uniview technologies Uniarch IPC-B112-PF40 User Manual

Network Cameras
User Manual
Manual Version: 1.00
Thank you for purchasing our product. If there are any questions, or requests, please do not hesitate to
CAUTION!
The default password is used for your first login. To ensure account security, please change the password after your first login. You are recommended to set a strong password (no less than eight characters).
contact the dealer.
Copyright
Copyright 2019 Zhejiang Uniview Technologies Co., Ltd. All rights reserved. No part of this manual may be copied, reproduced, translated, or distributed in any form or by any means without prior consent in writing from our company.
Trademark Acknowledgement
and other Uniview's trademarks and logos are the property of Zhejiang Uniview Technologies
Co., Ltd. Other trademarks, company names and product names contained in this manual are the property of their respective owners.
Disclaimer
To the maximum extent permitted by applicable law, the product described, with its hardware, software,
firmware and documents, is provided on an “as is” basis.
Best effort has been made to verify the integrity and correctness of the contents in this manual, but no
statement, information, or recommendation in this manual shall constitute formal guarantee of any kind, expressed or implied. We shall not be held responsible for any technical or typographical errors in this manual. The contents of this manual are subject to change without prior notice. Update will be added to the new version of this manual.
Use of this manual and the subsequent result shall be entirely on the user’s own responsibility. In no
event shall we be reliable to you for any special, consequential, incidental, or indirect damages, including, among others, damages for loss of business profits, business interruption, or loss of data or documentation in connection with the use of this product.
Video and audio surveillance can be regulated by laws that vary from country to country. Check the law
in your local region before using this product for surveillance purposes. We shall not be held responsible for any consequences resulting from illegal operations of the device.
The illustrations in this manual are for reference only and may vary depending on the version or model.
The screenshots in this manual may have been customized to meet specific requirements and user preferences. As a result, some of the examples and functions featured may differ from those displayed on your monitor.
This manual is a guide for multiple product models and so it is not intended for any specific product. Due to uncertainties such as physical environment, discrepancy may exist between the actual values
and reference values provided in this manual. The ultimate right to interpretation resides in our company.
Environmental Protection
Symbol
Description
WARNING!
Contains important safety instructions and indicates situations that could cause bodily injury.
CAUTION!
Means reader be careful and improper operations may cause damage or malfunction to product.
NOTE!
Means useful or supplemental information about the use of product.
This product has been designed to comply with the requirements on environmental protection. For the proper storage, use and disposal of this product, national laws and regulations must be observed.
Symbols
The symbols in the following table may be found in this manual. Carefully follow the instructions indicated by the symbols to avoid hazardous situations and use the product properly.
Contents
1 Network Connection ························································································································· 1
2 Login ·················································································································································· 1
Preparation ················································································································································ 1 Logging In to the Web Interface ················································································································ 3 Introduction to the Web Interface············································································································· 4 Initial Configuration ··································································································································· 5
3 Configuring Parameters ···················································································································· 6
Local Parameters ········································································································································ 6 Network Configuration ······························································································································ 7
Ethernet ·············································································································································· 7 Port ····················································································································································· 8 Port Mapping ······································································································································ 9 DNS ····················································································································································· 9 DDNS ··················································································································································· 9 Uniarch ············································································································································· 10 FTP ···················································································································································· 10 E-Mail ················································································································································ 11 QoS ··················································································································································· 12
Image Configuration ································································································································ 12
Image Adjustment ·························································································································· 122 OSD Setting ······································································································································· 19 Privacy Mask ····································································································································· 20
Audio and Video Configuration ················································································································ 21
Video Configuration ························································································································· 21 Snapshot ··········································································································································· 22 ROI ···················································································································································· 23 Media Stream Configuration ············································································································ 24
Common Alarm Configuration ················································································································· 25
Configuring Motion Detection Alarm ······························································································· 25 Configuring Tampering Alarm ········································································································ 288
System Maintenance ······························································································································· 29
Security ············································································································································· 29 Setting the System Time ··················································································································· 32 Upgrading the Device ······················································································································· 33 Restarting the System ······················································································································ 33 Importing and Exporting System Configuration File ········································································ 34 Collecting Diagnosis Information ····································································································· 34
4 Live View ········································································································································· 35
Live View Toolbar ····································································································································· 35 Viewing Certain Area of Images ··············································································································· 36
Using Digital Zoom ··························································································································· 36
i
Appendix B FAQ ································································································································· 37
ii
1 Network Connection
Network cable
IPC PC
IPC
PC
Switch or Router
Network cable Network cable
Before accessing a network camera (also known as IP Camera or IPC) from a PC, you need to connect the network camera to the PC directly with a network cable or via a switch or router.
Use a Shielded Twisted Pair (STP) cable to connect the network interfaces of the network camera and the PC.
Use Shielded Twisted Pair (STP) cables to connect the network interfaces of the camera and the switch or router.
2 Login
Preparation
After you have completed the installation in accordance with the quick guide, connect the camera to power to start it. After the camera is started, you can access the camera from a PC client installed with a web browser or the client software EZStation. Internet Explorer (IE) is a recommended web browser. For more information about EZStation, refer to the EZStation User Manual.
The following takes IE on a Microsoft Windows 7 operating system as an example.
Check before login
The camera is operating correctly. The network connection between the PC and the camera is normal. The PC is installed with Internet Explorer 10.0 or higher. (Optional) The resolution is set to 1440 x 900.
1
Add the IP address as a trusted site
1.13
1
2
2
NOTE!
The IP address 192.168.1.13 in this example is the default IP address. Please replace it with the actual address of your camera if it has been changed.
NOTE!
To manually load the ActiveX, type http://IP address/ActiveX/Setup.exe in the address bar and press
Enter.
The default password is used for your first login. To ensure account security, please change the
password after your first login. You are recommended to set a strong password (no less than eight characters).
The camera protects itself from illegal access by limiting the number of failed login attempts. If login
fails six times consecutively, the camera locks automatically for ten minutes.
1
2
3
4
(Optional) Modify user access control settings
Before you access the camera, follow the steps to set User Account Control Settings to Never notify.
Logging In to the Web Interface
The default static IP address of the camera is 192.168.1.13, and the default subnet mask is 255.255.255.0. DHCP is turned on by default. If a DHCP server is used in the network, the IP address of your camera may be
assigned dynamically, and you need to use the correct IP address to log in. Use the EZStation client to view the dynamic IP address of your camera.
The following takes IE as an example to describe the login procedure.
1. Browse to the login page by entering the correct IP address of your camera in the address bar.
2. If you log in for the first time, follow system prompts and install the ActiveX. You need to close your
browser to complete the installation.
3
3. Privacy policy is displayed on the screen when the user logs in for the first time (This function is not
supported by some models). After reading the privacy policy, you need to check in the 'I have read and agree to the above policy' box, then click the 'OK' button to proceed to the next step.
4. Enter the username and password, and then click Login. For the first login, use the default username
“admin” and password “admin”or“123456”.
If you log in with Live View selected, live video will be displayed when you are logged in. Otherwise, you
need to start live video manually in the live view window.
To clear the Username and Password text boxes, click Reset.
Introduction to the Web Interface
By default the live view window is displayed when you are logged in to the Web interface. The following shows an example.
4
No.
Description
1
Menu
2
Live view window
3
Live view toolbar
Item
Description
1. Ethernet.
Reconfigure the device IP and network parameters based on the actual networking.
2. Log out and log in again to the Web using the new IP address.
-
3. Set the system time.
Set the system time based on the actual situation.
4. (Optional) Set the management
server.
Set the management server based on the actual networking.
5. (Optional) Set the server for storing photos.
Set the server for storing photos based on the actual networking.
6. Set OSD.
Set the information displayed on the screen as needed, for example, time.
7. (Optional) Manage users.
Change the default password and add common users as needed.
1
2
3
Initial Configuration
After you log in to the device, please perform the following initial configuration.
You can watch the live video after finishing the initial configuration. Please configure other parameters as needed.
5
NOTE!
The displayed live view interface, parameters displayed and value ranges may vary with models.
Please see the actual Web interface for details.
The parameters that are grayed out cannot be modified. For the actual settings, see the Web
interface.
It is recommended that you change the password when you are logged in the first time. For details
about how to change a password, see Security.
NOTE!
The local parameters may vary with models. Please see the actual Web interface for details.
Parameter
Description
Video Processing Mode
Real-Time Priority: Recommended if the network is in good condition. Fluency Priority: Recommended if you want short time lag for live video. Ultra-low Latency: Recommended if you want the minimum time lag for
live video.
Protocol
Set the protocol used to transmit media streams to be decoded by the PC.
3 Configuring Parameters
Local Parameters
Set local parameters for your PC.
1. Select Setup > Common > Local Settings.
2. Modify the settings as required. The following table describes some major parameters.
6
Parameter
Description
Record and Snapshot
Recording
Subsection By Time: Duration of recorded video for each recording file on
the computer. For example, 2 minutes.
Subsection By Size: Size of each recording file stored on the computer. For
example, 10M.
When Storage Full
Overwrite Recording: When the total capacity allocated to the local
recording is full, the oldest recording file will be deleted.
Stop Recording: When the total capacity allocated to the local recording
is full, the recording will stop.
Files Folder
The save path of snapshots and recordings. The max. Path length is 260
bytes. If the limit is exceeded, recording or snapshot during live view will fail, and messages will appear on the screen.
NOTE!
After you have changed the IP address, you need to use the new IP address to log in. The configurations of DNS (Domain Name System) server are applicable when the device is accessed
by domain name.
3. Click Save.
Network Configuration
Ethernet
Modify communication settings such as the IP address for the camera so that the camera can communicate with other devices.
Static Address
1. Click Setup > Network > Network.
2. Select Static from the Obtain IP Address drop-down list.
3. Enter the IP address, subnet mask, and default gateway address. Make sure that the IP address of the
camera is unique in the network.
4. Click Save.
7
DHCP
NOTE!
This function is not supported by some models. Please see the actual model for details.
The Dynamic Host Configuration Protocol (DHCP) is enabled by default when the camera is delivered. If a DHCP server is deployed in the network, the camera can automatically obtain an IP address from the DHCP server.
To manually configure DHCP, follow the steps below:
1. Click Setup > Network > Network.
2. Select DHCP from the Obtain IP Address drop-down list.
3. Click Save.
IPv6
1. Click Setup > Network > Network.
2. By default the IPv6 mode is set to Manual.
3. Enter the IPv6 address, set the prefix length and default gateway. The IP address must be unique on the
network.
4. Click Save.
Port
1. Click Setup > Network > Port.
2. Configure relevant port numbers.
3. Click Save.
8
Loading...
+ 29 hidden pages