SeeTec - Manual - EN
SeeTec - Manual - EN
SeeTec Cayuga
© 2015 SeeTec AG
Contents
Contents
Contents 2
Legal notice 15
Copyright 15
Patent and copy protection 15
Address 15
Support 15
Image acknowledgment 15
Version 16
Support 17
Reporting a software problem 17
Introduction 18
Product lines 18
Functional overview 20
Server 21
Redundant system management 21
Redundant recording 21
Client 21
Surveillance mode 21
Archive mode 21
Report mode 22
Configuration mode 22
LPR mode 22
Installation 23
Information on installation 23
Setup types 24
Firewalls 24
System requirements 25
Known limitations 25
Requirements for remotely controlling the Cayuga client 25
Requirements for the Help system 25
General recommendations 25
Virtual environments 25
Thin clients 25
CPU recommendations 26
System parameters 27
Modules 28
2 / 251
Contents
Type of installation 30
Client installation 35
Login 48
Advanced options 51
3 / 251
Contents
4 / 251
Contents
Info 77
Request product ID 77
Import license file 77
Activate license 77
Display license 78
Display program information 78
Display system information 78
Help 78
User's Guide 78
Start problem recording 79
Display Help icons 79
Search 82
Searching in surveillance mode 82
Searching in configuration mode 82
Surveillance mode 83
Camera operation 83
Tabs 83
Control bar 83
Work area 85
Alarm notification ("Toast notification") 85
Creating layers 85
Setting the viewing mode on multiple displays 85
Maps 93
Displaying a camera preview 93
Using the lasso function 94
Web pages 95
5 / 251
Contents
Overview 96
Searching for an object 96
Control 97
PTZ control 97
Creating and deleting a preset camera position 99
Buttons 99
Patrol 99
Starting a patrol 99
Stopping a patrol 100
Pausing a patrol 100
Repeating a patrol 100
Navigating between points in the patrol 100
Audio 100
Dispatcher mode 101
iSearch 116
iSearch in archive mode 116
Keypad 116
iSearch in surveillance mode 116
Creating a search area 116
Deleting a search area 117
6 / 251
Contents
Company 128
About the relationship between the company and its branches 128
Working with branches 128
Creating a branch or branch group 128
Editing the name of a branch or branch group 129
Organizing branches in groups 129
Deleting a branch or branch group 129
Displaying a branch overview 129
Administration 130
Functions 130
Editing menu 130
Concept 131
Schematic diagram of rights and profiles 131
Administrative rights and user rights 131
Multi-level administration 132
Profiles 132
Cameras 132
Creating a new camera 132
Selecting and deselecting multiple cameras at once 134
Configuring multiple cameras 134
Configuring a camera 135
Encoder/camera 135
General 135
Digital inputs 135
Camera 136
7 / 251
Contents
General 136
Image storage - Multimedia database 137
Image storage - Edge storage 138
Video streams 138
Audio 140
Video gateway 140
Camera positions 140
Image data export 140
Server side operation 140
Server side operation: Motion detection 141
Server side operation: Reference image comparison 141
Server side operation: Tampering detection 141
Camera side operation: Motion detection 142
Camera side operation: Tampering detection 142
Privacy masking 142
Privacy masking: Static objects 142
Privacy masking: Moving objects 142
Privacy masking: Office mode 142
Record on motion 143
Duplicating a camera 143
Deleting a camera 143
Converting a camera 143
Other hardware 144
Working with other hardware 144
Creating new hardware 144
Integrating other hardware 145
Configuring hardware 145
Deleting hardware 145
Duplicating hardware 145
SeeTec 145
SeeTec network I/O 146
General 146
Inputs 146
Outputs 146
Display agent video wall 147
VoIP 147
General 147
Voice over IP recording 147
SeeTec Video Analytics 147
Generic VCA Channel 148
License plate recognition 148
Lane configuration 148
List configuration 149
SeeTec Analytics 149
Adding the SeeTec Analytics module 150
8 / 251
Contents
General 150
Tripwire 152
AOI (Area of interest) 153
Scene change 154
SeeTec Counting Suite 154
Overview of the SeeTec Analytics packages 154
Advantech 154
General 154
Inputs 155
Outputs 155
Wago 155
General 155
Inputs 155
Outputs 155
Third-party interface 156
eyevis wall 156
General 156
SPC alarm system 156
General 156
Areas 156
Rules 156
Access control 157
Creating a new access control 157
Deleting access controls 157
Editing an access control 158
Users 158
Creating a new user 158
Configuring a user 158
General 158
Password 159
Rights options 159
Managing user rights 159
Managing administrative rights 160
Deleting a user 160
Duplicating a user 161
Groups 161
Creating a new group 161
Configuring a group 162
General 162
Rights options 162
Using Windows® Active Directory® 162
Managing user group rights 162
Managing administrative rights 163
Deleting a group 163
Duplicating a group 163
9 / 251
Contents
Profiles 163
Configuring a profile 163
Image settings 164
Streaming (MPEG-4, H.264) 164
Video classification (for multistreaming) 164
Video wall module mapping 165
Time manager 165
Creating a new time manager 165
Configuring a time manager 166
Deleting a time manager 166
Duplicating a time manager 166
Alarms 166
Creating a new alarm scenario 166
Creating an alarm scenario with the wizard 167
Configuring an alarm scenario 167
General 167
Start 168
Expert mode 168
End 168
Visualization 168
Persons involved 169
Server 169
E-mail and FTP 169
Deleting an alarm scenario 170
Duplicating an alarm scenario 170
Layers 170
Creating a new layer 170
Configuring a layer 171
Deleting a layer 171
Duplicating a layer 171
Maps 171
Creating a new map 172
Configuring a map 172
Deleting a map 172
Duplicating a map 172
Buttons 173
Creating a new button 173
Configuring a button 173
General 173
Action 174
Deleting a button 174
Duplicating a button 174
Web pages 174
Creating a new web page 175
Configuring a web page 175
10 / 251
Contents
11 / 251
Contents
Adding and configuring the module in the SeeTec VA Administration tool 192
Admintools 205
12 / 251
Contents
13 / 251
Contents
Installing the SeeTec Mobile Client services on the SeeTec server 242
14 / 251
Legal notice
Legal notice
This document is an integral part of the software shipped by SeeTec (referred to hereinafter as the
vendor) and describes how to use and configure the software and the associated components.
The English version of the document is the original version. All translations are based on the Eng-
lish original.
Copyright
This document is protected by copyright. It is not permissible to pass on the information it con-
tains to third parties without the vendor's expression permission. Any infringements will result in
claims for damages.
Address
SeeTec AG
Werner-von-Siemens-Str. 2 - 6
D-76646 Bruchsal
Tel: +49 (0)7251/9290-0
Fax: +49 (0)7251/9290-815
Email: [email protected]
Internet: http://www.seetec.de
Support
https://support.seetec.eu/
Image acknowledgment
Insert in Camera image controller image at www.istockphoto.com - IGphotography
15 / 251
Legal notice
Version
This manual corresponds to the software Cayuga R6 (Version 6.6.0).
16 / 251
Support
Support
17 / 251
1
Introduction
Exploit hidden potential with SeeTec!
Many thanks for opting for a SeeTec software solution.
SeeTec is a leading vendor of video management software and has been developing and dis-
tributing software solutions for security applications since the year 2000. SeeTec also offers
industry-specific solutions for transportation and logistics, retail and trade, financial services and
critical infrastructure and cities. These applications support the business processes of our cus-
tomers and allow hidden potential to be exploited, thus making them more successful.
The Multi Solution Platform system concept provides the basis for this. In addition to the core
products SeeTec S50, S100 and Infinity, it includes a wide range of expansion options and inter-
faces to numerous third-party systems in the fields of access control and building management,
for example. As a modular software construction kit, the Multi Solution Platform allows custom,
industry-specific video solutions to be implemented that are infinitely scalable over time.
SeeTec Cayuga, the sixth generation of our video management software, is an extremely flexible
series of products suitable both for small-scale projects involving only a few cameras and for com-
plex and extensive installations involving multiple servers.
In this guide you will find information on the installation and configuration of the Cayuga software
and an overview of the frequently used functions.
Product lines
n SeeTec Cayuga S50/S50X: This is an attractively priced yet powerful entry-level solution
for small-scale projects involving up to 50 cameras.
n SeeTec Cayuga S100: This is the SeeTec solution for medium-sized installations. It allows
intelligent video analysis to be used and third-party systems to be integrated.
18 / 251
Introduction
n SeeTec Cayuga Infinity//Infinity X: This is the flagship of the SeeTec Cayuga product
series, offering the most extensive functional scope. There is no limit on the size of the pro-
jects that can be implemented.
19 / 251
2
Functional overview
20 / 251
Functional overview
Cayuga consists of various services that communicate with each other within a closed network
and over the Internet. Installations are possible on multiple computers, and an unlimited number of
servers, clients and devices can be added to the system. In addition, the database can be
installed at multiple distributed sites (multicore) to ensure network independence.
The system essentially consists of server applications and client applications.
Server
One or more server applications manage the connected devices and databases, providing the cli-
ents with the required data.
Redundant recording
If a device manager (multimedia database) fails, the concept of redundant recording offers the
option of assigning the cameras assigned to the device manager to be assigned to a predefined dif-
ferent device manager. The second device manager can be a standard device manager or a
device manager specially defined for redundancy purposes.
Client
A client application has a user interface that makes one or more modes available to the user (see
below). Multiple client applications can access a single server application.
Surveillance mode
In surveillance mode the live pictures of all of the connected cameras and incoming alarms are dis-
played. The PTZ cameras can also be controlled here. In addition, it is possible to search the
image data on the basis of specific criteria.
Archive mode
In archive mode the recorded image and event data (e.g. alarms) is displayed. The recordings can
be searched and exported.
21 / 251
Functional overview
Report mode
In report mode the events that occur (e.g. alarms and user logins and logouts) are displayed and
can be analyzed.
Configuration mode
All settings and adjustments made to the system are made in configuration mode. These include
the multiple configuration of video sources (e.g. cameras), user authorization management and
user interface settings.
LPR mode
License plate recognition (OCR) of the live images of the applicable cameras is performed on the
server. In LPR mode, the recognized license plates are compared with the stored master data and
can be linked to actions.
22 / 251
3
Installation
Information on installation
When migrating from SeeTec 5 to SeeTec 6 Cayuga, the CoreService master has to be
defined. This cannot be changed at a later state (e.g. changing to CoreService slave), as
it will result in data loss.
n Multiple scripts are used for installation, so you should disable any active virus scanners
for the duration of installation.
n Cayuga must not be installed on a compressed drive, since this can result in problems with
the database. A drive on which Cayuga is already installed must not be compressed sub-
sequently.
n DirectX is installed during installation, and Microsoft .NET Framework 4 as well, which
may require a restart in the case of a first-time installation. DirectX is required, for example,
for joystick control and MPEG-4/H.264 display. If you receive an error message telling you
that DirectX could not be installed, you must install it subsequently. You will find the setup
file in the Tools folder on the SeeTec DVD. Use only this version that is shipped with Cay-
uga.
n The DirectX installer for 32bit systems is found in D:\Software\32-Bit\DirectX9c,
where "D" is the DVD drive.
n The DirectX installer for 64bit systems is found in D:\Software\64-Bit\DirectX9c,
where "D" is the DVD drive.
n Before installation, the ZIP packed files must be unpacked. After unpacking, the
files are located in the folder \DirectX9c.
n When firewalls or virus scanners are used, you should disable the web guard/browser pro-
tection function or a similar function, since these programs prevent communication
23 / 251
Installation
between the server services. The use of web guards, behavioral monitoring etc. (e.g. of
virus scanners) is not supported.
n The SeeTec AutoUpdater is always installed.
Setup types
n Client & Server. This installation type installs the client and server modules on the com-
puter (see Standard installation (Client & Server) - p.33).
n Client. This installation type installs only the client modules (see Client installation -
p.35).
n Distributed server. This installation type installs only the client and the server services for
the cameras (DM/MDB) on the selected computer (see Installation of a distributed
server - p.37).
n User-defined. In a user-defined installation, it is possible to install only specific com-
ponents on a computer (see Carrying out a user-defined installation - p.39)
Firewalls
n Multiple ports on the server computer must be available by default to allow the Cayuga soft-
ware to function correctly in a network environment with a firewall. These are in the range
from 60000 to 60008 (TCP communication), 63000 (TCP, AutoUpdate) and 60007 (UDP,
image transmission).
n The client must also be accessible at ports 60000-60008, 63000 (TCP) and 60007 (UDP).
n The TCP alarm ports of the camera must also be accessible on the server computer that
administers a camera to guarantee alarm processing.
n Some cameras use the RTSP over RTP over UDP standard for MPEG4 image trans-
mission. In this case, the SeeTec server sends the requirements (e.g. frame rate and res-
olution) to the camera via TCP port 554. The camera sends the image data to the server via
a UDP port.
The corresponding ports must therefore not be blocked between the camera and the
SeeTec server.
24 / 251
Installation
System requirements
Known limitations
The performance requirements of the SeeTec server services depend, above all, on the video
volume transferred and the storage hardware.
The server software can only be installed on computers with the NTFS file system.
For the server, an additional 25 MB of RAM should be available for each camera.
Note that the hardware requirements depend very greatly on the configuration. Cayuga is based
on an advanced software architecture in response to technological progress. SeeTec recom-
mends a 64bit operating system for data-intensive clients in order to enable the use of the SeeTec
64bit client.
If in doubt contact our support.
n 32bit operating systems:Per server max. 80 devices
n 64bit operating systems:Per server max. 250 devices
n Maximum number of servers: 250 servers within a distributed installation
n Maximum number of cameras per system: 5000
General recommendations
Virtual environments
n We recommend not to use clients in virtual environments, because the rendering per-
formance is severely decreased
n We recommend dedicated network interfaces
n Virtualization could need more CPU power than its physical counterpart, additional CPU
performance may be necessary
n We recommend network storage instead of local storage
n Because virtualization decreases performance, we recommend testing the planned server
environment
n Cayuga is compatible with Citrix XEN, VMware vSphere and Microsoft Hyper-V
Thin clients
Thin Client environments are not supported.
25 / 251
Installation
CPU recommendations
Video processing needs a lot CPU power. We recommend always to use the latest powerful CPU
models.
You can find a comparison at https://www.cpubenchmark.net/high_end_cpus.html
26 / 251
Installation
System parameters
MaxChanSys Maximum number of video channels to be served by Cayuga for the 5000
whole system
MaxChanDM Maximum number of video channels per DeviceManagement (DM) 250
server (a reduction of the number of video channels might be advisable
depending on the number of video recordings to be stored)
27 / 251
Installation
Modules
Core Service n Microsoft Windows® 7 (Home Premium, Pro- n Only listed OS are supported
Device Management fessional, Ultimate, Enterprise) 32 Bit and 64 Bit n Windows embedded not supported
Multimedia Database n Microsoft Windows® 8 / 8.1 (Standard, Pro- n Counting Suite works only as 32 Bit process
fessional, Enterprise) 32 Bit and 64 Bit within a 64 Bit OS
Versatile Applications (i.e. Ana-
n Microsoft Windows Server® 2008 (Standard, Windows 2008 R2 (64 Bit) is recommended
lytics, LPR) n
Enterprise) 32 Bit and 64 Bit
n Contact SeeTec Sales Experts or Support for
n Microsoft Windows Server® 2008 R2 (Standard,
use of Virtual Machines
Enterprise) 32 Bit and 64 Bit
n Microsoft Windows Server® 2012 (Standard, Data-
center) 32 Bit and 64 Bit
n Microsoft Windows Server® 2012 R2 (Standard,
Datacenter) 32 Bit and 64 Bit
SDK n Microsoft Windows® 7 (Home Premium, Pro- n Only listed OS are supported
Native Client fessional, Ultimate, Enterprise) 32 Bit and 64 Bit n Windows embedded not supported
n Microsoft Windows® 8 / 8.1 (Standard, Pro- n Windows 7 (64 Bit) is recommended
fessional, Enterprise) 32 Bit and 64 Bit
n Microsoft Windows Server® 2008 R2 (Standard,
Enterprise) 32 Bit and 64 Bit
n Microsoft Windows Server® 2012 (Standard, Data-
center) 32 Bit and 64 Bit
n Microsoft Windows Server® 2012 R2 (Standard,
Datacenter) 32 Bit and 64 Bit
Mobile Client for iPhone/iPad Apple iOS devices with iOS 4.x or higher n Optimized for iPad
Mobile Client for Android Android devices with Android version 2.3 "Gingerbread"
or higher
Webclient n Google Chrome 35.0 n Google Chrome recommended
28 / 251
Installation
29 / 251
Installation
Type of installation
30 / 251
Installation
31 / 251
Installation
32 / 251
Installation
33 / 251
Installation
By default, the UpdateService uses port 63000 and 63001 to communicate with the
UpdateAgents.
11. Click Next.
12. Alter the existing path for image storage, or delete or add further folder paths. If the folder is
created on a network drive, enter the complete UNC path.
Example1
13. If the network drive is protected with a user name and password, select Using network
authorization and click Authorization.
14. Enter the user name and password for accessing the network drive, and then click OK.
Ensure that the specified user is available locally and that the domain is included in the user
name field (e.g. "Domain\\User name").
15. Click Next.
16. When asked, accept the EULA (End User License Agreement) for installing the DirectX 9
component.
17. Click Install.
Cayuga is now installed on your computer. If the UpdateService has been installed, the service
will now connect to the Update server and download the newest files, if available. To find out how
to start the program and modules, see Login - p.48.
34 / 251
Installation
Client installation
In the client installation, only the client is installed on the computer.
1. Insert the data carrier in the drive.
If you received the software as a download, copy it to the desktop of the computer on which
the software is installed and unpack the copy.
2. Double-click Setup to start installation.
3. Select the installation language.
You can configure the language of the user interface after installation (see also Con-
figuration mode - p.123).
4. Click OK to start installation.
5. Read the software license agreement, and then clickNext.
The program can only be installed if the End User License Agreement is accepted.
6. Select the destination folder.
7. Select "Client" as the setup type (see also "Installation").
35 / 251
Installation
10. Enter the IP address for the host of the Update service (also refer to Installing the Cayuga
UpdateService and the UpdateAgent).
By default, the UpdateService uses port 63000 and 63001 to communicate with the
UpdateAgents.
11. Click Next.
12. When asked, accept the EULA (End User License Agreement for installing the DirectX 9 com-
ponent.
13. Click Install.
The Cayuga client is then installed on your computer. If the UpdateService has been installed, the
service will now connect to the Update server and download the newest files, if available. To find
out how to start the program and modules, see Login.
36 / 251
Installation
1. Insert the data carrier in the drive. If you have received a ZIP archive, copy it to the computer
on which the software is installed and unpack the file.
2. Double-click Setup to start installation.
3. Select the installation language. You can configure the language of the user interface after
installation (see also Configuration mode - p.123).
4. Click OK to start installation.
5. Read the software license agreement, and then click Next. The program can only be installed
if the End User License Agreement is accepted.
6. Select the destination folder.
7. Select "Distributed server" as the setup type (see also Installation - p.23).
8. Specify the IP address of the main Core Service Master (CSM) server as the host in the "Man-
agement service" area.
9. Leave the port number unchanged at "60000".
10. Select a IP address/host name for server communication as the network address. The cli-
ent logs in to the server using this IP address. The installation program shows you all of the
existing network addresses and host names of the PC or server.
Neither the IP 127.0.0.1 nor the host name "localhost" may be used for com-
munication with the server.
11. Enter the IP address for the host of the Update service (also refer toInstalling and con-
figuring the UpdateService and the UpdateAgent - p.41).
37 / 251
Installation
By default, the UpdateService uses port 63000 and 63001 to communicate with the
UpdateAgents.
12. Click Next.
13. Alter the existing path for image storage, or delete or add further folder paths. If the folder is
created on a network drive, enter the complete UNC path.
Example1
14. If the network drive is protected with a user name and password, select Using network
authorization and click Authorization.
15. Enter the user name and password for accessing the network drive, and then click OK.
Ensure that the specified user is available locally and that the domain is included in the user
name field (e.g. "Domain\\User name").
16. Click Next.
17. Click Install. The Cayuga server is then installed on your computer.
18. Start the SeeTec Service Manager in the SeeTec Cayuga folder.
19. Use the SeeTec Service Manager to start the services. The distributed server connects to the
main server automatically.
The required ports 60000 - 60008 for communication between the distributed server and the
main server must be open.
20. If the UpdateService has been installed, the service will now connect to the Update server
and download the newest files, if available.
21. Configure the system with the SeeTec client (see Configuration mode - p.123).
38 / 251
Installation
39 / 251
Installation
Client components
n Client (32bit): The client for 32bit operating system
n Client (64bit): The client for 64bit operating system
n Mobile client: The server-side mobile client components to connect with mobile apps on
iOS and Android platforms
n Mobile client: The server-side web client components to connect with web-browsers
n Viewer: the offline viewer to see recorded images
Server components
n CoreService Master: The master core services and management database
n CoreService Slave: The slave core services and management database
Tools
n SDK (32-bit): The 32-bit components of the SDK for use in third-party software
n SDK (64-bit): The 64-bit components of the SDK for use in third-party software
40 / 251
Installation
Only one server should be the UpdateService server. Having multiple UpdateService
servers is not recommended.
1. Before installing updates with the UpdateService (e.g. from Cayuga R3 to Cayuga R6),
update all UpdateAgents with the current UpdateService (e.g. Cayuga R3).
2. Select the server that runs the UpdateService.
3. Provide the IP address of the server for the UpdateService.
4. Check that ports 63000 and 63001 are not blocked by the firewall.
By default, the UpdateService uses port 63000 and 63001 to communicate with the UpdateA-
gents.
5. Select the "UpdateService" component in the server components of the user-defined install-
ation and install (see Installing and configuring the UpdateService and the UpdateA-
gent - p.41).
6. If SeeTec Cayuga is already installed, run the installer again from the control panel of the oper-
ating system and select Change. (To modify installed applications, refer to the operating sys-
tem manual.)
7. Start the VMS_UPDATESVR service if not already running (seeSeeTec ServiceManager -
p.219).
41 / 251
Installation
If the IP address of the UpdateServer has changed, the UpdateAgent has to be configured manu-
ally in the configuration file of the UpdateAgent.
1. Open the configuration file "/conf/updateclient.conf.xml" in the installation directory.
2. Set the new IP address of the UpdateService. The IP address is identical to the network
address of the client with the UpdateService installed.
Example1
3. Restart the VMS_UPDATER service. For restarting, see SeeTec ServiceManager - p.219.
1
updateclient.conf.xml
<?xml version="1.0"?>
<ServerInformation xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd-
d="http://www.w3.org/2001/XMLSchema">
<ip>10.0.8.131</ip>
<port>63000</port>
</ServerInformation>
42 / 251
Installation
Updating
If a previous version of Cayuga is already installed, uninstalling the previous version is not
required before updating to a newer version. However, if any version of SeeTec 5 is installed, it
must be removed before upgrading (see Migrating from SeeTec 5.4.x to Cayuga - p.45).
43 / 251
Installation
6. To remove the program from the hard disk, select "Remove" and then Next. All components
of the program except for the configuration settings are deleted from the hard disk and
removed from the directory services.
7. To completely remove all traces of the program after uninstallation, delete the remaining
SeeTec folder in C:\Program Files manually.
Uninstallation
1. Open the Control Panel and select Programs.
2. Select Programs and Features.
3. Select SeeTec Cayuga, and then click Uninstall. All components of the program except for
the configuration settings are deleted from the hard disk and removed from the directory ser-
vices.
4. To completely remove all traces of the program after uninstallation, delete the remaining
SeeTec folder in C:\Program Files manually.
This step is necessary when performing a "clean installation", as the MaxDB data base will
be migrated when not removed manually.
44 / 251
Installation
Compatibility matrix
A direct upgrade is possible from SeeTec 5.4.0. onwards. Older SeeTec installations
must therefore be updated to SeeTec 5.4.x.
45 / 251
Installation
Migrating procedure
Note that the backup must be available locally and must not be unpacked!
7. Install and activate a new license (see Import license file - p.77).
46 / 251
Installation
47 / 251
4
Login
Once the system is installed, you have to log in on the client in order to use the installed services.
To automate the startup of the client, multiple Command line parameters - p.230 can be passed
at startup in order, for example, to start the client with a different language or with predefined pass-
words.
48 / 251
Login
1. Start the SeeTec client in the SeeTecCayuga folder on the Start menu.
49 / 251
Login
50 / 251
Login
Advanced options
In the advanced options you can configure additional user management functions or log in as a
user with two passwords.
1. Click Advanced options in the login window.
2. From the drop-down list, you can select a different server in the network.
3. Enter a second password if you wish.
4. In the drop-down menu, select a comment or enter a new comment. Commenting can be
used to store additional information for the selected login.
5. In order to access an Active Directory service for the purpose of user management, select
Use Active Directory and use your Windows login details to enter the user name and pass-
word.
6. Select Remember user name and Remember password in order to avoid having to spe-
cify the user data. The system enters the specified user name and password in the login
window.
7. Select Log user in automatically to go straight to the user interface when the program
starts up.
8. Select Use NAT to use the client to access a different server over the Internet. Deselect
this option if no internet connection is required.
If you forget the administrator's password and haven't added any users to the admin-
istrator group, it is no longer possible to access the system configuration settings.
51 / 251
Login
52 / 251
5
The user interface
53 / 251
The user interface
n The Work area (3), which is the main window for displaying the selected mode functions
and – depending on which mode is selected – the Information control (4), which is dis-
played in the lower part of the work area. Similar to a browser window, the work area can
be displayed on multiple tabs.The information control is used for the alarm list and system
messages in surveillance mode, and for displaying search results in configuration mode
n The control bar (5), which contains the tabs for controlling the contents of the work area
(see The control bar - p.81)
54 / 251
The user interface
The menu bar contains the menus you can use regardless of the mode you have selected:
n File (1). Changes the settings of the client, the language, password, profile, installation,
installation manager, and switches the user.
n View (2). Manages the settings of the connected monitors and the video wall as well as the
LPR master data (see View - p.66).
n Tools (3). Displays and removes the write protection of recordings, configures the multiple
export of image data and defines the logo action (see Tools - p.72).
n Info (4). Displays information on the system and license (see Info - p.77).
n Help (5). Calls the Help system and provides options for solving problems (see Help -
p.78).
n Screen background of the main window (bright) (6). This function makes the screen back-
ground of the main window brighter.
n Screen background of the main window (dark) (7). This function makes the screen back-
ground of the main window darker (except when the configuration mode is active)
File
This menu displays the following options:
Client configuration 55
Changing the font color 63
Changing the language 63
Changing the password 63
Changing the profile 63
Changing the user 63
Switching SeeTec installation 64
Installation Manager 64
Select and display cameras with the keyboard 65
Client configuration
The settings of the client are stored locally in the Windows user profile. They can only
be changed by a user with administrator rights.
55 / 251
The user interface
Client
1. Select Disable alarm toast messages to suppress alarm notification for toast messages
(see Alarm notification - p.103).
2. Select Disable system notification toast messages to suppress system notifications for
toast messages (see Alarm notification - p.103).
3. Select Show filtered search results only to display only the relevant search results in the
search results list.
4. Select a web browser to be used for displaying the online help system. If no browser is spe-
cified, the standard browser defined in the operating system settings will be used.
5. Make entries for Maximum number of events in report mode to specify the maximum num-
ber of events displayed in report mode.
6. Select Activate for cameras in camera overview to activate the thumbnail view of the cam-
era image in the camera overview.
You can open thumbnails by rolling the mouse cursor over the names of the cameras in the
overview while holding down the CTRL-key.
7. Select Activate for cameras in maps to activate the thumbnail view of the camera image in
the maps.
You can open the thumbnail by using the mouse pointer to hover over the name of the camera
in the map.
8. Select Scale thumbnail size in map with screen resolution and select the thumbnail size
from the drop-down menu. The scaling adapts the thumbnail size to the screen resolution. The
higher the resolution of the screen is, the higher will be the resolution of the thumbnails.
56 / 251
The user interface
9. Activate the Automatic login for display agent and enter the user name and password to
start the display agent automatically when the client is started.
Alarms
57 / 251
The user interface
Analytics
58 / 251
The user interface
Warnings
59 / 251
The user interface
Network
60 / 251
The user interface
61 / 251
The user interface
Input devices
1. Select the Input devices tab.
2. All input devices, such as joysticks, that are connected to the system and available before
startup of the SeeTec client are displayed. Any combination of devices is supported. Every
device can be configured independently of the others.
3. Select from the list the device you want to configure.
The device's functions are listed on the right-hand side of the dialog box.
4. Activate the device.
5. If necessary, activate the z-axis (depending on the hardware).
6. Press the joystick button to which you want to assign an action, and then select the desired
action.
7. To use the keyboard for selecting and displaying cameras, activate Enable virtual
sequence.
The keys are assigned as follows:
n First row:
n F1: Monitor
n F2: Display Agent
n F5: Webpage entity
n Second row:
n B1: predefined layer
n B2: camera
n B3: Tile
n B4: temporary layer
n B5: map
n Last row:
n Tab: enter
Pattern:
[B1, B2, B3, B4, B5, F5] (number of entity or temporary layer) --> [F1, F2] (number of monitor or
display agent) --> [optional: 3] (number of tile of temporary layer that has focus) Tab
Examples1
62 / 251
The user interface
1. Choose Change password from the File menu, and then enter the new password for the cur-
rent user.
2. Enter the new password.
3. Click OK to apply the password.
63 / 251
The user interface
Installation Manager
Adds further servers to the existing client-server installation in order to provide access to the
devices connected to them and displays the current connection status.
64 / 251
The user interface
Requirements
n The server version on all servers to which a connection is to be established cannot be
higher (newer) than the client.
n All servers must support multi-installation login. A license must be available for SeeTec
multi-installation login.
Reorder installations
1. Reorder the list of installations by selecting one object and dragging it to the designated place
in the list.
65 / 251
The user interface
1. To display a camera with the keyboard, start by entering a special key combination.
2. Enter a multi-digit number on the number keys of the keypad.
3. Press another special key, then enter the number of the monitor or display agent.
4. Start by pressing the tab bar.
It is also possible to show a temporary layer with a joystick button and to show a camera in a
tile in such a temporary layer.
Key assignment
n First row:
n F1: Monitor
n F2: Display Agent
n F5: Webpage entity
n Second row:
n B1: predefined layer
n B2: camera
n B3: Tile
n B4: temporary layer
n B5: map
n Last row:
n Tab: enter
Pattern
1. [B1, B2, B3, B4, B5, F5] (number of entity or temporary layer)
2. [F1, F2] (number of monitor or display agent)
3. [optional: 3] (number of tile of temporary layer that has focus)
4. Tab
Examples1
View
The settings are stored locally and have to be made on each client and for each Win-
dows® login profile.
Adding a window 67
Adding the sequential alarm window 67
Keeping the aspect ratio 67
Borderless display 67
Display agent 67
Video wall dispatcher 67
LPR master data editor 67
Count analysis 71
Access control data editor 71
66 / 251
The user interface
Adding a window
1. The "Add window" function allows you to distribute the display of the work area to multiple
connected monitors.
2. Choose Add window from the View menu.
A second window opens.
3. Move the window to the connected monitor.
The client saves the setting and makes it available when you log in again.
4. To use multiple connected monitors, repeat these steps.
Borderless display
1. Select Borderless display to hide the controls and the bars between the camera images in
the layer with multiple cameras (see View - p.66).
If a camera is selected, the border will be displayed.
2. To display the controls and the camera menu, click the required camera image.
Display agent
1. The SeeTec display agent allows you to use standard PCs and monitors to create a full-
fledged remote-controlled video wall (for settings, see Video walls - p.178 in the configuration
mode).
67 / 251
The user interface
The LPR master data editor must be configured in the SeeTec VA Administration Tool -
p.207 prior to usage.
License plates in the list (12) can be sorted and displayed by license plate groups.
1. Click the arrow beside the name of the license plate group to close it.
2. Click the arrow again to open the license plate group again.
68 / 251
The user interface
2. Enter the new license plate in the text box in the upper left corner if it is not yet displayed.
3. Assign the license plate to a license plate group.
License plate groups are created in configuration mode in the License plate groups - p.179
area.
4. You have the option of entering additional descriptions for the license plate in the LPR master
data tab.
The name and number of text fields are defined in the Server area in configuration mode (see
Configuring the global OCR settings - p.182 .
5. Switch to the Ticket tab and select the validity period for the license plate.
The activated time period is displayed in the left column.
6. If you wish to enter a different time period, click Activate and enter the desired time period.
This gives every license plate a validity ticket. The status of the ticket is indicated by the dif-
ferent font color and an icon.
7. To see an overview of the changes to the license plate, switch to the History tab.
The history shows the initial configuration of the license plate and all subsequent changes.
The width of the columns can be adjusted to improve readability.
8. Switch to the E-mail notification tab and optionally enter the recipient to whom an email is to
be sent as soon as the vehicle with the specific license number is recognized.
9. Enter the macro that is to be replaced with the applicable information by the server.
The following macros are available:
69 / 251
The user interface
1. Select a license plate from the list of the master data editor, and then click Delete (3) to
remove the selected license plate from the list.
The license plate is hidden.
1The text in the message "License plate [1] was recognized [4] at [5]." becomes "License plate
KA YX 0815 was recognized on 15.04.2010 at 4:25 pm." in the email.
70 / 251
The user interface
Count analysis
The count analysis provides a graphical analysis of the objects (people or vehicles) that have been
in the selected area (see AOI (Area of interest) - p.153)or have passed the tripwire (see Tripwire
- p.152).
For configuration of the count analysis, see SeeTec Video Analytics - p.147.
71 / 251
The user interface
For information about working with the access control system, refer to the technical
guide ("Technical_Guides_SeeTec_Cayuga_R6_EN.pdf") or contact support.
Tools
This menu displays the following options:
Multiple export of image data 72
Configuring a logo action 74
Manual reference image comparison 74
Removing write protection from recordings 76
Status report for automatic image export 76
72 / 251
The user interface
3. To secure the exported image data using the default password, select Use default pass-
word.
4. If you want to use your own password instead of the default password, enter this password
and then enter it again. Optionally, use the standard password. The standard password is set
in configuration mode in the Tools option.
5. Click Select and specify the storage location of the exported image data.
6. To store the exported image data in separate folders by user, camera name and time of
export, select Create subfolders for user, camera name and time of export.
7. To carry out the export at a specific time, select Select time for export, and then specify a
date and time for the export.
8. To store the exported image data in folders of approximately the same size as the expected
file size, select Split export into multiple folders and either select the desired folder size
according to the export medium (e.g. CD, DVD, Blue-ray disc) or specify the maximum size
of the image file. Image data that exceeds the specified size is split into multiple files so that
they can be stored on data carriers such as CD-ROMs or DVDs.The minimum size of the file
is 100 MB.
9. To carry out the export immediately, click Export.
During the export process, the SeeTec viewer installation file and a program for burning
to CD/DVD (Totally Free Burner) are copied to the export folder as well. This allows the
files to be run on a computer without a SeeTec installation with the SeeTec viewer. The
SeeTec viewer will import the files and display them as separate time intervals.
During the export process, the SeeTec viewer installation file and a program for burning
to CD/DVD (Totally Free Burner) are copied to the export folder as well. This allows the
files to be run on a computer without a SeeTec installation with the SeeTec viewer. The
SeeTec viewer will import the files and display them as separate time intervals.
73 / 251
The user interface
The manual reference image comparison helps detect changes in the camera orientation.
Mobotix cameras are only supported for Motion JPEG
1. Select a camera from the list and click Create reference image. The current camera image
will be used as reference image. The current view displays the actual live image of the cam-
era.
2. To delete a reference image, select the camera from the list and click Delete reference
image.
3. Select the camerae and check both images for changes.
4. If changes are detected, click the red con (2) to mark the change as not identical.
5. If the images are identical, click the green icon (4) to mark the image as identical.
74 / 251
The user interface
6. If the changes are difficult to see, select Show differences only. The changes detected by
the image processing software will be displayed as red areas in the current view. If no
changes are detected, the current view turns black.
7. Deselect Show differences only to return to the actual camera image.
8. Select Activate computerized support to display a threshold scale. Move the pointer on the
scale to change the threshold values. This changes the threshold values of the current image
and helps discern possible changes in the image.
9. Deselect Keep aspect ratio to display both images filling the frame. Depending on the cam-
era image, this setting may distort the image's aspect ratio.
10. To print the images, click the printer icon (3).
1. In the print report dialog, select Show difference images to print the current views with the
differences highlighted.
2. Select Show all reference images to print the reference images alongside the current views.
3. Select Show difference as percent to print the percentage of the detected differences.
4. Select Show objected cams to display only those cameras with images differing from the ref-
erence image.
5. Enter the user name and add comments, if necessary.
6. Click Print report.
75 / 251
The user interface
The status report for automatic image export displays the list of failed automatic exports,
76 / 251
The user interface
1. Select the DeviceManagers to be included in the query for fails automatic exports.
2. Click Start query. The errors and problems that have occurred on the selected DeviceMan-
ager are displayed.
3. Select one or more items in the list and select an action for the selected exports.
4. Export again. The selected image data export will be exported again.
5. Remove from list. The selected items will be removed from the result list.
6. Click Apply to perform the selected action.
7. Click Close.
Info
This menu displays the following options:
Request product ID 77
Import license file 77
Activate license 77
Display license 78
Display program information 78
Display system information 78
Request product ID
The Cayuga installation must be activated within 30 days to purchase a new license. This requires
sending an automatically generated activation key, the product ID, to SeeTec.
1. Choose Request product ID from the Info menu.
The software creates a unique product ID.
2. Click Copy to copy the displayed product ID to the clipboard.
3. Open the SeeTec website and navigate to "Support" and then "Licensing", and then click
"New license".
4. Enter your product ID and the other information requested there.
You will receive the license key by email.
Activate license
You cannot activate or download the licenses unless you have a connection to the Inter-
net.
77 / 251
The user interface
4. Select Download license if an update has been carried out and the license is therefore
required again. If the product ID has changed (e.g. due to changes to the server hardware),
contact the support department.
5. Enter your installation number (INR).
6. Click OK to confirm your entries. The client connects to the SeeTec registration server and
transfers the license key to the computer.
Display license
1. Choose Display license from the Info menu.
Information on the license is displayed, such as the maximum number of cameras/devices
that can be used, the concurrent client connections or the validity period of the license (if it is
a demo license).
A test license will be installed during installation and is valid for 30 days. A demo
license is valid until the displayed date. If no valid license is available, login is not pos-
sible. For further questions, contact the SeeTecSupport - p.17.
Help
This menu displays the following options:
User's Guide 78
Start problem recording 79
Display Help icons 79
User's Guide
Starts the Help system on the starting page. In addition, there are also links for accessing specific
topics directly from the various controls and dialog boxes. The system automatically checks for
current versions of the online help system. The user is notified if the installed version is not up-to-
date. For newer editions of the help system and the manual, visit the SeeTecwebsite.
When starting the help system for the first time, you may be prompted by the browser
to activate ActiveX or allow JavaScript. The help system will not function properly, if
78 / 251
The user interface
79 / 251
The user interface
80 / 251
The user interface
Showing/hiding a tab
1. Click the gray triangle in the upper-right corner of a tab to hide the tab on the right-hand edge of
the screen.
Once the last control on the control bar has been minimized, the available size of the main win-
dow increases.
2. Click the gray triangle on the tab on the right-hand side of the screen to show the control.
The control bar then also appears again.
81 / 251
The user interface
Search
82 / 251
6
Surveillance mode
Surveillance mode allows live images, web sites, maps, layers, alarms and patrols to be dis-
played and PTZ cameras and other peripherals, such as door openers, that are to be controlled
(see also The user interface - p.53).
To change to surveillance mode, click the Surveillance mode icon on the mode bar.
Camera operation
You can control the functions of the camera using the control bar (see Camera image controller -
p.90) or using the controls on the Control control (see Control).
To operate a camera, select the camera in the work area.
You can recognize a standard recording by a red point that slowly flashes on and off along the
lower right edge of the camera image in surveillance mode. You can recognize an alarm recording
by the red bell that appears along the lower right edge of the camera image during recording.
Tabs
The tabs allow you to open and close the layers (see Work area).
Control bar
The control bar allows you to perform the following actions:
n Move the selected PTZ cameras and change the image detail (see PTZ control - p.97)
n Perform actions using buttons (see Buttons - p.99)
n Carry out patrols (see Patrol - p.99)
83 / 251
Surveillance mode
n Use the optionally installed communication options (camera and audio) (see Audio -
p.100).
n Call dispatcher mode (if installed, see Video wall dispatcher - p.67). The dispatcher mode
is switched on and off via the View menu.
n Select the cameras created for each location (see Overview - p.96)
n Search for specific installed cameras
84 / 251
Surveillance mode
Work area
The main window for displaying the camera and object images is sometimes known as the "work
area" (see also The user interface - p.53). The work area displays up to 64 tiles at the same time.
The tiles can be arranged in different ways:
n Evenly as a grid
n With a main layer and smaller layers (e.g. "layer with focus tile")
Creating layers
Layers can be set in the layer area in configuration mode. Temporary layers, which are only avail-
able for the user and are not saved, can optionally be combined.
In some layers, the available objects such as cameras or maps can be assigned to any tile in the
work area.
1. Drag the desired layer from the Overview control to the work area.
To configure the layers, see Layers.
Or
2. Click the eye icon on the title bar in surveillance mode, and then choose Add layer.
You can select the desired number of tiles or create a user-defined layer.
The selected layer is shown in a control (on a tab) next to the eye icon.
3. Click the cross on the tab to close this layer.
4. Drag the selected object to the desired tile in the work area.
To move an object in the work area, drag it to the tile in which it is to be displayed. If there is
an object there already, it is moved to the previous tile of the moved object.
5. Select Open layer in secondary window to display the new layer on a second screen (see
View - p.66).
6. Select automatic layer switching and the desired interval to switch automatically between
the layers after a certain interval.
Automatic layer switching is stopped in the event of an alarm scenario and auto-
matically resumed after an alarm.
85 / 251
Surveillance mode
1. Switch to surveillance or archive mode and drag the required camera view onto the secondary
display. The drag & drop feature works between surveillance and archive mode and vice
versa.
2. On the secondary display, click on the display icon. The camera view on the secondary dis-
play will remain in surveillance mode with live image even if the primary display is switched to
another mode.
3. To remove the viewing mode on the secondary display, click on the display icon again.
4. When clicking on the display icon on the secondary display after switching the viewing mode
on the primary display, the last live image view will be restored on the secondary display.
86 / 251
Surveillance mode
1. To switch to the sequential mode, click (1). The alarms will be displayed in a single row. If the
number of alarm cameras exceeds the number of columns defined, the remaining alarm cam-
eras will be ignored.
2. To switch to continuous mode, click (2). If the number of alarm cameras exceeds the number
of columns defined, the additional cameras will be added in the row below.
87 / 251
Surveillance mode
Adding a layer
1. Click Add layer and select the required arrangement of the layer fields or select a user-
defined arrangement of rows and columns. The new layer is displayed.
2. Drag the camera views from the control bar into the fields and click Save layer as local layer
to save the new layer view for the current user on the client.
88 / 251
Surveillance mode
Closing layers
1. To close a single layer, click Close layer. To close all open layers, click Close all layers.
Unsaved layers will close without further notice.
89 / 251
Surveillance mode
n Zoom (1). Enlarges the image detail with the help of the digital or optical zoom function.
The image detail is enlarged or reduced in size using the scroll wheel on the mouse. You
can move the zoomed image by holding down the middle mouse button. Optionally, when
drawing a rectangle in the image, the enclosed area will be zoomed into.PTZ cameras can
be operated using the controller or a connected joystick.For some PTZ cameras, zooming
into a defined rectangular area in an image by optical zoom is enabled.
Optical zoom is only possible if supported by the camera model.
n PTZ (2). Moves the image detail in the layer. The image detail can be changed by clicking
and moving the mouse pointer in the image (see Swiveling the camera in the image). PTZ
90 / 251
Surveillance mode
Manual recording
Alarm recordings can be started and stopped manually by the user who has started them. Addi-
tionally, a bookmark can be added to the recording. This bookmark can be used for the search in
the archive mode (see Searching for alarms in the Archive mode).
1. Click the REC icon (9).
A red bell on the right indicates whether alarm recording has started.
2. If desired, click Add bookmark. A bookmark information window is displayed.
3. Enter the name and a short description of the bookmark.
4. Click OK to add the bookmark to the recording.
5. Click the REC icon (9) again.
The recording is stopped. To prevent unlimited recording, you must specify the maximum
post-alarm duration in configuration mode in the Cameras area.
91 / 251
Surveillance mode
iSearch
In iSearch you can search recordings for motion without switching to archive mode. The search-
able time period is 5 to 60 minutes.
The performance of the search in the selected image detail depends on the performance
capability of the client hardware, since the search is carried out exclusively on the cli-
ent.
1. Select the camera image, and then select ISearch at the bottom of the image.
See iSearch - p.116 to find out what to do next.
92 / 251
Surveillance mode
Maps
The map shows the area to be surveilled. In configuration mode it is added to the software as a
simple graphic (see Maps). The various cameras are then integrated in this graphic. The map can
thus show a variety of different parts of the company: from the company site to fully automated
production lines.
The map shows the cameras that the user can operate.
If a camera has failed (due to having no power, no connection to the network, etc.), the
camera icon is shown as a yellow warning sign.
1. Click the Digital zoom icon (19) to activate the zooming function for the image.
2. Increase or decrease the size of the image detail by moving the mouse wheel.
3. Click the Layer options icon (2) to open the image on a new tab or in a new window or to
close the layer.
4. Click the Create lasso selection icon (19) to activate the lasso function (see Using the
lasso function - p.94).
5. Click the Window on 1x1 layer icon (4) to increase the size of the image to fill the whole
work area.
93 / 251
Surveillance mode
94 / 251
Surveillance mode
Web pages
In the web page layer, the user can call specific web pages in specified tiles in order to receive
information on the company, for example. The (Internet or intranet) web pages displayed are spe-
cified in configuration mode (see Web pages).
95 / 251
Surveillance mode
Overview
The Overview control displays all available cameras, maps, layers and web pages classified by
the locations of the company.
1. Click the small triangle in front of the name of the site to display all of the objects assigned to
this site.
2. Select an object from the list to display only this object.
96 / 251
Surveillance mode
Control
The Control control allows you to control the active cameras displayed in the work area. The fol-
lowing submenus are available:
n PTZ control (1)
n Buttons (2)
n Patrol (3)
n Audio (4)
n Dispatcher mode (5)
PTZ control 97
Creating and deleting a preset camera position 99
Buttons 99
Patrol 99
Starting a patrol 99
Stopping a patrol 100
Pausing a patrol 100
Repeating a patrol 100
Navigating between points in the patrol 100
Audio 100
Dispatcher mode 101
PTZ control
1. On the menu bar of the Control control, click the PTZ control icon to switch to the operating
mode of the cameras.
97 / 251
Surveillance mode
2. The PTZ control function is the central function for operating the selected PTZ camera.
These functions are available for PTZ cameras. If no PTZ camera is present or the
PTZ camera is deactivated, digital zoom and digital preset selection is also pos-
sible.
3. Select the camera image, and then use the PTZ control (5) to move the camera by moving the
bright spot in the desired direction.
4. Drag the Zoom slider (1) up or down to make the camera zoom in or out.Select the required
camera position (2) to pan the camera to a preset position. Including the default position, ten
positions are possible. The current position is displayed.
Or
Click the triangle beside the position name, and then select the desired position from the drop-
down list.
The position is immediately approached. The positions are set in the configuration menu in the
Camera area.Use the four direction arrows at the edge of the PTZ control to move the camera
incrementally.Switch between daytime and nighttime vision (6) to get an image when light con-
ditions are poor, providing this is supported by the camera.
5. Click the Auto day/night icon to switch the camera automatically. The following camera func-
tions are also available, if they are supported by the hardware:
n Iris +, Iris -: opens or closes the iris of the camera to control the brightness.
n Auto Iris: automatically adjusts the iris opening to the optimum brightness of the envir-
onment.
n Close-up focus, long-range focus: adjusts the image sharpness to the objects in the cam-
era focus.
n Autofocus: automatically adjusts the image sharpness to the objects in the camera focus.
98 / 251
Surveillance mode
Example1
Buttons
1. On the menu bar of the Control control, click the OK icon to switch to the display of the but-
tons created.
The buttons are set in the configuration menu in the Buttons area.
2. The buttons the user is authorized to use are displayed.
3. Activate the desired action by clicking the button.
Patrol
1. On the menu bar of the Control control, click the Patrol icon to switch to the overview of the
patrols configured.
To configure the patrols, see Patrols in configuration mode.
Starting a patrol
1. Select the desired patrol, and then click Play (1).
The specified cameras, preset positions, maps and layers are displayed one after the other for
a defined period of time.
1Delete: Position 3 is deleted. Position 4 is then shifted to position 3, position 5 to position 4 and
so on.
99 / 251
Surveillance mode
Stopping a patrol
1. Click Stop (3) to cancel the selected patrol.
Pausing a patrol
1. Click Pause (2) to interrupt the patrol.
The patrol is paused.
Repeating a patrol
1. Click Loop (4).
The patrol is repeated.
2. Click Loop (4) again.
The repetition is canceled, and no more patrols are carried out once the current one is fin-
ished.
Audio
1. On the menu bar of the Control control, click the Audio icon to switch to audio mode.
2. Select VOIP or Camera to switch between the audio system of the camera (if there is one)
and voice output over the network (Voice over IP).
100 / 251
Surveillance mode
3. Move the sliders for the microphone (1) and loudspeakers (3) to adjust the volume.
The volume setting is saved locally for each camera.
4. To speak to a person from the address book of the existing users, enter the name of the per-
son in the text box, and then click the magnifying glass icon or select a person from the list.
5. Click the green phone icon to start the call.
6. Click the red phone icon to finish the call.
The name of the person you are talking to, the person's location and the duration of the call are
displayed (2).
Dispatcher mode
Dispatcher mode is displayed only if the video wall dispatcher is activated (see Video
wall dispatcher - p.67). In addition, at least one video wall must have been created in
configuration mode (see Video walls).
1. On the menu bar of the Control control, click the Dispatcher mode icon to switch to video
wall control.
101 / 251
Surveillance mode
Alarm list
The alarm list is at the bottom of the screen and can be opened or closed as required. It shows the
current and previous alarm and system messages. The Alarm list control displays the alarms that
have occurred in the order in their order of occurrence. The most recent alarms are displayed first.
In addition, the number of alarms that have occurred is shown in the surveillance mode icon on the
mode bar.
1. Switch between alarm and system messages by selecting the Alarm or System button.
For alarm and system messages see Alarm messages or System messages.
2. Click the column headings to sort the alarm or system messages by the column category.
3. Click the gray triangle in the upper-right corner of the alarm list to minimize the control at the
bottom of the screen.
4. Click the gray triangle on the tab in the lower right corner of the screen to show the control.
Alarm messages
All open alarms that have been assigned to the current logged-in profile are displayed in the alarm
messages (see Profiles). The type of alarm can be recognized by the color-code. The color in
which the alarm is displayed can be set in configuration mode in the Alarms control.
102 / 251
Surveillance mode
As soon as an alarm occurs, a message window is displayed for high- or medium-priority alarms.
Low-priority alarms are removed from the alarm list at the end of the alarm if they are acknow-
ledged and another alarm occurs. Low-priority alarms do not have an alarm status.
You can add a comment for this alarm if necessary.
The comment can be displayed in report mode and archive mode.
1. Click Confirm to acknowledge the alarm.
The alarm is deleted from the alarm list and the next alarm is displayed.
2. Reject the alarm.
The alarm is deleted from the alarm list and the next alarm is displayed.
3. Reset the alarm.
The alarm is marked as deferred in the alarm list. No further alarm is displayed until an alarm
is either called from the alarm list or acknowledged. This allows multiple alarms to be acknow-
ledged simultaneously.
Alarm notification
A new alarm is displayed in a highlighted pop-up window that opens from the bottom of the screen
(alarm notification).
The notification window displays the alarm name, its status and the time of occurrence.
1. Click Switch off alarm notes to prevent the alarm notifications appear on the screen.
2. Select the time interval for the alarm message to be hidden ("snooze"). After the selected inter-
val has elapsed, the alarm notification will be displayed again.
3. Select the alarm and click Edit alarm to display the message window for editing (see above).
4. Click Close to close the message window.
103 / 251
Surveillance mode
System messages
The system messages show the errors that have been reported by the system, such as failure of a
server, database or camera and also losses of connection.
The errors are displayed in descending order by time of occurrence with a description, the internal
error number, the message and the cause of the error.
1. Select one or more system messages and click Remove selected to remove the message
from the list. The number in the red circle displaying the number of unconfirmed messages is
reduced.
2. Optionally, click Remove all to remove all system messages from the list and to remove the
red circle displaying the number of unconfirmed system messages.
104 / 251
7
Archive mode
Archive mode is used for the retrospective evaluation of recordings and their archiving. Only recor-
ded data can be displayed in archive mode. To select the relevant image data, a camera must be
selected in the camera overview or in the alarm list.
The recording periods for the selected camera (green frame) are displayed in a time line in the
archive player. The icons for digital zoom and volume control are also displayed (only for cameras
with audio recording activated).
1. To switch to archive mode, click the Archive mode icon on the mode bar.
2. Select the camera or layer whose archived image data is to be displayed, or select an alarm
from the alarm list.
Camera overview
The camera overview displays all installed cameras, maps and layers you are permitted to
access. Cameras having integrated exported image data are displayed as "<camera name>
[archive]".
1. Select the relevant camera by clicking. The camera images are displayed in the main window.
105 / 251
Archive mode
Archive player
The archive player allows control of the playback from a selected camera. The player is divided
into two sections. The actual archive player is shown on the left and timeline on the right.
The archive player has the following functions:
n Previous frame (1): Jumps to the event's previous i-frame or JPEG image.
n Play backward (2): Plays the archived video stream in reverse chronological order.
n Pause (3): Pauses the playback.
n Play (4): Plays the archived event in the correct chronological order.
n Next frame (5): Jumps to the event's next i-frame or JPEG frame.
n Real time (6): Plays the event in real time.
n Next alarm recording (7): Jumps to the camera's next alarm recording.
n Skip pause (8): Skips the pause between two recordings in playback mode.
n Calendar (9): Opens a calendar window in order to navigate to a specific calendar time
(date and time).
n Zoom out from timeline (10) or Zoom in to timeline (11): Enlarges or reduces the size
of the display of the timeline. You can also zoom within the recording period by clicking the
timeline and then turning the scroll wheel on the mouse.
n Update timeline (12): Updates the camera's timeline. For cameras with Edge storage
recording, the camera's storage will be synchronized automatically (see Image storage -
Edge storage - p.138). For manual synchronization, hold down the CTRL key when click-
ing the icon.
n Add bookmark (13): Adds a bookmark to the current frame (seeWorking with book-
marks - p.114).
n Bookmark overview (14): Displays the overview of all bookmarks (see Working with
bookmarks - p.114).
n Synchronized mode(15): When playback starts, the cameras are synchronized to the
time of the selected camera.
n Set start/end marker (16): Sets the start and end markers for a selected area of the
timeline (see Editing an
area - p.112).
n Write protection (17): Sets write protection for the marked area of the timeline. See Set-
ting a write protection - p.111
n Delete area (18): Deletes the marked area from the timeline.
n Export area (19): Starts the *.avi export or the SeeTec image data export (see Editing an
area - p.112)
n Timeline / time stream (20): See Timeline / time stream - p.107.
106 / 251
Archive mode
n Jog dial (22): Plays the sequence forward and backward. The further you turn the jog dial
to the right or left, the faster the sequence is played forward or backward. The playback
speed is displayed in the number field (21).
107 / 251
Archive mode
Exporting recordings
1. After selecting a time span in a recording, click the button Export area.
2. Select the export format (AVI) or the SeeTec data format. The SeeTec data format is encryp-
ted.
AVI export
AVI export should only be selected if the export period is shorter than 10 minutes. The
exported AVI file(s) can only be stored on the client.
For server controlled AVI export, refer to Image data export in the server control bar of the con-
figuration mode.
1. To select the required export period, drag the time stream to the required position and set the
start and end markers (16). The period to be exported is highlighted on the time stream.
2. Select the AVI export format and click OK.
3. Specify the Name of the file export path and and select the export codec. By default, the best
codec available on the system is used.
4. Activate Export only i-frames to limit the size of the exported video to the keyframes.
5. Activate Advanced settings and choose the required compression setting in the Com-
pression menu. The following compression settings may be available (depending on the oper-
ating system mode - 32bit or 64bit - only the matching codecs are available, i.e. 32bit codecs
for 32bit systems and 64bit codecs for 64bit systems) :
6. Microsoft Video 1: a lossy video compression and decompression algorithm (codec) that was
released with version 1.0 of Microsoft Video for Windows.
7. Xvid MPEG-4 Codec: a video codec library following the MPEG-4 standard
8. DV Video Encoder: uses lossy compression of video while audio is stored uncompressed.
9. MJPEG compressor: Motion JPEG (M-JPEG or MJPEG) is a video compression format in
which each video frame or interlaced field of a digital video sequence is compressed sep-
arately as a JPEG image.
108 / 251
Archive mode
10. Cinepak codec by Radius: primary lossy video codec of early versions of QuickTime and
Microsoft Video for Windows. Video compressed with Cinepak is generally still playable in
most media players.
11. Source format: Original data format, only playable with the SeeTec Cayuga Viewer.
12. Activate Select audio to export the audio stream with the video stream.
13. Click Export. All options defined in the archive mode (e.g. tracking, privacy masks, and pos-
itions of virtual PTZ cameras) are exported.
4. Activate Limit time frame rate and chenge the number of frames per second that will be
exported as separate images.
5. Activate Export only i-frames to limit the number of the exported images to the keyframes.
6. Click Export.
109 / 251
Archive mode
n On a system without a SeeTec installation, the data can be evaluated using the SeeTec
OfflineViewer. The setup file for the SeeTec OfflineViewe is installed in the export folder
during export. The OfflineViewer manual is installed in the manual folder during installation.
The OfflineViewer also displays number plate recognition and ATM data if this type of data
has been exported.
n To integrate the data within a SeeTec installation, an "archive camera" must be created in
the configuration mode. (See Creating a new camera - p.132.)
110 / 251
Archive mode
111 / 251
Archive mode
Editing an area
1. Click the camera icon next to the jog dial. If one camera is played or multiple cameras are
played synchronously, the current time of the archive is displayed next to the playhead (20). If
multiple cameras are played asynchronously, the current time of the archive is not displayed.
2. To specify an area on the timeline, click the Set markers icon.
3. Move the period under the area.
4. Click the Set markers icon again to specify the area.
5. Click the Delete area icon to remove the area from the timeline.
6. Click the Export area icon to export the area.
7. Select the required data format (Type), and then click OK.
The following export formats are available:
n SeeTec data format: The exported data are password-protected and can only be
viewed with the viewer.
n AVI: The exported data are not password-protected and can be viewed with any film
software. This represents a high data protection risk.
8. Specify the required export settings (see Multiple export of image data - p.72).
112 / 251
Archive mode
113 / 251
Archive mode
Adding a bookmark
114 / 251
Archive mode
Bookmark overview
115 / 251
Archive mode
iSearch
ISearch helps you search for events in part of an image.
iSearch in archive mode 116
iSearch in surveillance mode 116
Creating a search area 116
Deleting a search area 117
Configuring a search 117
iSearch in expert mode 118
Keypad
116 / 251
Archive mode
n Rectangle
n Circle/ellipse
n Polygon
4. Click the camera image, and then drag the shape to the desired position.
A semi-transparent area is laid over the image in the selected position.
5. If you selected the polygon for this purpose, click a point in the image for each corner and
close the polygon by double-clicking the last point.
Configuring a search
1. Define the search area (see Creating a search area - p.116), or mark the start and end of the
search area using the Set start/end marker icon (3).
2. Click the Set start/end marker icon again to clear the search area.
3. To define the area more precisely, you can use the "Keypad" (1) or enlarge or shrink the dis-
play of the desired area or update the timeline (2).
4. Select either Any kind of motion within the selected area or only A single event, depending
on what you want to take into account.
5. Any kind of motion: This search method searches for all changes to what the image con-
tains in the specified period. This can be done for the whole image or for parts of the image
specified by the user. The search may take some time depending on the selection.
6. A single event: This search method is particularly quick. It is possible to search through sev-
eral days of image material in a few seconds. However, this method only works if a single,
lasting event has occurred in the camera's selected field.
7. Select iSearch in expert mode, if appropriate, to carry out fine tuning.
8. Start the search.
9. Use the jog dial to move around in the recorded period.
The further you turn the jog dial to the right or left, the faster the sequence is played forward or
backward.
117 / 251
Archive mode
In expert mode, any motion in the sections outside the marked sections is also highlighted if
motion is detected inside the marked sections. The fine adjustments in Expert mode can be used
to adjust iSearch optimally to the environment shown in the camera images.
1. Enter the Dead time in seconds to specify how much time has to elapse after motion detec-
tion in the image or part of the image before another hit is displayed in the result list.
2. Specify the Pixel threshold for detecting changes in the image when the camera is operating
in extreme light conditions.
A change in the image is interpreted as motion if it exceeds the threshold. The higher the
threshold, the greater the change in the image has to be before it is considered to be motion.
3. Specify the Maximum number of frames per second if not all of the recorded frames have
to be searched. This can speed up the search significantly.
4. Specify the Maximum pixel limit for interval search. The maximum pixel limit for an inter-
val search only has an impact on searches for a lasting change. The specified start and end
points of the period in which the search is to be carried out are compared continuously. If the
two points currently diverge by more than the specified pixel limit, interval bisection is inter-
rupted, and a serial search with greater increments is started until the pixel limit is adhered to
again. The interval search is then resumed from this point.
This setting improves the search under extreme lighting conditions (strong contrast between
light and dark areas or objects passing).
5. Select Show help dialog after single search, if appropriate.
On completion of the search, you can specify in a dialog whether or not the event has been
found and whether you want to switch to archive mode with the event found.
6. To search for any movement within the entire image frame, activate Show movement in the
entire image. The search will return results if a movement takes place in the entire image
area.
7. To exit expert mode, click Normal mode.
118 / 251
8
Report mode
Report mode gives you an overview of the events that have occurred in the form of a list. Distinc-
tions are drawn between:
n user events (display of events that concern specific users)
n alarm events (events that have occurred)
n camera usage (display of events that a specific camera)
n system messages (display of events that concern specific services)
In addition, the camera usage of users can be tracked.
The maximum number of events to be displayed can be specified in the client con-
figuration (see Client configuration - p.55).
1. To switch to report mode, click the Report mode icon on the mode bar.
2. Click a column header in the main window to sort the events in ascending or ascending order
on the basis of the column's category (data/time, alarm, description).
119 / 251
Report mode
120 / 251
Report mode
121 / 251
Report mode
Saving a query
Additionally, the search criteria can be saved for future queries.
1. Click Save.
2. Enter the Report template name.
3. Optionally, select Save timestamp relative to current time. This option will use the time
interval of the current query for the next query.
Example1
1The current query searches for events within the last 24 hours. When the query is saved with a
relative time stamp, the next query will also search within the last 24 hours - relative to the next
query.
122 / 251
9
Configuration mode
You need adequate administrator rights for configuration mode.
In configuration mode you make all of the settings for the hardware, network, company, maps,
alarms and users.
To change to configuration mode, click the Configuration mode icon.
Additional settings
n See Company - p.128 for further settings for the company.
n See Administration - p.130 for further settings for maps, other hardware, user man-
agement, etc.
123 / 251
Configuration mode
1. Select the DeviceManager for which the problems occurred and click Start query. All failed
exports are listed with additional information such as the state of the export, the location, the
camera and the date of the image.
2. Select the failed exports and select Export again or Remove from list to either reattempt
the export or exclude it from further automatic export.
3. Click Apply and close the window.
124 / 251
Configuration mode
Creating a camera
The wizard helps you to easily create a new camera. The settings correspond to the steps you
have to take in the Cameras control (see Creating a new camera - p.132).
The wizard cannot be used for creating a camera using generic drivers. The generic
driver only receives the standard image stream from the camera.
Creating an alarm
1. Specify the name of the alarm, and then click Wizard to start installation.
2. Select the events that are result in the alarm, and then click Next.
3. Select the camera to be used as the alarm camera.
4. Specify the recording time of the alarm camera (in seconds).
5. Indicate whether you want a pre-alarm duration to be activated, and then set the duration (in
seconds), if applicable.
6. Click Next.
7. Specify which users are to be notified in the event of an alarm and whether the selected users
are to be notified by means of a message window.
8. Click Next.
9. Check the settings you have made, and then click Finish.
The alarm configuration is displayed. You can make further settings here.
Find cameras
By using the IP address assigned uniquely to a camera (device), the software is able to generate
an overview of all devices currently present in the network. By this, finding and configuring the
camera is improved.
Searching for devices 126
Adding individual devices 126
Adding multiple devices 127
125 / 251
Configuration mode
2. Click on the arrow triangle (1) to start a new scanning through the network.
3. To display additional network options, click on the circle icon (2). The IP Finder currently sup-
ports Onvif, UPnP, and Bonjour (available if installed on the system) protocols.
4. Deselect the protocol not installed.
5. Specify the timeout (in Seconds) for the protocols. This defines the time each protocol
"listens" for new devices. After the timeout, the search has to be triggered manually.
6. Click on the search filter icon (3) to toggle the display between all or only unknown devices.
Installed devices are hidden or shown.
7. Enter one of the following search items in the search field:
n IP address or
n manufacturer or
n device type or
n name
8. Click on the IP address of a camera to open the configuration page supplied by the camera
software.
126 / 251
Configuration mode
127 / 251
Configuration mode
Company
This control allows you to configure your company's branches and the hardware used at each loc-
ation. When the program is installed, one "Company" branch is set as the starting point. You can
specify the name of the branch and assign additional branches to it. The headquarter can have
sub-branches, but branches cannot have sub-branches.
128 / 251
Configuration mode
1. To delete a branch or group, select the branch or group and click the Delete icon (5).
2. Click OK to confirm.
The branch or group is deleted.
129 / 251
Configuration mode
Administration
The Administration control contains all configuration settings. The Administration control allows
you to assign hardware (e.g. cameras), actions and the authorization manager to the specified
Administration and manage new objects such as alarm scenarios, for example.
It is recommended to obtain a basic understanding of the concept of the underlying
rights management before configuring the system.
Functions
Depending on the hardware and network architecture, you can configure the following functions:
n Cameras. This function allows you to configure and manage the camera hardware and the
associated video server.
n Other hardware. This function allows you to configure and manage additional devices.
n Users. This function allows you to configure and manage the users.
n Groups. This function allows you to configure and manage the user groups.
n Profiles. This function allows you to configure and manage the user and group profiles.
n Time management. This function allows you to configure and manage the time templates
to coordinate the standard image recording of individual or multiple cameras as well as
validity in alarm scenarios.
n Alarms. This function allows you to configure and manage the alarm scenarios.
n Layers. This function allows you to configure and manage the layers of the main window in
surveillance mode.
n Maps. This function allows you to configure and manage the maps of the site or building
under surveillance, including the location of the surveillance hardware.
n Buttons. This function allows you to configure and manage the sequences of actions that
can be triggered in the controller in surveillance mode.
n Web pages. This function allows you to embed web pages in the layer.
n Patrols. This function allows you to configure and manage multiple cameras, set positions,
maps and layers one after the other for a user-definable time.
n Sequences. This function allows you to configure and manage the sequences of actions in
which multiple set positions are approached one after the other and/or actions are triggered.
n Video walls. This function allows you to configure the arrangement of video wall screens.
You can drag and drop camera images, layers, maps and web pages to display them on
video walls (see Other hardware for information on how to configure the screens).
n License plate groups. This function allows you to configure and manage the number plate
recognition function of the LPR module.
n Server. This function allows you to configure the device services.
n System. This function allows you to configure and manage system-wide settings for the
network, automatic backups, communication settings and event management settings.
Editing menu
130 / 251
Configuration mode
Concept
Schematic diagram of rights and profiles
For a better understanding of the administrative rights, the following texts provide a look at the
concept.
131 / 251
Configuration mode
Multi-level administration
The video management system has multi-level administration, which allows a user to be assigned
administration rights to only a part of the installation or some of the functions. For a general
description of administrative and user rights, refer to Administrative rights and user rights -
p.131. For defining user group rights, see Managing user group rights - p.162, for defining spe-
cific user rights, see Managing user rights - p.159.
The system allows subdivision of the administrative rights levels and division into a control center
and as many branches as required. The branches are defined as logical subunits with their own
configuration context and cannot be nested.
n Users or other entities such as user groups, maps, Device Manager servers or cameras
that belong to a branch are restricted to their associations only, so that users only
receive access to video data and the configuration of the associated branches.
n Users or other entities such as user groups, maps, device managers or cameras that
belong to the control center are also able to interact with branches. Users or user groups
that belong to the control center are explicitly assigned administration rights for the applic-
able branches.
The video management system prohibits simultaneous configuration of a branch by two or more
users, but it does allow simultaneous configuration of different branches by different users.
Profiles
Each user group automatically is assigned to a profile which is defined in the Profile function.
Users within a group inherit the group's profile, but may have additional profiles depending on the
groups they belong to or profiles that have been assigned to the individual user. When a user logs
in using a user name, he or she is assigned the appropriate profile. The administrator can enable or
disable profiles for users and user groups.
Cameras
The Camera function on the control bar allows you to configure and manage the video hardware.
Creating a new camera 132
Selecting and deselecting multiple cameras at once 134
Configuring multiple cameras 134
Configuring a camera 135
Duplicating a camera 143
Deleting a camera 143
Converting a camera 143
132 / 251
Configuration mode
4. In the Create camera window, enter the name for the new camera.
If you want to configure the new camera using the configuration wizard, select Wizard .
The wizard cannot be used for creating a camera using generic drivers. The generic
driver only receives the standard image stream from the camera.
5. Select the manufacturer and type of the camera.
n Generic video driver: The generic video driver can be used to integrate cameras that
are not integrated into the SeeTec software. The functions are restricted to displaying
and recording the camera image. The video parameters, e.g. the resolution and the
frame rate, must be configured on the camera directly. SeeTec does not accept liability
for correct operation of cameras that are integrated by the generic video driver.
n Generic camera driver (vendor specific, see the PDF "SeeTec_Cayuga_Generic_
Drivers.pdf", only available in English): The generic camera driver obtains the sup-
ported features directly from the camera. SeeTec provides generic camera drivers for
Axis, Hikvision, Samsung, and Sony. All models available at the time of the current
133 / 251
Configuration mode
134 / 251
Configuration mode
5. Click Multi Configuration. The camera configuration view is displayed. Unavailable options
are greyed out.
When configuring multiple cameras at once, only those settings can be changed that apply to
all cameras.
6. Activate or deactivate the required settings. For setting details, see Configuring a camera -
p.135.
Configuring a camera
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the camera in the overview.
The settings of the camera are displayed in the main window.
3. Network cameras consist of at least one camera unit and a video server unit (Encoder). That
is why the video server and one or more cameras are displayed under Hardware. Accord-
ingly, the settings of a network camera are always subdivided into video server settings and
camera settings. The video server settings include all of the connection-specific parameters,
while the camera settings include all of the image quality and image storage settings.
Encoder/camera
General
1. Activate or deactivate the camera.
2. Enter the name of the network camera.
3. Select the protocol type (http or https), and then change the port number, if necessary.
4. To test the incoming camera signal, click the Browser button.
The browser defined in the system settings ("standard browser") starts up, and the camera
image is displayed in the browser window.
5. The application programming interface (API) is identified automatically. If the API version can-
not be retained, ask SeeTec Support for the correct assignment of the API version to the cam-
era firmware.
6. If necessary, change the server for managing the devices (DeviceManager Server).
7. Specify whether separate authentication is to be required for the camera and, if necessary,
enter a user name and password.
8. Select Virtual cameras to display and save multiple image details from a camera as a sep-
arate camera. The image details can then be specified in the virtual cameras.
This function is only available for specific camera models.
After activation of the virtual camera function, multiple virtual cameras are automatically cre-
ated. The number of virtual cameras depends on the camera model. They are configured sim-
ilarly to a standard camera.
Digital inputs
1. Select the digital inputs and specify unique names for Name for CLOSED and Name for
OPEN.
2. Specify the interval for the dead time (in seconds) after which a signal is analyzed again.
That prevents the event database from becoming unnecessarily large when there are events
in rapid succession. This setting may also be used to trigger an alarm (see Alarms).
3. Apply the set values if you want to make further settings.
4. Save the set values to apply the values and conclude input.
5. Digital outputs
6. Select the digital outputs and specify unique names for Name for CLOSED and Name for
OPEN.
135 / 251
Configuration mode
7. Specify the hold time for the time (in seconds) within which an output is opened or closed (0
= infinite).
Camera
General
1. Activate or deactivate the camera.
2. If necessary, alter the name of the camera.
3. If necessary, change the camera ID and adapt the ID of the associated camera to the hard-
ware. The camera ID is only required for some camera controllers.
4. Select the camera type.
5. Camera: The camera is used with or without the PTZ control functions, depending on the cam-
era type.
6. External PTZ: If the camera does not have its own PTZ control unit, you can divert the con-
trol signals of an encoder to another camera with a connected PTZ control unit. A separate
RS-485 port of the encoder is required for each diversion.
7. To change the camera type, click Open Converter (see Converting a camera).
8. Specify whether a titleis to be displayed in the camera image, and enter the title.
9. Select whether the date and time are to be displayed in the camera image.
10. If the camera was not mounted upright, you can use the Rotate image function.
You can rotate the image in 90° steps (90°, 180°, 270°).
This function is only available for specific camera models.
11. Select Display buffer and specify the required size (0-1000 ms).
If you use the display buffer, the images from the camera are buffered on the SeeTec client
before they are displayed. This normalizes fluctuations in the live display in terms of the inter-
vals between different images. These occur, above all, with cameras that have a low-band-
width connection.
PTZ cameras should not get a display buffer, since the delay in the display of images affects
manual control.
12. Select Control camera if you are configuring a PTZ camera or a control unit in order to give
the user the option of controlling the camera in surveillance mode.
13. Specify the PTZ sensitivity of the camera control.
14. Select the camera position to give the user the option of defining and using the preset cam-
era positions in surveillance mode.
15. Select Invert PTZ control to correctly control cameras that are mounted upside down.
16. Select Pan/tilt mode.
n Continuous control: During continuous control a graphic with cross hairs is shown.
The further from the center point the user clicks the faster the camera moves in that dir-
ection.
n Absolute control: In absolute control three scroll bars are shown, two of which are for
positioning the camera (vertical and horizontal) and one for adjusting the zoom. The
zoom can also be adjusted with the + and -. keys The further from the center point of
the scroll bars the user clicks the faster the camera moves in that direction.
17. If the camera has a wide-angle lens (fisheye lens), select the manufacturer of the lens and its
parameters.
18. If available at the camera, select the dewarping mode and set the alignment of the
camera.
The dewarping mode determines the extent to which the distortion of the image produced by
the fisheye lens is rectified.
19. Make a selection for Action in the case of inactivity to specify which action is to be per-
formed if the camera is inactive.
The selected action is displayed.
20. Specify for Timeout the time after which the action is to be performed if the camera is inact-
ive (in seconds).
136 / 251
Configuration mode
21. Make entries for Action at start of video stream and Action when the video stream
stops.
The selected actions are displayed.
22. The action at the start of the video stream is triggered if a user has the camera in sur-
veillance mode in the foreground, i.e. is viewing the current live image of that camera.
23. The action when the video stream stops is triggered if the current camera is closed or a dif-
ferent layer is moved to the foreground.
24. Make a selection for Action in the case of inactivity to specify what is to happen if the cam-
era is inactive.
The selected action is displayed.
Image storage - Multimedia database
Images are stored according to the so called "ring buffer" queue. For a brief overview, see the fol-
lowing illustration:
Overview1
All of the image storage settings (e.g. the size of a camera's storage area on the hard disk) are con-
figured here. To prevent sensitive image data from being overwritten, standard and alarm record-
ings are configured separately.
1. Select Multimedia database from the Image storage menu.
2. Select whether the image recording has a priority: the oldest recordings will be overwritten at
the latest when not enough storage is allocated or the recording interval is too long.
3. Select whether standard recordings are to be carried out with this camera.
4. Select the recording period.
You specify the exact period using a time template that you create in the Time Manager. By
default, continuous recording is started ("Always").
5. Select the time limit and enter the maximum storage duration.
If the time limit is exceeded, some of the oldest recordings will be deleted to free memory.
6. You can specify a condition for starting image recording.
7. Select whether alarm recordings are to be carried out with this camera.
When the storage capacity reaches 89%, a message is triggered via SNMP, email or as message
in the client.
As soon as the storage capacity reaches 90%, the ring buffer system starts deleting the image
data. The image data of the prioritized cameras are the last to be deleted.
If a camera is deactivated, the ring buffer stops for the image data of the deactivated camera.
137 / 251
Configuration mode
8. Select the time limit and enter the maximum storage duration.
If the time limit is exceeded, some of the oldest recordings will be deleted to free memory.
9. Specify a pre-alarm duration (up to a maximum of 3600 seconds) to record a period before
the alarm is triggered. The data recorded in the buffer memory is transferred to the alarm track
when manual recording is started.
10. Specify a maximum post-alarm duration for manual alarm recording to record a period after
the alarm is triggered.
If manual alarm recording is not stopped, the recording will stop automatically at the end of the
specified post-alarm duration.
11. Activate automatic reduction of the frame rate of standard recordings or alarm recordings after
a specified period (data-aging standard recording or data-aging alarm recording).
On expiration of the specified period, the frame rate of the stored recordings is reduced to
save memory (data aging).
Example 1
12. Specify the time limit after which the recordings are to be compressed and released from the
audio track.
13. Specify the frame rate (in fps) at which the recordings are to be stored after the time limit is
exceeded. This reduces the image data to the set frame rate.
14. Motion JPEG recordings will be reduced to the defined frame rate
15. MPEG4 / H.264 recordings will be reduced to i-frames (the p-frames will be deleted)
16. Specify the time and date for the oldest full frame in the buffer. As soon as this limit is
reached, a system message will be displayed.
Image storage - Edge storage
The menu item Edge storage is only displayed if supported by the selected camera.
1You record 20 images a second with an I-frame interval of a second. Data aging reduces the
frame rate to one image a second, because all P-frames are deleted.
Tracking data and audio recordings are always deleted.
138 / 251
Configuration mode
devices or virtual cameras, a change to the capture mode applies to all devices under this
video server. Hence the capture mode can only be defined for the base stream (displayed with
a home icon), but affects all subsequent streams of the selected camera.
Depending on the setting selected, the camera provides different frame rates and resolutions.
The camera may restart and then be inaccessible for a few minutes.
4. Select the type of the video stream.
The following video streams are available, depending on the hardware:
n Motion JPEG (M-JPEG)
n MPEG-4/H.264 (required for audio)
n MxPEG
n RTSP
5. The selected video codec is displayed.
The screen saver and screen lock of the client computer must be disabled for dis-
play on the client.
6. Select the transmission mode.
n RTP over UDP Unicast (default setting): Communication between the SeeTec server
and camera is via TCP port 554 (RTSP port). Image transmission from the camera to
the SeeTec server is via a negotiated UDP port.
n RTP over UDP Multicast: Communication between the SeeTec server and camera is
via TCP port 554 (RTSP port). Image transmission is via a multicast address provided
by the camera. RTP over UDP Multicast should only be used if third-party systems
(e.g. Barco or eyevis) and the SeeTec server access the camera simultaneously.
n RTP over RTSP over TCP: Communication between the SeeTec server and camera
and image transmission is via TCP port 554 (RTSP port). This setting is recommended
where there is a poor network connection between SeeTec servers and camera. The
disadvantage of this transmission method is the possibility of latency times, because
corrupt data must be transmitted again.
n RTP over RTSP over HTTP Unicast: Communication and image transmission is via a
HTTP tunnel (port 80 TCP). This setting is recommended where there is a poor net-
work connection between SeeTec servers and camera. The disadvantage of this trans-
mission method is the possibility of latency times, because corrupt data must be
transmitted again.
7. Select the transmission of audio signals.
This function is available only if the camera can process audio signals. Selection of the cam-
era is necessary only for multi-channel devices.
8. Specify the Frame rate (fps) and Quality (compression) separately for standard and alarm
recording.
When there are differences in the settings for standard and alarm recording in MPEG-4/H.264
streaming, it can take several seconds to switch from standard to alarm recording. The length
of time taken depends on the camera. There may be no recording available during this period.
9. Select a suitable resolution for the camera image.
10. Select the required video classification (refer to Configuring the video classification -
p.184).
11. Select multicast streaming to display one video stream simultaneously on multiple clients.
Multicast should only be used if there is low bandwidth between the Device Manager and cli-
ents.
Multicast-capable network hardware is required for multicast streaming.
12. Enter the network address and port number of the multicast server.
13. Specify the validity period (TTL) after which the client has to log in to the multicast server
again.A short TTL results in a higher network load.
139 / 251
Configuration mode
Audio
If the camera supports transmission of audio signals, the audio codec can be configured.
However, the adjustments in the camera control in surveillance mode override the camera set-
tings. To use the transmission of audio signals, the transmission has to be activated in the video
stream settings.
1. Select the MPEG-4/H.264 mode for video streams in the video stream settings.
2. Select the associated camera.
3. Select the correspondingaudio codec.
Video gateway
1. Select Gateway, and then specify the port number if intelligent image analysis is to be carried
out by a via:sys box from viasys | Intelligent Video GmbH.
Camera positions
If the selected camera does not support PTZ, this menu item changes to "Digital Pre-
sets". All camera positions will be defined using the digital zoom
Camera positions can be created and deleted as "presets" by the user in surveillance mode and by
the administrator in configuration mode.
Admin presets are created and managed by the administrator.
1. Use the PTZ controller or an external controller device to move the camera to the required pos-
ition.
2. Click New.
3. Enter the name of the new preset position, and then click OK.
The name is displayed in the column, and the preset position is assigned the next free pos-
ition number.
If there are not enough position numbers, the additional positions are added in a drop-down
list.
4. To remove a preset position, select the name from the list and click the Delete button.
Image data export
1. Specify whether standard recordings and alarm recordings are to be exported automatically.
The time and path for the export are specified in the Device Manager configuration
(see Configuring the Device Manager (DM) - p.181).
2. Specify the time period to be exported.
You specify the exact period using a time template that you create in the Time Manager.
3. Specify whether the camera nameandtime of recording are also to be exported and dis-
played in the AV export.
The camera name and time are specified in the exported sequence at the bottom of the image.
AV export is used for exporting alarm scenarios.
4. Select the maximum resolution for the export.
5. Specify whether the length of the recording is to be limited.
6. Enter the maximum duration of the export (in seconds).
7. Select Reduce frame rate separately for the video settings and single-image sequences in
order not to export all of the images of the recordings of alarm scenarios.
8. Specify the maximum frame rate (in fps).
9. Select Create ZIP file to compress the exported data after export.
Server side operation
The server side motion detection of the server detects motion within the image detail and, if neces-
sary, triggers an alarm scenario. The motion detection feature only delivers usable results indoors.
The Video Analysis module has to be installed and configured prior to configuring the
140 / 251
Configuration mode
server side operation (see Adding server-based motion detection module - p.212).
141 / 251
Configuration mode
142 / 251
Configuration mode
2. To delete all masks in the archive, click Delete history and then Yes to confirm.
If privacy masks with archived recordings are deleted, only users with the appro-
priate permissions are able to see the recordings.
Record on motion
1. Make a selection in the drop-down list to specify whether alarm recording is to be triggered in
the event of motion detection.
If applicable, the camera control then automatically follows the recorded object.
n No: If motion detection is not activated, the camera-specific record on motion function
is activated (if available).
n Yes: If motion detection is activated either by using the server settings or the camera
settings, the function will be used and the camera-specific setting takes priority.
Duplicating a camera
Duplicating a camera enables camera settings to be applied to a large number of identical cam-
eras to save time.
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the camera in the overview.
3. Click the Duplicate object icon, and specify the number of copies.
4. Enter the name of the duplicated camera.
The names of the cameras are also assigned a number, which is automatically incremented.
The name can also be changed after it has been set (see Configuring a camera - p.135)
5. Enter the IP address of the first copied camera in the address range.
The IP addresses are automatically incremented based on the number of copies.
6. Select the DeviceManager.
7. Activate the properties that are to be transferred to the copied cameras.
8. Click OK to accept the name.
The new camera is displayed in the overview.
Deleting a camera
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the camera in the overview.
3. Click the Delete object icon.
Converting a camera
An installed camera can be converted into a new camera by transferring the camera configuration
and recordings (driver conversion). Alarms, patrols and other settings are inherited by the new
camera. This conversion can be used to install a new camera to replace a defective one.
Camera using the generic driver are not fully supported and may only be converted par-
tially.
143 / 251
Configuration mode
2. Select the manufacturer and the camera type of the new camera.
3. Enter user name and password, if required.
4. Click Verify conversion. A list of possible conversion issues is displayed.
5. After resolving the issues, click Apply to start the conversion process.
Other hardware
The Other hardware function in the Administration control allows you to configure and manage
additional devices. Additional devices include items such as network interfaces, video walls,
alarm systems and I/O modules. The devices can be partly administered and actuated with the
SeeTec software and also with software from third-party manufacturers.
144 / 251
Configuration mode
Configuring hardware
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the hardware in the Other hardware overview.
3. Edit the settings for the hardware.
n SeeTec
n SeeTec Verticals
n SeeTec Video Analytics
n Advantech
n Wago
n Third-party Interface
Deleting hardware
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the hardware in the Other hardware overview.
3. Click the Delete object icon.
Duplicating hardware
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the hardware in the Other hardware overview.
3. Click the Duplicate object icon, and then enter the name for the duplicated hardware.
4. Click OK to accept the name.
The new hardware is displayed in the overview.
SeeTec
Other hardware from SeeTec includes the configuration of
n Network input and output
n Display agent video wall
145 / 251
Configuration mode
n VoIP
For a description on how to configure, refer to the sections below.
1
10.0.8.9-23,10.0.8.7,192.*.*.*
Three restrictive masks have been defined:
Mask 10.0.8.9-23 allows all IP addresses in the range 10.0.8.9 to 10.0.8.23. Mask 10.0.8.7 allows
the individual IP address.
Mask 192.*.*.* allows the complete subnet 192.
146 / 251
Configuration mode
5. If the HTTP protocol is selected, enter the user name and password for accessing the hard-
ware.
6. Select the type of password encryption.
If ASCII is selected, only upper- and lower-case letters and numbers can be used, not special
characters. With HEX, all characters are permissible.
7. Enter the text to be displayed as soon as the hardware is accessed.
8. To delete outputs, select the outputs you want to delete, and then click the Delete outputs
marked for deletion button.
VoIP
The configuration sets suitable hardware (VoIP-capable devices such as Mobotix cameras and
door intercom systems).
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, change the SIP address of the computer on which the VoIP is installed.
4. Select the DeviceManager.
5. Select whether the function key is to trigger a DTMF sequence or a SeeTec button.
6. If necessary, specify the DTMF sequence, which can be found in the manual supplied by the
device manufacturer, or select a SeeTec button:
To configure the buttons, see Configuring a button - p.173.
7. Specify the DTMF sequences for the start and end of the call.
Voice over IP recording
1. Activate Standard VoIP recording, select the recording period, and enter the size of the
recording to limit the available storage space.
2. Activate Additional time limit, and enter the maximum number of days and hours for the
total recording time.
3. Activate Alarm VoIP recording to set the storage space for the alarm recordings.
4. Activate Additional time limit, and enter the maximum number of days and hours for the
total recording time.
5. Apply the set values if you want to make further settings.
6. Save the set values to apply the values and conclude input.
147 / 251
Configuration mode
For performance reasons, the video analysis module should be installed on a dedicated
server (see User-defined installation).
148 / 251
Configuration mode
This setting is only applicable for the coming event and is used to check the para-
meters. It is applicable for only one event and is disabled after export.
12. Enter the time between identical license plates for continuous recognition.
This specifies how long the same license plate must be viewed.
Example2
13. Specify the number of images within which the license plate must be clearly recognized in the
Number of required frames box.
14. Click the Create new list button to save one or more license plate lists.
Select a list and assign a license plate group to it to be able to analyze it.
List configuration
1. Select a list.
2. Activate the list and, if necessary, alter the name.
3. Select the license plate groups that are to be analyzed.
In the associated alarm scenario the user can specify, for example, that an alarm is triggered
by a license plate from list 1 and that a barrier is automatically opened for a license plate from
list 2.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.
SeeTec Analytics
The SeeTec server must send the camera images to the SeeTec Analytics module for intelligent
video analysis. Based on the analysis, alarms can be triggered. The SeeTec solution offers dif-
ferent SeeTec Analytics packages:
149 / 251
Configuration mode
150 / 251
Configuration mode
1If a person is selected, place the head icon (red) at the highest point of the body's image and the
foot icon at the lowest point of the body.
151 / 251
Configuration mode
15. Activate Automatically acquire new angles of view to store the new position of the camera
automatically as a new scene. An alarm scenario can also be optionally started if the camera
was rotated.
16. Activate Force new angles of view to prevent circumstances in which the video data cannot
be analyzed because the current scene does not correspond to the acquired scene. Unlike the
"Automatically acquire new angles of view" option, you cannot start an alarm scenario by
activating the Force new angles of view option.
17. Activate Export single images in the event of an alarm to save the images on which a
motion or change is recognized separately as JPEG.
18. Specify the time period after which the exported images will be deleted. If you enter "0" as the
time period the images will not be deleted.
19. Optionally enter the generic parameters that are to be taken into account in the analysis of the
images.
See Technical Guide or ask SeeTec support about the use of generic parameters.
20. Click the Add new rule button and enter a unique name for the rule.
21. Select the rule type. The following rules are available:
n Tripwire: As soon as the tripwire is exceeded in one or both directions, an alarm can be
triggered.
n AOI: Area of interest. An area in the camera image that can trigger an alarm.
n Scene change: All changes in the visual field of the camera are detected if the camera
image changes significantly.
A rule is not automatically activated after it has been created. Activate the rule during
configuration of the rule (see below). Additional starting events can also be set for every
rule.
Tripwire
1. Activate the module and, if necessary, alter the name.
2. Activate Classification of target to assign the recognized object types.
Multiple objects can be selected.
3. Click the Tripwire button to create a tripwire and record virtual tripwires in the camera image.
4. Click the MultiSegment TW button to create multi-segment tripwires.
Multi-segment tripwires can be created at an angle.
5. Draw the virtual tripwires in the camera image.
Generate the corners of the tripwire by clicking on the camera image and then drawing them.
6. If you have created a multi-segment tripwire, close it with a double-click.
7. Select the parameters for the directions from which the object is to be recognized.
8. Select the filter for the minimum size and the filter for the maximum size to specify the
size of the object that is to be recognized.
9. Activate the filters with which the object is to be displayed.
The color highlighting makes it easier to recognize the sizes of target objects in the foreground
or background during configuration.
10. Select the additional filters:
n Salience: Moving objects ignored, e.g. reflections, falling leaves or water motions.
n Maximum size change (%): Fast-changing objects are filtered, e.g. shadows.
Example 1
11. Click the Delete this rule button to delete the currently displayed rule.
12. Click the Reset counter button to reset the object counter.
This function is only available if the SeeTec Counting Suite is configured.
1A shadow has a size of 100% in the first image, the size change is set to 50%.
If the shadow becomes larger, it is ignored until the size change exceeds 150%.
If the shadow becomes smaller, it is ignored until the size change falls below 50%.
152 / 251
Configuration mode
Example1
15. Click Delete this rule to delete the currently displayed rule.
16. Click the Reset counter button to reset the object counter.
This function is only available if the SeeTec Counting Suite is configured.
17. Apply the set values if you want to make further settings.
18. Save the set values to apply the values and conclude input.
1A shadow has a size of 100% in the first image, the size change is set to 50%. If the shadow
becomes larger, it is ignored until the size change exceeds 150%. If the shadow becomes smaller,
it is ignored until the size change falls below 50%.
153 / 251
Configuration mode
Scene change
1. Activate the module and, if necessary, alter the name.
2. Select the scene change that is to trigger an event. All changes in the visual field of the cam-
era are detected if the camera image changes significantly.
n Any change: Combination of available options of the selection.
n Lighting on: Change from dark to light
n Lighting off: Change from light to dark
n Lighting on or off: Change from light to dark or dark to light
n Unknown process: Unclassifiable change
n Camera movement: Camera is rotated
3. Apply the set values if you want to make further settings.
4. Save the set values to apply the values and conclude input.
Area of Interest X X X
Object Clas- X X X
sification
Tripwire X X X
(also non-linear)
Multi-segment X X
tripwire
Entering X X
Exiting X X
Appearing X X
Disappearing X X
Loiterers X
Left behind X
Taken away X
Advantech
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, change the IP address or the name of the host.
154 / 251
Configuration mode
1. Activate the desired input and change the name for CLOSED.
2. Select the appropriate icon to display a graphic view of the current status of the input.
You set the icon to be displayed in the map in the field of the same name.
3. Change the name for OPEN.
4. Select the appropriate icon to display a graphic view of the current status of the input.
You set the icon to be displayed in the map in the field of the same name.
5. Specify the interval for the dead time (in seconds) after which a signal is analyzed again.
Outputs
The number of outputs depends on the device type.
1. Activate the desired output and change the name for CLOSE.
2. Change the name for OPEN.
3. Specify the hold time (s) for the period for which the output is open or closed (0 = infinite).
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.
Wago
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, change the IP address or the name of the host.
4. If necessary, select the appropriate API version.
5. Change the server for managing the devices (Device Manager server).
Inputs
1. Click the Add new input or Add 10 new inputs button to create one or ten new inputs.
2. Activate the desired input and change the name for CLOSED.
3. Select the appropriate icon to display a graphic view of the current status of the input.
You set the icon to be displayed in the map in the field of the same name.
4. Change the name for OPEN.
5. Select the appropriate icon to display a graphic view of the current status of the input.
You set the icon to be displayed in the map in the field of the same name.
6. Specify the interval for the dead time (in seconds) after which a signal is analyzed again.
7. To delete entries, mark the entries that you want to delete and click the Delete inputs
marked for deletion button.
Outputs
1. Click the Add new output or Add 10 new outputs button to create one or ten new outputs.
2. Activate the desired output and change the name for CLOSE.
3. Change the name for OPEN.
4. Specify the hold time (s) for the period for which the output is open or closed (0 = infinite).
5. To delete entries, mark the entries that you want to delete and click the Delete outputs
marked for deletion button.
6. Apply the set values if you want to make further settings.
7. Save the set values to apply the values and conclude input.
155 / 251
Configuration mode
Third-party interface
eyevis wall
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. Enter the eyevis supervisor IP address.
4. Specify the eyevis wall name.
5. Divide the available image area on the eyevis video wall into individual video wall modules by
means of Number of modules (X) and Number of modules (Y).
6. Enter the port at which the eyevis supervisor can be reached.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.
The corresponding module entries of the SPC alarm system (source ID) and the entries
of the SeeTecCayuga system (destination ID) must be identical.
Areas
1. Activate the area and enter the name for the arming and the name for the disarming.
If an event is triggered, the term specified is displayed instead of a number (e.g. "window
open" or "window closed").
The state of an area can be visualized in the map. The area is shown red (armed) or green
(unarmed) after 10-15 Seconds.
Rules
1. Click the Add new rule or Add 10 new rules button to create one or ten new rules.
2. Activate the desired rules and change the name.
3. Select the event that is to trigger an alarm message.
The alarm system distinguishes between the burglar alarm and panic alarm events. Specify
the type of alarm in the rule.
4. Enter the detector group to set the ID of the device that sends the alarm signal.
156 / 251
Configuration mode
Access control
The Access control function in the Administration control allows you to configure and manage third
party access control devices. These devices can be partly administered and actuated with the
Cayuga software and with software provided by the respective third-party manufacturers.
After the access controls have been configured, they can be connected to alarm scenarios (see
Alarms - p.166).
See technical guides or ask SeeTec support about the use of third party access control
plugins.
157 / 251
Configuration mode
Users
The User function in the Administration control allows you to create and delete user profiles. In
addition, you can configure the connection to an existing Active Directory® Authorization Man-
ager. The corresponding authorizations and profiles are assigned to the user, depending on
whether he or she is logged in under a user name or as a group.
For a general description of administrative and user rights, refer to Administrative rights and user
rights.
Creating a new user 158
Configuring a user 158
Deleting a user 160
Duplicating a user 161
Configuring a user
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Users in the Administration control
3. Select the user in the Users control.
General
1. Activate or deactivate the user.
The administrator cannot be deactivated.
158 / 251
Configuration mode
Password
1. Select User must use a secure password.
If the password does not meet the security requirements (see below), you receive a message
to this effect.
2. Select User may change own password to permit the user to change his or her password.
3. Select User must change password regularly and specify the validity period for the pass-
word.
Before the period expires, the user is requested to change the password in order to be able to
continue logging in.
4. Select Change user password, and enter a new user password.
If you have selected User must use a secure password, choose a password that con-
sists of at least eight characters and contains at least one digit, one upper-case let-
ter and one lower-case letter.
5. Enter the user password again.
6. To create a second password on the "four-eyes principle", select User needs two pass-
words and specify a further password, which must adhere to the same security rules.
7. Enter the second password again.
If you forget the administrator's password and haven't added any users to the admin-
istrator group (see Groups - p.161), it is no longer possible to access configuration
mode.
Rights options
1. Select Limit archive access and specify the duration of the access period (in minutes) in
order to limit the user's continuous access to the archive.
159 / 251
Configuration mode
n Camera PTZ: The user can use the PTZ camera except for preset camera positions.
n Camera lock: The user can lock the position of the PTZ camera.
n Use camera position: The user can use the set camera positions.
n Create camera positions: The user can create camera positions or delete positions
that have been defined.
n Export camera: The user can save image data in the SeeTec-specific format in
archive mode.
n Export camera (AVI): The user can save image data as an AVI file in archive mode.
n Privacy masking: The user can deactivate privacy masking.
n MPEG audio: The user can use audio transmission.
n Map: The user can use the corresponding map.
n Layer: The user can display defined layers.
n Button: The user can use buttons.
n Report mode: The user can view report mode.
n Server extensions: The user can use server extensions such as license plate recog-
nition.
n Count analysis: The user can use the count analysis from the View menu.
n Use license plate group: The user can use license plate groups.
n Change license plate group: The user can change license plate groups.
n Intrusion detection: The user can operate intrusion control areas.
n Create reference image: The user can create reference images for comparisons (see
Manual reference image comparison - p.74).
n Access Control: The user can use the access control.
n Access Control Data Editor: The user can use the Access control data editor from
the from the View menu.
Deleting a user
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Users in the Administration control
3. Select the user in the overview.
4. Click the Delete object icon.
160 / 251
Configuration mode
Duplicating a user
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Users in the Administration control.
3. Select the user in the overview.
4. Click the Duplicate object icon, and enter a name for the duplicated user.
5. Click OK to accept the name.
The new user is displayed in the overview.
Groups
The Groups function in the Administration control can be used to add users to groups and manage
the rights of groups. The corresponding authorizations and profiles are assigned to the user,
depending on whether he or she is logged in under a user name or as a group.
For a general description of administrative and user rights, refer to Administrative rights and user
rights.
Creating a new group 161
Configuring a group 162
Deleting a group 163
Duplicating a group 163
161 / 251
Configuration mode
Configuring a group
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the group in the overview.
General
1. Select or deselect the group.
2. If necessary, alter the name of the group.
3. Enter a description of the group.
4. Select a validity period for the group, within which a user belonging to the group can log in to
the system.
The possible periods are specified in the Time Manager.
5. Specify the validity status to activate or deactivate the group.
All users belonging to this group can thus be prevented from accessing certain cameras.
6. Assign the group colors in group lists. Different colors for different groups facilitate the
administration of user rights as each user inherits the rights and the colors of the group he or
she belongs to.
7. Select the users to be assigned to the group.
Rights options
1. Select Limit archive access, and specify the duration of the access period (in minutes) in
order to prevent the user from having continuous access to the archive.
2. Select Activate Active Directory support to apply the authorization settings of a connected
Active Directory server.
Using Windows® Active Directory®
1. Create a new group in Active Directory®.
2. In Active Directory®, add the domain users of the group who are to log in using the SeeTec
Active Directory® login.
3. In the SeeTec software, create a group that is analogous to the one in Active Directory®.
Be sure to use upper and lower case in exactly the same way.
4. Assign the SeeTec group in the SeeTec software the required authorizations, and select
Activate Active Directory support.
When the software starts up, the users can use the Active Directory® login button to log in to
the SeeTec system with their Active Directory® user name and password.
5. To automate Active Directory® login, enter the AutoADLogin command line parameter in the
link for the SeeTec surveillance software (see Command line parameters).
You don't have to create any users in the SeeTec software in order to log in using
Active Directory®. Rights are assigned by means of the data stored in the SeeTec
group.
162 / 251
Configuration mode
Deleting a group
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the group in the overview.
3. Click the Delete object icon.
Duplicating a group
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the group in the overview.
3. Click the Duplicate object icon, and enter the name for the duplicated group.
4. Click OK to accept the name.
The new group is displayed in the overview.
Profiles
The Profiles function in the Administration control allows you to assign general settings to a user
account or group that apply to the operation of the client.
Configuring a profile 163
Image settings 164
Video wall module mapping 165
Configuring a profile
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the profile in the overview.
3. Activate or deactivate the selected profile.
4. Select Confirm termination of the client to display a confirmation on termination of the cli-
ent.
5. Optionally, select Confirm termination of the client with user password to display a con-
firmation on termination that the user must confirm with his password.
163 / 251
Configuration mode
6. Select Log off user when inactive and specify the timeout (time in minutes) after which the
user is logged out of the system automatically if inactive.
7. Enter the PTZ priority counter between 1 and 1000 (the higher the number: the higher the pri-
ority) and specify the Timeout for PTZ priority actions in seconds If the user does not
activate any controls, the camera control is released again after the timeout.
8. Enter the Timeout for the PTZ lock actions in seconds. If the user does not activate any
controls, the camera control is locked after the timeout.
9. Select the layersthat can be displayed to the user or group (see Layers).
The layers are displayed immediately in surveillance mode when starting and cannot be
closed.
10. Select the patrols that the user or group can select (see Patrols).
For each user created and each user group, a profile is automatically created, via which the
live layer can be influenced in surveillance mode.
Image settings
The single image settings are used to specify how many images the client is to display per camera
in a second if the camera sends Motion JPEG images.
These settings only affect the view in the client if Motion JPEG is activated as streaming
mode in the camera configuration. They have no effect on the recordings.
1. Specify the frame rates of the displayed normal and selected video image and of the alarm
video image, and then select the display mode.
164 / 251
Configuration mode
1. Specify the frame rates and the streaming rate of the displayed normal and selected video
image and the alarm video image. If nothing is selected, the streaming will be adjusted auto-
matically.
Time manager
The Time manager function in the Administration control allows you to create time templates that
are similar to a schedule in order to coordinate the standard image recording of individual or mul-
tiple cameras as well as validity in alarm scenarios and user groups.
Creating a new time manager 165
Configuring a time manager 166
Deleting a time manager 166
Duplicating a time manager 166
1The main window is displayed as 0/0 in the video wall module. The alarm scenario specifies that
the alarm camera is to be displayed in the main window.
The image of the alarm camera is displayed in the 0/0 module on the video wall by video wall mod-
ule mapping.
165 / 251
Configuration mode
Alarms
The Alarms function on the Administration control allows you to configure and manage alarm
scenarios:
Creating a new alarm scenario 166
Creating an alarm scenario with the wizard 167
Configuring an alarm scenario 167
Deleting an alarm scenario 170
Duplicating an alarm scenario 170
166 / 251
Configuration mode
General
1. Select or deselect the alarm scenario.
2. If necessary, alter the name of the alarm.
3. Enter a description.
4. Use the slider to assign the alarm a priority.
The meaning of the priority level is displayed.
An alarm with low priority can be stopped immediately at the end of the alarm. All dynamically
opened components (layers, cameras and message windows) are closed again, and the pre-
vious layer is restored. Alarms with medium or high priority are not stopped until they have
been confirmed. This is configurable in the settings for low-priority alarms (see below).
5. Select the validity period for the alarm.
The possible periods are specified in the Time Manager.
6. Select the color in the alarm list.
7. Activate Only remove alarm when it is ended and confirmed to remove the alarm from
the list only when its status has been set to "confirmed" and the alarm has ended (see Alarm
list in surveillance mode).
8. Deactivate Automatically start new alarms on clients to prevent the alarm from starting
events. If deactivated, the user must start the assigned alarm events manually.
9. Select the settings for low-priority alarms.
10. Terminate alarm on clients when terminated on server: The alarm is terminated on all of
the clients involved and removed from the alarm list.
11. Start new alarm on clients if another low-priority alarm is active: A low-priority alarm dis-
places another active low-priority alarm. In other words, the current alarm is put aside, and the
new alarm is displayed.
167 / 251
Configuration mode
12. Do not close layers automatically at the end of the alarm: Prevents the layer from being
automatically closed at the end of the alarm.
Start
Depending on the camera model used, the following events can be used as triggers for an alarm
scenario:
n Tampering: The camera angle is changed or the camera lens is covered.
n Video signal lost: The connection between the analog camera and the video server is cut.
n Motion detection: Significant motion has been detected in a defined area of the camera
image.
n Digital I/O: An incoming digital signal triggers an alarm.
1. Choose the Edit button to select the events that trigger the alarm.
The hardware and event are displayed. You can select multiple objects.
The trigger must be created or activated before configuring the alarm scenario. One exception
to this is buttons, which can be defined later in the buttons control. A starting event can be, for
example, the receipt of a TCP signal from a camera when it detects motion. This is imple-
mented via the SeeTec network I/O.
2. Click Expert mode to specify the settings.
Expert mode
Expert mode can be used to create complex alarm scenarios. The alarm is triggered by different
conditions that are logically linked (AND).
1. Click Edit and select the conditions at the (digital) inputs that must be fulfilled to trigger an
alarm.
2. Set the period (in seconds) within which at least one of the following events from each group
occurs.
3. To add the events to the condition, click Edit and select the relevant objects.
End
1. Specify the maximum server alarm duration (in seconds) to specify how long the alarm is
to be recorded for.
2. Use the Select button to select the events that terminate the alarm earlier.
The hardware and event are displayed.
Visualization
There are two types of views which can also be combined:
n Alarm camera: The alarm camera is highlighted by a red frame in the various windows in
surveillance mode.
n Alarm views: The alarm records of the selected camera are displayed in the selected win-
dow in four tiles in a 2x2 view: pre-alarm, post-alarm, alarm image (still image) and live
image.
An alarm with low priority is stopped immediately at the end of the alarm, i.e. all dynamically
opened components (layers, cameras and message windows) are closed and the previous layer is
restored. Alarms with medium or high priority are not stopped until they have been confirmed.
1. Activate the cameras to be displayed in the various windows in surveillance mode.
The window mode is automatically set to the normal view.
168 / 251
Configuration mode
Cameras and layers and also alarm cameras should not be displayed in the same win-
dow, because this can result in unwanted events (superimposition).
Persons involved
1. Select the profiles of the users or groups allowed to see the alarm.
The alarm messages are only displayed to the selected profiles.
For the AlarmWatchDog function, the user defined in the system settings must be activated.
2. Enter a text for alarms with a medium or high priority level in the message window. This text is
displayed in the message window.
3. Select Play signal tone, and then select whether the signal tone is to be played when the
alarm is activated or triggered.
The alarm tone is in the file system in "<installation folder>/Client/Sound" or "<installation
folder>/Client64/Sound" and can be replaced with different *.wav files.
4. Select Run external program if a program is to be started at the same time as the alarm.
The selected program must be installed on the client computer.
5. Use the Select button to select which document is to be opened by the program.
6. Enter any parameters required by the program.
A document can be opened using the selected program, for example.
Server
1. Specify the pre-alarm duration for camera recordings (up to a maximum of 3600 seconds)
to record a period before the alarm is triggered in alarm recording.
2. Select Use separate frame rate (fps) for camera recordings, and enter the required frame
rate.
The frame rate can only be changed with M-JPEG.
3. Choose Edit, and then activate the actions at the start of an alarm.
The selected actions are displayed.
If the AlarmWatchDog function is required, select AlarmWatchDog alarm from the list
4. Choose Edit, and then activate the actions at the end of an alarm.
The selected actions are displayed.
169 / 251
Configuration mode
5. Single image sequence: the files are sent as image sequence (JPEG).
Note that the email attachments can exceed the permissible size of the email.
6. Select the cameras whose data is to be stored on an FTP server when there is a large volume
of data, and specify the data format.
The FTP server is defined in the SeeTec VA Administration Tool.
If there are problems contacting the FTP server at alarm end, e.g. the FTP server is
not available, the program retries sending the data to the FTP server once every
minute. After one hour the attempt is canceled and the data are discarded.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.
Layers
The Layers function in the Administration control allows you to adjust the work area to suit your
requirements in surveillance mode by dividing it into multiple tiles. This gives the user fixed
arrangements and contents of the work area. These layers can be assigned to a user or group pro-
file and are available after the program starts up.
Creating a new layer 170
Configuring a layer 171
Deleting a layer 171
Duplicating a layer 171
170 / 251
Configuration mode
5. To specify the number of tiles yourself, choose User-defined from the drop-down list.
6. Click OK to apply the setting.
The new layer is displayed in the overview.
7. If you have chosen User-defined, alter the number of rows and columns in the layer.
A maximum of 64 fields is available (64 x 1 or 9 x 7).
8. Drag the mouse cursor over any number of adjacent tiles and click Connect to group the
selected tiles together as a single tile.
9. Click a group tile and then Disconnect to separate it into the original number of tiles.
10. Click OK to apply the setting.
The new layer is displayed in the overview.
Configuring a layer
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the layer in the overview.
3. If necessary, alter the name of the layer.
4. Click a tile, and then select the Focus element option.
You can mark a tile as a focus tile in every layer. If you double-click a camera in a layer with a
focus tile, the camera image is displayed in the focus tile. If you double-click a camera in a
layer without a focus tile, the camera image is displayed in a separate layer.
5. Drag the cameras, maps or web pages to the layer window in accordance with the selected
arrangement.
6. To remove a camera from the layer, select the camera and click the Delete button.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.
Deleting a layer
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the layer in the overview.
3. Click the Delete object icon.
Duplicating a layer
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the layer in the overview.
3. Click the Duplicate object icon, and enter a name for the duplicated layer.
4. Click OK to accept the name.
The new layer is displayed in the overview.
Maps
The Maps function in the Administration control allows you to configure and manage the overview
maps of the site or building under surveillance, including the location of the surveillance hardware.
Creating a new map 172
Configuring a map 172
171 / 251
Configuration mode
Configuring a map
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the map in the overview.
3. Click the Background image button, and then select the desired background image (e.g.
building floor plan).
4. Drag the available cameras or buttons required for the desired site from the list to the back-
ground image.
5. Use the slider to set the relative size of the camera or button and the angle of view.
You can also set the exact angle of view by entering the angle in the text box.
6. Activate Show circles to indicate the viewing angle and direction of the cameras in the map.
The circles will be displayed for all cameras in the map.
7. To hide the circles of a specific camera, set the camera's angle of view to "0".
8. Use the slider to set the angle of rotation.
9. Select Display text to display the name of the camera or button in the image.
10. Click the Delete button to remove the camera or button and all its settings from the image.
11. To cover a button (and thereby making it possible to select it in surveillance mode) with an
irregular shape, click Polygon.
12. Specify the color and transparency of the polygon.
13. Draw the polygon by clicking into the image around a button. Only one button can be
covered by one polygon.
14. Close the polygon by double clicking.
15. If necessary, draw multiple polygons.
16. Apply the set values if you want to make further settings.
17. Save the set values to apply the values and conclude input.
Deleting a map
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the map in the overview.
3. Click the Delete object icon.
Duplicating a map
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
172 / 251
Configuration mode
Buttons
The Buttons function in the Administration control allows you to start specified processes
(actions) such as camera recordings or alarm scenarios.
To call the configured buttons in surveillance mode, you have to call the Buttons function on the
control bar (see Buttons - p.99).
Creating a new button 173
Configuring a button 173
Deleting a button 174
Duplicating a button 174
Configuring a button
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the button in the overview.
General
1. If necessary, alter the name.
2. Specify the sort order of the buttons in the controller in surveillance mode (see Buttons -
p.99).
The buttons are automatically sorted in ascending order. In other words, the higher the num-
ber of a button, the lower down it appears in the list on the tab.
3. Select an icon to make it easier to recognize.
4. Activate the action for a specific camera, and select the camera.
In this case the button is only displayed if the specified camera is selected in surveillance
mode.
5. Activate Use shortcut and press the desired key combination on the keyboard to trigger the
button with a key combination.
The key combination is displayed.
The default keyboard shortcuts cannot be overwritten. Changes by the administrator
will be ignored.
173 / 251
Configuration mode
Action
1. Select the Call URL option and enter the Internet or intranet address.
Camera scripts cannot be started under this address, for example.
An Internet or intranet address is not displayed (to embed web pages in the layer, see Web
pages).
2. Click Test to check that the specified URL is working.
A check is carried out to ascertain that the URL can be accessed. The page is not displayed.
3. Select the Perform action option and then the action.
4. If a second action is to be performed, select Perform next action and then the action.
The action is selected as soon as you release the mouse button.
5. Select the Start alarm scenario option and then the alarm scenario (see Alarms).
6. Select the Terminate alarm scenario option and then the alarm scenario (see Alarms).
7. Select the Start patrol option and then the patrol (see Patrols).
8. Select the Run program option, and then click Select to select a program that is to be star-
ted.
The selected program must be installed on the client computer.
9. Enter any parameters required by the program.
A document can be opened using the selected program, for example.
10. Apply the set values if you want to make further settings.
11. Save the set values to apply the values and conclude input.
Deleting a button
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the action in the overview.
3. Click the Delete object icon.
Duplicating a button
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the action in the overview.
3. Click the Duplicate object icon, and enter a name for the duplicated action.
4. Click OK to accept the name.
The new action is displayed in the overview.
Web pages
The Web pages function on the Administration control allows you to embed web pages in the
layer (e.g. webcams or intranet pages).
Creating a new web page 175
Configuring a web page 175
Deleting a web page 175
Duplicating a web page 175
174 / 251
Configuration mode
Patrols
The Patrols function on the Administration control allows you to configure multiple cameras, set
positions, maps and layers one after the other for a user-definable time. It is also possible to open
or close digital outputs in a patrol and create checkpoints.
Creating a new patrol 176
Configuring a patrol 176
Deleting a patrol 176
Duplicating a patrol 177
175 / 251
Configuration mode
Configuring a patrol
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the patrol in the overview.
3. If necessary, alter the name of the patrol.
4. Select the default pause (in seconds) to set the duration for which a layer is to be displayed.
5. Click New group to group together the objects of the patrol.
6. Specify the name of the group, and then click OK.
7. Drag the objects from the left-hand column to Patrol positions or the group.
8. To add a specific position of a camera to the list, first drag the camera to the group, then the
associated preset position.
9. Select a camera, and then click the Edit button.
10. Select the window in which the camera is to be displayed.
11. If necessary, insert a new pause and specify its duration.
12. Insert a new checkpoint and give it a name.
If a checkpoint is reached, an information window is shown. The user can then decide
whether to continue or stop the patrol. The reaching of a checkpoint is saved in report mode.
13. To change the sequence of inserted objects, select the objects in patrol positions and move
the object Up or Down in the list by clicking the corresponding button.
For a patrol to be started in surveillance mode, it must first be assigned to a user or
group in the Profiles control.
14. Select the object in Patrol positions, and then click the Edit button to adjust the object's set-
tings.
This enables you to decide in which window the camera image is to be displayed.
15. Select the object in patrol positions, and then click the Delete button to delete it.
Deleting a patrol
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the patrol in the overview.
3. Click the Delete object icon.
176 / 251
Configuration mode
Duplicating a patrol
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the patrol in the overview.
3. Click the Duplicate object icon, and then enter a name for the duplicated patrol.
4. Click OK to accept the name.
The new patrol is displayed in the overview.
Sequences
The Sequences function on the Administration control allows you to create sequences in which
multiple set positions are approached one after the other and/or actions are triggered.
Configuring a sequence
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the sequence in the overview.
177 / 251
Configuration mode
General
1. Select the sequence and, if necessary, alter the name.
2. Use the Times and Time periods buttons to make additions.
3. Time: The sequence is started once at the selected time on every selected day.
4. Time period: The sequence is started multiple times depending on the duration of the
sequence on every selected day within the time period.
5. Select one or more entries, and then click the Edit selected entries button to edit the entries
one after the other.
6. Select one or more entries, and then click the Delete selected entries button to delete the
entries.
Actions
1. Create a new group and give it a name.
2. Specify the dead time (in seconds) to specify the interval within which no new signal is dis-
played.
3. Drag one or more camera positions or actions to the group.
4. Select a group, and then use the New pause button to adjust the pause (in seconds) to spe-
cify how long the camera or layer or map is displayed.
5. Select a group or an entry, and use the Up or Down button to move it up or down in the list.
6. Select a group or pause, and then click the Edit button to edit the name of the group or the dur-
ation of the pause.
7. Select a group or an entry, and then click the Delete button to delete the group or entry.
8. Apply the set values if you want to make further settings.
9. Save the set values to apply the values and conclude input.
Deleting a sequence
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the sequence in the overview.
3. Click the Delete object icon.
Duplicating a sequence
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the sequence in the overview.
3. Click the Duplicate object icon, and then enter the name for the duplicated sequence.
4. Click OK to accept the name.
The new sequence is displayed in the overview.
Video walls
The Video walls function in the Administration control allows you to configure the SeeTec Dis-
patcher. This allows you to display camera images, layers, maps, alarm scenarios and web pages
on video walls in dispatcher mode.
Creating a new video wall 179
178 / 251
Configuration mode
179 / 251
Configuration mode
Server
The Server function on the Administration control allows you to configure the server services.
Configuring the CoreService 181
180 / 251
Configuration mode
General
1. If necessary, alter the name of the image data server.
2. Select the failover server
In the event of the failure of the image data server, all connected devices are transferred to the
failover server.
Note that the failover server must have sufficient capacity to take over the devices.
3. Specify the time of the data aging search.
4. Activate Accesses to video sources to save these events.
5. Select the period after which the events are automatically deleted.
6. Click the Display statistics button to display the available recordings of the individual cam-
eras.
7. Click the Remove from the system button to remove the Device Manager server from the
system configuration.
Always contact SeeTec Support before deletion.
Options
1. If necessary, alter the port for SIP messages.
181 / 251
Configuration mode
The export folder can only be specified if client and server are installed on the same
computer.
3. Click the Check path button to check the availability of the specified folder.
4. Specify the time of the export.
5. Activate Export image data of the last 24 hours to export the image data of the last 24
hours before the specified export time.
If this option is not to be activated, the image data of the previous day (midnight to midnight)
are exported.
6. Specify a password, with which the image data is encrypted.
Manual image data export
A temporary folder is required for manual image data export to temporary storage of the export
data before they are sent from the server to the client.
The temporary folder is specified in the MBD configuration (see SeeTec administration
tool).
1. Create the temporary export folder on the server for the manual storage of the image data,
or click the Select path button to select the folder directly in Windows Explorer.
2. Click Check path to ensure that the SeeTec server services can write to the folder and read
from it.
Make sure that there is sufficient storage space for large export files on the partition
on which the temporary folder is created.
3. Specify a password to be used to encrypt the image data.
The password will be required to export the image data (see Multiple export of image data -
p.72).
Remove the stored password with Delete password.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.
182 / 251
Configuration mode
183 / 251
Configuration mode
System
The System function on the Administration control allows you, for example, to configure and
manage system-wide settings for the network, automatic backups as well as communication set-
tings and event management settings.
The system manager is valid for all locations.
184 / 251
Configuration mode
1. Select the year for which you want to create a calendar template.
Six months are displayed.
2. Click Next to display the following six months, or click Back to display the previous six
months.
3. To navigate to the current date, click the Jump to the current date icon (2).
4. Click Import to enter the public holidays in the company calendar.
The templates for public holiday import are in the SeeTec installation folder in the "\Cli-
ent\calendar folder as text files.
5. Select the desired federal states, as appropriate.
6. Activate Replace holidays to replace all entered public holidays, and then click OK.
The imported data is displayed highlighted in blue.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.
185 / 251
Configuration mode
Example1
6. Apply the set values if you want to make further settings.
7. Save the set values to apply the values and conclude input.
General
1. Select Use automatic deletion, and then select the period after which the event database is
to be deleted.
2. To tidy up the database manually, select Delete only events that are older than, and then
specify the period.
3. Click the Delete events button to delete the events in the selected period from the database.
4. Specify the time for the daily report on the system events.
The e-mail with the report of the events of the last 24 hours is sent to all e-mail addresses
stored as system addresses in the e-mail manager.
Error/warning/info
The events that have occurred are subdivided into three categories, depending on their priority:
n Error: Serious events that impair the operation of the Cayuga software such as the failure
of a server, service or device and errors in transmission or when accessing the image data-
base.
n Warning: Events that can lead to errors if they are not eliminated, such as the loss of a
camera's video signal, a change to the system time or data backup problems.
n Info: Events that provide information on the successful completion of system configuration
such as the modification of the license file or the restoration of image analysis.
1. Select the events in the list, and specify:
n whether the event is to be displayed only in the daily report of the system events,
n whether an e-mail is to be sent to all of the e-mail addresses entered in the e-mail man-
ager as system addresses when the event occurs.
2. To edit one or more events, select it in the Edit column and click the Edit selected objects
button.
3. Specify whether an action is to be performed:
n to which recipient an e-mail is to be sent,
n for which profiles a message is to be displayed in surveillance mode.
4. Click the Back to overview button to go back to the list of events.
186 / 251
Configuration mode
187 / 251
Configuration mode
Control Panel > Software > Add/Remove Windows Components > Management and
Monitoring Programs, a different port for LocalTrapSendPort must be set, because trans-
mission is not possible via port 161. If port 161 is set as the default, it will not work.
SNMP v1/v2
1. Activate SNMP v1 or SNMP v2. SNMP v2 adds simple security features, whereas SNMP v1
has none.
2. Enter the CommunityString to enable correct responses from the host.
SNMP v3
SNMP v3 is currently the most secure protocol version.
1. Activate SNMP v3.
2. Enter the Security Name, Authentication Type, Authentication Password, Encryption
Type, and the Encryption Password.
3. To test the settings, click Send SNMP test message to check the settings.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.
188 / 251
Configuration mode
189 / 251
10
Video Analytics
The SeeTec counting suite is part of the Video Analytics module. Like the SeeTec Analytics mod-
ule, the counting suite analyzes defined dynamic objects. The counting suite counts how often the
parameters defined in the Video Analytics module have been met and generates statistical fig-
ures. The results are displayed in the Count analysis.
190 / 251
Video Analytics
191 / 251
Video Analytics
192 / 251
Video Analytics
193 / 251
Video Analytics
Count analysis
The count analysis is based on SeeTec Analytics (also refer to SeeTec Analytics - p.149 in con-
figuration mode). It provides a graphical analysis of the objects (people or vehicles) that have
broken an analytics rule (e. g. entering an "area of interest" or passing a "tripwire").
1. Select Count analysis from the View menu. The following viewing options are displayed:
n Scenarios/templates: Scenarios are defined rules, which describe fixed recurrent
scenarios. Templates can be used for any rule in different combinations. Templates
can be considered as "scenarios without rules". Thereby, they can be used for multiple
rules and serve as predefined time frame and interval settings for a query.
n Complex scenarios: Scenarios and rules can be combined using Boolean operators.
n Individual query: Individual queries allow a broad range of search definitions and dia-
grams.
2. Select the desired option.
Requirements
The camera should be mounted at least in 3 meters above the object. The higher the camera is
positioned the better the perspective for object recognition.To get best possible counting results
an optimal camera position is required:
n Overhead, i.e. the camera points vertically downwards.
n According to the results of the camera placement tool.
MOBOTIX cameras are supported with Motion JPEG-Streaming only.
194 / 251
Video Analytics
2. In the Add new scenario window, enter a name for the scenario and select the counting chan-
nel.
3. Select a rule and specify the time frame in which the rule must have occurred.
4. Select the interval, for which the counted rules can be evaluated and visualized.
On the server, counted rules will be stored in the following intervals:
n Last 3 months: every minute
n 3 - 6 months: every hour
n Older than 6 months: daily
5. Click Expert mode to define the number of occurrences in which the rule has been met within
the time frame. Additionally, you may specify the number with Boolean operators (larger than,
equal to, etc.).
6. Click Save. The new scenario will be added to the list.
Editing a scenario
1. Select a scenario in the list. The details are displayed.
2. Click Edit and adjust the settings as required.
195 / 251
Video Analytics
3. Click Save.
Deleting a scenario
1. To delete a scenario, select the scenario in the Scenarios region and click Delete.
2. In the Add new template window, enter a name for the template and specify the time frame in
which any rule must have occurred.
3. Select the interval in which the counted rules should be analysed and visualized..
196 / 251
Video Analytics
4. Click Expert mode to define the number of occurrences in which the rule has been met within
the time frame. Additionally, you may specify the number with Boolean operators (larger than,
equal to, etc.).
5. Click Save. The new template will be added to the list.
Editing a template
1. Select a template in the list. The details are displayed.
2. Click Edit.and adjust the settings as required.
Deleting a template
1. To delete a template, select the template and click Delete.
197 / 251
Video Analytics
2. Select a scenario from the existing scenarios area. The scenario is displayed below.
3. Drag the scenario onto the pane below the tabs.
4. Drag a Boolean operator from the bottom of the window onto the pane.
5. Select an existing rule. The rule is displayed below.
6. Drag the rule onto the pane below the tabs.
7. Arrange the scenarios and rules according to the desired rule settings.
8. Define the settings and time intervals that have to be met.
9. Click Expert mode to define the number of occurrences in which the rule has been met within
the time frame. Additionally, you may specify the number with Boolean operators (larger than,
equal to, etc.).
10. To add rules or scenarios, click the required Boolean operator and connect with the respective
settings.
11. Click Save.
12. Enter a name and click OK.
198 / 251
Video Analytics
Removing an item
1. To remove an item, drag the item onto the trash can icon.
Editing a query
1. Select the query in the Query region of the Individual query tab and click Edit to change the
settings.
Deleting a query
1. Select the query in the Query region of the Individual query tab and click Delete.
Defining a report
199 / 251
Video Analytics
1. Select a chart type for displaying the result of the query. The results are displayed as charts
or data (numbers) in the counting data pane.
2. To print the chart,select With input data to print the chart with numerical values.
3. Select a query and click the Print button to print the selected query.
4. Select the export format, and then click the Export button to export the selected query. The
data can be exported as:
n CSV (comma separated values) for importing into spreadsheet applications
n PDF (portable document format) for easy distribution
200 / 251
11
Controlling the Cayuga client
remotely
The client can be administered and controlled by using the Remote Desktop connection or by a
Terminal Server session.
Activating the Remote Desktop connection 202
Activating the Terminal Server connection 203
Possible issues when using remote control 204
201 / 251
Controlling the Cayuga client remotely
202 / 251
Controlling the Cayuga client remotely
203 / 251
Controlling the Cayuga client remotely
204 / 251
12
Admintools
The SeeTec Cayuga admintools contain a suite of administration tools required to manage the
servers, clients and additional modules such as the UpdateService and the AlarmWatchDog.
n SeeTec VA Administration Tool The SeeTec VA Administration tool is used to configure
the settings for the core server and installing the "Versatile Application" extension. The
extension parameters are then configured from within the SeeTec client.
n SeeTec Administration Tool: The SeeTec Administration Tool is used to configure the
image database and the administration database of the SeeTec servers.
n SeeTec ServiceManager. The SeeTec ServiceManager is used for starting and stopping
SeeTec services.
n UpdateService Configuration Tool: The UpdateService Configuration Tool manages the
configuration of the UpdateService on the core service master (CSM) and the UpdateA-
gents on the clients.
SeeTec VA Administration Tool 207
Switching the display language 207
Creating a new configuration file 208
Adding an LPR module 208
Adding an AlarmManager Extension module 209
Adding an ObjectVideo module 210
Adding a Transcoding engine module 210
Adding a gateway service module 211
Adding an Analytics interface module 211
Adding server-based motion detection module 212
Adding a Generic DVR module 212
Adding an Access Control module 213
SeeTec Administration Tool 214
General settings 215
205 / 251
Admintools
206 / 251
Admintools
207 / 251
Admintools
1. Click the Settings (1) icon, and then choose Create new configuration file from the File
menu.
1. Right-click the configuration file in the column on the left and choose License plate recog-
nition from the Add new module context menu.
A new entry is created under the configuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.
208 / 251
Admintools
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port used by the LPR module.
7. Specify the number of concurrent jobs that are to be transferred. This number should
exceed the number of lanes to be monitored.
Example1
8. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
9. Click Save to save the changes.
10. Restart the services (see Starting and stopping the services - p.220) or add further mod-
ules.
1For each lane, more than one vehicle may be waiting. Hence, multiple concurrent jobs may be
present per lane. The jobs will then be set on a "waiting list" where the queue is processed one
after the other.
Do not change to 32bit mode without talking to SeeTec Support first.
209 / 251
Admintools
210 / 251
Admintools
211 / 251
Admintools
8. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
9. Click Save to save the changes.
10. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.
212 / 251
Admintools
7. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
8. Click Save to save the changes.
9. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
3. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
4. Select the module IP.
5. Enter the module port used by the Generic DVR module.
6. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
213 / 251
Admintools
1. Start the SeeTec Administration Tool in the SeeTec Cayuga installation folder.
All settings in the administration tool are not valid until the services or the complete
computer have been restarted (to start the services see SeeTec ServiceManager - p.219)
214 / 251
Admintools
General settings
1. Configure the server and port of the CoreService server if SeeTec administration was started
on a distributed server.
If SeeTec administration was started on the main server, leave these settings unchanged
(default: server: localhost, port: (60000).
2. Enter the IP address of the server and the host name for the SeeTec services to connect to
in the "IP address/host name for server communication" area.
3. Enter the network password.
4. Click the Settings (1) icon, and then choose Save from the File menu to save the changes.
5. Restart the services (seeSeeTec ServiceManager - p.219).
215 / 251
Admintools
If more storage space has to be made available to the multimedia database because, for example,
the event data is to remain available for an extended period, an additional volume can be added to
the MaxDB. The default size of the MaxDB is 4 GB.
A maximum of four volumes can be added to the MaxDB.
This extension has no influence on the actual multimedia database.
1. Enter the size [MB] of the additional storage space for the expansion of the multimedia data-
base (minimum: 512 MB, maximum: 4000 MB).
2. Click Add new volume.
The additional storage space is available immediately under DISK000X in the MaxDB install-
ation folder.
3. Click the Refresh (3) button for an estimate of how long (in days) the space in the MaxDB will
last at the current alarm rate.
A reliable estimate can only be made if the system is running under normal load with reference
to the alarm occurrence.
216 / 251
Admintools
Cache
If a large number of events occurs with resulting high loading times, the MaxDB cache size can be
increased.
However, this value should be selected carefully. Enlarging the cache is not useful if the computer
does not actually have enough free RAM available.
The current cache size of the RAM reserved for the MaxDB is displayed. The actual size of the
MaxDB is shown under Current capacity utilization of the management database.
The cache size of MaxDB is an extremely system-critical parameter that should not be
changed unless there are good reasons for it. The throughput is optimal if the compete
database is kept in the cache.
1. Enter a value in MB for the desired size, and click Adjust cache size.
Multimedia database
The multimedia database tab is used for maintenance and editing of zones of the multimedia data-
base. The zones are paths in which the multimedia database stores its image data. Both local
drives and network drives can be addressed. The specified zone size is not reserved immediately
but only used as required.
About zones
Zones specify the maximum storage depth of the multimedia database and thus of the software.
By default, the SeeTec software does not set any limits on the zone of the multimedia database.
The default zone is placed in the following folder in a new installation: "SeeTec installation folder-
\re\md\mds\data\.
However, we recommend replacing it with a zone on a dedicated partition.
If the volume of the existing zone is not sufficient, another zone can be added. A maximum of ten
zones should be created. A larger number has a negative effect on the performance of the mul-
timedia database. It is also better to have a few large zones than a larger number of small zones.
If more storage space than is available on the zones or on the hard disk is assigned to the con-
nected cameras, the database stops recording.
We strongly recommend against setting a hard disk that is connected by USB or
FireWire as a multimedia database zone, because this will have a very negative effect
on the performance. The multimedia database should be placed on another hard disk or
a RAID system to ensure satisfactory performance.
Add zone
1. Create a folder on a dedicated partition as a zone to store the image data.
The cluster size should be 64 KB.
2. Click Add zone.
3. Enter the path and the maximum size (in GB).
If necessary, click Browse to go to the new folder.
4. Activate Unlimited to use all the physical space in the partition.
We recommend using no more than 90% of the physical space on a partition, because any
217 / 251
Admintools
Editing a zone
1. Select the desired multimedia database in the zones field.
2. Click Edit zone to change the path and/or size.
We recommend using no more than 90% of the physical space on a partition, because any
more will adversely affect the performance of the operating system.
3. Click OK to confirm.
Remove zone
1. Select the desired multimedia database in the zones field.
2. Click Remove zone.
The image data in the deleted zone are no longer available in SeeTec Cayuga, but are not auto-
matically deleted.
218 / 251
Admintools
SeeTec ServiceManager
The SeeTec ServiceManager is used for starting and stopping SeeTec services. The following
functions are available in the SeeTec ServiceManager:
n Restart all SeeTec services
n Stop all SeeTec services
n Start all SeeTec services
The SeeTec ServiceManager is automatically installed when a server service is installed.
To start the SeeTec ServiceManager automatically at login, add "-autostart" as the command line
parameter (see Command line parameters - p.230).
1. Start the SeeTec ServiceManager in the SeeTec Cayuga installation folder or the Windows
Start menu.
219 / 251
Admintools
220 / 251
Admintools
221 / 251
Admintools
1. Start the UpdateService configuration tool in the SeeTec Cayuga installation folder. If
required, confirm the system's administration privileges.
The information tab is displayed.
222 / 251
Admintools
The Groups column displays all groups managed by the UpdateService alphabetically. The default
group contains all UpdateAgents (clients) not assigned to a group.
Clients in the default group are updated automatically. Clients that should not receive
updates or patches have to be located in a separate group (see Configuring a group -
p.224).
1. Click on a group folder icon to display the status overview of all clients within the group. Am
colored bullet point shows the current status of each client:
n Red: An error occurred at the client or the UpdateAgent of the client is offline for more
than 3 minutes.
n Yellow: UpdateAgent is currently busy (patching, downloading, etc.) or waiting for an
event triggered by the UpdateService (e.g. manual distribution of patches).
n Green: The client's UpdateAgent is up-to-date.
1. Click on a client name to display the installed components (e.g. the system software, the soft-
ware version, the status, and the installed patches).
2. Click Refresh list to see a more current status.
3. Click Configure group to create, rename or delete a group and specify the group's update
settings (see Configuring a group - p.224).
4. Click Delete clients to remove clients from the configuration tool.
223 / 251
Admintools
Configuring a group
If the time is in the past, downloads and patches will start immediately.
n Download interval between each UpdateAgent for in minutes (e.g. the first UpdateAgent
starts the download at 10:00, the second UpdateAgent starts the download at 10:10, the
third at 10:20, etc).
n Update and patch date and time.
n Specific update and patch behavior for the UpdateAgents in the current group.
1. Specify the required update and patch settings for the group.
2. Select Don't distribute patches or updates to these clients to prevent automatic dis-
tribution at low bandwidth.
If this option is activated, the patches have to be distributed manually.
3. Select Don't start patching or updating automatically to prevent automatic installation of
patches and updates.
Patching and updating has to be performed manually.
224 / 251
Admintools
4. Select Automatic restart before and after the patch/update to shut down the software and
log out all users before applying the patch.
The clients will be restarted automatically.
5. If required, deselect clients from the groups list. Only the selected clients will be affected by
the group settings.
Creating a group
1. Click Create new group, enter a name for the new group and click OK. The new group will
be displayed in the Groups column.
Renaming a group
1. Click Rename group, change the name of the group and click OK. All assigned UpdateA-
gents will remain in the group and adhere to the group's settings.
Deleting a group
1. Select a group in the Groups column and click Delete group. All clients in the group will be
moved into the default group and will be exempted from the update settings. UpdateAgents in
the default group will get updates and patches as soon as they are available.
225 / 251
Admintools
The tab displays the available updates and patches. If the UpdateService has been configured for
manual distribution in the Server configuration tab (see Editing the Server configuration -
p.226), all updates and patches can be imported from the server and exported to a directory on the
server or an attached media.
1. Click Import updates to download the available updates from a directory that is available in
the local network.
2. Click Refresh to check at the server for updates not yet displayed.
3. Click Export to copy the updates and a "SeeTec.UpdatePatchImport.exe" to a directory that
can be copied to any media such as a USB stick.
The SeeTec.UpdatePatchImport.exe updates and patches can be installed at each client sep-
arately (see Import of updates and patches at the UpdateAgent - p.227).
4. Click Import patches to download the available patches from a directory that is available in
the local network. The available patches are displayed.
5. Click Export to copy the patches and a "SeeTec.UpdatePatchImport.exe" to a directory that
can be copied to any media such as a USB stick.
The SeeTec.UpdatePatchImport.exe updates and patches can be installed at each client sep-
arately (see Import of updates and patches at the UpdateAgent - p.227).
6. If patches are not required, select the patches from the list and click Delete patches before
exporting them. Only the patches listed will be distributed.
7. Click Refresh to check at the server for patches not yet displayed.
226 / 251
Admintools
With the Server configuration tab, the basic settings for the communication between the Update
server and the clients are managed. By default, the UpdateService connects to the server provid-
ing the updates (i.e. SeeTec), downloads and distributes the updates and patches to the UpdateA-
gents. However, if manual distribution or a different server for downloads is preferred, the
automatic setting can be changed.
1. Select an option from the menu:
n Download and install updates/patches automatically from the internet. This is the
recommended setting for automatic updates and distribution of patches.
n Download updates/patches from the internet, but don't install them automatically.
Updates and patches will be automatically downloaded from the server, but will not be dis-
tributed to the UpdateAgents. The updates and patches must be updated and installed
manually (see Update and patch settings - p.225).
n Download and install updates/patches automatically from a defined remote loc-
ation. The updates and patches will be downloaded from an FTP server that has to be con-
figured and automatically installed at the UpdateAgents (see Configuring the FTP
server - p.227).
n Download and install updates/patches from a defined remote location, but don't
install them automatically. The updates and patches will be downloaded from an FTP
server that has to be configured, but will not be distributed to the UpdateAgents. The
updates and patches must be updated and installed manually (see Configuring the FTP
server - p.227).
n Don't look for updates from the internet or any remote location. The option is not
recommended, as no updates or patches will be downloaded or distributed automatically.
The updates and patches will have to be downloaded and exported manually (see Update
and patch settings - p.225).
2. Select the required option from the menu.
3. Specify the daytime when updates and patches will be downloaded and installed.
4. Click Check for updates/patches now to manually check for available downloads. Currently
active downloads are displayed.
5. Click Restart SeeTec UpdateServer to restart the UpdateServer with the applied settings.
6. Click Save to apply the settings.
227 / 251
13
LPR mode
The automatic recognition of license plates in the video image and comparison with a license-plate
database allows items such as entry checks and barrier control, parking and loading area admin-
istration and triggering of alarms.
LPR mode is for analyzing the LPR events and displaying the information associated with the
event (including master data, if available). In addition, statistics can be kept.
228 / 251
LPR mode
Player
The player is operated in LPR mode in the same way as in archive mode (see Archive mode -
p.105).
229 / 251
14
Command line parameters
Command line para- Meaning
meters
230 / 251
Command line parameters
1To start the SeeTec client in English at the server with the IP address 192.168.0.10, right-click
the link and append the command line parameter "lang:en-us" at the end of the line.
The line then appears as follows for a default installation path: "C:\Program Files\SeeTec\Cli-
ent\VMS_Client.exe" lang:en-us host:192.168.0.10
Note that no spaces are allowed after the colons.
231 / 251
15
Shortcut key
The following keyboard shortcuts are available for users in the client to speed up function calls.
232 / 251
16
The SeeTec Cayuga Viewer
The SeeTec Viewer can be used to access exported image data that are in the SeeTec image
format.
The SeeTec Viewer is automatically installed with a default or client installation. It can also be
installed separately in a user-defined installation.
1. Start the Viewer.
You will find the Viewer in the SeeTec installation folder.
233 / 251
The SeeTec Cayuga Viewer
234 / 251
The SeeTec Cayuga Viewer
1. Click the Select file button and navigate through the file folder to the file that you want to
view.
2. Click the Import data button to import the selected data into the viewer.
Importing data into the SeeTec Viewer may take some time.
1. Select the recording that you wish to view in the area on the left (1).
2. Enter the password specified during export.
3. Right-click the current camera and select Delete camera from layer to select a different
recording.
4. Click the new time period that you wish to view.
Alternatively, you can drag the desired time period to the previously occupied tile.
Play recording
1. Navigate through the recording with the player in the area on the right (12):
n Fast rewind (2): plays the recording backwards at high speed (time lapse)
n Play backward (3): plays the recording in reverse chronological order
n Slow rewind (4): plays the recording backwards at low speed (slow motion)
n Previous frame (5): jumps to the recording's previous i-frame.
n Pause (6): pauses the playback.
n Next frame (7): jumps to the recording's next i-frame.
235 / 251
The SeeTec Cayuga Viewer
n Slow forward (8): plays the recording forwards at low speed (slow motion).
n Play (9): plays the recording in normal chronological order.
n Fast forward (10): plays the recording forwards at high speed (time
lapse).
2. If the recording has an additional sound track, activate Sound output (11), and then adjust
the volume if necessary.
3. The Additional information field shows exported data of the CIT, license plate recognition
and ATM add-on modules.
236 / 251
The SeeTec Cayuga Viewer
Export a recording
1. Right-click the corresponding sequence under the camera name in the camera tree to delete
it.
2. Right-click the camera image to print a single image, save it as a JPG image or rotate the
image.
3. Right-click the camera image to activate the digital zoom.
If the image data that are to be played originate from a camera with an ImmerVision
lens, the digital zoom activates the distortion of the camera image.
237 / 251
The SeeTec Cayuga Viewer
Do not export uncompressed images as film. Ten seconds of exported image material
uncompressed is about 350 MB. If possible, do not use Windows® default codecs. They
yield a poor-quality export result.
MOBOTIX cameras can only be exported in the MOBOTIX format.recommends the XviD
codec.
If there are different frame rates and resolutions in the time period that is to be exported (e.g.
change from standard to alarm recording), check the film sequence, because the selected codec
may yield a distorted image from the time of the change in some cases.
238 / 251
The SeeTec Cayuga Viewer
239 / 251
17
Configuring the SeeTec Mobile
Client
The SeeTec Mobile Client is an application (app) that allows you to access an existing SeeTec
installation via WiFi or 3G network. With the Mobile Client app, the user may access camera
images, archives, enable button actions or process alarm events among other settings.
Installing the Mobile Client on a mobile device 241
Installing the SeeTec Mobile Client services on the SeeTec server 242
Configuring the SeeTec Mobile Client on the mobile device 243
Connecting with the SeeTec Mobile Client 244
240 / 251
Configuring the SeeTec Mobile Client
241 / 251
Configuring the SeeTec Mobile Client
242 / 251
Configuring the SeeTec Mobile Client
243 / 251
Configuring the SeeTec Mobile Client
244 / 251
18
Using the AlarmWatchDog
The AlarmWatchDog service displays all alarm scenarios on all clients connected to the
AlarmWatchDog server. For setup and configuration of the service, see AlarmWatchDog in the
configuration mode.
1. Start the AlarmWatchDog service from the tools folder in the installation directory.
245 / 251
Using the AlarmWatchDog
2. Specify the Location of the alarm data by setting the file path to the storage directory.
246 / 251
Using the AlarmWatchDog
6. Select one IP address from the TCP IP address list and copy it to the clipboard.
7. Paste the IP address in the AlarmWatchDog settings in the System menu (see
AlarmWatchDog in the System menu in the control bar).
8. Click OK.
247 / 251
Using the AlarmWatchDog
248 / 251
19
The Cayuga web client
With the web client, the SeeTecsystem is displayed with a web based interface within a browser.
Overview
In live mode, the web interface provides basic functions of the client, such as:
n Accessing cameras
n Accessing predefined layers
n Accessing maps
n Accessing webpages
n Recieving alarms and confirm them
n Controlling PTZ cameras and activating PTZ preset positions
n Displaying buttons and triggering their actions
n Displaying the same entity tree as in the Windows client with folders and subfolders
n Exporting the actual live image as JPEG
249 / 251
The Cayuga web client
250 / 251
The Cayuga web client
251 / 251