Allowed are selectable. 4. Set the IP Address Filter list. Add an IP Address Steps: (1) Click the Add to add an IP. (2) Input the IP Adreess. Figure 6-14 Add an IP (3) Click the OK to finish adding. Modify an IP Address Steps: (1) Select the IP address from filter list and click Modify.
User Manual of Network Fisheye Camera Delete an IP Address or IP Addresses. Select the IP address(es) and click Delete. 5. Click Save to save the settings. 6.2.10 Security Service To enable the remote login, and improve the data communication security, the camera provides the security service for better user experience. Steps: 1. Go to Configuration > System > Security > Security Service to enter the security service configuration interface. Figure 6-16 Security Service 2.
User Manual of Network Fisheye Camera page of Online Users. Enter the User Management interface: Configuration > System > User Management Figure 6-17 User Information Adding a User The admin user has all permissions by default and can create/modify/delete other accounts. The admin user cannot be deleted and you can only change the admin password. Steps: 1. Click Add to add a user. 2. Input the User Name, select Level and input Password. Notes: ● Up to 31 user accounts can be created.
User Manual of Network Fisheye Camera Figure 6-18 Add a User Modifying a User Steps: 1. Click the user from the user list and Click Modify. 2. Modify the User Name, Level or Password. 3. Check or uncheck the permissions for the user. 4. Click OK to finish the user modification.
User Manual of Network Fisheye Camera Figure 6-19 Modify a User Deleting a User Steps: 1. Click to select the user you want to delete and click Delete. 2. Click OK on the pop-up dialogue box to delete the user. View Online Users Steps: 1. Click Online Users tab. User information of the visitor, such as user name, level, IP address, and operation time, is displayed in the User List.
User Manual of Network Fisheye Camera 2. Click Refresh to refresh the list. 6.3 Configuring Network Settings 6.3.1 Configuring TCP/IP Settings Purpose: TCP/IP settings must be properly configured before you operate the camera over network. The camera supports both the IPv4 and IPv6. Both versions may be configured simultaneously without conflicting to each other, and at least one IP version should be configured. Steps: 1.
User Manual of Network Fisheye Camera 2. For the cameras support Wi-Fi, there are two NIC tabs selectable. One for LAN and other one for WLAN. Click the tab to configure the parameters of the selected NIC. 3. Click the Lan tab to configure the basic network settings, including the NIC Type, IPv4 or IPv6 Address, IPv4 or IPv6 Subnet Mask, IPv4 or IPv6 Default Gateway, IPv6 Mode, MTU and Multicast Address.
User Manual of Network Fisheye Camera Figure 6-22 Port Settings 2. Set the HTTP port, RTSP port and HTTPS port of the camera. HTTP Port: The default port number is 80, and it can be changed to any port No. which is not occupied. RTSP Port: The default port number is 554 and it can be changed to any port No. ranges from 1024 to 65535. HTTPS Port: The default port number is 443, and it can be changed to any port No. which is not occupied.
User Manual of Network Fisheye Camera Figure 6-23 PPPoE Settings 2. Check the Enable PPPoE checkbox to enable this feature. 3. Enter User Name, Password, and Confirm password for PPPoE access. Note: The User Name and Password should be assigned by your ISP. For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices.
User Manual of Network Fisheye Camera Registration on the DDNS server is required before configuring the DDNS settings of the camera. Steps: 1. Enter the DDNS Settings interface: Configuration > Network > Basic Settings > DDNS 2. Check the Enable DDNS checkbox to enable this feature. 3. Select DDNS Type. Two DDNS types are selectable: DynDNS and NO-IP. DynDNS: Steps: (1)Enter Server Address of DynDNS (e.g. members.dyndns.org).
User Manual of Network Fisheye Camera Figure 6-25 NO-IP DNS Settings (2) Enter the Server Address as www.noip.com (3) Enter the Domain name you registered. (4) Enter the User Name and Password. (5) Click Save and then you can view the camera with the domain name. Note: A reboot is required for the settings to take effect. 6.3.5 Configuring NAT (Network Address Translation) Settings Purpose: NAT interface allows you to configure the UPnP™ parameters.
User Manual of Network Fisheye Camera 2. Check the checkbox to enable the UPnP™ function. 3. Choose a nickname for the camera, or you can use the default name. 4. Select the port mapping mode. Manual and Auto are selectable. And for manual port mapping, you can customize the value of the external port. Figure 6-26 Configure NAT Settings 5. Click Save to save the settings. 6.3.
User Manual of Network Fisheye Camera strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
User Manual of Network Fisheye Camera Figure 6-27 SNMP Settings 2. Check the checkbox of Enable SNMPv1, Enable SNMP v2c, or Enable SNMPv3 to enable the feature correspondingly. 3. Configure the SNMP settings. Note: The settings of the SNMP software should be the same as the settings you configure here. 4. Click Save to save and finish the settings. Notes: • A reboot is required for the settings to take effect.
User Manual of Network Fisheye Camera • To lower the risk of information leakage, you are suggested to enable SNMP v3 instead of SNMP v1 or v2. 6.3.7 Configuring FTP Settings Purpose: You can configure the FTP server related information to enable the uploading of the captured pictures to the FTP server. The captured pictures can be triggered by events or a timing snapshot task. Steps: 1. Enter the FTP Settings interface: Configuration > Network > Advanced Settings > FTP. Figure 6-28 FTP Settings 2.
User Manual of Network Fisheye Camera strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
User Manual of Network Fisheye Camera 6.3.8 Email Settings Purpose: The system can be configured to send an Email notification to all designated receivers if an alarm event is detected, e.g., motion detection event, video loss, video tampering, etc. Before you start: Please configure the DNS Server settings under Configuration > Network > Basic Settings > TCP/IP before using the Email function. Steps: 1.
User Manual of Network Fisheye Camera your e-mail server. If you check the Enable STARTTLS checkbox when the protocol is not supported by your e-mail sever, your e-mail will not be encrypted. Attached Image: Check the checkbox of Attached Image if you want to send emails with attached alarm images. Interval: The interval refers to the time between two actions of sending attached pictures.
User Manual of Network Fisheye Camera Figure 6-29 Email Settings 4. Click Save to save the settings. 6.3.9 Configuring HTTPS Settings Purpose: HTTPS provides authentication of the web site and associated web server that one is communicating with, which protects against Man-in-the-middle attacks. Perform the following steps to set the port number of https. E.g., if you set the port number as 443 and the IP address is 192.168.1.64, you may access the device by inputting https://192.168.1.
User Manual of Network Fisheye Camera Figure 6-30 HTTPS Settings 2. Check the checkbox of Enable to enable the function. 3. Install a certificate. There are three ways of installation available, choose one according to your actual need. Create a self-signed certificate. (1) Select Create Self-signed Certificate as the installation method. (2) Click Create button to enter the creation interface.
User Manual of Network Fisheye Camera and start installation according to pop-up installation guides. Create the authorized certificate. Figure 6-32 Create the Certificate Request and Continue Installation (1) Select Create the certificate request first and continue the installation as the installation method. (2) Click Create button to create the certificate request. Fill in the required information in the pop-up window.
User Manual of Network Fisheye Camera 6.3.10 Configuring QoS Settings Purpose: QoS (Quality of Service) can help solve the network delay and network congestion by configuring the priority of data sending. Steps: 1. Enter the QoS Settings interface: Configuration > Network > Advanced Settings > QoS Figure 6-34 QoS Settings 2. Configure the QoS settings, including Video/Audio DSCP, Event/Alarm DSCP and Management DSCP. The valid value range of the DSCP is 0 to 63.
User Manual of Network Fisheye Camera Before you start: The authentication server must be configured. Please apply and register a user name and password for 802.1X in the server. For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices.
User Manual of Network Fisheye Camera 6.3.12 Configuring Platform Access Purpose: Platform access provides you an option to manage the devices via platform. Steps: 1. Enter the Platform Access Settings interface: Configuration > Network > Advanced Settings > Platform Access Figure 6-36 Platform Access Settings 2. Check the checkbox of Enable to enable the platform access function of the device. 3. Select the Platform Access Mode. Note: Hik-Connect is an application for mobile devices.
User Manual of Network Fisheye Camera 1) Click and read "Terms of Service" and "Privacy Policy" in pop-up window. 2) Create a verification code or change the verification code for the camera. Note: • The verification code is required when you add the camera to Hik-Connect app. • For more information about the Hik-Connect app, refer to Hik-Connect Mobile Client User Manual. 4. You can use the default server address. Or you can check the Custom checkbox on the right and input a desired server address. 5.
User Manual of Network Fisheye Camera Figure 6-38 Configure Video Settings 2. Select the Stream Type of the camera to main stream (normal) or sub-stream. The main stream is usually for recording and live view with good bandwidth, and the sub-stream can be used for live viewing when the bandwidth is limited. 3. You can customize the following parameters for the selected main stream or sub-stream. Video Type: Select the stream type to video stream, or video & audio composite stream.
User Manual of Network Fisheye Camera Frame Rate: Set the frame rate. The frame rate describes the frequency at which the video stream is updated and it is measured by frames per second (fps). A higher frame rate is advantageous when there is movement in the video stream, as it maintains image quality throughout. Max. Bitrate: Set the max. bitrate to from 256 to 12288 Kbps. The higher value corresponds to the higher video quality, but the higher bandwidth is required.
User Manual of Network Fisheye Camera H.264+/H.265+. If you switch from H.264+ to H.265+ directly, and vice versa, a reboot is not required by the system. Notes: • Upgrade your video player to the latest version if live view or playback does not work properly due to compatibility. • With H.264+/H.265+ enabled, the parameters such as profile, I frame interval, video quality, and SVC are greyed out if the bitrate type is variable. • With H.264+/H.265+ enabled, some functions are not supported.
User Manual of Network Fisheye Camera ON or Auto according to your actual needs. Smoothing: It refers to the smoothness of the stream. The higher value of the smoothing, the better fluency of the stream is, though, the video quality may not be so satisfactory. The lower value of the smoothing, the higher quality of the stream is, though it may appear not fluent. 4. Click Save to save the settings. 6.4.2 Configuring Audio Settings Steps: 1.
User Manual of Network Fisheye Camera function, detected noise can be filtered out. 3. Click Save to save the settings. Note: The audio settings vary according to the camera model. 6.4.3 Configuring ROI Encoding Purpose: ROI stands for the region of interest.
User Manual of Network Fisheye Camera Figure 6-40 Region of Interest Settings 2. Select the stream type for this channel. Main stream and sub stream are selectable. 3. Set fixed regions for ROI. 1) Select the Region No. from the drop-down list. 2) Click Drawing. Click and drag the mouse on the view screen to draw a red rectangle as the ROI region. You can click Clear to cancel former drawing. Click Stop Drawing when you finish.
User Manual of Network Fisheye Camera 3) Check the Enable checkbox to enable ROI function for the chosen region. 4) Select the ROI level. 5) Enter a region name for the chosen region. 6) Click Save the save the settings of ROI settings for chosen fixed region. 7) Repeat steps 1) to 6) to setup other fixed regions if supported. 4. Click Save to save the settings. Note: ROI level means the image quality enhancing level. The larger the value is, the better the image quality would be. 6.4.4 Display Info.
User Manual of Network Fisheye Camera sharpness, etc. Steps: 1. Enter the Display Settings interface: Configuration > Image> Display Settings 2. Set the image parameters of the camera. Note: In order to guarantee the image quality in the different illumination, it provides two sets of parameters for user to configure.
User Manual of Network Fisheye Camera Iris Mode: If the camera is equipped with the fixed lens, only Manual is selectable, and the iris mode is not configurable. Exposure Time: It refers to the electronic shutter time, which ranges from 1/3 to 1/100,000s. Adjust it according to the actual luminance condition. Gain: Gain of the image can also be manually configured from 0 to 100. The bigger the value is, the brighter would the image be, and the noise would also be amplified to a larger extent.
User Manual of Network Fisheye Camera Select Manual, and you can adjust the IR LED by adjusting the distance. The higher the value is, the higher the power of the light would be, and it can reach objects farther away. Backlight Settings BLC: If you focus on an object against strong backlight, the object will be too dark to be seen clearly. BLC compensates light to the object in the front to make it clear. OFF, Up, Down, Left, Right and Center are selectable.
User Manual of Network Fisheye Camera Please refer to the actual interface for details. Day/Night Scheduled Switch Day/Night scheduled-switch configuration interface enables you to set the camera parameters for day and night separately, guaranteeing the image quality in different illumination. Figure 6-43 Day/Night Scheduled-Switch Setting Steps: 1. Click the calendar icon to select the start time and the end time of the switch. Notes: • The start time and end time refer to the valid time for day mode.
User Manual of Network Fisheye Camera Note: The settings saved automatically if any parameter is changed. 6.5.2 Configuring OSD Settings Purpose: You can customize the camera name, time/date format, display mode, and OSD size displayed on the live view. Figure 6-44 OSD Settings Steps: 1. Enter the OSD Settings interface: Configuration > Image > OSD Settings. 2. Check the corresponding checkbox to select the display of camera name, date or week if required. 3.
User Manual of Network Fisheye Camera (2) Input the characters in the textbox. 7. Adjust the position and alignment of text frames. Left align, right align and custom are selectable. If you select custom, you can use the mouse to click and drag text frames in the live view window to adjust their positions. Note: The alignment adjustment is only applicable to Text Overlay items. 8. Click Save to save the settings. Note: OSD function may vary from model to model. 6.5.
User Manual of Network Fisheye Camera Figure 6-45 Privacy Mask Settings 2. Check the checkbox of Enable Privacy Mask to enable this function. 3. Click the Draw Area button to start drawing. 4. Click-and-drag the mouse in the live video window to draw the mask area. 5. Click Stop Drawing to finish drawing. 6. You can click Clear All to clear all the configured privacy masks. 7. Click Save to save the settings. Note: Up to 4 privacy masks are configurable. 6.
User Manual of Network Fisheye Camera Output, Trigger Recording/Trigger Channel, etc. Note: Check the checkbox of Notify Surveillance Center if you want to push the alarm information to the surveillance client such as the mobile phone, computer, etc., as soon as the alarm is triggered. 6.6.1 Configuring Motion Detection Purpose: Motion detection detects the moving objects in the configured surveillance area, and a series of actions can be taken when the alarm is triggered.
User Manual of Network Fisheye Camera Figure 6-46 Motion Detection Settings 2. Check the checkbox of Enable Motion Detection. 3. (Optional) Check the checkbox of Enable Dynamic Analysis for Motion if you want to mark the detected objects with green rectangles on the live view window. Note: You can go to Configuration > Local Configuration > Live View Parameters, and then select Disable for Rules if you don’t want the detected objected displayed with the rectangles. 4. Click Draw Area.
User Manual of Network Fisheye Camera 6. (Optional) Move the slider to set the sensitivity of the detection. Task 2: Set the Arming Schedule for Motion Detection Steps: 1. Click Arming Schedule to edit the arming schedule. Figure 6-47 Arming Schedule Setting 2. Click on the time bar and drag the mouse to select the time period. Note: Click on the selected time period, you can adjust the time period to the desired time by either moving the time bar or input the exact time period. 3.
User Manual of Network Fisheye Camera Figure 6-48 Linkage Method Settings Send Email: Send an email with alarm information to a user or users when an event occurs. Note: To send the Email when an event occurs, please refer to Section 6.3.8 to complete Email setup in advance. Notify Surveillance Center: Send an exception or alarm signal to remote management software when an event occurs.
User Manual of Network Fisheye Camera Capture Parameters page, enable the event-triggered snapshot, and set the capture interval and capture number. • The captured image can also be uploaded to the available memory card or network disk. Trigger Channel (or Trigger Recording) The video will be recorded when the motion is detected. You have to set the recording schedule to realize this function. Please refer to Section 7.1 for detailed information.
User Manual of Network Fisheye Camera If Expert is selected as the configuration mode, different sets of parameters are adopted for motion detection at day and night. ● Scheduled Image Settings: OFF Steps: (1) Draw the detection area as in the normal configuration mode. The supported area number varies according to different camera models. (2) Select OFF for Scheduled Image Settings. (3) Select the area by clicking the area No..
User Manual of Network Fisheye Camera (7) Click Save to save the settings. ● Scheduled Image Settings: Scheduled-Switch Steps: (1) Draw the detection area as in the normal configuration mode. The supported area number varies according to different camera models. (2) Select Scheduled-Switch for Scheduled Image Settings. (3) Select the start time and end time for the switching timing. (4) Select the area by clicking the area No..
User Manual of Network Fisheye Camera Figure 6-50 Video Tampering Detection Settings 3. Draw the detection area as in the normal configuration mode. 4. Move the slider to set the sensitivity. 5. Click Arming Schedule to set arming schedule as that in Task 2 Set the Arming Schedule for Motion Detection in Section 6.6.1. 6. Click Linkage Method to set linkage method as that in Task 3 Set the Linkage Method for Motion Detection in Section 6.6.1. 7. Click Save to save the settings. 6.6.
User Manual of Network Fisheye Camera Figure 6-51 Alarm Input Settings 2. Choose the alarm input No. and the Alarm Type. The alarm type can be NO (Normally Open) and NC (Normally Closed). Edit the alarm name (optional). 3. Check the checkbox of Enable Alarm Input Handling to enable the function. 4. Set the arming schedule. Refer to Task 2: Set Arming Schedule for Motion Detection in Section 6.6.1. 5. Set the linkage method. Refer to Task 3: Set Linkage Method for Motion Detection in Section 6.6.1. 6.
User Manual of Network Fisheye Camera 2. Select one alarm output channel in the Alarm Output drop-down list. 3. (Optional) Input the alarm output name in the text field. 4. The Delay time can be set to 5sec, 10sec, 30sec, 1min, 2min, 5min, 10min or Manual. The delay time refers to the time duration that the alarm output remains in effect after alarm occurs. 5. Set the arming schedule. Refer to Task 2: Set Arming Schedule for Motion Detection in Section 6.6.1. 6.
User Manual of Network Fisheye Camera 6.6.5 Handling Exception The exception type can be HDD full, HDD error, network disconnected, IP address conflicted and illegal login to the cameras. Steps: 1. Enter the Exception Settings interface: Configuration > Event > Basic Event > Exception 2. Check the checkbox to select the linkage method taken for exception. For details, refer to Task 3: Set Linkage Method for Motion Detection in Section 6.6.1. Figure 6-53 Exception Settings 3.
User Manual of Network Fisheye Camera Figure 6-54 Line Crossing Detection Setting 5. Click-and-drag the line, and you can locate it on the live video as desired. Click on the line, two red squares are displayed on each end, and you can click-and-drag one of the red squares to define the shape and length of the line. 6. Select the direction for line crossing detection. And you can select the directions as A<->B, A ->B, and B->A.
User Manual of Network Fisheye Camera can be detected. 7. Click-and-drag the slider to set the detection sensitivity. Sensitivity: Range [1 to 100]. The higher the value is, the more easily the line crossing action can be detected. 8. You can click the Clear button to clear the pre-defined line. 9. Set the arming schedule. Refer to Task 2: Set Arming Schedule for Motion Detection in Section 6.6.1. 10. Set the linkage method. Refer to Task 3: Set Linkage Method for Motion Detection in Section 6.6.1. 11.
User Manual of Network Fisheye Camera Figure 6-55 Intrusion Detection Settings 6. Set the time threshold, detection sensitivity and object percentage for intrusion detection. Threshold: Range [0 to 10]s, the threshold for the time of the object loitering in the region. If you set the value as 0, alarm is triggered immediately after the object entering the region. Sensitivity: Range [1 to 100]. The value of the sensitivity defines the size of the object which can trigger the alarm.
User Manual of Network Fisheye Camera 50%, when the object enters the region and occupies half of the whole region, the alarm is triggered. 7. You can click the Clear button to clear the pre-defined region. 8. Set the arming schedule. Refer to Task 2: Set Arming Schedule for Motion Detection in Section 6.6.1. 9. Set the linkage method. Refer to Task 3: Set Linkage Method for Motion Detection in Section 6.6.1. 10. Click Save to save the settings.
User Manual of Network Fisheye Camera Chapter 7 Storage Settings 7.1 Configuring Recording Schedule Purpose: There are two kinds of recording for the cameras: manual recording and scheduled recording. For the manual recording, refer to Section 5.3 Recording and Capturing Pictures Manually. In this section, you can follow the instructions to configure the scheduled recording. By default, the record files of scheduled recording are stored in the memory card (if supported) or in the network disk. Steps: 1.
User Manual of Network Fisheye Camera Figure 7-2 Record Parameters Pre-record: The time you set to start recording before the scheduled time or the event. For example, if an alarm triggers recording at 10:00, and the pre-record time is set as 5 seconds, the camera starts to record at 9:59:55. The Pre-record time can be configured as No Pre-record, 5 s, 10 s, 15 s, 20 s, 25 s, 30 s or not limited. Post-record: The time you set to stop recording after the scheduled time or the event.
User Manual of Network Fisheye Camera Record Triggered by Motion Detection If you select Motion, the video will be recorded when the motion is detected. Besides configuring the recording schedule, you have to set the motion detection area and check the checkbox of Trigger Channel in the Linkage Method of Motion Detection Settings interface. For detailed information, please refer to Section 6.6.1 Configuring Motion Detection.
User Manual of Network Fisheye Camera and check the checkbox of Trigger Channel in the Linkage Method of Line Crossing Detection Settings interface. For detailed information, please refer to Section 6.6.6 Configuring Line Crossing Detection. Record Triggered by Intrusion Detection If you select Intrusion Detection, the video will be recorded when the intrusion event is detected.
User Manual of Network Fisheye Camera 7.2 Configuring Capture Setting Purpose: You can configure the scheduled capture and event-triggered capture. The captured picture can be stored in the memory card (if supported) or in the network disk (For details, please refer to Section 7.3 Configuring Net HDD). The captured pictures can also be uploaded to a FTP server. Steps: 1. Enter Capture setting interface: Configuration > Storage > Schedule Setting 2.
User Manual of Network Fisheye Camera the events, including motion detection, alarm input, line crossing detection and intrusion detection. For details, please refer to Section 6.6. 4) Select the picture format, resolution, quality, capture interval, and capture number. 5. Click Save to save the settings. 6. (Optional) To upload the captured pictures to the FTP server, configure the FTP parameters and check Upload Picture checkbox in FTP Settings interface. For details, please refer to Section 6.3.
User Manual of Network Fisheye Camera For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
User Manual of Network Fisheye Camera Figure 7-7 View Disk Status 3. Define the quota for record and pictures. (1) Input the quota percentage for picture and for record. (2) Click Save and refresh the browser page to activate the settings. Figure 7-8 Quota Settings Notes: Up to 8 NAS disks can be connected to the camera. To initialize and use the memory card after insert it to the camera, please refer to the steps of NAS disk initialization. 7.
User Manual of Network Fisheye Camera Steps: 1. Enter Memory Card Detection configuration interface: Configuration > Storage > Storage Management > Memory Card Detection Figure 7-9 Memory Card Detection 2. View the memory card status on Status Detection tab. Remaining Lifespan: It shows the percentage of the remaining lifespan. The lifespan of a memory card may be influenced by factors such as its capacity and the bitrate. You need to change the memory card if the remaining lifespan is not enough.
User Manual of Network Fisheye Camera Figure 7-10 R/W Lock Setting Add a Lock (1) Select the Lock Switch as ON. (2) Input the password. (3) Click Save to save the settings. Unlock (1) If you use the memory card on the camera that locks it, unlocking will be done automatically and no unlocking procedures are required on the part of users. (2) If you use the memory card (with a lock) on a different camera, you can go to HDD Management interface to unlock the memory card manually.
User Manual of Network Fisheye Camera Chapter 8 Playback Purpose: This section explains how to view the remotely recorded video files stored in the network disks or memory card. Note: You can also search the records files and play it back in different playback modes via iVMS-4200 client software. Please refer to the User Manual of iVMS-4200 Client Software for detailed instructions. Steps: 1. Click Playback on the menu bar to enter playback interface. Figure 8-1 Playback Interface 2.
User Manual of Network Fisheye Camera 3. Choose a display mode to play the video. Figure 8-3 Playback Display Mode Setting Note: For detailed description of each display mode, refer to Section 5.1 Live View Page. 4. Click to play the video files found on this date. The toolbar on the bottom of Playback interface can be used to control playing process.
User Manual of Network Fisheye Camera You can set the local file saving path for the downloaded video files and pictures in Local Configuration interface. For details, please refer to Section 5.1. The playback mode varies according to the different mount type. PTZ function is also supported in playback. 5. Drag the progress bar with the mouse to locate the exact playback point. You can also input the time and click to locate the playback point in the Set playback time field.
User Manual of Network Fisheye Camera Chapter 9 Picture Click Picture to enter the picture searching interface. You can search, view, and download the pictures stored in the local storage or network storage. Notes: Make sure HDD, NAS or memory card are properly configured before you process picture searching. Make sure the capture schedule is configured. Go to Configuration > Storage > Schedule Settings > Capture to set the capture schedule. Figure 9-1 Picture Searching Interface Steps: 1.
User Manual of Network Fisheye Camera Appendix Appendix 1 SADP Software Introduction Description of SADP SADP (Search Active Devices Protocol) is a kind of user-friendly and installation-free online device search tool. It searches the active online devices within your subnet and displays the information of the devices. You can also modify the basic network information of the devices using this software.
User Manual of Network Fisheye Camera You can also click to refresh the online device list manually. The newly searched devices will be added to the list. You can click you can click or on each column heading to order the information; to expand the device table and hide the network parameter panel on the right side, or click to show the network parameter panel. Modify network parameters Steps: 1.
User Manual of Network Fisheye Camera Figure A.1.
User Manual of Network Fisheye Camera Appendix 2 Port Mapping The following settings are for TP-LINK router (TL-WR641G). The settings vary depending on different models of routers. Steps: 1. Select the WAN Connection Type, as shown below: Figure A.2.1 Select the WAN Connection Type 2. Set the LAN parameters of the router as in the following figure, including IP address and subnet mask settings. Figure A.2.2 Set the LAN parameters 3. Set the port mapping in the virtual severs of Forwarding.
User Manual of Network Fisheye Camera another camera as 81, 8001, 555, 8201 with IP 192.168.1.24. Refer to the steps as below: Steps: 1. As the settings mentioned above, map the port 80, 8000, 554 and 8200 for the network camera at 192.168.1.23 2. Map the port 81, 8001, 555 and 8201 for the network camera at 192.168.1.24. 3. Enable ALL or TCP protocols. 4. Check the Enable checkbox and click Save. Figure A.2.3 Port Mapping Note: The port of the network camera cannot conflict with other ports.
User Manual of Network Fisheye Camera 126