Dahua Dahua Technology DH-IPC-HDBW1430DE-SW Dome IP Overvågningskamera (2560x1440) User manual [EN]

Page 1
Network Camera Web 5.0
Operation Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.5
Page 2
General
This manual introduces the functions, configuration, general operation, and system maintenance of
network camera. Read carefully before using the platform, and keep the manual safe for future
reference.
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Operation Manual

Foreword

Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in property damage, data loss, reductions in performance, or unpredictable results.
Revision History
Version Revision Content Release Date
V1.0.5
V1.0.4
V1.0.3 Added parking space detection mode. November 2021
V1.0.2
Provides additional information as a supplement to the text.
Provides methods to help you solve a problem or save time.
Added the description of splicing and panoramic linkage.
Added the description of EPTZ, AI SSA and AFSA.
Added "6.2.2.2.14 Configuring Parking
Space".
Added "8.5 Setting Vehicle Density".
Added "8.6 Setting Parking Space".
Added "12.1.4 Crowd Distribution".
Added "12.1.5 Vehicle Density".
Updated "8.11 Setting ANPR".
September 2022
April 2022
July 2021
Added "8.8 Setting People Counting"
and "8.10 Setting Heat Map".
Added "6.2.1.11 Fisheye" and "7.4.4
V1.0.1
V1.0.0 First release. September 2020
Fisheye".
Updated "8.2 Setting Face
Recognition".
Updated "12 Report".
May 2021
Page 3
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy
protection laws and regulations to protect the legitimate rights and interests of other people by
implementing measures which include but are not limited: Providing clear and visible identification
to inform people of the existence of the surveillance area and provide required contact information.
About the Manual
The manual is for reference only. Slight differences might be found between the manual and the
product.
We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
If there is any uncertainty or controversy, we reserve the right of final explanation.
Operation Manual
II
Page 4

Important Safeguards and Warnings

This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, and comply with the
guidelines when using it.
Transportation Requirements
Transport the device under allowed humidity and temperature conditions.
Pack the device with packaging provided by its manufacturer or packaging of the same quality
before transporting it.
Do not place heavy stress on the device, violently vibrate or immerse it in liquid during
transportation.
Storage Requirements
Operation Manual
Store the device under allowed humidity and temperature conditions.
Do not place the device in a humid, dusty, extremely hot or cold site that has strong
electromagnetic radiation or unstable illumination.
Do not place heavy stress on the device, violently vibrate or immerse it in liquid during storage.
Installation Requirements
Strictly comply with the local electrical safety code and standards, and check whether the power
supply is correct before operating the device.
Please follow the electrical requirements to power the device.
When selecting the power adapter, the power supply must conform to the requirements of
ES1 in IEC 62368-1 standard and be no higher than PS2. Please note that the power supply
requirements are subject to the device label.
We recommend using the power adapter provided with the device.
Do not connect the device to two or more kinds of power supplies, unless otherwise specified, to
avoid damage to the device.
The device must be installed in a location that only professionals can access, to avoid the risk of
non-professionals becoming injured from accessing the area while the device is working.
Professionals must have full knowledge of the safeguards and warnings of using the device.
Do not place heavy stress on the device, violently vibrate or immerse it in liquid during
installation.
An emergency disconnect device must be installed during installation and wiring at a readily
accessible location for emergency power cut-off.
We recommend you use the device with a lightning protection device for stronger protection
III
Page 5
against lightning. For outdoor scenarios, strictly comply with the lightning protection
regulations.
Ground the function earthing portion of the device to improve its reliability (certain models
are not equipped with earthing holes). The device is a class I electrical appliance. Make sure that
the power supply of the device is connected to a power socket with protective earthing.
The dome cover is an optical component. Do not directly touch or wipe the surface of the cover
during installation.
Operation Requirements
The cover must not be opened while the device is powered on.
Do not touch the heat dissipation component of the device to avoid the risk of getting burnt.
Use the device under allowed humidity and temperature conditions.
Do not aim the device at strong light sources (such as lamplight, and sunlight) when focusing it,
to avoid reducing the lifespan of the CMOS sensor, and causing overbrightness and flickering.
When using a laser beam device, avoid exposing the device surface to laser beam radiation.
Prevent liquid from flowing into the device to avoid damage to its internal components.
Protect indoor devices from rain and dampness to avoid electric shocks and fires breaking out.
Do not block the ventilation opening near the device to avoid heat accumulation.
Protect the line cord and wires from being walked on or squeezed particularly at plugs, power
sockets, and the point where they exit from the device.
Do not directly touch the photosensitive CMOS. Use an air blower to clean the dust or dirt on the
lens.
The dome cover is an optical component. Do not directly touch or wipe the surface of the cover
when using it.
There might be a risk of electrostatic discharge on the dome cover. Power off the device when
installing the cover after the camera finishes adjustment. Do not directly touch the cover and
make sure the cover is not exposed to other equipment or human bodies
Strengthen the protection of the network, device data and personal information. All necessary
safety measures to ensure the network security of the device must be taken, such as using strong
passwords, regularly changing your password, updating firmware to the latest version, and
isolating computer networks. For the IPC firmware of some previous versions, the ONVIF
password will not be automatically synchronized after the main password of the system has been
changed. You need to update the firmware or change the password manually.
Operation Manual
Maintenance Requirements
Strictly follow the instructions to disassemble the device. Non-professionals dismantling the
device can result in it leaking water or producing poor quality images. For a device that is
required to be disassembled before use, make sure the seal ring is flat and in the seal groove
when putting the cover back on. When you find condensed water forming on the lens or the
desiccant becomes green after you disassembled the device, contact after-sales service to
replace the desiccant. Desiccants might not be provided depending on the actual model.
IV
Page 6
Operation Manual
Use the accessories suggested by the manufacturer. Installation and maintenance must be
performed by qualified professionals.
Do not directly touch the photosensitive CMOS. Use an air blower to clean the dust or dirt on the
lens. When it is necessary to clean the device, slightly wet a soft cloth with alcohol, and gently
wipe away the dirt.
Clean the device body with a soft dry cloth. If there are any stubborn stains, clean them away
with a soft cloth dipped in a neutral detergent, and then wipe the surface dry. Do not use volatile
solvents such as ethyl alcohol, benzene, diluent, or abrasive detergents on the device to avoid
damaging the coating and degrading the performance of the device.
The dome cover is an optical component. When it is contaminated with dust, grease, or
fingerprints, use degreasing cotton moistened with a little ether or a clean soft cloth dipped in
water to gently wipe it clean. An air gun is useful for blowing dust away.
It is normal for a camera made of stainless steel to develop rust on its surface after being used in
a strong corrosive environment (such as the seaside, and chemical plants). Use an abrasive soft
cloth moistened with a little acid solution (vinegar is recommended) to gently wipe it away.
Afterwards, wipe it dry.
V
Page 7
Table of Contents
Operation Manual
Foreword
Important Safeguards and Warnings
1 Overview
1.1 Introduction
1.2 Network Connection
1.3 Functions
2 Configuration Flow
3 Device Initialization
4 Login
4.1 Device Login
4.2 Resetting Password
5 Home Page
6 Setting
6.1 Local
........................................................................................................................................................................................................I
................................................................................................................................................................................................... 1
................................................................................................................................................................................. 1
................................................................................................................................................................ 1
....................................................................................................................................................................................... 1
1.3.1 Basic Functions
1.3.2 AI Functions
......................................................................................................................................................................................................... 10
............................................................................................................................................................................... 10
............................................................................................................................................................................................. 13
...................................................................................................................................................................................................... 14
............................................................................................................................................................................................... 14
................................................................................................................................................................ 1
....................................................................................................................................................................... 2
.............................................................................................................................................................................. 5
............................................................................................................................................................................ 6
................................................................................................................................................................ 11
............................................................................................................................................ III
6.2 Camera
6.2.1 Setting Image Parameters
6.2.2 Setting Encode Parameters
.......................................................................................................................................................................................... 15
6.2.1.1 Page Layout
6.2.1.2 AI SSA
6.2.1.3 Image
6.2.1.4 Exposure
6.2.1.5 Backlight
6.2.1.6 WB
6.2.1.7 Day/Night
6.2.1.8 Illuminator
6.2.1.9 Defog
6.2.1.10 AFSA
6.2.1.11 Fisheye
6.2.2.1 Encode
6.2.2.2 Overlay
.............................................................................................................................................................................. 21
.......................................................................................................................................................... 15
....................................................................................................................................................................... 17
....................................................................................................................................................................... 17
................................................................................................................................................................. 18
................................................................................................................................................................ 20
............................................................................................................................................................... 22
............................................................................................................................................................. 23
........................................................................................................................................................................ 24
....................................................................................................................................................................... 25
.................................................................................................................................................................. 26
..................................................................................................................................................................... 27
.................................................................................................................................................................... 29
........................................................................................................................................ 15
..................................................................................................................................... 26
6.2.2.2.1 Configuring Privacy Masking
6.2.2.2.2 Configuring Channel Title
6.2.2.2.3 Configuring Time Title
.................................................................................................................. 30
.......................................................................................................................... 31
............................................................................................................ 29
VI
Page 8
Operation Manual
6.2.2.2.4 Configuring Location
6.2.2.2.5 Configuring Font Properties
6.2.2.2.6 Configuring Picture Overlay
6.2.2.2.7 Configuring Custom Title
6.2.2.2.8 Configuring Target Statistics
6.2.2.2.9 Configuring ANPR
................................................................................................................................... 34
6.2.2.2.10 Configuring Face Detection
6.2.2.2.11 Configuring Face Recognition
6.2.2.2.12 Configuring Face Statistics
6.2.2.2.13 Configure Face&Body Counting
6.2.2.2.14 Configuring Parking Space
6.2.2.3 ROI
6.2.3 Splicing
6.2.4 Audio
............................................................................................................................................................................. 38
.............................................................................................................................................................................. 39
................................................................................................................................................................................... 40
6.2.4.1 Setting Audio Parameters
6.2.4.2 Setting Alarm Tone
........................................................................................................................................... 41
............................................................................................................................ 31
............................................................................................................. 32
.............................................................................................................. 33
.................................................................................................................... 33
............................................................................................................ 34
............................................................................................................ 35
....................................................................................................... 36
.............................................................................................................. 36
................................................................................................... 37
............................................................................................................. 38
............................................................................................................................. 40
6.3 Network
6.3.1 TCP/IP
6.3.2 Port
6.3.3 PPPoE
6.3.4 DDNS
6.3.5 Email
6.3.6 UPnP
6.3.7 SNMP
6.3.8 Bonjour
........................................................................................................................................................................................ 42
.................................................................................................................................................................................. 42
....................................................................................................................................................................................... 45
.................................................................................................................................................................................. 47
................................................................................................................................................................................... 47
.................................................................................................................................................................................... 48
.................................................................................................................................................................................... 50
................................................................................................................................................................................... 51
.............................................................................................................................................................................. 54
6.3.9 Multicast
6.3.10 Register
6.3.11 QoS
.................................................................................................................................................................................... 56
6.3.12 Platform Access
6.3.12.1 P2P
6.3.12.2 ONVIF
6.3.12.3 RTMP
............................................................................................................................................................................ 54
........................................................................................................................................................................... 55
........................................................................................................................................................... 56
.......................................................................................................................................................................... 56
.................................................................................................................................................................... 57
...................................................................................................................................................................... 58
6.3.13 Basic Service
6.4 EPTZ
6.5 Event
................................................................................................................................................................................................ 60
.............................................................................................................................................................................................. 61
................................................................................................................................................................. 59
6.5.1 Setting Alarm Linkage
6.5.1.1 Setting Alarm-in
................................................................................................................................................ 61
................................................................................................................................................. 61
VII
Page 9
Operation Manual
6.5.1.2 Alarm Linkage
...................................................................................................................................................... 62
6.5.1.2.1 Adding Schedule
6.5.1.2.2 Record Linkage
......................................................................................................................................... 63
6.5.1.2.3 Snapshot Linkage
6.5.1.2.4 Alarm-out Linkage
6.5.1.2.5 Email Linkage
6.5.1.3 Subscribing Alarm
6.5.1.3.1 Alarm Types
............................................................................................................................................ 64
............................................................................................................................................. 65
............................................................................................................................................... 65
6.5.1.3.2 Subscribing Alarm Information
6.5.2 Setting Exception
......................................................................................................................................................... 66
6.5.2.1 Setting SD Card Exception
6.5.2.2 Setting Network Exception
6.5.2.3 Setting Voltage Detection
6.5.3 Setting Video Detection
............................................................................................................................................ 69
6.5.3.1 Setting Motion Detection
6.5.3.2 Setting Video Tampering
..................................................................................................................................... 62
................................................................................................................................... 64
.................................................................................................................................. 64
....................................................................................................... 65
............................................................................................................................ 67
........................................................................................................................... 67
............................................................................................................................. 68
.............................................................................................................................. 69
............................................................................................................................... 71
6.5.3.3 Setting Scene Changing
6.5.4 Setting Audio Detection
6.6 Storage
6.7 System
6.7.1 General
6.7.2 Account
.......................................................................................................................................................................................... 73
........................................................................................................................................................................................... 74
............................................................................................................................................................................... 74
6.7.1.1 Basic
6.7.1.2 Date & Time
.......................................................................................................................................................................... 74
........................................................................................................................................................... 75
.............................................................................................................................................................................. 76
6.7.2.1 User
........................................................................................................................................................................... 76
6.7.2.1.1 Adding User
6.7.2.1.2 Resetting Password
6.7.2.2 Adding User Group
6.7.2.3 ONVIF User
............................................................................................................................................................ 81
6.7.3 Peripheral Management
6.7.3.1 Configuring Serial Port
6.7.3.2 Configuring External Light
................................................................................................................................. 72
............................................................................................................................................ 72
............................................................................................................................................... 76
............................................................................................................................... 79
........................................................................................................................................... 80
........................................................................................................................................... 82
................................................................................................................................... 82
............................................................................................................................ 83
6.7.3.3 Configuring Wiper
6.7.4 Manager
............................................................................................................................................................................ 84
6.7.4.1 Requirements
6.7.4.2 Maintenance
6.7.4.3 Import/Export
............................................................................................................................................. 84
...................................................................................................................................................... 84
......................................................................................................................................................... 85
...................................................................................................................................................... 85
VIII
Page 10
Operation Manual
6.7.4.4 Default
6.7.5 Upgrade
6.8 System Information
6.8.1 Version
6.8.2 Online User
6.9 Setting Log
6.9.1 Log
........................................................................................................................................................................................ 87
6.9.2 Remote Log
............................................................................................................................................................................................................. 90
7 Live
7.1 Live Page
...................................................................................................................................................................................... 90
7.2 Setting Encode
7.3 Live View Function Bar
7.4 Window Adjustment Bar
7.4.1 Adjustment
7.4.2 Zoom and Focus
7.4.3 Image Adjustment
..................................................................................................................................................................... 86
............................................................................................................................................................................. 86
................................................................................................................................................................ 87
............................................................................................................................................................................... 87
....................................................................................................................................................................... 87
.................................................................................................................................................................................. 87
...................................................................................................................................................................... 88
.......................................................................................................................................................................... 91
.......................................................................................................................................................... 92
...................................................................................................................................................... 93
...................................................................................................................................................................... 93
............................................................................................................................................................ 94
........................................................................................................................................................ 95
7.4.4 Fisheye
7.5 Display Mode
.............................................................................................................................................................................................................. 103
8 AI
8.1 Setting Crowd Distribution Map
8.1.1 Global Configuration
8.1.2 Rule Configuration
8.2 Setting Face Recognition
8.2.1 Enabling Face Recognition
8.2.2 Setting Face Database
8.2.2.1 Creating Face Database
8.2.2.2 Adding Face Picture
8.2.2.2.1 Single Adding
8.2.2.2.2 Batch Importing
8.2.2.3 Managing Face Picture
8.2.2.3.1 Editing Face Information
8.2.2.3.2 Deleting Face Picture
............................................................................................................................................................................... 96
.......................................................................................................................................................................... 100
................................................................................................................................... 103
............................................................................................................................................... 103
.................................................................................................................................................... 104
.................................................................................................................................................. 105
................................................................................................................................... 106
............................................................................................................................................. 109
............................................................................................................................... 109
....................................................................................................................................... 111
........................................................................................................................................ 111
.................................................................................................................................... 113
................................................................................................................................. 114
................................................................................................................. 114
......................................................................................................................... 115
8.2.2.4 Face Modeling
8.2.3 Setting Arm Alarm
.................................................................................................................................................. 116
..................................................................................................................................................... 116
8.2.4 Viewing Face Recognition Result
8.3 Setting Face Detection
8.4 Setting IVS
................................................................................................................................................................................ 122
....................................................................................................................................................... 120
....................................................................................................................... 119
IX
Page 11
Operation Manual
8.4.1 Global Configuration
8.4.2 Rule Configuration
8.5 Setting Vehicle Density
8.6 Setting Parking Space
8.6.1 Rule Configuration
............................................................................................................................................... 123
.................................................................................................................................................... 124
..................................................................................................................................................... 128
........................................................................................................................................................ 130
.................................................................................................................................................... 130
8.6.1.1 For Parking Space Detection Fisheye WizMind Network Camera
8.6.1.2 For Other Cameras
8.6.2 Global Configuration
8.7 Setting Video Metadata
8.7.1 Global Configuration
8.7.2 Rule Configuration
8.7.3 Viewing Video Metadata Report
8.8 Setting People Counting
8.8.1 People Counting
8.8.2 Queuing
.......................................................................................................................................................................... 143
......................................................................................................................................................... 141
8.8.3 Global Configuration
......................................................................................................................................... 132
............................................................................................................................................... 136
.................................................................................................................................................... 136
............................................................................................................................................... 136
.................................................................................................................................................... 138
........................................................................................................................ 140
................................................................................................................................................... 140
............................................................................................................................................... 145
.......................................... 130
8.9 Face & Body Detection
8.9.1 Global Configuration
8.9.2 Rule Configuration
8.10 Setting Heat Map
8.11 Setting ANPR
........................................................................................................................................................................ 149
8.11.1 Lane Configuration
8.11.2 Rule Configuration
8.11.3 Picture
8.11.4 Allowlist
8.11.5 Blocklist
........................................................................................................................................................................... 152
....................................................................................................................................................................... 153
........................................................................................................................................................................ 156
....................................................................................................................................................... 146
............................................................................................................................................... 146
.................................................................................................................................................... 147
............................................................................................................................................................... 149
................................................................................................................................................ 150
................................................................................................................................................. 151
8.12 Setting Panoramic Linkage
8.12.1 Enabling Linkage Track
8.12.2 Configuring Calibration Parameter
9 Security
9.1 Security Status
9.2 System Service
................................................................................................................................................................................................. 160
....................................................................................................................................................................... 160
....................................................................................................................................................................... 161
........................................................................................................................................... 157
........................................................................................................................................ 157
............................................................................................................... 158
9.2.1 802.1x
9.2.2 HTTPS
.............................................................................................................................................................................. 161
............................................................................................................................................................................... 162
9.3 Attack Defense
9.3.1 Firewall
............................................................................................................................................................................ 163
9.3.2 Account Lockout
....................................................................................................................................................................... 163
........................................................................................................................................................ 164
X
Page 12
Operation Manual
9.3.3 Anti-DoS Attack
9.4 CA Certificate
.......................................................................................................................................................................... 165
.......................................................................................................................................................... 165
9.4.1 Installing Device Certificate
9.4.1.1 Creating Certificate
9.4.1.2 Applying for and Importing CA Certificate
9.4.1.3 Installing Existing Certificate
9.4.2 Installing Trusted CA Certificate
9.5 A/V Encryption
9.6 Security Warning
10 Record
................................................................................................................................................................................................. 171
10.1 Playback
....................................................................................................................................................................... 169
.................................................................................................................................................................. 170
................................................................................................................................................................................. 171
10.1.1 Playing Back Video
10.1.2 Clipping Video
.......................................................................................................................................................... 173
10.1.3 Downloading Video
10.2 Setting Record Control
10.3 Setting Record Plan
........................................................................................................................................................... 176
................................................................................................................................. 165
........................................................................................................................................ 165
........................................................................................ 166
.................................................................................................................... 167
........................................................................................................................ 168
................................................................................................................................................. 171
............................................................................................................................................... 174
.................................................................................................................................................... 175
10.4 Storage
10.4.1 Local Storage
.................................................................................................................................................................................... 177
............................................................................................................................................................. 178
10.4.2 Network Storage
....................................................................................................................................................................... 179
...................................................................................................................................................................... 181
................................................................................................................................................................................. 183
11 Picture
11.1 Playback
10.4.2.1 FTP
10.4.2.2 NAS
................................................................................................................................................................................................. 183
11.1.1 Playing Back Picture
11.1.2 Downloading Picture
11.2 Setting Snapshot Parameters
11.3 Setting Snapshot Plan
11.4 Storage
.................................................................................................................................................................................... 186
11.5 Setting Upload Method
12 Report
................................................................................................................................................................................................. 188
12.1 Viewing Report
.................................................................................................................................................................... 188
12.1.1 Face Recognition
..................................................................................................................................................... 179
.............................................................................................................................................. 183
............................................................................................................................................ 184
...................................................................................................................................... 185
..................................................................................................................................................... 186
.................................................................................................................................................. 186
..................................................................................................................................................... 188
12.1.2 Video Metadata
12.1.3 People Counting
........................................................................................................................................................ 189
...................................................................................................................................................... 190
12.1.4 Crowd Distribution
12.1.5 Vehicle Density
12.1.6 Heat Map
......................................................................................................................................................... 194
..................................................................................................................................................................... 195
................................................................................................................................................. 193
XI
Page 13
Operation Manual
12.1.7 ANPR
12.2 Searching for Face Picture
12.3 Auto Upload
Appendix 1 Cybersecurity Recommendations
.............................................................................................................................................................................. 197
............................................................................................................................................. 198
.......................................................................................................................................................................... 199
..................................................................................................................... 204
XII
Page 14

1 Overview

1.1 Introduction

IP camera (Internet Protocol camera), is a type of digital video camera that receives control data and
sends image data through internet. They are commonly used for surveillance, requiring no local
recording device, but only a local area network.
IP camera is divided into single-channel camera and multi-channel camera according to the channel
quantity. For multi-channel camera, you can set the parameters for each channel.

1.2 Network Connection

In the general IPC network topology, IPC is connected to PC through network switch or router.
Figure 1-1 General IPC network
Operation Manual
Get IP address by searching on ConfigTool, and then you can start accessing IPC through network.

1.3 Functions

Functions might vary with different devices.

1.3.1 Basic Functions

Real-time Monitoring
Live view.
When live viewing the image, you can enable audio, voice talk and connect monitoring center for
quick processing on the abnormality.
Adjust the image to the proper position by PTZ.
Snapshot and triple snapshot abnormality of the monitoring image for subsequent view and
processing.
1
Page 15
Record abnormality of monitoring image for subsequent view and processing.
Configure coding parameters, and adjust live view image.
Alarm
Set alarm prompt mode and tone according to alarm type.
View alarm prompt message.
Exception
SD card error, network disconnection, illegal access, voltage detection and security exception.
When SD card error or illegal access is triggered, the system links alarm output and sending
email.
When network disconnection alarm is triggered, the system links recording and alarm output.
When the input voltage is more or less than the rated voltage, the alarm is triggered and the
system links sending email.
Video Detection
Motion detection, video tampering detection and scene changing detection.
When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Operation Manual
Audio Detection
Audio input abnormal detection and intensity change detection.
When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Record
Auto record as schedule.
Play back recorded video and picture as needed.
Download recorded video and picture.
Alarm linked recording.
Account
Add, edit and delete user group, and manage user authorities according to user group.
Add, edit and delete user, and configure user authorities.
Change user password.

1.3.2 AI Functions

IVS
Tripwire, intrusion, abandoned object, moving object, fast moving, parking detection, people
gathering, and loitering detection.
When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, and snapshot.
2
Page 16
Face Detection
Detects face and display the related attributes on the live page.
When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Face Recognition
Displays the recognition result on the live view page
In general mode, makes comparison between the detected face with the faces in face database
after detecting face. You can set the alarm mode and reporting mode for each face database
separately, and set linkages for each reporting mode.
In counting mode, does precise face counting after detecting face.
When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Crowd Distribution Map
View crowd distribution in real time for the timely arm to avoid accidents such as stampede.
When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Operation Manual
Video Metadata
Captures people, non-motor vehicle and vehicle, and displays the related information on the live
page.
When an alarm is triggered, the system links alarm output.
People Counting
Counts the people flow in/out the detection area, and generates report.
When the number of counted number of people in the detection area or the stay duration
exceeds the configured value, an alarm will be triggered.
When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Heat Map
Counts cumulative density of moving objects, and displays the result in different colors.
View report of heat map, which includes heat map and track map (track map is not available on
economic fisheye cameras).
ANPR
Recognizes plate number in detection area, and displays the related information on live page.
When an alarm is triggered, the system links alarm output and snapshot.
Face & Body Detection
Detects faces and human body separately, and then correlates the face and the body.
When select compliant mode, the camera can detect attributes including face masks, helmets,
glasses, safety vests, top color, and bottom color, and determine whether PPE requirements are
met. PPE compliance or non-compliance alarms can be triggered according to the alarm settings.
3
Page 17
When an alarm is triggered, the system links alarm output and snapshot.
Parking Space
Supports planned parking space and open parking space.
When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, and snapshot.
Vehicle Density
Includes road congestion and parking limit, and supports to view vehicle statistics through the
live page.
When the counted vehicle exceeds the configured vehicle number and the congestion time
exceeds the configured time, an alarm will be triggered.
When an alarm is triggered, the system performs linkages such as recording, alarm output and
sending email.
Operation Manual
4
Page 18
Operation Manual

2 Configuration Flow

For the device configuration flow, see Figure 2-1. For details, see Table 2-1. Configure the device
according to the actual situation.
Figure 2-1 Configuration flow
Table 2-1 Description of flow
Configuration Description Reference
Login
Initialization
Camera parameters
Date & time
Basic parameters
IP address
Subscribe alarm
AI AI rules
Open IE browser and enter IP address to log in to the web page, The camera IP address is
192.168.1.108 by default.
Initialize the camera when you use it for the first time.
Configure image parameters, encoder parameters, and audio parameters to ensure the image quality.
Set date and time to ensure the recording time is correct.
Change IP address according to network planning for the first use or during network adjustment.
Subscribe alarm event. When the subscribed alarm is triggered, the system will record the alarm on the alarm tab.
Configure the necessary detection rules, such as face detection and IVS.
"4 Login"
"3 Device Initialization"
"6.2 Camera"
"6.7.1.2 Date & Time"
"6.3.1 TCP/IP"
"6.5.1.3 Subscribing Alarm"
"8 AI"
5
Page 19
Device initialization is required for the first-time use. This manual is based on the operation on the
web page. You can also initialize device through ConfigTool, NVR, or platform devices.
To ensure the device safety, keep the password properly after initialization and change the
When initializing device, keep the PC IP and device IP in the same network.
Procedure
Step 1 Open IE browser, enter the IP address of the device in the address bar, and then press the
Operation Manual

3 Device Initialization

password regularly.
Enter key.
The IP is 192.168.1.108 by default.
Figure 3-1 Region setting
Step 2 Select the area, language, and video standard according to the actual situation, and then
click
Next
.
6
Page 20
Figure 3-2 Time zone setting
Operation Manual
Figure 3-3 Disclaimer
Step 3 Select the
Privacy Policy
I have read and agree to the terms of the Software License Agreement and
checkbox, and then click
7
Next
.
Page 21
Figure 3-4 Time zone setting
Operation Manual
Step 4 Configure the time parameters, and then click
Figure 3-5 Password setting
Next
.
8
Page 22
Operation Manual
Step 5 Set the password for admin account.
Table 3-1 Description of password configuration
Parameter Description
Username The default username is admin.
Password The password must consist of 8 to 32 non-blank characters and
contain at least two types of characters among upper case, lower
Confirm password
case, number, and special character (excluding ' " ; : &). Set a high security level password according to the password security notice.
Enter an email address for password resetting, and it is selected by default.
Reserved email
When you need to reset the password of the admin account, a security code for password resetting will be sent to the reserved email address.
Step 6 Click
Next
, and then
page is displayed.
P2P
9
Page 23

4.1 Device Login

This section introduces how to log in to the web page. This section takes Chrome as an example.
You need to initialize the camera before logging in to the web page. For details, see "3 Device
Initialization".
When initializing the camera, keep the PC IP and device IP in the same network.
Follow the instruction to download and install the plug-in for the first login.
Procedure
Step 1 Open IE browser, enter the IP address of the camera (192.168.1.108 by default) in the
address bar and press Enter.
Step 2 Enter the username and password.
The username is admin by default.
Operation Manual

4 Login

Click
Forget password?
set during the initialization. For details, see "4.2 Resetting Password".
, and you can reset the password through the email address that is
Figure 4-1 Login
Step 3 Click
Login
.
10
Page 24

4.2 Resetting Password

Operation Manual
Figure 4-2 Live page
When you need to reset the password for the admin account, there will be a security code sent to
the entered email address which can be used to reset the password.
Prerequisites
You have enabled password resetting service. For details, see "6.7.2.1.2 Resetting Password".
Procedure
Step 1 Open IE browser, enter the IP address of the device in the address bar and press Enter.
Figure 4-3 Login
11
Page 25
Operation Manual
Step 2 Click
set during the initialization.
Forget password?
, and you can reset the password through the email address that is
Figure 4-4 Login
12
Page 26

5 Home Page

Click at the upper-left corner of the page to display the home page.
Figure 5-1 Home page
Operation Manual
Live: View the real-time monitoring image.
AI: Configure AI functions of the camera.
Camera: Configure camera parameters, including image parameters, encoder parameters, and
audio parameters.
PTZ: Configure PTZ settings.
Event: Configure general events, including alarm linkage exception, video detection, and audio
detection.
System: Configure system parameters, including general, date & time, account, safety, default,
import/export, remote, auto maintain and upgrade.
Security: Check the device security status and set security functions.
Record: Play back or download recorded video.
Picture: Play back or download image files.
For the camera with multiple channels, through selecting channel numbers, you can set the
parameters of the channels.
Report: Search the AI event report and system report.
Alarm subscription: Subscribe alarm.
Skin setting: Set the skin.
Language setting: Set the language.
Restart: Click at the upper-right corner of the page, select
restarts.
Logout: Click at the upper-right corner of the page, select
login page. The system will sleep automatically after idling for a period of time.
Setting: Click at the upper-right corner of the page to set the basic parameters.
Full screen: Click at the upper-right corner of the page to enter full screen mode; click to
exit full screen mode.
Reboot
Logout
, and the camera
to go to the
13
Page 27
This section introduces the basic setting of the camera, including the configuration of Local, Camera,
Network, Event, Storage, System, System Information and Log.
For
Camera, Event
section takes method 1 as an example.
Method 1: Click , and then select the corresponding item.
Method 2: Click the corresponding icon on the home page.

6.1 Local

You can select protocol and configure the storage path for live snapshot, live record, playback
snapshot, playback download, and video clips.
Procedure
Step 1 Select >
and
Local
System
.
Operation Manual

6 Setting

, you can go to the configuration page through two methods. This
Figure 6-1 Local
Step 2 Click
playback download, and video clips.
Browse
to select the storage path for live snapshot, live record, playback snapshot,
14
Page 28
Table 6-1 Description of local parameter
Parameter Description
You can select the network transmission protocol as needed, and the options are
TCP, UDP
and
Multicast
Operation Manual
.
Protocol
Live Record
Playback Download
Video Clips
Live Snapshot
Playback Snapshot
Step 3 Click
Apply
Before selecting
parameters.
The recorded video of live page.
The default path is C:\Users\admin\WebDownload\LiveRecord.
The downloaded video of playback page.
The default path is C:\Users\admin\WebDownload\PlaybackRecor d.
The clipped video of playback page.
C:\Users\admin\WebDownload\VideoClips.
The snapshot of live page.
The default path is C:\Users\admin\WebDownload\LiveSnapshot.
The snapshot of playback page.
The default path is C:\Users\admin\WebDownload\PlaybackSnaps hot.
.
Multicast
, make sure that you have set the
Multicast
Admin in the path
refers to the account
being used.

6.2 Camera

This section introduces the camera setting, including image parameters, encoder parameters, and
audio parameters.
Camera parameters of different devices might vary.

6.2.1 Setting Image Parameters

Configure image parameters according to the actual situation, including image, exposure, backlight,
white balance, Day/Night, and light.
6.2.1.1 Page Layout
Configure camera parameters to improve the scene clarity, and ensure that surveillance goes
properly.
You can select normal mode, day mode, or night mode to view the configuration and the effect of
the selected mode, such as picture, exposure, and backlight.
15
Page 29
Operation Manual
Select the working mode as needed.
Self-adaptive: The camera will adjust the image according to the environment.
Figure 6-2 Page layout (self-adaptive)
Customized scene: You can select the profile as needed. Select the profile in
Time Plan Setting
and drag the slide block to set certain time as the selected profile. For example, set 8:00–18:00 as
day, and 0:00–8:00 and 18:00–24:00 as night
Figure 6-3 Page layout (customized scene)
Day/night switch: You can select
Day/Night
.
Day
or
night
16
in
Profile
and the surveillance system works under
Page 30
6.2.1.2 AI SSA
By enabling AI SSA (AI Scene Self-adaptation), the camera could detect environmental conditions,
such as rain, fog, backlight, low light and flicker, to adjust the parameters of the image to suit the
conditions, ensuring that clear images are always produced.
Operation Manual
Figure 6-4 Page layout (day/night switch)
Procedure
Step 1 Select >
Step 2 Select On in the dropdown list.
Step 3 Click
6.2.1.3 Image
You can configure picture parameters as needed.
Procedure
Step 1 Select >
Camera
After you enable
will be disabled by default.
AFSA
Apply
AI SSA
.
Camera
>
>
>
Image
, some other functions such as
Image
AI SSA
>
Image
Figure 6-5 Image
.
.
exposure, backlight, defog
and
Step 2 Configure picture parameters.
17
Page 31
Table 6-2 Description of picture parameters
Parameter Description
Select the picture style from soft, standard and vivid.
Soft: Default image style, displays the actual color of the image.
Style
Brightness
Contrast
Saturation
Standard: The hue of the image is weaker than the actual one, and
contrast is smaller.
Vivid: The image is more vivid than the actual one.
Changes the value to adjust the picture brightness. The higher the value is, the brighter the picture will be, and the smaller the darker. The picture might be hazy if the value is configured too big.
Changes the contrast of the picture. The higher the value is, the more the contrast will be between bright and dark areas, and the smaller the less. If the value is set too big, the dark area would be too dark and bright area easier to get overexposed. The picture might be hazy if the value is set too small.
Makes the color deeper or lighter. The higher the value is, the deeper the color will be, and the lower the lighter. Saturation value does not change image brightness.
Operation Manual
Sharpness
Gamma
Flip
Mirror
Step 3 Click
Apply
Changes the sharpness of picture edges. The higher the value is, the clearer the picture edges will be, and if the value is set too big, picture noises are more likely to appear.
Changes the picture brightness and improves the picture dynamic range in a non-linear way. The higher the value is, the brighter the picture will be, and the smaller the darker.
Changes the display direction of the picture, see the options below.
0°: Normal display.
90°: The picture rotates 90° clockwise.
180°: The picture rotates 90° counterclockwise.
270°: The picture flips upside down.
For some models, please set the resolution to be 1080p or lower
when using 90° and 180°. For details, see "6.2.2 Setting Encode
Parameters".
Click , and the picture will display with left and right side reversed.
.
6.2.1.4 Exposure
Configure iris and shutter to improve image clarity.
Cameras with true WDR do not support long exposure when WDR is enabled in
Procedure
Step 1 Select >
Camera
>
Image
>
Exposure
18
Backlight
.
.
Page 32
Figure 6-6 Exposure
Step 2 Configure exposure parameters.
Table 6-3 Description of exposure parameters
Parameter Description
You can select from 50 Hz, 60 Hz and Outdoor.
50 Hz: When the electric supply is 50 Hz, the system adjusts the
exposure according to ambient light automatically to ensure that
Anti-flicker
no stripe appears.
60 Hz: When the electric supply is 60 Hz, the system adjusts the
exposure according to ambient light automatically to ensure that
no stripe appears.
Outdoor: You can select any exposure mode as needed.
Operation Manual
Mode
Device exposure modes.
Auto: Adjusts the image brightness according to the actual
condition automatically.
Gain Priority: When the exposure range is normal, the system
prefers the configured gain range when auto adjusting according
to the ambient lighting condition. If the image brightness is not
enough and the gain has reached upper or lower limit, the system
adjusts shutter value automatically to ensure the image at ideal
brightness. You can configure gain range to adjust gain level when
using gain priority mode.
Shutter priority: When the exposure range is normal, the system
prefers the configured shutter range when auto adjusting
according to the ambient lighting condition. If the image
brightness is not enough and the shutter value has reached upper
or lower limit, the system adjusts gain value automatically to
ensure the image at ideal brightness.
Manual: Configure gain and shutter value manually to adjust image
brightness.
When the
priority, Shutter priority
Anti-flicker
19
is set to
or
Outdoor
Manual
, you can select
in the
Mode
Auto, Gain
list.
Page 33
Parameter Description
Operation Manual
Exposure Compensation
Shutter
Gain
Auto Iris
3D NR
Level
Step 3 Click
Apply
Sets the value, and it ranges from 0 to 50. The higher the value is, the brighter the image will be.
Set the effective exposure time. The smaller the value, the shorter the exposure time will be.
When selecting With minimum illumination, the camera increases Gain automatically to get clearer images.
This configuration is available only when the camera is equipped with auto-iris lens.
When auto iris is enabled, the iris size changes automatically
according to the ambient lighting condition, and the image
brightness changes accordingly.
When auto iris is disabled, the iris stays at full size and does not
change no matter how ambient lighting condition changes.
Works with multi-frame (no less than 2 frames) images and reduces noise by using the frame information between previous and latter frames.
This configuration is available only when the 3D NR is enabled.
The higher the level is, the better the result will be.
.
Gain Priority
or
Manual
in
, you can set Gain.
Mode
6.2.1.5 Backlight
You can select backlight mode from Auto, BLC, WDR, and HLC.
Procedure
Step 1 Select >
Step 2 Configure backlight parameters.
Camera
>
>
Image
Backlight
Figure 6-7 Backlight
.
20
Page 34
Table 6-4 Description of backlight parameters
Backlight mode Description
Operation Manual
BLC
WDR
HLC
Enable target when shooting against light. You can enable or disable
Customized
When you enable
exposure only to the set area according to ambient lighting condition
to ensure the image of the set area at ideal brightness.
When you disable
according to ambient lighting condition automatically to ensure the clarity of the darkest area.
The system dims bright areas and compensates dark areas to ensure the clarity of all the area. The higher the value is, the brighter the dark will be, but the more the noise will be.
, the camera can get clearer image of the dark areas on the
BLC
mode.
Customized
Default
mode, the system auto adjusts
mode, the system adjusts exposure
There might be a few seconds of video loss when the device is switching
to WDR mode from other mode.
Enable station or parking lot), the camera will dim strong light, and reduce the size of Halo zone to lower the brightness of the whole image, so that the camera can capture human face or car plate detail clearly. The higher the value is, the more obvious the HLC effect will be.
when extreme strong light is in the environment (such as toll
HLC
SSA
Step 3 Click
6.2.1.6 WB
WB function makes the image color display precisely as it is. When in WB mode, white objects would
always display white color in different environments.
Procedure
Step 1 Select >
Apply
Enable according to the environment to make the objects in the image clearer.
.
Camera
>
, the system automatically adjusts the image brightness
SSA
> WB.
Image
Figure 6-8 WB
Step 2 Configure WB parameters.
21
Page 35
Table 6-5 Description of WB parameters
WB Mode Description
Operation Manual
Auto
Natural
Street Lamp
Outdoor
Manual
Custom Area
Step 3 Click
6.2.1.7 Day/Night
Configure the display mode of the image. The system switches between color and black-and-white
mode according to the actual condition.
Apply
The system compensates WB according to color temperature to ensure color precision.
The system auto compensates WB to environments without artificial light to ensure color precision.
The system compensates WB to outdoor night scene to ensure color precision.
The system auto compensates WB to most outdoor environments with natural or artificial light to ensure color precision.
Configure red and blue gain manually; the system auto compensates WB according to color temperature.
The system compensates WB only to the set area according to color temperature to ensure color precision.
.
Procedure
Step 1 Select >
Step 2 Configure day and night parameters.
Camera
>
> WB.
Image
Figure 6-9 Day/night
22
Page 36
Table 6-6 Description of day and night parameters
Parameter Description
Operation Manual
Mode
Sensitivity
Delay
Step 3 Click
Apply
6.2.1.8 Illuminator
You can select device display mode from
Color, Auto
, and
B/W
.
Day/Night configuration is independent from profile management
configuration.
This configuration is available only when you set
You can configure camera sensitivity when switching between color and black-and-white mode.
This configuration is available only when you set
You can configure the delay when camera switching between color and black-and-white mode. The lower the value is, the faster the camera switches between color and black-and-white mode.
.
: The system displays color image.
Color
: The system switches between color and black-and-white
Auto
display according to the actual condition.
: The system displays black-and-white image.
B/W
in
Auto
in
Auto
Mode
Mode
.
.
This configuration is available only when the device is equipped with illuminator.
Procedure
Step 1 Select >
Step 2 Configure illuminator parameters.
Camera
>
>
Image
Figure 6-10 Light
Illuminator
.
23
Page 37
Table 6-7 Description of illuminator parameters
Parameter Description
Operation Manual
Fill Light
Mode
Set
Fill Light
IR Mode: Enable the IR illuminator, and the white light is disabled. When
an alarm is triggered, the system will link white light.
White Light: Enable the white light, and the IR illuminator is disabled.
When an alarm is triggered, the system will link white light.
Soft Light Mode: Enable IR illuminator and white light at the same time,
and adjust the brightness of the two illuminators to get clear images.
Manual
Auto
Zoom Priority
for sound and siren cameras.
Adjust the brightness of illuminator manually, and then the system will supply illuminator to the image accordingly.
The system adjusts the illuminator intensity according to the ambient lighting condition.
The system adjusts the illuminator intensity automatically according to the change of the ambient light.
When the ambient light turns darker, the system turns
on the low beam lights first, if the brightness is still
not enough, it turns on the high beam lights then.
When the ambient light turns brighter, the system
dims high beam lights until they are off, and then the
low beam lights.
When the focus reaches certain wide angle, the
system will not turn on high beam light in order to avoid over-exposure in short distance. In the meantime, you can configure light compensation manually to fine-tune IR light intensity.
Step 3 Click
6.2.1.9 Defog
The image quality is compromised in foggy or hazy environment, and defog can be used to improve
image clarity.
Procedure
Step 1 Select >
Apply
Off Illuminator is off.
.
Camera
>
Image
>
Defog
.
24
Page 38
Operation Manual
Figure 6-11 Light
Step 2 Configure defog parameters.
Table 6-8 Description of defog parameters
Defog Description
Configure function intensity and atmospheric light mode manually, and
Manual
Auto The system adjusts image clarity according to the actual condition.
then the system adjusts image clarity accordingly. Atmospheric light mode can be adjusted automatically or manually.
Off Defog function is disabled.
Step 3 Click
6.2.1.10 AFSA
You can enable AFSA (Anti-flicker Self-adaption) to prevent image flickering.
Procedure
Step 1 Select >
Apply
.
Camera
>
>
Image
Figure 6-12 AFSA
AFSA
.
Step 2 Select On or
When you select
disabled when there is no flicker.
Step 3 Click
Apply
in the dropdown list.
Auto
, AFSA function will be enabled when the camera detects flicker and
Auto
.
25
Page 39
6.2.1.11 Fisheye
Select installation mode and record mode according to the actual installation scene. When the
camera accesses the platform with corrective stream, the platform displays the corrective image.
This function is only available on fisheye device.
Procedure
Step 1 Select >
Camera
>
>
Image
Fisheye
Figure 6-13 Fisheye
Operation Manual
.
Step 2 Set installation mode and record mode.
Table 6-9 Description of fisheye parameters
Parameter Description
installation Mode You can select
1O: The original image before correction.
1P: 360°rectangular panoramic image.
2P: When the installation mode is
this mode. Two associated 180° rectangular image screens; at any
time, the two screens form a 360° panoramic image.
1R: Original image screen + independent sub-screen. You can
zoom or drag the image in all the screens.
Record Mode
Step 3 Click
Apply
.
2R: Original image screen + two independent sub-screens. You
can zoom or drag the image in all the screens.
4R: Original image screen + four independent sub-screens. You
can zoom or drag the image in all the screens.
1O + 3R: Original image screen + three independent sub-screens.
You can zoom or drag the image in original image screen, and move the image (upper and lower) in sub-screens to adjust the vertical view.
Ceiling, Wall
, or
Ground
Ceiling
.
or
Ground
, you can set

6.2.2 Setting Encode Parameters

This section introduces video parameters, such as video, snapshot, overlay, ROI (region of interest),
and path.
26
Page 40
Click
Default
configuration.
6.2.2.1 Encode
Configure video stream parameters, such as compression, resolution, frame rate, bit rate type, bit
rate, I frame interval, SVC, and watermark.
Procedure
Step 1 Select >
, and the device is restored to default configuration. Click
Camera
>
Encode
>
Encode
Figure 6-14 Encode
.
Refresh
Operation Manual
to view the latest
Step 2 Configure encode parameters.
Table 6-10 Description of encode parameters
Parameter Description
Click to enable sub stream, it is enabled by default.
Sub Stream
You can enable multiple sub streams simultaneously.
27
Page 41
Parameter Description
Select encode mode.
Compression
Click to enable smart codec to improve video compressibility and save storage space.
: Main profile encode mode. Compared with H.264B, it
H.264
requires smaller bandwidth.
H.264H
requires smaller bandwidth.
H.264B
bandwidth.
: Main profile encode mode. Compared with H.264, it
H.265
requires smaller bandwidth.
MJPEG
value to ensure clarity, you are recommended to set the value to the biggest value in the
Operation Manual
: High profile encode mode. Compared with H.264, it
: Baseline profile encode mode. It requires smaller
: When under this mode, the image requires high bit rate
Bit Rate
Reference Bit Rate
.
Smart Codec
Output Mode
Resolution
Frame Rate (FPS)
Bit Rate Type
Quality
After smart codec is enabled, the device would stop supporting the
third bit stream, ROI, and smart event detection.
You can select from
The resolution of the video. The higher the value is, the clearer the image will be, but the bigger the required bandwidth will be.
The number of frame in one second of video. The higher the value is, the clearer and smoother the video will be.
The bit rate control type during video data transmission. You can select bit rate type from:
(Constant Bit Rate): The bit rate changes a little and keeps
CBR
close to the defined bit rate value.
(Variable Bit Rate): The bit rate changes as monitoring
VBR
scene changes.
Single Stream
or
Flex Stream
.
The
Bit Rate Type
as
MJPEG
This parameter can be configured only when the as
VBR
The better the quality is, but the bigger the required bandwidth will be.
.
.
can only be set as
CBR
when
Encode Mode
Bit Rate Type
is set
is set
Reference Bit Rate
Max Bit Rate
The most suitable bit rate value range recommended to user according to the defined resolution and frame rate.
This parameter can be configured only when the as
You can select the value of the
Reference Bit Rate
scene changes, but the max bit rate keeps close to the defined value.
VBR
.
Max Bit Rate
value. The bit rate then changes as monitoring
28
Bit Rate Type
according to the
is set
Page 42
Parameter Description
Operation Manual
Bit Rate
I Frame Interval
SVC
Watermark
Watermark String
Step 3 Click
6.2.2.2 Overlay
Apply
This parameter can be configured only when the as
Select bit rate value in the list according to actual condition.
The number of P frames between two I frames, and the
Interval
It is recommended to set
Scaled video coding, is able to encode a high quality video bit stream that contains one or more subset bit streams. When sending stream, to improve fluency, the system will quit some data of related lays according to the network status.
You can verify the watermark to check if the video has been tampered.
.
.
CBR
range changes as
1: The default value, which means that there is no layered
coding.
2, 3 and 4: The lay number that the video stream is packed.
changes.
FPS
I Frame Interval
twice as big as
Bit Rate Type
I Frame
FPS
is set
.
Configure overlay information, and it will be displayed on the
6.2.2.2.1 Configuring Privacy Masking
You can enable this function when you need to protect the privacy of some area on the video image.
You can select the type of the masking from
When selecting
You can drag 8 blocks at most, and the color is black.
When selecting
most.
Color Block
Color Block
Mosaic
+
Mosaic
only, you can draw triangles and convex quadrilaterals as blocks.
, you can draw rectangles as blocks with mosaic. You can draw 4 blocks at
: You can draw 8 blocks at most.
Procedure
Step 1 Select >
Camera
>
Encode
Color Block
>
Overlay
Live
and
Mosaic
>
Privacy Masking
page.
.
.
29
Page 43
Figure 6-15 Privacy masking
Step 2 Configure privacy masking.
1) Click next to
2) Click
, and then drag the block to the area that you need to cover.
Add
Enable
3) Adjust the size of the rectangle to protect the privacy.
4) Click
Apply
.
Operation Manual
.
Related Operations
View and edit the block
Select the privacy masking rule to be edited in the list, then the rule is highlighted, and the block
frame is displayed in the image. You can edit the selected block as needed, including moving the
position, and adjusting the size.
Edit the block name
Double-click the name in
Delete the block
Click to delete blocks one by one.
Click
to delete all blocks.
Clear
Name
6.2.2.2.2 Configuring Channel Title
You can enable this function when you need to display channel title in the video image.
Procedure
Step 1 Select >
Camera
>
to edit the block name.
Encode
>
Overlay
>
Channel Title
.
30
Page 44
Figure 6-16 Channel title
Operation Manual
Step 2 Click next to
Click to add the channel title, and you can add 1 line at most.
Step 3 Move the title box to the position that you want in the image.
Step 4 Click
Apply
.
6.2.2.2.3 Configuring Time Title
You can enable this function when you need to display time in the video image.
Procedure
Step 1 Select >
Camera
Enable
, enter the channel title, and select the text alignment.
>
Encode
>
Overlay
Figure 6-17 Time title
>
Time Title
.
Step 2 Click next to
Step 3 Click next to
Step 4 Move the time box to the position that you want in the image.
Step 5 Click
Apply
.
6.2.2.2.4 Configuring Location
You can enable this function if you need to display text in the video image.
Enable
Week Display
.
to display the day of week.
31
Page 45
Text overlay and picture overlay cannot work at the same time, and the IPC that connects to mobile
NVR with private protocol would display GPS information as priority.
Procedure
Step 1 Select >
Camera
>
Encode
>
Overlay
Figure 6-18 Location
>
Location
Operation Manual
.
Step 2 Click next to
text is displayed in the video image.
Enable
Click to add the text overlay, and you can add 13 lines at most.
Step 3 Move the text box to the position that you want in the image.
Step 4 Click
Apply
.
6.2.2.2.5 Configuring Font Properties
You can enable this function if you need to adjust the font size in the video image.
Procedure
Step 1 Select >
Camera
>
Encode
Figure 6-19 Font properties
, enter the location information, and then select alignment. The
>
Overlay
>
Font Properties
.
Step 2 Select the font color and size.
You can set the RGB value to customize the font color.
Step 3 Click
Apply
.
32
Page 46
6.2.2.2.6 Configuring Picture Overlay
You can enable this function if you need to display picture information on the video image.
Text overlay and picture overlay cannot work at the same time.
Procedure
Step 1 Select >
Camera
>
Encode
Figure 6-20 Picture overlay
>
Overlay
>
Picture Overlay
Operation Manual
.
Step 2 Click next to
The picture is displayed on the video image.
Step 3 Move the overlaid picture to the position that you want in the image.
Step 4 Click
Apply
.
Enable
6.2.2.2.7 Configuring Custom Title
You can enable this function if you need to display custom information on the video image.
Procedure
Step 1 Select >
Camera
>
, click
Upload
Encode
Figure 6-21 Custom title
>
Overlay
, and then select the picture to be overlaid.
>
Custom Title
Step 2 Click next to
text alignment.
Enable
, enter the text that you want to display, and then select the
33
Page 47
Click to add the text overlay, and you can add 1 line at most.
Step 3 Move the custom box to the position that you want in the image.
Step 4 Click
Apply
.
6.2.2.2.8 Configuring Target Statistics
After configuring the target statistics, the number of target statistics will be displayed on the image.
Procedure
Step 1 Select >
Camera
>
Encode
Figure 6-22 Target statistics
>
Overlay
>
Target Statistics
Operation Manual
.
Step 2 Click next to
Click
Step 3 Move the custom box to the position that you want in the image.
Step 4 Click
The overlaid information will be displayed after enabling video metadata function.
to clear the statistics data.
Reset
.
Apply
6.2.2.2.9 Configuring ANPR
After enabling this function, ANPR statistics information will be displayed on the image. When the
overlay function is enabled during intelligent rules configuration, this function is enabled
simultaneously.
Procedure
Step 1 Select >
Camera
Enable
>
Encode
, select the statistics type, and then select the text alignment.
>
Overlay
>
ANPR
.
34
Page 48
Figure 6-23 ANPR
Operation Manual
Step 2 Select the
Enable
check box, select the statistics type, and then select text alignment.
Click
Step 3 Move the ANPR box to the position that you want in the image.
Step 4 Click
to clear the statistics data.
Reset
.
Apply
6.2.2.2.10 Configuring Face Detection
After enabling this function, face statistics information will be displayed on the image. When the
overlay function is enabled during intelligent rules configuration, this function is enabled
simultaneously.
Procedure
Step 1 Select >
Camera
>
Encode
Figure 6-24 Face detection
>
Overlay
>
Face Detection
.
Step 2 Click next to
Enable
, and select the text alignment.
35
Page 49
Operation Manual
Click
Step 3 Move the statistics box to the position that you want in the image.
Step 4 Click
The information will be displayed on the image after the face detection function is
enabled.
to clear the statistics data.
Reset
.
Apply
6.2.2.2.11 Configuring Face Recognition
After enabling this function, face statistics information will be displayed on the image. When the
overlay function is enabled during intelligent rules configuration, this function is enabled
simultaneously.
Procedure
Step 1 Select >
Camera
>
Encode
Figure 6-25 Face recognition
>
Overlay
>
Face Recognition
.
Step 2 Click next to
Enable
Click
Step 3 Move the statistics box to the position that you want in the image.
Step 4 Click
The information will be displayed on the image after the face recognition function is
enabled.
to clear the statistics data.
Reset
.
Apply
6.2.2.2.12 Configuring Face Statistics
After enabling this function, face statistics information will be displayed on the image. When the
overlay function is enabled during intelligent rules configuration, this function is enabled
simultaneously.
, select the statistics type, and then select the text alignment.
Procedure
Step 1 Select >
Camera
>
Encode
>
Overlay
36
>
Face Statistics
.
Page 50
Figure 6-26 Face statistics
Operation Manual
Step 2 Click next to
Enable
, and select the text alignment.
Click
Step 3 Move the statistics box to the position that you want in the image.
Step 4 Click
to clear the statistics data.
Reset
.
Apply
6.2.2.2.13 Configure Face&Body Counting
After enabling this function, face&body counting information will be displayed on the image. When
the overlay function is enabled during intelligent rules configuration, this function is enabled
simultaneously.
Procedure
Step 1 Select >
Camera
>
Encode
Figure 6-27 Face&body counting
>
Overlay
>
Face&Body Counting
.
Step 2 Select the
Enable
check box, and then select text alignment.
37
Page 51
Operation Manual
Click
Step 3 Move the face&body counting box to the position that you want in the image.
Step 4 Click
to clear the statistics data.
Reset
.
Apply
6.2.2.2.14 Configuring Parking Space
After enabling this function, parking space information will be displayed on the image. When the
overlay function is enabled during intelligent rules configuration, this function is enabled
simultaneously.
Procedure
Step 1 Select >
Camera
>
Encode
Figure 6-28 Parking space
>
Overlay
>
Parking Space
.
Step 2 Select the
Step 3 Select statistic type and text alignment.
Step 4 Click
6.2.2.3 ROI
Select ROI (region of interest) on the image and configure the image quality of ROI, and then the
selected image is display at defined quality.
Procedure
Step 1 Select >
Apply
Enable
.
Camera
check box.
>
Encode
>
ROI
.
38
Page 52
Figure 6-29 ROI
Operation Manual
Step 2 Click next to
quality of ROI.
Step 3 Click
Step 4 Click

6.2.3 Splicing

When the panorama contains multiple images captured by different lenses, enable this function.
Before splicing, make sure that the surveillance scene is large and there are no objects blocking the
camera from taking a clear picture, otherwise, the splicing might fail.
Procedure
Step 1 Select >
Enable
, draw an area on the image, and then configure the image
The higher the image quality value is, the better the quality will be.
Click
Apply
Add
to delete all the area boxes; select one box, and then click to delete it.
Clear
.
to add more ROI. You can draw 4 area boxes at most.
Camera
>
Splicing
Figure 6-30 Splicing
.
Step 2 Select the lenses that need to be spliced.
When splicing the image through selecting lenses, you need to select the continuous
splicing screens. The screen with the icon (deeper color) is the first screen of the
splicing. You can select any screen as the first one, and then select the following screens
continuously. The system supports the splicing of 2 lenses to 8 lenses.
This function is available on select models. And it is all sensors splicing by default.
For Multi-Sensor Panoramic + PTZ Camera, the 4-sensor device supports 2 to 4 lenses
39
Page 53
splicing; the 6-sensor device supports 2 to 6 lenses splicing; the 8-sensor device
supports 2-8 lenses splicing.
Step 3 Click
The system starts to splice the image.
Some cameras restart automatically after splicing is complete, you can view the results
Some cameras display splicing live window after splicing is complete. Click OK, and
of the splicing in the
then the default window appears. Click OK and the splicing will take effect.
Start
.
Live

6.2.4 Audio

You can configure audio parameters and alarm audio.
6.2.4.1 Setting Audio Parameters
This section introduces audio parameters, including encode mode, sampling frequency, audio in
type, and noise filter.
Operation Manual
window.
Procedure
Step 1 Select >
Camera
>
.
Audio
Figure 6-31 Audio
Step 2 Click next to
For the camera with multiple channels, select the channel number.
Enable
in
Please carefully activate the audio acquisition function according to the actual
requirements of the application scenario.
Step 3 Configure audio parameters.
Main Stream
40
or
Sub Stream
.
Page 54
Table 6-11 Description of audio parameters
Parameter Description
Operation Manual
Compression
Sampling Frequency
Audio Input Type
Noise Filter Enable this function, and the system auto filters ambient noise.
Microphone Volume Adjusts microphone volume.
Speaker Volume Adjusts speaker volume.
Step 4 Click
Apply
.
6.2.4.2 Setting Alarm Tone
You can record or upload alarm audio file. The audio file will be played when the alarm is triggered.
You can select audio
G.726, AAC, G.723
The configured audio encode mode applies to both audio and intercom. The default value is recommended.
Sampling number per second. The higher the sampling frequency is, the more the sample in a second will be, and the more accuracy the restored signal will be. You can select audio from
8000, 16000, 32000, 48000, 64000
You can select audio input type from:
: Requires external audio device.
LineIn
: Not require external audio device.
Mic
Encode Mode
.
from
PCM, G.711A, G.711Mu
Sampling Frequency
.
,
Procedure
Step 1 Select >
Camera
>
Audio Tone
Figure 6-32 Audio tone
.
Step 2 Click
Step 3 Configure the audio file.
Select
Select
Add
.
Record
Upload
, enter the audio name in the input box, and then click
, click
Browse
Record
to select the audio file to be uploaded, and then click
41
.
Page 55
Operation Manual
Upload
The camera supports recording audio file in .pcm format only. Recording is only
supported by select models.
You can upload audio files in .pcm, .wav2, .mp3, or .aac format.
Step 4 Select the file that you need.
Related Operations
Edit audio file
Click to edit the file name.
Delete audio file
Click to delete the file name.
Play audio file
Click to play the file name.
Download audio file
Click to download the file name.
.
Figure 6-33 Add alarm tone

6.3 Network

This section introduces network configuration.

6.3.1 TCP/IP

You can configure IP address and DNS (Domain Name System) server and so on according to
network planning.
Prerequisites
The camera has connected to the network.
Procedure
Step 1 Select >
Network
>
TCP/IP
.
42
Page 56
Figure 6-34 TCP/IP
Operation Manual
Step 2 Configure TCP/IP parameters.
Table 6-12 Description of TCP/IP parameters
Parameter Description
Host Name Enter the host name, and the maximum length is 15 characters.
43
Page 57
Parameter Description
Click to enable ARP/Ping to set IP address service. Get the camera MAC address, and then you can change and configure the device IP address with ARP/ping command.
This is enabled by default. During restart, you will have no more than 2 minutes to configure the device IP address by a ping packet with certain length, the server will be turned off in 2 minutes, or it will be turned off immediately after the IP address is successfully configured. If this is not enabled, the IP address cannot be configured with ping packet.
A demonstration of configuring IP address with ARP/Ping.
1. Keep the camera that needs to be configured and the PC within
the same local network, and then get a usable IP address.
2. Get the MAC address of the camera from device label.
3. Open command editor on the PC and enter the following
command.
Operation Manual
ARP/Ping
NIC
4. Restart the camera.
5. Check the PC command line, if information such as
192.168.0.125…
you can turn it off then.
6. Enter http://(IP address) in the browser address bar to log in.
Select the Ethernet card that need to be configured, and the default one is
Wire
.
is displayed, the configuration succeeds, and
Reply from
The mode that the camera gets IP:
Mode
MAC Address Displays host MAC address.
IP Version Select
: Configure
Static
Gateway
configured IP address is displayed.
DHCP
and the camera acquires IP address automatically.
IPv4
manually, and then click
: When there is DHCP server in the network, select
or
IPv6
44
IP Address, Subnet Mask
.
, and
Default
, the login page with the
Save
DHCP
,
Page 58
Parameter Description
Operation Manual
IP Address
Subnet Mask
Default Gateway
Preferred DNS IP address of the preferred DNS.
Alternate DNS IP address of the alternate DNS.
Step 3 Click

6.3.2 Port

Configure the port numbers and the maximum number of users (includes web, platform client, and
mobile phone client) that can connect to the device simultaneously.
Procedure
Step 1 Select >
Apply
.
Network
When you select mask that you need.
Static
in
, enter the IP address and subnet
Mode
IPv6 does not have subnet mask.
The default gateway must be in the same network segment with
the IP address.
>
TCP/IP
.
Figure 6-35 Port
Step 2 Configure port parameters.
0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, 42323 are occupied
for specific uses.
Do not use the same value of any other port during port configuration.
45
Page 59
Operation Manual
Table 6-13 Description of port parameters
Parameter Description
The max number of users (web client, platform client or mobile
Max Connection
TCP Port Transmission control protocol port. The value is 37777 by default.
UDP Port User datagram protocol port. The value is 37778 by default.
HTTP Port Hyper text transfer protocol port. The value is 80 by default.
phone client) that can connect to the device simultaneously. The value is 10 by default.
Real time streaming protocol port, and the value is 554 by
default. If you play live view with QuickTime, VLC or Blackberry
smart phone, the following URL format is available.
When the URL format requiring RTSP, you need to specify
channel number and bit stream type in the URL, and also
username and password if needed.
When playing live view with Blackberry smart phone, you need to
turn off the audio, and then set the codec mode to H.264B and
resolution to CIF.
RTSP Port
RTMP Port
URL format example:
rtsp://username:password@ip:port/cam/realmonitor?channel=1&sub type=0
Among that:
Username: The username, such as admin.
Password: The password, such as admin.
IP: The device IP, such as 192.168.1.112.
Port: Leave it if the value is 554 by default.
Channel: The channel number, which starts from 1. For example,
if you are using channel 2, then the channel=2.
Subtype: The bit stream type; 0 means main stream (Subtype=0)
and 1 means sub stream (Subtype=1).
Example: If you require the sub stream of channel 2 from a certain device, then the URL should be:
rtsp://admin:admin@10.12.4.84:554/cam/realmonitor?channel=2&su btype=1
If username and password are not needed, then the URL can be:
rtsp://ip:port/cam/realmonitor?channel=1&subtype=0
Real Time Messaging Protocol. The port that RTMP provides service. It is 1935 by default.
HTTPS Port HTTPS communication port. It is 443 by default.
Step 3 Click
Apply
.
The configuration of
after reboot.
Max Connection
takes effect immediately, and others will take effect
46
Page 60

6.3.3 PPPoE

Point-to-Point Protocol over Ethernet, is one of the protocols that device uses to connect to the
internet. Get the PPPoE username and password from the internet service provider, and then set up
network connection through PPPoE, the camera will acquire a WAN dynamic IP address.
Prerequisites
The camera has connected to the network.
You have gotten the account and password from Internet Service Provider.
Procedure
Step 1 Select >
Network
>
.
PPPoE
Figure 6-36 PPPoE
Operation Manual
Step 2 Click , and then enter username and password.
Step 3 Click

6.3.4 DDNS

Properly configure DDNS, and then the domain name on the DNS server matches your IP address
and the matching relation refreshes in real time. You can always visit the camera with the same
domain name no matter how the IP address changes.
Prerequisites
Check the type of DNS server supported by the camera.
Procedure
Step 1 Select >
Disable UPnP while using PPPoE to avoid possible influence.
After making PPPoE connection, the device IP address cannot be modified through
web page.
.
Apply
The success prompt box is displayed, and then the real-time WAN IP address is displayed.
You can access camera through the IP address.
Network
>
DDNS
.
Third party server might collect your device information after DDNS is enabled.
Register and log in to the DDNS website, and then you can view the information of all
47
Page 61
the connected devices in your account.
Figure 6-37 DDNS
Step 2 Click to enable the function.
Step 3 Configure DDNS parameters.
Operation Manual
Result
Table 6-14 Description of DDNS parameters
Parameter Description
Type The name and web address of the DDNS service provider, see the
matching relationship below:
CN99 DDNS web address: www.3322.org
Server Address
Domain Name The domain name you registered on the DDNS website.
Test
Username Enter the username and password that you got from the DDNS server
Password
Interval
Step 4 Click
Open the browser on PC, then enter domain name at the address bar and press
page is displayed.
Apply
.
NO-IP DDNS web address: dynupdate.no-ip.com
Dyndns DDNS web address: members.dyndns.org
Only when selecting whether the domain name registration is successful.
provider. You need to register an account (includes username and password) on the DDNS server provider's website.
The update cycle of the connection between the device and the server, and the time is 10 minutes by default.
NO-IP DDNS
type, you can click
Enter
to check
Test
, the login

6.3.5 Email

Configure email parameter and enable email linkage. The system sends email to the defined address
when the corresponding alarm is triggered.
Procedure
48
Page 62
Operation Manual
Step 1 Select >
Network
>
.
Email
Figure 6-38 Email
Step 2 Click to enable the function.
Step 3 Configure email parameters.
Table 6-15 Description of email parameters
Parameter Description
SMTP Server SMTP server address
Port
Username The account of SMTP server.
Password The password of SMTP server.
Anonymous
Sender Sender’s email address.
Encryption Type
Subject
The port number of the SMTP server.
Click , and the sender's information is not displayed in the email.
Select from
None, SSL
For details, see Table 6-16.
Enter maximum 63 characters in Chinese, English, and Arabic numerals. Click to select title type, including
ID
, and
Event Type
, and you can set maximum 2 titles.
and
TLS
For details, see Table 6-16.
.
Device Name, Device
Attachment Select the check box to support attachment in the email.
49
Page 63
Parameter Description
Receiver’s email address. Supports 3 addresses at most.
Receiver
Health Mail
Table 6-16 Description of major mailbox configuration
Mailbox SMTP server Authentication Port Description
After entering the receiver's email address, the
display. Click received successfully.
The system sends test mail to check if the connection is successfully configured. Click and configure the the system sends test mail as the set interval.
to test whether the emails can be sent and
Test
Sending Interval
Operation Manual
button is
Test
, and then
Gmail
Step 4 Click

6.3.6 UPnP

UPnP (Universal Plug and Play) is a protocol that establishes mapping relation between local area
and wide area networks. This function enables you to access local area device through wide area IP
address.
Prerequisites
Make sure the UPnP service is installed in the system.
Log in the router, and configure WAN IP address to set up internet connection.
Enable UPnP in the router.
Connect your device to the LAN port of the router.
Select >
select
Procedure
Step 1 Select >
smtp.gmail.c om
.
Apply
Network
and acquires IP address automatically.
DHCP
>
Network
SSL 465
TLS 587
>
UPnP
, in
IP Address
.
TCP/IP
You need to enable SMTP service in your mailbox.
, enter the local area IP address of the router or
50
Page 64
Figure 6-39 UPnP
Operation Manual
Step 2 Click next to
Step 3 Click

6.3.7 SNMP

SNMP (Simple Network Management Protocol), which can be used to enable software such as MIB
Builder and MG-SOFT MIB Browser to connect to the camera and manage and monitor the camera.
Prerequisites
Install SNMP monitoring and managing tools such as MIB Builder and MG-SOFT MIB Browser.
Get the MIB file of the matched version from technical support.
Procedure
Step 1 Select >
Enable
Select
Select
Open web browser on PC, enter http://
then you can visit the local area device with corresponding port.
Custom
Default
automatically, and you cannot edit mapping relation.
Apply
, click and then you can change external port as needed.
, and then the system finishes mapping with unoccupied port
.
Network
, and there are two mapping modes:
wide area IP address: external port number
>
SNMP
.
Custom
and
Default
, and
.
51
Page 65
Figure 6-40 SNMP (1)
Figure 6-41 SNMP (2)
Operation Manual
Step 2 Select SNMP version to enable SNMP.
Select V1, and the system can only process information of V1 version.
Select V2, and the system can only process information of V2 version.
Select V3, and then V1 and
password and authentication type. It requires corresponding username, password and
become unavailable. You can configure username,
V2
52
Page 66
authentication type to visit your device from the server.
Using V1 and V2 might cause data leakage, and V3 is recommended.
Step 3 In
Parameter Description
SNMP Port The listening port of the software agent in the device.
Read Community, Write Community
Trap Address
Browser installed, and leave other parameters to the default.
, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB
Table 6-17 Description of SNMP parameters
The read and write community string that the software agent supports.
You can enter number, letter, underline and dash to form the
name.
Operation Manual
Trap Address
Trap Port
Read-only Username
Read/Write Username
Authentication Type
Authentication Password It should be no less than 8 digits.
Encryption Type The default is CBC-DES.
Encryption Password It should be no less than 8 digits.
Step 4 Click
Apply
.
The target address of the Trap information sent by the software agent in the device.
The target port of the Trap information sent by the software agent in the device.
Set the read-only username accessing device, and it is default.
You can enter number, letter, and underline to form the name.
Set the read/write username access device, and it is default.
You can enter number, letter, and underline to form the name.
You can select from
MD5
and
. The default type is
SHA
public
private
MD5
by
by
.
Result
View device configuration through MIB Builder or MG-SOFT MIB Browser.
1. Run MIB Builder and MG-SOFT MIB Browser.
2. Compile the two MIB files with MIB Builder.
3. Load the generated modules with MG-SOFT MIB Browser.
4. Enter the IP address of the device you need to manage in the MG-SOFT MIB Browser, and then
select version to search.
5. Unfold all the tree lists displayed in the MG-SOFT MIB Browser, and then you can view the
configuration information, video channel amount, audio channel amount, and software version.
53
Page 67
Use PC with Windows and disable SNMP Trap service. The MG-SOFT MIB Browser will display prompt
when alarm is triggered.

6.3.8 Bonjour

Enable this function, and the OS and clients that support Bonjour would find the camera
automatically. You can have quick visit to the camera with Safari browser.
Bonjour is enabled by default.
Procedure
Step 1 Select >
Network
>
Bonjour
Figure 6-42 Bonjour
.
Operation Manual
Step 2 Click , and then configure server name.
Step 3 Click
Result
In the OS and clients that support Bonjour, follow the steps below to visit the network camera with
Safari browser.
1. Click
2. Enable
3. Click the camera to visit the corresponding web page.
Show All Bookmarks
Bonjour
enabled in the LAN.

6.3.9 Multicast

When multiple users are viewing the device video image simultaneously through network, it might
fail due to limited bandwidth. You can solve this problem by setting up a multicast IP (224.0.1.0–
238.255.255.255) for the camera and adopt the multicast protocol.
.
Apply
in Safari.
. The OS or client automatically detects the network cameras with Bonjour
Procedure
Step 1 Select >
Network
>
Multicast
.
54
Page 68
Figure 6-43 Multicast
Step 2 Click , and enter IP address and port number.
Table 6-18 Description of multicast parameters
Parameter Description
Operation Manual
Multicast Address
Port
Step 3 Click
Result
On the
protocol.
page, select
Live

6.3.10 Register

After you enable this function, when the camera is connected into Internet, it will report the current
location to the specified server which acts as the transit to make it easier for the client software to
access the camera.
Procedure
Step 1 Select >
Apply
.
RTSP
Network
The multicast IP address of by default, and the range is 224.0.0.0–239.255.255.255.
The multicast port of corresponding stream:
Sub Stream1
1025–65500.
in
Multicast
>
Register
: 40016;
, and then you can view the video image with multicast
.
Main Stream/Sub Stream
Sub Stream2
: 40032, and all the range is
is 224.1.2.4
Main Stream
: 40000;
Figure 6-44 Register
Step 2 Click , and then configure server name.
Table 6-19 Description of register parameters
Parameter Description
Server Address The IP address or domain name of the server to be registered.
55
Page 69
Parameter Description
Port The port for registration.
Sub-Device ID The custom ID for the camera.
Step 3 Click

6.3.11 QoS

You can solve problems such as network delay and congestion with this function. It helps to assure
bandwidth, reduce transmission delay, packet loss rate, and delay jitter to improve experience.
0–63 means 64 degrees of priority; 0 for the lowest and 63 the highest.
Procedure
Step 1 Select >
Apply
.
Network
>
.
QoS
Figure 6-45 QoS
Operation Manual
Step 2 Configure QoS parameters.
Parameter Description
Realtime Monitor
Command
Step 3 Click
Save
.

6.3.12 Platform Access

6.3.12.1 P2P
P2P (peer-to-peer) technology enables users to manage devices easily without requiring DDNS, port
mapping or transit server.
Scan the QR code with your smartphone, and then you can add and manage more devices on the
mobile phone client.
Table 6-20 Description of QoS parameters
Configure the priority of the data packets that used for network surveillance. 0 for the lowest and 63 the highest.
Configure the priority of the data packets that used for configure or checking.
Procedure
Step 1 Select >
Network
>
Platform Access
56
>
P2P
.
Page 70
Figure 6-46 P2P
When P2P is enabled, remote management on device is supported.
When P2P is enabled and the device accesses to the network, the status shows online.
The information of the IP address, MAC address, device name, and device SN will be
collected. The collected information is for remote access only. You can cancel
selection to reject the collection.
Step 2 Log in to mobile phone client and tap
Step 3 Tap + at the upper-right corner.
Step 4 Scan the QR code on the
Step 5 Follow the instructions to finish the settings.
P2P
page.
Device management
Operation Manual
Enable
.
6.3.12.2 ONVIF
The ONVIF verification is enabled by default, which allows the network video products (including
video recording device and other recording devices) from other manufacturers to connect to your
device.
ONVIF is enabled by default.
Procedure
Step 1 Select >
Step 2 Click next to
Step 3 Click
Apply
Network
.
>
Platform Access
Figure 6-47 ONVIF
ONVIF Verification
.
>
ONVIF
.
57
Page 71
6.3.12.3 RTMP
Through RTMP, you can access a third-party platform (such as Ali and YouTube) to realize video live
view.
RTMP can be configured by admin only.
RTMP supports the H.264, H.264 B and H.264H video formats, and the AAC audio format only.
Procedure
Step 1 Select >
Network
>
Platform Access
Figure 6-48 RTMP
>
RTMP
Operation Manual
.
Step 2 Click .
Make sure that the IP address is trustable when enabling RTMP.
Step 3 Configure RTMP parameters.
Table 6-21 Description of RTMP parameters
Parameter Description
Stream Type
Address Type
The stream for live view. Make sure that the video format is H.264, H.264 B and H.264H, and the audio format is AAC.
Non-custom
Custom
: Enter the server IP and domain name.
: Enter the path allocated by the server.
IP Address
Port
Custom Address
Step 4 Click
Apply
When selecting and port.
IP address
: Keep the default value.
Port
When selecting the server.
.
Non-custom
: Support IPv4 or domain name.
Custom
58
, you need to enter server IP address
, you need to enter the path allocated by
Page 72

6.3.13 Basic Service

Configure the IP hosts (devices with IP address) that are allowed to visit the device. Only the hosts in
the trusted sites list can log in to the web page. This is to enhance network and data security.
Procedure
Step 1 Select >
Network
>
Basic Service
Figure 6-49 Basic service
.
Operation Manual
Step 2 Enable the basic service according to the actual needs.
Table 6-22 Description of basic service parameters
Function Description
SSH
Multicast/Broadcast Search
CGI
Onvif
Genetec
Mobile Push Notification
Private Protocol Authentication Mode
Step 3 Click
Apply
.
You can enable SSH authentication to perform safety management.
Enable this function, and then when multiple users are viewing the device video image simultaneously through network, they can find your device with multicast/broadcast protocol.
Enable the function, and then other devices can access through this service. The function is enabled by default.
Enable this function, and then the system will send the snapshot that was taken when alarm is triggered to your phone, this is enabled by default.
Select the authentication mode from
Compatible Mode
. Security mode is recommended.
Security Mode
and
59
Page 73

6.4 EPTZ

EPTZ function can simultaneously zoom in and track multiple humans and vehicles that trigger
alarms. It provides rich details and a panoramic view at the same time.
This function is only available on select devices.
Procedure
Step 1 Select >
PTZ
>
EPTZ Linkage
Figure 6-50 EPTZ
Operation Manual
.
Step 2 Enable this function and select the display mode.
Table 6-23 Description of display modes
Mode Description
Displays the original screen.
Displays the original image screen + 1 sub-screen.
Displays the original image screen + 3 sub-screens.
You can zoom or drag
the sub-screen
images in the original
screen.
Step 3 (Optional) Enable the
the dropdown list.
Custom: Select the tracking duration time manually. For example, if you set from 30 s to
Displays the original image screen + 5 sub-screens.
60 s, after tracking object A for 30 seconds, if object B appears, the camera will start
tracking object B; if no other object appears in the process of tracking A, the camera will
Linkage Track
60
checkbox and select tracking duration mode from
Page 74
stop tracking object A after 60 seconds.
Continue till object disappears: The camera will stop tracking when the detected object
disappears in the image.
Step 4 Click
Apply
.

6.5 Event

6.5.1 Setting Alarm Linkage

6.5.1.1 Setting Alarm-in
When an alarm is triggered by the device connected to the alarm-in port, the system performs the
defined alarm linkage.
Procedure
Step 1 Select >
Step 2 Click next to
Event
>
Alarm
Enable
Operation Manual
.
to enable alarm linkage.
Figure 6-51 Alarm linkage
Step 3 Select an alarm-in port and a sensor type.
61
Page 75
Sensor Type: NO or NC.
Anti-Dither: Only record one alarm event during the anti-dither period.
Step 4 Select the schedule and arming periods and alarm linkage action. If the schedules cannot
meet the scene requirement, you can click
see "6.5.1.2.1 Adding Schedule".
Step 5 Click
Apply
6.5.1.2 Alarm Linkage
When configuring alarm events, select alarm linkages (such as record, snapshot). When the
corresponding alarm is triggered in the configured arming period, the system will alarm.
Select >
Event
>
.
, and then click next to
Alarm
Figure 6-52 Alarm linkage
Add Schedule
Enable
to enable alarm linkage.
Operation Manual
to add new schedule. For details,
6.5.1.2.1 Adding Schedule
Set arming periods. The system only performs corresponding linkage action in the configured
period.
Procedure
Step 1 Click
Add Schedule
next to
Schedule
62
.
Page 76
Figure 6-53 Schedule
Operation Manual
Step 2 Press and drag the left mouse button on the timeline to set arming periods. Alarms will be
triggered in the period in green on the timeline.
Click
You can set 6 periods per day.
Step 3 Click
Step 4 (Optional) Click
You can:
Double-click the table name to edit it.
Click to delete the table as needed.
Copy
page, you can copy the configuration to the selected days. Select the
box to select all days to copy the configuration.
Apply
6.5.1.2.2 Record Linkage
The system can link record channel when an alarm event occurs. After alarm, the system stops
recording after an extended period according to the
Prerequisites
After the corresponding alarm type (
links recording. For details, see "10.3 Setting Record Plan".
Enable auto record mode, the record linkage will take effect. For details, see "10.2 Setting Record
Control".
next to a day, and select the days that you want to copy to in the prompt
Select All
.
Time Plan Table
to add a new time plan table.
Post-Record
Normal, Motion
, or
setting.
Alarm
) is enabled, the record channel
check
Setting Record Linkage
On the
Post-Record
After
Post-Record
page, click to enable record linkage, select the channel as needed, and set
Alarm
to set alarm linkage and record delay.
is configured, alarm recording continues for an extended period after the alarm
63
Page 77
ends.
6.5.1.2.3 Snapshot Linkage
After snapshot linkage is configured, the system can automatically alarm and take snapshots when
an alarm is triggered.
Prerequisites
Operation Manual
Figure 6-54 Record linkage
After the corresponding alarm type (
links capturing picture. For details, see "10.3 Setting Record Plan".
Setting Record Linkage
On the
6.5.1.2.4 Alarm-out Linkage
When an alarm is triggered, the system can automatically link with alarm-out device.
On the
configure
When alarm delay is configured, alarm continues for an extended period after the alarm ends.
page, click to enable snapshot linkage, and select the channel as needed.
Alarm
page, click to enable alarm-out linkage, select the channel as needed, and then
Alarm
Post alarm
.
Normal, Motion
Figure 6-55 Snapshot linkage
Figure 6-56 Alarm-out linkage
, or
Alarm
) is enabled, the snapshot channel
6.5.1.2.5 Email Linkage
When an alarm is triggered, the system will automatically send an email to users.
Email linkage takes effect only when SMTP is configured. For details, see "6.3.5 Email".
Figure 6-57 Email linkage
64
Page 78
6.5.1.3 Subscribing Alarm
6.5.1.3.1 Alarm Types
Alarm Type Description Preparation
Operation Manual
Table 6-24 Description of alarm types
Motion Detection
Disk Full
Disk Error
Video Tampering
External Alarm
Audio Detection
IVS
The alarm is triggered when moving object is detected.
The alarm is triggered when the free space of SD card is less than the configured value.
The alarm is triggered when there is failure or malfunction in the SD card.
The alarm is triggered when the camera lens is covered or there is defocus in video images.
The alarm is triggered when there is external alarm input.
The alarm is triggered when there is audio connection problem.
The alarm is triggered when intelligent rule is triggered.
Motion detection is enabled. For details, see "6.5.3.1 Setting Motion Detection".
The SD card no space function is enabled. For details, see "6.5.2.1 Setting SD Card Exception".
SD card failure detection is enabled. For details, see "6.5.2.1 Setting SD Card Exception".
Video tampering is enabled. For details, see "6.5.3.2 Setting Video Tampering".
The device has alarm input port and external alarm function is enabled. For details, see "6.5.1.1 Setting Alarm-in".
Abnormal audio detection is enabled. For details, see "6.5.4 Setting Audio Detection".
Enable IVS, crowd map, face detection or people counting, and other intelligent functions.
The alarm is triggered when the
Scene Changing
Voltage Detection
Security Exception
device monitoring scene changes.
The alarm is triggered when the device detects abnormal voltage input.
The alarm is triggered when the device detects malicious attack.
6.5.1.3.2 Subscribing Alarm Information
Background Information
You can subscribe alarm event. When a subscribed alarm event is triggered, the system records
detailed alarm information at the right side of the page.
Functions of different devices might vary.
Procedure
Scene changing detection is enabled. For details, see "6.5.3.3 Setting Scene Changing".
Voltage detection is enabled. For details, see "6.5.2.3 Setting Voltage Detection".
Security exception is enabled. For details, see "9.1 Security Status".
65
Page 79
Step 1 Click at the right-upper corner of the main page.
Figure 6-58 Alarm (subscription)
Operation Manual
Step 2 Click next to
Step 3 Select alarm type according to the actual need. For details, see "6.5.1.3.2 Subscribing Alarm
Information".
The system prompts and records alarm information according to actual conditions.
When the subscribed alarm event is triggered and the alarm subscription page is not
displayed, a number is displayed on , and the alarm information is recorded
automatically. Click to view the details in the alarm list. You can click
record.
Step 4 Click next to
The system will play the selected audio file when the selected alarm is triggered.

6.5.2 Setting Exception

Abnormality includes SD card, network, illegal access, voltage detection, and security exception.
Only the device with SD card has the abnormality functions, including
and
Capacity Warning
.
Enable Alarm
Play Alarm Tone
.
, and select the tone path.
No SD Card, SD Card Error
Clear
to clear the
,
66
Page 80
6.5.2.1 Setting SD Card Exception
Operation Manual
In case of SD card exception, the system performs alarm linkage. The event types include
Card, Low SD Card Space
Procedure
Step 1 Select >
Step 2 Click to enable the SD card detection functions.
Step 3 Set alarm linkage actions. For details, see "6.5.1.2 Alarm Linkage".
Step 4 Click
, and
SD Card Error
>
Event
When enabling
card is less than this value, the alarm is triggered.
.
Apply
Exception
Figure 6-59 SD card exception
Low SD Card Space
. Functions might vary with different models.
>
SD Card Exception
, set
Capacity Limit
No SD
.
. When the remaining space of SD
6.5.2.2 Setting Network Exception
In case of network abnormality, the system performs alarm linkage. The event types include
and
IP Conflict
.
Procedure
Step 1 Select >
Event
>
Exception
>
Network Exception
Offline
.
67
Page 81
Figure 6-60 Network exception
Operation Manual
Step 2 Click to enable the network detection function.
Step 3 Set alarm linkage actions. For details, see "6.5.1.2 Alarm Linkage".
Step 4 Click
Apply
.
6.5.2.3 Setting Voltage Detection
When the input voltage is higher than or lower than the rated value of the device, the system
performs alarm linkage.
Procedure
Step 1 Select >
Event
>
Exception
>
Voltage Detection
.
68
Page 82
Figure 6-61 Voltage detection
Step 2 Click to enable the voltage detection function.
When enabling
Overlay
, the alarm icon is displayed by overlapping when the alarm is
triggered.
Step 3 Set alarm linkage actions. For details, see "6.5.1.2 Alarm Linkage".
Step 4 Click
Apply
.
Operation Manual

6.5.3 Setting Video Detection

Check whether there are considerable changes on the video by analyzing video images. In case of
any considerable change on the video (such as moving object and fuzzy image), the system
performs an alarm linkage.
6.5.3.1 Setting Motion Detection
The system performs an alarm linkage when a moving object appears in the image and its moving
speed reaches the configured sensitivity.
If you enable motion detection and smart motion detection simultaneously, and configure the
linked activities, the linked activities take effect as follows:
When motion detection is triggered, the camera will record and take snapshots, but other
configured linkages such as sending emails, PTZ operation will not take effect.
When smart motion detection is triggered, all the configured linkages take effect.
If you only enable motion detection, all the configured linkages take effect when motion
detection is triggered.
Procedure
Step 1 Select >
Event
>
Video Detection
>
Motion Detection
69
.
Page 83
Figure 6-62 Motion detection
Operation Manual
Step 2 Click to enable the motion detection function.
Step 3 Set the area for motion detection.
1) Click
Setting
next to
Area
.
Figure 6-63 Area
2) Select a color and set the region name. Select an effective area for motion detection in
the image and set
Sensitivity
and
Threshold
.
Select a color on to set different detection parameters for each
region.
Sensitivity: Sensitive degree of outside changes. It is easier to trigger the alarm with
higher sensitivity.
Threshold: Effective area threshold for motion detection. The smaller the threshold
is, the easier the alarm is triggered.
The whole video image is the effective area for motion detection by default.
The red line in the waveform indicates that the motion detection is triggered, and
70
Page 84
the green one indicates that there is no motion detection. Adjust sensitivity and
threshold according to the waveform.
3) Click OK.
Step 4 Set arming periods and alarm linkage action. For details, see "6.5.1.2 Alarm Linkage".
If the exiting schedules cannot meet the scene requirement, you can click
to add a new schedule. For details, see "6.5.1.2.1 Adding Schedule".
Anti-dither: After the
event in the period.
Step 5 Click
Apply
.
Anti-dither
6.5.3.2 Setting Video Tampering
The system performs alarm linkage when the lens is covered or video output is mono-color screen
caused by light and other reasons.
Procedure
Step 1 Select >
Step 2 Select the event type.
Video Tampering
exceed the configured values, an alarm will be triggered.
Defocus Detection
function is available on select models.
Event
>
Video Detection
: When the percentage of the tampered image and the duration
: When the image is blurred, an alarm will be triggered. This
Operation Manual
Add Schedule
time is set, the system only records one motion detection
>
Video Tampering
.
Figure 6-64 Video tampering
71
Page 85
Table 6-25 Description of video temper parameter
Parameter Description
Operation Manual
Covered Area
Duration
Anti-Dither Only record one alarm event during the anti-dither period.
Step 3 Set arming periods and alarm linkage action. For details, see "6.5.1.2 Alarm Linkage".
If the exiting schedules cannot meet the scene requirement, you can click
to add a new schedule. For details, see "6.5.1.2.1 Adding Schedule".
Step 4 Click
Apply
.
When the percentage of the tampered image and the duration exceed the configured values, an alarm will be triggered.
6.5.3.3 Setting Scene Changing
The system performs alarm linkage when the image switches from the current scene to another one.
Procedure
Step 1 Select >
Event
>
Video Detection
Figure 6-65 Scene changing
>
Scene Changing
Add Schedule
.
Step 2 Select the schedule and arming periods and alarm linkage action. For details, see "6.5.1.2
Alarm Linkage".
If the exiting schedules cannot meet the scene requirement, you can click
to add a new schedule. For details, see "6.5.1.2.1 Adding Schedule".
Step 3 Click
Apply
.

6.5.4 Setting Audio Detection

The system performs alarm linkage when vague voice, tone change, or rapid change of sound
intensity is detected.
Add Schedule
Procedure
Step 1 Select >
Event
>
Video Detection
>
Audio Detection
72
.
Page 86
Figure 6-66 Audio detection
Operation Manual
Step 2 Set parameters.
Step 3 Select the schedule and arming periods and alarm linkage action. For details, see "6.5.1.2
Alarm Linkage".
If the exiting schedules cannot meet the scene requirement, you can click
to add a new schedule. For details, see "6.5.1.2.1 Adding Schedule".
Step 4 Click

6.6 Storage

Input abnormal: Click next to
Audio Abnormal
, and the alarm is triggered when
the system detects abnormal sound input.
Intensity change: Click next to
Threshold
. The alarm is triggered when the system detects that the sound intensity
Intensity Change
, and then set
Sensitivity
exceeds the configured threshold.
It is easier to trigger the alarm with higher sensitivity or smaller threshold. Set a high
threshold for noisy environment.
The red line in the waveform indicates audio detection is triggered, and the green
one indicates no audio detection. Adjust sensitivity and threshold according to the
waveform.
Add Schedule
.
Apply
and
Displays the information of the local SD card. You can set it as read only or read & write; you can also
73
Page 87
Operation Manual
hot swap and format SD card.
Functions might vary with different models.
Select >
Click
Click
Click
Click
Read-Only
Read & Write
Hot Swap
Format
Storage
.
, and then the SD card is set to read only.
, and then the SD card is set to read & write.
, and then you can pull out the SD card.
, and you can format the SD card.
When reading SD card on PC, if the SD card capacity is much less than the nominal capacity, you
need to format the SD card. Then the data in SD card will be cleared, and the SD card is formatted
to be private file system. The private file system can greatly improve SD card multimedia file
read/write performance. Download Diskmanager from Toolbox to read the SD card. For details,
contact after-sales technicians.
Figure 6-67 Local

6.7 System

This section introduces system configurations, including general, date & time, account, safety, PTZ
settings, default, import/export, remote, auto maintain and upgrade.

6.7.1 General

6.7.1.1 Basic
You can configure device name, language and video standard.
Procedure
Step 1 Select >
System
>
General
>
Figure 6-68 Basic
Basic
.
Step 2 Configure general parameters.
74
Page 88
Table 6-26 Description of general parameters
Parameter Description
Name Enter the device name.
Operation Manual
Video Standard Select video standard from
Step 3 Click
Apply
6.7.1.2 Date & Time
You can configure date and time format, time zone, current time, DST (Daylight Saving Time) or NTP
server.
Procedure
Step 1 Select >
.
System
>
General
Figure 6-69 Date and time
>
Date & Time
and
PAL
.
NTSC
.
Step 2 Configure date and time parameters.
Table 6-27 Description of date and time parameters
Parameter Description
Date Format Configure the date format.
75
Page 89
Parameter Description
Manually Setting
: When selecting NTP, the system then syncs time with the
NTP
Time
internet server in real time.
You can also enter the IP address, time zone, port, and interval of a
PC which installed NTP server to use NTP.
Operation Manual
: Configure the parameters manually.
Time Format Configure the time format. You can select from
Time Zone Configure the time zone that the camera is at.
Current Time
DST
Step 3 Click

6.7.2 Account

You can manage users, such as add, delete, or edit them. Users include admin, added users and
ONVIF users.
Managing users and groups are only available for administrator users.
The max length of the user or group name is 31 characters which consists of number, letter,
underline, dash, dot and @.
The password must consist of 8 to 32 non-blank characters and contain at least two types of
characters among upper case, lower case, number, and special character (excluding ' " ; : &).
You can have 18 users and 8 groups at most.
You can manage users through single user or group, and duplicate usernames or group names
are not allowed. A user can only be in one group at a time, and the group users can own
authorities within group authority range.
Online users cannot edit their own authority.
There is one admin by default which has highest authority.
Select
Anonymous Login
password. Anonymous users only have preview authorities. During anonymous login, click
Logout
, and then you can log in with other username.
Apply
12-Hour
Configure system time.
Click
Sync PC
Enable DST as needed.
Click , and configure start time and end time of DST with
.
Week
.
, and then log in with only IP address instead of username and
, and the system time changes to the PC time.
or
24-Hour
Date
.
or
6.7.2.1 User
6.7.2.1.1 Adding User
You are admin user by default. You can add users, and configure different permissions.
Procedure
Step 1 Select >
System
>
Account
>
User
76
.
Page 90
Figure 6-70 User
Operation Manual
Step 2 Click
Add
.
Figure 6-71 Add user (system)
77
Page 91
Figure 6-72 Add user (restricted login)
Operation Manual
Step 3 Configure user parameters.
Table 6-28 Description of user parameters
Parameter Description
Username User’s unique identification. You cannot use existed username.
Password Enter password and confirm it again.
The password must consist of 8 to 32 non-blank characters and
Confirm Password
Group The group that users belong to. Each group has different authorities.
Remark Describe the user.
System
Live Select the live view authority for the user to be added.
Search Select the search authority for the user to be added.
contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &).
Select authorities as needed.
We recommend giving fewer permissions to normal users than
premium users.
78
Page 92
Parameter Description
Restricted Login
Step 4 Click
The newly added user is displayed in the username list.
Related Operations
click to edit password, group, memo or authorities.
Apply
Operation Manual
Set the PC address that allows the defined user to log in to the camera and the validity period and time range. You can log in to the web page with the defined IP in the defined time range of validity period.
IP address: You can log in to web through the PC with the set IP.
Validity period: You can log in to web in the set validity period.
Time range: You can log in to web in the set time range.
Set as follows
1. IP address: Enter the IP address of the host to be added.
2. IP segment: Enter the start address and end address of the host
to be added.
.
For admin account, you can only edit the password.
Click to delete the added users. Admin user cannot be deleted.
The admin account cannot be deleted.
6.7.2.1.2 Resetting Password
Enable the function, and you can reset password by clicking
For details, see "4.2 Resetting Password".
Procedure
Step 1 Select >
System
>
Account
>
Figure 6-73 User
User
.
Forget password?
on the login page.
79
Page 93
Operation Manual
Step 2 Click next to
If the function is not enabled, you can only reset the password by resetting the camera.
Step 3 Enter the reserved email address.
Step 4 Click
Apply
.
6.7.2.2 Adding User Group
You have two groups named admin and user by default, and you can add new group, delete added
group or edit group authority and memo.
Procedure
Step 1 Select >
System
Enable
>
in
Password Reset
Account
Figure 6-74 Group name
>
Group
.
.
Step 2 Click
Step 3 Enter the group name and memo, and then select group authorities.
Step 4 Click OK to finish configuration.
The newly added group displays in the group name list.
Add
.
Figure 6-75 Add group
Related Operations
Click to edit password, group, memo or authorities.
Click to delete the added users. Admin user cannot be deleted.
80
Page 94
The admin group and user group cannot be deleted.
6.7.2.3 ONVIF User
You can add, delete ONVIF user, and change their passwords.
Procedure
Step 1 Select >
System
>
Account
Figure 6-76 ONVIF user
>
ONVIF User
Operation Manual
.
Step 2 Click
Step 3 Configure user parameters.
Parameter Description
Username User’s unique identification. You cannot use existed username.
Password Enter password and confirm it again.
Confirm Password
Add
.
Figure 6-77 Add ONVIF user
Table 6-29 Description of ONVIF user parameters
The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' " ; : &).
Group Name
Step 4 Click OK.
The newly added user displays in the username list.
Related Operations
Click to edit password, group, memo or authorities.
The group that users belong to. Each group has different authorities.
81
Page 95
For admin account, you can only change the password.
Click to delete the added users.
The admin account cannot be deleted.

6.7.3 Peripheral Management

6.7.3.1 Configuring Serial Port
Set the serial port of the external device.
Procedure
Step 1 Select >
Step 2 Configure parameters.
System
>
Peripheral
Figure 6-78 Serial port settings
>
Serial Port
Operation Manual
.
Table 6-30 Description of serial port settings parameters
Parameter Description
Enter the corresponding device address. It is 1 by default.
IP Address
Baud Rate
Data Bits It is 8 by default.
Stop Bits
Make sure that the address is the same as the device address; otherwise you
cannot control the device.
Configure device baud rate. It is
It is 1 by default.
9600
by default.
Parity
Step 3 Click
Apply
It is
.
None
by default.
82
Page 96
6.7.3.2 Configuring External Light
You need to configure external light mode when the external light is used.
Prerequisites
Connect external light with RS-485 port.
You have configured serial port parameters. For details, see "6.7.3.1 Configuring Serial Port".
Procedure
Step 1 >
Step 2 Select working mode as needed.
System
>
Peripheral
>
Figure 6-79 External light
External Light
Operation Manual
.
Table 6-31 Lamp parameters
Parameter Description
: The external light is disabled.
Off
Work Mode
Auto Mode
Light Brightness
Manual
Set the brightness of the external light.
: The camera turns on or turns off the light according to the light
Auto
time and photoresister automatically.
: When selecting
Time
During the arming period, the external light is on.
Select the added time plan table in the
Schedule
Linkage".
Photoresister
camera turns on the external light according to the brightness automatically.
For some models, you can set the brightness of each external light
separately.
: Set the light brightness manually.
in
Time
to add new time plan table. For details, see "6.5.1.2 Alarm
: When you select
Auto Mode
Photoresister
, set the arming period.
Time Plan
list. Click
in
Auto Mode
Add
, the
Step 3 Click
Apply
.
83
Page 97
6.7.3.3 Configuring Wiper
Procedure
Step 1
Step 2 Configure working mode of wipers.
Select
> >
System
>
Peripheral
Figure 6-80 Wiper
>
Wiper
Operation Manual
.
Parameter Description
Interval
Start, Stop, Once
Wash
Step 3 Click
Apply

6.7.4 Manager

6.7.4.1 Requirements
To make sure the system runs normally, maintain it as the following requirements:
Check surveillance images regularly.
Clear regularly user and user group information that are not frequently used.
Change the password every three months. For details, see "6.7.2 Account".
View system logs and analyze them, and process the abnormity in time.
Back up the system configuration regularly.
Restart the device and delete the old files regularly.
Upgrade firmware in time.
Table 6-32 Wiper parameter description
The interval between stop mode and start mode. For example, set the time to 10 s, and the wiper will work every 10 s.
Configure working mode of the wiper.
Click
Click
Click
Select the work as the configured time. Click be used to check whether the wiper works normally.
.
, and the wiper works as the set interval time.
Start
, and the wiper stops working.
Stop
, and the wiper works once.
Once
Schedule
check box and set the time, and then the wiper will
, and the wiper works once. It can
Once
84
Page 98
6.7.4.2 Maintenance
You can restart the system manually, and set the time of auto reboot and auto deleting old files. This
function is disabled by default.
Procedure
Step 1 Select >
System
>
Manager
Figure 6-81 Maintenance
>
Maintenance
Operation Manual
.
Step 2 Configure auto maintain parameters.
Click next to
system will automatically restarts at the set time every week.
Click next to
will automatically deletes old files at the set time. The time range is 1 to 31 days.
When you enable and confirm the
restored. Operate it carefully.
Step 3 Click
Apply
6.7.4.3 Import/Export
Export the system configuration file to back up the system configuration.
Import system configuration file to make quick configuration or recover system configuration.
Procedure
Step 1 Select >
.
System
Auto Reboot
Auto Delete
>
Manager
in
Restart System
in
Delete Old Files
Auto Delete
>
Import/Export
, and set the reboot time, then the
, and set the time, then the system
function, the deleted files cannot be
.
85
Page 99
Step 2 Import or export the file.
6.7.4.4 Default
Figure 6-82 Import/Export
Import: Select local configuration file, and click
configuration file to the system.
Export: Click
storage.
Export Configuration file
to export the system configuration file to local
Import File
Operation Manual
to import the local system
Restore the device to default configuration or factory settings.
Select >
Click
Click
Default
Factory Default
System
>
Manager
, and then all the configurations except IP address and account are reset to default.
, and all the configurations are reset to factory settings.
>
Default
Figure 6-83 Default
.

6.7.5 Upgrade

Upgrading to the latest system can refine camera functions and improve stability.
If wrong upgrade file has been used, restart the device; otherwise some functions might not work
properly.
86
Page 100
Procedure
Step 1 Select >
System
>
Upgrade
.
Figure 6-84 Upgrade
Operation Manual
Step 2 Click
The upgrade file should be a .bin file.
Step 3 Click
Browse
Update
, and then upload upgrade file.
.

6.8 System Information

You can view the information, including version, log and online user, and back up or clear log.

6.8.1 Version

Select >
and web version.
System Info

6.8.2 Online User

Select >
System Info
>
Version
>
Online User
to view device information such as hardware, system version,
to view all the online users logging in to web.

6.9 Setting Log

6.9.1 Log

You can view and back up logs.
Procedure
Step 1 Select >
Step 2 Configure
The start time should be later than January 1, 2000, and the end time should be earlier
than December 31, 2037.
The log type includes All, System, Setting, Data, Event, Record, Account, and Security.
System
closedown, device reboot, system reboot, and system upgrade.
Setting
Data
>
Log
.
and
End Time
, and then select the log type.
Log
Start Time
: Includes program start, abnormal close, close, program reboot, device
: Includes saving configuration and deleting configuration file.
: Includes configuring disk type, clearing data, hot swap, FTP state, and record
87
Loading...