Network Speed Dome PTZ Camera Web 5.0 User's Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.
Foreword General This manual introduces the functions and operations of the Network Speed Dome PTZ Camera (hereinafter referred to as "the Camera"). Read carefully before using the device, and keep the manual safe for future reference. Safety Instructions The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury.
● We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual. ● The manual will be updated according to the latest laws and regulations of related jurisdictions. For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit our official website. The manual is for reference only. Slight differences might be found between the electronic version and the paper version.
Important Safeguards and Warnings This section introduces content covering the proper handling of the Camera, hazard prevention, and prevention of property damage. Read carefully before using the Device, comply with the guidelines when using it, and keep the manual safe for future reference. Operation Requirements ● Make sure that the power supply of the device works properly before use. ● Do not pull out the power cable of the device while it is powered on.
Table of Contents Foreword ........................................................................................................................................................................................................I Important Safeguards and Warnings ............................................................................................................................................ III 1 Overview .............................................................................................
4.3.2.2.9 Longitude & Latitude ............................................................................................................................31 4.3.2.2.10 Target Statistics ....................................................................................................................................32 4.3.2.2.11 Face Statistics .........................................................................................................................................33 4.3.2.3 ROI ...........
4.6 Event ..............................................................................................................................................................................................67 4.6.1 Setting Alarm Linkage................................................................................................................................................67 4.6.1.1 Setting Alarm-in ..............................................................................................................
4.8.5 Upgrade .............................................................................................................................................................................94 4.9 System Information ................................................................................................................................................................95 4.9.1 Version ..........................................................................................................................
7.3 Setting Snapshot Plan ........................................................................................................................................................ 122 7.4 Storage....................................................................................................................................................................................... 124 7.4.1 Local Storage ..............................................................................................................
9.4.1.2 Applying for and Importing CA Certificate ........................................................................................ 157 9.4.1.3 Installing Existing Certificate.................................................................................................................... 158 9.4.2 Installing Trusted CA Certificate ........................................................................................................................ 159 9.5 A/V Encryption .........................
1 Overview 1.1 Introduction Network Speed Dome PTZ Camera is a combination of traditional camera and network technology. Users can remotely connect to the Camera through the network for configuration and management. Get the camera IP address before visiting PTZ Camera through network, which can be searched by ConfigTool. Figure 1-1 Connected through network cable Figure 1-2 Connected through network router or switch 1.2 Functions Functions might be different depending on the model. 1.2.
● Take a snapshot or three snapshots of the abnormal monitoring image for subsequent viewing and processing. ● Record the abnormal monitoring image for subsequent viewing and processing. ● Configure encoding parameters, and adjust live view. Recording ● Auto recording as scheduled. ● Play back recorded videos and images. ● Download recorded videos and images. ● Record videos when an alarm is triggered. Account Management ● Add, edit and delete user groups, and manage user authorities by user group.
Face detection ● Supports human face detection and display the related attributes on the Live page. ● When an alarm is triggered, the system performs linkages such as video recording, alarm output, email sending and snapshot taking. Face Recognition ● Detects human faces, compares them with face images in the database, and links alarm output. ● When an alarm is triggered, the system performs linkages such as video recording, alarm output, email sending and snapshot taking.
2 Configuration Flow Configure the device as needed. Figure 2-1 Configuration flow Table 2-1 Flow description Configuration Description Reference Initialization Initialize the camera when you use it for the first time. "3 Device Initialization" Login Open the browser and enter the IP address to log in to the web page. The camera IP address is 192.168.1.108 by default. "4.1 Device Login" Configure basic functions Configure camera parameters, network parameters, general events and more.
3 Device Initialization Device initialization is required for first-time use. This manual is focused on the operation on the web page. You can also initialize the device through ConfigTool, NVR (Network Video Recorder), or platforms such as DSS Pro. ● To ensure device safety, protect your password after initialization and regularly change it. ● When initializing the device, keep the PC IP and Camera IP on the same segment. ● We recommend using Internet Explorer or Google Chrome.
Figure 3-2 Disclaimer Step 4 Configure the time parameters, and then click Next. Figure 3-3 Time zone setting Step 5 Set the password for admin account. Figure 3-4 Password setting Table 3-1 Description of password configuration Parameter Description Username The default username is admin.
Parameter Description New Password The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). Set a high security level password according to the password security notice. Confirm Password Email Address Step 6 Enter an email address for password reset. It is selected by default.
4 Setting This chapter introduces the basic settings of the Camera, including the configuration of local parameters, camera, network, PTZ, event, storage, system information, log, and more. You can configure the camera, event and system through two methods. This section uses method 1 as an example. ● Method 1: Click , and then select the corresponding item. ● Method 2: Click the corresponding icon on the main page 4.1 Device Login Log in to the device web page through a browser.
Figure 4-1 Login Step 3 Click Login. The Live page is displayed. For details, see"5.1 Live Page". Click on the left-upper corner of the page to display the main page. Figure 4-2 Main page For first-time login, you need to install the plug-in. Follow the on-screen instructions to complete download and installation.
Table 4-1 Description of main page No. Button Description 1 Display the main page. 2 Subscribe to alarm messages. For details, see "4.6.1.4.2 Subscribing to Alarm Information". 3 Set the skin. 4 Set the language. ● Click and select Restart, and the camera restarts. 5 ● Click and select Logout to go back to the login page. 6 Configure the basic parameters. For details, see "4 Setting". ● Click the button to enter full screen mode. 7 ● Click to exit full screen mode.
Figure 4-3 Local Step 2 Configure play parameters. Protocol: Network transport protocol type, supporting TCP (Transmission Control Protocol) port, UDP (User Datagram Protocol) port and multicast. Before selecting Multicast, you need to configure multicast parameters in advance. For details, see "4.4.9 Multicast". Step 3 Click Browse to select the storage path for live snapshot, live record, playback snapshot, playback download, and video clips.
Parameter Description Playback Snapshot The snapshot of playback page. The default path is C:\Users\admin\WebDownload\PlaybackSnapshot. Step 4 Click Apply. Related Operations ● Click Refresh to refresh the parameters of the current page. ● Click Default to restore the default parameter values. 4.3 Camera This section introduces camera configuration, including configuring image parameters, encoder parameters, and audio parameters. Camera parameters might differ depending on the device. 4.3.
4.3.1.2 Configuring Operating Mode Select working mode as needed, including self-adaptive and customized scene. on the upper-right corner of the page, and then select Camera > Image. Step 1 Click Step 2 Select the camera that needs to be configured from the Channel drop-down list and then select working mode on the top of the page. ● Self-adaptive: Camera automatically matches the appropriate configuration file type according to different environments. If you select Self-adaptive, go straight to Step5.
4.3.1.3 Adjusting Image You can configure image parameters. The actual parameters of the camera can be adjusted here. Step 1 Click on the upper-right corner of the page, and then select Camera > Image > Image. Step 2 Select the camera that needs to be configured from the Channel drop-down list and then configure parameters. Figure 4-6 Image Table 4-3 Description of image parameters Parameter Description Select the image style from soft, standard and vivid.
Parameter Description Change the sharpness NCT level of the Camera. The higher the value, the stronger the sharpness CNT. Sharpness Suppression This parameter takes effect only when the Camera is in an environment with low luminance. Gamma Change the image brightness and contrast in a non-linear way. The higher the value, the brighter the image. Flip Change the display direction of the image. ● Normal: The normal display of the image. ● Reflection: The image flips up and down.
Figure 4-7 Exposure Table 4-4 Description of exposure parameters Parameter Description You can select 50Hz, 60Hz, or Outdoor from the list. ● 50Hz: The system adjusts the exposure according to ambient light automatically to ensure that stripes do not appear. Anti-flicker ● 60Hz: The system adjusts the exposure according to ambient light automatically to ensure that stripes do not appear. ● Outdoor: If you select Outdoor, the exposure mode can be set to Gain Priority, Shutter Priority and Iris Priority.
Parameter Description Iris You can set the camera luminous flux. The larger the Iris value, the brighter the image. Exposure Compensation You can set the exposure compensation value. The value ranges from 0 to 100. The higher the value is, the brighter the image will be. Exposure adjustment speed You can set the exposure adjustment speed. The value ranges from 0 to 100. Upper gain threshold You can set the upper gain threshold of exposure. The value ranges from 0 to 100.
Figure 4-8 Backlight mode Table 4-5 Description of backlight parameters Parameter Description Enable BLC, the camera can get a clearer image of the dark areas on the target when shooting against light. You can select default mode or customized mode. ● When in default mode, the system automatically adjusts exposure according to ambient lighting conditions to ensure the clarity of the BLC darkest area.
Figure 4-9 White balance Table 4-6 Description of white balance parameters Parameter Description Auto The system compensates WB according to color temperature to ensure color precision. Indoor The system compensates WB for the general situation of indoor lighting to ensure color precision. Outdoor The system auto compensates WB to most outdoor environments with natural or artificial light to ensure color precision.
Figure 4-10 Day/Night mode Table 4-7 Description of Day/Night mode parameters Parameter Description You can select device display mode from Color, Auto, and B/W. Day/Night configuration is independent from Profile management configuration. Mode ● Color: The system displays the image in color. ● Auto: The system switches between color and black-and-white according to actual conditions. ● B/W: The system displays black-and-white image.
Figure 4-11 Focus & Zoom Table 4-8 Description of focus & zoom parameters Parameter Description Digital Zoom Click to enable Digital Zoom function. You can use the digital zoom to continue zooming operation even if the optical zoom is at its maximum value. Zoom Speed Adjust the zoom speed of the camera. The larger the value, the faster the zoom speed. Set focus mode.
Figure 4-12 Expert Mode 2) Click to adjust the video screen and draw the training region on the screen. Only supports closed model area (triangle and polygons above). 3) Double-click Lens Magnification to set focus magnification. 4) Click Apply to save settings. 5) Click Start Scene Focusing Training. The scene rotates and automatically focuses to the specified position. After the training is complete, the scene status is displayed as Complete. Step 4 Click Apply. 4.3.1.
Table 4-9 Description of illuminator parameters Parameter Description When the camera is equipped with illuminator, it supports setting illumination mode for illuminator, including IR Mode, White Light Mode and Soft Light Mode. ● IR Mode: Enable the IR illuminator, and the white light is disabled. You can only capture black and white images after enabling this function. Fill Light ● White Light Mode: Enable the white light, and the IR illuminator is disabled.
Parameter Description Off Step 3 Illuminator is off. Click Apply. 4.3.1.10 Defog The image quality is compromised in foggy or hazy environment, and defog can be used to improve image clarity. Step 1 Select > Camera > Image > Defog. Figure 4-14 Defog Step 2 Configure defog parameters. Table 4-10 Description of defog parameters Defog Description Manual Configure function intensity and atmospheric light mode manually, and then the system adjusts image clarity accordingly.
Step 1 Select > Camera > Encode > Encode. Figure 4-15 Encode Step 2 Configure encode parameters. Table 4-11 Description of encode parameters Parameter Description Click to enable sub stream, it is enabled by default. Sub Stream You can enable multiple sub streams simultaneously. Select encode mode. ● H.264: It includes H.264B (baseline profile encode mode), H.264 (main profile encode mode) and H.264H (high profile encode mode).
Parameter Description The bit rate control type during video data transmission. You can select bit rate type from: ● CBR (Constant Bit Rate): The bit rate changes a little and keeps close to the defined bit rate value. ● VBR (Variable Bit Rate): The bit rate changes as monitoring Bit Rate Type scene changes. The Bit Rate Type can only be set as CBR when Encode Mode is set as MJPEG. Quality This parameter can be configured only when the Bit Rate Type is set as VBR.
Step 3 Click Add, select Color Block or Mosaic, and then draw the blocks on the screen. ● You can draw 8 blocks at most. The same screen can add up to 4 mosaic blocks. ● Click Clear to delete all blocks; select the block you want to delete, click the corresponding block. Figure 4-16 Privacy masking Step 4 Adjust block size to protect the privacy. Step 5 Click Apply. 4.3.2.2.2 Channel Title You can enable this function when you need to display channel title in the video image.
4.3.2.2.3 Time Title You can enable this function when you need to display time title in the video image. > Camera > Encode > Overlay > Time Title. Step 1 Select Step 2 Select Enable. Step 3 (Optional) Select Week Display to display the day of week on the video image. Step 4 Move the time box to the position that you want on the image. Figure 4-18 Time title Step 5 Click Apply. 4.3.2.2.
Table 4-12 Description of OSD information parameter Parameter Description Presets Select Enable, and the preset name is displayed on the image when the camera turns to the preset, and it will disappear 3 s later. PTZ Coordinates Select Enable, and the PTZ coordinates information is displayed on the image. Zoom Select Enable and the zoom information is displayed on the image. North Select Enable, and the north direction is displayed on the image.
4.3.2.2.6 Picture Overlay You can enable this function if you need to display image information on the video image. Text overlay and picture overlay cannot work at the same time. > Camera > Encode > Overlay > Picture Overlay. Step 1 Select Step 2 Select channel and then select Enable. Step 3 Click Upload, and then select the overlaid image. The image shows in the Picture Preview. Figure 4-21 Picture overlay Step 4 You can move the overlaid image to the position you want in the image.
Figure 4-22 Custom title Step 4 Move the custom box to the position that you want in the image. Step 5 Click Apply. 4.3.2.2.8 Exception Overlay You can enable this function to display the overlaid abnormal information of the cameras on the screen. Step 1 Select > Camera > Encode > Overlay > Exception Overlay. Figure 4-23 Exception overlay Step 2 Select Enable, and then click Apply. 4.3.2.2.
Figure 4-24 Longitude & latitude Step 2 Enable Longitude & Latitude, and then click Apply. 4.3.2.2.10 Target Statistics After configuring the target statistics, the number of target statistics will be displayed in the image. > Camera > Encode > Target Statistics. Step 1 Select Step 2 Select Enable. Step 3 Select the statistics type, and then select the text alignment. Click Reset to clear the statistics data.
4.3.2.2.11 Face Statistics Procedure Step 1 Select > Camera > Encode > Face Statistics. Figure 4-26 Face statistics Step 2 Select Enable, and then select Statistics Type. ● Face detection: The screen displays the quantity information of face detection. ● Face recognition: The screen displays the quantity information of face recognition. Step 3 Select the text alignment, and then move the face statistics box to the position that you want in the image. Step 4 Click Apply.
Figure 4-27 ROI Step 4 Click Apply. 4.3.3 Audio Configure the noise filter and sampling frequency of the Camera. When enabling audio encoding, the network stream contains both audio and video, otherwise, it is only video stream. You need to click on the upper-right corner of the page, and then select Camera > Encode > Encode to enable the video stream of Sub Stream before enabling the audio. on the upper-right corner of the page, and then select Camera > Audio.
Table 4-13 Description of audio parameters Parameter Description Compression Configure audio compression. The configured audio encode mode applies to both audio and intercom. The default value is recommended. Sampling Frequency Sampling number per second. The higher the sampling frequency is, the more the sample in a second will be, and the more accuracy the restored signal will be. Noise Filter Enable this function, and the system automatically filters ambient noise.
Figure 4-29 TCP/IP Table 4-14 Description of TCP/IP parameters Parameter Description Enter the host name. Host Name The maximum length is 32 characters. ARP/Ping Click to enable ARP/Ping to set IP address service. Get the camera MAC address, and then you can change and configure the device IP address with ARP (Address Resolution Protocol) /ping command. This is enabled by default.
Parameter Description The mode that the camera gets IP: ● Static Configure IP Address, Subnet Mask, and Default Gateway manually, and then click Save, the login page with the configured Mode IP address is displayed. ● DHCP (Dynamic Host Configuration Protocol) When there is DHCP server in the network, select DHCP, and the camera acquires IP address automatically. MAC Address Displays host MAC (Media Access Control) address. IP Version Select IPv4 or IPv6.
Figure 4-30 Edit command 4. Restart the camera. 5. Check the PC command line, if information such as Reply from 192.168.0.125…is displayed, the configuration succeeds. 6. Enter http://(IP address) in the browser address bar to log in. 4.4.2 Port Configure the port numbers and the maximum number of users (includes web, platform client and mobile phone client) that can connect to the device simultaneously. > Network > Port. Step 1 Select Step 2 Configure port parameters.
Figure 4-31 Port Table 4-15 Description of port parameters Parameter Description Max Connection The max number of users (web client, platform client or mobile phone client) that can connect to the device simultaneously. The value is 10 by default. TCP Port Transmission Control Protocol port. The value is 37777 by default. UDP Port User Datagram Protocol Port. The value is 37778 by default. HTTP Port Hyper Text Transfer Protocol Port. The value is 80 by default.
Parameter Description ● Real Time Streaming Protocol Port, and the value is 554 by default. If you play live view with QuickTime, VLC (Video LAN Client) or Blackberry smart phone, the following URL (Uniform Resource Locator) format is available. ● When the URL format requires RTSP, you need to specify channel number and bit stream type in the URL, and also username and password if needed. ● When playing live view with Blackberry smart phone, you need to turn off the audio, and then set the codec mode to H.
Step 2 Click , and then enter username and password. Figure 4-32 PPPoE ● Disable UPnP while using PPPoE. ● After making PPPoE connection, the device IP address cannot be modified through web page. Step 3 Click Apply. The success prompt box is displayed, and then the real-time WAN IP address is displayed. You can visit camera through the IP address. 4.4.
Figure 4-33 DDNS Table 4-16 Description of DDNS parameters Parameter Description Type The name and web address of the DDNS service provider, see the matching relationship below: ● CN99 DDNS web address: www.3322.org ● NO-IP DDNS web address: dynupdate.no-ip.com Server Address ● Dyndns DDNS web address: members.dyndns.org Domain Name The domain name you registered on the DDNS website.
Figure 4-34 Email Table 4-17 Description of email parameters Parameter Description SMTP Server SMTP (Simple Mail Transfer Protocol) server address. Port The port number of the SMTP server. Username The account of SMTP server. Password The password of SMTP server. Anonymous Click Sender Sender’s email address. Encryption Type For details, see Table 4-18. , and the sender's information is not displayed in the email.
Parameter Description Health Mail The system sends test mail to check if the connection is successfully configured. Click and configure the Sending Interval, and then the system sends test mail as the set interval. Sending Interval Sending interval of health mail ranges from 1 second to 3,600 seconds. Table 4-18 Description of major mailbox configuration Mailb ox SMTP server gmail smtp.gmail.com Sina smtp.sina.com 126 smtp.126.
and wide area networks. This function enables you to visit local area device through wide area IP address. Prerequisites ● Make sure the UPnP service is installed in the system. ● Log in to the router, and then configure WAN IP address to set up internet connection. ● Enable UPnP in the router. ● Connect your device to the LAN port of the router. ● Select > Network > TCP/IP, in IP Address, enter the local area IP address of the router or select DHCP and then the system acquires IP address automatically.
● Select V3 (Recommended), and then V1 and V2 become unavailable. You can configure username, password and authentication type. It requires corresponding username, password and authentication type to visit your device from the server. Using V1 and V2 might cause data leakage, and V3 is recommended. Step 3 In Trap Address, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB Browser installed, and leave other parameters as default.
Figure 4-37 SNMP (2) Table 4-19 Description of SNMP parameters Parameter Description SNMP Port The listening port of the software agent in the device. Read Community The read and write community string that the software agent supports. Write Community You can enter number, letter, underline and dash to form the name. Trap Address The target address of the Trap information sent by the software agent in the device.
Parameter Description Read/Write Username Set the read/write username access device, and it is private by default. You can enter number, letter, and underline to form the name. Authentication Type You can select from MD5 and SHA. The default type is MD5. Authentication Password It should be no less than 8 digits. Encryption Type The default is CBC-DES. Encryption Password It should be no less than 8 digits. Step 4 Click Apply.
Result In the OS and clients that support Bonjour, follow the steps below to visit the network camera with Safari browser. 1. Click Show All Bookmarks in Safari. 2. Enable Bonjour. The OS or client automatically detects the network cameras with Bonjour enabled in the LAN. 3. Click the camera to visit the corresponding web page. 4.4.9 Multicast When multiple users are viewing the device video image simultaneously through network, it might fail due to the limited bandwidth.
Result ● In the web page, click and then select local. In the Play Parameter area, select Protocol as Multicast. ● Click Live on the main page of the web page, and then monitor the video image of corresponding stream in a multicast form on the Live page. 4.4.10 Register After you enable this function, when the camera is connected into Internet, it will report the current location to the specified server which acts as the transit to make it easier for the client software to access the camera.
Figure 4-41 QoS Table 4-22 Description of QoS parameters Parameter Description Real-time Monitoring Configure the priority of the data packets that used for network surveillance. 0 for the lowest and 63 the highest. Operation Command Configure the priority of the data packets that are used for configure or checking. 0 for the lowest and 63 the highest. Step 3 Click Apply. 4.4.
Figure 4-42 Dial-up Setting Step 3 Configure dial-up parameters. Table 4-23 Description of dial-up setting parameters Parameter Description The network types are as follows: ● 4G (TD-LTE): Dial (For China Mobile/Telecom/Unicom SIM card). Network Type ● 4G (FDD-LTE): Dial (For Telecom/Unicom SIM card). ● Auto: We recommend you use the auto mode, and then the system automatically selects the signal type. ● 5G (NR): Dial, text, call (For China Mobile/Telecom/Unicom special network card).
Parameter Description Username For ordinary cards, the username of telecom is ctnet@mycdma.cn or card. The mobile and Unicom have no username. The username of special network cards varies from card to card. Password For ordinary cards, the password of telecom is vnet.mobi or card. The mobile and Unicom have no password. The password of special network cards varies from card to card.
activate the device to access the network. > Network > Cellular Network > Mobile. Step 1 Select Step 2 Enable Send SMS, Activation by SMS, or Activation by phone according to actual needs. Figure 4-43 Mobile Setting Step 3 Enter the phone numbers of receiver, sender and caller, and then click Add to add the mobile phone users to the list. ● Click to delete the user number. ● When setting SMS, you can modify the title of the SMS message. Step 4 Click Apply. 4.4.13 Platform Access 4.4.13.
Figure 4-44 P2P ● When P2P is enabled, remote management on device is supported. ● When P2P is enabled and the device accesses to the network, the status shows online. The information of the IP address, MAC address, device name, and device SN will be collected. The collected information is for remote access only. You can cancel Enable selection to reject the collection. Step 2 Log in to mobile phone client and tap Device management. Step 3 Tap + at the upper-right corner.
4.4.13.3 RTMP Through RTMP, you can access a third-party platform (such as Ali and YouTube) to realize video live view. ● RTMP can be configured by admin only. ● RTMP supports the H.264, H.264 B and H.264H video formats, and the AAC (Advanced Audio Coding) audio format only. Step 1 Select > Network > Platform Access > RTMP. Step 2 Click . Make sure that the IP address is trustable when enabling RTMP. Step 3 Configure RTMP parameters.
4.4.14 Basic Service Configure the IP hosts (devices with IP address) that are allowed to visit the device. Only the hosts in the trusted sites list can log in to the web page. This is to enhance network and data security. > Network > Basic Service. Step 1 Select Step 2 Enable the basic service according to the actual needs.
4.5 PTZ This section introduces the configuration of PTZ parameters, such as preset, tour, and PTZ speed. ● The panorama camera channel and the detail camera channel support different functions, and might differ from the actual page. ● Some models of panorama camera channels do not support focus, zoom and iris adjustment functions, and might differ from the actual page. You can enter the page of PTZ through two methods.
4.5.2 Configuring Tour Configure Tour and the PTZ camera repeats performing tours among the configured presets after configuration. Prerequisites You need to setup several preset points in advance. Procedure and then select PTZ > Tour. Step 1 Click Step 2 Click Add Tour Group, and then double click Name to change the name of tour. Step 3 Select tour group and then select the presets from the Preset Point drop-down list on the left. Repeat this step to add several presets for the tour group.
Related Operations ● Delete tour group: Click to delete corresponding tour group. ● Clear all tour groups: Click Clear to delete all added tour groups. 4.5.3 Configuring Scan Scan means the Camera moves horizontally at a certain speed between the defined left and right boundaries. Procedure and then select PTZ > Scan. Step 1 Click Step 2 Click Add Scan, and then double click Name to change the name of scan. Step 3 Configure the left and right boundaries of the scan.
Figure 4-51 Pattern Step 5 Click to start pattern. Click to stop pattern. Related Operations ● Delete pattern: Click to delete the corresponding pattern. ● Clear all patterns: Click Clear to delete all added patterns. 4.5.5 Configuring Pan Pan refers to the continuous 360° rotation of the Camera in a horizontal way at a certain speed. , and then select PTZ > Pan. Step 1 Click Step 2 Configure the rotation speed. ● Click Start and PTZ starts horizontal rotation. ● Click Stop to stop the pan.
Figure 4-53 PTZ Speed Step 2 Select PTZ speed, and then click Apply. 4.5.7 Configuring Idle Motion Idle motion refers to a preset motion when the PTZ does not receive any valid command within a certain period. Prerequisites You have set PTZ motions such as preset, tour, scan and pattern in advance. Procedure and then select PTZ > PTZ Speed. Step 1 Click Step 2 Step 3 Click to enable idle motion. Configure idle interval time, and then select idle motion type.
Figure 4-54 Idle motion Step 4 Click Apply. 4.5.8 Configuring Power Up After configuring PowerUp, the camera will automatically perform the set motion after being powered up. Prerequisites You have set PTZ motions such as preset, tour, scan and pattern in advance. Procedure and then select PTZ > PowerUp. Step 1 Click Step 2 Step 3 Click to enable PowerUp function. Select PowerUp type.
Figure 4-55 PowerUp Step 4 Click Apply. 4.5.9 Configuring PTZ Rotation Limit Configure PTZ rotation limit to enable the Camera to move only within the defined PTZ area, and to rotate only within the limit range when calling functions such as tour and pan. and then select PTZ > PTZ Rotation Limit. Step 1 Click Step 2 Adjust the device direction to the Up Limit, and then click up limit Setting to set the current position to the up limit.
Figure 4-56 PTZ rotation limit Step 5 Select the elevation value from the drop-down list of Max Elevation Angle. This function is available on select models. Step 6 Click Enable to enable PTZ Rotation Limit. 4.5.10 Configuring Scheduled Task After setting scheduled task, the Camera performs the relevant motions during the set period. Prerequisites You have set PTZ motions such as preset, tour, scan and pattern in advance. Procedure and then select PTZ > Scheduled Task.
Figure 4-57 Scheduled task Step 5 Set the time for Auto Home. Auto Home: When the scheduled task is interrupted by an artificial call to the PTZ, the device will automatically resume the scheduled task after the auto home time. Step 6 Click Apply. 4.5.11 Configuring PTZ Maintenance PTZ Maintenance includes PTZ Restart and Default. and then select PTZ > PTZ Maintenance. Step 1 Click Step 2 Click PTZ Restart to restart PTZ or click Default to restore PTZ to defaults.
Figure 4-58 Configure protocol Step 2 Click Apply. 4.6 Event Click Event to configure general events, including alarm linkage, exception, video detection, and audio detection. You can go to the Event page through two methods. This following section uses method 1 as an example. ● Method 1: Click on the right-upper corner of the main page, and then click Event. ● Method 2: Click Event on the page. 4.6.1 Setting Alarm Linkage 4.6.1.
Figure 4-59 Alarm linkage Step 3 Select an alarm-in port and a sensor type. ● Anti-Dither: Only record one alarm event during the anti-dither period. ● Sensor Type: NO or NC. Step 4 Select the schedule and arming periods and alarm linkage action. For details, see "4.6.1.2 Alarm Linkage". If the exiting schedules cannot meet the scene requirement, you can click Add Schedule to add new schedule. For details, see "4.6.1.2.1 Adding Schedule". Step 5 Click Apply. 4.6.1.
Figure 4-60 Alarm linkage 4.6.1.2.1 Adding Schedule Configure arming schedule. The system only performs corresponding linkage action in the defined period. Step 1 Click Add Schedule next to Schedule. Step 2 Click Time Plan Table. You can set up multiple time plan tables for selection. Step 3 Configure the name of the Time Plan Table. Step 4 Configure arming periods. 1) Press and drag the left mouse button on the timeline to set arming periods.
Figure 4-61 Configuring arming period 2) Click the selected time period, and then enter the specific time in the text box to configure exact arming period. Figure 4-62 Configuring exact arming period Step 5 (Optional) Click Copy, select weeks, and then click Apply. Time plans for the current week can be quickly copied to other weeks. Step 6 Click Apply. 4.6.1.2.2 Record Linkage After enabling Record Linkage, the system can link record channel when an alarm event occurs.
Prerequisites ● Enable the corresponding alarm type (Normal, Motion, or Alarm) before the record channel links recording. For details, see "6.3 Setting Record Plan". ● Enable auto record mode before the record linkage takes effect. For details, see "6.2 Setting Record Control". Setting Record Linkage On the Alarm page, click to enable record linkage, select the channel, and then set Post- Record to set alarm linkage and record delay.
4.6.1.2.5 Email Linkage When an alarm is triggered, the system will automatically send an email to defined users. Prerequisites Email linkage takes effect only when SMTP is configured. For details, see "4.4.5 Email". Setting Email Linkage On the Alarm page, click to enable email linkage. Figure 4-66 Email linkage 4.6.1.3 Alarm Linkage When configuring alarm events, select alarm linkages (such as record, snapshot).
4.6.1.4 Subscribing to Alarm 4.6.1.4.1 Alarm Types Following are the alarm types and preparations of alarm events. Table 4-26 Description of alarm types Alarm Type Description Preparation Motion Detection The alarm is triggered when a moving object is detected. Motion detection is enabled. For details, see "4.6.3.1 Setting Motion Detection". Disk Full The alarm is triggered when the free space of SD card is less than the configured value. Insufficient SD card space detection is enabled.
Step 2 Click next to Alarm to enable alarm subscription, and then the system prompts and records alarm information according to actual conditions. ● When the subscribed alarm event is triggered and the alarm subscription page is not displayed, a number is displayed on automatically. Click , and the alarm information is recorded to view the details in the alarm list. You can click Clear to clear the record.
Card, Low SD Card Space, and SD Card Error. Functions might vary with different models. > Event > Exception > SD Card Exception. Step 1 Select Step 2 Select event type, and then enable SD card exception detection. When the event type is Low SD card space, you can configure Free Space. When the remaining free space is less than this value, an alarm is triggered. Figure 4-69 SD card exception Step 3 Click to enable the SD card detection functions. When Low SD Card Space is enabled, set Capacity Limit.
Figure 4-70 Network exception Step 2 Click to enable the network exception detection. Step 3 Set alarm linkage actions. For details, see "4.6.1.2 Alarm Linkage". Step 4 Click Apply. 4.6.2.3 Setting Tampering Detection > Event > Exception > Tampering Detection. Step 1 Select Step 2 Step 3 Click to enable the tampering detection function. Configure alarm parameters.
Figure 4-71 Setting tampering detection Step 4 Click Apply. 4.6.3 Setting Video Detection Check whether there are considerable changes on the video by analyzing video images. In case of any considerable change on the video (such as moving object, fuzzy image), the system performs an alarm linkage. 4.6.3.1 Setting Motion Detection The system performs an alarm linkage when a moving object appears in the image and its moving speed reaches the defined sensitivity.
Figure 4-72 Motion detection Step 2 Click to enable the motion detection function. Step 3 Set the area for motion detection. 1) Click Setting next to Area. Figure 4-73 Area 2) Select a color and set the region name. Select an effective area for motion detection in the image and set Sensitivity and Threshold.
region. ● Sensitivity: Sensitive degree of outside changes. The higher sensitivity is, the easier to trigger the alarm. ● Threshold: Effective area threshold for Motion Detection. The smaller the threshold is, the easier the alarm is triggered. ● The whole video image is the effective area for Motion Detection by default. Select color blocks to configure different detection parameters for different regions.
to add a new schedule. For details, see "4.6.1.2.1 Adding Schedule". Anti-dither: After the Anti-dither time is set, the system only records one motion detection event in the period. Step 4 Click Apply. 4.6.3.3 Setting Scene Changing The system performs alarm linkage when the image switches from the current scene to another one. > Event > Video Detection > Scene Changing. Step 1 Select Step 2 Select Channel and then click to enable the scene changing detection.
when the system detects abnormal sound input. ● Intensity change: Click to enable Intensity Change and then configure Sensitivity and Threshold. The alarm is triggered when the system detects that the sound intensity exceeds the configured threshold. ◇ The alarm is easier to be triggered with higher sensitivity or smaller threshold. Set a ◇ The red line in the waveform indicates audio detection is triggered, and the green high threshold for noisy environment. one indicates no audio is detected.
hot swap and format SD card. Background Information ● If you enter an incorrect password for five consecutive times during authentication, password change or password clearing, the account will be locked for five minutes. ● Before using the recording and playback function, ensure that the SD card has been authenticated. ● The health status of the SD card is classified as follows. ◇ Green: The SD card status is optimal. ◇ Orange: The SD card status is moderate. ◇ Blue: The SD card status is good.
4.8.1 General 4.8.1.1 Basic You can configure device name and video standard. Step 1 Select > System > General > Basic. Figure 4-78 Basic Step 2 Configure general parameters. Table 4-27 Description of general parameters Parameter Description Enter the device name. When a device is added by another device, the device name is displayed as the defined device name. Name Different devices have different names. Select video standard from PAL and NTSC.
Figure 4-79 Date and time Step 2 Configure date and time parameters. Table 4-28 Description of date and time parameters Parameter Description ● Manually Setting: Configure the parameters manually. ● NTP: When selecting NTP, the system then syncs time with the Time internet server in real time. You can also enter the IP address, time zone, port, and interval of a PC running NTP server to use NTP. System Time Configure system time. Click Sync with PC, and the system time changes to the PC time.
● The max. length of the user or group name is 31 characters which consist of number, letter, underline, dash, dot and @. ● The password must consist of 8–32 non-blank characters and contain at least two types of the following characters: Uppercase, lowercase, numbers, and special characters (excluding ' " ; : &). ● You can have up to 18 users (excluding the admin user) and 1 anonymous user, and you can have six user groups (excluding the admin and user groups).
Figure 4-81 Add user (system) Figure 4-82 Add user (live) Figure 4-83 Add user (search) 86
Figure 4-84 Add user (restricted log) Step 3 Configure user parameters. Table 4-29 Description of user parameters Parameter Description Username User’s unique identification. You cannot use existing user name. The max. length of the user or group name is 31 characters which consist of number, letter, underline, dash, dot and @. Password Confirm Password Enter password and confirm it again.
Parameter Description Set the PC address that allows the defined user to log in to the camera and the validity period and time range. You can log in to the web page with the defined IP in the defined time range of validity period. Set as follows: ● Enable IP address, select IP type and then configure IP address. ◇ Restricted Login ◇ IP address: Enter the IP address of the host to be added. IP segment: Enter the start address and end address of the host to be added.
Step 4 Click Apply. 4.8.2.3 Adding User Group You have two groups named admin and user by default, and you can add new group, delete added group or edit group authority and remarks. Step 1 Select > System > Account > Group. Figure 4-86 Group name Step 2 Click Add. Step 3 Enter the user group name and remarks, and then select the system, preview and playback authorities for the user group.
Group Authority Storage Admin YES Event YES User Functions NA Storage point configuration, snapshot recording time configuration, SFTP configuration and more. NA Video detection settings, audio detection settings, alarm settings and more. Network YES NA IP settings, SMTP settings, SNMP settings, AP Hotspot settings and more. Peripheral YES NA External light, wiper and serial port settings. Camera YES NA Camera property settings, audio and video settings and more.
Click to delete the added users. The admin account and user group cannot be deleted. 4.8.2.4 ONVIF User You can add, delete ONVIF user, and change their passwords. The default ONVIF user is admin. Step 1 Select > System > Account > ONVIF User. Figure 4-88 ONVIF user Step 2 Click Add. Figure 4-89 Add ONVIF user Step 3 Configure user parameters. Table 4-31 Description of ONVIF user parameters Parameter Description Username User’s unique identification. You cannot use existed username.
For admin account, you can only edit the password. ● Delete user group. Click to delete the added users. The admin account cannot be deleted. 4.8.3 Peripheral Management > System > Peripheral > > Wiper. Step 1 Select Step 2 Configure working mode of wipers. Figure 4-90 Wiper Table 4-32 Configure parameters of wiper Parameter Description Mode Select the start mode of wiper. Only manual mode is supported at present. Interval Time The interval time between stop mode and start mode.
● Back up the system configuration regularly. ● Restart the device and delete the old files regularly. ● Update firmware in time. 4.8.4.2 Maintenance You can restart the system manually, and then set the time of auto reboot and auto deleting old files. This function is disabled by default. Step 1 Select > System > Manager > Maintenance. Figure 4-91 Maintenance Step 2 Configure auto maintain parameters.
Figure 4-92 Import/export Step 2 Import and export. ● Import: Select local configuration file, and click Import File to import the local system configuration file to the system. ● Export: Click Export Configuration file to export the system configuration file to local storage. 4.8.4.4 Default Restore the device to default configuration or factory settings. This function will restore the device to default configuration or factory settings. Operate it carefully.
Figure 4-94 Upgrade Step 2 Click Browse, and then upload upgrade file. The upgrade file should be a .bin file. Step 3 Click Upgrade. The upgrade starts. 4.9 System Information You can view the information, including version, log and online user, and back up or clear log. 4.9.1 Version View the ONVIF Version, System Version, Web Version and other information of the camera. Select > System Info > Version to view the version information of the camera. 4.9.
The start time should be no earlier than January 1, 2000, and the end time should be no later than December 31, 2037. The log type includes All, System, Setting, Data, Event, Record, Account, and Security ● System: Includes program start, abnormal close, close, program reboot, device closedown, device reboot, system reboot, and system upgrade. ● Setting: Includes saving configuration and deleting configuration file. ● Data: Includes configuring disk type, clearing data, hot swap, FTP state, and record mode.
Figure 4-96 Remote log 97
5 Live This chapter introduces the layout of the page and function configuration. 5.1 Live Page This section respectively describes the Live page for single-channel and multi-channel devices. Click Live on the main web page to enter Live page. Pages might vary with different models. Figure 5-1 Live (single-channel) Figure 5-2 Live (multi-channel) Table 5-1 The description of live page Number Function Description 1 Display mode Switches the video display mode.
Number Function Description Image adjustment Adjusts the images in the live viewing. For details, see "5.4 Window Adjustment Bar". 5 Live view Displays the real-time monitoring image. 6 Live view function bar Displays the shortcut for available functions. Among them, some shortcut buttons of multi-channel devices are in the upper-right corner of the channel screen. For details, see "5.3 Live View Function Bar". 3 4 5.
Table 5-2 Description of live view function bar Icon Function Description Force Alarm Displays alarm output state of the corresponding channel. When the alarm output page is connected to the alarm output device, click the icon to force to enable or disable alarm output. ● Red: Alarm output enabled. ● Black: Alarm output disabled. Digital Zoom , Zoom in the selected area, drag the screen in the zoomed-in status to view other areas. You can zoom video image through two operations.
Table 5-3 Description of adjustment bar Icon Function Description Original Size Only single-channel devices display this icon. Click this icon and when the icon changes to , the actual size of the screen is displayed. Click the icon again to restore the screen to the appropriate size W:H Click the icon to resume original ratio or change ratio. It supports Original and Adaptive. Click the icon to adjust the fluency of the image. It supports Realtime, Fluent and General.
Function Description Speed: The speed value changes device rotate speed. The bigger the value is, the faster the device rotates. For example, the rotation with a speed of 8 is much faster than that of 1. Zoom: Adjust the zooming of images. Focus: Adjust the focal length of the Camera. Iris: Adjust the brightness of images. PTZ Menu: Click to enter PTZ menu. Configure the camera setting, PTZ setting, system management and other functions according to the actual page.
Parameter Description Tour Configure tour number. Click Start and the device automatically rotates back and forth in the order of the set preset points. Click Stop to finish tour. Pattern Configure pattern number. Click Start and the device automatically rotates back and forth according to the set operating record. Click Stop to finish pattern. The operation record includes the manual operations that the performed to the PTZ, and the changes in focus and zoom.
Parameter Description Pattern Click to enable pattern function, and the pattern information is displayed on the image. RS485 Click to enable RS485 function, and the RS485 information is displayed on the image. Temperature Click to enable temperature function, and the internal temperature of the current device is displayed. Location Click to enable location function, and the geographical location is displayed in the text.
The adjustment is only available on the web page, and it does not adjust the camera parameters. Figure 5-8 Image adjustment ● (Brightness adjustment): Adjusts the overall image brightness, and changes the value when the image is too bright or too dark. The bright and dark areas will have equal changes. ● (Contrast adjustment): Changes the value when the image brightness is proper but contrast is not enough.
Figure 5-9 Face mode page ● Select Metadata Mode on the upper left corner of the Live page, and then the page turns into metadata mode. Figure 5-10 Metadata mode page Table 5-7 Description of display mode Number Function Description 1 Live view Displays the real-time monitoring image. For details, see "5.4.1 Adjustment". 2 Details Displays the captured image and details. Enable statistics of people faces, human bodies, motor vehicles and non-motor vehicles.
displayed on the Live page, and then click Apply. Properties shown in blue boxes indicate that they are selected, and properties shown in gray boxes indicate that they are not selected. Properties of different modes are different.
6 Record This chapter introduces the functions of video playback and operations of record control, record plan and record storage. 6.1 Playback This section describes the operations of video playback and management. It supports editing and downloading videos. 6.1.1 Playing Back Video Query and playback video files stored in the SD card Prerequisites ● This function is available on the camera with SD card.
Figure 6-1 Search video Step 3 Point to the searched video, and then click to play back the selected video. Figure 6-2 Video playback Table 6-1 Description of video playback page No 1 Icon Function Description Displays all searched recorded video files. Click any files to view the recording. Recorded video list Click Back at the upper-left corner to go to the Search Video page.
No Icon Function Description You can zoom in or out video image of the selected area through two operations. ● Click the icon, and then select an area in the video image to zoom in; right-click on the image to resume the original size. In Digital Zoom zoom in state, drag the image to check other area. ● Click the icon, and then scroll the mouse wheel in the video image to zoom in or out.
No Icon Function Description Displays the record type and the corresponding period. ● Click any point in the colored area, and 3 Progress bar the system will play back the recorded video from the selected moment. — ● Each record type has its own color, and you can see their relations in Record Type bar. 6.1.2 Clipping Video Step 1 Click below the video during playback. Step 2 Drag the clipping box on the progress bar to select the start time and end time of the target video.
● Playback and download at the same time is not supported. ● Operations might vary with different browsers. ● For details of viewing or setting storage path, see "4.2 Local". Step 1 Select Record > Search Video. Step 2 Select the channel, the record type, and record time, and then click Search. Step 3 Select videos to be downloaded. ● Select at the upper-right corner of each video file to select one or more videos. The icon at the upper left corner of the selected file changes to ● Select .
When a Dahua smart SD card is inserted into a device that supports Dahua smart SD card, make sure that the SD card has been authenticated before using the video recording function. For details, see "4.2 Local". Step 1 Click Record in the main page, and then click the Record Control tab. Figure 6-7 Record control Step 2 Set parameters. Table 6-2 Description of record control parameters Parameter Description Max Duration The time for packing each video file.
● Green represents normal record plan (such as timing recording). ● Yellow represents motion record plan (such as recording triggered by intelligent events). ● Red represents alarm record plan (such as recording triggered by alarm-in). 1) Select a record type, and left-click and drag on the timeline to set the recording period of each event. Record plan from top to bottom are respectively normal record plan, motion record plan and alarm record plan.
Figure 6-10 Holiday plan ● Click to enable the holiday plan, and select the days that you need to set as holiday. The selected dates are shown in blue. ● Click Clear to cancel the selection. When holiday schedule setting is not the same as the general setting, holiday schedule setting is prior to the general setting. For example, with holiday schedule enabled, if the day is holiday, the system snapshots or records as holiday schedule setting; otherwise, the system captures or records as general setting.
Figure 6-12 Storage Table 6-3 Description of storage parameters Parameter Description Event Type Select from General, Event and Alarm. Recording strategy when the disk is full. Disk Full ● Overwrite: Overwrite the earliest video when the disk is full. ● Stop: Stop recording when the disk is full. Select from Local storage and Network storage ● Local storage: Save the recorded videos in the internal SD card. Storage Method Local storage is displayed only on models that support SD card.
Step 1 Select Record > Storage. Step 2 Select the recording strategy in Disk Full. ● Overwrite: Cyclically overwrite the earliest video when the disk is full. ● Stop: Stop recording when the disk is full. Step 3 Select Network storage in Storage Method, and select FTP to save the recorded videos in FTP server. Step 4 Select FTP or SFPT from the drop-down list. SFPT is recommended to enhance network security. Step 5 Click next to Enable to enable the FTP function.
6.4.2.2 NAS Enable this function, and you can save all the files in the NAS. Step 1 Select Record > Storage. Step 2 Select the recording strategy in Disk Full. ● Overwrite: Cyclically overwrite the earliest video when the disk is full. ● Stop: Stop recording when the disk is full. Step 3 Select Network storage in Storage Method, and select NAS to save the recorded videos in NAS server. Step 4 Select NAS protocol type.
7 Picture This chapter introduces the related functions and operations of image playback, including configuring snapshot parameters, configuring snapshot plan and snapshot storage. 7.1 Playback This section describes playing back and downloading images. 7.1.1 Playing Back Image This section introduces the operation of image playback. Prerequisites ● This function is available on the camera with SD card. ● Before playing back image, configure snapshot time range, snapshot storage method, snapshot plan.
Figure 7-2 Playback image Table 7-1 Description of playback page No 1 Function Snapshot list Description Displays all searched snapshots. Click any files to play back it. Click Back at the upper-left corner to go to the Picture Query page. ● Click to display the previous snapshot in the snapshot list. 2 Manual display 3 Slide show Click to display the snapshots list one by one in slide show mode.
Figure 7-3 Selecting image file Step 4 Click Download. Step 5 Select the download format and storage path. Figure 7-4 Downloading image Step 6 Click Start Download. The downloaded images are saved in the configured storage path. For details of storage path, see "4.2 Local". 7.2 Setting Snapshot Parameters Set the snapshot parameters, including type, size, quality and Interval. Step 1 Select Picture > Snapshot. Step 2 Select the channel, and then set the parameters.
Figure 7-5 Snapshot Table 7-2 Description of snapshot parameters Parameter Description You can select from Scheduled and Event. ● Scheduled: Capture images in the defined period. For details, see "7.3 Setting Snapshot Plan". ● Event: Capture images when configured event is triggered, such as Type Motion Detection, Video Tamper and Scene Changing. Make sure that you have enabled the corresponding event detection and the snapshot function. Size Set the size of the snapshot.
period of each event. Snapshot plan from top to bottom are respectively normal snapshot plan, motion snapshot plan and alarm snapshot plan. Figure 7-6 Configure through timeline 2) Click the selected time range and then set an accurate start and end time. Figure 7-7 Configure accurate time period ● Click Copy, and select the days that you want to copy to in the prompt page. ● Select the Select All checkbox to select all day to copy the configuration. ● You can set 6 time periods per day.
Figure 7-8 Holiday plan ● Click to enable the holiday plan, and select the days that you need to set as holiday. The selected dates are shown in blue. ● Click Clear to cancel the selection. When holiday schedule setting is not the same as the general setting, holiday schedule setting is prior to the general setting. For example, with holiday schedule enabled, if the day is holiday, the system snapshots or records as holiday schedule setting; otherwise, the system captures or records as general setting.
Figure 7-9 Storage Table 7-3 Description of storage parameters Parameter Description Event Type Select from General, Event and Alarm. Recording strategy when the disk is full. Disk Full ● Overwrite: Cyclically overwrite the earliest video when the disk is full. ● Stop: Stop recording when the disk is full. Select from Local storage and Network storage ● Local storage: Save the snapshots in the internal SD card. Storage Method Local storage is displayed only on models that support SD card.
7.4.2.1 FTP Enable this function, and you can save all the files in the FTP server. Step 1 Select Picture > Storage. Step 2 Select the snapshot strategy in Disk Full. ● Overwrite: Cyclically overwrite the earliest snapshot when the disk is full. ● Stop: Stop snapshot when the disk is full. Step 3 Select Network storage in Storage Method, and select FTP to save the snapshots in FTP server. You select FTP or SFPT from the drop-down list. SFPT is recommended.
Step 6 Click Apply. Step 7 Click Test to test whether FTP function works normally. 7.4.2.2 NAS Enable this function, and you can save all the files in the NAS. Step 1 Select Picture > Storage. Step 2 Select the snapshot strategy in Disk Full. ● Overwrite: Cyclically overwrite the earliest snapshot when the disk is full. ● Stop: Stop snapshot when the disk is full. Step 3 Select Network storage in Storage Method, and select NAS to save the snapshots in NAS server. Step 4 Select NAS protocol type.
8 AI This chapter describes how to configure device AI events, including face recognition, IVS and video metadata. 8.1 Configuring Smart Plan Smart plans include face recognition, intelligence behavior analysis, video metadata and so on. The smart functions of the camera cannot take effect until the smart plan has been enabled. Step 1 Click AI > AI Config > Smart Plan. Step 2 Enable the smart functions of the global and preset plan based on actual needs and then click Next.
image with the information in the face database, and links alarm according to the comparison result. Figure 8-2 Face recognition flowchart 8.2.1.1 Configuring Face Recognition Rule When a face is detected or recognized in the detection area, the system performs alarm linkage. Step 1 Click AI > AI Config > Smart Plan. Step 2 Click Rule Config and then select Face Recognition.
Figure 8-3 Configuring face recognition rule Table 8-1 Description of face recognition parameters Parameter Description Face Enhancement Select Face Enhancement to preferably guarantee clear faces with low stream. Target Box Overlay You can add a bounding box to the face in the captured image to highlight the face. The captured face image is saved in SD card or the Snapshot Path. For the Snapshot Path see "4.2 Local". Set a range for the captured face image, including face and oneinch image.
● Click + Event Linkage to set the linkage action and configure linkage parameters. For details, see "4.6.1.2 Alarm Linkage" Step 6 Click Apply. 8.2.1.2 Configuring Face Database By configuring face database, the face database information can be used to compare with the face captured. The configuration process includes creating face database, adding face image, and face modeling. The operations for configuring face databases are all performed on Face Database Config. 8.2.1.2.
Click to delete face database. 8.2.1.2.2 Adding Face Images Add face images to the created face database. You can add them one by one or in batches. Requirements on face images: ● A single image size is 50 KB–150 KB in JPEG format. The resolution is less than 1920 × 1080. ● Face size is 30%–60% of the whole image. There must be at least 100 pixels between the ears. ● Taken in full-face view directly facing the camera without makeup, filters, glasses, and fringe.
Add to task list. Step 7 at the upper-right corner, and then click Operation. Click ● If image adds successfully, it shows Stored successfully. Modeling successful. ● If adding user fails, the error code is displayed on the page. View the fail reason according to error code table. For details. see "Description of error code" ● If image modeling fails, the error code is displayed on the page. Please modify the image and remodel the image. For face modeling operation, see "8.2.1.2.4 Face Modeling".
Parameters Description Date of Birth Format: yyyy-mm-dd, such as 2020-10-23. Region Enter the abbreviation name of the country or region, such as CN (for China), BR (for Brazil). Province Enter the corresponding name of the province. Supports letters (capitalize the initial letter), but do not support Chinese characters. City Enter the corresponding name of the city. Credential Type 1" is ID card, "2" is passport, “3” is Officer Card and“4” is others. ID number Enter ID number.
Modeling". 8.2.1.2.3 Managing Face Images Add face images to face database, and then manage and maintain face images to ensure the information is correct. Modifying Face Information Step 1 Click AI > AI Config > Smart Plan. Step 2 Click Rule Config and then select Face Recognition. Step 3 Click Face Database Config to enter the face database configuration page. Step 4 Click Step 5 Click Query, set the criteria as needed, and then click Search.
● Single delete: Select the row where the face image or the personnel information is located, and click to delete the face image. ● Delete in batches: Select at the upper-right corner of the face image or of the row where the personnel information is located.. Select the information, click Delete, then click .Click Operation to delete the selected face images.
the thumbnail, it means the modeling failed. Point to the modeling status in the list to view the details of the failure. Change the images according to the reasons. Figure 8-10 Modeling status (list) 8.2.1.3 Configuring Arming Alarm When face recognition succeeded or failed, the device outputs alarms. Step 1 Click AI > AI Config > Smart Plan. Step 2 Click Rule Config and then select Face Recognition. Step 3 Click Face Database Config to enter the face database configuration page.
face database. ● Select none: The camera does not output alarms whether the detected face matches the face picture in the database or not. Step 7 Set arming periods and alarm linkage action. ● Click Add Schedule to add time plan. For details, see "4.6.1.2.1 Adding Schedule". ● Set the linkage action and configure linkage parameters. For details, see "4.6.1.2 Alarm Linkage" Step 8 Click Apply. 8.2.1.
moving distance should be larger its width and no less than 15 pixels (CIF image) at the same time. ● Reduce the complexity of surveillance scene as much as you can. Intelligent analysis functions are not recommended to be used in scene with dense targets and frequent illumination change. ● Avoid areas such as glass, reflective ground, water surface, and areas interfered by branch, shadow and mosquito. Avoid backlight scene and direct light. 8.2.2.
Sensitivity: Adjust the filter sensitivity. With higher value, it is easier to trigger an alarm when low-contrast object and small object are captured, and the false detection rate is higher. Figure 8-13 Global configuration (IVS) Step 6 Click Apply. Related Operations 1. Select the verification type, and then click Calibration Verification. To verify vertical ruler and horizontal ruler, respectively select Height Verification and Width Verification. 2.
Rule Functions Applicable Scene area. Intrusion When the target enters, leaves, or appears in the detection area, an alarm is triggered, and the system performs defined alarm linkages. Abandoned object When an object is abandoned in the detection area over the defined time, an alarm is triggered, and then the system performs defined alarm linkages. Scenes with sparse targets and without obvious and frequent light change. Simple scene in the detection area is recommended.
Figure 8-14 Tripwire Step 5 Click to draw rule lines in the image. Right-click to finish drawing. Different rules have slightly different drawing requirements. After drawing rules, drag corners of the detection area to adjust the area range. Figure 8-15 Drawing rule Table 8-5 Description of IVS analysis drawing rules Rule Description Crossing virtual fence Draw a detection line. Tripwire Intrusion Abandoned object Missing object Fast moving Parking detection Crowd gathering Draw a detection area.
Table 8-6 Description of IVS analysis drawing rules Rule Description Crossing virtual fence Draw a detection line. Tripwire Intrusion Abandoned object Draw a detection area. ● During the detection of abandoned objects, the alarm is also triggered if pedestrian or vehicle stays for a long time.
Figure 8-16 IVS parameters Table 8-7 Description of IVS parameters Parameter Description Direction Set the direction of rule detection. ● When setting tripwire, select A->B, B->A, or A<->B. ● When setting intrusion, select Enter, Exit, or Both. Target Filter After enabling Target filter, effective targets are not detected and alarms will not be triggered. This function is currently supported by tripwire, intrusion and fast moving. Effective Target Effective targets include Human and Motor Vehicle.
Parameter Description ● For fast moving, sensitivity is related to the triggering speed. Lower Sensitivity Step 8 sensitivity requires faster moving speed to trigger the alarm. ● For crowd gathering, sensitivity is related to the alarm triggering time. It is easier to trigger the alarm with higher sensitivity. Set arming periods and alarm linkage action. ● Click Add Schedule to add time plan. For details, see "4.6.1.2.1 Adding Schedule".
Table 8-8 Description of global configuration parameter Parameter Description Target Box Overlay Overlay target box on the captured images to mark the target position. Four types of target boxes are supported. Select the target box as needed. The captured images are stored in SD card or the configured storage path. For details, see "4.2 Local". Face Enhancement Enable Face Enhancement to preferably guarantee clear face with low stream.
Figure 8-19 Configure image parameters (non-motor vehicle) 3) Click Apply. Step 6 (Optional) Click the icon on the right of the screen to draw detection area, exclusion area and filtering target model on the monitoring screen. ● After enabling the rule, the detection area is displayed in the monitoring screen. Click , and then drag any corner of the box to adjust the size of the area ● Click to draw an area exclusion area for face detection in the image, and right-click to finish the drawing.
Figure 8-20 Configuring rule parameters (traffic flow statistics) Table 8-9 Description of video metadata parameter Parameter Description People Flow Statistics Click next to People Flow Statistics to count the number of people in the detection area. Traffic Flow Statistics (Nonmotor Vehicles) Click next to Traffic Flow Statistics (Non-motor Vehicles) to count the number of non-motor vehicles in the detection area.
video metadata. ● The left side displays real-time live screen; the right side displays large view of the snapshot and detailed attribute information; the bottom displays the face, human body, non-motor vehicle and motor vehicle snapshot statistics and snapshot thumbnails. ● Click to change the attributes shown in the image. For details, see "Configuring Display Properties". Figure 8-21 Video metadata report 8.3 Configuring Tour Plan You can configure the tour mode and time plan for different periods.
Figure 8-22 Multi-scenario tour Table 8-10 Description of multi-scenario tour parameter Parameter Description Stay Time Set the time that the Camera stays in the scene. Double-click the stay time to modify the time. Priority Sorting Set the priority of multiple scenes. Click to adjust the order. Delete Click Add Scenario Click Add Scenario to add a new tour scene. to delete the scene. 3) Click OK to complete the configuration of multi-scenario tour.
9 Security 9.1 Security Status Background Information Detect the user and service, and scan the security modules to check the security status of the Camera, so that when abnormality appears, you can process it timely. ● User and service detection: Detect login authentication, user status, and configuration security to check whether the current configuration meet requirement.
Figure 9-2 Security status 9.2 System Service Service functions can be used only after system services are enabled. 9.2.1 802.1x Cameras can connect to LAN after passing 802.1x authentication. Step 1 Select Security > System Service > 802.1x. Step 2 Select the NIC name as needed, and click Step 3 Select the authentication mode, and then configure parameters. ● PEAP (Protected EAP protocol). to enable it. 1. Select PEAP as the authentication mode. 2.
3. Select the certificate from the certificate list on the Device Certificate page. If there is no certificate in the list, click Certificate Management at the left navigation bar. For details, see "9.4.1 Installing Device Certificate". 4. (Optional) Click next to CA certificate, and select the trusted CA certificate in list. If there is no certificate in the list, click Certificate Management at the left navigation bar. For details, see "9.4.2 Installing Trusted CA Certificate". Figure 9-4 802.
Figure 9-5 HTTPS Step 4 Click Apply. Related Operations Enter https://IPaddress in the browser. ● If you have already installed the certificate, the normal login page will be displayed. ● If you have not installed the certificate, the browser displays a certificate error message. 9.3 Attack Defense 9.3.1 Firewall Configure firewall to limit access to the camera. Step 1 Select Security > Attack Defense > Firewall. Step 2 Click to enable the firewall function.
Figure 9-7 Firewall Step 5 Click Apply. Related Operations ● Click ● Click to edit the host information. to delete the host information. 9.3.2 Account Lockout If you consecutively enter a wrong password more than the configured value, the account will be locked. Step 1 Select Security > Attack Defense > Account Lockout. Step 2 Configure the login attempt and lock time for device account and ONVIF user. ● Login attempt: Upper limit of login attempts.
9.3.3 Anti-DoS Attack You can enable SYN Flood Attack Defense and ICMP Flood Attack Defense to defend the device against DoS (Denial of Service) attack. Step 1 Select Security > Attack Defense > Anti-DoS Attack. Step 2 Select SYN Flood Attack Defense or ICMP Flood Attack Defense to defend the device against Dos attack. Figure 9-9 Anti-DoS attack 9.4 CA Certificate 9.4.
Figure 9-10 Certificate information (1) Step 5 Click Create and install certificate. After the certificate is created successfully, you can view the created certificate on the Device Certificate page. Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ● Click ● Click to download the certificate. to delete the certificate. 9.4.1.2 Applying for and Importing CA Certificate Import the third-party CA certificate to the camera.
Figure 9-11 Certificate information (2) Step 5 Click Create and Download. Save the request file to your PC. Step 6 Apply for the CA certificate from the third-party certificate authority. Step 7 Import the signed CA certificate. 1) Save the CA certificate to the PC. 2) Select Install Device Certificate, click Apply for CA Certificate and Import (Recommended), and then click Next. 3) Click Browse to select the signed CA certificate. 4) Click Install and Import.
password. Figure 9-12 Certificate and private key Step 5 Click Import and Install. After the certificate is created successfully, you can view the created certificate on the Device Certificate page. Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ● Click ● Click to download the certificate. to delete the certificate. 9.4.2 Installing Trusted CA Certificate CA certificate is a digital certificate for the legal identity of the camera.
Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ● Click ● Click to download the certificate. to delete the certificate. 9.5 A/V Encryption The device supports audio and video encryption during data transmission. We recommend you to enable A/V Encryption function. There might be safety risk if this function is disabled. Step 1 Select Security > A/V Encryption. Step 2 Configure the parameters.
Area Step 3 Parameter Description Select a device certificate Select a device certificate for RTSP over TLS. Certificate Management For details about certificate management, see "9.4.1 Installing Device Certificate". Click Apply. 9.6 Security Warning When security exception event is detected, the camera sends a warning to remind you to process it timely, to avoid security risk. Step 1 Select Security > Security Warning. Step 2 Click Step 3 Configure the parameters. to enable security warning.
10 Report View the statistics result of video metadata in report form. Procedure Step 1 Click Report > Report > Video Metadata. Step 2 Set the period for the report. For multi-channel camera, select the channel first. Step 3 Click Search. Figure 1-1 Video metadata report Related Operations ● Select the report form. ◇ Click to display the report in line chart. Click to display the report in bar chart. ● Select the statistics type on the upper-right corner.
Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system.
We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing. 8.
● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device.
166