ƺ Click to pause. ƺ Click to stop. ƺ Click to display AI rule. The icon changes to . ● Add tags. Select one or more images, and then click Add Tag. ● Lock. Select one or more images, and then click Lock. The locked files will not be overwritten. ● Export. Select one or more images, and then click Export to export selected search results in excel. ● Back up.
Select file type, and then click Export to export the report in picture or csv format. 5.9.6 IVS The IVS function processes and analyzes the images to extract the key information to match the specified rules. When the detected behaviors match the rules, the system activates alarms. ● This function is available on select models. ● IVS and face detection cannot be enabled at the same time. 5.9.6.1 Enabling Smart Plan To use AI by camera, you need to enable the smart plan first. For details, see "5.9.
Step 3 Click Add to add a rule. Step 4 On the Type list, select Tripwire. Step 5 Draw the detection rule. 1) Click to draw a straight line or a curve on the surveillance video image. Right-click the image to stop drawing. Figure 5-104 Tripwire (AI by camera) Figure 5-105 Tripwire (AI by recorder) 2) Click to draw the minimum size or maximum size to filter the target.
maximum size and the minimum size. 3) Configure the parameters. Table 5-27 Tripwire parameters Parameter Description Name Customize the rule name. Direction Set the tripwire direction, including AɒB, BɒA and A↔B. Target Filter Click and then select effective target. With Human and Motor Vehicle selected by default, the system automatically identifies the person and motor vehicle appeared within the monitoring range. 4) Click OK. Step 6 Configure alarm schedule and linkage.
Figure 5-107 IVS Step 2 Select channel and AI type. Step 3 Click Add to add a rule. Step 4 On the Type list, select Intrusion. Step 5 Draw the detection rule. 1) Click to draw the rule on the surveillance video image. Right-click the image to stop drawing.
Figure 5-108 Intrusion (AI by camera) Figure 5-109 Intrusion (AI by recorder) 2) Click to draw the minimum size or maximum size to filter the target. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size. 3) Configure the parameters.
Table 5-28 Intrusion parameters Parameter Description Name Customize the rule name. Action Set the intrusion action, including appear and crossing area. Direction Set the direction to cross the area, including enter, exit and both. Target Filter Click and then select effective target. With Human and Motor Vehicle selected by default, the system automatically identifies the person and motor vehicle appeared within the monitoring range. 4) Click OK. Step 6 Configure alarm schedule and linkage.
Figure 5-111 IVS Step 2 Select channel and AI type. Step 3 Click Add to add a rule. Step 4 On the Type list, select Abandoned Object. Step 5 Draw the detection rule. 1) Click to draw a rectangle on the surveillance video image. Right-click the image to stop drawing.
Figure 5-112 Abandoned object rule 2) Click to draw the minimum size or maximum size to filter the target. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size. 3) Configure parameters. Table 5-29 Parameters of abandoned object detection Parameter Description Preset Select a preset you want to use IVS. Name Customize the rule name. Duration The system generates an alarm once the object is in the zone for the defined period.
Figure 5-113 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 7 Select Enable checkbox and then click Apply. 5.9.6.2.4 Fast Moving You can detect the fast moving object in the specified zone.
Figure 5-114 IVS Step 2 Select channel and AI type. Step 3 Click Add to add a rule. Step 4 On the Type list, select Fast Moving. Step 5 Draw the detection rule. 1) Click to draw a rectangle on the surveillance video image. Right-click the image to stop drawing.
Figure 5-115 Fast moving 2) Click to draw the minimum size or maximum size to filter the target. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size. 3) Configure parameters. Table 5-30 Parameter Description Preset Select a preset you want to use IVS Name Customize the rule name. Sensitivity You can set alarm sensitivity. The higher the value, the easier to detect a fast moving object but meanwhile the higher false alarm rate.
Figure 5-116 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 7 Select Enable checkbox and then click Apply. 5.9.6.2.
Figure 5-117 IVS Step 2 Select channel and AI type. Step 3 Click Add to add a rule. Step 4 On the Type list, select Parking. Step 5 Draw the detection rule. 1) Click to draw a rectangle on the surveillance video image. Right-click the image to stop drawing.
Figure 5-118 Parking 2) Click to draw the minimum size or maximum size to filter the target. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size. 3) Configure parameters. Table 5-31 Parameter Description Preset Set the preset point for IVS detection. Name Customize the rule name. Duration Set how long the object stays until the alarm is triggered. 4) Click OK. Step 6 Configure alarm schedule and linkage.
Figure 5-119 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 7 Select Enable checkbox and then click Apply. 5.9.6.2.
Figure 5-120 IVS Step 2 Select channel and AI type. Step 3 Click Add to add a rule. Step 4 On the Type list, select Crowd Gathering Estimation. Step 5 Draw the detection rule. 1) Click to draw a rectangle on the surveillance video image. Right-click the image to stop drawing.
Figure 5-121 Crowd gathering 2) Click to draw the minimum size or maximum size to filter the target. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size. 3) Set parameters. Table 5-32 Crowd gathering parameters Parameter Description Preset Select a preset you want to use IVS. Name Customize the rule name. Duration Set how long the object stays until the alarm is triggered. Sensitivity You can set alarm sensitivity.
Figure 5-122 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 7 Select Enable checkbox and then click Apply. 5.9.6.2.
Figure 5-123 IVS Step 2 Select channel and AI type. Step 3 Click Add to add a rule. Step 4 On the Type list, select Missing. Step 5 Draw the detection rule. 1) Click to draw a rectangle on the surveillance video image. Right-click the image to stop drawing.
Figure 5-124 Missing object 2) Click to draw the minimum size or maximum size to filter the target. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size. 3) Configure parameters. Table 5-33 Parameters of missing object detection Parameter Description Preset Set the preset point for IVS detection according to the actual needs. Name Customize the rule name. Duration Set how long the object stays until the alarm is triggered.
Figure 5-125 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 7 Select Enable checkbox and then click Apply. 5.9.6.2.
Figure 5-126 IVS Step 2 Select channel and AI type. Step 3 Click Add to add a rule. Step 4 On the Type list, select Loitering Detection. Step 5 Draw the detection rule. 1) Click to draw a rectangle on the surveillance video image. Right-click the image to stop drawing.
Figure 5-127 Loitering detection 2) Click to draw the minimum size or maximum size to filter the target. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size. 3) Configure parameters. Table 5-34 Loitering detection parameters Parameter Description Preset Set the preset point for IVS detection. Name Customize the rule name. Duration Set how long the object stays until the alarm is triggered. 4) Click OK.
Figure 5-128 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 7 Select Enable checkbox and then click Apply. 5.9.6.3 AI Search (IVS) You can search for IVS detection results.
Figure 5-129 IVS search Step 2 Select a channel, start time, end time, event type, and then click Search. The search results are displayed. Related Operations ● Play back video. Click an image, and then click to play back the related video. During playback, you can: ƺ Click to pause. ƺ Click to stop. ƺ Click to display AI rule. The icon changes to . ● Add tags. Select one or more images, and then click Add Tag. ● Lock. Select one or more images, and then click Lock.
5.9.7 Stereo Analysis By drawing and setting the rules of stereo behavior analysis, the system will perform alarm linkage actions when the video matches the detection rule. Types of events include: people approach detection, fall detection, violence detection, people No. exception detection and people stay detection. ● This function requires access to a camera that supports stereo behavior analysis. ● Stereo analysis and IVS are mutually exclusive and cannot be enabled at the same time. 5.9.7.
Figure 5-130 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 6 Click Apply. 5.9.7.2.
3) Click OK. Step 5 Configure alarm schedule and linkage. Figure 5-131 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 6 Click Apply. 5.9.7.2.
Step 5 Configure alarm schedule and linkage. Figure 5-132 Schedule and alarm linkage 1) Click . 2) Click Setting next to Schedule to configure the alarm period. The system performs linkage actions only for alarms during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. 3) Configure alarm linkage. For details, see Table 5-42. 4) Click Apply. Step 6 Click Apply. 5.9.7.2.4 People No.
Parameter Description Duration Set the minimum time to trigger an alarm after the system detects an abnormal number of people. Repeat Alarm Time Set repeat alarm time. If the alarm-triggering event continues, an alarm will be triggered again when repeat alarm time passed. Alarm People No. When the number of people in the area is greater than, equal to, or less than the defined threshold, an alarm will be triggered. 3) Click OK. Step 5 Configure alarm schedule and linkage.
stop drawing. 2) Configure parameters. Table 5-39 Parameters of people stay detection Parameter Description Name Customize the rule name. Sensitivity Set alarm sensitivity. Duration Set low long people stay in the detection area until an alarm is triggered. Repeat Alarm Time Set repeat alarm time. If the alarm-triggering event continues, an alarm will be triggered again when repeat alarm time passed. 3) Click OK. Step 5 Configure alarm schedule and linkage.
Figure 5-135 Stereo analysis search Step 2 Select a channel, start time, end time, event type, and then click Search. The search results are displayed. Related Operations ● Play back video. Click an image, and then click to play back the related video. During playback, you can: ƺ Click to pause. ƺ Click to stop. ƺ Click to display AI rule. The icon changes to . ● Add tags. Select one or more images, and then click Add Tag. ● Lock. Select one or more images, and then click Lock.
5.9.8.2 Configuring Video Metadata When a metadata alarm is triggered, the system links the corresponding camera to record videos and logs and take snapshots. Other alarm linkage actions are not supported for video metadata. Step 1 Select Main Menu > AI > Parameters > Video Metadata. Figure 5-136 Video metadata Step 2 Select a channel and AI type. AI by Recorder is available on select models. Step 3 Click Add to add a rule.
Figure 5-137 People detection 2) Enter the rule name. 3) Click to draw the minimum size or maximum size to filter the target. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size. 4) Click to enable face detection. 5) Select A to B, B to A, or Both as direction for tripwire counting. Tripwire counting is available when AI by Camera is used and the camera supports this function. 6) Click OK. Step 6 Click Apply. 5.9.8.
Figure 5-138 Human detection Step 2 Select a channel, start time, end time, and set corresponding parameters. Step 3 Click Search. For privacy protection, the faces are intentionally blurred. Figure 5-139 Search results Related Operations ● Play back video. Click an image, and then click to play back the related video.
During playback, you can: ƺ Click to pause. ƺ Click to stop. ƺ Click to display AI rule. The icon changes to . ● Add tags. Select one or more images, and then click Add Tag. ● Lock. Select one or more images, and then click Lock. The locked files will not be overwritten. ● Export. Select one or more images, and then click Export to export selected search results in excel. ● Back up.
Figure 5-140 Motor vehicle detection Step 2 Select a channel and then set parameters. ● The system supports fuzzy search of plate numbers. ● The system searches all plate numbers by default if you have not set a plate number. Step 3 Click Search. The search results are displayed. Related Operations ● Play back video. Click an image, and then click to play back the related video. During playback, you can: ƺ Click to pause. ƺ Click to stop. ƺ Click to display AI rule.
Select one or more images, click Backup, select the storage path and file type, and then click Start to export files to external storage device. 5.9.8.3.3 Non-motor Vehicle Detection You can search for non-motor vehicle detection results according to the non-motor vehicle parameters. This function is available on select models. Procedure Step 1 Select Main Menu > AI > AI Search > Non-Motor Vehicle Detection .
Figure 5-142 Search results Related Operations ● Play back video. Click an image, and then click to play back the related video. During playback, you can: ƺ Click to pause. ƺ Click to stop. ƺ Click to display AI rule. The icon changes to . ● Add tags. Select one or more images, and then click Add Tag. ● Lock. Select one or more images, and then click Lock. The locked files will not be overwritten. ● Export.
Figure 5-143 Metadata statistics Step 2 Select channel, report type, start time and end time, direction and then click Search. Related Operations ● Switch chart type. Click Bart Chart or Line Chart to switch the chart type. ● Export. Select file type, and then click Export to export the report in picture or csv format. 5.9.9 ANPR The system extracts the plate number on the surveillance video and then compare it with the specified plate information.
Figure 5-144 Vehicle blocklist/allowlist Step 2 Click Add. Step 3 Set plate information such as plate number, car owner name, select Block List or Allow List, and then set validity period. Step 4 Click OK. Related Operations ● Search. Enter keywords for Plate No. and Owner Name, select type and then click Search. ● Import and export plate information. ƺ Import: Click Import, select the corresponding file, and then click Browse to import the file.
Figure 5-145 ANPR Step 2 Select a channel and then select the Enable checkbox to enable ANPR. Step 3 (Optional) Enable Sync Vehicle Blocklist/Allowlist to synchronize the blocklist and allowlist on the NVR to the connected camera. Step 4 Click General (default), Blocklist or Allowlist tab. Before enabling the blocklist alarm or allowlist alarm, you need to add the corresponding plate information. ● General: The system triggers an alarm when it detects any plate number.
5.9.10 Crowd Distribution The system detects the crowd distribution. When the crowd density exceeds the defined threshold, an alarm is triggered. 5.9.10.1 Enabling Smart Plan To use AI by camera, you need to enable the smart plan first. For details, see "5.9.2 Smart Plan". 5.9.10.2 Configuring Crowd Distribution Configure the alarm rules of crowd distribution detection. Prerequisites Make sure that the connected camera supports the crowd distribution function.
Step 4 Click Setting next to Schedule to configure the arming period. The system triggers corresponding alarm actions only during the arming period. ● On the time line, drag to set the period. ● You can also click to set the period. Step 5 Configure alarm linkage actions. For details, see Table 5-42. Step 6 Click Apply. 5.9.10.3 Report Query You can search for and export video metadata statistics. ● The statistics might be overwritten when the storage space runs out. Back up in time.
Figure 5-147 People counting Step 2 Select a channel and then click Add. Step 3 Select the Enable checkbox and then set Type to People Counting. Step 4 Draw people counting rule. 1) Click to draw people counting rule. Right-click the image to stop drawing. Figure 5-148 People counting rule 2) Customize the rule name and then select direction. 3) Click OK. Step 5 Click under Parameters and then configure the parameters.
Table 5-41 People counting parameters Parameter Description ● Select Enter No., and then the number of people entering the detection zone will be displayed on the live page. OSD ● Select Exit No., and then the number of people leaving the detection zone will be displayed on the live page. ● Enter No.: An alarm is triggered when the number of people entering the detection zone exceeds the defined threshold. ● Exit No.
2) Configure the parameters. 3) Click OK. Step 5 Click and then enable in-area people number alarm and stay alarm. Step 6 Click under Trigger to configure the alarm schedule and linkage Step 7 Click Apply. 5.9.11.4 Queuing After configuring queuing alarm, the system can realize the corresponding linkage actions once the number of people in the queue or the waiting time has triggered an alarm. Step 1 Select Main Menu > AI > Parameters > People Counting > Queuing.
Figure 5-151 People counting Step 2 Select channel, rule, report type, start and end time, and direction, and then click Search. Related Operations ● Switch chart type. Click Bart Chart or Line Chart to switch the chart type. ● Export. Select file type, and then click Export to export the report in picture or csv format. 5.9.
Figure 5-152 Heat map Step 2 Select a channel and then click to enable the function. Step 3 Click Setting to configure the alarm schedule. Figure 5-153 Schedule Step 4 Click Apply. 5.9.12.3 Report Query You can search for and export the heat map report of general and fisheye cameras. 5.9.12.3.1 General Step 1 Select Main Menu > AI > Report Query > Heat Map > General.
Figure 5-154 General Step 2 Select the channel, start time, and end time. Step 3 Click Search. Step 4 Click Export to export the heat map. 5.9.12.3.2 Fisheye Step 1 Select Main Menu > AI > Report Query > Heat Map > Fisheye. Figure 5-155 Fisheye Step 2 Set channel, type and period, and then click Search. Step 3 Click Export to export the heat map.
5.9.13 SMD You can use SMD (Smart Motion Detection) to detect humans and vehicles in the video, and store the detection results in structured storage for fast retrieval. 5.9.13.1 Enabling Smart Plan To use AI by camera, you need to enable the smart plan first. For details, see "5.9.2 Smart Plan". 5.9.13.2 Configuring SMD Step 1 Select Main Menu > AI > Parameters > SMD. Figure 5-156 SMD Step 2 Select a channel and AI type. Step 3 Click Step 4 Configure the sensitivity. to enable the function.
Table 5-42 Alarm linkage parameters Parameter Description Anti-Dither The system records only one motion detection event within the defined period. Alarm-out Port When an alarm occurs, the NVR links the alarm output device to generate an alarm. The alarm lasts a period of time depending on the defined value for Post-Alarm. ● Make sure that the alarm devices are connected to the Post-Alarm alarm output port of NVR.
Parameter Description When an alarm occurs, the system takes a snapshot of the channel and stores the snapshot on the Device. Picture Storage Make sure that snapshot schedule and snapshot mode have been configured. For details, see "5.8.1 Recording Schedule". Buzzer The system activates the buzzer when an alarm occurs. Log When an alarm occurs, the system records the event in the logs. When an alarm occurs, the system plays the selected audio file.
Figure 5-157 Vehicle density Step 2 Select a channel and then click Add. Step 3 Select the Enable checkbox and then select a detection type. Step 4 Click to draw the detection rule. Step 5 Click under Parameters and then configure the parameters. Step 6 Click under Trigger to configure alarm schedule and linkage. Step 7 Click Apply. 5.9.14.3 Report Query You can search for and export statistics on vehicle density. ● The statistics might be overwritten when the storage space runs out.
Figure 5-158 Vehicle density Step 2 Select channel, report type, start and end time, and then click Search. Related Operations ● Switch chart type. Click Bart Chart or Line Chart to switch the chart type. ● Export. Select file type, and then click Export to export the report in picture or csv format. 5.9.15 Main-sub Tracking Main-sub tracking refers to fisheye camera and speed dome linkage system. The fisheye camera serves as the main camera and captures panoramic videos.
Table 5-43 Main-sub tracking parameters Parameter Description Select a type according to the number of fisheye and PTZ cameras: ● 1 Fisheye + 1 PTZ. Type ● 1 Fisheye + 2 PTZ. ● 1 Fisheye + 3 PTZ. Scene Name Main Camera Customize the scene name. Select a fisheye camera. 1. Click Select in Main Camera line. 2. Select a fisheye camera. 3. Click Apply. Sub Camera Select speed domes as needed. 1. Click Select in Sub Camera line. 2. Select speed domes. 3. Click Apply. Step 3 Click Apply.
Step 5 Click to save the newly added calibration point. Step 6 Repeat Step 2 to Step 5 to add more calibration points. Set 3–8 calibration points for a speed dome. Step 7 Click Apply. 5.9.16 Video Quality Analytics When conditions such as blurry, overexposure, or the color changes appear on the screen, the system triggers the alarm. ● This function takes effect only when the remote IPC supports video quality analytics. ● This function is available on select models. 5.9.16.
Figure 5-160 Video quality analytics settings The value range of threshold is 0–100, and the default value is 30. When the value exceeds the set threshold, an alarm will be triggered. Table 5-45 Video quality analytics parameters Parameter Description Stripe Stripes refer to the striped interferences in the video which might be due to device aging or signal interference. The stripe might be horizontal, vertical, or oblique.
5.9.16.2 Analytics List Search for the results of video quality analytics. Step 1 Select Main Menu > AI > AI Search > Analytics List. Step 2 Select the start time and end time. Step 3 Select one or more channels. Step 4 Click Search. Figure 5-161 Analytics list 5.9.17 Entries Frequency After setting entries frequency, when the entries detected of a person reach or exceed the threshold, an alarm is triggered.
Figure 5-162 Entries frequency Step 2 Click Setting to select a database and then click OK. Step 3 Click and then configure the parameters.
Figure 5-163 Configure entries frequency Table 5-46 Entries frequency parameters Parameter Description Statistical Cycle Set the cycle for counting the entries frequency. Entries Detected Set the threshold of entries frequency. When the entries detected reaches or exceeds the threshold, an alarm is triggered. Alarm Name The name is Entries Frequency by default. You can change the name. Step 4 Click Apply. 5.10 Alarm Settings 5.10.
Figure 5-164 Alarm information Step 2 Select the event type, and then set the search period. Step 3 Click Search. The search results are displayed. Related Operations ● Play back alarm videos. Select an alarm event log, click to play the recorded video of alarm event. ● Back up. Select an alarm event log and then click Backup to back up it to peripheral USB device. ● View alarm details. Double-click a log or click Details to view the detailed information of the event. 5.10.
Figure 5-165 Alarm status 5.10.3 Alarm Input Step 1 Select Main menu > ALARM > Alarm-in Port. Step 2 Click each tab to configure alarm input settings. ● Local alarm: After connect the alarm device to the NVR alarm input port, the system performs alarm linkage actions when there is an alarm signal from the alarm input port to the NVR. ● Alarm box: You can connect the alarm box to the RS-485 port of the Device.
Figure 5-166 Local alarm Step 3 Click Setting next to Schedule to configure the alarm schedule. Step 4 Configure the anti-dither period. If multiple alarms occur during the anti-dither period, the system only record the event once. Step 5 Configure alarm linkage. For details, see Table 5-42. Step 6 Enable Disarming so that you can connect a switch to the alarm input port for disarming Step 7 Click Apply. control. 5.10.
Figure 5-167 Alarm-out port Step 2 Select the alarm mode of the alarm output channel. Step 3 Click Apply. ● Click OK next to Alarm Reset to clear all alarm output statuses. ● View the alarm output status on the Status column. 5.10.5 Video Detection The system can analyze the video and check whether there is considerable change or not. Once video has changed considerably (for example, there is any moving object, video is distorted), the system performs alarm linkage actions. 5.10.5.
Figure 5-168 Motion detection Step 2 Select a channel and then click Step 3 Configure the detection region. to enable the function. 1) Click Setting next to Region. 2) Point to the middle top of the page. 3) Select one region, for example, click . 4) Drag on the screen to select the region that you want to detect. 5) Configure the parameters. Table 5-47 Detection region parameters Parameter Description Name Enter a name for the region.
Step 4 Click Setting next to Schedule to configure the alarm schedule. Step 5 Configure the anti-dither period. If multiple alarms occur during the anti-dither period, the system only record the event once. Step 6 Configure alarm linkage. For details, see Table 5-42. Step 7 Click Apply. 5.10.5.2 Video Loss When the video loss occurs, the system performs alarm linkage actions. Step 1 Select Main Menu > ALARM > Video Detection > Video Loss.
tampering alarm settings. Step 1 Select Main Menu > ALARM > Video Detection > Video Tampering. Figure 5-170 Video tampering Step 2 Select a channel and then click to enable the function. Step 3 Click Setting next to Schedule to configure the alarm schedule. Step 4 Configure alarm linkage. For details, see Table 5-42. Step 5 Click Apply. 5.10.5.4 Scene Change Background Information When the detected scene has changed, system performs alarm linkage actions.
Figure 5-171 Scene changing Step 2 Select a channel and then click to enable the function. Step 3 Click Setting next to Schedule to configure the alarm schedule. Step 4 Configure alarm linkage. For details, see Table 5-42. Step 5 Click Apply. 5.10.5.5 PIR Alarm PIR function helps enhancing the accuracy and validity of motion detect. It can filter the meaningless alarms that are activated by the objects such as falling leaves and flies.
Figure 5-172 PIR Step 2 Select a channel and then click Step 3 Configure the detection region. to enable the function. 1) Click Setting next to Region. 2) Point to the middle top of the page. 3) Select one region, for example, click . 4) Drag on the screen to select the region that you want to detect. 5) Configure the parameters. Table 5-48 Detection region parameters Parameter Description Name Enter a name for the region.
Step 5 Configure the anti-dither period. If multiple alarms occur during the anti-dither period, the system only record the event once. Step 6 Configure alarm linkage. For details, see Table 5-42. Step 7 Click Apply. 5.10.6 Audio Detection Background Information The system can generate an alarm once it detects the audio is not clear, the tone color has changed or there is abnormal or audio volume change. Procedure Step 1 Select Main Menu > ALARM > Audio Detection.
Figure 5-173 Thermal alarm Step 2 Select a channel and set alarm type to heat alarm, and then enable the function. Step 3 Select fire mode. The system supports preset mode and zone excluded mode. ● Preset mode: Select a preset and then enable the function. The system generates an alarm once it detects there is a fire. ● Zone excluded mode: The system filters the specified high temperature zone. The system generates an alarm once the rest zone has fire. Step 4 Configure alarm linkage.
Figure 5-174 Disk exception Step 2 Click each tab and then select an event type. ● Disk: The system detects HDD error, no HDD, no space, and other HDD events. ● Network: The system detects network errors such as disconnection, IP conflict, and MAC conflict. ● Device: The system detects device errors such as abnormal fan speed and network security error. Step 3 Click to enable the function. Step 4 (Optional) If the event type is Low Space, you need to configure the threshold of storage space.
Figure 5-175 Disarming Step 3 (Optional) To enable scheduled disarming, click Setting next to Duration of Disarm by Period, and then set periods. Scheduled disarming is only effective when Disarming is Off. Figure 5-176 Scheduled disarming ● Drag your mouse to select time blocks. ● Green blocks indicates that disarming is enabled. ● You can also click Step 4 to set time periods. One day can have 6 periods at most. Select the alarm linkage actions to disarm.
This function is only effective when the connected camera supports one-click disarming. Step 6 Click Apply. 5.11 Network Configure the network settings to ensure the Device can communicate with other devices on the same LAN. 5.11.1 TCP/IP You can configure the settings for the Device such as IP address, DNS according to the networking plan. Step 1 Select Main Menu > NETWORK > TCP/IP. Figure 5-177 TCP/IP Step 2 Click to configure the NIC card, and then click OK.
Figure 5-178 TCP/IP Table 5-49 TCP/IP parameters Parameter Description ● Single NIC: The current NIC card works independently. If the current NIC card is disconnected, the Device becomes offline. ● Fault Tolerance: Two NIC cards share one IP address. Normally only one NIC card is working. When this card fails, the other NIC card will start working automatically to ensure the network connection. The Device is regarded as offline only when both NIC cards are Network Mode disconnected.
Parameter Description Enable the system to allocate a dynamic IP address to the Device. There is no need to set IP address manually. ● If you want to manually configure the IP information, disable the DHCP DHCP function first. ● If PPPoE connection is successful, the IP address, subnet mask, default gateway, and DHCP are not available for configuration. IP Address Subnet Mask Enter the IP address and configure the corresponding subnet mask and default gateway.
Figure 5-179 Routing table Step 2 Add the routing table. ● Auto add. When you add a camera to the NVR and the IP address of the camera is not on the existing routing table, the system will add the routing information. ● Manual add. Configure the parameters such as destination address, netmask, and gateway, and then click Add. Step 3 ƺ The destination address and netmask must not be on the same LAN. ƺ The netmask must be valid and on the same LAN with the NIC card.
Figure 5-180 Port Step 2 Configure the parameters. The parameters except Max Connection take effect after the Device restarts. Table 5-50 Port parameters Parameter Description Max Connection The allowable maximum clients accessing the Device at the same time, such as web client, platform, and mobile client. TCP Port Transmission control protocol port. Enter the value according to your actual situation. UDP Port User datagram protocol port. Enter the value according to your actual situation.
5.11.4 External Wi-Fi The Device can be connected to wireless network with an external Wi-Fi module. Prerequisites Make sure that external Wi-Fi module is installed on the Device. Background Information This function is available on select models. Procedure Step 1 Select Main Menu > NETWORK > Wi-Fi. Figure 5-181 Wi-Fi Step 2 Configure the parameters.
Step 3 Click Apply. ● After the connection is successful, a Wi-Fi connection signal flag appears in the upper-right corner of the live view page. ● The Wi-Fi module models currently supported are D-LINK, dongle and EW-7811UTC wireless cards. 5.11.5 Wi-Fi AP You can configure Wi-Fi parameters for the NVR to ensure that a wireless IPC can connect to the NVR through Wi-Fi AP. This function requires the built-in Wi-Fi module in the Device. 5.11.5.
Figure 5-182 General settings Step 2 Select Wi-Fi to enable Wi-Fi. Step 3 Configure parameters. Table 5-52 Parameters of general settings Parameter Description SSID Wi-Fi name for the device. Hide SSID Hide the Wi-Fi name. Encryption Type Select an encryption mode from WPA2 PSK and WPA PSK. Password Set the Wi-Fi password for the Device. Select Channel Select the channel for device communication. Network Proxy Enable the external network access through the Device for a wireless IPC.
Figure 5-183 Advanced settings Step 2 Configure parameters. Table 5-53 Parameters of advanced settings Parameter Description IP Address Set IP address, subnet mask and default gateway for the Wi-Fi of NVR. Subnet Mask IP address and default gateway must be on the same network Default Gateway Start IP Set the start IP address and end IP address of the DHCP server. End IP Preferred DNS Alternate DNS Step 3 segment. Set preferred and alternate DNS server address. Click Apply. 5.11.
Background Information This function is available on select models. Procedure Step 1 Select Main Menu > NETWORK > 3G/4G. Figure 5-184 3G/4G The page is divided into three main areas: ● Zone 1 displays a 3G/4G signal indication. ● Zone 2 displays 3G/4G module configuration information. ● Zone 3 displays the status information of the 3G/4G module.
5.11.7 Cellular Network Connect the Device to mobile network and view network status and traffic of the cellular network. Prerequisites A SIM card is inserted in the recorder. This function is available on select models. Procedure Step 1 Select Main Menu > NETWORK > Cellular Network > Cellular Network. Step 2 Enable cellular network and configure parameters. Figure 5-185 Configuring cellular network Table 5-55 4G cellular network parameters Parameter Description NIC Name Select a NIC.
Figure 5-186 Network status ● View data traffic. Click the Data Traffic tab to view the daily and monthly data usage. Figure 5-187 Cellular data usage 5.11.8 Repeater The Device supports relay settings for the wireless relay IPC to extend video transmission distance and range. Prerequisites ● The Device has the built-in Wi-Fi module. ● The IPC has wireless relay module.
This function is available on select models. Procedure Step 1 Power on the NVR and wireless relay IPC, and connect all IPCs to the NVR through Wi-Fi. Step 2 Select Main Menu > NETWORK > REPEATER. ● Green connection line represents the successful connection between channel and wireless IPC. ● Auto cascade: After selecting auto cascade, the IPC can cascade to NVR automatically. Figure 5-188 Step 3 Select Manual Cascade.
You can use manual cascade when there are at least two IPCs on the network. Figure 5-189 Manual cascade Step 4 Click and select the channel to be added. Figure 5-190 Added channel Step 5 Click Apply. 5.11.9 PPPoE PPPoE is another way for the Device to access the network.
configuring PPPoE settings to give the Device a dynamic IP address on the WAN. To use this function, firstly you need to obtain the username and password from the Internet Service Provider. Procedure Step 1 Select Main Menu > NETWORK > PPPoE. Figure 5-191 PPPoE Step 2 Enable the PPPoE function. Step 3 Enter the username and password provided by the Internet Service Provider. Step 4 Click Apply. The IP address appears on the PPPoE page. You can use this IP address to access the Device.
Figure 5-192 DDNS Step 2 Enable DDNS and then configure the parameters. After you enable DDNS function, the third-party server might collect your device information. Table 5-56 DDNS parameters Parameter Description Type Displays the type and address of DDNS service provider. ● For Dyndns DDNS, the default address is members.dyndns.org. Server Address ● For NO-IP DDNS, the default address is dynupdate.no-ip.com. ● For CN99 DDNS, the default address is members.3322.org.
Step 3 Connect the Device with the LAN port on the router to connect into the LAN. Step 4 Select Main Menu > NETWORK > TCP/IP, configure the IP address into the router IP address range, or enable the DHCP function to obtain an IP address automatically. 5.11.11.2 Configuring UPnP Procedure Step 1 Select Main Menu > NETWORK > UPnP. Figure 5-193 UPnP Step 2 Configure the settings for the UPnP parameters. Table 5-57 UPnP parameters Parameter Description Port Mapping Enable the UPnP function.
Parameter Description The settings on port mapping list correspond to the UPnP port mapping list on the router. ● Service Name: Name of network server. ● Protocol: Type of protocol. ● Internal Port: Internal port that is mapped on the Device. ● External Port: External port that is mapped on the router. Port Mapping List ● To avoid the conflict, when setting the external port, try to use the ports from 1024 through 5000 and avoid popular ports from 1 through 255 and system ports from 256 through 1023.
Figure 5-194 Email Step 2 Click to enable the function. Step 3 Configure the email parameters. Table 5-58 Email parameters Parameter Description SMTP Server Enter the address of SMTP server of sender’s email account. Port Enter the port of SMTP server. The default value is 25. Username Password Enter the username and password of sender’s email account. Anonymous Enable anonymous login. Receiver Select the receiver to receive the notification. You can select up to three receivers.
Parameter Description Interval (Sec.) Set the interval at which the system sends an email for the same type of alarm event to avoid excessive pileup of emails caused by frequent alarm events. The value ranges from 0 to 3600. 0 means that there is no interval. Health Mail Enable the health test function. The system can send a test email to check the connection. Sending Interval Set the interval at which the system sends a health test email. The value ranges from 30 to 1440.
Figure 5-195 SNMP Step 2 Click to enable the function. Step 3 Configure the parameters. Table 5-59 SNMP parameters Parameter Description Select the checkbox of SNMP version that you are using. Version The default version is V3. There is a risk if you use V1 or V2. SNMP Port Read Community Write Community Enter the monitoring port on the agent program. Enter the read and write strings supported by the agent program.
Parameter Description Encryption Password Enter the encryption password. Step 4 Click Apply. Step 5 Compile the two MIB files by MIB Builder. Step 6 Run MG-SOFT MIB Browser to load in the module from compilation. Step 7 On the MG-SOFT MIB Browser, enter the device IP that you want to manage, and then select the version number to query.
Parameter Description Port Enter the port for the multicast. The port ranges from 1025 through 65000. Step 3 Click Apply. You can use the multicast IP address to log in to the web. On the web login page, on the Type list, select Multicast. The web will automatically obtain the multicast IP address and join the multicast group. Then you can view the video through multicast function. 5.11.
Step 4 Click Apply. 5.11.16 Register You can register the Device into the specified proxy server which acts as the transit to enable the client software to access the Device ● The proxy server has been deployed. ● The Device, the proxy server and the device running the client software are on the same network. Procedure Step 1 Select Main Menu > NETWORK > Register. Figure 5-198 Register Step 2 Click to enable the function. Step 3 Configure the parameters.
IP address to the IPC according to the defined IP segment, and the NVR will automatically connect to the IPC. ● Only models with PoE ports support this function. ● Do not connect the PoE port with a switch, otherwise it will cause connection failure. ● This function is enabled by default, and the IP segment start from 10.1.1.1. We recommend you use the default setting. ● When connecting to a third-party IPC, make sure that the IPC supports ONVIF protocol and DHCP is enabled.
Table 5-63 PoE operation Description When an IPC is connected to the PoE port, the system automatically assigns the IP address to the IPC according to the set IP segment. The NVR will try the method of arp ping to assign the IP address. If DHCP is enabled on the NVR, the NVR will use DHCP to assign the IP address. ● When IP address is successfully set, the system will broadcast Connect to PoE port through the switch function.
Figure 5-200 P2P Step 2 Enable the P2P function. After you enable the P2P function and connect to the Internet, the system will collect the information such as email address and MAC address for remote access. Step 3 Click Apply. The P2P function is enabled. You can use your phone to scan the QR code under Mobile Client to download and install the mobile client. After that, you can use the mobile client to scan the QR code under Device SN to add the Device for remote management.
Figure 5-201 Basic storage Step 2 Set parameters. Table 5-64 Basic storage parameters Parameter Disk Full Description Configure the storage strategy to be used when no more storage space is available ● Stop: Stop recording ● Overwrite: The newest files overwrite the oldest ones. Create Video Files Configure the time length and file length for each recorded video. Configure whether to delete the old files. ● Select Auto and then configure how long you want to keep the old files.
Figure 5-202 Disk manager View HDD Information You can view the physical position, properties, status and storage capacity of each HDD. Configure HDD Properties In the Properties column, you can set read and wire, read-only and redundant HDD. When there are two or more HDDs installed on the Device, you can set one HDD as redundant disk to back up recorded files. Format HDD Select an HDD, click Format, and then follow the on-screen prompts to format the HDD.
RAID function is available on select models. Table 5-65 Disk quantity for different RAID types RAID type Required disk quantity RAID 0 At least 2. RAID 1 Only 2. RAID 5 At least 3. We recommend using 4 disks to 6 disks. RAID 6 RAID 10 At least 4. 5.12.3.1 Creating RAID RAID has different levels, such as RAID 5 and RAID 6. Each level has different data protection, data availability, and performance grade. You can create different types of RAID as needed.
Figure 5-203 RAID Step 2 Select RAID type and working mode. The working mode determines how the system allocate resources. ● Self-Adaptive: Automatically adjust the RAID synchronization speed according to the business status. ƺ When there is no business running, synchronization is performed at a high speed. ƺ When there is business running, synchronization is performed at a low speed. ● Sync First: Resource priority is assigned to RAID synchronization.
Click to change the working mode of the RAID group. ● Delete RAID. Click to delete the RAID group. When you delete a RAID group, the disks in the RAID group will be formatted. 5.12.3.2 Viewing RAID Information Select Main Menu > STORAGE > RAID > RAID Info. You can view the RAID information, including type, disk space, hot spare, and status. 5.12.3.3 Creating Hot Spare Disk You can create a hot spare disk.
Figure 5-205 Local hotspare Figure 5-206 Global hotspare Step 3 You can select Local Hotspare or Global Hotspare. ● Local Hotspare: Select the target disk, and the current disk will serve as the hot spare disk for the selected target disk. ● Global Hotspare: The current disk will serve as the hot spare disk of the entire RAID. Step 4 Click OK. Click to delete a hot spare disk. 5.12.4 Disk Group By default, the installed HDD and created RAID are in Disk Group 1.
Figure 5-207 Disk group Step 2 (Optional) If Disk Quota is selected is shown on the page, click Switch to Disk Group Mode and then follow the on-screen instructions to format disks. Step 3 Select the group for each HDD, and then click Apply. After configuring HDD group, under the Main Stream tab, Sub Stream tab and Snapshot tab, configure settings to save the main stream, sub stream and snapshot to different disk groups. 5.12.
Figure 5-208 Disk Quota Step 2 (Optional) If Disk group mode selected is shown on the page, click Switch to Quota Mode and then follow the on-screen instructions to format disks. Step 3 Select a channel and set the record duration, bit rate and storage capacity of picture. Step 4 Click Apply. 5.12.6 Disk Check The system can detect HDD status so that you can clearly understand the HDD performance and replace the malfunctioning HDD. 5.12.6.
Figure 5-209 Manual check Step 2 Select the detection type. ● Key area detection: The system detects the used space of the HDD through the built-in file system. This type of detection is efficient. ● Global detection: The system detects the entire HDD through Window. This type of detection takes time and might affect the HDD that is recording. Step 3 Select the HDD that you want to detect Step 4 Click Start Check. The system starts detecting the HDD and displays the detection information.
Figure 5-210 Check report Step 2 Click to view detection results and S.M.A.R.T report.
Figure 5-211 Results Figure 5-212 S.M.A.R.T 5.12.6.3 Disk Health Monitoring Monitor health status of disks, and repair if any exceptions are found so as to avoid data loss. Select Main Menu > STORAGE > Disk Check > Health Monitoring. Click to show disk details interface. Then select Check Type, set time period, and then click Search. The system shows the details of disk monitoring status.
Figure 5-213 Disk details 5.12.7 Record Estimate Record estimate function can calculate how long you can record video according to the HDD capacity, and calculate the required HDD capacity according to the record period. Step 1 Select Main Menu > STORAGE > Rec Estimate.
Figure 5-214 Record estimation Step 2 Click . You can configure the Resolution, Frame Rate, Bit Rate and Record Time for the selected channel. Figure 5-215 Modify channel settings Step 3 Click Apply. Then the system will calculate the time period that can be used for storage according to the channels settings and HDD capacity.
Click Copy to to copy the settings to other channels. 5.12.7.1 Calculating Recording Time Procedure Step 1 On the Rec Estimate interface, click the By Space tab. Figure 5-216 By space Step 2 Click Select. Step 3 Select the checkbox of the HDD that you want to calculate. Figure 5-217 Recording time 5.12.7.2 Calculating HDD Capacity for Storage Step 1 On the Rec Estimate interface, click the By Time tab.
For the created FTP user, you need to set the write permission; otherwise the upload of recorded videos and snapshots will be failed. Procedure Step 1 Select Main Menu > STORAGE > FTP. Figure 5-219 FTP Step 2 Configure the parameters. Table 5-66 FTP parameters Parameter Description Enable Enable the FTP upload function. Select FTP type. FTP type ● FTP: Plaintext transmission. ● SFTP: Encrypted transmission (recommended). Server Address IP address of FTP server.
Parameter Description Password If you enable the anonymity function, you can log in anonymously without entering the username and password. Anonymous Create folder on FTP server. ● If you do not enter the name of remote directory, the system Storage Path automatically creates the folders according to the IP and time.
This function is available on select models. Step 1 Select Main Menu > STORAGE > iSCSI. Figure 5-220 iSCSI Step 2 Set parameters. Table 5-67 iSCSI parameters Parameter Description Server Address Enter the server address of iSCSI server. Port Enter the port of iSCSI server, and the default value is 3260. Click Storage Path to select a remote storage path.
5.13.1 Group The accounts of the Device adopt two-level management mode: user and user group. Every user must belong to a group, and one user only belongs to one group. The admin and user group are two default user groups that cannot be deleted. You can add more groups and define corresponding permissions. Step 1 Select Main Menu > ACCOUNT > Group. Figure 5-221 Group Step 2 Click Add. Step 3 Enter group name and then enter some remarks if necessary.
Figure 5-222 Add group Step 4 Select the checkboxes to select permissions. Step 5 Click OK. Click to modify the corresponding group information, click 5.13.2 User 5.13.2.1 Adding User Procedure Step 1 Select Main Menu > ACCOUNT > User. 305 to delete the group.
Figure 5-223 User Step 2 Click Add. Figure 5-224 Add user Step 3 Configure the parameters. Table 5-68 Parameters of adding user Parameter Username Password Confirm Password Description Enter a username and password for the account. Enter the password again to confirm it.
Parameter Remarks User MAC Description Optional. Enter a description of the account. Enter user MAC address Select a group for the account. Group The user rights must be within the group permissions. Click Setting to define a period during which the new account can log in to the Device. The new account cannot access the device during other periods. Period Select the checkboxes to grant permissions to the user.
Figure 5-225 Change password Step 3 Click to enable the Modify Password function. Step 4 Enter old password and then enter new password twice. ● The password must consist of 8–32 non-blank characters and contain at least two types of the following characters: uppercase, lowercase, numbers, and special characters (excluding ' " ; : &). ● For your device security, create a strong password. ● Check the box to enable Unlock Pattern function, click Step 5 Click Step 6 Click OK.
5.13.3.2 Resetting Password on Local Interface Procedure Step 1 Right-click the live page and then select any item on the shortcut menu. ● If you have configured unlock pattern, the unlock pattern login window is displayed. Click Forgot Pattern to switch to password login. ● If you did not configure unlock pattern, the password login window is displayed.
Figure 5-226 Pattern login Figure 5-227 Password login 310
Step 2 Click . ● If you have set the linked email address, the system will notify you of data collection required for resetting password. Click OK. ● If you did not set the linked email address, the system prompts you to enter an email address. Enter the email address and then click Next. Then the system will notify you of data collection required for resetting password. Figure 5-228 Notification on data colleciton Step 3 Read the prompt and then click OK. Step 4 Click Next.
Figure 5-229 Enter new password Step 8 Click OK. The password is reset. Step 9 (Optional) When the system prompts whether to synchronize the password with the remote devices accessed through the private protocol, click OK to synchronize the password. 5.13.4 ONVIF User Background Information To connect the camera from the third party to the NVR via the ONVIF protocol, you need to use a verified ONVIF account. The default ONVIF user is admin.
Figure 5-230 ONVIF user Step 2 Click Add. Figure 5-231 Add ONVIF user Step 3 Configure username, password and user group. Step 4 Click OK.
Click to modify the corresponding user information, click to delete current user. 5.14 Security 5.14.1 Security Status Security scanning helps get a whole picture of device security status. You can scan user, service and security module status for detailed information on the security status of the device. Detecting User and Service Green icon represents a healthy status of the scanned item, and orange icon represents a risky status.
Figure 5-232 Security status Figure 5-233 Details (1) ● Configuration Security: When there’s a risk in the device configuration, the icon will be in orange to warn risk. You can click Details to see the detailed risk description.
Figure 5-234 Details (2) Scanning Security Modules This area shows the running status of security modules. For details about the security modules, point to the icon to see the on-screen instructions. Re-scanning Security Status You can click Rescan to scan security status. 5.14.2 System Service You can set NVR basic information such as basic services, 802.1x and HTTPS. 5.14.2.1 Basic Services Procedure Step 1 Select Main Menu > SECURITY > System Service > Basic Services.
Figure 5-235 Basic services Step 2 Enable the system services. There might be safety risk when Mobile Push Notifications, CGI, ONVIF, SSH and NTP Server is enabled. Disable these functions when they are not needed. Table 5-69 Basic service parameters Parameter Description Mobile Push Notifications After enabling this function, the alarm triggered by the NVR can be pushed to a mobile phone. This function is enabled by default.
Parameter Description Enable the LLDP service. The Link Layer Discovery Protocol (LLDP) allows two different devices to collect hardware and protocol information about neighboring devices, which is useful in troubleshooting the network. LLDP Step 3 Click Apply. 5.14.2.2 802.1x The Device needs to pass 802.1x certification to enter the LAN. Procedure Step 1 Select Main Menu > SECURITY > System Service > 802.1x. Figure 5-236 802.1x Step 2 Select the Ethernet card you want to certify.
Parameter Description CA Certificate Enable it and click Browse to import CA certificate from flash drive. For details about importing and creating a certificate, see "5.14.4 CA Certificate". Username The username shall be authorized at server. Password Password of the corresponding username. Step 4 Click Apply. 5.14.2.3 HTTPS Background Information We recommend you enable HTTPS function to enhance system security. Procedure Step 1 Select Main Menu > SECURITY > System Service > HTTPS.
Figure 5-238 Firewall Step 2 Click to enable the firewall. Step 3 Select a firewall mode. ● Allow List: The hosts on the allowlist can access the Device. ● Block List: The hosts on the blocklist are prohibited to access the Device. Step 4 Click Add and then select a type for the allowlist or blocklist. You can allow or prohibit hosts through a specific IP address, a network segment, or a MAC address. ● IP address. Enter the IP address, start port and end port, and then click OK. ● IP segment.
Figure 5-239 Account lockout Step 2 Set parameters. Table 5-71 Account lockout parameters Parameter Description Attempt(s) Set the maximum number of allowable wrong password entries. The account will be locked after your entries exceed the maximum number. Lock Time Set how long the account is locked for. Step 3 Click Apply. 5.14.3.3 Anti-Dos Attack You can enable SYN Flood Attack Defense and ICMP Flood Attack Defense to defend the Device against Dos attack.
Figure 5-241 Sync Time-Allowlist Step 2 Click to enable the function. Step 3 Click Add to add trusted hosts for time synchronization. ● If you set Type to IP Address, enter the IP address, and then click OK. ● If you set Type to IP Segment, enter the start address and end address, and then click OK. Step 4 Click Apply. 5.14.4 CA Certificate 5.14.4.1 Device Certificate Create Certificate 1. Select Main Menu > SECURITY > CA Certificate > Device Certificate.
Figure 5-242 Device certificate 2. Click Create Certificate. Figure 5-243 Create certificate 3. Configure the parameters. 4. Click Create. CA Application and Import Click CA Application and Import and then follow the on-screen instructions to finish CA application and import.
Figure 5-244 CA application and import Import Third-Party Certificate 1. Click Import Third-Party Certificate 2. Configure the parameters. Table 5-72 Parameters for importing third-party certificate Parameter Description Path Click Browse to find the third-party certificate path on the USB drive. Private Key Click Browse to find the third-party certificate private key on the USB drive. Private Key Password Input the private key password. 3. Click Create. 5.14.4.
Figure 5-245 Create certificate Step 3 Click Browse to select the certificate that you want to install. Step 4 Click Import. 5.14.5 Audio/Video Encryption Background Information The Device supports audio and video encryption during data transmission. Procedure Step 1 Select Main Menu > SECURITY > AUDIO/VIDEO ENCRYPTION > Audio/Video Transmission.
Figure 5-246 Audio and video transmission Step 2 Configure parameters. Table 5-73 Audio and video transmission parameters Area Parameter Description Enables stream frame encryption by using private protocol. Enable There might be safety risk if this service is disabled. Private Protocol Encryption Type Use the default setting. Update Period of Secret Key Secret key update period. Value range: 0–720 hours. 0 means never update the secret key. Default value: 12.
Figure 5-247 Security exception Step 2 Click Click to enable the function. to view the list of security exception events. Step 3 Configure alarm linkage actions. For details, see Table 5-42. Step 4 Click Apply. 5.14.6.2 Illegal Login Step 1 Select Main Menu > SECURITY > Security Warning > Illegal Login.
Figure 5-248 Illegal login Step 2 Click to enable the function. Step 3 Configure alarm linkage actions. For details, see Table 5-42. Step 4 Click Apply. 5.15 System 5.15.1 General You can set NVR basic information such as system date and holiday. 5.15.1.1 General Background Information You can set device basic information such as device name, and serial number. Step 1 Select Main Menu > SYSTEM > General > Basic.
Figure 5-249 Basic settings Step 2 Set parameters. Table 5-74 Basic parameters Parameter Description Device Name Enter the Device name. Device No. Enter a number for the Device. Language Select a language for the Device system. Video Standard Select PAL or NTSC as needed. Sync Remote Device Enable this function; the NVR can synchronize information with the remote device such as Language, video standard and time zone.
Parameter Mouse Sensitivity Step 3 Description Adjust the speed of double-click by moving the slider. The bigger the value is, the faster the speed is. Click Apply button to save settings. 5.15.1.2 Date and Time Background Information You can set device time. You can enable NTP (Network Time Protocol) function so that the device can sync time with the NTP server. You can also configure date and time settings by selecting Main Menu > SYSTEM > General > Date&Time. Step 1 Click Date&Time tab.
Parameter Description Date Format In the Date Format list, select a date format for the system. Date Separator In the Date Separator list, select a separator style for the date. Time Format In the Time Format list, select 12-HOUR or 24-HOUR for the time display style. DST Enable the Daylight Saving Time function. Click Week or Date. Start Time End Time Configure the start time and end time for the DST. Enable the NTP function to sync the Device time with the NTP server.
Figure 5-251 Holiday Step 2 Click Add Holidays. Figure 5-252 Add holidays Step 3 Set holiday name, repeat mode and holiday mode. Click Add more to add new holiday information. Step 4 Click Add, you can add current holiday to the list. ● Click the drop-down list of the state; you can enable/disable holiday date. ● Click Step 5 to change the holiday information. Click Click Next to save settings. 332 to delete current date.
5.15.2 Serial Port Background Information After setting RS-232 parameters, the NVR can use the COM port to connect to other device to debug and operate. Procedure Step 1 Select MAIN MENU > SYSTEM > Serial Port. Figure 5-253 Serial port Step 2 Configure parameters. Table 5-76 Serial port parameters Parameter Description Select serial port control protocol. ● Console: Upgrade the program and debug with the console and mini terminal software. ● Keyboard: Control this Device with special keyboard.
5.16 Output and Display 5.16.1 Display Background Information You can configure the display effect such as displaying time title and channel title, adjusting image transparency, and selecting the resolution. Procedure Step 1 Select Main Menu > DISPLAY > Display. Figure 5-254 Display Step 2 Configure the parameters. Table 5-77 Display parameters Parameter Description Configure the output port format of both screens.
Parameter Description Time Title/Channel Title Select the checkbox and the date and time of the system will be displayed in the preview screen. Image Enhancement Select the checkbox to optimize the preview image edges. SMD Preview Select the checkbox to display the SMD previews in the live view interface. Select the checkbox to display the AI rules in the live view interface. AI Rule This function is for some series products only.
Figure 5-255 Tour ● On the top right of the live view screen, use the left mouse button or press Shift to switch between (image switching is allowed) and (image switching is not allowed) to turn on/off the tour function. ● On the navigation bar, click Step 2 to enable the tour and click to disable it. Configure the tour setting parameters. Table 5-78 Tour parameters Parameter Description Enable Tour Enable tour function.
5.16.3 Custom Layout Background Information You can set customized video split mode. ● This function is for some series products. See the actual product for detailed information. ● Device max. supports 5 customized videos. Procedure Step 1 Select Main Menu > DISPLAY > Custom Split. Figure 5-256 Custom split Step 2 Click and then click to select basic mode. System adopts the basic window mode as the new window name. For example, if you select the 8 display mode, the default name is Split8.
● After merge the window, system adopts the remaining window amount as the new name such as Split6. ● Select the window you want to merge (red highlighted), click to cancel the merge to restore the basic mode. ● Click to delete the customized window mode. Figure 5-257 Merged window Step 3 Click Apply to exit. After the setup, you can go to the preview window, right-click and then select Live Layout to select the custom split layout. 5.
5.17.1 Settings Procedure Step 1 Select Main Menu > POS > POS Setting. Figure 5-258 POS setting Step 2 Configure the POS parameters. Table 5-79 POS parameters Parameter Description In the POS Name list, select the POS machine that you want to configures settings for. Click to modify the POS name. POS Name ● The POS name must be unique. ● You can enter up to 21 Chinese characters or 63 English characters. Enable Enable the POS function. Record Channel Click Privacy Enter the privacy contents.
Parameter Description In the Overlay Mode list, Select Turn or ROLL. ● Turn: Once the information is at 16 lines, system displays the next page. ● ROLL: Once the information is at 16 lines, system rolls one line after another to delete the first line. Overlay Mode When the local preview mode is in 4-split, the turn/ROLL function is based on 8 lines.
Step 3 Click OK. 5.17.1.2 Connection Mode Background Information Connection type is UDP or TCP. Procedure Step 1 Select Connection Mode as UDP, TCP_CLINET or TCP. Step 2 Click . Figure 5-260 IP address Step 3 For Source IP and Port, enter the POS IP address and port. Step 4 Click OK. 5.17.2 Search The system supports fuzzy search. Step 1 Select Main Menu > POS > POS Search.
Figure 5-261 POS search Step 2 In the POS Search box, enter the information such as transaction number on your receipt, amount, or product name. Step 3 In the Start Time box and End Time box, enter the time period that you want to search the POS transaction information. Step 4 Click Search. The searched transaction results display in the table. 5.18 Audio The audio function is to manage audio files and set schedule play function. It is to realize audio broadcast activation function.
Figure 5-262 File management Step 2 Click Add. Figure 5-263 Add file Step 3 Select the audio file and then click Import. System supports MP3 and PCM audio format. Step 4 Click OK to start importing audio files from the USB storage device. If the importing is successful, the audio files will display in the File Management page.
5.18.2 Audio Play Background Information You can configure the settings to play the audio files during the defined time period. Procedure Step 1 Select Main Menu > AUDIO > Schedule. Figure 5-264 Schedule Step 2 Configure the parameters. Table 5-80 Schedule parameters Parameter Description Period In the Period box, enter the time. Select the checkbox to enable the settings. You can configure up to six periods.
Procedure Step 1 Select Mani Menu > AUDIO > Broadcast. Figure 5-265 Broadcast Step 2 Click Add Group. Figure 5-266 Add group (1) Step 3 Input group name and select one or more channels. Step 4 Click Save to complete broadcast group setup.
● On the broadcast interface, click to change group setup, click to delete group. ● After complete broadcast setup, on the preview interface and then click on the navigation bar, device pops up broadcast dialogue box. Select a group name and then click to begin broadcast. Figure 5-267 Add group (2) 5.19 Operation and Maintenance 5.19.1 Log You can view and search for the log information, or back up log to the USB device. Procedure Step 1 Select Main Menu > MAINTAIN > Log.
Figure 5-268 Log Step 2 In the Type list, select the log type that you want to view (System, Config, Storage, Record, Account, Clear Log, Playback, and Connection) or select All to view all logs. Step 3 Enter the time period to search, and then click Search. The search results are displayed. Related Operations ● Click Details or double-click the log to view details. Click Next or Previous to view more log information. ● Click Backup to back up the logs to the USB storage device.
5.19.2.3 HDD Info You can view the HDD quantity, HDD type, total space, free space, status, and S.M.A.R.T information. Select Main Menu > MAINTAIN > System Info > Disk. Figure 5-269 Disk information Table 5-81 Disk information Parameter Description No. Indicates the number of the currently connected HDD. The asterisk (*) means the current working HDD. Device Name Indicates name of HDD. Physical Position Indicates installation position of HDD. Properties Indicates HDD type.
Figure 5-270 BPS 5.19.2.5 Device Status You can view fan running status such as speed, CPU temperature, and memory. Select Main Menu > MAINTAIN > System Info > Device Status.
Figure 5-271 Device status 5.19.3 Network 5.19.3.1 Online User You can view the online user information or block any user for a period of time. To block an online user, click and then enter the time that you want to block this user. The maximum value you can set is 65535. The system detects every 5 seconds to check whether there is any user added or deleted, and update the user list timely. Select Main Menu > MAINTAIN > Network > Online User.
Figure 5-272 Online user 5.19.3.2 Network Load Background Information Network load means the data flow which measures the transmission capability. You can view the information such as data receiving speed and sending speed. Procedure Step 1 Select Main Menu > MAINTAIN > Network > Network Load.
Figure 5-273 Network load Step 2 Click the LAN name that you want to view, for example, LAN1. The system displays the information of data sending speed and receiving speed. ● System displays LAN1 load by default. ● Only one LAN load can be displayed at one time. 5.19.3.3 Network Test Background Information You can test the network connection status between the Device and other devices. Procedure Step 1 Select Main Menu > MAINTAIN > Network > Test.
Figure 5-274 Test Step 2 In the Destination IP box, enter the IP address. Step 3 Click Test. After testing is completed, the test result is displayed. You can check the evaluation for average delay, packet loss, and network status. 5.19.4 Maintenance and Management 5.19.4.1 Device Maintenance Background Information When the Device has been running for a long time, you can enable the Device to restart automatically at the idle time. You can also enable emergency maintenance.
Figure 5-275 Maintenance Step 2 Configure the parameters. ● Auto Reboot: Enable the Device to restart at the idle time. ● Emergency Maintenance: When the Device has an update power outage, running error and other problems, and you cannot log in, then you can use the emergency maintenance function to restart the Device, clear configuration, update the system, and more. Step 3 Click Apply. 5.19.4.
Figure 5-276 Import and export Step 2 Insert a USB storage device into one of the USB ports on the Device. Step 3 Click Refresh to refresh the interface. The connected USB storage device is displayed.
Figure 5-277 Connected USB device Step 4 Click Export. There is a folder under the name style of "Config_[YYYYMMDDhhmmss]". Double-click this folder to view the backup files. 5.19.4.3 Restoring Defaults 5.19.4.3.1 Restoring Defaults on the Local Interface Background Information This function is for admin account only. You can restore the Device to default settings on the local interface. Procedure Step 1 Select Main Menu > MAINTAIN > Manager > Default.
Figure 5-278 Default Step 2 Restore the settings. ● Default: Restore all the configurations except network settings and user management to the default.. ● Factory Default: Restore all the configurations to the factory default settings. 5.19.4.3.2 Resetting Device through the Reset Button Background Information You can use the reset button on the mainboard to reset the Device to the factory default settings. The reset button is available on select models.
Figure 5-279 Reset button Step 4 Restart the Device. After the Device restarts, the settings have been restored to the factory default. 5.19.4.4 System Update 5.19.4.4.1 Upgrading File Procedure Step 1 Insert a USB storage device containing the upgrade files into the USB port of the Device. Step 2 Select Main Menu > MAINTAIN > Manager > Update Figure 5-280 Update Step 3 Click Update.
Figure 5-281 Browse Step 4 Click the file that you want to upgrade. Step 5 The selected file is displayed in the Update File box. Step 6 Click Start. 5.19.4.4.2 Online Upgrade Background Information When the Device is connected to Internet, you can use online upgrade function to upgrade the system. Before using this function, you need to check whether there is any new version by auto check or manual check. ● Auto check: The Device checks if there is any new version available at intervals.
5.19.4.4.3 Uboot Upgrading ● Under the root directory in the USB storage device, there must be "u-boot.bin.img" file and "update.img" file saved, and the USB storage device must be in FAT32 format. ● Make sure the USB storage device is inserted; otherwise the upgrading cannot be performed.
You can add a USB keyboard through USB port, and it can input characters limited to soft keyboard. Figure 5-283 USB device prompt 5.21 Shutdown ● When you see corresponding dialogue box "System is shutting down…" Do not click power on-off button directly. ● Do not unplug the power cable or click power on-off button to shutdown device directly when device is running (especially when it is recording.) ● Shut down the device and then unplug the power cable before you replace the HDD.
Figure 5-284 Shutdown (1) 2. Select Shutdown. Draw the unlock pattern or input password first if you have no authority to shut down.
Figure 5-285 Shutdown (2) Figure 5-286 Shutdown (3) ● Remote Control Press the power button on the remote for at least 3 seconds. ● Press the power button at the rear panel of the device.
Auto Resume after Power Failure The system can automatically backup video file and resume previous working status after power failure.
6 Web Operation ● The figures in the Manual are used for introducing the operations and only for reference. The actual interface might be different dependent on the model you purchased. ● The Manual is a general document for introducing the product, so there might be some functions described for the Device in the Manual not apply to the model you purchased. ● Besides Web, you can use our Smart PSS to login the device. For detailed information, see Smart PSS user’s manual. 6.
Figure 6-1 Login Step 2 Enter the username and password. ● The default administrator account is admin. The password is the one that was configured during initial settings. To ensure your account security, we recommend you keep the password properly and change it regularly. ● Click Step 3 to display the password. Click Login. 6.3 Web Main Menu After you have logged in to the web, the main menu is displayed. For detailed operations, see "5 Local Operations".
Figure 6-2 Main menu Table 6-1 Main menu symbols No. Icon Includes configuration menu through which you can configure camera settings, network settings, storage settings, system settings, account settings, and view information. 1 2 Description None Displays system date and time. 3 When you point to , the current user account is displayed. 4 Click , select Logout, Reboot, or Shutdown according to your actual situation. Displays Cell Phone Client and Device SN QR Code.
No. Icon Description Includes eight function tiles: LIVE, PLAYBACK, AI, ALARM, POS, OPERATION, BACKUP, DISPLAY, and AUDIO. Click each tile to open the configuration interface of the tile. ● LIVE: You can perform the operations such as viewing real-time video, configuring channel layout, setting PTZ controls, and using smart talk and instant record functions if needed. ● PLAYBACK: Search for and play back the recorded video saved on the Device.
7 Glossary ● DHCP: DHCP (Dynamic Host Configuration Protocol) is one of the TCP/IP protocol cluster. It is mainly used to assign temporary IP addresses to computers on a network. ● DDNS: DDNS (Dynamic Domain Name Server) is a service that maps Internet domain names to IP addresses. This service is useful to anyone who wants to operate a server (web server, mail server, ftp server and more.
8 FAQ Questions Reasons ● Incorrect input power. ● Incorrect connection of the power cord. The Device failed to start properly. ● Damaged power switch. ● Wrong program. ● Damaged HDD. ● Damaged mainboard. ● Unstable or insufficient input voltage. The Device automatically shuts down or stops running. ● Insufficient button power. ● Improper operating environment. ● Hardware error. The Device cannot detect HDD. There is no video output in all channels. ● Damaged HDD or HDD ribbon.
Questions Reasons ● Front panel PTZ error ● PTZ decoder setup, connection or installation is not correct. ● Cable connection is not correct. ● PTZ setup is not correct. ● PTZ decoder and NVR protocol is not compatible. NVR cannot control PTZ. ● PTZ decoder and NVR address is not compatible. ● When there are several decoders, add 120 Ohm between the PTZ decoder A/B cables furthest end to delete the reverberation or impedance matching. Otherwise the PTZ control is not stable. ● The distance is too far.
Questions Reasons ● Alarm setup is not correct. Alarm signal cannot be disarmed. ● Alarm output has been open manually. ● Input device error or connection is not correct. ● Some program versions might have this problem. Upgrade your system. ● Alarm setup is not correct. Alarm function is null. ● Alarm cable connection is not correct. ● Alarm input signal is not correct. ● There are two loops connect to one alarm device. ● Camera quality is too low. Lens is dirty.
Questions Reasons ● Make sure that the IPC has booted up. ● IPC network connection is right and it is online ● IPC IP is in the blocklist. ● The device has connected to the too many IPC. It cannot I cannot connect to the IPC transmit the video. ● Check the IPC port value and the time zone is the same as the NVR. ● Make sure current network environment is stable. After I set the NVR resolution as 1080P, my monitor cannot display. My admin account has been changed and I cannot log in.
Appendix 1 HDD Capacity Calculation Calculate the total capacity needed by each device according to video recording (video recording type and video file storage time). 1. According to Formula (1) to calculate storage capacity that is the capacity of each channel needed for each hour, unit Mbyte. In the formula: means the bit rate, unit Kbit/s 2. After video time requirement is confirmed, according to Formula (2) to calculate the storage capacity , which is storage of each channel needed unit Mbyte.
Appendix 2 Mouse Operation Appendix Table 2-1 Mouse operation Operation Description When you have selected one menu item, left click mouse to view menu content. Modify checkbox or motion detection status. Click combo box to pop up drop-down list In input box, you can select input methods. Left click the corresponding button on the panel you can input numeral/English character (lower case/upper case). Hereɐ stands for backspace button. ˻ stands for space button.
Appendix 3 Remote Control Remote control is not our standard accessory and it is not included in the accessory package. Appendix Figure 3-1 Remote control No. Name Function 1 Power button Press this button to boot up or shut down the device. 2 Address Press this button to input device serial number, so that you can control the Device. 3 Forward Multi-step forward speed and normal speed playback. 4 Slow motion Multi-step slow motion speed or normal playback.
No. Name Function ● In normal playback state, press this button to pause playback. 7 Play/Pause ● In pause state, press this button to resume to normal playback. ● In live view window interface, press this button to enter video search menu. 8 Reverse/pause 9 Esc In the reverse playback state, press this button to pause reverse playback. In the reverse playback pause state, press this button to resume to playback reversing state.
Appendix 4 Compatible Network Camera List Please note all the models in the following list for reference only. For those products not included in the list, please contact your local retailer or technical supporting engineer for detailed information. Appendix Table 4-1 Compatible network camera list Manufacturer Model Version Video Encode Audio/Video Protocol P1346 5.40.9.2 H264 √ ONVIF/Privat e P3344/P334 4-E 5.40.9.2 H264 √ ONVIF/Privat e P5512 ˉ H264 √ ONVIF/Privat e Q1604 5.40.3.
Manufacturer Bosch Brikcom Cannon CNB CP PLUS Model Version Video Encode Audio/Video Protocol AV8185DN 65197 H264 √ Private NBN-921-P ˉ H264 √ ONVIF NBC-455-1 2P ˉ H264 √ ONVIF VG5-825 9500453 H264 √ ONVIF NBN-832 66500500 H264 √ ONVIF VEZ-211-I WTEIVA ˉ H264 √ ONVIF NBC-255-P 15500152 H264 √ ONVIF VIP-X1XF ˉ H264 √ ONVIF B0100 ˉ H264 √ ONVIF D100 ˉ H264 √ ONVIF GE-100-CB ˉ H264 √ ONVIF FB-100A v1.0.3.9 H264 √ ONVIF FD-100A v1.0.3.
Manufacturer Dynacolor Honeywell LG Imatek Panasonic Model Version Video Encode Audio/Video Protocol CP-ND20V L2-R cp20110808B NS H264 √ ONVIF CP-RNP-18 20 cp20120821N SA H264 √ Private CP-RNC-TP 20FL3C cp20120821N SA H264 √ Private CP-RNP-12 D cp20120828A NS H264 √ Private CP-RNC-D V10 cp20120821N SA H264 √ Private CP-RNC-D P20FL2C cp20120821N SA H264 √ Private ICS-13 d20120214N S H264 √ ONVIF/Privat e ICS-20W vt20111123N SA H264 √ ONVIF/Privat e NA222
Manufacturer Model Version Video Encode Audio/Video Protocol WV-SP102 H 1.41 H264 √ ONVIF/Privat e WV-SP105 H ˉ H264 √ ONVIF/Privat e WV-SP302 H 1.41 H264, MPEG4 √ ONVIF/Privat e WV-SP306 H 1.4 H264, MPEG4 √ ONVIF/Privat e WV-SP508 H ˉ H264, MPEG4 √ ONVIF/Privat e WV-SP509 H ˉ H264, MPEG4 √ ONVIF/Privat e WV-SF332 H 1.41 H264, MPEG4 √ ONVIF/Privat e WV-SW316 H 1.41 H264, MPEG4 √ ONVIF/Privat e WV-SW355 H 1.
Manufacturer Model Version Video Encode Audio/Video Protocol WV-SC385 H 1.08 H264, MPEG4 √ ONVIF/Privat e WV-SC386 H 1.08 H264, MPEG4 √ ONVIF/Privat e WV-SP539 1.66 H264, MPEG4 √ ONVIF DG-SC385 1.66 H264, MPEG4 √ ONVIF IXSOLW 1.8.1-201109 12-1.9082-A1 .6617 H264 √ Private IDE20DN 1.7.41.9111-O 3.6725 H264 √ Private D5118 1.7.8.9310-A1 .5288 H264 √ Private IM10C10 1.6.13.9261O2.4657 H264 √ Private DD4N-X 01.02.0015 MPEG4 √ Private DD423-X 01.02.
Manufacturer SANYO Model Version Video Encode Audio/Video Protocol SNC-CH135 1.73.01 H264 √ ONVIF/Privat e SNC-CH140 1.50.00 H264 √ ONVIF/Privat e SNC-CH210 1.73.00 H264 √ ONVIF/Privat e SNC-DH21 0 1.73.00 H264 √ ONVIF/Privat e SNC-DH24 0 1.50.00 H264 √ ONVIF/Privat e SNC-DH24 0-T 1.73.01 H264 √ ONVIF/Privat e SNC-CH26 0 1.74.01 H264 √ ONVIF/Privat e SNC-CH28 0 1.73.01 H264 √ ONVIF/Privat e SNC-RH-12 4 1.73.00 H264 √ ONVIF/Privat e SNC-RS46P 1.73.
Appendix 5 Cybersecurity Recommendations Mandatory actions to be taken for basic device network security: 1. Use Strong Passwords Please refer to the following suggestions to set passwords: ● The length should not be less than 8 characters. ● Include at least two types of characters; character types include upper and lower case letters, numbers and symbols. ● Do not contain the account name or the account name in reverse order. ● Do not use continuous characters, such as 123, abc, etc.
the risk of ARP spoofing. 8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks.
Legal and Regulatory Information Legal Considerations Video surveillance can be regulated by laws that vary from country to country. Check the laws in your local region before using this product for surveillance purposes. Disclaimer Every care has been taken in the preparation of this document. Please inform your nearest Dahua office of any inaccuracies or omissions.
Technology. The most up to date copy of the signed EU Declaration of Conformity (DoC) can be downloaded from: www.dahuasecurity.com/support/notice/ CE-Electromagnetic Compatibility (EMC) This digital equipment is compliant with Class A according to EN 55032. Warning: This is a Class A product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures.
instructions and the antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body.
Technology Equipment. CAUTION This is a Class A equipment. Operation of this equipment in a residential environment could cause radio interference. In such a case, the user may be required to take corrective actions. Batteries Correct disposal of batteries in this product This marking on the battery indicates that the batteries in this product should not be disposed of with other household waste at the end of their working life.
to local laws and regulations. For information about your nearest designated collection point, contact your local authority responsible for waste disposal. In accordance with local legislation, penalties may be applicable for incorrect disposal of this waste. This symbol means that the product shall not be disposed of together with household or commercial waste. Directive 2012/19/EU on waste electrical and electronic equipment (WEEE) is applicable in the European Union member states.
response. If you are connected to the Internet, you can: Download user documentation and software updates. Search by product, category, or phrase. Report problems to Dahua support staff by logging in to your private support area. Chat with Dahua support staff. Visit Dahua Support at www.dahuasecurity.com/support Contact Information ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. Address: No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R.
device for specific working temperature and humidity. Do not place the device in a location exposed to dampness, dust, extreme hot or cold, strong electronic radiation, or unstable lighting condtions. Do not install the device in a place near the heat source, such as radiator, heater, furnace, or other heat generating device to avoid fire. Prevent liquid from flowing into the device to avoid damge to internal components.
Symbol WSKAZÓWKI UWAGA Znaczenie Oznacza wskazówki pozwalające na rozwiązanie problemu lub oszczędność czasu. Oznacza informacje uzupełniające tekst główny. Wymogi dot. Bezpieczeństwa Przestrzegaj lokalnych standardów bezpieczeństwa elektrycznego celem upewnienia się, że źródło napięcia jest stabilne i zgodne z wymogami określonymi dla urządzenia. Urządzenie należy transportować, używać i przechowywać w warunkach o dozwolonym poziomie wilgotności i temperatury.
Sikkerhedsanvisninger Følgende signalord med beskrivelse kan forekomme i vejledningen. Signalord Beskrivelse FARE Angiver høj risiko, som, hvis den ikke undgås, kan medføre død eller alvorlig personskade. ADVARSEL Angiver middel eller lav risiko, som, hvis den ikke undgås, kan medføre lettere til moderat personskade. FORSIGTIG Angiver mulig risiko, som hvis den ikke undgås, kan resultere i skade på ejendom, tab af data, reduceret ydelse eller uforudsigelige resultater.
Bortskaf brugte batterier i overensstemmelse med lokale bestemmelser eller batteriproducentens anvisninger. Suomi Tärkeitä varotoimenpiteitä ja varoituksia Tässä luvussa kuvataan laitteen asianmukainen käsittely, vaarojen torjunta ja omaisuusvahinkojen estäminen. Lue tämä sisältö huolellisesti ennen laitteen käyttämistä ja noudata näitä ohjeita, kun käytät laitetta. Säilytä ohjeet tulevia tarpeita varten.
Paristo Alhainen pariston varaustaso vaikuttaa tosiaikakellon (RTC:n) toimintaan nollaten sen jokaisella käynnistyskerralla. Lokiviesti ilmestyy tuotteen palvelinraporttiin, kun paristo on vaihdettava. Lisätietoa palvelinraportista saat tuotteen asetussivuilta tai ottamalla yhteyttä Dahuan tukeen. VAROITUS Räjähdysvaara, jos paristo asetetaan väärin paikalleen. Vaihda vain samanlaiseen paristoon tai Dahuan suosittelemaan paristoon.
A tűz elkerülése érdekében ne telepítse az eszközt hőforrás, mint például radiátor, hősugárzó, kemence, vagy más hőtermelő eszköz közelében lévő helyre. A belső alkatrészek károsodásának elkerülése érdekében akadályozza meg, hogy folyadék folyjon az eszközbe. A leesésének megakadályozása érdekében az eszközt vízszintesen telepítse, vagy stabil helyre telepítse. Az eszközt jól szellőző helyre telepítse, és ne blokkolja az eszköz szellőzését. Önkényesen ne szerelje szét az eszközt.
Сигнални думи Значение СЪВЕТИ Обозначава начини, които да ви помогнат да разрешите проблем или да спестите време. ЗАБЕЛЕЖКА Предоставя допълнителна информация като акцент и допълнение към основния текст. Изисквания за безопасност Спазвайте местните стандарти за електрическа безопасност, за да осигурите стабилно напрежение, отговарящо на изискването за захранване на устройството.
Dispozitivului Instructiuni de siguranta Urmatoarele semne categorizate pot aparea in Ghid. Signal Words PERICOL AVERTIZARE ATENTIE SFATURI NOTA Meaning Indică un risc potențial ridicat care, dacă nu este evitat, va duce la deces sau vătămări grave. Indică un pericol potențial mediu sau scăzut care, dacă nu este evitat, poate duce la răni ușoare sau moderate.
AVERTIZARE Risc de explozie dacă bateria este înlocuită incorect. Înlocuiți numai cu o baterie identică sau cu o baterie recomandată de Dahua. Aruncați bateriile uzate în conformitate cu reglementările locale sau cu instrucțiunile producătorului bateriei. Čeština Důležitá bezpečnostní opatření a varování Tato kapitola popisuje obsah vztahujícíse na správnou manipulaci se zařízením, prevenci nebezpečí a prevenci škod na majetku.
Zařízení instalujte na dobře větraném místě a neblokujte odvětrávání zařízení. Zařízení svévolně nedemontujte. Během přepravy, skladování a instalace zamezte silnému tlaku, prudkým vibracím a namočení. Při přepravě je nezbytné úplné zabalení. Při přepravě použijte obal z výroby nebo obdobnýobal. Baterie Nízké nabití baterie ovlivňuje fungování hodin ve skutečném čase a způsobuje, že se při každém spuštění resetují.
Σήματα με λέξεις ΣΥΜΒΟΥΛΕΣ ΣΗΜΕΙΩΣΗ Σημασία Παρέχει μεθόδους που θα σας βοηθήσουν να επιλύσετε ένα πρόβλημα ή να εξοικονομήσετε χρόνο. Παρέχει πρόσθετες πληροφορίες δίνοντας έμφαση και συμπληρώνοντας το κείμενο. Απαιτήσεις ασφαλείας Τηρήστε τα τοπικά πρότυπα ηλεκτρικής ασφάλειας για να βεβαιωθείτε ότι η τάση είναι σταθερή και συμμορφώνεται με την απαίτηση τροφοδοσίας της συσκευής.
hrvatski Važne zaštitne mjere i upozorenja Ovo poglavlje opisuje sadržaj koji obuhvaća pravilno rukovanje uređajem, sprječavanje opasnosti i sprečavanje oštećenja imovine. Pažljivo pročitajte ove sadržaje prije korištenja Uređaja, pridržavajte ih se pri upotrebi i sačuvajte ih za buduću uporabu. Sigurnosne upute U vodiču se mogu pojaviti sljedeće kategorizirane signalne riječi s definiranim značenjem.
zaštitno pakiranje. Koristite tvorničko pakiranje ili ekvivalent za transport. Baterija Niska baterija utječe na rad RTC, uzrokujući da se resetira pri svakom uključivanju. Kad bateriju treba zamijeniti, pojaviti će se poruka u izvješću poslužitelja (server). Dodatne informacije o izvješću poslužitelja (server) potražite na stranicama priručnika proizvoda ili se obratite Dahua podršci. UPOZORENJE Rizik od eksplozije ako se baterija nepravilno zamijeni.
vlhkosti a teploty. Prečítajte si príslušné technické špecifikácie zariadenia pre špecifickú pracovnú teplotu a vlhkosť. Zariadenie neumiestňujte na miesto vystavené vlhkosti, prachu, extrémnemu teplu alebo chladu, silnému elektronickému žiareniu alebo nestabilným podmienkam osvetlenia. Zariadenie neinštalujte na miesto, ktoré sa nachádza blízko zdroja tepla, ako je napríklad radiátor, ohrievač, pec alebo iné zariadenie na tvorbu tepla. Predídete tak vzniku požiaru.
Oznaka UPOZORENJE OPREZ PREPORUKE BELEŠKA Značenje Označava opasnost srednje ili niske potencijale koja bi, ukoliko se ne izbegne, mogla dovesti do blagih ili umerenih povreda. Označava potencijalni rizik koji bi, ukoliko se to ne izbegne, mogao dovesti do oštećenja imovine, gubitka podataka, niže performanse ili nepredvidivog rezultata. Pruža metode za pomoć u rešavanju problema ili uštede vremena. Pruža dodatne informacije kao naglasak i dodatak tekstu.
Türkçe Önemli Kurallar ve Uyarılar Bu Bölüm, Cihazın doğru kullanımını, tehlike önlemeyi ve mal zararının önlenmesini kapsayan içerikleri anlatmaktadır. Cihazı kullanmadan önce bu içerikleri dikkatli şekilde okuyun, kullanırken bunlara uyun ve ileride başvurmak üzere saklayın. Güvenlik Talimatları Aşağıda, belirtilen açıklamaya sahip kategorize edilmiş uyarı sözcüklerini Kılavuzda görebilirsiniz.
Cihazı iyi havalandırılan bir yere monte edin ve cihazın hava sirkülasyonunu engellemeyin. Cihazın parçalarını gelişigüzel sökmeyin. Cihazın nakliyesi, saklanması ve montajı esnasında ağır baskılardan, şiddetli sarsıntılardan ve sıvıya batmalardan kaçının. Cihazın nakliyesi esnasında ambalajın tamamı gereklidir. Nakliye için fabrikasyon ambalajı ya da eş değerini kullanın. Pil Düşük pil gücü, her güç açma esnasında sıfırlanmasına neden olarak RTC’nin çalışmasını etkiler.
סִמון מִלוע התְה משמתוע .ולהשלמתו לטקסט להדגשה נוסף מידע מספקת ִטִחוע דְִשע ותואם יציב שהמתח להבטיח מנת על בחשמל לבטיחות המקומיים התקנים לכל לציית יש .המכשיר של החשמל אספקת לדרישות .המותרים והלחות הטמפרטורה לתנאי בהתאם יעשו המוצר של ואחסון שימוש ,הובלה המוגדרים וללחות לטמפרטורה המכשיר של המקבילים הטכניים למפרטים להתייחס יש .
Précautions d’emploi Les mentions d’avertissement catégorisées suivantes ayant un sens défini sont susceptibles d’apparaître dans le manuel. Mentions d’avertissement DANGER AVERTISSEMENT AVERTISSEMENT Signification Indique un danger à risque élevé qui entraînera la mort ou des blessures graves si les instructions données ne sont pas respectées. Indique une situation moyennement ou faiblement dangereuse qui entraînera des blessures faibles ou modérées si les instructions données ne sont pas respectées.
Batterie Un niveau de batterie faible affecte le fonctionnement du RTC, qui se réinitialisera à chaque redémarrage. Lorsque la batterie doit être remplacée, un message de journal apparaît dans le rapport du serveur du produit. Pour plus d’informations sur le rapport du serveur, consultez les pages de configuration du produit ou contactez l’assistance Dahua. AVERTISSEMENT Risque d’explosion si la batterie est remplacée de façon incorrecte.
correspondientes del dispositivo para la temperatura y humedad operativas específicas. No coloque el dispositivo en un lugar expuesto a humedad, polvo, calor o frío extremos, radiaciones electrónicas fuertes o condiciones de iluminación inestables. No instale el dispositivo en un lugar cerca de fuentes de calor, como radiadores, calentadores, hornos u otros dispositivos generadores de calor, para evitar un incendio.
Signalwörter Bedeutung WARNUNG VORSICHT Weist auf eine mittlere oder geringe potentielle Gefahr hin, die, wenn sie nicht vermieden wird, zu leichten oder mittelschweren Verletzungen führen kann. Weist auf ein potenzielles Risiko hin, das, wenn es nicht vermieden wird, zu Sachschäden, Datenverlust, geringerer Leistung oder unvorhersehbaren Ergebnis führen kann. TIPPS Stellt Methoden bereit, mit denen Sie ein Problem lösen oder Zeit sparen können.
Explosionsgefahr. Ersetzen Sie die Batterie nur durch eine identische Batterie oder eine Batterie, die von Dahua empfohlen wird. Entsorgen Sie leere Batterien entsprechend den örtlichen Vorschriften oder den Anweisungen des Batterieherstellers. Italiano Norme di sicurezza e avvertenze importanti Il presente capitolo descrive le procedure per una corretta manipolazione del dispositivo, per la prevenzione dei rischi e per la prevenzione di danni materiali.
Installare il dispositivo in un ambiente adeguatamente ventilato e non ostruire la circolazione dell'aria. Non smontare il dispositivo in modo casuale. Evitare forte sollecitazioni, violente vibrazioni e non bagnare il prodotto durante il trasporto, lo stoccaggio e l’installazione. Trasportare il prodotto utilizzando un imballaggio adeguato. Utilizzare l'imballaggio standard previsto o un imballaggio equivalente.
Veiligheidsvereiste Houdt u aan plaatselijke veiligheidsstandaarden om ervoor te zorgen dat het voltage stabiel is en voldoet aan de vereiste stroomvoorziening van het apparaat. Transporteer, gebruik en bewaar het apparaat onder de toegestane relatieve luchtvochtigheid en temperatuuromstandigheden. Zie de overeenkomstige technische specificaties van het apparaat voor specifieke werktemperatuur en relatieve luchtvochtigheid.
Palavras-sinal Significado ATENÇÃO Indica um risco potencial elevado que, se não for evitado, resultará em morte ou ferimentos graves. Indica um risco potencial médio ou baixo que, se não for evitado, poderá resultar em ferimentos ligeiros ou moderados. Indica um risco potencial que, se não for evitado, pode resultar em danos materiais, perda de dados, desempenho inferior ou resultados imprevisíveis. SUGESTÕES Disponibiliza métodos para o ajudar a resolver um problema ou a poupar o seu tempo.