Dahua Network Camera Web5.0 - Operation Manual - V1.0.1-Eng
Dahua Network Camera Web5.0 - Operation Manual - V1.0.1-Eng
0
Operation Manual
Foreword
General
This manual introduces the functions, configuration, general operation, and system maintenance of
network camera.
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Revision History
Version Revision Content Release Date
● Added "8.6 Setting People Counting"
and "8.8 Setting Heat Map".
● Added "6.2.1.9 Fisheye" and "7.4.4
V1.0.1 Fisheye". May 2021
● Updated "8.2 Setting Face
Recognition".
● Updated "12 Report".
V1.0.0 First release. September 2020
I
Operation Manual
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Operation Manual
Electrical Safety
● All installation and operation shall conform to your local electrical safety codes.
● Use power supply that meets ES1 but does not exceed PS2 limits defined in IEC 62368-1. For
specific power supply requirements, refer to device labels.
● Make sure that the power supply is correct before operating the device.
● A readily accessible disconnecting device shall be incorporated in the building installation wiring.
● Prevent the power cable from being trampled or pressed, especially the plug, power socket and
the junction extruded from the device.
Environment
● Do not aim the device at strong light to focus, such as lamp light and sun light; otherwise it might
cause over brightness or light marks, which are not the device malfunction, and affect the
longevity of Complementary Metal-Oxide Semiconductor (CMOS).
● Do not place the device in a damp, dusty, extremely hot or cold environment, or the locations
with strong electromagnetic radiation or unstable lighting.
● Keep the device away from any liquid to avoid damage to the internal components.
● Keep the indoor device away from rain or damp to avoid fire or lightning.
● Keep sound ventilation to avoid heat accumulation.
● Transport, use and store the device within the range of allowed humidity and temperature.
● Heavy stress, violent vibration or water splash are not allowed during transportation, storage and
installation.
● Pack the device with standard factory packaging or the equivalent material when transporting
the device.
● Install the device in the location where only the professional staff with relevant knowledge of
safety guards and warnings can access. The accidental injury might happen to the
non-professionals who enter the installation area when the device is operating normally.
III
Operation Manual
mild detergent. To avoid possible damage on device body coating which could cause
performance to decrease, do not use volatile solvent such as alcohol, benzene, diluent and so on
to clean the device body, nor can strong, abrasive detergent be used.
● Dome cover is an optical component. Do not touch or wipe the cover with your hands directly
during installation or operation. For removing dust, grease or fingerprints, wipe gently with
moistened oil-free cotton with diethyl or moisten soft cloth. You can also remove dust with an air
blower.
● Strengthen the protection of network, device data and personal information by adopting
measures which include but not limited to using strong password, changing password regularly,
upgrading firmware to the latest version, and isolating computer network. For some device with
old firmware versions, the ONVIF password will not be modified automatically along with the
modification of the system password, and you need to upgrade the firmware or manually update
the ONVIF password.
● Use standard components or accessories provided by manufacturer and make sure that the
device is installed and maintained by professional engineers.
● The surface of the image sensor should not be exposed to laser beam radiation in an
environment where a laser beam device is used.
● Do not provide two or more power supply sources for the device unless otherwise specified. A
failure to follow this instruction might cause damage to the device.
IV
Operation Manual
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings............................................................................................................................................ III
1 Overview ................................................................................................................................................................................................... 1
1.1 Introduction ................................................................................................................................................................................. 1
1.2 Network Connection ................................................................................................................................................................ 1
1.3 Function.......................................................................................................................................................................................... 1
1.3.1 Basic Function .................................................................................................................................................................. 1
1.3.2 AI Function ......................................................................................................................................................................... 2
2 Configuration Flow .............................................................................................................................................................................. 5
3 Device Initialization ............................................................................................................................................................................ 6
4 Login ......................................................................................................................................................................................................... 10
4.1 Device Login ...............................................................................................................................................................................10
4.2 Resetting Password ................................................................................................................................................................11
5 Main Interface ......................................................................................................................................................................................13
6 Setting ...................................................................................................................................................................................................... 14
6.1 Local ...............................................................................................................................................................................................14
6.2 Camera ..........................................................................................................................................................................................15
6.2.1 Setting Image Parameters........................................................................................................................................15
6.2.1.1 Interface Layout .................................................................................................................................................15
6.2.1.2 Image ....................................................................................................................................................................... 17
6.2.1.3 Exposure................................................................................................................................................................. 18
6.2.1.4 Backlight ................................................................................................................................................................20
6.2.1.5 WB..............................................................................................................................................................................21
6.2.1.6 Day/Night...............................................................................................................................................................22
6.2.1.7 Illuminator.............................................................................................................................................................22
6.2.1.8 Defog........................................................................................................................................................................24
6.2.1.9 Fisheye .................................................................................................................................................................... 24
6.2.2 Setting Encode Parameters ..................................................................................................................................... 25
6.2.2.1 Encode ..................................................................................................................................................................... 25
6.2.2.2 Overlay .................................................................................................................................................................... 27
6.2.2.2.1 Configuring Privacy Masking............................................................................................................28
6.2.2.2.2 Configuring Channel Title ..................................................................................................................28
6.2.2.2.3 Configuring Time Title..........................................................................................................................29
6.2.2.2.4 Configuring Location ............................................................................................................................29
6.2.2.2.5 Configuring Font Properties .............................................................................................................30
V
Operation Manual
6.2.2.2.6 Configuring Picture Overlay..............................................................................................................30
6.2.2.2.7 Configuring Custom Title....................................................................................................................31
6.2.2.2.8 Configuring Target Statistics ............................................................................................................31
6.2.2.2.9 Configuring ANPR ................................................................................................................................... 32
6.2.2.2.10 Configuring Face Detection ............................................................................................................33
6.2.2.2.11 Configuring Face Recognition ....................................................................................................... 33
6.2.2.2.12 Configuring Face Statistics..............................................................................................................34
6.2.2.2.13 Configure Face&Body Counting ................................................................................................... 34
6.2.2.3 ROI .............................................................................................................................................................................35
6.2.3 Audio ...................................................................................................................................................................................36
6.2.3.1 Setting Audio Parameters .............................................................................................................................36
6.2.3.2 Setting Alarm Tone ...........................................................................................................................................37
6.3 Network ........................................................................................................................................................................................38
6.3.1 TCP/IP..................................................................................................................................................................................38
6.3.2 Port.......................................................................................................................................................................................41
6.3.3 PPPoE ..................................................................................................................................................................................44
6.3.4 DDNS ...................................................................................................................................................................................44
6.3.5 Email ....................................................................................................................................................................................46
6.3.6 UPnP ....................................................................................................................................................................................47
6.3.7 SNMP ...................................................................................................................................................................................48
6.3.8 Bonjour ..............................................................................................................................................................................51
6.3.9 Multicast............................................................................................................................................................................51
6.3.10 Register ...........................................................................................................................................................................52
6.3.11 QoS ....................................................................................................................................................................................53
6.3.12 Platform Access ...........................................................................................................................................................53
6.3.12.1 P2P ..........................................................................................................................................................................53
6.3.12.2 ONVIF .................................................................................................................................................................... 54
6.3.12.3 RTMP ...................................................................................................................................................................... 54
6.3.13 Basic Service ................................................................................................................................................................. 55
6.4 Event ..............................................................................................................................................................................................57
6.4.1 Setting Alarm Linkage................................................................................................................................................57
6.4.1.1 Setting Alarm-in .................................................................................................................................................57
6.4.1.2 Alarm Linkage......................................................................................................................................................58
6.4.1.2.1 Adding Schedule ..................................................................................................................................... 58
6.4.1.2.2 Record Linkage......................................................................................................................................... 59
6.4.1.2.3 Snapshot Linkage ................................................................................................................................... 60
6.4.1.2.4 Alarm-out Linkage.................................................................................................................................. 60
VI
Operation Manual
6.4.1.2.5 Email Linkage............................................................................................................................................60
6.4.1.3 Subscribing Alarm .............................................................................................................................................61
6.4.1.3.1 About Alarm Types................................................................................................................................. 61
6.4.1.3.2 Subscribing Alarm Information ....................................................................................................... 61
6.4.2 Setting Exception .........................................................................................................................................................62
6.4.2.1 Setting SD Card Exception ............................................................................................................................63
6.4.2.2 Setting Network Exception ...........................................................................................................................63
6.4.2.3 Setting Voltage Detection .............................................................................................................................64
6.4.3 Setting Video Detection ............................................................................................................................................65
6.4.3.1 Setting Motion Detection ..............................................................................................................................65
6.4.3.2 Setting Video Tampering...............................................................................................................................67
6.4.3.3 Setting Scene Changing ................................................................................................................................. 68
6.4.4 Setting Audio Detection ............................................................................................................................................69
6.5 Storage..........................................................................................................................................................................................70
6.6 System ...........................................................................................................................................................................................71
6.6.1 General ...............................................................................................................................................................................71
6.6.1.1 Basic ..........................................................................................................................................................................71
6.6.1.2 Date & Time...........................................................................................................................................................72
6.6.2 Account ..............................................................................................................................................................................73
6.6.2.1 User ...........................................................................................................................................................................73
6.6.2.1.1 Adding User ...............................................................................................................................................73
6.6.2.1.2 Resetting Password ...............................................................................................................................76
6.6.2.2 Adding User Group ...........................................................................................................................................77
6.6.2.3 ONVIF User ............................................................................................................................................................78
6.6.3 Peripheral Management ...........................................................................................................................................79
6.6.3.1 Configuring Serial Port ................................................................................................................................... 79
6.6.3.2 Configuring External Light............................................................................................................................80
6.6.3.3 Configuring Wiper .............................................................................................................................................80
6.6.4 Manager ............................................................................................................................................................................81
6.6.4.1 Requirements ......................................................................................................................................................81
6.6.4.2 Maintenance.........................................................................................................................................................81
6.6.4.3 Import/Export ......................................................................................................................................................82
6.6.4.4 Default ..................................................................................................................................................................... 83
6.6.5 Upgrade .............................................................................................................................................................................83
6.7 System Information ................................................................................................................................................................84
6.7.1 Version ...............................................................................................................................................................................84
6.7.2 Online User....................................................................................................................................................................... 84
VII
Operation Manual
6.8 Setting Log ..................................................................................................................................................................................84
6.8.1 Log........................................................................................................................................................................................84
6.8.2 Remote Log ...................................................................................................................................................................... 85
7 Live.............................................................................................................................................................................................................87
7.1 Live Interface .............................................................................................................................................................................87
7.2 Setting Encode ..........................................................................................................................................................................88
7.3 Live View Function Bar..........................................................................................................................................................88
7.4 Window Adjustment Bar ......................................................................................................................................................90
7.4.1 Adjustment ...................................................................................................................................................................... 90
7.4.2 Zoom and Focus ............................................................................................................................................................90
7.4.3 Image Adjustment........................................................................................................................................................92
7.4.4 Fisheye ...............................................................................................................................................................................92
7.5 Display Mode .............................................................................................................................................................................96
8 AI .............................................................................................................................................................................................................. 100
8.1 Setting Crowd Distribution Map ................................................................................................................................... 100
8.1.1 Global Configuration ............................................................................................................................................... 100
8.1.2 Rule Configuration .................................................................................................................................................... 101
8.2 Setting Face Recognition .................................................................................................................................................. 103
8.2.1 Setting Face Detection ............................................................................................................................................ 103
8.2.2 Setting Face Database ............................................................................................................................................. 106
8.2.2.1 Creating Face Database ............................................................................................................................... 106
8.2.2.2 Adding Face Picture....................................................................................................................................... 108
8.2.2.2.1 Single Adding ........................................................................................................................................ 108
8.2.2.2.2 Batch Importing.................................................................................................................................... 110
8.2.2.3 Managing Face Picture ................................................................................................................................. 111
8.2.2.3.1 Editing Face Information ................................................................................................................. 111
8.2.2.3.2 Deleting Face Picture ......................................................................................................................... 112
8.2.2.4 Face Modeling .................................................................................................................................................. 113
8.2.3 Setting Arm Alarm ..................................................................................................................................................... 113
8.2.4 Viewing Face Recognition Result....................................................................................................................... 117
8.3 Setting Face Detection ....................................................................................................................................................... 117
8.4 Setting IVS ................................................................................................................................................................................ 120
8.4.1 Global Configuration ............................................................................................................................................... 120
8.4.2 Rule Configuration .................................................................................................................................................... 122
8.5 Setting Video Metadata .................................................................................................................................................... 125
8.5.1 Global Configuration ............................................................................................................................................... 125
8.5.2 Rule Configuration .................................................................................................................................................... 127
VIII
Operation Manual
8.5.3 Viewing Video Metadata Report ........................................................................................................................ 129
8.6 Setting People Counting ................................................................................................................................................... 129
8.6.1 People Counting......................................................................................................................................................... 130
8.6.2 Queuing .......................................................................................................................................................................... 132
8.6.3 Global Configuration ............................................................................................................................................... 134
8.7 Face & Body Detection ....................................................................................................................................................... 135
8.7.1 Global Configuration ............................................................................................................................................... 135
8.7.2 Rule Configuration .................................................................................................................................................... 136
8.8 Setting Heat Map .................................................................................................................................................................. 138
8.9 Setting ANPR........................................................................................................................................................................... 139
9 Security ................................................................................................................................................................................................. 142
9.1 Security Status ....................................................................................................................................................................... 142
9.2 System Service ....................................................................................................................................................................... 143
9.2.1 802.1x .............................................................................................................................................................................. 143
9.2.2 HTTPS............................................................................................................................................................................... 144
9.3 Attack Defense ....................................................................................................................................................................... 145
9.3.1 Firewall............................................................................................................................................................................ 145
9.3.2 Account Lockout ........................................................................................................................................................ 146
9.3.3 Anti-DoS Attack .......................................................................................................................................................... 146
9.4 CA Certificate .......................................................................................................................................................................... 147
9.4.1 Installing Device Certificate ................................................................................................................................. 147
9.4.1.1 Creating Certificate ........................................................................................................................................ 147
9.4.1.2 Applying for and Importing CA Certificate ........................................................................................ 148
9.4.1.3 Installing Existing Certificate.................................................................................................................... 149
9.4.2 Installing Trusted CA Certificate ........................................................................................................................ 150
9.5 A/V Encryption ....................................................................................................................................................................... 151
9.6 Security Warning .................................................................................................................................................................. 152
10 Record................................................................................................................................................................................................. 153
10.1 Playback ................................................................................................................................................................................. 153
10.1.1 Playing Back Video ................................................................................................................................................. 153
10.1.2 Clipping Video .......................................................................................................................................................... 155
10.1.3 Downloading Video ............................................................................................................................................... 156
10.2 Setting Record Control .................................................................................................................................................... 157
10.3 Setting Record Plan........................................................................................................................................................... 158
10.4 Storage .................................................................................................................................................................................... 159
10.4.1 Local Storage............................................................................................................................................................. 160
10.4.2 Network Storage ..................................................................................................................................................... 161
IX
Operation Manual
10.4.2.1 FTP ....................................................................................................................................................................... 161
10.4.2.2 NAS ...................................................................................................................................................................... 162
11 Picture................................................................................................................................................................................................. 164
11.1 Playback ................................................................................................................................................................................. 164
11.1.1 Playing Back Picture .............................................................................................................................................. 164
11.1.2 Downloading Picture ............................................................................................................................................ 165
11.2 Setting Snapshot Parameters ...................................................................................................................................... 166
11.3 Setting Snapshot Plan ..................................................................................................................................................... 167
11.4 Storage .................................................................................................................................................................................... 167
11.5 Setting Upload Method .................................................................................................................................................. 168
12 Report ................................................................................................................................................................................................. 169
12.1 Viewing Report.................................................................................................................................................................... 169
12.1.1 Face Recognition ..................................................................................................................................................... 169
12.1.2 Video Metadata........................................................................................................................................................ 170
12.1.3 People Counting ...................................................................................................................................................... 171
12.1.4 Heat Map ..................................................................................................................................................................... 174
12.1.5 ANPR .............................................................................................................................................................................. 176
12.2 Searching for Face Picture ............................................................................................................................................. 177
12.3 Auto Upload.......................................................................................................................................................................... 178
Appendix 1 Cybersecurity Recommendations ..................................................................................................................... 183
X
Operation Manual
1 Overview
1.1 Introduction
IP camera (Internet Protocol camera), is a type of digital video camera that receives control data and
sends image data through internet. They are commonly used for surveillance, requiring no local
recording device, but only a local area network.
IP camera is divided into single-channel camera and multi-channel camera according to the channel
quantity. For multi-channel camera, you can set the parameters for each channel.
Get IP address by searching on ConfigTool, and then you can start accessing IPC through network.
1.3 Function
Functions might vary with different devices.
Real-time Monitoring
● Live view.
● When live viewing the image, you can enable audio, voice talk and connect monitoring center for
quick processing on the abnormality.
● Adjust the image to the proper position by PTZ.
1
Operation Manual
● Snapshot and triple snapshot abnormality of the monitoring image for subsequent view and
processing.
● Record abnormality of monitoring image for subsequent view and processing.
● Configure coding parameters, and adjust live view image.
Alarm
● Set alarm prompt mode and tone according to alarm type.
● View alarm prompt message.
Exception
● SD card error, network disconnection, illegal access, voltage detection and security exception.
● When SD card error or illegal access is triggered, the system links alarm output and sending
email.
● When network disconnection alarm is triggered, the system links recording and alarm output.
● When the input voltage is more or less than the rated voltage, the alarm is triggered and the
system links sending email.
Video Detection
● Motion detection, video tampering detection and scene changing detection.
● When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Audio Detection
● Audio input abnormal detection and intensity change detection.
● When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Record
● Auto record as schedule.
● Play back recorded video and picture as needed.
● Download recorded video and picture.
● Alarm linked recording.
Account
● Add, edit and delete user group, and manage user authorities according to user group.
● Add, edit and delete user, and configure user authorities.
● Change user password.
1.3.2 AI Function
IVS
● Tripwire, intrusion, abandoned object, moving object, fast moving, parking detection, people
gathering, and loitering detection.
● When an alarm is triggered, the system performs linkages such as recording, alarm output,
2
Operation Manual
sending email, and snapshot.
Face Detection
● Detects face and display the related attributes on the live interface.
● When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Face Recognition
● Displays the recognition result on the live view interface.
● In general mode, makes comparison between the detected face with the faces in face database
after detecting face,. You can set the alarm mode and reporting mode for each face database
separately, and set linkages for each reporting mode.
● In counting mode, does precise face counting after detecting face.
● When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Video Metadata
● Captures people, non-motor vehicle and vehicle, and displays the related information on the live
interface.
● When an alarm is triggered, the system links alarm output.
People Counting
● Counts the people flow in/out the detection area, and generates report.
● When the number of counted number of people in the detection area or the stay duration
exceeds the configured value, an alarm will be triggered.
● When an alarm is triggered, the system performs linkages such as recording, alarm output,
sending email, PTZ operation, and snapshot.
Heat Map
● Counts cumulative density of moving objects, and displays the result in different colors..
● View report of heat map, which includes heat map and track map (track map is not available on
economic fisheye cameras).
ANPR
● Recognizes plate number in detection area, and displays the related information on live interface.
● When an alarm is triggered, the system links alarm output and snapshot.
3
Operation Manual
glasses, safety vests, top color, and bottom color, and determine whether PPE requirements are
met. PPE compliance or non-compliance alarms can be triggered according to the alarm settings.
● When an alarm is triggered, the system links alarm output and snapshot.
4
Operation Manual
2 Configuration Flow
For the device configuration flow, see Figure 2-1. For details, see Table 2-1. Configure the device
according to the actual situation.
5
Operation Manual
3 Device Initialization
Device initialization is required for the first-time use. This manual is based on the operation on the
web interface. You can also initialize device through ConfigTool, NVR, or platform devices.
● To ensure the device safety, keep the password properly after initialization and change the
password regularly.
● When initializing device, keep the PC IP and device IP in the same network.
Step 1 Open IE browser, enter the IP address of the device in the address bar, and then press the
Enter key.
Step 2 Select the area, language, and video standard according to the actual situation, and then
click Next.
6
Operation Manual
Figure 3-2 Disclaimer
Step 3 Select the I have read and agree to the terms of the Software License Agreement and
Privacy Policy check box, and then click Next.
7
Operation Manual
Figure 3-4 Password setting
8
Operation Manual
Figure 3-5 P2P
9
Operation Manual
4 Login
● You need to initialize the camera before logging in to the web interface. For details, see "3 Device
Initialization".
● When initializing the camera, keep the PC IP and device IP in the same network.
● Follow the instruction to download and install the plug-in for the first login.
Step 1 Open IE browser, enter the IP address of the camera (192.168.1.108 by default) in the
address bar and press Enter.
Step 2 Enter the username and password.
The username is admin by default.
Click Forget password?, and you can reset the password through the email address that is
set during the initialization. For details, see "4.2 Resetting Password".
10
Operation Manual
Figure 4-2 Live interface
Prerequisites
You have enabled password resetting service. For details, see "6.6.2.1.2 Resetting Password".
Procedure
Step 1 Open IE browser, enter the IP address of the device in the address bar and press Enter.
Step 2 Click Forget password?, and you can reset the password through the email address that is
11
Operation Manual
set during the initialization.
12
Operation Manual
5 Main Interface
Click at the left-upper corner of the interface to display the main interface.
13
Operation Manual
6 Setting
This section introduces the basic setting of the camera, including the configuration of Local, Camera,
Network, Event, Storage, System, System Information and Log.
For Camera, Event and System, you can go to the configuration interface through two methods.
This section takes method 1 as an exanple.
● Method 1: Click , and then select the corresponding item.
● Method 2: Click the corresponding icon on the main interface.
6.1 Local
You can select protocol and configure the storage path for live snapshot, live record, playback
snapshot, playback download, and video clips.
Step 1 Select > Local.
Step 2 Click Browse to select the storage path for live snapshot, live record, playback snapshot,
playback download, and video clips.
14
Operation Manual
Table 6-1 Description of local parameter
Parameter Description
You can select the network transmission protocol as needed, and the
options are TCP, UDP and Multicast.
Protocol
Before selecting Multicast, make sure that you have set the Multicast
parameters.
The recorded video of live interface.
Live Record The default path is
C:\Users\admin\WebDownload\LiveRecord.
The downloaded video of playback interface.
Playback The default path is
Download C:\Users\admin\WebDownload\PlaybackRecor
d.
The clipped video of playback interface.
Video Clips Admin in the path refers
C:\Users\admin\WebDownload\VideoClips. to the account being
The snapshot of live interface. used.
Live Snapshot The default path is
C:\Users\admin\WebDownload\LiveSnapshot.
The snapshot of playback interface.
6.2 Camera
This section introduces the camera setting, including image parameters, encoder parameters, and
audio parameters.
15
Operation Manual
the selected mode, such as picture, exposure, and backlight.
Select the working mode as needed.
● Self-adaptive: The camera will adjust the image according to the environment.
● Customized scene: You can select the profile as needed. Select the profile in Time Plan Setting
and drag the slide block to set certain time as the selected profile. For example, set 8:00–18:00 as
day, and 0:00–8:00 and 18:00–24:00 as night
● Day/night switch: You can select Day or night in Profile and the surveillance system works under
Day/Night.
16
Operation Manual
Figure 6-4 Interface layout (Day/night switch)
6.2.1.2 Image
You can configure picture parameters as needed.
Step 1 Select > Camera > Image > Image.
17
Operation Manual
Parameter Description
Makes the color deeper or lighter. The higher the value is, the deeper
Saturation the color will be, and the lower the lighter. Saturation value does not
change image brightness.
Changes the sharpness of picture edges. The higher the value is, the
Sharpness clearer the picture edges will be, and if the value is set too big, picture
noises are more likely to appear.
Changes the picture brightness and improves the picture dynamic
Gamma range in a non-linear way. The higher the value is, the brighter the
picture will be, and the smaller the darker.
Changes the display direction of the picture, see the options below.
● 0°: Normal display.
● 90°: The picture rotates 90° clockwise.
● 180°: The picture rotates 90° counterclockwise.
Flip ● 270°: The picture flips upside down.
6.2.1.3 Exposure
Configure iris and shutter to improve image clarity.
Cameras with true WDR do not support long exposure when WDR is enabled in Backlight.
Step 1 Select > Camera > Image > Exposure.
18
Operation Manual
Table 6-3 Description of exposure parameters
Parameter Description
You can select from 50 Hz, 60 Hz and Outdoor.
● 50 Hz: When the electric supply is 50 Hz, the system adjusts the
exposure according to ambient light automatically to ensure that
there is no stripe appears.
Anti-flicker
● 60 Hz: When the electric supply is 60 Hz, the system adjusts the
exposure according to ambient light automatically to ensure that
there is no stripe appears.
● Outdoor: You can select any exposure mode as needed.
Device exposure modes.
● Auto: Adjusts the image brightness according to the actual
condition automatically.
● Gain Priority: When the exposure range is normal, the system
prefers the configured gain range when auto adjusting according
to the ambient lighting condition. If the image brightness is not
enough and the gain has reached upper or lower limit, the system
adjusts shutter value automatically to ensure the image at ideal
brightness. You can configure gain range to adjust gain level when
using gain priority mode.
Mode ● Shutter priority: When the exposure range is normal, the system
prefers the configured shutter range when auto adjusting
according to the ambient lighting condition. If the image
brightness is not enough and the shutter value has reached upper
or lower limit, the system adjusts gain value automatically to
ensure the image at ideal brightness.
● Manual: Configure gain and shutter value manually to adjust image
brightness.
When the Anti-flicker is set to Outdoor, you can select Auto, Gain
priority, Shutter priority or Manual in the Mode list.
Exposure Sets the value, and it ranges from 0 to 50. The higher the value is, the
Compensation brighter the image will be.
Set the effective exposure time. The smaller the value, the shorter the
Shutter
exposure time will be.
When selecting Gain Priority or Manual in Mode, you can set Gain.
Gain With minimum illumination, the camera increases Gain automatically to
get clearer images.
19
Operation Manual
Parameter Description
This configuration is available only when the camera is equipped with
auto-iris lens.
● When auto iris is enabled, the iris size changes automatically
Auto Iris according to the ambient lighting condition, and the image
brightness changes accordingly.
● When auto iris is disabled, the iris stays at full size and does not
change no matter how ambient lighting condition changes.
Works with multi-frame (no less than 2 frames) images and reduces
3D NR noise by using the frame information between previous and latter
frames.
This configuration is available only when the 3D NR is enabled.
Level
The higher the level is, the better the result will be.
Step 3 Click Apply.
6.2.1.4 Backlight
You can select backlight mode from Auto, BLC, WDR, and HLS.
Step 1 Select > Camera > Image > Backlight.
20
Operation Manual
There might be a few seconds of video loss when the device is switching
to WDR mode from other mode.
Enable HLC when extreme strong light is in the environment (such as toll
station or parking lot), the camera will dim strong light, and reduce the
HLC size of Halo zone to lower the brightness of the whole image, so that the
camera can capture human face or car plate detail clearly. The higher the
value is, the more obvious the HLC effect will be.
Enable SSA, the system automatically adjusts the image brightness
SSA
according to the environment to make the objects in the image clearer.
Step 3 Click Apply.
6.2.1.5 WB
WB function makes the image color display precisely as it is. When in WB mode, white objects would
always display white color in different environments.
Step 1 Select > Camera > Image > WB.
Figure 6-8 WB
21
Operation Manual
WB mode Description
The system compensates WB only to the set area according to color
Custom Area
temperature to ensure color precision.
Step 3 Click Apply.
6.2.1.6 Day/Night
Configure the display mode of the image. The system switches between color and black-and-white
mode according to the actual condition.
Step 1 Select > Camera > Image > WB.
Delay You can configure the delay when camera switching between color and
black-and-white mode. The lower the value is, the faster the camera
switches between color and black-and-white mode.
Step 3 Click Apply.
6.2.1.7 Illuminator
This configuration is available only when the device is equipped with illuminator.
22
Operation Manual
23
Operation Manual
6.2.1.8 Defog
The image quality is compromised in foggy or hazy environment, and defog can be used to improve
image clarity.
Step 1 Select > Camera > Image > Defog.
6.2.1.9 Fisheye
Select installation mode and record mode according to the actual installation scene. When the
camera accesses the platform with corrective stream, the platform displays the corrective image.
24
Operation Manual
Table 6-9 Description of fisheye parameters
Parameter Description
installation Mode You can select Ceiling, Wall, or Ground.
● 1O: The original image before correction.
● 1P: 360°rectangular panoramic image.
● 2P: When the installation mode is Ceiling or Ground, you can set
this mode. Two associated 180° rectangular image screens; at any
time, the two screens form a 360° panoramic image.
● 1R: Original image screen + independent sub-screen. You can
zoom or drag the image in all the screens.
Record Mode ● 2R: Original image screen + two independent sub-screens. You
can zoom or drag the image in all the screens.
● 4R: Original image screen + four independent sub-screens. You
can zoom or drag the image in all the screens.
● 1O + 3R: Original image screen + three independent sub-screens.
You can zoom or drag the image in original image screen, and
move the image (upper and lower) in sub-screens to adjust the
vertical view.
Step 3 Click Apply.
Click Default, and the device is restored to default configuration. Click Refresh to view the latest
configuration.
6.2.2.1 Encode
Configure video stream parameters, such as compression, resolution, frame rate, bit rate type, bit
rate, I frame interval, SVC, and watermark.
Step 1 Select > Camera > Encode > Encode.
25
Operation Manual
Figure 6-13 Encode
Sub Stream
You can enable multiple sub streams simultaneously.
Smart Codec
After smart codec is enabled, the device would stop supporting the
third bit stream, ROI, and smart event detection.
Output Mode You can select from Single Stream or Flex Stream.
The resolution of the video. The higher the value is, the clearer the
Resolution
image will be, but the bigger the required bandwidth will be.
26
Operation Manual
Parameter Description
The number of frame in one second of video. The higher the value is,
Frame Rate (FPS)
the clearer and smoother the video will be.
The bit rate control type during video data transmission. You can
select bit rate type from:
● CBR (Constant Bit Rate): The bit rate changes a little and keeps
close to the defined bit rate value.
Bit Rate Type ● VBR (Variable Bit Rate): The bit rate changes as monitoring
scene changes.
The Bit Rate Type can be only be set as CBR when Encode Mode is
set as MJPEG.
This parameter can be configured only when the Bit Rate Type is set
as VBR.
Quality
The better the quality is, but the bigger the required bandwidth will
be.
The most suitable bit rate value range recommended to user
Reference Bit Rate
according to the defined resolution and frame rate.
This parameter can be configured only when the Bit Rate Type is set
as VBR.
Max Bit Rate You can select the value of the Max Bit Rate according to the
Reference Bit Rate value. The bit rate then changes as monitoring
scene changes, but the max bit rate keeps close to the defined value.
This parameter can be configured only when the Bit Rate Type is set
Bit Rate as CBR.
Select bit rate value in the list according to actual condition.
The number of P frames between two I frames, and the I Frame
I Frame Interval Interval range changes as FPS changes.
It is recommended to set I Frame Interval twice as big as FPS.
Scaled video coding, is able to encode a high quality video bit
stream that contains one or more subset bit streams. When sending
stream, to improve fluency, the system will quit some data of related
lays according to the network status.
SVC
● 1: The default value, which means that there is no layered
coding.
● 2, 3 and 4: The lay number that the video stream is packed.
Watermark You can verify the watermark to check if the video has been
Watermark String tampered.
Step 3 Click Apply.
6.2.2.2 Overlay
Configure overlay information, and it will be displayed on the Live interface.
27
Operation Manual
You can enable this function when you need to protect the privacy of some area on the video image.
You can select the type of the masking from Color Block and Mosaic.
● When selecting Color Block only, you can draw triangles and convex quadrilaterals as blocks.
You can drag 8 blocks at most, and the color is black.
● When selecting Mosaic, you can draw rectangles as blocks with mosaic. You can draw 4 blocks at
most.
● Color Block + Mosaic: You can draw 8 blocks at most.
Step 1 Select > Camera > Encode > Overlay > Privacy Masking.
Related Operations
● View and edit the block
Select the privacy masking rule to be edited in the list, then the rule is highlighted, and the block
frame is displayed in the image. You can edit the selected block as needed, including moving the
position, and adjusting the size.
● Edit the block name
Double-click the name in Name to edit the block name.
● Delete the block
◇ Click to delete blocks one by one.
◇ Click Clear to delete all blocks.
You can enable this function when you need to display channel title in the video image.
Step 1 Select > Camera > Encode > Overlay > Channel Title.
28
Operation Manual
Figure 6-15 Channel title
Step 2 Click next to Enable, enter the channel title, and select the text alignment.
Click to add the channel title, and you can add 1 line at most.
Step 3 Move the title box to the position that you want in the image.
Step 4 Click Apply.
You can enable this function when you need to display time in the video image.
Step 1 Select > Camera > Encode > Overlay > Time Title.
You can enable this function if you need to display text in the video image.
Text overlay and picture overlay cannot work at the same time, and the IPC that connects to mobile
NVR with private protocol would display GPS information as priority.
Step 1 Select > Camera > Encode > Overlay > Location.
29
Operation Manual
Figure 6-17 Location
Step 2 Click next to Enable, enter the location information, and then select alignment. The
text is displayed in the video image.
Click to add the text overlay, and you can add 13 lines at most.
Step 3 Move the text box to the position that you want in the image.
Step 4 Click Apply.
You can enable this function if you need to adjust the font size in the video image.
Step 1 Select > Camera > Encode > Overlay > Font Properties.
You can enable this function if you need to display picture information on the video image.
Text overlay and picture overlay cannot work at the same time.
Step 1 Select > Camera > Encode > Overlay > Picture Overlay.
30
Operation Manual
Figure 6-19 Picture overlay
Step 2 Click next to Enable, click Upload, and then select the picture to be overlaid.
The picture is displayed on the video image.
Step 3 Move the overlaid picture to the position that you want in the image.
Step 4 Click Apply.
You can enable this function if you need to display custom information on the video image.
Step 1 Select > Camera > Encode > Overlay > Custom Title
Step 2 Click next to Enable, enter the text that you want to display, and then select the
text alignment.
Click to add the text overlay, and you can add 1 line at most.
Step 3 Move the custom box to the position that you want in the image.
Step 4 Click Apply.
After configuring the target statistics, the number of target statistics will be displayed in the image.
Step 1 Select > Camera > Encode > Overlay > Target Statistics.
31
Operation Manual
Figure 6-21 Target statistics
Step 2 Click next to Enable, select the statistics type, and then select the text alignment.
The image displays ANPR statistics information. When the overlay function is enabled during
intelligent rules configuration, this function is enabled simultaneously.
Step 1 > Camera > Encode > Overlay > ANPR.
Step 2 Select the Enable check box, select the statistics type, and then select text alignment.
32
Operation Manual
The image displays face statistics information. When the overlay function is enabled during
intelligent rules configuration, this function is enabled simultaneously.
Step 1 Select > Camera > Encode > Overlay > Face Detection.
The image displays face statistics information. When the overlay function is enabled during
intelligent rules configuration, this function is enabled simultaneously.
Step 1 Select > Camera > Encode > Overlay > Face Recognition.
Step 2 Click next to Enable, select the statistics type, and then select the text alignment.
33
Operation Manual
The image displays face statistics information. When the overlay function is enabled during
intelligent rules configuration, this function is enabled simultaneously.
Step 1 Select > Camera > Encode > Overlay > Face Statistics.
The image displays face&body counting information. When the overlay function is enabled during
intelligent rules configuration, this function is enabled simultaneously.
Step 1 > Camera > Encode > Overlay > Face&Body Counting.
34
Operation Manual
Figure 6-26 Face&body counting
Step 2 Select the Enable check box, and then select text alignment.
6.2.2.3 ROI
Select ROI (region of interest) on the image and configure the image quality of ROI, and then the
selected image is display at defined quality.
Step 1 Select > Camera > Encode > ROI.
Step 2 Click next to Enable, draw an area on the image, and then configure the image
quality of ROI.
35
Operation Manual
6.2.3 Audio
You can configure audio parameters and alarm audio.
Please carefully activate the audio acquisition function according to the actual
requirements of the application scenario.
Step 3 Configure audio parameters.
36
Operation Manual
Parameter Description
You can select audio input type from:
Audio Input Type ● LineIn: Requires external audio device.
● Mic: Not require external audio device.
Noise Filter Enable this function, and the system auto filters ambient noise.
Microphone Volume Adjusts microphone volume.
Speaker Volume Adjusts speaker volume.
Step 4 Click Apply.
37
Operation Manual
● The camera supports recording audio file in .pcm format only. Recording is only
supported by select models.
● You can upload audio files in .pcm, .wav2, .mp3, or .aac format.
Related Operations
● Edit audio file
Click to edit the file name.
● Delete audio file
Click to delete the file name.
● Play audio file
Click to play the file name.
● Download audio file
Click to download the file name.
6.3 Network
This section introduces network configuration.
6.3.1 TCP/IP
You can configure IP address and DNS (Domain Name System) server and so on according to
network planning.
Prerequisites
The camera has connected to the network.
Procedure
Step 1 Select > Network > TCP/IP.
38
Operation Manual
Figure 6-31 TCP/IP
39
Operation Manual
Parameter Description
Click to enable ARP/Ping to set IP address service. Get the
camera MAC address, and then you can change and configure the
device IP address with ARP/ping command.
This is enabled by default. During restart, you will have no more than
2 minutes to configure the device IP address by a ping packet with
certain length, the server will be turned off in 2 minutes, or it will be
turned off immediately after the IP address is successfully configured.
If this is not enabled, the IP address cannot be configured with ping
packet.
A demonstration of configuring IP address with ARP/Ping.
1. Keep the camera that needs to be configured and the PC within
the same local network, and then get a usable IP address.
2. Get the MAC address of the camera from device label.
3. Open command editor on the PC and enter the following
command.
ARP/Ping
40
Operation Manual
Parameter Description
The mode that the camera gets IP:
● Static
Configure IP Address, Subnet Mask, and Default Gateway
Mode manually, and then click Save, the login interface with the
configured IP address is displayed.
● DHCP
When there is DHCP server in the network, select DHCP, and the
camera acquires IP address automatically.
MAC Address Displays host MAC address.
IP Version Select IPv4 or IPv6.
IP Address When you select Static in Mode, enter the IP address and subnet
mask that you need.
Subnet Mask
6.3.2 Port
Configure the port numbers and the maximum number of users (includes web, platform client, and
mobile phone client) that can connect to the device simultaneously.
Step 1 Select > Network > TCP/IP.
41
Operation Manual
Figure 6-32 Port
● 0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, 42323 are occupied
for specific uses.
● Do not use the same value of any other port during port configuration.
42
Operation Manual
Parameter Description
● Real time streaming protocol port, and the value is 554 by
default. If you play live view with QuickTime, VLC or Blackberry
smart phone, the following URL format is available.
● When the URL format requiring RTSP, you need to specify
channel number and bit stream type in the URL, and also
username and password if needed.
● When playing live view with Blackberry smart phone, you need to
turn off the audio, and then set the codec mode to H.264B and
resolution to CIF.
URL format example:
rtsp://username:password@ip:port/cam/realmonitor?channel=1&sub
type=0
Among that:
RTSP Port ● Username: The username, such as admin.
● Password: The password, such as admin.
● IP: The device IP, such as 192.168.1.112.
● Port: Leave it if the value is 554 by default.
● Channel: The channel number, which starts from 1. For example,
if you are using channel 2, then the channel=2.
● Subtype: The bit stream type; 0 means main stream (Subtype=0)
and 1 means sub stream (Subtype=1).
Example: If you require the sub stream of channel 2 from a certain
device, then the URL should be:
rtsp://admin:[email protected]:554/cam/realmonitor?channel=21&=
1
If username and password are not needed, then the URL can be:
rtsp://ip:port/cam/realmonitor?channel=11&=0
Real Time Messaging Protocol. The port that RTMP provides service. It
RTMP Port
is 1935 by default.
HTTPS Port HTTPS communication port. It is 443 by default.
Step 3 Click Apply.
43
Operation Manual
The configuration of Max Connection takes effect immediately, and others will take effect
after reboot.
6.3.3 PPPoE
Point-to-Point Protocol over Ethernet, is one of the protocols that device uses to connect to the
internet. Get the PPPoE username and password from the internet service provider, and then set up
network connection through PPPoE, the camera will acquire a WAN dynamic IP address.
Prerequisites
● The camera has connected to the network.
● You have gotten the account and password from Internet Service Provider.
Procedure
Step 1 Select > Network > PPPoE.
6.3.4 DDNS
Properly configure DDNS, and then the domain name on the DNS server matches your IP address
and the matching relation refreshes in real time. You can always visit the camera with the same
domain name no matter how the IP address changes.
Prerequisites
Check the type of DNS server supported by the camera.
Step 1 Select > Network > DDNS.
44
Operation Manual
● Third party server might collect your device information after DDNS is enabled.
● Register and log in to the DDNS website, and then you can view the information of all
the connected devices in your account.
Result
Open the browser on PC, enter the domain name at the address bar, and then press Enter, the login
interface is displayed.
45
Operation Manual
6.3.5 Email
Configure email parameter and enable email linkage. The system sends email to the defined address
when the corresponding alarm is triggered.
Step 1 Select > Network > Email.
46
Operation Manual
Parameter Description
Attachment Select the check box to support attachment in the email.
● Receiver’s email address. Supports 3 addresses at most.
Receiver ● After entering the receiver's email address, the Test button is
display. Click Test to test whether the emails can be sent and
received successfully.
The system sends test mail to check if the connection is successfully
Health Mail configured. Click and configure the Sending Interval, and then
the system sends test mail as the set interval.
For the configuration of major mailboxes, see Table 6-16.
6.3.6 UPnP
UPnP (Universal Plug and Play) is a protocol that establishes mapping relation between local area
and wide area networks. This function enables you to visit local area device through wide area IP
address.
Prerequisites
● Make sure the UPnP service is installed in the system.
● Log in the router, and configure WAN IP address to set up internet connection.
● Enable UPnP in the router.
● Connect your device to the LAN port of the router.
● Select > Network > TCP/IP, in IP Address, enter the local area IP address of the router or
select DHCP and acquires IP address automatically.
Procedure
Step 1 Select > Network > UPnP.
47
Operation Manual
Figure 6-36 UPnP
Step 2 Click next to Enable, and there are two mapping modes: Custom and Default.
● Select Custom, click and then you can change external port as needed.
● Select Default, and then the system finishes mapping with unoccupied port
automatically, and you cannot edit mapping relation.
Step 3 Click Apply.
Open web browser on PC, enter http:// wide area IP address: external port number, and
then you can visit the local area device with corresponding port.
6.3.7 SNMP
SNMP (Simple Network Management Protocol), which can be used to enable software such as MIB
Builder and MG-SOFT MIB Browser to connect to the camera and manage and monitor the camera.
Prerequisites
● Install SNMP monitoring and managing tools such as MIB Builder and MG-SOFT MIB Browser.
● Get the MIB file of the matched version from technical support.
Procedure
Step 1 Select > Network > SNMP.
48
Operation Manual
Figure 6-37 SNMP (1)
49
Operation Manual
authentication type to visit your device from the server.
You can enter number, letter, and underline to form the name.
Set the read/write username access device, and it is private by
default.
Read/Write Username
You can enter number, letter, and underline to form the name.
Authentication Type You can select from MD5 and SHA. The default type is MD5.
Authentication Password It should be no less than 8 digits.
Encryption Type The default is CBC-DES.
Encryption Password It should be no less than 8 digits.
Step 4 Click Apply.
Result
View device configuration through MIB Builder or MG-SOFT MIB Browser.
1. Run MIB Builder and MG-SOFT MIB Browser.
2. Compile the two MIB files with MIB Builder.
3. Load the generated modules with MG-SOFT MIB Browser.
4. Enter the IP address of the device you need to manage in the MG-SOFT MIB Browser, and then
select version to search.
5. Unfold all the tree lists displayed in the MG-SOFT MIB Browser, and then you can view the
configuration information, video channel amount, audio channel amount, and software version.
50
Operation Manual
Use PC with Windows and disable SNMP Trap service. The MG-SOFT MIB Browser will display prompt
when alarm is triggered.
6.3.8 Bonjour
Enable this function, and the OS and clients that support Bonjour would find the camera
automatically. You can have quick visit to the camera with Safari browser.
Procedure
Step 1 Select > Network > Bonjour.
Result
In the OS and clients that support Bonjour, follow the steps below to visit the network camera with
Safari browser.
1. Click Show All Bookmarks in Safari.
2. Enable Bonjour. The OS or client automatically detects the network cameras with Bonjour
enabled in the LAN.
3. Click the camera to visit the corresponding web interface.
6.3.9 Multicast
When multiple users are viewing the device video image simultaneously through network, it might
fail due to limited bandwidth. You can solve this problem by setting up a multicast IP
(224.0.1.0–238.255.255.255) for the camera and adopt the multicast protocol.
Step 1 Select > Network > Multicast.
51
Operation Manual
Figure 6-40 Multicast
Result
On the Live interface, select RTSP in Multicast, and then you can view the video image with
multicast protocol.
6.3.10 Register
After you enable this function, when the camera is connected into Internet, it will report the current
location to the specified server which acts as the transit to make it easier for the client software to
access the camera.
Step 1 Select > Network > Register.
52
Operation Manual
Step 3 Click Apply.
6.3.11 QoS
You can solve problems such as network delay and congestion with this function. It helps to assure
bandwidth, reduce transmission delay, packet loss rate, and delay jitter to improve experience.
0–63 means 64 degrees of priority; 0 for the lowest and 63 the highest.
Step 1 Select > Network > QoS.
6.3.12.1 P2P
P2P (peer-to-peer) technology enables users to manage devices easily without requiring DDNS, port
mapping or transit server.
Scan the QR code with your smartphone, and then you can add and manage more devices on the
mobile phone client.
Step 1 Select > Network > Platform Access > P2P.
53
Operation Manual
Figure 6-43 P2P
6.3.12.2 ONVIF
The ONVIF verification is enabled by default, which allows the network video products (including
video recording device and other recording devices) from other manufacturers to connect to your
device.
6.3.12.3 RTMP
Through RTMP, you can access a third-party platform (such as Ali and YouTube) to realize video live
view.
54
Operation Manual
Step 2 Click .
55
Operation Manual
Figure 6-46 Basic service
56
Operation Manual
6.4 Event
57
Operation Manual
Step 5 Click Apply.
Set arming periods. The system only performs corresponding linkage action in the configured
period.
Step 1 Click Add Schedule next to Schedule.
58
Operation Manual
Figure 6-49 Schedule
Step 2 Press and drag the left mouse button on the timeline to set arming periods. Alarms will be
triggered in the time period in green on the timeline.
● Click Copy next to a day, and select the days that you want to copy to in the prompt
interface, you can copy the configuration to the selected days. Select the Select All
check box to select all days to copy the configuration.
● You can set 6 time periods per day.
Step 3 Click Apply.
Step 4 (Optional) Click Time Plan Table to add a new time plan table.
You can:
● Double-click the table name to edit it.
● Click to delete the tale as needed.
The system can link record channel when an alarm event occurs. After alarm, the system stops
recording after an extended time period according to the Post-Record setting.
Prerequisites
● After the corresponding alarm type (Normal, Motion, or Alarm) is enabled, the record channel
links recording. For details, see "10.3 Setting Record Plan".
● Enable auto record mode, the record linkage will take effect. For details, see "10.2 Setting Record
Control".
59
Operation Manual
Figure 6-50 Record linkage
After snapshot linkage is configured, the system can automatically alarm and take snapshots when
an alarm is triggered.
Prerequisites
After the corresponding alarm type (Normal, Motion, or Alarm) is enabled, the snapshot channel
links capturing picture. For details, see "10.3 Setting Record Plan".
When an alarm is triggered, the system can automatically link with alarm-out device.
On the Alarm interface, click to enable alarm-out linkage, select the channel as needed, and
then configure Post alarm.
When alarm delay is configured, alarm continues for an extended period after the alarm ends.
When an alarm is triggered, the system will automatically send an email to users.
Email linkage takes effect only when SMTP is configured. For details, see "6.3.5 Email".
60
Operation Manual
Figure 6-53 Email linkage
For alarm types and preparations of alarm events, see Table 6-23.
You can subscribe alarm event. When a subscribed alarm event is triggered, the system records
detailed alarm information at the right side of the interface.
61
Operation Manual
62
Operation Manual
Only the device with SD card has the abnormality functions, including No SD Card, SD Card Error,
and Capacity Warning.
63
Operation Manual
Figure 6-56 Network exception
64
Operation Manual
Figure 6-57 Voltage detection
● If you enable motion detection and smart motion detection simultaneously, and configure the
linked activities, the linked activities take effect as follows:
◇ When motion detection is triggered, the camera will record and take snapshots, but other
configured linkages such as sending emails, PTZ operation will not take effect.
◇ When smart motion detection is triggered, all the configured linkages take effect.
● If you only enable motion detection, all the configured linkages take effect when motion
detection is triggered.
Step 1 Select > Event > Video Detection > Motion Detection.
65
Operation Manual
Figure 6-58 Motion detection
2) Select a color and set the region name. Select an effective area for motion detection in
the image and set Sensitivity and Threshold.
● Select a color on to set different detection parameters for each
region.
● Sensitivity: Sensitive degree of outside changes. It is easier to trigger the alarm with
higher sensitivity.
● Threshold: Effective area threshold for Motion Detection. The smaller the threshold
is, the easier the alarm is triggered.
● The whole video image is the effective area for Motion Detection by default.
● The red line in the waveform indicates that the Motion Detection is triggered, and
66
Operation Manual
the green one indicates that there is no motion detection. Adjust sensitivity and
threshold according to the waveform.
3) Click OK.
Step 4 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage".
If the exiting schedules cannot meet the scene requirement, you can click Add Schedule
to add a new schedule. For details, see "6.4.1.2.1 Adding Schedule".
Anti-dither: After the Anti-dither time is set, the system only records one motion detection
event in the period.
Step 5 Click Apply.
67
Operation Manual
Figure 6-60 Video tampering
Anti-Dither Only record one alarm event during the anti-dither period.
Step 3 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage".
If the exiting schedules cannot meet the scene requirement, you can click Add Schedule
to add a new schedule. For details, see "6.4.1.2.1 Adding Schedule".
Step 4 Click Apply.
68
Operation Manual
Figure 6-61 Scene changing
Step 2 Select the schedule and arming periods and alarm linkage action. For details, see "6.4.1.2
Alarm Linkage".
If the exiting schedules cannot meet the scene requirement, you can click Add Schedule
to add a new schedule. For details, see "6.4.1.2.1 Adding Schedule".
Step 3 Click Apply.
69
Operation Manual
Figure 6-62 Audio detection
one indicates no audio detection. Adjust sensitivity and threshold according to the
waveform.
Step 3 Select the schedule and arming periods and alarm linkage action. For details, see "6.4.1.2
Alarm Linkage".
If the exiting schedules cannot meet the scene requirement, you can click Add Schedule
to add a new schedule. For details, see "6.4.1.2.1 Adding Schedule".
Step 4 Click Apply.
6.5 Storage
Display the information of the local SD card. You can set it as read only or read & write; you can also
70
Operation Manual
hot swap and format SD card.
When reading SD card on PC, if the SD card capacity is much less than the nominal capacity, you
need to format the SD card. Then the data in SD card will be cleared, and the SD card is formatted
to be private file system. The private file system can greatly improve SD card multimedia file
read/write performance. Download Diskmanager from Toolbox to read the SD card. For details,
contact after-sales technicians.
6.6 System
This section introduces system configurations, including general, date & time, account, safety, PTZ
settings, default, import/export, remote, auto maintain and upgrade.
6.6.1 General
6.6.1.1 Basic
You can configure device name, language and video standard.
Step 1 Select > System > General > Basic.
71
Operation Manual
Table 6-25 Description of general parameters
Parameter Description
Name Enter the device name.
Video Standard Select video standard from PAL and NTSC.
Step 3 Click Apply.
72
Operation Manual
Parameter Description
Time Format Configure the time format. You can select from 12-Hour or 24-Hour.
Time Zone Configure the time zone that the camera is at.
Configure system time.
Current Time
Click Sync PC, and the system time changes to the PC time.
Enable DST as needed.
DST Click , and configure start time and end time of DST with Date or
Week.
Step 3 Click Apply.
6.6.2 Account
You can manage users, such as add, delete, or edit them. Users include admin, added users and
ONVIF users.
Managing users and groups are only available for administrator users.
● The max length of the user or group name is 31 characters which consists of number, letter,
underline, dash, dot and @.
● The password must consist of 8 to 32 non-blank characters and contain at least two types of
characters among upper case, lower case, number, and special character (excluding ' " ; : &).
● You can have 18 users and 8 groups at most.
● You can manage users through single user or group, and duplicate usernames or group names
are not allowed. A user can only be in one group at a time, and the group users can own
authorities within group authority range.
● Online users cannot edit their own authority.
● There is one admin by default which has highest authority.
● Select Anonymous Login, and then log in with only IP address instead of username and
password. Anonymous users only have preview authorities. During anonymous login, click
Logout, and then you can log in with other username.
6.6.2.1 User
You are admin user by default. You can add users, and configure different permissions.
Step 1 Select > System > Account > User.
73
Operation Manual
Figure 6-66 User
74
Operation Manual
System
It is recommended to give fewer authorities to normal users than
premium users.
Live Select the live view authority for the user to be added.
Search Select the search authority for the user to be added.
75
Operation Manual
Parameter Description
Set the PC address that allows the defined user to log in to the camera
and the validity period and time range. You can log in to the web
interface with the defined IP in the defined time range of validity
period.
● IP address: You can log in to web through the PC with the set IP.
Restricted Login ● Validity period: You can log in to web in the set validity period.
● Time range: You can log in to web in the set time range.
Set as follows
1. IP address: Enter the IP address of the host to be added.
2. IP segment: Enter the start address and end address of the host
to be added.
Step 4 Click Apply.
The newly added user is displayed in the username list.
Related Operations
● click to edit password, group, memo or authorities.
Enable the function, and you can reset password by clicking Forget password? on the login
interface. For details, see "4.2 Resetting Password".
Step 1 Select > System > Account > User.
76
Operation Manual
Step 3 Enter the reserved email address.
Step 4 Click Apply.
Step 3 Enter the group name and memo, and then select group authorities.
Step 4 Click OK to finish configuration.
The newly added group displays in the group name list.
Related Operations
● click to edit password, group, memo or authorities.
● Click to delete the added users. Admin user cannot be deleted.
77
Operation Manual
Related Operations
● click to edit password, group, memo or authorities.
78
Operation Manual
IP Address
Make sure that the address is the same as the device address; otherwise you
cannot control the device.
Baud Rate Configure device baud rate, it is 9600 by default.
Data Bits It is 8 by default.
Stop Bits It is 1 by default.
Test It is none by default.
Step 3 Click Apply.
79
Operation Manual
Prerequisites
● Connect external light with RS-485 port.
● You have configured serial port parameters. For details, see "6.6.3.1 Configuring Serial Port".
Procedure
Step 1 > System > Peripheral > External Light.
Step 2 Select working mode as needed.
Light Brightness
For some models, you can set the brightness of each external light
separately.
Step 3 Click OK.
80
Operation Manual
Step 2 Configuring working mode of wipers.
6.6.4 Manager
6.6.4.1 Requirements
To make sure the system runs normally, maintain it as the following requirements:
● Check surveillance images regularly.
● Clear regularly user and user group information that are not frequently used.
● Change the password every three months. For details, see "6.6.2 Account".
● View system logs and analyze them, and process the abnormity in time.
● Back up the system configuration regularly.
● Restart the device and delete the old files regularly.
● Upgrade firmware in time.
6.6.4.2 Maintenance
You can restart the system manually, and set the time of auto reboot and auto deleting old files. This
81
Operation Manual
function is disabled by default.
Step 1 Select > System > Manager > Maintenance.
When you enable and confirm the Auto Delete function, the deleted files cannot be
restored. Operate it carefully.
Step 3 Click Apply.
6.6.4.3 Import/Export
● Export the system configuration file to back up the system configuration.
● Import system configuration file to make quick configuration or recover system configuration.
Step 1 Select > System > Manager > Import/Export.
82
Operation Manual
Figure 6-78 Import/Export
6.6.4.4 Default
Restore the device to default configuration or factory settings.
This function will restore the device to default configuration or factory setting.
Select > System > Manager > Default
● Click Default, and then all the configurations except IP address and account are reset to default.
● Click Factory Default, and all the configurations are reset to factory settings.
6.6.5 Upgrade
Upgrading to the latest system can refine camera functions and improve stability.
If wrong upgrade file has been used, restart the device; otherwise some functions might not work
properly.
83
Operation Manual
6.7.1 Version
Select > System Info > Version to view device information such as hardware, system version,
and web version.
6.8.1 Log
You can view and back up logs.
Step 1 Select > Log > Log.
Step 2 Configure Start Time and End Time, and then select the log type.
The start time should be later than January 1st, 2000, and the end time should be earlier
than December 31, 2037.
The log type includes All, System, Setting, Data, Event, Record, Account, and Safety.
● System: Includes program start, abnormal close, close, program reboot, device
closedown, device reboot, system reboot, and system upgrade.
● Setting: Includes saving configuration and deleting configuration file.
● Data: Includes configuring disk type, clearing data, hot swap, FTP state, and record
mode.
84
Operation Manual
● Event (records events such as video detection, smart plan, alarm and abnormality):
includes event start and event end.
● Record: Includes file access, file access error, and file search.
● Account: Includes login, logout, adding user, deleting user, editing user, adding group,
deleting group, and editing group.
● Security: Includes password resetting and IP filter.
Step 3 Click Search.
● Click or click a certain log, and then you can view the detailed information in
Details area.
● Click Backup, and then you can back up all found logs to local PC.
85
Operation Manual
Figure 6-82 Remote log
86
Operation Manual
7 Live
This section introduces the layout of the interface and function configuration.
87
Operation Manual
● Main Stream: It has large bit stream value and image with high resolution, but also requires large
bandwidth. This option can be used for storage and monitoring. For details, see "6.2.2.1 Encode".
● Sub Stream: It has small bit stream value and smooth image, and requires less bandwidth. This
option is normally used to replace main stream when bandwidth is not enough. For details, see
"6.2.2.1 Encode".
● means the current stream is main stream; means the current stream is sub stream 1;
means the current stream is sub stream 1.
88
Operation Manual
89
Operation Manual
7.4.1 Adjustment
This section introduces the adjustment of image. For details, see Table 7-3.
90
Operation Manual
Reset
You can restore the focus if the image has poor clarity or has been
zoomed too frequently.
Refresh Get the latest zoom setting of the camera.
Focus on the subject of a selected area.
Area Focus Click Area Focus, and then select an area in the image, the camera
performs auto focus in that area.
91
Operation Manual
The adjustment is only available on the web interface, and it does not adjust the camera parameters.
● (Brightness adjustment): Adjusts the overall image brightness, and changes the value when
the image is too bright or too dark. The bright and dark areas will have equal changes.
● (Contrast adjustment): Changes the value when the image brightness is proper but contrast
is not enough.
● (Saturation adjustment): Adjusts the image saturation, this value does not change image
brightness.
● (Hue adjustment): Makes the color deeper or lighter. The default value is made by the light
sensor, and it is recommended.
Click Reset to restore focus to default value.
You can restore the zoom if the image has poor clarity or has been zoomed too frequently.
7.4.4 Fisheye
You can select the installation mode, display mode and VR mode of Fisheye devices as needed. For
details, see Table 7-5.
● Install Mode: Select the installation mode according to the actual situation.
● Display Model: Select the display mode of live view.
● VR Mode: Select VR mode to display images in stereo mode.
92
Operation Manual
Figure 7-6 Fisheye-ceiling mount
93
Operation Manual
Parameter Description
The display model of the current image. There are different display modes
for each installation mode.
● Ceiling: 1P+1, 2P, 1+2, 1+3, 1+4, 1P+6, 1+8.
● Wall: 1P, 1P+3, 1P+4, 1P+8.
Display mode ● Ground: 1P+1, 2P, 1+3, 1+4, 1P+6, 1+8.
The image will be the original size by default when switching installation
mode.
Ceiling/Wall/Gro
Original image The original image before correction.
und mount
360° rectangular panoramic image screen +
independent sub-screens.
● You can zoom or drag the image in all the
1P+1
screens.
● You can move the start point (left and right)
on rectangular panoramic image screen.
Two associated 180° rectangular image screens;
at any time, the two screens form a 360°
panoramic image. It is also called
2P dual-panoramic image.
You can move the start point (left and right) on
the two rectangular panoramic image screens,
and the two screens link each other.
Original image screen + two independent
sub-screens. Ground mount does not support
this display mode.
Ceiling/Ground
mount , 1+2 ● You can zoom or drag the image in all the
screens.
● You can rotate the image on the original
image screen to change the start point.
Original image screen + three independent
sub-screens.
● You can zoom or drag the image in all the
1+3
screens.
● You can rotate the image on the original
image screen to change the start point.
Original image screen + four independent
sub-screens.
● You can zoom or drag the image in all the
, 1+4
screens.
● You can rotate the image on the original
image screen to change the start point.
94
Operation Manual
Parameter Description
360° rectangular panoramic screen + six
independent sub-screens.
● You can zoom or drag the image in all the
1P+6
screens.
● You can move the start point (left and right)
on rectangular panoramic image screen.
Original image screen + eight independent
sub-screens.
● You can zoom or drag the image in all the
1P+8
screens.
● You can rotate the image on the original
image screen to change the start point.
180° rectangular panoramic image screen (from
left to right).
1P
You can drag the image in all the screens (up
and down) to adjust the vertical view.
180° rectangular panoramic image screen +
three independent sub-screens.
● You can zoom or drag the image in all the
1P+3 screens.
● You can drag the image in all the screens
(upper and lower) to adjust the vertical
view.
180° rectangular panoramic image screen + four
Wall mount independent sub-screens.
● You can zoom or drag the image in all the
, 1P+4 screens.
● You can drag the image in all the screens
(upper and lower) to adjust the vertical
view.
180° rectangular panoramic image screen +
eight independent sub-screens.
● You can zoom or drag the image in all the
1P+8 screens.
● You can drag the image in all the screens
(upper and lower) to adjust the vertical
view.
Drag or cross the screen 360° to unfold the
VR mode Panorama distortion panorama, and you can drag the
image in left/right direction.
95
Operation Manual
Parameter Description
● You can drag the image in
upper/lower/left/right direction. Press I to
display the panorama, and press O to
Semi-circle resume the original size.
● Press S to rotate the image in anticlockwise
direction, and press E to stop the rotation.
● Scroll the mouse wheel to zoom the image.
Display the distortion panorama in
360°circularity.
● You can drag the image in
upper/lower/left/right direction. Press I to
Cylinder display the panorama, and press O to return
to the original size.
● Press S to rotate the image in anticlockwise
direction, and press E to stop the rotation.
● Scroll the mouse wheel to zoom the image.
● You can drag the image in
upper/lower/left/right direction. Press I to
display the panorama, and press O to return
Asteroid to the original size.
● Press the left mouse-button to slide down
to display the image on the plane surface.
● Scroll the mouse wheel to zoom the image.
96
Operation Manual
Make sure that you have enabled video metadata detection function.
97
Operation Manual
● Select Face & Body Detection from the display mode drop-down list.
Make sure that you have enabled face & body detection function.
98
Operation Manual
99
Operation Manual
8 AI
Calibration Purpose
Determine corresponding relationship between 2D image captured by the camera and 3D actual
object according to one horizontal ruler and three vertical rulers calibrated by the user and the
corresponding actual distance.
Notes
When drawing calibration ruler, keep the ruler length consistent with the actual length of the object.
Procedure
1. Select AI > Smart Plan.
2. Click next to Crowd Distribution Map to enable crowd distribution map of the
corresponding channel, and then click Next.
3. Click the Global Config tab.
4. Click the rule icon to draw one horizontal ruler and three vertical rulers on the image.
● is the vertical ruler icon, and is the vertical horizontal icon.
● Select the added rulers on the image, and click to delete them.
100
Operation Manual
Figure 8-1 Global configuration of crowd distribution map
5. Select a calibration type and enter the actual length, and then click Add Rulers.
6. Click Apply.
Prerequisites
● Select AI > Smart Plan, and enable Crowd Distribution Map.
● You have configured the parameters on the Global Config interface.
Procedure
Step 1 Select AI > Smart Plan
Step 2 Click next to Crowd Distribution Map, and then click Next.
Step 3 Click the Rule Config tab.
Step 4 Click next to Enable, and then the crowd map function is enabled, and the
detection area box is displayed on the image.
Click , and you drag the any corner of the box to adjust the size of the area, and press
the left mouse button and move the box to adjust the position.
101
Operation Manual
Step 5 Draw multiple people counting areas in Detection Area as needed.
1) Click Add Rule to add statistical areas.
2) Set the name of Area and People Number to Trigger Alarm.
When the number of the people in the area exceeds the configured threshold, the
alarm will be triggered, and the system will perform the linkage actions. The people
number to trigger alarm is 20 by default.
3) Click at the right side of the image, draw people counting areas in the detection
area, and then right-click to finish the drawing.
4) Repeat the above steps to add more people counting areas.
● Click , and then press and hold the left mouse button to draw a rectangle, and
then pixel size is displayed.
● Click to delete the drawn detection or people counting areas.
Step 6 Configure parameters.
Result
Click on the Live interface to view the crowd distribution map.
Double-click the rendering area at the lower-right corner in the image to view crowd distribution in
the area.
102
Operation Manual
Figure 8-4 Crowd map (2)
Procedure
Step 1 Select AI > Smart Plan.
Step 2 Click next to Face Recognition to enable face recognition of the corresponding
channel, and then click Next.
103
Operation Manual
Figure 8-6 Face detection
104
Operation Manual
minimum size, can the alarm be triggered.
● Click , and then press and hold the left mouse button to draw a rectangle, the pixel
size is displayed.
● Click to delete the detection line.
Step 6 Set parameters.
105
Operation Manual
Parameter Description
● General mode:
◇ Optimized Snapshot: Capture the clearest picture within the
configured time after the camera detects face.
◇ Recognition Priority: Repeatedly compare the captured face to
the faces in the armed face database, and capture the most
Snap Mode similar face image and send the event. We recommend you
using this mode in access control scene.
106
Operation Manual
data for the captured face pictures.
Procedure
Step 1 Select AI > Smart Plan.
Step 2 Click next to Face Recognition to enable face recognition of the corresponding
channel, and then click Next.
Step 3 Select the detection mode.
Step 4 Click Face Database Config on the Face Recognition interface.
● Counting mode: Except two default function database (all people database and
exclude people database), you can add 5 databases at most. Add faces that you do not
107
Operation Manual
want to count (such as repeating faces and loitering faces) into the exclude people
database so that the system will not count the faces face after detecting them.
◇ You cannot change the name of all people database and exclude database.
◇ Do not name the newly added database as AllPeople or ExcludePeople.
● Arm alarm
Click to configure the parameters of arm alarm. For details, see "8.2.3 Setting Arm Alarm".
● Manage face database
Click to manage the face database. You can search face, register, batch register, modeling all,
modeling, and delete faces.
The all people database only supports modeling all, modeling, and delete faces.
● Delete face database
Click to delete the face database.
Add face pictures one by one. Select this way when you need to add a small number of face pictures.
Step 1 On the Face Database Config interface, click next to the face database to be
configured.
Step 2 Click Register.
Step 3 Click Upload, select a face picture to be uploaded, and then click Open.
108
Operation Manual
You can manually select the area for a face. After uploading picture, select a face and click
Confirm Screen. When there are multiple faces in a photo, select the target face and click
Confirm Screen to save face picture.
Step 4 Enter the information about face picture according to the actual situation.
Step 5 Click Add to task list.
Step 6 Click , and then click Operation.
● If the operation is successful, the system prompts that stored successfully, modeled
successfully.
● If adding user fails, the error code is displayed on the interface. For details, see Table 8-3.
For face modeling operation, see "8.2.2.4 Face Modeling"
109
Operation Manual
Import face pictures in batches. Select this way when you need to add a large number of face
pictures.
Before importing pictures in batches, name face pictures in a format of "Name#SGender#BDate of
Birth#NRegion#TCredentials Type#MID No.jpg" (for example, "John#S1#B1990-01-01#T1#M0000).
For naming rules, see Table 8-4.
● The max. size of a single face picture is 150K, and the resolution is less than 1080p.
● When naming pictures, name is required, and others are optional.
110
Operation Manual
Figure 8-12 Task list
Step 1 On the Face Database Config interface, click next to the face database to be
configured.
Step 2 Click Query, set the criteria as needed, and then click Search.
Step 3 Select the row where the face picture or the personnel information is located, and then
click .
Step 4 Edit face information according to the actual need. Click Add to task list.
111
Operation Manual
Figure 8-13 Face information modification
On the Face Database Config interface, click next to the face database to be configured. Click
Query, set the search criteria as needed, click Search, select the face information that needs to be
deleted and delete it.
● Single delete: Select the row where the face picture or the personnel information is located, and
click to delete the face picture.
● Batch delete: Select at the upper-right corner of the face picture or of the row where
the personnel information is located. Select the information, click Delete, then click
, and then click Operation to delete the selected face pictures.
● Delete all: When viewing face pictures in a list, click of the row where the serial number is
located; when viewing by thumbnail, select All to select all face pictures. Click Delete, then click
, and then click Operation to delete all face pictures.
112
Operation Manual
● The more the selected face pictures are, the longer time the face modeling takes. Please wait
patiently.
● During modeling, some intelligent detection functions (such as face recognition) are not
available temporarily, and will be available after modeling.
Step 1 On the Face Database Config interface, click next to the face database to be
configured.
Step 2 Start modeling.
● Selective modeling.
If there are many face pictures in the face database, you can set search criteria to select
the pictures that need to be modeled.
1. Set the search criteria, and click Search.
2. Select the face pictures to be modeled.
3. Click Modeling.
● All modeling.
Click Modeling All to complete modeling of all face pictures in the face database.
Step 3 View the modeling result.
When the modeling failed, Query will be displayed in the result interface. Click Query to
view the details.
Click to view the face picture in list format; click to view the face picture in
thumbnail format.
● When the modeling status is Valid in the list or is displayed at the lower-left corner of
the thumbnail, it means the modeling succeeded.
● When the modeling status is Invalid in the list or is displayed at the lower-left corner of
the thumbnail, it means the modeling failed. Point to the modeling status in the list to
view the details of the failure. Change the pictures according to the details.
113
Operation Manual
Step 1 On the Face Database Config interface, click next to the face database to be
configured.
Step 2 Arm face database.
1) Click next to Arm to enable the face database arming.
The snapshot will be compared to the pictures in the armed face database.
2) Set the similarity.
The detected face matches the face database only when the similarity between the
detected face and the face feature in face database reaches the configured similarity
threshold. After successful match, the comparison result is displayed on the Live
interface.
114
Operation Manual
Figure 8-15 Arm alarm
115
Operation Manual
Figure 8-17 Arm alarm (exclude people)
116
Operation Manual
To view alarm information on the alarm subscription tab, you need to subscribe relevant
alarm event. For details, see "6.4.1.3.2 Subscribing Alarm Information".
Procedure
Step 1 Select AI > Smart Plan.
Step 2 Click next to Face Detection to enable face detection of the corresponding channel,
and then click Next.
117
Operation Manual
Figure 8-19 Face detection
118
Operation Manual
Parameter Description
During the configured period, the duplicate faces are displayed only
once, to avoid repeated counting.
When selecting Custom, click , configure the parameters on the
prompt interface, and then click Apply.
● Customized width: Set snapshot width; enter the times of the
Face Matting original face width. It ranges from 1–5.
● Customized face height: Set face height in snapshot; enter the times
of the original face height. It ranges from 1–2.
● Customized body height: Set body height: in snapshot; enter the
times of the original body height. It ranges from 0–4.
When the value is 0, it means to cutout the face image only.
● Optimized Snapshot: Capture the clearest picture within the
configured time after the camera detects face.
● Recognition Priority: Repeatedly compare the captured face to the
faces in the armed face database, and capture the most similar face
Snap Mode image and send the event. It is recommended to use this mode in
access control scene.
Result
The face detection result is displayed on the live interface.
● The face pictures snapped in real time and their attribute information are displayed.
● Click a face picture in the display area, and the details are displayed.
119
Operation Manual
Figure 8-20 Face detection result
Calibration Purpose
Determine corresponding relationship between 2D image captured by the camera and 3D actual
object according to one horizontal ruler and three vertical rulers calibrated by the user and the
corresponding actual distance.
120
Operation Manual
Applicable Scene
● Medium or distant view with installation height of more than three meters. Scenes with parallel
view or ceiling-mounted are not supported.
● Calibrate horizontal plane, not vertical walls or sloping surfaces.
● This function is not applicable to scenes with distorted view, such as the distorted views captured
by super wide-angle or fisheye camera.
Notes
● Calibration Drawing
◇ Calibration area: The calibration area drawn should be on one horizontal plane.
◇ Vertical ruler: The bottom of three vertical rulers should be on the same horizontal plane.
Select three reference objects with fixed height in triangular distribution as vertical rulers,
such as vehicle parked at roadside or road lamp poles. Arrange three persons to draw at each
of the three positions in the monitoring scene.
◇ Horizontal ruler: Select reference object with known length on the ground, such as sign on
the road, or use a tape to measure the actual length.
● Calibration Verification
After setting the ruler, draw a straight line on the image, check the estimated value of the straight
line, and then compare this value with the value measured in the actual scene to verify
calibration accuracy. In case of major difference between the estimated value and the actual one,
fine-tune or reset parameters until the error requirement is met.
Procedure
1. Select AI > Smart Plan.
2. Click next to IVS to enable IVS of the corresponding channel, and then click Next.
3. Click the Global Config tab.
121
Operation Manual
object and small object are captured, and the false detection rate is higher.
6. Click Apply.
Result
1. Select the verification type, and then click Calibration Verification.
To verify vertical ruler and horizontal ruler, respectively select Height Verification and Width
Verification.
2. Draw a straight line in the image to verify whether the rulers are correctly set.
In case of big difference between the estimated value and the actual one, fine-tune or reset
parameters until the error requirement is met.
122
Operation Manual
123
Operation Manual
Double-click the name, and you can edit the rule name; the rule is enabled by default.
Step 5 Click to draw rule line in the image. Right-click to finish drawing.
For requirements of drawing rules, see Table 8-7. After drawing rules, drag corners of the
detection area to adjust the area range.
124
Operation Manual
Step 7 Set rule parameters for IVS.
125
Operation Manual
Step 4 Set parameters.
126
Operation Manual
Parameter Description
Enable Face Beautifying to make face details clearer at night.
Face Beautifying After enabling this function, you can adjust the level. The higher
the level, the higher the beautifying level.
Enable Face Exposure to make face clearer by adjusting lens
Face Exposure
aperture and shutter.
Target Face Brightness Set the face target brightness, and it is 50 by default.
Set the face exposure interval detection time to prevent image
Face Exposure Interval
flickering caused by constant adjustment of face exposure. It is
Detection Time
5 seconds by default.
Scene Set scene as Distant View or Close View.
Step 5 Click Apply.
Prerequisites
● Select AI > Smart Plan, and enable Video Metadata.
● You have configured the parameters on the Clobal Config interface.
Procedure
Step 1 Select AI > Smart Plan
Step 2 Click next to Video Metadata, and then click Next.
Step 3 Click the Rule Config tab.
Step 4 Click Add Rule to select rules.
The added rules will be display in the list. Click the text box under Name to edit the rule
name. The rule is enabled by default.
127
Operation Manual
Figure 8-25 Picture (non-motor vehicle)
3) Click Apply.
Step 6 (Optional) Click the icons at the right side of the image to filter targets in the image.
● Click to draw rule line in the image.
When targets pass the tripwire along the configured direction line, they will be
counted.
● After the rule is enabled, the detection area is displayed. Click , and you drag the
any corner of the box to adjust the size of the area, and press the left mouse button and
move the box to adjust the position.
● Click to draw an area exclusion area for face detection in the image, and right-click
to finish the drawing..
● Click to draw the minimum size of the target, and click to draw the maximum
size of the target. Only when the target size is between the maximum size and the
minimum size, can the alarm be triggered.
● Click , and then press and hold the left mouse button to draw a rectangle, the pixel
size is displayed.
● Click to delete the detection line.
Step 7 Set parameters.
128
Operation Manual
Parameter Description
● Optimized: Capture the pictures until the vehicle disappears
from the image, and report the clearest picture.
● Tripwire: Capture the pictures when the vehicle triggers
Snapshot Mode tripwire as the configured direction.
1. Select Tripwire.
2. Select the direction from A to B, B to A, and Both.
3. Adjust the position of rule line as needed.
Step 8 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage".
Click + Event Linkage to set the linkage action.
Step 9 Click Apply.
To view alarm information on the alarm subscription tab, you need to subscribe relevant
alarm event. For details, see "6.4.1.3.2 Subscribing Alarm Information".
129
Operation Manual
Background Information
There are two types of people counting rules.
● People Counting: The system counts the people entering and leaving the detection area. When
the number of counted number of people who enter, leave, or stay in the area exceeds the
configured value, an alarm is triggered, and the system performs an alarm linkage.
● Area People Counting: The system counts the people in the detection area and the duration
that people stay in the area. When the number of counted number of people in the detection
area or the stay duration exceeds the configured value, an alarm is triggered, and the system
performs an alarm linkage. This function is available on some select models.
Procedure
Step 1 Select AI > Smart Plan
Step 2 Click next to People Counting, and then click Next.
Step 3 Click the People Counting tab.
Step 4 Click Add Rule to select rules.
● The added rules will be displayed in the list. Click the text box under Name to edit the
rule name. The rule is enabled by default.
● For the models that support multiple counting rules, different detection areas can be
overlapped. It supports at most 4 people counting rules and 4 area people counting
rules.
130
Operation Manual
Figure 8-28 People counting
131
Operation Manual
Click + Event Linkage to set the linkage action.
Step 8 Click Apply.
To view alarm information on the alarm subscription tab, you need to subscribe relevant
alarm event. For details, see "6.4.1.3.2 Subscribing Alarm Information".
Result
You can view the counting results on the Live interface.
● For People Counting rule, the entry and exit numbers are displayed.
● For Area People Counting rule, the inside number is displayed.
8.6.2 Queuing
The system counts the queue people in the detection area. When the queue people number exceeds
the configured number or the queue time exceeds the configured time, an alarm will be triggered,
and the system performs an alarm linkage.
Procedure
Step 1 Select AI > Smart Plan
Step 2 Click next to People Counting, and then click Next.
Step 3 Click the Queuing tab.
Step 4 Click Add Rule > Queuing to select rules.
● The added rules will be display in the list. Click the text box under Name to edit the rule
name. The rule is enabled by default.
● For the models that support multiple counting rules, different detection areas can be
overlapped. It supports at most 4 queuing rules.
132
Operation Manual
Figure 8-31 Add rule
Result
You can view the queuing results on the Live interface.
The queuing number and the stay time of each target are displayed on the interface.
133
Operation Manual
Figure 8-33 Queuing result
Procedure
Step 1 Select AI > Smart Plan
Step 2 Click next to People Counting, and then click Next.
Step 3 Click the Global Config tab.
Step 4 Set the sensitivity.
The higher the sensitivity, the easier the detection, but the more the false detections.
134
Operation Manual
Table 8-14 Description of scene set parameters (face & body detection)
Parameter Description
Overlay target box on the captured pictures to mark the target
Target Box Overlay
position.
Face & Body Image Click next to Face & Body Image Enhancement to
Enhancement preferably guarantee clear face and body with low stream.
Set a range for matting face image, including face, one-inch
Face Cutout
photo, and custom.
Detection Priority Select from Face First or Human Body First.
135
Operation Manual
Parameter Description
● Real-time: Capture the image when the camera detects a
face.
● Optimized: Capture the clearest image within the
configured time after the camera detects face.
● Quality Priority: After detecting the face image quality is
higher than the quality threshold, the camera captures the
Snapshot Mode image.
● Tripwire: This snapshot is available in PPE Detection
Mode.
Prerequisites
● Select AI > Smart Plan, and enable Face & Body Detection.
● You have configured the parameters on the Global Config interface.
Procedure
Step 1 Select AI > Smart Plan
Step 2 Click next to Face & Body Detection, and then click Next.
Step 3 Click the Rule Config tab.
136
Operation Manual
Figure 8-36 Rule configuration
● Click to draw the minimum size of the target, and click to draw the maximum
size of the target. Only when the target size is between the maximum size and the
minimum size, can the alarm be triggered.
● Click , and then press and hold the left mouse button to draw a rectangle, the pixel
size is displayed.
● Click to delete the detection line.
Step 6 (Optional) Set OSD information.
Click OSD Info, and the Overlay interface is displayed, and then enable the face & body
counting function. The number of detected faces and bodies is displayed on the Live
interface. For details, see "6.2.2.2.12 Configuring Face Statistics".
Step 7 Select the detection mode.
● General Mode (selected by default): The system will perform an alarm linkage when
the camera detects a face or a person.
● PPE Detection Mode:
1. Click + next to AI Attributes.
2. Select AI attributes that you want to detect.
The AI attributes include mouth mask, vest, safety helmet, glasses, top color, and
bottom color. For glasses, you need to select the glass type; for safety helmet, top
color, and bottom color, you need to select colors.
3. Click Apply to go back to the Rule Config interface.
4. Select the alarm mode.
◇ Match Attributes Alarm: When the target's properties are compliant with the
configured properties, an alarm will be triggered, and the system performs an
alarm linkage.
137
Operation Manual
◇ Mismatch Attributes Alarm: When the target's properties are not compliant
with the configured properties, an alarm will be triggered, and the system
performs an alarm linkage..
Step 8 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage".
Step 9 Click Apply.
To view alarm information on the alarm subscription tab, you need to subscribe relevant
alarm event. For details, see "6.4.1.3.2 Subscribing Alarm Information".
Background Information
When mirroring occurs on the camera or the viewing angle changes, original data on the heat map
will be cleared.
Procedure
Step 1 Select AI > Smart Plan
Step 2 Click next to Heat Map, and then click Next.
Step 3 Select the Enable check box, and then the heat map function is enabled.
138
Operation Manual
Procedure
Step 1 Select AI > Smart Plan
Step 2 Click next to ANPR, and then click Next.
This icon is only available when you select Tripwire in Snapshot Mode.
● Click to draw a face detection area in the image, and right-click to finish the
drawing.
● Click to draw an exclusion area for face detection in the image, and right-click to
finish the drawing.
● Click , and then press and hold the left mouse button to draw a rectangle, the pixel
size is displayed.
● Click to draw the minimum size of the target, and click to draw the maximum
size of the target. Only when the target size is between the maximum size and the
minimum size, can the alarm be triggered.
● Click to delete the detection line.
Step 5 Click Picture to set overlay information and box position, such as plate no., time, vehicle
color, vehicle type, and vehicle logo.
139
Operation Manual
Figure 8-39 Picture
Result
Select ANPR in Display Mode at the upper-right corner of the live view interface. The ANPR result is
displayed on the live interface.
● The plate no. and attribute information of vehicle are displayed at the right side. Click to set
the displayed attributes.
● Click the picture in the display area, and the detailed information is displayed.
140
Operation Manual
Figure 8-40 ANPR result
141
Operation Manual
9 Security
Background Information
Detect the user and service, and scan the security modules to check the security status of the camera,
so that when abnormality appears, you can process it timely.
● User and service detection: Detect login authentication, user status, and configuration security to
check whether the current configuration conforms to recommendation.
● Security modules scanning: Scan the running status of security modules, such as audio/video
transmission, trusted protection, securing warning and attack defense, not detect whether they
are enabled.
Procedure
Step 1 Select Security > Security Status.
Step 2 Click Rescan to scan the security status of the camera.
Related Operations
After scanning, different results will be displayed with different color. Yellow indicates that the
security modules are abnormal, and Green indicates that the security modules are normal.
1. Click Details to view the details of the scanning result.
2. Click Ignore to ignore the exception, and it will not be scanned in next scanning.
Click Joint Detection, and the exception will be scanned in next scanning.
3. Click Optimize, and the corresponding interface is displayed, and you can edit the configuration
to clear the exception.
142
Operation Manual
Figure 9-2 Security Status
9.2.1 802.1x
Cameras can connect to LAN after passing 802.1x authentication.
Step 1 Select Security > System Service > 802.1x.
Step 2 Select the NIC name as needed, and click to enable it.
Step 3 Select the authentication mode, and then configure parameters.
● PEAP: Protected EAP protocol.
1. Select PEAP as the authentication mode.
2. Enter the username and password that has been authenticated on the server.
3. Click next to CA certificate, and select the trusted CA certificate in list.
143
Operation Manual
2. Enter the username.
3. Click next to CA certificate, and select the trusted CA certificate in list.
9.2.2 HTTPS
Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS
with your PC. The HTTPS can protect page authenticity on all types of websites, secure accounts, and
keep user communications, identity, and web browsing private.
Procedure
Step 1 Select Security > System Service > HTTPS.
Step 2 Click to enable it.
Step 3 Select the certificate.
If there is no certificate in the list, click Certificate Management at the left navigation bar.
For details, see
144
Operation Manual
9.3.1 Firewall
Configure firewall to limit access to the camera.
Step 1 Select Security > Attack Defense > Firewall.
Step 2 Click to enable the firewall function.
Related Operations
● Click to edit the host information.
● Click to delete the host information.
145
Operation Manual
146
Operation Manual
Figure 9-9 Anti-DoS attack
9.4 CA Certificate
147
Operation Manual
Figure 9-10 Certificate information (1)
Related Operations
● Click Enter Edit Mode, you can edit the custom name of the certificate.
● Click to download the certificate.
● Click to delete the certificate.
148
Operation Manual
Figure 9-11 Certificate information (2)
Related Operations
● Click Enter Edit Mode, you can edit the custom name of the certificate.
● Click to download the certificate.
● Click to delete the certificate.
149
Operation Manual
Figure 9-12 Certificate and private key
Related Operations
● Click Enter Edit Mode, you can edit the custom name of the certificate.
● Click to download the certificate.
● Click to delete the certificate.
Related Operations
● Click Enter Edit Mode, you can edit the custom name of the certificate.
● Click to download the certificate.
150
Operation Manual
You are recommended to enable A/V Encryption function. There might be safety risk if this function
is disabled.
Step 1 Select Security > A/V Encryption.
Step 2 Configure the parameters.
151
Operation Manual
Step 4 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage".
Click + Event Linkage to set the linkage action.
Step 5 Click Apply.
152
Operation Manual
10 Record
10.1 Playback
Prerequisites
● This function is available on the camera with SD card.
● Before playing back video, configure record time range, record storage method, record schedule
and record control. For details, see "10.2 Setting Record Control", "10.3 Setting Record Plan", and
"10.4 Storage".
Procedure
Step 1 Select Record > Search Video.
Step 2 Select the channel, the record type, and record time, and then click Search.
● Click All, and select the record type from the drop-down list, you can select from All,
General, Event, Alarm, and Manual.
When selecting Event as the record type, you can select the specific event types, such
as Motion Detection, Video Tamper and Scene Changing.
● The dates with blue dots indicate there are videos recorded on those days.
Step 3 Point to the searched video, and then click to play back the selected video.
The video playback interface is displayed.
153
Operation Manual
Figure 10-2 Video playback
154
Operation Manual
No Function Description
Controls playback.
● : Click the icon to play back the previous
recorded video in the recorded video list.
● : Click the icon to slow down the playback.
● : Click the icon to stop playing back recorded
videos.
Play control bar
The icon changes to , click the icon to play back
recorded videos.
● : Click the icon to speed up the playback.
● : Click the icon to play back the next recorded
video in the recorded video list.
● : Click the icon to play the next frame.
Controls the sound during playback.
Sound ● : Mute mode.
● : Vocal state. You can adjust the sound.
Click to capture one picture of the current image,
and it will be saved to the configured storage path.
Snapshot
About viewing or configuring storage path, see "6.1
Local".
Click , and clip a certain recorded video and save it.
Video clip
For details, see "10.1.2 Clipping Video".
Click , and the image is displayed in full-screen
Full Screen mode; double-click the image or press Esc button to exit
full-screen mode.
Displays the record type and the corresponding period.
● Click any point in the colored area, and the system
3 Progress bar will play back the recorded video from the selected
moment.
● Each record type has its own color, and you can see
their relations in Record Type bar
155
Operation Manual
Step 4 Select the download format and storage path.
156
Operation Manual
Figure 10-6 Downloading video
157
Operation Manual
Parameter Description
The time to record the video in advance of a triggered alarm event.
For example, if the pre-event record is set to be 5 s, the system
saves the recorded video 5 s before the alarm is triggered.
Pre-Record
When an alarm or motion detection links recording, and the
recording is not enabled, the system saves the video data within
the pre-event record time to the video file.
When you select Manual, the system starts recording; when you
Record Mode select Auto, the system starts recording in the configured time
period of record plan.
Record Stream Select record stream, including Main Stream and Sub Stream.
Step 3 Click Apply.
158
Operation Manual
● Click Copy next to a day, and select the days that you want to copy to in the prompt
interface, you can copy the configuration to the selected days. Select the Select All
check box to select all day to copy the configuration.
● You can set 6 time periods per day.
Step 3 Click Apply.
Step 4 Click Holiday to set holidays.
Step 5 Click to enable the holiday configuration, and select the days that you need to set
as holiday
Click Clear to cancel the selection.
When holiday schedule setting is not the same as the general setting, holiday schedule
setting is prior to the general setting. For example, with holiday schedule enabled, if the
day is holiday, the system snapshots or records as holiday schedule setting; otherwise, the
system snapshots or records as general setting.
Step 6 Click OK.
10.4 Storage
This section introduces the configuration of the storage method for the recorded videos.
Step 1 Select Record > Storage.
159
Operation Manual
Figure 10-10 Live
Step 2 Select the storage method that you need for different types of recorded videos.
Storage Method
Local storage is displayed only on models that support SD card.
● Network storage: Save the recorded videos in the FTP server or
NAS.
Step 3 Click Apply.
160
Operation Manual
10.4.2.1 FTP
Enable this function, and you can save all the files in the FTP server.
Step 1 Select Record > Storage.
Step 2 Select the recording strategy in Disk Full.
● Overwrite: Cyclically overwrite the earliest video when the disk is full.
● Stop: Stop recording when the disk is full.
Step 3 Select Network storage in Storage Method, and select FTP to save the recorded videos in
FTP server.
You select FTP or SFPT from the drop-down list. SFPT is recommended to enhance
network security.
Step 4 Click next to Enable to enable the FTP function.
161
Operation Manual
Table 10-4 Description of FTP parameters
Parameter Description
Server IP The IP address of the FTP server.
Port The port number of the FTP server.
Username The username to log in to the FTP server.
Password The password to log in to the FTP server.
Storage Path The destination path in the FTP server.
Set the directory structure, and you can select Use Level 1
Directory Structure
Directory, Use Level 2 Directory, and Use Level 3 Directory
Set the Level 1 directory name, and you can select from Device
Level 1 Directory name, Device IP, and Custom.
When you select Custom, please enter the custom directory.
Level 2 Directory Set the Level 2 directory name, and you can select from File Type,
Date, File Type_Channel Number, and Custom.
Level 3 Directory
When you select Custom, please enter the custom directory.
Click , and when the FTP server does not work, all the files are
Urgently store to local
saved to the internal SD card.
Step 6 Click Save.
Step 7 Click Test to test whether FTP function works normally.
10.4.2.2 NAS
Enable this function, and you can save all the files in the NAS.
Step 1 Select Record > Storage.
Step 2 Select the recording strategy in Disk Full.
● Overwrite: Cyclically overwrite the earliest video when the disk is full.
● Stop: Stop recording when the disk is full.
Step 3 Select Network storage in Storage Method, and select NAS to save the recorded videos
in NAS server.
Step 4 Select NAS protocol type.
● NFS (Network File System): A file system which enables computers in the same network
share files through TCP/IP.
● SMB (Server Message Block): Provides shared access for clients and the server.
162
Operation Manual
Figure 10-13 FTP
163
Operation Manual
11 Picture
This section introduces the related functions and operations of picture playback.
11.1 Playback
Prerequisites
● This function is available on the camera with SD card.
● Before playing back picture, configure snapshot time range, snapshot storage method, snapshot
plan. For details, see"11.3 Setting Snapshot Plan".
Procedure
Step 1 Select Record > Picture Query.
Step 2 Select the channel, the snapshot type, and snapshot time, and then click Search.
● Click All, and select the record type from the drop-down list, you can select from All,
General, Event, and Alarm.
When selecting Event as the snapshot type, you can select the specific event types,
such as Motion Detection, Video Tamper and Scene Changing.
● The dates with blue dots indicate there are snapshots on those days.
Step 3 Point to the searched picture, and then click to play back the selected picture.
The picture playback interface is displayed.
164
Operation Manual
Figure 11-2 Picture playback
snapshot list.
2 Manual display
● Click to display the nest snapshot in the snapshot
list.
Click to display the snapshots list one by one in
3 Slide show
slide show mode.
Click , and the snapshot is displayed in full-screen
4 Full screen mode; double-click the image or press Esc button to exit
full-screen mode.
165
Operation Manual
Figure 11-3 Selecting picture file
166
Operation Manual
Figure 11-5 Snapshot
Make sure that you have enable the corresponding event detection and
the snapshot function.
Size It is same with the resolution of the main stream.
Quality Set the quality of the snapshot. The higher the value, the better the quality.
Set the frequency of snapshot. You can select Custom to set the frequency
Interval
as needed.
Step 3 Click Apply.
11.4 Storage
Set the storage method for the snapshot. For detailed operation, see "10.4 Storage".
167
Operation Manual
Background Information
You do not need to set upload period. When an alarm is triggered, images will be automatically
uploaded to the defined server.
Procedure
Step 1 On the web interface, select Picture > Auto Upload.
Step 2 Enable the function.
Step 3 Click Add, and then configure parameters of HTTP upload method.
You can add two server information at most.
Event type
The event types in the drop-down list are the same with that of
picture playback.
Test Test the network connection between the camera and the server.
Step 4 Click Apply.
168
Operation Manual
12 Report
Procedure
Step 1 Select Report > Report > Face Recognition.
Step 2 Set the period for the report.
169
Operation Manual
Figure 12-2 Face Recognition report
Related Operations
● Select the report form
Click to display the report in line chart; click to display the report in bar chart.
● Select the statistics type on the upper-right corner.
The statistics result of unselected types will not be displayed.
● Export reports
Select the file format, and then click Export.
◇ Select png: Displays the report in picture format.
◇ Select csv: Displays the report in list format.
Procedure
Step 1 Select Report > Report > Video Metadata.
Step 2 Set the period for the report.
170
Operation Manual
Related Operations
● Select the report form
Click to display the report in line chart; click to display the report in bar chart.
● Select the statistics type on the upper-right corner.
The statistics result of unselected types will not be displayed.
● Export reports
Select the file format, and then click Export.
◇ Select png: Displays the report in picture format.
◇ Select csv: Displays the report in list format.
Prerequisites
Make sure that you have configured the rule before searching for the report.
Procedure
Step 1 Select Report > Report > People Counting.
Step 2 Set search conditions.
171
Operation Manual
172
Operation Manual
Figure 12-4 People counting
173
Operation Manual
Figure 12-7 Queuing
Related Operations
● Select the report form
Click to display the report in line chart; click to display the report in bar chart.
● Select the statistics type on the upper-right corner.
The statistics result of unselected types will not be displayed.
● Export reports
Select the file format, and then click Export.
◇ Select png: Displays the report in picture format.
◇ Select csv: Displays the report in list format.
Procedure
Step 1 Select Report > Report > Heat Map
Step 2 Set search conditions.
Time When selecting type as Heat Map, select Time and then set the
174
Operation Manual
Parameter Description
Threshold threshold. The system will display the heat map for stay time.
175
Operation Manual
Related Operations
Click Export, and select the storage path for the exported report in .bmp format.
12.1.5 ANPR
View the statistics result of ANPR in report form.
Step 1 Select Report > Report > ANPR.
Step 2 Set the period for the report.
176
Operation Manual
Figure 12-11 ANPR report
Prerequisites
Make sure that you have installed SD card.
Procedure
Step 1 Select Report > Picture Query > Face.
Step 2 Select the type and set the period for the report.
Click Advance to set face attributes for precise search.
Step 3 Click Search. The search result is displayed.
177
Operation Manual
Figure 12-12 Face report
Step 4 Click the picture, and then you can view the details.
Background Information
There are three upload methods:
● HTTP: Upload reports to a server through HTTP protocol.
● FTP: Upload reports to a server through FTP protocol. You need to set the parameters, such as the
server IP, username, password, and storage path.
● Email: Send reports to receivers through emails. You need to set the parameters, such as the
username, password, sender and receiver.
Procedure
Step 1 Select Report > Auto Upload.
Step 2 Select the upload method, and then enable it.
Step 3 Set parameters.
Parameters of different upload methods are different.
● HTTP
Click Add, and then add the information of server. You can add two server information
at most.
178
Operation Manual
Figure 12-13 HTTP upload method
Report type The report types in the drop-down list are the same with that
supported AI function. For example: If the camera supports people
counting, heat map, and video metadata, the 3 report types are
displayed in the drop-down list,
Test Test the network connection between the camera and the server.
● FTP upload method
179
Operation Manual
Figure 12-14 FTP upload method
Report type The report types in the drop-down list are the same with that
supported AI function. For example: If the camera supports people
counting, heat map, and video metadata, the 3 report types are
displayed in the drop-down list,
Server IP The IP address and port number of the FTP server which the report
Port will be uploaded to.
Username
Username and password for logging in to FTP server.
Password
Storage Path Username and password for logging in to FTP server.
Test Test the network connection between the camera and the server.
● Email upload method
180
Operation Manual
Figure 12-15 Email upload method
● The report types in the drop-down list are the same with that
Report Type supported AI function. For example: If the camera supports people
counting, and video metadata the 2 report types are displayed in the
drop-down list,
● Heat map report will not be uploaded when you select email upload
method, so heat map will not be displayed in the drop-down list.
SMTP server SMTP (Simple Mail Transfer Protocol) server IP address and port number.
Port
See Table 12-6 for details.
Select Anonymous, and the sender's information is not displayed in the
Anonymous
email.
Username Username and password used to log in server.
181
Operation Manual
Parameter Description
Password
See Table 12-6 for details.
Sender Sender's email address.
Select the encryption type from None, SSL (Secure Sockets Layer) and TLS
(Transport Layer Security).
Encryption Type
182
Operation Manual
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps
toward protecting and strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on how to create a more secured
security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
● The length should not be less than 8 characters;
● Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols;
● Do not contain the account name or the account name in reverse order;
● Do not use continuous characters, such as 123, abc, etc.;
● Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
● According to the standard procedure in Tech-industry, we recommend to keep your
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is
equipped with the latest security patches and fixes. When the equipment is connected to the
public network, it is recommended to enable the“auto-check for updates” function to obtain
timely information of firmware updates released by the manufacturer.
● We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices. For
example, place the equipment in a special computer room and cabinet, and implement
well-done access control permission and key management to prevent unauthorized personnel
from carrying out physical contacts such as damaging hardware, unauthorized connection of
removable equipment (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The equipment supports password reset function. Please set up related information for password
reset in time, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, it is
suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password several
times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers between
183
Operation Manual
1024~65535, reducing the risk of outsiders being able to guess which ports you are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment, thus
reducing the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
● Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
● Check equipment log: By viewing the logs, you can know the IP addresses that were used to
log in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need to
save the log for a long time, it is recommended that you enable the network log function to
ensure that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
● The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
● Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
184
Operation Manual
● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
185
Operation Manual