all | frequencies |
|
|
|
|
exhibits | applications |
---|---|---|---|---|---|---|---|
manual | photos | label |
app s | submitted / available | |||||||
---|---|---|---|---|---|---|---|---|
1 |
|
User Manual | Users Manual | 5.61 MiB | July 08 2022 | |||
1 |
|
Internal photo | Internal Photos | 1.23 MiB | July 08 2022 | |||
1 |
|
External photo | External Photos | 419.92 KiB | July 08 2022 | |||
1 |
|
Label | ID Label/Location Info | 143.43 KiB | July 08 2022 | |||
1 |
|
Applicant Declaration Letter | Cover Letter(s) | 381.70 KiB | July 08 2022 | |||
1 |
|
Auth letter | Cover Letter(s) | 184.36 KiB | July 08 2022 | |||
1 | Block Diagram | Block Diagram | July 08 2022 | confidential | ||||
1 |
|
Confidentiality FCC | Cover Letter(s) | 181.83 KiB | July 08 2022 | |||
1 |
|
MCL | Cover Letter(s) | 112.72 KiB | July 08 2022 | |||
1 | Operational Description | Operational Description | July 08 2022 | confidential | ||||
1 | Schematics | Schematics | July 08 2022 | confidential | ||||
1 |
|
Test report | Test Report | 1.84 MiB | July 08 2022 | |||
1 |
|
Test setup photo | Test Setup Photos | 467.80 KiB | July 08 2022 |
1 | User Manual | Users Manual | 5.61 MiB | July 08 2022 |
Security Radar Web Users Manual Users Manual V1.0.2 V1.0.0 Foreword General Safety Instructions This manual introduces the functions and operations of the security radar. The manual is applicable to multiple radar models. The figures are for reference only, and might differ from the actual products. The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning WARNING Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury. CAUTION Indicates a potential risk which, if not avoided, could result in property damage, data loss, lower performance, or unpredictable result. TIPS NOTE Provides methods to help you solve a problem or save you time. Provides additional information as the emphasis and supplement to the text. Revision History About the Manual Version Revision Content Added 240 m radar configuration. Changed figures. Release Time March 2021 Deleted previous Figure 4-64. February 2020 First release. September 2019 V1.0.2 V1.0.1 V1.0.0 The manual is for reference only. If there is inconsistency between the manual and the actual product, the actual product shall prevail. We are not liable for any loss caused by the operations that do not comply with the manual. The manual would be updated according to the latest laws and regulations of related regions. For detailed information, see the paper manual, CD-ROM, QR code or our official website. If there is inconsistency between paper manual and the electronic version, the electronic version shall prevail. All the designs and software are subject to change without prior written notice. The product updates might cause some differences between the actual product and the manual. Please contact the customer service for the latest program and supplementary documentation. I There still might be deviation in technical data, functions and operations description, or errors in print. If there is any doubt or dispute, please refer to our final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened. All trademarks, registered trademarks and the company names in the manual are the properties of their respective owners. Please visit our website, contact the supplier or customer service if there is any problem occurred when using the device. If there is any uncertainty or controversy, please refer to our final explanation. II Important Safeguards and Warnings The following contents are about the proper ways of using the radar, preventing dangers and property damage when it is in use. Read the manual carefully before using the radar, strictly abide by the manual and properly keep it for future reference. Operation Requirements Do not place or install the radar in a place exposed to sunlight or near the heat source. Keep the radar away from dampness, dust or soot. Keep the radar installed horizontally on the stable place to prevent it from falling. Do not drop or splash liquid onto the radar, and make sure there is no object filled with liquid on the radar to prevent liquid from flowing into the device. Install the radar in a well-ventilated place, and do not block the ventilation of the device. Operate the radar within the rated range of power input and output. Do not disassemble the radar. Transport, use and store the radar under the allowed humidity and temperature conditions. Electrical Safety specification. Use the recommended power cables in your area and conform to the rated power Use the power adapter provided with the radar; otherwise, it might result in people injury and device damage. The power source shall conform to the requirement of the Safety Extra Low Voltage (SELV) standard, and supply power with rated voltage which conforms to Limited power Source requirement according to IEC60950-1. Please note that the power supply requirement is subject to the device label. Connect the radar (I-type structure) to the power socket with protective earthing. The appliance coupler is a disconnection device. When using the coupler, keep the angle for easy operation. III Table of Contents 3.1 1.1 1.2 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Foreword .......................................................................................................................................... I Important Safeguards and Warnings .................................................................................................. III 1 Network Configuration .................................................................................................................... 1 Network Connection ............................................................................................................................... 1 Logging in to Web Client ......................................................................................................................... 1 1.2.1 Device Initialization ...................................................................................................................... 1 1.2.2 First-time Login ...........................................................................................................................4 1.2.3 Forgetting Password ................................................................................................................... 6 2 Live View ....................................................................................................................................... 9 Encoding Configuration ......................................................................................................................... 9 Video Tool.............................................................................................................................................. 9 Video Window Adjustment ................................................................................................................... 10 System Menu ....................................................................................................................................... 11 Function Options .................................................................................................................................. 11 Device List ............................................................................................................................................ 12 PTZ Control .......................................................................................................................................... 12 3 Playback ....................................................................................................................................... 14 Video Playback ..................................................................................................................................... 14 3.1.1 Playing Video .............................................................................................................................. 15 3.1.2 Record Types .............................................................................................................................. 16 3.1.3 Auxiliary Functions ..................................................................................................................... 16 3.1.4 Record Files ................................................................................................................................ 16 3.1.5 Clipping Records ......................................................................................................................... 17 3.1.6 Time Format of the Time Bar ...................................................................................................... 18 Snapshot Playback ............................................................................................................................... 18 3.2.1 Playing Snapshots ...................................................................................................................... 19 3.2.2 Snapshot Files ............................................................................................................................ 19 3.2.3 Snapshot Types .......................................................................................................................... 20 4 Setting ......................................................................................................................................... 21 Radar .................................................................................................................................................... 21 4.1.1 Video .......................................................................................................................................... 21 4.1.2 PTZ Camera ............................................................................................................................... 27 4.1.3 Linkage ...................................................................................................................................... 28 4.1.4 Region Management ................................................................................................................. 32 4.1.5 Protection Zone Management ................................................................................................... 35 4.1.6 IVS Setup ................................................................................................................................... 37 Network ............................................................................................................................................... 38 4.2.1 TCP/IP ........................................................................................................................................ 38 4.2.2 Port............................................................................................................................................ 40 4.2.3 PPPoE ........................................................................................................................................ 42 4.2.4 DDNS ........................................................................................................................................ 42 4.2.5 SMTP (Email) ............................................................................................................................. 43 4.2.6 UPnP ......................................................................................................................................... 45 4.2 3.2 4.1 IV 4.3 4.5 4.4 4.2.7 SNMP.........................................................................................................................................46 4.2.8 Bonjour ...................................................................................................................................... 48 4.2.9 Multicast....................................................................................................................................49 4.2.10 802.1x ......................................................................................................................................49 4.2.11 QoS .......................................................................................................................................... 50 4.2.12 Access Platform ....................................................................................................................... 51 Event Management .............................................................................................................................. 52 4.3.1 Alarm ......................................................................................................................................... 52 4.3.2 Abnormality ............................................................................................................................... 54 Storage ................................................................................................................................................ 57 4.4.1 Schedule .................................................................................................................................... 57 4.4.2 Destination ................................................................................................................................60 4.4.3 Record Control ........................................................................................................................... 63 System .................................................................................................................................................64 4.5.1 General ......................................................................................................................................64 4.5.2 Date & Time ............................................................................................................................... 65 4.5.3 Account ..................................................................................................................................... 66 4.5.4 Onvif User .................................................................................................................................. 71 4.5.5 Safety ........................................................................................................................................ 72 4.5.6 Firewall ...................................................................................................................................... 79 4.5.7 Default ....................................................................................................................................... 81 4.5.8 Import/Export ............................................................................................................................ 81 4.5.9 Auto Maintain ............................................................................................................................ 82 4.5.10 Upgrade ................................................................................................................................... 82 Information .......................................................................................................................................... 83 4.6.1 Version ....................................................................................................................................... 83 4.6.2 Log ............................................................................................................................................ 84 4.6.3 Remote Log ............................................................................................................................... 85 4.6.4 Online User ................................................................................................................................ 85 5 Alarm ...........................................................................................................................................87 6 Logging out ................................................................................................................................. 89 Appendix 1 Cybersecurity Recommendations ..................................................................................... 90 4.6 V 1 Network Configuration 1.1 Network Connection There are mainly two connection methods between the radar and PC. See Figure 1-1 and Figure 1-2. Figure 1-1 Connected by network cable Figure 1-2 Connected through router or switch The IP address of the radar is 192.168.1.108 by default. You need to use IP segment reasonably according to actual network environment so that the radar can connect to network. 1.2 Logging in to Web Client 1.2.1 Device Initialization The radar needs to be initialized for the first-time use. Step 1 Open IE browser, enter the IP address of the radar in the address bar, and then press Enter key. After the radar is successfully connected, the Device Initialization interface is displayed. See Figure 1-3. 1 Figure 1-3 Device initialization Step 2 Set the password. See Figure 1-4. The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special characters (excluding ' " ; :
&). Make sure that the password and the confirmed password are the same. Follow the password strength prompt to set a password with high security. Figure 1-4 Set admin password Step 3
(Optional) Set the email address which is used to reset password. Email address function is enabled by default and you can disable it. We recommend you to enter the email address to guarantee normal use of the radar. Step 4 Click Save. The P2P interface is displayed. See Figure 1-5. 2 Step 5 Read on-screen notifications, select P2P check box as needed, and then click Next. The Online Upgrade interface is displayed. See Figure 1-6. Figure 1-6 Online upgrade Read on-screen notifications, select Auto-check for updates check box as needed, and Step 6 then click Next. The Country/Region Setting interface is displayed. See Figure 1-7. Figure 1-5 P2P 3 Figure 1-7 Country or region setting Step 7 Select region, language, and video standard as needed, and then click Save. The login interface is displayed. See Figure 1-8. Figure 1-8 Login 1.2.2 First-time Login You need to download and install the plug-in for the first-time login. Enter username and password, and then click Login. Step 1 The Live interface is displayed. See Figure 1-9. 4 Figure 1-9 Install the plug-in If you enter the wrong password for continuously 5 times, the account will be locked for 5 minutes. After the locked time ends, you can log in to the radar again. You can set the allowed wrong password times in Setting > Event > Abnormality > Illegal Access. For details, see "4.3.2.3 Illegal Access."
Step 2 Step 3 Download and install the plug-in according to the on-screen instructions. After the plug-in is installed, the login interface is displayed automatically. Enter username and password, and then click Login. The Live interface is displayed. See Figure 1-10. Figure 1-10 Live The Live interface might vary with different device models, and the actual interface shall prevail. 5 1.2.3 Forgetting Password You can reset the admin password through the reserved email address when you forget it. Step 1 Open IE browser, enter the IP address of the radar in the address bar, and then press Enter. The login interface is displayed. See Figure 1-11. Figure 1-11 Login Step 2 Click Forget password?
The Prompt interface is displayed. See Figure 1-12. Prompt Figure 1-12 Step 3 Click OK. The QR code scanning interface is displayed. See Figure 1-13. After clicking OK, your information such as email address, MAC address, and device SN might be collected for authentication. 6 Figure 1-13 QR code Step 4 Read notes and scan the QR code. Enter security code acquired from the reserved email and then click Next. The password resetting interface is displayed. See Figure 1-14. Reset the password within 24 hours after you get the security code; otherwise it will be invalid. If the security code is not used twice continuously, for the third time, the system will prompt that you fail to acquire the security code. For normal use of the radar, you need to restore the radar to default and then acquire the security code again, or acquire the security code after 24 hours. Figure 1-14 Reset the password Step 5 Set the new admin password and then confirm it. The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special characters (excluding ' " ; :
&). Follow the password strength prompt to set a password with high security. 7 Step 6 Click Save. The login interface is displayed. 8 2 Live View You can do the operations such as watching live video, taking snapshots and records, and setting video stream. Click Live tab. The Live interface is displayed. See Figure 2-1. For live view parameter descriptions, see Table 2-1. Figure 2-1 Live view Table 2-1 Live view parameter descriptions No. Description Set encoding mode. Adjust video window. Function options. 1 3 5 No. 2 4 6 Name Video tool. Function tabs. Device list. 2.1 Encoding Configuration You can select stream media protocol from TCP, UDP, and RTP multicast. See Figure 2-2. Figure 2-2 Encoding configuration 2.2 Video Tool You can view bit rate, and resolution, and take records and snapshots, and so on. See Figure 2-3. For parameter descriptions, see Table 2-2. 9 Figure 2-3 Video tool 1 2 3 Table 2-2 Video tool parameter descriptions No. Name Description Bit Rate Display the current video bit rate. Resolution Display the current video resolution. Digital Zoom Click the icon, and then draw a box at any area to zoom in the selected part. Scroll on the selected part to zoom in or zoom out the image; point anywhere, and then scroll to zoom in or zoom out the image. Right-click or click the icon again to restore to the original status. 4 Snapshot Click the icon to capture the picture of live image. 5 Record Click the icon to take record of the live video. Snapshot and record configurations are for the radar only. You can modify the storage path in Setting > Radar Settings > Video >
Path. For details, see "4.1.1.4 Storage Path."
6 Audio Click the icon to mute or unmute the video. 2.3 Video Window Adjustment You can set window split mode, play the video in full screen, original size, and adaptive size, and more. For details, see Figure 2-4 and Table 2-3. Figure 2-4 Video window adjustment No. Name Description Table 2-3 Icon descriptions 1 2 3 Image size Full screen W:H (Width and height ratio) Click the icon to display the video in its original size and the icon switches to
. Click the icon again, and the video is displayed in adaptive size. Click the icon to play the video in full screen. Double-click or press Esc key to exit full screen. Click the icon and then select the ratio as Original or Adaptive. 46 Window split Click the icon to set window split mode. 10 No. Name Description Single live image:
. It is set by default. Double live images:
Four live images:
7 Picture in picture mode Click the icon, click the small window at the lower-right corner of the main live image, and then double-click the linked camera from the Device List. The live view of the selected camera will be displayed in the small window. 2.4 System Menu You can click each tab to enter its corresponding interface. See Figure 2-5. Figure 2-5 System menu 2.5 Function Options Click each icon to use different functions such as manual positioning, and taking snapshots and records. For details, see Figure 2-6 and Table 2-4. Figure 2-6 Function options No. Name Description Table 2-4 Function icon descriptions 1 Manual Positioning In 2 or 4 window split mode, click any area on the radar map, and all linked cameras position to that specified area. If you have no operation for more than 30 s after clicking, the camera will restore to default position. To make manual position valid, you need to:
Log in to the linked camera. Complete radar positioning and radar calibration. For details, see
"4.1.3 Linkage."
2 Relay-out Display the alarm output status. An alarm is triggered: The icon turns red. No alarm: The icon is gray. You can click the icon to enable or disable alarm manually. 3 4 Snapshot See Table 2-2. Record See Table 2-2. 11 2.6 Device List You can view IP addresses of radar and the linked cameras, and set video stream. See Figure 2-7. Figure 2-7 Device list Click to select video streams. For details, see Figure 2-8 and Table 2-5. Figure 2-8 Select video stream No. Name Description Table 2-5 Video stream icon descriptions 1 Main Stream 2 Sub Stream 1 3 Sub Stream 2 Under the selected stream media protocol, use main stream to monitor and store video. Main stream is applied in live view and record storage by default. Click the icon again to close live video. Under the selected stream media protocol, use sub stream 1 to monitor if the network bandwidth is insufficient. Click the icon again to close live video. Under the selected stream media protocol, use sub stream 2 to monitor if the network bandwidth is insufficient. Click the icon again to close live video. 2.7 PTZ Control You can control PTZ function of the linked camera by PTZ control bar on Live interface. PTZ control is only for radar speed dome tracking system, and you can skip this function as needed. Before using PTZ control, you need to add a PTZ camera. For details, see "4.1.2 PTZ Camera."
PTZ control can only be operated on the selected camera channel. For PTZ control bar, see Figure 2-9. For detailed icon descriptions, see Table 2-6. 12 Table 2-6 PTZ control descriptions Description Name Direction Support eight directions: Up, down, left, right, upper-left, upper-right, lower-left, and lower-right. Quick position Click the icon, draw a box on radar's live interface, and then the PTZ camera will rotate, focus and quickly locate that area. Speed PTZ rotation speed. The larger the value is, the higher the speed will be. Zoom/Focus/Iris Click to increase the value and click to decrease the value. Zoom: Tap or to zoom in or zoom out the image. Focus: Tap or to adjust the lens focus to get a desired definition of the video. Iris: Tap or to adjust the brightness of the video. Figure 2-9 PTZ Control 13 3 Playback You can play back snapshots and videos saved in SD card. Snapshot and video playback configurations are only for radar on this web. Before playback, you need to configure parameters such as record and snapshot schedule, storage method, and record mode. For details, see "4.4 Storage."
Click Playback tab. The Playback interface is displayed. See Figure 3-1. Figure 3-1 Playback 3.1 Video Playback Select file type as dav. The video playback interface is displayed. See Figure 3-2. For details, see Table 3-1. 14 Figure 3-2 Video playback Table 3-1 Video playback function descriptions No. Description Time bar. Video playing bar. For details, see "3.1.1 Playing Video."
Record type. For details, see "3.1.2 Record Types."
Auxiliary functions. For details, see "3.1.3 Auxiliary Functions."
Record files. For details, see "3.1.4 Record Files."
Clip. For details, see "3.1.5 Clipping Records."
Time format of the time bar. For details, see "3.1.6 Time Format of the Time Bar."
3.1.1 Playing Video You can do video playback operations such as playing and pausing, stopping, fast and slow playing, and playing by frame. For details, see Figure 3-3 and Table 3-2. Figure 3-3 Video playing bar Table 3-2 Video playing bar icon descriptions No. Name Description Play and pause Click the icon to play or pause playing the record. Stop Click the icon to stop playing video. Click the icon to play the record by frame. Play by frame You need to pause playback when using this function. Slow play Click the icon to play slowly. 15 1 2 3 4 5 6 7 1 2 3 4 No. Name Description 5 Fast play Click the icon to play fast. 3.1.2 Record Types Select the record type, and only selected files will be displayed in the time bar and file list. See Figure 3-4. Figure 3-4 Record type 3.1.3 Auxiliary Functions You can zoom in or zoom out the image, and take a snapshot. For details, see Figure 3-5 and Table 3-3. Figure 3-5 Auxiliary functions Table 3-3 Auxiliary function icon descriptions No. Name Description 1 2 Digital Zoom For details, see "2.2 Video Tool."
Snapshot For details, see "2.2 Video Tool."
3.1.4 Record Files Select file type, data source, and date, and then you can play back records. On the calendar, the date with blue background means the current date has records. See Figure 3-6. For parameter descriptions, see Table 3-4. 16 Figure 3-6 Select records Table 3-4 Record parameter descriptions Parameter Description File Type Data Src Select dav for video playback. Data source. It is from SD card by default. File list. Click the icon, and then the video files of the selected date will be displayed in the list. 3.1.5 Clipping Records You can clip the selected record as needed. The function column is displayed as Figure 3-7. Figure 3-7 Clip record Step 1 Select start time of clipping on time bar which should be within time range of the record. Step 2 Move your mouse pointer to and then Select Start Time is displayed. Step 3 Click to set the start time for video clipping. Step 4 Select end time of clipping on time bar which should be within time range of the record. Step 5 Move your mouse pointer to and then Select End Time is displayed. Step 6 Click to set the end time for video clipping. Step 7 Click
, and the clipped video will be saved in the path of video clips. For details, see
"4.1.1.4 Storage Path."
17 3.1.6 Time Format of the Time Bar You can set time format of the time bar as 24 h, 2 h, 1 h, and 30 min. For details, see Figure 3-8 and Table 3-5. Figure 3-8 Time format Icon Description Table 3-5 Time format descriptions Click the icon to display the time bar in 24-hour mode. Click the icon to display the time bar in 2-hour mode. Click the icon to display the time bar in 1-hour mode. Click the icon to display the time bar in 30-min mode. 3.2 Snapshot Playback Select file type as jpg. The snapshot playback interface is displayed. See Figure 3-9. For details, see Table 3-6. Figure 3-9 Snapshot playback Table 3-6 Picture playback function descriptions No. Description 1 2 3 Picture playing bar. For details, see "3.2.1 Playing Snapshots."
Snapshot type. For details, see "3.2.2 Snapshot Files."
Snapshot file. For details, see "3.2.3 Snapshot Types."
18 3.2.1 Playing Snapshots You can play and pause playing snapshots. See Figure 3-10. Figure 3-10 Picture playing bar 3.2.2 Snapshot Files Select file type, data source, and date, and then you can play back snapshots. On the calendar, the date with blue background means the current date has snapshots. See Figure 3-11. For parameter descriptions, see Table 3-7. Figure 3-11 Select snapshots Table 3-7 Snapshot parameter descriptions Parameter Description File Type Data Src Select jpg for picture playback. Data source. It is from SD card by default. File list. Click the icon, and then the snapshot files of the selected date will be displayed in the list. See Figure 3-12. 19 Figure 3-12 Device list On device list interface, you can double-click the file to play back pictures. For more icon descriptions, see Table 3-8. Icon Description Table 3-8 Device list icon descriptions Click the icon to search all snapshot files within the start time and end time of selected date. Click icon to download snapshot file to local storage. Click icon to return to calendar interface and re-select time to operate. 3.2.3 Snapshot Types Select the record type, and only selected files will be displayed in the time bar and file list. For details, see "3.1.2 Record Types."
20 4 Setting This chapter introduces how to configure and view the radar information, including settings about radar, network, event, storage, and system. You can make configurations about radar such as setting video and snapshot parameters, adding PTZ cameras, doing radar and camera linkage, managing protection zone, and setting IVS. 4.1 Radar 4.1.1 Video You can set video stream, snapshots, overlay, and storage path. 4.1.1.1 Video Stream You can set the main stream and sub stream of live videos. Select Setting > Radar Settings > Video > Video. Step 1 The Video interface is displayed. See Figure 4-1. Figure 4-1 Set video stream Video stream configuration interface might vary with different devices, and the actual interface shall prevail. Default values might vary with different video streams, and the actual interface shall prevail. Step 2 Configure parameters as needed. For details, see Table 4-1. 21 Parameter Description Table 4-1 Video stream parameter descriptions Enable By selecting Enable check box or not, you can enable or disable the sub stream. It is enabled by default. Encode Mode Select the encode mode from H.264, H.264H, H.264B, and H.265. Enable smart codec to improve video compressibility and save storage space. Smart Codec Resolution Frame Rate
(FPS) Bit Rate Type After smart codec is enabled, the third bit stream, ROI, and smart event detection will be disabled. The actual interface shall prevail. Select the resolution of main stream and sub stream. Each resolution has different reference bit rate. PAL: 125 frame per second. Frame rate varies with different resolutions. Include CBR and VBR. You can set Quality (from 1 to 6, and 6 is the best) under VBR mode. Reference Bit Rate The most suitable bit rate range recommended to users according to the set resolution and frame rate. Bit Rate The value is the upper limit of the stream in VBR mode. In CBR mode, it is fixed. Refer to Reference Bit Rate to acquire the best setting rage. I Frame Interval The number of P frame between two I frames. The range varies with the bit rate and is up to 150. It is recommended to set the number as twice of the bit rate. Watermark Settings You can verify the watermark to check if the video has been tampered. Select Watermark Settings check box to enable watermark. The watermark character is DigitalCCTV by default. The watermark characters (Max. 128 characters) can be Chinese characters, letters, symbols, punctuation marks, space or special characters. Watermark Character Step 3 Click Save. 4.1.1.2 Snapshot You can configure snapshots captured from monitoring video. Select Setting > Radar Settings > Video > Snapshot. Step 1 The Snapshot interface is displayed. See Figure 4-2. 22 Step 2 Configure parameters as needed. For details, see Table 4-2. Parameter Description Table 4-2 Snapshot parameter descriptions Snapshot Type General: The system takes snapshots as scheduled. For details of schedule setting, see "4.4.1 Schedule."
Event: The system takes snapshots when the external alarm is triggered. For detailed configuration, see "4.3 Event Management."
Image Size It is the same as the resolution of snapshot under main stream by default. Quality Interval Step 3 Click Save. Set the image quality. There are six levels from 1 to 6. 6 is the best. The higher the level is, the larger the picture will be. Set snapshot taking frequency. The value ranges from 1 s to 7 s or can be customized. 4.1.1.3 Overlay You can overlay information such as channel title, time title and more on videos. Step 1 Select Setting > Radar Settings > Video > Overlay. The Overlay interface is displayed. Step 2 Configure the overlay information as needed. See Figure 4-3, Figure 4-4, Figure 4-5, Figure 4-6, Figure 4-7, and Figure 4-8. For parameter descriptions, see Table 4-3. Figure 4-2 Set snapshot 23 Figure 4-3 Channel title Figure 4-4 Time title 24 Figure 4-5 OSD information Figure 4-6 Font 25 Figure 4-7 Picture overlay Figure 4-8 Abnormal Name Channel Title Time Title OSD Info Font Table 4-3 Overlay configuration parameter descriptions Description Enable or disable Channel Title to be overlaid on the video image. Drag the Channel Title box to adjust the display position. Enable or disable Time Title to be overlaid on the video image. By selecting Week Display check box, the day will be displayed. Drag the Time Title box to adjust the display position. Enable or disable geographical position to be overlaid on the video image. Drag the OSD info box to adjust the display position. The text can be left-aligned or right-aligned. Set the font colour and font size of channel title, time title, and OSD information. 26 Name Description Picture Overlay Enable or disable picture to be overlaid on the video image. Click Upload Picture to overlay the local picture on the video image. Drag the yellow box to adjust the picture display position. OSD info and picture overlay cannot be disabled at the same time. Abnormal Enable or disable abnormal information to be overlaid on the video image. Step 3 Click Save. 4.1.1.4 Storage Path You can set storage paths of snapshots and records taken from live view, and snapshots, downloads and video clips from playback. Step 1 Select Setting > Radar Settings > Video > Path. The Path interface is displayed. See Figure 4-9. Figure 4-9 Path Step 2 Click Browse to change the default storage path. Step 3 Click Save. 4.1.2 PTZ Camera You can add or delete PTZ cameras, set camera name and type, and enable or disable alarm track. PTZ camera configuration is only for radar speed dome tracking system, and you can skip this setting as needed. Step 1 Select Setting > Radar Settings > PTZ Camera. 27 Figure 4-10 Add PTZ camera Step 2 Click Add PTZ Camera. Figure 4-11 Add PTZ camera Step 4 Click Save. camera. 4.1.3 Linkage Importing a Map Step 3 Enter IP address, port, camera name, type, username, and password. Port is set to 80 by default. Keep the port consistent with the PTZ camera. Switch to to enable alarm track linkage between the radar and the selected You can import a map, and set linkage between the radar and the added cameras after finishing radar positioning and calibration. Step 1 Select Setting > Radar Settings > Linkage. 28 Figure 4-12 Linkage Step 2 Click Choose to import a map. png, .jpg, and .bmp format are supported. Figure 4-13 Import a map Crop the map according to the detection range of the radar. Drag the box to select the Step 3 range, and then click Cut Map. Step 4 Click Confirm Screen to get the map with the range you need. Click Cancel Screenshot to cancel the cropping. Step 5 Calculate the map size. 1) 2) Measure a distance in the actual detection area. On the web client, click Draw Line to draw the measured distance on the image. 29 3) Click and hold the left mouse button to start drawing, and then release the button to complete drawing. Double-click the map to enter full screen display to draw the line more accurately. Click Clear to clear the line you drew. 4) Enter the actual measured length of the line you drew in the Line Length input box and then click Calculate Map Size. The system will automatically get the map width and height. 5) Click Next. Radar Positioning Step 1 Drag the end points of the yellow sector on the map to adjust the radar orientation. When the dotted line points to the right horizontally, it is considered as 0. The degree increases clockwise, and you can also adjust degree value by clicking or entering a number.
Double-click the map to enter full screen to position the radar more accurately. Figure 4-14 Radar positioning Step 2 Enter installation height of the radar in Altitude box. Enter height of the radar center (front side); otherwise the camera-radar linkage effect will be reduced. Click Next. Step 3
(Optional) Radar Calibration Radar calibration is only for Radar-PTZ Linkage, and you can skip this setting as needed. Step 1 Select a PTZ camera in PTZ Camera List, and then enter the username and password used to log in to the web interface of the camera. 30 You must log in to the PTZ camera before calibration. For details, see "4.1.2 PTZ Camera". If you need to link multiple cameras, click PTZ Camera List at the upper-left corner above the live image to switch to another camera, and then repeat the following steps. Figure 4-15 Log in to the camera Step 2 Enter the installation height of the camera. Enter the height of the lens; otherwise the camera-radar linkage effect will be reduced. Step 3 Step 4 Step 5 Select Close to turn off Alarm Track; otherwise you cannot calibrate the camera. Select installation methods from Separate and Integrated. Add radar coordinates to calibrate radar. Set coordinates 10 m20 m away from the PTZ camera and make sure they are within the radar detection range. Two people are required: Person A is on the site, and Person B doing configurations on the Web. Keep A and B stay in contact. 1) 2) Double-click the map to enter full screen, and then click A walks until a green track appears. to add radar coordinates. After A stops, the track of A will disappear and turn into an orange static track point. 3) Aim to the feet of A and adjust the PTZ camera image to make sure the target takes up 1/2 of the image. 4) Click to save the settings. For separate installation, repeat the above steps to add the second set of radar coordinate. PTZ camera and the two sets of coordinates must not on the same straight line. 31 5) Select a target point (More than 10 m away from the camera is recommended) with the same height as the lens. Adjust monitoring image of the camera by using PTZ control icons to move the crosshair to the target point, and then click Acquire calibration value. 6) Enable Alarm Track on the interface, and then click Save. 4.1.4 Region Management You can add different types of regions, draw alarm, pre-warning, or shield areas, set arming periods, filter objects in regions, and more. Step 1 Select Setting > Radar Settings > Region. Figure 4-16 Region Step 2 Click to add regions. Regions are enabled by default. Step 3 Step 4 Double-click the name under the Name column to modify the region name. Select Area Type from Intrusion and Tripwire. Intrusion: When the target enters, leaves, or appears in the detection area, the system performs alarm linkages. Tripwire: When the target crosses tripwire from the defined motion direction, the system performs alarm linkages. Step 5 Click Draw Rule to draw a line or an area within radar detection range. Click the left mouse button to start drawing, and then click the right mouse button to end drawing. The area you draw can exceed the edges of the detection region. 32 Figure 4-17 Draw an area Step 6 Click Setup to configure arming periods. Figure 4-18 Set arming periods 1) Set arming periods, and the alarm can only be triggered when it occurs during the defined period. The time period in green on the timeline is armed. Method one: Click Setting of the day you want to set. Directly press and drag the left mouse button on the timeline. Method two: Click Setting of the day you want to set. Select the check box in front of the time period to enable it. Enter start time and end time of that time period. 33 Select All or the check box of any other day, and the set time period will apply to the selected days. You can set 6 time periods per day. 2) Click Save. different regions, see Table 4-5. Step 7 Configure other parameters as needed. For details, see Table 4-4. For alarm rules of Name Table 4-4 Region management parameter descriptions Description Effective Object Select monitoring target to be monitored from Human and Vehicle. Direction Set the alarm direction for tripwire. A->B, B->A, and A<->B are available. Set alarm type for intrusion. Alarm, pre-warning, and shield are available. Alarm Type Priority: Shield > Alarm > Pre-warning. See "Table 4-5 Region alarm rule Speed Filtering Record descriptions" for details. trigger alarms. Objects whose speeds are not within the specified target speed range will not For 50 m and 120 m radars, the speed range must be within 1 to 40 km/h; for 240 m radar, the range must be within 1 to 72 km/h; for 300 m and 450 m radars, the range must be within 1 to 80 km/h. By selecting Record, the system will record automatically when the alarm is triggered. Before enabling this function, you need to configure record period in Setting > Storage > Schedule > Record. For details, see "4.4.1.1 Record Schedule." In Setting > Storage > Record Control, select Auto for the Record Mode. When the alarm track is enabled, the radar will control the camera to record, and the record rules of the camera are invalid. When the alarm track is disabled, the radar will not control the camera, and the camera will record under its own recording rules. Record Delay The alarm record keeps running for the defined time (from 10 s to 300 s) after the alarm is ended. By selecting Relay-out, the corresponding alarm output device will be linked through alarm output port when the alarm is triggered. Relay-out Five alarm output ports. Only 50 m/120 m radar supports high power device control. No.5 is connected to the high power device. Alarm Delay The alarm keeps running for the defined time (from 10 s to 300 s) after the alarm is ended. Send Email By selecting Send Email, the system automatically sends email to the specified mailbox when the alarm is triggered. You can configure the mailbox in Setting > Network > SMTP (Email). For details, see " 4.2.5 SMTP (Email)."
34 Name Description Snapshot By selecting Snapshot, the system automatically captures images when the alarm is triggered. You can configure the snapshot taking period in Setting >
Storage > Schedule > Snapshot. For details, see "4.4.1.2 Snapshot Schedule."
Region Description Table 4-5 Region alarm rule descriptions Alarm area Secondary priority. The target will be tracked when it enters the alarm area. When targets appear both in the alarm area and pre-warning area, only the target in alarm area will be tracked. Pre-warning area Lowest priority. The target will be tracked when it enters the pre-warning area. Highest priority. The target will not be tracked, and its trace will not be displayed in the shield area. Shield area When objects that might cause misinformation such as trees occur in shield area and alarm area at the same time, the alarm will not be triggered. Step 8 Click Save. 4.1.5 Protection Zone Management You can set trajectory duration, select channels for radar, configure alarm track, and more. Step 1 Select Setting > Radar Settings > Protection Zone Management. Figure 4-19 50 m/120 m protection zone management 35 Figure 4-20 240 m protection zone management Figure 4-21 300 m/450 m protection zone management Step 2 Configure parameters as needed. Table 4-6 Parameter descriptions of protection zone management Description Name Trajectory Duration Trajectory duration of targets, ranging from 3 s to 30 s. You can select different channels for radar to avoid co-channel interference. Select Channel Applicable to 50 m/120 m radar. Co-channel interference: In radar's protection zone, interference signals from other devices in the same frequency band will cause the radar to give cluttering trajectory and misinformation more frequently. 36 Name Description Select the detection region according to actual application. Detection Region Hide Protection Zone Track Mode Track Time Step 3 Click Save. 4.1.6 IVS Setup Applicable to 240 m/300 m/450 m radar. The device will restart if the value is changed. Select the check box to hide protection area. Tour: The camera tracks all targets in the detection region in turn. Distance Priority: The camera tracks the target nearest to the radar in the detection region. Time Priority: The camera tracks the target appearing earliest in the detection region. The maximum tracking time of each target, ranging from 1 s to 15 s. Track time is only for Tour track mode. You can select environment mode, set displaying scale of the tracked target, and radar structuring. Step 1 Select Setting > Radar Settings > IVS Setup. Figure 4-22 IVS setup Step 2 Configure parameters as needed. For details, see Table 4-7. Name Description Table 4-7 IVS setup parameter descriptions Environment Mode General: Apply to detection regions without shrubs, except large barriers such as cars. Shrub: Apply to detection regions with trees, shrubs, and other swaying objects that might cause misinformation. Capacious: Apply to detection regions without trees, shrubs, or large barriers. 240 m/300 m/450 m radar do not support environment mode. Tracking Target Display Display the tracking target by setting a specific value from 1 to 6. The bigger the value is, the larger the target is in the linkage image. Radar Structuring By enabling Radar Structuring, the tracking distance, angle, moving speed, and type of the tracked target will be displayed on live view interface. 37 This chapter introduces network configuration. 4.2 Network 4.2.1 TCP/IP You can configure IP address, DNS (Domain Name System) server of the radar to make sure that it can be mutually connected to other devices in the networking. Confirm the radar has connected to network correctly before setting network parameters. Allocate IP address of the same network segment if there is no router in the network. Set corresponding gateway and subnet mask if there is a router in the network. Step 1 Select Setting > Network > TCP/IP. The TCP/IP interface is displayed. See Figure 4-23. TCP/IP Figure 4-23 Step 2 Configure parameters. See Table 4-8. Table 4-8 TCP/IP parameter descriptions Parameter Description Host Name Enter host name, 15 characters at most. Select the Ethernet card that needs to be configured. The default one is Wire. Ethernet Card You can change the default Ethernet card if there is more than one card. Restart radar to activate the new settings once you modify the default settings. 38 IP Address Subnet Mask Default Gateway Parameter Description Mode DHCP: The system acquires IP address automatically. You cannot set the IP address, subnet mask and default gateway. Static: You need to configure IP address, subnet mask and default gateway manually. MAC Address Display the MAC address of radar. IP Version Select IP version from IPV4 and IPV6 and both versions can be accessed. Enter the IP address, subnet mask, and default gateway as needed when selecting Static mode. IPV6 has no subnet mask. The default gateway must be in the same network segment with the IP address. Preferred DNS IP address of the preferred DNS. Alternate DNS IP address of the Alternate DNS. Select the check box, get the device MAC address, and then you can modify and configure the device IP address with ARP/ping command. It is enabled by default. During restarting, you will have no more than 2 minutes to configure the device IP address by a ping packet with defined length, the server will be turned off in 2 minutes, or it will be turned off immediately after the IP address is successfully configured. If the service is not enabled, the IP address cannot be configured with ping packet. Enable ARP/Ping to set IP address service. Step 3 Click Save. A demonstration of configuring IP address with ARP/Ping Step 1 Keep the device that needs to be configured and the PC within the same LAN, and then get an IP address available. Step 2 Step 3 Get the physical address of the radar from its label. Open command editor on the PC and enter the following command. See Table 4-9. 39 Parameter Description Table 4-9 Command list Windows syntax UNIX/Linux/Mac syntax Win7 syntax Arp -s <IP Address> <MAC>
Ping -l 480 -t < IP Address >
Example:
Arp -s 192.168.0.125 11-40-8c-18-10-11 Ping -l 480 -t 192.168.0.125 Arp -s <IP Address> <MAC>
Ping -s 480 < IP Address >
Example:
Arp -s 192.168.0.125 11-40-8c-18-10-11 Ping -s 480 192.168.0.125 netsh i i show in netsh -c i i add neighbors ldx <IP Address> <MAC>
ping -l 480 -t < IP Address >
Example:
netsh i i show in netsh -c i i add neighbors 12 192.168.0.125 11-40-8c-18-10-11 ping -l 480 -t 192.168.0.125 Step 4 Step 5 Power off and restart radar or restart the device by network. Check the PC command line. If information such as "Reply from 192.168.0.125" is displayed, the configuration has succeeded, and then you can close the command line. Step 6 Enter http://(IP address) in the browser address bar to log in. 4.2.2 Port This section introduces configurations of the maximum number of users that can connect to the radar simultaneously and value of each port. Step 1 Select Setting > Network > Port. The Port interface is displayed. See Figure 4-24. Figure 4-24 Port Step 2 Configure port parameters. See Table 4-10. 40 The configuration of Max Connection takes effect immediately and others after the radar is restarted. 01024, 1900, 3800, 5000, 5050, 9999, 37776, 3778037880, 39999, 42323 are occupied for specific uses. It is not recommended to use the default value of other ports during port configuration. Parameter Description Table 4-10 Port parameter description Max Connection The maximum number of users that can log in to the web interface simultaneously of the same radar. The value ranges from 1 to 20 and 10 is set by default. TCP Port UDP Port HTTP Port RTSP Port Transmission control protocol port, the default value is 37777, and it can be modified as needed. User datagram protocol port, the default value is 37778, and it can be modified as needed. Hypertext transfer protocol port, the default value is 80, and it can be modified as needed. Real time streaming protocol port, leave it if the value is 554 by default. If you play live view with QuickTime, VLC or Blackberry smart phone, the following URL format is available. When the URL format requiring RTSP, you need to specify channel number and bit stream type in the URL, and also username and password if needed. When playing live view with Blackberry smart phone, you need to turn off the audio, and then set the codec mode to H.264B and resolution to CIF. URL format example:
rtsp://username:password@ip:port/cam/realmonitor?channel=1&subtype=0 Among that:
Username: Your username, such as admin. Password: Your password, such as admin. IP: Your device IP, such as 192.168.1.122. Port: Leave it if the value is 554 by default. Channel: Channel number, which starts from 1. For example, if you are using channel 2, then the channel=2. Subtype: Bit stream type; 0 means main stream (subtype=0) and 1 means sub stream (subtype=1). So, if you require the sub stream of channel 2 from a certain device, then the URL should be:
rtsp://admin:admin@10.12.4.84:554/cam/realmonitor?channel=2&subtype=1 If user name and password are not needed, then the URL can be:
rtsp://ip:port/cam/realmonitor?channel=1&subtype=0 HTTPs Port HTTPs communication port, the default value is 443, and it can be modified as needed. Step 3 Click Save. 41 4.2.3 PPPoE Point-to-Point Protocol over Ethernet, it is one of the protocols that device uses to connect to the Internet. Get the PPPoE username and password from the Internet service provider, set network connection through PPPoE, and then the device will acquire a WAN dynamic IP address. Step 1 Select Setting > Network > PPPoE. The PPPoE interface is displayed. See Figure 4-25. PPPoE Figure 4-25 Step 2 Step 3 Select Enable, and then enter username and password. Click Save. 4.2.4 DDNS Properly configure DDNS, and then the domain name on the DNS server matches your IP address and the matching relation refreshes in real time. You can always visit your device with the same domain name no matter how much your device IP address changes. Before making configurations, please check if your radar supports the DNS server. Third party server might collect your device information if DDNS is enabled. Register and log in to the DDNS website, and then you can view the information of all the connected devices in your account. Step 1 Select Setting > Network > DDNS. The DDNS interface is displayed. See Figure 4-26. 42 Figure 4-26 DDNS (1) Step 2 Select DDNS Type, and then configure the parameters as needed. See Table 4-11. Parameter Description Table 4-11 DDNS parameter descriptions The name and web address of the DDNS service provider, see the matching relationship below:
CN99 DDNS web address: www.3322.org NO-IP DDNS web address: dynupdate.no-ip.com Dyndns DDNS web address: members.dyndns.org Domain Name The domain name you registered on the DDNS website. Enter the username and password you got from the DDNS service provide. You need to register an account (with username and password) on the DDNS service provider's website. The update cycle of the connection between the radar and the server, and the time is 10 min by default. Step 3 Click Save. Open the browser on PC, enter the domain name at the address bar, and then press Enter, the log in interface is displayed. Type Address Username Password Interval 4.2.5 SMTP (Email) Configure email parameter and enable email linkage. The system sends email to the server of the receiver through SMPT server when alarm or abnormity is triggered. The receiver can receive the email after logging in to the server. Step 1 Select Setting > Network > SMTP (Email). The SMTP (Email) interface is displayed. See Figure 4-27. 43 Figure 4-27 SMTP (Email) Step 2 Configure parameters. See Table 4-12. Table 4-12 SMTP (Email) parameter descriptions Parameter Description SMTP Server Port IP address of SMTP server that sends emails. Port number of the SMTP server that sends emails. The default value is 25. Username Password Sender's email username. Sender's email password. For the detailed configuration, see Table 4-13. Anonymity By enabling this function, the sender's information is not displayed in the email. You can auto log in anonymously, and do not need to enter the username, password and the sender information. Sender Sender's email address. Select Authentication from None, SSL and TLS. TLS is set by default. Authentication For the detailed configuration, see Table 4-13. Title Enter no more than 60 characters in Chinese, English, and Arabic numerals. Attachment Select the check box to support attachment in the email. Mail Receiver Receiver's email address. Support 3 addresses at most. Health Mail The system sends test mails to check if the connection is successfully configured. Select Health Mail, configure the Update Period, and then the system sends test mails as the defined period. Test Test the email sending and receiving function. If the configuration is correct, you will receive test mail. Save email configuration before running the test. For the configuration of major mailboxes, see Table 4-13. 44 Mailbox SMTP Server Table 4-13 Major mailbox configuration Authentication Port Description QQ smtp.qq.com SSL 465 TLS 587 The authentication type cannot be None. You need to enable SMTP service in your mailbox. The authentication code is required as password; either the QQ password or email password is not applicable. Authentication code, the code you receive when enabling SMTP service. 465/9 94 You need to enable SMTP service in your mailbox. The authentication code is required as password; the email password is not applicable. Authentication code, the code you receive when enabling SMTP service. You need to enable SMTP service in your mailbox. You need to enable SMTP service in your mailbox. 25 25 465 25 25 SSL TLS none SSL none 163 smtp.163.com Sina smtp.sina.com 126 smtp.126.com none Step 3 Click Save. 4.2.6 UPnP Universal Plug and Play, a protocol that establishes mapping relation between intranet and Internet. This function enables you to access intranet device through Internet. Internal port is radar's port and external port is router's port. You can access the radar with external port. When UPnP is not needed, you need to disable UPnP function so that other functions can be used normally. Enable UPnP if radar supports UPnP protocol. In Windows XP or Windows Vista system, if UPnP is enabled, the device can automatically find it in the Network Neighborhood of Windows. Refer to the following steps to install UPnP network service in the Windows system. Step 1 Step 2 Step 3 Step 4 Open control panel, and select Add or Remove Programs. Click Add/Remove Windows Components. Select the Network Services in the Windows Components Wizard, and then click Details. Select Internet gateway device discovery and control client, and UPnP user interface, and then click OK to begin installation. For UPnP configuration on radar web interface, see following steps. Step 1 Select Setting > Network > UPnP. The UPnP interface is displayed. See Figure 4-28. 45 Figure 4-28 UPnP Select Enable to enable UPnP function, and there are two mapping modes: Custom and Step 2 Default. Select Custom, and then you can modify external port as needed. Select Default, and then the system finishes mapping with available port automatically. You cannot modify mapping relation. Step 3 Step 4 Select Start Device Discover as needed. Click Save to make the configurations valid. 4.2.7 SNMP Simple Network Management Protocol, which can be used to enable software such as MIB Builder and MG-SOFT MIB Browser to connect to the radar and manage and monitor your device. Install SNMP monitoring and managing tools such as MIB Builder and MG-SOFT MIB Browser. Contact technical support for the MIB file that matches the current version. Step 1 Select Setting > Network > SNMP. The SNMP interface is displayed, see Figure 4-29 and Figure 4-30. Figure 4-29 SNMP (1) 46 Figure 4-30 SNMP (2) Step 2 Select SNMP version to enable SNMP. In the Trap Address, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB Browser installed, and leave other parameters as the default. Parameter Description Table 4-14 SNMP parameter descriptions Select the check box of the version you need, and the system can process information of corresponding version. Select V1, and the system can only process information of V1 version. Select V2, and the system can only process information of V2 version. Select V3, and then V1 and V2 become unavailable. You can configure username, password and authentication type, which are needed to access radar from the server. Version Read Community, Write Community Trap Address Trap Port SNMP Port The listening port of the software agent in the radar. Using V1 and V2 might cause data leakage, and V3 is recommended. The read and write community strings that the software agent supports. You can enter number, letter, underline and dash to form the name. The target address of the trap information sent by the software agent of the radar. The target port of the trap information sent by the software agent of the radar. 47 Parameter Description The name is public by default. Read-only Username You can enter number, letter, and underline to form the name. The name is private by default. Read & write Username Authentication Type You can select from MD5 and SHA. The default type is MD5. You can enter number, letter, and underline to form the name. Authentication Password It should be no less than 8 digits. Encryption Type The default is CBC-DES. It should be no less than 8 digits. Encryption Password Click Save. View radar information. Step 3 Step 4 1) 1) 2) 3) Run MIB Builder and MG-SOFT MIB Browser. Compile the two MIB files with MIB Builder. Load the generated modules with MG-SOFT MIB Browser. Enter the IP address of the device you need to manage in the MG-SOFT MIB Browser, and then select version to search. 4) Unfold all the tree lists displayed in the MG-SOFT MIB Browser, and then you can view the configuration information such as video channel and software version. Use PC with Windows operating system and disable SNMP Trap service. The MG-SOFT MIB Browser will display prompt when alarm is triggered. 4.2.8 Bonjour Bonjour, known as zero-configuration networking, can automatically discover the PC, device and service on the IP network. With Bonjour, the radar can discover each other automatically without entering IP address or configuring DNS server. After Bonjour function is enabled, your device will be automatically detected in the operating system and client which support Bonjour. When the radar is automatically detected by Bonjour, it will display the server name which is configured by the user. Step 1 Select Setting > Network > Bonjour. The Bonjour interface is displayed. See Figure 4-31. Bonjour Figure 4-31 Step 2 Step 3 Select Enable, and then configure server name. Click Save. 48 In the operating system and clients that support Bonjour, follow steps below to visit the radar web interface with Safari browser. Step 1 Step 2 Step 3 Click Show all bookmarks in Safari. Enable Bonjour, and then, in your LAN, all the radars which enable Bonjour are displayed. Click the radar to visit the corresponding web interface. 4.2.9 Multicast When multiple users are watching the live video simultaneously through network, it might fail due to limited bandwidth. The problem can be solved by setting a multicast IP for the radar and adopting the multicast protocol. Step 1 Select Setting > Network > Multicast. The RTP interface is displayed. See Figure 4-32. Figure 4-32 RTP Port Step 4 Click Save. 4.2.10 802.1x Select Enable to enable main stream or sub stream multicast, and select the sub stream Step 2 from the drop-down list if you enable sub stream multicast. Step 3 Enter multicast address and port number. For detailed description, see Table 4-15. Parameter Description Table 4-15 Multicast parameter descriptions Multicast Address The multicast IP address of main stream and sub stream is 224.1.2.4 by default, and the range is 224.0.0.0239.255.255.255. Set the multicast port of corresponding stream. Main Stream: 40000; Sub Stream1: 40016; Sub Stream2: 40032. All the range is 102565500. The multicast configuration of TS is similar to RTP, and you can refer to the previous steps. 802.1x (port based network access control protocol) supports manual selection of authentication method. Device can be connected to LAN after passing 802.1 x authentications. It well supports authentication, charging, safety and management requirement of network. Step 1 Select Setting > Network > 802.1x. The 802.1x interface is displayed. See Figure 4-33. 49 Figure 4-33 802.1x Step 2 Select Enable to enable 802.1x. Step 3 Configure parameters. See Table 4-16. Table 4-16 802.1x parameter descriptions Parameter Description Authentication PEAP (protected EAP protocol). The username that was authenticated on the server. Corresponding password. Username Password Step 4 Click Save. 4.2.11 QoS You can solve problems such as network delay and congestion with this QoS (Quality of Service). It helps to assure bandwidth, and reduce transmission delay, packet loss rate, and delay jitter to improve service quality. For DSCP (Differentiated Services Code Point), it has 64 degrees (063) of priority for packets; 0 is the lowest and 63 is the highest. It can select different queues and the bandwidth of each queue according to the priority. When the network is congested, bandwidth of different queues will be discarded with different ratios so as to guarantee service quality. Step 1 Select Setting > Network > QoS. The QoS interface is displayed. See Figure 4-34. Figure 4-34 QoS Step 2 Configure parameters. See Table 4-17. Parameter Description Table 4-17 QoS parameter descriptions Realtime Monitor Command Configure the priority of the data packets that used for network monitoring. 0 is the lowest and 63 is the highest. Configure the priority of the data packets that used for configuration or search. 0 is the lowest and 63 is the highest. 50 Step 3 Click Save. 4.2.12 Access Platform 4.2.12.1 P2P P2P (peer-to-peer) is a private network traversal technology which enables user to manage devices easily without requiring DDNS, port mapping or transit server. Scan the QR code with your smartphone, and then you can add and manage devices on your mobile client. Step 1 Select Setting > Network >Access Platform > P2P. The P2P interface is displayed. See Figure 4-35. Figure 4-35 P2P P2P is enabled by default. When P2P is enabled, the radar will be connected to the network, and the status is displayed as online. We might collect the information including IP address, MAC address, device name, device SN and so on. The information collected is for remote accessing only. Clear Enable check box if you do not agree with our information collection. Log in to mobile phone client, and then tap the cross icon at the upper-right corner of the Step 2 app on the Device interface. Step 3 Step 4 Scan the QR code on the P2P interface. Follow on-screen instructions to finish the configurations. 4.2.12.2 ONVIF The ONVIF (Open Network Video Interface Forum) allows the network video products (including video recording device and other recording devices) from different manufacturers to mutually communicate with each other. ONVIF is on by default. Step 1 Select Setting > Network > Access Platform > ONVIF. The ONVIF interface is displayed. See Figure 4-36. 51 Figure 4-36 ONVIF Step 2 Step 3 Select On. Click Save. 4.3 Event Management You can enable external and abnormality alarms, and configure linked actions such as recording, capturing, and sending email, and so on. 4.3.1 Alarm You can set the linkage actions when alarm events are triggered. Step 1 Select Setting > Event > Alarm. The Alarm interface is displayed. See Figure 4-37. Figure 4-37 Alarm linkage Select Enable check box to enable the alarm linkage, and configure parameters as needed. Step 2 Configure arming period. 1) Click Setting. The Period interface is displayed. See Figure 4-38. 52 Figure 4-38 Set arm period 2) Set arming periods, and the alarm can only be triggered when it occurs during the defined period. The time period in green on the timeline is armed. Method one: Click Setting of the day you want to set. Directly press and drag the left mouse button on the timeline. Method two: Click Setting of the day you want to set. Select the check box in front of the time period to enable it. Enter start time and end time of that time period. Select All or the check box of any other day, and the set time period will apply to the selected days. You can set 6 time periods per day. Click Save to return to the Alarm interface. 3) Set other parameters. For details, see Table 4-18. Table 4-18 Alarm linkage parameter descriptions Parameter Description Enable Relay-in Anti-Dither Select Enable check box to enable alarm linkage. Select alarm input. The system records only one motion detection event within the defined time (from 0 s to 100 s). Sensor Type Two options: NO (Normally Open) and NC (Normally Closed). Switch from NO to NC means enabling alarm. Switch from NC to NO means disabling alarm. 53 Parameter Description By selecting Record, the system will record automatically when the alarm is triggered. Record Before enabling this function, you need to configure record period in Setting >
Storage > Schedule > Record. For details, see "4.4.1.1 Record Schedule." In Setting > Storage > Record Control, select Auto for the Record Mode. Record Delay The alarm record keeps running for the defined time (from 10 s to 300 s) after the alarm is ended. Relay-out By selecting Relay-out, the corresponding alarm output device will be linked through alarm output port when the alarm is triggered. Alarm Delay The alarm keeps running for the defined time (from 10 s to 300 s) after the alarm is ended. By selecting Send Email, the system automatically sends email to the specified mailbox when the alarm is triggered. You can configure the mailbox in Setting >
Network > SMTP (Email). For details, see " 4.2.7 SNMP."
By selecting Snapshot, the system automatically captures images when the alarm is triggered. Send Email Snapshot Before enabling this function, you need to configure record period in Setting >
Storage > Schedule > Snapshot. For tetails, see "4.4.1.2 Snapshot Schedule."
Step 3 Click Save. 4.3.2 Abnormality 4.3.2.1 SD Card You can set the linkage actions when abnormal events are triggered covering SD card, network, illegal access, and scene changing. When any abnormality happens to the SD card, the alarm will be triggered. Step 1 Select Setting > Event > Abnormality > SD Card. The SD Card interface is displayed. See Figure 4-39. SD card Figure 4-39 Step 2 Configure parameters as needed. For details, see Table 4-19. 54 For other parameter descriptions, see Table 4-18. Parameter Description Table 4-19 SD card parameter descriptions Event Type Select SD card abnormality from no SD card, SD card error, and capacity warning. Enable Select Enable check box to enable SD card abnormality detection. Capacity Limit This parameter is available when Capacity Warning is selected in Event Type. Configure the free space percentage, and if the free space in the SD card is lower than the defined percentage, the alarm is triggered. Step 3 Click Save. 4.3.2.2 Network When any abnormality happens to the network, the alarm will be triggered. Step 1 Select Setting > Event > Abnormality > Network. The Network interface is displayed. See Figure 4-40. Network Figure 4-40 Step 2 Configure parameters. See Table 4-20. For other parameter descriptions, see Table 4-18. Parameter Description Table 4-20 Network parameter description Event Type Select network abnormality from disconnection and IP conflict. Enable Select Enable check box to enable to network card abnormality detection. Step 3 Click Save. 4.3.2.3 Illegal Access When the entering times of wrong password have exceeded the defined times, the alarm is triggered. Step 1 Select Setting > Event > Abnormality > Illegal Access. 55 The Illegal Access interface is displayed. See Figure 4-41. Figure 4-41 Illegal access Step 2 Configure parameters as needed. For details, see Table 4-21. For other parameter descriptions, see Table 4-18. Parameter Description Table 4-21 Illegal access parameter descriptions Enable Select Enable check box to enable to network card abnormality detection. Login Error The number of times that the login password is allowed to be incorrectly entered. When the password has been incorrectly entered for more than the defined times, the account is locked. Step 3 Click Save. 4.3.2.4 Security Exception When any event that will influence radar's security happens, the alarm will be triggered. Step 1 Select Setting > Event > Abnormality. The Security Exception interface is displayed. See Figure 4-42. Figure 4-42 Security exception Step 2 Configure parameters as needed. For other parameter descriptions, see Table 4-18. Step 3 Click Save. 56 4.3.2.5 Scene Changing When scene changing happens, the alarm will be triggered. See conditions below. The vertical detection range of the radar is covered for more than 50%. The radar is rotated for more than 30. But in open areas, 30 rotation of the radar might not trigger the alarm. Step 1 Select Setting > Event > Abnormality > Scene Changing. The Scene Changing interface is displayed. See Figure 4-43. Figure 4-43 Scene changing Step 2 Select Enable check box to enable scene changing alarm, and then configure other parameters as needed. For details, see Table 4-18. Step 3 Click Save. 4.4 Storage 4.4.1 Schedule This chapter introduces configurations of schedules for records, snapshots, and holiday, storage methods, and record control. You can configure schedules of records, snapshots, and holidays. Before configuring schedule, set Record Mode as Auto in Setting > Storage > Record Control. If you select Off, the system will not record video or take snapshot as scheduled. 4.4.1.1 Record Schedule The system starts or stops video recording as scheduled. Select Setting > Storage > Schedule > Record. Step 1 The record schedule interface is displayed. See Figure 4-44. 57 Figure 4-44 Record schedule Set a record plan. Step 2 Method one: Select a record type, such as Alarm, and then press and drag the left mouse button to draw the time period for alarm record on the timeline. Method two: Enter an actual time period. 1) Click Setting of the day you want to set. The Setting interface is displayed. See Figure 4-45. Figure 4-45 Set schedule Enter start time and end time of the time period, and select record type from General 2) and Alarm. Select All or the check box of any other day, and the set time period will apply to the selected days. You can set 6 time periods per day. Click Save to return to the Record interface. 3) Each color matches with a different record schedule. 58 Green: General video record. The system records continuously within the set Red: Alarm video record. The system records when the alarm event happens period. within the set period. Step 3 Click Save. 4.4.1.2 Snapshot Schedule The system starts or stops taking snapshot as scheduled. Step 1 Select Setting > Storage > Schedule > Snapshot. The snapshot schedule interface is displayed. See Figure 4-46. Figure 4-46 Snapshot schedule Step 2 Step 3 Configure time periods. For details, see previous record schedule settings. Click Save. 4.4.1.3 Holiday Schedule Set certain days as holiday, and when the Record or Snapshot is selected in the holiday schedule, the system takes snapshot or records as holiday schedule defined. Select Setting > Storage > Schedule > Holiday Schedule. Step 1 The Holiday Schedule interface is displayed. See Figure 4-47. 59 Figure 4-47 Holiday schedule Step 2 Step 3 Step 4 Select the days to be set as holiday as needed. The selected days has yellow background. Select from Record and Snapshot, and then click Save. On Record or Snapshot interface, click Setting behind Holiday, and then you can set detection type and detection period. For details, see "4.4.1.1 Record Schedule."
Step 5 Click Save. Record and snapshot will be taken according to the set holiday schedule for the selected days. 4.4.2 Destination 4.4.2.1 Path This section introduces the configurations of storage paths for the records and snapshots. You can select storage paths from Local, FTP, or NAS for the records and snapshots. Step 1 Select Setting > Storage > Destination > Path. The Path interface is displayed. See Figure 4-48. Figure 4-48 Path 60 Step 2 Select the storage path for the records and snapshots of different event types as needed. For detailed parameter descriptions, see Table 4-22. Parameter Description Table 4-22 Path parameter descriptions Event Type Select from Scheduled and Alarm. It matches with the record types on the schedule interface. Local FTP NAS Save in the internal SD card. Save in the FTP server. Save in the NAS (network Attached Storage). Step 3 Click Save. 4.4.2.2 Local Display the internal SD card information. You can set it as read only or read & write; you can also hot swap or refresh it. Select Setting > Storage > Destination > Local, and then the Local interface is displayed. See Figure 4-49. Click Read Only, and then the SD card is set to read only. Click Read & Write, and then the SD card is set to read & write. Click Hot Swap to realize hot swap upon the SD card. Click Refresh, and then you can format the SD card. Figure 4-49 Local 4.4.2.3 FTP When the network fails or is disconnected, you can save all the files to the internal SD card for emergency. FTP function can be enabled only when the storage path is selected as FTP. Step 1 Select Setting > Storage > Destination > FTP. The FTP interface is displayed. See Figure 4-50. 61 Step 2 Select Enable check box to enable the FTP function. SFTP is recommended to enhance network security. Step 3 Configure FTP parameters. See Table 4-23. Table 4-23 FTP parameter descriptions Parameter Description Server Address The IP address of the FTP server. Port Username Password The port number of the FTP server. The username to log in to the FTP server. The password to log in to the FTP server. Remote Directory The destination path in the FTP server. Emergency (Local) Select Emergency (Local), and when the FTP server fails, all the files are saved to the internal SD card. Step 4 Step 5 Click Test to test if FTP server can be connected to radar. Click Save. 4.4.2.4 NAS NAS function can be enabled only when the storage path is selected as NAS. Step 1 Select Setting > Storage > Destination > NAS. The NAS interface is displayed. See Figure 4-51. Figure 4-50 FTP 62 Figure 4-51 NAS Step 2 Configure NAS parameters. See Table 4-24. Parameter Description Table 4-24 NAS parameter descriptions Enable Select Enable check box to enable NFS or SMB function. NFS (Network File System): A file system which enables computers in the same network share files through TCP/IP. SMB (Server Message Block): Provide shared access for clients and the server. Server Address The IP address of the NAS server. The destination path in the NAS server. Remote Directory Step 3 Click Save. 4.4.3 Record Control This section introduces record control configurations, including pack duration, pre-event record, disk full, record mode, and record stream. Step 1 Select Setting > Storage > Record Control. The Record Control interface is displayed. See Figure 4-52. Figure 4-52 Record control Step 2 Configure record control parameters. See Table 4-25. 63 Parameter Description Pack Duration Pre-event Record Table 4-25 Record control parameter descriptions Set the pack duration of each record; it is 30 min by default. The time period for which the system records video before alarm starts. If the value is 5, then the system records video for 5 s before alarm starts and then save it to the record. If the Record Mode is Off, and the record is triggered by an alarm event, the system will save n seconds (the duration set in Pre-event Record) of the video, which starts before enabling recording, into the whole record. Set the record method when the disk is full. You can select from:
Stop: The system stops recording when the disk is full. Overwrite: The system overwrites the oldest files and keeps recording when the disk is full. Manual: The system starts recording video manually. Auto: The system records video as time period scheduled. Off: The system will not record video or take snapshots. Include main stream and sub stream. This chapter introduces system configurations, including general settings, date & time, account, safety, default, import and export configurations, auto maintenance, and upgrade. You can configure radar name, system language and video format. Step 1 Select Setting > System > General > General. The General interface is displayed, see Figure 4-53. General Figure 4-53 Disk Full Record Mode Record Stream Step 3 Click Save. 4.5 System 4.5.1 General Step 2 Configure General parameters. See Table 4-26. 64 Table 4-26 General parameter descriptions Parameter Description The name of the radar. Name Each device has a different name. Language Select system language. Video Standard Select video standard from PAL and NTSC. Step 3 Click Save. 4.5.2 Date & Time You can configure date and time format, time zone, current time, DST (Daylight Saving Time), and NTP (Network Time Protocol) server. Step 1 Select Setting > System > General > Date & Time. The Date & Time interface is displayed. See Figure 4-54. Figure 4-54 Date & Time Step 2 Configure Date & Time parameters. See Table 4-27. Table 4-27 Date & Time parameter descriptions Parameter Description Date Format Select the date format. Time Format Select the time format from 12-hour or 24-hour. Time Zone Select the time zone that the radar is at. Current Time Configure system time. Click Sync PC, and the system time will sync to the time on PC. 65 Parameter Description DST NTP Server Port Interval Enable DST as needed. Select the check box, and then configure start time and end time of DST with Date or Week. Select NTP check box to enable NTP function and the system will sync time to the Internet server. Set the address of time server. Set the port of time server. Set the sync interval between the radar and the time server. Step 3 Click Save. 4.5.3 Account You can add, delete, or modify users and groups. Managing users and groups are only available for administrator users. The maximum length of the user or group name is 15 characters. A user name can only consist of numbers, letters, underline, dot and @. A group name can only consist of numbers, letters, and underline. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &). Follow the password security notice to set a high security level password. Make sure that the new password and the confirmed password are the same. You can have 18 users and 8 groups at most according to factory settings. You can manage users in two methods: Single user or group. Duplicate usernames or group names are not allowed. A user can be in only one group at a time. Online users cannot modify their own authority. There is one admin by default which has the highest authority. 4.5.3.1 User You are admin user by default. You can add users, delete added users, modify user password, and log in anonymously. Select Setting > System > Account > Account > Username. The Username interface is displayed. See Figure 4-55. 66 Anonymous Login By selecting Anonymous Login check box, you can log in with only entering IP address instead of username and password. Anonymous users only have live view authority. Under Anonymous Login, you can log in with other account after clicking Logout. Adding a User You can add users to the group, and configure user authority. As a default user with the highest authority, admin cannot be deleted. Step 1 Click Add User. The Add User interface is displayed. See Figure 4-56. Figure 4-55 Username 67 Figure 4-56 Add user 68 Step 2 Enter username and password, and then select group and operation permission. A user can be in only one group at a time, and the group users can own authorities within group authority range. It is recommended to give fewer authorities to normal users than premium users.
(Optional) Click Restricted Login to set IP address, validity period, and time range of the added user. See Figure 4-57. Step 3 Figure 4-57 Restricted login 69 Step 4 Click Save. Modifying a User Step 1 Click of the selected user. The Modify User interface is displayed. See Figure 4-58. Figure 4-58 Modify user Step 2 Step 3 Modify user information as needed. Click Save. Modifying the Password Step 1 Click of the selected user. The Modify User interface is displayed. Step 2 Step 3 Step 4 Select Modify Password check box. Enter the old password, new password, and then confirm the password. Click Save. Deleting a User 4.5.3.2 Group Click to delete the added user. You have two groups named admin and user by default, you can add new group, delete added group or modify group authority and memo. Step 1 Select Setting > System > Account > Account > Group Name. The Group Name interface is displayed. See Figure 4-59. 70 Figure 4-59 Group name Adding a Group For details, see "4.5.3.1 User."
Modifying a Group For details, see "4.5.3.1 User."
Deleting a Group For details, see "4.5.3.1 User."
4.5.4 Onvif User You can add, delete, and modify Onvif users. Step 1 Select Setting > System > Account > Onvif User. The Onvif User interface is displayed. See Figure 4-60. Figure 4-60 Onvif user Step 2 Click Add User. The Add User interface is displayed. See Figure 4-61. 71 Figure 4-61 Add user Step 3 Step 4 Set username, password, and select group. Click Save. Click to modify user information. 4.5.5 Safety You can set RTSP authentication, system service, HTTPS, and firewall to ensure the safety of data transmission. 4.5.5.1 RTSP Authentication Real Time Streaming Protocol (RTSP) ensures the safety of the streaming media during transmission. Step 1 Select Setting > System > Safety > RTSP Authentication. The RTSP Authentication interface is displayed. See Figure 4-62. Figure 4-62 RTSP Authentication Step 2 Select authorize mode. Click Default and the Authorize Mode will be selected as Digest automatically. If you select None and click Save, the prompt "Non-authentication mode may have risk. Are you sure to enable it?" will pop up to remind you about the risk. Be careful. If you select Basic and click Save, the prompt "Basic authentication mode may have risk. Are you sure to enable it?" will pop up to remind you about the risk. Be careful. 72 4.5.5.2 System Service You can configure system services and ensure system security. Select Setting > System > Safety > System Service. Step 1 The System Service interface is displayed. See Figure 4-63. Figure 4-63 System service Step 2 Configure system service parameters. See Table 4-28. Function SSH Multicast/Broadcast Search Table 4-28 System service parameter descriptions Description Disabled by default. You can enable SSH authentication to perform safety management. Enabled by default. When multiple users watch the live video simultaneously through network, they can find your device with multicast or broadcast protocol. Enabled by default. You can reset the password if you forget the password. Password Reset CGI Service Onvif Service Genetec Service Audio and Video Transmission Encryption If you disable the function, you can only restore the device to default settings through hardware and then reset the password. Enabled by default, and the radar can be accessed through these protocols. Enable the function to encrypt audio and video transmission. Make sure that matched device or software supports video decryption. Encryption function is not supported when transmitting audio and video date between the radar and the third party platform and device. To ensure data security, we recommend you to disable CGI service, Onvif service, and Genetec service. 73 Function Description Mobile Push Step 3 Click Save. Enabled by default. The system will send the snapshot that was taken when alarm is triggered to your phone. 4.5.5.3 HTTPS Create certificate or upload the authenticated certificate, and then you can connect through HTTPS with your PC. The HTTPS can ensure safety of data communication, user information, and radar with reliable technology. Step 1 Create a certificate or upload the authenticated certificate. If you need to create certificate, follow the steps below. 1) Select Setting > System > Safety > HTTPS. The HTTPS interface is displayed. See Figure 4-64. Figure 4-64 HTTPS (1) 2) 3) Click Create. Enter the required information and then click Create. If the operation is correct, then the Create Successful prompt is displayed. The entered IP or Domain name must be the same as the IP or domain name of the radar. 4) Click Install. The certificate begins to be installed. See Figure 4-65. 74 Figure 4-65 Install certificate 5) Click Download to download root certificate. The Save As dialog box is displayed. See Figure 4-66. Download certificate Figure 4-66 6) 7) Select storage path, and then click Save. Double-click the RootCert.cer icon. The Certificate interface is displayed. See Figure 4-67. 75 Figure 4-67 Certificate 76 8) Click Install Certificate. The Certificate Import Wizard interface is displayed. See Figure 4-68. Figure 4-68 Certificate import wizard 9) Click Next. Select Trusted Root Certification Authorities. See Figure 4-69. Figure 4-69 Store certificate 10) Click Next. The Completing the Certificate Import Wizard interface is displayed. See Figure 4-70. 77 Figure 4-70 Complete certificate import wizard 11) Click Finish. The Security Warning dialog box is displayed. See Figure 4-71. Figure 4-71 Security warning 12) Click Yes. The The import was successful dialog box is displayed. Click OK to finish download. See Figure 4-72. 78 Figure 4-72 Import successfully If you select Install Signed Certificate, follow the steps below. 1) Select Setting > System > Security > HTTPS. The HTTPS interface is displayed. 2) Click Browse to select signed certificate path and certificate key path, and then click Upload. Install root certificate. See the previous steps in creating certificate. 3) Step 2 Select Enable HTTPs, and then click Save. The Reboot interface is displayed. See Figure 4-73. Figure 4-73 Reboot the radar If HTTPS is enabled, you cannot access the radar through HTTP. It will switch to HTTPS automatically. 4.5.6 Firewall You can configure network access, refuse PING request, and prevent Semijoin to enhance network and data security. Network Access: Set trusted list and banned list to limit access permission. Trust List: Only the IP/MAC addresses in the list can access the selected port of the radar. Banned List: The IP/MAC addresses in the list cannot access the selected port of the radar. PING Prohibited: By enabling PING Prohibited function, the radar will not response to the ping request. Prevent Semijoin: By enabling Prevent Semijoin function, the radar can provide service normally under Semijoin attack. You cannot add IP/MAC address of the radar to the trusted or banned list. You cannot set port number when MAC address is added to the trusted or banned list. When the IP addresses of the radar and your PC are in the same LAN, MAC verification takes When you access the radar through Internet, MAC address verifies according to the router effect. MAC. This section takes Network Access as an example. 79 Step 1 Select Setting > System > Safety > Firewall. The Firewall interface is displayed. See Figure 4-74. Firewall Figure 4-74 Step 2 Select Network Access from Rule Type list, and then select Enable check box. Enable PING Prohibited or Prevent Semijoin, and click Save to complete the configuration. You do not need to configure parameters. Enable Network Access, and configure trust list and banned list. 1) 2) Select the mode: TrustList and BannedList. Click Add IP/MAC. The Add IP/MAC interface is displayed. See Figure 4-75. Figure 4-75 Add IP/MAC 3) Configure parameters. For details, see Table 4-29. Table 4-29 Parameter descriptions of adding IP/MAC Parameter Description Rule Type IP address: Select IP version and enter the IP address of the host to be added. IP segment: Select IP version and enter the start address and 80 Parameter Description IP Version Device All Ports Device Start Server Port Device End Server Port end address of the segment to be added. MAC address: Enter MAC address of the host to be added. All IP addresses: Set all IP addresses in trust list or banned list. IPv4: Enter IP address in IPv4 format, such as 192.108.1.125. IPv6: Enter IP address in IPv6 format, such as aa:aa:aa:aa:aa:aa:aa:aa. Set access ports. You can select all ports or the ports in defined range. Device All Ports: Set all IP port in trust list or banned list. When selecting BannedList in Mode, and All IP Address in Rule Type, you cannot select Device All Ports check box. Device Start Server Port and Device End Server Port: Set device start server port and device end server port, and the range is 165535. Step 3 Select OK, and the Firewall interface is displayed. Step 4 Click Save. 4.5.7 Default Restore the radar to default configurations or factory settings. Select Setting > System > Default. The Default interface is displayed. See Figure 4-76. Figure 4-76 Default Click Default, and then all the configurations except IP address and account management will be restored to default. Click Factory Default, and all the configurations will be restored to factory settings. 4.5.8 Import/Export Export the system configuration file to back up the system configuration. Import system configuration file to make quick configuration or recover system configuration. The map you imported in linkage configuration cannot be imported or exported. Select Setting > System > Import/Export. The Import/Export interface is displayed. See Figure 4-77. 81 Figure 4-77 Import/Export Click Export to export the configuration file (.backup file) to local. Click Import to import the configuration file into the system. 4.5.9 Auto Maintain You can restart the system manually, or set the time of auto restarting and auto deleting old files. The system will execute the corresponding actions at the defined time. Step 1 Select Setting > System > Auto Maintain. The Auto Maintain interface is displayed. See Figure 4-78 Figure 4-78 Auto Maintain Step 2 Configure auto maintain parameters. See Table 4-30. Table 4-30 Auto maintain parameter descriptions Parameter Description Auto Reboot Select Auto Reboot, and then configure the auto rebooting time. Select Auto Delete Old Files check box, and then configure the time; the time range is 1 to 31 days. Auto Delete Old Files When you enable and confirm the Auto Delete Old Files, the deleted files cannot be restored. Be careful. Step 3 Click Save. 4.5.10 Upgrade You can upgrade the system to the latest version to improve radar function and stability. If wrong upgrade file has been used, please restart the radar, otherwise some functions might not work properly. Step 1 Select Setting > System > Upgrade. The Upgrade interface is displayed. See Figure 4-79. 82 Figure 4-79 Upgrade Step 2 Select upgrade method. File Upgrade 1) Click Browse, and then upload upgrade file. The upgrade file should be a .bin file. 2) Click Upgrade. The upgrade starts. Online Upgrade 1) Select the Auto-check for updates check box. It will enable the system to check for upgrade once a day automatically and there will be system notice if any upgrade is available. In order to inform you to upgrade in time, we need to collect the information such as device name, device IP address, firmware version, and device serial number. All the collected information is only used to verify device legality and send upgrade messages. If there is any upgrade available, click Upgrade, and then the system starts upgrading. 2) Click Manual Check, and you can check for upgrade manually. 4.6 Information 4.6.1 Version You can view version, log, working time, upgrade times of the system, and more. You can view hardware information, system version, and web version of the radar. Versions of different devices might vary, and the actual interface shall prevail. Select Setting > Information > Version, and then the Version interface is displayed. See Figure 4-80. 83 Figure 4-80 Version 4.6.2 Log You can view and backup operation and system logs. Select Setting > Information > Log. Step 1 The Log interface is displayed. See Figure 4-81. Figure 4-81 Log Step 2 Configure Start time and End time, and then select log type. The start time should be later than January 1st, 2000, and the end time should be earlier than December 31, 2037. The log type includes All, System, Setting, Data, Event, Record, Account, and Safety. 84 System: Include program launching, force exit, exit, program restarting, device turn off/restarting, system restarting, and system upgrade. Setting: Include save configuration and delete configuration files. Data: Include configuring disk type, erasing data, hot swap, FTP status, and record mode. Event (Record events such as video detection, smart plan, alarm, and abnormality): Include event start and event end. Record: Include file access, file access error, and file search. Account: Include login, logout, add user, delete user, modify user, add group, delete group, and modify group. Safety: Include safety related information such as password reset and IP filter. Step 3 Click Search. The needed logs are displayed. Click a certain log, and then you can view the detailed information in Detailed Information area. Click Backup, and then you can back up all the found logs to your PC. Click Clear to clear all logs. 4.6.3 Remote Log You can upload the log information to the log server. Step 1 Select Setting > Information > Log > Remote Log. The Remote Log interface is displayed. See Figure 4-82. Figure 4-82 Remote log Step 2 Step 3 Step 4 Select Enable check box to enable the remote log function. Set the IP address, port, and device number as needed. Click Save. You can click Default to restore the settings. 4.6.4 Online User You can view username, user local group, IP address, and user login time of the online users. Select Setting > Information > Online User. 85 The Online User interface is displayed. See Figure 4-83. Figure 4-83 Online user 86 5 Alarm You can subscribe alarm messages and view the triggered alarm event information on the right column of Alarm interface. Alarm prompt and alarm tone can also be selected as a reminder. Click Alarm tab, and then the Alarm interface is displayed. See Figure 5-1. For more parameter descriptions, see Table 5-1. Figure 5-1 Alarm Parameter Name Description Table 5-1 Alarm parameter descriptions Alarm Type Illegal Access Select to record the alarm when unauthorized access occurs. Disk Full Disk Error External Alarm Security Exception Radar Alarm Select to record the alarm when disk is full. Select to record the alarm when disk malfunctions. Select to record the alarm when radar receives external alarm. Select to record the alarm when security exception occurs. Select to record the alarm when an alarm is triggered in the configured detection region. When an alarm is triggered, if you are not in Alarm interface, icon will be displayed on Alarm tab, and the alarm will be recorded automatically. icon disappears when you click Alarm tab. Note If you are in Alarm interface, when the alarm is triggered, icon will not be displayed, but the alarm will be recorded. Operation Prompt Alarm Tone Play Alarm Tone Select the function and choose audio file. When alarm occurs, system automatically generates alarm audio. 87 Parameter Name Description Tone Path Select Browse to choose alarm audio file. 88 6 Logging out Click Logout tab, and then the system goes back to login interface. See Figure 6-1. Figure 6-1 Login 89 Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: its something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system. Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped with the latest security patches and fixes. When the device is connected to the public network, it is recommended to enable the auto-check for updates function to obtain timely information of firmware updates released by the manufacturer. We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection We suggest that you perform physical protection to device, especially storage devices. For example, place the device in a special computer room and cabinet, and implement well-done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable device (such as USB flash disk, serial port), etc. 2. Change Passwords Regularly We suggest that you change passwords regularly to reduce the risk of being guessed or cracked. 3. Set and Update Passwords Reset Information Timely The device supports password reset function. Please set up related information for password reset in time, including the end users mailbox and password protection questions. If the information changes, please modify it in time. When setting password protection questions, it is suggested not to use those that can be easily guessed. 4. Enable Account Lock The account lock feature is enabled by default, and we recommend you to keep it on to guarantee the account security. If an attacker attempts to log in with the wrong password several times, the corresponding account and the source IP address will be locked. 5. Change Default HTTP and Other Service Ports 90 We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS 7. MAC Address Binding We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing. 8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a minimum set of permissions to them. 9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to reduce risks. If necessary, it is highly recommended that you use safe modes, including but not limited to the following services:
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication passwords. SMTP: Choose TLS to access mailbox server. FTP: Choose SFTP, and set up strong passwords. AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords. 10. Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive, we recommend that you use encrypted transmission function, to reduce the risk of audio and video data being stolen during transmission. Reminder: encrypted transmission will cause some loss in transmission efficiency. 11. Secure Auditing Check online users: we suggest that you check online users regularly to see if the device is logged in without authorization. Check device log: By viewing the logs, you can know the IP addresses that were used to log in to your devices and their key operations. 12. Network Log Due to the limited storage capacity of the device, the stored log is limited. If you need to save the log for a long time, it is recommended that you enable the network log function to ensure that the critical logs are synchronized to the network log server for tracing. 13. Construct a Safe Network Environment In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet devices from external network. The network should be partitioned and isolated according to the actual network needs. If there are no communication requirements between two sub networks, it is suggested to use VLAN, network GAP and other technologies to partition the network, so as to achieve the network isolation effect. Establish the 802.1x access authentication system to reduce the risk of unauthorized access to private networks. 91 Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. 92
1 | Label | ID Label/Location Info | 143.43 KiB | July 08 2022 |
Radar System @hua DH-PFR4K-B240 12V ==,2A/24V ~ ,1A;POE;50/60Hz Detection Range: 240m Detection Angle: 20 PIN: 1.0.01.21.10250 SIN: 2M0024EPAG26500 FCC ID: SVNPFR4kK-B240 MADE IN CHINA Date:2022-03 ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. FCC Warning Statement This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference and
(2) this device must accept any interference received, including interference that may cause undesired operation.
1 | Applicant Declaration Letter | Cover Letter(s) | 381.70 KiB | July 08 2022 |
SGS North America Inc. 620 Old Peachtree Road SUITE 100 Suwanee, Georgia 30024 United States Applicant Declaration Applicant Legal Business Name Zhejiang Dahua Vision Technology Co., Ltd No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China Address Grantee Code FCC ID Contact Email Contact Phone Authorized Contact Name Yolanda chen SVN SVNPFR4K-B240 chen_yunhuan@dahuatech.com 0571-28822025 I, the undersigned, certify that I am an authorized signatory for the Applicant and therefore declare;
in accordance with 47CFR2.911(d), all of the statements herein and the exhibits attached hereto are true and correct to the best of my knowledge and belief. in accepting a Grant of Equipment Authorization issued by a TCB, under the authority of the FCC, as a result of the representations made in this application, the Applicant is responsible for:
labeling the equipment with the exact FCC ID as specified in this application,
(1)
(2) compliance statement labeling pursuant to the applicable rules,
(3) compliance of the equipment with the applicable technical rules, if the Applicant is not the actual manufacturer of the equipment, appropriate arrangements have been made with the manufacturer to ensure that production units of this equipment will continue to comply with the FCCs technical requirements. in accordance with 47 CFR 2.909 and KDB394321, the Applicant has read, understood and agrees to accept that they are the responsible party and agree to abide by their responsibilities as specified under 47 CFR 2.909 and KDB394321. in accordance with ISO17065, FCC KDB641163, FCC KDB610077, KDB394321 and RSP-100, the Applicant has read, understood, accepts and agrees to abide by the post market surveillance requirements.
(1)
(2)
(3) the Applicant understands, accepts and agrees that a sample may be requested for surveillance testing. the Applicant shall make provisions to always have a production sample available upon request by SGS, FCC and/or ISED. the Applicant shall, upon request by SGS, at the Applicants expense, provide a production sample of the requested product to SGS, FCC and/or ISED as instructed. The sample shall include all support devices, cables, software, accessories or other hardware or software required for evaluation, review, certification and audit surveillance of products certified by SGS. neither the Applicant nor any party to the application is subject to a denial of Federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 862 because of a conviction for possession or distribution of a controlled substance. See 47CFR 1.2002(b) for the definition of a party for these purposes. the Applicant has read, understood, accepts and agrees to abide by the SGS North America, Inc.(TCB) terms and conditions. Link to CFRs: https://www.fcc.gov/wireless/bureau-divisions/technologies-systems-and-innovation-division/rules-regulations-title-47 Link to KDBs: https://apps.fcc.gov/oetcf/kdb/index.cfm Link to RSP-100: https://www.ic.gc.ca/eic/site/smt-gst.nsf/eng/sf01130.html Applicant Signature:
Date:2022-05-07 Print Name:
Title:
Yolanda chen Senior Certification engineer
*NOTE: This declaration cannot be signed by an Agent, it shall be signed by an authorized person listed in the FCC database a) b) c) d) e) f) g) Applicant Declaration Rev:0.0
1 | Auth letter | Cover Letter(s) | 184.36 KiB | July 08 2022 |
ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. TO:
Federal Communication Commission Equipment Authorization Branch 7435 Oakland Mills Road Columbia, MID 21046 Date: 2022-05-07 Regarding: FCC ID: SVNPFR4K-B240 To whom it may concern:
We, the undersigned, hereby authorize Parlam Zhan to act on our behalf in all manners relating to application for equipment authorization with respect to the FCC ID above, including signing of all documents relating to these matters. Any and all acts carried out by the agent on our behalf shall have the same effect as acts of our own. We, the undersigned, hereby certify that we are not subject to a denial of federal benefits, that includes FCC benefits, pursuant to Section 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 853(a). Where our agent signs the application for certification on our behalf, I acknowledge that all responsibility for complying with the terms and conditions for Certification, as specified by SGS North America, Inc., still resides with ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. This authorization is valid until further written notice from the applicant. Name (Printed): Yolanda chen Signature:
On behalf of Company: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. Telephone: No.1199, Binan Road, Binjiang District, Hangzhou, P.R.China Title: Certificate Engineer
1 | Confidentiality FCC | Cover Letter(s) | 181.83 KiB | July 08 2022 |
Confidentiality Request regarding application for FCC ID: SVNPFR4K-B240 No.1199, Binan Road, Binjiang District, Hangzhou, P.R.China SGS North America Inc. 620 Old Peachtree Road SUITE 100 Suwanee, Georgia United States ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. To:
From: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD. Regarding:
LONG TERM CONFIDENTIALITY Pursuant to 47 CFR Section 0.459 and 0.457 of the commissions rules, the applicant hereby request confidential treatment of the documents listed below, associated with the certification application referenced above. Schematic(s) Block Diagrams Operational Descriptions The documents above contain proprietary information not released to the public. Public disclosure of this information may prove harmful to the business of the applicant. Sincerely, Signature:
Printed Name (on file with the FCC associated with the Grantee Code): Yolanda chen Title: Certificate Engineer Company Name: ZHEJIANG DAHUA VISION TECHNOLOGY CO.,LTD..
1 | MCL | Cover Letter(s) | 112.72 KiB | July 08 2022 |
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. Current Date : 2022-05-12 SGS-CSTC Standards Technical Services (Shanghai) Co., Ltd. No. 588 West Jindu Road, Songjiang District, Shanghai, China. 201612 Dear Sir/Madam, Subject: Declaration Letter about Identity of Products
*WE (ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.) HEREBY DECLARED THAT Product Description Radar System Model No. PFR4K-B240,DH-PFR4K-B240A,PFR4K-B240A Manufacturers Name ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. Manufacturers Address No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
*Except that the model number, trade name,Color and appearance deviation, are identical with the original product as follows:
Note: The definition of identical should be electrically identical. A device will be considered to be electrically identical if no changes are made to the devices schematics, board layouts, component layouts, chip sets, resistors and all other electrical aspects of the device are identical. with the model(s) below which samples we chose to be tested by SGS Model No. ():
DH-PFR4K-B240 Manufacturers Name ():
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. Manufacturers Address):
No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China Sincerely, Signature ():
Printed Name ():
Yolanda.chen Position/Title ():
Senior Certification engineer Contact Number ():
0571-28822025 To:
frequency | equipment class | purpose | ||
---|---|---|---|---|
1 | 2022-07-08 | 24000 ~ 24250 | DXX - Part 15 Low Power Communication Device Transmitter | Original Equipment |
app s | Applicant Information | |||||
---|---|---|---|---|---|---|
1 | Effective |
2022-07-08
|
||||
1 | Applicant's complete, legal business name |
Zhejiang Dahua Vision Technology Co., Ltd
|
||||
1 | FCC Registration Number (FRN) |
0028432326
|
||||
1 | Physical Address |
No.1199, Bin'an Road, Binjiang District, Hangzhou, P.R. China
|
||||
1 |
No.1199, Bin'an Road, Binjiang District, Hangzhou
|
|||||
1 |
Hangzhou, N/A
|
|||||
1 |
China
|
|||||
app s | TCB Information | |||||
1 | TCB Application Email Address |
U******@SGS.COM
|
||||
1 | TCB Scope |
A2: Low Power Transmitters (except Spread Spectrum) and radar detectors operating above 1 GHz
|
||||
app s | FCC ID | |||||
1 | Grantee Code |
SVN
|
||||
1 | Equipment Product Code |
PFR4K-B240
|
||||
app s | Person at the applicant's address to receive grant or for contact | |||||
1 | Name |
Y**** c******
|
||||
1 | Telephone Number |
0571-********
|
||||
1 | Fax Number |
0571-********
|
||||
1 |
c******@dahuatech.com
|
|||||
app s | Technical Contact | |||||
1 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 | Name |
P****** Z******
|
||||
1 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 |
ShangHai, 201612
|
|||||
1 |
China
|
|||||
1 | Telephone Number |
+8621********
|
||||
1 | Fax Number |
02161********
|
||||
1 |
P******@sgs.com
|
|||||
app s | Non Technical Contact | |||||
1 | Firm Name |
SGS-CSTC Standards Technical Services Co., Ltd.
|
||||
1 | Name |
P**** Z********
|
||||
1 | Physical Address |
588 West Jindu Road, Xinqiao, Songjiang
|
||||
1 |
ShangHai, 201612
|
|||||
1 |
China
|
|||||
1 | Telephone Number |
+8621********
|
||||
1 | Fax Number |
02161********
|
||||
1 |
P******@sgs.com
|
|||||
app s | Confidentiality (long or short term) | |||||
1 | Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | Yes | ||||
1 | Long-Term Confidentiality Does this application include a request for confidentiality for any portion(s) of the data contained in this application pursuant to 47 CFR § 0.459 of the Commission Rules?: | No | ||||
if no date is supplied, the release date will be set to 45 calendar days past the date of grant. | ||||||
app s | Cognitive Radio & Software Defined Radio, Class, etc | |||||
1 | Is this application for software defined/cognitive radio authorization? | No | ||||
1 | Equipment Class | DXX - Part 15 Low Power Communication Device Transmitter | ||||
1 | Description of product as it is marketed: (NOTE: This text will appear below the equipment class on the grant) | Radar System | ||||
1 | Related OET KnowledgeDataBase Inquiry: Is there a KDB inquiry associated with this application? | No | ||||
1 | Modular Equipment Type | Does not apply | ||||
1 | Purpose / Application is for | Original Equipment | ||||
1 | Composite Equipment: Is the equipment in this application a composite device subject to an additional equipment authorization? | No | ||||
1 | Related Equipment: Is the equipment in this application part of a system that operates with, or is marketed with, another device that requires an equipment authorization? | No | ||||
1 | Is there an equipment authorization waiver associated with this application? | No | ||||
1 | If there is an equipment authorization waiver associated with this application, has the associated waiver been approved and all information uploaded? | No | ||||
app s | Test Firm Name and Contact Information | |||||
1 | Firm Name |
Compliance Certification Services (Kunshan) Inc.
|
||||
1 | Name |
J**** C********
|
||||
1 | Telephone Number |
+ 86-******** Extension:
|
||||
1 |
J******@sgs.com
|
|||||
Equipment Specifications | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Line | Rule Parts | Grant Notes | Lower Frequency | Upper Frequency | Power Output | Tolerance | Emission Designator | Microprocessor Number | |||||||||||||||||||||||||||||||||
1 | 1 | 15C | 24000.00000000 | 24250.00000000 |
some individual PII (Personally Identifiable Information) available on the public forms may be redacted, original source may include additional details
This product uses the FCC Data API but is not endorsed or certified by the FCC