Next Level Security Systems NLSS Unified Security Suite User Manual

Page 1
NLSS Unified Security Suite
User Manual
v4.0
© 2009-2014 by Next Level Security Systems, Inc.
All rights reserved.
2.00-UM-20140804
Page 2
Next Level Security Systems® is a registered trademark of Next Level Security Systems, Inc. NextConnect™ is a
with all rights reserved, or is the property of Next Level Security Systems and/or third parties protected by intellectual property rights. Any use of materials in this document, including reproduction for purposes other than those noted above, modification, distribution, or replication, or other commercial exploitation of any kind, without prior written permission of an authorized officer of Next Level Security Systems is strictly prohibited.
Next Level Security Systems' trademarks may not be used in connection with any product or service that is not provided by Next Level Security Systems, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Next Level Security Systems.
All other trademarks displayed in this document are the trademarks of their respective owners, and constitute neither an endorsement nor a recommendation of those Vendors. In addition, such use of trademarks is not intended to imply, directly or indirectly, that those Vendors endorse or have any affiliation with Next Level Security Systems.
The contents of this manual are subject to change without notice.
Page 3
NLSS Unified Security Suite User Manual: v4.0
Contents
Preface................................................................................................................16
PART 1: GETTING STARTED.................................................................................................... 17
Chapter 1: Introduction ..................................................................................................... 18
KEY FEATURES................ ....... ...... ....... ...... ............................................. ....... ...... ....... .. 18
COMPONENTS OF THE NLSS UNIFIED SECURITY PLATFORM............................... 19
NLSS Gateway...... ....... ............................................. ...... ....... ...... ....... ............... 19
NLSS Unified Security Suite .............................................................................. 19
Access Control Devices ..................................................................................... 19
Cameras............................................................................................................. 19
NLSS HD Decoder............................................................................................. 20
External Storage ................................................................................................ 20
Generic Computers and Browsers..................................................................... 20
Generic HD Monitors.......................................................................................... 20
Chapter 2: Installation........................................................................................................ 21
SYSTEM REQUIREMENTS ........................................................................................... 21
Requirements for NLSS Discovery Utility........................................................... 21
Requirements for Configuration and Operation ................................................ 21
CAMERA REQUIREMENTS........................................................................................... 22
HARDWARE INSTALLATION......................................................................................... 22
SOFTWARE INSTALLATION ......................................................................................... 22
Install Security Certificate...................... ....... ............................................. ....... .. 22
Install Cameras ............................................ ...... ....... ...... ....... ...... ....... ...... ......... 24
Install NLSS Gateways ...................................................................................... 24
Finding the IP Address without the Web Interface........................................ 26
Chapter 3: Using the NLSS Web Interface................................................................. 28
LOG IN............................................................................................................................ 28
Local Login......................................................................................................... 28
Automatic Log Off.................................................................................... 29
Remote Login............... ...... ............................................. ....... ...... ....... ............... 29
USING THE NLSS WEB INTERFACE............................................................................ 29
MAIN MENU.................................................................................................................... 30
Operations.......................................................................................................... 31
System Health......................................................................................... 32
Operations Windows ................................................................................ 33
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 3
Page 4
NLSS Unified Security Suite User Manual: v4.0
Filtering Operations Lists........................................................................... 34
Searching a List...................................................................................................35
Configuration...................................................................................................... 35
Events ................................................................................................................. 36
Full Screen Toggle............................................................................................. 36
Log off ................................................................................................................ 36
Help.................................................................................................................... 36
Transcode .......................................................................................................... 36
PART 2: OPERATIONS................................................................................................................... 37
Chapter 4: Controlling Cameras.................................................................................... 38
SELECTING CAMERAS................................................................................................. 38
Camera Icons...................................................................................................... 40
Filtering the Camera List .................................................................................... 40
Video Player........................................................................................................ 41
MONITORING CAMERAS............................................................................................... 42
Monitor Cameras from the Operations Menu..................................................... 42
Using the Camera Toolbar .................................................................................. 43
Video Information..................................................................................... 43
Play/Pause.............................................................................................. 44
Live/Archive Toggle.................................................................................. 44
Rewind and Fast Forward......................................................................... 44
Date & Time Selection.............................................................................. 45
Camera Events Toggle............................................................................. 45
Event Bookmark....................................................................................... 45
PTZ (Pan, Tilt, Zoom)............................................................................... 46
Video Analytics........................................................................................ 49
Audio Analytics....................................................................................................50
Digital Zoom
Output Contact......................................................................................... 50
Play Audio............................................................................................... 50
Talkback (Local Microphone Control) ......................................................... 51
Volume / Mute ......................................................................................... 51
Export JPG.............................................................................................. 51
Export Video............................................................................................ 51
Full Screen Toggle................................................................................... 53
Timelines ................................................................................................ 53
............................................................................................ 50
Additional Camera Controls ............................................................................... 54
Select a Stream....................................................................................... 54
Low Resolution/Native resolution ........................................................................55
Camera Event Log
Camera Reports....................................................................................... 57
Back....................................................................................................... 57
................................................................................... 55
Chapter 5: Operations with Video Analytics............................................................. 58
PARAMETERS ............................................................................................................... 58
USING VIDEO ANALYTICS............................................................................................ 59
Activity................................................................................................................ 61
Direction............................................................................................................. 62
© 2009-2014 Next Level Security Systems, Inc. 4
Page 5
NLSS Unified Security Suite User Manual: v4.0
Dwell .................................................................................................................. 63
Face Capture ..................................................................................................... 64
Face Recognition ............................................................................................... 65
License Plate Capture and License Plate Recognition...................................... 66
Line Crossing ..................................................................................................... 66
Object Moved...................................................................................................... 67
Object Taken....................................................................................................... 68
People Count ...................................................................................................... 69
People Count Directional .................................................................................... 70
Perimeter............................................................................................................. 71
Troubleshooting Video Analytics........................................................................ 71
VIDEO FORENSICS....................................................................................................... 72
Chapter 6: Operations with Doors................................................................................ 73
DOORS WINDOW .......................................................................................................... 73
DOOR LIST..................................................................................................................... 74
List Filters........ ...... ....... ...... ....... ...... ...... .............................................. ...... ....... .. 74
Door Icons.......................................................................................................... 74
UNLOCK......................................................................................................................... 75
ADD CAMERA ................................................................................................................ 75
Adding and Viewing Cameras with Doors.......................................................... 75
Remove Camera................................................................................................ 75
PUSH TO TALK ............................................................................................................... 76
EVENT LOG.......... ....... ...... ............................................. ....... ...... ....... ............................ 76
REPORTS....................................................................................................................... 76
Chapter 7: Operations with Cardholders & Users.................................................. 77
CARDHOLDERS/USERS WIN DOW ........................................... ....... ...... ....... ...... ....... .. 77
Filtering Cardholders/Users List......................................................................... 78
CARDHOLDERS/USERS DETAILS ............................... .............................................. .. 78
Cardholder Information ...................................................................................... 78
User Information................................................................................................. 78
Cardholder Photo............................................................................................... 78
Activate / Deactivate Cardholders....................................................................... 79
Cardholders & Users Reports and Events ......................................................... 79
Chapter 8: Operations with Reports ............................................................................ 80
GENERATING REPORTS.............................................................................................. 80
Reports Window........... ...... ....... ............................................. ...... ....... ...... ......... 81
Event-Specific Reports....................................................................................... 81
Device-Specific Reports..................................................................................... 83
CATEGORIES OF EVENT-SPECIFIC REPORTS ......................................................... 84
CANNED REPORTS.... ...... ....... ...... ............................................. ....... ...... ....... ...... .......... 85
Using the Table.................................................................................................. 85
Report Table Filters............................................................................................. 87
© 2009-2014 Next Level Security Systems, Inc. 5
Page 6
NLSS Unified Security Suite User Manual: v4.0
Chapter 9: Displaying Video............................................................................................ 88
CREATE, EDIT, AND DISPLAY VIEWS......................................................................... 88
Views Menu and Layout..................................................................................... 89
Create Views...................................................................................................... 90
Edit Views .......................................................................................................... 90
Filter Views List.................................................................................................. 90
Transport Control ................................................................................................ 91
Delete Views ...................................................................................................... 92
CREATE, EDIT, AND DISPLAY SEQUENCES............................................................... 93
Sequences Menu and Editor.............................................................................. 93
Create New Sequences ...................................................................................... 94
PUSH MEDIA CLIPS, VIEWS AND SEQUENCES TO DECODERS ............................. 95
Decoder Window................................................................................................ 96
Pushing a Media Clip ......................................................................................... 97
Pushing a View or Sequence.............................................................................. 98
Search filter............................................................................................. 87
Column Filters ......................................................................................... 87
Menu Options.......................................................................................... 89
Edit a Sequence....................................................................................... 94
Delete Sequences ...............................................................................................95
Display Sequences
................................................................................... 95
Chapter 10: Media Operations........................................................................................ 99
MEDIA LIBRARY ........................................................................................................... 100
Filter the Library ................................................................................................ 101
Searching the Media Library ............................................................................ 101
Download a Video Clip..................................................................................... 101
Stop a Camera Export...................................................................................... 102
Lock a Media File............................................................................................. 102
Delete a Media File .......................................................................................... 102
Replacing a Default Audio File......................................................................... 102
Chapter 11: Operations with Input Devices............................................................ 103
INPUT DEVICES WINDOW.......................................................................................... 103
INPUT DEVICE LIST .................................................................................................... 104
Input Device Icons............................................................................................ 104
ADD CAMERA .............................................................................................................. 104
Adding and Viewing Cameras with Input Devices............................................ 104
Remove Camera............................................................................................... 105
PUSH TO TALK ............................................................................................................ 105
EVENT LOG.......... ....... ...... ............................................. ....... ...... ....... .......................... 105
REPORTS...................................................................................................................... 106
Chapter 12: Operations with Output Devices......................................................... 107
OUTPUT DEVICES WINDOW...................................................................................... 107
© 2009-2014 Next Level Security Systems, Inc. 6
Page 7
NLSS Unified Security Suite User Manual: v4.0
OUTPUT DEVICE LIST ................................................................................................ 108
Output Device Icons......................................................................................... 108
ACTIVATING AND DEACTIVATING A DEVICE........................................................... 108
ADD CAMERA .............................................................................................................. 109
Adding and Viewing Cameras with Output Devices......................................... 109
Remove Camera.............................................................................................. 109
PUSH TO TALK ............................................................................................................ 109
EVENT LOG.......... ....... ...... ............................................. ....... ...... ....... .......................... 110
REPORTS..................................................................................................................... 110
Chapter 13: Using Floor Plans...................................................................................... 111
Chapter 14: Using Groups.............................................................................................. 112
GROUPS WINDOW....................................................................................................... 113
LIST VIEW .................................................................................................................... 113
Adding and Using Maps ................................................................................... 114
Opening a Door from a Floor plan or Map................................................. 116
Viewing Video from a Floorplan or Map .................................................... 116
Deactivating a Cardholder Information via a Floorplan or Map ......................... 117
Activating and Deactivating an Output Device
........................................... 117
Chapter 15: Monitoring and Handling Events........................................................ 118
MONITORING EVENTS ............................................................................................... 118
EVENT LOG.......... ....... ...... ............................................. ....... ...... ....... ........................... 119
Date & Time Range.......................................................................................... 119
Event Log Queues ............................................................................................ 120
Event Filters ..................................................................................................... 120
Search Fields ................................................................................................... 121
Event List ......................................................................................................... 121
List Actions............ ....... ...... ....... ...... ...... ....... ...... .............................................. 122
EVENT DETAILS .. ....... ...... ............................................. ....... ...... ....... ........................... 123
Event Details Actions ....................................................................................... 123
Event State............................................................................................ 123
Shunt Toggle......................................................................................... 124
Lock State Toggle.................................................................................. 124
Written Note Editor................................................................................. 124
Recorded Event..................................................................................... 124
Current Snapshot................................................................................... 124
Profile Picture........................................................................................ 124
Exporting the Event Log.......................................................................... 124
Close.................................................................................................... 125
Emergency Events........................................................................................... 125
FACE RECOGNITION EVENTS................................................................................... 125
Events and Linkages........................................................................................ 126
© 2009-2014 Next Level Security Systems, Inc. 7
Page 8
NLSS Unified Security Suite User Manual: v4.0
PART 3: SYSTEM CONFIGURATION................................................................................ 127
Chapter 16: General Configuration Functions....................................................... 128
SEARCHING TABLES.................................................................................................. 128
ADDING, EDITING AND DELETING ITEMS................................................................ 129
Adding Items .................................................................................................... 129
Edit Items ......................................................................................................... 129
Delete Items...................................................................................................... 130
Chapter 17: Global Configurations............................................................................. 131
CONFIGURE SUBSCRIPTIONS ................................................................................... 132
Enabling RMS ................................................................................................... 133
Enabling Other Premium Features................................................................... 133
CONFIGURE CUSTOMER........................................................................................... 134
Customer Details.............................................................................................. 134
Customer Configuration ................................................................................... 134
CONFIGURE SITES ...................................................................................................... 135
Site Details....................................................................................................... 135
Editing Site Details ........................................................................................... 135
CONFIGURE NLSS GATEWAYS.................................................................................. 136
General Tab ..................................................................................................... 136
General Tab Parameters......................................................................... 136
General Tab Buttons and Links................................................................ 137
Wired Network Tab .......................................................................................... 142
Email Tab......................................................................................................... 143
Time Tab.......................................................................................................... 144
CONFIGURE HOLIDAYS .............................................................................................. 145
Holidays Table ................................................................................................. 145
Holiday Details ................................................................................................. 145
CONFIGURE SCHEDULES.......................................................................................... 146
Schedule Details .............................................................................................. 147
Create New Schedules .................................................................................... 147
CONFIGURE EVENT TYPES........................................................................................ 148
Event Type Table............................................................................................. 148
Event Type Details............................................................................................ 149
CONFIGURE EVENT SEVERITY................................................................................. 149
Event Severity Table........................................................................................ 149
Event Severity Details ....................................................................................... 150
CONFIGURE GROOMER SETTINGS.......................................................................... 150
CONFIGURE ACTIONS................................................................................................ 151
Action Type ....................................................................................................... 152
Creating an Action............................................................................................ 153
CONFIGURE EVENT LINKAGES................................................................................. 154
Event Linkage Details ...................................................................................... 155
© 2009-2014 Next Level Security Systems, Inc. 8
Page 9
NLSS Unified Security Suite User Manual: v4.0
Creating an Event Linkage........................................ ...... ....... .......................... 156
Chapter 18: Configure Identity and Credentials.................................................... 157
CONFIGURE ACCESS LEVELS .................................................................................. 157
Access Level Details ........................................................................................ 158
Create a New Access Level ............................................................................. 158
CONFIGURE CARD TYPES......................................................................................... 159
Card Types Table............................................................................................. 159
Card Types Details............................................................................................ 160
CONFIGURE CARDHOLDER TYPES.......................................................................... 161
Cardholder Types Table................................................................................... 161
Cardholder Types Details................................................................................. 161
CONFIGURE CARDHOLDERS.................................................................................... 162
Cardholders Table........................... ...... ....... ...... ....... ...... ....... ...... ....... ............. 162
Configuration Order........................................................................................... 163
Cardholders Tabs .. ....... ...... ....... ............................................. ...... ....... ...... ....... 163
General Tab .......................................................................................... 163
Cards Tab............................................................................................. 164
Access Levels Tab................................................................................. 166
Chapter 19: Configure Access Control..................................................................... 168
CONFIGURE CONTROLLERS..................................................................................... 169
Controller Details.............................................................................................. 170
General Tab .......................................................................................... 170
Controller Details: Diagnostics Tab .......................................................... 172
Associating a Mercury Controller with an NLSS Gateway ................................ 173
Putting an Axis A1001 Network Door Controller In Service ............................. 173
CONFIGURE ELEVATOR CONTROL.......................................................................... 174
Configuring Elevator Control............................................................................ 175
CONFIGURE READER INTERFACES......................................................................... 175
Reader Interface Details .................................................................................. 176
General Tab .......................................................................................... 176
Aux Input Tab........................................................................................ 178
Aux Output Tab...................................................................................... 179
Adding and Deleting Reader Interfaces ........................................................... 180
Add Reader Interfaces Manually.............................................................. 180
Delete Reader Interfaces........................................................................ 180
CONFIGURE READERS ............................................................................................... 181
Reader Details ................................................................................................. 181
CONFIGURE DOORS ................................................................................................... 183
Gateway Capacities .................................................................................. ....... 183
Adding and Maintaining Doors......................................................................... 183
Door Details ..................................................................................................... 184
CONFIGURE I/O INTERFACES................................................................................... 185
I/O Interface Details ......................................................................................... 186
© 2009-2014 Next Level Security Systems, Inc. 9
I/O Interfaces: General Parameters.......................................................... 186
I/O Interface Details: Aux Input Tab.......................................................... 186
I/O Interface Details: Aux Output Tab....................................................... 187
Page 10
NLSS Unified Security Suite User Manual: v4.0
CONFIGURE I/O LINKAGES........................................................................................ 188
I/O Linkages Details......................................................................................... 189
Chapter 20: Configure Video, & Storage, & Decoders........................................ 190
CONFIGURE EXTERNAL STORAGE DEVICES ......................................................... 190
Storage Table................................................................................................... 191
Storage Details................................................................................................. 191
Adding Storage Devices.................................................................................... 192
CONFIGURE CAMERAS AND STREAMS................................................................... 194
Camera Details General Tab ........................................................................... 195
Camera Details Stream Tab............................................................................. 197
Camera Details Recording Tab........................................................................ 199
Cameras Actions.............................................................................................. 201
USB Storage Devices............................................................................. 192
eSATA Storage Devices ......................................................................... 192
iSCSI Storage Devices........................................................................... 192
NAS Storage Devices............................................................................. 193
Editable Parameters............................................................................... 195
Read-Only Parameters........................................................................... 197
List of Streams....................................................................................... 198
Video Stream Parameters....................................................................... 198
Audio Stream Parameters....................................................................... 199
Stream Settings.................................................................................................200
Camera Settings
Connect to a Camera.............................................................................. 201
Add RTSP and HTTP Streams ................................................................ 201
.................................................................................... 200
CONFIGURE NLSS HD DECODERS............................................................................ 202
Decoder Table.................................................................................................. 202
Decoder Details................................................................................................. 203
Editable Parameters............................................................................... 203
Read-Only Parameters........................................................................... 203
Chapter 21: Configuring Permissions....................................................................... 204
APPLYING PERMISSIONS EXAMPLE ........................................................................ 204
GROUPS........................................................................................................................ 207
Example ........................................................................................................... 207
Groups Window................................................................................................ 208
Create a Group ................................................................................................ 208
Edit a Group..................................................................................................... 209
Delete a Group................................................................................................. 209
ROLES.......................................................................................................................... 210
Roles Details.................................................................................................... 211
General Tab .......................................................................................... 211
Gateway Modules Tab............................................................................ 212
Gateway Groups.................................................................................... 214
Gateway Functions................................................................................. 215
Cloning a Role.................................................................................................. 216
Delete a Role ................................................................................................... 216
USERS...........................................................................................................................217
User Details....................................................................................................... 218
© 2009-2014 Next Level Security Systems, Inc. 10
Page 11
NLSS Unified Security Suite User Manual: v4.0
PART 4: PREMIUM FEATURES............................................................................................. 219
Chapter 22: Configuring and Using Face Recognition....................................... 220
DATABASE SPECIFICATIONS.................................................................................... 221
.csv File............................................................................................................ 221
Images Requirements...................................................................................... 221
IMPORTING A DATABASE .......................................................................................... 222
FACE RECOGNITION GROUPS.................................................................................. 223
Accessing Face Recognition Groups............................................................... 224
Groups Table ................................................................................................... 224
Group Details ................................................................................................... 225
Creating a Group.............................................................................................. 225
Deleting a Group.............................................................................................. 225
Assigning People to Groups............................................................................. 226
MANAGEMENT ............................................................................................................ 226
Management Table ........................................................................................... 227
Management Details ........................................................................................ 227
General Tab .......................................................................................... 227
Images Tab........................................................................................... 228
Updating the Management List ........................................................................ 230
Adding a Person .................................................................................... 230
Editing a Person..................................................................................... 230
Deleting a Person................................................................................... 231
RUNNING THE FACE RECOGNITION ANALYTIC.................................. ....... ...... ....... . 232
FACE CAPTURE AND RECOGNITION GUIDELINES................................................. 233
Configuration Notes ......................................................................................... 233
FAQs on the Face Capture and Face Recognition Video Analytic ................... 234
Chapter 23: Configuring and Using License Plate Recognition..................... 235
DATABASE SPECIFICATIONS.................................................................................... 236
lpr.csv File.......................... ....... ...... ...... ....... ...... ....... ....................................... 236
vehicles.csv....................................................................................................... 237
Images Requirements...................................................................................... 237
IMPORTING A DATABASE ........................................................................................... 238
LICENSE PLATE RECOGNITION MANAGEMENT ..................................................... 239
Management Table .......................................................................................... 239
Management Details ......................................................................................... 240
General Tab .......................................................................................... 240
License Plate Tab.................................................................................. 240
Updating the Management List ........................................................................ 241
Adding a Person .................................................................................... 241
Editing a Person ................................................................................................242
Deleting a Person
LICENSE PLATE RECOGNITION GROUPS ............................................................... 242
Accessing License Plate Recognition Groups .................................................. 243
Groups Table ................................................................................................... 243
Group Details ................................................................................................... 243
................................................................................... 242
© 2009-2014 Next Level Security Systems, Inc. 11
Page 12
NLSS Unified Security Suite User Manual: v4.0
Creating a Group.............................................................................................. 244
Deleting a Group.............................................................................................. 244
Assigning People to Groups............................................................................. 244
RUNNING LICENSE PLATE CAPTURE ....................................................................... 245
RUNNING THE LICENSE PLATE RECOGNITION ANALYTIC ................................... 246
SEARCHING EVENTS FOR LICENSE PLATES.......................................................... 247
LICENSE PLATE CAPTURE AND RECOGNITION GUIDELINES .............................. 248
Chapter 24: Configuring Audio Analytics................................................................ 249
CONFIGURING AN AUDIO ANALYTIC........................................................................ 249
Chapter 25: Configuring and Using Intrusion Detection................................... 252
CONFIGURING INTRUSION........................................................................................ 253
Panel................................................................................................................ 253
Areas................................................................................................................. 257
Zones ................................................................................................................ 259
General Tab .......................................................................................... 254
Diagnosti c Tab....................................................................................... 255
Zones Tab............................................................................................. 255
Outputs Tab .......................................................................................... 256
Adding an I ntrusion Detection Panel......................................................... 256
Devices..............................................................................................................258
INTRUSION OPERATIONS.......................................................................................... 260
Adding a Camera to a Zone or Area......................................................... 260
Zones Window ................................................................................................. 261
Bypassing a Zone .................................................................................. 262
Zone Alarm Status Indicator.................................................................... 262
Areas Window.................... ............................................. ....... ...... .................... 262
Arming or Disarming an Area................................................................... 263
Armed Setting Indicator .......................................................................... 264
Chapter 26: Configuring and Using Point of Sale................................................ 265
OPERATIONS............................................................................................................... 265
Controlling the Video Player............................................................................. 267
Exporting Transactions .................................................................................... 267
CONFIGURATION........................................................................................................ 268
Terminal Interface ............................................................................................ 268
Terminals ......................................................................................................... 268
Chapter 27: NLSS Remote Management Services............................................... 269
EXAMPLE OF RMS DEPLOYMENT ............................................................................ 269
RMS HIERARCHY........................................................................................................ 273
LOGGING IN TO THE NLSS RMS WEB INTERFACE.................................... ...... ....... . 274
RMS MAIN MENU......................................................................................................... 274
VOLUME........................................................................................................................ 275
© 2009-2014 Next Level Security Systems, Inc. 12
Page 13
NLSS Unified Security Suite User Manual: v4.0
SITES............................................................................................................................ 275
OPERATIONS............................................................................................................... 276
Media ............................................................................................................... 276
Multiview ........................................................................................................... 279
Groups .............................................................................................................. 280
CONFIGURATION........................................................................................................ 280
RMS Settings ................................................................................................... 280
RMS Dependencies ......................................................................................... 282
Transferring RMS Settings............................................................................... 282
Global................................................................................................................ 284
Identity............................................................................................................... 290
Permissions....................................................................................................... 295
Transferring a Video Clip to RMS............................................................. 277
Export a Video Clip................................................................................. 277
Downloading a Video Clip....................................................................... 278
Initial Registration................................................................................... 281
Transfer Status...................................................................................... 283
Customer .............................................................................................. 284
Sites..................................................................................................... 284
Holidays................................................................................................ 287
Schedules............................................................................................. 288
Event Type............................................................................................ 288
Event Severity ....................................................................................... 289
Access Levels........................................................................................ 290
Card Type............................................................................................. 291
Cardholder Types..............................................................................................292
Cardholders
Setting Up Groups in RMS ...................................................................... 295
Setting Up Roles in RMS......................................................................... 295
Setting Up Users in RMS ........................................................................ 296
........................................................................................... 292
EVENTS........................................................................................................................ 297
RMS Event Log................................................................................................ 297
FULL SCREEN ............................... ....... ...... ...... .............................................. ...... ....... 297
LOG OFF ...................................................................................................................... 298
HELP............................................................................................................................. 298
TRANSCODE................................................................................................................ 298
Chapter 28: Next Level Mobile Application............................................................. 299
SUPPORTED MOBILE DEVICES ................................................................................ 300
GETTING STARTED .................................................................................................... 300
NAVIGATING THE NEXTMOBILE APP ....................................................................... 303
RMS Options..................................................................................................... 305
Device Navigation ............................................................................... ...... ....... 305
FAVORITES................................................................................................................... 308
SEARCHING A LIST..................................................................................................... 308
USING THE VIDEO PLAYER ........................................................................................ 309
REMOTE DOOR UNLOCK........................................................................................... 312
© 2009-2014 Next Level Security Systems, Inc. 13
Page 14
NLSS Unified Security Suite User Manual: v4.0
EVENTS......................................................................................................................... 314
Event Details.................................................................................................... 316
MULTIVIEWS................................................................................................................. 318
CLOUD CLIPS .............................................................................................................. 319
USING THE MOBILE APP WITH A DECODER ........................................................... 320
Check the Active Video ..................................................................................... 321
Setting a Channel to Active.............................................................................. 321
Setting a View to Active ................................................................................... 321
Setting a Sequence to Active........................................................................... 321
PART 5: APPENDICES.................................................................................................................. 322
Appendix A: Performance and Setup Guidelines: Video Analytics, Face Rec-
ognition, and License Plate Recognition................................................................. 323
VIDEO ANALYTICS METRICS...................................................................................... 324
VIDEO ANALYTICS PERFORMANCE.......................................................................... 325
SPECIFIC VIDEO ANALYTICS BEHAVIOR NOTES .................................................... 325
FACE RECOGNITION ................................................................................................... 326
Face Capture and Face Recognition Guidelines for Best Results .................... 326
Photograph Guidelines......................................................................................326
IP Camera Guidelines.............................. ...... ..... ...... ..... ...... ..............................327
General Guidelines............................................................................................327
Face Recognition Events and Actions .............................................................. 328
Event Linkage Examples...................................................................................328
LICENSE PLATE RECOGNITION................................................................................. 329
License Plate Capture and License Plate Recognition Guidelines
for Best Results................................................................................................. 329
License Plate Recognition Events and Actions................................................. 330
Event Linkage Examples...................................................................................330
Appendix B: Audio Analytics Guidelines................................................................. 331
INTRODUCTION............................................................................................................ 331
GLASS BREAK ANALYTIC ........................................................................................... 332
Analytic Specifications ....................................... .............................................. . 332
CAR ALARM ANALYTIC................................................................................................ 332
Analytic Specifications ....................................... .............................................. . 332
AGGRESSION ANALYTIC ............................................................................................ 333
Analytic Specifications ....................................... .............................................. . 333
GUNSHOT ANALYTIC................................................................................................... 333
Analytic Specifications ....................................... .............................................. . 333
GENERAL SPECIFICATIONS....................................................................................... 334
Environmental ................................................................................................... 334
Performance...................................................................................................... 334
© 2009-2014 Next Level Security Systems, Inc. 14
Page 15
NLSS Unified Security Suite User Manual: v4.0
Configuration..................................................................................................... 334
SUPPORTED CAMERAS.............................................................................................. 335
USING AUDIO ANALYTICS .......................................................................................... 335
Appendix C: Contacting Support................................................................................ 336
GATEWAY INFORMATION........................................................................................... 336
SYSTEM LOG................................................................................................................ 337
CONFIGURATION BACKUP ......................................................................................... 337
CONTACT INFORMATION ....... ...... ....... ...... ...... ....... ...... ....... ...... ....... ...... ....... ...... ....... . 338
Index ................................................................................................................339
© 2009-2014 Next Level Security Systems, Inc. 15
Page 16
NLSS Unified Security Suite User Manual: v4.0
Preface
PURPOSE, SCOPE, AND AUDIENCE OF THIS MANUAL
This document explains how to install, configure, and operate the NLSS Unified Security Suite.
Part 1: Getting Started highlights the features of the NLSS Unified Security Suite;
provides installation instructions; and introduces the NLSS Web Interface.
Note: Except for acces s co n trol de vi ces, t he N L SS de vi ce s i n th e Un if i ed Se curi t y Su i te
use common connectors such as standard AC cords, and Ethernet, USB, eSA TA,
HDMI connections.
For instructions on wiring the NLSS Gateway and third party access control
devices, refer to the separate NLSS Gateway: Quick Start Guide, which is
available on the NLSS web site.
Part 2: Operations provides instructions for the day-to-day procedures for using the
NLSS Security Suite Web Interface. The instructions in Part 1 and Part 2 are intended for anyone with basic familiarity with
PCs, web browsers, and security concepts.
Part 3: System Configuration provide procedures for setting up and maintaining the
NLSS Unified Security Suite. These tasks require a slightly greater than average knowledge of these topics, and
some IT knowledge in certain areas.
Part 4: Premium Features provides instructions for configuring and using features
that can be added to the NLSS Unified Security Suite.
PARTNERS AND THIRD PARTIES
This document refers directly to various devices made by partners and other third parties. All references to makes, models, and trademarks mentioned in this document are the property of their respective owners.
MORE INFORMATION
For more information about the NLSS Gateway, including release notes, a list of supported devices, and standalone product documents, see the NLSS Support website:
support.nlss.com
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 16
Page 17
NLSS Unified Security Suite User Manual: v4.0
PART 1:GETTING S TARTED
Getting Started includes:
Chapter 1: Introduction - an introduction to the product,
Chapter 2: Installation - installation instructions.
Chapter 3: Using the NLSS Web Interface - introduction to the NLSS Web Interface.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 17
Page 18
NLSS Unified Security Suite User Manual: v4.0
Chapter 1: Introduction
The NLSS Unified Sec uri ty Sui te runs on the NLSS Gateway. This software is a unified platform for video surveillance, video analytics, and access control.
The Gateway, using the embedded NLSS Unified Security Suite, connects with third party video cameras and access control devices over an IP-based network. The NLSS Unified Security Suite collects data from separate access control devices, and video cameras. Information about users, cardholders, schedules, permissions, and related data are stored in a database on the Gateway. The NLSS Web Interface allows users to operate and configure their systems.
The NLSS Web Interface provides users with browser-based access to either a single NLSS Gateway or cloud camera, or to multiple Gateways and cloud cameras managed by RMS (Remote Management Servi ces ).
This document describes how to use the NLSS Web Interface.
1.1 KEY FEATURES
The NLSS Unified Security Suite is configured and operated using the NLSS Web Interface, which is accessed through most browsers on any computer.
Unified Simplicity: organizes data from the traditionally separate subsystems of
access control, intrusion detection, and video surveillance.
Easy to Install and Update:
Comes with the NLSS Discovery Utility, which finds all NLSS devices on the same
Discovered devices easily can be configured and updated in the system without
Administered and operated through a browser via the user-friendly NLSS Web
Remote Access: the entire system can be configured, monitored, and administered
from a single, local or remote location.
High Performance:
Modularity: the basic system requires only one NLSS Gateway at a site. A more
Video: can auto-discover many IP cameras, including 1080p HD cameras. The
Layer 2 network.
disrupting operations.
Interface.
robust system can include numerous Gateways at multiple locations. A Gateway
can handle multiple cameras, access points, and cardholders.
NLSS Web Interface also can display and record video streams from remote
encoders and local files that adhere to standard RTSP and HTTP protocols.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 18
Page 19
NLSS Unified Security Suite User Manual: v4.0 Introduction
Intelligence: Video Analytics are fully integrated and are tracked as events. Video
Analytics include Line Crossing, People Count, Directional People Count, Face
Capture, Activity Detection, Perimeter Detection, Dwell, Direction, Object Taken,
and Object Moved. See Chapter 5: Operations with Video Analytics for more
information.
Remote Monitoring and Backups: video recordings and other data can be saved on
internal hard drives in NLSS Gateways, as well as on external storage devices.
Remote Management Services (RMS): provides a single entry point to manage
multiple sites. RMS provides the ability to access, configure and operate multiple Gateways from anywhere, at any time, via a web browser or a mobile device. (RMS is available as a premium feature.)
1.2 COMPONENTS OF THE NLSS UNIFIED SECURITY PLATFORM
An NLSS Gateway, network access, and a computer with a browser, are the minimum requirements to configure, administer, and operate the NLSS Security Platform.
1.2.1 NLSS Gateway
The NLSS Unified Security Suite software is installed on each NLSS Gateway, with no software licenses. Each NLSS Gateway is a network device that collects and processes
video and access control information. The NLSS Unified Security Suite organizes and displays this information for users to monitor and act upon. Each Gateway includes a web server that generates the NLSS Web Interface to access the NLSS Unified Security Suite.
The NLSS Unified Security Suite comes installed on all NLSS Gateways.
Important: NLSS recommends that the Gateway be plugged into a UPS for protection in
the event of a power failure.
1.2.2 NLSS Unified Security Suite
The NLSS Unified Security Suite provides an easy and powerful means to monitor, manage and act on data from video cameras and access control devices attached to the same network as the NLSS Gateway. Use a browser to log into the NLSS Web Interface generated by the NLSS Unified Security Suite.
1.2.3 Access Control Devices
The NLSS Unified Security Suite supports many access controllers, reader interfaces, and readers from Mercury Security, HID, and Assa Abloy. For a complete list of currently supported devices, check the NLSS web site at www.NLSS.com.
1.2.4 Cameras
The NLSS Unified Security Suite supports IP-based security cameras that conform to ONVIF standards, as well as most cameras from major manufacturers, including many Arecont, Axis, Bosch, IQInVision, Panasonic, Pelco, and Sony cameras. For a complete list of currently supported cameras, check the NLSS web site at www.NLSS.com.
© 2009-2014 Next Level Security Systems, Inc. 19
Page 20
NLSS Unified Security Suite User Manual: v4.0 Introduction
1.2.5 NLSS HD Decoder
When the decoder is part of an NLSS Security Platform, any Gateway in the network can push a view or a video clip to the decoder. Independent Mode software also is embedded on each NLSS HD Decoder so it can operate in a stand-alone mode.
NLSS strongly recommends the use of NLSS HD Decoders for long-term, continuous monitoring of video. Although video can be monitored in the NLSS Web Interface, a web browser is required to do so. Due to the complexities and shortcomings of various web browsers, NLSS cannot guarantee the performance, stability, or functionality of video displayed in a web browser.
1.2.6 External Storage
Third-party external storage devices provide an optional extension of the hard drive space for NLSS Gateways. T o increase the Gateway’s storage capacity, connect a USB, eSA TA, NFS, or iSCSI external storage device directly to a Gateway and configure the drive.
1.2.7 Generic Computers and Browsers
The NLSS Web Interface is used to control and configure the system, according to user permissions. The interface can be accessed via a browser running on Windows, Linux, Macintosh or Android-bas ed operating systems.
Browsers supported: Firefox (20.0 or above, Windows and Mac OS X only), Safari
(5.1.10 for OS X v10.6, 6.1.4 for OS X 10.7-10.8), Internet Explorer (9.0 or later), or Chrome (26.0 or above).
Adobe Flash Player 13.0 or above also must be installed. Check the Adobe web site
for the latest version: get.adobe.com/flashplayer.
Any computer can access the NLSS Web Interface. As with any software, faster processors and additional RAM can improve performance.
See Requirements for Configuration and Operation for more information.
1.2.8 Generic HD Monitors
Video streams processed by the system are rendered in the Gateway and displayed in a browser with the NLSS Web Interface.
The minimum recommended resolution is 1024x768, or greater.
© 2009-2014 Next Level Security Systems, Inc. 20
Page 21
NLSS Unified Security Suite User Manual: v4.0
Chapter 2: Installation
This chapter provides instructions for using the NLSS Unified Security Suite software to discover your cameras and access control devices. (Installing the hardware is documented separately.)
2.1 SYSTEM REQUIREMENTS
Using the NLSS Web Interface to decode and display video streams in a browser requires hardware and software that meets the following minimum requirements.
2.1.1 Requirements for NLSS Discovery Utility
The NLSS Discovery Utility discovers NLSS Gateways and NLSS HD Decoders installed on the same network.
NLSS Discovery Utility runs on a Windows-based computer with:
Access to the network on which the NLSS Gateway is installed.
Multicore Intel processor.
2GB of RAM minimum. The 64-bit version of Windows requires 4 GB of RAM.
Operating systems:
Windows 7 or Windows 8: 32-bit or 64-bit for both Windows versions
CD/DVD reader.
Windows .NET Framework.
2.1.2 Requirements for Configuration and Operation
After the NLSS Gateway is discovered, it can be configured and operated from multiple platforms and browsers via the NLSS Gateway Web Interface.
Minimum dual core processor
Operating Systems:
Windows 7 or Windows 8: 32 bit or 64 bit for both Windows versions – Linux – Mac OS X v10.6 or above
2GB of RA M minimum
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 21
Page 22
NLSS Unified Security Suite User Manual: v4.0 Installation
Access to the network on which the NLSS Gateway is installed.
Supported browsers: Firefox (26 or above), Safari (6 or above), Internet Explorer (10
or above), Chrome (30 or above).
Flash 13.0 or above also must be installed.
Check the Adobe web site for the latest version: get.adobe.com/flashplayer. Check
adobe.com/software/flash/about/ for information on supported operating systems
and Flash versions.
Important: Disable hardware acceleration for Flash in the browser.
2.2 CAMERA REQUIREMENTS
IP cameras must be installed on the same sub-network as the NLSS Gateway, for the Gateway to discover them. Cameras on other networks can be added via HTTP.
A list of supported cameras is located on the NLSS Support website:
support.nlss.com/customer/portal/articles/970656-cameras-and-encoders
2.3 HARDWARE INSTALLATION
For instructions on physically installing NLSS Gateways and NLSS HD Decoders, see the NLSS Gateway: Quick Start Guide, which can be downloaded from support.NLSS.com.
For instructions on physically installing IP cameras and access control hardware, refer to instructions provided by the manufacturers of those devices.
2.4 SOFTWARE INSTALLATION
The installation of your NLSS Unified Security Platform is done in three phases.
Install Security Certificate
Install Cameras
Install NLSS Gateways
2.4.1 Install Security Certificate
CA certificates are an important component of secure connections using the HTTPS protocol, which NLSS Gateways use for security purposes.
Note: The following instructions for installing the NLSS CA certificate in your browser
are only for Internet Explorer (8.0 or above). For other browsers, consult their
documentation for instructions on manually installing a CA certificate.
1. Using Internet Explorer, go to http://support.nlss.com.
2. Click the Downloads link to access the page for downloading NLSS CA certificates.
© 2009-2014 Next Level Security Systems, Inc. 22
Page 23
NLSS Unified Security Suite User Manual: v4.0 Installation
3. Download the NLSS Certificate, and save it to your desktop.
4. Double-click the certificate file on your desktop to display the Certificate dialog (see
the figure below).
5. In the General tab of the Certificate dialog, click Install Certificate. The Certificate
Import Wizard is disp lay ed .
6. In the Wizard:
a. Click Next to display the Certificate Store page. b. Select Place all certificates in the following store. c. Click Browse to display the Select Certificate Store page.
© 2009-2014 Next Level Security Systems, Inc. 23
Page 24
NLSS Unified Security Suite User Manual: v4.0 Installation
7. In the Select Certificate Store page, select Trusted Root Certificate Authorities.
8. Click OK.
9. Click Next and Finish to close the Wizard.
10. To complete the installation of the Certificate, click Yes in the Security Warning page if
it is displayed.
2.4.2 Install Cameras
For ease of discovery, ensure that your IP cameras are installed and powered on before installing an NLSS Gateway on the same sub-network.
Note: For best results, use the same password for all IP cameras. As needed, change
the passwords on the cameras according to instructions provided by the
manufacturers.
2.4.3 Install NLSS Gateways
1. Physically connect the NLSS Gateway to the local network.
After the NLSS Gateway is connected to the network, use a computer running a supported operating system and browser to configure and control the system.
Ensure the computer has a supported browser, with Adobe Flash Player 13.0 or
above plug-in installed. See Generic Computers and Browsers.
Ensure the computer has a high speed Internet connection to support streaming
video, and is connected to the same network as the Gateway.
© 2009-2014 Next Level Security Systems, Inc. 24
Page 25
NLSS Unified Security Suite User Manual: v4.0 Installation
2. Insert the supplied NLSS Discovery Utility CD into the computer’s disc drive, or
download the software from the NLSS web site (support.nlss.com).
3. Copy the NLSS Discovery Utility file to your computer’s hard drive.
4. Run the NLSS Discovery Tool.
5. In the NLSS Device Discovery window, click Scan. The Utility discovers all the NLSS
Gateways, NLSS HD Decoders, and Cloud Cameras on the same LAN.
The list can be sorted by clicking on a column header. The scan results of the NLSS Discovery Utility provide both the IP address and MAC
address of each NLSS device. Either address can be used with a browser to navigate to the NLSS Web Interface generated by the target NLSS device.
In the discovered device list, the IP addresses are hyper-linked to the respective NLSS Gateways.
6. Click an IP address to open the NLSS Web Interface login window in the default
browser.
Note: An alternate method of connecting to the Gateway is by using the local host
name. This host name is based upon the Gateway’s MAC address.
Use the following URL to connect to the Gateway with host name:
http://nlss-gateway-macaddress.local
where gateway is the NLSS device and macaddress is the MAC address of the
target Gateway.
For example, if the MAC address of a Gateway 500 is 90:E6:BA:B2:F7:C8, enter:
http://nlss-gw500-90e6bab2f7c8.locall
(note the removal of colons)
7. Accept other installation prompts, such as plug-ins, etc. Bypass certificate errors, if
any.
© 2009-2014 Next Level Security Systems, Inc. 25
Page 26
NLSS Unified Security Suite User Manual: v4.0 Installation
The NLSS Gateway’s login window is displayed in the browser. This login window provides access to the NLSS Web Interface generated by the target NLSS Gateway. Superuser permissions are needed to complete the final steps.
8. Log in as described in Local Login.
9. In the NLSS Web Interface, navigate to Configuration > Global > Gateways, and click
the Check Update button to see if new firmware is available for your NLSS Gateway. If so, update the firmware to the latest version. For instructions, see Configure NLSS
Gateways.
2.4.3.1 FINDING THE IP ADDRESS WITHOUT THE WEB INTERFACE
If a problem occurs locating the Gateway with the Discovery Utility, and the MAC address is unavailable, the IP address can be discovered by directly connecting to the Gateway.
1. Ensure the Gateway is shutdown.
If the Gateway is running, quickly press and release the power button. This
procedure allows the Gateway to shutdown properly.
Important: Do NOT press and hold the power button, or unplug the Gateway, as those
actions can damage the Gateway by not allowing it to shut down properly.
2. Connect a monitor to the Gateway using an HDMI or DVI connection.
Do not use a VGA converter, as the Gateway’s output signal is digital.
3. Connect a keyboard to a USB port on the Gateway.
4. Power up the Gateway.
The Gateway takes about three minutes to boot up. A small, NLSS logo is displayed on the monitor when the boot up is complete.
5. Press Ctrl-Alt-F6.
A login prompt is displaye d.
6. Login with these credentials:
Username: support Password: nlss123 A menu is displayed.
============================================
Please choose one of the following options:
1--Show local IP Address 2--Enable/disable ssh 3--FactoryReset 4--Display software version 5--Initiate Check Update 6--Initiate NLSS Support Session 7--Close all NLSS Support Sessions Q--exit
============================================
7. Enter 1, and press Enter.
© 2009-2014 Next Level Security Systems, Inc. 26
Page 27
NLSS Unified Security Suite User Manual: v4.0 Installation
The Gateway’s IP address is displayed.
8. Enter Q, and press Enter.
This option closes the menu.
9. Power down the monitor, and remove the monitor and keyboard.
10. In a browser on a computer connected to the same sub-network as the Gateway, log
in as described in Local Login.
11. In the NLSS Web Interface, navigate to Configuration > Global > Gateways, and click
the Check Update button to see if new firmware is available for your NLSS Gateway. If so, update the firmware to the latest version. For instructions, see Configure NLSS
Gateways.
© 2009-2014 Next Level Security Systems, Inc. 27
Page 28
NLSS Unified Security Suite User Manual: v4.0
Chapter 3: Using the NLSS Web Interface
3.1 LOG IN
The NLSS Web Interface can be accessed from the same local network as the NLSS Gateway, or remotely via VPN or a similar service.
Note: The features available after login are dependent on the user’s role. See Chapter
21: Configuring Permissions for more information.
3.1.1 Local Login
Using a supported browser running on a computer in the same network as your NLSS system, navigate to any NLSS Gateway in your system. Enter either the IP address or the local host name of the target NLSS Gateway.
Note: The MAC address of an installed Gateway never changes. If DHCP is used to
assign an IP address to the Gateway, then that IP address can change. The NLSS
Discovery Utility provides both MAC and IP addresses.
Important: If the network is not using DHCP, then a link-local address is assigned to the
decoder (169.254.x.x) when it is connected to the network. A static IP address must be entered in the IP Address field for the Gateway to communicate outside the local network. See Wired Network Tab in Chapter 17: Global
Configurations in Chapter 17: Global Configurations for more information.
When the browser connects to the target Gateway, a login window is displayed. Log in with an assigned username and password.
If logging into a new Gateway for the first time, use the following user name and password, which provide unlimited access to configuration, administration, and operation.
User: superuser
Password: superuser
Important: After logging into the Gateway for the first time, change the default password
for the Superuser and Operator.
Note: When a Gateway is registered with RMS, the superuser password is reset to
superuser. The password can be changed at the RMS level. Once the discovery process begins, it may take a few minutes to locate all compatible
cameras and access control devices on the network and list them in the NLSS Web Interface.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 28
Page 29
NLSS Unified Security Suite User Manual: v4.0 Using the NLSS Web Interface
After devices are discovered by the NLSS Gateway, a status of Preprovisioned is listed in the device table. Preprovisioned means the device has been discovered, but has never been put into service with this Gateway. Devices are put into service by setting the
Administrative State to In Service in the Configuration menu for the device type. See
Configure Cameras and Streams in Chapter 20: Configure Video, & Storage, & Decoders for more information.
After a device in placed In Service, the Preprovisioned setting is no longer available. Use the Out of Service setting to remove a device from service.
3.1.1.1 AUTOMATIC LOG OFF
If the NLSS Gateway detects no activity in the NLSS Web Interface for 60 minutes, then the system automatically logs off the user who logged in last. This security feature prevents unattended interfaces from being available until the user manually logs out.
3.1.2 Remote Login
Logging into the system via the NLSS Web Interface is the same for remote users as for local users, except a VPN or another service is required to access the network on which the target NLSS Gateway is installed.
Once you are on the same network as the target NLSS Gateway, then you can enter the IP or MAC address of that Gateway into a browser, and log into the NLSS Web Interface using the Local Login instructions.
3.2 USING THE NLSS WEB INTERFACE
After logging in, the NLSS Unified Security Suite Web Interface is opened. The Web Interface provides access to the Security Suite features. Access to each feature is determined by permissions set for the user who is logged in. Users with unlimited permissions can access all menu options. See Roles and Users in Chapter 21:
Configuring Permissions for more information.
Mouse-over a button in the Web Interface to display a Tool Tip. Features are accessed through the Main Menu at the bottom of the window. The bottom
pane also contains two information boxes describing the current state of the system:
Current User: the user logged into this NLSS Web Interface session.
© 2009-2014 Next Level Security Systems, Inc. 29
Page 30
NLSS Unified Security Suite User Manual: v4.0 Using the NLSS Web Interface
Current User
Main Menu
Latest Event
Main Menu Module Options
Latest Event: the most recent event detected by the NLSS Gateway. The NLSS Web
Interface can play an audio alert notification when an event is detected.
3.3 MAIN MENU
The Main Menu contains three modules for using the NLSS Web Interface:
Operations Configuration Events
Operations and Configuration provide options that are displayed in the left column of the Web Interface.These modules and options are discussed later in this chapter and in the following chapters.
The Main Menu contains these additional options:
Volume: opens a slider to set the volume for audio played locally through the Web Interface when events occur.
Full Screen: toggles between full-screen and windowed modes.
Log off: ends your session in the NLSS Web Interface.
© 2009-2014 Next Level Security Systems, Inc. 30
Page 31
NLSS Unified Security Suite User Manual: v4.0 Using the NLSS Web Interface
Help: opens the on-line help system.
Transcode: adjusts resolution of the video displayed in the Web
Interface.
3.3.1 Operations
In the Operations menu in the left pane contains most of the functions that Operators of the NLSS system regularly need. Operator accounts are typically configured with permission to access everything under the Operations menu. After you click the Operations button, a series of options is displayed in the left pane under the Gateway’s name.
Media: a search-able catalog of audio and video files that the Gateway can play. See
Chapter 10: Media Operations for more information.
Cameras: controlling live cameras and accessing recordings. See Chapter 4:
Controlling Cameras for instructions.
•Decoders: pushing views and sequences in video streams to NLSS HD Decoders for
display on remote monitors. See Push Media Clips, Views and Sequences to
Decoders in Chapter 9: Displaying Video for instructions.
Doors: locking and unlocking doors manually, as well as running individual door
reports. See Chapter 6: Operations with Doors for instructions.
Cardholders/Users: tracing and deactivating individual cardholders, as well as
running individual cardholder reports. See Chapter 7: Operations with Cardholders
& Users for instructions.
Reporting: run reports that summarize events, etc. See Chapter 8: Operations with
Reports for instructions.
Views: create custom video display layouts, using one or multiple cameras or video
streams. See Chapter 9: Displaying Video for instructions.
Sequences: create automated progression of views to display when launched. See
Chapter 9: Displaying Video f or in st ructions.
Groups: access groups created in Configuration > Permissions > G roups. See
Chapter 14: Using Groups for instructions.
© 2009-2014 Next Level Security Systems, Inc. 31
Page 32
NLSS Unified Security Suite User Manual: v4.0 Using the NLSS Web Interface
3.3.1.1 SYSTEM HEALTH
System Health provides a quick overview of the load and activity on an NLSS Gateway. Monitoring System Health is important when running video analytics. Since Analytics can consume system resources, over usage can impact system performance. See Video
Analytics in Chapter 4: Controlling Cameras for more information.
1. Open the NLSS Gateway Web Interface.
2. Select Operations in the Main Menu.
3. Select the gateway’s nam e or IP address, at the top of the Operations options in the
left column. For example, GW4000-IP: 10.1.9.10.
The System Health pane is displayed. This panel can be accessed at any time by clicking on the Gateway’s name. A series of real time readouts and colored gauges summarize the Gateway’s health.
Color Cause
Green Operating within normal parameters. Yellow System is exceeding 70% of the RAM or processor capacity. Orange System is exceeding 80% of the RAM or processor capacity. Red System is exceeding 85% of the RAM or processor capacity.
Memory Usage: the amount of RAM, in MBytes, currently in use. The gauge also
indicates the total MBytes of RAM.
CPU Usage: the percentage of CPU currently in use. When the percentage reaches
80%, the gauge turns red to indicate a high usage that could impact performance.
© 2009-2014 Next Level Security Systems, Inc. 32
Page 33
NLSS Unified Security Suite User Manual: v4.0 Using the NLSS Web Interface
List Items Search
Previous/Next Page
Filters
Preview/Details Pane
List/Grid Pane
GPU Memory Usage: the percentage of the graphics processor currently in use.
When the percentage reaches 80%, the gauge turns red to indicate a high usage that
could impact performance.
Active Streaming: the number of video streams monitored by this Gateway.
Active Recording: the number of video streams of cameras that are currently set to
recording mode.
Active Video Analytics: the number of video analytics currently running on cameras
or video streams.
System Uptime: the length of time since the Gateway last was restarted, measured in
dddd:hh:mm.
Network Input/Output: the rate that the Gateway is receiving and sending out data.
Doors Online/Tot al: the number of doors currently available, as compared to the total
number of doors placed in service on the Gateway.
3.3.1.2 OPERATIONS WINDOWS
When the Operations > Media, Doors, Decoders, or Cardholders/Users options are selected, List and Preview or Details panes are displayed. The Cameras and Reporting options display a single pane with a list to drill down to the camera or report. Views, Sequences and Groups display the item selected under that option. Each Operations menu option is discussed in the chapters in P ar t 2: Opera tion s.
The list contains these standard features for each option:
Filter: click a button to display a pop-up dialog box containing filtering choices for the
list. See Filtering Operations Lists for instructions.
© 2009-2014 Next Level Security Systems, Inc. 33
Page 34
NLSS Unified Security Suite User Manual: v4.0 Using the NLSS Web Interface
Select All
De-select All
Filter
Search: enter text and click the check mark to find matching items. Clear the Search
field and click the check mark again to display all items.
List View: displays the items in a simple l i st.
Grid View: displays the items in a grid, with thumbnails. Note: The view options are only available for Media, Cameras and Cardholders/Users.
Previous/Next Page: provides navigation through multiple pages of items. These
buttons are grayed out if only one page of items is available.
List Item: accesses the selected item. Click on a list item to display that item.
Selected decoders and doors also display a mini-video player in the right pane, if
video is available. Selected cameras, views, and sequences also display video.
3.3.1.3 FILTERING OPERATIONS LISTS
An Operations list can be filtered.
1. Click a filter button to open a dialog.
De-select an option to hide the matching items in the list.
–Click Select All (check mark) to choose all options in the dialog.
–Click De-select All (circle) to hide items matching all options in this dialog box.
3. Click Close (X) to exit the dialog. To display all items again, open the filter dialog box and click Select All.
2. Check the items you want included in the list.
© 2009-2014 Next Level Security Systems, Inc. 34
Page 35
NLSS Unified Security Suite User Manual: v4.0 Using the NLSS Web Interface
3.3.1.4 SEARCHING A LIST
A filtered or non-filtered list can be se arch ed. Note: A search only runs on the items currently in the list. Items hidden because of
filtering are not included in the results.
1. Enter any text, such as part of a name, in the Search field.
2. Click Update (check mark).
3. To display all items again:
a. Clear the Search field.
b. Click Update.
3.3.2 Configuration
The Configuration menu allows users with Superuser permissions to configure everything in the system. Operators typically do not have permission to access options under the Configuration menu.
The Configuration menu provides the following options:
Global: provides options for configuring the Gateway, and events. See Chapter 17:
Global Configurations for instructi ons.
Identity: provides options for configuring cardholders and access levels. See Chapter
18: Configure Identity and Credentials for instructions.
Access Control: a premium features that provides options for configuring access to
doors and other entries that are monitored by your NLSS system. See Chapter 19:
Configure Access Control for instructions.
Video: provides options for configuring installed cameras, NLSS HD Decoders, and
external storage devices. See Chapter 20: Configure Video, & Storage, &
Decoders for instructions.
Permissions: create Groups, Roles, and Users.
Intrusion: configure the Gateway to work with Panels, Areas, Devices, and Zones.
See Chapter 11: Oper ations with Input Devices and Chapter 12: Operations with
Output Devices for more information.
Face Recognition: set up for an add-on video analytic. See Chapter 22:
Configuring and Using Face Recognition for instructions.
Licnese Plate Recognition: set up for an add-on video analytic. See Ch apt er 23:
Configuring and Using License Plate Recognition for instructi ons.
© 2009-2014 Next Level Security Systems, Inc. 35
Page 36
NLSS Unified Security Suite User Manual: v4.0 Using the NLSS Web Interface
3.3.3 Events
The Events menu provides a timeline of all system events in an Event Log view. Superusers and users with Operator permissions typically have access to everything under the Events menu. For details, see Chapter 15: Monitoring and Handling Events.
3.3.4 Full Screen Toggle
The Full Screen toggle in the Main Menu hides the browser’s borders to allow the RMS interface to fill the screen. All functions are available in Full Screen mode.
Click the Full Screen toggle in the Main Menu.
Click the Full Screen toggle again, or press Esc, to restore the browser’s boundaries. Note: The NLSS Web Interface also exits Full Screen mode when go to another window.
3.3.5 Log off
Click Logoff in the Main Menu to close the current RMS session. The Login window is dis played.
3.3.6 Help
The NLSS Unified Security Suite includes a help system to provide detailed configuration and operation instructions for the local Gateway interface.
•Click Help in the Main Menu. The help system is displayed in a new tab.
3.3.7 Transcode
All video displayed through the Web Interface can be set to a lower resolution if bandwidth usage becomes an issue. A maximum resolution of 1080p can be transcoded.
Note: This button is hidden when the video player is displayed.
•Click Transcode in the main menu before opening a video player. The frame rate, bit rate and resolution are adjusted to alleviate bandwidth issues. Only the
video being displayed reflects the setting. The setting does not impact recorded video. The camera icon in the transcode button becomes smaller to reflect the lower resolution.
•Click Transcode again to return to the camera setting for the video.
Important: Selecting these settings at in the main menu impacts all video displayed in
© 2009-2014 Next Level Security Systems, Inc. 36
this session, but does not impact the video displayed in the Web Interface for other users.
Page 37
NLSS Unified Security Suite User Manual: v4.0
PART 2:OPERATIONS
Part 2: Operations includes instructions and background information for using the options under the Operations module.
A Web Interface User’s access to these options is dependent on the permissions assigned to the role associated with the user. Permissions and roles are discussed in Chapter 21:
Configuring Permissions.
Chapter 4: Controlling Cameras - provides instructions for using the built-in video
player, and the video analytics and forensics. Among the analytics are activity
detection and face recognition.
Chapter 5: Operations with Video Analytics - provides instructions for configuring
and using video analytics available through the video player.
Chapter 6: Operations with Doors - provides instructions for monitoring a door’s
status, remotely unlocking a door, and associating a camera with a door.
Chapter 7: Operations with Cardholders & Users - provides instructions for viewing
cardholder and user information, and activating and deactivating cardholders.
Chapter 8: Operations with Reports - provides instructions for configuring, running
reports, printing and saving.
Chapter 9: Displaying Video - provides instructions for displaying video from multiple
cameras using views and sequences.
Chapter 10: Media Operations - provide instructions for using the Media Library,
including how to download video clips to a local computer.
Chapter 11: Operations with Input Devices: provides instructions for using input
devices, and associating cameras to those devices.
Chapter 12: Operations with Output Devices: provides instructions for using
activating and deactivating output devices, and associating cameras to those devices.
Chapter 13: Using Floor Plans - provides links to configuration instructions for floor
plans.
Chapter 14: Using Groups - provides an overview of how groups work, plus
instructions for using groups, and creating and using maps and floor plans.
Chapter 15: Monitoring and Handling Events - provides instructions for accessing
events, and using the Event Log to review the incidents that triggered an event.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 37
Page 38
NLSS Unified Security Suite User Manual: v4.0
Chapter 4: Controlling Cameras
This chapter provides instructions for controlling individual security cameras, as well as RTSP streams from local video files and HTTP streams from the web using a server push.
4.1 SELECTING CAMERAS
Cameras and video streams can be viewed and configured for monitoring from the Cameras menu. These cameras and video streams are discovered by the NLSS Gateway.
An embedded video player displays a camera or video stream when the camera or stream is selected.
Access to a camera’s operations and configurations, in general, is controlled by permissions. Access to specific, pre-configured cameras can be controlled by groups. See
Chapter 21: Configuring Permissions for more information.
To be discovered, a camera or encoder:
Must be physically attached to the same sub-network as the Gateway.
Must be turned on. Starting with NLSS Security Suite v3.1 and later, Verint encoders are also automatically
discovered, if the device is on the same LAN as the Gateway, and the default port setting is used. Each encoder stream is displayed separately.
Streams from cameras and Verint encoders on other networks can be added. See
Configure Cameras and Streams in Chapter 20: Configure Video, & Storage, & Decoders for instructions on adding streams.
Important: Discovering a camera is not enough to view its video streams. To see video,
the system must connect to the camera, which requires configuring the Gateway to use the camera’s user name and password, and setting the Admin State to In Service. See Configure Cameras and Streams in Chapter
20: Configure Video, & Storage, & Decoders for configuration instructions.
•Select Operations > Cameras from the Main Menu of the NLSS Web Interface.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 38
Page 39
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
List View
Grid View
A list of discovered cameras, RTSP and HTTP video streams is displayed.
The NLSS Web Interface displays these video streams, and can push them to remote monitors supported by NLSS HD Decoders.
The list has two viewing options:
Grid view: displays a thumbnail of the camera’s stream. The thumbnail updates
automatically.
List view: displays the camera’s name and icon. The NLSS Gateway supports many camera features, as listed in this chapter. However,
some cameras do not support the same features. For example, not all cameras have audio or Pan-Tilt-Zoom (PTZ) capabilities. Some cameras also may have features that are not supported by the NLSS Gateway at this time.
Note: Only users with Superuser or the appropriate permissions can configure cameras.
See Chapter 21: Configuring Permissions for more information.
In the Cameras list, the icon displayed next to each camera’s name indicates the operational state of the camera.
© 2009-2014 Next Level Security Systems, Inc. 39
Page 40
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
4.1.1 Camera Icons
Camera icons vary according to the camera model, such as these examples.
The Streaming symbol indicates an RTSP or HTTP video stream.
Green LED: indicates the system is successfully connected to the camera.
Yellow LED: not connected/off line.
Red LED: indicates that the camera is currently recording.
Blue LED: indicates that analytics are running.
A blue LED in a window in an RMS system indicates a peer-to-peer connection
between the camera and Gateway. The video signal bypasses the RMS server.
•Red X: indicates a previously established connection with this camera has been lost.
Spinning animation: indicates the system is attempting to connect with the camera.
4.1.2 Filtering the Camera List
The Camera List can be filtered to only display cameras meeting specified search criteria. See Filtering Operations Lists for more information.
Use these buttons to filter the list. One or more options can be used to filter the list:
Connection State: Connected, Connecting, Not Connected Active Recording: All, Active, Inactive Active Analytics: All, Active, Inactive PTZ: All, Yes, No Admin State: In Service, Out of Service, Preprovisioned
© 2009-2014 Next Level Security Systems, Inc. 40
Page 41
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
4.1.3 Video Player
The Video Player is used to operate the camera, and view recorded video.
Click the corresponding link to select a camera or video stream.
The NLSS Web Interface video player is displayed.
The video player contains a series of fields and options.
The name of the camera or stream.
Links to Events and Reports for that camera or stream.
Buttons to control and configure the video and the player.
See Using the Camera Toolbar for instructions on using the video player.
© 2009-2014 Next Level Security Systems, Inc. 41
Page 42
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
4.2 MONITORING CAMERAS
The ability of the NLSS system to display video in a web browser is intended to aid investigations with video surveillance, but is not intended to provide constant, long-term surveillance. Due to the complexities and shortcomings of various web browsers, NLSS cannot guarantee the performance, stability, or functionality of video displayed in a web browser. For displaying video constantly over long periods, add one or more NLSS HD Decoders in your system.
Monitor Cameras from the Operations Menu
Using the Camera Toolbar
Additional Camera Controls
4.2.1 Monitor Cameras from the Operations Menu
Camera streams can be displayed from three locations under the Operations menu in the NLSS Web Interface:
Operations > Cameras
Select from the camera list and open the video player, as described in Selecting
Cameras.
If the camera outputs more than one stream, and these streams are enabled,
select a stream from the drop-down list above the video player. Streams are enabled when the camera is configured.
Use the toolbar under the video player to control the selected camera. See Using
the Camera Toolbar.
Operations > Views/Sequences
Select View or Sequence to launch a user-configured display of one or multiple
cameras or video streams. See Chapter 9: Displaying Video for instructions on configuring and using Views and Sequences.
Optionally, you can push streams to remote monitors via the NLSS HD Decoders in your system. See Push Media Clips, Views and Sequences to Decoders for details.
© 2009-2014 Next Level Security Systems, Inc. 42
Page 43
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
PTZ (Pan, Tilt, Zoom)
Digital Zoom
Output Contact
Video Analytics
Rewind
Date & Time Selection
Rewind and Fast Forward
24-Hour Timeline
1-Hour Timeline
Play/Pause
Clip Export Start Bracket
Clip Export End Bracket
Live/Archive Toggle
Camera Events Toggle
Talkback (Local Microphone Control)
Export JPG
Export Video
Event Bookmark
Volume / Mute
Full Screen Toggle
Detail Zone
Video Information
Select a Stream
Back
Play Audio
Camera Event Log
Camera Reports
Play heads
Device
Stream Player Status Video Date an d Tim e
4.2.2 Using the Camera Toolbar
The Camera Toolbar controls the video player, and the camera or video stream displayed in the video player. The video player is opened by clicking on a thumbnail or item in the camera list.
The toolbar appears under the embedded video player for both live and recorded video. The toolbar contains video information, a series of controls, and a timeline. Specific tool bar operations can be controlled by permissions. See Chapter 21:
Configuring Permissions for more information..
4.2.2.1 VIDEO INFORMATION
The camera toolbar provides the information about the video playing for the selected camera, whether it is live or recorded.
Device Name: the name assigned to the camera or stream when it was configured.
See Camera Details General Tab in Chapter 20: Configure Video, & Storage, &
Decoders.
© 2009-2014 Next Level Security Systems, Inc. 43
Page 44
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
Stream: the stream currently displayed, as selected from the drop-down list above the
video player. See Select a Stream in Chapter 20: Configure Video, & Storage, &
Decoders.
Note: Some cameras output multiple streams simultaneously. Each stream can be set to
a different codec or resolution, via the camera.
Date: the date of the video that is playing.
Time: the time of day of the video that is playing.
Status: what the video player is currently doing: play, rewind, fast forward, etc.
4.2.2.2
The Play/Pause button is active only if the selected camera has been configured to record and a recording is currently playing in the video player. You cannot pause a live camera.
1. Open a camera or stream in the video player, and use the Live/Archive Toggle in the
2. In the toolbar, select the time to start playback using the Date & Time Selection
3. Toggle between Play and Pause to start and stop playback.
4.2.2.3
The Live/Archive toggle button is active only if the selected camera has been configured to record.
The Live/Archive toggle turns green when the displayed video is live. The button turns red when playing a recorded stream.
1. Open the video player for a camera or stream.
2. In the Camera Toolbar, select the time to start playback with the Date & Time
P
LAY/PAUSE
toolbar to play recordings made from this camera instead of the live view.
buttons, the Timelines, and the Rewind and Fast Forward buttons.
L
IVE/ARCHIVE
Selection button, the Timelines, the Rewind and Fast Forward buttons, or Rewind
and Fast Forward buttons.
TOGGLE
3. Click Play and Pause to start and stop playback.
4. To return to the live video stream, click the Live/Archive toggle button.
4.2.2.4 REWIND AND FAST FORWARD
The Rewind and Fast Forward buttons are active only if the selected camera is configured to record. Rewind only goes as far back as recorded video has been saved.
1. Click Play/Pause in the toolbar to play recordings made from this camera.
2. In the toolbar, use the Date & Time Selection buttons, the Timelines, or both, to
select the day and time to rewind to.
3. Use the Rewind and Fast Forward buttons to move through the video.
© 2009-2014 Next Level Security Systems, Inc. 44
Page 45
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
Note: Click the Rewind and Fast Forward buttons repeatedly to cycle between 0.5x,
2x, 5x, 10x, and 50x speed. The amount of video that the play head moves depends on the frame rate at which the video was recorded.
4. Click Play/Pause at any time to start and pause playback.
4.2.2.5 DATE & TIME SELECTION
The Date & Time selection button is active only if the selected camera is configured to record, and the recordings are saved as far back in time as requested. This setting allows selection of video for playback or export. See Export Video for instructions.
1. Click Date & Time .
The Time & Date dialog is displayed.
The dates marked with green are the days on which recordings were made.
2. Click the desired date in the calender.
3. Use the up and down arrows to select the time of the recorded video.
The Timelines in the toolbar update to reflect the new date and time, as does the
playback in the video player. Note: The timeline is updated only if the camera has been set to record, and recordings
on the target date and time have been saved.
4. Use the playback controls to view the video.
5. Click the Live/Archive Toggle to return to live video. The button turns green
when live video is displayed.
4.2.2.6 CAMERA EVENTS TOGGLE
Event markers can be displayed or hidden in the timeline.
Click the Camera Events Toggle to hide or display events markers.
4.2.2.7 EVENT BOOKMARK
A bookmark is a manually defined event.
1. To manually add an event to the timeline, click Bookmark in the Camera Toolbar.
A Bookmark event is added to the event lists for this camera or stream, as well as the
entire system.
2. Optionally in the Camera Event Log win dow, open Event Notes for the book marked
event that you just set, and enter notes about the event.
© 2009-2014 Next Level Security Systems, Inc. 45
Page 46
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
Virtual Joystick
Update
Home
Preset Patrol
Zoom
4.2.2.8 PTZ (PAN, TILT, ZOOM)
Cameras that support PTZ or just zoom can be controlled from the NLSS Web Interface. The controls function like a joystick for the selected camera, if that camera supports PTZ.
1. Click PTZ to display pan, tilt, and zoom controls.
Pan and Tilt: click and drag anywhere over the video stream within the video
player, and drag the mouse. The cursor becomes a small hand. As an alternative, click-hold the virtual joystick and move it. If the camera is capable of pan and tilt movements, it follows the mouse
movements. – Zoom: click and drag the vertical zoom slider to zoom the camera. – Preset: saves the current po sit ion of the sele cted camera . See Using Prese ts for
more information. – Patrol: organizes two or more presets into a Patrol. When the Patrol is activated,
the camera moves to the first preset, holds that position for a configured time then
moves to the second preset, and continues to cycle through the presets. See
Accessin g Pa t r ols for more information.
2. Click PTZ again to hide the controls.
4.2.2.8.1 Using Presets
A preset saves the current position and zoom settings of the selected PTZ camera. Using the NLSS Web Interface, you can create, save, edit, and use numerous custom presets, as well as one Home preset.
1. Select Operations > Cameras.
2. Select a PTZ-enabled camera.
3. Click PTZ in the toolbar. After PTZ is accessed, presets for that camera can be configured:
© 2009-2014 Next Level Security Systems, Inc. 46
Page 47
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
Create and Use a Home Preset Create Custom Presets Use Custom Presets Edit Presets Delete Presets
REATE AND USE A HOME PRESET
C
1. Move and zoom the camera to the desired position for a Home preset.
2. Click Update to set this position as the Home preset.
At any time, you can move the camera to the Home preset by clicking Home.
REATE CUSTOM PRESETS
C
In addition to a Home preset, custom presets can be added.
1. Move and zoom the camera to the desired position for the first preset.
2. Click Preset in the upper left to display the Add button in the middle of the window).
3. Click Add to dis pla y the Add PTZ Preset dialog.
4. In the dialog, enter a unique Preset Name and Preset ID number.
5. Click Update ( ) next to the preset to save the new setting. Click the Cancel butt on (red X) to ignore the setting and close the dialog.
6. Repeat the steps above to create additional Presets.
7. Click Preset again to hide the Add button.
The PTZ Preset List for that camera is displayed under the Presets button.
U
SE CUSTOM PRESETS
1. Click Preset to display the PTZ Preset List.
2. Click a preset to move the camera to the desired position.
E
DIT PRESETS
1. Move and zoom the camera to the desired new position.
2. Click Preset to display the PTZ Preset List.
3. In the PTZ Preset List, click Update next to the preset you wish to update. The preset is updated with the current position of the camera.
© 2009-2014 Next Level Security Systems, Inc. 47
Page 48
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
Note: The previous preset is lost when you click Update.
D
ELETE PRESETS
1. Click Preset to display the PTZ Preset List.
2. Click the Trash Can next to the setting to be deleted from the list.
4.2.2.8.2 Accessing Patrols
When you activate a Patrol, the camera moves from one preset to the next in a defined order, pausing at each position for a configured time. Use the NLSS Web Interface, to create, save, edit and use custom Patrols.
1. Select Operations > Cameras.
2. Select a PTZ-enabled camera.
3. Click PTZ in the toolbar to access the Patrol functionality. From the PTZ window, Patrols for the camera can be configured: – Create Patrols Use Existing Patrols Delete Patrols
C
REATE PATROLS
1. Click Patrol in the upper left to display the Add button in the middle of the window).
2. Click Add to displa y the Add PTZ Patrol dialog.
3. In the dialog, enter a Patrol Name and Patrol ID.
4. Click Update ( ) to save the new Patrol. –Click Cancel (red X) to ignore the setting and close the dialog.
ONFIGURE AND EDIT PATROLS
C
After a Patrol is created, it must be configured. The same procedure is used to edit a Patrol.
1. Click Patrol to refresh the list.
2. Click the desired Patrol.
© 2009-2014 Next Level Security Systems, Inc. 48
Page 49
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
Presets
Presets
The Edit PTZ Patrol dialog is displayed. A list of presets is displayed as icons in a vertical column. A blank horizontal column at the bottom of the dialog. Using these columns, presets can be added, removed and reordered for a Patrol.
To add a preset to the Patrol, drag that preset’s icon from the vertical column to
the horizontal column.
To reorder the presets in a Patrol, drag the preset icons in the horizontal list into
the desired order.
To remove a preset from a Patrol, drag that preset’s icon out of the horizontal list.
3. By default, the camera pauses for 5 seconds at a preset, before moving to the next preset in the list. To change this time:
a. Click the desired preset in the horizontal list. The Edit PTZ Patrol Item dialog is
displayed. b. Enter the new pause time (in seconds). c. Click Update ( ) to save the new Patrol.
»Click Cancel (X) to ignore the setting and close the dialog.
U
SE EXISTING PATROLS
1. Click Patrol to display a list of existing Patrols.
2. Click the desired Patrol in the list to activate that patrol.
ELETE PATROLS
D
1. Click Patrol to display a list of existing patrols.
2. Click the Trash Can next to a Patrol to delete it.
4.2.2.9 VIDEO ANALYTICS
A video analytic recognizes certain movements and behaviors within a video stream. When set thresholds are exceeded, an event is triggered.
See Chapter 5: Operations with Video Analytics for instructions on configuring and using video analytics.
© 2009-2014 Next Level Security Systems, Inc. 49
Page 50
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
4.2.2.10 AUDIO ANALYTICS
If a camera has a built-in or attached microphone, audio analytics can be applied. When an Audio Analytic is activated for a camera, the Gateway analyzes detected
sounds, then compares it to sounds that can trigger an event. If a match is made, an event is generated.
By default, the NLSS Gateway includes an Audio Analytic for glass break. Other audio analytics are available as a premium feature enabled by a token. See Chapter 24: Configuring Audio Analytics for instructions on configuring and using
audio analytics.
4.2.2.11 DIGITAL ZOOM
1. Click Digital Zoom. The Magnifying Glass tool is opened.
2. Move the zoom slider up and down to zoom in and zoom out in the video player.
3. Drag the Magnifying Glass to move the display.
4. Click Digital Zoom again to close the Magnifying Glass tool.
Note: The Digital Zoom does not move the camera or operate its zoom function. This
tool only changes the video player’s display.
4.2.2.12 OUTPUT CONTACT
Devices such as door locks, alarms, or flashing lights can be operated from a contact switch on a camera. This switch can be triggered from the video player.
•Click Output Contact to enable the camera’s output port for five seconds.
The output triggers a contact switch which can be used to trigger an alarm or warning light, or lock or unlock a door.
4.2.2.13 PLAY AUDIO
Sound effects and audio warnings can be played through a speaker attached to a camera, if available. An audio file can be associated with a camera using Configuration >Global >Actions.
This audio can be triggered manually from the video player, or automatically using Event Linkages. See Configure Actions and Configure Event Linkages in Chapter 17 :
Global Configurations for instructions on automatic triggering.
Manual triggering is used when the user watching a camera observes an event or behavior that requires a warning.
1. Open a camera or stream in the video player.
2. Click Play Audio.
The audio files are included with the Web Interface. See Chapter 10: Media Operations for more information.
© 2009-2014 Next Level Security Systems, Inc. 50
Page 51
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
4.2.2.14 TALKBACK (LOCAL MICROPHONE CONTROL)
The NLSS Gateway supports full duplex audio. The toolbar contains a slider that controls the volume of your local microphone to the camera speaker.
1. Select a camera or stream and open the video player.
2. Click Talkback in the toolbar.
3. Drag the slider up and down to increase or decrease the local microphone’s volume through the camera’s speaker.
4.2.2.15
The NLSS Gateway supports full duplex audio. The toolbar contains a slider that controls the volume of the computer’s speaker.
1. Select a camera or stream and open the video player.
2. Click Volume Control.
3. Drag the slider up and down to increase or decrease the speaker volume.
V
OLUME
/ M
UTE
4.2.2.16 EXPORT JPG
A snapshot of a video clip can be grabbed from the toolbar. The video can be live or recorded.
1. Select a camera and open the video player. – If you want an image of a recorded clip, navigate to the location in the timeline.
2. Click Export JPG. A dialog is displayed.
3. Follow the prompts to save the picture.
4.2.2.17 EXPORT VIDEO
A clip from a recording can be exported if the selected camera or stream is configured to record, and the target recording period has been saved. The file is sent to the Media Library. The file also can be saved to the local computer.
1. Select a camera and open the video player.
2. If the time and date of the clip are not known, use the Date & Time Selection, the
Timelines, and the 1-Hour Timeline to locate the clip.
3. Click Export Video.
© 2009-2014 Next Level Security Systems, Inc. 51
Page 52
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
A dialog is displayed to set the date and time range of the clip to be exported.
If the time and date of the clip are not known, use the Date & Time Selection, the
Timelines, and the 1-Hour Timeline in the player to locate the clip.
4. Set the Start and End date and time.
Important: A maximum of four hours of video can be exported in one clip.
Although export can be simultaneously run on multiple cameras, exporting several large files at the same time can impact Gateway performance.
5. Enter a Name for the clip. The default file name is the name of the camera. Change the file name. If the default
file name is used, it overwrites previous files with the same name.
6. In the Export dialog, click Yes to start the export. –Click No to cancel the export. An icon in the Main Menu indicates that the export in underway.
© 2009-2014 Next Level Security Systems, Inc. 52
Page 53
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
24-Hour Timeline
1-Hour Timeline
7. When the export is complete, the browser displays a pop-up window or dialog box, depending on the browser. The clip can be downloaded and saved locally. Follow the prompts to download the clip.
Note: If the Gateway is accessed via the RMS Sites map, the clip is placed in the
Gateway’s Media Library to be transferred to the RMS Media Library for exporting. See Export a Video Clip in Chapter 27: NLSS Remote M anagement Services for more information.
When the export is complete, the clip is automatically saved in the Gateway’s Media Library. See Chapter 10: Media Operations for more information.
4.2.2.18
You can hide the menus and tab to enlarge the video player fill the browser screen.
Click the Full Screen toggle to switch between full screen and the menu view.
4.2.2.19
In the NLSS Web Interface, a pair of timelines are located at the bottom of the toolbar, under the embedded video player: a 24-Hour Timeline and a 1-Hour Timeline.
F
ULL SCREEN TOGGLE
T
IMELINES
4.2.2.19.1 24-Hour Timeline
The lower timeline shows the 24-hour period of the current day, or an earlier date if the video is from an earlier date.
The 24-hour timeline includes:
•A Detail Zone is a transparent blue box that can be moved with the mouse to select a specific hour. The time period you select determines the location of the 1-Hour
Timeline in the top portion of the timeline.
The brackets are not displayed unless the system contains recorded video for that camera.
© 2009-2014 Next Level Security Systems, Inc. 53
Page 54
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
Available Streams
The Time Indicator is a cursor that can be moved to an earlier hour on the 24-hour timeline, triggering a recording to playback from that time.
Small vertical markings at the times that events were recorded with this camera. The color of the markings indicates the type of event.
4.2.2.19.2 1-Hour Timeline
The upper timeline shows the 1-hour period selected with the Detail Zone in the lower slider. The 1-Hour timeline is a more precise version of the timeline in the 24-hour slider.
The exact start and end times of the 1-hour timeline are displayed at either end of the slider.
Drag the Time Indicator to an earlier time to play back a recording from that time. This feature is only available if the camera or stream is configured to record.
Adjust the Start and End brackets (left and right) to set a time interval for saving a clip as a separate video file, in a standard format. For details, see Export Video.
4.2.3 Additional Camera Controls
Additional controls for cameras appear above the embedded video player for the selected camera.
4.2.3.1 SELECT A STREAM
Some cameras simultaneously output more than one stream. Streams may have different codecs or resolution settings, or both. If a camera supports multiple streams, and the NLSS Web Interface is configured to handle more than one stream from that camera, then a stream can be selected to display in the video player.
A stream must be enabled in the Streams tab of the Configuration > Video > Cameras window. See Camera Details Stream Tab for instructions.
1. Select the desired camera from the Cameras menu. Above the video player, buttons are displayed for the available camera streams. The
streams are numerically labeled, such as Stream 0, Stream 1, etc.
2. Open the drop-down menu and select a stream to play it in the video player. A green LED next the menu item indicates the selected stream.
The selected video stream is displayed. The drop-down and the Stream field in the toolbar list the selected stream.
© 2009-2014 Next Level Security Systems, Inc. 54
Page 55
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
4.2.3.2 LOW RESOLUTION/NATIVE RESOLUTION
If bandwidth becomes an issue for displaying video, the displayed video can be transcoded to display at a lower resolution.
Note: This button is hidden when the video player is displayed.
•Click Transcode in the main menu before opening a video player.
The Gateway adjusts the frame rate, bit rate and resolution to alleviate bandwidth issues. The quality of the video also reflects the setting.
The camera icon in the transcode button becomes smaller to reflect the lower resolution.
•Click Transcode again to return to the camera setting for the video.
Important: Selecting these settings impacts all displayed video from the Gateway.
If the Gateway is accessed through RMS, only the video displayed from the selected Gateway is changed. The video displayed from the other Gateways is not effected.
4.2.3.3 CAMERA EVENT LOG
1. Click Operations >Cameras.
2. Select a camera or video stream.
3. Click Events in the top bar of the video player. The Reports or Events pane for the selected camera or video stream is displayed. See Chapter 15: Monitoring and Handling Events for instructions on using events.
4. Click Return to go back to the video player.
4.2.3.3.1 Camera Events
The following types of events are associated with a camera or stream:
Video Analytics that are set up for this camera or stream.
Event Bookmark that is manually set up for this camera or stream.
The operational status reported by this camera or stream, such as going online or offline, video or channel loss, video resumed or bookmarked, clip or video exported successfully or not.
Motion Event as set up through the camera.
Input Port as set up through the camera.
An Event Log related to this camera or stream can be displayed. See Camera Event Log. Also, buttons of events related to this camera appear within the Timelines under the video player, offering quick access to Playback Events.
© 2009-2014 Next Level Security Systems, Inc. 55
Page 56
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
4.2.3.3.2 Motion Event
Some cameras are designed to generate an event when motion is detected. The NLSS Gateway can accept this event from many cameras, and lists that event with other events. This event is configured within the camera, not in through the NLSS Web Interface.
4.2.3.3.3 Input Port
Some cameras contain an input port that generates an I/O Event when triggered. The NLSS Gateway can accept this event from many cameras, and lists that event with other events. This event is configured within the camera, not in through the NLSS Web Interface.
4.2.3.3.4 Viewing Events from the Timeline
Events are marked in the timeline for each camera.
1. Click the Camera Events Toggle if event markers are not displayed in the toolbar.
2. Click the event marker in the timeline. An Event dialog is displayed in the video player. This dialog can be dragged to other
locations in the player window. The dialog appears in the same location when accessed for subsequent events.
3. In the dialog:
Click Lock to prevent the event from being groomed (deleted). The event is added to the lock queue in the Events module, and cannot be deleted until it is unlocked. See Configure Groomer Settings for more information about grooming stored video.
Click Play to replay the event in the video player.
Click Snapshot to take a screen shot of the event. Pause the playback in the timeline to get the exact moment to be captured.
Click Save to make a copy of the video for the event. The clip is downloaded to the local hard drive on which the web interface is being accessed.
The Event dialog can stay open while live video continues to play.
4. Click the event marker. The timeline cursor is placed at that location, and recorded video is played, as
indicated by the red Live/Archive Toggle in the timeline.
5. Click Close to exit the dialog.
6. Click the toggle again to return to live video, indicated by the green toggle.
© 2009-2014 Next Level Security Systems, Inc. 56
Page 57
NLSS Unified Security Suite User Manual: v4.0 Controlling Cameras
4.2.3.3.5 Playback Events
If the camera is set to record, then video can be played back from the time of the event.
1. Select a camera or stream and open the video player.
2. In the 1-hour timeline of the Camera Toolbar, double-click the desired event marker. The video that triggered the event is played in the video player.
Note: If no event icons are displayed in the timeline, click the Camera Events Toggle in
the toolbar to ensure that the icons are displayed.
4.2.3.4 CAMERA REPORTS
1. Click Operations >Cameras.
2. Select a camera or video stream.
3. Click Reports in the top bar of the video playe r. The Reports pane for the selected camera or video stream is displayed. See Chapter 8: Operations with Reports for instructions on using reports.
4. Click Back to go back to the video player.
4.2.3.5 BACK
Click Back in the upper right corner of the player to return to the camera list.
© 2009-2014 Next Level Security Systems, Inc. 57
Page 58
NLSS Unified Security Suite User Manual: v4.0
Chapter 5: Operations with Video Analytics
This chapter provides instructions for setting up and using video analytics. A video analytic recognizes certain movements and behaviors within a video stream.
When set thresholds are exceeded, an event is triggered.
5.1 PARAMETERS
The NLSS Unified Security Suite provides video analytics. You can configure multiple video analytics for each camera, but run only one analytic on a camera at a time. The total number of video analytics that can run across your system is platform dependent.
NLSS analytics can only be used if the video streams are no more than1080p. Video analytics are the most processor intensive operations in the system, and therefore
the number of analytics that run simultaneously is limited. Different analytics require different levels of processing power.
The system performance requirements of video analytics vary, depending upon the behavior, scene, activity in a scene, shadows, specific camera, frame rate, bit rate, etc.
A baseline level of 1 (one) is used to measure the impact of a video analytic behavior on the system.
This table shows the relative impact level of different analytics. A lower Metric Level indicates less impact on the system’s processing.
Metric Level Video Analytic
.5 Transcode
One transcode is requi red for each M PEG4 encod ed video st ream that is viewed via the browser.
1 Activity
Direction Face Capture License Plate Capture Line Crossing People Count People Count Direction Perimeter
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 58
Page 59
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
Metric Level Video Analytic
2 Dwell
Face Recognition Forensics (except those noted below) License Plate Recognition Object Moved Object Taken
3 Forensic Face Recognition
Forensic License Plate Recognition
The total number of Metric 1 video analytics that can be supported is determined on a per platform (NLSS device) basis.
See Appendix A: Performance and Setup Guidelines: Video Analytics, Face
Recognition, and License Plate Recognition for recommendations and performance
guidelines for running Video Analytics.
Important: The optimal setting for Video Analytic success is 15 frames per second. If the
camera is set to a lower frame rate, the Video Analytic accuracy is compromised. If too many Video Analytics are configured, the system automatically decreases Video Analytic frame processing in order to maintain total syst em reliability. The Video Analytic accuracy then decreases.
When an analytic detects an event for which it is looking, an event is generated in the timeline. Camera events are discussed in Camera Event Log in Chapter 4: Controlling
Cameras.
5.2 USING VIDEO ANALYTICS
1. Open the Cameras menu and select a camera or streaming video. The camera’s video stream is displayed in the video player in your browser.
2. Click Analytics. The Video Analytics Configuration overlay is displayed with the Video Analytics
Configuration list and Video Forensics Queue. – The Video Analytics Configuration list contains the analytics set for this camera.
From this list, you can edit, play or pause, or delete an analytic. You can also send an analytic to the Video Forensics Queue.
The Video Forensics Queue lists the analytics that have been tagged for further
analysis. See Video Forensics.
© 2009-2014 Next Level Security Systems, Inc. 59
Page 60
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
–Click Analytics in the toolbar again to hide these overlays.
3. Click Add Video Analytics (
) at the top of the list to attach an analytic to a camera.
+
The Video Analytics options pop-up menu is displayed.
4. Click the desired video analytic. The analytic is added to the Video Analytic Configuration list.
The video analytic options are discussed in the following sections. – Activity Direction Dwell Face Recognition License Plate Capture and License Plate Recognition Line Crossing Object Moved Object Taken People Count People Count Directional Perimeter
© 2009-2014 Next Level Security Systems, Inc. 60
Page 61
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
5. Click an analytic in the list to select it to configure.
Click Edit to configure or edit the analytic. The parameters vary between the video analytic options. Sensitivity is set for all analytics. The higher the number, the more likely the analytic is to trip and generate an event.
Click Save to keep the settings.
Click Cancel to leave edit mode without saving the changes.
Click Start to activate the analytic. Only one analytic can run for a camera at one time.
Click Stop to stop the analytic for running on that camera.
Click Hide to hide the Video Analytic Edit dialog.
Note: The defined detection area for the following analytics needs to be bigger than
50% of the detected object size in order to trigger event. For example, if a person takes up 100 pixels on the screen, the Line Crossing detection line needs to be 50 pixels long when configured for the analytic.
Activity Line Crossing People Count Directiona l
Direction People Count
•Dwell •Perimeter
5.2.1 Activity
Activity detects movement within a selected area. Use edit mode for this analytic to draw the area to be monitored.
1. Click Edit for Activity in the Video Analytics Configuration list. The video player is displayed with an Activity Zone highlighted. By default, a
rectang ular area is selected.
2. Drag the rectangle to move it to the area that you want to monitor.
© 2009-2014 Next Level Security Systems, Inc. 61
Page 62
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
3. Drag the rectangle’s corner points to resize and reshape it to set the area to be monitored.
4. Adjust the Sensitivity slider to set the threshold of this video analytic. Higher values make this video analytic more sensitive to small movements and small objects.
5. Click Save to keep the changes.
6. Click Start to activate this video analytic. If someone (or something large enough) moves through the rectangle, a video analytic event is generated.
5.2.2 Direction
Direction detects movement toward a specific area within the video stream. The direction is defined by drawing a directional line in the video player.
1. Click Edit for Direction in the Video Analytics Configuration list. The video player is displayed containing a line with an arrow indicating the direction in
which movement is monitored.
2. Drag the line to move its location in the video stream.
© 2009-2014 Next Level Security Systems, Inc. 62
Page 63
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
3. Drag the end point (green LED) to change the direction and distance of a movement needed to trigger the analytic.
4. Adjust the Sensitivity slider to set the threshold of this video analytic. Higher values make this video analytic more sensitive to small movements.
5. Click Save to keep the changes.
6. Click Start to activate this video analytic. A video analytic event is generated if a movement is detected for the set direction and distance.
5.2.3 Dwell
Dwell detects when an object or a person moves into a monitored location and stays longer than a designated time.
1. Click Edit for Dwell in the Video Analytics Configuration list. The video player is displayed with a Dwell Zone highlighted, a rectangle by default.
2. Drag the rectangle to move the shape to the area that you want to monitor.
© 2009-2014 Next Level Security Systems, Inc. 63
Page 64
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
3. Drag the corner points of the rectangle to resize and reshape it to select the area to be monitored.
4. Adjust the Sensitivity slider to set the threshold of this video analytic. Higher values make this video analytic more sensitive to the lack of movement.
5. Adjust the Dwell Time slider to set the length of time, in seconds, to pass before an event is generated because someone stayed in the designated zone for too long.
6. Click Save to keep the changes.
7. Click Start to activate this video analytic. If a person or object stays in the Dwell Zone for longer than the set threshold, a video analytic event is generated.
5.2.4 Face Capture
Face Capture records all clearly visible faces as events. The faces can be seen later by displaying the events referencing them.
Face Capture is a standard Video Analytic included with the NLSS Unified Security Suite. Face Recognition is a premium, add on feature. Face Capture does not need to be
configured and launched if Face Recognition is running. When Face Recognition is running, a Face Capture event is generated before the Face Recognition event.
However, Face Capture can be run if Face Recognition is not running or enabled. Face Capture is configured and run at the local Gateway level, on a per camera basis. To get the best results, the proper settings are needed in configuring Face Capture. For
details on optimizing face capture, see:
Face Capture and Recognition Guidelines in Chapter 22: Configur ing and Using
Face Recognition for basic configuration notes.
Appendix A: Performance and Setup Guidelines: Video Analytics, Face
Recognition, and License Plate Recognition for more detailed guidelines.
© 2009-2014 Next Level Security Systems, Inc. 64
Page 65
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
1. Click Edit for Face Capture in the Video Analytics Configuration list. The video player is displayed with a rectangular Face Capture Zone highlighted.
2. Drag the rectangle to move the Face Capture Zone to the area that you want to monitor.
3. Drag the corner points of the rectangle to resize and reshape it to select the area to be monitored.
4. Use the Sensitivity slider to adjust the threshold of this video analytic. A higher sensitivity setting puts a lower threshold on the face capture. A higher sensitivity captures more face-like objects, but increases the false positive rate.
5. Click Save to keep the changes.
6. Click Start to activate this video analytic. A square, labeled Minimum Face Size, is displayed to indicate the minimum size that
face must be on the screen to be recognized by the system. If someone moves into the Face Capture Zone, and the image of their face meets the minimum object size, then a video analytic event is generated.
5.2.5 Face Recognition
Face Recognition is premium Video Analytic that can be added to the NLSS Unified Security Suite. When the Face Recognition Video Analytic is activated for a camera, it captures a face, then compares the image to uploaded images in a database. If a match is made, an event is generated. The capture and recognition features generate an event.
See Chapter 22: Configuring and Using Face Recognition for instructions on setting up and using the Face Recognition Analytic.
© 2009-2014 Next Level Security Systems, Inc. 65
Page 66
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
5.2.6 License Plate Capture and License Plate Recognition
License Plate Recognition is a premium Video Analytics that can be added to the NLSS Unified Security Suite. When the License Plate Recognition Video Analytic is activated for a camera, it captures a license plate from video, reads it, and then compares the number to license plates in a database. The capture and recognition features generate an event.
See Chapter 23: Configuring and Using License Plate Recognition for inst r uc ti o ns on setting up and using the Face Recognition Analytic.
5.2.7 Line Crossing
Line Crossing monitors movement that crosses a line drawn in the area being monitored.
1. Click Edit for Line Crossing in the Video Analytics Configuration list. The video player is displayed with a red line labeled Line Crossing displayed.
2. Drag the line to move it to the location that you want to monitor, such as a door or hallway.
3. Drag each end point to resize and position the line to cover the area to be monitored. Position the tripwire so the people and things you wish to detect must cross it.
4. Use the Sensitivity slider to adjust the threshold of this video analytic. Higher values increase sensitivity to small movements.
5. Click Save to keep the changes.
6. Click Start to activate this video analytic. If a person or object crosses the line in either direction, a video analytic event is generated.
© 2009-2014 Next Level Security Systems, Inc. 66
Page 67
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
5.2.8 Object Moved
Object Taken monitors for objects that are placed in or removed from an area.
1. Click Edit for Object Moved in the Video Analytics Configuration list. The video player is displayed with a Object Left Zone highlighted. By default, a
rectang ular area is selected.
2. Drag the rectangle to move the rectangle to the area that you want to monitor. The smaller the box, the more precise the monitoring.
3. Drag the corner points of the rectangle to resize and reshape it to select the area to be monitored.
4. Adjust the Sensitivity slider to set the threshold of this video analytic. Higher values make this video analytic more sensitive to an object being left.
5. Set the Dwell Time for the length of time needed to trigger an event. – If an object is left in the Object Moved Zone for longer than the Dwell Time, an
event is triggered.
If the analytic detects that an object has been removed from the Object Moved
Zone for longer than the Dwell Time, then an event is triggered.
6. Click Save to keep the changes.
7. Click Start to activate this video analytic. If an object stays in the Object Left Zone for longer than the set threshold, a video analytic event is generated.
© 2009-2014 Next Level Security Systems, Inc. 67
Page 68
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
5.2.9 Object Taken
Object Taken monitors for objects removed from a selected area.
1. Click Edit for Object Taken in the Video Analytics Configuration list. The video player is displayed with a Object Taken Zone highlighted. By default, a
rectang ular area is selected.
2. Drag the rectangle to move the rectangle to the area that you want to monitor.
3. Drag the corner points of the rectangle to resize and reshape it to select the area to be monitored.
4. Adjust the Sensitivity slider to set the threshold of this video analytic. Higher values make this video analytic more sensitive to an object being removed.
5. Click Save to keep the changes.
6. Click Start to activate this video analytic. If an object is removed from the Object Taken Zone, a video analytic event is generated
© 2009-2014 Next Level Security Systems, Inc. 68
Page 69
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
5.2.10 People Count
People Count monitors the number of people moving from one zone to another in the video stream. The count is done in either direction.
1. Click Edit for People Count in the Video Analytics Configuration list. The video player is displayed with two highlighted areas: People Count Zone 0 and
People Count Zone 1.
2. Drag each rectangle to move it where you want monitor in the video stream.
3. Drag the corner points of each rectangle to resize and reshape it, so as to encompass the area to be monitored.
4. Adjust the Sensitivity slider to set the threshold of this video analytic. Higher values make this video analytic more sensitive to movement between the zones.
5. Click Save to keep the changes.
6. Click Start to activate this video analytic. If someone moves from one zone to the other, in either direction, a video analytic event is generated.
© 2009-2014 Next Level Security Systems, Inc. 69
Page 70
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
5.2.11 People Count Directional
The People Count Directional video analytic is the directional version of the People Count video analytic. It monitors people moving from one zone to another, but only in one direction. Just as with the non-directional version of People Count, you define both areas with rectangles in the video player.
1. Click Edit for People Count Directional in the Video Analytics Configuration list. The video player is displayed with two highlighted areas: People Count Zone 0 and
People Count Zone 1.
2. Drag each rectangle to move it where you want monitor in the video stream.
Note: To register as a People Count Directional event, someone must move from the
Direction In (green) rectangle to the Direction Out (red) rectangle. People moving in the other direction are not counted.
3. Drag the corner points of each rectangle to resize and reshape, so as to encompass the area to be monitored.
4. Adjust the Sensitivity slider to set the threshold of this video analytic. Higher values make this video analytic more sensitive to the movement between the zones.
5. Click Save to keep the changes.
6. Click Start to activate this video analytic. If someone moves from one zone to the other in the designated direction, a video analytic event is generated.
© 2009-2014 Next Level Security Systems, Inc. 70
Page 71
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
5.2.12 Perimeter
The Perimeter analytic functions similar to the Line Crossing analytic, but encompasses a four sides boundary. Any person or object that enters the Perimeter Zone from any direction is counted as an event.
1. Click Edit for Perimeter in the Video Analytics Configuration list. The video player is displayed with a highlighted area labeled Perimeter Zone.
2. Drag each rectangle to move it where you want monitor in the video stream.
3. Drag the corner points of the rectangle to resize and reshape it, so as to encompass the area to be monitored.
4. Adjust the Sensitivity slider to set the threshold of this video analytic. Higher values increase the sensitivity.
5. Click Save to keep the changes.
6. Click Start to activate this video analytic. If a person or object crosses a perimeter zone boundary, a video analytic event is generated.
5.2.13 Troubleshooting Video Analytics
Video analytics are among the more challenging and subjective features to configure in the system.
This section lists some of the most common problems and solutions for setting up video analytics. These items are listed in a rough order for troubleshooting.
Problem: noisy scene, such as swaying trees, seeing errant bounding boxes in unexpected locations.
Solution: decrease the Sensitivity setting.
Problem: missing bounding boxes. Moving objects in scene to not have boxes around them and/or smaller objects are not identified.
Solution: increase the Sensitiv ity setting.
© 2009-2014 Next Level Security Systems, Inc. 71
Page 72
NLSS Unified Security Suite User Manual: v4.0 Operations with Video Analytics
Problem: People Count too high. Solutions: – Make the camera angle as close to straight down as possible. – Reduce or eliminate changes to the lighting in the scene. – Make boxes smaller or farther apart. – Increase the Sensitivity setting.
Problem: People Count too low. Solutions: – Make the camera angle as close to straight down as possible. – Reduce or eliminate changes to the lighting in the scene. – Make boxes larger or closer together. – Increase the Sensitivity setting.
5.3 VIDEO FORENSICS
Video Forensics allow analytics to be run on recorded video. Video Forensics are added to the Video Forensics Queue from the Video Analytics Configuration overlay.
1. Select the desired camera or stream.
2. Click Analytics in the toolbar.
3. Select an analytic from the Video Analytics Configuration list. – Add and configure the analytic if it is not already in the list.
4. Click Forensics in the Video Analytics Configuration overlay. The analytic is added to the Video Forensics Queue.
5. Click the Start and End calendar buttons in the queue to set the time of the recorded video on which to run the forensic.
A dialog is displayed for each field. Click the arrows to set the date and time. The selected date and time are displayed in the Start and End fields.
6. Click Play. – A green bar indicates progress of the analytic. Click Refresh in the upper left
corner of the queue to update the progress bar while a running forensic.
The line item in the queue turns pink if the analytic cannot run. For example, if a
date or time was entered that has no recorded video. – An event is generated when the analytic detects an event for which it is looking. – The result remains in the Video Forensics Queue until it is manually deleted.
»Click Delete to remove the result from the queue.
© 2009-2014 Next Level Security Systems, Inc. 72
Page 73
NLSS Unified Security Suite User Manual: v4.0
Door List
Add Camera
Remove Camera
Push to Talk Unlock
Event Log Reports
Chapter 6: Operations with Doors
Configured doors are listed under the Operations > Doors menu. Four features are available with doors:
Unlock
Add Camera
Push to Talk
Event Log Access to door operations and configurations, in general, is controlled by permissions.
Access to specific pre-configured doors can be controlled by groups. Operations > Doors is not available if access control is not enabled for the Gateway.
6.1 DOORS WINDOW
Select Operations > Doors to display the Doors window. The left pane includes a list of doors discovered by the Gateway. The right pane provides the option to associate a camera or video stream with the selected door. If a camera and door are associated, a video stream is displayed with, talk back (if available), remove, and unlock buttons. A video player also can be launched from this pane.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 73
Page 74
NLSS Unified Security Suite User Manual: v4.0 Operations with Doors
Door Connection Status
Door Secured Status
Strike Energized Status
6.2 DOOR LIST
The Door list contains the doors discovered by the NLSS Unified Security Suite and set up in Configuration > Access Control > Doors. See Configure Doors in Chapter 19:
Configure Access Control for more information. The Doors list can be filtered and
searched. See Operations Windows in Chapter 3: Using the NLSS Web Interface for more information on using a list and its functions.
See Searching a List in Chapter 3: Using the NLSS Web Interface for instructions on searching a list.
6.2.1 List Filters
The Door list can be filtered by:
Connection State Admin State Controller Type
These filters can be combined to narrow the results.
1. Click a filter button. The filter dialog box is opened.
2. Select or deselect the desired filter items. – Connection State: Connected or Not Connected. – Admin State: In Service or Out of Service. – Controller Type: lists the controller models supported by the Gateway.
3. Close the dialog.
The list displays the doors meeting the search criteria.
6.2.2 Door Icons
Each door icon includes three LEDs to indicate status.
Door Connection Status
• Green = InService/Online
• Yellow = InService/Offline
• Red = OutOfService/Offline
• Gray = Preprovisioned
Door Secured Status (Mercury only)
• Green = Secured
• Gray = Unsecured (Off)
Strike Energized Status
• Red = Strike energized
• Gray = S trike is no t energi zed (Off)
© 2009-2014 Next Level Security Systems, Inc. 74
Page 75
NLSS Unified Security Suite User Manual: v4.0 Operations with Doors
6.3 UNLOCK
If a locked door needs to be temporarily unlocked outside its scheduled time, NLSS Web Interface users can manually send a momentary unlock command to the door.
1. Click Operations > Doors.
2. Select a door from the list. The Doors window is disp laye d .
3. Click Open to unlock the door for its configured strike time. See General Tab in
Chapter 19: Configure Access Control for information on the Default Strike Time.
The person requesting entry must physically open the door within the strike time, or the door re-locks.
6.4 ADD CAMERA
A camera can be associated with a specific door. The camera’s stream can be viewed directly from the right pane in the Doors window.
6.4.1 Adding and Viewing Cameras with Doors
By default, doors do not have cameras associated with them.
1. Click Operations > Doors.
2. Select a door from the list.
3. Click Add Camera to display the Camera list in the right pane. See Selecting
Cameras in Chapter 4: Controlling Cameras for more information.
4. Select a camera or video stream. The video is displayed in the video player in the right pane.
5. Click on the video to view it in the full NLSS Web Interface Video Player.
6.4.2 Remove Camera
The association between a camera and a door can be removed.
1. Click Operations > Doors.
2. Select a door from the list.
3. Click Remove Camera to remove the link between the camera and the door.
© 2009-2014 Next Level Security Systems, Inc. 75
Page 76
NLSS Unified Security Suite User Manual: v4.0 Operations with Doors
6.5 PUSH TO TALK
A user can communicate via the camera speaker and a local microphone, if a camera supports audio. The Talk toggle allows the user to be heard through the camera’s speaker.
Note: An internal or external microphone and a speaker must be enabled for the
computer on which the browser is running. See the operating system or the audio program instructions to operate the microphone and speaker connected to the computer.
1. Click Operations > Doors.
2. Select a door.
3. Click Push to Talk to speak.
4. Click Talk again to cancel the microphone feed to the camera.
6.6 EVENT LOG
6.7 REPORTS
The Event Log for the selected door can be accessed from the Doors window.
1. Click Operations >Doors.
2. Select a door.
3. Click Event Log in the mini-pane. The Reports or Events pane for the door is displayed. See Chapter 15: Monitoring and Handling Events for instructions.
4. Click Return to go back to the Doors window.
Reports for the selected door can be accessed from the Doors window.
1. Click Operations >Doors.
2. Select a door.
3. Click Reports in the min i- pane. The Reports or Events pane for the door is displayed. See Chapter 8: Operations with Reports for instructions.
4. Click Return to go back to the Doors window.
© 2009-2014 Next Level Security Systems, Inc. 76
Page 77
NLSS Unified Security Suite User Manual: v4.0
Cardholder Sta t us button
Cardholder/ User list
Person Type Filter
User Type Filter
Cardholder/User Information
Cardholder Picture
Cardholder
User
Record Pane
Chapter 7: Operations with Cardholders & Users
Operations > Cardholders & Users lists the people who have been assigned an access card, as well as the administrative personnel who operate the system through the NLSS Web Interface.
See Chapter 18: Configure Identity and Credentials for instructions on configuring cards and adding cardholders. Cardholders work with the add-on Access Control module.
See Chapter 21: Configuring Permissions for instructions on configuring users.
7.1 CARDHOLDERS/USERS WINDOW
The Cardholder & Users window contains a list of people who use or are monitored by the system, and a pane that provides details about the selected person. See Operations
Windows for more information on using this window.
Cardholders are the people whose access to doors is controlled by the system. A cardholder’s card can be Activated or Deactivated from the record pane.
Users are the people operating the system through the NLSS Web Interface. No actions can be taken on a user record from this window.
Access to Cardholders/Users operations and configuration, in general, is controlled by permissions. Access to specific Cardholders/Users can be controlled by groups. See
Chapter 21: Configuring Permissions for more information.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 77
Page 78
NLSS Unified Security Suite User Manual: v4.0 Operations with Cardholders & Users
7.1.1 Filtering Cardholders/Users List
Person Type: select either Cardholder, User, or All
User Ty pe: select from the configured User Types, or All. See Users in Chapter
21: Configuring Permissions for instructions on creating and configuring User
Types.
7.2 CARDHOLDERS/USERS DETAILS
Records for a selected cardholder are displayed in the right pane.
Cardholder Information
Cardholder Photo
Activate / Deactivate Cardholders
Cardholders & Users Reports and Events
Note: Five access cards can be active per cardholder.
7.2.1 Cardholder Information
These fields are populated in the Configuration > Identity > Cardholders window. See
Cardhold ers Tabs in Chapter 18: Configure Identity and Credentials.
The First Name, Last Name, and Cardholder ID (Emp #) identify the cardholder. The Cardholder ID is a unique identifier. Cardholder Title and Location are organizational identifiers.
7.2.2 User Information
These fields are populated in the Configuration > Permissions > Users window. See
Users in Chapter 21: Configuring Permissions.
The First Name, Last Name, and User ID (Email) identify the cardholder. The User ID is a unique identifier. The User Type identifies the permission level of this user in the NLSS system.
7.2.3 Cardholder Photo
If a photo was uploaded for the cardholder, the photo is displayed in the Configuration pane. See Cards Tab in Chapter 18: Configure I dentity and Cre dentials for instructions on uploading a photo.
© 2009-2014 Next Level Security Systems, Inc. 78
Page 79
NLSS Unified Security Suite User Manual: v4.0 Operations with Cardholders & Users
7.2.4 Activate / Deactivate Cardholders
Cardholder access can be activated or deactivated from the Configuration pane.
1. Click Cardholder Status in the Configuration pane. The current status of the Cardholder is displayed, either:
Card Activated
Card Deactivated
2. Reset the cardholder’s status. – If the cardholder’s status is active, click Deactivate to disable the card. – If the selected card is currently inactive, click Activate to disable the card.
Note: Only one (1) access card can be active per cardholder. After Cardholder Status is clicked, the Events and Reports buttons are displayed.
7.2.5 Cardholders & Users Reports and Events
1. Click Operations >Cardholders & Users.
2. Select a camera or video stream.
3. Click Reports or Events in the Configuration pane.
Reports
Events
The Reports or Events page for the cardholder or user is displayed. See Chapter 8: Operations with Reports and Chapter 15: Monitoring and
Handling Events for more instructions.
4. Click Back to go back to the Cardholders/Users window.
© 2009-2014 Next Level Security Systems, Inc. 79
Page 80
NLSS Unified Security Suite User Manual: v4.0
Chapter 8: Operations with Reports
Reports collect information from events tracked by the NLSS Unified Security Suite. The information displayed depends on the report type, the date/time range, and other filters. Reports are displayed as graphs in the NLSS Web Interface. Reports also can be displayed in a table format using Canned Reports.
8.1 GENERATING REPORTS
Two types of reports are available.
Event-Specific Reports display all instances of an event type detected in the system. These reports are accessed from Operations > Reporting, and can be tailored to specific categories and Event Types.
Device-Specific Reports display activity reports for the selected items. These reports can be selected from the video player or the Preview/Details panes for Cameras, Doors, or Cardholders & Users.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 80
Page 81
NLSS Unified Security Suite User Manual: v4.0 Operations with Reports
End Date
Daily Count
Weekly Count Monthly Count
Column Gra p h
Line Graph Pie Graph Generate Report
Print Report
Save Report
Category
Canned Reports
Back
8.1.1 Reports Window
Most features are the same for all types of reports on the Reports window.
8.1.2 Event-Specific Reports
Reports generated for events tracked across the entire system are accessed from the Operations > Reporting menu.
Access to Reports, in general, is controlled by permissions.
1. Select Operations > Reporting from the Main Menu. The Reports window is displayed.
© 2009-2014 Next Level Security Systems, Inc. 81
Page 82
NLSS Unified Security Suite User Manual: v4.0 Operations with Reports
The Reports window is opened with a report category list.
2. Select a category (Event Filter). The Event Type list is displayed for the category.
3. Select an Event Type from the list. –Click Event Filters to return to Category list.
© 2009-2014 Next Level Security Systems, Inc. 82
Page 83
NLSS Unified Security Suite User Manual: v4.0 Operations with Reports
4. Click Date/Time. The Date dialog box is displayed.
Use the arrows to select the last day and time that the records are searched, according to the time period selected in the next step. The report includes all of the events prior to the end of the day, or to the time of the search if today is selected as the end date.
5. Click Save (check mark) to set the date and time.
6. Select a time period for the report.
Hourly: Graphs the matching events, in hourly increments, for the 24 hours of the date selected. If today is selected, the report includes all matching events from midnight up to the time of the report
Weekly: Graphs the matching events, in one day increments, for that date and the seven days prior to the end date.
Monthly: Graphs the matching events, in monthly increments, for the year prior to the end date.
7. Select a graph type for the report: Column, Pie Chart, or Line Graph.
8. Click Run Report to create the report. –Click Print Report to print the report. –Click Save .csv file to keep a .csv spreadsheet of the report. If a message is displayed stating: No records to display, widen the search time using
the Date and Time dialog and run the report again.
Any of the report settings be clicked at any time to run a different report. A new report must be run after any change to update the data.
8.1.3 Device-Specific Reports
The Operations > Reporting menu generates reports for your entire system, not individual devices.
To generate reports of events related to individual doors, cameras, or cardholders and users, select that device and run a report.
1. Open Operations >Cameras/Doors/Cardholders & Users.
2. Select an item in the list.
3. Click Reports.
4. Click End Date. The Date dialog box is displayed.
© 2009-2014 Next Level Security Systems, Inc. 83
Page 84
NLSS Unified Security Suite User Manual: v4.0 Operations with Reports
Use the arrows to select the last day and time that the records are searched, according to the time period selected in the next step. The report includes all of the events prior to the end of the day, or to the time of the search if today is selected as the end date. The start time and date are dependent on the time period selected for the report
–Click Save to set the date and time.
5. Select a time period for the report. – Daily: Graphs the matching events, in hourly increments, for the 24 hours of the
date selected. If today is selected, the report includes all matching events from midnight up to the time of the report.
Weekly: Graphs the matching events, in one day increments, for that date and the
seven days prior to the end date.
Monthly: Graphs the matching events, in monthly increments, for the year prior to
the end date.
6. Select a graph type for the report: Column, Line, or Pie.
7. Click Generate Report to create the report. –Click Print to print the report. –Click Save to keep a .csv version of the report.
The report settings be clicked at any time to run a different report for the selected device. A new report must be run after any change to update the data.
8.2 CATEGORIES OF EVENT-SPECIFIC REPORTS
Several categories of event-specific reports are available in the Operations > Reporting menu.
Access Control Reports: Access Control reports provide the status of key access control hardware in your system.
Camera Reports: Camera reports provide the count for events related to cameras in your system. For example, the Camera - Motion Event report counts the motion events recorded by the cameras in the system.
Decoder Reports: Decoder reports provide off-line and on-line reports for NLSS decoders discovered by the Gateway.
System Reports: Reports on external storage and recording events.
User Reports: User reports lists when specific users have logged in or out of the system.
Video Analytics Reports: Video Analytics reports list how many times the cameras in the system have detected a video analytic event.
© 2009-2014 Next Level Security Systems, Inc. 84
Page 85
NLSS Unified Security Suite User Manual: v4.0 Operations with Reports
8.3 CANNED REPORTS
Besides graphs, reports can be displayed in tables that can be filtered and sorted. These tables also can be printed and exported to a formatted spreadsheet in .xls format.
8.3.1 Using the Table
Tables can be sorted and filtered.
1. Click Canned Reports in the Reports window to display report tables. The tables are displayed in a separate window or tab than the NLSS Web Interface.
2. Select a report from the left column. – Doors: provides a summary of configuration information set in Configuration >
Access Control > Doors, plus Strike and Opened counts. See Door Details in Chapter 19: Configure Acce ss Contro l for field definitions.
Cameras: provides a summary of configuration information set in Configuration >
Video> Cameras, plus video parameters set directly on the camera. See Configure Cameras and Streams in Chapter 20: Configure Video, &
Storage, & Decoders for field definitions.
Cardholders: provides a summary of cardholder information, as set in Configure
> Identity > Cardholders and plus the Facility Code set in Card Profiles.
See Configure Cardholders and Configure Cardholder Types in Chapter 18:
Configure Identity and Credentials for field definitions.
Users: lists the users’ first and last names, User ID, Type and Group, as set in
Configuration > Permissions > Users. See User Details in Chapter 21: Configuring Permissions for field definitions.
© 2009-2014 Next Level Security Systems, Inc. 85
Page 86
NLSS Unified Security Suite User Manual: v4.0 Operations with Reports
Events: provides a summary of events recorded by the Gateway. This summary
contains all event types. The reports are available for the following Event Categories
» Camera » Door » Cardholder » Cardholder by Door » User » Facial Recognition » License Plate Recognition
Each event table lists the time of the event, plus identifies the item (door, camera, etc.) that triggered the event. The Event Type, Severity, and Status are also listed.
See Chapter 15: Monitoring and Handling Events for more information on events.
The Event reports can be filtered by specific category details, such as a name, or
IP address, or by time and date. The time and date filter is set in the YYYY/MM/DD HH:MM:SS format. » To search after a date and time, enter the starting point in the greater than or
equal to field (>=).
» To narrow the search, enter an end point date and time in the less than or
equal to field (<=).
»Select and or or to define the end point.
3. Click on a column header to sort a table.
4. Use the page navigation at the bottom of the table to: – Go the previous or next page. – Go to the first or last page. – Select the number of records to be displayed on a page. The total number of records in the report also is displayed below the table.
5. From the drop-down list, select the number of items (Groups) to display per page.
6. Click Printer Friendly to open a page formatted for printing. – Use the browser’s print options to print the page. – Use the browser’s Back button to return to the full Canned Reports page.
7. Click Export to Excel to generate an .xls file. – Follow the prompts to save and open the file.
© 2009-2014 Next Level Security Systems, Inc. 86
Page 87
NLSS Unified Security Suite User Manual: v4.0 Operations with Reports
8.3.2 Report Table Filters
Report tables can be filtered using the search feature, or directly from the column header.
8.3.2.1 SEARCH FILTER
1. Select a report type.
2. Click the plus (+) to display the Filters fields, if they are not displayed. – The fields vary, depending on the selected report type. – Each filter provides a field to search on the item name and ID. – Cameras and doors can be searched by IP address. – Events can be searched by greater than, or equal to (>=) a time stamp (hh:mm:ss)
and date (yyyy/mm/dd), with an and/or option.
Note: If a search by time is configured, a date must be included.
3. Click Search to display the items matching the search criteria.
4. Click Reset and click Search again to restore all records.
8.3.2.2 COLUMN FILTERS
Tables also can be filtered by columns.
1. Select a report type.
2. Click Column Filter. A drop-down dialog is displayed with the current entries contained in that column. For example, this graphic shows the filter dialog for the event type in a Events User
report. Only event types in the report are listed. If an event is triggered with a different type, it is added to subsequent reports, but not to this report.
3. Check the items on which to filter the table.
4. Click OK.
5. To remove the filter, open the drop-down and check All.
© 2009-2014 Next Level Security Systems, Inc. 87
Page 88
NLSS Unified Security Suite User Manual: v4.0
Chapter 9: Displaying Video
In the NLSS Web Interface, video streams from IP cameras, and RTSP, HTTP , and encoder video feeds are displayed. Multiple streams can be displayed simultaneously using Views, and Multiple Views can be displayed in configured order using the Sequence feature.
Use the NLSS Web Interface to:
Create, Edit, and Display Views
Create, Edit, and Display Sequences
Push Media Clips, Views and Sequences to Decoders
The ability of the NLSS system to display video in a web browser is intended to aid investigations with video surveillance, but is not intended to provide constant long-term surveillance. Due to the complexities and shortcomings of various web browsers, NLSS cannot guarantee the performance, stability, or functionality of video displayed in a web browser.
To display video continuously over long periods, the recommended practice is to add one or more NLSS HD Decoders to the system. The NLSS Web Interface can Push Media
Clips, Views and Sequences to Decoders installed in your system, and display video on
HD monitors attached to those decoders. Note: Presets, patrols, and video analytics assigned to individual cameras are
preserved in Views and Sequences. See Chapter 4: Controlling Cameras for instructions on configuring those features.
9.1 CREATE, EDIT, AND DISPLAY VIEWS
Views allows the simultaneous display of up to nine live cameras, and RSTP and HTTP streams. Use the Operations > Views menu to create, edit and display views.
Views can be used to build a Sequence. See Create, Edit, and Display Sequences for instructions.
Access to Views and Sequences operations and configurations, in general, is controlled by permissions. Access to specific, pre-configured Views and Sequences can be controlled by groups.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 88
Page 89
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
Select Layout
Edit View Name
Save
Delete
View Layout
Current View
Selected Monitor
Views Menu
Transport Control
9.1.1 Views Menu and Layout
After Operations > Views is clicked, the Views menu and layout are displayed. Views can be created, edited, displayed, and deleted, using the menu options. These procedures are discussed in the following sections.
9.1.1.1 MENU OPTIONS
Use the menu options to configure the View.
Current View: the name given to the selected View.
Select Layout: choose a layout from one of the seven options.
1x1 1x2 horizontal 2x1 vertical 2x2 – 3x3 1x4 horizontal 2x4 horizontal
View Name: editable field to assign a name to the current View.
Save: keep any changes made to this View.
Delete: remove current View from the list of Views.
View Layout: displays the selected cameras and streams, depending on the layout selected. Cameras and video streams are assigned from the pane.
Selected Monitor: a light, gray frame highlights the selected pane.
Transport Control: provides control of synchronized playback of video in each monitor pane in the view. See Transport Control for instructions.
© 2009-2014 Next Level Security Systems, Inc. 89
Page 90
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
9.1.2 Create Views
By default, no Views are configured for the NLSS Web Interface.
1. Select Operations > Views from the Main Menu.
2. Click Add to display a New View window.
3. Select a View Layout to set the number and arrangement of panes in the new View.
4. Enter a View Name. By default New View is entered in the field.
5. Click in a pane to open a list of cameras and streams. – A light gray frame highlights the selected pane. – The Camera List has the same search, filter and display features as the list
displayed from Operations > Cameras. See Filtering the Camera List for more information.
6. Select a camera or video stream to assign it to the pane.
Note: If a Pane already contains a camera or stream, then assigning a new camera or
stream replaces the assignment for that pane.
7. Click Close in the Camera List.
8. Repeat steps 5 and 6 for the rest of the panes in the layout.
9. Click Save button to keep the new View.
9.1.3 Edit Views
An existing View can be edited.
1. Select Operations > Views from the Main Menu.
2. Select a View to display from the list in the Views menu.
3. Update the View, as needed. The View Name can be edited, a different layout can be selected, or a different camera or stream can be assigned to a pane or panes.
4. Click Save to keep the changes.
9.1.4 Filter Views List
The Views list can be filtered by view types, such as 1x1, 2x4, etc.
1. Click View Type.
2. Select the desired formats to display in the list.
SeeFiltering Operations Lists in Chapter 3: Using the NLSS Web Interface for more information on filtering lists.
© 2009-2014 Next Level Security Systems, Inc. 90
Page 91
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
Video Playback Controls
Transport Control
9.1.5 Transport Control
Besides displaying live video from multiple cameras, synchronized recorded video can be played back from each camera in the View. If recorded video of an event is displayed for a selected camera, Transport Control can be used to synchronize the other playback of the other cameras in the view to the same time.
The Transport Control feature displays video player controls in the Views window.
1. Click Transport Control in the top of the Views page. Video player controls are displayed, and the view edit buttons are hidden.
Note: If a video stream is not configured for recording, the current video continues to
display while other monitors show recorded video. The selected monitor must be configured for recording to access recorded video
from other monitors.
2. Use the video player controls to control playback for all monitors. – These controls are applied the selected monitor, and then simultaneously applied
to video streams in the other monitors.
Complete camera controls are only available if the camera is accessed through
Operations > Cameras.
See Using the Camera Toolbar in Chapter 4: Controlling Cameras for more information on the video player controls.
3. Select the time period for playback: –Click Date & Time.
- or -
Drag the play head in the timeline the desired time. The Live/Archive toggle turns red when playing a recorded stream.
4. Click Play/Pause to start or pause the playback.
© 2009-2014 Next Level Security Systems, Inc. 91
Page 92
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
5. Use the Rewind and Fast Forward buttons to move through the video.
Note: Click the Rewind and Fast Forward buttons repeatedly to cycle between 0.5x,
2x, 5x, 10x, and 50x speed. The amount of video that the play head moves depends on the frame rate at which the video was recorded.
6. Click the Camera Events Toggle to display or hide events markers.
7. Click Bookmark to manually add an event to the timeline. A marker is added in the timelines for each camera in the view.
8. Click Export Video to save synchronized video clips from all monitors. Video clips from the same time period are exported to the Media Library.
9. Click Full Screen to hide the Operations menu options, and expand the view to full screen.
10. Click Play/Pause at any time to start and pause playback.
11. Click the Live/Archive toggle to return to live video. The toggle button turns green when the displayed video is live.
12. Click Transport Control again to return to the Views edit mode.
Note: If the Transport Control is closed while recorded video is playing, the recorded
video continues to play.
9.1.6 Delete Views
A View can be erased from the Views list. Note: A deleted View also is removed from any Sequence in which is was used.
1. Select Operations > Views from the Main Menu.
2. Select a View.
3. Click Delete in the Views menu.
© 2009-2014 Next Level Security Systems, Inc. 92
Page 93
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
Edit Sequence Name
Save
Delete
Available Views
Current Sequence
Play - Full Screen
Views in Sequence
Sequence Menu
Current View
Sequence Editor
9.2 CREATE, EDIT, AND DISPLAY SEQUENCES
Sequences play a succession of Views. Sequences can be created, edited, deleted and displayed from the Sequences menu and editor.
9.2.1 Sequences Menu and Editor
Current Name: the name of the currently selected Sequence.
Sequence: an editable field used to assign a name to this Sequence.
Save: keeps the changes made to a Sequence.
Delete: erases the selected Sequence.
Play - Full Screen: hides the menus and runs the Sequence
Available Views: the vertical column listing the Views that have been created. See
9.1 Create, Edit, and Display Views for more information.
Sequence Views: the horizontal list of the Views in this Sequence. You can add, remove, and rearrange these Views.
Current View: the View selected in the Sequence Views.
© 2009-2014 Next Level Security Systems, Inc. 93
Page 94
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
9.2.2 Create New Sequences
1. Select Operations > Sequence.
2. Click Add. The Sequence Pane is displayed.
3. Drag a View from the Available Views list to the Sequence Views. – To change the order of Views in the Sequence, drag-and-drop the Views into the
desired order.
To remove a View from the Sequence, drag that View out of the Sequence Views.
4. Optionally, the duration a View is displayed can be changed. The default setting is 10 seconds.
a. Click a View in the Sequence Views list. The Edit Sequence Item dialog is
displayed. b. Enter a Duration (in seconds). c. Click Update to keep the change.
» Click Cancel (X) the close the dialog without saving the change.
5. Click Save to keep the Sequence configuration.
9.2.2.1 EDIT A SEQUENCE
1. Select Operations > Sequence.
2. Select a Sequence from the list in the menu.
3. Adjust the Sequence as needed. – To add a View to the Sequence, drag it from the Available Views list to the
Sequence Views. – To remove a View from the Sequence, drag that View out of the Sequence Views. – To change the order of Views in the Sequence, drag-and-drop the Views into the
desired order.
4. To change the duration a View is displayed: a. Click a View in the Sequence Views list. The Edit Sequence Item dialog is
displayed. b. Enter a Duration (in seconds). c. Click Update to keep the change.
» Click Cancel (X) the close the dialog without saving the change.
5. Click Save to keep the Sequence configuration.
© 2009-2014 Next Level Security Systems, Inc. 94
Page 95
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
9.2.2.2 DELETE SEQUENCES
1. Select Operations > Sequence.
2. Select a Sequence from the list in the menu.
3. Click Delete in the Sequence Pane.
9.2.2.3 DISPLAY SEQUENCES
After a Sequence is created and configured, it can be played in full screen mode.
1. Select Operations > Sequence.
2. Select a Sequence from the list in the menu.
3. Click Full Screen - Play. The menus are hidden and the Sequence plays in the Next Level Web Interface.
4. Click Back to return to the menus.
Note: Do not click the browser’s Back button, as that returns to the NLSS Web Interface
login window.
9.3 PUSH MEDIA CLIPS, VIEWS AND SEQUENCES TO DECODERS
A selected Media clip, View, or Sequences can be pushed from the Gateway to NLSS HD Decoders for display. The selected View and Sequence, or Media clip is pushed to a decoder as a stream from this page. See the NLSS HD Decoder User Manual for more information on configuring that device.
© 2009-2014 Next Level Security Systems, Inc. 95
Page 96
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
Select Views
Select Sequences
Decoder List
Selected Decoder
Current Selection
Current View or Sequence
Decoder Status
Filter
Select Media
Events
Reports
Configuration Pane
9.3.1 Decoder Window
Select Operations > Decoders to display the Decoder window.
The left pane lists all decoders discovered by the Gateway. A right pane contains configuration options to push a Media clip, View or Sequence from
the Gateway to the decoder. The video for the selection is also displayed.
Decoder List: – Decoder Name: the name assigned under Configuration > Video > Decoders in
Device Status: colored LED under the Decoder icon that indicates if the decoder
Filter: the list can be f il ter ed on Connection S t ate: Connected or Not Co nn ect ed . Search: locate a decoder in the list.
Configuration Pane: displays the Media clip, View, or Sequence currently being pushed to the decoder from this Gateway.
A Video Unavailable message indicates no video is being pushed from this Gateway to the decoder, or the decoder is off line.
Current Selection: the Media clip, View or Sequence being pushed to the
Events: opens the Events Log to list the events associated with the selected
this interface. The selected Decoder Name is displayed above the configuration pane.
is on line. Green indicates the decoder is connected; yellow indicates that the decoder is not connected.
decoder. The video is displayed in the player and the name is listed below the media player.
decoder. See Event Log in Chapter 15: Monitoring and Handling Events for more information.
© 2009-2014 Next Level Security Systems, Inc. 96
Page 97
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
Reports: opens the Reports window to create reports for the selected decoder.
See Generating Reports in Chapter 8: Operations wi th Reports for more information.
Media: opens the Media Library list containing clips that can be pushed to the
decoder from the Gateway. See Media Library in Chapter 10: Media
Operations for more information.
Views: accesses a list of Views on this Gateway.
When a view is pushed from the Gateway to a Decoder, each pane of video in the decoder display counts as a stream. For example, if a 2x2 view is sent from the Gateway to a Decoder, it counts as four (4) streams.
The decoder cannot display 3x3 views in sequences created on the decoder.
Sequences: accesses a list of Sequences on this Gateway.
Access to Operations > Decoders is controlled by permissions. Access to specific decoders can be controlled by groups. See Chapter 21: Configuring Permissions for more information.
9.3.2 Pushing a Media Clip
1. Click Operations > Decoders from the Main Menu.
2. Select a decoder.
3. Click Media. A list of saved video files is displayed.
Note: This list does not contain the sound effects files shipped with the Media Library.
Use the Search feature, if necessary, to locate the desired decoder. – The Views list can be filtered by layout type, such as 1x1, 2x2, etc.
4. Select a View or Sequence. See Create, Edit, and Display Views and Create, Edit, and Display Sequences for
more information on Views and Sequences.
Note: A sequence containing a 3x3 view should not be pushed to a decoder.
5. Close the list. The selected clip is displayed in the Current View pane, and is now available to the
decoder. The pane contains a media player with play/pause, stop and volume controls, same as in the Operations > Media window.
© 2009-2014 Next Level Security Systems, Inc. 97
Page 98
NLSS Unified Security Suite User Manual: v4.0 Displaying Video
9.3.3 Pushing a View or Sequence
1. Click Operations > Decoders from the Main Menu.
2. Select a decoder.
3. Click Views or Sequences. A list of existing Views or Sequences is displayed.
Use the Search feature, if necessary, to locate the desired item. – The Views list can be filtered by layout type.
4. Select a View or Sequence. See Create, Edit, and Display Views and Create, Edit, and Display Sequences for
more information on Views and Sequences.
5. Close the list. The selected View or Sequence is displayed in the Current View. This View or
Sequence is now available to the decoder.
6. Mouse-over the pane and click the Full Screen button to fill the window with the View or Sequence.
–Click Back to return to the default display.
© 2009-2014 Next Level Security Systems, Inc. 98
Page 99
NLSS Unified Security Suite User Manual: v4.0
Chapter 10: Media Operations
The NLSS Web Interface contains a Media Library to store audio and video files. Operations > Media includes a searchable library of sound effects that are included with the Gateway. The library also holds the video exported from a camera.
Note: The sound effects files included with the system cannot be deleted or unlocked.
However, the files can be replaced with an imported audio file. See Replacing a
Default Audio File.
Use the NLSS Web Interface to play selected audio through a speaker attached to camera. The audio can either be triggered automatically by an event, or manually from the NLSS Web Interface video player. See Using the Camera Toolbar in Chapter 4:
Controlling Cameras for more information.
The audio is associated to a camera as an Action. An event is associated with the action through Event Linkages. When the event occurs, the Action triggers the audio to play. See
Configure Actions and Configure Event Linkages in Chapter 17: Global Configurations for instructions.
Video clips up to four hours long can be stored in the Media Library. See Export Video in
Chapter 4: Controlling Cameras for instructions. The video is deleted (groomed) from
the library after a set period if the file is not locked. See Configure Groomer Settings in
Global Configurations for more information.
© 2009-2014 Next Level Security Systems, Inc. 2.00-UM-20140804 99
Page 100
NLSS Unified Security Suite User Manual: v4.0 Media Operations
10.1 MEDIA LIBRARY
From the Media Library, files can be sorted, searched, sampled, and downloaded.
1. Select Operations > Media. The Media Library opens with a list of files in the left pane. These files can be filtered
and searched in this pane, as described later in this chapter.
2. Select a media file. These files can be previewed, downloaded, locked and deleted in using the tools in
the right pane.
3. The player function in the Preview pane on the right depends on the file type. – Audio: click the Speaker to open the slider to adjust the playback volume.
Video: use the player to view the video. The player contains the standard play,
pause, stop, volume, and mute controls.
See Operations Windows in Chapter 3: Using the NLSS Web Interface for instru ctions on other window features.
© 2009-2014 Next Level Security Systems, Inc. 100
Loading...