all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manual | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User Manual | Users Manual | 4.47 MiB | July 20 2021 | |||
1 |
|
Internal Photos | Internal Photos | 3.76 MiB | July 20 2021 | |||
1 |
|
External Photos | External Photos | 1.54 MiB | July 20 2021 | |||
1 |
|
Label | ID Label/Location Info | 224.06 KiB | July 20 2021 | |||
1 |
|
Appendix A 1 for DTS rev2 | Test Report | 4.06 MiB | July 20 2021 | |||
1 |
|
Appendix A 2 for DTS rev2 | Test Report | 3.65 MiB | July 20 2021 | |||
1 |
|
Applicant Declaration Letter Rev0.0 | Cover Letter(s) | 629.11 KiB | July 20 2021 | |||
1 |
|
MPE | RF Exposure Info | 1.07 MiB | July 20 2021 | |||
1 |
|
SGS FCC Confidentiality request | Cover Letter(s) | 262.14 KiB | July 20 2021 | |||
1 |
|
SGS FCC agent auth letter | Cover Letter(s) | 134.61 KiB | July 20 2021 | |||
1 |
|
Test Setup photos-FCC | Test Setup Photos | 1.90 MiB | July 20 2021 | |||
1 |
|
Test report for DTS | Test Report | 2.09 MiB | July 20 2021 |
1 | User Manual | Users Manual | 4.47 MiB | July 20 2021 |
Network Speed Dome & PTZ Camera
User’s Manual
Web 3.0
V2.0.2
Foreword
General
Safety Instructions
The manual introduces the functions and operations of the web interface of the network speed
dome and PTZ camera (hereinafter referred to as "the Device").
The following categorized signal words with defined meaning might appear in the manual.
Signal Words
Meaning
Indicates a high potential hazard which, if not avoided, will result
in death or serious injury.
Indicates a medium or low potential hazard which, if not
avoided, could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, lower performance, or
unpredictable result.
Provides methods to help you solve a problem or save you time.
Provides additional information as the emphasis and
supplement to the text.
Revision History
Version
Revision Content
Release Time
V2.0.2
V2.0.1
V2.0.0
V1.1.1
Added the note to provide
international calling codes for 4G
models.
Updated OSD info, TCP/IP and
smart plan, and delete life
statistics.
Added some functions of the
Baseline, and refine the whole
manual.
Updated some functions of the
Security Baseline.
June 2020
April 2020
January 2020
September 2019
V1.0.0
First release.
May 2018
About the Manual
(cid:122) The manual is for reference only. If there is inconsistency between the manual and the
actual product, the actual product shall prevail.
I
(cid:122) We are not liable for any loss caused by the operations that do not comply with the manual.
(cid:122) The manual would be updated according to the latest laws and regulations of related
regions. For detailed information, see the paper manual, CD-ROM, QR code or our official
website. If there is inconsistency between paper manual and the electronic version, the
electronic version shall prevail.
(cid:122) All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for the latest program and supplementary documentation.
(cid:122) There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
(cid:122) Upgrade the reader software or try other mainstream reader software if the manual (in PDF
(cid:122) All trademarks, registered trademarks and the company names in the manual are the
(cid:122) Please visit our website, contact the supplier or customer service if there is any problem
format) cannot be opened.
properties of their respective owners.
occurred when using the device.
(cid:122)
If there is any uncertainty or controversy, please refer to our final explanation.
II
Important Safeguards and Warnings
The manual will help you to use the Device properly. Read the manual carefully before using
the Device, and keep it well for future reference.
Operation Requirements
(cid:122) Avoid heavy stress, violent vibration, and water splash during transportation, storage, and
installation. Complete package is necessary during the transportation. We assume no
responsibility for any damage or problem caused by the incomplete package during the
transportation.
(cid:122) To avoid damage, protect the Device from falling down and heavy vibration. Arrange more
than one person to move the Device when necessary.
(cid:122) Buckle the safety hook before installing the Device if it is included.
(cid:122) Keep the Device away from devices that generate electromagnetic field like televisions,
radio transmitters, electromagnetic devices, electric machine, transformers, and speakers;
otherwise image quality will be influenced.
(cid:122) Keep the Device away from smoke, vapor, heat, and dust.
(cid:122) Do not install the Device near heating furnace, spotlight, and other heat sources. If it is
installed on ceiling, in kitchen or near boiler room, the Device temperature might rise.
(cid:122) Do not dissemble the Device; otherwise it might cause dangers or device damage. Contact
your local retailer or customer service center for internal setup or maintenance
(cid:122) Make sure that there is no metal, or inflammable, explosive substance in the Device;
otherwise it might cause fire, short-circuit, or other damage. Power off the Device and
disconnect the power cord immediately if there is water or liquid falling into the Device. And
contact your local retailer or customer service center. Avoid sea water or rain eroding the
requirement.
Device.
(cid:122) Avoid aiming the lens at intense light source, including sunlight, and incandescent light;
otherwise the lens might be damaged.
(cid:122) Clean the enclosure with soft cloth. To remove the dirt, you can dip the soft cloth in proper
detergent, wring the soft cloth out, and then dry the enclosure with soft cloth. Do not use
gasoline, paint thinner, or other chemicals to clean the enclosure; otherwise it might result
in enclosure transfiguration or paint flake. Read all the manuals included before using
chemical cloth. Avoid long time touch between the plastic or rubber material and the
enclosure; otherwise it might result in device damage and paint flake.
(cid:122)
It is recommended to use the Device with a lightning-proof device for better lightning-proof
effect.
III
Requirements for Installation and Maintenance Personnel
(cid:122) Have certificates or experiences related to installation and maintenance of the
closed-circuit television (CCTV), and have certificates related to working at height.
(cid:122) Have basic knowledge and installation skills of CCTV system.
(cid:122) Have basic knowledge and operation technique for low-voltage wiring and low-voltage
electronic circuit connection.
(cid:122) Have the ability to read and understand the manual.
Requirements for Lifting the Device
(cid:122) Use secure lifting appliances suitable for the installation place and the product installation
(cid:122) Make sure that the selected tools reach the installation height and have high safety
mode.
performance.
(cid:122) All installation and operations shall conform to local electrical safety regulations.
(cid:122) The power source shall conform to the requirements of the Safety Extra Low Voltage
(SELV) standard, and supply power with rated voltage which conforms to Limited Power
Source requirement according to IEC60950-1. Note that the power supply requirement is
subject to the device label.
(cid:122) Use the power adapter recommended by the manufacturer.
(cid:122) For the Device that supports laser, do not aim the laser directly at eyes. And keep a proper
(cid:122) Do not connect several devices to one power adapter; otherwise it might result in overheat
distance from the flammable to avoid fire.
or fire if it exceeds the rated load.
(cid:122) Make sure that the power is off when you connect the cables, install or uninstall the Device.
(cid:122) Power off the Device and disconnect the power cord immediately if there is any smoke,
disgusting smell, or noise from the Device. And contact your local retailer or customer
service center.
(cid:122) Contact your local retailer or customer service center if the Device is abnormal. Do not
disassemble or repair the Device by yourself. We assume no responsibility for any
problems caused by unauthorized modifications, disassembly or repair, incorrect
installation or use, and overuse of certain components.
IV
Table of Contents
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings .................................................................................................... III
1 Network Configuration.......................................................................................................................... 1
Network Connection ...................................................................................................................... 1
Logging in to the Web Interface .................................................................................................... 1
1.2.1 Device Initialization ............................................................................................................. 1
1.2.2 First-time Login ................................................................................................................... 5
1.2.3 Device Login ....................................................................................................................... 6
1.2.4 Resetting Password ............................................................................................................ 7
2 Live.......................................................................................................................................................... 9
Encoding Setting ........................................................................................................................... 9
Video Window Adjustment .......................................................................................................... 10
System Menu .............................................................................................................................. 15
Video Window Functions ............................................................................................................ 15
PTZ Configuration ....................................................................................................................... 18
PTZ Status .................................................................................................................................. 22
3 AI Live ................................................................................................................................................... 24
AI Live Interface .......................................................................................................................... 24
3.1.1 Information Display Area of Detected Targets .................................................................. 24
3.1.2 Snapshot Display Area ..................................................................................................... 25
3.1.3 Statistics Area of the Detected Targets ............................................................................ 25
AI Live Settings ........................................................................................................................... 26
4 Playback ............................................................................................................................................... 28
Video Playback ........................................................................................................................... 28
4.1.1 Video Play Function Bar ................................................................................................... 29
4.1.2 Recording Type ................................................................................................................. 29
4.1.3 Auxiliary Functions ............................................................................................................ 29
4.1.4 Video Playback File Search and Display Area ................................................................. 30
4.1.5 Video Clipping Area .......................................................................................................... 33
4.1.6 Progress Bar Time Formats .............................................................................................. 33
Picture Playback ......................................................................................................................... 34
4.2.1 Picture Playing Functions ................................................................................................. 34
4.2.2 Picture Playback File Search and Display Area ............................................................... 35
4.2.3 Snapshot Types ................................................................................................................ 36
5 Setting .................................................................................................................................................. 37
Camera........................................................................................................................................ 37
5.1.1 Conditions Settings ........................................................................................................... 37
5.1.2 Video ................................................................................................................................. 53
5.1.3 Audio ................................................................................................................................. 63
Network Settings ......................................................................................................................... 65
5.2.1 TCP/IP .............................................................................................................................. 65
5.2.2 Port ................................................................................................................................... 68
5.2.3 PPPoE .............................................................................................................................. 70
V
5.2.4 DDNS ................................................................................................................................ 70
5.2.5 SMTP (Email).................................................................................................................... 72
5.2.6 UPnP ................................................................................................................................. 74
5.2.7 SNMP ................................................................................................................................ 75
5.2.8 Bonjour .............................................................................................................................. 77
5.2.9 Multicast ............................................................................................................................ 78
5.2.10 Auto Register .................................................................................................................. 79
5.2.11 Wi-Fi ................................................................................................................................ 80
5.2.12 802.1x ............................................................................................................................. 81
5.2.13 QoS ................................................................................................................................. 82
5.2.14 4G ................................................................................................................................... 83
5.2.15 Access Platform .............................................................................................................. 86
PTZ Settings ............................................................................................................................... 89
5.3.1 Protocol ............................................................................................................................. 89
5.3.2 Function ............................................................................................................................ 90
Event Management ................................................................................................................... 101
5.4.1 Video Detection .............................................................................................................. 101
5.4.2 Smart Motion Detection .................................................................................................. 107
5.4.3 Audio Detection ............................................................................................................... 108
5.4.4 Smart Plan .......................................................................................................................110
5.4.5 IVS ................................................................................................................................... 111
5.4.6 Face Recognition .............................................................................................................117
5.4.7 People Counting ............................................................................................................. 127
5.4.8 Heat Map ........................................................................................................................ 128
5.4.9 Video Metadata ............................................................................................................... 130
5.4.10 Alarm ............................................................................................................................. 134
5.4.11 Abnormality ................................................................................................................... 134
Storage ...................................................................................................................................... 139
5.5.1 Schedule ......................................................................................................................... 139
5.5.2 Snapshot by Location ..................................................................................................... 142
5.5.3 Destination ...................................................................................................................... 143
5.5.4 Record Control ................................................................................................................ 146
System Management ................................................................................................................ 147
5.6.1 Device Settings ............................................................................................................... 147
5.6.2 Account Settings ............................................................................................................. 149
5.6.3 Safety .............................................................................................................................. 155
5.6.4 Peripheral........................................................................................................................ 166
5.6.5 Default ............................................................................................................................. 167
5.6.6 Import/Export .................................................................................................................. 167
5.6.7 Auto Maintain .................................................................................................................. 168
5.6.8 Upgrade .......................................................................................................................... 169
Information ................................................................................................................................ 169
5.7.1 Version ............................................................................................................................ 169
5.7.2 Log Information ............................................................................................................... 170
5.7.3 Online User ..................................................................................................................... 172
6 Alarm ................................................................................................................................................... 172
7 Logout ................................................................................................................................................ 174
VI
Cybersecurity Recommendations ................................................................................. 175
VII
1 Network Configuration
Network Connection
To view the web interface on your PC, connect the Device to the PC first. There are mainly two
connection modes between the Device and PC. See Figure 1-1 and Figure 1-2.
Direct connection by using a network cable
Connection over by using a switch or router
The models presented in the figures are for reference only, and the actual product shall prevail.
All devices have the same IP address (192.168.1.108 by default) when they are delivered out of
factory. To make the device get access to network smoothly, plan available IP segment
reasonably according to practical network environment.
Logging in to the Web Interface
1.2.1 Device Initialization
For first-time use or after you have restored the Device to defaults, you need to initialize the
Device by performing the following steps.
Open the browser, enter the IP address of the Device in the address bar, and then
press the Enter key.
1
The Country/Region Setting interface is displayed. Set the Country/Region,
Language and Video Standard as needed. See Figure 1-3.
Country/region setting interface
Click Save, and the Time Zone Setting interface is displayed.
Configure time parameters. See Figure 1-4.
Time zone setting interface
Click Next.
The Device Initialization interface is displayed. For the interface, see Figure 1-5. For
the parameter description, see Table 1-1.
2
Table 1-1 Device initialization parameter description
Parameter
Description
Username
It is admin by default.
Password
The password should consist of 8 to 32 non-blank characters and contain
at least two types of characters among upper case, lower case, number,
and special characters (excluding ' " ; : &). Set a high security password
according to the prompt of password strength. Make sure that the new
password is the same as the confirming password.
Confirm
Password
Enter the confirming password that shall be the same as the password you
entered.
Set the email address which is used to reset password.
Email Address
Email address is enabled by default. You can disable the function as
needed.
Click Save.
The P2P interface is displayed. See Figure 1-6.
Device initialization
3
Scan the QR code on the interface, download the app, and then finish configurations
according to the instructions on your mobile device. After that, click Next.
The Online Upgrade interface is displayed. See Figure 1-7.
Online upgrade
Select Auto-check for updates check box as needed.
After the function is enabled, the Device will check for updates once a day automatically.
There will be system notice if any update is available.
Click Next, and the login interface is displayed. See Figure 1-8.
P2P interface
4
Login interface
1.2.2 First-time Login
You need to download and install the plug-in for the first-time login.
Open the browser, enter the IP address of the Device in the address bar, and then
press the Enter key.
Enter the username and password, and then click Login.
The web interface is displayed.
(cid:122)
If you enter the wrong password for 5 times, the account will be locked for 5
minutes. After the locked time, you can log in to the web interface again.
(cid:122) You can set the number of allowed password attempts and locked time in
"5.4.11.3 Illegal Access."
Download and install the plug-in according to the on-screen instruction after logging in
to the web interface. See Figure 1-9.
Installing the plug-in
After the plug-in is installed, the web interface will be refreshed automatically, and the
video is displayed in Live interface. See Figure 1-10.
5
Live interface
The Live interface shown in the manual is for reference only, and the actual interface shall
prevail.
1.2.3 Device Login
Open the browser, enter the IP address of the Device in the address bar, and then
press the Enter key.
The Login interface is displayed. See Figure 1-11.
Device login
Enter the username and password, and then click Login.
The web interface is displayed, and the video is displayed in Live interface.
(cid:122)
If you enter the wrong password for 5 times, the account will be locked for 5
minutes. After the locked time, you can log in to the web interface again.
(cid:122) You can set the number of allowed password attempts and locked time. For
details, see "5.4.11.3 Illegal Access."
6
1.2.4 Resetting Password
If you forget the password of the admin user, you can set the password through the provided
email address.
Before resetting the password, you need to provide the email address in advance. For details,
see "1.2.1 Device Initialization" or "5.6.3.2 System Service."
Open the browser, enter the IP address of the Device in the address bar, and then
press the Enter key.
The Login interface is displayed. See Figure 1-12.
Login
Click Forgot password?, and the Prompt interface is displayed. See Figure 1-13.
Prompt
Click OK to reset the password. The Reset the password (1/2) interface is displayed.
If you click OK, your email address, MAC address, device serial number, and other
information might be collected.
7
Resetting the password (1)
Scan the QR code on the actual interface according to the instructions, and then enter
the security code received in the mailbox.
Reset the password with the security code you received within 24 hours, otherwise the
code will be invalid.
Click Next.
The Reset the password (2/2) interface is displayed. See Figure 1-15.
Resetting the password (2)
Set the password of the admin user again.
The password should consist of 8 to 32 non-blank characters and contain at least two
types of characters among upper case, lower case, number, and special characters
(excluding ' " ; : &). Set a high security password according to the prompt of password
strength.
Click Save.
8
2 Live
Click the Live tab, and the Live interface is displayed. See Figure 2-1.
Live interface
For descriptions of function bars on the Live interface, see Table 2-1.
No.
Description
Table 2-1 Function bars description
Encoding setting
Video window adjustment
System menu
Video window functions
PTZ configuration
PTZ status
Encoding Setting
1
2
3
4
5
6
9
Some devices do not support two sub streams.
For the encoding setting area, See Figure 2-2. For the parameter description, see Table 2-2.
Encoding setting
Table 2-2 Encoding setting parameter description
Parameter
Description
Main Stream
It has large bit stream value and image with high resolution, but requires
large bandwidth. This option can be used for storage and monitoring.
Sub Stream 1
Sub Stream 2
Protocol
It has small bit stream value and smooth image, and requires little
bandwidth. This option is normally used to replace main stream when
bandwidth is not enough.
It has small bit stream value and smooth image, and requires little
bandwidth. This option is normally used to replace main stream when
bandwidth is not enough.
Select a protocol for video monitoring. The supported protocols include
TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and
Multicast.
Video Window Adjustment
For the video window adjustment bar, See Figure 2-3. For parameter description, see Table
2-3.
Video window adjustment
Table 2-3 Video window adjustment parameter description
No.
Parameter
Description
1
Image Adjustment
Click this button, and the Image Adjustment interface is
displayed on the right side of the Live interface. You can
adjust parameters such as brightness, contrast, hue, and
saturation on the interface.
Original Size
Adjust the video image to original size.
Click this button, and the video is displayed in full screen.
To exit full screen, double-click the screen or press the Esc
button.
W:H
Adjust the video image to original ratio or a proper window.
2
3
4
5
6
Full Screen
Fluency
Rules Info
Click this button, and you can select Realtime, General, or
Fluent. General is selected by default.
Click this button, and smart rules are displayed on the Live
interface after the function is enabled. The function is
10
No.
Parameter
Description
enabled by default.
7
8
PTZ
Face
9
Video Metadata
Click this button, and PTZ configurations are displayed on
the Live interface after the function is enabled.
Click this button, and face pictures are displayed on the
screen. See Figure 2-8.
Click this button, and information about motor vehicles,
non-motor vehicles, and people is displayed on the screen
in real time. See Figure 2-11.
10
Anti-aliasing
Click this button to enable anti-aliasing, and then aliasing
can be avoided when video windows are small.
11
Panorama
Click this button, and a panorama window is displayed on
the Live interface. You can perform operations such as
positioning, calling presets, and setting tours.
Image Adjustment
For Image Adjustment interface, see Figure 2-4. For parameter description, see Table 2-4.
Image Adjustment
Table 2-4 Image adjustment parameter description
Parameter
Description
Adjust the image brightness.
Adjust the image contrast.
Adjust the image hue.
Adjust the image saturation.
Restore brightness, contrast, saturation and hue to default values.
11
Only brightness, contrast, hue, and saturation of live view image on the web interface can be
adjusted with this function. To adjust the brightness, contrast, hue, and saturation of the Device,
you can go to Setting > Camera > Conditions.
Panorama
For the Panorama interface, see Figure 2-5.
Panorama interface
(cid:122) You can perform positioning in this window by drawing a box with the left mouse button.
The located area is displayed on the Live interface and enlarged.
(cid:122) After you click Refresh, the Device rotates from 0 to 360 degrees horizontally and from 6
to 65 degrees vertically to obtain a new panoramic image.
(cid:122) You can adjust the size of the panoramic image by dragging the screen ratio bar
.
(cid:122) You can click
to call a corresponding preset on the right side of the window. For
the interface, see Figure 2-6. For how to set a preset, see "5.3.2.1 Preset."
Preset
You can click
to call a corresponding tour on the right side of the window. For the
interface, see Figure 2-7. For how to set a tour, see "5.3.2.2 Tour."
12
Face
For the Face interface, see Figure 2-8. Face recognition result is displayed on the left side, and
the captured face picture and attributes are displayed on the right side.
(cid:122) Face recognition result display area: Displays the captured small face pictures, the
corresponding face pictures in the database, and the similarities between them. After you
click the picture, the attributes and details are displayed. See Figure 2-9.
Tour
Face
13
Face recognition result display
(cid:122) Face and attributes display zone: Displays the captured small face pictures and
information such as gender, age, and expression. After you click the picture, the details are
displayed. See Figure 2-10.
Face and attributes display
Video Metadata
For the interface, see Figure 2-11. Motor vehicle information is displayed on the right side, and
the information about human and non-motor vehicles is at the bottom of the interface. For more
details, see "5.4.9 Video Metadata."
14
Video metadata
System Menu
To access an interface, click the corresponding tab on the system menu. For the system menu,
see Figure 2-12.
System menu
Video Window Functions
For the video window function buttons, See Figure 2-13. For the parameter description, see
Table 2-5.
Video window function buttons
Table 2-5 Video window function button description
No. Parameter
Description
1
Wiper Control
Click this button to select wiper operation.
Start: Click this button, and the wiper starts and waves
continuously.
Stop: Click this button, and the wiper is turned off and stops
waving.
Once: Click this button, and the wiper starts and waves from
15
No. Parameter
Description
2
Mark
3
Regional Focus
4
Relay-out
5
Gesture Control
6
Digital Zoom
7
Snapshot
8
Triple Snapshot
9
Record
10
Manual Track
left to right for one time.
Click this button, right-click on the Live interface, and the
function menu is displayed. See Figure 2-14. You can add
information on the Live interface, and also manage added
comments.
Add Info: Select Add Info from the pop-up menu, and
enter the comment. For the interface, see Figure 2-15.
Managing comments: Select Info Management from
the pop-up menu to display, hide, or delete added
comments. For the interface, see Figure 2-16.
Click the button, draw a box with the mouse on the live view,
and then the Device will automatically focus on the area in
the box.
Click the button, and an alarm will be triggered. When an
alarm is triggered, the icon turns red; and when an alarm is
canceled, the icon turns grey.
Click the button, and you can drag the live view by pressing
and holding the left mouse button to control PTZ; and you
can also zoom in or out through the mouse wheel.
Click the button, and then select an area in the live view
to zoom in; right-click on the image to restore to the
original status. In enlarged status, drag the image to
check other area.
Click the button, and then scroll the mouse wheel in the
live view to zoom in or out.
Click the button to capture one picture of the current image,
and it will be saved to the live snapshot storage path set in
"5.1.2.5 Path."
Click the button, and three pictures of the current image are
captured with one snapshot per second. These snapshots
will be saved to the live snapshot storage path set in "5.1.2.5
Path."
Click the button to record videos. The recording will be
saved to the live recording storage path set in "5.1.2.5
Path."
Click the button and select any area by dragging the left
mouse button in the video window; the Device tracks objects
in this area intelligently.
Click the button to enable or disable audio output of the
monitoring stream.
Before using the function, you need to enable the audio of
the corresponding stream in Setting > Camera > Audio
first.
16
11
Audio
12
Talk
Click the button to enable or disable the two-way audio.
Mark—menu
Mark—adding comments
17
PTZ Configuration
You can control PTZ by using the PTZ Control panel or joystick. You can also set preset,
scanning, and other functions in the PTZ Function area.
PTZ Control
Before using the PTZ Control panel, you need to set the PTZ protocol by selecting Setting >
PTZ > Protocol.
For PTZ Control panel, See Figure 2-17. For parameter description, see Table 2-6.
Mark—managing comments
18
PTZ control
19
Table 2-6 PTZ control parameter description
No.
Parameter
Description
Direction buttons
There are 8 directions: Up, down, left, right, upper left, upper
right, lower left, and lower right.
Provides quick positioning function. Draw an box in the live
view with the mouse, and then the PTZ rotates to and
focuses on the selected area rapidly.
The changing speed of PTZ direction. The higher the value,
the faster the speed.
Zoom/Focus/Iris
to increase the value, and click
to
Click
decrease the value.
1
2
3
4
Position
Speed
Joystick
You can drag the middle button to simulate joystick operations to control device rotation. For
the operation interface, see Figure 2-18. Speed, zoom, focus, and iris configurations are the
same as that of PTZ Control panel.
Joystick
PTZ Functions
The PTZ supports multiple functions. Select a function, click
or
to start
using the function, and then click
to stop using the function. For the configuration
interface, see Figure 2-19. For the supported functions and settings, see Table 2-7.
PTZ function
Parameter Description
Table 2-7 PTZ functions description
Scan
Preset
Tour
Select Scan from the list, enter a scan number, and then click Start. The PTZ
starts scanning, and the default number is 1.
Select Preset from the list, enter a preset number, and then click Go to. The
PTZ will rotate to the preset position.
Select Tour from the list, enter a tour number, and then click Start. The PTZ
starts to tour.
20
Parameter Description
Pattern
Select Pattern from the list, enter a pattern number, and then click Start. The
PTZ starts to pattern.
Reserved for special requirements.
Assistant
If necessary, enable this function under the guidance of professionals.
Pan
Select Pan from the list, and then click Start. The PTZ starts to pan.
Go to
(cid:122) Select Go to from the list, enter horizontal angle value, vertical angle
value and zoom, and then click Go to. The Device will turn to the position
you want.
(cid:122) One unit of the horizontal angle value or vertical angle value you enter
equals 0.1 degree.
Menu
For the menu interface, see Figure 2-20. For the parameter description, see Table 2-8.
Menu interface
Parameter
Description
Table 2-8 Menu parameter description
Direction
buttons
Click the up and down buttons to select parameters, and click the left and
right buttons to select parameter values.
OK
Open
Close
Confirmation button.
Open the OSD menu.
Close the OSD menu.
Click Open to open the OSD menu. The OSD menu is displayed on the live view. See Figure
2-21.
21
OSD menu
You can finish the following settings through the menu:
(cid:122) Camera settings: See "5.1 Camera."
(cid:122) PTZ settings: See "5.3 PTZ Settings."
(cid:122) System management: See "5.6 System Management."
You can change the location of the OSD menu in "5.1.2.3 Overlay."
PTZ Status
On the Live interface, the PTZ status is displayed at the lower right corner. See Figure 2-22.
The function is available on select models.
PTZ status
When the PTZ lifespan is close to the threshold, the warning will be displayed on the Live
interface. See Figure 2-23 and Figure 2-24.
Warning (1)
22
Warning (2)
23
3 AI Live
You can check the information of the detected human faces, human bodies, motor vehicles,
and non-motor vehicles.
This function is available on select models.
AI Live Interface
For the AI Live interface, see Figure 3-1. For the layout description, see Table 3-1.
AI live interface
Table 3-1 AI live interface description
No. Function
Live view
1
2
3
4
Snapshot display area
Information display area of detected targets
Statistics area of the detected targets
3.1.1 Information Display Area of Detected Targets
Display the information of the captured targets in real time. See Figure 3-2.
24
Information display of the detected targets
3.1.2 Snapshot Display Area
Display the snapshots of the detected targets. See Figure 3-3. Click any snapshot to view the
information of the detected target in information display area.
Snapshot display area
3.1.3 Statistics Area of the Detected Targets
Display the number of the captured target in real time. See Figure 3-4.
25
Statistics area of the detected targets
Table 3-2 Statistics area description of the detected targets
Icon
Detected Target Description
Face
Human
Available detection items: Gender, age, expression,
glasses, mouth mask, and beard.
Available detection items: Top, bottom, top color, bottom
color, bag, hat, and umbrella.
Non-motor vehicle
Available detection items: Vehicle type, vehicle body color,
top, top color, occupancy, and hat.
Available detection items: License plate, vehicle body color,
vehicle type, vehicle logo, vehicle series, sunshield,
seatbelt, smoking, calling, ornament, and annual inspection
mark.
Motor vehicle
Up to 7 items can be selected at the same time for motor
vehicle detection.
Settings
Click the button to select the detection items.
AI Live Settings
Preparation
Procedure
Select Setting > Event > Smart Plan, and then enable Face Detection, Face Recognition or
Video Metadata. For the method to enable the function, see "5.4.4 Smart Plan.". For the
operations, see "5.4.6 Face Recognition" or "5.4.9 Video Metadata."
Click the AI Live tab. The AI Live interface is displayed. See Figure 3-5. The
information display area of detected targets is on the right side; the snapshot display
26
area is on the bottom; the statistics area of the detected targets is on the lower right
corner.
AI live interface
Click
to set the detection items of the targets. See Figure 3-6.
Detection items selection interface
Click
to complete the configuration
27
4 Playback
You can watch the saved pictures and videos on the Playback interface.
Before using the function, you need to set the period, storage method, and record control of
recording and snapshot first. For details, see "5.5 Storage."
Click the Playback tab, and the Playback interface is displayed. See Figure 4-1.
Playback interface
Video Playback
Select dav from the File Type list, and the video playback interface is displayed. See Figure 4-2.
For parameter description, see Table 4-1.
Video playback
Table 4-1 Video playback parameter description
No.
Description
1
2
Video playing function bar
Progress bar
28
No.
Description
Recording types
Auxiliary functions
3
4
5
6
7
Video playback file search and display area
Video clipping area
Progress bar time formats
4.1.1 Video Play Function Bar
For the video playing function bar, see Figure 4-3. For the parameter description, see Table 4-2.
Video playing function bar
Table 4-2 Video play function bar description
No.
Parameter
Description
1
2
3
4
5
6
7
8
Play
Stop
Next Frame
Slow
Fast
Sound
Volume
Rules Info
Play the video.
Stop playing the video.
Play the next frame.
frame.
Slow down video playing.
Speed up video playing.
Mute or unmute the sound.
Adjust the volume.
Click this button, and smart rules will be displayed on the
video playback interface if the smart rules are enabled.
You need to pause the playback before playing the next
4.1.2 Recording Type
Select a recording type, and then only files of the selected types will be displayed in the
progress bar and file list. See Figure 4-4.
Recording Type
4.1.3 Auxiliary Functions
For the auxiliary functions, see Figure 4-5. For the parameter description, see Table 4-3.
29
Auxiliary functions
Table 4-3 Auxiliary functions parameter description
No.
Parameter
Description
1
Digital Zoom
2
Snapshot
Click the button, and then select an area in the live view
to zoom in; right-click on the image to restore to the
original status. In zoomed-in status, drag the image to
check other areas.
Click the button, and then scroll the mouse wheel in the
live view to zoom in or out.
Click the button, and then you can take snapshots of the
video in playback, and save them in the playback snapshot
path set in "5.1.2.5 Path."
4.1.4 Video Playback File Search and Display Area
There are videos and snapshots on days with blue shading. See Figure 4-6. For the parameter
description, see Table 4-4.
Playback file (1)
30
Table 4-4 Playback file parameter description (1)
Parameter
Description
File Type
To play back a recording, select dav.
To play back a picture, select jpg.
Data Src
The SD Card is used by default.
Click this button, and recordings or pictures of a certain type on specific
dates can be downloaded in batch.
The function is available on select models.
File list. Click this button, and the recording files on the selected day will be
displayed in the list.
Download in Batches
Click
.
The Batch Download interface is displayed. See Figure 4-7.
Batch download
Configure parameters as needed. For the parameter description, see Table 4-5.
Table 4-5 Batch download parameters description
Parameter
Description
Type
Path
Select the event type that triggers video recording. All Videos,
General, Event, Alarm, Manual, and Snapshot are selectable. It is
All Videos by default.
Start Time/EndTime Select the start time and end time for video searching.
File type
Select the video type. dav and mp4 are selectable. It is dav by default.
Click Browse, and set the saving path for video files. The default path
is C:\Users\admin\WebDownload\PlaybackRecord.
Click Search to search for the video files that meets the requirements.
Select the video, and click Download. The video files are downloaded and saved in the
saving path.
31
Displaying File List
Click a day with blue shading, and recording file progress bar with different colors is
You can select multiple files to download them.
displayed on the time axis.
(cid:122) Green: Represents general videos.
(cid:122) Yellow: Represents motion detection videos.
(cid:122) Red: Represents alarm videos.
(cid:122) Blue: Represents manually recorded videos.
progress bar, see Figure 4-8.
Progress bar
Click anywhere on the progress bar, and the video will be played from that time. For the
Click
, and videos recorded on the selected day will be displayed in a list.
For the playback file list, see Figure 4-9. For the parameter description, see Table 4-6.
To play back a file in the list, double-click the file.
Playback file (2)
32
Table 4-6 Playback file parameter description (2)
Parameter
Description
Search all the recorded files from the start time to the end time on the
selected date.
Download
Format
There are two options: dav and mp4.
Click the download button, and the files will be saved to the storage path
set in "5.1.2.5 Path."
Downloading and playing video at the same time is not supported.
Click the button to go back to the calendar interface.
4.1.5 Video Clipping Area
You can clip the videos in this area. See Figure 4-10.
Video clipping
Click the time axis to select the start time for video clipping. The time must be within the
progress bar range.
Hover over
, and then Select start time is displayed.
Click
to set the start time for video clipping.
Click the time axis to select the end time for video clipping. The time must be within the
progress bar range.
Hover over
, and then Select end time is displayed.
Click
to set the end time for video clipping.
Click
, and the clipped video will be saved in the path set in "5.1.2.5 Path."
4.1.6 Progress Bar Time Formats
For the progress bar time format, see Figure 4-11. For the parameter description, see Table
4-7.
Progress bar time formats
33
Table 4-7 Progress bar time format description
Parameter
Description
Click the button, and then the progress bar displays the recordings in
24-hour mode.
Click the button, and then the video within the 2-hour period in which this
video was recorded is displayed.
Click the button, and then the video within the 1-hour period in which this
video was recorded is displayed.
Click the button, and then the video within the 30-minute period in which
this video was recorded is displayed.
Picture Playback
Select jpg from the File Type list. For the picture playback interface, see Figure 4-12. For the
parameter description, see Table 4-8.
Picture playback
Table 4-8 Picture playback parameter description
No.
Description
Picture playing functions
Snapshot types
1
2
3
Picture playback file search and display area
4.2.1 Picture Playing Functions
For the picture playing buttons, see Figure 4-13.
Picture playing buttons
The status button is displayed as
by default, indicating the picture play is paused or no
picture is being played.
(cid:122) To play the picture, click
, and the button is switched to
.
34
(cid:122) To pause the picture play, click
.
4.2.2 Picture Playback File Search and Display Area
For the playback file interface, see Figure 4-14 and Figure 4-15. For the description of buttons
on the interface, see Table 4-9.
Playback file (1)
Table 4-9 Button description
Parameter
Description
File Type
Data Src
The SD Card is used by default.
Select jpg from the File Type list, and the picture will be played if any.
File list. Click this button, and the recording files on the selected day will be
displayed in the list.
35
Playback file (2)
36
Click
, and the snapshots on a selected day will be displayed in a list.
To play back a snapshot, double-click the corresponding file. For the parameter
description, see Table 4-10.
Table 4-10 Playback file parameter description
Parameter
Description
Search all the snapshots from the start time to the end time on the
selected date.
Click the button to download the snapshot to local storage.
Click the button to go back to the calendar interface.
4.2.3 Snapshot Types
After you select a snapshot type, only the files of the selected type are displayed in the file list.
For snapshot types, See Figure 4-16.
Snapshot types
5 Setting
Camera
5.1.1 Conditions Settings
5.1.1.1 Conditions
Picture
This section describes how to set camera attributes and manage profiles.
Set camera attributes and picture parameters to achieve the best display effect.
Select Setting > Camera > Conditions > Conditions > Picture.
The Picture interface is displayed. See Figure 5-1.
Picture interface
Configure parameters as needed. For parameter description, see Table 5-1.
37
Table 5-1 Picture setting parameter description
Parameter Description
Profile
Style
There are three options: General, Day, and Night. You can view the
configurations and the effect of the selected mode. Day is selected by default.
Set the image display style. There are three options: Soft, Standard, and
Vivid. Standard is selected by default.
Brightness
Set the overall image brightness. The larger the value is, the brighter the image
will be. The value ranges from 0 to 100.
Contrast
Set the image contrast. The larger the value is, the greater the contrast will be.
The value ranges from 0 to 100.
Saturation
Set the intensity of colors. The larger the value is, the brighter the colors will
be. The value ranges from 0 to 100.
The larger the value, the higher suppression on image colors. The value
ranges from 0 to 100.
This parameter takes effect only when the Device is in the environment with
low luminance.
Set the sharpness of picture edges. The larger the value is, the more obvious
the edge will be. The value ranges from 0 to 100.
If the value is too large, there might be image noise. Set the value according to
the actual condition.
The larger the value is , the stronger the sharpness CNT will be. The value
ranges from 0 to 100.
Chroma
CNT
Sharpness
Sharpness
CNT
This parameter takes effect only when the Device is in the environment with
low luminance.
Gamma
Change image brightness through non-linear tuning to expand the dynamic
display range of images. The larger the value is, the brighter the image will be.
The value ranges from 0 to 100.
Monitoring videos can be flipped over. There are two options.
Flip
0°: The monitoring video is normally displayed. It is 0° by default.
180°: The monitoring video is flipped over.
Electronic image stabilization (EIS) is used to effectively solve the problem of
image shaking during use, thus presenting clearer images. It is Off by default.
EIS
(cid:122) This function is available on select models.
(cid:122) This parameter takes effect only when the Device is in the environment
(cid:122) Optical image stabilization and electronic image stabilization cannot be
with low luminance.
enabled at the same time.
Picture
Freeze
After you select On, the image at the called preset is displayed directly if you
call a preset or tour, and no images during the rotation of the Device are
displayed.
Click Save.
38
Exposure
You can control the amount of light per unit area reaching the electronic image sensor by
adjusting parameters on the Exposure interface.
Select Setting > Camera > Conditions > Conditions > Exposure.
The Exposure interface is displayed. See Figure 5-2 to Figure 5-6.
Exposure—auto mode
Exposure—aperture priority mode
39
Exposure—shutter priority mode
Exposure—gain priority mode
40
Exposure—manual mode
Configure parameters as needed. For parameter description, see Table 5-2.
Table 5-2 Exposure setting parameter description
Parameter
Description
Anti-flicker
Mode
You can select 50Hz, 60Hz, or Outdoor from the list.
50Hz: When the alternating current is 50Hz, the exposure is
automatically adjusted to make sure that there are no stripes on
images.
60Hz: When the alternating current is 60Hz, the exposure is
automatically adjusted to make sure that there are no stripes on
images.
Outdoor: You can switch the modes to achieve the effect you want.
Set the exposure modes. You can select Auto, Manual, Aperture Priority,
Shutter Priority, Gain Priority. The Auto mode is selected by default.
Auto: Exposure
is automatically adjusted according
to scene
brightness if the overall brightness of images is in the normal exposure
range.
Manual: You can adjust the Gain, Shutter, and Iris value manually.
Aperture Priority: You can set the iris to a fixed value, and the Device
adjusts shutter value then. If the image brightness is not enough and
the shutter value has reached upper or lower limit, the system adjusts
gain value automatically to ensure the image is at ideal brightness.
Shutter Priority: You can customize the shutter range. The Device
automatically adjusts the aperture and gain according to the scene
brightness.
Gain Priority: Gain value and exposure compensation value can be
adjusted manually.
41
Parameter
Description
Gain
Shutter
Iris
Exposure
Comp
AE Recovery
2D NR
3D NR
Grade
You can set the exposure gain. The value ranges from 0 to 100.
You can adjust the exposure time of the Device. The larger the shutter
value, the brighter the image.
You can set the Device luminous flux. The larger the iris value, the brighter
the image.
You can set the exposure compensation value. The value ranges from 0 to
100.
Automatic exposure is an automated digital camera system that adjusts the
aperture and shutter speed, based on the external lighting conditions for
images and videos. If you have selected an AE Recovery time, the
exposure mode will be restored to the previous mode after you adjusted the
Iris value. There are five options: Off, 5Min, 15Min, 1Hour, and 2Hour.
2D noise reduction is the process of removing noise from a signal. The
higher the grade is, the less the noise will be, and images appear to be
blurrier.
3D noise reduction is the process of removing noise from a signal. The
higher the grade is, the less the noise will be, and images appear to be
blurrier.
Noise reduction grade. The value ranges from 0 to 100. The larger the
value is, the less the noise will be.
Realize noise suppression effect through 3D and 2D video filtering method.
Advanced NR
Click Save.
The function is available on select models.
Backlight
The backlight function cannot be configured if defog function is enabled. There will be a prompt
on the interface.
You can use this function to adjust the backlight compensation mode of the monitoring screen.
Select Setting > Camera > Conditions > Conditions > Backlight.
The Backlight interface is displayed. See Figure 5-7.
42
Backlight settings
43
Select a backlight mode from the list.
There are 4 options: Off, BLC, HLC, and WDR.
(cid:122) Off: Backlight is disabled.
(cid:122) BLC: Backlight compensation corrects regions with extremely high or low levels of
light to maintain a normal and usable level of light for the object in focus.
(cid:122) WDR: When in WDR (Wide Dynamic Range) mode, the Device constrains over
bright areas and compensates dark areas to improve the image clarity.
(cid:122) HLC: Highlight compensation dims strong light, so that the Device can capture
details of faces and license plates in extreme light conditions. It is applicable to the
entrance and exit of toll stations or parking lots.
If you select Off, other backlight mode configurations will not be effective.
Click Save.
WB
In this mode, you can make a white object displaying itself clearly on the video image in all
environments.
Select Setting > Camera > Conditions > Conditions > WB.
The WB interface is displayed. See Figure 5-8.
Select WB mode from the list.
You can select from Auto, Indoor, Outdoor, ATW, Manual, Sodium Lamp, Natural,
and Street Lamp. Auto is selected by default.
Click Save.
Day & Night
Defog function cannot be configured if Day & Night function is enabled. There will be a prompt
on the interface.
This function allows you to switch between the color mode and the black & white mode,
ensuring clear monitoring screen in a dim environment.
Select Setting > Camera > Conditions > Conditions > Day & Night.
The Day & Night interface is displayed. See Figure 5-9.
WB settings
44
Day & night settings
Configure parameters as needed. For parameter description, see Table 5-3.
Table 5-3 Day & night parameter description
Parameter
Description
There are two options: Electrical and ICR. ICR is selected by default.
Type
ICR: IR filter is used for day & night switch.
Electrical: Image processing method is used for day & night switch.
Select a mode from the list (Your selection is independent from the profile).
Auto is selected by default.
Color: The Device only outputs color images.
Auto: The Device outputs color images or black-and-white images
according to ambient conditions.
B/W: The Device only outputs black-and-white images.
Adjust the sensitivity to switch between different modes. There are three
options: Low, Middle, and High.
You can set sensitivity only when Day & Night mode is set to Auto.
Adjust the delay time to switch between different modes. The value ranges
from 2 s to 10 s.
You can set Delay only when Day & Night mode is set to Auto.
Mode
Sensitivity
Delay
Click Save.
Focus & Zoom
Digital zoom refers to capturing a part of the image to magnify it. The higher the magnification is,
the blurrier the images will become.
45
Select Setting > Camera > Conditions > Conditions > Focus & Zoom.
The Focus & Zoom interface is displayed. See Figure 5-10.
Focus & zoom settings
Configure each parameter as needed. See Table 5-4.
Table 5-4 Focus & zoom parameter description
Parameter
Description
Digital Zoom
Select On or Off to enable or disable digital zoom. Off is selected by
default.
Zoom Speed
The larger the value is, the faster the Device zooms.
Select the focus triggering mode. There are three options: Semi Auto,
Auto, and Manual. Semi Auto is selected by default.
Semi Auto: The Device focuses automatically when zoom or ICR
Mode
switch is detected.
Auto: The Device focuses automatically when scene changes, zoom,
Manual: The Device cannot focus automatically. You need to adjust
or ICR switch are detected.
the focus manually.
You can select the shortest focus distance, which means the Device will
focus on objects farther than the shortest focus distance. If you select
Auto, the Device will select an appropriate shortest distance according to
the zoom value.
Sensitivity is the capacity of resisting interference of the Device when
focusing. The smaller the value is, the more capable the Device can resist
interference when focusing.
If you enable this function, the image is relatively clear during zoom. If you
disable this function, the speed is relatively high during zoom.
Focus Limit
Sensitivity
PFA
46
Parameter
Description
Lens
Initialization
Click this button, and the lens will be initialized automatically. The lens will
be extended to calibrate the zoom and focus.
Click Save.
IR Light
Infrared IR Light/White Light
Common illuminators are classified into infrared IR lights, white lights, and laser lights. Different
device models support different types of illuminators, and have different configuration interfaces.
The actual interface shall prevail. This section describes how to configure these light types.
These are the conditions for using infrared IR light and white light.
(cid:122) When the day & night mode is set to B/W, the monitoring screen is black and white. In this
(cid:122) When the day & night mode is set to Color, the monitoring screen is colored. In this case,
case, infrared IR light is used.
white light is used.
(cid:122) When the day & night mode is set to Auto, the monitoring screen color changes with the
ambient light condition, and the illuminator varies with the monitoring screen. In B/W mode,
the infrared IR light is turned on; in Color mode, the white light is turned on.
(cid:122) Some models are equipped with photoresistor that can turn on different types of
illuminators based on the ambient brightness.
Perform the following steps to set illuminators.
Select Setting > Camera > Conditions > Conditions > IR Light.
The IR Light interface is displayed. See Figure 5-11.
IR light settings—ZoomPrio
47
IR light settings—SmartIR
IR light settings—manual
48
IR light setting—timing
IR light setting—off
Configure each parameter as needed. For the parameter description, see Table 5-5.
Parameter
Description
Table 5-5 IR light parameter description
There are 5 options: Manual, SmartIR, ZoomPrio, Timing, and Off.
ZoomPrio: The system adjusts the IR light brightness automatically
Mode
according to the zoom times.
SmartIR: The system controls the IR light intensity according to actual
49
Parameter
Description
conditions.
Manual: Set IR light brightness manually.
Timing: Enable different light types in different time periods according
to actual condition.
Off: Turn off the IR light.
(cid:122) Some models do not support SmartIR, Manual, Timing, or Off.
(cid:122)
(cid:122)
In ZoomPrio mode, IR light and white light are supported, and IR light
is selected by default.
In Timing mode, you can set four periods with different light types.
(cid:122) Only infrared IR light supports the SmartIR mode.
(cid:122) The IR light is turned off for cameras with low power consumption by
Light Type
You can select IR Light or White Light.
default. Turn on the IR light if necessary.
Correction
Compensate for the brightness of the IR light. The value ranges from 0 to
100.
Near Light
Set the brightness of the near light. The value ranges from 0 to 100.
Far Light
Set the brightness of the far light. The value ranges from 0 to 100.
Click Save.
Laser Light
Laser light makes compensation for the ambient environment when it is used for long-distance
monitoring.
Select Setting > Camera > Conditions > Conditions > IR Light.
The IR Light interface is displayed. See Figure 5-16.
Laser light settings
Configure parameter as needed. Refer to Table 4-6 for more details.
50
Table 5-6 Laser light setting parameter description
Parameter
Description
Select the laser light mode from ZoomPrio and Manual. It is ZoomPrio by
default.
(cid:122) ZoomPrio: The Device can automatically adjust laser light brightness
according to the zoom times.
(cid:122) Manual: Manually set laser light brightness and angle value.
Set the intensity of the laser light. The value ranges from 0 to 100.
Mode
Laser
Intensity
Laser Angle
Set the angle value from 0 to 100.
Click Save.
Defog
The defog function cannot be configured if backlight function is enabled. There will be a prompt
on the interface.
Image quality drops if the Device is installed in foggy or hazy environment. You can enable
defog to improve image quality.
Select Setting > Camera > Conditions > Conditions > Defog.
The Defog interface is displayed. See Figure 5-17 and Figure 5-18.
Defog settings—manual
51
Defog settings—auto
Configure parameters as needed. For parameter description, see Table 5-7.
Parameter
Description
Table 5-7 Defog parameter description
Select the defog mode of the Device. You can select Auto, Manual, or
Off. It is Off by default.
Mode
For the Device that supports optical defog, in Auto mode, optical defog
and electronic defog switch automatically according to the algorithm.
And in Off mode, electronic defog is enabled by default.
Intensity
Set the defog intensity of the Device. You can select from Low, Medium,
or High.
Defog
Enhancement
Only the Device that supports optical defog has this parameter.
In Manual mode, if you enable this function, both optical defog and
electronic defog are enabled. (You need to enable Auto mode for Day &
Night to use the function.)
Click Save.
5.1.1.2 Profile Management
Select Setting > Camera > Conditions > Profile Management.
The Profile Management interface is displayed.
Select the profile management mode.
There are three options: General, Full Time and Schedule.
(cid:122)
If you select General, monitoring is based on the general configuration of the
Device. See Figure 5-19.
52
Profile management—general
(cid:122)
If you select Full Time, Day and Night are selectable, and the corresponding
camera property profile is day or night. See Figure 5-20.
Profile management—full time
(cid:122)
If you select Schedule, you can select one period for day configuration and another
period for night configuration. For the configuration interface, see Figure 5-21. For
example, you can set the day-time configuration from 6:00 to 18:00, and set the
night-time configuration from 18:00 to 6:00 on the next day.
Profile management—schedule
Click Save.
5.1.2 Video
5.1.2.1 Video Stream
You can set the video stream, snapshot stream, video overlay, ROI, and storage path of the
Device.
This section describes how to set the video stream for the monitoring screen.
Select Setting > Camera > Video > Video.
The Video interface is displayed. See Figure 5-22.
53
Video stream settings
(cid:122) The stream configuration interfaces might vary depending on devices, and the
actual interface shall prevail.
(cid:122) The default bit rate of different devices might vary, and the actual product shall
prevail.
Configure parameters as needed. For parameter description, see Table 5-8.
Table 5-8 Video stream parameter description
Parameter
Description
Enable
enabled by default.
You can select the check box to enable sub stream. The sub stream is
Encode Mode
You can select H.264, H.264H, H.264B, H.265, MJPEG, MPEG4, or SVAC.
Enable Smart Codec to improve video compressibility and save storage
Smart Codec
space.
After Smart Codec is enabled, the Device does not support the third stream,
ROI, smart event, and other functions. The actual interface shall prevail.
Multiple resolution types are available for you to choose, and each type
corresponds to a unique recommended stream value.
Frame Rate
PAL: 1–25 frames/s or 1–50 frames/s. The frame rate changes with the
(FPS)
resolution.
There are two options: CBR (constant bit rate) and VBR (variable bit rate).
Picture quality can be set only in VBR mode, and cannot be set in
CBR mode.
In MJPEG encode mode, CBR is the only option for Bit Rate Type.
The recommended bit rate range is based on the resolution and frame rate.
Resolution
Bit Rate Type
Reference Bit
Rate
Bit Rate
It is the upper limit of stream in VBR. In CBR, the value is fixed.
The number of P frames between two I frames. The range varies with the
I Frame Interval
frame rate, and the maximum value is 150. It is recommended to set the
interval twice the frame rate.
Layered encoding can be done for FPS. SVC is a scalable encoding method
SVC
on time domain. It is 1 by default, which means no layered coding. You can
set 2, 3 or 4 layered encoding.
54
Description
Parameter
Watermark
Settings
Watermark
Character
Click Save.
You can verify the watermark to check if the video has been tampered.
You can verify the watermark to check if the video has been tampered. Select
Watermark Settings check box to enable Watermark Character. The
watermark character is DigitalCCTV by default, and you can modify it.
Watermark character consists of up to 128 characters from letters, standard
symbols, spaces, and special characters.
5.1.2.2 Snapshot
This section describes how to set streams for snapshots.
Select Setting > Camera > Video > Snapshot.
The Snapshot interface is displayed. See Figure 5-23.
Snapshot stream settings
Configure parameters as needed. For parameter description, see Table 5-9.
Table 5-9 Snapshot stream parameter description
Parameter
Description
You can select General or Event.
General refers to capturing pictures within the time range set in the
schedule. For details, see "5.5.1 Schedule."
Event means capturing pictures when motion detection, video
tampering, or local alarms are triggered. For how to enable
snapshots for motion detection, video tampering, or local alarms,
see "5.4 Event Management."
It is the same as the resolution of the selected snapshot main stream, and
cannot be modified on this interface.
You can set the snapshot quality from 1 to 6 levels. Level 1 is the lowest
level, and level 6 is the highest level.
Set the snapshot frequency. You can select from 1 s through 7 s or
Snapshot Type
Image Size
Quality
Interval
Customized.
Click Save.
55
5.1.2.3 Overlay
This section describes how to set the overlay information on the monitoring screen.
Select Setting > Camera > Video > Overlay.
The Overlay interface is displayed.
Configure overlay information as needed. For the configuration interfaces, see the
following figures. For the parameter description, see Table 5-10.
Overlay settings—privacy masking
Overlay settings—channel title
56
Overlay settings—time title
Overlay settings—OSD info
57
Overlay settings—font attribute
Overlay settings—picture overlay
58
Overlay settings—abnormal
Overlay settings—GPS position
59
Overlay settings—custom overlay
Table 5-10 Overlay setting parameter description
Parameter
Description
Privacy masking refers to setting a certain region in the monitoring screen to
protect privacy.
Privacy Masking
To draw a privacy mask in the live view, click Draw.
To delete a privacy mask, click Delete.
To clear all privacy masks, click Clear.
You can set the number, type and color of the privacy mask. To view a
privacy mask, click Go to.
Set whether to display the channel title on the monitoring screen. You can
adjust the channel title location by dragging the box.
Channel Title
Click
to add a channel title. You can also select the Text Align of the
Set whether to display time on the monitoring screen, and you can select
Time Title
whether to display the week. You can adjust the time title location by
channel title.
dragging the box.
60
Parameter
Description
If you want to display preset title, temperature, PTZ life warning,
coordinates, zoom, north direction, RS485, and other information on the
monitoring screen, you can set OSD info.
Preset: Set the duration of the preset title displaying on the screen.
You can select from Disable, 5s, 15s, Display Permanently, and
Custom.
Temperature: Select the Enable check box, select the termperature
unit, and then the internal termperature of the Device is displayed.
PTZ Life Warning: When the PTZ lifespan is close to the threshold, a
warning will be displayed on the Live interface. This OSD info is
enabled by default.
Coordinates/Zoom/North/RS485/Text Overlay: Select the Enable
check box to display the corresponding OSD info on the screen.
OSD info
(cid:122) You can adjust the OSD info location by dragging the box.
(cid:122) There are two options for alignment of text overlay: Left and Right.
Set the font of the channel title, time title, and OSD info, and you can also set
Font Attribute
the color and size of the font.
Set whether to display the overlaid picture on the monitoring screen. Click
Upload Picture to overlay local pictures on the monitoring screen. You can
Picture Overlay
adjust the location of an overlaid picture by dragging the yellow box.
Geographic location and picture overlay cannot be both enabled.
Abnormal
Set whether to display abnormality information on the monitoring screen.
Add custom OSD information on the monitoring screen. Click
to add one
line of custom OSD information. You can also select the Text Align of the
Custom Overlay
channel title.
Click Save.
5.1.2.4 ROI
ROI is available on select models.
Set a key monitoring region as a ROI (region of interest). You can set the image quality of this
region.
Select Setting > Camera > Video > ROI.
The ROI interface is displayed. See Figure 5-33.
61
ROI settings
62
Select Enable to enable this function.
Press and hold the left mouse button to draw boxes on the monitoring screen. You can
draw up to 4 boxes.
(cid:122) Click Delete or right click to delete the drawn boxes.
(cid:122) Click Remove All to clear all boxes.
Set the image quality of the ROI.
Click Save.
5.1.2.5 Path
The storage path is associated with the snapshot and recording on the Live interface. You can
set the path of Live Snapshot and Live Record respectively.
The storage path is associated with the snapshot, downloaded and clipped files on the
Playback interface. You can set the path of Playback Snapshot, Playback Download, and
Video Clips respectively.
Select Setting > Camera > Video > Path.
The Path interface is displayed. See Figure 5-34.
Path settings
Set each storage path.
(cid:122) Default storage path for snapshots:
C:\Users\admin\WebDownload\LiveSnapshot.
(cid:122) Default storage path for recording:
C:\Users\admin\WebDownload\LiveRecord.
(cid:122) Default storage path for playback snapshot:
C:\Users\admin\WebDownload\PlaybackSnapshot.
(cid:122) Default storage path for playback download:
C:\Users\admin\WebDownload\PlaybackRecord.
(cid:122) Default storage path for video clips:
C:\Users\admin\WebDownload\VideoClips.
admin is the login account.
Click Save.
5.1.3 Audio
5.1.3.1 Audio
This function is available on select models.
Set audio parameters of the Device.
Select Setting > Camera > Audio > Audio.
The Audio interface is displayed. See Figure 5-35.
63
Audio settings
Configure parameters as needed. For parameter description, see Table 5-11.
Table 5-11 Audio setting parameter description
Parameter
Description
Enable Main Stream or Sub Stream, and then the network stream contains
both audio and video; otherwise, it is only video stream.
Enable
Encode Mode
talks.
and 64000.
Sampling
Frequency
Audio can be enabled only when video has been enabled.
The audio encoding modes include G.711A, G.711Mu, G726, PCM,
MPEG2-Layer2, G.722.1, G.729, and AAC. It is G.711A by default.
The audio encoding mode set here applies to both audio streams and voice
The supported sampling frequencies include 8000, 16000, 32000, 48000,
The sampling frequency varies depending on the encoding mode. Select an
encoding mode as needed.
AudioIn Type
Set the audio input type. You can select LineIn or Mic.
Noise Filter
Set whether to enable noise filter. The function is enabled by default.
64
Parameter
Description
Adjust the noise reduction level from 0 to 100.
NR (Noise
Reduction) Level
Microphone
Volume
Click Save.
This parameter takes effect when noise filter is enabled.
Adjust the microphone volume from 0 to 100.
Speaker Volume
Adjust the speaker volume from 0 to 100.
Network Settings
5.2.1 TCP/IP
Configure the IP address and DNS server of the Device to connect it to other devices in the
network.
Before configuring network parameters, make sure that the Device is connected to the network
properly.
(cid:122)
(cid:122)
If there is no router in the network, assign an IP address in the same network segment.
If there is a router in the network, set the corresponding gateway and subnet mask.
Select Setting > Network > TCP/IP.
The TCP/IP interface is displayed. See Figure 5-36.
65
TCP/IP settings
Set TCP/IP parameters. For details, see Table 5-12.
Parameter
Description
Table 5-12 TCP/IP parameter description
Host Name
Set the name of the current device. The host name can be English or
Chinese within 63 bytes.
Select the Ethernet card to be configured. Wire is selected by default.
Ethernet Card
Mode
If the Device is configured with multiple Ethernet cards, the default
Ethernet card can be changed. If you reset the default Ethernet card,
restart the Device.
Static and DHCP modes are available.
If DHCP is selected, the IP address is obtained automatically. In this
case, the IP address, subnet mask, and gateway cannot be set.
If Static is selected, you need to set the IP address, subnet mask, and
gateway manually.
MAC Address
Display the MAC address of the Device.
IP Version
You can select IPv4 or IPv6. Both versions are supported and can be
accessed.
IP Address
Enter correct digits to change the IP address.
Subnet Mask
Set the subnet mask according to actual conditions. The subnet prefix is a
number in the range of 1 to 255. The subnet prefix identifies a specific
network link, and usually contains a hierarchical structure.
66
Parameter
Description
The Device checks the validity of all IPv6 addresses. The IP address and
the default gateway must be in the same network segment. Make sure that
a certain part of the subnet prefix in the IP address and default gateway
are the same.
Default
Gateway
Configure as needed. The default gateway
must be in the same network segment as the IP
address.
Preferred DNS
IP address of the DNS server.
Alternate DNS
Alternate IP address of the DNS server.
For IPv6 version, in the
IP Address, Default
Gateway,
Preferred
DNS, and Alternate
DNS fields, enter 128
bits, and
these fields
cannot be blank.
You can set the MTU value to ensure good data transmission according to
the network. The value is 1500 by default. Modifying MTU value causes
ethernet card restarting and network disconnection.
Here are some suggested value for your reference.
(cid:122)
(cid:122)
(cid:122)
(cid:122)
1500: It is the maximum and default value of Ethernet packet, typical
setting of the network connection without PPPOE or VPN, and is the
default setting of some routers, network adapters, and switches.
1492: The optimal value for PPPOE.
1468: The optimal value for DHCP.
1450: The optimal value for VPN.
Select the check box, and then you can modify and set the device IP
address through ARP/Ping command if the MAC address is known.
The function is enabled by default. During reboot, you will have no more
than 2 minutes to configure the Device IP address by a ping packet with
certain length. The server will be turned off in 2 minutes, or it will be turned
off immediately after the IP address is successfully configured. If the
function is not enabled, the IP address cannot be configured with ping
packet.
MTU
Enable
ARP/Ping to set
IP address
service
Click Save.
LAN.
An Example of Configuring IP Address with ARP/Ping
To obtain a usable IP address, make sure that the Device and your PC are in the same
Get the MAC address from the Device label.
Open command editor on the PC and enter the following command. See Table 5-13.
System
Command
Table 5-13 Command lists
Windows syntax
arp -s <IP Address> <MAC>
ping -l 480 -t < IP Address >
Example:
arp -s 192.168.1.125 11-40-8c-18-10-11
67
System
Command
UNIX/Linux/Mac
syntax
ping -l 480 -t 192.168.0.125
arp -s <IP Address> <MAC>
ping -s 480 < IP Address >
Example:
arp -s 192.168.1.125 11-40-8c-18-10-11
ping -s 480 192.168.0.125
Win7 syntax
netsh i i show in
netsh -c “i i” add neighbors ldx <IP Address> <MAC>
ping -l 480 -t < IP Address >
Example:
netsh i i show in
netsh -c “i i” add neighbors 12 192.168.1.125
11-40-8c-18-10-11
ping -l 480 -t 192.168.1.125
Power off the Device and then restart it, or restart the Device over the network.
Check the PC command line. If there is information such as "Reply from
192.168.1.125…", it means the configuration succeeds. In this case, you can close the
command editor.
Enter http://<IP address> in the browser address bar to log in.
5.2.2 Port
Configure the maximum port numbers and values on this interface.
Select Setting > Network > Port.
The Port interface is displayed. See Figure 5-37.
Port interface
Configure each port value of the Device. For details, see Table 5-14.
(cid:122) Except Max Connection, modifications of other parameters will take effect after
restart.
68
(cid:122)
(cid:122)
0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, and 42323
are occupied for specific uses.
It is not recommended to use the default values of other ports during port
configuration.
Parameter
Description
Table 5-14 Port parameter description
Max
Connection
The maximum number of users that can log in to the web interface of the
Device simultaneously. The value ranges from 1 to 10, and it is 10 by default.
TCP Port
UDP Port
TCP service port. The value is 37777 by default. You can set this parameter
as needed.
User Datagram Protocol port. The value is 37778 by default. You can set this
parameter as needed.
HTTP Port
HTTP communication port. The value is 80 by default. You can set this
parameter as needed.
Real Time Streaming Protocol port. Keep the default value 554 if it is
displayed. If you play live view through Apple’s QuickTime or VLC, the
following format is available. This function is also supported by Blackberry
mobile phone.
When the URL format requiring RTSP, you need to specify channel number
and bit stream type in the URL, and also username and password if needed.
When playing live view with Blackberry mobile phone, you need to disable the
audio, and then set the stream encoding mode to H.264B and resolution to
CIF.
URL format example:
rtsp://username:password@ip:port/cam/realmonitor?channel=1&subtype=0
RTSP Port
Username: Your username. For example, admin.
Password: Your password. For example, admin.
IP: Your device IP. For example, 192.168.1.122.
Port: Leave it if the value is 554 by default.
Channel: Channel number starting from 1. For example, if it is channel 2,
Subtype: stream type. The main stream is 0 (subtype=0); the sub stream
then enter channel=2.
is 1 (subtype=1).
For example, if you require the sub stream of channel 2 from a certain device,
then the URL shall be:
rtsp://admin:admin@192.168.1.123:554/cam/realmonitor?channel=2&subtyp
e=1
If certification is not required, you do not need to specify the username and
password. Use the following format:
rtsp://ip:port/cam/realmonitor?channel=1&subtype=0
A network protocol for real-time data communication. The value is 1935 by
default. You can enter the value as needed.
RTSP Port
Enable RTMP to push audio and video data to the third-party server. Make
sure that the address is trusted; otherwise it might cause data leakage.
69
Parameter
Description
HTTPS Port
HTTPS communication port. The value is 443 by default. You can set this
parameter as needed.
Click Save.
5.2.3 PPPoE
You can enable PPPoE (Point-to-Point Protocol over Ethernet) to establish network connection.
In this case, the Device obtains a dynamic IP address. To use this function, you need to obtain
the PPPoE username and password from the Internet Service Provider (ISP).
Select Setting > Network > PPPoE.
The PPPoE interface is displayed. See Figure 5-38.
PPPoE interface (1)
Select Enable, and then enter PPPoE username and password.
Click Save.
Save Succeeded! is displayed, and the obtained IP address of public network is
displayed in real time. See Figure 5-39. You can access the Device through the IP
address.
PPPoE interface (2)
5.2.4 DDNS
Properly configure DDNS, and then the domain name on the DNS server matches your IP
address and refresh the matching relation in real time. You can always access your device with
70
the same domain name no matter how much your device IP address changes. Before making
any changes, check whether your device supports the DNS server.
(cid:122) The third party servers might collect your device information if DDNS is enabled.
(cid:122) Register and log in to the DDNS website, and then you can view the information of all the
connected cameras in your account.
Select Setting > Network > DDNS.
The DDNS interface is displayed. See Figure 5-40.
DDNS
Select Type, and then configure the parameters as needed. For details, see Table
5-15.
Parameter
Description
Table 5-15 DDNS parameter description
Type
The name and website of the DDNS service provider. Here is the matching
relationship:
CN99 DDNS
Server address: www.3322.org
Server address
NO-IP DDNS
Server address: dynupdate.no-ip.com
Dyndns DDNS
Server address: members.dyndns.org
Domain Name
The domain name you registered on the DDNS website.
Username
Password
Interval
Enter the username and password obtained from DDNS service provider.
You need to register an account (including username and password) on
the website of DDNS service provider.
The update cycle of the connection between your device and the server,
and the time is 10 minutes by default.
Click Save.
Open the browser, enter the domain name in the address bar, and then press the Enter
key. The login interface is displayed.
71
5.2.5 SMTP (Email)
After this function is enabled, the device data will be sent to the given server. There is data
leakage risk. Think twice before enabling the function.
Configure SMTP (Email). When alarms, video detection and abnormal events are triggered, an
email will be sent to the recipient server through SMTP server. The recipient can log in to the
incoming mail server to receive emails.
Select Setting > Network > SMTP (Email).
The SMTP (Email) interface is displayed. See Figure 5-41.
SMTP (Email)
Configure parameters as needed. For parameter description, see Table 5-16.
Table 5-16 SMTP (Email) parameter description
Parameter
Description
SMTP Server
IP address of the outgoing mail server
complying with SMTP protocol.
Port number of the outgoing mail server
Port
complying with SMTP protocol. It is 25 by
default.
5-17.
For
the
detailed
configuration,
see Table
72
Parameter
Description
Username of sender mailbox.
Password of sender mailbox.
Username
Password
Anonymity
Sender
Email address of the sender.
For servers supporting anonymous email, you can log in anonymously without
entering username, password, and sender information.
Select authentication type from None, SSL and TLS. TLS is selected by
default.
Authentication
Title
numerals.
(cid:122) For the detailed configuration, see Table 5-17.
(cid:122) There might be risks if you select the authentication type other than TLS.
TLS is recommended.
You can enter no more than 63 characters in Chinese, English, and Arabic
Mail Receiver
Email address of the receiver. Support 3 addresses at most.
Attachment
Select the check box to support attachment in the email.
The system sends test mail to check if the connection is successfully
Health Mail
configured. Select the Health Mail check box and configure the Update
Period, and then the system sends test mails according to the defined period.
Test whether the email function is normal. If the configuration is correct, the
Test
email address of the receiver will receive the test email. Save the email
configuration before running rest.
For common email configurations, see Table 5-17.
Table 5-17 Common email configuration description
Type
SMTP Server
Authentication Port Description
SSL
465
(cid:122) The
authentication
type
cannot be None.
(cid:122) You need to enable SMTP
service in your mailbox.
(cid:122) The authentication code is
required; either
the QQ
password or email password
is not applicable.
Authentication code is the code
you receive when enabling SMTP
service.
(cid:122) You need to enable SMTP
service in your mailbox.
(cid:122) The authentication code is
required; the email password
is not applicable.
Authentication code is the code
you receive when enabling SMTP
service.
smtp.qq.com
TLS
587
163
smtp.163.com
SSL
TLS
465/
994
25
—
25
73
Type
SMTP Server
Authentication Port Description
Sina
smtp.sina.com
SSL
—
126
smtp.126.com —
Click Save.
465
25
25
You need to enable SMTP service
in your mailbox.
You need to enable SMTP service
in your mailbox.
5.2.6 UPnP
After UPnP is enabled, Intranet service and port of the Device will be mapped to Extranet. Think
twice before enabling it.
UPnP (Universal Plug and Play) allows you to establish the mapping relationship between
Intranet and Extranet. Extranet users can access Intranet device by visiting Extranet IP address.
Intranet port is device port and Extranet port is router port. Users can access the Device by
accessing Extranet port. When you are not using routers for UPnP, disable UPnP to avoid
affecting other functions.
Once UPnP is enabled, the Device supports UPnP protocol. In Windows XP or Windows Vista,
after UPnP is enabled, the Device can be automatically searched by Windows network.
Perform the following steps to add UPnP network service in the Windows system.
Open Control Panel, and select Add or Remove Programs.
Click Add/Remove Windows Components.
Select Network Service from the Windows Components Wizard and click Details
button.
Select Internet Gateway Device Discovery and Control Client, and UPnP User
Interface, and then click OK to start installation.
Perform the following steps to configure UPnP:
Select Setting > Network > UPnP.
The UPnP interface is displayed. See Figure 5-42.
UPnP
Select Enable.
Select a mode from the drop-down list.
There are 2 mapping modes: Custom and Default. In Custom mode, users can modify
the external port. Select Default, and then the system finishes mapping with
unoccupied port automatically. In this case, you do not need to modify mapping
relation.
74
Select Start Device Discover as needed.
Click Save.
5.2.7 SNMP
SNMP (Simple Network Management Protocol) is a basic network management framework.
You need to install certain software to the Device to obtain the configuration information of the
Device.
The following requirements must be satisfied if you want to use SNMP function:
(cid:122)
Install SNMP monitoring and managing tools, such as MIB Builder and MG-SOFT MIB
Browser.
(cid:122) Obtain two MIB files corresponding to the current version from the technical personnel.
Select Setting > Network > SNMP.
The SNMP interface is displayed. See Figure 5-43 and Figure 5-44.
SNMP (1)
75
SNMP (2)
Select a version to enable SNMP.
In the Trap Address field, enter the IP address of the PC that has MG-SOFT MIB
Browser installed, leaving other parameters to the default values.
Parameter
Description
Table 5-18 SNMP parameter description
Version
Select the check box of the version you need, and the system can
process information of the corresponding version.
Select V1, and the system can only process information of V1
Select V2, and the system can only process information of V2
Select V3, and then V1 and V2 become unavailable. You need
to set the username, password, and authentication type to visit
your device from the server.
version.
version.
SNMP Port
The listening port of the software agent in the Device.
V1 and V2 might cause data leakage, and V3 is recommended.
76
Parameter
Description
The read and write community strings that the software agent
supports.
The name can only consist of number, letter, underline (_), and
strikethrough (-).
The target address of the trap information sent by the software
agent in the Device.
The target port of the trap information sent by the software agent in
the Device.
Select the Keep Alive check box, and the system can send data
package to ensure network connection without interruption.
The name is public by default.
The username can only consist of number, letter, and underline.
The name is private by default.
Read
Community/Write
Community
Trap Address
Trap Port
Keep Alive
Read-only Username
Read&write
Username
Authentication
Password
Authentication Type
You can select from MD5 and SHA, and it is MD5 by default.
The username can only consist of number, letter, and underline.
It shall be no less than 8 digits.
Encryption Type
It is CBC-DES by default.
Encryption Password
It shall be no less than 8 digits.
Click Save.
View device information.
1) Run MIB Builder and MG-SOFT MIB Browser.
2) Compile the two MIB files with MIB Builder.
3) Load the generated modules with MG-SOFT MIB Browser.
4) Enter the IP address of the Device you need to manage in the MG-SOFT MIB
Browser, and then select version to search.
5) Expand all the tree lists displayed in the MG-SOFT MIB Browser, and then you can
view the configuration information, video channel amount, audio channel amount,
and software version.
Use PC with Windows operating system (OS) and disable SNMP Trap service. The
MG-SOFT MIB Browser will display prompt when an alarm is triggered.
5.2.8 Bonjour
Bonjour is also called zero-configuration networking, which can automatically discover
computers, devices and services on IP networks. Bonjour is a protocol of industry standard
which allows devices to search and find each other. IP address or DNS server is not required
during the process.
77
Enable this function, and the network camera will be automatically detected by the OS and
client with Bonjour function. When the network camera is automatically detected by Bonjour,
server name you have set will be displayed.
Select Setting > Network > Bonjour.
The Bonjour interface is displayed. See Figure 5-45.
Bonjour interface
Select Enable, and then set Server Name.
Click Save.
In the OS and clients that support Bonjour, perform the following steps to visit the web interface
of the Device with Safari browser.
Click Show all bookmarks in Safari.
The OS or client automatically detects the network cameras with Bonjour enabled in
the LAN.
Click to visit the corresponding web interface.
5.2.9 Multicast
Access the Device by network to see live view. If the access times exceed its upper limit,
preview might fail. You can set multicast IP to access by multicast protocol to solve the problem.
The Device supports two multicast protocols: RTP and TS. RTP is enabled by default when
main stream and sub stream are used. TS is disabled by default.
5.2.9.1 RTP
Select Setting > Network > Multicast > RTP.
The RTP interface is displayed. See Figure 5-46.
RTP interface
Enable main stream or sub stream as needed.
Enter multicast address and port number.
78
Click Save.
5.2.9.2 TS
Select Setting > Network > Multicast > TS.
The TS interface is displayed. See Figure 5-47.
TS interface
Enable main stream or sub stream as needed.
Enter multicast address and port number.
Click Save.
5.2.10 Auto Register
After you enable this function, when the Device is connected to Internet, it will report the current
location to the specified server which acts as the transit to make it easier for the client software
to access the Device.
Select Setting > Network > Auto Register.
The Auto Register interface is displayed. See Figure 5-48.
Auto register
Select the Enable check box to enable Auto Register.
Enter IP Address, Port and Sub-Device ID. For details, see Table 5-19.
79
Table 5-19 Auto register parameter description
Description
The IP address of server that needs to be registered to.
Parameter
IP Address
Port
Sub-Device ID
Sub device ID assigned by server.
The port for auto-registration.
Click Save.
5.2.11 Wi-Fi
5.2.11.1.1 Wi-Fi
Devices with Wi-Fi function can access network through Wi-Fi.
(cid:122) Wi-Fi and WPS are available on select models.
(cid:122) All devices with WPS button support WPS function.
The name, status and IP information of current hotspot are displayed in the Wi-Fi information
bar. Click Refresh after reconnection to make sure that the operating status is displayed in real
time. Connecting Wi-Fi hotspot takes some time depending on network signal strength. For
Wi-Fi configuration interface, see Figure 5-49.
Wi-Fi interface
Perform the following steps to configure Wi-Fi.
Select the Enable check box.
Click Search SSID, and Wi-Fi hotspots in the environment of current network camera
are displayed. See Figure 5-50.
Wi-Fi setting
To manually add Wi-Fi, click Add SSID, and the Add WiFi interface is displayed. See
Figure 5-51.
Enter a network name in the dialog box.
80
It is recommended to set a secure encryption method for the Device to connect routers.
Adding Wi-Fi
Double-click one hotspot to display the Signal Quality and the Authentication
Manner.
(cid:122)
If the password is required, enter it. When entering the password, its index number
shall be consistent with that on the router.
(cid:122) Click Connection if password is not required.
5.2.11.1.2 WPS
For WPS configuration interface, see Figure 5-52.
WPS setting
PIN and SSID can be obtained from the router. Enter PIN and SSID, and then click Refresh to
display operating status in real time.
5.2.12 802.1x
802.1x is a port-based network access control protocol. It allows users to manually select
authentication mode to control device access to LAN, and meet authentication, billing, safety
and management requirements of the network.
Select Setting > Network > 802.1x.
The 802.1x interface is displayed, see Figure 5-53.
81
Select the Enable check box to enable 802.1x.
Select an authentication mode, and enter username and password. For parameter
description, see Table 5-20.
Table 5-20 802.1X setting parameter description
Parameter
Description
Authentication
PEAP (protected EAP protocol).
Username
Password
Click Save.
The username that was authenticated on the server.
Corresponding password.
5.2.13 QoS
QoS (Quality of Service) is a network security mechanism, and is also a technology to solve
network delay, congestion, and other problems. For network business, QoS includes
transmission bandwidth, time delay in transmission, and packet loss of data. In network, QoS
can be improved by ensuring transmission bandwidth, and reducing time delay in transmission,
packet loss rate, and delay jitter.
For DSCP (Differentiated Services Code Point), there are 64 priority degrees (0–63) of data
packets. 0 represents the lowest priority, and 63 the highest priority. Based on the priority, the
packets are classified into different groups. Each group occupies different bandwidth and has
different discard percentage when there is congestion so as to improve service quality.
Select Setting > Network > QoS.
The QoS interface is displayed. See Figure 5-54.
QoS interface
802.1x interface
82
Configure Realtime Monitor and Command. For parameter description, see Table
5-21.
Table 5-21 QoS setting parameter description
Parameter
Description
Realtime Monitor
Data packet of network video monitoring. The value ranges from 0 to
63.
Command
Data packet of device configuration and query. The value ranges from 0
to 63.
Click Save.
5.2.14 4G
5.2.14.1 Dialing Setting
Log in to web interface, select Setting > Network > 4G > Dialing Setting and the Dialing
Setting interface is displayed. See Figure 5-55.
Dialing setting interface
Some devices only support certain mobile carriers, and only the supported carriers are
displayed in Network Support.
Select the Enable check box.
Enter APN, Authorize Mode, Dial-up Number, Username, and Password according
to the SIM card inserted.
83
These parameters might vary by countries. Contact local carrier or customer service for
details.
Set the period to use 4G. See Figure 5-56.
(cid:122)
(cid:122)
If the current time is in the period you set, 4G network connection will be enabled.
The IP address of the SIM card will be displayed in IP Address. And you can
access the device through 4G after finishing the rest steps.
If the current time is not in the period you set, 4G network connection will not be
enabled. Only the corresponding Wireless Signal is displayed on the interface.
And you cannot access the device through 4G.
Period setting
Set the interval to enable 4G through message or phone call if you want to use 4G
outside the period set in Step 3.
The value range is 0–7200 s and it is 30 s by default. If the interval is 30 s, after
activating 4G, you can use it for 30 s. After 30 s, you need to activate 4G again. If you
set the interval to 0 s, you can use 4G without disconnection and you do not need to
activate it again. For the method to activate 4G through message or phone call, see
"4.2.12.2 Mobile Setting."
Click Save.
5.2.14.2 Mobile Setting
Log in to web interface, select Setting > Network > 4G > Mobile Settings, and the Mobile
Setting interface is displayed. See Figure 5-55.
84
You can add the phone number to receive alarms. You also can add phone number used to
activate 4G through message or phone call if you want to use 4G outside the period set in Step
3 of "5.2.14.1 Dialing Setting."
Make sure that you add international calling codes before the phone number to avoid
unnecessary charges caused by phone calls or messages to other countries or regions.
Mobile setting interface
(cid:122) Message Send: When alarms are triggered, the phone number added will receive
message.
(cid:122) Message Activation: You can enable 4G through message outside the period you set to
use 4G. You need to send "ON" or "OFF" to phone number of the SIM card in the Device.
"ON" indicates enabling, and "OFF" indicates disabling.
(cid:122) Phone Activation: You can enable 4G through phone calls outside the period you set to
use 4G. You need to call the phone number of the SIM card in the Device. If the call gets
through, it means 4G has been enabled.
(cid:122) Make sure that your SIM card supports making phone calls and sending messages, and it
(cid:122) Make sure that you use activation function outside the time range you set; otherwise it
Select the check box of the service you need to enable. You can select one or more
can be used normally.
does not work.
services.
Enter the phone number and click
to add it.
Click Save.
Select the Message Link check box on the interface of the event for which you want to
receive message.
Take Face Detection for example. Click Setting > Event > Face Detection and select
the Message Link check box.
85
Click Save on the interface of the corresponding event. And you will receive message if
the alarm is triggered.
5.2.15 Access Platform
5.2.15.1 P2P
P2P is a private network traversal technology which enables users to manage devices easily
without requiring DDNS, port mapping or transit server. Scan the QR code with your smart
phone, and then you can add and manage more devices on your mobile client.
Select Setting > Network > Access Platform > P2P.
The P2P interface is displayed.
Message link
86
P2P interface
(cid:122) P2P is enabled by default. You can manage the devices remotely.
(cid:122) When P2P is enabled and the device is connected to network, the status is
displayed as Online. We might collect the information including IP address, MAC
address, device name, and serial number. The information collected is for remote
access only. If you do not agree with this, you can clear the Enable check box.
Log in to mobile phone client and tap Device Management.
Tap Add + at the upper-right corner.
Scan the QR code on the P2P interface.
Follow the instructions to finish settings.
5.2.15.2 ONVIF
The ONVIF authentication is On by default, which allows the network video products (including
video recording device and other recording devices) from other manufacturers to connect to the
Service.
ONVIF is enabled by default.
Select Setting > Network > Access Platform > ONVIF.
The ONVIF interface is displayed. See Figure 5-60.
ONVIF interface
87
Select On for Authentication.
Click Save.
5.2.15.3 RTMP
You can connect the third party platforms (such as YouTube) to play live video through RTMP
protocol.
(cid:122) Only admin user can configure RTMP.
(cid:122) RTMP only supports H.264, H.264B and H.264H video formats, and Advanced Audio
Coding (AAC) audio format.
Select Setting > Network >Access Platform > RTMP.
The RTMP interface is displayed. See Figure 5-61.
RTMP interface
Select the Enable check box, and RTMP will be enabled.
When enabling RTMP, make sure that the address can be trusted.
Set parameters. For details, see Table 4-20.
Table 5-22 RTMP parameter setting description
Parameter
Description
Stream Type
Select live video stream type. Make sure that the video format of the
stream is H.264, H.264B or H.264H, and the audio format is AAC.
Address Type
There are two options: Non-custom and Custom.
Non-custom: You need to fill in the IP address or domain name.
Custom: You need to fill in the address allocated by the server.
IP Address
Port
If you have selected Non-custom, IP address and port need to be filled in.
IP Address: IPv4 or domain name is supported.
Port: It is recommended to use the default value.
88
Parameter
Description
Custom
Address
If you have selected Custom, the address allocated by the server needs
to be filled in.
Click Save.
PTZ Settings
5.3.1 Protocol
Network PTZ setting and analog PTZ setting are available on select models.
5.3.1.1 Network PTZ Settings
Select Setting > PTZ > Protocol > Network PTZ.
The Network PTZ interface is displayed. See Figure 5-62.
Network PTZ setting
Select a protocol as needed. You can select DH-SD1, DH-SD3, PELCOD, or PELCOP.
DH-SD1 is selected by default.
DH-SD1 protocol supports up to 80 presets, and DH-SD3 protocol supports up to 300
presets.
Click Save.
5.3.1.2 Analog PTZ Settings
Select Setting > PTZ > Protocol > Analog PTZ.
The Analog PTZ interface is displayed. See Figure 5-63.
89
Configure parameters as needed. See Table 5-23.
Table 5-23 Analog PTZ parameter description
Parameter
Description
Enter the address of the Device.
Address
Baud Rate
Select the baud rate of the Device.
Data Bit
Stop Bit
Parity
It is 8 by default.
It is 1 by default.
It is NONE by default.
Click Save.
Make sure that the address is the same as the device address; otherwise
you cannot control the device.
5.3.2 Function
5.3.2.1 Preset
Select Setting > PTZ > Function > Preset. The Preset interface is displayed. See Figure 5-64.
If you click Remove All, all presets and special presets will be cleared.
Analog PTZ setting
90
Preset settings
Preset
Preset means a certain position of the Device. Users can adjust the PTZ and camera to the
location quickly through calling presets.
At the lower left corner of the Preset interface, click the direction buttons,
,
, and
to adjust the PTZ direction, speed, zoom, and focus of
the Device.
Click
to add a preset.
The current position is set to a preset and is displayed in the list. See Figure 5-65
Adding presets
(cid:122) Double-click the preset title to edit the title displayed on the monitoring screen.
Click
to save the preset.
Perform operations on presets.
(cid:122) Click
to delete the preset.
91
Special Preset
Special presets serve as the shortcut for some special functions switch or calling, and they no
longer represent the location of the PTZ camera.
Click
to add a special preset. The added special preset will be displayed in the list.
See Figure 4-60.
The number of special presets starts from 51 by default, and 100 is the largest number.
Special presets
Click
Perform operations on special presets.
to save the added special preset.
(cid:122) Click
to modify the special preset function.
(cid:122) Click
to delete the special preset.
(cid:122) Click
to quickly call the function configured for the special preset.
If the PTZ is restored to default settings, all preset configurations will be cleared, but
the called function will remain.
5.3.2.2 Tour
Tour means a series of movements that the Device makes along several presets.
You need to set several presets in advance.
Select Setting > PTZ > Function > Tour.
The Tour interface is displayed. See Figure 5-67.
92
Tour settings
Select the Tour Mode from Original Path and Shortest Path. Original Path is
selected by default.
(cid:122) Original Path: Tour in the order of adding presets.
(cid:122) Shortest Path: Starting from the preset with largest horizontal zoom value and
vertical zoom value, pass all presets in the tour to ensure the shortest path. The
Device reaches the corresponding preset and ensure the minimum number of
rotation.
Click Add at the bottom of the list at the upper right corner of the interface to add a tour
Click Add at the bottom of the list at the lower right corner of the interface to add
path.
several presets.
Perform tour operations.
(cid:122) Double-click tour name to edit the name of the corresponding tour.
(cid:122) Double-click duration to set the time that the Device stays at the corresponding
(cid:122) Double-click speed to modify the tour speed. The default value is 7, and the value
range is 1–10. The larger the value, the faster the speed.
Click Start to start the tour.
preset.
The ongoing tour stops if any operation is made to the PTZ.
5.3.2.3 Scan
Scan means the Device moves horizontally at a certain speed between the defined left and
right limits.
Select Setting > PTZ > Function > Scan.
93
The Scan interface is displayed. See Figure 5-68.
Scan settings
Select the Scan No.
Drag the slider to adjust the scan speed.
Click Setup to adjust the Device to an ideal position.
Click Set Left Limit and Set Right Limit to set the left and right boundaries of the
Device.
Click Start, and the Device starts scanning.
Click Stop, and the scanning stops.
5.3.2.4 Pattern
Pattern means a record of a series of operations that users make to the Device. The operations
include horizontal and vertical movements, zoom and preset calling. Record and save the
operations, and then you can call the pattern path directly.
Select Setting > PTZ > Function > Pattern.
The Pattern interface is displayed. See Figure 5-69.
94
Select the Pattern No.
Click Setup and Start Rec, and then operate the PTZ as needed.
Click Stop Rec to stop recording.
Click Start, and the Device starts patterning.
Click Stop, and the patterning stops.
5.3.2.5 Pan
Pan refers to the continuous 360° rotation of the Device at a certain speed.
Select Setting > PTZ > Function > Pan.
The Pan interface is displayed. See Figure 5-70.
Pattern settings
95
Pan settings
Drag the slider to set the Pan Speed.
Click Start, and the Device starts to rotate horizontally at this speed.
5.3.2.6 PTZ Speed
You can adjust the manual control speed of the PTZ by setting PTZ speed. This speed does not
apply to tour, pattern, or auto tracking.
Select Setting > PTZ > Function > PTZ Speed.
The PTZ Speed interface is displayed. See Figure 5-71.
PTZ speed settings
Select Low, Middle or High.
96
5.3.2.7 Idle Motion
Idle motion refers to a defined operation when the Device does not receive any valid command
within a certain period.
Set Preset, Tour, Scan or Pattern in advance.
Select Setting > PTZ > Function > Idle Motion.
The Idle Motion interface is displayed. See Figure 5-72.
Idle motion settings
Select the Enable check box to enable the idle motion.
Select idle motion from Preset, Tour, Scan and Pattern.
Select the action number of the selected motion.
Set Idle Time for the selected motion.
Click Save.
5.3.2.8 PowerUp
PowerUp means the automatic operation of the Device after it is powered on.
Set Preset, Tour, Scan or Pattern in advance.
Select Setting > PTZ > Function > PowerUp.
The PowerUp interface is displayed. See Figure 5-73.
97
PowerUp settings
98
Select the Enable check box to enable power up motion.
Select power up motion from Preset, Tour, Scan, Pattern or Auto.
Select Auto and the last motion before you shut down the Device last time will be
performed.
Select the action number of the selected motion.
Click Save.
5.3.2.9 PTZ Limit
After setting the PTZ limit, the Device can only move in the set area.
Select Setting > PTZ > Function > PTZ Limit.
The PTZ Limit interface is displayed. See Figure 5-74.
PTZ limit settings
Adjust the PTZ direction and click Setting to set the Up Line.
Adjust the PTZ direction and click Setting to set the Down Line.
Click Live to preview the already-set up line and down line.
Select the Enable check box to enable the PTZ limit function.
5.3.2.10 Time Task
After setting time task, the Device performs the selected motions during the set period.
Set Preset, Tour, Scan or Pattern in advance.
Select Setting > PTZ > Function > Time Task.
The Time Task interface is displayed. See Figure 5-75.
Time task settings
Select the Enable check box to enable time task function.
Set the time task number.
Click Clear All to delete all set time tasks.
Select Time Task action such as Preset, Tour, Scan or Pattern.
Select the action number of the selected motion.
Set the time for AutoHome.
AutoHome refers to the time needed to automatically recover the time task in case of
manually calling the PTZ to stop the time task.
Click Period setting to set the period to perform time tasks.
Select the task number to copy settings to the selected task, and then click Copy.
Click Save.
5.3.2.11 PTZ Restart
Restart the PTZ. Follow these steps to complete the configuration.
99
Select Setting > PTZ > Function > PTZ Restart.
The PTZ Restart interface is displayed. See Figure 5-76.
PTZ restart
Click PTZ Restart.
The PTZ is restarted.
5.3.2.12 Default
Restore the PTZ to factory defaults.
This function will restore the Device to defaults. Think twice before performing the operation.
Select Setting > PTZ > Function > Default.
The Default interface is displayed. See Figure 5-77.
100
Default setting
101
Click Default.
The PTZ will be restored to factory defaults.
Event Management
5.4.1 Video Detection
5.4.1.1 Motion Detection
Video detection includes three event types: Motion Detection, Video Tamper and Scene
Changing.
When the moving object appears and moves fast enough to reach the preset sensitivity value,
alarms will be triggered.
Select Setting > Event > Video Detection > Motion Detection.
The Motion Detection interface is displayed. See Figure 5-78.
Select the Enable check box, and then configure parameters as needed.
(cid:122) Set arming and disarming period.
1) Click Setting, and then set the arming and disarming period on the interface. See
Figure 5-79.
Motion detection settings
102
Arming and disarming period settings
2) Set the alarm period to enable alarm events in the period you set.
There are 6 time periods for each day. Select the check box for the time period to
enable it.
Select the day of week (Sunday is selected by default; If All is selected, the setting
is applied to the whole week. You can also select the check box next to the day to
set it separately).
3) After completing the settings, click Save.
You will return to the Motion Detection interface.
(cid:122) Set the area.
Click Setting, and the Area interface is displayed. See Figure 5-80. Refer to Table
5-24 and Table 5-25 for parameters description. Each color represents a certain
region, and you can set different motion detection regions for each area. The
detection region can be irregular and discontinuous.
103
Area setting
Table 5-24 Area setting parameter description
Parameter
Description
Name
The default names are Region1, Region2, Region3 and Region4, and the
names can be customized.
Sensitivity
Threshold
Sensitivity to brightness change. The higher the sensitivity is, the easier the
motion detection event will occur.
You can set different sensitivities for each region, with values ranging from 0
to 100, and 30 to 70 is recommended.
Detect the relation between the object and the region. The smaller the
threshold is, the easier the motion detection will occur.
Set different thresholds for each region, with values ranging from 0 to 100,
and 1 to 10 is recommended.
Waveform
graph
The red line indicates that motion detection is triggered, and the green line
indicates that it is not triggered.
Remove All Remove all detection regions.
Delete
Delete the detection region of the selected color block.
(cid:122) Other parameters
Table 5-25 Video detection parameter description
Parameter
Description
Anti-Dither
The system records only one motion detection event within the defined
period. The value range is 0–100 s.
After you enable the function, the motion detection events that occur when
you control the PTZ manually will be excluded. In this way, you can reduce
the false alarm rate of such events.
Enable
Manual
Control
Trigger
104
Parameter
Description
Record
After you enable the function, when an alarm is triggered, the system will start
recording automatically. Before using the function, you need to set the
recording period of the alarm in Storage > Schedule, and select Auto for
Record Mode on the Record Control interface.
Record
Delay
Relay-out
When the alarm is over, the alarm recording will continue for an extended
period of time. The time unit is second, and the value range is 10–300.
Select the check box, and you can enable the alarm linkage output port, and
link corresponding relay-out devices after an alarm is triggered.
Alarm Delay When the alarm is over, the alarm will continue for an extended period of
time. The time unit is second, and the value range is 10–300.
Send Email
After you select the check box, when an alarm is triggered, the system sends
email to the specified email address. You can configure the email address in
"5.2.5 SMTP (Email)."
PTZ
Snapshot
Select PTZ, and then configure the linkage action. When an alarm is
triggered, the system links PTZ to rotate to the preset. The Activation
options include None, Preset, Tour and Pattern.
Select the Snapshot check box, and then the system takes snapshot
automatically when an alarm is triggered. You need to set the alarm snapshot
period as described in "5.5.1.2 Snapshot."
Click Save.
5.4.1.2 Video Tamper
Alarms will be triggered if there is video tampering.
Select Setting > Event > Video Detection > Video Tamper.
The Video Tamper interface is displayed. See Figure 5-81.
105
Select the Enable check box, and then configure parameters as needed.
Click Save.
For parameters configuration, see "5.4.1.1 Motion Detection."
5.4.1.3 Scene Changing
Alarms will be triggered if there is scene changing.
Select Setting > Event > Video Detection > Scene Changing.
The Scene Changing interface is displayed. See Figure 5-82.
Video tamper settings
106
Scene changing settings
Select the Enable check box, and then configure parameters as needed.
Click Save.
For parameters configuration, see "5.4.1.1 Motion Detection."
5.4.2 Smart Motion Detection
After you set smart motion detection, when the human, non-motor vehicles and motor vehicles
appear and move fast enough to reach the preset sensitivity value, the alarm linkage actions
will be performed. The function can help you to avoid the alarms triggered by natural
environment change.
(cid:122) The function depends on the result of motion detection, and all other parameters (except
sensitivity) of motion detection function are used, including arming period, area settings,
and linkage configurations. If no motion detection is triggered, smart motion detection will
not be triggered.
If motion detection is not enabled, when smart motion detection is enabled, motion
detection will also be enabled. If both functions are enabled, when motion detection is
disabled, smart motion detection will also be disabled.
(cid:122)
(cid:122) When smart motion detection is triggered and recording is linked, back-end devices can
filter recording with human or vehicles through smart search function. For details, see the
corresponding user’s manual.
107
Preparation
Procedure
(cid:122) Select Setting > Event > Video Detection > Motion Detection, and then enable the
(cid:122) Set the arming period and detection area. The sensitivity of each region is larger than 0,
motion detection function.
and the threshold is not equal to 100.
Select Setting > Event > Smart Motion Detection.
The Smart Motion Detection interface is displayed. See Figure 5-83.
Smart motion detection
Select the Enable check box, and then the Smart Motion Detection is enabled.
Select the effective object and sensitivity.
(cid:122) Effective object: Select Human or Motor Vehicle. When Human is selected,
both people and non-motor vehicles will be detected.
(cid:122) Sensitivity: Select High, Medium, or Low. The higher the sensitivity, the easier
the alarm is triggered.
Click Save.
5.4.3 Audio Detection
Select Setting > Event > Audio Detection > Audio Detection.
The Audio Detection interface is displayed. See Figure 5-84.
108
Audio detection settings
Configure parameters as needed. For the parameter description, see Table 5-26.
Table 5-26 Audio detection parameter description
Parameter
Description
Input
Abnormal
Intensity
Change
Sensitivity
Threshold
Select Input Abnormal, and then an alarm is triggered when there is
abnormal audio input.
Select Intensity Change, and then an alarm is triggered when the change in
sound intensity exceeds the defined threshold.
The value ranges from 1 to 100. The smaller this value is, the larger the input
sound volume changes are needed for it to be judged as an audio anomaly.
You need to adjust it according to the actual condition.
The value ranges from 1 to 100. Configure the ambient sound intensity you
need to filter. The louder the ambient noise is, the larger this value shall be.
You need to adjust it according to the actual condition.
Click Save.
For other parameters, see "5.4.1.1 Motion Detection."
109
5.4.4 Smart Plan
Smart plans include IVS, face recognition, heat map, people counting, video metadata, and so
on. Only after smart plans have been enabled, can the corresponding smart function come into
effect.
Before configuring the smart plan, you need to set presets in advance. For setting methods,
see "5.3.2.1 Preset."
Select Setting > Event > Smart Plan.
The Smart Plan interface is displayed.
Smart plan (1)
(Optional) Click
to enable Auto Tracking.
When enabling auto tracking, you do not need to configure smart plans, and the Device
perform auto tracking based on internal mechanism. If auto tracking and alarm track of
the smart plan (such as IVS) are both enabled, the Device perform tracking in the order
of triggering time.
It is recommended to disable auto tracking when alarm track is enabled to avoid
disordered tracking.
Click
to select the presets to be configured.
Select smart plans as needed.
The selected function will be highlighted. See Figure 5-86. Click it again to cancel the
selection.
110
Smart plan (2)
Click Save.
5.4.5 IVS
Basic Requirements for the Scene
(cid:122) The target size shall not exceed 10% of the image.
(cid:122) The pixel of the target shall be no less than 10×10; the pixel of abandoned object shall be
no less than 15×15 (CIF image); the width and height of the target shall be no more than
1/3 of the image. It is recommended that the height of the target is 10% of the image.
(cid:122) The brightness difference between the target and the background is no less than 10 gray
(cid:122) The target shall be present in the image for no less than 2 consecutive seconds, and the
moving distance shall be larger than its width and no less than 15 pixels (CIF image).
(cid:122) Try to reduce the complexity of monitoring scenes. It is not recommended to enable IVS in
scenes with dense targets and frequent light changes.
(cid:122) Try to avoid the following scenes: scenes with reflective surfaces such as glass, bright
ground or water; scenes that disturbed by tree branches, shadows or winged insects;
scenes that against light or under direct light exposure.
values.
Before using the function, you need to set presets in advance. For setting methods, see
"5.3.2.1 Preset."
5.4.5.1 Rule Config
Set smart rules. Follow these steps to complete the configuration.
Select Setting > Event > IVS > Rule Config.
The Rule Config interface is displayed. See Figure 5-87.
111
Select the presets to be configured with smart rules.
Click
to add smart rules.
Click Save.
Double-click rule type to modify the type of rules.
5.4.5.1.1 Tripwire
Alarms are triggered when the target crosses the warning line in the defined direction.
It requires certain stay time and moving space for the target to be confirmed, so you need to
leave some space at both sides of the warning line during configuration and do not draw it near
obstacles.
Applicable scenes: Scenes with sparse targets and no occlusion between targets, such as
perimeter protection of unattended areas.
Select Tripwire from the Rule Type list.
The configuration interface is displayed. See Figure 5-88.
Adding smart rules
112
Tripwire rule settings
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Table 5-27 Rule drawing parameter description
Parameter
Description
Max Size
Set the size range of detection targets to be filtered, and select the maximum
or minimum size.
Max Size: Set the maximum size of targets to be filtered. When the target
Min Size
is larger than this size, the system will ignore it. The unit is pixel.
Min Size: Set the minimum size of targets to be filtered. When the target
is smaller than this size, the system will ignore it. The unit is pixel.
Pixel
Counter
Help to accurately draw the target area.
Enter the length and width of the target area in Pixel Counter, and click Draw
Target to generate the target area in the monitoring screen. The unit is pixel.
Enter the rule configuration interface, and the locking function will be
automatically enabled, and the locking time is 180 s. During this period, the
device cannot track the target. Click Unlock to release the control.
Lock/Unlock
The locking function only takes effect in the rule configuration interface. After
switching to the Live interface, the Device can track the target normally.
Configure parameters as needed. For the parameter description, see Table 5-28.
113
Table 5-28 Tripwire parameter description
Parameter
Description
Period
Set the alarming period to enable alarm events in the period you set.
1. Click Setting, and then the Period interface is displayed.
2. Enter the time value or press and hold the left mouse button, and
drag directly on the setting interface. There are six periods for
setting each day. Select the check box next to the period, and the
set period will be effective.
3. Select the day of week (Sunday is selected by default; If All is
selected, the setting is applied to the whole week. You can also
select the check box next to the day to set it separately).
4. After completing the setting, click Save to return to the rule
configuration interface.
Direction
Configure the tripwire direction. You can select A->B, B->A or A<->B.
Alarm Track
Select the check box, and there will be alarm tracking when an smart rule is
triggered.
Track Time
Set the alarm tracking time.
Record
Select the check box, and when an alarm is triggered, the system will start
recording automatically. Before using the function, you need to set the
recording period of the alarm in Storage > Schedule, and select Auto for
Record Mode in the Record Control interface.
Record
Delay
When the alarm is over, the recording will continue for an extended period of
time. The value range is 10–300 s.
Relay-out
Select the check box, and you can enable the alarm linkage output port, and
link corresponding relay-out devices when an alarm is triggered.
Alarm Delay
When the alarm is over, the alarm will continue for an extended period of
time. The value range is 10–300 s.
Send Email
Select the Send Email check box, and when an alarm is triggered, the
system sends an email to the specified mailbox. You can configure the
mailbox in Setting > Network > SMTP (Email).
Snapshot
Select the check box, and the system will automatically take snapshots in
case of alarms. You need to set snapshot period in Storage > Schedule.
Click Save.
5.4.5.1.2 Intrusion
Intrusion includes crossing areas and in-area functions.
(cid:122) Crossing area means an alarm will be triggered when a target enters or leaves the area.
(cid:122)
In-area function means an alarm will be triggered when a specified number of targets
appear in a set alarming area at a given time. In-area function only counts the number of
targets in the detection area, regardless of whether they are the same targets.
(cid:122) For the reporting time interval of the in-area functions, the system will trigger the first alarm
and then detect whether the same event occurs in the interval period. If no same event
occurs in this period, the alarm counter will be cleared.
Similar to the warning line, to detect an entry/exit event, a certain movement space should be
reserved at the periphery of the area line.
114
Applicable scenes: Scenes with sparse targets and no occlusion between targets, such as
perimeter protection of unattended areas.
Select Intrusion from the Rule Type list.
The configuration interface is displayed. See Figure 5-89.
Intrusion settings
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Configure parameters as needed. For the parameter description, see Table 5-29.
Table 5-29 Intrusion parameter description
Parameter
Description
Action
Configure intrusion action, and you can select Appear or Cross.
Direction
Select the crossing direction from Enters, Exits, and Enter & Exit.
For other parameters, see "5.4.5.1.1 Tripwire."
Click Save.
5.4.5.1.3 Abandoned Object
An alarm will be triggered when the selected target in the monitoring scene stays in the screen
for more than the set time.
Pedestrians or vehicles that stay for too long would be regarded as abandoned objects. To filter
out such alarms, you can use Target filter. In addition, the duration can be properly extended
to avoid false alarm due to a short stay of people.
115
Applicable scenes: Scenes with sparse targets, no obvious and frequent light changes. For
scenes with intensive targets or too many obstacles, missed alarms would increase; for scenes
in which too many people stay, false alarms would increase. Select detection areas with simple
texture, because this function is not applicable to scenes with complex texture.
Select Abandoned Object from the Rule Type list.
The configuration interface is displayed. See Figure 5-90.
Abandoned object settings
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Configure parameters as needed. For the parameter description, see Table 5-30.
Table 5-30 Abandoned object parameter description
Parameter
Description
Duration
For abandoned object, the duration is the shortest time to trigger an alarm
after an object is abandoned.
For other parameters, see "5.4.5.1.1 Tripwire."
Click Save.
5.4.5.1.4 Missing Object
An alarm will be triggered when the selected target in the scene is taken away for the time
longer than the set duration.
The system analyzes static areas from the foreground, and determines whether it is missing
object or abandoned object from the similarity of its foreground and background. When the time
exceeds the set period, an alarm is triggered.
116
Applicable scenes: Scenes with sparse targets, no obvious and frequent light changes. For
scenes with intensive targets or too many obstacles, the missed alarm would increase; for
scenes in which too many people stay, the false alarm would increase. Keep the detection area
texture as possible simple as possible, because this function is not applicable to scenes with
complex texture.
Select Missing Object from the Rule Type list.
The configuration interface is displayed. See Figure 5-91.
Missing object setting
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Configure parameters as needed. For the parameter description, see Table 5-31.
Table 5-31 Missing object parameter description
Parameter
Description
Duration
Configure the shortest time from the object disappearing to the alarm being
triggered.
For other parameters, see "5.4.5.1.1 Tripwire."
Click Save.
5.4.6 Face Recognition
(cid:122) Select Setting > Event > Smart Plan, and then enable face recognition.
117
(cid:122) This function is available on select models.
The function can detect faces and compare them with those in the configured face database.
5.4.6.1 Face Detection
When human face is detected in the monitoring screen, an alarm is triggered and the linked
activity is executed.
Select Setting > Event > Face Recognition > Face Detection.
The Face Detection interface is displayed. See Figure 5-92.
Face detection interface
Select Enable, and you can enable the face detection function.
Configure parameters as needed. For the parameter description, see Table 5-32.
Table 5-32 Face detection parameter description
Parameter
Description
Period
Alarm event will be triggered only within the defined time period. See
"5.4.1.1 Motion Detection."
Face
Enhancement
Select Face Enhancement to preferably guarantee clear faces with low
stream.
Select Record, and the system records video when alarms are triggered.
Record."
Control."
Record
To enable video recording, you need to make sure that:
(cid:122) The motion detection recording is enabled. For details, see "5.5.1.1
(cid:122) The auto recording is enabled. For details, see "5.5.4 Record
Record Delay
The video recording will not stop until the record delay time you set has
passed.
118
Parameter
Description
Send Email
Select Send Email, and when alarms are triggered, the system sends
email to the specified mailbox. For the email settings, see "5.2.5 SMTP
(Email)."
Select Snapshot, and the system takes snapshot when alarms are
triggered.
Snapshot
Record."
(cid:122) Enable the motion detection snapshot first. For details, see "5.5.1.1
(cid:122) For searching and setting snapshot storage path, see "5.1.2.5 Path."
Set the snapshot scope, including Face and One-inch photo.
Select the Attribute check box, click
attributes during face detection.
, and then you can set the human
Snap Face
Image
Attribute
Click Save.
5.4.6.2 Face Database Config
After you successfully configure the face database, the detected faces can be compared with
the information in the face database. Configuring a face database includes creating a face
database, adding face pictures, and face modeling.
5.4.6.2.1 Adding Face Database
Create a face database, and then register face images, that is to add face pictures to the newly
created face database.
Select Setting > Event > Face Recognition > Face Database Config.
The Face Database Config interface is displayed. See Figure 5-93.
Face database config
Click Add Face Database.
The Add Face Database interface is displayed. See Figure 5-94.
Adding face database
Set face database name.
Click OK to complete the addition.
119
The added face database is displayed. See Figure 5-95.
Adding face database completed
Configure parameters as needed. For the parameter description, see Table 5-33.
Table 5-33 Face database config parameter description
Parameter
Description
Deploy
Select Deploy and the face database takes effect.
Similarity
Threshold
More Info
Arm/Disarm
The comparison is successful only when the similarity between the
detected face and the face feature in face database reaches the set
similarity threshold. After this, the comparison result is displayed on the
Live interface.
Click More Info to manage face database. You can set search conditions,
register people, and modify people information.
Alarm event will be triggered only within the defined time period. See
"5.4.1.1 Motion Detection."
Delete
Delete the selected face database.
5.4.6.2.2 Adding Face Pictures
Manual Addition
Add face pictures to the created face database. Manual addition and batch import are
supported.
Add a single face picture. Use this method when registering a small number of face pictures.
Select Setting > Event > Face Recognition > Face Database Config.
The Face Database Config interface is displayed.
Click
More Info for the face database to be configured.
The interface is displayed. See Figure 5-96.
More info
Set filtering conditions as needed, and then click Search. The search result is
displayed.
Click Registration.
The Registration interface is displayed. See Figure 5-97.
120
Import the face pictures to be uploaded. The interface is displayed. See Figure 5-98.
Click Upload Picture.
You can manually select a face area. After uploading the picture, select a face area and
click OK. If there are multiple faces in a picture, select the target face and click OK to
save the face picture.
Registration interface
121
Addition completed
Fill in face picture information as needed.
Click Add to task list.
Click
.
The Task List interface is displayed. See Figure 5-99.
Task list addition completed
Click Remove All, and you can remove all the tasks.
Batch Registration
Import multiple face pictures in batch. Use this method when registering a large number of face
pictures.
importing pictures
format of
Before
"Name#SGender#BDate of Birth#NRegion#TCredentials Type#MID No. jpg" (for example,
"John#S1#B1990-01-01#NCN#T1#M330501199001016222"). For naming rules, see Table
5-34.
in batches, name
face pictures
the
the
in
Name is required and the rest are optional.
122
Table 5-34 Naming rules for batch import
Naming Rules Description
Name
Gender
Enter the corresponding name.
Enter a number. 1: Male; 2: Female.
Region
Enter the region name.
Credentials
Type
ID No.
Enter ID No.
Enter a number. 1: ID card; 2: passport.
Date of Birth
Enter numbers in the format of yyyy-mm-dd. For example, 2017-11-23.
Select Setting > Event > Face Recognition > Face Database Config.
The Face Database Config interface is displayed.
Click
More Info for the face database to be configured.
The Face Database interface is displayed.
Click Batch Registration.
The Task List interface is displayed. See Figure 5-100.
Batch registration
Click
to select the file path.
Batch registration
Click Browse.
The registering interface is displayed. See Figure 5-101.
123
Registering
After the registration is completed, click Next to view the registration result.
5.4.6.2.3 Managing Face Pictures
Modifying Face Information
Add face pictures to face database; manage and maintain face pictures to ensure correct
information.
On the Face Database Config interface, move the mouse pointer to the face picture or person
information line. Click
or
, and the Registration interface is displayed. See Figure
5-103. After modifying the face picture information as needed, click Add to task list.
Registration interface
Deleting Face Pictures
Enter face database, and then delete the created face picture.
(cid:122) Single deletion: Move the mouse pointer to the face picture or people information line, and
then click
or
to delete the face picture.
124
(cid:122) Batch deletion: Move the mouse pointer to the face picture or people information line, and
then click
at the upper right corner of the face pictures, or click
on person
information line. After selecting multiple items, click Add to the delete list, click
, and then click OK to delete the selected face pictures.
(cid:122) Delete all: When viewing face pictures in a list, click
on people information line (or
select All when viewing face pictures in pictures), click Add to the delete list, click
, and then click OK to delete all face pictures.
5.4.6.2.4 Face Modeling
Extract and import the relevant information of face pictures into the database through face
modeling, and create a face feature mode for smart detection such as face comparison.
(cid:122) The more face pictures you choose, the longer the modeling time is. Wait patiently.
(cid:122) During the modeling process, some smart detection functions (such as face comparison)
are temporarily unavailable and can be resumed after the modeling is completed.
Select Setting > Event > Face Recognition > Face Database Config.
The Face Database Config interface is displayed.
Click
More Info for the face database to be configured.
The face database interface is displayed. See Figure 5-104.
Face database interface
Choose the face pictures for modeling as needed.
Click
to view the face picture in a list. Click
to view the face image as a
thumbnail.
(cid:122) Modeling All
Click Modeling All, and all face pictures in the face database will be modeled.
(cid:122) Selective Modeling
If there are many face pictures in the face database, set filtering conditions and click
Search to select face pictures for modeling.
125
Modeling completed
5.4.6.3 Alarm Linkage
Set the alarm linkage mode for face comparison.
Select Setting > Event > Face Recognition > Alarm.
The Alarm interface is displayed. See Figure 5-106.
Alarm linkage
Face
Database
Relay-out
Configure parameters as needed. For the parameter description, see Table 5-35.
Table 5-35 Alarm linkage parameter description
Parameter
Description
Select the face database to be configured with alarm linkage.
Alarm Rule
Select the alarm rule as needed.
Select the Relay-out check box, and when an alarm is triggered, the system
interacts with the linked alarm devices.
Alarm Delay
The alarm will continue for an extended period of time. The value range is 1–
300 s.
Click Save.
126
5.4.7 People Counting
needed.
(cid:122) Before using this function, you need to enable People Counting in Smart Plan.
(cid:122) The people counting data will be overwritten if the disk is full. Back up the data in time as
(cid:122) This function is available on select models.
You can use this function to count the number of people in the area and generate reports.
5.4.7.1 People Counting
With the function, the system can count the number of people appearing in the monitoring
screen within a certain period of time.
Select Setting > Event > People Counting > People Counting.
The People Counting interface is displayed. See Figure 5-107.
People counting settings
Select the presets to be configured.
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Configure parameters as needed. For the parameter description, see Table 5-36.
127
Table 5-36 People counting parameter description
Parameter
Description
OSD
Enter No.
Leave No.
Display the number of people displayed in the area in real time. Click Clear,
and the current number will be zero.
Set the Enter No., and when the number of people entering reaches the set
value, an alarm will be triggered.
Set the Leave No., and when the number of people leaving reaches the set
value, an alarm will be triggered.
Stranded
No.
Set the Stranded No., and when the number of people staying reaches the
set value, an alarm will be triggered.
For other parameters, refer to "5.4.5.1.1 Tripwire."
Click Save.
5.4.7.2 Report
You can view the statistics results of people in the scene during the selected period.
Select Setting > Event > People Counting > Report.
The Report interface is displayed. See Figure 5-108.
People counting–report
Select a preset.
Select the Rule, Statistics Type, and Time Range.
Select the start time and end time for searching reports.
Select Flow Direction and Chart Type.
Click Search to generate reports, and click Export to export the report to local storage.
5.4.8 Heat Map
in the Smart Plan.
(cid:122) Before enabling Heat Map, you need to set presets in PTZ section, and select the function
(cid:122) The data will be overwritten if the disk is full. Back up the data in time as needed.
128
(cid:122) This function is available on select models.
5.4.8.1 Heat Map
The function can be used to detect the activity level of moving objects in the scene during a
certain period of time.
Select Setting > Event > Heat Map > Heat Map.
The Heat Map interface is displayed. See Figure 5-109.
Heat map interface
Select the presets to be configured.
Select the Enable check box, and then the heat map function is enabled.
Click Setting to set the arming period. For details, see "5.4.1.1 Motion Detection."
Click Save.
5.4.8.2 Report
You can view the heat map report for the scene in the selected time period.
Select Setting > Event > Heat Map > Report.
The Report interface is displayed.
Set the start time and end time to search for the heat map report.
Select a preset.
Click Search, and the search results will be displayed on the interface. See Figure
5-110.
129
Report
130
5.4.9 Video Metadata
With the function, the system can count the number of motor vehicles, non-motor vehicles and
people in the monitoring screen, identify the features of the vehicles and people in the scene,
and take snapshots.
(cid:122) Before using video metadata, you need to enable the function in the Smart Plan.
(cid:122) This function is available on select models.
5.4.9.1 Scene Setting
Set the parameters of snapshot, analysis and alarm in the scene.
Select Setting > Event > Video Metadata.
The Scene Set interface is displayed. See Figure 5-111.
Video metadata–scene set
Click the Preset list to select the preset to configure video metadata.
Click
Modify the parameters as needed.
to add a rule type.
(cid:122) Double-click the name to modify the rule name.
(cid:122) Select the rule type from People, Non-motor Vehicle and Motor Vehicle.
Click the corresponding
to delete detection items.
Configure parameters as needed. For parameter description, see Table 5-37.
Table 5-37 Scene set parameter description
Parameter
Description
After selection, traffic flow statistics will be displayed on the screen.
Select the check box to enable the OSD overlay. The statistics will be
displayed on the Live interface in the form of OSD information.
Click it to clear the statistics of motor vehicles, non-motor vehicles and
people.
For other parameters, see "5.4.5.1.1 Tripwire."
131
People Flow
Statistics
Non-motor
Vehicle Flow
Statistics
Traffic Flow
Statistics
OSD
Clear
Click Save.
5.4.9.2 Picture Overlay
Set the overlay information on the snapshot.
Select Setting > Event > Video Metadata > Overlay.
The Picture interface is displayed.
Select Picture Overlay Type from People, Non-motor Vehicle and Motor Vehicle.
See Figure 5-112, Figure 5-113 and Figure 5-114.
Picture overlay–motor vehicle
Picture overlay–non-motor vehicle
132
Picture overlay–people
Select overlay information as needed.
Click Save.
If you select Location, you need to manually enter the location of the Device.
5.4.9.3 Report
You can view the number of vehicles, non-vehicles and people in the scene during the selected
period.
Select Setting > Event > Video Metadata > Report.
The Report interface is displayed.
Select the Report Type.
Select the start time and end time for searching reports.
Select the Traffic Flow Statistics Type.
Click Search to generate reports. See Figure 5-115.
Video metadata report
133
5.4.10 Alarm
Select Setting > Event > Alarm.
The Alarm interface is displayed. See Figure 5-116.
Alarm
Configure parameters as needed. For parameter description, see Table 5-38.
Table 5-38 Alarm setting parameter description
Parameter
Description
Enable
Relay-in
Sensor Type
Select the Enable check box, and then the alarm linkage is enabled.
Select alarm input, and 7 alarm inputs are available.
There are two types: NO (normally open) and NC (normally closed). Switch
from NO to NC, and alarm event will be enabled. Switch from NC to NO, and
alarm event will be disabled.
Click Save.
For other parameters, see "5.4.1.1 Motion Detection."
5.4.11 Abnormality
Abnormality includes 7 alarm events: No SD Card, Capacity Warning, SD Card Error,
Disconnection, IP Conflict, Illegal Access, and Security Exception.
134
5.4.11.1 SD Card
In case of an SD card exception, an alarm will be triggered. Follow these steps to complete the
configuration.
Select Setting > Event > Abnormality > SD Card.
The SD Card interface is displayed. See Figure 5-117, Figure 5-118, and Figure 5-119.
No SD card
SD card error
135
Configure parameters as needed. For parameter description, see Table 5-39.
Table 5-39 SD card exception parameter description
Parameter
Description
Enable
Capacity
Limit
Select the check box to enable this function.
Configure the free space percentage, and if the free space in the SD card is
less than the defined percentage, an alarm is triggered.
For other parameters, see "5.4.1.1 Motion Detection."
Click Save.
5.4.11.2 Network Exception
In case of a network exception, an alarm will be triggered. Follow these steps to complete the
configuration.
Select Setting > Event > Abnormality > Network.
The Network interface is displayed. See Figure 5-120 and Figure 5-121.
Capacity warning
136
Disconnection
IP conflict
Configure parameters as needed. See Table 5-40.
Table 5-40 Network exception parameter description
Parameter
Description
Enable
Select the check box to enable this function.
Click Save.
For other parameters, see "5.4.1.1 Motion Detection."
5.4.11.3 Illegal Access
Illegal access alarm is triggered when the login password has been wrongly entered for more
than the times you set.
Select Setting > Event > Abnormality > Illegal Access.
The Illegal Access interface is displayed. See Figure 5-122.
137
Illegal access
Configure parameters as needed. For parameter description, see Table 5-41.
Table 5-41 Illegal access parameter description
Parameter
Description
Enable
Select the check box to set the illegal access alarm.
Login Error
After entering a wrong password for the set times, the alarm for illegal access
will be triggered, and the account will be locked.
Click Save.
For other parameters, see "5.4.1.1 Motion Detection."
5.4.11.4 Security Exception
When an event affecting the Device safety occurs, an alarm for safety exception will be
triggered.
Select Setting > Event > Abnormality > Security Exception.
The Security Exception interface is displayed. See Figure 5-123.
Security exception
Configure each parameter as needed. For details, refer to "5.4.1.1 Motion Detection."
Click Save.
138
Storage
5.5.1 Schedule
5.5.1.1 Record
Before setting the schedule, make sure that the Record Mode is Auto in Record Control.
If the Record Mode is Off, the Device will not record or take snapshots according to the
schedule.
Select Setting > Storage > Schedule > Record.
The Record interface is displayed. See Figure 5-124.
Record
Select the day for recording from Monday to Sunday. Click Setting on the right, and the
Setting interface is displayed. See Figure 5-125.
(cid:122) Set the recording period as needed. You can set up to six periods for one day.
(cid:122) You can select 3 types of recording: General, Motion and Alarm.
To set the time period, you can also press and hold the left mouse button and drag
directly on the Record interface.
139
Record schedule setting
Click Save to return to the Record interface. See Figure 5-126.
At this time, the colored chart visually displays the set time period.
Green: Represents general recording.
Yellow: Represents motion detection recording.
Red: Represents the alarm recording.
Recording schedule setting completed
On the Record interface, click Save, and the Save Succeeded! prompt will be
displayed, which means the recording schedule has been set.
5.5.1.2 Snapshot
Select Setting > Storage > Schedule > Snapshot.
The Snapshot interface is displayed. See Figure 5-127.
140
For the snapshot schedule settings, refer to Step 2 and Step 3 in "5.5.1.1 Record."
Click Save, and the Save Succeeded! prompt will be displayed, which means the
snapshot schedule has been set.
5.5.1.3 Holiday Schedule
You can set specific dates as holidays.
Select Setting > Storage > Schedule > Holiday Schedule.
The Holiday Schedule interface is displayed. See Figure 5-128.
Snapshot
141
Holiday schedule
Select a date.
be displayed.
The selected date will be a holiday and displayed in yellow.
Select Record or Snapshot, and then click Save. The Save Succeeded! prompt will
On the Record or Snapshot interface, click Setting to the right of Holiday. The setting
method is the same as that of Monday to Sunday.
Set the time period of one day for the Holiday, and the recording or snapshot will be
taken according to the holiday time period.
5.5.2 Snapshot by Location
The system can take snapshots when the Device rotates to certain presets.
You need to set presets in advance.
Select Setting > Storage > Snapshot by Location.
The Snapshot by Location interface is displayed. See Figure 5-129.
142
Snapshot by location
Select presets.
(cid:122) Enable snapshot by location.
(cid:145) Click
to enable the function for the corresponding preset.
(cid:145) Click
, and then select All Enabled to enable the function for all
presets.
(cid:122) Disable snapshot by location.
(cid:145) Click
to disable the function for the corresponding preset.
(cid:145) Click
, and then select All Disabled to disable the function for all
presets.
Click Save.
5.5.3 Destination
5.5.3.1 Path
Configure the storage path of recordings and snapshots of the Device, and select local SD card,
FTP and NAS for storage. Store recordings and snapshots according to the event type,
respectively corresponding to General, Motion and Alarm in the schedule, and then select the
corresponding type of recordings or snapshots for storage.
Select Setting > Storage > Destination > Path.
143
The Path interface is displayed, see Figure 5-130.
Path settings
Select the corresponding event type and storage method as needed. For details, refer
to Table 5-42.
Table 5-42 Path parameter description
Parameter
Description
Event Type
Select Scheduled, Motion Detection or Alarm.
Local
FTP
NAS
Save recordings or snapshots to the SD card.
Save recordings or snapshots to the FTP server.
Save recordings or snapshots to the NAS server.
Click Save.
5.5.3.2 Local
Display the SD card information. You can set it as read only or read & write; you can also hot
swap or refresh it.
Select Setting > Storage > Destination > Local, and the Local interface is displayed. See
Figure 5-131.
Local storage
(cid:122) Click Read Only, and the SD card is set to read only.
(cid:122) Click Read & Write, and the SD card is set to read & write.
(cid:122) Click Hot Swap to remove the SD card.
(cid:122) Click Refresh to start formatting the SD card.
After the SD card is formatted, the data will be cleared. Think twice before performing the
operation.
5.5.3.3 FTP
FTP function can be enabled only when it is selected as a destination path. When the network
is disconnected or does not work, you can save recordings and snapshots to the SD card by
using Emergency (Local) function.
Select Setting > Storage > Destination > FTP.
144
The FTP interface is displayed. See Figure 5-132.
FTP settings
Select the Enable check box, and the FTP function is enabled.
function.
(cid:122) There might be risks if the FTP function is enabled. Think twice before enabling the
(cid:122) SFTP is recommended to ensure network security.
Configure parameters as needed. For parameter description, see Table 5-43.
Table 5-43 FTP parameter description
Parameter
Description
Server Address The IP address of the FTP server.
Port
The port number of the FTP server.
The username to log in to the FTP server.
The password to log in to the FTP server.
The destination path on the FTP server.
Username
Password
Remote
Directory
Emergency
(Local)
the Device.
Click Save.
5.5.3.4 NAS
If you enable the function, in case of FTP storage exception, the
recordings and snapshots will be stored on the local SD card.
Click test to verify the username and password, and test whether FTP is connected to
This function can be enabled only when NAS is selected as a destination path. Select NAS to
store files on the NAS server.
Select Setting > Storage > Destination > NAS.
The NAS interface is displayed. See Figure 5-133.
145
NAS settings
Configure parameters as needed. For parameter description, see Table 5-44.
Parameter
Description
Table 5-44 NAS parameter description
Enable
Select the check box to enable NAS function. Select NFS or SMB
function.
There might be risks if NFS or SMB is enabled. Think twice before
enabling the function.
Server Address The IP address of the NAS server.
The destination path on the NAS server.
Remote
Directory
Click Save.
5.5.4 Record Control
Select Setting > Storage > Record Control.
The Record Control interface is displayed. See Figure 5-134.
Record control
Configure parameters as needed. For parameter description, see Table 5-45.
146
Table 5-45 Record control parameter description
Parameter
Description
Pack Duration
Set the pack duration of each recording file. It is 30 minutes by default.
Pre-event
Record
Set the pre-recording time. For example, if you enter 5, when an alarm is
triggered, the system reads the recording of the first 5 seconds in memory,
and then records it into a file.
Disk Full
If alarm recording or motion detection recording occurs, if there is no
recording before, the video data within N seconds before the recording is
started will also be recorded into the video file.
You can select Stop or Overwrite.
(cid:122) Stop: The system stops recording when the disk is full.
(cid:122) Overwrite: The system overwrites the oldest files and keeps
recording when the disk is full.
The data will be overwritten if the disk is full. Back up the file in time as
needed.
Record Mode
You can select Auto, Manual or Off. Select Manual mode to start
recording immediately, and select Auto mode to record within the
schedule.
Record Stream Select Main Stream or Sub Stream.
Click Save.
System Management
5.6.1 Device Settings
5.6.1.1 General
Select Setting > System > General > General.
The General interface is displayed. See Figure 5-135.
General settings
Configure parameters as needed. For parameter description, see Table 5-46.
147
Table 5-46 General setting parameter description
Parameter
Description
Set the device name.
Name
Different devices have different names.
Language
Select the language to be displayed.
Video Standard Select video standard from PAL and NTSC.
Click Save.
5.6.1.2 Date & Time
Select Setting > System > General > Date&Time.
The Date&Time interface is displayed. See Figure 5-136.
Date & time
Configure parameters as needed. See Table 5-47.
Table 5-47 Date & time parameter description
Parameter
Description
Date Format
Select the date format. Three formats are available: YYYY-MM-DD,
MM-DD-YYYY and DD-MM-YYYY.
Time Format
Select the time format. Two formats are available: 24-Hour and 12-Hour.
Time Zone
Set the local time zone.
Current Time
The current time of the Device.
DST
Set the Start Time and End Time of DST in the Date format or Week
format.
148
Parameter
Description
NTP
Select the NTP check box to enable the network time sync function.
Set the address of the time server.
Set the network timing function of NTP server, and the Device time will be
synchronized with the server time.
Set the port number of the time server.
Set the synchronization interval of the Device and the time server.
Server
Port
Interval
Click Save.
5.6.2 Account Settings
5.6.2.1 Account
User management is only available for admin users.
(cid:122) For Username and Group Name, the maximum length is 15 characters. Username can
only consist of numbers, letters, underlines, dots and @; group name can only consist of
numbers, letters and underlines.
(cid:122) The password should consist of 8 to 32 non-blank characters and contain at least two
types of characters among upper case, lower case, number, and special characters
(excluding ' " ; : &). The confirming password shall be the same as the new password. Set
a high security password according to the prompt of password strength.
(cid:122) The number of users and groups is 19 and 8 respectively by default.
(cid:122) User management adopts a two-level method of group and user. Neither group names nor
user names can be duplicated, and a user can only belong to one group.
(cid:122) Users currently logged in cannot modify their own permissions.
(cid:122) The user is admin by default. The admin account is defined as high privileged user.
5.6.2.1.1 Username
Select Setting > System > Account > Account > Username, and you can enable anonymous
login, add users, delete users, modify user passwords, and perform other operations. For the
configuration interface, see Figure 5-137.
Account interface
149
No permission is available for version information and other buttons except Relay-out, Mark,
and Wiper Control in Live interface for the time being.
Anonymous Login
Select the Anonymous Login check box, and you can log in to the Device anonymously
without username and password after entering IP. Anonymous users only have preview
permission in the permission list. In the anonymous login, click Logout to log in to the Device
by using other usernames.
After Anonymous Login is enabled, the user can view audio and video data without
authentication. Think twice before enabling the function.
Adding Users
Add users in the group and set permissions.
As the default user with the highest authority, admin cannot be deleted.
Click Add User.
The Add User interface is displayed. See Figure 5-138.
150
Adding users
151
Enter Username and Password, confirm password, select Group Name, and then
add Memo.
Set Operation Permission and Restricted Login.
(cid:122) Operation Permission: Click Operation Permission, and then select the operation
permission of the user as needed.
(cid:122) Restricted Login: Click Restricted Login, and the interface shown in Figure 5-139
is displayed. You can control login to the Device by setting the IP Address,
Validity Period and Time Range.
Restricted login
152
(cid:122) Once the group is selected as needed, the user permission can only be a subset of
the group, and cannot exceed its permission attributes.
It is recommended to give less permissions to general users than advanced users.
(cid:122)
Click Save.
Modifying Users
Click
corresponding to the user you want to modify.
The Modify User interface is displayed. See Figure 5-140.
Modifying users
153
Modify user information as needed.
Click Save.
Modifying Password
Select the Modify Password check box.
Enter old password and new password, and confirm password.
Click Save.
Deleting Users
5.6.2.1.2 Group Name
Click
corresponding to the user to be deleted, and the user can be deleted.
Users/user groups cannot be recovered after deletion. Think twice before performing the
operation.
Select Setting > System > Account > Account > Group Name, and you can add groups,
delete groups, modify group passwords, and perform other operations. For the interface, see
Figure 5-141.
User group settings
Adding Groups
Modifying Groups
Deleting Groups
5.6.2.2 Onvif User
For specific operations, refer to "5.6.2.1.1 Username."
For specific operations, refer to "5.6.2.1.1 Username."
For specific operations, refer to "5.6.2.1.1 Username."
On the web interface, you can add ONVIF users, or modify existing users.
Select Setting > System > Account > Onvif User.
The Onvif User interface is displayed. See Figure 5-142.
Onvif user
Click Add User.
The Add User interface is displayed. See Figure 5-143.
Adding users
Set the username and password, confirm password, and then select the group name.
Click Save.
(cid:122) Click
to modify user information.
(cid:122) Click
to delete users.
154
5.6.3 Safety
5.6.3.1 RTSP Authentication
Set the authentication method for media stream.
Select Setting > System > Safety > RTSP Authentication.
The RSTP Authentication interface is displayed. See Figure 5-144.
RTSP authentication
Select the Authorize Mode. You can select from Digest, Basic and None. It is Digest
by default.
(cid:122) Click Default, and Digest is selected automatically.
(cid:122) Select None, and “Non-authentication mode may have risk. Are you sure to enable
it” prompt will be displayed. Think twice before selecting the mode.
(cid:122) Select Basic mode, and "Basic authentication mode may have risk. Are you sure
to enable it?” prompt will be displayed. Think twice before selecting the mode.
5.6.3.2 System Service
You can configure system service to ensure system security.
Select Setting > System > Safety > System Service.
The System Service interface is displayed. See Figure 5-145.
155
System service
Configure system service parameters. For the detailed description, see Table 5-48.
Table 5-48 System service parameter description
Function
Description
SSH
Search
You can enable SSH authentication to perform safety management. The
function is disabled by default.
It is recommended to disable SSH. If this function is enabled, there might
be security risks.
Enable this function, and when multiple users are viewing the monitoring
screen simultaneously through network, they can find the Device through
It is recommended to disable the multicast/broadcast search function. If
this function is enabled, there might be security risks.
You can enable Password Reset to perform security management. The
function is enabled by default.
Multicast/Broadcast
multicast/broadcast protocol.
Password Reset
If the function is disabled, you can only reset the password after restoring
the Device to factory defaults through pressing the Reset button on the
You can access the Device through this protocol. The function is enabled
It is recommended to disable the function. If this function is enabled, there
might be security risks.
You can access the Device through this protocol. The function is enabled
device.
by default.
CGI Service
Onvif Service
by default.
156
Function
Description
It is recommended to disable the function. If this function is enabled, there
might be security risks.
protocol.
Enable this function to encrypt the stream transmitted through the private
(cid:122) Make sure that the matched devices or software support video
decryption function.
(cid:122)
It is recommended to enable the function. If the function is disabled,
there might be risk of data leakage.
Push the alarm snapshot triggered by the Device to the mobile phone. The
function is enabled by default.
Audio and Video
Transmission
Encryption
Mobile Push
It is recommended to disable the function. If this function is enabled, there
might be security risks.
Private Protocol
You can select Security Mode and Compatible Mode. Security mode is
Authentication
recommended. If you select compatibility mode, there might be security
Mode
risks.
Click Save.
5.6.3.3 HTTPS
It is recommended to enable HTTPS service. If the service is disabled, there might be risk of
data leakage.
Create certificate or upload signed certificate, and then you can log in through HTTPS with your
PC. HTTPS can ensure data security, and protect user information and device security with
reliable and stable technology.
Create certificate or upload the signed certificate.
(cid:122)
If you select Create Certificate, refer to the following steps.
1) Select Setting > System > Safety > HTTPS.
The HTTPS interface is displayed. See Figure 5-146.
157
HTTPS (1)
2) Click Create.
The HTTPS dialog box is displayed. See Figure 5-147.
HTTPS (2)
3) Enter the required information, and then click Create.
The entered IP or domain name must be the same as the IP or domain name of
the Device.
4) Click Install to install the certificate on the Device. See Figure 5-148.
158
Certificate installation
5) Click Download to download root certificate.
The Save As dialog box is displayed. See Figure 5-149.
Downloading root certificate
6) Select storage path, and then click Save.
7) Double-click the RootCert.cer icon.
The Certificate interface is displayed. See Figure 5-150.
159
8) Click Install Certificate.
The Certificate Import Wizard interface is displayed. See Figure 5-151.
Certificate information
160
Certificate import wizard
161
9) Click Next.
Select Trusted Root Certification Authorities. See Figure 5-152.
Certificate storage area
162
10) Click Next.
The Completing the Certificate Import Wizard interface is displayed, see Figure
5-153.
Completing the certificate import wizard
11) Click Finish.
The Security Warning dialog box is displayed. See Figure 5-154.
163
Security warning
12) Click Yes.
The import was successful dialog box is displayed. Click OK to complete the
certificate installation. See Figure 5-155.
Import success
(cid:122)
If you select Install Signed Certificate, refer to the following steps.
1) Select Setting > System > Safety > HTTPS.
The HTTPS interface is displayed. See Figure 5-156.
164
Install signed certificate
2) Click Browse to upload the signed certificate and certificate key, and then click
Upload.
3) To install the root certificate, refer to Step 5) to 12) in Create Certificate.
Select Enable HTTPS and click Save.
The Reboot interface is displayed, and the configuration takes effect after reboot. See
Figure 5-157.
Reboot
Enter https://xx.xx.xx.xx in the browser to open the login interface. If no certificate is
installed, a certificate error prompt will be displayed.
(cid:122)
If HTTPS is enabled, you cannot access the Device through HTTP. The system will
switch to HTTPS if you access the Device through HTTP.
(cid:122) The deletion of created and installed certificates cannot be restored. Think twice
before deleting them.
5.6.3.4 Firewall
Set a firewall for the Device to prevent network attacks after the Device is connected to the
network.
Select Setting > System > Safety > Firewall.
The Firewall interface is displayed. See Figure 5-158.
165
Firewall
Select the type of network attack that the firewall resists as needed. You can select
Network Access, PING Prohibited, or Prevent Semijoin.
Select Enable, and then the Firewall is enabled.
Click Save.
The peripheral functions might vary with different models, and the actual interface shall prevail.
5.6.4 Peripheral
5.6.4.1 Wiper
Select Setting > System > Peripheral > Wiper.
The Wiper interface is displayed. See Figure 5-159.
Wiper settings
Configure parameters as needed. For parameter description, see Table 5-49.
Table 5-49 Wiper setting parameter description
Parameter
Description
Mode
Set the wiper mode. It is Manual by default.
In Manual mode, you need to manually start the wiper.
Interval Time
The time between wiper starting to wiper ending.
Working
Duration
Set the maximum duration of the wiper operating once in Manual mode.
The value ranges from 10 minutes to 1440 minutes.
Click Save.
166
5.6.5 Default
All information except IP address and user management will be restored to defaults. Think
twice before performing the operation.
Select Setting > System > Default, and click Default to restore the Device. The configuration
interface is displayed. See Figure 5-160.
Default interface
Select the recovery mode as needed.
(cid:122) Default: All information except IP address and user management will be restored to
(cid:122) Factory Default: The function is equivalent to the Reset button of the Device. All
configuration information of the Device can be restored to the factory defaults, and the IP
address can also be restored to the original IP address. After clicking Factory Default, you
need to enter the password of admin user on the interface displayed. The Device can be
restored to factory defaults only after the system confirms that the password is correct.
defaults.
(cid:122) Only admin user can use this function.
(cid:122) When the Device is restored to factory defaults, all information except the data in the
external storage media will be erased. Delete data in external storage media by formatting
and other methods.
5.6.6 Import/Export
When multiple devices share the same configuration methods, they can be quickly configured
by importing and exporting configuration files.
On the web interface of one device, select Setting > System > Import/Export.
The Import/Export interface is displayed. See Figure 5-161.
167
Import/Export
Click Export to export the configuration file (.backup file) to the local storage path.
Click Import on the Import/Export interface of the Device to be configured to import
the configuration file, and the Device will complete the configurations.
5.6.7 Auto Maintain
You can select Auto Reboot or Auto Delete Old Files.
(cid:122)
(cid:122)
If you select Auto Reboot, the frequency and time need to be set.
If you select Auto Delete Old Files, you need to set the time period for the files to be
deleted.
Select Setting > System > Auto Maintain.
The Auto Maintain interface is displayed. See Figure 5-162.
Auto maintain
Configure parameters as needed. For parameter description, see Table 5-50.
Table 5-50 Auto maintain parameter description
Parameter
Description
Auto Reboot
Select the check box to set the Device reboot time.
Select the check box to customize the time period for the files to be deleted.
The value ranges from 1 day to 31 days.
Auto Delete Old
Files
When you enable the function, The deleted files cannot be recovered.
Are you sure to enable this function now? prompt will be displayed.
Think twice before enabling the function.
Click Save and the configuration will take effect.
168
5.6.8 Upgrade
Upgrade the system to improve device function and stability.
If wrong upgrade file has been used, restart the Device; otherwise some functions might not
work properly.
Select Setting > System > Upgrade. The configuration interface is displayed. See Figure
5-163.
System upgrade
(cid:122) File Upgrade: Click Browse, select the upgrade file, and then click Upgrade to upgrade
the firmware. The upgrade file is in the format of *.bin.
(cid:122) Online Upgrade
1) Select the Auto-check for updates check box.
This will enable the system to check for upgrade once a day automatically, and
there will be system notice if any upgrade is available.
We need to collect the data such as IP address, device name, firmware version,
and device serial number to perform auto-check. The collected information is only
used to verify the legitimacy of the Device, and push the upgrade notification.
2) Click Save.
Click Manual Check, and you can check for upgrade manually.
Information
5.7.1 Version
You can view information such as version, online users, log, and life statistics.
You can view information such as system hardware features, software version and release
date.
169
Select Setting > Information > Version > Version, and then you can see the version
information of current web interface. See Figure 5-164.
Version
5.7.2 Log Information
5.7.2.1 Log
Select Setting > Information > Log > Log, and then you can see the operation information of
the Device, and some system information. See Figure 5-165. For parameter description, see
Table 5-51.
Log
170
Parameter
Description
Table 5-51 Log parameter description
The start time of the log to be searched (January 1, 2000 is the earliest
time).
The end time of the log to be searched (December 31, 2037 is the latest
time).
The log type includes All, System, Setting, Data, Event, Record, Account,
Clear Log, and Safety.
Set the start time and end time of the log to be searched, select the log
type, and then click Search. The searched log number and time period will
be displayed.
Click a log to display the details.
Start Time
End Time
Type
Search
Detailed
Information
Clear
Clear all logs of the Device, and classified clearing is not supported.
Back up the searched system logs to the PC currently used by the user.
Backup
The data will be overwritten if the disk is full. Back up the data in time as
needed.
Here are the meanings of different log types:
launch,
(cid:122) System:
Includes program
shutdown/restart, system reboot, and system upgrade.
force exit, exit, program
reboot, device
(cid:122) Setting: Includes saving configurations, and deleting configuration files.
(cid:122) Data: Includes disk type configurations, data erasing, hot swap, FTP state, and recording
mode.
(cid:122) Event (records events such as video detection, smart plan, alarm, and abnormality):
Includes starting events, and ending events.
(cid:122) Record: Includes file access, file access error, and file search.
(cid:122) Account (records modification of user management, login, and logout): Includes login,
logout, adding user, deleting user, modifying user, adding group, deleting group, and
modifying group.
(cid:122) Safety: Includes security-related information.
(cid:122) Clear Log: Clearing logs.
5.7.2.2 Remote Log
Upload the Device operations to the log server.
Select Setting > Information > Log > Remote Log.
The Remote Log interface is displayed. See Figure 5-166.
171
Remote log
172
Select Enable, and then remote log function is enabled.
Set the IP Address, Port and Device Number of the log server.
Click Default to restore the Device to the default settings.
5.7.3 Online User
Select Setting > Information > Online User, and the Online User interface is displayed. See
Figure 5-167.
Online users
6 Alarm
You can select alarm types on the interface. When the selected alarms are triggered, detailed
alarm information will be displayed on the right side of the interface. You can also select
Prompt or Play Alarm Tone. When an alarm occurs, the alarm prompt or tone will be triggered.
For the Alarm setting interface, see Figure 6-1. For parameter description, see Table 6-1.
Alarm setting interface
Table 6-1 Alarm setting parameter description
Category
Parameter
Description
Alarm Type
Motion Detection
Record alarm information in case of motion detection.
Disk Full
Disk Error
Record alarm information in case of full disk.
Record alarm information in case of disk error.
Video Tamper
Record alarm information in case of video tampering.
External Alarm
Record alarm information in case of an external alarm.
Illegal Access
Record alarm information in case of illegal access.
Audio Detection
Record alarm information in case of audio detection.
IVS
Record alarm information in case of smart events.
Scene Changing
Record alarm information in case of scene changing.
Security Exception
Record alarm information in case of security exception.
Operation
Prompt
disappears.
Select the Prompt check box. When you are not on the
Alarm interface, and the selected alarm event is triggered,
the Relay-out button on the main menu will change to
, and the alarm information will be automatically
recorded. After you click the Alarm menu bar, the button
If you are on the Alarm interface, there will be no image
prompt when the selected alarm event is triggered, but the
corresponding alarm information will be recorded in the
alarm list on the right.
Select the check box, and then select the tone file path.
When the selected alarm event is triggered, the selected
tone file will be played to prompt you that an alarm event is
triggered.
Alarm Tone
Play Alarm Tone
Tone Path
Customize the storage path for alarm tones.
173
7 Logout
Click Logout to log out, and the login interface is displayed. See Figure 7-1. Enter the
username and password to log in again.
Login interface
174
Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic
steps toward protecting and strengthening networks and networked appliances will make them
less susceptible to attacks. Below are some tips and recommendations on how to create a
more secured security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
(cid:122) The length should not be less than 8 characters;
(cid:122)
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
(cid:122) Do not contain the account name or the account name in reverse order;
(cid:122) Do not use continuous characters, such as 123, abc, etc.;
(cid:122) Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
(cid:122) According to the standard procedure in Tech-industry, we recommend to keep your
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the
system is equipped with the latest security patches and fixes. When the equipment is
connected to the public network, it is recommended to enable the “auto-check for
updates” function to obtain timely information of firmware updates released by the
manufacturer.
(cid:122) We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices.
For example, place the equipment in a special computer room and cabinet, and implement
well-done access control permission and key management to prevent unauthorized
personnel from carrying out physical contacts such as damaging hardware, unauthorized
connection of removable equipment (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or
cracked.
3. Set and Update Passwords Reset Information Timely
The equipment supports password reset function. Please set up related information for
password reset in time, including the end user’s mailbox and password protection
questions. If the information changes, please modify it in time. When setting password
protection questions, it is suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
(cid:3)
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you
are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure
communication channel.
7. Enable Whitelist
We suggest you to enable whitelist function to prevent everyone, except those with
specified IP addresses, from accessing the system. Therefore, please be sure to add your
computer’s IP address and the accompanying equipment’s IP address to the whitelist.
8. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment,
thus reducing the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP,
etc., to reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to
the following services:
(cid:122) SNMP(cid:726)Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
(cid:122) SMTP(cid:726)Choose TLS to access mailbox server.
(cid:122) FTP(cid:726)Choose SFTP, and set up strong passwords.
(cid:122) AP hotspot(cid:726)Choose WPA2-PSK encryption mode, and set up strong passwords.
11. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that
you use encrypted transmission function, to reduce the risk of audio and video data being
stolen during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
(cid:122) Check online users: we suggest that you check online users regularly to see if the
device is logged in without authorization.
(cid:122) Check equipment log: By viewing the logs, you can know the IP addresses that were
used to log in to your devices and their key operations.
13. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need
to save the log for a long time, it is recommended that you enable the network log function
to ensure that the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
(cid:122) Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
(cid:122) The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
(cid:3)
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
(cid:122) Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.
(cid:3)
Legal and Regulatory Information
Legal Considerations
Video surveillance can be regulated by laws that vary from country to country.
Check the laws in your local region before using this product for surveillance
purposes.
Disclaimer
Every care has been taken in the preparation of this document. Please inform
your nearest Dahua office of any inaccuracies or omissions. Dahua Technology
shall not be held responsible for any technical or typographical errors and
reserves the right to make changes to the product and manuals without prior
notice. Dahua Technology makes no warranty of any kind with regard to the
material contained within this document, including, but not limited to, the implied
warranties of merchantability and fitness for a particular purpose. Dahua
Technology shall not be liable or responsible for incidental or consequential
damages in connection with the furnishing, performance or use of this material.
This product is only to be used for its intended purpose.
Intellectual Property Rights
Dahua Technology retains all intellectual property rights relating to technology
embodied in the product described in this document.
Equipment Modifications
This equipment must be installed and used in strict accordance with the
instructions given in the user documentation. This equipment contains no
user-serviceable components. Unauthorized equipment changes or modifications
will invalidate all applicable regulatory certifications and approvals.
Trademark Acknowledgments
,
,
trademarks or
trademark applications of Dahua Technology in various jurisdictions. All other
company names and products are trademarks or registered trademarks of their
respective companies.
are registered
,
Regulatory Information
European Directives Compliance
This product complies with the applicable CE marking directives and
standards:
(cid:122) Low Voltage (LVD) Directive 2014/35/EU.
(cid:122) Electromagnetic Compatibility (EMC) Directive 2014/30/EU.
(cid:122) Restrictions of Hazardous Substances (RoHS) Directive 2011/65/EU and
its amending Directive (EU) 2015/863.
A copy of the original declaration of conformity may be obtained from Dahua
Technology.
The most up to date copy of the signed EU Declaration of Conformity (DoC) can
be downloaded from: www.dahuasecurity.com/support/notice/
CE-Electromagnetic Compatibility (EMC)
This digital equipment is compliant with Class A according to EN 55032.
Warning:
This is a Class A product. In a domestic environment this product may cause
radio interference, in which case the user may be required to take adequate
measures.
CE-Safety
This product complies with IEC/EN/UL 60950-1 or IEC/EN/UL 62368-1, Safety of
Information Technology Equipment.
Declaration of Conformity CE
(Only for the product has RF function)
Hereby, Dahua Technology declares that the radio equipment is compliant with
Radio Equipment Directive (RED) 2014/53/EU. The full text of the EU
declaration of conformity is available at the following internet address:
www.dahuasecurity.com/support/notice/
USA Regulatory Compliance
FCC
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions:
(1) This device may not cause harmful interference.
(2) This device must accept any interference received, including interference
that may cause undesired operation.
Attention that changes or modification not expressly approved by the party
responsible for compliance could void the user’s authority to operate the
equipment.
Note: This equipment has been tested and found to comply with the limits for a
Class A digital device, pursuant to part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. This equipment generates,
uses, and can radiate radio frequency energy and, if not installed and used in
accordance with the instruction manual, may cause harmful interference to radio
communications. Operation of this equipment in a residential area is likely to
cause harmful interference in which case the user will be required to correct the
interference at his own expense.
FCC
Statement
https://us.dahuasecurity.com/support/notices/
downloaded
SDOC
from:
can
be
RF exposure warning
(Only for the product has RF communication function)
This equipment must be installed and operated in accordance with provided
instructions and the antenna(s) used for this transmitter must be installed to
provide a separation distance of at least 20 cm from all persons and must not be
co-located or operating in conjunction with any other antenna or transmitter.
End-users and installers must be provided with antenna installation instructions
and transmitter operating conditions for satisfying RF exposure compliance.
This equipment should be installed and operated with a minimum distance 20cm
between the radiator and your body.
Canada Regulatory Compliance
ICES-003
This Class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la Classe A est conforme à la norme NMB-003 du
Canada.
This device complies with Industry Canada licence-exempt RSS standard(s).
Operation is subject to the following two conditions:
(1) This device may not cause interference, and
(2) This device must accept any interference, including interference that may
cause undesired operation of the device.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux
appareils radioexempts de licence. L'exploitation est autorisée aux deux
conditions suivantes:
(1) l'appareil ne doit pas produire de brouillage, et
(2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi,
même si le brouillage est susceptible d'en compromettre le fonctionnement.
RF exposure warning
(Only for the product has RF communication function)
This equipment should be installed and operated with a minimum distance 20cm
between the radiator and your body.
Cet équipement doit être installé et utilisé à une distance minimale de 20 cm
entre le radiateur et votre corps.
Under Industry Canada regulations, this radio transmitter may only operate using
an antenna of a type and maximum (or lesser) gain approved for the transmitter
by Industry Canada. To reduce potential radio interference to other users, the
antenna type and its gain should be so chosen that the equivalent isotropically
radiated power (e.i.r.p.) is not more than that necessary for successful
communication.
Conformément à la réglementation d'Industrie Canada, le présent émetteur radio
peut fonctionner avec une antenne d'un type et d'un gain maximal (ou inférieur)
approuvé pour l'émetteur par Industrie Canada. Dans le but de réduire les
risques de brouillage radioélectrique à l'intention des autres utilisateurs, il faut
choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonnée
équivalente (p.i.r.e.) ne dépasse pas l'intensité nécessaire à l'établissement
d'une communication satisfaisante.
Japan Regulatory Compliance
VCCI
These products comply with the requirements of VCCI Class A Information
Technology Equipment.
CAUTION
This is a Class A equipment. Operation of this equipment in a residential
environment could cause radio interference. In such a case, the user may be
required to take corrective actions.
Batteries
Correct disposal of batteries in this product
This marking on the battery indicates that the batteries in this product
should not be disposed of with other household waste at the end of their working
life. Where marked, the chemical symbols Hg, Cd or Pb indicate that the battery
contains mercury, cadmium or lead above the reference levels in Directive
2006/66/EC and its amending Directive 2013/56/EU. If batteries are not properly
disposed of, these substances can cause harm to human health or the
environment.
CAUTION
Do not ingest battery. Chemical Burn Hazard.
This product contains a coin cell battery. If the coin cell battery is swallowed, it
can cause severe internal burns in just 2 hours and can lead to death.
Keep new and used batteries away from children.
If the battery compartment does not close securely, stop using the product and
keep it away from children.
If you think batteries might have been swallowed or placed inside any part of the
body, seek immediate medical attention.
CAUTION
Risk of explosion if the battery is replaced by an incorrect type.
Do not throw or immerse into water, heat to more than 100(cid:263)(212(cid:807)), repair or
disassemble, leave in an extremely low air pressure environment or extremely
high-temperature environment, crush, puncture, cut or incinerate.
Dispose of the battery as required by local ordinances or regulations.
Safety
The product complies with IEC/EN/UL 60950-1, Information Technology
Equipment – Safety – Part 1: General Requirements; or complies with
IEC/EN/UL 62368-1, Audio/video, information and communication technology
equipment – Part 1: Safety requirements.
If the power supply to the product is from external power adaptor without
connecting to AC Mains, and the product is not shipped with power adaptor,
customers are required to use the external power adaptor that must fulfill the
requirements for Safety Extra Low Voltage (SELV) and Limited Power Source
(LPS).
Waste Electrical and Electronic Equipment (WEEE) statements
Disposal and Recycling
When this product has reached the end of its useful life, dispose of it according
to local laws and regulations. For information about your nearest designated
collection point, contact your local authority responsible for waste disposal. In
accordance with local legislation, penalties may be applicable for incorrect
disposal of this waste.
This symbol means that the product shall not be disposed of together with
household or commercial waste. Directive 2012/19/EU on waste electrical and
electronic equipment (WEEE) is applicable in the European Union member
states. To prevent potential harm to human health and the environment, the
product must be disposed of in an approved and environmentally safe recycling
process. For information about your nearest designated collection point, contact
your local authority responsible for waste disposal. Businesses should contact
the product supplier for information about how to dispose of this product
correctly.
Privacy Protection Notice
As the device user or data controller, you might collect personal data of others
such as face, fingerprints, car plate number, Email address, phone number, GPS
and so on. You need to be in compliance with the local privacy protection laws
and regulations to protect the legitimate rights and interests of other people by
implementing measures, including but not limited to: providing clear and visible
identification to inform data subject the existence of surveillance area and
providing related contact.
About the Manual
(cid:122) The manual is for reference only. If there is inconsistency between the
manual and the actual product, the actual product shall prevail.
(cid:122) We are not liable for any loss caused by the operations that do not comply
with the manual.
(cid:122) The manual would be updated according to the latest laws and regulations of
related jurisdictions. For detailed information, refer to the paper manual,
CD-ROM, QR code or our official website. If there is inconsistency between
paper manual and the electronic version, the electronic version shall prevail.
(cid:122) All the designs and software are subject to change without prior written notice.
The product updates might cause some differences between the actual
product and the manual. Please contact the customer service for the latest
program and supplementary documentation.
(cid:122) There still might be deviation in technical data, functions and operations
description, or errors in print. If there is any doubt or dispute, we reserve the
right of final explanation.
(cid:122) Upgrade the reader software or try other mainstream reader software if the
manual (in PDF format) cannot be opened.
(cid:122) All trademarks, registered trademarks and the company names in the manual
are the properties of their respective owners.
(cid:122) Please visit our website, contact the supplier or customer service if there is
(cid:122)
any problem occurring when using the device.
If there is any uncertainty or controversy, we reserve the right of final
explanation.
Support
Should you require any technical assistance, please contact your Dahua
distributor. If your questions cannot be answered immediately, your distributor
will forward your queries through the appropriate channels to ensure a rapid
response. If you are connected to the Internet, you can:
(cid:122) Download user documentation and software updates.
(cid:122) Search by product, category, or phrase.
(cid:122) Report problems to Dahua support staff by logging in to your private support
area.
(cid:122) Chat with Dahua support staff.
(cid:122) Visit Dahua Support at www.dahuasecurity.com/support
Contact Information
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
Address: No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
Postcode: 310053
Tel: +86-571-87688883
Fax: +86-571-87688815
Email: overseas@dahuatech.com
Website: www.dahuasecurity.com
English
Important Safeguards and Warnings
This Chapter describes the contents covering proper handling of the device,
hazard prevention, and prevention of property damage. Read these contents
carefully before using the device, comply with them when using, and keep it well
for future reference.
Safety Instructions
The following categorized signal words with defined meaning might appear in the
manual.
Signal Words
Meaning
Indicates a high potential hazard which, if not avoided,
will result in death or serious injury.
Indicates a medium or low potential hazard which, if not
avoided, could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could
result in property damage, data loss, lower performance,
or unpredictable result.
Provides methods to help you solve a problem or save
you time.
Provides additional information as the emphasis and
supplement to the text.
Safety Requirement
(cid:122) Abide by local electrical safety standards to ensure that the voltage is stable
and complies with the power supply requirement of the device.
(cid:122) Transport, use, and store the device under the allowed humidity and
temperature conditions. Refer to the corresponding technical specifications of
device for specific working temperature and humidity.
(cid:122) Do not place the device in a location exposed to dampness, dust, extreme hot
or cold, strong electronic radiation, or unstable lighting condtions.
(cid:122) Do not install the device in a place near the heat source, such as radiator,
heater, furnace, or other heat generating device to avoid fire.
(cid:122)
(cid:122)
(cid:122) Prevent liquid from flowing into the device to avoid damge to internal
components.
Install the device horizontally or install on the stable place to prevent it from
falling.
Install the device in a well-ventilated place, and do not block the ventilation of
the device.
(cid:122) Do not disassemble the device arbitrarily.
(cid:122) Avoid heavy stress, violent vibration, and soaking during during transportation,
storage, and installation. Complete package is necessary during the
transportation.
(cid:122) Use the factory package or the equivalent for transportation.
Low battery power affects the operation of the RTC, causing it to reset at every
power-up. When the battery needs replacing, a log message will appear in the
product’s server report. For more information about the server report, see the
product´s setup pages or contact Dahua support.
(cid:122)
(cid:122)
(cid:122)
Risk of explosion if the battery is incorrectly replaced.
Replace only with an identical battery or a battery which is recommended by
Dahua.
Dispose of used batteries according to local regulations or the battery
manufacturer's instructions.
Battery
Polski
Ważne środki ostrożności i ostrzeżenia
Niniejszy rozdział opisuje właściwe sposoby korzystania z urządzenia, sposoby
zapobiegania zagrożeniom, a także sposoby zapobiegania uszkodzeniu mienia.
Przed rozpoczęciem korzystania z urządzenia zapoznaj się dokładnie z tymi
informacjami i zachowaj je na przyszłość do celów referencyjnych.
Instrukcje dot. bezpieczeństwa
W podręczniku mogą pojawić się następujące symbole. Ich znaczenie wyjaśnia
poniższa tabela.
Symbol
Znaczenie
ZAGROŻENIE
OSTRZEŻENIE
UWAGA
Oznacza potencjalne zagrożenie wysokiego
stopnia, którego nieuniknięcie może skutkować
poważnymi urazami lub śmiercią.
Oznacza potencjalne zagrożenie średniego lub
niskiego stopnia, którego nieuniknięcie może
skutkować pomniejszymi lub średnimi urazami.
potencjalne
którego
Oznacza
nieuniknięcie może skutkować zniszczeniem
mienia, utratą danych, spadkiem wydajności lub
mieć inne nieprzewidziane skutki.
zagrożenie,
Symbol
Znaczenie
WSKAZÓWKI
Oznacza wskazówki pozwalające na rozwiązanie
problemu lub oszczędność czasu.
UWAGA
Oznacza informacje uzupełniające tekst główny.
Wymogi dot. Bezpieczeństwa
(cid:122) Przestrzegaj lokalnych standardów bezpieczeństwa elektrycznego celem
upewnienia się, że źródło napięcia jest stabilne i zgodne z wymogami
określonymi dla urządzenia.
(cid:122) Urządzenie należy transportować, używać i przechowywać w warunkach o
dozwolonym poziomie wilgotności i temperatury. Szczegółowe informacje na
temat wilgotności i temperatury roboczej znaleźć można w odpowiedniej
specyfikacji technicznej urządzenia.
(cid:122) Nie umieszczaj urządzenia w miejscach narażonych na wilgoć, kurz,
ekstremalne temperatury, silne promieniowanie elektroniczne oraz niestabilne
warunki oświetleniowe.
(cid:122) Nie instaluj urządzenia w pobliżu źródeł ciepła, takich jak kaloryfery, grzałki,
piece bądź inne urządzenia generujące ciepło, aby zapobiegać wystąpieniu
pożaru.
(cid:122) Zabezpiecz urządzenie przed dostaniem się do jego wnętrza cieczy, ponieważ
może to spowodować uszkodzenie komponentów wewnętrznych.
lub wybierz stabilne miejsce,
(cid:122) Zamontuj urządzenie poziomo
wyeliminować ryzyko upadku.
(cid:122) Zamontuj urządzenie w dobrze wentylowanym miejscu i upewnij się, że jego
otwory wentylacyjne nie są zablokowane.
(cid:122) Nie rozmontowuj urządzenia samodzielnie.
(cid:122) Chroń urządzenie przed dużymi obciążeniami i naprężeniami, silnymi
wibracjami oraz zalaniem zarówno podczas transportu, przechowywania, jak i
montażu. Na potrzeby transportu wymagane jest korzystanie z kompletnego
opakowania.
(cid:122) Do transportu używaj oryginalnego opakowania lub innego zapewniającego
tak aby
podobny poziom ochrony.
Akumulator
Niski poziom naładowania akumulatora wpływa na działanie zegara czasu
rzeczywistego, powodując jego resetowanie przy każdym włączeniu. Gdy
akumulator wymaga wymiany, w raporcie serwerowym dla produktu pojawi się
stosowna wiadomość. Aby uzyskać więcej
temat raportu
serwerowego, zapoznaj się z instrukcjami konfiguracji urządzenia lub skontaktuj
się z personelem pomocy technicznej firmy Dahua.
informacji na
OSTRZEŻENIE
wybuchem.
(cid:122) W przypadku niewłaściwej wymiany akumulatora występuje zagrożenie
(cid:122) Akumulator należy zastępować wyłącznie takim samym typem lub innym
(cid:122) Akumulatory należy utylizować zgodnie z
lokalnymi
regulacjami
lub
typem zalecanym przez firmę Dahua.
instrukcjami producenta akumulatora.
Dansk
Vigtige sikkerhedsanvisninger og advarsler
Kapitlet beskriver korrekt håndtering af produktet, undgåelse af risici og
undgåelse af skader på ejendom. Læs kapitlet omhyggeligt, før du bruger
produktet, overhold alle anvisninger og advarsler under brugen, og gem kapitlet til
senere brug.
Sikkerhedsanvisninger
Følgende signalord med beskrivelse kan forekomme i vejledningen.
Signalord
Beskrivelse
FARE
Angiver høj risiko, som, hvis den ikke undgås, kan
medføre død eller alvorlig personskade.
ADVARSEL
Angiver middel eller lav risiko, som, hvis den ikke
undgås, kan medføre lettere til moderat personskade.
FORSIGTIG
Angiver mulig risiko, som hvis den ikke undgås, kan
resultere i skade på ejendom, tab af data, reduceret
ydelse eller uforudsigelige resultater.
TIPS
Indeholder forslag, som hjælper dig med at løse et
problem eller sparer tid.
BEMÆRK
Indeholder yderligere oplysninger, som understreger
og supplerer teksten.
Sikkerhedskrav
(cid:122) Følg lokale standarder for elsikkerhed for at sikre, at spændingen er stabil og i
overensstemmelse med produktets krav til strømforsyning.
(cid:122) Transportér, brug og opbevar produktet i henhold til de tilladte klimatiske
forhold (temperatur og luftfugtighed). Se produktets tekniske specifikationer
for specifik temperatur og luftfugtighed ved drift.
(cid:122) Placér ikke produktet et sted med fugt, støv, stærk varme eller kulde, stærk
(cid:122)
elektronisk udstråling eller ustabile lysforhold.
Installér ikke produktet i nærheden af en varmekilde, såsom en radiator, et
varmeapparat, et centralfyr eller andre varmeafgivende enheder, for at undgå
ildebrand.
(cid:122) Undgå, at væske løber ind i produktet og dermed forårsager skade på de
(cid:122)
(cid:122)
indvendige komponenter.
Installér produktet vandret, eller installér det et stabilt sted for at undgå, at det
falder ned.
Installér produktet et sted med god udluftning, og blokér ikke produktets
ventilationsåbninger.
(cid:122) Adskil ikke produktet.
(cid:122) Undgå stærkt tryk, kraftige vibrationer og gennemblødning under transport,
opbevaring og installation. Produktet skal være fuldt emballeret under
transport.
(cid:122) Brug fabriksemballagen eller tilsvarende til transporten.
Batteri
Lav batterispænding påvirker driften af realtidsuret og får uret til at nulstille, hver
gang produktet tændes. Der vises en logbesked i produktets serverrapport, når
batteriet skal udskiftes. Se konfigurationssiderne til produktet, eller kontakt
Dahuas supportteam for at få flere oplysninger om serverrapporten.
ADVARSEL
(cid:122) Der er risiko for eksplosion, hvis batteriet udskiftes forkert.
(cid:122) Udskift kun med et tilsvarende batteri eller et batteri, der anbefales af Dahua.
(cid:122) Bortskaf brugte batterier i overensstemmelse med lokale bestemmelser eller
batteriproducentens anvisninger.
Suomi
Tärkeitä varotoimenpiteitä ja varoituksia
Tässä luvussa kuvataan laitteen asianmukainen käsittely, vaarojen torjunta ja
omaisuusvahinkojen estäminen. Lue tämä sisältö huolellisesti ennen laitteen
käyttämistä ja noudata näitä ohjeita, kun käytät laitetta. Säilytä ohjeet tulevia
tarpeita varten.
Turvallisuusohje
Seuraavat luokitellut huomiosanat kuvatulla merkityksellä saattavat esiintyä
oppaassa.
Huomiosanat
Merkitys
VAARA
VAROITUS
HUOMIO
Ilmaisee suuren potentiaalisen vaaran, joka johtaa
kuolemaan tai vakavaan loukkaantumiseen, jos sitä ei
vältetä.
Ilmaisee keskisuuren tai pienen potentiaalisen vaaran,
kohtalaiseen
joka
loukkaantumiseen, jos sitä ei vältetä.
saattaa
lievään
johtaa
tai
Ilmaisee mahdollisen vaarallisen tilanteen, joka saattaa
tietojen menetykseen,
johtaa omaisuusvahinkoon,
suoritustehon heikkenemiseen
tai odottamattomiin
tuloksiin, jos sitä ei vältetä.
VINKIT
Tarjoavat apua ongelmien ratkaisemiseen tai säästävät
aikaa.
HUOMAUTUS Tarjoaa lisätietoa, joka korostaa tai täydentää tekstiä.
Turvallisuusvaatimus
(cid:122) Noudata paikallisia sähköturvallisuusstandardeja varmistaaksesi, että jännite
on vakaa ja vastaa laitteen virtalähteelle asetettuja vaatimuksia.
(cid:122) Kuljeta, käytä ja säilytä laitetta sallituissa kosteus- ja lämpötilaolosuhteissa.
Katso laitteen erityinen käyttölämpötila ja -kosteus laitteen vastaavista
teknisistä tiedoista.
(cid:122) Älä sijoita laitetta paikkaan, jossa se altistuu kosteudelle, pölylle, erittäin
kuumalle tai kylmälle lämpötilalle, voimakkaalle sähkösäteilylle tai epävakaille
valaistusolosuhteille.
(cid:122) Älä asenna laitetta lähelle lämmönlähdettä, kuten lämpöpatteria, lämmitintä,
uunia tai muuta lämpöä tuottavaa laitetta, tulipalon välttämiseksi.
(cid:122) Vältä nesteen pääsemistä laitteen sisälle sisäisten komponenttien
(cid:122) Asenna laite vaakasuoraan tai asenna se vakaaseen paikkaan estääksesi sen
vahingoittumisen estämiseksi.
kaatumisen.
(cid:122) Asenna laite hyvin ilmastoituun paikkaan äläkä peitä laitteen tuuletusaukkoja.
(cid:122) Älä pura laitetta omavaltaisesti.
(cid:122) Vältä kovaa rasitusta, voimakasta tärinää ja kosteutta kuljetuksen, säilytyksen
ja asennuksen aikana. Kuljetus vaatii täydellisen pakkaamisen.
(cid:122) Käytä tehtaan pakkausta tai vastaavaa kuljetuksen aikana.
Paristo
Alhainen pariston varaustaso vaikuttaa tosiaikakellon (RTC:n) toimintaan nollaten
sen jokaisella käynnistyskerralla. Lokiviesti ilmestyy tuotteen palvelinraporttiin,
kun paristo on vaihdettava. Lisätietoa palvelinraportista saat
tuotteen
asetussivuilta tai ottamalla yhteyttä Dahuan tukeen.
(cid:122) Räjähdysvaara, jos paristo asetetaan väärin paikalleen.
(cid:122) Vaihda vain samanlaiseen paristoon tai Dahuan suosittelemaan paristoon.
(cid:122) Hävitä käytetyt paristot ja akut paikallisten määräysten tai valmistajan
VAROITUS
ohjeiden mukaisesti.
Magyar
Fontos óvintézkedések és figyelmeztetések
A jelen Fejezet leírja az Eszköz megfelelő kezelését, a veszélyek megelőzését és
a vagyoni károk megelőzését. Az Eszköz használata előtt olvassa el figyelmesen,
a használata során tartsa be, és őrizze meg jól jövőbeni hivatkozás céljára.
Biztonsági utasítások
Az Útmutatóban az alábbi meghatározott
figyelmeztetések jelenhetnek meg.
jelentéssel bíró kategorizált
Figyelmeztetés
Jelentés
VESZÉLY
Nagy potenciális veszélyt jelez, amely, ha nem
kerüli el, halált vagy súlyos sérülést okoz.
FIGYELEM
VIGYÁZAT
TIPPEK
Közepes vagy kis potenciális veszélyt jelez, amely,
ha nem kerüli el, enyhe vagy mérsékelt sérülést
okozhat.
Olyan potenciális kockázatot jelez, amely, ha nem
kerüli el, vagyoni kárt, adatvesztést, alacsonyabb
teljesítményt vagy kiszámíthatatlan eredményt
okozhat.
Olyan módszereket biztosít, amelyek segítenek
megoldani a problémáját vagy időt takarítanak
meg.
MEGJEGYZÉSEK
További
kiemelésével és kiegészítésével.
információkat
biztosít
a
szöveg
Biztonsági követelmények
(cid:122) Tartsa be a helyi elektromos biztonsági szabványokat annak biztosítása
feszültség stabil és az eszköz áramellátási
érdekében, hogy a
követelményének megfelelő legyen.
(cid:122) Az eszközt a megengedett páratartalom és hőmérséklet viszonyok között
tárolja. A konkrét üzemi hőmérsékletet és
szállítsa, használja, és
páratartalmat megtalálja az eszköz műszaki leírásában.
(cid:122) Ne tegye az eszközt olyan helyre, ahol nedvességnek, pornak, rendkívüli
melegnek vagy hidegnek, erős elektronikus sugárzásnak, vagy instabil
fényviszonyoknak van kitéve.
(cid:122) A tűz elkerülése érdekében ne telepítse az eszközt hőforrás, mint például
radiátor, hősugárzó, kemence, vagy más hőtermelő eszköz közelében lévő
helyre.
(cid:122) A belső alkatrészek károsodásának elkerülése érdekében akadályozza meg,
(cid:122) A leesésének megakadályozása érdekében az eszközt vízszintesen telepítse,
hogy folyadék folyjon az eszközbe.
vagy stabil helyre telepítse.
(cid:122) Az eszközt jól szellőző helyre telepítse, és ne blokkolja az eszköz szellőzését.
(cid:122) Önkényesen ne szerelje szét az eszközt.
(cid:122) A szállítás, tárolás és telepítés során kerülje a nagy igénybevételt, erős
rezgést, és az eláztatást. A szállítás során a teljes csomagolásra szükség van.
(cid:122) A szállításhoz gyári csomagolást vagy azzal egyenértékűt használjon.
Elem
Az alacsony elem töltöttségi szint hatással van az RTC működésére, minden
bekapcsoláskor alaphelyzetbe áll. Amikor az elemet cserélni kell, egy napló
üzenet jelenik meg a termék szerver jelentésében. A szerver jelentésről további
információkat talál a termék beállítási oldalain, vagy forduljon a Dahua
támogatáshoz.
(cid:122) Robbanásveszély, ha az elemet nem megfelelőre cseréli.
(cid:122) Csak ugyanolyan elemre vagy a Dahua által ajánlott elemre cserélje.
(cid:122) A használt elemet a helyi előírások vagy az elemgyártó utasításai szerint
FIGYELEM
ártalmatlanítsa.
(cid:192)(cid:192)(cid:249)(cid:234)(cid:226)(cid:223)(cid:239)(cid:240)(cid:233)(cid:231)
Важни предпазни мерки и предупреждения
Тази глава описва инструкциите за правилна експлоатация на устройството,
за предотвратяване на опасностите и материалните щети. Прочетете
внимателно тези инструкции, преди да използвате устройството, спазвайте
ги при използването на устройството, и ги запазете за бъдещи справки.
Инструкции за безопасност
Ръководството съдържа следните определени сигнални думи.
Сигнални думи
Значение
ОПАСНОСТ
ПРЕДУПРЕЖДЕНИЕ
ВНИМАНИЕ
Показва висока потенциална опасност, която,
ако не бъде избегната, ще доведе до смърт или
сериозно нараняване.
средна или ниска потенциална
Показва
опасност, която, ако не бъде избегната, може да
доведе до леки или умерени наранявания.
Посочва потенциален риск, който, ако не бъде
избегнат, може да доведе до материални щети,
загуба на данни, по-ниска производителност или
непредсказуем резултат.
Сигнални думи
Значение
СЪВЕТИ
Обозначава начини, които да ви помогнат да
разрешите проблем или да спестите време.
ЗАБЕЛЕЖКА
Предоставя допълнителна информация като
акцент и допълнение към основния текст.
Изисквания за безопасност
(cid:122) Спазвайте местните стандарти за електрическа безопасност, за да
осигурите стабилно напрежение, отговарящо на изискването за
захранване на устройството.
(cid:122) Транспортирайте, използвайте и съхранявайте устройството при
указаните условия на влажност и температура. Направете справка в
съответните технически спецификации на устройството за конкретната
работна температура и влажност.
(cid:122) Не поставяйте устройството на място, изложено на влага, прах, много
висока или ниска температура, със силно електронно излъчване или на
място с променливо осветление.
(cid:122) Не поставяйте устройството близо до източник на топлина, като радиатор,
нагревател, пещ или друго устройство за генериране на топлина, за да
избегнете пожар.
(cid:122) Не допускайте в устройството да попадне течност, за да не се повредят
вътрешните компоненти.
място, за да не падне.
(cid:122) Монтирайте устройството хоризонтално или го поставете на стабилно
(cid:122) Монтирайте устройството на добре проветриво място и не блокирайте
вентилацията на устройството.
(cid:122) Не разглобявайте устройството произволно.
(cid:122) Избягвайте силно натоварване, вибрации и намокряне по време на
транспортиране, съхранение и монтаж. При транспортиране следва да се
опакова напълно.
(cid:122) Използвайте за транспортиране фабричната опаковка или подобна.
Батерия
Ниската мощност на батерията влияе на работата на часовника в реално
време (RTC), което води до нулиране при всяко включване. Когато батерията
трябва да бъде сменена, в отчета на сървъра на продукта ще се покаже
съобщение. За повече информация относно отчета на сървъра вижте
страниците за настройка на продукта или се свържете с екипа на Dahua.
ПРЕДУПРЕЖДЕНИЕ
(cid:122) Ако батерията е неправилно подменена, има риск от експлозия.
(cid:122) Сменяйте само със същата или батерия, препоръчана от Dahua.
(cid:122) Изхвърляйте използваните батерии в съответствие с местните
разпоредби или инструкциите на производителя на батерията.
Românesc
Masuri de siguranta si Atentionari
Acest capitol descrie indicatiile de utilizare corecta a Dispozitivului , prevenirea
pericolului si prevenirea distrugerii proprietatii.Cititi aceste randuri inaintea folosirii
Dispozitivului
Instructiuni de siguranta
Urmatoarele semne categorizate pot aparea in Ghid.
Signal Words
Meaning
PERICOL
Indică un risc potențial ridicat care, dacă nu este
evitat, va duce la deces sau vătămări grave.
A
AVERTIZARE
Indică un pericol potențial mediu sau scăzut care,
dacă nu este evitat, poate duce la răni ușoare sau
moderate.
A
ATENTIE
SFATURI
NOTA
Indică un risc potențial care, dacă nu este evitat, ar
putea duce la daune materiale, pierderi de date,
performanțe mai scăzute sau rezultate imprevizibile.
Oferă metode care să vă ajute să rezolvați o
problemă sau să economisiți timp.
Oferă informații suplimentare ca accent și supliment
la text.
Cerinte de siguranta
(cid:122) Respectați standardele locale de siguranță electrică pentru a vă asigura că
tensiunea este stabilă și respectă cerințele de alimentare ale dispozitivului.
(cid:122) Transportați, utilizați și depozitați dispozitivul sub condițiile de umiditate și
temperatură admise. Consultați specificațiile tehnice corespunzătoare ale
dispozitivului pentru temperatură și umiditate specifice de lucru.
(cid:122) Nu așezați dispozitivul într-o locație expusă la umezeală, praf, extrem de
caldă sau rece, de radiații electronice puternice sau de condiții de iluminare
instabile.
(cid:122) Nu instalați dispozitivul într-un loc în apropierea sursei de căldură, cum ar fi
radiatorul, încălzitorul, cuptorul sau alt dispozitiv generator de căldură, pentru
a evita incendiul.
Împiedicați curgerea lichidului în dispozitiv pentru a evita deteriorarea
componentelor interne.
Instalați dispozitivul în poziție orizontală sau instalați-l pe un loc stabil pentru a
preveni căderea acestuia.
Instalați aparatul într-un loc bine ventilat și nu blocați ventilația aparatului.
(cid:122)
(cid:122)
(cid:122)
(cid:122) Nu dezasamblați dispozitivul voit.
(cid:122) Evitați
loviturile puternice, vibrațiile violente și umiditatea
timpul
transportului, depozitării și instalării. Este necesar un pachet complet în timpul
transportului.
în
(cid:122) Utilizati pachetul de fabrica sau echvalent in timpul transportului.
Bateriile
Puterea redusă a bateriei afectează funcționarea RTC, determinând resetarea la
fiecare pornire. Când bateria are nevoie de înlocuire, în raportul serverului
produsului va apărea un mesaj de jurnal. Pentru mai multe informații despre
raportul serverului, consultați paginile de configurare ale produsului sau contactați
asistența Dahua.
AVERTIZARE
(cid:122) Risc de explozie dacă bateria este înlocuită incorect.
Înlocuiți numai cu o baterie identică sau cu o baterie recomandată de Dahua.
(cid:122)
(cid:122) Aruncați bateriile uzate în conformitate cu reglementările locale sau cu
instrucțiunile producătorului bateriei.
Čeština
Důležitá bezpečnostní opatření a varování
Tato kapitola popisuje obsah vztahující se na správnou manipulaci se zařízením,
prevenci nebezpečí a prevenci škod na majetku. Pečlivě si tyto informace
je dodržujte
pročtěte před použitím zařízení, během používání zařízení
a uschovejte je pro budoucí použití.
Bezpečnostní pokyny
Tato příručka může obsahovat následující kategorie signálních slov.
Signální slova
Význam
NEBEZPEČÍ
VAROVÁNÍ
UPOZORNĚNÍ
TIPY
Označuje možnost závažného nebezpečí, které,
pokud by mu nebylo zamezeno, může mít za
následek smrt nebo vážné zranění.
Označuje možnost středně nebo málo závažného
nebezpečí, které, pokud by mu nebylo zamezeno,
může mít za následek lehké nebo nepříliš závažné
zranění.
Označuje možné riziko, které, pokud by mu nebylo
zamezeno, může mít za následek škodu na
majetku, ztrátu dat, snížení výkonu nebo
neočekávaný výsledek.
Uvádí metody, které vám pomohou vyřešit problém
nebo vám ušetří čas.
POZNÁMKA
Poskytuje dodatečné informace formou důrazu
a doplnění textu.
Bezpečnostní požadavek
(cid:122) Dodržujte místní normy pro elektrickou bezpečnost pro zajištění stabilního
napětí a dodržení požadavků na napájení zařízení.
(cid:122) Zařízení přepravujte, používejte a skladujte při odpovídající teplotě a vlhkosti.
Konkrétní pracovní teplotu a vlhkost naleznete v příslušných technických
specifikacích zařízení.
(cid:122) Neumísťujte zařízení tam, kde bude vystaveno vlhkosti, prachu, extrémnímu
horku nebo chladu, silnému elektronickému záření nebo nestabilním
světelným podmínkám.
(cid:122) Neinstalujte zařízení v blízkosti zdrojů tepla, jako je radiátor, ohřívač, kotel
nebo jiné zařízení generující teplo, aby nedošlo k požáru.
(cid:122) Zamezte proniknutí kapalin do zařízení, aby nedošlo k poškození jeho
(cid:122) Zařízení instalujte vodorovně nebo je instalujete na stabilním místě, aby bylo
vnitřních součástí.
chráněno před pádem.
(cid:122) Zařízení instalujte na dobře větraném místě a neblokujte odvětrávání zařízení.
(cid:122) Zařízení svévolně nedemontujte.
(cid:122) Během přepravy, skladování a instalace zamezte silnému tlaku, prudkým
vibracím a namočení. Při přepravě je nezbytné úplné zabalení.
(cid:122) Při přepravě použijte obal z výroby nebo obdobný obal.
Baterie
Nízké nabití baterie ovlivňuje fungování hodin ve skutečném čase a způsobuje,
že se při každém spuštění resetují. V případě, že je třeba baterii vyměnit, se
v serverové zprávě produktu zobrazí zpráva protokolu. Další
informace
o serverové zprávě naleznete na stránkách o nastavení produktu, případně
kontaktujte podporu společnosti Dahua.
(cid:122) Nebezpečí výbuchu v případě nesprávné výměny baterie.
(cid:122) Vyměňte pouze za totožnou baterii nebo baterii doporučenou společností
(cid:122) Použité baterie likvidujte v souladu s místními předpisy nebo pokyny výrobce
VAROVÁNÍ
Dahua.
baterie.
(cid:146)(cid:146)(cid:176)(cid:176)(cid:172)(cid:178)(cid:174)(cid:175)(cid:531)
Σημαντικές Διασφαλίσεις και Προειδοποιήσεις
Αυτό το Κεφάλαιο περιγράφει το περιεχόμενο που καλύπτει το σωστό χειρισμό
της Συσκευής, την πρόληψη των κινδύνων και την πρόληψη της καταστροφής της
ιδιοκτησίας. Διαβάστε προσεκτικά τα αναγραφόμενα πριν χρησιμοποιήσετε τη
Συσκευή, τηρήστε τα κατά τη χρήση και κρατήστε τα καλά για μελλοντική χρήση.
Οδηγίες Ασφαλείας
Τα ακόλουθα κατηγοριοποιημένα σήματα με λέξεις έχουν καθορισμένη σημασία
και ενδέχεται να εμφανίζονται στις Οδηγίες Χρήσης.
Σήματα με λέξεις
Σημασία
(cid:147)(cid:146)(cid:150)(cid:141)(cid:157)(cid:150)(cid:152)(cid:155)
(cid:153)(cid:154)(cid:152)(cid:142)(cid:146)(cid:141)(cid:152)(cid:153)(cid:152)(cid:146)(cid:144)(cid:155)
(cid:144)
(cid:153)(cid:154)(cid:152)(cid:155)(cid:152)(cid:159)(cid:144)
Δείχνει έναν υψηλό δυνητικό κίνδυνο, ο
οποίος, εάν δεν αποφευχθεί, θα έχει ως
αποτέλεσμα
σοβαρό
θάνατο
τραυματισμό.
ή
Υποδεικνύει έναν μεσαίο ή χαμηλό
δυνητικό κίνδυνο, ο οποίος, αν δεν
να
αποφευχθεί,
προκαλέσει
μέτριο
τραυματισμό.
μπορούσε
ή
θα
ελαφρύ
Δείχνει έναν πιθανό κίνδυνο, ο οποίος,
εάν δεν αποφευχθεί, θα μπορούσε να
ιδιοκτησία,
προκαλέσει ζημιά στην
χαμηλότερη
δεδομένων,
απώλεια
απόδοση ή απρόβλεπτο αποτέλεσμα.
Σήματα με λέξεις
Σημασία
(cid:155)(cid:155)(cid:157)(cid:149)(cid:139)(cid:152)(cid:157)(cid:148)(cid:142)(cid:155)
(cid:155)(cid:144)(cid:149)(cid:142)(cid:146)(cid:161)(cid:155)(cid:144)
Παρέχει μεθόδους που θα σας
βοηθήσουν
ένα
πρόβλημα ή να εξοικονομήσετε χρόνο.
επιλύσετε
να
πρόσθετες
Παρέχει
πληροφορίες
δίνοντας έμφαση και συμπληρώνοντας
το κείμενο.
Απαιτήσεις ασφαλείας
(cid:122) Τηρήστε τα τοπικά πρότυπα ηλεκτρικής ασφάλειας για να βεβαιωθείτε ότι η
τάση είναι σταθερή και συμμορφώνεται με την απαίτηση τροφοδοσίας της
συσκευής.
(cid:122) Μεταφέρετε, χρησιμοποιήστε και αποθηκεύστε τη συσκευή υπό τις
επιτρεπόμενες συνθήκες υγρασίας και θερμοκρασίας. Ανατρέξτε στις
αντίστοιχες τεχνικές προδιαγραφές της συσκευής για τη συγκεκριμένες
συνθήκες λειτουργίας θερμοκρασίας και υγρασίας.
(cid:122) Μην τοποθετείτε τη συσκευή σε θέση που είναι εκτεθειμένη σε υγρασία, σκόνη,
ακραία ζέστη ή κρύο, ισχυρή ηλεκτρονική ακτινοβολία ή ασταθές φωτισμό.
(cid:122) Μην τοποθετείτε τη συσκευή σε μέρος κοντά στην πηγή θερμότητας, όπως
καλοριφέρ, θερμάστρα, κλίβανο ή άλλη συσκευή παραγωγής θερμότητας για
να αποφύγετε τη φωτιά.
(cid:122) Αποφύγετε να ρέει υγρό μέσα στη συσκευή για να αποφύγετε την
αποδυνάμωση των εσωτερικών εξαρτημάτων.
(cid:122) Εγκαταστήστε τη συσκευή οριζόντια ή εγκαταστήστε την στο σταθερό μέρος
για να μην πέσει.
εξαερισμό της συσκευής.
(cid:122) Τοποθετήστε τη συσκευή σε καλά αεριζόμενο μέρος και μην εμποδίζετε τον
(cid:122) Μην αποσυναρμολογείτε αυθαίρετα τη συσκευή.
(cid:122) Αποφύγετε την υψηλή συμπίεση, το υψηλό βάρος, τη βίαιη δόνηση και τη
διαβροχή κατά τη διάρκεια της μεταφοράς, της αποθήκευσης και της
εγκατάστασης. Το πλήρες πακέτο είναι απαραίτητο κατά τη μεταφορά.
(cid:122) Χρησιμοποιήστε το εργοστασιακό πακέτο ή το αντίστοιχο για μεταφορά.
Μπαταρία
Η χαμηλή ισχύς της μπαταρίας επηρεάζει τη λειτουργία του RTC, προκαλώντας
την επαναφορά του σε κάθε επανεκκίνηση. Όταν η μπαταρία χρειάζεται
αντικατάσταση, ένα μήνυμα συμβάντος θα εμφανιστεί στην αναφορά συμβάντων
του διακομιστή. Για περισσότερες πληροφορίες σχετικά με την αναφορά
διακομιστή, ανατρέξτε στις σελίδες εγκατάστασης του προϊόντος ή επικοινωνήστε
με την υποστήριξη Dahua.
(cid:153)(cid:154)(cid:152)(cid:142)(cid:146)(cid:141)(cid:152)(cid:153)(cid:152)(cid:146)(cid:144)(cid:155)(cid:144)
(cid:122) Κίνδυνος έκρηξης σε περίπτωση λανθασμένης αντικατάστασης
της
μπαταρίας.
από τη Dahua.
(cid:122) Αντικαταστήστε μόνο με πανομοιότυπη μπαταρία ή μπαταρία που συνιστάται
(cid:122) Απορρίψτε τις χρησιμοποιημένες μπαταρίες σύμφωνα με τους τοπικούς
κανονισμούς ή τις οδηγίες του κατασκευαστή της μπαταρίας.
hrvatski
Važne zaštitne mjere i upozorenja
Ovo poglavlje opisuje sadržaj koji obuhvaća pravilno rukovanje uređajem,
sprječavanje opasnosti i sprečavanje oštećenja imovine. Pažljivo pročitajte ove
sadržaje prije korištenja Uređaja, pridržavajte ih se pri upotrebi i sačuvajte ih za
buduću uporabu.
Sigurnosne upute
U vodiču se mogu pojaviti sljedeće kategorizirane signalne riječi s definiranim
značenjem.
Signal Words
Meaning
OPASNOST
UPOZORENJE
OPREZ
SAVJETI
BILJEŠKA
Sigurnosni zahtjevi
izbjegne, rezultirat smrću
Označava veliku potencijalnu opasnost koja će, ako
se ne
ili ozbiljnim
ozljedama.
Označava srednju ili malu potencijalnu opasnost
koja, ako se ne izbjegne, može rezultirati malom ili
umjerenom ozljedom.
Ukazuje na potencijalni rizik koji, ako se ne
imovine,
izbjegne, može rezultirati oštećenjem
gubitkom podataka, manjom učinkovitošću
ili
nepredvidivim rezultatom.
Pruža vam metode kojim vam pomaže riješiti
problem ili će vam uštedjeti vrijeme.
Pruža dodatne informacije kao naglasak i dopunu
teksta.
(cid:122) Avoid heavy stress, violent vibration, and soaking during during transportation,
storage, and installation. Complete package is necessary during the
transportation.
(cid:122) Pridržavajte se lokalnih električnih sigurnosnih standarda kako biste osigurali
da je napon stabilan i da udovoljava zahtjevima napajanja uređaja.
(cid:122) Prijenosite, upotrebljavajte i pohranjujte uređaj pod dopuštenim uvjetima vlage
i temperature. Pogledajte odgovarajuće tehničke specifikacije uređaja za
određenu radnu temperaturu i vlagu.
(cid:122) Nemojte postavljati uređaj na mjesto izloženo vlazi, prašini, ekstremno vrućoj
ili hladnoj okolini, jakom elektronskom zračenju ili nestabilnim uvjetima
osvjetljenja.
(cid:122) Kako biste izbjegli požar nemojte postavljati uređaj na mjesto u blizini izvora
topline, kao što su radijator, grijač, peć ili neki drugi uređaj za stvaranje
topline.
(cid:122) Spriječite da tekućina teče u uređaj kako bi se izbjegla šteta na unutarnjim
dijelovima.
spriječili padanje.
(cid:122) Ugradite uređaj vodoravno ili ga postavite na stabilno mjesto kako biste
(cid:122) Ugradite uređaj na dobro prozračeno mjesto i ne blokirajte ventilaciju uređaja.
(cid:122) Nemojte rastavljati uređaj samovoljno.
(cid:122)
Izbjegavajte teški stres, nasilne vibracije i natapanje tijekom prijevoza,
skladištenja i instalacije. Prilikom prijevoza potrebno je koristiti tvorničko
zaštitno pakiranje.
(cid:122) Koristite tvorničko pakiranje ili ekvivalent za transport.
Baterija
Niska baterija utječe na rad RTC, uzrokujući da se resetira pri svakom
uključivanju. Kad bateriju treba zamijeniti, pojaviti će se poruka u izvješću
poslužitelja (server). Dodatne informacije o izvješću poslužitelja (server) potražite
na stranicama priručnika proizvoda ili se obratite Dahua podršci.
UPOZORENJE
(cid:122) Rizik od eksplozije ako se baterija nepravilno zamijeni.
(cid:122) Zamijeniti samo sa jednakom baterijom ili sa baterijom koja je preporučena od
strane Dahua Technology.
instructions. Dotrajale baterije trba zbrinuti u skladu sa lokalnim propisima ili u
skladu s uputama proizvođača baterije.
(cid:122)
Slovenčina
Dôležité bezpečnostné pokyny a varovania
Táto kapitola obsahuje
týkajúce sa správnej manipulácie so
zariadením, prevencie pred nebezpečenstvom a prevencie poškodenia majetku.
Pred používaním zariadenia si pozorne prečítajte tieto informácie, dodržiavajte
ich pri používaní a uchovajte ich na budúce použitie.
informácie
Bezpečnostné pokyny
V príručke sa môžu nachádzať nasledujúce kategorizované signálne výrazy s
definovaným významom.
Signálne výrazy
Význam
NEBEZPEČENSTVO
VAROVANIE
POZOR
TIPY
POZNÁMKA
Označuje vysoké potenciálne nebezpečenstvo,
ktoré spôsobí smrť alebo vážne zranenie, ak
sa mu nevyhnete.
Označuje stredné alebo nízke potenciálne
nebezpečenstvo, ktoré môže mať za následok
mierne alebo stredne ťažké zranenie, ak sa mu
nevyhnete.
Označuje potenciálne riziko, ktoré môže viesť k
poškodeniu majetku, strate údajov, zníženiu
výkonu alebo nepredvídateľnému výsledku, ak
sa mu nevyhnete.
Poskytuje metódy, ktoré vám pomôžu vyriešiť
problém alebo ušetriť čas.
Poskytuje ďalšie informácie ako zdôraznenie a
doplnenie textu.
Požiadavky na bezpečnosť
(cid:122) Dodržujte miestne elektrické bezpečnostné normy, aby ste zabezpečili, že
napätie je stabilné a zodpovedá požiadavkám na napájanie zariadenia.
(cid:122) Zariadenie prepravujte, používajte a uchovávajte pri povolených podmienkach
vlhkosti a teploty. Prečítajte si príslušné technické špecifikácie zariadenia pre
špecifickú pracovnú teplotu a vlhkosť.
(cid:122) Zariadenie neumiestňujte na miesto vystavené vlhkosti, prachu, extrémnemu
teplu alebo chladu, silnému elektronickému žiareniu alebo nestabilným
podmienkam osvetlenia.
(cid:122) Zariadenie neinštalujte na miesto, ktoré sa nachádza blízko zdroja tepla, ako
je napríklad radiátor, ohrievač, pec alebo iné zariadenie na tvorbu tepla.
Predídete tak vzniku požiaru.
(cid:122) Zabráňte vnikaniu kvapaliny do zariadenia, aby nedošlo k poškodeniu
(cid:122) Zariadenie nainštalujte horizontálne alebo ho nainštalujte na stabilné miesto,
(cid:122) Zariadenie nainštalujte na dobre vetranom mieste a neblokujte ventiláciu
vnútorných komponentov.
aby ste zabránili pádu.
zariadenia.
(cid:122) Zariadenie svojvoľne nerozoberajte.
(cid:122) Počas prepravy, skladovania a inštalácie sa vyhnite silnému namáhaniu,
prudkým vibráciám a namáčaniu. Počas prepravy je potrebne prepravovať
kompletné balenie.
(cid:122) Na prepravu použite továrenské balenie alebo jeho ekvivalent.
Batéria
Nízka kapacita batérie ovplyvňuje prevádzku RTC, čo spôsobí jeho vynulovanie
pri každom zapnutí. Keď je batériu potrebné vymeniť, v správe servera produktu
sa zobrazí hlásenie. Ďalšie informácie o hlásení servera nájdete na stránkach s
nastaveniami produktu alebo sa obráťte na podporu spoločnosti Dahua.
(cid:122) Nebezpečenstvo výbuchu, ak je batéria nesprávne vymenená.
(cid:122) Vymeňte iba za tú istú batériu alebo batériu, ktorú odporúča spoločnosť
(cid:122) Použité batérie zlikvidujte v súlade s miestnymi predpismi alebo pokynmi
VAROVANIE
Dahua.
výrobcu batérie.
Cрпски
Važne Zaštitne mere i Upozorenja
Ovo poglavlje opisuje sadržaj koji pokriva pravilno rukovanje uređajem,
sprečavanje opasnosti i sprečavanje oštećenja imovine. Pažljivo pročitajte ove
sadržaje pre korišćenja uređaja, poštujte ih kada koristite i čuvajte ga za buduću
referencu.
Bezbednosna Uputstva
Sledeće kategorije reči sa definisanim značenjem mogu se pojaviti u „Vodiču“.
Oznaka
Značenje
OPASNOST
Označava visoku potencijalnu opasnost koja će,
ako se i ne izbegne, rezultirati smrću ili ozbiljnim
povredama.
Oznaka
Značenje
UPOZORENJE
OPREZ
Označava opasnost srednje ili niske potencijale
koja bi, ukoliko se ne izbegne, mogla dovesti do
blagih ili umerenih povreda.
Označava potencijalni rizik koji bi, ukoliko se to ne
izbegne, mogao dovesti do oštećenja imovine,
gubitka
ili
nepredvidivog rezultata.
performanse
podataka,
niže
PREPORUKE
Pruža metode za pomoć u rešavanju problema ili
uštede vremena.
BELEŠKA
Pruža dodatne informacije kao naglasak i dodatak
tekstu.
Bezbednosna Uputstva
(cid:122) Pridržavajte se lokalnih standarda električne sigurnosti kako biste bili sigurni
da je napon stabilan i da odgovara zahtevu za napajanje uređaja.
(cid:122) Prevoz, korišćenje i skladištenje uređaja treba da budu u skladu sa
dozvoljenim uslovima vlage
temperaturnim uslovima. Pogledajte
odgovarajuće tehničke specifikacije uređaja koji se odnose na specifičnu
radnu temperaturu i vlažnost vazduha.
i
(cid:122) Nemojte postavljati uređaj na mesto izloženo vlazi, prašini, ekstremnom
vrućem ili hladnom vazduhu, jakom elektronskom zračenju ili nestabilnim
uslovima osvetljenja.
(cid:122) Ne postavljajte uređaj na mesto blizu izvora toplote, kao što je radijator,
grejač, peć ili drugi uređaj za proizvodnju toplote kako biste izbegli požar.
(cid:122) Sprečite tečnost da teče u uređaj kako bi se izbeglo oštećenje unutrašnjih
(cid:122)
komponenti.
Instalirajte uređaj horizontalno ili postavite na stabilno mesto kako biste
sprečili padanje.
(cid:122) Ugradite uređaj na dobro provetreno mesto i ne blokirajte ventilaciju uređaja.
(cid:122) Nemojte rastavljati uređaj proizvoljno.
(cid:122)
Izbegavajte jak pritisak, nasilne vibracije i usisavanje tokom transporta,
skladištenja i instalacije. Kompletan paket je neophodan tokom transporta.
(cid:122) Koristite fabričko pakovanje ili ekvivalent u toku transporta.
Baterija
Baterija male snage utiče na rad RTC-a, dovodeći do reseta pri svakom
uključivanju. Kada se baterija mora zameniti, logovna poruka će se pojaviti u
izveštaju servera proizvoda. Za više informacija o izveštaju servera, pogledajte
stranice za podešavanje proizvoda ili kontaktirajte Dahua podršku.
UPOZORENJE
Dahua.
proizvođača baterije.
(cid:122) Opasnost od eksplozije ako se baterija nepravilno zameni.
(cid:122) Zamenite je samo sa identičnom baterijom ili sa baterijom koju preporučuje
(cid:122) Odložite iskorišćene baterije u skladu sa lokalnim propisima ili uputstvima
Türkçe
Önemli Kurallar ve Uyarılar
Bu Bölüm, Cihazın doğru kullanımını, tehlike önlemeyi ve mal zararının
önlenmesini kapsayan içerikleri anlatmaktadır. Cihazı kullanmadan önce bu
içerikleri dikkatli şekilde okuyun, kullanırken bunlara uyun ve ileride başvurmak
üzere saklayın.
Güvenlik Talimatları
Aşağıda, belirtilen açıklamaya sahip kategorize edilmiş uyarı sözcüklerini
Kılavuzda görebilirsiniz.
Uyarı Sözcükleri Anlamı
TEHLİKE
ciddi
Kaçınılmaması
yaralanmalara neden olacak yüksek potansiyelli bir
tehlikeyi belirtir.
durumunda
ölüm
veya
UYARI
Kaçınılmaması durumunda hafif veya orta dereceli
yaralanmaya neden olabilecek orta veya düşük
potansiyelli bir tehlikeyi belirtir.
DİKKAT
Kaçınılmaması durumunda mal hasarına, veri kaybına,
düşük performansa veya tahmin edilemeyen sonuca
neden olabilecek potansiyel bir riski belirtir.
İPUÇLARI
Bir problemi çözmenize veya zamandan
etmenize yardımcı olmak için yöntemler sunar.
tasarruf
NOT
Metne pekiştirme ve ek olarak ilave bilgiler sağlar.
Güvenlik Gereksinimi
(cid:122) Voltajın is istikrarlı olduğundan ve cihazın güç kaynağı gereksinimine uygun
olduğundan emin olmak için yerel elektrik güvenliği standartlarına uyun.
(cid:122) Cihazı izin verilen nem ve sıcaklık şartları altında nakledin, kullanın ve
saklayın. Belirli çalışma sıcaklığı ve nem değerleri için cihazın ilgili teknik
özelliklerine bakın.
(cid:122) Cihazı rutubete, toza, aşırı sıcağa veya soğuğa, güçlü elektronik radyasyona
veya değişken aydınlatma şartlarına maruz kalan bir yere yerleştirmeyin.
(cid:122) Yangını önlemek için cihazı radyatör, ısıtıcı, fırın veya başka ısı üreten cihazlar
(cid:122)
gibi ısı kaynağına yakın bir yere monte etmeyin.
İçerisindeki parçaların hasar görmesini önlemek için cihazın içerisine sıvıların
girmesini önleyin.
(cid:122) Cihazın düşmesini önlemek için yatay olarak veya dayanıklı bir yere monte
edin.
Pil
UYARI
çıkarın.
תי ִרְב ִע
תויחנה תוחיטב
תועמשמ
(cid:122) Cihazı iyi havalandırılan bir yere monte edin ve cihazın hava sirkülasyonunu
engellemeyin.
(cid:122) Cihazın parçalarını gelişigüzel sökmeyin.
(cid:122) Cihazın nakliyesi, saklanması ve montajı esnasında ağır baskılardan, şiddetli
sarsıntılardan ve sıvıya batmalardan kaçının. Cihazın nakliyesi esnasında
ambalajın tamamı gereklidir.
(cid:122) Nakliye için fabrikasyon ambalajı ya da eş değerini kullanın.
Düşük pil gücü, her güç açma esnasında sıfırlanmasına neden olarak RTC’nin
çalışmasını etkiler. Pillerin değiştirilmesi gerektiğinde ürünün sunucu raporunda
bir günlük iletisi görüntülenir. Sunucu raporu hakkında daha fazla bilgi için ürünün
kurulum sayfalarına bakın veya Dahua destek merkeziyle iletişime geçin.
(cid:122) Pil yanlış şekilde takılırsa patlama tehlikesi.
(cid:122) Sadece aynı türde veya Dahua tarafından önerilen bir pil takın.
(cid:122) Eski pilleri, yerel yönetmeliklere veya pil üreticisinin talimatlarına göre elden
יעצמא תוריהז תורהזאו ילעב תובישח
קרפ הז ראתמ תא םינכתה אשונב לופיט תואנ רישכמב, תעינמ תויעב תעינמו יקזנ שוכר. שי
אורקל םינכת הלא תמושתב בל ינפל שומיש רישכמב, לועפל םרואל תעב תלעפה רישכמה
רומשלו םתוא ןויעל ידיתע.
תולימ ןומיסה תוגווסמה תואבה םע םישוריפה םירדגומה תויושע עיפוהל ךירדמב.
תנייצמ הנכס תוריבסב ההובג, םאש אל ענמית, היושע םורגל
תוומל וא העיצפל השק.
תנייצמ הנכס תוריבסב תינוניב וא הכומנ, םאש אל ענמית, היושע
םורגל העיצפל הלק וא תינוניב.
תנייצמ תוריבס הנכסל םאש אל ענמית, היושע םורגל קזנל, ןדבוא
עדימ, התחפה תמרב םיעוציבה וא תואצותל אל תויופצ.
תולימ ןומיס
הנכס
הרהזא
תוריהז
תוקפסמ תוטיש ועייסיש ךל רותפל תויעב וא וכסחיש ךל ןמז.
תוצע
תועמשמ
תולימ ןומיס
תקפסמ עדימ ףסונ השגדהל טסקטל ותמלשהלו.
הרעה
תשירד תוחיטב
שי תייצל לכל םינקתה םיימוקמה תוחיטבל למשחב לע תנמ חיטבהל חתמהש ביצי םאותו
תושירדל תקפסא למשחה לש רישכמה.
הלבוה, שומיש ןוסחאו לש רצומה ושעי םאתהב יאנתל הרוטרפמטה תוחלהו םירתומה.
שי סחייתהל םיטרפמל םיינכטה םיליבקמה לש רישכמה הרוטרפמטל תוחללו םירדגומה
עוציבל הדובע.
ןיא םקמל תא רישכמה םוקמב ףושח תוביטרל, קבא, יאנת רוק וא םוח םיינוציק, הנירק
תילמשח הקזח וא יאנת הרואת אל םיביצי.
לע תנמ ןיא ןיקתהל תא רישכמה תברקב רוקמ םוח, ןוגכ ןרקמ, רונת, ןשבכ וא רישכמ
רחא טלופש םוח.
שי ענמיהל תכיפשמ לזונ לע רישכמה לע תנמ עונמל קזנ ויביכרמל םיימינפה.
לע תנמ אלש ופייל, שי ןיקתהל תא רישכמה הרוצב תנזואמ וא םוקמב ביצי.
שי ןיקתהל תא רישכמה םוקמב ררוואמ בטיה אלו םוסחל תא רבעמ ריוואה רישכמל.
ןיא קרפל תא רישכמה תוחוכב ךמצע.
שי ענמיהל תבצהמ לקשמ דבכ, לוטלט קזח וא ותבטרה ךלהמב תלבוה רישכמה, ונוסחא
וא ותנקתה. םשל תרבעה רישכמה יש שמתשהל ותזיראב האלמה.
םשל תרבעה רישכמה שי שמתשהל הזיראב תקפוסמה לע ידי ןרציה וא הליבקמב.
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
הללוס
הללוס השלח עיפשת לע תלועפ ה-RTC םורגתו ול ספאתהל לכב הקלדה ולש. רשאכ שי ךרוצ
תפלחהב הללוסה, עיפות תעדוה ןמוי םיעוריא ודב"ח תרשה לש רצומה. עדימל ףסונ תודוא וד"ח
תרשה, שי ןייעל יפדב הרדגהה לש רצומה וא רוציל רשק םע הכימתה לש Dahua.
הרהזא
הפלחה אל הנוכנ לש הללוסה הלולע םורגל ץוציפל.
שי ףילחהל ךא קרו הללוסב ההז וא וזכ תצלמומש לע ידי Dahua.
שי קלסל תוללוס תושמושמ םאתהב תונקתל תוימוקמה וא ויתויחנהל לש ןרציה.
(cid:122)
(cid:122)
(cid:122)
Français
Précautions et avertissements importants
Le contenu de ce chapitre aborde la bonne manipulation de l’appareil, la
prévention des risques et la prévention des dommages matériels. Lisez ce
contenu soigneusement avant d’utiliser l’appareil, respectez-le lorsque vous
l’utilisez, et conservez-le pour vous y référer ultérieurement.
Précautions d’emploi
Les mentions d’avertissement catégorisées suivantes ayant un sens défini sont
susceptibles d’apparaître dans le manuel.
Mentions d’avertissement Signification
DANGER
Indique un danger à risque élevé qui entraînera
la mort ou des blessures graves si
les
instructions données ne sont pas respectées.
AVERTISSEMENT
une
ou
Indique
faiblement dangereuse qui entraînera des
blessures faibles ou modérées si les instructions
données ne sont pas respectées.
situation moyennement
AVERTISSEMENT
ASTUCES
REMARQUE
Indique une situation potentiellement dangereuse
qui pourra entraîner des dommages de
la
propriété, des pertes de données, une
résultats
performance moindre
imprévisibles, si les instructions données ne sont
pas respectées.
des
ou
Fournit des instructions qui vous permettront de
résoudre un problème ou de vous faire gagner du
temps.
Fournit des informations supplémentaires pour
mettre en évidence et compléter le texte.
Exigences de sécurité
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
(cid:122)
les spécifications
température autorisées. Consultez
Respectez les normes de sécurité électrique locales pour vous assurer que
la tension est stable et conforme aux exigences d’alimentation de l’appareil.
Transportez, utilisez et stockez l’appareil dans les conditions d’humidité et
de
techniques
correspondantes de l’appareil pour connaître la température et l’humidité de
fonctionnement spécifiques.
Ne placez pas l’appareil dans un lieu exposé à l’humidité, à la poussière, à
une chaleur ou un froid extrême, à de forts rayonnements électroniques, ou
à des conditions d’éclairage instables.
N’installez pas l’appareil près d’une source de chaleur telle qu’un radiateur,
un chauffage, une chaudière, ou tout autre dispositif générant de la chaleur
afin d’éviter les risques d’incendie.
Empêchez aux liquides de couler sur l’appareil afin d’éviter d’endommager
les composants internes.
Installez l’appareil horizontalement ou sur une surface stable afin de
l’empêcher de tomber.
Installez l’appareil dans un lieu bien ventilé et ne bloquez pas la ventilation
de l’appareil.
Ne démontez pas l’appareil de façon arbitraire.
Au cours du transport, du stockage et de l’installation de l’appareil, évitez de
le soumettre à de fortes contraintes, à des vibrations violentes ou à une
immersion. L’emballage complet est nécessaire au cours du transport.
Utilisez l’emballage d’usine ou équivalent pour le transport.
Batterie
Un niveau de batterie faible affecte le fonctionnement du RTC, qui se réinitialisera
à chaque redémarrage. Lorsque la batterie doit être remplacée, un message de
journal apparaît dans le rapport du serveur du produit. Pour plus d’informations
sur le rapport du serveur, consultez les pages de configuration du produit ou
contactez l’assistance Dahua.
(cid:122)
(cid:122)
(cid:122)
AVERTISSEMENT
Risque d’explosion si la batterie est remplacée de façon incorrecte.
Remplacez la batterie uniquement par une batterie recommandée par
Dahua.
Éliminez les batteries usagées conformément aux réglementations locales
ou aux instructions du fabricant de la batterie.
Español(España)
Advertencias y precauciones de seguridad impo
rtantes
En este capítulo se describe el contenido que cubre la manipulación correcta del
dispositivo, la prevención de riesgos y la prevención de daños materiales. Lea
detenidamente este contenido antes de usar el dispositivo, sígalo cuando lo
utilice y consérvelo para consultas futuras.
Instrucciones de seguridad
Las siguientes palabras de advertencia con un significado definido podrían
aparecer en la guía.
Palabras de advertencia Significado
PELIGRO
ADVERTENCIA
PRECAUCIÓN
CONSEJOS
NOTA
Indica un riesgo potencial alto que, si no se evita,
resultará en muerte o lesiones graves.
Indica un riesgo potencial medio o bajo que, si no
se evita, podría resultar en lesiones leves o
moderadas.
Indica un riesgo potencial que, si no se evita,
podría resultar en daños materiales, pérdida de
datos,
resultados
impredecibles.
rendimiento menor
o
Ofrece métodos para ayudarle a resolver un
problema o ahorrar tiempo.
Proporciona información adicional como hincapié y
complemento para el texto.
Requisitos de seguridad
(cid:122) Cumpla las normas locales de seguridad eléctrica para garantizar que la
tensión sea estable y cumpla los requisitos de alimentación eléctrica del
dispositivo.
(cid:122) Transporte, utilice y almacene el dispositivo bajo las condiciones de humedad
técnicas
temperatura permitidas. Consulte
las especificaciones
y
correspondientes del dispositivo para la temperatura y humedad operativas
específicas.
(cid:122) No coloque el dispositivo en un lugar expuesto a humedad, polvo, calor o frío
extremos, radiaciones electrónicas fuertes o condiciones de iluminación
inestables.
(cid:122) No instale el dispositivo en un lugar cerca de fuentes de calor, como
radiadores, calentadores, hornos u otros dispositivos generadores de calor,
para evitar un incendio.
(cid:122) No deje que entre líquido en el dispositivo para evitar daños en los
componentes internos.
Instale el dispositivo horizontalmente o instálelo sobre un lugar estable para
evitar que caiga.
Instale el dispositivo en un lugar bien ventilado y no obstruya la ventilación.
(cid:122)
(cid:122) No desmonte de forma arbitraria el dispositivo.
(cid:122) Evite las presiones excesivas, las vibraciones violentas y mojar el dispositivo
durante el transporte, almacenamiento e instalación. Es necesario utilizar el
embalaje completo durante el transporte.
(cid:122)
(cid:122) Utilice el embalaje de fábrica o uno equivalente para transportarlo.
Pilas
La baja batería afecta al funcionamiento del RTC, provocando que se restablezca
cada vez que recibe alimentación. Cuando sea necesario sustituir las pilas,
aparecerá un mensaje de registro en el informe de servidor del producto. Para
más información acerca del informe de servidor, consulte las páginas de
configuración del producto o póngase en contacto con el departamento de
soporte de Dahua.
ADVERTENCIA
(cid:122) Riesgo de explosión si se sustituyen incorrectamente las pilas.
(cid:122) Sustitúyalas únicamente por pilas idénticas o pilas recomendadas por Dahua.
(cid:122) Elimine las pilas gastadas en conformidad con la normativa local o las
instrucciones del fabricante de las pilas.
Deutsch
Wichtige Sicherheits- und Warnhinweise
Dieses Kapitel beschreibt die Inhalte zum richtigen Umgang mit dem Gerät, zur
Verhütung von Gefahren und zur Vermeidung von Sachschäden. Lesen Sie
dieses Kapitel sorgfältig durch, bevor Sie das Gerät verwenden, halten Sie die
Anweisungen bei der Verwendung ein und bewahren Sie diese Anleitung zum
späteren Nachlesen gut auf.
Sicherheitshinweise
Die folgenden kategorisierten Signalwörter mit definierter Bedeutung können in
der Kurzanleitung verwendet werden.
Signalwörter
Bedeutung
GEFAHR
Weist auf ein hohes Gefahrenpotential hin, das, wenn
es nicht vermieden wird, zum Tod oder zu schweren
Verletzungen führt.
Signalwörter
Bedeutung
Weist auf eine mittlere oder geringe potentielle Gefahr
hin, die, wenn sie nicht vermieden wird, zu leichten oder
mittelschweren Verletzungen führen kann.
Weist auf ein potenzielles Risiko hin, das, wenn es nicht
vermieden wird, zu Sachschäden, Datenverlust,
geringerer Leistung oder unvorhersehbaren Ergebnis
führen kann.
Stellt Methoden bereit, mit denen Sie ein Problem lösen
oder Zeit sparen können.
Bietet zusätzliche Informationen als Schwerpunkt und
Ergänzung zum Text.
WARNUNG
VORSICHT
TIPPS
HINWEIS
Sicherheitsanforderungen
(cid:122) Halten Sie sich an die örtlichen elektrischen Sicherheitsnormen, um
sicherzustellen, dass die Spannung stabil ist und den Anforderungen an die
Stromversorgung des Geräts entspricht.
(cid:122) Transportieren, verwenden und lagern Sie das Gerät unter den zulässigen
Feuchtigkeits- und Temperaturbedingungen. Die entsprechenden technischen
Spezifikationen des Geräts
jeweilige Betriebstemperatur und
Luftfeuchtigkeit sind zu beachten.
für die
(cid:122) Stellen Sie das Gerät nicht an Orten auf, an denen es Feuchtigkeit, Staub,
extremer Hitze oder Kälte, starker elektronischer Strahlung oder instabilen
Lichtverhältnissen ausgesetzt ist.
Installieren Sie das Gerät nicht in der Nähe einer Wärmequelle, z. B. einem
Heizkörper, Heizlüfter, Ofen oder anderen Wärme erzeugenden Geräten, um
Feuer zu vermeiden.
(cid:122)
(cid:122) Verhindern Sie, dass Flüssigkeit in das Gerät fließt, um Schäden an internen
(cid:122)
(cid:122)
Bauteilen zu vermeiden.
Installieren Sie das Gerät waagerecht oder an einem stabilen Ort, damit es
nicht herunterfällt.
Installieren Sie das Gerät an einem gut belüfteten Ort und blockieren Sie die
Belüftung des Geräts nicht.
(cid:122) Nehmen Sie das Gerät nicht eigenmächtig auseinander.
(cid:122) Vermeiden Sie starke Belastungen, Vibrationen und eindringende Nässe
während des Transports, der Lagerung und der Installation. Das Gerät sollte
immer vollständig verpackt transportiert werden.
(cid:122) Verwenden Sie die ab Werk verwendete Verpackung oder eine gleichwertige
Verpackung für den Transport.
Batterie
Eine niedrige Batterieleistung beeinträchtigt den Betrieb der Echtzeituhr, wodurch
sie bei jedem Einschalten zurückgesetzt wird. Wenn die Batterie ausgetauscht
werden muss, wird eine Protokollmeldung im Serverbericht des Produkts
angezeigt. Weitere
finden Sie auf den
Informationen zum Serverbericht
Einrichtungsseiten des Produkts oder wenden Sie sich an den Support von
Dahua.
WARNUNG
nicht
(cid:122) Bei
ordnungsgemäßem Austausch
der Batterie
besteht
Explosionsgefahr.
die von Dahua empfohlen wird.
(cid:122) Ersetzen Sie die Batterie nur durch eine identische Batterie oder eine Batterie,
(cid:122) Entsorgen Sie leere Batterien entsprechend den örtlichen Vorschriften oder
den Anweisungen des Batterieherstellers.
Italiano
Norme di sicurezza e avvertenze importanti
Il presente capitolo descrive le procedure per una corretta manipolazione del
dispositivo, per la prevenzione dei rischi e per la prevenzione di danni materiali.
Leggere attentamente queste informazioni prima di utilizzare il dispositivo,
attenersi alle istruzioni fornite durante l’uso e conservarle come futuro riferimento.
Istruzioni di sicurezza
I seguenti indicatori di pericolo, aventi i significati indicati, possono apparire nella
presente guida.
Indicatori di pericolo Significato
PERICOLO
AVVERTENZA
Indica una situazione ad alto rischio che, se non viene
evitata, può causare il decesso o gravi lesioni.
Indica una situazione a medio o basso rischio che, se
non viene evitata, può causare lesioni di leggera o
moderata entità.
ATTENZIONE
Indica un rischio potenziale che, se non evitato, può
causare danni materiali, perdite di dati, riduzione delle
prestazioni o altre conseguenze imprevedibili.
CONSIGLI
NOTA
Spiegano metodi utili per risolvere un problema o per
aiutarvi a risparmiare tempo.
Fornisce informazioni aggiuntive che completano
quelle riportate nel testo.
Requisiti di sicurezza
(cid:122) Attenersi alle leggi locali sulla sicurezza elettrica per garantire una tensione
stabile e soddisfare i requisiti di alimentazione del dispositivo.
(cid:122) Trasportare, utilizzare e conservare il dispositivo alle condizioni di umidità e
tecniche del
temperatura consentite. Fare riferimento alle specifiche
dispositivo per conoscere i valori specifici della temperatura di esercizio e
dell’umidità.
(cid:122) Non posizionare il dispositivo in un ambiente esposto ad una eccessiva
umidità, a polvere, a condizioni di caldo e freddo estremi, a forti radiazioni
elettroniche o a condizioni di illuminazione non stabile.
(cid:122) Non installare il dispositivo vicino ad una fonte di calore, quali ad esempio
radiatori, apparecchi di riscaldamento, forni o altri dispositivi di generazione
del calore, per evitare il rischio di incendio.
(cid:122) Evitare di versare liquido sul dispositivo per non danneggiare i componenti
(cid:122)
interni.
Installare il dispositivo in posizione orizzontale, oppure in una zona stabile, per
evitare che possa cadere.
(cid:122)
Installare il dispositivo in un ambiente adeguatamente ventilato e non ostruire
la circolazione dell'aria.
(cid:122) Non smontare il dispositivo in modo casuale.
(cid:122) Evitare forte sollecitazioni, violente vibrazioni e non bagnare il prodotto
durante il trasporto, lo stoccaggio e l’installazione. Trasportare il prodotto
utilizzando un imballaggio adeguato.
(cid:122) Utilizzare l'imballaggio standard previsto o un imballaggio equivalente.
Batteria
L’uso di una batteria scarica può compromettere il funzionamento del dispositivo
RTC, che si resetterà ad ogni avvio. Quando è necessario sostituire la batteria,
nel report del server del prodotto viene visualizzato un messaggio di log. Per
ulteriori informazioni sul report del server, leggere le pagine di configurazione del
prodotto, oppure contattare il servizio assistenza di Dahua.
AVVERTENZA
esplosione.
Dahua.
(cid:122) Se la batteria non viene sostituita correttamente, può generare il rischio di
(cid:122) Sostituire solo con una batteria identica o una batteria raccomandata da
(cid:122) Smaltire le batterie usate in conformità con le normative locali o attenendosi
alle istruzioni del produttore della batteria.
Nederlands
Belangrijke voorzorgsmaatregelen en waarschuwingen
Dit hoofdstuk beschrijft de inhoud die de juiste omgang met het apparaat
behandelt, het voorkomen van gevaren alsmede het voorkomen van materiële
schade. Lees deze inhoud zorgvuldig door voordat u het apparaat gebruikt, houdt
u eraan tijdens het gebruik, en bewaar ze goed voor toekomstige referentie.
Veiligheidsinstructies
De volgende gecategoriseerde signaalwoorden met gedefinieerde betekenis
staan in de handleiding vermeld.
Signaalwoorden
GEVAAR
WAARSCHUWING
LET OP
TIPS
Betekenis
Geeft een hoog potentieel gevaar aan dat, indien
niet voorkomen, kan leiden tot overlijden of
ernstig.
Geeft een gemiddeld of laag potentieel gevaar
aan dat, indien niet voorkomen, kan leiden tot licht
of matig letsel.
Geeft een potentieel risico aan dat, indien niet
voorkomen, kan leiden tot materiële schade,
gegevensverlies,
of
lagere
onvoorspelbaar resultaat.
prestaties
Biedt methodes om u te helpen een probleem op
te lossen of tijd te besparen.
OPMERKING
Biedt aanvullende informatie als nadruk op en
aanvulling van de tekst.
Veiligheidsvereiste
(cid:122) Houdt u aan plaatselijke veiligheidsstandaarden om ervoor te zorgen dat het
voltage stabiel is en voldoet aan de vereiste stroomvoorziening van het
apparaat.
(cid:122) Transporteer, gebruik en bewaar het apparaat onder de toegestane relatieve
luchtvochtigheid en temperatuuromstandigheden. Zie de overeenkomstige
technische specificaties van het apparaat voor specifieke werktemperatuur en
relatieve luchtvochtigheid.
(cid:122) Plaats het apparaat niet op een locatie die blootgesteld is aan vocht, stof,
extreme hitte of koude, sterke elektronische straling of onstabiele
verlichtingsomstandigheden.
Installeer het apparaat niet op een plek vlakbij de warmtebron, zoals een
radiator, verwarming, fornuis of ander warmte-genererend apparaat om brand
te voorkomen.
(cid:122) Voorkom dat er vloeistof in het apparaat loopt om schade aan interne
(cid:122)
componenten te vermijden.
Installeer het apparaat horizontaal of installeer het op een stabiele plek om te
voorkomen dat het valt.
Installeer het apparaat in een goed geventileerde ruimte en blokkeer de
ventilatie van het apparaat niet.
(cid:122) Haal het apparaat niet willekeurig uit elkaar.
(cid:122) Vermijd zware druk, hevige trilling en nat worden tijdens het transport, de
opslag en de installatie. De complete verpakking is noodzakelijk tijdens het
transport.
(cid:122) Gebruik de fabrieksverpakking of gelijkwaardig voor het transport.
(cid:122)
(cid:122)
Batterij
Lage batterijstroom beïnvloedt de bediening van de RTC, waardoor deze bij
iedere stroominschakeling reset. Als de batterij vervangen moet worden,
verschijnt een logbericht in het serverrapport van het product. Zie voor meer
informatie over het serverrapport de setuppagina's van het product of neem
contact op met Dahua Support.
WAARSCHUWING
(cid:122) Gevaar op ontploffing als de batterij onjuist wordt vervangen.
(cid:122) Vervang alleen met een identieke batterij die wordt aanbevolen door Dahua.
(cid:122) Verwerk de gebruikte batterijen volgens de plaatselijke regelgeving of de
instructies van de batterijfabrikant.
Portugués
Instruções e advertências importantes
Este capítulo descreve os conteúdos relativos ao manuseamento correto do
dispositivo, à prevenção de riscos e à prevenção de danos materiais. Leia estes
conteúdos atentamente antes de utilizar o dispositivo, respeite as instruções
durante a utilização e guarde-as em boas condições para consulta futura.
Instruções de segurança
As seguintes palavras-sinal categorizadas, com um significado definido, poderão
surgir no Guia.
Palavras-sinal
PERIGO
AVISO
ATENÇÃO
Significado
Indica um risco potencial elevado que, se não for
evitado, resultará em morte ou ferimentos graves.
Indica um risco potencial médio ou baixo que, se não for
evitado, poderá resultar em ferimentos ligeiros ou
moderados.
Indica um risco potencial que, se não for evitado, pode
resultar em danos materiais, perda de dados,
desempenho inferior ou resultados imprevisíveis.
SUGESTÕES
Disponibiliza métodos para o ajudar a resolver um
problema ou a poupar o seu tempo.
NOTA
Disponibiliza informações adicionais como destaque e
complemento ao texto.
Requisitos em termos de segurança
(cid:122) Respeite as normas locais de segurança elétrica de forma a garantir que a
tensão é estável e respeita os requisitos da fonte de alimentação do
dispositivo.
(cid:122) Transporte, utilize e armazene o dispositivo nas condições de humidade e
temperatura permitidas. Consulte as respetivas especificações técnicas do
dispositivo para conhecer a temperatura e humidade de funcionamento
específicas.
(cid:122) Não coloque o dispositivo num local exposto a humidade, poeira, condições
de calor ou frio extremas, radiação eletrónica intensa ou condições de
iluminação instáveis.
(cid:122) Não instale o dispositivo num local próximo de uma fonte de calor, como, por
exemplo, um radiador, aquecedor, fornalha ou outro dispositivo de geração de
calor de forma a evitar incêndios.
(cid:122) Não permita o escorrimento de líquidos para o dispositivo, evitando, assim,
danos nos componentes internos.
Instale o dispositivo numa posição horizontal ou num local estável,
prevenindo possíveis quedas.
Instale o dispositivo num local bem ventilado e não bloqueie a ventilação do
dispositivo.
(cid:122) Não desmonte o dispositivo de forma arbitrária.
(cid:122) Evite pressões intensas, vibrações violentas e a imersão do dispositivo
durante o transporte, armazenamento e instalação. Para o transporte, é
necessária a embalagem completa.
(cid:122) Utilize a embalagem de fábrica ou equivalente para efetuar o transporte.
(cid:122)
(cid:122)
Bateria
Uma bateria fraca afeta a operação do RTC, fazendo com que este reinicie
sempre que é ligado. Quando a bateria tiver de ser substituída, surgirá uma
mensagem de registo no relatório do servidor do produto. Para mais informações
sore o relatório do servidor, consulte as páginas de configuração do produto ou
contacte a Dahua para obter assistência.
(cid:122)
(cid:122)
(cid:122)
AVISO
Risco de explosão se a bateria não for corretamente colocada.
Substitua apenas por uma bateria idêntica ou por uma bateria recomendada
pela Dahua.
Elimine as baterias usadas de acordo com os regulamentos locais ou com
as instruções do fabricante da bateria.
1 | Label | ID Label/Location Info | 224.06 KiB | July 20 2021 |
Remark:The product is small to place the FCC statement on the product and it be placed
in the user manual which the device is marketed.
1 | SGS FCC agent auth letter | Cover Letter(s) | 134.61 KiB | July 20 2021 |
沁ncrestTechnologies
LLC
TO: Federal
Comm1ss1on
Communication
Branch
Authorization
Equipment
7435 Oakland
Columbia,
MID 21046
Mills Road
Regarding: FCC ID: ZZ2-AMZ001
To whom it may concern
Date: 2021-06-11
We, the undersigned,
for equipment
application
relating
documents
the same effect as acts of our own
hereby authorize
to
of all
signing
shall have
to these matters. Any and all acts carried out by the agent on our behalf
Parlam Zhan
with respect to the FCC ID above, including
to act on our behalf in all manners relating
authorization
We, the undersigned,
FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a)
that we are not subject to a denial of federal benefits, that includes
hereby certify
Where our agent signs the application for certification
for complying
with the terms and conditions
resides with Amcrest Technologies LLC
on our behalf, I acknowledge
that all respons心ility
for Certification, as specified
by SGS North America, Inc., still
This authorization
is valid until further
written notice
from the applicant
Title:
Director
Signature.
On behalf of CompanyA Amcrest Technologies
LLC
Telephone:
(315) 790-0466
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2021-07-20 | 2422 ~ 2452 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2021-07-20
|
||||
1 | Applicant's complete, legal business name |
Amcrest Technologies LLC
|
||||
1 | FCC Registration Number (FRN) |
0021139704
|
||||
1 | Physical Address |
16727 Park Row Dr.
|
||||
1 |
Houston, TX
|
|||||
1 |
United States
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
U******@SGS.COM
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
ZZ2
|
||||
1 | Equipment Product Code |
AMZ001
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
A****** R********
|
||||
1 | Title |
Director
|
||||
1 | Telephone Number |
(315)********
|
||||
1 | Fax Number |
(713)********
|
||||
1 |
a******@amcrest.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 | Name |
P**** Z********
|
||||
1 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 |
ShangHai, 201612
|
|||||
1 |
China
|
|||||
1 | Telephone Number |
86216********
|
||||
1 | Fax Number |
86216********
|
||||
1 |
P******@sgs.com
|
|||||
app s | Non Technical Contact | |||||
1 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 | Name |
P******** Z********
|
||||
1 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 |
ShangHai, 201612
|
|||||
1 |
China
|
|||||
1 | Telephone Number |
86216********
|
||||
1 | Fax Number |
86216********
|
||||
1 |
P******@sgs.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | NETWORK PT CAMERA | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power Output listed is conducted. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filing. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. This device has 20 MHz and 40MHz bandwidth mode. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Compliance Certification Services (Kunshan) Inc.
|
||||
1 | Name |
J****** C******
|
||||
1 | Telephone Number |
+ 86-******** Extension:
|
||||
1 |
J******@sgs.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | MO | 2412 | 2462 | 0.035 | |||||||||||||||||||||||||||||||||||
1 | 2 | 15C | MO | 2422 | 2452 | 0.036 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC