all | frequencies |
|
|
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|---|---|
manuals | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
Users Manual -1 | Users Manual | 720.82 KiB | January 18 2022 | |||
1 |
|
Users Manual -2 | Users Manual | 4.97 MiB | January 18 2022 | |||
1 |
|
Users Manual -3 | Users Manual | 3.19 MiB | January 18 2022 | |||
1 |
|
Internal Photos | Internal Photos | 541.25 KiB | January 18 2022 | |||
1 |
|
External Photos | External Photos | 547.09 KiB | January 18 2022 | |||
1 |
|
Label and Label Location | ID Label/Location Info | 847.17 KiB | January 18 2022 | |||
1 |
|
Authorization Letter | Cover Letter(s) | 283.53 KiB | January 18 2022 | |||
1 | Block Diagram | Block Diagram | January 18 2022 | confidential | ||||
1 | Circuit diagram | Schematics | January 18 2022 | confidential | ||||
1 |
|
Confidentiality Letter | Cover Letter(s) | 161.97 KiB | January 18 2022 | |||
1 |
|
Declaration Letter | Cover Letter(s) | 136.92 KiB | January 18 2022 | |||
1 | Operational Description | Operational Description | January 18 2022 | confidential | ||||
1 |
|
RF Exposure Info | RF Exposure Info | 76.27 KiB | January 18 2022 | |||
1 |
|
Setup Photos | Test Setup Photos | 418.23 KiB | January 18 2022 | |||
1 |
|
Test Report -1 | Test Report | 5.30 MiB | January 18 2022 | |||
1 |
|
Test Report -2 | Test Report | 3.29 MiB | January 18 2022 |
1 | Users Manual -1 | Users Manual | 720.82 KiB | January 18 2022 |
Legal and Regulatory Information Legal Considerations Video surveillance can be regulated by laws that vary from country to country. Check the laws in your local region before using this product for surveillance purposes. Disclaimer Every care has been taken in the preparation of this document. Please inform your nearest Dahua office of any inaccuracies or omissions. Dahua Technology shall not be held responsible for any technical or typographical errors and reserves the right to make changes to the product and manuals without prior notice. Dahua Technology makes no warranty of any kind with regard to the material contained within this document, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Dahua Technology shall not be liable or responsible for incidental or consequential damages in connection with the furnishing, performance or use of this material. This product is only to be used for its intended purpose. Intellectual Property Rights Dahua Technology retains all intellectual property rights relating to technology embodied in the product described in this document. Equipment Modifications This equipment must be installed and used in strict accordance with the instructions given in the user documentation. This equipment contains no user-serviceable components. Unauthorized equipment changes or modifications will invalidate all applicable regulatory certifications and approvals. Trademark Acknowledgments
, trademark applications of Dahua Technology in various jurisdictions. All other company names and products are trademarks or registered trademarks of their respective companies. are registered trademarks or Regulatory Information European Directives Compliance This product complies with the applicable CE marking directives and standards:
Low Voltage (LVD) Directive 2014/35/EU. Electromagnetic Compatibility (EMC) Directive 2014/30/EU. Restrictions of Hazardous Substances (RoHS) Directive 2011/65/EU and its amending Directive (EU) 2015/863. A copy of the original declaration of conformity may be obtained from Dahua Technology. The most up to date copy of the signed EU Declaration of Conformity (DoC) can be downloaded from: www.dahuasecurity.com/support/notice/
CE-Electromagnetic Compatibility (EMC) This digital equipment is compliant with Class A according to EN 55032. Warning:
This is a Class A product. In a domestic environment this product may cause radio interference, in which case the user may be required to take adequate measures. CE-Safety This product complies with IEC/EN/UL 62368-1: Audio/video, information and communication technology equipment Part 1: Safety requirements and IEC/UL 60950-1: Safety of Information Technology Equipment. Declaration of Conformity CE
(Only for the product has RF function) Hereby, Dahua Technology declares that the radio equipment is compliant with Radio Equipment Directive (RED) 2014/53/EU. The full text of the EU declaration of conformity is available at the following internet address:
www.dahuasecurity.com/support/notice/
Declaration of Conformity UKCA This device complies with UKCA relevant directives and standards. UK Declaration of Conformity (DoC) can be downloaded from:
https://www.dahuasecurity.com/uk/newsEvents/DahuaNotice/572 USA Regulatory Compliance FCC This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference.
(2) This device must accept any interference received, including interference that may cause undesired operation. Attention that changes or modification not expressly approved by the party responsible for compliance could void the users authority to operate the equipment. Note: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense. Statement FCC https://us.dahuasecurity.com/support/notices/
downloaded SDOC from:
can be RF exposure warning
(Only for the product has RF communication function) This equipment must be installed and operated in accordance with provided instructions and the antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. End-users and installers must be provided with antenna installation instructions and transmitter operating conditions for satisfying RF exposure compliance. This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. Canada Regulatory Compliance ICES-003 This Class A digital apparatus complies with Canadian ICES-003. Cet appareil numrique de la Classe A est conforme la norme NMB-003 du Canada. This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions:
(1) This device may not cause interference, and
(2) This device must accept any interference, including interference that may cause undesired operation of the device. Le prsent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radioexempts de licence. L'exploitation est autorise aux deux conditions suivantes:
(1) l'appareil ne doit pas produire de brouillage, et
(2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le brouillage est susceptible d'en compromettre le fonctionnement. RF exposure warning
(Only for the product has RF communication function) This equipment should be installed and operated with a minimum distance 20cm between the radiator and your body. Cet quipement doit tre install et utilis une distance minimale de 20 cm entre le radiateur et votre corps. Under Industry Canada regulations, this radio transmitter may only operate using an antenna of a type and maximum (or lesser) gain approved for the transmitter by Industry Canada. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that necessary for successful communication. Conformment la rglementation d'Industrie Canada, le prsent metteur radio peut fonctionner avec une antenne d'un type et d'un gain maximal (ou infrieur) approuv pour l'metteur par Industrie Canada. Dans le but de rduire les risques de brouillage radiolectrique l'intention des autres utilisateurs, il faut choisir le type d'antenne et son gain de sorte que la puissance isotrope rayonne quivalente (p.i.r.e.) ne dpasse pas l'intensit ncessaire l'tablissement d'une communication satisfaisante. The device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems. Les dispositifs fonctionnant dans la bande 5150-5250 MHz sont rservs uniquement pour une utilisation l'intrieur afin de rduire les risques de brouillage prjudiciable aux systmes de satellites mobiles utilisant les mmes canaux. Japan Regulatory Compliance VCCI These products comply with the requirements of VCCI Class A Information Technology Equipment. CAUTION This is a Class A equipment. Operation of this equipment in a residential environment could cause radio interference. In such a case, the user may be required to take corrective actions. Batteries Correct disposal of batteries in this product This marking on the battery indicates that the batteries in this product should not be disposed of with other household waste at the end of their working life. Where marked, the chemical symbols Hg, Cd or Pb indicate that the battery contains mercury, cadmium or lead above the reference levels in Directive 2006/66/EC and its amending Directive 2013/56/EU. If batteries are not properly disposed of, these substances can cause harm to human health or the environment. CAUTION Do not ingest battery. Chemical Burn Hazard. This product contains a coin cell battery. If the coin cell battery is swallowed, it can cause severe internal burns in just 2 hours and can lead to death. Keep new and used batteries away from children. If the battery compartment does not close securely, stop using the product and keep it away from children. If you think batteries might have been swallowed or placed inside any part of the body, seek immediate medical attention. CAUTION Risk of explosion if the battery is replaced by an incorrect type. Do not throw or immerse into water, high or low extreme temperatures, repair or disassemble, leave in an extremely low air pressure environment or extremely high-temperature environment, crush, puncture, cut or incinerate. Dispose of the battery as required by local ordinances or regulations. Safety The product complies with IEC/EN/UL 60950-1, Information Technology Equipment Safety Part 1: General Requirements; or complies with IEC/EN/UL 62368-1, Audio/video, information and communication technology equipment Part 1: Safety requirements. If the power supply to the product is from external power adaptor without connecting to AC Mains, and the product is not shipped with power adaptor, customers are required to use the external power adaptor that must fulfill the requirements for Safety Extra Low Voltage (SELV) and Limited Power Source
(LPS). Waste Electrical and Electronic Equipment (WEEE) statements Disposal and Recycling When this product has reached the end of its useful life, dispose of it according to local laws and regulations. For information about your nearest designated collection point, contact your local authority responsible for waste disposal. In accordance with local legislation, penalties may be applicable for incorrect disposal of this waste. This symbol means that the product shall not be disposed of together with household or commercial waste. Directive 2012/19/EU on waste electrical and electronic equipment (WEEE) is applicable in the European Union member states. To prevent potential harm to human health and the environment, the product must be disposed of in an approved and environmentally safe recycling process. For information about your nearest designated collection point, contact your local authority responsible for waste disposal. Businesses should contact the product supplier for information about how to dispose of this product correctly. Privacy Protection Notice As the device user or data controller, you might collect personal data of others such as face, fingerprints, car plate number, Email address, phone number, GPS and so on. You need to be in compliance with the local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures, including but not limited to: providing clear and visible identification to inform data subject the existence of surveillance area and providing related contact. About the Manual The manual is for reference only. If there is inconsistency between the manual and the actual product, the actual product shall prevail. We are not liable for any loss caused by the operations that do not comply with the manual. The manual would be updated according to the latest laws and regulations of related jurisdictions. For detailed information, refer to the paper manual, CD-ROM, QR code or our official website. If there is inconsistency between paper manual and the electronic version, the electronic version shall prevail. All the designs and software are subject to change without prior written notice. The product updates might cause some differences between the actual product and the manual. Please contact the customer service for the latest program and supplementary documentation. There still might be deviation in technical data, functions and operations description, or errors in print. If there is any doubt or dispute, we reserve the right of final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened. All trademarks, registered trademarks and the company names in the manual are the properties of their respective owners. Please visit our website, contact the supplier or customer service if there is any problem occurring when using the device. If there is any uncertainty or controversy, we reserve the right of final explanation. Support Should you require any technical assistance, please contact your Dahua distributor. If your questions cannot be answered immediately, your distributor will forward your queries through the appropriate channels to ensure a rapid response. If you are connected to the Internet, you can:
Download user documentation and software updates. Search by product, category, or phrase. Report problems to Dahua support staff by logging in to your private support area. Chat with Dahua support staff. GET WIFI FREQUENCY & MAX ERIP FROM DAHUA SUPPORT (Only for the product has RF function) Visit Dahua Support at www.dahuasecurity.com/support Contact Information Manufacturer:
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. Address: No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China Postcode: 310053 Tel: +86-571-87688883 Fax: +86-571-87688815 Email: overseas@dahuatech.com Website: www.dahuasecurity.com Authorised representative established within the EU:
Dahua Technology Hungary Kft. Address: 1134 Budapest, Angyalfldi t 5/b. 3. emelet 302/b, Hungary Authorised representative established within the UK:
DAHUA TECHNOLOGY UK LIMITED Address:3rd Floor Quantum, 60 Norden Road, Maidenhead, Berkshire, United Kingdom, SL6 4AY English Important Safeguards and Warnings This Chapter describes the contents covering proper handling of the device, hazard prevention, and prevention of property damage. Read these contents carefully before using the device, comply with them when using, and keep it well for future reference. Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury. Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury. Indicates a potential risk which, if not avoided, could result in property damage, data loss, lower performance, or unpredictable result. Provides methods to help you solve a problem or save you time. Provides additional information as the emphasis and supplement to the text. Safety Requirement Abide by local electrical safety standards to ensure that the voltage is stable and complies with the power supply requirement of the device. Transport, use, and store the device under the allowed humidity and temperature conditions. Refer to the corresponding technical specifications of device for specific working temperature and humidity. Do not place the device in a location exposed to dampness, dust, extreme hot or cold, strong electronic radiation, or unstable lighting condtions. Do not install the device in a place near the heat source, such as radiator, heater, furnace, or other heat generating device to avoid fire. Prevent liquid from flowing into the device to avoid damge to internal components. Install the device horizontally or install on the stable place to prevent it from falling. Install the device in a well-ventilated place, and do not block the ventilation of the device. Do not disassemble the device arbitrarily. Avoid heavy stress, violent vibration, and soaking during during transportation, storage, and installation. Complete package is necessary during the transportation. Use the factory package or the equivalent for transportation. Battery Low battery power affects the operation of the RTC, causing it to reset at every power-up. When the battery needs replacing, a log message will appear in the products server report. For more information about the server report, see the products setup pages or contact Dahua support. Risk of explosion if the battery is incorrectly replaced. Replace only with an identical battery or a battery which is recommended by Dahua. Dispose of used batteries according to local regulations or the battery manufacturer's instructions. Polski Wane rodki ostronoci i ostrzeenia Niniejszy rozdzia opisuje waciwe sposoby korzystania z urzdzenia, sposoby zapobiegania zagroeniom, a take sposoby zapobiegania uszkodzeniu mienia. Przed rozpoczciem korzystania z urzdzenia zapoznaj si dokadnie z tymi informacjami i zachowaj je na przyszo do celw referencyjnych. Instrukcje dot. bezpieczestwa W podrczniku mog pojawi si nastpujce symbole. Ich znaczenie wyjania ponisza tabela. Symbol Znaczenie ZAGROENIE OSTRZEENIE UWAGA WSKAZWKI Oznacza potencjalne zagroenie wysokiego stopnia, ktrego nieuniknicie moe skutkowa powanymi urazami lub mierci. Oznacza potencjalne zagroenie redniego lub niskiego stopnia, ktrego nieuniknicie moe skutkowa pomniejszymi lub rednimi urazami. potencjalne Oznacza ktrego nieuniknicie moe skutkowa zniszczeniem mienia, utrat danych, spadkiem wydajnoci lub mie inne nieprzewidziane skutki. zagroenie, Oznacza wskazwki pozwalajce na rozwizanie problemu lub oszczdno czasu. UWAGA Oznacza informacje uzupeniajce tekst gwny. Wymogi dot. Bezpieczestwa Przestrzegaj lokalnych standardw bezpieczestwa elektrycznego celem upewnienia si, e rdo napicia jest stabilne i zgodne z wymogami okrelonymi dla urzdzenia. Urzdzenie naley transportowa, uywa i przechowywa w warunkach o dozwolonym poziomie wilgotnoci i temperatury. Szczegowe informacje na temat wilgotnoci i temperatury roboczej znale mona w odpowiedniej specyfikacji technicznej urzdzenia. Nie umieszczaj urzdzenia w miejscach naraonych na wilgo, kurz, ekstremalne temperatury, silne promieniowanie elektroniczne oraz niestabilne warunki owietleniowe. Nie instaluj urzdzenia w pobliu rde ciepa, takich jak kaloryfery, grzaki, piece bd inne urzdzenia generujce ciepo, aby zapobiega wystpieniu poaru. Zabezpiecz urzdzenie przed dostaniem si do jego wntrza cieczy, poniewa moe to spowodowa uszkodzenie komponentw wewntrznych. lub wybierz stabilne miejsce, Zamontuj urzdzenie poziomo tak aby wyeliminowa ryzyko upadku. Zamontuj urzdzenie w dobrze wentylowanym miejscu i upewnij si, e jego otwory wentylacyjne nie s zablokowane. Nie rozmontowuj urzdzenia samodzielnie. Chro urzdzenie przed duymi obcieniami i napreniami, silnymi wibracjami oraz zalaniem zarwno podczas transportu, przechowywania, jak i montau. Na potrzeby transportu wymagane jest korzystanie z kompletnego opakowania. Do transportu uywaj oryginalnego opakowania lub innego zapewniajcego podobny poziom ochrony. Akumulator Niski poziom naadowania akumulatora wpywa na dziaanie zegara czasu rzeczywistego, powodujc jego resetowanie przy kadym wczeniu. Gdy akumulator wymaga wymiany, w raporcie serwerowym dla produktu pojawi si stosowna wiadomo. Aby uzyska wicej temat raportu serwerowego, zapoznaj si z instrukcjami konfiguracji urzdzenia lub skontaktuj si z personelem pomocy technicznej firmy Dahua. informacji na OSTRZEENIE wybuchem. W przypadku niewaciwej wymiany akumulatora wystpuje zagroenie Akumulator naley zastpowa wycznie takim samym typem lub innym Akumulatory naley utylizowa zgodnie z lokalnymi regulacjami lub typem zalecanym przez firm Dahua. instrukcjami producenta akumulatora. Dansk Vigtige sikkerhedsanvisninger og advarsler Kapitlet beskriver korrekt hndtering af produktet, undgelse af risici og undgelse af skader p ejendom. Ls kapitlet omhyggeligt, fr du bruger produktet, overhold alle anvisninger og advarsler under brugen, og gem kapitlet til senere brug. Sikkerhedsanvisninger Flgende signalord med beskrivelse kan forekomme i vejledningen. Signalord Beskrivelse FARE Angiver hj risiko, som, hvis den ikke undgs, kan medfre dd eller alvorlig personskade. ADVARSEL Angiver middel eller lav risiko, som, hvis den ikke undgs, kan medfre lettere til moderat personskade. FORSIGTIG Angiver mulig risiko, som hvis den ikke undgs, kan resultere i skade p ejendom, tab af data, reduceret ydelse eller uforudsigelige resultater. TIPS Indeholder forslag, som hjlper dig med at lse et problem eller sparer tid. BEMRK Indeholder yderligere oplysninger, som understreger og supplerer teksten. Sikkerhedskrav Flg lokale standarder for elsikkerhed for at sikre, at spndingen er stabil og i overensstemmelse med produktets krav til strmforsyning. Transportr, brug og opbevar produktet i henhold til de tilladte klimatiske forhold (temperatur og luftfugtighed). Se produktets tekniske specifikationer for specifik temperatur og luftfugtighed ved drift. Placr ikke produktet et sted med fugt, stv, strk varme eller kulde, strk elektronisk udstrling eller ustabile lysforhold. Installr ikke produktet i nrheden af en varmekilde, ssom en radiator, et varmeapparat, et centralfyr eller andre varmeafgivende enheder, for at undg ildebrand. Undg, at vske lber ind i produktet og dermed forrsager skade p de indvendige komponenter. Installr produktet vandret, eller installr det et stabilt sted for at undg, at det falder ned. Installr produktet et sted med god udluftning, og blokr ikke produktets ventilationsbninger. Adskil ikke produktet. Undg strkt tryk, kraftige vibrationer og gennembldning under transport, opbevaring og installation. Produktet skal vre fuldt emballeret under transport. Brug fabriksemballagen eller tilsvarende til transporten. Batteri Suomi Lav batterispnding pvirker driften af realtidsuret og fr uret til at nulstille, hver gang produktet tndes. Der vises en logbesked i produktets serverrapport, nr batteriet skal udskiftes. Se konfigurationssiderne til produktet, eller kontakt Dahuas supportteam for at f flere oplysninger om serverrapporten. ADVARSEL Der er risiko for eksplosion, hvis batteriet udskiftes forkert. Udskift kun med et tilsvarende batteri eller et batteri, der anbefales af Dahua. Bortskaf brugte batterier i overensstemmelse med lokale bestemmelser eller batteriproducentens anvisninger. Trkeit varotoimenpiteit ja varoituksia Tss luvussa kuvataan laitteen asianmukainen ksittely, vaarojen torjunta ja omaisuusvahinkojen estminen. Lue tm sislt huolellisesti ennen laitteen kyttmist ja noudata nit ohjeita, kun kytt laitetta. Silyt ohjeet tulevia tarpeita varten. Turvallisuusohje Seuraavat luokitellut huomiosanat kuvatulla merkityksell saattavat esiinty oppaassa. Huomiosanat Merkitys VAARA Ilmaisee suuren potentiaalisen vaaran, joka johtaa kuolemaan tai vakavaan loukkaantumiseen, jos sit ei vltet. Huomiosanat Merkitys VAROITUS Ilmaisee keskisuuren tai pienen potentiaalisen vaaran, joka kohtalaiseen loukkaantumiseen, jos sit ei vltet. saattaa lievn johtaa tai HUOMIO Ilmaisee mahdollisen vaarallisen tilanteen, joka saattaa tietojen menetykseen, johtaa omaisuusvahinkoon, suoritustehon heikkenemiseen tai odottamattomiin tuloksiin, jos sit ei vltet. VINKIT Tarjoavat apua ongelmien ratkaisemiseen tai sstvt aikaa. HUOMAUTUS Tarjoaa listietoa, joka korostaa tai tydent teksti. Turvallisuusvaatimus Noudata paikallisia shkturvallisuusstandardeja varmistaaksesi, ett jnnite on vakaa ja vastaa laitteen virtalhteelle asetettuja vaatimuksia. Kuljeta, kyt ja silyt laitetta sallituissa kosteus- ja lmptilaolosuhteissa. Katso laitteen erityinen kyttlmptila ja -kosteus laitteen vastaavista teknisist tiedoista. l sijoita laitetta paikkaan, jossa se altistuu kosteudelle, plylle, erittin kuumalle tai kylmlle lmptilalle, voimakkaalle shksteilylle tai epvakaille valaistusolosuhteille. l asenna laitetta lhelle lmmnlhdett, kuten lmppatteria, lmmitint, uunia tai muuta lmp tuottavaa laitetta, tulipalon vlttmiseksi. Vlt nesteen psemist laitteen sislle sisisten komponenttien Asenna laite vaakasuoraan tai asenna se vakaaseen paikkaan estksesi sen vahingoittumisen estmiseksi. kaatumisen. Asenna laite hyvin ilmastoituun paikkaan lk peit laitteen tuuletusaukkoja. l pura laitetta omavaltaisesti. Vlt kovaa rasitusta, voimakasta trin ja kosteutta kuljetuksen, silytyksen ja asennuksen aikana. Kuljetus vaatii tydellisen pakkaamisen. Kyt tehtaan pakkausta tai vastaavaa kuljetuksen aikana. Paristo Alhainen pariston varaustaso vaikuttaa tosiaikakellon (RTC:n) toimintaan nollaten sen jokaisella kynnistyskerralla. Lokiviesti ilmestyy tuotteen palvelinraporttiin, kun paristo on vaihdettava. Listietoa palvelinraportista saat tuotteen asetussivuilta tai ottamalla yhteytt Dahuan tukeen. Rjhdysvaara, jos paristo asetetaan vrin paikalleen. Vaihda vain samanlaiseen paristoon tai Dahuan suosittelemaan paristoon. Hvit kytetyt paristot ja akut paikallisten mrysten tai valmistajan VAROITUS ohjeiden mukaisesti. Magyar Fontos vintzkedsek s figyelmeztetsek A jelen Fejezet lerja az Eszkz megfelel kezelst, a veszlyek megelzst s a vagyoni krok megelzst. Az Eszkz hasznlata eltt olvassa el figyelmesen, a hasznlata sorn tartsa be, s rizze meg jl jvbeni hivatkozs cljra. Biztonsgi utastsok Az tmutatban az albbi meghatrozott figyelmeztetsek jelenhetnek meg. jelentssel br kategorizlt Figyelmeztets Jelents VESZLY Nagy potencilis veszlyt jelez, amely, ha nem kerli el, hallt vagy slyos srlst okoz. FIGYELEM VIGYZAT TIPPEK Kzepes vagy kis potencilis veszlyt jelez, amely, ha nem kerli el, enyhe vagy mrskelt srlst okozhat. Olyan potencilis kockzatot jelez, amely, ha nem kerli el, vagyoni krt, adatvesztst, alacsonyabb teljestmnyt vagy kiszmthatatlan eredmnyt okozhat. Olyan mdszereket biztost, amelyek segtenek megoldani a problmjt vagy idt takartanak meg. MEGJEGYZSEK Tovbbi kiemelsvel s kiegsztsvel. informcikat biztost a szveg Biztonsgi kvetelmnyek Tartsa be a helyi elektromos biztonsgi szabvnyokat annak biztostsa feszltsg stabil s az eszkz ramelltsi rdekben, hogy a kvetelmnynek megfelel legyen. Az eszkzt a megengedett pratartalom s hmrsklet viszonyok kztt trolja. A konkrt zemi hmrskletet s szlltsa, hasznlja, s pratartalmat megtallja az eszkz mszaki lersban. Ne tegye az eszkzt olyan helyre, ahol nedvessgnek, pornak, rendkvli melegnek vagy hidegnek, ers elektronikus sugrzsnak, vagy instabil fnyviszonyoknak van kitve. A tz elkerlse rdekben ne teleptse az eszkzt hforrs, mint pldul raditor, hsugrz, kemence, vagy ms htermel eszkz kzelben lv helyre. A bels alkatrszek krosodsnak elkerlse rdekben akadlyozza meg, A leessnek megakadlyozsa rdekben az eszkzt vzszintesen teleptse, hogy folyadk folyjon az eszkzbe. vagy stabil helyre teleptse. Az eszkzt jl szellz helyre teleptse, s ne blokkolja az eszkz szellzst. nknyesen ne szerelje szt az eszkzt. A szllts, trols s telepts sorn kerlje a nagy ignybevtelt, ers rezgst, s az elztatst. A szllts sorn a teljes csomagolsra szksg van. A szlltshoz gyri csomagolst vagy azzal egyenrtkt hasznljon. Elem Az alacsony elem tltttsgi szint hatssal van az RTC mkdsre, minden bekapcsolskor alaphelyzetbe ll. Amikor az elemet cserlni kell, egy napl zenet jelenik meg a termk szerver jelentsben. A szerver jelentsrl tovbbi informcikat tall a termk belltsi oldalain, vagy forduljon a Dahua tmogatshoz. Robbansveszly, ha az elemet nem megfelelre cserli. Csak ugyanolyan elemre vagy a Dahua ltal ajnlott elemre cserlje. A hasznlt elemet a helyi elrsok vagy az elemgyrt utastsai szerint FIGYELEM rtalmatlantsa.
(RTC), .
. Dahua.
, Dahua. Romnesc Masuri de siguranta si Atentionari Acest capitol descrie indicatiile de utilizare corecta a Dispozitivului , prevenirea pericolului si prevenirea distrugerii proprietatii.Cititi aceste randuri inaintea folosirii Dispozitivului Instructiuni de siguranta Urmatoarele semne categorizate pot aparea in Ghid. Signal Words Meaning PERICOL Indic un risc potenial ridicat care, dac nu este evitat, va duce la deces sau vtmri grave. AVERTIZARE Indic un pericol potenial mediu sau sczut care, dac nu este evitat, poate duce la rni uoare sau moderate. ATENTIE SFATURI NOTA Indic un risc potenial care, dac nu este evitat, ar putea duce la daune materiale, pierderi de date, performane mai sczute sau rezultate imprevizibile. Ofer metode care s v ajute s rezolvai o problem sau s economisii timp. Ofer informaii suplimentare ca accent i supliment la text. Cerinte de siguranta Respectai standardele locale de siguran electric pentru a v asigura c tensiunea este stabil i respect cerinele de alimentare ale dispozitivului. Transportai, utilizai i depozitai dispozitivul sub condiiile de umiditate i temperatur admise. Consultai specificaiile tehnice corespunztoare ale dispozitivului pentru temperatur i umiditate specifice de lucru. Nu aezai dispozitivul ntr-o locaie expus la umezeal, praf, extrem de cald sau rece, de radiaii electronice puternice sau de condiii de iluminare instabile. Nu instalai dispozitivul ntr-un loc n apropierea sursei de cldur, cum ar fi radiatorul, nclzitorul, cuptorul sau alt dispozitiv generator de cldur, pentru a evita incendiul. mpiedicai curgerea lichidului n dispozitiv pentru a evita deteriorarea componentelor interne. Instalai dispozitivul n poziie orizontal sau instalai-l pe un loc stabil pentru a preveni cderea acestuia. Instalai aparatul ntr-un loc bine ventilat i nu blocai ventilaia aparatului. Nu dezasamblai dispozitivul voit. Evitai loviturile puternice, vibraiile violente i umiditatea timpul transportului, depozitrii i instalrii. Este necesar un pachet complet n timpul transportului. n Utilizati pachetul de fabrica sau echvalent in timpul transportului. Bateriile Puterea redus a bateriei afecteaz funcionarea RTC, determinnd resetarea la fiecare pornire. Cnd bateria are nevoie de nlocuire, n raportul serverului produsului va aprea un mesaj de jurnal. Pentru mai multe informaii despre raportul serverului, consultai paginile de configurare ale produsului sau contactai asistena Dahua. AVERTIZARE Risc de explozie dac bateria este nlocuit incorect. nlocuii numai cu o baterie identic sau cu o baterie recomandat de Dahua. Aruncai bateriile uzate n conformitate cu reglementrile locale sau cu instruciunile productorului bateriei. etina Dleit bezpenostn opaten a varovn Tato kapitola popisuje obsah vztahujc se na sprvnou manipulaci se zazenm, prevenci nebezpe a prevenci kod na majetku. Peliv si tyto informace je dodrujte protte ped pouitm zazen, bhem pouvn zazen a uschovejte je pro budouc pouit. Bezpenostn pokyny Tato pruka me obsahovat nsledujc kategorie signlnch slov. Signln slova Vznam NEBEZPE VAROVN UPOZORNN TIPY Oznauje monost zvanho nebezpe, kter, pokud by mu nebylo zamezeno, me mt za nsledek smrt nebo vn zrann. Oznauje monost stedn nebo mlo zvanho nebezpe, kter, pokud by mu nebylo zamezeno, me mt za nsledek lehk nebo nepli zvan zrann. Oznauje mon riziko, kter, pokud by mu nebylo zamezeno, me mt za nsledek kodu na majetku, ztrtu dat, snen vkonu nebo neoekvan vsledek. Uvd metody, kter vm pomohou vyeit problm nebo vm uet as. POZNMKA Poskytuje dodaten informace formou drazu a doplnn textu. Bezpenostn poadavek Dodrujte mstn normy pro elektrickou bezpenost pro zajitn stabilnho napt a dodren poadavk na napjen zazen. Zazen pepravujte, pouvejte a skladujte pi odpovdajc teplot a vlhkosti. Konkrtn pracovn teplotu a vlhkost naleznete v pslunch technickch specifikacch zazen. Neumsujte zazen tam, kde bude vystaveno vlhkosti, prachu, extrmnmu horku nebo chladu, silnmu elektronickmu zen nebo nestabilnm svtelnm podmnkm. Neinstalujte zazen v blzkosti zdroj tepla, jako je raditor, ohva, kotel nebo jin zazen generujc teplo, aby nedolo k poru. Zamezte proniknut kapalin do zazen, aby nedolo k pokozen jeho Zazen instalujte vodorovn nebo je instalujete na stabilnm mst, aby bylo vnitnch soust. chrnno ped pdem. Zazen instalujte na dobe vtranm mst a neblokujte odvtrvn zazen. Zazen svvoln nedemontujte. Bhem pepravy, skladovn a instalace zamezte silnmu tlaku, prudkm vibracm a namoen. Pi peprav je nezbytn pln zabalen. Pi peprav pouijte obal z vroby nebo obdobn obal. Baterie Nzk nabit baterie ovlivuje fungovn hodin ve skutenm ase a zpsobuje, e se pi kadm sputn resetuj. V ppad, e je teba baterii vymnit, se v serverov zprv produktu zobraz zprva protokolu. Dal informace o serverov zprv naleznete na strnkch o nastaven produktu, ppadn kontaktujte podporu spolenosti Dahua. Nebezpe vbuchu v ppad nesprvn vmny baterie. Vymte pouze za totonou baterii nebo baterii doporuenou spolenost Pouit baterie likvidujte v souladu s mstnmi pedpisy nebo pokyny vrobce VAROVN Dahua. baterie.
. . RTC,
, Dahua. Dahua. hrvatski Vane zatitne mjere i upozorenja Ovo poglavlje opisuje sadraj koji obuhvaa pravilno rukovanje ureajem, sprjeavanje opasnosti i spreavanje oteenja imovine. Paljivo proitajte ove sadraje prije koritenja Ureaja, pridravajte ih se pri upotrebi i sauvajte ih za buduu uporabu. Sigurnosne upute U vodiu se mogu pojaviti sljedee kategorizirane signalne rijei s definiranim znaenjem. Signal Words Meaning OPASNOST UPOZORENJE OPREZ SAVJETI BILJEKA Sigurnosni zahtjevi izbjegne, rezultirat smru Oznaava veliku potencijalnu opasnost koja e, ako se ne ili ozbiljnim ozljedama. Oznaava srednju ili malu potencijalnu opasnost koja, ako se ne izbjegne, moe rezultirati malom ili umjerenom ozljedom. Ukazuje na potencijalni rizik koji, ako se ne imovine, izbjegne, moe rezultirati oteenjem gubitkom podataka, manjom uinkovitou ili nepredvidivim rezultatom. Prua vam metode kojim vam pomae rijeiti problem ili e vam utedjeti vrijeme. Prua dodatne informacije kao naglasak i dopunu teksta. Avoid heavy stress, violent vibration, and soaking during during transportation, storage, and installation. Complete package is necessary during the transportation. Pridravajte se lokalnih elektrinih sigurnosnih standarda kako biste osigurali da je napon stabilan i da udovoljava zahtjevima napajanja ureaja. Prijenosite, upotrebljavajte i pohranjujte ureaj pod doputenim uvjetima vlage i temperature. Pogledajte odgovarajue tehnike specifikacije ureaja za odreenu radnu temperaturu i vlagu. Nemojte postavljati ureaj na mjesto izloeno vlazi, praini, ekstremno vruoj ili hladnoj okolini, jakom elektronskom zraenju ili nestabilnim uvjetima osvjetljenja. Kako biste izbjegli poar nemojte postavljati ureaj na mjesto u blizini izvora topline, kao to su radijator, grija, pe ili neki drugi ureaj za stvaranje topline. Sprijeite da tekuina tee u ureaj kako bi se izbjegla teta na unutarnjim dijelovima. sprijeili padanje. Ugradite ureaj vodoravno ili ga postavite na stabilno mjesto kako biste Ugradite ureaj na dobro prozraeno mjesto i ne blokirajte ventilaciju ureaja. Nemojte rastavljati ureaj samovoljno. Izbjegavajte teki stres, nasilne vibracije i natapanje tijekom prijevoza, skladitenja i instalacije. Prilikom prijevoza potrebno je koristiti tvorniko zatitno pakiranje. Koristite tvorniko pakiranje ili ekvivalent za transport. Baterija Niska baterija utjee na rad RTC, uzrokujui da se resetira pri svakom ukljuivanju. Kad bateriju treba zamijeniti, pojaviti e se poruka u izvjeu posluitelja (server). Dodatne informacije o izvjeu posluitelja (server) potraite na stranicama prirunika proizvoda ili se obratite Dahua podrci. UPOZORENJE Rizik od eksplozije ako se baterija nepravilno zamijeni. Zamijeniti samo sa jednakom baterijom ili sa baterijom koja je preporuena od strane Dahua Technology. instructions. Dotrajale baterije trba zbrinuti u skladu sa lokalnim propisima ili u skladu s uputama proizvoaa baterije. Slovenina Dleit bezpenostn pokyny a varovania Tto kapitola obsahuje tkajce sa sprvnej manipulcie so zariadenm, prevencie pred nebezpeenstvom a prevencie pokodenia majetku. Pred pouvanm zariadenia si pozorne pretajte tieto informcie, dodriavajte ich pri pouvan a uchovajte ich na budce pouitie. informcie Bezpenostn pokyny V prruke sa mu nachdza nasledujce kategorizovan signlne vrazy s definovanm vznamom. Signlne vrazy Vznam NEBEZPEENSTVO VAROVANIE POZOR TIPY POZNMKA Oznauje vysok potencilne nebezpeenstvo, ktor spsob smr alebo vne zranenie, ak sa mu nevyhnete. Oznauje stredn alebo nzke potencilne nebezpeenstvo, ktor me ma za nsledok mierne alebo stredne ak zranenie, ak sa mu nevyhnete. Oznauje potencilne riziko, ktor me vies k pokodeniu majetku, strate dajov, zneniu vkonu alebo nepredvdatenmu vsledku, ak sa mu nevyhnete. Poskytuje metdy, ktor vm pomu vyriei problm alebo uetri as. Poskytuje alie informcie ako zdraznenie a doplnenie textu. Poiadavky na bezpenos Dodrujte miestne elektrick bezpenostn normy, aby ste zabezpeili, e naptie je stabiln a zodpoved poiadavkm na napjanie zariadenia. Zariadenie prepravujte, pouvajte a uchovvajte pri povolench podmienkach vlhkosti a teploty. Pretajte si prslun technick pecifikcie zariadenia pre pecifick pracovn teplotu a vlhkos. Zariadenie neumiestujte na miesto vystaven vlhkosti, prachu, extrmnemu teplu alebo chladu, silnmu elektronickmu iareniu alebo nestabilnm podmienkam osvetlenia. Zariadenie neintalujte na miesto, ktor sa nachdza blzko zdroja tepla, ako je naprklad raditor, ohrieva, pec alebo in zariadenie na tvorbu tepla. Preddete tak vzniku poiaru. Zabrte vnikaniu kvapaliny do zariadenia, aby nedolo k pokodeniu Zariadenie naintalujte horizontlne alebo ho naintalujte na stabiln miesto, Zariadenie naintalujte na dobre vetranom mieste a neblokujte ventilciu vntornch komponentov. aby ste zabrnili pdu. zariadenia. Zariadenie svojvone nerozoberajte. Poas prepravy, skladovania a intalcie sa vyhnite silnmu namhaniu, prudkm vibrcim a namaniu. Poas prepravy je potrebne prepravova kompletn balenie. Na prepravu pouite tovrensk balenie alebo jeho ekvivalent. Batria Nzka kapacita batrie ovplyvuje prevdzku RTC, o spsob jeho vynulovanie pri kadom zapnut. Ke je batriu potrebn vymeni, v sprve servera produktu sa zobraz hlsenie. alie informcie o hlsen servera njdete na strnkach s nastaveniami produktu alebo sa obrte na podporu spolonosti Dahua. Nebezpeenstvo vbuchu, ak je batria nesprvne vymenen. Vymete iba za t ist batriu alebo batriu, ktor odpora spolonos Pouit batrie zlikvidujte v slade s miestnymi predpismi alebo pokynmi VAROVANIE Dahua. vrobcu batrie. C Vane Zatitne mere i Upozorenja Ovo poglavlje opisuje sadraj koji pokriva pravilno rukovanje ureajem, spreavanje opasnosti i spreavanje oteenja imovine. Paljivo proitajte ove sadraje pre korienja ureaja, potujte ih kada koristite i uvajte ga za buduu referencu. Bezbednosna Uputstva Sledee kategorije rei sa definisanim znaenjem mogu se pojaviti u Vodiu. Oznaka Znaenje OPASNOST Oznaava visoku potencijalnu opasnost koja e, ako se i ne izbegne, rezultirati smru ili ozbiljnim povredama. Oznaka Znaenje UPOZORENJE OPREZ Oznaava opasnost srednje ili niske potencijale koja bi, ukoliko se ne izbegne, mogla dovesti do blagih ili umerenih povreda. Oznaava potencijalni rizik koji bi, ukoliko se to ne izbegne, mogao dovesti do oteenja imovine, gubitka ili nepredvidivog rezultata. performanse podataka, nie PREPORUKE Prua metode za pomo u reavanju problema ili utede vremena. BELEKA Prua dodatne informacije kao naglasak i dodatak tekstu. Bezbednosna Uputstva Pridravajte se lokalnih standarda elektrine sigurnosti kako biste bili sigurni da je napon stabilan i da odgovara zahtevu za napajanje ureaja. Prevoz, korienje i skladitenje ureaja treba da budu u skladu sa dozvoljenim uslovima vlage temperaturnim uslovima. Pogledajte odgovarajue tehnike specifikacije ureaja koji se odnose na specifinu radnu temperaturu i vlanost vazduha. i Nemojte postavljati ureaj na mesto izloeno vlazi, praini, ekstremnom vruem ili hladnom vazduhu, jakom elektronskom zraenju ili nestabilnim uslovima osvetljenja. Ne postavljajte ureaj na mesto blizu izvora toplote, kao to je radijator, greja, pe ili drugi ureaj za proizvodnju toplote kako biste izbegli poar. Spreite tenost da tee u ureaj kako bi se izbeglo oteenje unutranjih komponenti. Instalirajte ureaj horizontalno ili postavite na stabilno mesto kako biste spreili padanje. Ugradite ureaj na dobro provetreno mesto i ne blokirajte ventilaciju ureaja. Nemojte rastavljati ureaj proizvoljno. Izbegavajte jak pritisak, nasilne vibracije i usisavanje tokom transporta, skladitenja i instalacije. Kompletan paket je neophodan tokom transporta. Koristite fabriko pakovanje ili ekvivalent u toku transporta. Baterija Baterija male snage utie na rad RTC-a, dovodei do reseta pri svakom ukljuivanju. Kada se baterija mora zameniti, logovna poruka e se pojaviti u izvetaju servera proizvoda. Za vie informacija o izvetaju servera, pogledajte stranice za podeavanje proizvoda ili kontaktirajte Dahua podrku. UPOZORENJE Dahua. proizvoaa baterije. Opasnost od eksplozije ako se baterija nepravilno zameni. Zamenite je samo sa identinom baterijom ili sa baterijom koju preporuuje Odloite iskoriene baterije u skladu sa lokalnim propisima ili uputstvima Trke nemli Kurallar ve Uyarlar Bu Blm, Cihazn doru kullanmn, tehlike nlemeyi ve mal zararnn nlenmesini kapsayan ierikleri anlatmaktadr. Cihaz kullanmadan nce bu ierikleri dikkatli ekilde okuyun, kullanrken bunlara uyun ve ileride bavurmak zere saklayn. Gvenlik Talimatlar Aada, belirtilen aklamaya sahip kategorize edilmi uyar szcklerini Klavuzda grebilirsiniz. Uyar Szckleri Anlam TEHLKE ciddi Kanlmamas yaralanmalara neden olacak yksek potansiyelli bir tehlikeyi belirtir. durumunda lm veya UYARI Kanlmamas durumunda hafif veya orta dereceli yaralanmaya neden olabilecek orta veya dk potansiyelli bir tehlikeyi belirtir. DKKAT Kanlmamas durumunda mal hasarna, veri kaybna, dk performansa veya tahmin edilemeyen sonuca neden olabilecek potansiyel bir riski belirtir. PULARI Bir problemi zmenize veya zamandan etmenize yardmc olmak iin yntemler sunar. tasarruf NOT Metne pekitirme ve ek olarak ilave bilgiler salar. Gvenlik Gereksinimi Voltajn is istikrarl olduundan ve cihazn g kayna gereksinimine uygun olduundan emin olmak iin yerel elektrik gvenlii standartlarna uyun. Cihaz izin verilen nem ve scaklk artlar altnda nakledin, kullann ve saklayn. Belirli alma scakl ve nem deerleri iin cihazn ilgili teknik zelliklerine bakn. Cihaz rutubete, toza, ar scaa veya soua, gl elektronik radyasyona veya deiken aydnlatma artlarna maruz kalan bir yere yerletirmeyin. Yangn nlemek iin cihaz radyatr, stc, frn veya baka s reten cihazlar gibi s kaynana yakn bir yere monte etmeyin. erisindeki paralarn hasar grmesini nlemek iin cihazn ierisine svlarn girmesini nleyin. Cihazn dmesini nlemek iin yatay olarak veya dayankl bir yere monte edin. Pil UYARI karn. Cihaz iyi havalandrlan bir yere monte edin ve cihazn hava sirklasyonunu engellemeyin. Cihazn paralarn geliigzel skmeyin. Cihazn nakliyesi, saklanmas ve montaj esnasnda ar basklardan, iddetli sarsntlardan ve svya batmalardan kann. Cihazn nakliyesi esnasnda ambalajn tamam gereklidir. Nakliye iin fabrikasyon ambalaj ya da e deerini kullann. Dk pil gc, her g ama esnasnda sfrlanmasna neden olarak RTCnin almasn etkiler. Pillerin deitirilmesi gerektiinde rnn sunucu raporunda bir gnlk iletisi grntlenir. Sunucu raporu hakknda daha fazla bilgi iin rnn kurulum sayfalarna bakn veya Dahua destek merkeziyle iletiime gein. Pil yanl ekilde taklrsa patlama tehlikesi. Sadece ayn trde veya Dahua tarafndan nerilen bir pil takn. Eski pilleri, yerel ynetmeliklere veya pil reticisinin talimatlarna gre elden
-RTC
, Dahua. Dahua. Franais Prcautions et avertissements importants Le contenu de ce chapitre aborde la bonne manipulation de lappareil, la prvention des risques et la prvention des dommages matriels. Lisez ce contenu soigneusement avant dutiliser lappareil, respectez-le lorsque vous lutilisez, et conservez-le pour vous y rfrer ultrieurement. Prcautions demploi Les mentions davertissement catgorises suivantes ayant un sens dfini sont susceptibles dapparatre dans le manuel. Mentions davertissement Signification DANGER Indique un danger risque lev qui entranera la mort ou des blessures graves si les instructions donnes ne sont pas respectes. AVERTISSEMENT une ou Indique faiblement dangereuse qui entranera des blessures faibles ou modres si les instructions donnes ne sont pas respectes. situation moyennement AVERTISSEMENT ASTUCES REMARQUE Indique une situation potentiellement dangereuse qui pourra entraner des dommages de la proprit, des pertes de donnes, une rsultats performance moindre imprvisibles, si les instructions donnes ne sont pas respectes. des ou Fournit des instructions qui vous permettront de rsoudre un problme ou de vous faire gagner du temps. Fournit des informations supplmentaires pour mettre en vidence et complter le texte. Exigences de scurit les spcifications temprature autorises. Consultez Respectez les normes de scurit lectrique locales pour vous assurer que la tension est stable et conforme aux exigences dalimentation de lappareil. Transportez, utilisez et stockez lappareil dans les conditions dhumidit et de techniques correspondantes de lappareil pour connatre la temprature et lhumidit de fonctionnement spcifiques. Ne placez pas lappareil dans un lieu expos lhumidit, la poussire, une chaleur ou un froid extrme, de forts rayonnements lectroniques, ou des conditions dclairage instables. Ninstallez pas lappareil prs dune source de chaleur telle quun radiateur, un chauffage, une chaudire, ou tout autre dispositif gnrant de la chaleur afin dviter les risques dincendie. Empchez aux liquides de couler sur lappareil afin dviter dendommager les composants internes. Installez lappareil horizontalement ou sur une surface stable afin de lempcher de tomber. Installez lappareil dans un lieu bien ventil et ne bloquez pas la ventilation de lappareil. Ne dmontez pas lappareil de faon arbitraire. Au cours du transport, du stockage et de linstallation de lappareil, vitez de le soumettre de fortes contraintes, des vibrations violentes ou une immersion. Lemballage complet est ncessaire au cours du transport. Utilisez lemballage dusine ou quivalent pour le transport. Batterie Un niveau de batterie faible affecte le fonctionnement du RTC, qui se rinitialisera chaque redmarrage. Lorsque la batterie doit tre remplace, un message de journal apparat dans le rapport du serveur du produit. Pour plus dinformations sur le rapport du serveur, consultez les pages de configuration du produit ou contactez lassistance Dahua. AVERTISSEMENT Risque dexplosion si la batterie est remplace de faon incorrecte. Remplacez la batterie uniquement par une batterie recommande par Dahua. liminez les batteries usages conformment aux rglementations locales ou aux instructions du fabricant de la batterie. Espaol(Espaa) Advertencias y precauciones de seguridad impo rtantes En este captulo se describe el contenido que cubre la manipulacin correcta del dispositivo, la prevencin de riesgos y la prevencin de daos materiales. Lea detenidamente este contenido antes de usar el dispositivo, sgalo cuando lo utilice y consrvelo para consultas futuras. Instrucciones de seguridad Las siguientes palabras de advertencia con un significado definido podran aparecer en la gua. Palabras de advertencia Significado PELIGRO ADVERTENCIA PRECAUCIN CONSEJOS NOTA Indica un riesgo potencial alto que, si no se evita, resultar en muerte o lesiones graves. Indica un riesgo potencial medio o bajo que, si no se evita, podra resultar en lesiones leves o moderadas. Indica un riesgo potencial que, si no se evita, podra resultar en daos materiales, prdida de datos, resultados impredecibles. rendimiento menor o Ofrece mtodos para ayudarle a resolver un problema o ahorrar tiempo. Proporciona informacin adicional como hincapi y complemento para el texto. Requisitos de seguridad Cumpla las normas locales de seguridad elctrica para garantizar que la tensin sea estable y cumpla los requisitos de alimentacin elctrica del dispositivo. Transporte, utilice y almacene el dispositivo bajo las condiciones de humedad tcnicas temperatura permitidas. Consulte las especificaciones y correspondientes del dispositivo para la temperatura y humedad operativas especficas. No coloque el dispositivo en un lugar expuesto a humedad, polvo, calor o fro extremos, radiaciones electrnicas fuertes o condiciones de iluminacin inestables. No instale el dispositivo en un lugar cerca de fuentes de calor, como radiadores, calentadores, hornos u otros dispositivos generadores de calor, para evitar un incendio. No deje que entre lquido en el dispositivo para evitar daos en los componentes internos. Instale el dispositivo horizontalmente o instlelo sobre un lugar estable para evitar que caiga. Instale el dispositivo en un lugar bien ventilado y no obstruya la ventilacin. No desmonte de forma arbitraria el dispositivo. Evite las presiones excesivas, las vibraciones violentas y mojar el dispositivo durante el transporte, almacenamiento e instalacin. Es necesario utilizar el embalaje completo durante el transporte. Utilice el embalaje de fbrica o uno equivalente para transportarlo. Pilas La baja batera afecta al funcionamiento del RTC, provocando que se restablezca cada vez que recibe alimentacin. Cuando sea necesario sustituir las pilas, aparecer un mensaje de registro en el informe de servidor del producto. Para ms informacin acerca del informe de servidor, consulte las pginas de configuracin del producto o pngase en contacto con el departamento de soporte de Dahua. ADVERTENCIA Riesgo de explosin si se sustituyen incorrectamente las pilas. Sustityalas nicamente por pilas idnticas o pilas recomendadas por Dahua. Elimine las pilas gastadas en conformidad con la normativa local o las instrucciones del fabricante de las pilas. Deutsch Wichtige Sicherheits- und Warnhinweise Dieses Kapitel beschreibt die Inhalte zum richtigen Umgang mit dem Gert, zur Verhtung von Gefahren und zur Vermeidung von Sachschden. Lesen Sie dieses Kapitel sorgfltig durch, bevor Sie das Gert verwenden, halten Sie die Anweisungen bei der Verwendung ein und bewahren Sie diese Anleitung zum spteren Nachlesen gut auf. Sicherheitshinweise Die folgenden kategorisierten Signalwrter mit definierter Bedeutung knnen in der Kurzanleitung verwendet werden. Signalwrter Bedeutung GEFAHR Weist auf ein hohes Gefahrenpotential hin, das, wenn es nicht vermieden wird, zum Tod oder zu schweren Verletzungen fhrt. Signalwrter Bedeutung Weist auf eine mittlere oder geringe potentielle Gefahr hin, die, wenn sie nicht vermieden wird, zu leichten oder mittelschweren Verletzungen fhren kann. Weist auf ein potenzielles Risiko hin, das, wenn es nicht vermieden wird, zu Sachschden, Datenverlust, geringerer Leistung oder unvorhersehbaren Ergebnis fhren kann. Stellt Methoden bereit, mit denen Sie ein Problem lsen oder Zeit sparen knnen. Bietet zustzliche Informationen als Schwerpunkt und Ergnzung zum Text. WARNUNG VORSICHT TIPPS HINWEIS Sicherheitsanforderungen Halten Sie sich an die rtlichen elektrischen Sicherheitsnormen, um sicherzustellen, dass die Spannung stabil ist und den Anforderungen an die Stromversorgung des Gerts entspricht. Transportieren, verwenden und lagern Sie das Gert unter den zulssigen Feuchtigkeits- und Temperaturbedingungen. Die entsprechenden technischen Spezifikationen des Gerts jeweilige Betriebstemperatur und Luftfeuchtigkeit sind zu beachten. fr die Stellen Sie das Gert nicht an Orten auf, an denen es Feuchtigkeit, Staub, extremer Hitze oder Klte, starker elektronischer Strahlung oder instabilen Lichtverhltnissen ausgesetzt ist. Installieren Sie das Gert nicht in der Nhe einer Wrmequelle, z. B. einem Heizkrper, Heizlfter, Ofen oder anderen Wrme erzeugenden Gerten, um Feuer zu vermeiden. Verhindern Sie, dass Flssigkeit in das Gert fliet, um Schden an internen Bauteilen zu vermeiden. Installieren Sie das Gert waagerecht oder an einem stabilen Ort, damit es nicht herunterfllt. Installieren Sie das Gert an einem gut belfteten Ort und blockieren Sie die Belftung des Gerts nicht. Nehmen Sie das Gert nicht eigenmchtig auseinander. Vermeiden Sie starke Belastungen, Vibrationen und eindringende Nsse whrend des Transports, der Lagerung und der Installation. Das Gert sollte immer vollstndig verpackt transportiert werden. Verwenden Sie die ab Werk verwendete Verpackung oder eine gleichwertige Verpackung fr den Transport. Batterie Eine niedrige Batterieleistung beeintrchtigt den Betrieb der Echtzeituhr, wodurch sie bei jedem Einschalten zurckgesetzt wird. Wenn die Batterie ausgetauscht werden muss, wird eine Protokollmeldung im Serverbericht des Produkts angezeigt. Weitere finden Sie auf den Informationen zum Serverbericht Einrichtungsseiten des Produkts oder wenden Sie sich an den Support von Dahua. WARNUNG nicht Bei ordnungsgemem Austausch der Batterie besteht Explosionsgefahr. die von Dahua empfohlen wird. Ersetzen Sie die Batterie nur durch eine identische Batterie oder eine Batterie, Entsorgen Sie leere Batterien entsprechend den rtlichen Vorschriften oder den Anweisungen des Batterieherstellers. Italiano Norme di sicurezza e avvertenze importanti Il presente capitolo descrive le procedure per una corretta manipolazione del dispositivo, per la prevenzione dei rischi e per la prevenzione di danni materiali. Leggere attentamente queste informazioni prima di utilizzare il dispositivo, attenersi alle istruzioni fornite durante luso e conservarle come futuro riferimento. Istruzioni di sicurezza I seguenti indicatori di pericolo, aventi i significati indicati, possono apparire nella presente guida. Indicatori di pericolo Significato PERICOLO AVVERTENZA Indica una situazione ad alto rischio che, se non viene evitata, pu causare il decesso o gravi lesioni. Indica una situazione a medio o basso rischio che, se non viene evitata, pu causare lesioni di leggera o moderata entit. ATTENZIONE Indica un rischio potenziale che, se non evitato, pu causare danni materiali, perdite di dati, riduzione delle prestazioni o altre conseguenze imprevedibili. CONSIGLI NOTA Spiegano metodi utili per risolvere un problema o per aiutarvi a risparmiare tempo. Fornisce informazioni aggiuntive che completano quelle riportate nel testo. Requisiti di sicurezza Attenersi alle leggi locali sulla sicurezza elettrica per garantire una tensione stabile e soddisfare i requisiti di alimentazione del dispositivo. Trasportare, utilizzare e conservare il dispositivo alle condizioni di umidit e tecniche del temperatura consentite. Fare riferimento alle specifiche dispositivo per conoscere i valori specifici della temperatura di esercizio e dellumidit. Non posizionare il dispositivo in un ambiente esposto ad una eccessiva umidit, a polvere, a condizioni di caldo e freddo estremi, a forti radiazioni elettroniche o a condizioni di illuminazione non stabile. Non installare il dispositivo vicino ad una fonte di calore, quali ad esempio radiatori, apparecchi di riscaldamento, forni o altri dispositivi di generazione del calore, per evitare il rischio di incendio. Evitare di versare liquido sul dispositivo per non danneggiare i componenti interni. Installare il dispositivo in posizione orizzontale, oppure in una zona stabile, per evitare che possa cadere. Installare il dispositivo in un ambiente adeguatamente ventilato e non ostruire la circolazione dell'aria. Non smontare il dispositivo in modo casuale. Evitare forte sollecitazioni, violente vibrazioni e non bagnare il prodotto durante il trasporto, lo stoccaggio e linstallazione. Trasportare il prodotto utilizzando un imballaggio adeguato. Utilizzare l'imballaggio standard previsto o un imballaggio equivalente. Batteria Luso di una batteria scarica pu compromettere il funzionamento del dispositivo RTC, che si resetter ad ogni avvio. Quando necessario sostituire la batteria, nel report del server del prodotto viene visualizzato un messaggio di log. Per ulteriori informazioni sul report del server, leggere le pagine di configurazione del prodotto, oppure contattare il servizio assistenza di Dahua. AVVERTENZA esplosione. Dahua. Se la batteria non viene sostituita correttamente, pu generare il rischio di Sostituire solo con una batteria identica o una batteria raccomandata da Smaltire le batterie usate in conformit con le normative locali o attenendosi alle istruzioni del produttore della batteria. Nederlands Belangrijke voorzorgsmaatregelen en waarschuwingen Dit hoofdstuk beschrijft de inhoud die de juiste omgang met het apparaat behandelt, het voorkomen van gevaren alsmede het voorkomen van materile schade. Lees deze inhoud zorgvuldig door voordat u het apparaat gebruikt, houdt u eraan tijdens het gebruik, en bewaar ze goed voor toekomstige referentie. Veiligheidsinstructies De volgende gecategoriseerde signaalwoorden met gedefinieerde betekenis staan in de handleiding vermeld. Signaalwoorden GEVAAR WAARSCHUWING LET OP TIPS Betekenis Geeft een hoog potentieel gevaar aan dat, indien niet voorkomen, kan leiden tot overlijden of ernstig. Geeft een gemiddeld of laag potentieel gevaar aan dat, indien niet voorkomen, kan leiden tot licht of matig letsel. Geeft een potentieel risico aan dat, indien niet voorkomen, kan leiden tot materile schade, gegevensverlies, of lagere onvoorspelbaar resultaat. prestaties Biedt methodes om u te helpen een probleem op te lossen of tijd te besparen. OPMERKING Biedt aanvullende informatie als nadruk op en aanvulling van de tekst. Veiligheidsvereiste Houdt u aan plaatselijke veiligheidsstandaarden om ervoor te zorgen dat het voltage stabiel is en voldoet aan de vereiste stroomvoorziening van het apparaat. Transporteer, gebruik en bewaar het apparaat onder de toegestane relatieve luchtvochtigheid en temperatuuromstandigheden. Zie de overeenkomstige technische specificaties van het apparaat voor specifieke werktemperatuur en relatieve luchtvochtigheid. Plaats het apparaat niet op een locatie die blootgesteld is aan vocht, stof, extreme hitte of koude, sterke elektronische straling of onstabiele verlichtingsomstandigheden. Installeer het apparaat niet op een plek vlakbij de warmtebron, zoals een radiator, verwarming, fornuis of ander warmte-genererend apparaat om brand te voorkomen. Voorkom dat er vloeistof in het apparaat loopt om schade aan interne componenten te vermijden. Installeer het apparaat horizontaal of installeer het op een stabiele plek om te voorkomen dat het valt. Installeer het apparaat in een goed geventileerde ruimte en blokkeer de ventilatie van het apparaat niet. Haal het apparaat niet willekeurig uit elkaar. Vermijd zware druk, hevige trilling en nat worden tijdens het transport, de opslag en de installatie. De complete verpakking is noodzakelijk tijdens het transport. Gebruik de fabrieksverpakking of gelijkwaardig voor het transport. Batterij Lage batterijstroom benvloedt de bediening van de RTC, waardoor deze bij iedere stroominschakeling reset. Als de batterij vervangen moet worden, verschijnt een logbericht in het serverrapport van het product. Zie voor meer informatie over het serverrapport de setuppagina's van het product of neem contact op met Dahua Support. WAARSCHUWING Gevaar op ontploffing als de batterij onjuist wordt vervangen. Vervang alleen met een identieke batterij die wordt aanbevolen door Dahua. Verwerk de gebruikte batterijen volgens de plaatselijke regelgeving of de instructies van de batterijfabrikant. Portugus Instrues e advertncias importantes Este captulo descreve os contedos relativos ao manuseamento correto do dispositivo, preveno de riscos e preveno de danos materiais. Leia estes contedos atentamente antes de utilizar o dispositivo, respeite as instrues durante a utilizao e guarde-as em boas condies para consulta futura. Instrues de segurana As seguintes palavras-sinal categorizadas, com um significado definido, podero surgir no Guia. Palavras-sinal PERIGO AVISO ATENO Significado Indica um risco potencial elevado que, se no for evitado, resultar em morte ou ferimentos graves. Indica um risco potencial mdio ou baixo que, se no for evitado, poder resultar em ferimentos ligeiros ou moderados. Indica um risco potencial que, se no for evitado, pode resultar em danos materiais, perda de dados, desempenho inferior ou resultados imprevisveis. SUGESTES Disponibiliza mtodos para o ajudar a resolver um problema ou a poupar o seu tempo. NOTA Disponibiliza informaes adicionais como destaque e complemento ao texto. Requisitos em termos de segurana Respeite as normas locais de segurana eltrica de forma a garantir que a tenso estvel e respeita os requisitos da fonte de alimentao do dispositivo. Transporte, utilize e armazene o dispositivo nas condies de humidade e temperatura permitidas. Consulte as respetivas especificaes tcnicas do dispositivo para conhecer a temperatura e humidade de funcionamento especficas. No coloque o dispositivo num local exposto a humidade, poeira, condies de calor ou frio extremas, radiao eletrnica intensa ou condies de iluminao instveis. No instale o dispositivo num local prximo de uma fonte de calor, como, por exemplo, um radiador, aquecedor, fornalha ou outro dispositivo de gerao de calor de forma a evitar incndios. No permita o escorrimento de lquidos para o dispositivo, evitando, assim, danos nos componentes internos. Instale o dispositivo numa posio horizontal ou num local estvel, prevenindo possveis quedas. Instale o dispositivo num local bem ventilado e no bloqueie a ventilao do dispositivo. No desmonte o dispositivo de forma arbitrria. Evite presses intensas, vibraes violentas e a imerso do dispositivo durante o transporte, armazenamento e instalao. Para o transporte, necessria a embalagem completa. Utilize a embalagem de fbrica ou equivalente para efetuar o transporte. Bateria Uma bateria fraca afeta a operao do RTC, fazendo com que este reinicie sempre que ligado. Quando a bateria tiver de ser substituda, surgir uma mensagem de registo no relatrio do servidor do produto. Para mais informaes sore o relatrio do servidor, consulte as pginas de configurao do produto ou contacte a Dahua para obter assistncia. AVISO Risco de exploso se a bateria no for corretamente colocada. Substitua apenas por uma bateria idntica ou por uma bateria recomendada pela Dahua. Elimine as baterias usadas de acordo com os regulamentos locais ou com as instrues do fabricante da bateria.
1 | Users Manual -2 | Users Manual | 4.97 MiB | January 18 2022 |
Dahua Network Speed Dome & PTZ Camera Web 3.0 Users Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V3.0.2 Foreword Users Manual General Safety Instructions This manual introduces the functions and operations of the network speed dome and PTZ camera (hereinafter referred to as "the Device"). The following signal words might appear in the manual. Signal Words Meaning Indicates a high potential hazard which, if not avoided, will result in death or serious injury. Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury. Indicates a potential risk which, if not avoided, could result in property damage, data loss, reductions in performance, or unpredictable results. Electrostatic Sensitive Devices. Indicates a device that is sensitive to electrostatic discharge. Indicates dangerous high voltage. Take care to avoid coming into contact with electricity. Indicates a laser radiation hazard. Take care to avoid exposure to a laser beam. Provides methods to help you solve a problem or save time. Provides additional information as a supplement to the text. Revision History V3.0.2 V3.0.1 Revision Content Release Time Revision Content Updated illuminator Added legal information function. function. September 2021 Added Configuring User Group function. July 2021 I Revision Content Release Time Revision Content Users Manual V3.0.0 March 2021 Modified overlay, audio, network settings, and destination sections. Added Bluetooth settings, construction monitoring, battery exception, screen off settings, emergency maintenance, life statistics, and battery status sections. Added the note to provide international calling codes for 4G models. Updated OSD info, TCP/IP and smart plan,and delete life statistics. Added some functions of the Baseline, and refine the whole manual. Updated some functions of the Security Baseline. June 2020 April 2020 January 2020 September 2019 V2.0.2 V2.0.1 V2.0.0 V1.1.1 V1.0.0 Privacy Protection Notice First release. May 2018 As the device user or data controller, you might collect the personal data of others such as their face, fingerprints, and license plate number. You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures which include but are not limited: Providing clear and visible identification to inform people of the existence of the surveillance area and provide required contact information. Interface Declaration About the Manual This manual mainly introduces the relevant functions of the device. The interfaces used in its manufacture, the procedures for returning the device to the factory for inspection and for locating its faults are not described in this manual. Please contact technical support if you need information on these interfaces. The manual is for reference only. Slight differences might be found between the manual We are not liable for losses incurred due to operating the product in ways that are not in and the product. compliance with the manual. The manual will be updated according to the latest laws and regulations of related jurisdictions. For detailed information, see the paper users manual, use our CD-ROM, scan the QR code or visit our official website. The manual is for reference only. Slight differences might be found between the electronic version and the paper version. II Users Manual All designs and software are subject to change without prior written notice. Product updates might result in some differences appearing between the actual product and the manual. Please contact customer service for the latest program and supplementary documentation. There might be errors in the print or deviations in the description of the functions, operations and technical data. If there is any doubt or dispute, we reserve the right of final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF All trademarks, registered trademarks and company names in the manual are properties of Please visit our website, contact the supplier or customer service if any problems occur If there is any uncertainty or controversy, we reserve the right of final explanation. format) cannot be opened. their respective owners. while using the device. III Important Safeguards and Warnings Users Manual This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, comply with the guidelines when using it, and keep the manual safe for future reference. Operation Requirements Make sure that the power supply of the device works properly before use. Do not pull out the power cable of the device while it is powered on. Only use the device within the rated power range. Transport, use and store the device under allowed humidity and temperature conditions. Prevent liquids from splashing or dripping on the device. Make sure that there are no objects filled with liquid on top of the device to avoid liquids flowing into it. Do not disassemble the device. Installation Requirements Connect the device to the adapter before power on. Strictly abide by local electrical safety standards, and make sure that the voltage in the area is steady and conforms to the power requirements of the device. Do not connect the device to more than one power supply. Otherwise, the device might become damaged. Observe all safety procedures and wear required protective equipment provided for your use while working at heights. Do not expose the device to direct sunlight or heat sources. Do not install the device in humid, dusty or smoky places. Install the device in a well-ventilated place, and do not block the ventilator of the device. Use the power adapter or case power supply provided by the device manufacturer. The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no higher than PS2. Note that the power supply requirements are subject to the device label. Connect class I electrical appliances to a power socket with protective earthing. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. IV Users Manual Caution: The user is cautioned that changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. Note: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense. V Table of Contents Users Manual Foreword .................................................................................................................................................... I Important Safeguards and Warnings .................................................................................................... IV 1 Network Configuration.......................................................................................................................... 1 1.1 Network Connection ..................................................................................................................... 1 1.2 Log in to the Web Page ................................................................................................................ 1 1.2.1 Device Initialization .............................................................................................................. 1 1.2.2 First-time Login ..................................................................................................................... 5 1.2.3 Device Login .......................................................................................................................... 6 1.2.4 Resetting Password ............................................................................................................. 7 2 Live........................................................................................................................................................ 11 2.1 Encoding Setting ......................................................................................................................... 11 2.2 Video Window Adjustment ......................................................................................................... 12 2.3 System Menu ............................................................................................................................... 16 2.4 Video Window Functions ........................................................................................................... 16 2.5 PTZ Configuration ....................................................................................................................... 19 2.6 PTZ Status.................................................................................................................................... 23 3 AI Live ................................................................................................................................................... 24 3.1 AI Live Page ................................................................................................................................. 24 3.1.1 Information Display Area of Detected Targets ................................................................ 24 3.1.2 Snapshot Display Area ....................................................................................................... 25 3.1.3 Statistics Area of the Detected Targets ........................................................................... 25 3.2 AI Live Settings ........................................................................................................................... 26 4 Playback ............................................................................................................................................... 28 4.1 Video Playback ............................................................................................................................ 28 4.1.1 Video Play Function Bar .................................................................................................... 29 4.1.2 Recording Type ................................................................................................................... 29 4.1.3 Auxiliary Functions ............................................................................................................ 29 4.1.4 Video Playback File Search and Display Area................................................................. 30 4.1.4.1 Downloading Files in Batches .................................................................................. 31 4.1.4.2 Displaying File List ..................................................................................................... 32 4.1.5 Video Clipping Area ............................................................................................................ 33 4.1.6 Progress Bar Time Formats............................................................................................... 33 4.2 Image Playback ........................................................................................................................... 34 4.2.1 Image Playing Functions ................................................................................................... 34 4.2.2 Image Playback File Search and Display Area ................................................................ 34 4.2.3 Snapshot Types .................................................................................................................. 36 5 Setting .................................................................................................................................................. 37 VI Users Manual 5.1 Camera ......................................................................................................................................... 37 5.1.1 Conditions Settings ............................................................................................................ 37 5.1.1.1 Conditions ................................................................................................................... 37 5.1.1.1.1 Picture ................................................................................................................. 37 5.1.1.1.2 Exposure ............................................................................................................. 38 5.1.1.1.3 Backlight ............................................................................................................. 43 5.1.1.1.4 WB ........................................................................................................................ 43 5.1.1.1.5 Day & Night ......................................................................................................... 44 5.1.1.1.6 Focus & Zoom .................................................................................................... 45 5.1.1.1.7 Illuminator ........................................................................................................... 47 5.1.1.1.8 Defog ................................................................................................................... 50 5.1.1.2 Profile Management ................................................................................................... 52 5.1.2 Video .................................................................................................................................... 53 5.1.2.1 Video Stream ............................................................................................................... 53 5.1.2.2 Snapshot ..................................................................................................................... 54 5.1.2.3 Overlay ......................................................................................................................... 55 5.1.2.3.1 Privacy Masking ................................................................................................. 55 5.1.2.3.2 Channel Title ....................................................................................................... 56 5.1.2.3.3 Time Title ............................................................................................................. 57 5.1.2.3.4 OSD Info .............................................................................................................. 58 5.1.2.3.5 Font Attribute ...................................................................................................... 59 5.1.2.3.6 Picture Overlay ................................................................................................... 59 5.1.2.3.7 Mobile State ........................................................................................................ 60 5.1.2.3.8 Custom Overlay .................................................................................................. 61 5.1.2.3.9 Abnormal ............................................................................................................. 61 5.1.2.3.10 Latitude and Longitude.................................................................................... 62 5.1.2.4 ROI ................................................................................................................................ 62 5.1.2.5 Path .............................................................................................................................. 63 5.1.3 Audio .................................................................................................................................... 64 5.1.3.1 Configuring Audio Parameters ................................................................................. 64 5.1.3.2 Configuring Alarm Audio ........................................................................................... 66 5.2 Network Settings ......................................................................................................................... 67 5.2.1 TCP/IP ................................................................................................................................... 67 5.2.2 Port ....................................................................................................................................... 70 5.2.3 PPPoE .................................................................................................................................. 72 5.2.4 DDNS .................................................................................................................................... 73 5.2.5 SMTP (Email) ....................................................................................................................... 74 5.2.6 UPnP ..................................................................................................................................... 77 5.2.7 Bonjour ................................................................................................................................ 78 VII Users Manual 5.2.8 SNMP .................................................................................................................................... 79 5.2.9 Multicast............................................................................................................................... 81 5.2.9.1 RTP ............................................................................................................................... 82 5.2.9.2 TS ................................................................................................................................. 82 5.2.10 Auto Register .................................................................................................................... 82 5.2.11 Wi-Fi ................................................................................................................................... 83 5.2.11.1 Wi-Fi Settings ............................................................................................................ 83 5.2.11.2 WPS Settings ............................................................................................................ 85 5.2.11.3 AP Settings ................................................................................................................ 85 5.2.12 802.1x ................................................................................................................................. 86 5.2.13 QoS ..................................................................................................................................... 87 5.2.14 4G/5G .................................................................................................................................. 87 5.2.14.1 Dialing Setting........................................................................................................... 88 5.2.14.2 Mobile Setting ........................................................................................................... 89 5.2.15 Access Platform ................................................................................................................ 91 5.2.15.1 P2P ............................................................................................................................. 91 5.2.15.2 ONVIF ......................................................................................................................... 92 5.2.15.3 RTMP .......................................................................................................................... 93 5.3 Bluetooth Settings ...................................................................................................................... 94 5.4 PTZ Settings ................................................................................................................................ 96 5.4.1 Protocol................................................................................................................................ 96 5.4.1.1 Network PTZ Settings ................................................................................................ 96 5.4.1.2 Analog PTZ Settings .................................................................................................. 96 5.4.2 Function ............................................................................................................................... 97 5.4.2.1 Preset ........................................................................................................................... 97 5.4.2.1.1 Preset Settings ................................................................................................... 97 5.4.2.1.2 Special Preset Settings ..................................................................................... 98 5.4.2.2 Tour .............................................................................................................................. 99 5.4.2.3 Scan ........................................................................................................................... 100 5.4.2.4 Pattern........................................................................................................................ 101 5.4.2.5 Pan ............................................................................................................................. 101 5.4.2.6 PTZ Speed ................................................................................................................. 102 5.4.2.7 Idle Motion ................................................................................................................. 103 5.4.2.8 PowerUp .................................................................................................................... 103 5.4.2.9 PTZ Limit ................................................................................................................... 104 5.4.2.10 Time Task ................................................................................................................ 105 5.4.2.11 PTZ Restart .............................................................................................................. 105 5.4.2.12 Default ...................................................................................................................... 106 5.5 Event Management ................................................................................................................... 107 VIII Users Manual 5.5.1 Video Detection ................................................................................................................. 107 5.5.1.1 Motion Detection ...................................................................................................... 107 5.5.1.2 Video Tamper ............................................................................................................ 110 5.5.1.3 Scene Changing........................................................................................................ 111 5.5.2 Smart Motion Detection ................................................................................................... 112 5.5.3 Audio Detection ................................................................................................................ 113 5.5.4 Smart Plan ......................................................................................................................... 114 5.5.5 IVS ...................................................................................................................................... 115 5.5.5.1 Tripwire ...................................................................................................................... 116 5.5.5.2 Intrusion .................................................................................................................... 119 5.5.5.3 Abandoned Object .................................................................................................... 120 5.5.5.4 Missing Object .......................................................................................................... 121 5.5.6 Construction Monitoring .................................................................................................. 122 5.5.7 Face Recognition .............................................................................................................. 127 5.5.7.1 Face Detection .......................................................................................................... 127 5.5.7.2 Face Database Config .............................................................................................. 128 5.5.7.2.1 Adding Face Database ..................................................................................... 128 5.5.7.2.2 Adding Face Images ........................................................................................ 129 5.5.7.2.3 Managing Face Images .................................................................................... 133 5.5.7.2.4 Face Modeling .................................................................................................. 134 5.5.7.3 Alarm Linkage ........................................................................................................... 135 5.5.8 People Counting ............................................................................................................... 136 5.5.8.1 People Counting Settings ........................................................................................ 136 5.5.8.2 Report ........................................................................................................................ 138 5.5.9 Heat Map ............................................................................................................................ 138 5.5.9.1 Heat Map Settings .................................................................................................... 138 5.5.9.2 Report ........................................................................................................................ 139 5.5.10 Video Metadata ................................................................................................................ 140 5.5.10.1 Scene Setting .......................................................................................................... 140 5.5.10.2 Picture Overlay ....................................................................................................... 142 5.5.10.3 Report ...................................................................................................................... 143 5.5.11 Alarm ................................................................................................................................ 144 5.5.12 Abnormality ..................................................................................................................... 144 5.5.12.1 SD Card .................................................................................................................... 145 5.5.12.2 Network Exception ................................................................................................. 146 5.5.12.3 Illegal Access .......................................................................................................... 147 5.5.12.4 Security Exception ................................................................................................. 147 5.5.12.5 Battery Exception ................................................................................................... 148 5.6 Storage ....................................................................................................................................... 149 IX Users Manual 5.6.1 Schedule ............................................................................................................................ 149 5.6.1.1 Record........................................................................................................................ 149 5.6.1.2 Snapshot ................................................................................................................... 150 5.6.1.3 Holiday Schedule ...................................................................................................... 151 5.6.2 Snapshot by Location ...................................................................................................... 152 5.6.3 Destination ........................................................................................................................ 153 5.6.3.1 Path ............................................................................................................................ 153 5.6.3.2 FTP ............................................................................................................................. 153 5.6.3.3 Local ........................................................................................................................... 154 5.6.3.4 NAS ............................................................................................................................ 155 5.6.4 Record Control .................................................................................................................. 156 5.7 System Management ................................................................................................................ 157 5.7.1 Device Settings ................................................................................................................. 157 5.7.1.1 General ...................................................................................................................... 157 5.7.1.2 Date & Time ............................................................................................................... 158 5.7.1.3 Screen Off Settings .................................................................................................. 159 5.7.2 Account Settings .............................................................................................................. 159 5.7.2.1 Account ..................................................................................................................... 159 5.7.2.1.1 Username .......................................................................................................... 159 5.7.2.1.2 Group Name ...................................................................................................... 163 5.7.2.2 ONVIF User ................................................................................................................ 165 5.7.3 Safety ................................................................................................................................. 165 5.7.3.1 RTSP Authentication ................................................................................................ 165 5.7.3.2 System Service ......................................................................................................... 166 5.7.3.3 HTTPS ........................................................................................................................ 168 5.7.3.4 Firewall ...................................................................................................................... 174 5.7.4 Peripheral .......................................................................................................................... 174 5.7.5 Default ................................................................................................................................ 175 5.7.6 Import/Export .................................................................................................................... 175 5.7.7 System Maintenance ........................................................................................................ 176 5.7.7.1 Auto Maintain ............................................................................................................ 176 5.7.7.2 Emergency Maintenance ......................................................................................... 177 5.7.8 Upgrade.............................................................................................................................. 177 5.8 Information................................................................................................................................. 178 5.8.1 Version ............................................................................................................................... 178 5.8.2 Log Information ................................................................................................................. 178 5.8.2.1 Log ............................................................................................................................. 178 5.8.2.2 Remote Log ............................................................................................................... 180 5.8.3 Online User ........................................................................................................................ 180 X 5.8.4 Life Statistics ..................................................................................................................... 180 5.8.5 Battery Status .................................................................................................................... 181 5.8.6 Legal Information .............................................................................................................. 181 6 Alarm .................................................................................................................................................. 183 7 Logout ................................................................................................................................................ 185 Appendix 1 Cybersecurity Recommendations ................................................................................. 186 Users Manual XI 1 Network Configuration Users Manual 1.1 Network Connection To view the web page on your PC, connect the Device to the PC first. There are mainly two connection modes between the Device and PC. The models presented in the figures are for reference only, and the actual product shall prevail. Figure 1-1 Direct connection by using a network cable Figure 1-2 Connection by using a switch or router All devices have the same IP address (192.168.1.108 by default) when they are delivered out of factory. To make the Device get access to network smoothly, plan available IP segment reasonably according to practical network environment. 1.2 Log in to the Web Page 1.2.1 Device Initialization For first-time use or after you have restored the Device to defaults, you need to initialize the Device by performing the following steps. Step 1 Open the browser, enter the IP address of the Device in the address bar, and then press the Enter key. 1 Step 2 Set the Country/Region, Language and Video Standard, and then click Save. Figure 1-3 Country/region setting Users Manual Step 3 Configure time parameters, and then click Next. Figure 1-4 Time zone setting Step 4 Set the password for admin account, and then click Save. 2 Figure 1-5 Device initialization Users Manual Table 1-1 Device initialization parameter description Parameter Username Description It is admin by default. Password The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special characters (excluding ' " ; : &). Set a high security password according to the prompt of password strength. Make sure that the new password is the same as the confirming password. Confirm Password Enter the confirming password that shall be the same as the password you entered. Set the email address which is used to reset password. Email Address Email address is enabled by default. You can disable the function as needed. Step 5 Select I have read and agree to all terms checkbox, and then click Next. 3 Figure 1-6 End-user license agreement Users Manual Step 6 Select P2P checkbox, and then click Next. Figure 1-7 P2P page Step 7 Scan the QR code on the page, download the app, and then finish configurations according to the instructions on your mobile device. After that, click Next. 4 Figure 1-8 Online upgrade Users Manual Step 8 Select Auto-check for updates checkbox. After the function is enabled, the Device will check for updates once a day automatically. There will be system notice if any update is available. Step 9 Click Next, and the login page is displayed. Figure 1-9 Login page 1.2.2 First-time Login You need to download and install the plug-in for the first-time login. Step 1 Open the browser, enter the IP address of the Device in the address bar, and then press Enter. Step 2 Enter the username and password, and then click Login. 5 Users Manual If you enter the wrong password for 5 times, the account will be locked for 5 minutes. After the locked time, you can log in to the web page again. You can set the number of allowed password attempts and locked time in Step 3 Download and install the plug-in according to the on-screen instruction after logging
"5.5.12.3 Illegal Access". in to the web page. Figure 1-10 Install the plug-in Step 4 After the plug-in is installed, the web page will be refreshed automatically, and the video is displayed on the Live page. Figure 1-11 Live page The Live page shown in the manual is for reference only, and functions might be different depending on the model. 1.2.3 Device Login Step 1 Open the browser, enter the IP address of the Device in the address bar, and then 6 press Enter. Figure 1-12 Device login Users Manual Step 2 Enter the username and password, and then click Login. The video is displayed on the Live page. If you enter the wrong password for 5 times, the account will be locked for 5 minutes. After the locked time, you can log in to the web page again. You can set the number of allowed password attempts and locked time. For details, see "5.5.12.3 Illegal Access". 1.2.4 Resetting Password If you forget the password of the admin user, you can set the password through the provided email address. Before resetting the password, you need to provide the email address in advance. For details, see "1.2.1 Device Initialization" or "5.7.3.2 System Service". Step 1 Open the browser, enter the IP address of the Device in the address bar, and then press Enter. 7 Figure 1-13 Login Users Manual Step 2 Click Forgot password?, and the Prompt page is displayed. Figure 1-14 Prompt Step 3 Click OK to reset the password. If you click OK, your email address, MAC address, device serial number, and other information might be collected. 8 Figure 1-15 Reset the password (1) Users Manual Step 4 Scan the QR code on the actual page according to the instructions, and then enter the security code received in the mailbox. Reset the password with the security code you received within 24 hours, otherwise the code will be invalid. Step 5 Click Next. Figure 1-16 Reset the password (2) Step 6 Set the password of the admin user again. The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special characters
(excluding ' " ; : &). Set a high security password according to the prompt of password strength. 9 Step 7 Click Save. Users Manual 10 2 Live Users Manual Click the Live tab, and the Live page is displayed. Figure 2-1 Live page Table 2-1 Function bars description No. Description Encoding setting Video window adjustment System menu Video window functions PTZ configuration PTZ status 1 2 3 4 5 6 2.1 Encoding Setting Click
, and then select the stream as needed. Some devices do not support two sub streams. Figure 2-2 Encoding setting 11 Users Manual Table 2-2 Description of encoding setting parameter Parameter Description Main Stream It has large bit stream value and image with high resolution, but requires large bandwidth. This option can be used for storage and monitoring. Sub Stream 1 Sub Stream 2 It has small bit stream value and smooth image, and requires little bandwidth. This option is normally used to replace main stream when bandwidth is not enough. Protocol Select a protocol for video monitoring. The supported protocols include TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and Multicast. 2.2 Video Window Adjustment This section introduces the adjustment of video window. Figure 2-3 Video window adjustment Table 2-3 Description of Video window adjustment parameter No. Parameter Description Image Adjustment Click this button, and the Image Adjustment interface is displayed on the right side of the Live interface. You can adjust parameters such as brightness, contrast, hue, and saturation on the interface. Original Size Adjust the video image to original size. Full Screen W:H Fluency Rules Info PTZ Face Click this button, and the video is displayed in full screen. To exit full screen, double-click the screen or press the Esc key. Adjust the video image to original ratio or a proper window. Click this button, and you can select Realtime, General, or Fluent. General is selected by default. Click this button, and smart rules are displayed on the Live interface after the function is enabled. The function is enabled by default. Click this button, and PTZ configurations are displayed on the Live interface after the function is enabled. Click this button, and images are displayed on the screen. See Figure 2-8. 1 2 3 4 5 6 7 8 12 Users Manual No. Parameter Description 9 Video Metadata 10 Anti-aliasing 11 Panorama Click this button, and information about motor vehicles, non-motor vehicles, and people is displayed on the screen in real time. See Figure 2-11. Click this button to enable anti-aliasing, and then aliasing can be avoided when video windows are small. Click this button, and a panorama window is displayed on the Live interface. You can perform operations such as positioning, calling presets, and setting tours. Image Adjustment This section introduces the adjustment of image. Figure 2-4 Image adjustment Table 2-4 Image adjustment parameter description Parameter Description Adjust the image brightness. Adjust the image contrast. Adjust the image hue. Adjust the image saturation. Restore brightness, contrast, saturation and hue to default values. Only brightness, contrast, hue, and saturation of live view image on the web interface can be adjusted with this function. To adjust the brightness, contrast, hue, and saturation of the Device, you can go to Setting > Camera > Conditions. 13 Panorama Figure 2-5 Panorama interface Users Manual You can perform positioning in this window by drawing a box with the left mouse button. The located area is displayed on the Live interface and enlarged. After you click Refresh, the Device rotates from 0 to 360 degrees horizontally and from 6 to 65 degrees vertically to obtain a new panoramic image. You can adjust the size of the panoramic image by dragging the screen ratio bar
. You can click to call a corresponding preset on the right side of the window. For how to set a preset, see "5.4.2.1 Preset". Figure 2-6 Preset You can click to call a corresponding tour on the right side of the window. For how to set a tour, see "5.4.2.2 Tour". Figure 2-7 Tour Face Face recognition result is displayed on the left side, and the captured face image and attributes are displayed on the right side. 14 Figure 2-8 Face Users Manual Face recognition result display area: Displays the captured small face images, the corresponding face images in the database, and the similarities between them. After you click the image the attributes and details are displayed. Figure 2-9 Face recognition result display Face and attributes display area: Displays the captured small face pictures and information such as gender, age, and expression. After you click the picture, the details are displayed. 15 Figure 2-10 Face and attributes display Users Manual Video Metadata Motor vehicle information is displayed on the right side, and the information about human and non-motor vehicles is at the bottom of the interface. For details, see "5.5.10 Video Metadata". Figure 2-11 Video metadata 2.3 System Menu To access a page, click the corresponding tab on the system menu. Figure 2-12 System menu 2.4 Video Window Functions This section introduces the function of video window. 16 Figure 2-13 Video window function buttons Users Manual Table 2-5 Description of video window function button No. Parameter Description 1 Wiper Control Stop: Click this button, and the wiper is turned off and Click this button to select wiper operation. Start: Click this button, and the wiper starts and waves continuously. stops waving. Once: Click this button, and the wiper starts and waves from left to right for one time. Click this button, right-click on the Live interface, and the function menu is displayed. See Figure 2-14. You can add information on the Live interface, and also manage added comments. Add info: Select Add Info from the pop-up menu, and enter the comment. For the interface, see Figure 2-15. Manage comments: Select Info Management from the pop-up menu to display, hide, or delete added comments. For the interface, see Figure 2-16. Click the button, draw a box with the mouse on the live view, and then the Device will automatically focus on the area in the box. Click the button, and an alarm will be triggered. When an alarm is triggered, the icon turns red; and when an alarm is canceled, the icon turns grey. Click the button, and you can drag the live view by pressing and holding the left mouse button to control PTZ;
and you can also zoom in or out through the mouse wheel. Click the button, and then select an area in the live view to zoom in; right-click on the image to restore to the original status. In enlarged status, drag the image to check other area. Click the button, and then scroll the mouse wheel in the live view to zoom in or out. Click the button to capture one image of the current image, and it will be saved to the live snapshot storage path set in
"5.1.2.5 Path."
17 2 Mark 3 4 5 Regional Focus Relay-out Gesture Control 6 Digital Zoom 7 Snapshot No. Parameter Description 8 9 Triple Snapshot Record 10 Manual Track 11 Audio Users Manual Click the button, and three images of the current image are captured with one snapshot per second. These snapshots will be saved to the live snapshot storage path set in
"5.1.2.5 Path."
Click the button to record videos. The recording will be saved to the live recording storage path set in "5.1.2.5 Path."
Click the button and select any area by dragging the left mouse button in the video window; the Device tracks objects in this area intelligently. Click the button to enable or disable audio output of the monitoring stream. Before using the function, you need to enable the audio of the corresponding stream in Setting > Camera > Audio first. 12 Talk Click the button to enable or disable the two-way audio. Figure 2-14 Markmenu 18 Figure 2-15 Markadd comments Users Manual Figure 2-16 Markmanage comments 2.5 PTZ Configuration You can control PTZ by using the PTZ Control panel or joystick. You can also set preset, scanning, and other functions in the PTZ Function area. PTZ Control Before using the PTZ Control panel, you need to set the PTZ protocol by selecting Setting >
PTZ > Protocol. 19 Figure 2-17 PTZ control Users Manual Table 2-6 Description of PTZ control parameter No. Parameter Description 1 2 3 4 Direction Buttons There are 8 directions: Up, down, left, right, upper left, upper right, lower left, and lower right. Position Speed Provides quick positioning function. Draw a box in the live view with the mouse, and then the PTZ rotates to and focuses on the selected area rapidly. The changing speed of PTZ direction. The higher the value, the faster the speed. Zoom/Focus/Iris Click to increase the value, and click to decrease the value. Joystick You can drag the middle button to simulate joystick operations to control device rotation. Speed, zoom, focus, and iris configurations are the same as that of PTZ Control panel. 20 Figure 2-18 Joystick Users Manual PTZ Functions The PTZ supports multiple functions. Select a function, click or to start using the function, and then click to stop using the function. Figure 2-19 PTZ functions Table 2-7 Description of PTZ function Parameter Description Scan Preset Tour Pattern Select Scan from the list, enter a scan number, and then click Start. The PTZ starts scanning, and the default number is 1. Select Preset from the list, enter a preset number, and then click Go to. The PTZ will rotate to the preset position. Select Tour from the list, enter a tour number, and then click Start. The PTZ starts to tour. Select Pattern from the list, enter a pattern number, and then click Start. The PTZ starts to pattern. 21 Users Manual Parameter Description Assistant Reserved for special requirements. If necessary, enable this function under the guidance of professionals. Pan Select Pan from the list, and then click Start. The PTZ starts to pan. Select Go to from the list, enter horizontal angle value, vertical angle value and zoom, and then click Go to. The Device will turn to the position you want. One unit of the horizontal angle value or vertical angle value you enter equals 0.1 degree. Go to Menu Figure 2-20 Menu page Table 2-8 Description of menu parameter Parameter Description Direction Buttons Click the up and down buttons to select parameters, and click the left and right buttons to select parameter values. OK Open Confirmation button. Open the OSD menu. Close Close the OSD menu. Click Open to open the OSD menu. The OSD menu is displayed on the live view. Figure 2-21 OSD menu You can finish the following settings through the menu. Camera settings: For details, see "5.1 Camera". 22 PTZ settings: For details, see "5.4 PTZ Settings". System management: For details, see "5.7 System Management". Users Manual 2.6 PTZ Status On the Live page, the PTZ status is displayed at the lower right corner. The function is available on select models. Figure 2-22 PTZ status When the PTZ lifespan is close to the threshold, a warning will be displayed on the Live page. Figure 2-23 Warning (1) Figure 2-24 Warning (2) 23 3 AI Live Users Manual You can check the information of the detected human faces, human bodies, motor vehicles, and non-motor vehicles. This function is available on select models. 3.1 AI Live Page Log in and click the AI Live tab. Page might vary with different models. Figure 3-1 AI live page Table 3-1 Description of AI live page No. Function Live view 1 2 3 4 Snapshot display area Information display area of detected targets Statistics area of the detected targets 3.1.1 Information Display Area of Detected Targets This area displays the information of the captured targets in real time. 24 Figure 3-2 Information display of the detected targets Users Manual 3.1.2 Snapshot Display Area This area displays the snapshots of the detected targets. Click any snapshot to view the information of the detected target in information display area. Figure 3-3 Snapshot display area 3.1.3 Statistics Area of the Detected Targets This area displays the number of the captured target in real time. 25 Figure 3-4 Statistics area of the detected targets Users Manual Table 3-2 Statistics area description of the detected targets Icon Detected Target Description Face Human Available detection items: Gender, age, expression, glasses, mouth mask, and beard. Available detection items: Top, bottom, top color, bottom color, bag, hat, and umbrella. Non-motor vehicle Available detection items: Vehicle type, vehicle body color, top, top color, occupancy, and hat. Motor vehicle Available detection items: License plate, vehicle body color, vehicle type, vehicle logo, vehicle series, sunshield, seatbelt, smoking, calling, ornament, and annual inspection mark. Up to 7 items can be selected at the same time for motor vehicle detection. Settings Click the button to select the detection items. 3.2 AI Live Settings Prerequisites Select Setting > Event > Smart Plan, and then enable Face Detection, Face Recognition or Video Metadata. For the method to enable the function, see "5.5.4 Smart Plan". For the operations, see "5.5.7 Face Recognition" or "5.5.10 Video Metadata". Procedure Step 1 Click the AI Live tab. The information display area of detected targets is on the right side; the snapshot display area is on the bottom; the statistics area of the detected targets is on the 26 lower right corner. Figure 3-5 AI live page Users Manual Step 2 Click to set the detection items of the targets. Figure 3-6 Detection items selection page Step 3 Click to complete the configuration. 27 4 Playback Users Manual You can view the saved images and videos on the Playback page Before using the function, you need to set the period, storage method, and record control of recording and snapshot first. For details, see "5.6 Storage". Click the Playback tab, and the Playback page is displayed. Figure 4-1 Playback page 4.1 Video Playback Select dav from the File Type list, and the video playback interface is displayed. Figure 4-2 Video playback Table 4-1 Description of video playback parameter No. Description 1 2 3 Video playing function bar Progress bar Recording types 28 4 5 6 7 1 2 3 4 5 6 7 8 Users Manual No. Description Auxiliary functions Video playback file search and display area Video clipping area Progress bar time formats 4.1.1 Video Play Function Bar This section introduces the function of video play function bar. Figure 4-3 Video playing function bar Table 4-2 Description of video play function bar No. Parameter Description Next Frame You need to pause the playback before playing the next frame. Play Stop Slow Fast Sound Volume Play the video. Stop playing the video. Play the next frame. Slow down video playing. Speed up video playing. Mute or unmute the sound. Adjust the volume. Rules Info Click this button, and smart rules will be displayed on the video playback interface if the smart rules are enabled. 4.1.2 Recording Type Select a recording type, and then only files of the selected types will be displayed in the progress bar and file list. Figure 4-4 Recording type 4.1.3 Auxiliary Functions This section introduces auxiliary function. 29 Figure 4-5 Auxiliary functions Users Manual Table 4-3 Description of auxiliary functions parameter No. Parameter Description 1 Digital Zoom 2 Snapshot Click the button, and then select an area in the live view to zoom in; right-click on the image to restore to the original status. In zoomed-in status, drag the image to check other areas. Click the button, and then scroll the mouse wheel in the live view to zoom in or out. Click the button, and then you can take snapshots of the video in playback, and save them in the playback snapshot path set in "5.1.2.5 Path". 4.1.4 Video Playback File Search and Display Area This section introduces the operation of searching video playback file. There are videos and snapshots on days with blue shading. Figure 4-6 Playback file (1) Table 4-4 Description of playback file parameter (1) Parameter Description File Type Data Src To play back a recording, select dav. To play back a image, select jpg. The SD Card is used by default. 30 Users Manual Parameter Description Click this button, and recordings or images of a certain type on specific dates can be downloaded in batches. The function is available on select models. File list. Click this button, and the recording files on the selected day will be displayed in the list. 4.1.4.1 Downloading Files in Batches Step 1 Click
. The Batch Download interface is displayed. Figure 4-7 Batch download Step 2 Configure batch download parameters. Table 4-5 Description of batch download parameter Parameter Description Type Start Time/End Time Select the event type that triggers video recording. All Videos, General, Event, Alarm, Manual, and Snapshot are selectable. It is All Videos by default. Select the start time and end time for video searching. File Type Select the video type. dav and mp4 are selectable. It is dav by default. Path Click Browse, and set the saving path for video files. The default path is C:\Users\admin\WebDownload\PlaybackRecord. Step 3 Click Search to search for the video files that meets the requirements. Step 4 Select the video, and then click Download. The video files are downloaded and saved in the saving path. 31 Users Manual You can select multiple files to download them. 4.1.4.2 Displaying File List Step 1 Click a day with blue shading, and recording file progress bar with different colors is displayed on the time axis. Green: Represents general videos. Yellow: Represents motion detection videos. Red: Represents alarm videos. Blue: Represents manually recorded videos. Figure 4-8 Progress bar Step 2 Click anywhere on the progress bar, and the video will be played from that time. Step 3 Click
, and videos recorded on the selected day will be displayed in a list. To play back a file in the list, double-click the file. Figure 4-9 Playback file (2) Table 4-6 Description of playback file parameter (2) Parameter Description Search all the recorded files from the start time to the end time on the selected date. Download Format There are two options: dav and mp4. 32 Users Manual Parameter Description Click the download button, and the files will be saved to the storage path set in "5.1.2.5 Path". Downloading and playing video at the same time is not supported. Click the button to go back to the calendar interface. 4.1.5 Video Clipping Area You can clip the videos in this area. Figure 4-10 Video clipping Step 1 Click the time axis to select the start time for video clipping. The time must be within the progress bar range. Step 2 Hover over
, and then Select start time is displayed. Step 3 Click to set the start time for video clipping. Step 4 Click the time axis to select the end time for video clipping. The time must be within the progress bar range. Step 5 Hover over
, and then Select end time is displayed. Step 6 Click to set the end time for video clipping. Step 7 Click
, and the clipped video will be saved in the path set in "5.1.2.5 Path". 4.1.6 Progress Bar Time Formats This section introduces the time format of progress bar. Figure 4-11 Progress bar time formats Table 4-7 Description of progress bar time format Parameter Description Click the button, and then the progress bar displays the recordings in 24-hour mode. Click the button, and then the video within the selected 2-hour period is displayed. Click the button, and then the video within the selected 1-hour period is displayed. Click the button, and then the video within the selected 30-minute period is displayed. 33 4.2 Image Playback This section introduces the operations of image playback. Select jpg from the File Type list. Figure 4-12 Image playback Users Manual Table 4-8 Description of image playback parameter No. Description Image playing functions Snapshot types 1 2 3 Image playback file search and display area 4.2.1 Image Playing Functions This section introduces the function of image playing. Figure 4-13 Image playing buttons The status button is displayed as by default, indicating the image play is paused or no image is being played. To play the image, click
, and the button is switched to
. To pause the image play, click
. 4.2.2 Image Playback File Search and Display Area This section introduces the operation of searching video playback file. There are videos and snapshots on days with blue shading.. 34 Figure 4-14 Playback file (1) Users Manual Table 4-9 Description of playback file parameter Parameter Description File Type Data Src Select jpg from the File Type list, and the image will be played in jpg.. The SD Card is selected by default. File list. Click this button, and the recording files on the selected day will be displayed in the list. 35 Figure 4-15 Playback file (2) Users Manual Step 1 Click
, and the snapshots on a selected day will be displayed in a list. Step 2 To play back a snapshot, double-click the corresponding file. Table 4-10 Description of playback file parameter Parameter Description Search all the snapshots from the start time to the end time on the selected date. Click the button to download the snapshot to local storage. Click the button to go back to the calendar page. 4.2.3 Snapshot Types After you select a snapshot type, only the files of the selected type are displayed in the file list. Figure 4-16 Snapshot types 36 5 Setting Users Manual 5.1 Camera 5.1.1 Conditions Settings 5.1.1.1 Conditions 5.1.1.1.1 Picture This section describes how to set camera attributes and manage profiles. You can set camera attributes and picture parameters to achieve the best display effect. Step 1 Select Setting > Camera > Conditions > Conditions > Picture. Figure 5-1 Picture interface Step 2 Configure image setting parameter. Table 5-1 Description of image setting parameter Parameter Description Profile Style There are three options: General, Day, and Night. You can view the configurations and the effect of the selected mode. Day is selected by default. Set the image display style. There are three options: Soft, Standard, and Vivid. Standard is selected by default. Brightness Set the overall image brightness. The larger the value is, the brighter the image will be. The value ranges from 0 to 100. 37 Parameter Description Users Manual Contrast Saturation Chroma CNT Sharpness Sharpness CNT Gamma Flip EIS Set the image contrast. The larger the value is, the greater the contrast will be. The value ranges from 0 to 100. Set the intensity of colors. The larger the value is, the brighter the colors will be. The value ranges from 0 to 100. The larger the value, the higher suppression on image colors. The value ranges from 0 to 100. This parameter takes effect only when the Device is in the environment with low luminance. Set the sharpness of picture edges. The larger the value is, the more obvious the edge will be. The value ranges from 0 to 100. If the value is too large, there might be image noise. Set the value according to the actual condition. The larger the value is , the stronger the sharpness CNT will be. The value ranges from 0 to 100. This parameter takes effect only when the Device is in the environment with low luminance. Change image brightness through non-linear tuning to expand the dynamic display range of images. The larger the value is, the brighter the image will be. The value ranges from 0 to 100. Monitoring videos can be flipped over. There are two options. 0: The monitoring video is normally displayed. It is 0 by default. 180: The monitoring video is flipped over. Electronic image stabilization (EIS) is used to effectively solve the problem of image shaking during use, thus presenting clearer images. It is Off by default. This function is available on select models. This parameter takes effect only when the Device is in the environment with low luminance. Optical image stabilization and electronic image stabilization cannot be enabled at the same time. After you select On, the image at the called preset is displayed directly if you call a preset or tour, and no images during the rotation of the Device are displayed. Picture Freeze Step 3 Click Save. 5.1.1.1.2 Exposure You can control the amount of light per unit area reaching the electronic image sensor by adjusting parameters on the Exposure interface. Step 1 Select Setting > Camera > Conditions > Conditions > Exposure. 38 Figure 5-2 Exposureauto mode Users Manual Figure 5-3 Exposureaperture priority mode 39 Figure 5-4 Exposureshutter priority mode Users Manual Figure 5-5 Exposuregain priority mode 40 Figure 5-6 Exposuremanual mode Users Manual Step 2 Configure exposure setting parameter. Table 5-2 Description of exposure setting parameter Parameter Description Anti-flicker 60Hz: When the alternating current is 60Hz, the exposure is You can select 50Hz, 60Hz, or Outdoor from the list. 50Hz: When the alternating current is 50Hz, the exposure is automatically adjusted to make sure that there are no stripes on images. automatically adjusted to make sure that there are no stripes on images. Outdoor: You can switch the modes to achieve the effect you want. 41 Parameter Description Users Manual Set the exposure modes. You can select Auto, Manual, Aperture Priority, Shutter Priority, or Gain Priority. The Auto mode is selected by default. Auto: Exposure is automatically adjusted according to scene brightness if the overall brightness of images is in the normal exposure range. Manual: You can adjust the Gain, Shutter, and Iris value manually. Aperture Priority: You can set the iris to a fixed value, and the Device adjusts shutter value then. If the image brightness is not enough and the shutter value has reached upper or lower limit, the system adjusts gain value automatically to ensure the image is at ideal brightness. Shutter Priority: You can customize the shutter range. The Device automatically adjusts the aperture and gain according to the scene brightness. Gain Priority: Gain value and exposure compensation value can be adjusted manually. You can set the exposure gain. The value ranges from 0 to 100. You can adjust the exposure time of the Device. The larger the shutter value, the brighter the image. You can set the Device luminous flux. The larger the iris value, the brighter the image. Automatic exposure is an automated digital camera system that adjusts the aperture and shutter speed, based on the external lighting conditions for images and videos. If you have selected an AE Recovery time, the exposure mode will be restored to the previous mode after you adjust the iris value. There are five options:
Off, 5Min, 15Min, 1Hour, and 2Hour. 2D noise reduction is the process of removing noise from a signal. The higher the grade is, the less the noise will be, and images appear to be blurrier. 3D noise reduction is the process of removing noise from a signal. The higher the grade is, the less the noise will be, and images appear to be blurrier. Noise reduction grade. The value ranges from 0 to 100. The larger the value is, the less the noise will be. Realize noise suppression effect through 3D and 2D video filtering method. Mode Gain Shutter Iris 2D NR 3D NR Grade AE Recovery Exposure Comp You can set the exposure compensation value. The value ranges from 0 to 100. Advanced NR Step 3 Click Save. The function is available on select models. 42 Users Manual 5.1.1.1.3 Backlight The backlight function cannot be configured if defog function is enabled. There will be a prompt on the interface. You can use this function to adjust the backlight compensation mode of the monitoring screen. Step 1 Select Setting > Camera > Conditions > Conditions > Backlight. Figure 5-7 Backlight settings Step 2 Select a backlight mode from the list. There are 4 options: Off, BLC, HLC, and WDR. Off: Backlight is disabled. BLC: Backlight compensation corrects regions with extremely high or low levels of light to maintain a normal and usable level of light for the object in focus. HLC: Highlight compensation dims strong light, so that the Device can capture details of faces and license plates in extreme light conditions. It is applicable to the entrance and exit of toll stations or parking lots. WDR: When in WDR (Wide Dynamic Range) mode, the Device constrains over bright areas and compensates dark areas to improve the image clarity. Step 3 Click Save. 5.1.1.1.4 WB If you select Off, other backlight mode configurations will not be effective. In this mode, you can make a white object displaying itself clearly on the video image in all environments. Step 1 Select Setting > Camera > Conditions > Conditions > WB. 43 Figure 5-8 WB settings Users Manual Step 2 Select WB mode from the list. You can select from Auto, Indoor, Outdoor, ATW, Manual, Sodium Lamp, Natural, and Street Lamp. Auto is selected by default. Step 3 Click Save. 5.1.1.1.5 Day & Night This function allows you to switch between the color mode and the black & white mode, ensuring clear monitoring screen in a dim environment. Defog function cannot be configured if Day & Night function is enabled. There will be a prompt on the interface. Step 1 Select Setting > Camera > Conditions > Conditions > Day & Night. 44 Figure 5-9 Day & night settings Users Manual Step 2 Configure day & night parameter. Table 5-3 Description of day & night parameter Parameter Description Type Mode There are two options: Electrical and ICR. ICR is selected by default. Electrical Image processing method is used for day & night switch. ICR: IR filter is used for day & night switch. Select a mode from the list (Your selection is independent from the profile). Auto is selected by default. Color: The Device only outputs color images. Auto: The Device outputs color images or black-and-white images according to ambient conditions. B/W: The Device only outputs black-and-white images. Adjust the sensitivity to switch between different modes. There are three options: Low, Middle, and High. Sensitivity Delay You can set sensitivity only when Day & Night mode is set to Auto. Adjust the delay time to switch between different modes. The value ranges from 2 s to 10 s. You can set Delay only when Day & Night mode is set to Auto. Step 3 Click Save. 5.1.1.1.6 Focus & Zoom Digital zoom refers to capturing a part of the image to magnify it. The higher the magnification is, the blurrier the images will become. Step 1 Select Setting > Camera > Conditions > Conditions > Focus & Zoom. 45 Figure 5-10 Focus & zoom settings Users Manual Step 2 Configure focus & zoom parameter. Table 5-4 Description of focus & zoom parameter Parameter Description Digital Zoom Select On or Off to enable or disable digital zoom. Off is selected by default. Zoom Speed The larger the value is, the faster the Device zooms. Mode ICR switch is detected. Select the focus triggering mode. There are three options: Semi Auto, Auto, and Manual. Semi Auto is selected by default. Semi Auto: The Device focuses automatically when zoom or Auto: The Device focuses automatically when scene changes, zoom, or ICR switch are detected. Manual: The Device cannot focus automatically. You need to adjust the focus manually. You can select the shortest focus distance, which means the Device will focus on objects farther than the shortest focus distance. If you select Auto, the Device will select an appropriate shortest distance according to the zoom value. Sensitivity is the capacity of resisting interference of the Device when focusing. The smaller the value is, the more capable the Device can resist interference when focusing. If you enable this function, the image is relatively clear during zoom. If you disable this function, the speed is relatively high during zoom. Click this button, and the lens will be initialized automatically. The lens will be extended to calibrate the zoom and focus. Focus Limit Sensitivity PFA Lens Initialization Step 3 Click Save. 46 5.1.1.1.7 Illuminator This configuration is available only when the device is equipped with illuminators. Common illuminators are classified into IR lights, white lights, laser lights, and full-spectrum lights. Different device models support different types of illuminators. Users Manual This section is for reference only, and might differ from the actual interface. IR Light/White Light These are the conditions for using IR light and white light. When the day & night mode is set to B/W, the monitoring screen is black and white. In this When the day & night mode is set to Color, the monitoring screen is colored. In this case, case, IR light is used. white light is used. When the day & night mode is set to Auto, the monitoring screen color changes with the ambient light condition, and the illuminator varies with the monitoring screen. In B/W mode, the IR light is turned on; in Color mode, the white light is turned on. Full-spectrum IR light supports the infrared IR light and white-light IR light at the same time. Some models are equipped with photoresistor that can turn on different types of illuminators based on the ambient brightness. Step 1 Select Setting > Camera > Conditions > Conditions > Illuminator. Figure 5-11 Illuminator settings Step 2 Configure illuminator parameters. 47 Table 5-5 Description of illuminator parameters Parameter Description IR Mode White Mode Users Manual When the device is equipped with illuminators, you can configure the fill light mode, including IR mode, white light and smart illumination. IR Mode: Enable the IR light, and then the white light is disabled. You can only capture black and white images after enabling this function. The IR light is turned off for cameras with low power consumption by default. Turn on the IR light if necessary. White Mode: Enable the white light, and the IR light is disabled. You can capture clear scene image after enabling this function. Smart Illumination: This function is mainly used at night. Smart illumination applies IR mode in most situations. When an event occurs (for example, motion detection and human detection), the camera automatically switches to white light mode to link image capturing and video recording under the full color mode. The white light turns off when the event stops, and then the mode switches to IR mode according to the ambient brightness. The status of the illuminator mainly depends on time and environment. If the smart illumination is triggered at night and the event continues during the day, the illuminator configured for the daytime will be turned off. Adjust the brightness of illuminator manually, and then the system will supply illumination to the image accordingly. This function is available on select models. Enable different light types in different time periods according to actual condition. You can set four periods with different light types. This function is available on select models. 48 Fill Light Smart Illumination Mode Manual Timing Parameter Description Auto Smart IR Zoom Priority Users Manual The system adjusts the illuminator intensity according to the ambient lighting condition. Some devices support setting the brightness upper limit and sensitivity of the illuminator. Sensitivity: The higher the sensitivity setting, the higher the brightness can turn on the illuminator when the actual scene darkens. When the actual scene becomes bright, a higher brightness is required to turn off the illuminator. Brightness upper limit: If the filling light is too bright, the center of the image might be overexposed, and the actual image cannot be seen clearly. It is suggested to adjust the brightness upper limit according to the actual scene. The value range is 0-100, and the default is 100. The system adjusts the illuminator intensity according to the ambient lighting condition. Only infrared IR light supports the Smart IR mode. The system adjusts the illuminator intensity automatically according to the change of the ambient light. You can configure light compensation manually to fine-tune the brightness of the illuminator. When the ambient light turns darker, the system turns on the near light first, if the brightness is still not enough, then it turns on the far light. When the ambient light turns brighter, the system dims far light until they are off, and then the near light. When the focus reaches certain wide angle, the system will not turn on far light in order to avoid over-exposure in short distance. In ZoomPrio mode, IR light and white light are supported, and IR light is selected by default. Illuminator is off. You can select IR Light or White Light. Compensate for the brightness of the IR light. The value ranges from 0 to 100. Set the brightness of the short-range light. The value ranges from 0 to 100. Set the brightness of the long-range light. The value ranges from 0 to 100. 49 Off Light Type Correction Near Light Far Light Step 3 Click Save. Laser Light Laser light makes compensation for the ambient environment when it is used for long-distance monitoring. Step 1 Select Setting > Camera > Conditions > Conditions > IR Light. Figure 5-12 Laser light settings Users Manual Step 2 Configure laser light setting parameter. Table 5-6 Description of laser light setting parameter Parameter Description Mode Select the laser light mode from ZoomPrio and Manual. It is ZoomPrio by default. ZoomPrio: The Device can automatically adjust laser light brightness according to the zoom times. Manual: Manually set laser light brightness and angle value. Laser Intensity Set the intensity of the laser light. The value ranges from 0 to 100. Laser Angle Set the angle value from 0 to 100. Step 3 Click Save. 5.1.1.1.8 Defog The defog function cannot be configured if backlight function is enabled. There will be a prompt on the interface. Image quality drops if the Device is installed in foggy or hazy environment. You can enable defog to improve image quality. Step 1 Select Setting > Camera > Conditions > Conditions > Defog. 50 Figure 5-13 Defog settingsmanual Users Manual Figure 5-14 Defog settingsauto Step 2 Configure defog parameter. Table 5-7 Description of defog parameter Parameter Description Mode Select the defog mode of the Device. You can select Auto, Manual, or Off. It is Off by default. For the Device that supports optical defog, in Auto mode, optical defog and electronic defog switch automatically according to the algorithm. And in Off mode, electronic defog is enabled by default. 51 Users Manual Parameter Description Intensity Set the defog intensity of the Device. You can select from Low, Medium, or High. In Manual mode, if you enable this function, both optical defog and electronic defog are enabled. (You need to enable Auto mode for Day &
Night to use the function.) Only the Device that supports optical defog has this parameter. Defog Enhancement Step 3 Click Save. 5.1.1.2 Profile Management Step 1 Select Setting > Camera > Conditions > Profile Management. Step 2 Select the profile management mode. There are three options: General, Full Time and Schedule. If you select General, monitoring is based on the general configuration of the Device. Figure 5-15 Profile managementgeneral If you select Full Time, Day and Night are selectable, and the corresponding camera property profile is day or night. Figure 5-16 Profile managementfull time If you select Schedule, you can select one period for day configuration and another period for night configuration. For example, you can set the day-time configuration from 6:00 to 18:00, and set the night-time configuration from 18:00 to 6:00 on the next day. 52 Figure 5-17 Profile managementschedule Users Manual Step 3 Click Save. 5.1.2 Video 5.1.2.1 Video Stream You can set the video stream, snapshot stream, video overlay, ROI, and storage path of the Device. This section describes how to set the video stream for the monitoring screen. Step 1 Select Setting > Camera > Video > Video. Figure 5-18 Video stream settings The stream configuration interfaces might vary depending on devices, and the actual interface shall prevail. The default bit rate of different devices might vary, and the actual product shall prevail. Step 2 Configure video stream parameter. Table 5-8 Description of video stream parameters Parameter Description Enable You can select the check box to enable sub stream. The sub stream is enabled by default. Encode Mode You can select H.264, H.264H, H.264B, H.265, MJPEG, MPEG4, or SVAC. 53 Users Manual Parameter Description Smart Codec Enable Smart Codec to improve video compressibility and save storage space. After Smart Codec is enabled, the Device does not support the third stream, ROI, smart event, and other functions. The actual interface shall prevail. Resolution Multiple resolution types are available for you to choose, and each type corresponds to a unique recommended stream value. Frame Rate
(FPS) PAL: 125 frames/s or 150 frames/s. The frame rate changes with the resolution. There are two options: CBR (constant bit rate) and VBR (variable bit rate). Image quality can be set only in VBR mode, and cannot be set in Bit Rate Type CBR mode. In MJPEG encode mode, CBR is the only option for Bit Rate Type. Reference Bit Rate The recommended bit rate range is based on the resolution and frame rate. Bit Rate It is the upper limit of stream in VBR. In CBR, the value is fixed. I Frame Interval The number of P frames between two I frames. The range varies with the frame rate, and the maximum value is 150. It is recommended to set the interval twice the frame rate. SVC Watermark Settings Layered encoding can be done for FPS. SVC is a scalable encoding method on time domain. It is 1 by default, which means no layered coding. You can set 2, 3 or 4 layered encoding. You can verify the watermark to check if the video has been tampered. You can verify the watermark to check if the video has been tampered. Select Watermark Settings check box to enable Watermark Character. The watermark character is DigitalCCTV by default, and you can modify it. Watermark Character Watermark character consists of up to 128 characters from letters, standard symbols, spaces, and special characters. Step 3 Click Save. 5.1.2.2 Snapshot This section describes how to set streams for snapshots. Step 1 Select Setting > Camera > Video > Snapshot. 54 Figure 5-19 Snapshot stream settings Users Manual Step 2 Configure snapshot stream parameter. Table 5-9 Description of snapshot stream parameters Parameter Description You can select General or Event. General refers to capturing images within the time range set in the schedule. For details, see "5.6.1 Schedule". Event means capturing images when motion detection, video tampering, or local alarms are triggered. For how to enable snapshots for motion detection, video tampering, or local alarms, see "5.5 Event Management". It is the same as the resolution of the selected snapshot main stream, and cannot be modified on this page. You can set the snapshot quality from 1 to 6 levels. Level 1 is the lowest level, and level 6 is the highest level. Set the snapshot frequency. You can select from 1 s through 7 s or Customized. Snapshot Type Image Size Quality Interval Step 3 Click Save. 5.1.2.3 Overlay 5.1.2.3.1 Privacy Masking Configure overlay information, and it will be displayed on the Live page. You can enable this function when you need to protect privacy of some areas on the video image. Procedure Step 1 Select Setting > Camera > Video > Overlay > Privacy Masking. 55 Figure 5-20 Privacy masking Users Manual Step 2 Select Enable. Step 3 Click Add, select the masking type and color, set the shielding ratio, and then draw blocks on the image. You can select the masking type from Color Lump and Mosaic. When selecting Color Lump only, you can draw triangles and convex quadrilaterals as blocks. You can drag 8 blocks at most. When selecting Mosaic, you can draw rectangles as blocks with mosaic. You can draw 4 blocks at most. When selecting both Color Lump and Mosaic, you can draw 8 blocks at most. Related Operations View and edit the block. Select the privacy masking rule to be edited in the list, then the rule is highlighted, and the block frame is displayed in the image. You can edit the selected block as needed, including moving the position, and adjusting the size. Edit the block name. Double-click the block name to edit it. Delete the block. Click to delete blocks one by one. Click Clear to delete all blocks. 5.1.2.3.2 Channel Title You can enable this function when you need to display channel title in the video image. Step 1 Select Setting > Camera > Video > Overlay > Channel Title. 56 Figure 5-21 Channel title Users Manual Step 2 Select the Enable checkbox, enter the channel title, and then select the text alignment. Click to expand the channel title, and you can expand 1 line at most. Step 3 Move the title box to the position that you want in the image. Step 4 Click Save. 5.1.2.3.3 Time Title You can enable this function when you need to display time in the video image. Step 1 Select Setting > Camera > Video > Overlay > Time Title. Figure 5-22 Time title Step 2 Select the Enable checkbox. Step 3 Select the Week Display checkbox. Step 4 Move the time box to the position that you want in the image. Step 5 Click Save. 57 5.1.2.3.4 OSD Info You can enable this function if you want to display preset title, temperature, PTZ life warning, coordinates, zoom, north direction, pattern, RS-485, battery information, and other information on the video image. Step 1 Select Setting > Camera > Video > Overlay > OSD Info. Figure 5-23 OSD info Users Manual Step 2 Configure OSD information. Table 5-10 Description of OSD information Parameter Description Select Enable, and the preset name is displayed on the image when the camera turns to the preset, and it will disappear 3 s later. Preset For some devices, you can set the duration of the preset title displaying on the screen. You can select from Disable, 5s, 15s, Display Permanently, and Custom. Temperature Select Enable, and the internal temperature of the current device is displayed. PTZ Life Warning When the PTZ lifespan is close to the threshold, a warning will be displayed on the video image. This OSD info is enabled by default. Coordinates Select Enable, and the PTZ coordinates information is displayed on the image. Zoom North Pattern Select Enable, and the zoom information is displayed on the image. For example, means 12x zoom rate. Select Enable, and the north direction is displayed on the image. Select Enable, and the pattern information is displayed on the image. 58 Users Manual Parameter Description RS485 Battery Info Text Overlay Input Text Text Align Select Enable, and the RS-485 communication information is displayed on the image. Select Enable, and the battery level is displayed on the image. Select Enable and enter text, and the text is displayed on the image. Set the alignment mode of the displayed information on the image. Step 3 Move the OSD box to the position that you want on the image. Step 4 Click Save. 5.1.2.3.5 Font Attribute You can enable this function if you need to adjust the font size and color on the video image. Step 1 Select Setting > Camera > Video > Overlay > Font Attribute. Figure 5-24 Font attribute Step 2 Select the font color and size. Click More Color to customize the font color. Step 3 Click Save. 5.1.2.3.6 Picture Overlay You can enable this function if you need to display image on the video image. Text overlay and picture overlay cannot be enabled at the same time. Step 1 Select Setting > Camera > Video > Overlay > Picture Overlay. 59 Figure 5-25 Picture overlay Users Manual Step 2 Select the Enable checkbox, click Upload Picture, and then select the image to be overlaid. The image is displayed on the video image. Step 3 Move the overlaid image to the position that you want on the image. Step 4 Click Save. 5.1.2.3.7 Mobile State You can enable this function if you want to display mobile state on the image. Step 1 Select Setting > Camera > Video > Overlay > Mobile State. Figure 5-26 Mobile state Step 2 Select the Enable checkbox. Step 3 Drag the mobile state box to the position that you want on the image. Step 4 Click Save. The mobile state information is displayed on the image. 60 5.1.2.3.8 Custom Overlay You can enable this function if you need to display custom information on the video image. Step 1 Select Setting > Camera > Video > Overlay > Custom Overlay. Figure 5-27 Custom overlay Users Manual Step 2 Select the Enable checkbox, and then select the text alignment. Click to expand the custom overlay, and you can expand 1 line at most. Step 3 Drag the custom overlay box to the position that you want on the image. Step 4 Click Save. 5.1.2.3.9 Abnormal You can enable this function if you want to display exception information on the image. Step 1 Select Setting > Camera > Video > Overlay > Abnormal. Figure 5-28 Abnormal Step 2 Select the Enable checkbox. Step 3 Drag the box to the position that you want on the image. 61 Users Manual Step 4 Click Save. The exception information is displayed on the image. 5.1.2.3.10 Latitude and Longitude You can enable this function if you need to display latitude and longitude on the video image. Step 1 Select Setting > Camera > Video > Overlay > Latitude and Longitude. Figure 5-29 Latitude and longitude Step 2 Select the Enable checkbox. Step 3 Drag the box to the position that you want on the image. Step 4 Click Save. 5.1.2.4 ROI You can set a key monitoring region as a ROI (region of interest), and configure the image quality of this region. ROI is available on select models. Step 1 Select Setting > Camera > Video > ROI. 62 Figure 5-30 ROI settings Users Manual Step 2 Select Enable to enable this function. Step 3 Press and hold the left mouse button to draw boxes on the monitoring screen. You can draw up to 4 boxes. Click Delete or right click to delete the drawn boxes. Click Remove All to clear all boxes. Step 4 Set the image quality of the ROI. Step 5 Click Save. 5.1.2.5 Path The storage path is associated with the snapshot and recording on the Live page. You can set the path of Live Snapshot and Live Record respectively. The storage path is associated with the snapshot, downloaded and clipped files on the Playback page. You can set the path of Playback Snapshot, Playback Download, and Video Clips respectively. Step 1 Select Setting > Camera > Video > Path. 63 Figure 5-31 Path settings Users Manual Step 2 Set each storage path. Default storage path for snapshots: C:\Users\admin\WebDownload\LiveSnapshot. Default storage path for recording: C:\Users\admin\WebDownload\LiveRecord. Default storage path for playback snapshot:
C:\Users\admin\WebDownload\PlaybackSnapshot. Default storage path for playback download:
C:\Users\admin\WebDownload\PlaybackRecord. Default storage path for video clips: C:\Users\admin\WebDownload\VideoClips. Step 3 Click Save. 5.1.3 Audio You can configure audio parameters and alarm audio. The function is available on select models. 5.1.3.1 Configuring Audio Parameters You can set the audio input type, volume and more. After you enable main stream or sub stream, the network stream contains both audio and video; otherwise it is only video stream. Before enabling sub stream audio, go to Setting > Camera > Video > Video to enable video in sub stream. Step 1 Select Setting > Camera > Audio > Audio. 64 Figure 5-32 Audio Users Manual Step 2 Enable audio in main stream or sub stream. Step 3 Configure audio parameters. Table 5-11 Description of audio parameter Parameter Description Enable audio in main stream or sub stream. Enable Encode Mode Sampling Frequency Audio can be enabled only when video has been enabled. The audio encoding mode selected here applies to both audio streams and voice talks. We recommend you to keep the default value. The number of audio signals sampled per second. The higher the sampling frequency, the more samples obtained per unit time, and the more accurate the restored audio signals. Set the audio input type. LineIn: The Camera collects audio signals through an external audio device. Mic: The Camera collects audio signals through the built-in Bluetooth: The Camera collects audio signals through a Bluetooth device. Bluetooth is available on select models. AudioIn Type microphone. 65 Users Manual Parameter Description Audio Output Type built-in speaker. Set the audio output type. LineOut: The Camera outputs audio signals through an external audio device. Speaker: The Camera outputs audio signals through the Bluetooth: The Camera outputs audio signals through a Bluetooth device. Bluetooth is available on select models. Noise Filter After the function is enabled, noise in the environment will be filtered. NR (Noise Reduction) Level Adjust the noise reduction level. This parameter takes effect when noise filter is enabled. Microphone Volume Adjust the microphone volume. Speaker Volume Step 4 Click Save. Adjust the speaker volume. 5.1.3.2 Configuring Alarm Audio You can set the alarm audio to be played when an alarm is triggered. For some devices, you can record or upload alarm audios. Procedure Step 1 Select Setting > Camera > Audio > Alarm Audio. Figure 5-33 Alarm audio Step 2 Click Add Audio File. Figure 5-34 Add audio file Step 3 Configure the audio file. Select Record, enter the audio file name, and then click Record. 66 Click Stop to complete recording. Select Upload, click
, select the audio file to be uploaded, and then click Users Manual The format of recorded audio is .pcm. Audio recording is only supported by some Upload. devices. Audio file in the format of .wav can be uploaded. You can edit and delete recorded or uploaded audio. Click to edit audio file. Click to delete audio file. Step 4 Select the audio file that you need. Related Operations Play audio: Click to play the alarm audio. Download audio: Click to download the alarm audio to local storage. The audio is saved to the default download path of the browser. 5.2 Network Settings 5.2.1 TCP/IP Prerequisites You can configure the IP address and DNS server of the Device to connect it to other devices in the network. Before configuring network parameters, make sure that the Device is connected to the network properly. If there is no router in the network, assign an IP address in the same network segment. If there is a router in the network, set the corresponding gateway and subnet mask. Procedure Step 1 Select Setting > Network > TCP/IP. 67 Figure 5-35 TCP/IP settings Users Manual Step 2 Set TCP/IP parameters. Table 5-12 Description of TCP/IP parameter Parameter Description Host Name Set the name of the current device. The host name can be English or Chinese within 63 bytes. Ethernet Card Select the Ethernet card to be configured. Wire is selected by default. If the Device is configured with multiple Ethernet cards, the default Ethernet card can be changed. If you reset the default Ethernet card, restart the Device. Set as Default Card Click to set the current Ethernet card as the default card. Mode Static and DHCP modes are available. If DHCP is selected, the IP address is obtained automatically. In this case, the IP address, subnet mask, and gateway cannot be set. If Static is selected, you need to set the IP address, subnet mask, and gateway manually. MAC Address Display the MAC address of the Device. 68 Users Manual Description You can select IPv4 or IPv6. Both versions are supported and can be accessed. Enter correct digits to change the IP address. Set the subnet mask according to actual conditions. The subnet prefix is a number in the range of 1 to 255. The subnet prefix identifies a specific network link, and usually contains a hierarchical structure. The Device checks the validity of all IPv6 addresses. The IP address and the default gateway must be in the same network segment. Make sure that a certain part of the subnet prefix in the IP address and default gateway are the same. Default Gateway Configure as needed. The default gateway must be in the same network segment as the IP address. Preferred DNS IP address of the DNS server. Alternate DNS Alternate IP address of the DNS server. For IPv6 version, in the IP Address, Default Gateway, Preferred DNS, and Alternate DNS fields, enter 128 bits, and these fields cannot be blank. Parameter IP Version IP Address Subnet Mask MTU You can set the MTU value to ensure good data transmission according to the network. The value is 1500 by default. Modifying MTU value causes Ethernet card restarting and network disconnection. Here are some suggested value for your reference. 1500: It is the maximum and default value of Ethernet packet, typical setting of the network connection without PPPOE or VPN, and is the default setting of some routers, network adapters, and switches. 1492: The optimal value for PPPOE. 1468: The optimal value for DHCP. 1450: The optimal value for VPN. Select the check box, and then you can modify and set the device IP address through ARP/Ping command if the MAC address is known. The function is enabled by default. During reboot, you will have no more than 2 minutes to configure the Device IP address by a ping packet with certain length. The server will be turned off in 2 minutes, or it will be turned off immediately after the IP address is successfully configured. If the function is not enabled, the IP address cannot be configured with ping packet. An Example of Configuring IP Address with ARP/Ping 1. To obtain a usable IP address, make sure that the Device and your PC are in the same 69 Enable ARP/Ping to set IP address service Step 3 Click Save. Related Operations Users Manual LAN. 2. Get the MAC address from the Device label. 3. Open command editor on the PC and enter the following command. System Command Table 5-13 Command list Windows syntax UNIX/Linux/Mac syntax arp -s <IP Address> <MAC>
ping -l 480 -t < IP Address >
Example:
arp -s 192.168.1.125 11-40-8c-18-10-11 ping -l 480 -t 192.168.0.125 arp -s <IP Address> <MAC>
ping -s 480 < IP Address >
Example:
arp -s 192.168.1.125 11-40-8c-18-10-11 ping -s 480 192.168.0.125 Win7 syntax netsh i i show in netsh -ci i add neighbors ldx <IP Address> <MAC>
ping -l 480 -t < IP Address >
Example:
netsh i i show in netsh -ci i add neighbors 12 192.168.1.125 11-40-8c-18-10-11 ping -l 480 -t 192.168.1.125 4. Power off the Device and then restart it, or restart the Device over the network. 5. Check the PC command line. If there is information such as "Reply from 192.168.1.125", it means the configuration succeeds. In this case, you can close the command editor. 6. Enter http://<IP address> in the browser address bar to log in. 5.2.2 Port You can configure the maximum port numbers and values on this page. Step 1 Select Setting > Network > Port. 70 Figure 5-36 Port page Users Manual Step 2 Configure each port value of the Device. restart. Except Max Connection, modifications of other parameters will take effect after 01024, 1900, 3800, 5000, 5050, 9999, 37776, 3778037880, 39999, and 42323 It is not recommended to use the default values of other ports during port are occupied for specific uses. configuration. Table 5-14 Description of port parameter Parameter Description Max Connection The maximum number of users that can log in to the web page of the Device simultaneously. The value ranges from 1 to 10, and it is 10 by default. TCP Port UDP Port HTTP Port TCP service port. The value is 37777 by default. You can set this parameter as needed. User Datagram Protocol port. The value is 37778 by default. You can set this parameter as needed. HTTP communication port. The value is 80 by default. You can set this parameter as needed. 71 Parameter Description Users Manual RTSP Port Real Time Streaming Protocol port. Keep the default value 554 if it is displayed. If you play live view through Apples QuickTime or VLC, the following format is available. This function is also supported by Blackberry mobile phone. When the URL format requiring RTSP, you need to specify channel number and bit stream type in the URL, and also username and password if needed. When playing live view with Blackberry mobile phone, you need to disable the audio, and then set the stream encoding mode to H.264B and resolution to CIF. URL format example:
rtsp://username:password@ip:port/cam/realmonitor?channel=1&subty pe=0 Username: Your username. For example, admin. Password: Your password. For example, admin. IP: Your device IP. For example, 192.168.1.122. Port: Leave it if the value is 554 by default. Channel: Channel number starting from 1. For example, if it is channel 2, then enter channel=2. Subtype: stream type. The main stream is 0 (subtype=0); the sub stream is 1 (subtype=1). For example, if you require the sub stream of channel 2 from a certain device, then the URL shall be:
rtsp://admin:admin@192.168.1.123:554/cam/realmonitor?channel=2&
subtype=1 If certification is not required, you do not need to specify the username and password. Use the following format:
rtsp://ip:port/cam/realmonitor?channel=1&subtype=0 A network protocol for real-time data communication. The value is 1935 by default. You can enter the value as needed. RTMP Enable RTMP to push audio and video data to the third-party server. Make sure that the address is trusted; otherwise it might cause data leakage. HTTPS Port HTTPS communication port. The value is 443 by default. You can set this parameter as needed. The port is disabled by default. If you need to connect the Camera to intelligent transportation box through 5000 port, enable this port. There might be network risk if the port is enabled. Be cautious. 5000 Port Step 3 Click Save. 5.2.3 PPPoE You can enable PPPoE (Point-to-Point Protocol over Ethernet) to establish network connection. In this case, the Device obtains a dynamic IP address. To use this function, you need to obtain the PPPoE username and password from the Internet Service Provider (ISP). 72 Step 1 Select Setting > Network > PPPoE. Figure 5-37 PPPoE page (1) Users Manual Step 2 Select Enable, and then enter PPPoE username and password. Step 3 Click Save. Save Succeeded! is displayed, and the obtained IP address of public network is displayed in real time. You can access the Device through the IP address. Figure 5-38 PPPoE page (2) 5.2.4 DDNS Properly configure DDNS, and then the domain name on the DNS server matches your IP address and refresh the matching relation in real time. You can always access your device with the same domain name no matter how much your device IP address changes. Before making any changes, check whether your device supports the DNS server. The third party servers might collect your device information if DDNS is enabled. Register and log in to the DDNS website, and then you can view the information of all the connected cameras in your account. Step 1 Select Setting > Network > DDNS. 73 Figure 5-39 DDNS Users Manual Step 2 Select Type, and then configure DDNS parameter. Table 5-15 Description of DDNS parameter Parameter Description Type Server Address The name and website of the DDNS service provider. Here is the matching relationship. CN99 DDNS Server address: www.3322.org NO-IP DDNS Server address: dynupdate.no-ip.com Dyndns DDNS Server address: members.dyndns.org Domain Name The domain name you registered on the DDNS website. Username Password Interval Enter the username and password obtained from DDNS service provider. You need to register an account (including username and password) on the website of DDNS service provider. The update cycle of the connection between your device and the server, and the time is 10 minutes by default. Step 3 Click Save. Open the browser, enter the domain name in the address bar, and then press the Enter key. The login page is displayed. 5.2.5 SMTP (Email) After this function is enabled, the device data will be sent to the given server. There is data leakage risk. Think twice before enabling the function. After you configure SMTP (Email), when alarms, video detection and abnormal events are triggered, an email will be sent to the recipient server through SMTP server. The recipient can log in to the incoming mail server to receive emails. Step 1 Select Setting > Network > SMTP (Email). 74 Figure 5-40 SMTP (Email) Users Manual Step 2 Configure SMTP (Email) parameter. Table 5-16 Description of SMTP (Email) parameter Parameter Description SMTP Server Port IP address of the outgoing mail server complying with SMTP protocol. Port number of the outgoing mail server complying with SMTP protocol. It is 25 by default. Username Username of sender mailbox. Password Password of sender mailbox. For the detailed configuration, see Table 5-17. Anonymity For servers supporting anonymous email, you can log in anonymously without entering username, password, and sender information. Sender Email address of the sender. 75 Users Manual Parameter Description Authenticati on Select authentication type from None, SSL and TLS. TLS is selected by default. For the detailed configuration, see Table 5-17. There might be risks if you select the authentication type other than TLS. TLS is recommended. You can enter no more than 63 characters in Chinese, English, and Arabic numerals. Email address of the receiver. Support 3 addresses at most. Title Mail Receiver Attachment Select the check box to support attachment in the email. Health Mail The system sends test mail to check if the connection is successfully configured. Select the Health Mail check box and configure the Update Period, and then the system sends test mails according to the defined period. Test Test whether the email function is normal. If the configuration is correct, the email address of the receiver will receive the test email. Save the email configuration before running rest. Table 5-17 Description of common email configuration Type SMTP Server Authentication Port Description SSL 465 QQ smtp.qq.com TLS 587 The authentication type cannot be None. You need to enable SMTP service in your mailbox. The authentication code is required;
either the QQ password or email password is not applicable. Authentication code is the code you receive when enabling SMTP service. 76 Type SMTP Server Authentication Port Description SSL TLS 465/994 163 smtp.163.com 25 Sina smtp.sina.com 126 smtp.126.com Step 3 Click Save. SSL 465 25 25 Users Manual You need to enable SMTP service in your mailbox. The authentication code is required; the email password is not applicable. Authentication code is the code you receive when enabling SMTP service. You need to enable SMTP service in your mailbox. You need to enable SMTP service in your mailbox. 5.2.6 UPnP After UPnP is enabled, Intranet service and port of the Device will be mapped to Extranet. Think twice before enabling it. UPnP (Universal Plug and Play) allows you to establish the mapping relationship between Intranet and Extranet. Extranet users can access Intranet device by visiting Extranet IP address. Intranet port is device port and Extranet port is router port. Users can access the Device by accessing Extranet port. When you are not using routers for UPnP, disable UPnP to avoid affecting other functions. Once UPnP is enabled, the Device supports UPnP protocol. In Windows XP or Windows Vista, after UPnP is enabled, the Device can be automatically searched by Windows network. Adding UPnP Network Service in Windows System 1. Open Control Panel, and then select Add or Remove Programs. 2. Click Add/Remove Windows Components. 3. Select Network Service from the Windows Components Wizard and click Details button. 4. Select Internet Gateway Device Discovery and Control Client, and UPnP User Interface, and then click OK to start installation. 77 Configuring UPnP 1. Select Setting > Network > UPnP. Figure 5-41 UPnP Users Manual 2. Select Enable. 3. Select a mode from the drop-down list. There are 2 mapping modes: Custom and Default. In Custom mode, users can modify the external port. Select Default, and then the system finishes mapping with unoccupied port automatically. In this case, you do not need to modify mapping relation. 4. Select Start Device Discover. 5. Click Save. 5.2.7 Bonjour Introduction Bonjour is also called zero-configuration networking, which can automatically discover computers, devices and services on IP networks. Bonjour is a protocol of industry standard which allows devices to search and find each other. IP address or DNS server is not required during the process. Enable this function, and the network camera will be automatically detected by the OS and client with Bonjour function. When the network camera is automatically detected by Bonjour, server name you have set will be displayed. Configuring Bonjour 1. Select Setting > Network > Bonjour. Figure 5-42 Bonjour page 78 Users Manual 2. Select Enable, and then set Server Name. 3. Click Save. Visiting Web Page with Safari Browser In the OS and clients that support Bonjour, perform the following steps to visit the web page of the Device with Safari browser. 2. The OS or client automatically detects the network cameras with Bonjour enabled in the 1. Click Show all bookmarks in Safari. LAN. 3. Click to visit the corresponding web page. 5.2.8 SNMP Prerequisites Browser. Procedure After setting SNMP (Simple Network Management Protocol) and connecting to the Device through certain software (such as MIB Builder and MG-SOFT MIB Browser), you can manage and monitor the Device with the software. Install SNMP monitoring and management tool such as MIB Builder and MG-SOFT MIB Get the MIB file of the matched version from technical support. Step 1 Select Setting > Network > SNMP. Figure 5-43 SNMP (1) 79 Figure 5-44 SNMP (2) Users Manual Step 2 Select SNMP version to enable SNMP. Select V1, and the system can only process information of V1 version. Select V2, and the system can only process information of V2 version. Select V3, and then V1 and V2 become unavailable. You can configure username, password and authentication type. It requires corresponding username, password and authentication type to access your device from the server. Using V1 and V2 might cause data leakage, and V3 is recommended. In Trap Address, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB Browser installed, and leave other parameters to the default. Table 5-18 Description of SNMP parameters Parameter SNMP Port Description The listening port of the software agent on the Device. 80 Users Manual Parameter Description Read Community, Write Community Trap Address Trap Port Keep Alive Read-only Username Read/Write Username The read and write community string that the software agent supports. The name must consist of numbers, letters, underlines and strikethroughs. The target address of the Trap information sent by the software agent on the Device. The target port of the Trap information sent by the software agent on the Device. After you select the check box, the Device can send data packet to ensure continuous network connection. Set the read-only username used to access the Device, and it is public by default. The name must consist of numbers, letters or underlines. Set the read/write username used to access the Device, and it is public by default. Authentication Type You can select MD5 or SHA. The default type is MD5. The name must consist of numbers, letters or underlines. Authentication Password It cannot be less than 8 digits. Encryption Type It is CBC-DES by default. Encryption Password It cannot be less than 8 digits. Step 3 Click Save. Result View device configuration through MIB Builder or MG-SOFT MIB Browser. 1. Run MIB Builder and MG-SOFT MIB Browser. 2. Compile the two MIB files with MIB Builder. 3. Load the generated modules with MG-SOFT MIB Browser. 4. Enter the IP address of the Device you need to manage in the MG-SOFT MIB Browser, and then select version to search. 5. Unfold all the tree lists displayed in the MG-SOFT MIB Browser, and then you can view the configuration information, video channel amount, audio channel amount, and software version. Use PC with Windows OS and disable SNMP Trap service. The MG-SOFT MIB Browser will display prompt when an alarm is triggered. 5.2.9 Multicast You can access the Device by network to see live view. If the access times exceed its upper limit, preview might fail. You can set multicast IP to access by multicast protocol to solve the problem. The Device supports two multicast protocols: RTP and TS. RTP is enabled by default 81 when main stream and sub stream are used. TS is disabled by default. Users Manual 5.2.9.1 RTP Step 1 Select Setting > Network > Multicast > RTP. Figure 5-45 RTP page Step 2 Enable main stream or sub stream. Step 3 Enter multicast address and port number. Step 4 Click Save. 5.2.9.2 TS Step 1 Select Setting > Network > Multicast > TS. Figure 5-46 TS page Step 2 Enable main stream or sub stream. Step 3 Enter multicast address and port number. Step 4 Click Save. 5.2.10 Auto Register After you enable this function, when the Device is connected to Internet, it will report the current location to the specified server which acts as the transit to make it easier for the client software to access the Device. Step 1 Select Setting > Network > Auto Register. 82 Figure 5-47 Auto register Users Manual Step 2 Select the Enable checkbox to enable Auto Register. Step 3 Enter IP Address, Port and Sub-Device ID. Table 5-19 Description of auto register parameter Description The IP address of server that needs to be registered to. The port for auto-registration. Sub device ID assigned by server. Parameter IP Address Port Sub-Device ID Step 4 Click Save. 5.2.11 Wi-Fi Devices with Wi-Fi function can access network through Wi-Fi. Wi-Fi and WPS are available on select models. All devices with WPS button support WPS function. 5.2.11.1 Wi-Fi Settings The name, status and IP information of current hotspot are displayed in the Wi-Fi information bar. Click Refresh after reconnection to make sure that the operating status is displayed in real time. Connecting Wi-Fi hotspot takes some time depending on network signal strength. Step 1 Select the Enable checkbox. 83 Figure 5-48 Wi-Fi settings (1) Users Manual Step 2 Click Search SSID, and Wi-Fi hotspots in the environment of current network camera are displayed. Figure 5-49 Wi-Fi settings (2) Step 3 To manually add Wi-Fi, click Add SSID. Figure 5-50 Add Wi-Fi Step 4 Enter a network name in the dialog box. It is recommended to set a secure encryption method for the Device to connect routers. Step 5 Double-click one hotspot to display the Signal Quality and the Authentication Manner. If the password is required, enter the password. When entering the password, its index number shall be consistent with that on the router. Click Connection if password is not required. 84 5.2.11.2 WPS Settings Figure 5-51 WPS settings Users Manual PIN and SSID can be obtained from the router. Enter PIN and SSID, and then click Refresh to display operating status in real time. 5.2.11.3 AP Settings You can use the Camera as wireless AP (Access Point), and other devices such as mobile phones can connect to the Camera by searching for the network name. You can then log in to the Camera through the browser on your device. At most 5 accounts can log in to the Camera at the same time. AP and Wi-Fi cannot be both enabled at the same time, and AP is disabled by default. Procedure Step 1 Select Setting > Network > WIFI > AP. Step 2 Select Enable, and then set AP information. Figure 5-52 AP settings Table 5-20 AP parameter description Parameter Description SSID The default name is "device serial number_SD". Frequency Band Both 2.4G and 5G are available. Verification Type It is WPA2 PSK by default, and cannot be changed. Connection Password Set the connection password which is required when other devices connect to the Camera. It is 12345678 by default. 85 Users Manual Parameter Host IP Step 3 Click Save. Description Displays the IP address of AP. Result 1. Open your device such as mobile phone, search for the network name of the AP in the wireless signal list, and then connect to the network. After it is successfully connected, the IP address and MAC address of the device is displayed on the AP interface. 2. Open a browser on your device, enter the host IP on the AP interface or IP address on the TCP/IP interface, and then you can go to the login interface of the Camera. 3. Enter the username and password, and then log in to the Camera. Live view is available on select devices. 5.2.12 802.1x 802.1x is a port-based network access control protocol. It allows users to manually select authentication mode to control device access to LAN, and meet authentication, billing, safety and management requirements of the network. Step 1 Select Setting > Network > 802.1x. Figure 5-53 802.1x ipage Step 2 Select the Enable checkbox to enable 802.1x. Step 3 Select an authentication mode, and then enter username and password. Table 5-21 Description of 802.1x setting parameter Parameter Description Authentication PEAP (protected EAP protocol). Username Password Step 4 Click Save. The username that was authenticated on the server. Corresponding password. 86 5.2.13 QoS Users Manual QoS (Quality of Service) is a network security mechanism, and is also a technology to solve network delay, congestion, and other problems. For network business, QoS includes transmission bandwidth, time delay in transmission, and packet loss of data. In network, QoS can be improved by ensuring transmission bandwidth, and reducing time delay in transmission, packet loss rate, and delay jitter. For DSCP (Differentiated Services Code Point), there are 64 priority degrees (063) of data packets. 0 represents the lowest priority, and 63 the highest priority. Based on the priority, the packets are classified into different groups. Each group occupies different bandwidth and has different discard percentage when there is congestion so as to improve service quality. Step 1 Select Setting > Network > QoS. Figure 5-54 QoS page Step 2 Configure QoS setting parameters. Table 5-22 Description of QoS setting parameter Parameter Description Realtime Monitor Data packet of network video monitoring. The value ranges from 0 to 63. Data packet of device configuration and query. The value ranges from 0 to 63. Select the check box to enable wireless QoS. Command Open the WMM Step 3 Click Save. 5.2.14 4G/5G After installing SIM card, you can connect the Device to 4G/5G network through dialing or mobile setting. Dialing setting: Connect the Device to 4G/5G network in specified period. Mobile setting: Receive alarm linkage messages on your mobile phone. When receiving alarm messages, you can activate the Device to connect to 4G/5G network through SMS or phone calls. 87 The function is available on devices with 4G/5G module. This section uses 4G as an Dual 4G is supported by select models, but only one 4G network adapter can be enabled example. simultaneously. Users Manual 5.2.14.1 Dialing Setting Log in to web page, select Setting > Network > 4G > Dialing Setting. Figure 5-55 Dialing setting page Some devices only support certain mobile carriers, and only the supported carriers are displayed in Network Support. Step 1 Select the Enable checkbox. Step 2 Enter APN, Authorize Mode, Dial-up Number, Username, and Password according to the SIM card inserted. These parameters might vary by countries. Contact local carrier or customer service for details. Step 3 Set the period to use 4G. 88 Users Manual If the current time is in the period you set, 4G network connection will be enabled. The IP address of the SIM card will be displayed in IP Address. And you can access the device through 4G after finishing the rest steps. If the current time is not in the period you set, 4G network connection will not be enabled. Only the corresponding Wireless Signal is displayed on the page. And you cannot access the device through 4G. Figure 5-56 Period setting Step 4 Set the interval to enable 4G through message or phone call if you want to use 4G outside the period set in Step3. The value range is 07200 s and it is 30 s by default. If the interval is 30 s, after activating 4G, you can use it for 30 s. After 30 s, you need to activate 4G again. If you set the interval to 0 s, you can use 4G without disconnection and you do not need to activate it again. For the method to activate 4G through message or phone call, see"5.2.14.2 Mobile Setting". Step 5 Click Save. 5.2.14.2 Mobile Setting Log in to web page, select Setting > Network > 4G > Mobile Settings. You can add the phone number to receive alarms. You also can add phone number used to activate 4G through message or phone call if you want to use 4G outside the period set in Step3 of "5.2.14.1 Dialing Setting". 89 Make sure that you add international calling codes before the phone number to avoid unnecessary charges caused by phone calls or messages to other countries or regions. Figure 5-57 Mobile setting page Users Manual Message Send: When alarms are triggered, the phone number added will receive message. Message Activation: You can enable 4G through message outside the period you set to use 4G. You need to send "ON" or "OFF" to phone number of the SIM card in the Device.
"ON" indicates enabling, and "OFF" indicates disabling. Phone Activation: You can enable 4G through phone calls outside the period you set to use 4G. You need to call the phone number of the SIM card in the Device. If the call gets through, it means 4G has been enabled. Make sure that your SIM card supports making phone calls and sending messages, and it Make sure that you use activation function outside the time range you set; otherwise it does Step 1 Select the check box of the service you need to enable. You can select one or more can be used normally. not work. services. Step 2 Enter the phone number and click to add it. Step 3 Click Save. Step 4 Select the Message Link checkbox on the page of the event for which you want to receive message. Take Face Detection for example. Click Setting > Event > Face Detection, and then select the Message Link checkbox. 90 Figure 5-58 Message link Users Manual Step 5 Click Save on the page of the corresponding event. You will receive message if the alarm is triggered. 5.2.15 Access Platform 5.2.15.1 P2P P2P is a private network traversal technology which enables users to manage devices easily without requiring DDNS, port mapping or transit server. Scan the QR code with your smart phone, and then you can add and manage more devices on your mobile client. Step 1 Select Setting > Network > Access Platform > P2P. 91 Figure 5-59 P2P page Users Manual P2P is enabled by default. You can manage the devices remotely. When P2P is enabled and the device is connected to network, the status is displayed as Online. We might collect the information including IP address, MAC address, device name, and serial number. The information collected is for remote access only. If you do not agree with this, you can clear the Enable check box. Step 2 Log in to mobile phone client, and then tap Device Management. Step 3 Tap Add + at the upper-right corner. Step 4 Scan the QR code on the P2P page. Step 5 Follow the onscreen instructions to finish settings. 5.2.15.2 ONVIF The ONVIF authentication is On by default, which allows the network video products (including video recording device and other recording devices) from other manufacturers to connect to the service. Step 1 Select Setting > Network > Access Platform > ONVIF. Figure 5-60 ONVIF page Step 2 Select On for Authentication. 92 Step 3 Click Save. 5.2.15.3 RTMP Users Manual You can connect the third party platforms (such as YouTube) to play live video through RTMP protocol. Only admin user can configure RTMP. RTMP only supports H.264, H.264B and H.264H video formats, and Advanced Audio Coding (AAC) audio format. Step 1 Select Setting > Network > Access Platform > RTMP. Figure 5-61 RTMP page Step 2 Select the Enable checkbox to enable RTMP. When enabling RTMP, make sure that the address can be trusted. Step 3 Set RTMP parameters. Table 5-23 Description of RTMP parameter configuration Parameter Description Stream Type Select live video stream type. Make sure that the video format of the stream is H.264, H.264B or H.264H, and the audio format is AAC. There are two options: Non-custom and Custom. Non-custom: You need to fill in the IP address or domain Address Type name. IP Address Port Custom: You need to fill in the address allocated by the server. If you have selected Non-custom, IP address and port need to be filled in. IP Address: IPv4 or domain name is supported. Port: It is recommended to use the default value. 93 Parameter Description Custom Address Step 4 Click Save. If you have selected Custom, the address allocated by the server needs to be filled in. Users Manual 5.3 Bluetooth Settings You can connect the Camera to Bluetooth devices such as Bluetooth headset for voice broadcast of alarms and voice intercom with the platform. Procedure The function is available on select models. Step 1 Select Setting > Connection Settings > Bluetooth. Step 2 Select Enable. The searched Bluetooth devices are displayed in the Bluetooth List. Click Refresh at the lower-right corner of the list to search for Bluetooth devices again. Figure 5-62 Bluetooth list Step 3 Double-click the name of Bluetooth device, and then set PIN on the Setup interface. 94 For the PIN of the Bluetooth device, see the corresponding users manual. Figure 5-63 Connect to Bluetooth device Users Manual Step 4 Click Save. The connected Bluetooth device is displayed in the list below. Step 5 Select Setting > Camera > Audio > Audio, and then set audio input and audio output types to Bluetooth. Figure 5-64 Set audio Related Operations devices again. Click Refresh at the lower-right corner of the list to get information of paired Bluetooth Click Pair Again to quickly connect to Bluetooth devices paired before. 95 Click Delete to delete the Bluetooth device. Users Manual 5.4 PTZ Settings 5.4.1 Protocol Network PTZ setting and analog PTZ setting are available on select models. 5.4.1.1 Network PTZ Settings Step 1 Select Setting > PTZ > Protocol > Network PTZ. Figure 5-65 Network PTZ setting Step 2 Select a protocol. You can select DH-SD1, DH-SD3, PELCOD, or PELCOP. DH-SD1 is selected by default. Step 3 Click Save. DH-SD1 protocol supports up to 80 presets, and DH-SD3 protocol supports up to 300 presets. 5.4.1.2 Analog PTZ Settings Step 1 Select Setting > PTZ > Protocol > Analog PTZ. Figure 5-66 Analog PTZ setting Step 2 Configure analog PTZ parameter. 96 Users Manual Table 5-24 Description of analog PTZ parameter Parameter Description Enter the address of the Device. Address Make sure that the address is the same as the device address;
otherwise you cannot control the device. Baud Rate Select the baud rate of the Device. Data Bit Stop Bit Parity It is 8 by default. It is 1 by default. It is NONE by default. Step 3 Click Save. 5.4.2 Function 5.4.2.1 Preset Select Setting > PTZ > Function > Preset. The Preset page is displayed. If you click Remove All, all presets and special presets will be cleared. Figure 5-67 Preset 5.4.2.1.1 Preset Settings Preset means a certain position to which the Device rotates. Users can adjust the PTZ and camera to the location quickly through calling presets. Step 1 On the lower left corner of the Preset interface, click the direction buttons,
, and to adjust the PTZ direction, speed, zoom, and focus of 97 the Device. Step 2 Click to add a preset. The current position is set to a preset and is displayed in the list. Figure 5-68 Add presets Users Manual Step 3 Click to save the preset. Step 4 Perform operations on presets. Double-click the preset title to edit the title displayed on the monitoring screen. Click to delete the preset. 5.4.2.1.2 Special Preset Settings Special presets serve as the shortcut for some special functions switch or calling, and they no longer represent the location of the PTZ camera. Step 1 Click to add a special preset. The added special preset will be displayed in the list. The number of special presets starts from 51 by default, and 100 is the largest number. Figure 5-69 Special presets Step 2 Click to save the added special preset. 98 Step 3 Perform operations on special presets. If the PTZ is restored to default settings, all preset configurations will be cleared, but the called function will remain. Users Manual Related Operations Click to modify the special preset function. Click to delete the special preset. Click to quickly call the function configured for the special preset. 5.4.2.2 Tour Tour means a series of movements that the Device makes along several presets. You need to set several presets in advance. Step 1 Select Setting > PTZ > Function > Tour. Figure 5-70 Tour settings Step 2 Select the Tour Mode from Original Path and Shortest Path. Original Path is selected by default. Original Path: Tour in the order of adding presets. Shortest Path: Starting from the preset with largest horizontal zoom value and vertical zoom value, pass all presets in the tour to ensure the shortest path. The Device reaches the corresponding preset and ensure the minimum number of rotation. 99 Step 3 Click Add at the bottom of the list on the upper right corner of the page to add a tour Users Manual Step 4 Click Add at the bottom of the list on the lower right corner of the page to add several Step 5 Perform tour operations. Double-click tour name to edit the name of the corresponding tour. Double-click duration to set the time that the Device stays at the corresponding Double-click speed to modify the tour speed. The default value is 7, and the value range is 110. The larger the value, the faster the speed. Step 6 Click Start to start the tour. path. presets. preset. The ongoing tour stops if any operation is made to the PTZ. 5.4.2.3 Scan Scan means the Device moves horizontally at a certain speed between the defined left and right limits. Step 1 Select Setting > PTZ > Function > Scan. Figure 5-71 Scan settings Step 2 Select the Scan No.. Step 3 Drag the slider to adjust the scan speed. Step 4 Click Setup to adjust the Device to an ideal position. Step 5 Click Set Left Limit and Set Right Limit to set the left and right boundaries of the Device. Step 6 Click Start, and then the Device starts scanning. Step 7 Click Stop, and then the scanning stops. 100 5.4.2.4 Pattern Pattern means a record of a series of operations that users make to the Device. The operations include horizontal and vertical movements, zoom and preset calling. Record and save the operations, and then you can call the pattern path directly. Step 1 Select Setting > PTZ > Function > Pattern. Figure 5-72 Pattern settings Users Manual Step 2 Select the Pattern No.. Step 3 Click Setup and Start Rec, and then operate the PTZ. Step 4 Click Stop Rec to stop recording. Step 5 Click Start, and then the Device starts patterning. Step 6 Click Stop, and then the patterning stops. 5.4.2.5 Pan Pan refers to the continuous 360 rotation of the Device at a certain speed. Step 1 Select Setting > PTZ > Function > Pan. 101 Figure 5-73 Pan settings Users Manual Step 2 Drag the slider to set the Pan Speed. Step 3 Click Start, and the Device starts to rotate horizontally at this speed. 5.4.2.6 PTZ Speed You can adjust the manual control speed of the PTZ by setting PTZ speed. This speed does not apply to tour, pattern, or auto tracking. Step 1 Select Setting > PTZ > Function > PTZ Speed. Figure 5-74 PTZ speed settings Step 2 Select Low, Middle or High. 102 5.4.2.7 Idle Motion Idle motion refers to a set motion when the Device does not receive any valid command within a certain period. Users Manual Set Preset, Tour, Scan or Pattern in advance. Step 1 Select Setting > PTZ > Function > Idle Motion. Figure 5-75 Idle motion settings Step 2 Select the Enable checkbox to enable the idle motion. Step 3 Select idle motion from Preset, Tour, Scan and Pattern. Step 4 Select the action number of the selected motion. Step 5 Set Idle Time for the selected motion. Step 6 Click Save. 5.4.2.8 PowerUp PowerUp means the automatic operation of the Device after it is powered on. Set Preset, Tour, Scan or Pattern in advance. Step 1 Select Setting > PTZ > Function > PowerUp. 103
1 | Users Manual -3 | Users Manual | 3.19 MiB | January 18 2022 |
Figure 5-76 PowerUp settings Users Manual Step 2 Select the Enable checkbox to enable power up motion. Step 3 Select power up motion from Preset, Tour, Scan, Pattern or Auto. Select Auto and the last motion before you shut down the Device last time will be performed. Step 4 Select the action number of the selected motion. Step 5 Click Save. 5.4.2.9 PTZ Limit After you set the PTZ limit, the Device can only move in the defined area. Step 1 Select Setting > PTZ > Function > PTZ Limit. Figure 5-77 PTZ limit settings Step 2 Adjust the PTZ direction, and then click Setting to set the Up Line. 104 Step 3 Adjust the PTZ direction, and then click Setting to set the Down Line. Step 4 Click Live to preview the already-set up line and down line. Step 5 Select the Enable checkbox to enable the PTZ limit function. Users Manual 5.4.2.10 Time Task After you set time task, the Device performs the selected motions during the defined period. Set Preset, Tour, Scan or Pattern in advance. Step 1 Select Setting > PTZ > Function > Time Task. Figure 5-78 Time task settings Step 2 Select the Enable checkbox to enable time task function. Step 3 Set the time task number. Click Clear All to delete all set time tasks. Step 4 Select Time Task action such as Preset, Tour, Scan or Pattern. Step 5 Select the action number of the selected motion. Step 6 Set the time for AutoHome. AutoHome refers to the time needed to automatically recover the time task in case of manually calling the PTZ to stop the time task. Step 7 Click Period setting to set the period to perform time tasks. Step 8 Select the task number to copy settings to the selected task, and then click Copy. Step 9 Click Save. 5.4.2.11 PTZ Restart Step 1 Select Setting > PTZ > Function > PTZ Restart. 105 Figure 5-79 PTZ restart Users Manual Step 2 Click PTZ Restart. The PTZ is restarted. 5.4.2.12 Default With the function, you can restore the PTZ to factory defaults. This function will restore the Device to defaults. Think twice before performing the operation. Step 1 Select Setting > PTZ > Function > Default. 106 Figure 5-80 Default setting Users Manual Step 2 Click Default. The PTZ will be restored to factory defaults. 5.5 Event Management 5.5.1 Video Detection Video detection includes three event types: Motion Detection, Video Tamper and Scene Changing. 5.5.1.1 Motion Detection When the moving object appears and moves fast enough to reach the preset sensitivity value, alarms will be triggered. Step 1 Select Setting > Event > Video Detection > Motion Detection. 107 Figure 5-81 Motion detection settings Users Manual Step 2 Select the Enable check box, and then configure motion detection parameters. Set arming and disarming period. 1. Click Setting, and then set the arming period on the page. Figure 5-82 Arming period settings 2. Set the alarm period to enable alarm events in the period you set. There are 6 time periods for each day. Select the check box for the time 108 period to enable it. Select the day of week (Sunday is selected by default; If All is selected, the setting is applied to the whole week. You can also select the check box next to the day to set it separately). Users Manual 3. After completing the settings, click Save. You will return to the Motion Detection page. Set the area. Click Setting, and the Area page is displayed. Refer to Table 5-25 and Table 5-
26 for parameters description. Each color represents a certain region, and you can set different motion detection regions for each area. The detection region can be irregular and discontinuous. Figure 5-83 Area setting Table 5-25 Description of area setting parameter Parameter Description Name Sensitivity Threshold The default names are Region1, Region2, Region3 and Region4, and the names can be customized. Sensitivity to brightness change. The higher the sensitivity is, the easier the motion detection event will occur. You can set different sensitivities for each region, with values ranging from 0 to 100, and 30 to 70 is recommended. Detect the relation between the object and the region. The smaller the threshold is, the easier the motion detection will occur. Set different thresholds for each region, with values ranging from 0 to 100, and 1 to 10 is recommended. Waveform graph The red line indicates that motion detection is triggered, and the green line indicates that it is not triggered. Remove All Remove all detection regions. Delete Delete the detection region of the selected color block. 109 Other parameters Table 5-26 Description of video detection parameter Parameter Description Users Manual Anti-Dither Enable Manual Control Trigger Record Record Delay Relay-out Alarm Delay Send Email PTZ Snapshot The system records only one motion detection event within the defined period. The value range is 0100 s. After you enable the function, the motion detection events that occur when you control the PTZ manually will be excluded. In this way, you can reduce the false alarm rate of such events. After you enable the function, when an alarm is triggered, the system will start recording automatically. Before using the function, you need to set the recording period of the alarm in Storage > Schedule, and select Auto for Record Mode on the Record Control page. When the alarm is over, the alarm recording will continue for an extended period of time. The time unit is second, and the value range is 10300. Select the check box, and you can enable the alarm linkage output port, and link corresponding relay-out devices after an alarm is triggered. When the alarm is over, the alarm will continue for an extended period of time. The time unit is second, and the value range is 10 300. After you select the check box, when an alarm is triggered, the system sends email to the specified email address. You can configure the email address in "5.2.5 SMTP (Email)."
Select PTZ, and then configure the linkage action. When an alarm is triggered, the system links PTZ to rotate to the preset. The Activation options include None, Preset, Tour and Pattern. Select the Snapshot check box, and then the system takes snapshot automatically when an alarm is triggered. You need to set the alarm snapshot period as described in "5.5.1.2 Snapshot."
Step 3 Click Save. 5.5.1.2 Video Tamper Alarms will be triggered if there is video tampering. Step 1 Select Setting > Event > Video Detection > Video Tamper. 110 Figure 5-84 Video tamper settings Users Manual Step 2 Select the Enable check box, and then configure video tamper parameters. For parameters configuration, see "5.5.1.1 Motion Detection". Step 3 Click Save. 5.5.1.3 Scene Changing Alarms will be triggered if there is scene changing. Step 1 Select Setting > Event > Video Detection > Scene Changing. Figure 5-85 Scene changing settings Step 2 Select the Enable check box, and then configure scene changing parameters. 111 Users Manual Step 3 Click Save. For parameters configuration, see "5.5.1.1 Motion Detection". 5.5.2 Smart Motion Detection After you set smart motion detection, when the human, non-motor vehicles and motor vehicles appear and move fast enough to reach the preset sensitivity value, the alarm linkage actions will be performed. The function can help you to avoid the alarms triggered by natural environment change. The function depends on the result of motion detection, and all other parameters (except sensitivity) of motion detection function are used, including arming period, area settings, and linkage configurations. If no motion detection is triggered, smart motion detection will not be triggered. If motion detection is not enabled, when smart motion detection is enabled, motion detection will also be enabled. If both functions are enabled, when motion detection is disabled, smart motion detection will also be disabled. When smart motion detection is triggered and recording is linked, back-end devices can filter recording with human or vehicles through smart search function. For details, see the corresponding users manual. Select Setting > Event > Video Detection > Motion Detection, and then enable the Set the arming period and detection area. The sensitivity of each region is larger than 0, motion detection function. and the threshold is not equal to 100. Prerequisites Procedure 1. Select Setting > Event > Smart Motion Detection. Figure 5-86 Smart motion detection 2. Select the Enable check box to enable Smart Motion Detection. 112 3. Select the effective object and sensitivity. Effective object: Select Human or Motor Vehicle. When Human is selected, both people and non-motor vehicles will be detected. Sensitivity: Select High, Medium, or Low. The higher the sensitivity, the easier the Users Manual alarm is triggered. 4. Click Save. 5.5.3 Audio Detection Step 1 Select Setting > Event > Audio Detection > Audio Detection. Figure 5-87 Audio detection settings Step 2 Configure audio detection parameter. 113 Table 5-27 Description of audio detection parameter Parameter Description Users Manual Input Abnormal Intensity Change Sensitivity Threshold Select Input Abnormal, and then an alarm is triggered when there is abnormal audio input. Select Intensity Change, and then an alarm is triggered when the change in sound intensity exceeds the defined threshold. The value ranges from 1 to 100. The smaller this value is, the larger the input sound volume changes are needed for it to be judged as an audio anomaly. You need to adjust it according to the actual condition. The value ranges from 1 to 100. Configure the ambient sound intensity you need to filter. The louder the ambient noise is, the larger this value shall be. You need to adjust it according to the actual condition. For other parameters, see "5.5.1.1 Motion Detection". Step 3 Click Save. 5.5.4 Smart Plan Smart plans include IVS, face recognition, heat map, people counting, video metadata, construction monitoring and so on. Only after smart plans have been enabled, can the corresponding smart function come into effect. Before configuring the smart plan, you need to set presets in advance. For setting methods, see "5.4.2.1 Preset". Step 1 Select Setting > Event > Smart Plan. Figure 5-88 Smart plan (1) 114 Users Manual Step 2
(Optional) Click to enable Auto Tracking. When enabling auto tracking, you do not need to configure smart plans, and the Device performs auto tracking based on internal mechanism. If auto tracking and alarm track of the smart plan (such as IVS) are both enabled, the Device perform tracking in the order of triggering time. It is recommended to disable auto tracking when alarm track is enabled to avoid disordered tracking. Step 3 Click to select the presets to be configured. Step 4 Select smart plans. The selected function will be highlighted. Click it again to cancel the selection. Figure 5-89 Smart plan (2) Step 5 Click Save. 5.5.5 IVS Basic Requirements for the Scene The target size shall not exceed 10% of the image. The pixel of the target shall be no less than 1010; the pixel of abandoned object shall be no less than 1515 (CIF image); the width and height of the target shall be no more than 1/3 of the image. It is recommended that the height of the target is 10% of the image. The brightness difference between the target and the background is no less than 10 gray values. The target shall be present in the image for no less than 2 consecutive seconds, and the moving distance shall be larger than its width and no less than 15 pixels (CIF image). 115 Try to reduce the complexity of monitoring scenes. It is not recommended to enable IVS in scenes with dense targets and frequent light changes. Try to avoid the following scenes: scenes with reflective surfaces such as glass, bright ground or water; scenes that disturbed by tree branches, shadows or winged insects;
scenes that against light or under direct light exposure. Users Manual Before using the function, you need to set presets in advance. For setting methods, see
"5.3.2.1 Preset."
Rule Config 1. Select Setting > Event > IVS > Rule Config. Figure 5-90 Add smart rules 2. Select the presets to be configured with smart rules. 3. Click to add smart rules. Double-click rule type to modify the type of rules. 4. Click Save. 5.5.5.1 Tripwire Alarms are triggered when the target crosses the warning line in the defined direction. It requires certain stay time and moving space for the target to be confirmed, so you need to leave some space at both sides of the warning line during configuration and do not draw it near obstacles. Applicable scenes: Scenes with sparse targets and no occlusion between targets, such as perimeter protection of unattended areas. Procedure Step 1 Select Tripwire from the Rule Type list. 116 Figure 5-91 Tripwire rule settings Users Manual Step 2 Click Draw Rule, and you can draw rules on the monitoring screen. Click Clear to the right of Draw Rule to clear all drawn rules. Table 5-28 Description of rule drawing parameter Parameter Description Set the size range of detection targets to be filtered, and select the maximum or minimum size. Max Size: Set the maximum size of targets to be filtered. When the target is larger than this size, the system will ignore it. The unit is pixel. Min Size: Set the minimum size of targets to be filtered. When the target is smaller than this size, the system will ignore it. The unit is pixel. Help to accurately draw the target area. Enter the length and width of the target area in Pixel Counter, and click Draw Target to generate the target area in the monitoring screen. The unit is pixel. Max Size Min Size Pixel Counter 117 Users Manual Parameter Description Lock/Unlock Enter the rule configuration page, and the locking function will be automatically enabled, and the locking time is 180 s. During this period, the device cannot track the target. Click Unlock to release the control. The locking function only takes effect in the rule configuration page. After switching to the Live page, the Device can track the target normally. Step 3 Configure tripwire parameter. Table 5-29 Description of tripwire parameter Parameter Description Period Set the alarming period to enable alarm events in the defined period. 1. Click Setting, and then the Period interface is displayed. 2. Enter the time value or press and hold the left mouse button, and drag directly on the setting interface. There are six periods for each day. Select the check box next to the period for it to take effect. 3. Select the day of week (Sunday is selected by default; If All is selected, the setting is applied to the whole week. You can also select the check box next to the day to set it separately). 4. After completing the setting, click Save to go back to the rule configuration interface. Direction Configure the tripwire direction. You can select A->B, B->A or A<->B. Alarm Track Select the check box, and there will be alarm tracking when a smart rule is triggered. Track Time Set the alarm tracking time. Record Select the check box, and when an alarm is triggered, the system will start recording automatically. Before using the function, you need to set the recording period of the alarm in Storage > Schedule, and select Auto for Record Mode on the Record Control interface. Record Delay When the alarm is over, the recording will continue for an extended period of time. The value range is 10300 s. Relay-out Select the check box, and you can enable the alarm linkage output port, and link corresponding relay-out devices when an alarm is triggered. Alarm Delay When the alarm is over, the alarm will continue for an extended period of time. The value range is 10300 s. Send Email Snapshot Step 4 Click Save. Select the Send Email check box, and when an alarm is triggered, the system sends an email to the specified mailbox. You can configure the mailbox in Setting > Network > SMTP (Email). Select the check box, and the system will automatically take snapshots in case of alarms. You need to set snapshot period in Storage > Schedule. 118 5.5.5.2 Intrusion Users Manual Intrusion includes crossing areas and in-area functions. Crossing area means an alarm will be triggered when a target enters or leaves the area. In-area function means an alarm will be triggered when a specified number of targets appear in a set alarming area at a given time. In-area function only counts the number of targets in the detection area, regardless of whether they are the same targets. For the reporting time interval of the in-area functions, the system will trigger the first alarm and then detect whether the same event occurs in the interval period. If no same event occurs in this period, the alarm counter will be cleared. Similar to the warning line, to detect an entry/exit event, a certain movement space should be reserved at the periphery of the area line. Applicable scenes: Scenes with sparse targets and no occlusion between targets, such as perimeter protection of unattended areas. Step 1 Select Intrusion from the Rule Type list. Figure 5-92 Intrusion settings Step 2 Click Draw Rule, and you can draw rules on the monitoring screen. For parameter description, see Table 5-28. Click Clear to the right of Draw Rule to clear all drawn rules. Step 3 Configure intrusion parameter. 119 Users Manual Table 5-30 Description of intrusion parameter Parameter Description Action Direction Configure intrusion action, and you can select Appear or Cross. Select the crossing direction from Enters, Exits, and Enter & Exit. For other parameters, see "5.5.5.1 Tripwire". Step 4 Click Save. 5.5.5.3 Abandoned Object An alarm will be triggered when the selected target in the monitoring scene stays in the screen for more than the defined time. Pedestrians or vehicles that stay for too long would be regarded as abandoned objects. To filter out such alarms, you can use Target filter. In addition, the duration can be properly extended to avoid false alarm due to a short stay of people. Applicable scenes: Scenes with sparse targets, no obvious and frequent light changes. For scenes with intensive targets or too many obstacles, missed alarms would increase; for scenes in which too many people stay, false alarms would increase. Select detection areas with simple texture, because this function is not applicable to scenes with complex texture. Step 1 Select Abandoned Object from the Rule Type list. Figure 5-93 Abandoned object settings Step 2 Click Draw Rule, and you can draw rules on the monitoring screen. For parameter description, see Table 5-28. 120 Users Manual Click Clear to the right of Draw Rule, and you can clear all drawn rules. Step 3 Configure abandoned object parameter. Table 5-31 Description of abandoned object parameter Parameter Description Duration For abandoned object, the duration is the shortest time to trigger an alarm after an object is abandoned. For other parameters, see "5.5.5.1 Tripwire". Step 4 Click Save. 5.5.5.4 Missing Object An alarm will be triggered when the selected target in the scene is taken away for the time longer than the set duration. The system analyzes static areas from the foreground, and determines whether it is missing object or abandoned object from the similarity of its foreground and background. When the time exceeds the set period, an alarm is triggered. Applicable scenes: Scenes with sparse targets, no obvious and frequent light changes. For scenes with intensive targets or too many obstacles, the missed alarm would increase; for scenes in which too many people stay, the false alarm would increase. Keep the detection area texture as possible simple as possible, because this function is not applicable to scenes with complex texture. Step 1 Select Missing Object from the Rule Type list. Figure 5-94 Missing object setting 121 Step 2 Click Draw Rule, and you can draw rules on the monitoring screen. For parameter description, see Table 5-28. Users Manual Click Clear to the right of Draw Rule to clear all drawn rules. Step 3 Configure missing object parameter. Table 5-32 Description of missing object parameter Parameter Description Duration Configure the shortest time from the object disappearing to the alarm being triggered. For other parameters, see "5.5.5.1 Tripwire". Step 4 Click Save. 5.5.6 Construction Monitoring The Device can be used for construction monitoring which include helmet detection, workwear detection, lone working detection and absence detection. Prerequisites Procedure Select Setting > Event > Smart Plan to enable Construction Monitoring. Step 1 Select Setting > Event > Construction Monitoring. Step 2 Select Global or a preset from the Preset list. If global plan is selected, detection area and rule are set by default, and the detection area cannot be changed. If a preset is selected, you need to set detection area and rule manually. The following section uses selecting Preset 1 as an example. Figure 5-95 Global plan 122 Figure 5-96 Plan by preset Users Manual drawing. rule. Step 3 Click at the upper-right corner of the Area Config section. Double click the rule name to modify it. Step 4 Click to draw rule box on the video image, and then right-click to complete After drawing is complete, drag the corners of the drawn area to adjust the detection area. If you select preset plan, 8 detection areas can be drawn at most. Step 5 Select the check box before the event type to enable the corresponding detection Rule Description Table 5-33 Rule description Helmet Detection When the Device detects person not wearing helmet or not wearing helmet in the specified color, alarm linkage actions will be performed. Workwear Detection When the Device detects person not wearing workwear in accordance with the rule, alarm linkage actions will be performed. The rule for workwear is long-sleeved tops and trousers in the same color. If short-
sleeved shirts, shorts or different colors are detected, it means the rule is not followed. Lone Working Detection When the Device detects a single person working in the detection area, alarm linkage actions will be performed. Absence Detection When the Device detects nobody working in the detection area, alarm linkage actions will be performed. Step 6 Click next to the detection rule, configure parameters on the Advanced Parameter interface, and then click Save. 123 Figure 5-97 Helmet detection Users Manual Figure 5-98 Workwear detection 124 Figure 5-99 Lone working detection Users Manual Figure 5-100 Absence detection Table 5-34 Parameter description Parameter Description Allowed Color When configuring helmet detection, you can set allowed colors. When the helmet detected is not in the selected colors, alarms will be triggered. 125 Duration Record Relay-out Alarm Delay Send Email Audio Linkage Message Link Snapshot Period Users Manual Parameter Description When events not following the rule are detected and the duration exceeds the defined value, alarms will be triggered. For example, when the duration of helmet detection is 5 seconds, if the Device detects a person not wearing helmet or the helmet color is not allowed for more than 5 seconds, an alarm will be triggered. Repeat Alarm Time After an alarm is triggered, when the event lasts for the time reaching repeated alarm time, an alarm will be triggered again. After you enable the function, when an alarm is triggered, the system will start recording automatically. Before using the function, you need to set the recording period of the alarm in Storage >
Schedule, and select Auto for Record Mode on the Record Control interface. Record Delay When an alarm is over, the alarm recording will continue for an extended period of time. Select the check box, and you can enable the alarm linkage output port, and link corresponding relay-out devices after an alarm is triggered. When an alarm is over, the alarm will continue for an extended period of time. After you select the check box, when an alarm is triggered, the system sends email to the specified email address. You can configure the email address in "5.2.8 SNMP". Select the check box to play alarm audio when alarms are triggered. You can set the play count and select the audio file. For how to set the audio file, see "5.1.3.2 Configuring Alarm Audio". Select the check box to receive message when alarms are triggered. Select the check box, and the system will automatically take snapshots in case of alarms. You need to set snapshot period in Storage > Schedule. Set the alarm period to enable alarm events in the defined period. 1. Click Setup, and the Period interface is displayed. 2. Enter the time value or press and hold the left mouse button, and drag directly on the setting interface. There are six periods for each day. Select the check box next to the period for it to take effect. 3. Select the day of week (Sunday is selected by default; If All is selected, the setting is applied to the whole week. You can also select the check box next to the day to set it separately). 4. After completing the setting, click Save to go back to the rule configuration interface. Step 7 Click Save on the Construction Monitoring interface. 126 If you want to see the alarm information on the Alarm tab, you need to subscribe the corresponding alarm type. For details, see "6 Alarm". Users Manual Result Click the AI Live tab to view construction monitoring results. For details, see "3.2 AI Live Settings". 5.5.7 Face Recognition The function can detect faces and compare them with those in the configured face database. Select Setting > Event > Smart Plan to enable face recognition. This function is available on select models. 5.5.7.1 Face Detection When human face is detected in the monitoring screen, an alarm is triggered and the linked action is performed. Step 1 Select Setting > Event > Face Recognition > Face Detection. Figure 5-101 Face detection page Step 2 Select Enable to enable the face detection function. Step 3 Configure face detection parameters. Table 5-35 Description of face detection parameter Parameter Description Period Alarm event will be triggered only within the defined period. For details, see "5.5.1.1 Motion Detection". 127 Users Manual Parameter Description Face Enhancement Select Face Enhancement to preferably guarantee clear faces with low stream. Select Record, and the system records video when alarms are triggered. Record To enable video recording, you need to make sure that:
The motion detection recording is enabled. For details, see The auto recording is enabled. For details, see "5.6.4 Record
"5.6.1.1 Record". Control". Record Delay The video recording will not stop until the record delay time you set has passed. Send Email Select Send Email, and when alarms are triggered, the system sends email to the specified mailbox. For the email settings, see
"5.2.5 SMTP (Email)". Select Snapshot, and the system takes snapshot when alarms are triggered. Snapshot Enable the motion detection snapshot first. For details, see For searching and setting snapshot storage path, see "5.1.2.5
"5.6.1.1 Record". Path". Snap Face Image Set the snapshot scope, including Face and One-inch photo. Select the Attribute check box, click the human attributes during face detection.
, and then you can set Attribute Step 4 Click Save. 5.5.7.2 Face Database Config After you successfully configure the face database, the detected faces can be compared with the information in the face database. Configuring a face database includes creating a face database, adding face images, and face modeling. 5.5.7.2.1 Adding Face Database Create a face database, and then register face images to add face images to the newly created face database. Step 1 Select Setting > Event > Face Recognition > Face Database Config. 128 Figure 5-102 Face database config Users Manual Step 2 Click Add Face Database. Figure 5-103 Add face database Step 3 Set face database name. Step 4 Click OK to complete the addition. Figure 5-104 Add face database completed Step 5 Configure face database configuration parameters. Table 5-36 Description of face database config parameter Parameter Description Deploy Select Deploy and the face database takes effect. Similarity Threshold More Info Arm/Disarm The comparison is successful only when the similarity between the detected face and the face feature in face database reaches the set similarity threshold. After this, the comparison result is displayed on the Live page. Click More Info to manage face database. You can set search conditions, register people, and modify people information. Alarm event will be triggered only within the defined time period. For details, see "5.5.1.1 Motion Detection". Delete Delete the selected face database. 5.5.7.2.2 Adding Face Images You can add face images to the created face database. Manual addition and batch import are supported. 129 Manual Addition Add a single face image. Use this method when registering a small number of face images. Step 1 Select Setting > Event > Face Recognition > Face Database Config. Step 2 Click More Info for the face database to be configured. Figure 5-105 More info Users Manual Set filtering conditions, and then click Search. The search result is displayed. Step 3 Click Registration. Figure 5-106 Registration interface Step 4 Click Upload Picture, and then import the face pictures to be uploaded. You can manually select a face area. After uploading the picture, select a face area and click OK. If there are multiple faces in a image, select the target face and click OK to save the face image. 130 Figure 5-107 Addition completed Users Manual Step 5 Fill in face image information. Step 6 Click Add to task list. Step 7 Click
. Figure 5-108 Task list addition completed Click Remove All to remove all the tasks. Batch Registration You can import multiple face images in batches. Use this method when registering a large number of face images. Before importing images in batches, name the face images in the format of
"Name#SGender#BDate of Birth#NRegion#TCredentials Type#MID No. jpg" (for example,
"John#S1#B1990-01-01#NCN#T1#M330501199001016222"). 131 Users Manual Name is required and the rest are optional. Table 5-37 Naming rules for batch import Naming Rules Description Enter the corresponding name. Enter a number. 1: Male; 2: Female. Name Gender Date of Birth Enter numbers in the format of yyyy-mm-dd. For example, 2017-
11-23. Region Enter the region name. Credentials Type Enter a number. 1: ID card; 2: passport. ID No. Enter ID No. Step 1 Select Setting > Event > Face Recognition > Face Database Config. The Face Database Config interface is displayed. Step 2 Click More Info for the face database to be configured. The Face Database interface is displayed. Step 3 Click Batch Registration. Figure 5-109 Batch registration Step 4 Click to select the file path. 132 Figure 5-110 Batch registration Users Manual Step 5 Click Browse. Figure 5-111 Registering Step 6 After the registration is completed, click Next to view the registration result. 5.5.7.2.3 Managing Face Images Modifying Face Information You can add face images to face database; manage and maintain face images to ensure correct information. On the Face Database Config page, move the mouse pointer to the face image or person information line, and then click or
. After modifying the face image information, click Add to task list. 133 Figure 5-112 Registration page Users Manual Deleting Face Images Enter face database, and then delete the created face image. Single deletion: Move the mouse pointer to the face image or people information line, and then click or to delete the face image. Batch deletion: Move the mouse pointer to the face image or people information line, and then click at the upper right corner of the face images, or click on person information line. After selecting multiple items, click Add to the delete list, click
, and then click OK to delete the selected face images. Delete all: When viewing face images in a list, click on people information line (or select All when viewing face images in images), click Add to the delete list, click
, and then click OK to delete all face images. 5.5.7.2.4 Face Modeling You can extract and import the relevant information of face images into the database through face modeling, and create a face feature mode for smart detection such as face comparison. The more face images you choose, the longer the modeling time is. During the modeling process, some smart detection functions (such as face comparison) are temporarily unavailable and can be resumed after the modeling is complete. Step 1 Select Setting > Event > Face Recognition > Face Database Config. Step 2 Click More Info for the face database to be configured. 134 Figure 5-113 Face database page Users Manual Step 3 Select the face images for modeling Click thumbnail. Modeling All Selective Modeling to view the face image in a list. Click to view the face image as a Click Modeling All, and all face images in the face database will be modeled. If there are many face images in the face database, set filtering conditions and then click Search to select face images for modeling. Figure 5-114 Modeling completed 5.5.7.3 Alarm Linkage Set the alarm linkage mode for face comparison. Step 1 Select Setting > Event > Face Recognition > Alarm. Figure 5-115 Alarm linkage Step 2 Configure alarm linkage parameter. 135 Users Manual Table 5-38 Description of alarm linkage parameter Parameter Description Face Database Select the face database to be configured with alarm linkage. Alarm Rule Select the alarm rule as needed. Relay-out Alarm Delay Step 3 Click Save. Select the Relay-out check box, and when an alarm is triggered, the system interacts with the linked alarm devices. The alarm will continue for an extended period of time. The value range is 1300 s. 5.5.8 People Counting You can use this function to count the number of people in the area and generate reports. Before using this function, you need to enable People Counting in Smart Plan. The people counting data will be overwritten if the disk is full. Back up the data in time as needed. This function is available on select models. 5.5.8.1 People Counting Settings With the function, the system can count the number of people appearing in the monitoring screen within a certain period. Step 1 Select Setting > Event > People Counting > People Counting. 136 Figure 5-116 People counting settings Users Manual Step 2 Select the presets to be configured. Step 3 Click Draw Rule, and you can draw rules on the monitoring screen. For parameter description, see Table 5-28. Click Clear to the right of Draw Rule, and you can clear all drawn rules. Step 4 Configure people counting parameter. Table 5-39 Description of people counting parameter Parameter Description OSD Enter No. Leave No. Display the number of people displayed in the area in real time. Click Clear, and the current number will be zero. Set the Enter No., and when the number of people entering reaches the set value, an alarm will be triggered. Set the Leave No., and when the number of people leaving reaches the set value, an alarm will be triggered. Stranded No. Set the Stranded No., and when the number of people staying reaches the set value, an alarm will be triggered. For other parameters, see "5.5.5.1 Tripwire". Step 5 Click Save. 137 5.5.8.2 Report You can view the statistics results of people in the scene during the selected period. Step 1 Select Setting > Event > People Counting > Report. Figure 5-117 People counting report Users Manual Step 2 Select a preset. Step 3 Select the Rule, Statistics Type, and Time Range. Step 4 Select the start time and end time for searching reports. Step 5 Select Flow Direction and Chart Type. Step 6 Click Search to generate reports, and then click Export to export the report to local storage. 5.5.9 Heat Map in the Smart Plan. Before enabling Heat Map, you need to set presets in PTZ section, and select the function The data will be overwritten if the disk is full. Back up the data in time. This function is available on select models. 5.5.9.1 Heat Map Settings The function can be used to detect the activity level of moving objects in the scene during a certain period. Step 1 Select Setting > Event > Heat Map > Heat Map. 138 Figure 5-118 Heat map Users Manual Step 2 Select the presets to be configured. Step 3 Select the Enable check box to enable heat map function. Step 4 Click Setting to set the arming period. For details, see "5.5.1.1 Motion Detection". Step 5 Click Save. 5.5.9.2 Report You can view the heat map report for the scene in the selected period. Step 1 Select Setting > Event > Heat Map > Report. Step 2 Set the start time and end time to search for the heat map report. Step 3 Select a preset. Step 4 Click Search, and the search results will be displayed on the page. 139 Figure 5-119 Report Users Manual 5.5.10 Video Metadata With the function, the system can count the number of motor vehicles, non-motor vehicles and people in the monitoring screen, identify the features of the vehicles and people in the scene, and take snapshots. Before using video metadata, you need to enable the function in the Smart Plan. This function is available on select models. 5.5.10.1 Scene Setting Set the parameters of snapshot, analysis and alarm in the scene. Step 1 Select Setting > Event > Video Metadata. 140 Figure 5-120 Scene setting Users Manual Step 2 Click the Preset list to select the preset to configure video metadata. Step 3 Click to add a rule type. Step 4 Modify the parameters. Double-click the name to modify the rule name. Select the rule type from People, Non-motor Vehicle and Motor Vehicle. Click the corresponding to delete detection items. Step 5 Configure scene setting parameters. Table 5-40 Description of scene setting parameter Description Parameter People Flow Statistics Non-motor Vehicle Flow Statistics Traffic Flow Statistics After selection, traffic flow statistics will be displayed on the screen. Select the check box to enable the OSD overlay. The statistics will be displayed on the Live page in the form of OSD information. Click it to clear the statistics of motor vehicles, non-motor vehicles and people. OSD Clear For other parameters, see "5.5.5.1 Tripwire". Step 6 Click Save. 141 5.5.10.2 Picture Overlay Set the overlay information on the snapshot. Step 1 Select Setting > Event > Video Metadata > Overlay. Step 2 Select Picture Overlay Type from People, Non-motor Vehicle and Motor Vehicle. Figure 5-121 Picture overlaymotor vehicle Users Manual Figure 5-122 Picture overlaynon-motor vehicle 142 Figure 5-123 Picture overlaypeople Users Manual Step 3 Select overlay information. Step 4 Click Save. 5.5.10.3 Report If you select Location, you need to manually enter the location of the Device. You can view the number of vehicles, non-vehicles and people in the scene during the selected period. Step 1 Select Setting > Event > Video Metadata > Report. Step 2 Select the Report Type. Step 3 Select the start time and end time for searching reports. Step 4 Select Traffic Flow Statistics Type. Step 5 Click Search to generate reports. Figure 5-124 Video metadata report 143 5.5.11 Alarm Step 1 Select Setting > Event > Alarm. Figure 5-125 Alarm Users Manual Step 2 Configure alarm setting parameters. Table 5-41 Description of alarm setting parameter Parameter Description Enable Relay-in Sensor Type Select the Enable check box, and then the alarm linkage is enabled. Select alarm input, and 7 alarm inputs are available. There are two types: NO (normally open) and NC (normally closed). Switch from NO to NC, and alarm event will be enabled. Switch from NC to NO, and alarm event will be disabled. For other parameters, see "5.5.1.1 Motion Detection". Step 3 Click Save. 5.5.12 Abnormality Abnormality includes 7 alarm events: No SD Card, Capacity Warning, SD Card Error, Disconnection, IP Conflict, Illegal Access, and Security Exception. 144 5.5.12.1 SD Card In case of an SD card exception, an alarm will be triggered. Step 1 Select Setting > Event > Abnormality > SD Card. Figure 5-126 No SD card Users Manual Figure 5-127 SD card error Figure 5-128 Capacity warning 145 Users Manual Step 2 Configure SD card exception parameters. Table 5-42 Description of SD card exception parameter Description Select the check box to enable this function. Configure the free space percentage, and if the free space in the SD card is less than the defined percentage, an alarm is triggered. Parameter Enable Capacity Limit For other parameters, see "5.5.1.1 Motion Detection". Step 3 Click Save. 5.5.12.2 Network Exception In case of a network exception, an alarm will be triggered. Step 1 Select Setting > Event > Abnormality > Network. Figure 5-129 Disconnection Figure 5-130 IP conflict 146 Users Manual Step 2 Configure network exception parameters. Table 5-43 Description of network exception parameter Parameter Description Enable Select the check box to enable this function. For other parameters, see "5.5.1.1 Motion Detection". Step 3 Click Save. 5.5.12.3 Illegal Access Illegal access alarm is triggered when the login password has been wrongly entered for more than the times you set. Step 1 Select Setting > Event > Abnormality > Illegal Access. Figure 5-131 Illegal access Step 2 Configure illegal access parameters. Table 5-44 Description of illegal access parameter Description Parameter Enable Login Error Select the check box to set the illegal access alarm. After entering a wrong password for the set times, the alarm for illegal access will be triggered, and the account will be locked. For other parameters, see "5.5.1.1 Motion Detection". Step 3 Click Save. 5.5.12.4 Security Exception When an event affecting the Device safety occurs, an alarm for safety exception will be triggered. Step 1 Select Setting > Event > Abnormality > Security Exception. 147 Figure 5-132 Security exception Users Manual Step 2 Configure security exception parameter. For details, see "5.5.1.1 Motion Detection". Step 3 Click Save. 5.5.12.5 Battery Exception When overtemperature of the battery is detected, alarm linkage actions are performed. Step 1 Select Setting > Event > Abnormality > Battery Exception. Figure 5-133 Battery exception Step 2 Select the Enable check box to enable battery exception detection. Step 3 Set alarm linkage actions. Step 4 Click Save. 148 Users Manual 5.6 Storage 5.6.1 Schedule 5.6.1.1 Record Before setting the schedule, make sure that the Record Mode is Auto in Record Control. If the Record Mode is Off, the Device will not record or take snapshots according to the schedule. Step 1 Select Setting > Storage > Schedule > Record. Figure 5-134 Record Step 2 Select the day for recording from Monday to Sunday, and then click Setting on the right. Set the recording period. You can set up to six periods for one day. You can select 3 types of recording: General, Motion and Alarm. To set the time period, you can also press and hold the left mouse button and drag directly on the Record page. 149 Figure 5-135 Record schedule setting Users Manual Step 3 Click Save to return to the Record page. At this time, the colored chart visually displays the defined period.
: Represents general recording.
: Represents motion detection recording.
: Represents alarm recording. Figure 5-136 Recording schedule setting completed Step 4 On the Record page, click Save, and the Save Succeeded! prompt will be displayed, which means the recording schedule has been set. 5.6.1.2 Snapshot Step 1 Select Setting > Storage > Schedule > Snapshot. 150 Figure 5-137 Snapshot Users Manual Step 2 Set snapshot schedule. For details, refer to Step2 and Step3 in "5.6.1.1 Record". Step 3 Click Save, and the Save Succeeded! prompt will be displayed, which means the snapshot schedule has been set. 5.6.1.3 Holiday Schedule You can set specific dates as holidays. Step 1 Select Setting > Storage > Schedule > Holiday Schedule. Figure 5-138 Holiday schedule 151 Users Manual Step 2 Select a date. The selected date will be a holiday and displayed in yellow. Step 3 Select Record or Snapshot, and then click Save. The Save Succeeded! prompt will be displayed. Step 4 On the Record or Snapshot page, click Setting to the right of Holiday. The setting method is the same as that of Monday to Sunday. Step 5 Set the period of one day for the Holiday, and the recording or snapshot will be taken according to the holiday time period. 5.6.2 Snapshot by Location The system can take snapshots when the Device rotates to certain presets. You need to set presets in advance. Step 1 Select Setting > Storage > Snapshot by Location. Figure 5-139 Snapshot by location Step 2 Select presets. Enable snapshot by location. Click to enable the function for the corresponding preset.
, and then select All Enabled to enable the function for all Click presets. Disable snapshot by location. Click to disable the function for the corresponding preset. Click
, and then select All Disabled to disable the function for all presets. Step 3 Click Save. 152 5.6.3 Destination 5.6.3.1 Path Configure the storage path of recordings and snapshots of the Device, and select local SD card, FTP and NAS for storage. Store recordings and snapshots according to the event type, respectively corresponding to General, Motion and Alarm in the schedule, and then select the corresponding type of recordings or snapshots for storage. Step 1 Select Setting > Storage > Destination > Path. Figure 5-140 Path settings Users Manual Step 2 Select the corresponding event type and storage method. Parameter Event Type Local FTP NAS Step 3 Click Save. Table 5-45 Description of path parameter Description Select Scheduled, Motion Detection or Alarm. Save recordings or snapshots to the SD card. Save recordings or snapshots to the FTP server. Save recordings or snapshots to the NAS server. 5.6.3.2 FTP FTP function can be enabled only when it is selected as a destination path. When the network is disconnected or does not work, you can save recordings and snapshots to the SD card by using Emergency (Local) function. Step 1 Select Setting > Storage > Destination > FTP. 153 Figure 5-141 FTP settings Users Manual Step 2 Select the Enable check box to enable FTP function. There might be risks if the FTP function is enabled. Think twice before enabling the function. SFTP is recommended to ensure network security. Step 3 Configure FTP parameters. Table 5-46 FTP parameter description Parameter Description Server Address The IP address of the FTP server. Port Username Password The port number of the FTP server. The username to log in to the FTP server. The password to log in to the FTP server. Remote Directory The destination path on the FTP server. Emergency (Local) If you enable the function, in case of FTP storage exception, the recordings and snapshots will be stored on the local SD card. Step 4 Click test to verify the username and password, and test whether FTP is connected to the Device. Step 5 Click Save. 5.6.3.3 Local SD card information is displayed in the local storage list. You can set it as read only or read &
write. You can also hot swap or refresh it. 154 Users Manual Dual SD cards are supported by some devices. For such devices, the SD card first inserted is called Local Disk 1, and the SD card inserted later is called Local Disk 2. If no recordings in both cards, the recording will be saved to Local Disk 1, and then saved to Local Disk 2 when Disk 1 is full. If there are recordings in both cards, the recording will be saved to the card with the latest recordings, and then saved to the other card when this card is full. Step 1 Select Setting > Storage > Destination > Local. Figure 5-142 Local storage Step 2 Select the SD card to be set, and then perform the following operations as needed. Click Read Only to set the SD card to be read only. Click Read & Write to set the SD card to be read and write. Click Hot Swap to remove or insert the SD card when the Camera is running. Click Format to format the SD card. After formatting the SD card, all data on it will be cleared. Be cautious. 5.6.3.4 NAS This function can be enabled only when NAS is selected as a destination path. Select NAS to store files on the NAS server. Step 1 Select Setting > Storage > Destination > NAS. Figure 5-143 NAS settings Step 2 Configure NAS setting parameters. 155 Users Manual Table 5-47 NAS parameter description Parameter Description Enable Select the check box to enable NAS function. Select NFS or SMB function. There might be risks if NFS or SMB is enabled. Think twice before enabling the function. Server Address The IP address of the NAS server. Remote Directory Step 3 Click Save. The destination path on the NAS server. 5.6.4 Record Control Step 1 Select Setting > Storage > Record Control. Figure 5-144 Record control Step 2 Configure record control parameters. Table 5-48 Record control parameter description Parameter Description Pack Duration Set the pack duration of each recording file. It is 30 minutes by default. Pre-event Record Set the pre-recording time. For example, if you enter 5, when an alarm is triggered, the system reads the recording of the first 5 seconds in memory, and then records it into a file. If alarm recording or motion detection recording occurs, if there is no recording before, the video data within N seconds before the recording is started will also be recorded into the video file. 156 Parameter Description Users Manual Disk Full recording when the disk is full. You can select Stop or Overwrite. Stop: The system stops recording when the disk is full. Overwrite: The system overwrites the oldest files and keeps The data will be overwritten if the disk is full. Back up the file in time as needed. You can select Auto, Manual or Off. Select Manual mode to start recording immediately, and select Auto mode to record within the schedule. Select Main Stream or Sub Stream. Record Mode Record Stream Step 3 Click Save. 5.7 System Management 5.7.1 Device Settings 5.7.1.1 General Step 1 Select Setting > System > General > General. Figure 5-145 General settings Step 2 Configure general setting parameters. Table 5-49 Description of general setting parameter Parameter Description Set the device name. Name Different devices have different names. Language Select the language to be displayed. Video Standard Step 3 Click Save. Select video standard from PAL and NTSC. 157 5.7.1.2 Date & Time Step 1 Select Setting > System > General > Date&Time. Figure 5-146 Date & time Users Manual Step 2 Configure date &time parameters. Table 5-50 Description of date & time parameter Parameter Description Date Format Time Format Select the date format. Three formats are available: YYYY-MM-
DD, MM-DD-YYYY and DD-MM-YYYY. Select the time format. Two formats are available: 24-Hour and 12-Hour. Time Zone Set the local time zone. Current Time The current time of the Device. DST NTP Server Port Interval Set the Start Time and End Time of DST in the Date format or Week format. Select the NTP check box to enable the network time sync function. Set the address of the time server. Set the network timing function of NTP server, and the Device time will be synchronized with the server time. Set the port number of the time server. Set the synchronization interval of the Device and the time server. 158 Users Manual Step 3 Click Save. 5.7.1.3 Screen Off Settings The function is available on select models. You can set the screen-off time of the device display. Step 1 Select Setting > System > General > Screen Off Settings. Figure 5-147 Screen off settings Step 2 Set screen-off time. Never: The screen is never turned off. Custom: Customize the screen-off time. Step 3 Click Save. 5.7.2 Account Settings 5.7.2.1 Account User management is only available for admin users. For Username and Group Name, the maximum length is 15 characters. Username can only consist of numbers, letters, underlines, dots and @; group name can only consist of numbers, letters and underlines. The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special characters (excluding '
" ; : &). The confirming password shall be the same as the new password. Set a high security password according to the prompt of password strength. The number of users and groups is 19 and 8 respectively by default. User management adopts a two-level method of group and user. Neither group names nor user names can be duplicated, and a user can only belong to one group. Users currently logged in cannot modify their own permissions. The user is admin by default. The admin account is defined as high privileged user. 5.7.2.1.1 Username Select Setting > System > Account > Account > Username to enable anonymous login, add users, delete users, modify user passwords or perform other operations. 159 Figure 5-148 Account interface Users Manual No permission is available for version information and other buttons except Relay-out, Mark, and Wiper Control on the Live interface for the time being. Anonymous Login Select the Anonymous Login check box, and you can log in to the Device anonymously without username and password after entering IP. Anonymous users only have preview permission in the permission list. In the anonymous login, click Logout to log in to the Device by using other usernames. After Anonymous Login is enabled, the user can view audio and video data without authentication. Think twice before enabling the function. Adding Users Add users in the group and set permissions. As the default user with the highest authority, admin cannot be deleted. Step 1 Click Add User. 160 Figure 5-149 Add users Users Manual Step 2 Enter Username and Password, confirm password, select Group Name, and then add Memo. Step 3 Set Operation Permission and Restricted Login. Operation Permission: Click Operation Permission, and then select the operation permission of the user as needed. Restricted Login: Click Restricted Login, and the interface shown in Figure 5-
150 is displayed. You can control login to the Device by setting the IP Address, Validity Period and Time Range. Once the group is selected as needed, the user permission can only be a subset of the group, and cannot exceed its permission attributes. It is recommended to give less permissions to general users than advanced users. 161 Figure 5-150 Restricted login Users Manual Step 4 Click Save. Modifying Users Step 1 Click corresponding to the user you want to modify. 162 Figure 5-151 Modify users Users Manual Step 2 Modify user information. Step 3 Click Save. Modifying Password Step 1 Select the Modify Password check box. Step 2 Enter old password and new password, and then confirm password. Step 3 Click Save. Deleting Users 5.7.2.1.2 Group Name Click corresponding to the user to be deleted, and the user can be deleted. Users/user groups cannot be recovered after deletion. Think twice before performing the operation. Select Setting > System > Account > Account > Group Name to add groups, delete groups, modify group passwords or perform other operations. Figure 5-152 User group settings 163 Configuring User Group The default authorities of Admin group includes live, playback, storage, file backup, user, system, system info, manual control, maintenance, peripheral, PTZ, security, network, event and AV parameters; the default authorities of User group include live and playback. Table 5-51 Description of user group parameters Group Authority Admin Functions Users Manual Event YES NA User Live Playback System System Info Manual Control File Backup Storage Network Peripheral AV Parameter PTZ Security Maintenance YES YES YES YES YES YES YES YES YES YES YES YES YES YES Add, delete and check user/user group. Real-time stream view. Playback view. System time setting and more. Version information, system logs and more. PTZ settings. File backup. Storage point configuration, snapshot recording time configuration, SFTP configuration and more. Video detection settings, audio detection settings, alarm settings and more. IP settings, SMTP settings, SNMP settings, AP Hotspot settings and more. External light, wiper and serial port settings. Camera property settings, audio and video settings and more. Preset settings, tour settings and more. HTTPS settings, RTSP over TLS settings and more. Automatic maintenance settings and more. Any user in the Admin group has User authority to modify group authority. The User group does not have this authority. The functions of the device correspond to the authority control respectively. Only user with specified authority can use corresponding function; the Admin group has all the authorities. Adding Groups Modifying Groups For specific operations, refer to "5.7.2.1.1 Username". For specific operations, refer to "5.7.2.1.1 Username". User NA YES YES NA NA NA NA NA NA NA NA NA NA NA 164 Users Manual Deleting Groups 5.7.2.2 ONVIF User Procedure For specific operations, refer to "5.7.2.1.1 Username". On the web page, you can add ONVIF users, or modify existing users. Step 1 Select Setting > System > Account > Onvif User. Figure 5-153 Onvif user Step 2 Click Add User. Figure 5-154 Add users Step 3 Set the username and password, confirm password, and then select the group name. Step 4 Click Save. Related Operations Click to modify user information. Click to delete users. 5.7.3 Safety 5.7.3.1 RTSP Authentication Set the authentication method for media stream. Step 1 Select Setting > System > Safety > RTSP Authentication. 165 Figure 5-155 RTSP authentication Users Manual Step 2 Select the Authorize Mode. You can select from Digest, Basic and None. It is Digest by default. Click Default, and Digest is selected automatically. Select None, and "Non-authentication mode may have risk. Are you sure to enable it" prompt will be displayed. Think twice before selecting the mode. Select Basic mode, and "Basic authentication mode may have risk. Are you sure to enable it?" prompt will be displayed. Think twice before selecting the mode. 5.7.3.2 System Service You can configure system service to ensure system security. Step 1 Select Setting > System > Safety > System Service. Figure 5-156 System service Step 2 Configure system service parameters. 166 Table 5-52 Description of system service parameter Function Description You can enable SSH authentication to perform safety management. The function is disabled by default. Users Manual SSH Multicast/Broadcast Search Password Reset CGI Service Onvif Service Audio and Video Transmission Encryption Mobile Push Private Protocol Authentication Mode Step 3 Click Save. It is recommended to disable SSH. If this function is enabled, there might be security risks. Enable this function, and when multiple users are viewing the monitoring screen simultaneously through network, they can find the Device through multicast/broadcast protocol. It is recommended to disable the multicast/broadcast search function. If this function is enabled, there might be security risks. You can enable Password Reset to perform security management. The function is enabled by default. If the function is disabled, you can only reset the password after restoring the Device to factory defaults through pressing the Reset button on the device. You can access the Device through this protocol. The function is enabled by default. It is recommended to disable the function. If this function is enabled, there might be security risks. You can access the Device through this protocol. The function is enabled by default. It is recommended to disable the function. If this function is enabled, there might be security risks. Enable this function to encrypt the stream transmitted through the private protocol. Make sure that the matched devices or software support video decryption function. It is recommended to enable the function. If the function is disabled, there might be risk of data leakage. Push the alarm snapshot triggered by the Device to the mobile phone. The function is enabled by default. It is recommended to disable the function. If this function is enabled, there might be security risks. You can select Security Mode and Compatible Mode. Security mode is recommended. If you select compatibility mode, there might be security risks. 167 Users Manual 5.7.3.3 HTTPS It is recommended to enable HTTPS service. If the service is disabled, there might be risk of data leakage. Create certificate or upload signed certificate, and then you can log in through HTTPS with your PC. HTTPS can ensure data security, and protect user information and device security with reliable and stable technology. Step 1 Create certificate or upload the signed certificate. If you select Create Certificate, refer to the following steps. 1) Select Setting > System > Safety > HTTPS. Figure 5-157 HTTPS (1) 2) Click Create. 168 Figure 5-158 HTTPS (2) Users Manual 3) Enter the required information, and then click Create. The entered IP or domain name must be the same as the IP or domain name of the Device. 4) Click Install to install the certificate on the Device. Figure 5-159 Certificate installation 5) Click Download to download root certificate. 169 Figure 5-160 Download root certificate Users Manual 6) Select storage path, and then click Save. 7) Double-click the RootCert.cer icon. Figure 5-161 Certificate information 8) Click Install Certificate. 170 Figure 5-162 Certificate import wizard Users Manual 9) Click Next, and then select Trusted Root Certification Authorities. Figure 5-163 Certificate storage area 10) Click Next. 171 Figure 5-164 Completing the certificate import wizard Users Manual 11) Click Finish. Figure 5-165 Security warning 12) Click Yes, and then click OK to complete the certificate installation. 172 Figure 5-166 Import success Users Manual If you select Install Signed Certificate, refer to the following steps. 1) Select Setting > System > Safety > HTTPS. Figure 5-167 Install signed certificate 2) Click Browse to upload the signed certificate and certificate key, and then click Upload. 3) Install the root certificate. For details, see 5) to 12) in Step1. Step 2 Select Enable HTTPS, and then click Save. The configuration takes effect after reboot. Figure 5-168 Reboot Enter https://xx.xx.xx.xx in the browser to open the login interface. If no certificate is installed, a certificate error prompt will be displayed. 173 If HTTPS is enabled, you cannot access the Device through HTTP. The system will switch to HTTPS if you access the Device through HTTP. The deletion of created and installed certificates cannot be restored. Think twice before deleting them. Users Manual 5.7.3.4 Firewall Set a firewall for the Device to prevent network attacks after the Device is connected to the network. Step 1 Select Setting > System > Safety > Firewall. Figure 5-169 Firewall Step 2 Select the type of network attack that the firewall resists. You can select Network Access, PING Prohibited, or Prevent Semijoin. Step 3 Select Enable to enable Firewall ifunction. Step 4 Click Save. 5.7.4 Peripheral The peripheral functions might vary with different models. Step 1 Select Setting > System > Peripheral > Wiper. Figure 5-170 Wiper settings Step 2 Configure wiper parameters. 174 Users Manual Table 5-53 Description of wiper setting parameter Parameter Description Mode Set the wiper mode. It is Manual by default. In Manual mode, you need to manually start the wiper. Interval Time The time between wiper starting to wiper ending. Set the maximum duration of the wiper operating once in Manual mode. The value ranges from 10 minutes to 1440 minutes. Working Duration Step 3 Click Save. 5.7.5 Default All information except IP address and user management will be restored to defaults. Think twice before performing the operation. Select Setting > System > Default, and click Default to restore the Device. Figure 5-171 Default page Select the recovery mode. Default: All information except IP address and user management will be restored to defaults. Factory Default: The function is equivalent to the Reset button of the Device. All configuration information of the Device can be restored to the factory defaults, and the IP address can also be restored to the original IP address. After clicking Factory Default, you need to enter the password of admin user on the page displayed. The Device can be restored to factory defaults only after the system confirms that the password is correct. Only admin user can use this function. When the Device is restored to factory defaults, all information except the data in the external storage media will be erased. Delete data in external storage media by formatting and other methods. 5.7.6 Import/Export When multiple devices share the same configuration methods, they can be quickly configured by importing and exporting configuration files. Step 1 On the web page of one device, select Setting > System > Import/Export. 175 Figure 5-172 Import/Export Users Manual Step 2 Click Export to export the configuration file (.backup file) to the local storage path. Step 3 Click Import on the Import/Export page of the Device to be configured to import the configuration file, and the Device will complete the configurations. 5.7.7 System Maintenance 5.7.7.1 Auto Maintain You can select Auto Reboot or Auto Delete Old Files. If you select Auto Reboot, the frequency and time need to be set. If you select Auto Delete Old Files, you need to set the time period for the files to be deleted. Step 1 Select Setting > System > Auto Maintain. Figure 5-173 Auto maintain Step 2 Configure parameters of auto maintain. Table 5-54 Description of auto maintain parameter Parameter Description Auto Reboot Select the check box to set the Device reboot time. Auto Delete Old Files Select the check box to customize the time period for the files to be deleted. The value ranges from 1 day to 31 days. When you enable the function, The deleted files cannot be recovered. Are you sure to enable this function now? prompt will be displayed. Think twice before enabling the function. 176 Users Manual Step 3 Click Save. 5.7.7.2 Emergency Maintenance By enabling emergency maintenance, you can fix most issues caused by upgrade and configuration. Step 1 Select Setting > System > Auto Maintain > Emergency Maintenance. Figure 5-174 Auto maintain Step 2 Click Save. 5.7.8 Upgrade Upgrade the system to improve device function and stability. If wrong upgrade file has been used, restart the Device; otherwise some functions might not work properly. Select Setting > System > Upgrade. Figure 5-175 System upgrade File Upgrade: Click Browse, select the upgrade file, and then click Upgrade to upgrade the firmware. The upgrade file is in the format of *.bin. Online Upgrade 1. Select the Auto-check for updates check box. This will enable the system to check for upgrade once a day automatically, and there 177 2. Click Save. 5.8 Information 5.8.1 Version will be system notice if any upgrade is available. Users Manual We need to collect the data such as IP address, device name, firmware version, and device serial number to perform auto-check. The collected information is only used to verify the legitimacy of the Device, and push the upgrade notification. Click Manual Check, and you can check for upgrade manually. You can view information such as version, online users, log, and life statistics. You can view information such as system hardware features, software version and release date. Select Setting > Information > Version > Version to view the version information of current web interface. Figure 5-176 Version 5.8.2 Log Information 5.8.2.1 Log Select Setting > Information > Log > Log to view the operation information of the Device and system information. 178 Figure 5-177 Log Users Manual Table 5-55 Log parameter description Parameter Description Start Time End Time Type Search Detailed Information Clear The start time of the log to be searched (January 1, 2000 is the earliest time). The end time of the log to be searched (December 31, 2037 is the latest time). The log type includes All, System, Setting, Data, Event, Record, Account, Clear Log, and Safety. Set the start time and end time of the log to be searched, select the log type, and then click Search. The searched log number and time period will be displayed. Click a log to display the details. Clear all logs of the Device, and classified clearing is not supported. Back up the searched system logs to the PC currently used by the user. Backup The data will be overwritten if the disk is full. Back up the data in time as needed. Here are the meanings of different log types. System: Includes program launch, force exit, exit, program reboot, device shutdown/restart, system reboot, and system upgrade. Setting: Includes saving configurations, and deleting configuration files. Data: Includes disk type configurations, data erasing, hot swap, FTP state, and recording mode. Event (records events such as video detection, smart plan, alarm, and abnormality):
Includes starting events, and ending events. Record: Includes file access, file access error, and file search. Account (records modification of user management, login, and logout): Includes login, logout, adding user, deleting user, modifying user, adding group, deleting group, and 179 Users Manual modifying group. Safety: Includes security-related information. Clear Log: Clearing logs. 5.8.2.2 Remote Log Upload the Device operations to the log server. Step 1 Select Setting > Information > Log > Remote Log. Figure 5-178 Remote log Step 2 Select Enable to enable remote log function. Step 3 Set the IP Address, Port and Device Number of the log server. Click Default to restore the Device to the default settings. 5.8.3 Online User Select Setting > Information > Online User to view online users. Figure 5-179 Online users 5.8.4 Life Statistics Select Setting > Information > Life Statistics to view the life statistics of the Device. 180 The function is available on select models. Figure 5-180 Online users Users Manual 5.8.5 Battery Status Select Setting > Information > Battery Status to view battery usage of the Device. The function is available on select models. Figure 5-181 Battery status 5.8.6 Legal Information Select Setting > Information > Legal Info to view legal information of the Device. Click Software License Agreement, Privacy Policy and Open Source Software Notice to respectively view the corresponding content. 181 The function is available on select models. Figure 5-182 Legal information Users Manual 182 6 Alarm Users Manual You can select alarm types on the page. When the selected alarms are triggered, detailed alarm information will be displayed on the right side of the page. You can also select Prompt or Play Alarm Tone. When an alarm occurs, the alarm prompt or tone will be triggered. Figure 6-1 Alarm setting page Table 6-1 Description of alarm setting parameter Category Parameter Description Alarm Type Motion Detection Disk Full Disk Error Video Tamper External Alarm Illegal Access Audio Detection IVS Scene Changing Record alarm information in case of motion detection. Record alarm information in case of full disk. Record alarm information in case of disk error. Record alarm information in case of video tampering. Record alarm information in case of an external alarm. Record alarm information in case of illegal access. Record alarm information in case of audio detection. Record alarm information in case of smart events. Record alarm information in case of scene changing. Security Exception Record alarm information in case of security exception. 183 Category Parameter Description Operation Prompt Users Manual Select the Prompt check box. When you are not on the Alarm page, and the selected alarm event is triggered, the Relay-out button on the main menu will change to
, and the alarm information will be automatically recorded. After you click the Alarm menu bar, the button disappears. If you are on the Alarm page, there will be no image prompt when the selected alarm event is triggered, but the corresponding alarm information will be recorded in the alarm list on the right. Select the check box, and then select the tone file path. When the selected alarm event is triggered, the selected tone file will be played to prompt you that an alarm event is triggered. Alarm Tone Play Alarm Tone Tone Path Customize the storage path for alarm tones. 184 Users Manual Click Logout to log out, and the login page is displayed. Enter the username and password to log in again. 7 Logout Figure 7-1 Login page 185 Appendix 1 Cybersecurity Recommendations Users Manual Cybersecurity is more than just a buzzword: its something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations from Dahua on how to create a more secured security system. Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters. Include at least two types of characters; character types include upper and lower case letters, numbers and symbols. Do not contain the account name or the account name in reverse order. Do not use continuous characters, such as 123, abc, etc. Do not use overlapped characters, such as 111, aaa, etc. 2. Update Firmware and Client Software in Time According to the standard procedure in Tech-industry, we recommend to keep your equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with the latest security patches and fixes. When the equipment is connected to the public network, it is recommended to enable theauto-check for updates function to obtain timely information of firmware updates released by the manufacturer. We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection We suggest that you perform physical protection to equipment, especially storage devices. For example, place the equipment in a special computer room and cabinet, and implement well-done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable equipment (such as USB flash disk, serial port), etc. 2. Change Passwords Regularly We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 3. Set and Update Passwords Reset Information Timely The equipment supports password reset function. Please set up related information for password reset in time, including the end users mailbox and password protection questions. If the information changes, please modify it in time. When setting password protection questions, it is suggested not to use those that can be easily guessed. 4. Enable Account Lock The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked. 5. Change Default HTTP and Other Service Ports 186 Users Manual We suggest you to change default HTTP and other service ports into any set of numbers between 102465535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing. 8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks. If necessary, it is highly recommended that you use safe modes, including but not limited to the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords. SMTP: Choose TLS to access mailbox server. FTP: Choose SFTP, and set up strong passwords. AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 10. Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission. Reminder: encrypted transmission will cause some loss in transmission efficiency. 11. Secure Auditing Check online users: we suggest that you check online users regularly to see if the device is logged in without authorization. Check equipment log: By viewing the logs, you can know the IP addresses that were used to log in to your devices and their key operations. 12. Network Log Due to the limited storage capacity of the equipment, the stored log is limited. If you need to save the log for a long time, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing. 13. Construct a Safe Network Environment In order to better ensure the safety of equipment and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks. 187 Enable IP/MAC address filtering function to limit the range of hosts allowed to access Users Manual the device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations. 188 Users Manual
1 | Label and Label Location | ID Label/Location Info | 847.17 KiB | January 18 2022 |
30.00 15.00 This device complies with part 15 of the FCC Rules. Operation is subject accept any intert including interference that may cause undesired operation. D=1.0mm_ NETWORK PTZ CAMERA @hua TECHNOLOGY DH-SD2A200-GN-AW-PV 12V ===,1.5A SAFETY CODE:L21 24563|
P/N:1.0.01.07.14355 s hed S/N: 2M0024EPAG04078 FCC ID:SVNDH-SD2AX MADE IN CHINA ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. warning label location VLMa LN TREY ECT KOA IW SNS \
Te) a) A ee a ad AS
1 | Authorization Letter | Cover Letter(s) | 283.53 KiB | January 18 2022 |
ZHEJIANG DAHUA VISION TECHNOLOGY Co.,LTD. No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China Date: 2021/12/27 Federal Communications Commission 7435 Oakland Mills Road Columbia MD 21046 To whom it may concern:
I, the undersigned, hereby authorize UL Verification Services Inc. to act on our behalf in all manners relating to application for equipment authorization, including signing of all documents relating to these matters. Any and all acts carried out by UL Verification Services Inc. on our behalf shall have the same effect as acts of our own. I, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a). In authorizing UL Verification Services Inc. as our representative, we still recognize that we are responsible to:
a) comply with the relevant provisions of the certification program;
b) c) d) e) f) make all necessary arrangements for the conduct of the evaluation, including provision for examining documentation and access to all areas, records (including internal audit reports) and personnel for the purposes of evaluation (e.g. testing, inspection, assessment, surveillance, reassessment) and resolution of complaints;
make claims regarding certification only in respect of the scope for which certification has been granted;
do not use our product certification in such a manner as to bring the Certification Division into disrepute and not make any statement regarding our product certification which the Certification Division may consider misleading or unauthorized;
upon suspension or cancellation of certification, discontinue use of all advertising matter that contains any reference thereto and return any certification documents as required by the Certification Division;
use certification only to indicate the products are certified as being in conformity with specified standards;
g) h) i) j) endeavor to ensure that no certificate or report nor any part thereof is used in a misleading manner;
ensure that any reference to our product certification in communication media such as documents, brochures or advertising, complies with the requirements of the Certification Division;
keep a record of all complaints made known to us relating to the products compliance with requirements of the relevant standard and to make these records available to the when requested;
take appropriate action with respect to such complaints and any deficiencies found in products or services that affect compliance with the requirements for certification;
k) document the actions taken. This authorization is valid until further written notice from the applicant. Sincerely Yours, Signed by :
Company Name: ZHEJIANG DAHUA VISION TECHNOLOGY Co.,LTD. Company AdressNo.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China Contact Name: Yolanda Chen Title of Personcertified manager Address: hangzhou
1 | Confidentiality Letter | Cover Letter(s) | 161.97 KiB | January 18 2022 |
ZHEJIANG DAHUA VISION TECHNOLOGY Co.,LTD. No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China SVNDH-SD2AX Request for Confidentiality Federal Communications Commission 7435 Oakland Mills Road Columbia MD 21046 Subject:
FCC ID:
To Whom It May Concern:
Pursuant to the provisions of Sections 0.457 and 0.459 of the Commissions rules (47 CFR 0.457, 0.459), we are requesting the Commission to withhold the following attachments as confidential document from public disclosure indefinitely. Schematic Diagram Block Diagram Theory of Operation Above mentioned document contains detailed system and equipment description are considered as proprietary information in operation of the equipment. The public disclosure of above documents might be harmful to our company and would give competitor an unfair advantage in the market. It is our understanding that all measurement test reports, FCC ID label format and correspondent during certification review process cannot be granted as confidential documents and those information will be available for public review once the grant of equipment authorization is issued. Best Regards
(Type name of signer) Yolanda Chen
(Title of signer) certified manager
(Applicant name) ZHEJIANG DAHUA VISION TECHNOLOGY Co.,LTD. Company AdressNo.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
(Date) 12-27-2021
1 | Declaration Letter | Cover Letter(s) | 136.92 KiB | January 18 2022 |
ZHEJIANG DAHUA VISION TECHNOLOGY Co.,LTD. No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China Confirmation Letter We, ZHEJIANG DAHUA VISION TECHNOLOGY Co.,LTD. the product: DH-SD2A200-GN-AW-PV And item No.:
DH-SD2A500-GN-AW-PV; SD2A200-GN-AW-PV; SD2A500-GN-AW-PV;
DH-SD2A#########################SD2A#########################
2A############(#=0-9 or A-Z or - or blank or / or ()) have the same technical construction including circuit diagram, PCB Layout, components and component layout, all electrical construction and mechanical construction, with DH-SD2A200-GN-AW-PV. The differences between the main model are resolution, video formats, zoom rate. Name: Yolanda Chen Title: certified manager On behalf of:ZHEJIANG DAHUA VISION TECHNOLOGY Co.,LTD. Telephone: +886 571 28822025
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2022-01-18 | 2412 ~ 2462 | DTS - Digital Transmission System | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2022-01-18
|
||||
1 | Applicant's complete, legal business name |
Zhejiang Dahua Vision Technology Co., Ltd
|
||||
1 | FCC Registration Number (FRN) |
0028432326
|
||||
1 | Physical Address |
No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
|
||||
1 |
No.1199, Bin'an Road, Binjiang District, Hangzhou
|
|||||
1 |
Hangzhou, N/A
|
|||||
1 |
China
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
L******@ul.com
|
||||
1 | TCB Scope |
A4: UNII devices & low power transmitters using spread spectrum techniques
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
SVN
|
||||
1 | Equipment Product Code |
DH-SD2AX
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
Y****** c****
|
||||
1 | Telephone Number |
0571-********
|
||||
1 | Fax Number |
0571-********
|
||||
1 |
c******@dahuatech.com
|
|||||
app s | Technical Contact | |||||
n/a | ||||||
app s | Non Technical Contact | |||||
n/a | ||||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DTS - Digital Transmission System | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | NETWORK PTZ CAMERA | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Grant Comments | Power Output listed is average conducted. This device has 20 MHz and 40MHz bandwidth mode. This device supports SISO b/g modes and SISO & MIMO n20/n40 modes. The antenna(s) used for this transmitter must be installed to provide a separation distance of at least 20 cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter, except in accordance with FCC multi-transmitter evaluation procedures as documented in this filling. | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
UL-CCIC Company Limited
|
||||
1 | Name |
C****** Z******
|
||||
1 | Telephone Number |
+86 5********
|
||||
1 |
C******@ul.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | MO | 2412.00000000 | 2462.00000000 | 0.0610000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC