Figure 4-116 4.7.2 Smart Plan The smart plan is for the smart network camera. If you do not set a rule here, you cannot use the intelligent functions in IVS (Chapter 4.7.3), Face detection (Chapter 4.7.4) and People counting (Chapter 4.7.5) when you are connecting to a smart network camera. There are two types to realize intelligent analytics function. Note Smart network camera supports intelligent functions: Some smart camera supports the intelligent functions.
Figure 4-117 Please select a channel number and a preset. Click Add. The preset is now on the list. See Figure 4-118. Note Some smart camera does not need to add the preset. Please refer to the actual product for detailed information.
Figure 4-118 Select a smart plant from the dropdown list and then click the corresponding intelligent plan icon. See Figure 4-118. Note The NVR supports general behavior analytics (IVS), human face detection, heat map, and people counting. Different network camera supports different smart plans. Please refer to the actual product for detailed information. The general behavior analytics (IVS) and human face detection function cannot be valid at the same time.
The object total size shall not be more than 10% of the whole video. The object size on the video shall not be more than 10pixels*10 pixels. The abandoned object size shall be more than 15pixels*15 pixels (CIF resolution). The object width shall not be more than 1/3 of the video height and width. The recommended height is 10% of the video. The object and the background brightness different shall be more than 10 grey levels. The object shall remain on the video for more than 2 seconds.
Support several tripwires at the same scene suitable for complicated environment. Support object size filter. From main menu->Setting->Event->Behavior analytics, the interface is shown as below. See Figure 4-120. Figure 4-120 Click Draw button to draw the tripwire. See Figure 4-121.
Figure 4-121 Select direction, and then input customized rule name. Preset: Select a preset you want to use behavior analytics. Name: Input customized rule name. Direction (A→B/B→A/A↔B): System can generate an alarm once there is any object crossing in the specified direction. Target filter: Click , you can set filter object size. Each rule can set two sizes (min size/max size). Once the object is smaller than the min size or larger than the max size, there is no alarm.
In Figure 4-112, Select icon Now the icon is shown as In Figure 4-112. Click button of several dates, all checked items can be edited together. . Click to delete a record type from one period. after one date or a holiday, you can see an interface shown as in Figure 4-113. Alarm output: when an alarm occurs, system enables peripheral alarm devices. Latch: when tripwire complete, system auto delays detecting for a specified time.
Figure 4-123 Figure 4-124 128
Figure 4-125 After you set the corresponding parameters, click OK button in Figure 4-122., and then click the Apply button in Figure 4-120 to complete the setup. 4.7.3.2 Intrusion (Cross warning zone) (Optional) System generates an alarm once there is any object entering or exiting the zone in the specified direction. From main menu->Setting->Event->Behavior analytics, click Add button and then select type as intrusion, the interface is shown as below. See Figure 4-126.
Figure 4-126 Click draw button to draw the zone. See Figure 4-127.
Figure 4-127 Select direction, and then input customized rule name. Preset: Select a preset you want to use behavior analytics. Name: Input customized rule name. Direction (A→B/B→A/A↔B): System can generate an alarm once there is any object crossing in the specified direction. Target filter: Click , you can set filter object size. Each rule can set two sizes (min size/max size). Once the object is smaller than the min size or larger than the max size, there is no alarm.
System supports customized area shape and amount. Support duration setup. Support objects filter function. Figure 4-128 Click draw button to draw the zone. See Figure 4-129.
Figure 4-129 Preset: Select a preset you want to use behavior analytics. Name: Input customized rule name. Duration: System can generate an alarm once the object is in the zone for the specified period. Target filter: Click , you can set filter object size. Each rule can set two sizes (min size/max size). Once the object is smaller than the min size or larger than the max size, there is no alarm. Please make sure the max size is larger than the min size. Now you can draw a rule.
Figure 4-130 Click Draw button to draw a zone. See Figure 4-131.
Preset: Select a preset you want to use behavior analytics. Name: Input customized rule name. Duration: System can generate an alarm once the object in the zone is missing for the specified period. Target filter: Click , you can set filter object size. Each rule can set two sizes (min size/max size). Once the object is smaller than the min size or larger than the max size, there is no alarm. Please make sure the max size is larger than the min size. Now you can draw a rule.
Click draw button to draw the zone. See Figure 4-133. Figure 4-133 Preset: Select a preset you want to use behavior analytics. Name: Input customized rule name. Duration: System can generate an alarm once the object is in the zone for the specified period. Target filter: Click , you can set filter object size. Each rule can set two sizes (min size/max size). Once the object is smaller than the min size or larger than the max size, there is no alarm.
Customized zone and amount setup. Duration setup. Sensitivity setup. Min gathering zone setup. Figure 4-134 Click draw button to draw the zone. See Figure 4-135.
Figure 4-135 Preset: Select a preset you want to use behavior analytics. Name: Input customized rule name. Duration: System can generate an alarm once the object is in the zone for the specified period. Sensitivity: It is to set alarm sensitivity. The value ranges from 1 to 10.The default setup is 5. Target filter: Click , you can set filter object size. Each rule can set two sizes (min size/max size).
Figure 4-136 Click draw button to draw the zone. See Figure 4-137.
Figure 4-137 Preset: Select a preset you want to use behavior analytics. Name: Input customized rule name. Sensitivity: It is to set alarm sensitivity. The value ranges from 1 to 10.The default setup is 5. Target filter: Click , you can set filter object size. Each rule can set two sizes (min size/max size). Once the object is smaller than the min size or larger than the max size, there is no alarm. Please make sure the max size is larger than the min size. Now you can draw a rule.
4-138. Figure 4-138 Click Global config button, the interface is shown as below. See Figure 4-139. Channel: Please select a channel from the dropdown list. Preset: Select a preset you want to set the rule. Please note, you need to add a preset first, otherwise, you cannot see the preset dropdown list. If there is no preset, you can draw a rule in current channel. Calibration zone: Click Add zone , you can draw a calibration zone at the left pane of the interface.
Figure 4-139 4.7.4 Face Detect (Optional) System processes and analyzes the video from the camera. System can generate an alarm when it detects there is any human face information. From main menu->Setting->Event->Face detect, the interface is shown as in Figure 4-140. Face ROI: Check the box here, system can enhance the human face display pane. Note Make sure the connected camera supports human face detect function if you want to use face ROI function.
Figure 4-140 4.7.5 People Counting (Optional) System adopts video image and graphics analysis technology. System can calculate the entry/exit people amount in the specified zone on the video. It can generate an alarm when the amount has exceeded the threshold. From main menu->Setting->Event->People counting, you can see an interface shown as in Figure 4-141. Enable: Check the box to enable people counting function.
Figure 4-141 After you set the people counting function, from main menu->Info->Event->People counting, you can view people counting statistics report. Please refer to chapter 4.7.1.1 Motion detect for detailed information. 4.7.6 Heat Map Heat map technology can monitor the active objects distribution status on the specified zone during a period of time, and use the different colors to display on the heat map. Step 1 From main menu->Setting->Event->Heat map. Enter heat map interface. See Figure 4-142.
Figure 4-142 Step 2 Step 3 Select a channel number and then check the box to enable the function. Click Setup button. Enter setup interface. See Figure 4-143. Figure 4-143 Step 4 Set arm/disarm period. Refer to chapter 4.7.1.1 Motion detect for detailed setup information.
Step 5 Click Apply button to complete setup. Note After set the heat map parameters, go to main menu->Info->Event->Heat map to view heat map report. Refer to chapter 4.10.2.3.3 for detailed setup information. 4.7.7 Plate Recognition 4.7.7.1 Plate recognition settings Device can generate an alarm when it detects the corresponding plate information. Please follow the steps listed below. Step 1 From main menu->Setup->Event->Vehicle Recognition-> Vehicle Recognition. Enter Vehicle Recognition interface.
Whitelist: In this interface, device triggers an alarm when it detects plate number in the whitelist. 4.7.7.2 B/W List It is to set the blacklist and the whitelist. It includes add, delete, import, export blacklist/whitelist. After setting the blacklist/whitelist, in the plate snapshot list on the preview interface, the blacklist plate number is red, the whitelist plate number is green, the regular plate number is white.
and xlsx. The export file is .csv. Import blacklist/whitelist: Set the type as blacklist or whitelist and then click Import button. Select the corresponding file and then click Open button to import. Export blacklist/whitelist: Set the type as blacklist or whitelist and then click Export button. The Browse interface is displayed. See Figure 4-146. Select the file save path, enter the encryption password, and then click Save.
Threshold: It is to set intensity change threshold. The smaller the value is, the higher the sensitivity is. Log: Check the box here, system can record audio detect alarm log. Refer to the chapter 4.7.1.1 Motion Detect to set other parameters. Figure 4-147 4.7.9 Alarm Settings In the main menu, from Setting->Event->Alarm, you can see alarm setup interface. Alarm in: Here is for you to select channel number. In the main menu, from Setting->Event->Alarm, you can see alarm setup interface.
motion detection (MD), Alarm, MD & alarm. In Figure 4-153, Select icon Now the icon is shown as of several dates, all checked items can be edited together. . Click to delete a record type from one period. In Figure 4-153. Click button after one date or a holiday, you can see an interface shown as in Figure 4-154. There are four record types: regular, motion detection (MD), Alarm, MD & alarm. PTZ activation: When an alarm occurred, system can activate the PTZ operation.
Finally, you can set the alarm input as the local alarm and then select the record channel. The select channel begins alarm record when an alarm occurred. Please note system begins the alarm record instead of the MD record if the local alarm and MD event occurred at the same time. Tour: Here you can enable tour function when an alarm occurs. System supports 1/8-window tour. Please go to chapter4.3.6.2 Display for tour interval setup.
Figure 4-149 .
Figure 4-151 Figure 4-152 153
Figure 4-153 Figure 4-154 Please highlight icon to select the corresponding function. After setting all the setups please click save button. 4.7.10 Abnormality There are three types: Disk/Network/User. Disk: Disk error, no disk, no space. See Figure 4-155. Network: Disconnection, IP conflict, MAC conflict. See Figure 4-156. User: Illegal login. Figure 4-157.
Alarm output: Please select alarm activation output port (multiple choices). Less than: System can alarm you when the HDD space is less than the threshold you set here (For HDD no space type only). Attempts: In user interface, select illegal login from the dropdown list. Here you can set login attempts. The value ranges from 1 to 10. Lock time: In user interface, select illegal login from the dropdown list. Here you can set account lock time. The value ranges from 1 to 30 minutes.
Figure 4-156 Figure 4-157 4.7.11 Alarm output From Main menu->Setting->Event->Alarm output, you can see an interface shown as in Figure 4-158.
Here is for you to set proper alarm output (Auto/manual/stop). Connect the alarm device to the system alarm output port, and set the mode as auto, system can trigger the corresponding operations when an alarm occurs. Auto: Once an alarm event occurs, system can generate an alarm. Manual: Alarm device is always on the alarming mode. Stop: Disable alarm output function. Click OK button of the alarm reset, you can clear all alarm output status.
Figure 4-159 Step 2 Click Add button, the interface is shown as below. See Figure 4-160. Set parameters. Enable: Check the box to enable POS function. Name: Set POS name. 1. Click 2. 3. Input POS name on the pop-up dialogue box. Click OK button. Note The POS name shall be unique. System max supports 64 English letters. Event: Set POS arm/disarm period, record channel and etc. Click Setup to go to the interface. For detailed information, please refer to chapter 4.7.1.1 motion detect.
Turn: Once the overlay information has reached 8 lines, NVR turn to the next page. Roll: Once the overlay information has reached 8 lines, NVR displays the next new line and delete the oldest line. Network overtime: Once there is no POS data for the specified period, NVR automatically deletes POS information after specified period. Font size: The overlay font size. Color: The overlay font color. POS Info: Check the box to overlay information on the local preview window.
Figure 4-160 Step 2 Set privacy information. Step 3 Click OK button. 4.7.12.2 Connection type Connection type is UDP or TCP. Step 1 Click Setup. Enter Setup interface. See Figure 4-161. Figure 4-161 Step 2 Source IP and port refers to POS IP address and port.
Note Destination IP and port refers to NVR IP address and port. System can auto get and display. Step 3 Click OK to complete setup. Connection mode is RS232 or RS485. Step 1 Click Setup. Enter Setup interface. See Figure 4-162. Figure 4-162 Step 2 Set address, baud rate, data bit, stop bit and parity. Note Make sure the parameters here are the same with the POS setup. Step 3 Click OK to complete setup. 4.8 Network 4.8.1 Network Settings 4.8.1.
Network fault-tolerance: In this mode, device uses bond0 to communicate with the external devices. You can focus on one host IP address. At the same time, you need to set one master card. Usually there is only one running card (master card).System can enable alternate card when the master card is malfunction. The system is shown as offline once these two cards are both offline. Please note these two cards shall be in the same LAN.
LAN download: System can process the downloaded data first if you enable this function. The download speed is 1.5X or 2.0X of the normal speed. After completing all the setups please click save button, system goes back to the previous menu. Figure 4-163 Figure 4-164 4.8.1.
The connection setup interface is shown as in Figure 4-165. Max connection: The max client login amount (such as WEB, platform, cellphone and etc). The value ranges from 1 to 128(default). TCP port: Default value is 37777. UDP port: Default value is 37778. HTTP port: Default value is 80. HTTPS port: Select the Enable check box and configure the port according to your actual needs. The default value is 443.
Encryption Type: Select encryption type from the dropdown list. Channel: Please select a channel from the dropdown list. The default setup is auto. Gain: There are three options: High/middle/low. Please select from the dropdown list. Figure 4-166 4.8.1.3.2 Advanced Click Advanced and you can see an interface shown as below. See Figure 4-167. IP Address: Input Wi-Fi AP IP address. Subnet Mask: Input Wi-Fi AP subnet mask. Default Gateway: Input Wi-Fi AP gateway.
Figure 4-167 4.8.1.4 Wi-Fi The Wi-Fi interface is shown as below. See Figure 4-168. Enable: Check the box here to enable Wi-Fi function. Refresh: You can click it to search the hotspot list again. It can automatically add the information such as the password if you have set it before. Disconnect: Here you can click it to turn off the connection. Connect: Here you can click it to connect to the hotspot.
Figure 4-168 Wi-Fi working status: Here you can view current connection status. Please note: After successful connection, you can see Wi-Fi connection icon at the top right corner of the preview interface. When the hotspot verification type is WEP, system displays as AUTO since the device cannot detect its encryption type. System does not support verification type WPA and WPA2. The display may become abnormal for the verification type and encryption type.
When the connection line is green, the channel has conneted to Wi-Fi IPC successfully. Figure 4-169 Step 3 Click after the channel you want to set the repeater function. System displays the icon to add channel. See Figure 4-170.
Figure 4-170 Step 4 Click and select the channel you want to add. After the adding is successful, system displays the following interface. See Figure 4-171.
Figure 4-171 To take Figure 4-171 as an example, the IPC connected to CH1 is the primary repeater and the IPC connected to CH2 is the secondary repeater. Each primary repeater can connect 2 Wi-Fi IPCs at most in series or in parallel. When connecting IPCs in series, the IPC in CH2 works as a secondary repeater to connect the IPC in CH3. See Figure 4-172. When connecting IPCs in parallel, the IPC in CH1 works as a primary repeater to connect the IPCs in CH2 and CH3. See Figure 4-173.
Figure 4-172 Figure 4-173 171
Step 5 Click Apply or OK to save the configuration. Unbinding Repeater If you want to unbind the repeater, click the corresponding channel and the IPC in this channel will connect to the NVR device directly. You can delete repeater IPC only from the last level 4.8.1.6 3G 3G setup interface is shown as below. See Figure 4-174. Please refer to the following contents for the parameter information. Pane 1: Display 3G signal intensity after you enabled 3G function.
1 2 3 Figure 4-174 4.8.1.7 PPPoE PPPoE interface is shown as in Figure 4-175. Input “PPPoE name” and “PPPoE password” you get from your ISP (Internet service provider). Click save button, you need to restart to activate your configuration. After rebooting, NVR will connect to internet automatically. The IP in the PPPoE is the NVR dynamic value. You can access this IP to visit the unit.
Figure 4-175 4.8.1.8 DDNS DDNS (Dynamic Domain Name Server) is to dynamically refresh the DNS domain name and IP address if the device IP address has changed frequently. The user can use the domain to access the device. Preparation Before the operation, make sure the device supports DNS type and go to the DDNS service provider website to register the domain name via the PC. After you register the device and log in the DDNS website, you can view all connected device information of the current user.
Figure 4-176 Step 2 Select the Enable check box to enable DDNS function. When DDNS is enabled, the third-party server might collect your device information. Step 3 Configure the DDNS parameters according to practical situation. Type/address: Dyndns DDNS is members.dyndns.org. NO-IP DDNS is dynupdate.no-ip.com. CN99 DDNS is members.3322.org. Domain: The domain name registered on the DDNS service provider website.
Status: When the UPNP is offline, it shows as “Unknown”. When the UPNP works it shows “Success” Router LAN IP: It is the router IP in the LAN. WAN IP: It is the router IP in the WAN. Port Mapping list: The port mapping list here is the one to one relationship with the router’s port mapping setting. List: Service name: Defined by user. Protocol: Protocol type Internal port: Port that has been mapped in the router. External port: Port that has been mapped locally.
Figure 4-178 4.8.1.10 Email The email interface is shown as below. See Figure 4-179. SMTP server: Please input your email SMTP server IP here. Port: Please input corresponding port value here. User name: Please input the user name to login the sender email box. Password: Please input the corresponding password here. Sender: Please input sender email box here. Title: Please input email subject here. System support English character and Arabic number. Max 32-digit.
Figure 4-179 4.8.1.11 SNMP SNMP is an abbreviation of Simple Network Management Protocol. It provides the basic network management frame of the network management system. SNMP is widely used in various scenarios, network devices, software and systems. Preparation: Install SNMP monitor and management tool, such as MIB Builder and MG-SOFT MIB Browser. Obtain the corresponding MIB file from the technical support. Step 1 Enter from main menu > Setup > Network > SNMP. The SNMP interface is displayed.
Figure 4-180 Step 2 Step 3 Select the SNMP check box. Configure the parameyers. For details, see the following table. Parameter Description Select the check box of the corresponding version. Version System selects V3 by default. There might be risks for V1 and V2. Step 4 Step 5 SNMP Port Enter the SNMP port number. Read Community/Write Community The read community/write community string supported by the program. Trap Address Enter the IP address of the PC installed with MG-SOFT MIB Browser.
2) 3) 4) 5) Compile the two MIB files with MIB Builder. Load the compiled module to the software with MG-SOFT MIB Browser. Enter the PC IP address into MG-SOFT MIB Browser and select the version to search. Expand the tree list in MG-SOFT MIB Browser to view the device configuration information, such as channel number and program version. 4.8.1.
Figure 4-182 4.8.1.13 Alarm Centre This interface is reserved for you to develop. See Figure 4-183. Figure 4-183 4.8.1.14 Auto register This function allows the device to auto register to the proxy you specified. In this way, you can use the client-end to access the NVR and etc via the proxy. Here the proxy has a switch function. In the network service, device supports the server address of IPv4 or domain. Please follow the steps listed below to use this function.
1) The setup interface is shown as in Figure 4-184. Important Do not input network default port such as TCP port number. Figure 4-184 2) The proxy server software developed from the SDK. Please open the software and input the global setup. Please make sure the auto connection port here is the same as the port you set in the previous step. 3) Now you can add device. Please do not input default port number such as the TCP port in the mapping port number.
Figure 4-185 Here we use cell phone APP to continue. Step 1 Use cell phone to scan the QR code and download the APP. Step 2 After installation, run the APP and Live Preview, enter the main interface. Now you can add device to the APP. 1. Open App; tap to go to the Live preview. 2. Tap 3. Tap Device manager button, you can use several modes (P2P/DDNS/IP and etc.) to add at the top left corner, you can see the main menu. the device. Click to save current setup.
Figure 4-186 4.8.1.16 Easy Space This function allows you to upload motion detect record or snapshot image to the dropbox and etc. The easy space interface is shown as below. See Figure 4-187. Please select the easy space address from the dropdown list and then input corresponding user name and password.
The uploaded file is for sub stream only. Please go to record control interface (main stream->setting->Storage->Record) and then select sub stream. The easy space function uses upload bandwidth. Usually the recommended upload bandwidth shall be more than 512kbps and please make sure the network is stable. The easy space upload data adopts safe SSL encryption connection. Please enable 1-channel to upload in case this function occupies too much CPU. 4.8.1.
Type Note Connect After connect the camera to the PoE, NVR allocate an IP address in the camera to the specified IP segment to the camera. NVR tries to use arp ping to set. If the PoE NVR has enabled the DHCP function, it uses DHCP to set. After successfully set IP address, NVR can send out broadcast via the switch and get the corresponding response. Now The camera has registered to the NVR.
Figure 4-189 4.8.2.2 Network Load From main menu->Info-Network->Load, network load is shown as in Figure 4-190. Here you can view the follow statistics of the device network adapter. Here you can view information of all connected network adapters. The connection status is shown as offline if connection is disconnected. Click one network adapter, you can view the flow statistics such as send rate and receive rate at the top panel. Note It is to display LAN1 network load by default.
Figure 4-190 4.9 Storage Here you can view HDD information such as type, status, total capacity, record time and etc. The operation includes format, resume from error, change HDD property (Read write, Read-only). Here you can also set alarm and HDD storage position. 4.9.1 Basic It is to manage HDD storage space. Step 1 From main menu->Setup->Storage->Basic. Enter Basic interface. See Figure 4-191.
Figure 4-191 Step 2 Set parameters. HDD full: It is to select working mode when hard disk is full. There are two options: stop recording or rewrite. Pack duration: It is to specify record duration. The max length is 120 minutes. Auto delete old files: Never: Do not auto delete old files. Customized: input customized period here and system can auto delete corresponding old files. The deleted file cannot be restored. Step 3 Click Apply or Save to complete setup. 4.9.
See Figure 4-192. Figure 4-192 Step 2 Step 3 4.9.4 Select a HDD and then select an time from the dropdown list. Click Execute button. Click OK button to complete the setup. You can see system needs to restart to activate current setup if you want to format the HDD. FTP It is to backup record file or image to the FTP to storage or view. Before the operation, please download or purchase the FTP service tool and install on the PC.
User name/Password: The account for you to access the FTP server. Remote directory: The folder you created under the root path of the FTP according to the corresponding rule. If there is no remote directory, system can auto create different directories according to the IP, time and channel. If there is remote directory, system can create corresponding folder under the FTP root path and then create different folders according to IP address, time and channel.
Figure 4-193 4.9.5 Record Control After you set schedule record or schedule snapshot function, please set auto record/snapshot function so that the NVR can automatically record or snapshot. For detailed information, please refer to chapter 4.1.4.6.3 record control. 4.9.6 HDD Information Here is to list hard disk type, total space, free space, and status. See Figure 4-194. ○ means current HDD is normal.. - means there is no HDD. If disk is damaged, system shows as “?”.
Figure 4-195 Parameter Function SATA 1 here means there is 1 HDD. For different series product, the max HDD amount may vary, When HDD is working properly, system is shown as O. . “_” means there is no HDD. SN You can view the HDD amount the device connected to; ﹡ means the second HDD is current working HDD. Type The corresponding HDD property. Total space The HDD total capacity. Free space The HDD free capacity. Status HDD can work properly or not. Bad track Display there is bad track or not.
4.9.7 HDD Group It is to set HDD group, and HDD group setup for main stream, sub stream and snapshot operation. Caution When you are setting HDD group, please set a HDD for each channel, otherwise NVR cannot save current setup. The main stream is shown as in Figure 4-196. HDD: Here you can view the HDD amount the device can support. Group: It lists the HDD Group number of current hard disk. Figure 4-196 Please select the correspond group from the dropdown list and then click Apply button.
that is recording. 4.9.8.1 Manual Detect From main menu->Setting->Storage->HDD Detect->Manual Detect, the interface is shown as below. See Figure 4-197. Please select detect type and HDD. Click start detect to begin. You can view the corresponding detect information. Figure 4-197 4.9.8.2 Detect Report After the detect operation, you can go to the detect report to view corresponding information. From main menu->Setting->Storage->HDD Detect->Manual Detect, the interface is shown as below. See Figure 4-198.
Figure 4-198 Click View, you can see the detailed information such as detect result, backup and S.M.A.R.T. See Figure 4-199 and Figure 4-200.
Figure 4-200 4.9.9 RAID Manager RAID (redundant array of independent disks) is a data storage virtualization technology that combines multiple physical HDD components into a single logical unit for the purposes of data redundancy, performance improvement, or both. Note RAID function is for some series product only. Slight difference may be found on the user interface. Right now, NVR supports RAID0, RAID1, RAID5, RAID6, and RAID 10. Local hotspare supports RAID1, RAID5, RAID6, and RAID10.
One click to create RAID Click it to automatically create RAID5. For create RAID function, you can select the physical HDD that does not included in the RAID group or the created disk array to create a RAID5. You can refer to the following situations: There is no RAID, no hotspare disk: System directly creates the RAID5 and creates one hotspare disk at the same time. There is no RAID, but there is a hotspare disk: System creates the RAID5 only. It uses previous hotspare disk.
Global: It is global hotspare disk. When any RAID becomes degrading, it can replace and build the RAID. Local: It is local hotspare disk. When the specified RAID becomes degrading, it can replace and build the RAID. Select a hot spare device and then click Delete button. Click Apply button to delete. Figure 4-202 4.10 Device Maintenance and Manager 4.10.1 Account It is to manage users, user group and ONVIF user, set admin security questions.
Figure 4-203 Step 2 Step 3 Click Add user button in Figure 4-203. The interface is shown as in Figure 4-204. Figure 4-204 Input the user name, password, select the group it belongs to from the dropdown list.
can check the corresponding rights for current user. Note For convenient user management, usually we recommend the general user right is lower than the admin account. Step 4 Click the Set button after the period, you can set valid period to use current account. See Figure 4-205. Figure 4-205 Step 5 Step 6 Click Set button, you can set six periods in one day. See Figure 4-206. Check the box after the period, you can enable current setup.
Figure 4-206 Step 7 Click OK button. 4.10.1.1.2 Modify user From main menu->Setting->System->Account->User, click , you can go to the following interface to change user information. See Figure 4-207.
Figure 4-207 For admin user, you can change the email, enable/disable unlock pattern, change password prompt question, set security questions. See Figure 4-208. Figure 4-208 Input email information and then click Save, it is to set/change email address. Check the box to enable unlock pattern and then click , click Save to change unlock pattern. Set security question Step 1 Click Security question, enter the following interface. See Figure 4-209.
Figure 4-209 Step 2 Input answers and then click Save button. After successfully set security questions, you can answer the security questions to reset admin password. Note Select security questions from the dropdown list and then input the proper answers, click Delete button to reset security questions and answers again. 4.10.1.1.3 Change Password In Figure 4-207, check the Modify password box, you can change password. Please input old password, and then input new password twice to confirm.
Figure 4-210 Step 2 Step 3 Click add group button in Figure 4-210. Enter Add group the interface. See Figure 4-211. Input group name and then input some memo information if necessary. Check select authorities.