Hikvision DS-2CD63C5G0E-IVS User Manual

Network Fisheye Camera
User Manual
User Manual of Network Fisheye Camera
1
User Manual
COPYRIGHT ©2019 Hangzhou Hikvision Digital Technology Co., Ltd.
ALL RIGHTS RESERVED.
Any and all information, including, among others, wordings, pictures, graphs are the properties of Hangzhou Hikvision Digital Technology Co., Ltd. or its subsidiaries
(hereinafter referred to be “Hikvision”). This user manual (hereinafter referred to be
“the Manual”) cannot be reproduced, changed, translated, or distributed, partially or
wholly, by any means, without the prior written permission of Hikvision. Unless otherwise stipulated, Hikvision does not make any warranties, guarantees or representations, express or implied, regarding to the Manual.
About this Manual
This Manual is applicable to Network Fisheye Camera. The Manual includes instructions for using and managing the product. Pictures, charts, images and all other information hereinafter are for description and explanation only. The information contained in the Manual is subject to change, without notice, due to firmware updates or other reasons. Please find the latest version in the company website (http://overseas.hikvision.com/en/). Please use this user manual under the guidance of professionals.
Trademarks Acknowledgement
and other Hikvision’s trademarks and logos are the properties of
Hikvision in various jurisdictions. Other trademarks and logos mentioned below are the properties of their respective owners.
Legal Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND
FIRMWARE, IS PROVIDED “AS IS”, WITH ALL FAULTS AND ERRORS, AND
HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY,
User Manual of Network Fisheye Camera
2
FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES. IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
User Manual of Network Fisheye Camera
3
residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected. Consult the dealer or an experienced radio/TV technician for help
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are marked with "CE" and comply therefore with the applicable harmonized European standards listed under the EMC Directive
2014/30/EU, the RoHS Directive 2011/65/EU.
2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see:
www.recyclethis.info.
User Manual of Network Fisheye Camera
4
2006/66/EC (battery directive): This product contains a battery that cannot be disposed of as unsorted municipal waste in the European Union. See the product documentation for specific battery information. The battery is marked with this symbol, which may
include lettering to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see: www.recyclethis.info. Industry Canada ICES-003 Compliance This device meets the CAN ICES-3 (B)/NMB-3(B) standards requirements.
Safety Instruction
These instructions are intended to ensure that the user can use the product correctly to avoid danger or property loss.
The precaution measure is divided into ‘Warnings’ and ‘Cautions’: Warnings: Serious injury or death may be caused if any of these warnings are
neglected.
Cautions: Injury or equipment damage may be caused if any of these cautions are
neglected.
Warnings Follow these safeguards to prevent serious injury or death.
Cautions Follow these precautions to prevent potential injury or material damage.
Warnings:
Please adopt the power adapter which can meet the safety extra low voltage
(SELV) standard. And source with 12 VDC or 24 VAC (depending on models) according to the IEC60950-1 and Limited Power Source standard.
To reduce the risk of fire or electrical shock, do not expose this product to rain or
moisture.
This installation should be made by a qualified service person and should conform
User Manual of Network Fisheye Camera
5
to all the local codes.
Please install blackouts equipment into the power supply circuit for convenient
supply interruption.
Please make sure that the ceiling can support more than 50(N) Newton gravities if
the camera is fixed to the ceiling.
If the product does not work properly, please contact your dealer or the nearest
service center. Never attempt to disassemble the camera yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)
Cautions:
Make sure the power supply voltage is correct before using the camera. Do not drop the camera or subject it to physical shock. Do not touch sensor modules with fingers. If cleaning is necessary, use a clean
cloth with a bit of ethanol and wipe it gently. If the camera will not be used for an extended period of time, put on the lens cap to protect the sensor from dirt.
Do not aim the camera lens at the strong light such as sun or incandescent lamp.
The strong light can cause fatal damage to the camera.
The sensor may be burned out by a laser beam, so when any laser equipment is
being used, make sure that the surface of the sensor not be exposed to the laser beam.
Do not place the camera in extremely hot, cold temperatures (the operating
temperature should be between -30°C ~ 60°C, or -40°C ~ 60°C if the camera model has an “H” in its suffix), dusty or damp environment, and do not expose it to high electromagnetic radiation.
To avoid heat accumulation, good ventilation is required for a proper operating
environment.
Keep the camera away from water and any liquid. While shipping, the camera should be packed in its original packing.
User Manual of Network Fisheye Camera
6
Improper use or replacement of the battery may result in hazard of explosion.
Please use the manufacturer recommended battery type.
Notes:
For the camera supports IR, you are required to pay attention to the following precautions to prevent IR reflection: Dust or grease on the dome cover will cause IR reflection. Please do not remove
the dome cover film until the installation is finished. If there is dust or grease on the dome cover, clean the dome cover with clean soft cloth and isopropyl alcohol.
Make certain the installation location does not have reflective surfaces of objects
too close to the camera. The IR light from the camera may reflect back into the lens causing reflection.
The foam ring around the lens must be seated flush against the inner surface of
the bubble to isolate the lens from the IR LEDS. Fasten the dome cover to camera body so that the foam ring and the dome cover are attached seamlessly.
User Manual of Network Fisheye Camera
7
Table of Contents
Chapter 1 System Requirement ................................................................................ 1
Chapter 2 Network Connection ................................................................................ 2
2.1 Setting the Network Camera over the LAN ........................................................ 2
2.1.1 Wiring over the LAN ......................................................................................................... 2
2.1.2 Activating the Camera ...................................................................................................... 3
2.2 Setting the Network Camera over the WAN ...................................................... 9
2.2.1 Static IP Connection .......................................................................................................... 9
2.2.2 Dynamic IP Connection ................................................................................................... 10
Chapter 3 Access to the Network Camera ............................................................. 13
3.1 Accessing by Web Browsers ............................................................................ 13
3.2 Accessing by Client Software .......................................................................... 14
Chapter 4 Live View ................................................................................................ 16
4.1 Live View Page ............................................................................................... 16
4.2 Starting Live View .......................................................................................... 20
4.3 Recording and Capturing Pictures Manually .................................................... 22
4.4 Operating PTZ Control .................................................................................... 22
4.4.1 PTZ Control Panel ............................................................................................................ 23
4.4.2 Setting/Calling/Deleting a Preset ................................................................................... 25
4.4.3 Setting/Calling/Deleting a Patrol .................................................................................... 26
Chapter 5 Network Camera Configuration ........................................................... 28
5.1 Configuring Local Parameters ......................................................................... 28
5.2 Configure System Settings .............................................................................. 30
5.2.1 Configuring Basic Information ........................................................................................ 30
5.2.2 Configuring Time Settings ............................................................................................... 30
5.2.3 Configuring RS232 Settings ............................................................................................. 32
5.2.4 Configuring RS485 Settings ............................................................................................. 33
5.2.5 Configuring DST Settings ................................................................................................. 34
5.2.6 Configuring Metadata Settings ....................................................................................... 35
5.2.7 Open Source Software License ....................................................................................... 36
5.3 Maintenance ................................................................................................. 36
5.3.1 Upgrade & Maintenance ................................................................................................. 36
5.3.2 Log .................................................................................................................................. 37
5.4 Security Settings ............................................................................................ 38
5.4.1 Authentication ................................................................................................................ 39
5.4.2 IP Address Filter .............................................................................................................. 39
5.4.3 Security Service............................................................................................................... 41
User Manual of Network Fisheye Camera
8
5.5 User Management ......................................................................................... 42
5.5.1 User Management .......................................................................................................... 42
5.5.2 Online Users .................................................................................................................... 44
Chapter 6 Network Settings .................................................................................... 45
6.1 Configuring Basic Settings .............................................................................. 45
6.1.1 Configuring TCP/IP Settings ............................................................................................ 45
6.1.2 Configuring DDNS Settings .............................................................................................. 47
6.1.3 Configuring PPPoE Settings ............................................................................................. 49
6.1.4 Configuring Port Settings ................................................................................................ 50
6.1.5 Configure NAT (Network Address Translation) Settings .................................................. 51
6.2 Configure Advanced Settings .......................................................................... 52
6.2.1 Configuring SNMP Settings ............................................................................................. 52
6.2.2 Configuring FTP Settings ................................................................................................. 55
6.2.3 Configuring Email Settings .............................................................................................. 57
6.2.4 Platform Access ............................................................................................................... 59
6.2.5 HTTPS Settings ................................................................................................................ 60
6.2.6 Configuring QoS Settings ................................................................................................ 63
6.2.7 Configuring 802.1X Settings ............................................................................................ 64
6.2.8 Integration Protocol ........................................................................................................ 65
6.2.9 Configuring HTTP Listening ............................................................................................. 66
Chapter 7 Video/Audio Settings ............................................................................. 67
7.1 Configuring Video Settings ............................................................................. 67
7.2 Configuring Audio Settings ............................................................................. 70
7.3 Configuring ROI Encoding ............................................................................... 71
7.4 Display Info. on Stream .................................................................................. 73
Chapter 8 Configuring Image Parameters ............................................................ 74
8.1 Configuring Display Settings ........................................................................... 74
8.2 Configuring OSD Settings ................................................................................ 78
8.3 Configuring Privacy Mask ............................................................................... 79
8.4 Picture Overlay .............................................................................................. 80
Chapter 9 Configuring Event Settings ................................................................... 82
9.1 Configuring Motion Detection ........................................................................ 82
9.2 Configuring Video Tampering Alarm ............................................................... 88
9.3 Configuring Alarm Input ................................................................................. 89
9.4 Configuring Alarm Output .............................................................................. 90
9.5 Handling Exception ........................................................................................ 92
User Manual of Network Fisheye Camera
9
9.6 Configuring Audio Exception Detection ........................................................... 92
9.7 Configuring Intrusion Detection ...................................................................... 94
9.8 Configuring Line Crossing Detection ................................................................ 96
9.9 Configuring Region Entrance Detection ........................................................... 98
9.10 Configuring Region Exiting Detection ............................................................ 100
9.11 Configuring Unattended Baggage Detection .................................................. 102
9.12 Configuring Object Removal Detection ......................................................... 104
Chapter 10 Storage Settings .................................................................................... 107
10.1 Configuring Recording Schedule ................................................................... 107
10.2 Configuring Capture Setting .......................................................................... 111
10.3 Configuring Net HDD .................................................................................... 112
Chapter 11 People Counting ................................................................................... 115
11.1 Rule Settings ................................................................................................ 115
11.1.1 Rule ............................................................................................................................... 115
11.1.2 Arming Schedule ........................................................................................................... 116
11.1.3 Linkage Method ............................................................................................................ 116
11.2 Data Uploading Setting ................................................................................. 117
11.3 Advanced Settings ........................................................................................ 117
Chapter 12 Heat Map .............................................................................................. 119
Chapter 13 Intersection Analysis ............................................................................ 121
Chapter 14 Playback ................................................................................................ 122
Chapter 15 Picture ................................................................................................... 125
Chapter 16 Application ........................................................................................... 126
16.1 People Counting Statistics ............................................................................ 126
16.2 Heat Map Statistics ...................................................................................... 127
16.3 Intersection Analysis Statistics ...................................................................... 129
Appendix ............................................................................................................... 130
Appendix 1 SADP Software Introduction ............................................................... 130
Appendix 2 Port Mapping ...................................................................................... 132
User Manual of Network Fisheye Camera
1

Chapter 1 System Requirement

Operating System: Microsoft Windows XP SP1 and above version CPU: 2.0 GHz or higher RAM: 1G or higher Display: 1024×768 resolution or higher Web Browser: Internet Explorer 8.0 and above version, Apple Safari 5.0.2 and above
version, Mozilla Firefox 5.0 and above version and Google Chrome 18 and above version
User Manual of Network Fisheye Camera
2

Chapter 2 Network Connection

Note:
You shall acknowledge that the use of the product with Internet access might be
under network security risks. For avoidance of any network attacks and information leakage, please strengthen your own protection. If the product does not work properly, please contact with your dealer or the nearest service center.
To ensure the network security of the network camera, we recommend you to
have the network camera assessed and maintained termly. You can contact us if you need such service.
Before you start:
If you want to set the network camera via a LAN (Local Area Network), please
refer to Section 2.1 Setting the Network Camera over the LAN.
If you want to set the network camera via a WAN (Wide Area Network), please
refer to Section 2.2 Setting the Network Camera over the WAN.

2.1 Setting the Network Camera over the LAN

Purpose:
To view and configure the camera via a LAN, you need to connect the network camera in the same subnet with your computer, and install the SADP or iVMS-4200 software to search and change the IP of the network camera.
Note: For the detailed introduction of SADP, please refer to Appendix 1.

2.1.1 Wiring over the LAN

The following figures show the two ways of cable connection of a network camera and a computer:
Purpose:
To test the network camera, you can directly connect the network camera to the
computer with a network cable as shown in Figure 2-1.
User Manual of Network Fisheye Camera
3
Refer to the Figure 2-2 to set network camera over the LAN via a switch or a
router.
Figure 2-1 Connecting Directly
Figure 2-2 Connecting via a Switch or a Router

2.1.2 Activating the Camera

You are required to activate the camera first by setting a strong password for it before you can use the camera. Activation via Web Browser, Activation via SADP, and Activation via Client Software are all supported.
Activation via Web Browser
Steps:
1. Power on the camera, and connect the camera to the network.
2. Input the IP address into the address bar of the web browser, and click Enter to enter the activation interface.
Notes:
The default IP address of the camera is 192.168.1.64. The computer and the camera should belong to the same subnet.
For the camera enables the DHCP by default, you need to use the SADP software to search the IP address.
User Manual of Network Fisheye Camera
4
Figure 2-3 Activation via Web Browser
3. Create a password and input the password into the password field.
A password with user name in it is not allowed.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
4. Confirm the password.
5. Click OK to save the password and enter the live view interface.
Activation via SADP Software
SADP software is used for detecting the online device, activating the camera, and resetting the password. Get the SADP software from the supplied disk or the official website, and install the SADP according to the prompts. Follow the steps to activate the camera. Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select the inactive device.
User Manual of Network Fisheye Camera
5
Select inactive device.
Input and confirm password.
Figure 2-4 SADP Interface
Note:
The SADP software supports activating the camera in batch. Refer to the user manual of SADP software for details.
3. Create a password and input the password in the password field, and confirm the
password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Note:
You can enable the Hik-Connect service for the device during activation.
4. Click Activate to start activation. You can check whether the activation is completed on the popup window. If activation
failed, please make sure that the password meets the requirement and try again.
User Manual of Network Fisheye Camera
6
5. Change the device IP address to the same subnet with your computer by either
modifying the IP address manually or checking the checkbox of Enable DHCP.
Figure 2-5 Modify the IP Address
6. Input the admin password and click Modify to activate your IP address
modification.
The batch IP address modification is supported by the SADP. Refer to the user manual of SADP for details.
Activation via Client Software
The client software is versatile video management software for multiple kinds of devices. Get the client software from the supplied disk or the official website, and install the software according to the prompts. Follow the steps to activate the camera.
Steps:
1. Run the client software and the control panel of the software pops up, as shown in
the figure below.
User Manual of Network Fisheye Camera
7
Figure 2-6 Control Panel
2. Click the Device Management icon to enter the Device Management interface, as
shown in the figure below.
Figure 2-7 Device Management Interface
User Manual of Network Fisheye Camera
8
3. Check the device status from the device list, and select an inactive device.
4. Click the Activate button to pop up the Activation interface.
5. Create a password and input the password in the password field, and confirm the
password.
STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. We recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Figure 2-8 Activation Interface (Client Software)
6. Click OK button to start activation.
7. Click the Modify Netinfo button to pop up the Network Parameter Modification
interface, as shown in the figure below.
User Manual of Network Fisheye Camera
9
Figure 2-9 Modifying the Network Parameters
8. Change the device IP address to the same subnet with your computer by either
modifying the IP address manually or checking the checkbox of Enable DHCP.
9. Input the password to activate your IP address modification.

2.2 Setting the Network Camera over the WAN

Purpose:
This section explains how to connect the network camera to the WAN with a static IP or a dynamic IP.

2.2.1 Static IP Connection

Before you start:
Please apply a static IP from an ISP (Internet Service Provider). With the static IP address, you can connect the network camera via a router or connect it to the WAN directly.
Connecting the network camera via a router
Steps:
1. Connect the network camera to the router.
User Manual of Network Fisheye Camera
10
2. Assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2
for detailed IP address configuration of the network camera.
3. Save the static IP in the router.
4. Set port mapping, e.g., 80, 8000, and 554 ports. The steps for port mapping vary
according to the different routers. Please call the router manufacturer for assistance with port mapping.
Note: Refer to Appendix 2 for detailed information about port mapping.
5. Visit the network camera through a web browser or the client software over the
internet.
Figure 2-10 Accessing the Camera through Router with Static IP
Connecting the network camera with static IP directly
You can also save the static IP in the camera and directly connect it to the internet without using a router. Refer to Section 2.1.2 for detailed IP address configuration of the network camera.
Figure 2-11 Accessing the Camera with Static IP Directly

2.2.2 Dynamic IP Connection

Before you start:
Please apply a dynamic IP from an ISP. With the dynamic IP address, you can connect the network camera to a modem or a router.
Connecting the network camera via a router
Steps:
User Manual of Network Fisheye Camera
11
1. Connect the network camera to the router.
2. In the camera, assign a LAN IP address, the subnet mask and the gateway. Refer
to Section 2.1.2 for detailed IP address configuration of the network camera.
3. In the router, set the PPPoE user name, password and confirm the password.
4. Set port mapping. E.g. 80, 8000, and 554 ports. The steps for port mapping vary
depending on different routers. Please call the router manufacturer for assistance with port mapping.
Note: Refer to Appendix 2 for detailed information about port mapping.
5. Apply a domain name from a domain name provider.
6. Configure the DDNS settings in the setting interface of the router.
7. Visit the camera via the applied domain name.
Connecting the network camera via a modem
Purpose:
This camera supports the PPPoE auto dial-up function. The camera gets a public IP address by ADSL dial-up after the camera is connected to a modem. You need to configure the PPPoE parameters of the network camera. Refer to Section 5.3.3 Configuring PPPoE Settings for detailed configuration.
Figure 2-12 Accessing the Camera with Dynamic IP
Note: The obtained IP address is dynamically assigned via PPPoE, so the IP address
always changes after rebooting the camera. To solve the inconvenience of the dynamic IP, you need to get a domain name from the DDNS provider (E.g. DynDns.com). Please follow the steps below for normal domain name resolution and private domain name resolution to solve the problem. Normal Domain Name Resolution
User Manual of Network Fisheye Camera
12
Figure 2-13 Normal Domain Name Resolution
Steps:
1. Apply a domain name from a domain name provider.
2. Configure the DDNS settings in the DDNS Settings interface of the network
camera. Refer to Section 5.3.4 Configuring DDNS Settings for detailed configuration.
3. Visit the camera via the applied domain name.
User Manual of Network Fisheye Camera
13
Chapter 3 Access to the Network
Camera

3.1 Accessing by Web Browsers

Note:
For certain camera models, HTTPS is enabled by default and the camera creates an unsigned certificate automatically. When you access to the camera the first time, the web browser prompts a notification about the certificate issue. To cancel the notification, install a signed-certificate to the camera. For detailed operation, see 6.2.5 HTTPS Settings.
Steps:
1. Open the web browser.
2. In the browser address bar, input the IP address of the network camera, and press
the Enter key to enter the login interface.
Note:
The default IP address is 192.168.1.64. You are recommended to change the IP address to the same subnet with your computer.
3. Input the user name and password and click Login.
The admin user should configure the device accounts and user/operator permissions properly. Delete the unnecessary accounts and user/operator permissions.
Note:
The IP address gets locked if the admin user performs 7 failed password attempts (5 attempts for the user/operator).
Figure 3-1 Login Interface
User Manual of Network Fisheye Camera
14
4. Click Login.
5. (Optional) Install the plug-in before viewing the live video and operating the
camera. Follow the installation prompts to install the plug-in.
Note: For camera that supports plug-in free live view, if you are using Google Chrome 45 and its above version or Mozilla Firefox 52 and its above version, plug-in installation is not required. But Picture and Playback functions are hidden. To use mentioned function via web browser, change to their lower version, or change to Internet Explorer 8.0 and above version.

3.2 Accessing by Client Software

The product CD contains the iVMS-4200 client software. You can view the live video and manage the camera with the software. Follow the installation prompts to install the software. The control panel interface of iVMS-4200 client software is shown as bellow.
Figure 3-2 iVMS-4200 Client Software
User Manual of Network Fisheye Camera
15
Figure 3-3 iVMS-4200 Main View
Note: For detailed information about the software, please refer to the user manual of
the iVMS-4200 Client Software.
User Manual of Network Fisheye Camera
16

Chapter 4 Live View

4.1 Live View Page

Purpose:
The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters. Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page.
Note:
You can also visit the fisheye camera to get the live view in different live view modes via iVMS-4200 client software. Please refer to the User Manual of iVMS-4200 Client Software for detailed instructions.
Introduction:
The Live View Page is mainly composed of three parts, the display control area on the left, the live view screen in the middle and a PTZ panel which can be shown or hidden on the right.
Descriptions of the live view page:
Live View
Window
Display
Control
Preset/Patrol
Setting
Tool Bar
Menu Bar
PTZ
Control
Figure 4-1 Live View Page (Software Decoding)
User Manual of Network Fisheye Camera
17
Live View
Window
Display
Control
Preset/Patrol
Setting
Tool Bar
Menu Bar
PTZ
Control
Figure 4-2 Live View Page (Hardware Decoding)
Menu Bar: Click the tab to enter Live View, Playback, Picture, Application and Configuration page respectively.
Display Control:
The display control area allows you to select decoding mode, mount type and display mode of live view. Software decoding and hardware decoding are selectable for decoding mode. On the software tab, mount type and display mode are configurable. While on the hardware tab, besides the mount type and display mode, stream type of each camera channel is also configurable.
Decoding Mode
Software decoding means the obtained live view video is decoded by using the CPU of your PC that is running the web browser. The live view performance depends on the decoding ability of your PC. Hardware decoding means the obtained live view video is decoded by the camera itself.
Mount Type
Select ceiling mounting, wall mounting and table mounting according to the actual mount type you adopted for your camera.
User Manual of Network Fisheye Camera
18
Table 4-1 Description of Mount Types
Mount Type Icon
Description
Ceiling mounting.
Wall mounting.
Table mounting.
Display Mode
You can select a display mode for the layout of the live view window. The description of each display mode is shown in the following table. Fisheye View: In the Fisheye View mode, the whole wide-angle view of the
fisheye camera is displayed. This view mode is called Fisheye View because
it approximates the vision of a fish’s convex eye. The lens produces
curvilinear images of a large area, while distorting the perspective and angles of objects in the image.
Panorama View: In the Panorama View mode, the round fisheye image is
transformed to rectangular image by some calibration methods.
PTZ View: The PTZ View is the close-up view of some defined area in the
Fisheye View or Panorama View.
Note: Each PTZ View is marked on the Fisheye View and Panorama View with a
specifically colored region under software decoding mode, and with a specific navigation box under hardware decoding mode.
Table 4-2 Description of Display Modes
Mode
Description
Mode
Description
Fisheye view.
180 degrees panorama view.
360 degrees panorama view.
Live view with a 360 degrees panorama view and a PTZ view.
Live view with a 360 degrees panorama view and 3 PTZ views.
Live view with a 360 degrees panorama view and 6 PTZ views.
Live view with a 360 degrees panorama view and 8 PTZ views.
Live view with 2 PTZ views.
User Manual of Network Fisheye Camera
19
Mode
Description
Mode
Description
Live view with into 4 PTZ views.
Live view with 1 fisheye view and 3 PTZ views.
Live view with 1 fisheye view and 8 PTZ views.
Panorama view.
Live view with a panorama view and 3 PTZ views.
Live view with a panorama view and 3 PTZ views.
Live view with a fisheye view, a panorama view and 3 PTZ views.
Live view with a hemisphere view
Live view with a AR hemisphere view
Live view with a cylinder view
Live view with a 4 PTZ fusion view
Note:
Available display modes vary according to decoding modes and camera
models.
When you change display mode on hardware tab, a reboot is required to for
the display mode switch to take effect.
When you display hardware-decoded live view under the display mode of
360 panorama view or 4 PTZ, you cannot switch the decoding mode directly from hardware to software. Switch to the other display mode first.
Stream Type Setting (Hardware Decoding Only):
Steam type switch for camera channels is only supported when the live view video is
decoded by hardware. You can set stream type as main stream or sub stream . The default stream type for every channel is main stream.
Table 4-3 Selectable Stream Types for Camera Channels
Display Mode
Channel No.
Selectable Stream Type
/
Camera 01
Main stream/Sub stream
Camera 01/02/03/04
Main Stream
Camera 01
Main stream/Sub stream
Camera 02/03/04
Main Stream
Camera 01/02/03/04/05
Main stream
User Manual of Network Fisheye Camera
20
Note: Selectable stream types may be different between camera channels under
different display modes. Detailed information is shown in the following table.
Live View Window: Display the live video on the display window of live view. Toolbar:
Start/Stop the live view, enable/disable the two-way audio, adjust the audio volume, capture pictures, record the video files, etc.
Note: Icons on tool bar are different under different decoding mode. Refer to Table
4-4 for detailed description. PTZ Control:
Realize the pan/tilt/zoom function of PTZ view via the navigation box, and set the PTZ moving speed.
Preset/Patrol Settings:
Set and call the preset/patrol for the camera.

4.2 Starting Live View

Starting live view under decoding modes of software and hardware is a bit different.
Software Decoding Mode:
You can click the icon / on the toolbar to start/stop all live view of the camera. Hardware Decoding Mode:
Under hardware decoding mode, live video will be automatically displayed when you click Live View on menu bar, click Hardware in display control area, change mount type or display mode.
Loading...
+ 114 hidden pages