0% found this document useful (0 votes)
1K views251 pages

SeeTec - Manual - EN

Uploaded by

bstanko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views251 pages

SeeTec - Manual - EN

Uploaded by

bstanko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 251

User manual

SeeTec Cayuga

© 2015 SeeTec AG
Contents

Contents
Contents 2

Legal notice 15
Copyright 15
Patent and copy protection 15
Address 15
Support 15
Image acknowledgment 15
Version 16

Support 17
Reporting a software problem 17

Introduction 18
Product lines 18

Functional overview 20
Server 21
Redundant system management 21
Redundant recording 21
Client 21
Surveillance mode 21
Archive mode 21
Report mode 22
Configuration mode 22
LPR mode 22

Installation 23
Information on installation 23
Setup types 24
Firewalls 24

System requirements 25
Known limitations 25
Requirements for remotely controlling the Cayuga client 25
Requirements for the Help system 25
General recommendations 25
Virtual environments 25
Thin clients 25
CPU recommendations 26
System parameters 27
Modules 28

2 / 251
Contents

Type of installation 30

Standard installation (Client & Server) 33

Client installation 35

Installation of a distributed server 37

Carrying out a user-defined installation 39


Components for the user-defined installation 40
Client components 40
Server components 40
Tools 40

Installing and configuring the UpdateService and the UpdateAgent 41


Installing the Cayuga UpdateService 41
Configuring the Cayuga UpdateService 41
Manually configuring and activating the UpdateAgent 41

Updating, customizing, repair and uninstallation 43


Updating 43
Customization and repair 43
Uninstallation 44

Migrating from SeeTec 5.4.x to Cayuga 45


Recommended steps before migration 45
Compatibility matrix 45
Migrating procedure 46
Hardware and operating system already meet the requirements 46
Migrating to new hardware and / or new operating system 46
After the installation 46

Login 48

Logging in for the first time 50

Advanced options 51

Extending the network timeout 52

The user interface 53

The menu bar 55


File 55
Client configuration 55
Client 56
Alarms 57
Analytics 58
Warnings 59
Network 60
VoIP and SIP 61
Input devices 62
Restrictions and special cases 62

3 / 251
Contents

Changing the font color 63


Changing the language 63
Changing the password 63
Changing the profile 63
Changing the user 63
Switching SeeTec installation 64
Installation Manager 64
Requirements 65
Select and add an installation 65
Reorder installations 65
Disconnect and reconnect a SeeTec installation 65
Edit SeeTec installations 65
Delete saved SeeTec installations 65
Select and display cameras with the keyboard 65
Key assignment 66
Pattern 66
View 66
Adding a window 67
Adding the sequential alarm window 67
Keeping the aspect ratio 67
Borderless display 67
Display agent 67
Video wall dispatcher 67
LPR master data editor 67
Creating a new license plate (1) 68
Editing a license plate (2) 70
Deleting a license plate (3) 70
Displaying (4) and restoring (5) deleted license plates 70
Deleting a history (6) 70
Deleting a license plate permanently (7) 71
Switching the view (8) 71
Refresh the view (9) 71
Search for a license plate (10) 71
Exporting and importing license plates (11) 71
Count analysis 71
Access control data editor 71
Tools 72
Multiple export of image data 72
Exporting image data to the server. 72
Exporting image data to the client 73
Configuring a logo action 74
Manual reference image comparison 74
Printing the reference image comparison 75
Removing write protection from recordings 76
Status report for automatic image export 76

4 / 251
Contents

Info 77
Request product ID 77
Import license file 77
Activate license 77
Display license 78
Display program information 78
Display system information 78
Help 78
User's Guide 78
Start problem recording 79
Display Help icons 79

The mode bar 80

The control bar 81


Showing/hiding a tab 81

Search 82
Searching in surveillance mode 82
Searching in configuration mode 82

Surveillance mode 83
Camera operation 83
Tabs 83
Control bar 83

Work area 85
Alarm notification ("Toast notification") 85
Creating layers 85
Setting the viewing mode on multiple displays 85

Sequential alarm window 87

Custom image layers 88


Adding a layer 88
Opening a layer in the secondary window 88
Changing a layer automatically 88
Loading a local layer 88
Deleting local layers 89
Closing layers 89

Camera image controller 90


Camera image control icons 90
Manual recording 91
Swivelling the camera in the image 92
iSearch 92

Maps 93
Displaying a camera preview 93
Using the lasso function 94

Web pages 95

5 / 251
Contents

Overview 96
Searching for an object 96

Control 97
PTZ control 97
Creating and deleting a preset camera position 99
Buttons 99
Patrol 99
Starting a patrol 99
Stopping a patrol 100
Pausing a patrol 100
Repeating a patrol 100
Navigating between points in the patrol 100
Audio 100
Dispatcher mode 101

Alarm list 102


Alarm messages 102
Changing the alarm status 102
Message window (pop-up) 103
Alarm notification 103
System messages 104

Archive mode 105


Camera overview 105

Archive player 106


Using the jog dial 107
Timeline / time stream 107

Exporting recordings 108


AVI export 108
Exporting as JPEG image seguence 109
Image data export 109
Evaluating exported image data 109

Setting a write protection 111

Editing an area 112

Searching for alarms 113

Working with bookmarks 114


Adding a bookmark 114
Bookmark overview 115

iSearch 116
iSearch in archive mode 116
Keypad 116
iSearch in surveillance mode 116
Creating a search area 116
Deleting a search area 117

6 / 251
Contents

Configuring a search 117


iSearch in expert mode 118

Report mode 119

Filtering the analysis 120

Exporting the analysis 121

Saving a query 122

Configuration mode 123


Searching for objects 123
Additional settings 123
Status report for automatic image export 123

The Configuration wizard 125


Creating a camera 125
Creating an alarm 125
Find cameras 125
Searching for devices 126
Adding individual devices 126
Adding multiple devices 127

Company 128
About the relationship between the company and its branches 128
Working with branches 128
Creating a branch or branch group 128
Editing the name of a branch or branch group 129
Organizing branches in groups 129
Deleting a branch or branch group 129
Displaying a branch overview 129

Administration 130
Functions 130
Editing menu 130
Concept 131
Schematic diagram of rights and profiles 131
Administrative rights and user rights 131
Multi-level administration 132
Profiles 132
Cameras 132
Creating a new camera 132
Selecting and deselecting multiple cameras at once 134
Configuring multiple cameras 134
Configuring a camera 135
Encoder/camera 135
General 135
Digital inputs 135
Camera 136

7 / 251
Contents

General 136
Image storage - Multimedia database 137
Image storage - Edge storage 138
Video streams 138
Audio 140
Video gateway 140
Camera positions 140
Image data export 140
Server side operation 140
Server side operation: Motion detection 141
Server side operation: Reference image comparison 141
Server side operation: Tampering detection 141
Camera side operation: Motion detection 142
Camera side operation: Tampering detection 142
Privacy masking 142
Privacy masking: Static objects 142
Privacy masking: Moving objects 142
Privacy masking: Office mode 142
Record on motion 143
Duplicating a camera 143
Deleting a camera 143
Converting a camera 143
Other hardware 144
Working with other hardware 144
Creating new hardware 144
Integrating other hardware 145
Configuring hardware 145
Deleting hardware 145
Duplicating hardware 145
SeeTec 145
SeeTec network I/O 146
General 146
Inputs 146
Outputs 146
Display agent video wall 147
VoIP 147
General 147
Voice over IP recording 147
SeeTec Video Analytics 147
Generic VCA Channel 148
License plate recognition 148
Lane configuration 148
List configuration 149
SeeTec Analytics 149
Adding the SeeTec Analytics module 150

8 / 251
Contents

General 150
Tripwire 152
AOI (Area of interest) 153
Scene change 154
SeeTec Counting Suite 154
Overview of the SeeTec Analytics packages 154
Advantech 154
General 154
Inputs 155
Outputs 155
Wago 155
General 155
Inputs 155
Outputs 155
Third-party interface 156
eyevis wall 156
General 156
SPC alarm system 156
General 156
Areas 156
Rules 156
Access control 157
Creating a new access control 157
Deleting access controls 157
Editing an access control 158
Users 158
Creating a new user 158
Configuring a user 158
General 158
Password 159
Rights options 159
Managing user rights 159
Managing administrative rights 160
Deleting a user 160
Duplicating a user 161
Groups 161
Creating a new group 161
Configuring a group 162
General 162
Rights options 162
Using Windows® Active Directory® 162
Managing user group rights 162
Managing administrative rights 163
Deleting a group 163
Duplicating a group 163

9 / 251
Contents

Profiles 163
Configuring a profile 163
Image settings 164
Streaming (MPEG-4, H.264) 164
Video classification (for multistreaming) 164
Video wall module mapping 165
Time manager 165
Creating a new time manager 165
Configuring a time manager 166
Deleting a time manager 166
Duplicating a time manager 166
Alarms 166
Creating a new alarm scenario 166
Creating an alarm scenario with the wizard 167
Configuring an alarm scenario 167
General 167
Start 168
Expert mode 168
End 168
Visualization 168
Persons involved 169
Server 169
E-mail and FTP 169
Deleting an alarm scenario 170
Duplicating an alarm scenario 170
Layers 170
Creating a new layer 170
Configuring a layer 171
Deleting a layer 171
Duplicating a layer 171
Maps 171
Creating a new map 172
Configuring a map 172
Deleting a map 172
Duplicating a map 172
Buttons 173
Creating a new button 173
Configuring a button 173
General 173
Action 174
Deleting a button 174
Duplicating a button 174
Web pages 174
Creating a new web page 175
Configuring a web page 175

10 / 251
Contents

Deleting a web page 175


Duplicating a web page 175
Patrols 175
Creating a new patrol 176
Configuring a patrol 176
Deleting a patrol 176
Duplicating a patrol 177
Sequences 177
General information on sequences 177
Creating a new sequence 177
Configuring a sequence 177
General 178
Actions 178
Deleting a sequence 178
Duplicating a sequence 178
Video walls 178
Creating a new video wall 179
Configuring a video wall 179
Deleting a video wall 179
Duplicating a video wall 179
License plate groups 179
Creating a new license plate group 180
Configuring a license plate group 180
Deleting a license plate group 180
Duplicating a license plate group 180
Server 180
Configuring the CoreService 181
Configuring the Device Manager (DM) 181
General 181
Options 181
Image data export 181
Automatic image data export to the server 181
Manual image data export 182
Configuring the global OCR settings 182
Configuring the LPR module 183
Configuring the transcoding module 183
Configuring the generic DVR module 184
Configuring an Access control module 184
System 184
Configuring the video classification 184
Configuring the company calendar 185
Configuring the backup 185
Configuring the Event Manager 186
General 186
Error/warning/info 186

11 / 251
Contents

Configuring the SMTP server 187


Configuring the Email Manager 187
Alarm addresses and system addresses 187
Configuring the SNMP server 187
SNMP v1/v2 188
SNMP v3 188
Configuring the NAT list 188
Configuring the entity numbering 188
Configuring the AlarmWatchDog 189

Video Analytics 190

Installing the Video Analytics module 191

Adding and configuring the module in the SeeTec VA Administration tool 192

Configuring the module in Configuration mode 193

Count analysis 194


Requirements 194
Adding a new scenario 195
Editing a scenario 195
Searching occurrences of rules 196
Deleting a scenario 196
Adding a new template 196
Editing a template 197
Searching occurrences according to the template 197
Deleting a template 197
Configuring a complex scenario 197
Configuring a complex scenario 198
Removing an item 199
Deleting a complex scenario 199
Configuring an individual query 199
Adding an individual query 199
Editing a query 199
Deleting a query 199
Defining a report 199

Controlling the Cayuga client remotely 201

Activating the Remote Desktop connection 202

Activating the Terminal Server connection 203

Possible issues when using remote control 204

Admintools 205

SeeTec VA Administration Tool 207


Switching the display language 207
Creating a new configuration file 208

12 / 251
Contents

Adding an LPR module 208


Adding an AlarmManager Extension module 209
Adding an ObjectVideo module 210
Adding a Transcoding engine module 210
Adding a gateway service module 211
Adding an Analytics interface module 211
Adding server-based motion detection module 212
Adding a Generic DVR module 212
Adding an Access Control module 213

SeeTec Administration Tool 214


General settings 215
Management database (MaxDB) 215
Backup and restore 215
Increase storage space (add volume) 216
Cache 217
Multimedia database 217
About zones 217
Add zone 217
Add zone in network drive 218
Editing a zone 218
Remove zone 218

SeeTec ServiceManager 219


Switching the display language 219
Editing the settings 220
Starting and stopping the services 220

UpdateService Configuration Tool 222


Configuring the UpdateService 223
Manually triggering an action 224
Configuring a group 224
Creating a group 225
Renaming a group 225
Deleting a group 225
Update and patch settings 225
Editing the Server configuration 226
Configuring the FTP server 227
Import of updates and patches at the UpdateAgent 227

LPR mode 228


Editing LPR master data 228
Displaying license plate recognition details 228
Player 229
Call license plate 229

Command line parameters 230

13 / 251
Contents

Shortcut key 232

The SeeTec Cayuga Viewer 233

Switching the display language 234

Select and play recording 235


Play recording 235

Export a recording 237

Save sequence as AVI file 238

Selecting multiple layers 239

Configuring the SeeTec Mobile Client 240

Installing the Mobile Client on a mobile device 241

Installing the SeeTec Mobile Client services on the SeeTec server 242

Configuring the SeeTec Mobile Client on the mobile device 243

Connecting with the SeeTec Mobile Client 244

Using the AlarmWatchDog 245

Configuring the AlarmWatchDog 246

Using the AlarmWatchDog 248

The Cayuga web client 249


Overview 249

Installing the web client 250

Remarks, limitations and known issues 251

14 / 251
Legal notice

Legal notice
This document is an integral part of the software shipped by SeeTec (referred to hereinafter as the
vendor) and describes how to use and configure the software and the associated components.
The English version of the document is the original version. All translations are based on the Eng-
lish original.

Copyright
This document is protected by copyright. It is not permissible to pass on the information it con-
tains to third parties without the vendor's expression permission. Any infringements will result in
claims for damages.

Patent and copy protection


In the event of protection being provided by a patent, utility model or registered design, all rights
are reserved. Brand names and product names are trade names or registered trademarks of their
companies or organizations.

Address
SeeTec AG
Werner-von-Siemens-Str. 2 - 6
D-76646 Bruchsal
Tel: +49 (0)7251/9290-0
Fax: +49 (0)7251/9290-815
Email: [email protected]
Internet: http://www.seetec.de

Subject to alterations, errors and misprints.

Support
https://support.seetec.eu/

Image acknowledgment
Insert in Camera image controller image at www.istockphoto.com - IGphotography

15 / 251
Legal notice

Version
This manual corresponds to the software Cayuga R6 (Version 6.6.0).

16 / 251
Support

Support

Reporting a software problem


If you discover a software problem, report it using the helpdesk portal at https://support.seetec.eu.
For assistance, please provide the Version - p.16 of the manual as well, as it is updated on a reg-
ular basis and the installed version may be outdated.
If the Installing and configuring the UpdateService and the UpdateAgent - p.41 is installed
and configured, the client will automatically check for new versions of the software and the help
system.

17 / 251
1
Introduction
Exploit hidden potential with SeeTec!
Many thanks for opting for a SeeTec software solution.
SeeTec is a leading vendor of video management software and has been developing and dis-
tributing software solutions for security applications since the year 2000. SeeTec also offers
industry-specific solutions for transportation and logistics, retail and trade, financial services and
critical infrastructure and cities. These applications support the business processes of our cus-
tomers and allow hidden potential to be exploited, thus making them more successful.
The Multi Solution Platform system concept provides the basis for this. In addition to the core
products SeeTec S50, S100 and Infinity, it includes a wide range of expansion options and inter-
faces to numerous third-party systems in the fields of access control and building management,
for example. As a modular software construction kit, the Multi Solution Platform allows custom,
industry-specific video solutions to be implemented that are infinitely scalable over time.
SeeTec Cayuga, the sixth generation of our video management software, is an extremely flexible
series of products suitable both for small-scale projects involving only a few cameras and for com-
plex and extensive installations involving multiple servers.
In this guide you will find information on the installation and configuration of the Cayuga software
and an overview of the frequently used functions.

Product lines
n SeeTec Cayuga S50/S50X: This is an attractively priced yet powerful entry-level solution
for small-scale projects involving up to 50 cameras.
n SeeTec Cayuga S100: This is the SeeTec solution for medium-sized installations. It allows
intelligent video analysis to be used and third-party systems to be integrated.

18 / 251
Introduction

n SeeTec Cayuga Infinity//Infinity X: This is the flagship of the SeeTec Cayuga product
series, offering the most extensive functional scope. There is no limit on the size of the pro-
jects that can be implemented.

19 / 251
2
Functional overview

20 / 251
Functional overview

Cayuga consists of various services that communicate with each other within a closed network
and over the Internet. Installations are possible on multiple computers, and an unlimited number of
servers, clients and devices can be added to the system. In addition, the database can be
installed at multiple distributed sites (multicore) to ensure network independence.
The system essentially consists of server applications and client applications.

Server
One or more server applications manage the connected devices and databases, providing the cli-
ents with the required data.

Redundant system management


The video management system has the option of redundancy of the core service master (central
core service) in the form of a core service slave (redundant core service). The redundancy concept
sets the core service slave as the primary active contact and makes it available for the services.
If the core service slave fails, the core service master automatically takes over its tasks. This
allows the active clients to continue operating virtually without interruption and without requiring
restart. Restart is also available without restrictions.
The failure of the connection to the core service slave is shown immediately on occurrence in the
GUI of the native client (client that is currently running on the server). The system switches back
to the core service slave as soon as the connection is re-established. During the failure of the core
service slave or the core service master, the essential functions of the native client remain avail-
able.
If the connection to the core service master fails, the configuration, report mode, backup, event
display, event cleanup and vertical modules of the system are not available, but the system can
continue to be operated.

Redundant recording
If a device manager (multimedia database) fails, the concept of redundant recording offers the
option of assigning the cameras assigned to the device manager to be assigned to a predefined dif-
ferent device manager. The second device manager can be a standard device manager or a
device manager specially defined for redundancy purposes.

Client
A client application has a user interface that makes one or more modes available to the user (see
below). Multiple client applications can access a single server application.

Surveillance mode
In surveillance mode the live pictures of all of the connected cameras and incoming alarms are dis-
played. The PTZ cameras can also be controlled here. In addition, it is possible to search the
image data on the basis of specific criteria.

Archive mode
In archive mode the recorded image and event data (e.g. alarms) is displayed. The recordings can
be searched and exported.

21 / 251
Functional overview

Report mode
In report mode the events that occur (e.g. alarms and user logins and logouts) are displayed and
can be analyzed.

Configuration mode
All settings and adjustments made to the system are made in configuration mode. These include
the multiple configuration of video sources (e.g. cameras), user authorization management and
user interface settings.

LPR mode
License plate recognition (OCR) of the live images of the applicable cameras is performed on the
server. In LPR mode, the recognized license plates are compared with the stored master data and
can be linked to actions.

22 / 251
3
Installation

Information on installation
When migrating from SeeTec 5 to SeeTec 6 Cayuga, the CoreService master has to be
defined. This cannot be changed at a later state (e.g. changing to CoreService slave), as
it will result in data loss.
n Multiple scripts are used for installation, so you should disable any active virus scanners
for the duration of installation.
n Cayuga must not be installed on a compressed drive, since this can result in problems with
the database. A drive on which Cayuga is already installed must not be compressed sub-
sequently.
n DirectX is installed during installation, and Microsoft .NET Framework 4 as well, which
may require a restart in the case of a first-time installation. DirectX is required, for example,
for joystick control and MPEG-4/H.264 display. If you receive an error message telling you
that DirectX could not be installed, you must install it subsequently. You will find the setup
file in the Tools folder on the SeeTec DVD. Use only this version that is shipped with Cay-
uga.
n The DirectX installer for 32bit systems is found in D:\Software\32-Bit\DirectX9c,
where "D" is the DVD drive.
n The DirectX installer for 64bit systems is found in D:\Software\64-Bit\DirectX9c,
where "D" is the DVD drive.
n Before installation, the ZIP packed files must be unpacked. After unpacking, the
files are located in the folder \DirectX9c.
n When firewalls or virus scanners are used, you should disable the web guard/browser pro-
tection function or a similar function, since these programs prevent communication

23 / 251
Installation

between the server services. The use of web guards, behavioral monitoring etc. (e.g. of
virus scanners) is not supported.
n The SeeTec AutoUpdater is always installed.

Setup types
n Client & Server. This installation type installs the client and server modules on the com-
puter (see Standard installation (Client & Server) - p.33).
n Client. This installation type installs only the client modules (see Client installation -
p.35).
n Distributed server. This installation type installs only the client and the server services for
the cameras (DM/MDB) on the selected computer (see Installation of a distributed
server - p.37).
n User-defined. In a user-defined installation, it is possible to install only specific com-
ponents on a computer (see Carrying out a user-defined installation - p.39)

Firewalls
n Multiple ports on the server computer must be available by default to allow the Cayuga soft-
ware to function correctly in a network environment with a firewall. These are in the range
from 60000 to 60008 (TCP communication), 63000 (TCP, AutoUpdate) and 60007 (UDP,
image transmission).
n The client must also be accessible at ports 60000-60008, 63000 (TCP) and 60007 (UDP).
n The TCP alarm ports of the camera must also be accessible on the server computer that
administers a camera to guarantee alarm processing.
n Some cameras use the RTSP over RTP over UDP standard for MPEG4 image trans-
mission. In this case, the SeeTec server sends the requirements (e.g. frame rate and res-
olution) to the camera via TCP port 554. The camera sends the image data to the server via
a UDP port.
The corresponding ports must therefore not be blocked between the camera and the
SeeTec server.

24 / 251
Installation

System requirements

Known limitations
The performance requirements of the SeeTec server services depend, above all, on the video
volume transferred and the storage hardware.
The server software can only be installed on computers with the NTFS file system.
For the server, an additional 25 MB of RAM should be available for each camera.
Note that the hardware requirements depend very greatly on the configuration. Cayuga is based
on an advanced software architecture in response to technological progress. SeeTec recom-
mends a 64bit operating system for data-intensive clients in order to enable the use of the SeeTec
64bit client.
If in doubt contact our support.
n 32bit operating systems:Per server max. 80 devices
n 64bit operating systems:Per server max. 250 devices
n Maximum number of servers: 250 servers within a distributed installation
n Maximum number of cameras per system: 5000

Requirements for remotely controlling the Cayuga client


The Cayuga client can be remotely controlled with applications such as Windows® Remote
Desktop or Teamviewer® remote control software.
n .NET 4.5 framework

Requirements for the Help system


n Current browser (e.g. Mozilla Firefox, Internet Explorer, Google Chrome) with JavaScript
activated

General recommendations
Virtual environments
n We recommend not to use clients in virtual environments, because the rendering per-
formance is severely decreased
n We recommend dedicated network interfaces
n Virtualization could need more CPU power than its physical counterpart, additional CPU
performance may be necessary
n We recommend network storage instead of local storage
n Because virtualization decreases performance, we recommend testing the planned server
environment
n Cayuga is compatible with Citrix XEN, VMware vSphere and Microsoft Hyper-V

Thin clients
Thin Client environments are not supported.

25 / 251
Installation

CPU recommendations
Video processing needs a lot CPU power. We recommend always to use the latest powerful CPU
models.
You can find a comparison at https://www.cpubenchmark.net/high_end_cpus.html

26 / 251
Installation

System parameters

System parameter Description and comments Value

MaxChanSys Maximum number of video channels to be served by Cayuga for the 5000
whole system
MaxChanDM Maximum number of video channels per DeviceManagement (DM) 250
server (a reduction of the number of video channels might be advisable
depending on the number of video recordings to be stored)

MaxChanDMAnalytics Maximum number of video channels per DeviceManagement server, if 20 - 80


video analytics will run on the same server (the final amount of video
channels will depend on the performance consumption of the applied
analytics software)

27 / 251
Installation

Modules

Modules Supported operating systems Notes

Core Service n Microsoft Windows® 7 (Home Premium, Pro- n Only listed OS are supported
Device Management fessional, Ultimate, Enterprise) 32 Bit and 64 Bit n Windows embedded not supported
Multimedia Database n Microsoft Windows® 8 / 8.1 (Standard, Pro- n Counting Suite works only as 32 Bit process
fessional, Enterprise) 32 Bit and 64 Bit within a 64 Bit OS
Versatile Applications (i.e. Ana-
n Microsoft Windows Server® 2008 (Standard, Windows 2008 R2 (64 Bit) is recommended
lytics, LPR) n
Enterprise) 32 Bit and 64 Bit
n Contact SeeTec Sales Experts or Support for
n Microsoft Windows Server® 2008 R2 (Standard,
use of Virtual Machines
Enterprise) 32 Bit and 64 Bit
n Microsoft Windows Server® 2012 (Standard, Data-
center) 32 Bit and 64 Bit
n Microsoft Windows Server® 2012 R2 (Standard,
Datacenter) 32 Bit and 64 Bit
SDK n Microsoft Windows® 7 (Home Premium, Pro- n Only listed OS are supported
Native Client fessional, Ultimate, Enterprise) 32 Bit and 64 Bit n Windows embedded not supported
n Microsoft Windows® 8 / 8.1 (Standard, Pro- n Windows 7 (64 Bit) is recommended
fessional, Enterprise) 32 Bit and 64 Bit
n Microsoft Windows Server® 2008 R2 (Standard,
Enterprise) 32 Bit and 64 Bit
n Microsoft Windows Server® 2012 (Standard, Data-
center) 32 Bit and 64 Bit
n Microsoft Windows Server® 2012 R2 (Standard,
Datacenter) 32 Bit and 64 Bit
Mobile Client for iPhone/iPad Apple iOS devices with iOS 4.x or higher n Optimized for iPad
Mobile Client for Android Android devices with Android version 2.3 "Gingerbread"
or higher
Webclient n Google Chrome 35.0 n Google Chrome recommended

28 / 251
Installation

Modules Supported operating systems Notes

n Mozilla Firefox 29.0


n Microsoft Internet Explorer 11
n Apple Safari
n Opera
BVI Server n Microsoft Windows Server® 2008 (Standard, n Only listed OS are supported
Enterprise) 64 Bit n Windows embedded not supported
n Microsoft Windows Server® 2008 R2 (Standard, n Windows 8 / 8.1 not supported
Enterprise) 64 Bit n Windows 2012 / R2 not supported
n Windows 2008 R2 (64 Bit) is recommended
BVI Client n Microsoft Windows® 7 (Home Premium, Pro- n Only listed OS are supported
fessional, Ultimate, Enterprise) 64 Bit n Windows embedded not supported
n Microsoft Windows Server® 2008 (Standard, n Windows 8 / 8.1 not supported
Enterprise) 64 Bit n Windows 2012 R2 not supported
n Microsoft Windows Server® 2008 R2 (Standard, n Windows 7 (64 Bit) is recommended
Enterprise) 64 Bit

29 / 251
Installation

Type of installation

Type of installation Hardware requirements Notes

Core Service Recommended:


n CPU: Intel® Core i7-4930K @ 3.40GHz, or Intel
Xeon E5-2640 v3 @ 2.60GHz
n RAM: 16 GB (<1000 video channels), 24 GB (>1000
video channels)
n HDD: 500 GB free disk space @ 7200 RPM
n Network: Ethernet with 1000 MBit/s
Minimum:
n CPU: Intel Core i3 M 370 @ 2.40GHz
n RAM : 4 GB
n HDD: 100 GB free disk space
n Network: Ethernet with 1000 MBit/
Core Service Recommended:
Device Management n CPU: Intel® Core i7-4930K @ 3.40GHz, or Intel
Xeon E5-2640 v3 @ 2.60GHz
n RAM: 16 GB (<250 video channels), 24 GB (>250
video channels), 32 GB (>1000 video channels)
n HDD: 500 GB free disk space @ 7200 RPM
n Network: Ethernet with 1000 MBit/s
Minimum:
n CPU: Intel Core i3 M 370 @ 2.40GHz
n RAM : 4 GB
n HDD: 100 GB free disk space
n Network: Ethernet with 1000 MBit/
Device Management (DM) Recommended:

30 / 251
Installation

Type of installation Hardware requirements Notes

n CPU: Intel® Core i7-4930K @ 3.40GHz, or Intel


Xeon E5-2640 v3 @ 2.60GHz
n RAM: 16 GB
n HDD: 500 GB free disk space @ 7200 RPM
n Network: Ethernet with 1000 MBit/s
Minimum:
n CPU: Intel Core i3 M 370 @ 2.40GHz
n RAM : 4 GB
n HDD: 100 GB free disk space
n Network: Ethernet with 1000 MBit/
Versatile Applications (i.e. See DeviceManagement (DM) Contact SeeTec sales experts or support to get a precise
Analytics, LPR) recommendation.
Native Client Recommended: n Deviation from the recommendation can cause stum-
n CPU: Intel® Core i7-4930K @ 3.40GHz bling rendering and other negative side effects
n RAM: 16 GB n Onboard graphic is not supported
n HDD: 50 GB free disk space @ 7200 RPM n We recommend not to use Nvidia NVS or Nvidia
n Network: Ethernet with 1000 MBit/s Mobile graphic cards
n Graphics adapter: AMD R9 290 with at least 4 GB n Graphic cards with at least 1 GB RAM recom-
DDR5 mended
Minimum: n We recommend ATI Radeon HD 5450 (2GB RAM)
for small or medium systems with up to two mon-
n CPU: Intel Core i3 M 370 @ 2.40GHz
itors
n RAM : 4 GB
n HDD: 10 GB free disk space
n Network: Ethernet with 100 MBit/s or faster
n Dedicated graphics adapter without shared
memory, 16 Mio. colors, supporting DirectX 9.0 or
higher
Minimum display resolution:
n 1280 x 768 (with text size 100%)
n 1600 x 960 (with text size 125%)

31 / 251
Installation

Type of installation Hardware requirements Notes

n 1920 x 1152 (with text size 150%)


BVI Server Minimum:
n CPU: Intel® Core i7-4930K @ 3.40GHz, or Intel
Xeon E5-2640 v3 @ 2.60GHz
n RAM: 16 GB
n HDD: 500 GB free disk space @ 7200 RPM
n Network: Ethernet with 1000 MBit/s
BVI Client See Native Client - p.31, but at least 16 GB RAM man- See Native Client - p.31
datory

32 / 251
Installation

Standard installation (Client & Server)


The standard installation installs the system with the client and server on a single system ("Client
& server").
1. Insert the data carrier in the drive. If you have received a ZIP archive, copy it to the computer
on which the software is installed and unpack the file.
2. Double-click Setup to start installation.
3. Select the installation language. You can configure the language of the user interface after
installation (see Configuration mode - p.123).
4. Click OK to start installation.
5. Read the software license agreement, and then click Next. The program can only be installed
if the End User License Agreement is accepted.
6. Select the destination folder.
7. Select "Client & server" as the setup type.

It is recommended to leave the port number of the management service unchanged at


"60000".If the port number must be changed, contact the SeeTecSupport - p.17 before apply-
ing changes.
8. Select IP addresses/host names found as the network address. The client logs in to the
server using this IP address. The installation program shows you all of the existing network
addresses and host names of the PC or server.
9. Neither the IP 127.0.0.1 nor the host name "localhost" must be used for communication with
the server.
10. If the update server needs to be installed on a different host, enter the IP address for the host
of the Update service (see Installing and configuring the UpdateService and the
UpdateAgent - p.41).

33 / 251
Installation

By default, the UpdateService uses port 63000 and 63001 to communicate with the
UpdateAgents.
11. Click Next.

12. Alter the existing path for image storage, or delete or add further folder paths. If the folder is
created on a network drive, enter the complete UNC path.
Example1
13. If the network drive is protected with a user name and password, select Using network
authorization and click Authorization.
14. Enter the user name and password for accessing the network drive, and then click OK.
Ensure that the specified user is available locally and that the domain is included in the user
name field (e.g. "Domain\\User name").
15. Click Next.
16. When asked, accept the EULA (End User License Agreement) for installing the DirectX 9
component.
17. Click Install.
Cayuga is now installed on your computer. If the UpdateService has been installed, the service
will now connect to the Update server and download the newest files, if available. To find out how
to start the program and modules, see Login - p.48.

1"\\IP address\Release name\Path..."

34 / 251
Installation

Client installation
In the client installation, only the client is installed on the computer.
1. Insert the data carrier in the drive.
If you received the software as a download, copy it to the desktop of the computer on which
the software is installed and unpack the copy.
2. Double-click Setup to start installation.
3. Select the installation language.
You can configure the language of the user interface after installation (see also Con-
figuration mode - p.123).
4. Click OK to start installation.
5. Read the software license agreement, and then clickNext.
The program can only be installed if the End User License Agreement is accepted.
6. Select the destination folder.
7. Select "Client" as the setup type (see also "Installation").

8. It is recommended to leave the port number of the management service unchanged at


"60000".
If the port number must be changed, contact the SeeTec Support before applying changes.
9. Select IP addresses/host names found as the network address. The client logs in to the
server using this IP address. The installation program shows you all of the existing network
addresses and host names of the PC or server.
Neither the IP 127.0.0.1 nor the host name "localhost" must be used for com-
munication with the server.

35 / 251
Installation

10. Enter the IP address for the host of the Update service (also refer to Installing the Cayuga
UpdateService and the UpdateAgent).
By default, the UpdateService uses port 63000 and 63001 to communicate with the
UpdateAgents.
11. Click Next.
12. When asked, accept the EULA (End User License Agreement for installing the DirectX 9 com-
ponent.
13. Click Install.
The Cayuga client is then installed on your computer. If the UpdateService has been installed, the
service will now connect to the Update server and download the newest files, if available. To find
out how to start the program and modules, see Login.

36 / 251
Installation

Installation of a distributed server


In distributed server installation, only the database modules for the image database are installed
together with the client on a different computer from the already installed client and core server.
The distributed server reduces the utilization of the core server because the image database is loc-
ated partially or entirely on the distributed server.
In order to configure the server, you need an installed and configured Cayuga client
and core server (see Standard installation (Client & Server) - p.33).

1. Insert the data carrier in the drive. If you have received a ZIP archive, copy it to the computer
on which the software is installed and unpack the file.
2. Double-click Setup to start installation.
3. Select the installation language. You can configure the language of the user interface after
installation (see also Configuration mode - p.123).
4. Click OK to start installation.
5. Read the software license agreement, and then click Next. The program can only be installed
if the End User License Agreement is accepted.
6. Select the destination folder.
7. Select "Distributed server" as the setup type (see also Installation - p.23).

8. Specify the IP address of the main Core Service Master (CSM) server as the host in the "Man-
agement service" area.
9. Leave the port number unchanged at "60000".
10. Select a IP address/host name for server communication as the network address. The cli-
ent logs in to the server using this IP address. The installation program shows you all of the
existing network addresses and host names of the PC or server.
Neither the IP 127.0.0.1 nor the host name "localhost" may be used for com-
munication with the server.
11. Enter the IP address for the host of the Update service (also refer toInstalling and con-
figuring the UpdateService and the UpdateAgent - p.41).

37 / 251
Installation

By default, the UpdateService uses port 63000 and 63001 to communicate with the
UpdateAgents.
12. Click Next.

13. Alter the existing path for image storage, or delete or add further folder paths. If the folder is
created on a network drive, enter the complete UNC path.
Example1
14. If the network drive is protected with a user name and password, select Using network
authorization and click Authorization.
15. Enter the user name and password for accessing the network drive, and then click OK.
Ensure that the specified user is available locally and that the domain is included in the user
name field (e.g. "Domain\\User name").
16. Click Next.
17. Click Install. The Cayuga server is then installed on your computer.
18. Start the SeeTec Service Manager in the SeeTec Cayuga folder.
19. Use the SeeTec Service Manager to start the services. The distributed server connects to the
main server automatically.
The required ports 60000 - 60008 for communication between the distributed server and the
main server must be open.
20. If the UpdateService has been installed, the service will now connect to the Update server
and download the newest files, if available.
21. Configure the system with the SeeTec client (see Configuration mode - p.123).

1"\\Server name\Release name\Path..." or "\\IP address\Release name\Path..."

38 / 251
Installation

Carrying out a user-defined installation


In a user-defined installation you can install selected modules. It is also possible to install a further
core server in slave mode that serves as a redundant server and thus increases the reliability of
the core server.
For a description of the components for the user-defined installation, see Components for the
user-defined installation - p.40
1. Insert the data carrier in the drive.
If you received the software as a download, copy it to the desktop of the computer on which
the software is installed and unpack the copy.
2. Double-click Setup to start installation.
3. Select the installation language.
You can configure the language of the user interface after installation (see also Con-
figuration mode - p.123).
4. Click OK to start installation.
5. Read the software license agreement, and then click Next.
The program can only be installed if the end user license agreement is accepted.
6. Select the destination folder.
7. Select "User-defined" as the setup type (see also Installation - p.23).

8. Select the desired services and features.


You can deselect services and features that are not required.

IMPORTANT: if a previously installed service is deselected, it will be removed. For


installation of the UpdateService on the server and the UpdateAgent on the client,
refer to Installing and configuring the UpdateService and the UpdateAgent - p.41.
9. Click Next.
10. Click Install.
11. When asked, accept the EULA (end user licence agreement) for installing the DirectX 9 com-
ponent.

39 / 251
Installation

The modules and services are now installed on your computer.

Components for the user-defined installation


The following components are available.

Client components
n Client (32bit): The client for 32bit operating system
n Client (64bit): The client for 64bit operating system
n Mobile client: The server-side mobile client components to connect with mobile apps on
iOS and Android platforms
n Mobile client: The server-side web client components to connect with web-browsers
n Viewer: the offline viewer to see recorded images

Server components
n CoreService Master: The master core services and management database
n CoreService Slave: The slave core services and management database

Slave and master cannot be installed simultaneously on the same machine.


n Device Manager & MediaDatabase: The services for the DeviceManager and Media-
Database. These services are mainly responsible for image handling processes
n UpdateService: The UpdateService is managing the update and patch processes on the
UpdateAgents (see Installing and configuring the UpdateService and the UpdateA-
gent - p.41")
n OPC Service: The "Open Platform Communications" interface provides a standardized
data exchange between applications and devices in real time (see Technical Guide on
OPC Service (Cayuga R3 or later).
n GatewayService: The GatewayService is required to use mobile and Web clients (see
Installing the SeeTec
Mobile Client services on the SeeTec
server - p.242")
n TranscodingService: The TranscodingService is required to use mobile and Web clients
(see Configuring the transcoding module - p.183)
n Analytics: The server side components for SeeTec VideoAnalytics features (e . g. Ana-
lytics, License plate recognition)

Tools
n SDK (32-bit): The 32-bit components of the SDK for use in third-party software
n SDK (64-bit): The 64-bit components of the SDK for use in third-party software

40 / 251
Installation

Installing and configuring the UpdateSer-


vice and the UpdateAgent
The Cayuga UpdateService installs the downloaded updates and patches on the connected cli-
ents (UpdateAgents). This enables automatic installation of updates and patches for multiple cli-
ents. For this, the Cayuga UpdateService is installed on the core service master. The
UpdateAgent will be automatically installed and activated on the associated clients.

Installing the Cayuga UpdateService


The UpdateService is installed on the main server (core service master) by default (see Install-
ation of a distributed server - p.37).
To install and run the UpdateService on a different server than the core service master,
it has to be removed from the main server before installation (see Customization and
repair - p.43).

Only one server should be the UpdateService server. Having multiple UpdateService
servers is not recommended.

1. Before installing updates with the UpdateService (e.g. from Cayuga R3 to Cayuga R6),
update all UpdateAgents with the current UpdateService (e.g. Cayuga R3).
2. Select the server that runs the UpdateService.
3. Provide the IP address of the server for the UpdateService.
4. Check that ports 63000 and 63001 are not blocked by the firewall.
By default, the UpdateService uses port 63000 and 63001 to communicate with the UpdateA-
gents.
5. Select the "UpdateService" component in the server components of the user-defined install-
ation and install (see Installing and configuring the UpdateService and the UpdateA-
gent - p.41).
6. If SeeTec Cayuga is already installed, run the installer again from the control panel of the oper-
ating system and select Change. (To modify installed applications, refer to the operating sys-
tem manual.)
7. Start the VMS_UPDATESVR service if not already running (seeSeeTec ServiceManager -
p.219).

Configuring the Cayuga UpdateService


The configuration application will be installed automatically with the Cayuga UpdateService on the
server. For configuration settings, see the section on the UpdateService Configuration Tool -
p.222.

Manually configuring and activating the UpdateAgent


The UpdateAgent is installed automatically (see Standard installation (Client & Server) - p.33).
After installation, the UpdateAgent is enabled and configured by the installer by default.

41 / 251
Installation

If the IP address of the UpdateServer has changed, the UpdateAgent has to be configured manu-
ally in the configuration file of the UpdateAgent.
1. Open the configuration file "/conf/updateclient.conf.xml" in the installation directory.
2. Set the new IP address of the UpdateService. The IP address is identical to the network
address of the client with the UpdateService installed.
Example1
3. Restart the VMS_UPDATER service. For restarting, see SeeTec ServiceManager - p.219.

1
updateclient.conf.xml
<?xml version="1.0"?>
<ServerInformation xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd-
d="http://www.w3.org/2001/XMLSchema">
<ip>10.0.8.131</ip>
<port>63000</port>
</ServerInformation>

42 / 251
Installation

Updating, customizing, repair and unin-


stallation
Updating 43
Customization and repair 43
Uninstallation 44

Updating
If a previous version of Cayuga is already installed, uninstalling the previous version is not
required before updating to a newer version. However, if any version of SeeTec 5 is installed, it
must be removed before upgrading (see Migrating from SeeTec 5.4.x to Cayuga - p.45).

Customization and repair


1. Open the Control Panel and select Programs and Features.
2. Select SeeTec Cayuga, and then click Change or Repair.

3. Select the desired option.


4. To update the program, select "Modify" and then Next. This allows you to carry out a user-
defined installation, in which you can install and uninstall the modules and services you
choose (see Carrying out a user-defined installation - p.39).
5. To repair the program, select "Repair" and then Next. Cayuga tries to repair and reinstall any
damaged program components itself.

43 / 251
Installation

6. To remove the program from the hard disk, select "Remove" and then Next. All components
of the program except for the configuration settings are deleted from the hard disk and
removed from the directory services.
7. To completely remove all traces of the program after uninstallation, delete the remaining
SeeTec folder in C:\Program Files manually.

Uninstallation
1. Open the Control Panel and select Programs.
2. Select Programs and Features.
3. Select SeeTec Cayuga, and then click Uninstall. All components of the program except for
the configuration settings are deleted from the hard disk and removed from the directory ser-
vices.
4. To completely remove all traces of the program after uninstallation, delete the remaining
SeeTec folder in C:\Program Files manually.
This step is necessary when performing a "clean installation", as the MaxDB data base will
be migrated when not removed manually.

44 / 251
Installation

Migrating from SeeTec 5.4.x to Cayuga


This section is intended for the preparation and implementation of a migration from SeeTec 5.4.x
to Cayuga. It describes the necessary steps of the analysis and the basic process. Please note
that the preparation, depending on the technical specification of the existing system, should start
well before the actual migration, since delivery times may have to be considered for hardware com-
ponents. The SeeTec support team can be contacted before migrating complex installations (eg.
logistics, CIT, etc.)
Recommended steps before migration 45
Compatibility matrix 45
Migrating procedure 46
After the installation 46

Recommended steps before migration


Migrating from SeeTec 5.4.x to Cayuga may require hardware and / or operating system
modifications or replacement of hardware components. Therefore SeeTec strongly
recommends to analyse the existing system well before the actual date of migration.
n Get an overview of changes and innovations in Cayuga by consulting the Readme doc-
ument in the installation directory.
n Make sure that you have a valid license for Cayuga.
n Capture the specification of the existing server and client hardware and compare it with the
requirements as described in the section on "System requirements".
Some graphics cards which are used in SeeTec 5.4.x, are not suitable for use with Cay-
uga because they do not or only partially support DirectX, e.g. Matrox graphic boards,
Nvidia Quadro NVS 290 or 420.
n Make sure that any device of the configuration is listed in the document SeeTecCayuga R6
Supported devices (PDF) and check the supported functionality.

Compatibility matrix
A direct upgrade is possible from SeeTec 5.4.0. onwards. Older SeeTec installations
must therefore be updated to SeeTec 5.4.x.

5.3.x 5.4.0 - 5.4.7 5.4.8 Cayuga R1


up to R5
5.3.x to - Yes Yes No
5.4.0 - 5.4.7 to No - Yes Yes
5.4.8 to No No - Yes
Cayuga R1 to No No No -
up to R5

45 / 251
Installation

Migrating procedure

Hardware and operating system already meet the requirements


1. Perform a backup of the MaxDB data base and the configuration directory.
2. In SeeTec Administration (Start Menu -> Programs -> SeeTec5) change to Management data-
base ( MaxDB ) and create a backup via the button Backup. The backup will be stored in
C:\Program Files\SeeTec\SAPDB\backup.
3. The configuration directory is located in: C:\Program Files\SeeTec\conf
4. Only for Windows Server 2012: Install the "Desktop Feature Experience" (go to "Server
Manager = > Manage => Add Roles and Features => Features => User Interfaces and Infra-
structure (Installed) = > Desktop Experience => Add Features => Next = > Install").
5. Uninstall SeeTec 5.x via the Windows Control Panel
6. Install Cayuga.
7. Install and activate a new license (see Import license file - p.77).

Migrating to new hardware and / or new operating system


1. Make sure that the existing SeeTec version is at least 5.4.0. If not, upgrade to the latest ver-
sion 5.4.x.
2. Perform a backup of the MaxDB data base.
3. In SeeTec Administration (Start Menu -> Programs -> SeeTec5) change to Management data-
base ( MaxDB ) and create a backup via the button Backup. The backup will be stored in
C:\Program Files\SeeTec\SAPDB\backup.
4. Only for Windows Server 2012: Install the "Desktop Feature Experience" (go to "Server
Manager = > Manage => Add Roles and Features => Features => User Interfaces and Infra-
structure (Installed) = > Desktop Experience => Add Features => Next = > Install").
5. Install Cayuga.
6. Start the SeeTec Administration Tool (Start Menu -> Programs -> SeeTecCayuga) on the
newly installed Cayuga system and restore the backup of the existing system under Man-
agement database (MaxDB).

Note that the backup must be available locally and must not be unpacked!
7. Install and activate a new license (see Import license file - p.77).

After the installation


n All users except the administrator are disabled.
n The administrator's password is reset to „pass“. (The passwords of all other users must be
reassigned during activation.)
n The services SeeTec5_ENT, SeeTec5_EVT, SeeTec5_AUTH, SeeTec5_ALARM and
SeeTec5_EXT will be migrated to ONE service called VMS_CORE. So there is only one
log file core.log and only one configuration file core.conf.xml
n All services are now starting with "VMS_".
n Indication of the storage volume is no longer possible at camera configuration / image stor-
age. It can only be configured for time limit. Cameras, for which a storage volume was con-
figured, will have a time limit set to 9999 days.
n The configuration of the services AvExport and Gateway service should be checked after
the migration in the SeeTec VA Administration Tool, as the configuration of SeeTec 5 is not
imported

46 / 251
Installation

n Server-side analytics configurations, such as Object Video or SeeTec motion detection


should be checked and recalibrated if necessary.

47 / 251
4
Login
Once the system is installed, you have to log in on the client in order to use the installed services.
To automate the startup of the client, multiple Command line parameters - p.230 can be passed
at startup in order, for example, to start the client with a different language or with predefined pass-
words.

48 / 251
Login

1. Start the SeeTec client in the SeeTecCayuga folder on the Start menu.

2. Enter the name of the user and the password.


Make sure the user name and password are entered correctly, because the system
distinguishes between upper and lower case (case-sensitive).
3. Apply your entry by clicking the blue check mark.
The client is started in surveillance mode (see Surveillance mode - p.83).

Logging in for the first time 50


Advanced options 51
Extending the network timeout 52

49 / 251
Login

Logging in for the first time


1. If you are logging in for the first time (i.e. without installing Cayuga beforehand), you have to
modify the default user password.
2. Enter the user name ("administrator") and default password ("pass").
3. Enter your new password.
4. Disable Enforce secure password if you do not require increased password security (see
Configuring a user - p.158).
5. If necessary, enter a second password (see Configuring a user - p.158).

50 / 251
Login

Advanced options
In the advanced options you can configure additional user management functions or log in as a
user with two passwords.
1. Click Advanced options in the login window.

2. From the drop-down list, you can select a different server in the network.
3. Enter a second password if you wish.
4. In the drop-down menu, select a comment or enter a new comment. Commenting can be
used to store additional information for the selected login.
5. In order to access an Active Directory service for the purpose of user management, select
Use Active Directory and use your Windows login details to enter the user name and pass-
word.
6. Select Remember user name and Remember password in order to avoid having to spe-
cify the user data. The system enters the specified user name and password in the login
window.
7. Select Log user in automatically to go straight to the user interface when the program
starts up.
8. Select Use NAT to use the client to access a different server over the Internet. Deselect
this option if no internet connection is required.

If you forget the administrator's password and haven't added any users to the admin-
istrator group, it is no longer possible to access the system configuration settings.

51 / 251
Login

Extending the network timeout


If the client cannot connect to the server because the time to connect is exceeded, a failure mes-
sage is displayed.
1. Extend the timeout interval and click OK. The login window is displayed.
2. Apply your entry by clicking the blue check mark.
The client is started in surveillance mode (see Surveillance mode - p.83). The client will try
to reconnect to the server within the new extended interval.

52 / 251
5
The user interface

The Cayuga user interface is subdivided into four different sections:


n The mode bar (1), which allows you to select the modes (see The mode bar - p.80)
n The menu bar (2), which allows you to choose functions regardless of the mode selected
(see The menu bar - p.55)

53 / 251
The user interface

n The Work area (3), which is the main window for displaying the selected mode functions
and – depending on which mode is selected – the Information control (4), which is dis-
played in the lower part of the work area. Similar to a browser window, the work area can
be displayed on multiple tabs.The information control is used for the alarm list and system
messages in surveillance mode, and for displaying search results in configuration mode
n The control bar (5), which contains the tabs for controlling the contents of the work area
(see The control bar - p.81)

54 / 251
The user interface

The menu bar

The menu bar contains the menus you can use regardless of the mode you have selected:
n File (1). Changes the settings of the client, the language, password, profile, installation,
installation manager, and switches the user.
n View (2). Manages the settings of the connected monitors and the video wall as well as the
LPR master data (see View - p.66).
n Tools (3). Displays and removes the write protection of recordings, configures the multiple
export of image data and defines the logo action (see Tools - p.72).
n Info (4). Displays information on the system and license (see Info - p.77).
n Help (5). Calls the Help system and provides options for solving problems (see Help -
p.78).
n Screen background of the main window (bright) (6). This function makes the screen back-
ground of the main window brighter.
n Screen background of the main window (dark) (7). This function makes the screen back-
ground of the main window darker (except when the configuration mode is active)

File
This menu displays the following options:
Client configuration 55
Changing the font color 63
Changing the language 63
Changing the password 63
Changing the profile 63
Changing the user 63
Switching SeeTec installation 64
Installation Manager 64
Select and display cameras with the keyboard 65

Client configuration
The settings of the client are stored locally in the Windows user profile. They can only
be changed by a user with administrator rights.

55 / 251
The user interface

Client

1. Select Disable alarm toast messages to suppress alarm notification for toast messages
(see Alarm notification - p.103).
2. Select Disable system notification toast messages to suppress system notifications for
toast messages (see Alarm notification - p.103).
3. Select Show filtered search results only to display only the relevant search results in the
search results list.
4. Select a web browser to be used for displaying the online help system. If no browser is spe-
cified, the standard browser defined in the operating system settings will be used.
5. Make entries for Maximum number of events in report mode to specify the maximum num-
ber of events displayed in report mode.
6. Select Activate for cameras in camera overview to activate the thumbnail view of the cam-
era image in the camera overview.
You can open thumbnails by rolling the mouse cursor over the names of the cameras in the
overview while holding down the CTRL-key.
7. Select Activate for cameras in maps to activate the thumbnail view of the camera image in
the maps.
You can open the thumbnail by using the mouse pointer to hover over the name of the camera
in the map.
8. Select Scale thumbnail size in map with screen resolution and select the thumbnail size
from the drop-down menu. The scaling adapts the thumbnail size to the screen resolution. The
higher the resolution of the screen is, the higher will be the resolution of the thumbnails.

56 / 251
The user interface

9. Activate the Automatic login for display agent and enter the user name and password to
start the display agent automatically when the client is started.

Alarms

1. Select the Warnings tab.


2. For Alarm sequence, specify whether you want to start with more recent or older alarms
when processing the alarm list.
3. Select Stop low priority alarms when a new alarm is activated to stop low-priority alarms
(priority 1-4) before the end of the predefined alarm interval is reached (see Configuring an
alarm scenario - p.167). High priority alarms cannot be stopped.
4. Select Restore minimized main window when an alarm occurs to restore the main win-
dow in case of an alarm. If this option is not activated, the main window will not be restored in
case of an alarm.
5. Specify the desired number of rows and columns to be displayed in the sequential alarm win-
dow (see Adding the sequential alarm window - p.67).
6. Make entries for Maximum number of alarms in archive mode to specify the maximum
number of alarms displayed in archive mode.

57 / 251
The user interface

Analytics

1. Select the Analytics tab.


2. The tracking data settings are defined as global settings in configuration mode (see Video
Analytics - p.190). They can be activated separately. Select which tracking data should be
displayed:
n Objects
n Classification
n Counts
n Object path
n Rule

58 / 251
The user interface

Warnings

1. Select the Warnings tab.


2. Select Suppress warning about time difference to server to suppress a warning if there
are more than ten seconds of time difference between client and server.
3. Select Suppress warning about low screen resolution to suppress a warning if the screen
used does not have a high enough resolution (see System requirements).
4. Select Suppress warning about MDS zone full to prevent a warning when the storage
depth limit of the multimedia database is reached (see SeeTec Administration Tool -
p.214).
5. Select Suppress warning about different streaming settings in configuration mode to
suppress the warning that recording losses can occur if there are discrepancies between the
settings for standard and alarm recording in MPEG-4/H.264 recording.
6. Select Delete entities without confirmation in configuration mode to delete the entity
(camera, time template, alarm, button, etc.) without receiving a request for confirmation when
you click the Delete button in configuration mode.

59 / 251
The user interface

Network

1. Select the Network tab.


2. If the server does not respond quickly enough, increase the time limit in Timeout for server
requests (in seconds).
3. Specify Image transmission via the UDP or TCP port.
The UDP port is freely selectable.
4. Limit the bandwidth when accessing servers with a low-bandwidth connection.
5. Select the camera manager by double-clicking it.
6. Limit the maximum bandwidth used to avoid overloading the network.

60 / 251
The user interface

VoIP and SIP

1. Select the VoIP and SIP tab.


2. Specify the port number of the SIP base port (the default is "5060").
3. Specify the port number of the audio RTP port (the default is "7000").
4. Select the client's audio input device and audio output device.
Regardless of this, incoming calls go via the operating system's default audio output device.
5. Select Use echo and noise suppression to improve the sound quality.
6. Select Use microphone amplifier to increase the volume of the input device.
7. All of the existing SeeTec installations are displayed in the column on the left of the Specific
settings for SeeTec installation group.
8. Select the desired SeeTec installation, and then select the settings.
9. Select Use keep-alive packages, and then, if necessary, adjust the intervals at which the cli-
ent is to log in to the SIP or VoIP server.
The default value for Keep-alive interval is 10 (s), and for Registration interval it is 3600
(s).
10. Enter the data stored on the SIP server in the SIP user data for SIP user name and SIP pass-
word.
11. Enter any name for Participant name. The participant name is displayed as the called par-
ticipant in archive mode.
12. Enter the IP address of the PBX server for Registration server and Outgoing proxy.

61 / 251
The user interface

Input devices
1. Select the Input devices tab.
2. All input devices, such as joysticks, that are connected to the system and available before
startup of the SeeTec client are displayed. Any combination of devices is supported. Every
device can be configured independently of the others.
3. Select from the list the device you want to configure.
The device's functions are listed on the right-hand side of the dialog box.
4. Activate the device.
5. If necessary, activate the z-axis (depending on the hardware).
6. Press the joystick button to which you want to assign an action, and then select the desired
action.
7. To use the keyboard for selecting and displaying cameras, activate Enable virtual
sequence.
The keys are assigned as follows:
n First row:
n F1: Monitor
n F2: Display Agent
n F5: Webpage entity
n Second row:
n B1: predefined layer
n B2: camera
n B3: Tile
n B4: temporary layer
n B5: map
n Last row:
n Tab: enter

Pattern:
[B1, B2, B3, B4, B5, F5] (number of entity or temporary layer) --> [F1, F2] (number of monitor or
display agent) --> [optional: 3] (number of tile of temporary layer that has focus) Tab
Examples1

Restrictions and special cases


n The jog dial and shuttle wheel are supported in archive mode for the Axis T831x control
unit.
n Up to 112 virtual buttons can be configured for the Axis T8312 control unit by selecting the
Enable virtual buttons option(refer to Select and display cameras with the keyboard -
p.65).
n The control unit has 9 buttons
n If you want to assign an action to button 56, press button 5 and 6 in rapid succession, and
then select the desired action.
n Specify for Timeout (ms) the time period within which the two buttons must be pressed.
n The Videotec DCZ control unit is also supported with the following restrictions
n Only 32 of 38 buttons can be used.
n Only the outer jog dial can be used in archive mode.

1Opening of cam 444 on monitor 3 in tile 12: B2 F1 3 B3 4 Tab


Opening of cam 444 on monitor 3 in full screen: B2 444 F1 3 Tab
Opening of predefined layer 555 on display agent 2: B1 555 F2 2 Tab

62 / 251
The user interface

Changing the font color


The font colors for the user interface can be configured.
1. Choose Font colors from the File menu.
2. Set the color for the font
n Color 1 on a dark background,
n Color 2 on a light background,
n Color 3 on a mixed background like the main menu,
n Color 4 on a mixed background like table headings,
n Color 5.on a video player border (black background).
3. To revert to the default settings, activate Use default colors.
4. Restart the client for the changes to take effect.

Changing the language


1. The Cayuga user interface is shipped in multiple languages:
2. Choose Change language from the File menu, and then select the desired language.
If you select the Windows default, the operating system's language environment is used
automatically.
3. Click OK to apply your selection, and then restart the client.

Changing the password


You can change the user's password at any time.
To allow the user to change the password, the respective setting has to be activated in
the configuration menu in the "File" menu.

1. Choose Change password from the File menu, and then enter the new password for the cur-
rent user.
2. Enter the new password.
3. Click OK to apply the password.

Changing the profile


If multiple profiles are used (user profile, group profile, etc.), you can change to a different profile.
The profiles can be managed in configuration mode (see Profiles - p.163).
1. Select Change profile and then the desired profile.
2. Click OK to confirm.
The current profile is logged off, and the selected profile with its user rights is activated.

Changing the user


If multiple users are created, you can change to a different user.
1. Choose Change user from the File menu, and then select the user.
2. Click OK to confirm your selection.
The current user is logged out, and the new user has to log in with a user name and password
(see Login - p.48).

63 / 251
The user interface

Switching SeeTec installation


If you have installed multiple independent SeeTec servers, you can connect to a different SeeTec
server.
It is not possible to connect to a different SeeTec server if you are in configuration
mode.

1. Choose Switch installation from the File menu.


2. Enter the server name or IP address and the user name and password.
The current installation is terminated, and the selected installation is started.

Installation Manager
Adds further servers to the existing client-server installation in order to provide access to the
devices connected to them and displays the current connection status.

n Activate(1): Activates or deactivates the selected installation


n Connect (2): Connects an available installation
n Edit (3): Allows editing the installation's connection settings
n Delete (4): Removes the installation from the list

64 / 251
The user interface

Requirements
n The server version on all servers to which a connection is to be established cannot be
higher (newer) than the client.
n All servers must support multi-installation login. A license must be available for SeeTec
multi-installation login.

Select and add an installation


1. Choose Installation-Manager from the File menu, and then select the desired servers.
2. If the server is not displayed, add the installation by entering the installation name, the IP
address or host name, and the port number of the server.
3. Click Add to confirm your selection.

Reorder installations
1. Reorder the list of installations by selecting one object and dragging it to the designated place
in the list.

Disconnect and reconnect a SeeTec installation


Disconnects connected installations from the current system. The color marker in the symbol
indicates the connection state.
1. Click the Disconnect icon (1) of the SeeTec installation that you want to disconnect.
2. For automatic connecting and disconnecting, click the Enable auto-connect icon or Disable
auto-connect icon (4) of the SeeTec installation.

Edit SeeTec installations


1. Changes the IP address, host name and the port number of the selected server.
2. Click the Edit icon (3) of the SeeTec installation that you want to change.
The selected server is displayed at the bottom of the window.
3. Edit the installation name, the IP address or host name, and the port number of the server.
4. Click Apply to apply the changes.

Delete saved SeeTec installations


Tidies up the list of SeeTec installations most recently called by the client (see also Login - p.48).
1. Click the Delete icon (2) of the SeeTec installation that you no longer want to be available for
selection the next time you log in on the client.
2. To delete multiple installations at once, select the installations you want to delete and click
Delete selected objects.

Select and display cameras with the keyboard


Using the Axis T8312 keyboard, a camera can be displayed on a local screen or on a Dis-
playAgent. To reduce the number of buttons that must be configured, each camera is numbered.
Refer to the manufacturer's documentation of the keyboard.

65 / 251
The user interface

1. To display a camera with the keyboard, start by entering a special key combination.
2. Enter a multi-digit number on the number keys of the keypad.
3. Press another special key, then enter the number of the monitor or display agent.
4. Start by pressing the tab bar.
It is also possible to show a temporary layer with a joystick button and to show a camera in a
tile in such a temporary layer.
Key assignment
n First row:
n F1: Monitor
n F2: Display Agent
n F5: Webpage entity
n Second row:
n B1: predefined layer
n B2: camera
n B3: Tile
n B4: temporary layer
n B5: map
n Last row:
n Tab: enter

Pattern
1. [B1, B2, B3, B4, B5, F5] (number of entity or temporary layer)
2. [F1, F2] (number of monitor or display agent)
3. [optional: 3] (number of tile of temporary layer that has focus)
4. Tab

Examples1

View
The settings are stored locally and have to be made on each client and for each Win-
dows® login profile.

Adding a window 67
Adding the sequential alarm window 67
Keeping the aspect ratio 67
Borderless display 67
Display agent 67
Video wall dispatcher 67
LPR master data editor 67
Count analysis 71
Access control data editor 71

1"B2 444 F1 3 B3 4 Tab" opens camera 444 on monitor 3 in tile 12


"B2 444 F1 3 Tab" opens camera 444 on monitor 3 in full screen
"B1 555 F2 2 Tab" opens a predefined layer 555 on display agent 2

66 / 251
The user interface

Adding a window
1. The "Add window" function allows you to distribute the display of the work area to multiple
connected monitors.
2. Choose Add window from the View menu.
A second window opens.
3. Move the window to the connected monitor.
The client saves the setting and makes it available when you log in again.
4. To use multiple connected monitors, repeat these steps.

Adding the sequential alarm window


In case of an alarm scenario, cameras included in any alarm scenario (see Alarms - p.166 in con-
figuration mode) are displayed in a separate alarm window. The name of the camera is displayed
and the image frame in the window corresponds to the color of the alarm scenario. The camera
images can be displayed either in sequential mode or in continuous mode.
1. Select Add sequential alarm window to display all alarm related cameras in a new ded-
icated window.

Keeping the aspect ratio


1. Select Keep aspect ratio to adapt the camera image to the layer window.
The camera image may appear distorted.
2. Select Keep aspect ratio again to display the camera image with the original aspect ratio.

Borderless display
1. Select Borderless display to hide the controls and the bars between the camera images in
the layer with multiple cameras (see View - p.66).
If a camera is selected, the border will be displayed.
2. To display the controls and the camera menu, click the required camera image.

Display agent
1. The SeeTec display agent allows you to use standard PCs and monitors to create a full-
fledged remote-controlled video wall (for settings, see Video walls - p.178 in the configuration
mode).

Video wall dispatcher


The video wall dispatcher can control associated monitors dynamically. You can drag and drop
camera images, layers, maps and web pages to display them on video walls. The video wall dis-
patcher allows camera images and layers from patrols and alarm scenarios to be diverted to the
video walls.

LPR master data editor


In the LPR master data editor you can add, modify or delete license plates.

67 / 251
The user interface

The LPR master data editor must be configured in the SeeTec VA Administration Tool -
p.207 prior to usage.

License plates in the list (12) can be sorted and displayed by license plate groups.
1. Click the arrow beside the name of the license plate group to close it.
2. Click the arrow again to open the license plate group again.

Creating a new license plate (1)


The window for entering new data is opened automatically as soon as a license plate is recog-
nized by the camera.
1. If the window for entering a new license plate is not opened automatically, click New (1).
Automatic opening of the master data editor in the event of unknown license plates can be
activated in configuration mode (see Configuring the LPR module - p.183).

68 / 251
The user interface

2. Enter the new license plate in the text box in the upper left corner if it is not yet displayed.
3. Assign the license plate to a license plate group.
License plate groups are created in configuration mode in the License plate groups - p.179
area.
4. You have the option of entering additional descriptions for the license plate in the LPR master
data tab.
The name and number of text fields are defined in the Server area in configuration mode (see
Configuring the global OCR settings - p.182 .
5. Switch to the Ticket tab and select the validity period for the license plate.
The activated time period is displayed in the left column.
6. If you wish to enter a different time period, click Activate and enter the desired time period.
This gives every license plate a validity ticket. The status of the ticket is indicated by the dif-
ferent font color and an icon.
7. To see an overview of the changes to the license plate, switch to the History tab.
The history shows the initial configuration of the license plate and all subsequent changes.
The width of the columns can be adjusted to improve readability.
8. Switch to the E-mail notification tab and optionally enter the recipient to whom an email is to
be sent as soon as the vehicle with the specific license number is recognized.
9. Enter the macro that is to be replaced with the applicable information by the server.
The following macros are available:

69 / 251
The user interface

n [0] Camera image


n [1] License plate
n [2] Group
n [3] Unknown status [4] date
n [5] Time
n [6] Lane
n [7] Module name
n [10] Master data field 1
n ...
n [19] Master data field
Example1
10. Click OK to confirm your entries.

Editing a license plate (2)


1. Select a license plate in the list of the master data editor and click Edit (2) to change the
details for the license plate.
See Creating a new license plate (1) - p.68.

Deleting a license plate (3)


License plates can be removed from the list of valid license plates.
When removed from the list, the license plates lose their validity but are not removed
from the database.

1. Select a license plate from the list of the master data editor, and then click Delete (3) to
remove the selected license plate from the list.
The license plate is hidden.

Displaying (4) and restoring (5) deleted license plates


1. Click Display deleted entries (4) to display the list including the deleted (hidden) license
plates.
2. Select the deleted license plate (recognizable by the grayed-out text), and then click Restore
(5).
The license plate is restored in the license plate list.

Deleting a history (6)


If necessary, you can restore a deleted (hidden) license plate to delete its history.
1. Select the license plate whose history you wish to delete, and then click Delete history (6).

1The text in the message "License plate [1] was recognized [4] at [5]." becomes "License plate
KA YX 0815 was recognized on 15.04.2010 at 4:25 pm." in the email.

70 / 251
The user interface

Deleting a license plate permanently (7)


To remove license plate from the database permanently, they first have to be deleted (i.e.
removed from the list).
License plates can only be permanently deleted by a user with administrator rights.

1. Select the license plate that is to be permanently deleted.


To delete multiple license plates, select the license plates while pressing and holding the
CTRL key.
2. Click Delete permanently (7), and then click OK in response to the query.
The license plate is permanently deleted.

Switching the view (8)


1. Click Change view (8) to cancel or activate sorting by license plate group in the list (12).

Refresh the view (9)


1. Click Refresh view (9) to display any hidden license plates in the list (12).

Search for a license plate (10)


1. To search for a license plate in the list (12), enter part of the master data set of the license
plate into the search box.
The search is started automatically, and the result is displayed in the list (12).
2. Click the X in the search box to save the search.

Exporting and importing license plates (11)


You can export and import the master data of the license plate as a CSV file (a text file with values
separated by semicolons) in order to analyze or prepare it for further import into databases.
1. Select the license plate whose master data you wish to export.
To export multiple license plates, select the license plates while pressing and holding the
CTRL key.
2. Click Export (11) to export the master data as a CSV file.
3. Click Import (11) to import a CSV file with master data sets.

Count analysis
The count analysis provides a graphical analysis of the objects (people or vehicles) that have been
in the selected area (see AOI (Area of interest) - p.153)or have passed the tripwire (see Tripwire
- p.152).
For configuration of the count analysis, see SeeTec Video Analytics - p.147.

Access control data editor


If the access control software "SiPass" is installed, the access control data editor allows the edit-
ing of card holders' access data.

71 / 251
The user interface

For information about working with the access control system, refer to the technical
guide ("Technical_Guides_SeeTec_Cayuga_R6_EN.pdf") or contact support.

Tools
This menu displays the following options:
Multiple export of image data 72
Configuring a logo action 74
Manual reference image comparison 74
Removing write protection from recordings 76
Status report for automatic image export 76

Multiple export of image data


If you want to export a large volume of archived image data in a single operation, you can specify
the settings required for this on this menu. When exporting image data, the exported image data
are saved in encrypted form and can then be played back on a computer without a SeeTec install-
ation with the SeeTec viewer. You will find the SeeTec viewer in the SeeTec installation folder.
A setup file is exported for an application that allows burning the exported image material onto a
storage medium. The setup files for the offline viewer and the burning tool can be found in the
folder "Tools" of the SeeTec installation.
1. Choose Multiple export of image data from the Tools menu.

2. Select or deselect either all of the installed cameras or specific cameras.


3. Sort the list of cameras available by clicking on the table titles ("Camera", "Type", "Path"
etc.).
4. Specify whether the image data is to be exported to the server or the client by either selecting
Export to server or Export to client.

Exporting image data to the server.


1. Specify whether only standard recordings are to be exported or whether alarm recordings are
to be exported as well.
2. Specify the time period for the image data to be exported.

72 / 251
The user interface

3. To secure the exported image data using the default password, select Use default pass-
word.
4. If you want to use your own password instead of the default password, enter this password
and then enter it again. Optionally, use the standard password. The standard password is set
in configuration mode in the Tools option.
5. Click Select and specify the storage location of the exported image data.
6. To store the exported image data in separate folders by user, camera name and time of
export, select Create subfolders for user, camera name and time of export.
7. To carry out the export at a specific time, select Select time for export, and then specify a
date and time for the export.
8. To store the exported image data in folders of approximately the same size as the expected
file size, select Split export into multiple folders and either select the desired folder size
according to the export medium (e.g. CD, DVD, Blue-ray disc) or specify the maximum size
of the image file. Image data that exceeds the specified size is split into multiple files so that
they can be stored on data carriers such as CD-ROMs or DVDs.The minimum size of the file
is 100 MB.
9. To carry out the export immediately, click Export.

During the export process, the SeeTec viewer installation file and a program for burning
to CD/DVD (Totally Free Burner) are copied to the export folder as well. This allows the
files to be run on a computer without a SeeTec installation with the SeeTec viewer. The
SeeTec viewer will import the files and display them as separate time intervals.

Exporting image data to the client


1. Specify if only standard recordings are to be exported or if alarm recordings are to be exported
as well.
2. Specify the time period for the image data to be exported.
3. To secure the exported image data using the default password, select Use default pass-
word.
4. If you want to use your own password instead of the default password, enter this password
and then enter it again.
5. Click Select, and then specify the storage location of the exported image data.
If you know the folder path, you can also enter it in the text box directly.
6. To store the exported image data in separate folders by user, camera name and time of
export, select Create subfolders for user, camera name and time of export.
7. If the image data is to be exported to a client that has only a low-bandwidth connection, select
Use bandwidth limit and specify the bandwidth limit.
8. To store the exported image data in folders of approximately the same size as the expected
file size, select Split export into multiple folders and specify the folder size and max-
imum size of the image file.
Image data that exceeds the specified size is split into multiple files so that they can be
stored on data carriers such as CD-ROMs or DVDs.
9. To carry out the export immediately, click Export.

During the export process, the SeeTec viewer installation file and a program for burning
to CD/DVD (Totally Free Burner) are copied to the export folder as well. This allows the
files to be run on a computer without a SeeTec installation with the SeeTec viewer. The
SeeTec viewer will import the files and display them as separate time intervals.

73 / 251
The user interface

Configuring a logo action


Logo action allows you to specify which layer is to be displayed when you click the SeeTec logo at
the top of the screen.
1. Choose Configure logo action from the Tools menu.
2. Select the defined layers from the drop-down list.
The layers are saved in the configuration menu (see Layers - p.170).
3. Click OK to confirm.

Manual reference image comparison


To create reference camera images and compare camera images, the user must have
the rights to see live images in surveillance mode (refer to Groups rights or Users
rights settings in configuration mode).

The manual reference image comparison helps detect changes in the camera orientation.
Mobotix cameras are only supported for Motion JPEG

1. Select a camera from the list and click Create reference image. The current camera image
will be used as reference image. The current view displays the actual live image of the cam-
era.
2. To delete a reference image, select the camera from the list and click Delete reference
image.
3. Select the camerae and check both images for changes.
4. If changes are detected, click the red con (2) to mark the change as not identical.
5. If the images are identical, click the green icon (4) to mark the image as identical.

74 / 251
The user interface

6. If the changes are difficult to see, select Show differences only. The changes detected by
the image processing software will be displayed as red areas in the current view. If no
changes are detected, the current view turns black.
7. Deselect Show differences only to return to the actual camera image.
8. Select Activate computerized support to display a threshold scale. Move the pointer on the
scale to change the threshold values. This changes the threshold values of the current image
and helps discern possible changes in the image.
9. Deselect Keep aspect ratio to display both images filling the frame. Depending on the cam-
era image, this setting may distort the image's aspect ratio.
10. To print the images, click the printer icon (3).

Printing the reference image comparison

1. In the print report dialog, select Show difference images to print the current views with the
differences highlighted.
2. Select Show all reference images to print the reference images alongside the current views.
3. Select Show difference as percent to print the percentage of the detected differences.
4. Select Show objected cams to display only those cameras with images differing from the ref-
erence image.
5. Enter the user name and add comments, if necessary.
6. Click Print report.

75 / 251
The user interface

Removing write protection from recordings


1. Recorded image data can be write-protected to prevent any important data from being auto-
matically overwritten.
2. Choose Write protection of recordings from the Tools menu.
3. Select the cameras to be checked to ascertain whether there is a write-protected recording
area.
4. Click the Start query button to display any write-protected recordings of the selected cam-
eras.
5. Select the areas in which write protection is to be removed from recordings.
6. Click the Remove write protection button.
7. Close the window.

Status report for automatic image export


This menu item is only available in Configuration mode.

The status report for automatic image export displays the list of failed automatic exports,

76 / 251
The user interface

1. Select the DeviceManagers to be included in the query for fails automatic exports.
2. Click Start query. The errors and problems that have occurred on the selected DeviceMan-
ager are displayed.
3. Select one or more items in the list and select an action for the selected exports.
4. Export again. The selected image data export will be exported again.
5. Remove from list. The selected items will be removed from the result list.
6. Click Apply to perform the selected action.
7. Click Close.

Info
This menu displays the following options:
Request product ID 77
Import license file 77
Activate license 77
Display license 78
Display program information 78
Display system information 78

Request product ID
The Cayuga installation must be activated within 30 days to purchase a new license. This requires
sending an automatically generated activation key, the product ID, to SeeTec.
1. Choose Request product ID from the Info menu.
The software creates a unique product ID.
2. Click Copy to copy the displayed product ID to the clipboard.
3. Open the SeeTec website and navigate to "Support" and then "Licensing", and then click
"New license".
4. Enter your product ID and the other information requested there.
You will receive the license key by email.

Import license file


1. Choose Import license file from the Info menu.
2. Click Select and navigate through the file system to the storage location of the license file
that was sent to you by SeeTec.
3. Select the SeeTec.key license file or the packaged ("zipped") file containing the license file.
Upon import, the zipped file will be decompressed automatically.
4. Click Import to use the license key.

Activate license
You cannot activate or download the licenses unless you have a connection to the Inter-
net.

1. Choose Activate license from the Info menu.


2. Select Personalize license (to register it with your user data) if the license has not yet been
registered.
3. Enter your installation number (INR) and user details.

77 / 251
The user interface

4. Select Download license if an update has been carried out and the license is therefore
required again. If the product ID has changed (e.g. due to changes to the server hardware),
contact the support department.
5. Enter your installation number (INR).
6. Click OK to confirm your entries. The client connects to the SeeTec registration server and
transfers the license key to the computer.

Display license
1. Choose Display license from the Info menu.
Information on the license is displayed, such as the maximum number of cameras/devices
that can be used, the concurrent client connections or the validity period of the license (if it is
a demo license).

A test license will be installed during installation and is valid for 30 days. A demo
license is valid until the displayed date. If no valid license is available, login is not pos-
sible. For further questions, contact the SeeTecSupport - p.17.

Display program information


1. Choose Show program information from the Info menu. The information on items such as
the program version, current user and profile and also validity of password is shown.
2. Click OK to close the window.

Display system information


1. Choose Show system information from the Info menu. The information on items such as
the operating system, number of clients and server is shown.
2. Click Send to copy the system information to the clipboard. You can paste the data from the
clipboard to your email program to send it to Support - p.17.
3. Click Cancel to close the window.

Help
This menu displays the following options:
User's Guide 78
Start problem recording 79
Display Help icons 79

User's Guide
Starts the Help system on the starting page. In addition, there are also links for accessing specific
topics directly from the various controls and dialog boxes. The system automatically checks for
current versions of the online help system. The user is notified if the installed version is not up-to-
date. For newer editions of the help system and the manual, visit the SeeTecwebsite.
When starting the help system for the first time, you may be prompted by the browser
to activate ActiveX or allow JavaScript. The help system will not function properly, if

78 / 251
The user interface

those services are blocked.

Start problem recording


If problems occur during operation, you can use the "Start problem recording" function to record,
comment on and save them. The "Problem Steps Recorder" is part of the operating system.
1. Choose Start problem recording from the File menu.
2. Select Start recording and carry out the steps that led to the problem.
3. As soon as you have carried out these steps, stop recording.
4. If you want to add a comment to the recording, click Add comment (e.g the time, behavior of
the client and devices, etc.).
5. Specify where the file is stored.

Display Help icons


1. The help icons are small gray circles with question marks in the program components that
lead directly to the applicable section of the Help system.
2. Choose Display Help icons from the Help menu.
The function is activated (check mark) or disabled (no check mark).

79 / 251
The user interface

The mode bar


The mode bar allows you to switch between display modes.
n Surveillance mode (1). When you log in, the system starts
up in surveillance mode (see Surveillance mode - p.83).
The number of alarms and system events that have occurred
are indicated by a number in the icon. Additionally, the num-
ber of alarms and system events are indicated by a number in
their respective tab in the Alarm list - p.102.
n Archive mode (2). Here you can manage and display recor-
ded image data and search for alarm events (see Archive
mode - p.105). The number of export operations that have
occurred is indicated by a number in the Archive icon.
n Report mode (3). The report mode facility gives you a list of
the events that have occurred (see Report mode - p.119).
n Configuration mode(4). Configuration mode is for man-
aging and configuring the video sources, users and locations
(see Configuration mode - p.123).
n LPR mode (5). LPR mode is used for license plate recog-
nition in the image data of the corresponding cameras (see
LPR mode - p.228).

80 / 251
The user interface

The control bar


The control bar contains the tabs required, depending on the mode, for controlling the display or for
configuration. You will find descriptions of the tabs in the sections describing each mode. Tabs
cannot be moved. They remain anchored in position on the control bar.

Showing/hiding a tab
1. Click the gray triangle in the upper-right corner of a tab to hide the tab on the right-hand edge of
the screen.
Once the last control on the control bar has been minimized, the available size of the main win-
dow increases.
2. Click the gray triangle on the tab on the right-hand side of the screen to show the control.
The control bar then also appears again.

81 / 251
The user interface

Search

Searching in surveillance mode


Below the overview tab in the control bar, there is a search function that helps you to find the con-
tents of the active control bar more quickly.
1. Enter the search term.
The first term found is highlighted.
2. Click the magnifying glass icon.
The next term found is highlighted.

Searching in configuration mode


The Search control at the bottom of the user interface helps you find the contents of the server
database more quickly.
1. Enter the search term.
The search starts as soon as the second character is entered and shows a list of all results.
Information on the type is also displayed.
2. Click the term found.
The right column shows context belonging to the found term.
3. If it is a setting, click Open setting.
The menu belonging to the hit is opened.
4. Click the magnifying glass icon.
The next term found is highlighted.
5. Double-click the item found to open the corresponding settings window in the configuration
mode.
To edit items in the configuration mode, administration rights may be required.

82 / 251
6
Surveillance mode
Surveillance mode allows live images, web sites, maps, layers, alarms and patrols to be dis-
played and PTZ cameras and other peripherals, such as door openers, that are to be controlled
(see also The user interface - p.53).
To change to surveillance mode, click the Surveillance mode icon on the mode bar.

Camera operation
You can control the functions of the camera using the control bar (see Camera image controller -
p.90) or using the controls on the Control control (see Control).
To operate a camera, select the camera in the work area.
You can recognize a standard recording by a red point that slowly flashes on and off along the
lower right edge of the camera image in surveillance mode. You can recognize an alarm recording
by the red bell that appears along the lower right edge of the camera image during recording.

Tabs
The tabs allow you to open and close the layers (see Work area).

Control bar
The control bar allows you to perform the following actions:
n Move the selected PTZ cameras and change the image detail (see PTZ control - p.97)
n Perform actions using buttons (see Buttons - p.99)
n Carry out patrols (see Patrol - p.99)

83 / 251
Surveillance mode

n Use the optionally installed communication options (camera and audio) (see Audio -
p.100).
n Call dispatcher mode (if installed, see Video wall dispatcher - p.67). The dispatcher mode
is switched on and off via the View menu.
n Select the cameras created for each location (see Overview - p.96)
n Search for specific installed cameras

84 / 251
Surveillance mode

Work area
The main window for displaying the camera and object images is sometimes known as the "work
area" (see also The user interface - p.53). The work area displays up to 64 tiles at the same time.
The tiles can be arranged in different ways:
n Evenly as a grid
n With a main layer and smaller layers (e.g. "layer with focus tile")

Alarm notification ("Toast notification")


Depending on the setting, alarms and system messages are displayed as they occur in a separate
message window (alarm notification) at the bottom of the screen. For further information, see the
Alarm messages - p.102.

Creating layers
Layers can be set in the layer area in configuration mode. Temporary layers, which are only avail-
able for the user and are not saved, can optionally be combined.
In some layers, the available objects such as cameras or maps can be assigned to any tile in the
work area.
1. Drag the desired layer from the Overview control to the work area.
To configure the layers, see Layers.
Or
2. Click the eye icon on the title bar in surveillance mode, and then choose Add layer.
You can select the desired number of tiles or create a user-defined layer.
The selected layer is shown in a control (on a tab) next to the eye icon.
3. Click the cross on the tab to close this layer.
4. Drag the selected object to the desired tile in the work area.
To move an object in the work area, drag it to the tile in which it is to be displayed. If there is
an object there already, it is moved to the previous tile of the moved object.
5. Select Open layer in secondary window to display the new layer on a second screen (see
View - p.66).
6. Select automatic layer switching and the desired interval to switch automatically between
the layers after a certain interval.

Automatic layer switching is stopped in the event of an alarm scenario and auto-
matically resumed after an alarm.

Setting the viewing mode on multiple displays


The viewing mode feature is only available for viewing on multiple displays. If multiple displays are
connected to the client, their viewing mode can be set independently. By this, the viewing mode
on the secondary display can remain in surveillance mode even if the main display is switched to
another mode (e.g. archive mode).

85 / 251
Surveillance mode

1. Switch to surveillance or archive mode and drag the required camera view onto the secondary
display. The drag & drop feature works between surveillance and archive mode and vice
versa.
2. On the secondary display, click on the display icon. The camera view on the secondary dis-
play will remain in surveillance mode with live image even if the primary display is switched to
another mode.
3. To remove the viewing mode on the secondary display, click on the display icon again.
4. When clicking on the display icon on the secondary display after switching the viewing mode
on the primary display, the last live image view will be restored on the secondary display.

86 / 251
Surveillance mode

Sequential alarm window


The settings for the sequential alarm window are defined in the View menu.

1. To switch to the sequential mode, click (1). The alarms will be displayed in a single row. If the
number of alarm cameras exceeds the number of columns defined, the remaining alarm cam-
eras will be ignored.
2. To switch to continuous mode, click (2). If the number of alarm cameras exceeds the number
of columns defined, the additional cameras will be added in the row below.

87 / 251
Surveillance mode

Custom image layers


When working in surveillance mode, custom layers can be added and stored locally. In contrast to
the layers configured in the configuration mode (see Layers), the custom layers can be defined
and deleted by the user.

1. Click on the symbol "Eye" in the surveillance mode bar.

Adding a layer
1. Click Add layer and select the required arrangement of the layer fields or select a user-
defined arrangement of rows and columns. The new layer is displayed.
2. Drag the camera views from the control bar into the fields and click Save layer as local layer
to save the new layer view for the current user on the client.

Opening a layer in the secondary window


1. Click Open layer in secondary window to move the new layer to a secondary window if a
second display is available.

Changing a layer automatically


1. Click Automatic Layer change and select a time interval after which the next open layer is
displayed.

Loading a local layer


1. To open an existing layer, click Load local layer and select the layer.

88 / 251
Surveillance mode

Deleting local layers


1. To delete a locally saved layer, click Delete local layers.

2. Select the layer(s) to be deleted and click Delete layers.

Closing layers
1. To close a single layer, click Close layer. To close all open layers, click Close all layers.
Unsaved layers will close without further notice.

89 / 251
Surveillance mode

Camera image controller


You work with the images of the connected and configured cameras directly in the layer in the
work area. These functions refer only to the control options offered by the software.
Camera image control icons 90
Manual recording 91
Swivelling the camera in the image 92
iSearch 92

Camera image control icons


PTZ cameras are operated using the Control - p.97.

n Zoom (1). Enlarges the image detail with the help of the digital or optical zoom function.
The image detail is enlarged or reduced in size using the scroll wheel on the mouse. You
can move the zoomed image by holding down the middle mouse button. Optionally, when
drawing a rectangle in the image, the enclosed area will be zoomed into.PTZ cameras can
be operated using the controller or a connected joystick.For some PTZ cameras, zooming
into a defined rectangular area in an image by optical zoom is enabled.
Optical zoom is only possible if supported by the camera model.
n PTZ (2). Moves the image detail in the layer. The image detail can be changed by clicking
and moving the mouse pointer in the image (see Swiveling the camera in the image). PTZ

90 / 251
Surveillance mode

cameras can be operated using the controller or a connected joystick.


n Layer options (3). Shows additional options:
n Tracking data: Displays the specified rules and detected for this camera (e.g. trip-
wires) in the view. For configuration see Video Analytics - p.190
n Display statistics: Displays statistical data on the image stream between the cam-
era and the DeviceManager server and between the DeviceManager server and the
client.
n Activate privacy masking: Activates or disables privacy masking.The settings for
the camera are made in configuration mode in the Cameras area.
n Deselect: Disables control of the camera in the control and by means of a con-
nected joystick.
n Open in new tab: Displays the camera in a separate layer.
n Open in side window: Displays the camera in a separate layer in the first secondary
window.
n Close: Closes the active layer
n Archive mode (4). Shows the recordings of the selected interval.
The interval can be between 5 and 30 minutes and is displayed or selected by clicking the
icon.
n Audio mode (5). Controls the cameras' audio feature (volume/mute/permanent on)
n Export (6). Exports the current still image (video frame) as a JPG file or prints the still
image displayed.
n Tile on 1x1 layer (7). Enlarges the tile so that it fills the full screen of the work area.
n Camera lock (8): Locks the camera for the user. Clicking the icon again releases the cam-
era for other users. The camera lock function must be enabled in the Users settings in con-
figuration mode.
n REC (9). Starts and stops manual recording.
A red bell on the right indicates whether alarm recording has started.
n Positions (10). Indicates the preset positions of the selected camera.
The camera positions are set in configuration mode in the Cameras area. To control the set
positions, see Control - p.97.

Manual recording
Alarm recordings can be started and stopped manually by the user who has started them. Addi-
tionally, a bookmark can be added to the recording. This bookmark can be used for the search in
the archive mode (see Searching for alarms in the Archive mode).
1. Click the REC icon (9).
A red bell on the right indicates whether alarm recording has started.
2. If desired, click Add bookmark. A bookmark information window is displayed.
3. Enter the name and a short description of the bookmark.
4. Click OK to add the bookmark to the recording.
5. Click the REC icon (9) again.
The recording is stopped. To prevent unlimited recording, you must specify the maximum
post-alarm duration in configuration mode in the Cameras area.

91 / 251
Surveillance mode

Swivelling the camera in the image


The camera can be moved in pan and tilt mode in the image. Swivelling the camera sideways is
called "panning" (creating a panoramic effect), whereas swivelling the camera up and down is
called "tilting".
1. Click the PTZ icon (2).
A red cross appears in the center of the image.
2. Click a point next to the cross.
The distance of the point you click from the center of the cross determines the speed of the
swivel operation in the relevant direction.
3. If you like, you can activate the zoom function of the PTZ camera. Using the mouse wheel,
zoom in or out of the image.
4. Click the PTZ icon again to deactivate the swivel function in the image.

iSearch
In iSearch you can search recordings for motion without switching to archive mode. The search-
able time period is 5 to 60 minutes.
The performance of the search in the selected image detail depends on the performance
capability of the client hardware, since the search is carried out exclusively on the cli-
ent.

1. Select the camera image, and then select ISearch at the bottom of the image.
See iSearch - p.116 to find out what to do next.

92 / 251
Surveillance mode

Maps
The map shows the area to be surveilled. In configuration mode it is added to the software as a
simple graphic (see Maps). The various cameras are then integrated in this graphic. The map can
thus show a variety of different parts of the company: from the company site to fully automated
production lines.
The map shows the cameras that the user can operate.
If a camera has failed (due to having no power, no connection to the network, etc.), the
camera icon is shown as a yellow warning sign.

1. Click the Digital zoom icon (19) to activate the zooming function for the image.
2. Increase or decrease the size of the image detail by moving the mouse wheel.
3. Click the Layer options icon (2) to open the image on a new tab or in a new window or to
close the layer.
4. Click the Create lasso selection icon (19) to activate the lasso function (see Using the
lasso function - p.94).
5. Click the Window on 1x1 layer icon (4) to increase the size of the image to fill the whole
work area.

Displaying a camera preview 93


Using the lasso function 94

Displaying a camera preview


1. Move the mouse pointer in the map to the desired camera.
A preview of the camera image is displayed.
2. Click the camera symbol to open the camera image in a new layer.

93 / 251
Surveillance mode

Using the lasso function


1. Click the Create lasso selection icon (3) to activate the lasso function.
2. Hold the left mouse button pressed and move the mouse pointer around the cameras you
want to select.
The movement of the mouse pointer is highlighted by means of a red line.
3. Release the mouse button.
The selected camera images are displayed in a new layer.

94 / 251
Surveillance mode

Web pages
In the web page layer, the user can call specific web pages in specified tiles in order to receive
information on the company, for example. The (Internet or intranet) web pages displayed are spe-
cified in configuration mode (see Web pages).

1. Navigate in the web pages as in a browser.


The navigation bar typically found in browsers is not displayed.
2. To display the page in its own layer, click the Full screen icon.
The following navigation controls are available:
n Back (1): Pages back to the previous page.
n Next (2): Pages forward to the next page.
n Start page (3): Jumps back to the start page. The start page is the page specified in con-
figuration mode.
n Reload (4): Calls the displayed page again.
n Cancel loading (5): Interrupts loading.

95 / 251
Surveillance mode

Overview
The Overview control displays all available cameras, maps, layers and web pages classified by
the locations of the company.
1. Click the small triangle in front of the name of the site to display all of the objects assigned to
this site.
2. Select an object from the list to display only this object.

Searching for an object


In the system's configuration settings, each object should have been given its own name.
1. To search for a specific object, enter the name of the object in the Search text box (see
Searching in surveillance mode).

96 / 251
Surveillance mode

Control

The Control control allows you to control the active cameras displayed in the work area. The fol-
lowing submenus are available:
n PTZ control (1)
n Buttons (2)
n Patrol (3)
n Audio (4)
n Dispatcher mode (5)
PTZ control 97
Creating and deleting a preset camera position 99
Buttons 99
Patrol 99
Starting a patrol 99
Stopping a patrol 100
Pausing a patrol 100
Repeating a patrol 100
Navigating between points in the patrol 100
Audio 100
Dispatcher mode 101

PTZ control
1. On the menu bar of the Control control, click the PTZ control icon to switch to the operating
mode of the cameras.

97 / 251
Surveillance mode

2. The PTZ control function is the central function for operating the selected PTZ camera.
These functions are available for PTZ cameras. If no PTZ camera is present or the
PTZ camera is deactivated, digital zoom and digital preset selection is also pos-
sible.
3. Select the camera image, and then use the PTZ control (5) to move the camera by moving the
bright spot in the desired direction.
4. Drag the Zoom slider (1) up or down to make the camera zoom in or out.Select the required
camera position (2) to pan the camera to a preset position. Including the default position, ten
positions are possible. The current position is displayed.
Or
Click the triangle beside the position name, and then select the desired position from the drop-
down list.
The position is immediately approached. The positions are set in the configuration menu in the
Camera area.Use the four direction arrows at the edge of the PTZ control to move the camera
incrementally.Switch between daytime and nighttime vision (6) to get an image when light con-
ditions are poor, providing this is supported by the camera.
5. Click the Auto day/night icon to switch the camera automatically. The following camera func-
tions are also available, if they are supported by the hardware:
n Iris +, Iris -: opens or closes the iris of the camera to control the brightness.
n Auto Iris: automatically adjusts the iris opening to the optimum brightness of the envir-
onment.
n Close-up focus, long-range focus: adjusts the image sharpness to the objects in the cam-
era focus.
n Autofocus: automatically adjusts the image sharpness to the objects in the camera focus.

98 / 251
Surveillance mode

Creating and deleting a preset camera position


1. Move the camera to the required position.
2. Click the Add new camera position icon (3).
The new camera position is added at the next free position number.
3. Enter a name for the position.
4. To delete a preset position, select the position and click the Delete icon (4).
The deleted camera position is released, and subsequent positions are shifted to com-
pensate.

Example1

Buttons
1. On the menu bar of the Control control, click the OK icon to switch to the display of the but-
tons created.
The buttons are set in the configuration menu in the Buttons area.
2. The buttons the user is authorized to use are displayed.
3. Activate the desired action by clicking the button.

Patrol

1. On the menu bar of the Control control, click the Patrol icon to switch to the overview of the
patrols configured.
To configure the patrols, see Patrols in configuration mode.

Starting a patrol
1. Select the desired patrol, and then click Play (1).
The specified cameras, preset positions, maps and layers are displayed one after the other for
a defined period of time.

1Delete: Position 3 is deleted. Position 4 is then shifted to position 3, position 5 to position 4 and
so on.

99 / 251
Surveillance mode

Stopping a patrol
1. Click Stop (3) to cancel the selected patrol.

Pausing a patrol
1. Click Pause (2) to interrupt the patrol.
The patrol is paused.

Repeating a patrol
1. Click Loop (4).
The patrol is repeated.
2. Click Loop (4) again.
The repetition is canceled, and no more patrols are carried out once the current one is fin-
ished.

Navigating between points in the patrol


1. Click Back (5) or Next (6) to go to the previous or next point.

Audio
1. On the menu bar of the Control control, click the Audio icon to switch to audio mode.

2. Select VOIP or Camera to switch between the audio system of the camera (if there is one)
and voice output over the network (Voice over IP).

100 / 251
Surveillance mode

3. Move the sliders for the microphone (1) and loudspeakers (3) to adjust the volume.
The volume setting is saved locally for each camera.
4. To speak to a person from the address book of the existing users, enter the name of the per-
son in the text box, and then click the magnifying glass icon or select a person from the list.
5. Click the green phone icon to start the call.
6. Click the red phone icon to finish the call.
The name of the person you are talking to, the person's location and the duration of the call are
displayed (2).

Dispatcher mode
Dispatcher mode is displayed only if the video wall dispatcher is activated (see Video
wall dispatcher - p.67). In addition, at least one video wall must have been created in
configuration mode (see Video walls).

1. On the menu bar of the Control control, click the Dispatcher mode icon to switch to video
wall control.

2. Select the set video wall in the area (3).


The video wall is displayed , including the monitors (1) it contains.
3. Click the Digital zoom icon (2) and scroll with the mouse wheel to zoom in or out.
4. Press the mouse button and drag the display icons left or right to see adjacent displays.
5. Drag the desired video sources, layers and maps to the monitor in the thumbnail (1).
6. If necessary, open the display of the monitor by-clicking it.
The monitor with the active layers is displayed in the work area.
You can drag the video sources, layers and maps directly into the work area if the video wall
monitor is displayed there.

101 / 251
Surveillance mode

Alarm list
The alarm list is at the bottom of the screen and can be opened or closed as required. It shows the
current and previous alarm and system messages. The Alarm list control displays the alarms that
have occurred in the order in their order of occurrence. The most recent alarms are displayed first.
In addition, the number of alarms that have occurred is shown in the surveillance mode icon on the
mode bar.
1. Switch between alarm and system messages by selecting the Alarm or System button.
For alarm and system messages see Alarm messages or System messages.
2. Click the column headings to sort the alarm or system messages by the column category.
3. Click the gray triangle in the upper-right corner of the alarm list to minimize the control at the
bottom of the screen.
4. Click the gray triangle on the tab in the lower right corner of the screen to show the control.

Alarm messages 102


Changing the alarm status 102
Message window (pop-up) 103
Alarm notification 103
System messages 104

Alarm messages
All open alarms that have been assigned to the current logged-in profile are displayed in the alarm
messages (see Profiles). The type of alarm can be recognized by the color-code. The color in
which the alarm is displayed can be set in configuration mode in the Alarms control.

Changing the alarm status


An alarm has the following statuses:
n Activated: This alarm is currently active.
n Confirmed: These alarms have been viewed and will be removed from the alarm list. These
alarms are removed from the alarm list for all users.
n Deferred: These alarms have been viewed and declared as important by the applicable
user (e.g. security guard), because they will be required at a later time (e.g. for the patrol
report). These alarms are retained in the alarm list.Deferred alarms are declared open at the
next start.
n Rejected: These alarms are removed from the alarm list and considered unimportant or not
applicable by the user.
1. Click the entry in the Status column of the alarm list to change the status of the alarm mes-
sages.
2. Optionally, click Confirm all to acknowledge the alarms and remove the red circle displaying
the number of unconfirmed alarms.

102 / 251
Surveillance mode

Message window (pop-up)

As soon as an alarm occurs, a message window is displayed for high- or medium-priority alarms.
Low-priority alarms are removed from the alarm list at the end of the alarm if they are acknow-
ledged and another alarm occurs. Low-priority alarms do not have an alarm status.
You can add a comment for this alarm if necessary.
The comment can be displayed in report mode and archive mode.
1. Click Confirm to acknowledge the alarm.
The alarm is deleted from the alarm list and the next alarm is displayed.
2. Reject the alarm.
The alarm is deleted from the alarm list and the next alarm is displayed.
3. Reset the alarm.
The alarm is marked as deferred in the alarm list. No further alarm is displayed until an alarm
is either called from the alarm list or acknowledged. This allows multiple alarms to be acknow-
ledged simultaneously.

Alarm notification
A new alarm is displayed in a highlighted pop-up window that opens from the bottom of the screen
(alarm notification).
The notification window displays the alarm name, its status and the time of occurrence.
1. Click Switch off alarm notes to prevent the alarm notifications appear on the screen.
2. Select the time interval for the alarm message to be hidden ("snooze"). After the selected inter-
val has elapsed, the alarm notification will be displayed again.
3. Select the alarm and click Edit alarm to display the message window for editing (see above).
4. Click Close to close the message window.

103 / 251
Surveillance mode

System messages
The system messages show the errors that have been reported by the system, such as failure of a
server, database or camera and also losses of connection.
The errors are displayed in descending order by time of occurrence with a description, the internal
error number, the message and the cause of the error.
1. Select one or more system messages and click Remove selected to remove the message
from the list. The number in the red circle displaying the number of unconfirmed messages is
reduced.
2. Optionally, click Remove all to remove all system messages from the list and to remove the
red circle displaying the number of unconfirmed system messages.

104 / 251
7
Archive mode
Archive mode is used for the retrospective evaluation of recordings and their archiving. Only recor-
ded data can be displayed in archive mode. To select the relevant image data, a camera must be
selected in the camera overview or in the alarm list.
The recording periods for the selected camera (green frame) are displayed in a time line in the
archive player. The icons for digital zoom and volume control are also displayed (only for cameras
with audio recording activated).
1. To switch to archive mode, click the Archive mode icon on the mode bar.
2. Select the camera or layer whose archived image data is to be displayed, or select an alarm
from the alarm list.

Camera overview
The camera overview displays all installed cameras, maps and layers you are permitted to
access. Cameras having integrated exported image data are displayed as "<camera name>
[archive]".
1. Select the relevant camera by clicking. The camera images are displayed in the main window.

105 / 251
Archive mode

Archive player

The archive player allows control of the playback from a selected camera. The player is divided
into two sections. The actual archive player is shown on the left and timeline on the right.
The archive player has the following functions:
n Previous frame (1): Jumps to the event's previous i-frame or JPEG image.
n Play backward (2): Plays the archived video stream in reverse chronological order.
n Pause (3): Pauses the playback.
n Play (4): Plays the archived event in the correct chronological order.
n Next frame (5): Jumps to the event's next i-frame or JPEG frame.
n Real time (6): Plays the event in real time.
n Next alarm recording (7): Jumps to the camera's next alarm recording.
n Skip pause (8): Skips the pause between two recordings in playback mode.
n Calendar (9): Opens a calendar window in order to navigate to a specific calendar time
(date and time).
n Zoom out from timeline (10) or Zoom in to timeline (11): Enlarges or reduces the size
of the display of the timeline. You can also zoom within the recording period by clicking the
timeline and then turning the scroll wheel on the mouse.
n Update timeline (12): Updates the camera's timeline. For cameras with Edge storage
recording, the camera's storage will be synchronized automatically (see Image storage -
Edge storage - p.138). For manual synchronization, hold down the CTRL key when click-
ing the icon.
n Add bookmark (13): Adds a bookmark to the current frame (seeWorking with book-
marks - p.114).
n Bookmark overview (14): Displays the overview of all bookmarks (see Working with
bookmarks - p.114).
n Synchronized mode(15): When playback starts, the cameras are synchronized to the
time of the selected camera.
n Set start/end marker (16): Sets the start and end markers for a selected area of the
timeline (see Editing an
area - p.112).
n Write protection (17): Sets write protection for the marked area of the timeline. See Set-
ting a write protection - p.111
n Delete area (18): Deletes the marked area from the timeline.
n Export area (19): Starts the *.avi export or the SeeTec image data export (see Editing an
area - p.112)
n Timeline / time stream (20): See Timeline / time stream - p.107.

106 / 251
Archive mode

n Jog dial (22): Plays the sequence forward and backward. The further you turn the jog dial
to the right or left, the faster the sequence is played forward or backward. The playback
speed is displayed in the number field (21).

Using the jog dial


1. Turn the jog dial with the mouse to the left or right to play the sequence backwards and for-
ward. When releasing the jog dial, it will return to the center position.
2. Click on a dot around the jog dial to position it there.
3. Click on the double bar above the dial to release.

Timeline / time stream


The timeline / time stream allows you to search across the entire recording period for relevant
image material. The important color markings are:
n Green (standard recording)
n Red (alarm recording)
1. Zoom into the recording period by clicking the timeline and turning the scroll wheel on the
mouse. This improves the overview of the recording start of the camera.

107 / 251
Archive mode

Exporting recordings
1. After selecting a time span in a recording, click the button Export area.
2. Select the export format (AVI) or the SeeTec data format. The SeeTec data format is encryp-
ted.

AVI export
AVI export should only be selected if the export period is shorter than 10 minutes. The
exported AVI file(s) can only be stored on the client.
For server controlled AVI export, refer to Image data export in the server control bar of the con-
figuration mode.
1. To select the required export period, drag the time stream to the required position and set the
start and end markers (16). The period to be exported is highlighted on the time stream.
2. Select the AVI export format and click OK.

3. Specify the Name of the file export path and and select the export codec. By default, the best
codec available on the system is used.
4. Activate Export only i-frames to limit the size of the exported video to the keyframes.
5. Activate Advanced settings and choose the required compression setting in the Com-
pression menu. The following compression settings may be available (depending on the oper-
ating system mode - 32bit or 64bit - only the matching codecs are available, i.e. 32bit codecs
for 32bit systems and 64bit codecs for 64bit systems) :
6. Microsoft Video 1: a lossy video compression and decompression algorithm (codec) that was
released with version 1.0 of Microsoft Video for Windows.
7. Xvid MPEG-4 Codec: a video codec library following the MPEG-4 standard
8. DV Video Encoder: uses lossy compression of video while audio is stored uncompressed.
9. MJPEG compressor: Motion JPEG (M-JPEG or MJPEG) is a video compression format in
which each video frame or interlaced field of a digital video sequence is compressed sep-
arately as a JPEG image.

108 / 251
Archive mode

10. Cinepak codec by Radius: primary lossy video codec of early versions of QuickTime and
Microsoft Video for Windows. Video compressed with Cinepak is generally still playable in
most media players.
11. Source format: Original data format, only playable with the SeeTec Cayuga Viewer.
12. Activate Select audio to export the audio stream with the video stream.
13. Click Export. All options defined in the archive mode (e.g. tracking, privacy masks, and pos-
itions of virtual PTZ cameras) are exported.

Exporting as JPEG image seguence


Optionally, JPEG still images can be exported. Exporting as JPEG will export the selected video
as a sequence of images.
1. To select the required export period, drag the time stream to the required position and set the
start and end markers (16). The period to be exported is highlighted on the time stream.
2. Select the AVI export format and click OK.
3. For Export settings, select Jpeg.

4. Activate Limit time frame rate and chenge the number of frames per second that will be
exported as separate images.
5. Activate Export only i-frames to limit the number of the exported images to the keyframes.
6. Click Export.

Image data export


1. To save the archived image data, select Multiple export of image data in the menu bar. See
Multiple export of image data - p.72.

Evaluating exported image data


There are two options for evaluating the exported image data:

109 / 251
Archive mode

n On a system without a SeeTec installation, the data can be evaluated using the SeeTec
OfflineViewer. The setup file for the SeeTec OfflineViewe is installed in the export folder
during export. The OfflineViewer manual is installed in the manual folder during installation.
The OfflineViewer also displays number plate recognition and ATM data if this type of data
has been exported.
n To integrate the data within a SeeTec installation, an "archive camera" must be created in
the configuration mode. (See Creating a new camera - p.132.)

110 / 251
Archive mode

Setting a write protection


1. Click on the open padlock symbol to set the write protection.
2. Click on the closed padlock symbol to remove the write protection.

111 / 251
Archive mode

Editing an area
1. Click the camera icon next to the jog dial. If one camera is played or multiple cameras are
played synchronously, the current time of the archive is displayed next to the playhead (20). If
multiple cameras are played asynchronously, the current time of the archive is not displayed.
2. To specify an area on the timeline, click the Set markers icon.
3. Move the period under the area.
4. Click the Set markers icon again to specify the area.
5. Click the Delete area icon to remove the area from the timeline.
6. Click the Export area icon to export the area.
7. Select the required data format (Type), and then click OK.
The following export formats are available:
n SeeTec data format: The exported data are password-protected and can only be
viewed with the viewer.
n AVI: The exported data are not password-protected and can be viewed with any film
software. This represents a high data protection risk.
8. Specify the required export settings (see Multiple export of image data - p.72).

112 / 251
Archive mode

Searching for alarms


1. Click Alarm query in the Alarm search control. The Alarm query is displayed.

2. Specify the Time period for the alarm to be searched.


3. Optionally, select the recent time intervals of the last hour, the last 24 hours, the last week or
the current day.
4. Select the alarm scenario, either by name or by priority.
5. Selecting by name displays all scenarios within the selected time interval by name.
6. Selecting by priority displays a slider showing the lowest priority (1) and highest priority (11) to
be searched for. Move the slider to specify the range.
7. Enter the information that is obtained by network triggers (e.g. Network IO or SiPass) to be
searched for.
8. Select Manual alarm recording to include manual recordings in the search.
9. To search for comments, type the words into the comments text field.
10. Select the recordings of the camera or cameras to be searched.
11. To select all cameras, click Select all.
12. To deselect, click Delete selection.
13. Click OK to start the search.

113 / 251
Archive mode

Working with bookmarks

Adding a bookmark

1. Click Add bookmark in the Archive Player.


2. Enter a Name for the bookmark.
3. Select the Camera from the drop-down menu. All cameras in the archive player are displayed.
By default, the currently active camera in the archive player will be displayed.
4. Enter a description, if required.
5. Click Add bookmark. A yellow flag will be added to the time line in the archive player of the
selected camera.

114 / 251
Archive mode

Bookmark overview

1. Click Bookmark overview in the Archive Player.


2. Select one or more cameras in the top left area or click Select all to select all cameras dis-
played (i.e. cameras with bookmarks attached).
3. To deselect, click Cancel selection.
4. Activate Search within a range to narrow the time window for the search and specify the
time interval.
5. Click Start search to display only the bookmarks within the specified time interval. The book-
marks are displayed in the "Bookmarks" section.
6. Select a bookmark from the "Bookmarks" section. The information associated with the book-
mark (time, the assigned camera and the description) is displayed in the right area.
7. Double-click on the bookmark to navigate to the corresponding time marker.
8. To edit the information, click on the edit icon (1).
9. To delete the bookmark, click on the trash icon (2).

115 / 251
Archive mode

iSearch
ISearch helps you search for events in part of an image.
iSearch in archive mode 116
iSearch in surveillance mode 116
Creating a search area 116
Deleting a search area 117
Configuring a search 117
iSearch in expert mode 118

iSearch in archive mode

Keypad

n Previous frame (1): Jumps to the event's previous i-frame.


n Play backward (2): Plays the archived event in reverse chronological order.
n Pause (3): Pauses the playback.
n Play (4): Plays the archived event in the correct chronological order.
n Next frame (5): Jumps to the event's next i-frame.
n Real time (6): Plays the event in real time.

iSearch in surveillance mode


In surveillance mode it is possible to use iSearch within a selected analysis period. All motion is
detected. To filter individual events, you have to switch to archive mode.
1. Click iSearch on the left under the camera image to start the iSearch function.
The search starts automatically after a predefined analysis period is set and the desired part
of the image is selected (see Creating a search area - p.116). After the selected duration has
elapsed, you receive a message about the changes found in the selected area.
2. Click the Play icon to play back the recorded period.
3. Click the Pause icon to pause the recording.

Creating a search area


1. Select the camera image, and then select iSearch at the bottom of the image.
2. Select the duration of the recording if you like.
The default duration is 30 minutes.
3. Click the area icon (dotted line), and then select the shape of the area to be searched in.
The following shapes are available:

116 / 251
Archive mode

n Rectangle
n Circle/ellipse
n Polygon
4. Click the camera image, and then drag the shape to the desired position.
A semi-transparent area is laid over the image in the selected position.
5. If you selected the polygon for this purpose, click a point in the image for each corner and
close the polygon by double-clicking the last point.

Deleting a search area


1. Click the area, and then click Delete to delete only the selected area.
2. Click Delete all to delete all parts of the image.

Configuring a search

1. Define the search area (see Creating a search area - p.116), or mark the start and end of the
search area using the Set start/end marker icon (3).
2. Click the Set start/end marker icon again to clear the search area.
3. To define the area more precisely, you can use the "Keypad" (1) or enlarge or shrink the dis-
play of the desired area or update the timeline (2).
4. Select either Any kind of motion within the selected area or only A single event, depending
on what you want to take into account.
5. Any kind of motion: This search method searches for all changes to what the image con-
tains in the specified period. This can be done for the whole image or for parts of the image
specified by the user. The search may take some time depending on the selection.
6. A single event: This search method is particularly quick. It is possible to search through sev-
eral days of image material in a few seconds. However, this method only works if a single,
lasting event has occurred in the camera's selected field.
7. Select iSearch in expert mode, if appropriate, to carry out fine tuning.
8. Start the search.
9. Use the jog dial to move around in the recorded period.
The further you turn the jog dial to the right or left, the faster the sequence is played forward or
backward.

117 / 251
Archive mode

iSearch in expert mode

In expert mode, any motion in the sections outside the marked sections is also highlighted if
motion is detected inside the marked sections. The fine adjustments in Expert mode can be used
to adjust iSearch optimally to the environment shown in the camera images.
1. Enter the Dead time in seconds to specify how much time has to elapse after motion detec-
tion in the image or part of the image before another hit is displayed in the result list.
2. Specify the Pixel threshold for detecting changes in the image when the camera is operating
in extreme light conditions.
A change in the image is interpreted as motion if it exceeds the threshold. The higher the
threshold, the greater the change in the image has to be before it is considered to be motion.
3. Specify the Maximum number of frames per second if not all of the recorded frames have
to be searched. This can speed up the search significantly.
4. Specify the Maximum pixel limit for interval search. The maximum pixel limit for an inter-
val search only has an impact on searches for a lasting change. The specified start and end
points of the period in which the search is to be carried out are compared continuously. If the
two points currently diverge by more than the specified pixel limit, interval bisection is inter-
rupted, and a serial search with greater increments is started until the pixel limit is adhered to
again. The interval search is then resumed from this point.
This setting improves the search under extreme lighting conditions (strong contrast between
light and dark areas or objects passing).
5. Select Show help dialog after single search, if appropriate.
On completion of the search, you can specify in a dialog whether or not the event has been
found and whether you want to switch to archive mode with the event found.
6. To search for any movement within the entire image frame, activate Show movement in the
entire image. The search will return results if a movement takes place in the entire image
area.
7. To exit expert mode, click Normal mode.

118 / 251
8
Report mode
Report mode gives you an overview of the events that have occurred in the form of a list. Distinc-
tions are drawn between:
n user events (display of events that concern specific users)
n alarm events (events that have occurred)
n camera usage (display of events that a specific camera)
n system messages (display of events that concern specific services)
In addition, the camera usage of users can be tracked.
The maximum number of events to be displayed can be specified in the client con-
figuration (see Client configuration - p.55).

1. To switch to report mode, click the Report mode icon on the mode bar.
2. Click a column header in the main window to sort the events in ascending or ascending order
on the basis of the column's category (data/time, alarm, description).

Filtering the analysis 120


Exporting the analysis 121
Saving a query 122

119 / 251
Report mode

Filtering the analysis


1. To filter the events on the basis of specified criteria, select the type of event you are search-
ing for on the Query for control bar.
2. Select the user or users related to the events to be searched for.
3. Select the desired events.
The items are displayed in the list below.
4. Select specific items by clicking the check box in front of the item's name or click select all.
5. To deselect, click Delete selection.
6. To further narrow the selection, specify dates and times to define the time period.
7. Start the query.
Only the events that meet the selected criteria are displayed in the main window.

120 / 251
Report mode

Exporting the analysis


You can also export the result as a comma-separated file (*.csv).
1. Export the result in order to analyze it in a spreadsheet program

121 / 251
Report mode

Saving a query
Additionally, the search criteria can be saved for future queries.
1. Click Save.
2. Enter the Report template name.
3. Optionally, select Save timestamp relative to current time. This option will use the time
interval of the current query for the next query.

Example1

1. Click OK to save the query.


2. To use a previously saved query, select the name of the query in the drop-down menu and
click Start query.
3. To delete the saved query, select the query from the drop-down menu and click Delete.

1The current query searches for events within the last 24 hours. When the query is saved with a
relative time stamp, the next query will also search within the last 24 hours - relative to the next
query.

122 / 251
9
Configuration mode
You need adequate administrator rights for configuration mode.
In configuration mode you make all of the settings for the hardware, network, company, maps,
alarms and users.
To change to configuration mode, click the Configuration mode icon.

Searching for objects


You can search for all objects in configuration mode with the Search control below the work area.
The search starts as soon as the second character is entered and shows a list of all the results
(see Searching in configuration mode - p.82).

Additional settings
n See Company - p.128 for further settings for the company.
n See Administration - p.130 for further settings for maps, other hardware, user man-
agement, etc.

Status report for automatic image export


After switching to configuration mode, an additional item is displayed in the menu bar under the
Tools item. If any problems occur during the export of image data, the failed exports can be restar-
ted or deleted from list.

123 / 251
Configuration mode

1. Select the DeviceManager for which the problems occurred and click Start query. All failed
exports are listed with additional information such as the state of the export, the location, the
camera and the date of the image.
2. Select the failed exports and select Export again or Remove from list to either reattempt
the export or exclude it from further automatic export.
3. Click Apply and close the window.

124 / 251
Configuration mode

The Configuration wizard


You will find the configuration wizard on the starting page of configuration mode. This helps you
make settings for the hardware. You can use it to make basic settings for:
n Alarm scenarios
n for manual configuration, see Creating a new alarm scenario - p.166
n for configuration with the wizard, see Creating an alarm scenario with the wiz-
ard - p.167
n Cameras
n for manual configuration, see Creating a new camera - p.132
n for configuration with the wizard, see Creating a camera - p.125.
n Find available cameras. See Find cameras - p.125.

Creating a camera
The wizard helps you to easily create a new camera. The settings correspond to the steps you
have to take in the Cameras control (see Creating a new camera - p.132).
The wizard cannot be used for creating a camera using generic drivers. The generic
driver only receives the standard image stream from the camera.

Creating an alarm
1. Specify the name of the alarm, and then click Wizard to start installation.
2. Select the events that are result in the alarm, and then click Next.
3. Select the camera to be used as the alarm camera.
4. Specify the recording time of the alarm camera (in seconds).
5. Indicate whether you want a pre-alarm duration to be activated, and then set the duration (in
seconds), if applicable.
6. Click Next.
7. Specify which users are to be notified in the event of an alarm and whether the selected users
are to be notified by means of a message window.
8. Click Next.
9. Check the settings you have made, and then click Finish.
The alarm configuration is displayed. You can make further settings here.

Find cameras
By using the IP address assigned uniquely to a camera (device), the software is able to generate
an overview of all devices currently present in the network. By this, finding and configuring the
camera is improved.
Searching for devices 126
Adding individual devices 126
Adding multiple devices 127

125 / 251
Configuration mode

Searching for devices


1. Select Find devices in the Configuration mode view.
The Device Finder window is displayed. All cameras available on the network are displayed.
Unknown (i.e. not yet configured cameras) are displayed as gray text.

2. Click on the arrow triangle (1) to start a new scanning through the network.
3. To display additional network options, click on the circle icon (2). The IP Finder currently sup-
ports Onvif, UPnP, and Bonjour (available if installed on the system) protocols.
4. Deselect the protocol not installed.
5. Specify the timeout (in Seconds) for the protocols. This defines the time each protocol
"listens" for new devices. After the timeout, the search has to be triggered manually.
6. Click on the search filter icon (3) to toggle the display between all or only unknown devices.
Installed devices are hidden or shown.
7. Enter one of the following search items in the search field:
n IP address or
n manufacturer or
n device type or
n name
8. Click on the IP address of a camera to open the configuration page supplied by the camera
software.

Adding individual devices


1. Select a camera and change the settings (manufacturer, type, and DeviceManager), rename
the camera or change user name and password, if required.
2. Click on the Add icon in the camera row or click on the Add and Configure icon. After click-
ing on the Add and configure icon, the configuration settings for this device are displayed.
3. Configure the camera (see Cameras).

126 / 251
Configuration mode

Adding multiple devices


1. Select multiple cameras and change the settings (manufacturer, type, and DeviceManager),
rename the camera or change user name and password, if required.
2. To configure the cameras with the multi-configurations option, select Add with multi-config.
3. Click Add.

127 / 251
Configuration mode

Company
This control allows you to configure your company's branches and the hardware used at each loc-
ation. When the program is installed, one "Company" branch is set as the starting point. You can
specify the name of the branch and assign additional branches to it. The headquarter can have
sub-branches, but branches cannot have sub-branches.

About the relationship between the company and its branches


Branches are dependent subgroups of a company. Hence the administration of the company can
extend into the administration of a branch, but not vice versa. Equally, one branch cannot manage
another branch or the company itself. With the exception of cameras and DeviceManagement
servers, all other objects belong to the branch (e.g. a map of a branch cannot be connected to a
camera in the company, but the map in the company can be connected to a camera in the branch).
The relationship for individual items is as follows (not exhaustive):
n Confined to the branch are time settings, camera actions and recordings (also cameras
used for the licence plate recognition), buttons, video walls and groups, maps (if defined in
the branch), user and administrative rights (if defined in the branch), profiles, alarms,
sequences, and patrols (if defined in the branch), failover server (each branch must have its
own failover server)
n Confined to the branch and the company, but not other branches are: DeviceMan-
agement server and all associated services such as GND, SPS and SPC, maps (if defined
in the company), user and administrative rights (if defined in the company), profiles,
alarms, sequences, and patrols (if defined in the company)
Administrative rights from the company are not inherited by the branch.

Working with branches

Creating a branch or branch group


1. To create a new branch or branch group, click the New branch icon (2) or the New branch
group icon (1).
2. Specify the name of the branch or group, and then click OK.
The new branch or group is displayed.

128 / 251
Configuration mode

Editing the name of a branch or branch group


1. To edit the name of a branch or branch group that has been created, select the branch or group
in the window of the control.
2. Click the Edit icon (3).
3. Enter a new name for the branch or group, and then click OK.

Organizing branches in groups


Branches can be organized into branch groups to facilitate navigation. The branch groups are dis-
played as folders in the Company control as tree views (archive tree, LPR tree etc.).
1. To move a branch into a branch group, select a branch and drag the branch on the branch
group.
2. To remove a branch from a branch group, select the branch and drag it on the company name.

Deleting a branch or branch group


To delete a branch or branch group, you first have to delete all of the objects assigned
to it.

1. To delete a branch or group, select the branch or group and click the Delete icon (5).
2. Click OK to confirm.
The branch or group is deleted.

The top-level branch (company) cannot be deleted.

Displaying a branch overview


1. To display all of the objects and branches, click the Site map icon (4).
2. Select Consistency check to display any assignment inconsistencies.
For example, these may be maps with cameras assigned to different locations.

129 / 251
Configuration mode

Administration
The Administration control contains all configuration settings. The Administration control allows
you to assign hardware (e.g. cameras), actions and the authorization manager to the specified
Administration and manage new objects such as alarm scenarios, for example.
It is recommended to obtain a basic understanding of the concept of the underlying
rights management before configuring the system.

Functions
Depending on the hardware and network architecture, you can configure the following functions:
n Cameras. This function allows you to configure and manage the camera hardware and the
associated video server.
n Other hardware. This function allows you to configure and manage additional devices.
n Users. This function allows you to configure and manage the users.
n Groups. This function allows you to configure and manage the user groups.
n Profiles. This function allows you to configure and manage the user and group profiles.
n Time management. This function allows you to configure and manage the time templates
to coordinate the standard image recording of individual or multiple cameras as well as
validity in alarm scenarios.
n Alarms. This function allows you to configure and manage the alarm scenarios.
n Layers. This function allows you to configure and manage the layers of the main window in
surveillance mode.
n Maps. This function allows you to configure and manage the maps of the site or building
under surveillance, including the location of the surveillance hardware.
n Buttons. This function allows you to configure and manage the sequences of actions that
can be triggered in the controller in surveillance mode.
n Web pages. This function allows you to embed web pages in the layer.
n Patrols. This function allows you to configure and manage multiple cameras, set positions,
maps and layers one after the other for a user-definable time.
n Sequences. This function allows you to configure and manage the sequences of actions in
which multiple set positions are approached one after the other and/or actions are triggered.
n Video walls. This function allows you to configure the arrangement of video wall screens.
You can drag and drop camera images, layers, maps and web pages to display them on
video walls (see Other hardware for information on how to configure the screens).
n License plate groups. This function allows you to configure and manage the number plate
recognition function of the LPR module.
n Server. This function allows you to configure the device services.
n System. This function allows you to configure and manage system-wide settings for the
network, automatic backups, communication settings and event management settings.

Editing menu

130 / 251
Configuration mode

The following editing modes are available on the Administration control:


n Create new object (1)
n Create new folder (2)
n Duplicate object (3). Only one object can be selected.
n Edit object (4). Depending on the context, many different configuration pages or a multiple
configuration can be open.
n Delete object (5)

Concept
Schematic diagram of rights and profiles

For a better understanding of the administrative rights, the following texts provide a look at the
concept.

Administrative rights and user rights


After the software is installed, two types users can be configured:
n Administrator. An administrator is installed by default. The administrator is a user with
configuration rights and belongs to the administrator group. An administrator inherits the
administrator group's rights. The administrative rights of the group and hence the admin-
istrators can be restricted to branches, where the administrator may manage only the
objects (e.g. cameras) within the branch without "seeing" other branches.
n Users. The user has restricted rights and can be member of one or more user groups. A
user inherits the rights of his group or groups. The user group's rights are defined in the
Group control. Additionally, the user may have specific rights that are not included in his
groups' rights. These additional rights are defined in the User control. Group rights take pri-
ority over user rights. In other words, a user in a group cannot receive any exceptions (i.e.
further restrictions or "negative rights"), only additional rights. A user's membership of par-
ticular groups is revealed by the colored fields (see Groups for information on how to con-
figure the colors of groups).

131 / 251
Configuration mode

Multi-level administration
The video management system has multi-level administration, which allows a user to be assigned
administration rights to only a part of the installation or some of the functions. For a general
description of administrative and user rights, refer to Administrative rights and user rights -
p.131. For defining user group rights, see Managing user group rights - p.162, for defining spe-
cific user rights, see Managing user rights - p.159.
The system allows subdivision of the administrative rights levels and division into a control center
and as many branches as required. The branches are defined as logical subunits with their own
configuration context and cannot be nested.
n Users or other entities such as user groups, maps, Device Manager servers or cameras
that belong to a branch are restricted to their associations only, so that users only
receive access to video data and the configuration of the associated branches.
n Users or other entities such as user groups, maps, device managers or cameras that
belong to the control center are also able to interact with branches. Users or user groups
that belong to the control center are explicitly assigned administration rights for the applic-
able branches.
The video management system prohibits simultaneous configuration of a branch by two or more
users, but it does allow simultaneous configuration of different branches by different users.

Profiles
Each user group automatically is assigned to a profile which is defined in the Profile function.
Users within a group inherit the group's profile, but may have additional profiles depending on the
groups they belong to or profiles that have been assigned to the individual user. When a user logs
in using a user name, he or she is assigned the appropriate profile. The administrator can enable or
disable profiles for users and user groups.

Cameras
The Camera function on the control bar allows you to configure and manage the video hardware.
Creating a new camera 132
Selecting and deselecting multiple cameras at once 134
Configuring multiple cameras 134
Configuring a camera 135
Duplicating a camera 143
Deleting a camera 143
Converting a camera 143

Creating a new camera


For creating multiple cameras quickly, see Find cameras in the configuration wizard.

1. Select the location in the Company control.


The selected location is displayed in the title bar of the control bar.
2. Select Cameras in the control bar.

132 / 251
Configuration mode

3. Click Create new object in the camera control bar.

4. In the Create camera window, enter the name for the new camera.
If you want to configure the new camera using the configuration wizard, select Wizard .

The wizard cannot be used for creating a camera using generic drivers. The generic
driver only receives the standard image stream from the camera.
5. Select the manufacturer and type of the camera.
n Generic video driver: The generic video driver can be used to integrate cameras that
are not integrated into the SeeTec software. The functions are restricted to displaying
and recording the camera image. The video parameters, e.g. the resolution and the
frame rate, must be configured on the camera directly. SeeTec does not accept liability
for correct operation of cameras that are integrated by the generic video driver.
n Generic camera driver (vendor specific, see the PDF "SeeTec_Cayuga_Generic_
Drivers.pdf", only available in English): The generic camera driver obtains the sup-
ported features directly from the camera. SeeTec provides generic camera drivers for
Axis, Hikvision, Samsung, and Sony. All models available at the time of the current

133 / 251
Configuration mode

release are supported.


NB: some models that are different from the manufacturers' standard can cause dif-
ferent behavior of the generic camera driver. Any camera planned to be used with a
generic driver should be tested before making any binding agreements. Approved
devices are listed in the document "Supported 3rd Party interfaces".
Generic camera drivers do not support offline configuration. For projects
with many cameras of the same type, at least one camera per model must be
connected and configured. Afterwards, the cameras may be duplicated and
configured as as often as required.
n ONVIF / ONVIF Profile S: The ONVIF video driver can be used to integrate cameras
that are not integrated into the SeeTec software. The functions are restricted to dis-
playing and recording the camera image. The video parameters, e.g. the resolution and
the frame rate, and motion detection can be configured depending on the ONVIF ver-
sion. SeeTec does not accept liability for correct operation of cameras that are integ-
rated by the OnVIF video driver.
6. Select an authorization, if required, and enter a user name and password.
7. Enter the host name or IP address of the camera.
8. Select the DeviceManager, if applicable.
If multiple servers have been installed for storing the image data (see Distributed server in the
installation routine), the available servers are displayed.
9. Optionally select the camera's manufacturer in the Available IP installers drop-down menu,
and then click IP setup.
The subsequent configuration of the network address of the camera depends on the man-
ufacturer's installation program and may have to be installed separately. Note the associated
documentation of the installation program.
10. Click OK to confirm your entries.
The new camera is displayed in the camera control bar.

Selecting and deselecting multiple cameras at once


1. To select a contiguous list of cameras, select the first camera in the camera control by click-
ing its check box. A check mark is displayed in the box.
2. Press the Shift key and select the last camera in the row by clicking its check box. All cam-
eras in between are selected.
3. To deselect a contiguous list of cameras, deselect the first camera in the camera control by
clicking its check box. The check box is empty.
4. Press the Shift key and deselect the last camera in the list by clicking its check box. All cam-
eras in between are deselected.
5. Press the Shift key and click on the check box in front of the list name. All cameras are selec-
ted.

Configuring multiple cameras


To facilitate camera configuration, multiple cameras can be configured at once, even across dif-
ferent branches. However, not all settings are available. For the configuration of specific cameras,
see Configuring a camera - p.135.
1. Close all camera configuration tabs.
2. Click Cameras in the company control.
3. Select the cameras you want to configure.
4. To configure multiple cameras at once, close all camera tabs in the work area.

134 / 251
Configuration mode

5. Click Multi Configuration. The camera configuration view is displayed. Unavailable options
are greyed out.
When configuring multiple cameras at once, only those settings can be changed that apply to
all cameras.
6. Activate or deactivate the required settings. For setting details, see Configuring a camera -
p.135.

Configuring a camera
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the camera in the overview.
The settings of the camera are displayed in the main window.
3. Network cameras consist of at least one camera unit and a video server unit (Encoder). That
is why the video server and one or more cameras are displayed under Hardware. Accord-
ingly, the settings of a network camera are always subdivided into video server settings and
camera settings. The video server settings include all of the connection-specific parameters,
while the camera settings include all of the image quality and image storage settings.

Encoder/camera
General
1. Activate or deactivate the camera.
2. Enter the name of the network camera.
3. Select the protocol type (http or https), and then change the port number, if necessary.
4. To test the incoming camera signal, click the Browser button.
The browser defined in the system settings ("standard browser") starts up, and the camera
image is displayed in the browser window.
5. The application programming interface (API) is identified automatically. If the API version can-
not be retained, ask SeeTec Support for the correct assignment of the API version to the cam-
era firmware.
6. If necessary, change the server for managing the devices (DeviceManager Server).
7. Specify whether separate authentication is to be required for the camera and, if necessary,
enter a user name and password.
8. Select Virtual cameras to display and save multiple image details from a camera as a sep-
arate camera. The image details can then be specified in the virtual cameras.
This function is only available for specific camera models.
After activation of the virtual camera function, multiple virtual cameras are automatically cre-
ated. The number of virtual cameras depends on the camera model. They are configured sim-
ilarly to a standard camera.
Digital inputs
1. Select the digital inputs and specify unique names for Name for CLOSED and Name for
OPEN.
2. Specify the interval for the dead time (in seconds) after which a signal is analyzed again.
That prevents the event database from becoming unnecessarily large when there are events
in rapid succession. This setting may also be used to trigger an alarm (see Alarms).
3. Apply the set values if you want to make further settings.
4. Save the set values to apply the values and conclude input.
5. Digital outputs
6. Select the digital outputs and specify unique names for Name for CLOSED and Name for
OPEN.

135 / 251
Configuration mode

7. Specify the hold time for the time (in seconds) within which an output is opened or closed (0
= infinite).

Camera
General
1. Activate or deactivate the camera.
2. If necessary, alter the name of the camera.
3. If necessary, change the camera ID and adapt the ID of the associated camera to the hard-
ware. The camera ID is only required for some camera controllers.
4. Select the camera type.
5. Camera: The camera is used with or without the PTZ control functions, depending on the cam-
era type.
6. External PTZ: If the camera does not have its own PTZ control unit, you can divert the con-
trol signals of an encoder to another camera with a connected PTZ control unit. A separate
RS-485 port of the encoder is required for each diversion.
7. To change the camera type, click Open Converter (see Converting a camera).
8. Specify whether a titleis to be displayed in the camera image, and enter the title.
9. Select whether the date and time are to be displayed in the camera image.
10. If the camera was not mounted upright, you can use the Rotate image function.
You can rotate the image in 90° steps (90°, 180°, 270°).
This function is only available for specific camera models.
11. Select Display buffer and specify the required size (0-1000 ms).
If you use the display buffer, the images from the camera are buffered on the SeeTec client
before they are displayed. This normalizes fluctuations in the live display in terms of the inter-
vals between different images. These occur, above all, with cameras that have a low-band-
width connection.
PTZ cameras should not get a display buffer, since the delay in the display of images affects
manual control.
12. Select Control camera if you are configuring a PTZ camera or a control unit in order to give
the user the option of controlling the camera in surveillance mode.
13. Specify the PTZ sensitivity of the camera control.
14. Select the camera position to give the user the option of defining and using the preset cam-
era positions in surveillance mode.
15. Select Invert PTZ control to correctly control cameras that are mounted upside down.
16. Select Pan/tilt mode.
n Continuous control: During continuous control a graphic with cross hairs is shown.
The further from the center point the user clicks the faster the camera moves in that dir-
ection.
n Absolute control: In absolute control three scroll bars are shown, two of which are for
positioning the camera (vertical and horizontal) and one for adjusting the zoom. The
zoom can also be adjusted with the + and -. keys The further from the center point of
the scroll bars the user clicks the faster the camera moves in that direction.
17. If the camera has a wide-angle lens (fisheye lens), select the manufacturer of the lens and its
parameters.
18. If available at the camera, select the dewarping mode and set the alignment of the
camera.
The dewarping mode determines the extent to which the distortion of the image produced by
the fisheye lens is rectified.
19. Make a selection for Action in the case of inactivity to specify which action is to be per-
formed if the camera is inactive.
The selected action is displayed.
20. Specify for Timeout the time after which the action is to be performed if the camera is inact-
ive (in seconds).

136 / 251
Configuration mode

21. Make entries for Action at start of video stream and Action when the video stream
stops.
The selected actions are displayed.
22. The action at the start of the video stream is triggered if a user has the camera in sur-
veillance mode in the foreground, i.e. is viewing the current live image of that camera.
23. The action when the video stream stops is triggered if the current camera is closed or a dif-
ferent layer is moved to the foreground.
24. Make a selection for Action in the case of inactivity to specify what is to happen if the cam-
era is inactive.
The selected action is displayed.
Image storage - Multimedia database
Images are stored according to the so called "ring buffer" queue. For a brief overview, see the fol-
lowing illustration:
Overview1
All of the image storage settings (e.g. the size of a camera's storage area on the hard disk) are con-
figured here. To prevent sensitive image data from being overwritten, standard and alarm record-
ings are configured separately.
1. Select Multimedia database from the Image storage menu.
2. Select whether the image recording has a priority: the oldest recordings will be overwritten at
the latest when not enough storage is allocated or the recording interval is too long.
3. Select whether standard recordings are to be carried out with this camera.
4. Select the recording period.
You specify the exact period using a time template that you create in the Time Manager. By
default, continuous recording is started ("Always").
5. Select the time limit and enter the maximum storage duration.
If the time limit is exceeded, some of the oldest recordings will be deleted to free memory.
6. You can specify a condition for starting image recording.
7. Select whether alarm recordings are to be carried out with this camera.

When the storage capacity reaches 89%, a message is triggered via SNMP, email or as message
in the client.
As soon as the storage capacity reaches 90%, the ring buffer system starts deleting the image
data. The image data of the prioritized cameras are the last to be deleted.
If a camera is deactivated, the ring buffer stops for the image data of the deactivated camera.

137 / 251
Configuration mode

8. Select the time limit and enter the maximum storage duration.
If the time limit is exceeded, some of the oldest recordings will be deleted to free memory.
9. Specify a pre-alarm duration (up to a maximum of 3600 seconds) to record a period before
the alarm is triggered. The data recorded in the buffer memory is transferred to the alarm track
when manual recording is started.
10. Specify a maximum post-alarm duration for manual alarm recording to record a period after
the alarm is triggered.
If manual alarm recording is not stopped, the recording will stop automatically at the end of the
specified post-alarm duration.
11. Activate automatic reduction of the frame rate of standard recordings or alarm recordings after
a specified period (data-aging standard recording or data-aging alarm recording).
On expiration of the specified period, the frame rate of the stored recordings is reduced to
save memory (data aging).
Example 1
12. Specify the time limit after which the recordings are to be compressed and released from the
audio track.
13. Specify the frame rate (in fps) at which the recordings are to be stored after the time limit is
exceeded. This reduces the image data to the set frame rate.
14. Motion JPEG recordings will be reduced to the defined frame rate
15. MPEG4 / H.264 recordings will be reduced to i-frames (the p-frames will be deleted)
16. Specify the time and date for the oldest full frame in the buffer. As soon as this limit is
reached, a system message will be displayed.
Image storage - Edge storage
The menu item Edge storage is only displayed if supported by the selected camera.

1. Edge storage uses the camera to store images on an internal SD card.


2. Select Edge storage from the Image storage menu.
3. Select the required type edge storage.
4. Gap filling: Fills gaps in the recording when the connection between the camera and the
server has been temporarily interrupted.
5. Edge storage import: Stores the images on the internal storage of the camera. The images
can be manually transferred to the archive.
6. Select the Recording type of the camera recording (standard recordings or alarms).
For gap filling, the recording type must be set to Standard recording.
7. Specify the execution time and date for the server to look for recordings on the edge storage.
If the server finds recording gaps in the archive, they are filled with the recordings from the
camera.
Video streams
In the video streams you can specify and configure different profiles for the transmission of image
data. The software creates a base profile during installation of the camera.
1. Click New to create a new video stream.
The maximum number of streams depends on the camera type.
2. Select the video stream, and then click Edit to make the required settings.
3. Select the capture mode.
Capture mode can only be selected if it is supported by the camera. With multi-channel

1You record 20 images a second with an I-frame interval of a second. Data aging reduces the
frame rate to one image a second, because all P-frames are deleted.
Tracking data and audio recordings are always deleted.

138 / 251
Configuration mode

devices or virtual cameras, a change to the capture mode applies to all devices under this
video server. Hence the capture mode can only be defined for the base stream (displayed with
a home icon), but affects all subsequent streams of the selected camera.
Depending on the setting selected, the camera provides different frame rates and resolutions.
The camera may restart and then be inaccessible for a few minutes.
4. Select the type of the video stream.
The following video streams are available, depending on the hardware:
n Motion JPEG (M-JPEG)
n MPEG-4/H.264 (required for audio)
n MxPEG
n RTSP
5. The selected video codec is displayed.
The screen saver and screen lock of the client computer must be disabled for dis-
play on the client.
6. Select the transmission mode.
n RTP over UDP Unicast (default setting): Communication between the SeeTec server
and camera is via TCP port 554 (RTSP port). Image transmission from the camera to
the SeeTec server is via a negotiated UDP port.
n RTP over UDP Multicast: Communication between the SeeTec server and camera is
via TCP port 554 (RTSP port). Image transmission is via a multicast address provided
by the camera. RTP over UDP Multicast should only be used if third-party systems
(e.g. Barco or eyevis) and the SeeTec server access the camera simultaneously.
n RTP over RTSP over TCP: Communication between the SeeTec server and camera
and image transmission is via TCP port 554 (RTSP port). This setting is recommended
where there is a poor network connection between SeeTec servers and camera. The
disadvantage of this transmission method is the possibility of latency times, because
corrupt data must be transmitted again.
n RTP over RTSP over HTTP Unicast: Communication and image transmission is via a
HTTP tunnel (port 80 TCP). This setting is recommended where there is a poor net-
work connection between SeeTec servers and camera. The disadvantage of this trans-
mission method is the possibility of latency times, because corrupt data must be
transmitted again.
7. Select the transmission of audio signals.
This function is available only if the camera can process audio signals. Selection of the cam-
era is necessary only for multi-channel devices.
8. Specify the Frame rate (fps) and Quality (compression) separately for standard and alarm
recording.
When there are differences in the settings for standard and alarm recording in MPEG-4/H.264
streaming, it can take several seconds to switch from standard to alarm recording. The length
of time taken depends on the camera. There may be no recording available during this period.
9. Select a suitable resolution for the camera image.
10. Select the required video classification (refer to Configuring the video classification -
p.184).
11. Select multicast streaming to display one video stream simultaneously on multiple clients.
Multicast should only be used if there is low bandwidth between the Device Manager and cli-
ents.
Multicast-capable network hardware is required for multicast streaming.
12. Enter the network address and port number of the multicast server.
13. Specify the validity period (TTL) after which the client has to log in to the multicast server
again.A short TTL results in a higher network load.

139 / 251
Configuration mode

Audio
If the camera supports transmission of audio signals, the audio codec can be configured.
However, the adjustments in the camera control in surveillance mode override the camera set-
tings. To use the transmission of audio signals, the transmission has to be activated in the video
stream settings.
1. Select the MPEG-4/H.264 mode for video streams in the video stream settings.
2. Select the associated camera.
3. Select the correspondingaudio codec.
Video gateway
1. Select Gateway, and then specify the port number if intelligent image analysis is to be carried
out by a via:sys box from viasys | Intelligent Video GmbH.
Camera positions
If the selected camera does not support PTZ, this menu item changes to "Digital Pre-
sets". All camera positions will be defined using the digital zoom
Camera positions can be created and deleted as "presets" by the user in surveillance mode and by
the administrator in configuration mode.
Admin presets are created and managed by the administrator.
1. Use the PTZ controller or an external controller device to move the camera to the required pos-
ition.
2. Click New.
3. Enter the name of the new preset position, and then click OK.
The name is displayed in the column, and the preset position is assigned the next free pos-
ition number.
If there are not enough position numbers, the additional positions are added in a drop-down
list.
4. To remove a preset position, select the name from the list and click the Delete button.
Image data export
1. Specify whether standard recordings and alarm recordings are to be exported automatically.
The time and path for the export are specified in the Device Manager configuration
(see Configuring the Device Manager (DM) - p.181).
2. Specify the time period to be exported.
You specify the exact period using a time template that you create in the Time Manager.
3. Specify whether the camera nameandtime of recording are also to be exported and dis-
played in the AV export.
The camera name and time are specified in the exported sequence at the bottom of the image.
AV export is used for exporting alarm scenarios.
4. Select the maximum resolution for the export.
5. Specify whether the length of the recording is to be limited.
6. Enter the maximum duration of the export (in seconds).
7. Select Reduce frame rate separately for the video settings and single-image sequences in
order not to export all of the images of the recordings of alarm scenarios.
8. Specify the maximum frame rate (in fps).
9. Select Create ZIP file to compress the exported data after export.
Server side operation
The server side motion detection of the server detects motion within the image detail and, if neces-
sary, triggers an alarm scenario. The motion detection feature only delivers usable results indoors.
The Video Analysis module has to be installed and configured prior to configuring the

140 / 251
Configuration mode

server side operation (see Adding server-based motion detection module - p.212).

1. Select the server side operation menu.


2. Select a video classification. The video classification determines which video stream is used
for motion detection. The video streams are ordered according to their use of network band-
width ("HD quality" requires a broadband connection, whereas "Mobile" decreases the image
quality for slow networks).
For image comparison, select a video stream for low bandwidths. Motion detection, reference
image comparison and tampering resize the images to 320x240 internally if they are larger.
Server side operation: Motion detection
1. Select Motion detection from the Server side operation menu (you may have to click on the
triangle in front of the menu).
2. To activate the motion detection, select Yes from the dropdown-menu.
3. Click the plus sign to the right of the camera image.
4. Use the polygon tool to draw the region on the camera image.
Different sections are only required if different alarm scenarios are to be triggered for each sec-
tion.
5. Enter a name for the region(s).
6. Adjust the motion sensitivity as appropriate.
7. Specify the interval for the dead time (in seconds) after which a signal is analyzed again.
8. Click Start test to check the settings.
9. If necessary, adjust the threshold as of which motion is to be detected.
Server side operation: Reference image comparison
The live camera image is compared to a defined reference image of the same camera view (see
Manual reference image comparison - p.74). An alarm will be triggered if the images do not
match and triggers a second alarm when the original camera view is restored.
1. Select Reference image comparison in the server side operation menu.
2. To activate the automatic image reference comparison, select Yes from the dropdown-menu.
3. Click Create reference image to select an image from the camera that serves as a backdrop
for the motion detection.
4. Specify the values for the Execution time pointby defining the time interval (in minutes, at a
certain day time or on certain days per week at a specific time) for the comparison between
the reference image and the live image.
Server side operation: Tampering detection
The tampering detection recognizes manipulation of the camera orientation but uses edge detec-
tion for comparison. The reference images are generated automatically from every image and com-
pared to the following. Specific tampering events can be used as triggers for an alarm scenario.
After an alarm, the reference image will be recreated.
1. To activate the tampering detection, select Yes from the dropdown-menu.
2. Set the Minimum allowable deviation for the live image (in percent) to specify the threshold
value that triggers the motion detection. The higher the value, the less sensitive the image
detection will be.
3. To trigger an alarm, an alarm scenario has to be configured for the camera (see Creating a
new alarm scenario - p.166).
4. Select the alarm by opening the camera module in the camera control and selecting the alarm
scenario.
1. Apply the set values if you want to make further settings.
2. Save the set values to apply the values and conclude input.

141 / 251
Configuration mode

Camera side operation: Motion detection


1. Choose Motion detection in the Camera side operation menu.
2. Activate the appropriate number of windows, and enter a name and interval for the dead time
(in seconds) after which a signal is analyzed again. This setting may also be used to trigger an
alarm (see Alarms - p.166).
Camera side operation: Tampering detection
Depending on the camera model used, specific events can be used as triggers for an alarm scen-
ario (see the respective camera manual for more information about the camera specific tampering
features).
1. Specify if a notification is to be sent to the server automatically, if there is tampering with the
camera or the video signal is lost.
An action can be started once notification is received. This setting may also be used to trigger
an alarm (see Alarms - p.166).
2. Select Yes to activate camera side tampering detection.
3. Select Yes for sending notifications if the video signal is lost. This will trigger a notification in
the alarm list if the video signal drops out.
Privacy masking
This function can be activated and disabled in surveillance mode and archive mode by
administrators and users with corresponding rights.
Sensitive areas or movements in the image can be hidden by means of a mask. This prevents the
user from seeing these areas. Depending on the user authorizations, the mask is displayed in sur-
veillance mode and archive mode.
1. Activate privacy masking.
2. Select the Static objects or Scrambling control.
n You can use the Static objects method to mask fixed individual areas of the camera
image. The masking follows the camera so that it is always the same image detail that is
masked.
n The Moving objects method of the Scrambling function allows you to mask moving
objects or people. Office mode of the Scrambling function masks all differences from a
reference image.
Privacy masking: Static objects
1. Select the Static objects function and select the shape of the area to be hidden.
2. Select the transparency, color and shape of the mask, and then drag the shape over the cam-
era image.
You can select either Delete to delete a single masking or Delete all to delete all of them.
Privacy masking: Moving objects
1. Select the Scrambling function and specify how long the object is to be masked for after it
comes to a halt (Masking duration), the pixel size to be used for masking (Masking) and
how sensitive the response is to a moving object (Sensitivity).
2. Select Black and white to display the mask in black and white. Otherwise, the mask is dis-
played with coarse pixels in the original colors.
Privacy masking: Office mode
1. Select Office mode, and then load a reference image. All differences to the stored reference
image are masked.

142 / 251
Configuration mode

2. To delete all masks in the archive, click Delete history and then Yes to confirm.

If privacy masks with archived recordings are deleted, only users with the appro-
priate permissions are able to see the recordings.

Record on motion
1. Make a selection in the drop-down list to specify whether alarm recording is to be triggered in
the event of motion detection.
If applicable, the camera control then automatically follows the recorded object.
n No: If motion detection is not activated, the camera-specific record on motion function
is activated (if available).
n Yes: If motion detection is activated either by using the server settings or the camera
settings, the function will be used and the camera-specific setting takes priority.

Duplicating a camera
Duplicating a camera enables camera settings to be applied to a large number of identical cam-
eras to save time.
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the camera in the overview.
3. Click the Duplicate object icon, and specify the number of copies.
4. Enter the name of the duplicated camera.
The names of the cameras are also assigned a number, which is automatically incremented.
The name can also be changed after it has been set (see Configuring a camera - p.135)
5. Enter the IP address of the first copied camera in the address range.
The IP addresses are automatically incremented based on the number of copies.
6. Select the DeviceManager.
7. Activate the properties that are to be transferred to the copied cameras.
8. Click OK to accept the name.
The new camera is displayed in the overview.

Deleting a camera
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the camera in the overview.
3. Click the Delete object icon.

All saved recordings of the camera are deleted.

Converting a camera
An installed camera can be converted into a new camera by transferring the camera configuration
and recordings (driver conversion). Alarms, patrols and other settings are inherited by the new
camera. This conversion can be used to install a new camera to replace a defective one.
Camera using the generic driver are not fully supported and may only be converted par-
tially.

143 / 251
Configuration mode

1. Click Open converter in the general settings of the selected camera.

2. Select the manufacturer and the camera type of the new camera.
3. Enter user name and password, if required.
4. Click Verify conversion. A list of possible conversion issues is displayed.
5. After resolving the issues, click Apply to start the conversion process.

Other hardware
The Other hardware function in the Administration control allows you to configure and manage
additional devices. Additional devices include items such as network interfaces, video walls,
alarm systems and I/O modules. The devices can be partly administered and actuated with the
SeeTec software and also with software from third-party manufacturers.

Working with other hardware


Working with other hardware follows the same basic procedures.

Creating new hardware


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Other hardware in the Administration control.
3. Create a new hardware item.
4. Enter the name for the new hardware.
If you want to configure the new hardware using the configuration wizard, select Wizard in
the dialog box.
5. Select the manufacturer and type of the hardware.
The following manufacturers and types are available:
n SeeTec: network I/O, display agent and VoIP
n SeeTec Video Analytics: Generic VCA Channel, license plate recognition, SeeTec
Analytics Basic / Enterprise / Premium, SeeTec Counting Suite
n Advantech: ADAM 6050/6050W, ADAM 6052, ADAM 6060/6060W/6066
n Axis: P8221
n Wago: Wago System 750 I/O module
n Third-party interface: eyevis wall, SPC alarm system, Aritech Alarm Cen-
ter,Schneider Intercom ICX Connection, Siemens SPC 4000/5000/6000, SiPass
Access Control Software, TDSi access control
See Integrating other hardware - p.145 or ask SeeTec support about the use of third
party interfaces.
1. Select an authorization, if required, and enter a user name and password.
2. If necessary, enter the name of the host or the IP address of the device.

144 / 251
Configuration mode

3. If necessary, select the Device Manager.


4. Click OK to confirm your entries.
The new hardware is displayed in the overview.

Integrating other hardware


For the integration and configuration of other hardware, consult the following technical guides:
n Bettini DVRs "Integration Bettini DVR"
n Samsung DVRs: "Integration Samsung DVR"
n Aritech Alarm Center: "aritech_alarm_center_(ATS)"
n TDSI Access Control Software: "tdsi-connection"
n Schneider Intercom Software: "schneider_intercom_icx"
n Siemens SPC Alarmsystem Software: "siemens_spc_alarmsystem_(EDP_protocol)"
n SiPass access control software: "Siemens SiPass Integrated"

Configuring hardware
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the hardware in the Other hardware overview.
3. Edit the settings for the hardware.
n SeeTec
n SeeTec Verticals
n SeeTec Video Analytics
n Advantech
n Wago
n Third-party Interface

Deleting hardware
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the hardware in the Other hardware overview.
3. Click the Delete object icon.

Duplicating hardware
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the hardware in the Other hardware overview.
3. Click the Duplicate object icon, and then enter the name for the duplicated hardware.
4. Click OK to accept the name.
The new hardware is displayed in the overview.

SeeTec
Other hardware from SeeTec includes the configuration of
n Network input and output
n Display agent video wall

145 / 251
Configuration mode

n VoIP
For a description on how to configure, refer to the sections below.

SeeTec network I/O


General
1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, enter the valid IP addresses or IP address ranges to create a mask within
which input operations are to be run.This is optional. You can specify any number of masks
separated by commas (no spaces). The placeholders * and - can be used in a mask. If no
mask is assigned, every incoming connection is accepted.
Example1
4. If necessary, change the server for managing the devices (DeviceManager).
This option is only available for a user-defined installation.
Inputs
1. Click the Add new input or Add 10 new inputs button to create one or ten new inputs.
2. Activate the desired input and change the name.
3. Select the network protocol for the input.
The following protocols are available:
n TCP for connections within the network
n HTTP for connections over the Internet.
4. Enter the IP address and the port number with which the output is to establish a connection.
5. Specify the interval for the dead time (in seconds) after which a signal is analyzed again.
6. If the HTTP protocol is selected, enter the user name and password for accessing the hard-
ware.
7. Select the type of password encryption.
If ASCII is selected, only upper- and lower-case letters and numbers can be used, not special
characters. With HEX, all characters are permissible.
8. Enter the text to be displayed as soon as the hardware is accessed, and (optionally) specify
the control character encoding for the correct display of paragraph changes, for example.
9. To delete inputs, select the inputs you want to delete, and then click the Delete inputs
marked for deletion button.
Outputs
1. Click the Add new output or Add 10 new outputs button to create one or ten new outputs.
2. Activate the desired input and change the name.
3. Select the network protocol for the output.
The following protocols are available:
n TCP for connections within the network
n HTTP for connections over the Internet.
4. Enter the IP address and the port number with which the output is to establish a con-
nection.You can assign to the same IP address to multiple outputs.

1
10.0.8.9-23,10.0.8.7,192.*.*.*
Three restrictive masks have been defined:
Mask 10.0.8.9-23 allows all IP addresses in the range 10.0.8.9 to 10.0.8.23. Mask 10.0.8.7 allows
the individual IP address.
Mask 192.*.*.* allows the complete subnet 192.

146 / 251
Configuration mode

5. If the HTTP protocol is selected, enter the user name and password for accessing the hard-
ware.
6. Select the type of password encryption.
If ASCII is selected, only upper- and lower-case letters and numbers can be used, not special
characters. With HEX, all characters are permissible.
7. Enter the text to be displayed as soon as the hardware is accessed.
8. To delete outputs, select the outputs you want to delete, and then click the Delete outputs
marked for deletion button.

Display agent video wall


1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, change the IP address of the computer on which the SeeTec display agent is
installed.
4. Specify the number of windows to set the monitors on the computer on which the SeeTec
display agent was installed.
We recommend specifying one window per monitor.

VoIP
The configuration sets suitable hardware (VoIP-capable devices such as Mobotix cameras and
door intercom systems).
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, change the SIP address of the computer on which the VoIP is installed.
4. Select the DeviceManager.
5. Select whether the function key is to trigger a DTMF sequence or a SeeTec button.
6. If necessary, specify the DTMF sequence, which can be found in the manual supplied by the
device manufacturer, or select a SeeTec button:
To configure the buttons, see Configuring a button - p.173.
7. Specify the DTMF sequences for the start and end of the call.
Voice over IP recording
1. Activate Standard VoIP recording, select the recording period, and enter the size of the
recording to limit the available storage space.
2. Activate Additional time limit, and enter the maximum number of days and hours for the
total recording time.
3. Activate Alarm VoIP recording to set the storage space for the alarm recordings.
4. Activate Additional time limit, and enter the maximum number of days and hours for the
total recording time.
5. Apply the set values if you want to make further settings.
6. Save the set values to apply the values and conclude input.

SeeTec Video Analytics


Because the attention of the observers falls as the number of monitors that are observed
increases, the SeeTec software gives you the option of performing intelligent video analysis. Intel-
ligent video analysis reduces the stress on the personnel and significantly improves the sur-
veillance quality.

147 / 251
Configuration mode

For performance reasons, the video analysis module should be installed on a dedicated
server (see User-defined installation).

Generic VCA Channel


The Generic VCA Channel module is used to connect APIs from third-party suppliers via an open
application programming interface (API). The interface sends image data to SeeTec Cayuga and
receives events that, for example, require an alarm to be triggered.
In order to be detected correctly when the software starts up, the API must be stored in
the "\VersatileApplications\VCAPlugin" subfolder of the SeeTecCayuga installation
folder. The API module must be installed as either a 32-bit or 64-bit version, depending
on the program version.

1. Activate the module and, if necessary, alter the name.


2. Select the API module.
3. Enter the frame rate for detection.
4. Select the appropriate camera.
5. Select the appropriate video classification.
The video classification determines which video stream is used in surveillance mode for the
various modes (normal, selected, alarm).
6. Apply the set values if you want to make further settings.
7. Save the set values to apply the values and conclude input.

License plate recognition


To configure an LPR module, you first have to create it in the SeeTec VA administration
tool (see SeeTec VA administration tool)
Lane configuration
1. Activate the module and, if necessary, alter the name.
2. Select the appropriate API module.
3. Select the appropriate camera.
4. Select the appropriate video classification.
The video classification determines the video profile used in surveillance mode for the various
modes (normal, selected, alarm).
With MPEG-4/H.264 streaming the frame rate for recognition must correspond to the frame
rate for default recording on the selected camera, while any desired value can be entered for
Motion JPEG.
5. Select the desired role.
For example, in LPR mode you can restrict the search to all entrances and you do not need to
selected every entrance lane manually.
6. Enter the frame rate for recognition to specify the number of images per second that are to
be transmitted to the module.
With MPEG-4/H.264 streaming the frame rate for recognition must correspond to the frame
rate for default recording on the selected camera, while any desired value can be entered for
Motion JPEG.
7. Specify the number of days after which LPR events (recognized license plates, changes to
master data, etc.) are to be deleted.
8. Select the assigned cameras and assigned layers that are to be displayed in LPR mode in
addition to the camera.

148 / 251
Configuration mode

9. Select Event-based recognition or Continuous LPR.


With event-controlled recognition license plate recognition is only started after an event, e.g.
if a vehicle passes through a light barrier.
10. Enter the pre-delay and the post-delay in seconds for event-controlled recognition.
This period is used for recognition of the license plate, i.e. the images of this period are sent
for OCR recognition.
11. Activate Export at next trigger event.
As soon as this function is activated, the images are exported at the next trigger event to the
LPR mode for license plate recognition and stored in the "VersatileApplications" folder in
accordance with the pre-delay, post-delay and frame rate parameters.
Example1

This setting is only applicable for the coming event and is used to check the para-
meters. It is applicable for only one event and is disabled after export.
12. Enter the time between identical license plates for continuous recognition.
This specifies how long the same license plate must be viewed.
Example2
13. Specify the number of images within which the license plate must be clearly recognized in the
Number of required frames box.
14. Click the Create new list button to save one or more license plate lists.
Select a list and assign a license plate group to it to be able to analyze it.
List configuration
1. Select a list.
2. Activate the list and, if necessary, alter the name.
3. Select the license plate groups that are to be analyzed.
In the associated alarm scenario the user can specify, for example, that an alarm is triggered
by a license plate from list 1 and that a barrier is automatically opened for a license plate from
list 2.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

SeeTec Analytics
The SeeTec server must send the camera images to the SeeTec Analytics module for intelligent
video analysis. Based on the analysis, alarms can be triggered. The SeeTec solution offers dif-
ferent SeeTec Analytics packages:

1Frame rate: 2 fps


Pre-delay: 1s
Post-delay 2s
At the next trigger event six images are saved to the "VersatileApplications" directory (pre-delay+-
post-delay * 2fps).
2License plate recognition at a gas station: The time between same license plates is set to 60
seconds.
Scenario 1: Car 1 arrives -> license plate recognition is started - car 1 leaves -> start 60 seconds -
car 1 returns within 60 seconds -> no license plate recognition because the car returned within 60
seconds.
Scenario 2: Car 1 arrives -> license plate recognition is started - car 1 leaves -> start 60 seconds -
car 1 returns after 60 seconds -> license plate recognition again because the car did not return
within 60 seconds

149 / 251
Configuration mode

n SeeTec Analytics Basic (SAB)


n SeeTec Analytics Premium (SAP)
n SeeTec Analytics Enterprise (SAE)
For the differences between the packages see Overview of the SeeTec Analytics packages.
To configure a SeeTec Analytics module, you first have to create it in the SeeTec VA
administration tool (see SeeTec VA administration tool)
Adding the SeeTec Analytics module
1. Select Other hardware and create a new object.
2. Enter a name and select "SeeTec Video Analytics" as manufacturer.
3. Select "SeeTec Analytics Basic", "SeeTec Analytics Premium" or "SeeTec Analytics Enter-
prise" as type.
4. Select the Video Analysis module to specify which video analysis channel is to analyze the
image data.
5. Click OK.
General
1. Activate the module and, if necessary, alter the name.
2. Select the video analysis module to specify which video analysis channel is to analyze the
image data.
3. Select the camera for the intelligent video analysis.
Privacy masking must not be used on the selected camera. SeeTec Analytics
devices cannot be copied. If the camera is rotated after configuration, the Video Ana-
lysis module will terminate recognition in some circumstances.
4. Select the video classification to specify which profile is to be used for image transmission
to the video analysis channel. This setting applies only to multistreaming.
SeeTec recommends using an additional stream from the camera for video analysis. A CIF
resolution is generally adequate for analysis (compression: 20%). Select larger resolutions
only after consultation.
5. Specify the frame rate for analysis to set the number of images per second to be sent to the
video analysis channel.
SeeTec recommends a frame rate of 12 frames per second (fps).
6. The channel state shows the current state of the SeeTec Analytics channel. The following
states are possible:
n Known scene (Good View): The SeeTec Analytics channel is running. The video
data is being analyzed.
n No signal (Bad Signal): The SeeTec Analytics channel is running. The video data is
not being analyzed. (Possible causes: the image quality is too poor, the contrast may
be too low or the image is too dark.). An alarm scenario can be started in this state.
Select the Video analysis failure due to insufficient light or obstruction option as the trig-
ger event for the alarm scenario.
n Invalid scene (Invalid View): Unknown error. The video data is not being analyzed.
n Unknown scene (Unknown View): The current scene does not correspond with the
acquired scene (e.g. the camera was rotated). The video data is not being analyzed.
An alarm scenario can be started in this state. Select the "Video analysis failed due to
incorrect camera position" option as the trigger event for the alarm scenario.
n Search for known scene (Searching for View): The SeeTec Analytics channel is in
the acquisition phase. If the SeeTec Analytics channel is activated, the state changes
to "Known scene", "Unknown scene" or "Unknown".
n Unknown: No connection to the SeeTec Analytics channel.

150 / 251
Configuration mode

7. Select the desired Usage.


n Inside. All objects will be monitored inside of a room or building
n Inside and people only. Only people will be monitored inside of a room or a building
n Outside. All objects will be monitored in open areas
n Outside, but no people. All objects except humans will be monitored in open areas
n Any. Any of the above applies
8. Select whether the analysis is to recognize people or vehicles.
9. Click the Person or Vehicle button to create an area in the camera image to be used to cal-
ibrate the camera.
10. For spatial location of the vehicle click the Tires button and define the position of the tires.
11. In the specified area, specify the position of the body parts (head/foot) or the vehicle's upper
point (e.g. roof).
Example1
12. If a vehicle is selected, place the cross icon at the highest point (roof) and select at least one
wheel.
At least three persons or vehicles must be defined.
13. To delete an area that has been created, select it and click the Delete button.
14. To delete all areas, click the Delete all button.

1If a person is selected, place the head icon (red) at the highest point of the body's image and the
foot icon at the lowest point of the body.

151 / 251
Configuration mode

15. Activate Automatically acquire new angles of view to store the new position of the camera
automatically as a new scene. An alarm scenario can also be optionally started if the camera
was rotated.
16. Activate Force new angles of view to prevent circumstances in which the video data cannot
be analyzed because the current scene does not correspond to the acquired scene. Unlike the
"Automatically acquire new angles of view" option, you cannot start an alarm scenario by
activating the Force new angles of view option.
17. Activate Export single images in the event of an alarm to save the images on which a
motion or change is recognized separately as JPEG.
18. Specify the time period after which the exported images will be deleted. If you enter "0" as the
time period the images will not be deleted.
19. Optionally enter the generic parameters that are to be taken into account in the analysis of the
images.
See Technical Guide or ask SeeTec support about the use of generic parameters.
20. Click the Add new rule button and enter a unique name for the rule.
21. Select the rule type. The following rules are available:
n Tripwire: As soon as the tripwire is exceeded in one or both directions, an alarm can be
triggered.
n AOI: Area of interest. An area in the camera image that can trigger an alarm.
n Scene change: All changes in the visual field of the camera are detected if the camera
image changes significantly.

A rule is not automatically activated after it has been created. Activate the rule during
configuration of the rule (see below). Additional starting events can also be set for every
rule.
Tripwire
1. Activate the module and, if necessary, alter the name.
2. Activate Classification of target to assign the recognized object types.
Multiple objects can be selected.
3. Click the Tripwire button to create a tripwire and record virtual tripwires in the camera image.
4. Click the MultiSegment TW button to create multi-segment tripwires.
Multi-segment tripwires can be created at an angle.
5. Draw the virtual tripwires in the camera image.
Generate the corners of the tripwire by clicking on the camera image and then drawing them.
6. If you have created a multi-segment tripwire, close it with a double-click.
7. Select the parameters for the directions from which the object is to be recognized.
8. Select the filter for the minimum size and the filter for the maximum size to specify the
size of the object that is to be recognized.
9. Activate the filters with which the object is to be displayed.
The color highlighting makes it easier to recognize the sizes of target objects in the foreground
or background during configuration.
10. Select the additional filters:
n Salience: Moving objects ignored, e.g. reflections, falling leaves or water motions.
n Maximum size change (%): Fast-changing objects are filtered, e.g. shadows.

Example 1
11. Click the Delete this rule button to delete the currently displayed rule.
12. Click the Reset counter button to reset the object counter.
This function is only available if the SeeTec Counting Suite is configured.

1A shadow has a size of 100% in the first image, the size change is set to 50%.
If the shadow becomes larger, it is ignored until the size change exceeds 150%.
If the shadow becomes smaller, it is ignored until the size change falls below 50%.

152 / 251
Configuration mode

AOI (Area of interest)


1. Activate the module and, if necessary, alter the name.
2. Activate Classification of target to assign the recognized object types.
Multiple objects can be selected.
3. Select the trigger types to specify which object behavior is to trigger the event.
n Exiting: Object exits the analysis area (including partially) and is still visible
in the image.
n Entering: Object enters the analysis area (including partially) and was still visible
in the image beforehand.
n Disappearing: Object exits the analysis area and is then not visible in the image.
n Appearing: Object is in the analysis area and was not visible in the image beforehand.
4. Click the AOI button and specify the image detail.
5. Close the image detail with a double-click after it is marked out.
6. Select additional parameters for object recognition.
7. Enter a time period for Time of loitering (s)and Left behind since (s) after which a signal
will be sent to trigger an alarm.
n Loitering: Object has been in the analysis area for a longer time (over x seconds).
n Left behind: Object is left behind in the analysis area for longer than x seconds (includ-
ing partially).
8. Select the plane to specify the plane on which the object is found.
This shows the differential background for the object recognition.
9. Ground plane: Recognition is to be on a horizontal area, e.e. a long corridor. The ground
plane can be viewed as a carpet in the corridor that the object is in contact with.
10. Image plane: Every motion is to be detected. A detection at image plane can best be com-
pared with traditional motion detection. However, detection at image plane also includes
object classification.
11. In the layer, select whether detection is to be performed in an image detail or in the full
image.
Detection in the full image should be used if all unspecific motions are to be detected (person
enters or exits the camera area). Because all motions are detected, it is also possible to
receive a number of unwanted alarms. If detection is to be performed in the full image, some
object behavior cannot be used and is therefore grayed out.
12. Select the filter for the minimum size and the filter for the maximum size to specify the
size of the object that is to be recognized.
13. Activate the filters with which the area is to be displayed.The color highlighting makes it
easier to recognize the sizes of target objects in the foreground or background during con-
figuration.
14. Select the additional filters:
n Salience: Moving objects ignored (e.g. reflections, falling leaves or water motions).
n Maximum size change (%): Fast-changing objects are filtered, e.g. shadows.

Example1
15. Click Delete this rule to delete the currently displayed rule.
16. Click the Reset counter button to reset the object counter.
This function is only available if the SeeTec Counting Suite is configured.
17. Apply the set values if you want to make further settings.
18. Save the set values to apply the values and conclude input.

1A shadow has a size of 100% in the first image, the size change is set to 50%. If the shadow
becomes larger, it is ignored until the size change exceeds 150%. If the shadow becomes smaller,
it is ignored until the size change falls below 50%.

153 / 251
Configuration mode

Scene change
1. Activate the module and, if necessary, alter the name.
2. Select the scene change that is to trigger an event. All changes in the visual field of the cam-
era are detected if the camera image changes significantly.
n Any change: Combination of available options of the selection.
n Lighting on: Change from dark to light
n Lighting off: Change from light to dark
n Lighting on or off: Change from light to dark or dark to light
n Unknown process: Unclassifiable change
n Camera movement: Camera is rotated
3. Apply the set values if you want to make further settings.
4. Save the set values to apply the values and conclude input.

SeeTec Counting Suite


The SeeTec Counting Suite is used to count defined dynamic objects (e.g. vehicles, persons) in
the field of view of the camera. No alarm events are triggered.
The configuration of the SeeTec Counting Suite is similar to the configuration of SeeTec Ana-
lytics. However, a scene change cannot be set. For installation and configuration, see Video Ana-
lytics.

Overview of the SeeTec Analytics packages


SeeTec Analytics SeeTec Analytics SeeTec Analytics
Basic Premium Enterprise

Area of Interest X X X
Object Clas- X X X
sification
Tripwire X X X
(also non-linear)
Multi-segment X X
tripwire
Entering X X
Exiting X X
Appearing X X
Disappearing X X
Loiterers X
Left behind X
Taken away X

Advantech
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, change the IP address or the name of the host.

154 / 251
Configuration mode

4. If necessary, select the appropriate API version.


5. Change the server for managing the devices (Device Manager server).
Inputs
The number of inputs depends on the device type.

1. Activate the desired input and change the name for CLOSED.
2. Select the appropriate icon to display a graphic view of the current status of the input.
You set the icon to be displayed in the map in the field of the same name.
3. Change the name for OPEN.
4. Select the appropriate icon to display a graphic view of the current status of the input.
You set the icon to be displayed in the map in the field of the same name.
5. Specify the interval for the dead time (in seconds) after which a signal is analyzed again.
Outputs
The number of outputs depends on the device type.

1. Activate the desired output and change the name for CLOSE.
2. Change the name for OPEN.
3. Specify the hold time (s) for the period for which the output is open or closed (0 = infinite).
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

Wago
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, change the IP address or the name of the host.
4. If necessary, select the appropriate API version.
5. Change the server for managing the devices (Device Manager server).
Inputs
1. Click the Add new input or Add 10 new inputs button to create one or ten new inputs.
2. Activate the desired input and change the name for CLOSED.
3. Select the appropriate icon to display a graphic view of the current status of the input.
You set the icon to be displayed in the map in the field of the same name.
4. Change the name for OPEN.
5. Select the appropriate icon to display a graphic view of the current status of the input.
You set the icon to be displayed in the map in the field of the same name.
6. Specify the interval for the dead time (in seconds) after which a signal is analyzed again.
7. To delete entries, mark the entries that you want to delete and click the Delete inputs
marked for deletion button.
Outputs
1. Click the Add new output or Add 10 new outputs button to create one or ten new outputs.
2. Activate the desired output and change the name for CLOSE.
3. Change the name for OPEN.
4. Specify the hold time (s) for the period for which the output is open or closed (0 = infinite).
5. To delete entries, mark the entries that you want to delete and click the Delete outputs
marked for deletion button.
6. Apply the set values if you want to make further settings.
7. Save the set values to apply the values and conclude input.

155 / 251
Configuration mode

Third-party interface

eyevis wall
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. Enter the eyevis supervisor IP address.
4. Specify the eyevis wall name.
5. Divide the available image area on the eyevis video wall into individual video wall modules by
means of Number of modules (X) and Number of modules (Y).
6. Enter the port at which the eyevis supervisor can be reached.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.

SPC alarm system


The Siemens alarm center can send alarms and events to the SeeTec system. The SeeTec sys-
tem acknowledges the events and can process them in the form of alarm scenarios.
General communication between the two systems is via TCP. The Siemens alarm center always
establishes a TCP connection. All messages sent to the SeeTec system by the Siemens alarm
center are acknowledged by SeeTec, otherwise they are sent again.
General
1. Activate or disable the module.
2. If necessary, alter the name.
3. If necessary, change the server for managing the devices (DeviceManager).
The alarm system sends the messages to this server.
4. If necessary, change the port number.
Use a separate port for every alarm center.
5. Enter the source ID and destination ID.
You will find the source ID and destination ID in the configuration of the SPC alarm system.

The corresponding module entries of the SPC alarm system (source ID) and the entries
of the SeeTecCayuga system (destination ID) must be identical.
Areas
1. Activate the area and enter the name for the arming and the name for the disarming.
If an event is triggered, the term specified is displayed instead of a number (e.g. "window
open" or "window closed").
The state of an area can be visualized in the map. The area is shown red (armed) or green
(unarmed) after 10-15 Seconds.
Rules
1. Click the Add new rule or Add 10 new rules button to create one or ten new rules.
2. Activate the desired rules and change the name.
3. Select the event that is to trigger an alarm message.
The alarm system distinguishes between the burglar alarm and panic alarm events. Specify
the type of alarm in the rule.
4. Enter the detector group to set the ID of the device that sends the alarm signal.

156 / 251
Configuration mode

5. Apply the set values if you want to make further settings.


6. Save the set values to apply the values and conclude input.

Access control
The Access control function in the Administration control allows you to configure and manage third
party access control devices. These devices can be partly administered and actuated with the
Cayuga software and with software provided by the respective third-party manufacturers.
After the access controls have been configured, they can be connected to alarm scenarios (see
Alarms - p.166).
See technical guides or ask SeeTec support about the use of third party access control
plugins.

Creating a new access control 157


Deleting access controls 157
Editing an access control 158

Creating a new access control


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Access Control.
3. Create a new access control item.
4. Enter the name for the new access control.
5. Select the manufacturer and type.
6. Enter the host (IP address or name).
7. Select the Access control module.
8. Optionally select the access control's manufacturer in the Available IP installers drop-down
menu, and then click IP setup.
The subsequent configuration of the network address of the access control depends on the
manufacturer's installation program and may have to be installed separately. Note the asso-
ciated documentation of the installation program.
9. Click OK.
The new access control is available within the selected company item.
For the SeeTec generic access control at least one of the following access control modules has to
be installed:
n Paxton Net2
n Continental CardAccess3000

Deleting access controls


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the access control in the Access control overview.
3. Click the Delete object icon.

157 / 251
Configuration mode

Editing an access control


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the access control in the Access control overview.
3. Activate the access control.
4. Edit the name.
5. Select the access control module.
6. Enter the user name and password for the access control module.
7. Change the port and IP adress.
8. Click OK to save the settings.

Users
The User function in the Administration control allows you to create and delete user profiles. In
addition, you can configure the connection to an existing Active Directory® Authorization Man-
ager. The corresponding authorizations and profiles are assigned to the user, depending on
whether he or she is logged in under a user name or as a group.
For a general description of administrative and user rights, refer to Administrative rights and user
rights.
Creating a new user 158
Configuring a user 158
Deleting a user 160
Duplicating a user 161

Creating a new user


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Users control.
2. Select Create new object in the Users control.
3. Create a new user.
4. Enter the name and password of the new user.
5. Click OK to accept the name.
The new user is displayed in the control.

Configuring a user
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Users in the Administration control
3. Select the user in the Users control.

General
1. Activate or deactivate the user.
The administrator cannot be deactivated.

158 / 251
Configuration mode

2. If necessary, alter the name of the user.


3. Enter a description of the user account.
This can be the name of the user, for example.
4. Activate the groups to which the user account is to belong (see also Groups).
The association with a group is optional.

Password
1. Select User must use a secure password.
If the password does not meet the security requirements (see below), you receive a message
to this effect.
2. Select User may change own password to permit the user to change his or her password.
3. Select User must change password regularly and specify the validity period for the pass-
word.
Before the period expires, the user is requested to change the password in order to be able to
continue logging in.
4. Select Change user password, and enter a new user password.
If you have selected User must use a secure password, choose a password that con-
sists of at least eight characters and contains at least one digit, one upper-case let-
ter and one lower-case letter.
5. Enter the user password again.
6. To create a second password on the "four-eyes principle", select User needs two pass-
words and specify a further password, which must adhere to the same security rules.
7. Enter the second password again.
If you forget the administrator's password and haven't added any users to the admin-
istrator group (see Groups - p.161), it is no longer possible to access configuration
mode.

Rights options
1. Select Limit archive access and specify the duration of the access period (in minutes) in
order to limit the user's continuous access to the archive.

Managing user rights


User rights of users who belong to a group can also be administered via the group rights (see
Administrative rights and user rights - p.131). A user's membership of particular groups is
revealed by the colored fields (see Groups for information on how to configure the colors of
groups).
1. Select or deselect the rights for the selected user to perform specific actions on the installed
devices and objects. Depending on the device or object, the following rights are available,
which can be selected or deselected individually or together.
n All: Selects or deselects all users rights for the corresponding device or object.
n Surveillance camera: The user can see a camera and its live images in surveillance
mode.
n Camera archive: The user can use cameras in archive mode.
n Delete recordings: The user can delete recordings in archive mode.
n Overwrite protection: The user can apply overwrite protection to recordings in archive
mode or remove overwrite protection from them.

159 / 251
Configuration mode

n Camera PTZ: The user can use the PTZ camera except for preset camera positions.
n Camera lock: The user can lock the position of the PTZ camera.
n Use camera position: The user can use the set camera positions.
n Create camera positions: The user can create camera positions or delete positions
that have been defined.
n Export camera: The user can save image data in the SeeTec-specific format in
archive mode.
n Export camera (AVI): The user can save image data as an AVI file in archive mode.
n Privacy masking: The user can deactivate privacy masking.
n MPEG audio: The user can use audio transmission.
n Map: The user can use the corresponding map.
n Layer: The user can display defined layers.
n Button: The user can use buttons.
n Report mode: The user can view report mode.
n Server extensions: The user can use server extensions such as license plate recog-
nition.
n Count analysis: The user can use the count analysis from the View menu.
n Use license plate group: The user can use license plate groups.
n Change license plate group: The user can change license plate groups.
n Intrusion detection: The user can operate intrusion control areas.
n Create reference image: The user can create reference images for comparisons (see
Manual reference image comparison - p.74).
n Access Control: The user can use the access control.
n Access Control Data Editor: The user can use the Access control data editor from
the from the View menu.

Managing administrative rights


1. Select or deselect the rights of the selected user to make changes or settings.
There are three types of administrative rights available:
n Create/delete: The user has unlimited scope to manage the selected objects and can,
for example, create, configure and delete cameras.
n Edit: The user can change the settings of the selected objects, but cannot create or
delete objects.
n View: The user can view and operate the selected objects but cannot make settings or
create and delete objects.This does not apply to layers created in surveillance mode
("temporary layers").
2. Apply the set values if you want to make further settings.
3. Save the set values to apply the values and conclude input.

Deleting a user
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Users in the Administration control
3. Select the user in the overview.
4. Click the Delete object icon.

160 / 251
Configuration mode

Duplicating a user
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Users in the Administration control.
3. Select the user in the overview.
4. Click the Duplicate object icon, and enter a name for the duplicated user.
5. Click OK to accept the name.
The new user is displayed in the overview.

Groups
The Groups function in the Administration control can be used to add users to groups and manage
the rights of groups. The corresponding authorizations and profiles are assigned to the user,
depending on whether he or she is logged in under a user name or as a group.
For a general description of administrative and user rights, refer to Administrative rights and user
rights.
Creating a new group 161
Configuring a group 162
Deleting a group 163
Duplicating a group 163

Creating a new group


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Groups in the Administration control.
3. Create a new group.

4. Enter the name for the new group.


5. If Active Directory groups are available (the client must be connected to an Active Directory
network), select the appropriate AD-group. Click the Refresh button (1) to fetch the current
group settings from the Active Directory server.
6. Click OK to accept the name.
The new group is displayed in the overview.

161 / 251
Configuration mode

Configuring a group
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the group in the overview.

General
1. Select or deselect the group.
2. If necessary, alter the name of the group.
3. Enter a description of the group.
4. Select a validity period for the group, within which a user belonging to the group can log in to
the system.
The possible periods are specified in the Time Manager.
5. Specify the validity status to activate or deactivate the group.
All users belonging to this group can thus be prevented from accessing certain cameras.
6. Assign the group colors in group lists. Different colors for different groups facilitate the
administration of user rights as each user inherits the rights and the colors of the group he or
she belongs to.
7. Select the users to be assigned to the group.

Rights options
1. Select Limit archive access, and specify the duration of the access period (in minutes) in
order to prevent the user from having continuous access to the archive.
2. Select Activate Active Directory support to apply the authorization settings of a connected
Active Directory server.
Using Windows® Active Directory®
1. Create a new group in Active Directory®.
2. In Active Directory®, add the domain users of the group who are to log in using the SeeTec
Active Directory® login.
3. In the SeeTec software, create a group that is analogous to the one in Active Directory®.
Be sure to use upper and lower case in exactly the same way.
4. Assign the SeeTec group in the SeeTec software the required authorizations, and select
Activate Active Directory support.
When the software starts up, the users can use the Active Directory® login button to log in to
the SeeTec system with their Active Directory® user name and password.
5. To automate Active Directory® login, enter the AutoADLogin command line parameter in the
link for the SeeTec surveillance software (see Command line parameters).
You don't have to create any users in the SeeTec software in order to log in using
Active Directory®. Rights are assigned by means of the data stored in the SeeTec
group.

Managing user group rights


1. Select or deselect the rights to perform specific actions on the installed devices and objects
for the selected group.

162 / 251
Configuration mode

Managing administrative rights


1. Select or deselect the rights to make changes or settings in the administration settings for the
selected group.
n Create/delete: The group can administer the selected objects in full and, for example,
create and delete cameras.
n Edit: The group can change the settings of the selected objects, but cannot
create or delete objects.
n View: The group can view and operate the selected objects but cannot make any
settings or create and delete objects.
2. Apply the set values if you want to make further settings.
3. Save the set values to apply the values and conclude input.

Deleting a group
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the group in the overview.
3. Click the Delete object icon.

Duplicating a group
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the group in the overview.
3. Click the Duplicate object icon, and enter the name for the duplicated group.
4. Click OK to accept the name.
The new group is displayed in the overview.

Profiles
The Profiles function in the Administration control allows you to assign general settings to a user
account or group that apply to the operation of the client.
Configuring a profile 163
Image settings 164
Video wall module mapping 165

Configuring a profile
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the profile in the overview.
3. Activate or deactivate the selected profile.
4. Select Confirm termination of the client to display a confirmation on termination of the cli-
ent.
5. Optionally, select Confirm termination of the client with user password to display a con-
firmation on termination that the user must confirm with his password.

163 / 251
Configuration mode

6. Select Log off user when inactive and specify the timeout (time in minutes) after which the
user is logged out of the system automatically if inactive.
7. Enter the PTZ priority counter between 1 and 1000 (the higher the number: the higher the pri-
ority) and specify the Timeout for PTZ priority actions in seconds If the user does not
activate any controls, the camera control is released again after the timeout.
8. Enter the Timeout for the PTZ lock actions in seconds. If the user does not activate any
controls, the camera control is locked after the timeout.
9. Select the layersthat can be displayed to the user or group (see Layers).
The layers are displayed immediately in surveillance mode when starting and cannot be
closed.
10. Select the patrols that the user or group can select (see Patrols).
For each user created and each user group, a profile is automatically created, via which the
live layer can be influenced in surveillance mode.

Image settings
The single image settings are used to specify how many images the client is to display per camera
in a second if the camera sends Motion JPEG images.
These settings only affect the view in the client if Motion JPEG is activated as streaming
mode in the camera configuration. They have no effect on the recordings.

1. Specify the frame rates of the displayed normal and selected video image and of the alarm
video image, and then select the display mode.

Streaming (MPEG-4, H.264)


Streaming (MPEG-4, H.264) allows you to specify the frame rate (fps) for MPEG-4/H.264 stream-
ing. You can select either full or reduced frame rate.
n Full: The complete image flow is transferred with the full frame rate. This can be a heavy
load on the client computer if more than four cameras are displayed simultaneously and/or
the computer hardware performance is too low.
n Reduced: The reduced frame rate only transfers the I-frames) full screens), which sig-
nificantly reduces the CPU load for the client. The default setting for i-frames is one i-frame
per second. In other words, with a reduced frame rate you only see one image per second
in surveillance mode. The number of I-frames per second can be changed the camera con-
figuration.
1. Specify the frame rates of the displayed normal and selected video image and the alarm
video image.

Video classification (for multistreaming)


The video classification setting allows you to specify the frame rate for three camera image sizes.
If many cameras are displayed in a layer, the resolution of an individual camera can be decreased
by selecting a different setting for each image display size:
n Small: for image display sizes up to 320 px
n Medium: for image display sizes between 320 px and 640 px
n Large: for image display sizes above 640 px
By decreasing the resolution, the system performance is improved. Accordingly, the streaming
rate can be adjusted to accommodate for the available bandwidth (e.g. HD (high definition), web,
mobile).

164 / 251
Configuration mode

1. Specify the frame rates and the streaming rate of the displayed normal and selected video
image and the alarm video image. If nothing is selected, the streaming will be adjusted auto-
matically.

Video wall module mapping


Video wall module mapping allows you to specify whether and in which video wall module an
alarm that occurs or a patrol is displayed for the selected profile.
1. Select standard module mapping or select which layer window is to be displayed on which
video wall module.
Standard module mapping is used if you have not defined video wall mapping for the specified
SeeTec window. Standard module mapping is configured in the Video walls control.
2. If the number of module assignments is insufficient, add to the list by clicking the Add icon.
3. In Additional module mappings, select which window is to be displayed in which video
wall module.
Example1
4. Select the modules you want to delete, and then click the Delete button.
5. Apply the set values if you want to make further settings.
6. Save the set values to apply the values and conclude input.

Time manager
The Time manager function in the Administration control allows you to create time templates that
are similar to a schedule in order to coordinate the standard image recording of individual or mul-
tiple cameras as well as validity in alarm scenarios and user groups.
Creating a new time manager 165
Configuring a time manager 166
Deleting a time manager 166
Duplicating a time manager 166

Creating a new time manager


1. Select the location in the Company control.
The selected location is displayed on the title bar of the Administration control.
2. Select Time manager in the Administration control.
3. Create a new time manager.
4. Enter the name for the new time manager.
5. Click OK to accept the name.
The new time manager is displayed in the overview.

1The main window is displayed as 0/0 in the video wall module. The alarm scenario specifies that
the alarm camera is to be displayed in the main window.
The image of the alarm camera is displayed in the 0/0 module on the video wall by video wall mod-
ule mapping.

165 / 251
Configuration mode

Configuring a time manager


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the time manager in the overview.
3. In the calendar, select the periods in which actions are to be performed by holding down the
mouse button and dragging the mouse pointer over the period.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

Deleting a time manager


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the time manager in the overview.
3. Click the Delete object icon.

Duplicating a time manager


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the time manager in the overview.
3. Click the Duplicate object icon, and then enter the name for the duplicated time manager.
4. Click OK to accept the name.
The new time manager is displayed in the overview.

Alarms
The Alarms function on the Administration control allows you to configure and manage alarm
scenarios:
Creating a new alarm scenario 166
Creating an alarm scenario with the wizard 167
Configuring an alarm scenario 167
Deleting an alarm scenario 170
Duplicating an alarm scenario 170

Creating a new alarm scenario


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Alarms in the Administration control.
3. Create a new alarm scenario.
4. Enter the name for the new alarm scenario.
5. If you want to configure the new alarm scenario using the configuration wizard, select Wizard
in the dialog box or confirm the name withOK.
The new alarm scenario is displayed in the overview.

166 / 251
Configuration mode

Creating an alarm scenario with the wizard


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Click Configuration menu and select Create alarm.
3. Enter the name of the new alarm scenario and select Wizard.
4. Open the list of available objects for the location.
5. Activate the objects that are to trigger an alarm event, and then click Next.
6. Select the camera that is to be displayed as the alarm camera, and set the duration for alarm
recording (in seconds).
7. Specify whether you want to add a pre-alarm duration, and set the duration in seconds.
8. Click Next.
9. Specify which user is to be notified when there is an alarm event.
The user must first be created in the User control.
10. Specify whether the user is to be informed of an alarm event by an alarm notification (see
Alarm messages - p.102).
11. If the user is to be informed by a message window, you can enter a short message.
12. Click Next, and then check the settings.
If you wish to make changes, click Back and change the settings.
13. To apply the settings, click Finish.

Configuring an alarm scenario


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the alarm scenario in the alarm overview.

General
1. Select or deselect the alarm scenario.
2. If necessary, alter the name of the alarm.
3. Enter a description.
4. Use the slider to assign the alarm a priority.
The meaning of the priority level is displayed.
An alarm with low priority can be stopped immediately at the end of the alarm. All dynamically
opened components (layers, cameras and message windows) are closed again, and the pre-
vious layer is restored. Alarms with medium or high priority are not stopped until they have
been confirmed. This is configurable in the settings for low-priority alarms (see below).
5. Select the validity period for the alarm.
The possible periods are specified in the Time Manager.
6. Select the color in the alarm list.
7. Activate Only remove alarm when it is ended and confirmed to remove the alarm from
the list only when its status has been set to "confirmed" and the alarm has ended (see Alarm
list in surveillance mode).
8. Deactivate Automatically start new alarms on clients to prevent the alarm from starting
events. If deactivated, the user must start the assigned alarm events manually.
9. Select the settings for low-priority alarms.
10. Terminate alarm on clients when terminated on server: The alarm is terminated on all of
the clients involved and removed from the alarm list.
11. Start new alarm on clients if another low-priority alarm is active: A low-priority alarm dis-
places another active low-priority alarm. In other words, the current alarm is put aside, and the
new alarm is displayed.

167 / 251
Configuration mode

12. Do not close layers automatically at the end of the alarm: Prevents the layer from being
automatically closed at the end of the alarm.

Start
Depending on the camera model used, the following events can be used as triggers for an alarm
scenario:
n Tampering: The camera angle is changed or the camera lens is covered.
n Video signal lost: The connection between the analog camera and the video server is cut.
n Motion detection: Significant motion has been detected in a defined area of the camera
image.
n Digital I/O: An incoming digital signal triggers an alarm.
1. Choose the Edit button to select the events that trigger the alarm.
The hardware and event are displayed. You can select multiple objects.
The trigger must be created or activated before configuring the alarm scenario. One exception
to this is buttons, which can be defined later in the buttons control. A starting event can be, for
example, the receipt of a TCP signal from a camera when it detects motion. This is imple-
mented via the SeeTec network I/O.
2. Click Expert mode to specify the settings.

Expert mode
Expert mode can be used to create complex alarm scenarios. The alarm is triggered by different
conditions that are logically linked (AND).
1. Click Edit and select the conditions at the (digital) inputs that must be fulfilled to trigger an
alarm.
2. Set the period (in seconds) within which at least one of the following events from each group
occurs.
3. To add the events to the condition, click Edit and select the relevant objects.

End
1. Specify the maximum server alarm duration (in seconds) to specify how long the alarm is
to be recorded for.
2. Use the Select button to select the events that terminate the alarm earlier.
The hardware and event are displayed.

Visualization
There are two types of views which can also be combined:
n Alarm camera: The alarm camera is highlighted by a red frame in the various windows in
surveillance mode.
n Alarm views: The alarm records of the selected camera are displayed in the selected win-
dow in four tiles in a 2x2 view: pre-alarm, post-alarm, alarm image (still image) and live
image.
An alarm with low priority is stopped immediately at the end of the alarm, i.e. all dynamically
opened components (layers, cameras and message windows) are closed and the previous layer is
restored. Alarms with medium or high priority are not stopped until they have been confirmed.
1. Activate the cameras to be displayed in the various windows in surveillance mode.
The window mode is automatically set to the normal view.

168 / 251
Configuration mode

2. Choose if the cameras to be displayed as an alarm camera and/or in alarm view.


3. Select normal mode or full-image mode for the window mode.
4. Select the window to display the camera or layer in the main window or in a secondary win-
dow.

Cameras and layers and also alarm cameras should not be displayed in the same win-
dow, because this can result in unwanted events (superimposition).

Persons involved
1. Select the profiles of the users or groups allowed to see the alarm.
The alarm messages are only displayed to the selected profiles.
For the AlarmWatchDog function, the user defined in the system settings must be activated.
2. Enter a text for alarms with a medium or high priority level in the message window. This text is
displayed in the message window.
3. Select Play signal tone, and then select whether the signal tone is to be played when the
alarm is activated or triggered.
The alarm tone is in the file system in "<installation folder>/Client/Sound" or "<installation
folder>/Client64/Sound" and can be replaced with different *.wav files.
4. Select Run external program if a program is to be started at the same time as the alarm.
The selected program must be installed on the client computer.
5. Use the Select button to select which document is to be opened by the program.
6. Enter any parameters required by the program.
A document can be opened using the selected program, for example.

Server
1. Specify the pre-alarm duration for camera recordings (up to a maximum of 3600 seconds)
to record a period before the alarm is triggered in alarm recording.
2. Select Use separate frame rate (fps) for camera recordings, and enter the required frame
rate.
The frame rate can only be changed with M-JPEG.
3. Choose Edit, and then activate the actions at the start of an alarm.
The selected actions are displayed.
If the AlarmWatchDog function is required, select AlarmWatchDog alarm from the list
4. Choose Edit, and then activate the actions at the end of an alarm.
The selected actions are displayed.

E-mail and FTP


The SMTP server for e-mails and the email addresses must be created in the System
control to enable the system to forward the messages.
In an alarm scenario, in addition to the alarm message, it is also possible to send a standard email
or specify a data export to an FTP server.
1. Enter the subject and text for the email message.
2. Select the recipients to receive the email at the start and end of the alarm.
You can specify the email addresses in the Alarm addresses section of the system settings.
3. Select the cameras whose data at the end of the alarm is to be attached to the email and
specify the data format. Two types of file format are possible:
4. Video: the files are sent unencrypted as *.avi

169 / 251
Configuration mode

5. Single image sequence: the files are sent as image sequence (JPEG).
Note that the email attachments can exceed the permissible size of the email.
6. Select the cameras whose data is to be stored on an FTP server when there is a large volume
of data, and specify the data format.
The FTP server is defined in the SeeTec VA Administration Tool.
If there are problems contacting the FTP server at alarm end, e.g. the FTP server is
not available, the program retries sending the data to the FTP server once every
minute. After one hour the attempt is canceled and the data are discarded.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.

Deleting an alarm scenario


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the alarm scenario in the overview.
3. Click the Delete object icon.

Duplicating an alarm scenario


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the alarm scenario in the overview.
3. Click the Duplicate object icon, and enter a name for the duplicated alarm scenario.
4. If you want to configure the new alarm scenario using the configuration wizard, select Wizard
in the dialog box.
5. Click OK to accept the name.
The new alarm scenario is displayed in the overview.

Layers
The Layers function in the Administration control allows you to adjust the work area to suit your
requirements in surveillance mode by dividing it into multiple tiles. This gives the user fixed
arrangements and contents of the work area. These layers can be assigned to a user or group pro-
file and are available after the program starts up.
Creating a new layer 170
Configuring a layer 171
Deleting a layer 171
Duplicating a layer 171

Creating a new layer


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Layers in the Administration control.
3. Create a new layer.
4. Enter the name of the new layer and the layout or number of tiles.

170 / 251
Configuration mode

5. To specify the number of tiles yourself, choose User-defined from the drop-down list.
6. Click OK to apply the setting.
The new layer is displayed in the overview.
7. If you have chosen User-defined, alter the number of rows and columns in the layer.
A maximum of 64 fields is available (64 x 1 or 9 x 7).
8. Drag the mouse cursor over any number of adjacent tiles and click Connect to group the
selected tiles together as a single tile.
9. Click a group tile and then Disconnect to separate it into the original number of tiles.
10. Click OK to apply the setting.
The new layer is displayed in the overview.

Configuring a layer
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the layer in the overview.
3. If necessary, alter the name of the layer.
4. Click a tile, and then select the Focus element option.
You can mark a tile as a focus tile in every layer. If you double-click a camera in a layer with a
focus tile, the camera image is displayed in the focus tile. If you double-click a camera in a
layer without a focus tile, the camera image is displayed in a separate layer.
5. Drag the cameras, maps or web pages to the layer window in accordance with the selected
arrangement.
6. To remove a camera from the layer, select the camera and click the Delete button.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.

Deleting a layer
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the layer in the overview.
3. Click the Delete object icon.

Duplicating a layer
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the layer in the overview.
3. Click the Duplicate object icon, and enter a name for the duplicated layer.
4. Click OK to accept the name.
The new layer is displayed in the overview.

Maps
The Maps function in the Administration control allows you to configure and manage the overview
maps of the site or building under surveillance, including the location of the surveillance hardware.
Creating a new map 172
Configuring a map 172

171 / 251
Configuration mode

Deleting a map 172


Duplicating a map 172

Creating a new map


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Maps in the Administration control.
3. Create a new map.
4. Enter the name for the new map.
5. Click OK to accept the name.
The new map is displayed in the overview.

Configuring a map
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the map in the overview.
3. Click the Background image button, and then select the desired background image (e.g.
building floor plan).
4. Drag the available cameras or buttons required for the desired site from the list to the back-
ground image.
5. Use the slider to set the relative size of the camera or button and the angle of view.
You can also set the exact angle of view by entering the angle in the text box.
6. Activate Show circles to indicate the viewing angle and direction of the cameras in the map.
The circles will be displayed for all cameras in the map.
7. To hide the circles of a specific camera, set the camera's angle of view to "0".
8. Use the slider to set the angle of rotation.
9. Select Display text to display the name of the camera or button in the image.
10. Click the Delete button to remove the camera or button and all its settings from the image.
11. To cover a button (and thereby making it possible to select it in surveillance mode) with an
irregular shape, click Polygon.
12. Specify the color and transparency of the polygon.
13. Draw the polygon by clicking into the image around a button. Only one button can be
covered by one polygon.
14. Close the polygon by double clicking.
15. If necessary, draw multiple polygons.
16. Apply the set values if you want to make further settings.
17. Save the set values to apply the values and conclude input.

Deleting a map
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the map in the overview.
3. Click the Delete object icon.

Duplicating a map
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.

172 / 251
Configuration mode

2. Select the map in the overview.


3. Click the Duplicate object icon, and then enter a name for the duplicated map.
4. Click OK to accept the name.
The new map is displayed in the overview.

Buttons
The Buttons function in the Administration control allows you to start specified processes
(actions) such as camera recordings or alarm scenarios.
To call the configured buttons in surveillance mode, you have to call the Buttons function on the
control bar (see Buttons - p.99).
Creating a new button 173
Configuring a button 173
Deleting a button 174
Duplicating a button 174

Creating a new button


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Buttons in the Administration control.
3. Create a new button.
4. Enter the name for the new button.
5. Click OK to accept the name.
The new button is displayed in the overview.

Configuring a button
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the button in the overview.

General
1. If necessary, alter the name.
2. Specify the sort order of the buttons in the controller in surveillance mode (see Buttons -
p.99).
The buttons are automatically sorted in ascending order. In other words, the higher the num-
ber of a button, the lower down it appears in the list on the tab.
3. Select an icon to make it easier to recognize.
4. Activate the action for a specific camera, and select the camera.
In this case the button is only displayed if the specified camera is selected in surveillance
mode.
5. Activate Use shortcut and press the desired key combination on the keyboard to trigger the
button with a key combination.
The key combination is displayed.
The default keyboard shortcuts cannot be overwritten. Changes by the administrator
will be ignored.

173 / 251
Configuration mode

Action
1. Select the Call URL option and enter the Internet or intranet address.
Camera scripts cannot be started under this address, for example.
An Internet or intranet address is not displayed (to embed web pages in the layer, see Web
pages).
2. Click Test to check that the specified URL is working.
A check is carried out to ascertain that the URL can be accessed. The page is not displayed.
3. Select the Perform action option and then the action.
4. If a second action is to be performed, select Perform next action and then the action.
The action is selected as soon as you release the mouse button.
5. Select the Start alarm scenario option and then the alarm scenario (see Alarms).
6. Select the Terminate alarm scenario option and then the alarm scenario (see Alarms).
7. Select the Start patrol option and then the patrol (see Patrols).
8. Select the Run program option, and then click Select to select a program that is to be star-
ted.
The selected program must be installed on the client computer.
9. Enter any parameters required by the program.
A document can be opened using the selected program, for example.
10. Apply the set values if you want to make further settings.
11. Save the set values to apply the values and conclude input.

Deleting a button
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the action in the overview.
3. Click the Delete object icon.

Duplicating a button
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the action in the overview.
3. Click the Duplicate object icon, and enter a name for the duplicated action.
4. Click OK to accept the name.
The new action is displayed in the overview.

Web pages
The Web pages function on the Administration control allows you to embed web pages in the
layer (e.g. webcams or intranet pages).
Creating a new web page 175
Configuring a web page 175
Deleting a web page 175
Duplicating a web page 175

174 / 251
Configuration mode

Creating a new web page


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Web pages in the Administration control.
3. Create a new web page.
4. Enter the name for the new web page.
5. Click OK to accept the name.
The new web page is displayed in the overview.

Configuring a web page


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the web page in the overview.
3. If necessary, alter the name of the web page and enter the URL (Internet or intranet address).
4. Click the Test button to check that the web page can be accessed.
The web page is displayed.
5. Apply the set values if you want to make further settings.
6. Save the set values to apply the values and conclude input.

Deleting a web page


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the web page in the overview.
3. Click the Delete object icon.

Duplicating a web page


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the web page in the overview.
3. Click the Duplicate object icon, and then enter the name for the duplicated web page.
4. Click OK to accept the name.
The new web page is displayed in the overview.

Patrols
The Patrols function on the Administration control allows you to configure multiple cameras, set
positions, maps and layers one after the other for a user-definable time. It is also possible to open
or close digital outputs in a patrol and create checkpoints.
Creating a new patrol 176
Configuring a patrol 176
Deleting a patrol 176
Duplicating a patrol 177

175 / 251
Configuration mode

Creating a new patrol


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Patrols in the Administration control.
3. Create a new patrol.
4. Enter the name for the new patrol.
5. Click OK to accept the name.
The new patrol is displayed in the overview.
6. In order to be able to activate the new patrol in surveillance mode, it must be assigned to a
user profile.
7. Switch to the Profile control and activate the patrol for the desired user profile (see Con-
figuring a profile - p.163).

Configuring a patrol
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the patrol in the overview.
3. If necessary, alter the name of the patrol.
4. Select the default pause (in seconds) to set the duration for which a layer is to be displayed.
5. Click New group to group together the objects of the patrol.
6. Specify the name of the group, and then click OK.
7. Drag the objects from the left-hand column to Patrol positions or the group.
8. To add a specific position of a camera to the list, first drag the camera to the group, then the
associated preset position.
9. Select a camera, and then click the Edit button.
10. Select the window in which the camera is to be displayed.
11. If necessary, insert a new pause and specify its duration.
12. Insert a new checkpoint and give it a name.
If a checkpoint is reached, an information window is shown. The user can then decide
whether to continue or stop the patrol. The reaching of a checkpoint is saved in report mode.
13. To change the sequence of inserted objects, select the objects in patrol positions and move
the object Up or Down in the list by clicking the corresponding button.
For a patrol to be started in surveillance mode, it must first be assigned to a user or
group in the Profiles control.
14. Select the object in Patrol positions, and then click the Edit button to adjust the object's set-
tings.
This enables you to decide in which window the camera image is to be displayed.
15. Select the object in patrol positions, and then click the Delete button to delete it.

Deleting a patrol
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the patrol in the overview.
3. Click the Delete object icon.

176 / 251
Configuration mode

Duplicating a patrol
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the patrol in the overview.
3. Click the Duplicate object icon, and then enter a name for the duplicated patrol.
4. Click OK to accept the name.
The new patrol is displayed in the overview.

Sequences
The Sequences function on the Administration control allows you to create sequences in which
multiple set positions are approached one after the other and/or actions are triggered.

General information on sequences


n Multiple times and/or time periods can be added to a sequence.
n A time input is not required if the sequence is to be started by an alarm scenario.
n If a sequence is started by an alarm scenario, the sequence in progress is stopped. The
sequence in progress is run once and then restarted at the previously stopped time.
n If a sequence is started by an alarm scenario, the sequence is processed in full. The
sequence is also processed in full if the alarm scenario is stopped earlier.
n If a sequence in progress is stopped by an alarm scenario, the sequence is only interrupted
for a defined time period.
n A recording can only be started in connection with an alarm scenario.
n Sequences do not have exclusive access to the camera positions. If a PTZ camera is con-
trolled during an ongoing sequence, the preset positions are approached with a dead time of
one minute not included in the sequence.
n A preset position can also be approached by an alarm scenario, even if the sequence
approached a different preset position of the same camera shortly before. The same
applies to an additional sequence.

Creating a new sequence


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Sequences in the Administration control.
3. Create a new sequence.
4. Enter the name for the new sequence.
5. Click OK to accept the name.
The new sequence is displayed in the overview.

Configuring a sequence
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the sequence in the overview.

177 / 251
Configuration mode

General
1. Select the sequence and, if necessary, alter the name.
2. Use the Times and Time periods buttons to make additions.
3. Time: The sequence is started once at the selected time on every selected day.
4. Time period: The sequence is started multiple times depending on the duration of the
sequence on every selected day within the time period.
5. Select one or more entries, and then click the Edit selected entries button to edit the entries
one after the other.
6. Select one or more entries, and then click the Delete selected entries button to delete the
entries.

Actions
1. Create a new group and give it a name.
2. Specify the dead time (in seconds) to specify the interval within which no new signal is dis-
played.
3. Drag one or more camera positions or actions to the group.
4. Select a group, and then use the New pause button to adjust the pause (in seconds) to spe-
cify how long the camera or layer or map is displayed.
5. Select a group or an entry, and use the Up or Down button to move it up or down in the list.
6. Select a group or pause, and then click the Edit button to edit the name of the group or the dur-
ation of the pause.
7. Select a group or an entry, and then click the Delete button to delete the group or entry.
8. Apply the set values if you want to make further settings.
9. Save the set values to apply the values and conclude input.

Deleting a sequence
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the sequence in the overview.
3. Click the Delete object icon.

Duplicating a sequence
1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the sequence in the overview.
3. Click the Duplicate object icon, and then enter the name for the duplicated sequence.
4. Click OK to accept the name.
The new sequence is displayed in the overview.

Video walls
The Video walls function in the Administration control allows you to configure the SeeTec Dis-
patcher. This allows you to display camera images, layers, maps, alarm scenarios and web pages
on video walls in dispatcher mode.
Creating a new video wall 179

178 / 251
Configuration mode

Configuring a video wall 179


Deleting a video wall 179
Duplicating a video wall 179

Creating a new video wall


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select Video walls in the Administration control.
3. Create a new video wall.
4. Enter the name for the new video wall.
5. Click OK to accept the name.
The new video wall is displayed in the overview.

Configuring a video wall


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the video wall in the overview.
3. If necessary, alter the name of the video wall.
4. Select the background image to be displayed on the video wall.
5. Drag the monitors (see Other hardware - p.144) to the video wall, and adjust the arrangement
of the monitors.
6. Apply the set values if you want to make further settings.
7. Save the set values to apply the values and conclude input.

Deleting a video wall


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the video wall in the overview.
3. Click the Delete object icon.

Duplicating a video wall


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the video wall in the overview.
3. Click the Duplicate object icon, and then enter the name for the duplicated video wall.
4. Click OK to accept the name.
The new video wall is displayed in the overview.

License plate groups


The License plate groups function in the Administration control allows you to configure and man-
age the license plates for automatic recognition (License Plate Recognition, LPR).
Creating a new license plate group 180
Configuring a license plate group 180

179 / 251
Configuration mode

Deleting a license plate group 180


Duplicating a license plate group 180

Creating a new license plate group


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select License plate group in the Administration control.
3. Create a new license plate group.
4. Enter the name for the new license plate group.
5. Click OK to accept the name.
The new license plate group is displayed in the overview.

Configuring a license plate group


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the license plate group in the overview.
3. Select the license plate group.
4. If necessary, alter the name of the license plate group.
5. Adjust the font color and background in the display of the license plate.
6. Select XML export to export the license plate data as an XML file as soon as any license
plate from that group is recognized by an LPR event.
The XML data is saved in the folder specified during configuration of the LPR module.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.

Deleting a license plate group


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the license plate group in the overview.
3. Click the Delete object icon.

Duplicating a license plate group


1. Select the location in the Company control.
The selected location is displayed in the title bar of the Administration control.
2. Select the license plate group in the overview.
3. Click the Duplicate object icon, and then enter the name for the duplicated license plate
group.
4. Click OK to accept the name.
The new license plate group is displayed in the overview.

Server
The Server function on the Administration control allows you to configure the server services.
Configuring the CoreService 181

180 / 251
Configuration mode

Configuring the Device Manager (DM) 181


Configuring the global OCR settings 182
Configuring the LPR module 183
Configuring the transcoding module 183
Configuring the generic DVR module 184
Configuring an Access control module 184

Configuring the CoreService


1. If necessary, change the name of the server.
2. If necessary, alter the network address and port number of the master server.
3. Click the Remove from the system button to remove the core server from the system con-
figuration.
Removing from the system is only available if the server is not running.
Always contact SeeTec support before deletion.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

Configuring the Device Manager (DM)

General
1. If necessary, alter the name of the image data server.
2. Select the failover server
In the event of the failure of the image data server, all connected devices are transferred to the
failover server.
Note that the failover server must have sufficient capacity to take over the devices.
3. Specify the time of the data aging search.
4. Activate Accesses to video sources to save these events.
5. Select the period after which the events are automatically deleted.
6. Click the Display statistics button to display the available recordings of the individual cam-
eras.
7. Click the Remove from the system button to remove the Device Manager server from the
system configuration.
Always contact SeeTec Support before deletion.

Options
1. If necessary, alter the port for SIP messages.

Image data export


Automatic image data export to the server
1. Select the automatic export of the image data.
2. Create the export path for the automatic storage of the image data, or click the Select path
button to select the folder directly in Windows Explorer.

181 / 251
Configuration mode

The export folder can only be specified if client and server are installed on the same
computer.
3. Click the Check path button to check the availability of the specified folder.
4. Specify the time of the export.
5. Activate Export image data of the last 24 hours to export the image data of the last 24
hours before the specified export time.
If this option is not to be activated, the image data of the previous day (midnight to midnight)
are exported.
6. Specify a password, with which the image data is encrypted.
Manual image data export
A temporary folder is required for manual image data export to temporary storage of the export
data before they are sent from the server to the client.
The temporary folder is specified in the MBD configuration (see SeeTec administration
tool).

1. Create the temporary export folder on the server for the manual storage of the image data,
or click the Select path button to select the folder directly in Windows Explorer.
2. Click Check path to ensure that the SeeTec server services can write to the folder and read
from it.
Make sure that there is sufficient storage space for large export files on the partition
on which the temporary folder is created.
3. Specify a password to be used to encrypt the image data.
The password will be required to export the image data (see Multiple export of image data -
p.72).
Remove the stored password with Delete password.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

Configuring the global OCR settings


The server on which the LPR service is to be executed is displayed.
1. Select Enable automatic master data entry for unknown license plates.
This opens the LPR master data editor as soon as the camera detects an unknown license
plate.
2. Change the font color for unknown license plates and the background in the display of the
license plate.
Known license plates can be changed in the License plate groups control.
3. Select XML export to export the license plate data as an XML file.
4. Select Enable automatic master data entry for license plates that are no longer valid.
5. Create up to 10 additional fields in the master data fields.
These are displayed when you add or edit a license plate.
6. Select Required field and/or Search field to specify that an entry must be made in this field
(required field) and/or it is possible to search for this data (search field).
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.

182 / 251
Configuration mode

Configuring the LPR module


1. If necessary, alter the name of the module.
2. Select the failover module in order to be able to switch to a different server in the event of
the failure of the server.
3. Select Detect spaces to include spaces in the license plate.
4. Specify the XML export path for the storage of the exported XML files.
The export path must be available on the LPR module server. Each recognized license plate
is saved as a separate XML file, including the license plate, license plate group, time and lane
name.
5. Select Embed images in XML file to save an image as a JPEG in Base64 of the recognized
license plate in the XML file.
6. If you like, you can specify an export path for the SQL export. Specify the corresponding
information for this (URL, database, table and user name and password for accessing the
database).
The export contains the license plate, country code, date and time. In the SQL table, three
columns must be created:
n "NumberPlate" (char), approx. 20 characters
n "LastSeen" (varchar) or (string), size 20 characters
n "Country" (char) with at least 30 characters. The size depends on the recognized
country codes. Most country codes have only 3 letters, such as GER, FRA.
However, there are also longer country codes, such as GER_Oldtimer_old.
Example1
7. If multiple character sets have been installed, select which character set is to be used for the
recognition of the license plate.
n The character set cmanpr-7.2.7:99: default does not have an integrated country code.
n The character set cmanpr-7.2.7:99: latin also recognizes the country but requires more
time for recognition.
n You can get character sets for non-European license plates on request.

Configuring the transcoding module


The transcoding module is required for the configuration of the Cayuga web client and mobile cli-
ent client.
1. If necessary, alter the name of the module.
2. Specify the maximum number of channels. For each image requested by the web client or
mobile client, one channel is needed. To reduce the network load and the load on the transcod-
ing module, limit the number of channels to a maximum of 25 channels per transcoding mod-
ule.
3. Specify the Lowest RTSP port and the Highest RTSP port number for channels.
4. Activate the DeviceManagement server.
5. Apply the set values if you want to make further settings.
6. Save the set values to apply the values and conclude input.

1NumberPlate, LastSeen, Country


KA LH 0001, 10.02.2011 16:27:25, GER

183 / 251
Configuration mode

Configuring the generic DVR module


1. If necessary, alter the name of the module.
2. Select a DVR plugin.
3. Specify the maximum number of devices.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

Configuring an Access control module


1. If necessary, alter the name of the module.
2. Select a Redundant module.
3. Select the Selected plugin (refer to Access control - p.157).
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

System
The System function on the Administration control allows you, for example, to configure and
manage system-wide settings for the network, automatic backups as well as communication set-
tings and event management settings.
The system manager is valid for all locations.

1. Select the main location in the Company control.

Configuring the video classification 184


Configuring the company calendar 185
Configuring the backup 185
Configuring the Event Manager 186
Configuring the SMTP server 187
Configuring the Email Manager 187
Configuring the SNMP server 187
Configuring the NAT list 188
Configuring the entity numbering 188
Configuring the AlarmWatchDog 189

Configuring the video classification


1. Click the Add new video classification button, and then specify the name of the video clas-
sification.
2. Click OK to confirm.
The new video classification is displayed in the list.
3. Select the video classifications you want to delete, and then click the Delete video clas-
sifications marked for deletion button.
The standard video classifications ("HD quality", "Standard quality", "Mobile",
"Web", "Analytics") cannot be deleted; they can only be renamed.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

184 / 251
Configuration mode

Configuring the company calendar


In the company calendar, you specify the days to be handled in time templates separately from
normal weekdays (e.g. public holidays or non-working days). Time templates are created in the
Time Manager. They allow the precise specification of recording periods or times in which alarm
scenarios are started.

1. Select the year for which you want to create a calendar template.
Six months are displayed.
2. Click Next to display the following six months, or click Back to display the previous six
months.
3. To navigate to the current date, click the Jump to the current date icon (2).
4. Click Import to enter the public holidays in the company calendar.
The templates for public holiday import are in the SeeTec installation folder in the "\Cli-
ent\calendar folder as text files.
5. Select the desired federal states, as appropriate.
6. Activate Replace holidays to replace all entered public holidays, and then click OK.
The imported data is displayed highlighted in blue.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.

Configuring the backup


1. Select Use automatic backup to schedule automatic backups.
2. Select the time and start time of the backup.
3. If necessary, edit the storage path for data backup or click the Select button to select the
folder directly in Windows Explorer.
The export folder can only be selected if the client is installed on the CoreService
Master server. Otherwise, the storage path to the export folder on the server has to
be entered manually.
4. Select Delete old data to delete existing backups before the data is backed up.
This setting is only applicable for automatic backup. There are up to eight backups.
The backup folder should be backed up to a tape drive or other backup medium at
regular intervals to ensure that the data backups are still available in the event of a
hard drive crash.
5. Click the Perform backup button to carry out the data backup immediately.
The backup is started.
The backup file is named as follows: SeeTec_M_20yymmdd.hhmm.zip, where "yy is the
decade, mm the month.

185 / 251
Configuration mode

Example1
6. Apply the set values if you want to make further settings.
7. Save the set values to apply the values and conclude input.

Configuring the Event Manager


Irrelevant events must be deleted from the event database at regular intervals to ensure that
searches for events are fast. Irrelevant events include events for which image data are no longer
available. A database maintained in this way enables faster searches.
The instances of access to video sources in surveillance mode are stored in the cor-
responding Device Manager (see Configuring the Device Manager (DM) - p.181).
Legislation in France requires that events are never deleted in installations in France. Make sure
that the management database (MAXDB) has sufficient storage space at its disposal. The capa-
city of the management database is configured with the "SeeTec Administration Tool".

General
1. Select Use automatic deletion, and then select the period after which the event database is
to be deleted.
2. To tidy up the database manually, select Delete only events that are older than, and then
specify the period.
3. Click the Delete events button to delete the events in the selected period from the database.
4. Specify the time for the daily report on the system events.
The e-mail with the report of the events of the last 24 hours is sent to all e-mail addresses
stored as system addresses in the e-mail manager.

Error/warning/info
The events that have occurred are subdivided into three categories, depending on their priority:
n Error: Serious events that impair the operation of the Cayuga software such as the failure
of a server, service or device and errors in transmission or when accessing the image data-
base.
n Warning: Events that can lead to errors if they are not eliminated, such as the loss of a
camera's video signal, a change to the system time or data backup problems.
n Info: Events that provide information on the successful completion of system configuration
such as the modification of the license file or the restoration of image analysis.
1. Select the events in the list, and specify:
n whether the event is to be displayed only in the daily report of the system events,
n whether an e-mail is to be sent to all of the e-mail addresses entered in the e-mail man-
ager as system addresses when the event occurs.
2. To edit one or more events, select it in the Edit column and click the Edit selected objects
button.
3. Specify whether an action is to be performed:
n to which recipient an e-mail is to be sent,
n for which profiles a message is to be displayed in surveillance mode.
4. Click the Back to overview button to go back to the list of events.

1"SeeTec_M_20130725.1145.zip" for a backup performed on July 25, 2013, at 11:45 am.

186 / 251
Configuration mode

5. Apply the set values if you want to make further settings.


6. Save the set values to apply the values and conclude input.

Configuring the SMTP server


To enable the SeeTec services to report the malfunctioning or failure of a camera, the software
requires the data of an accessible SMTP server.
1. Activate the SMTP server.
2. Specify the network address of the SMTP server and the SMTP port number.
3. Enter the user name and password for the user account.
4. If necessary, select the encryption method with which the e-mails are to be sent.
The following encryption methods are available: SSL and TSL.
5. Enter the sender address.
6. Click Send test e-mail to check the settings.
7. Apply the set values if you want to make further settings.
8. Save the set values to apply the values and conclude input.

Configuring the Email Manager


The e-mail lists are used to send system messages (see Configuring the Event Manager -
p.186). The email addresses are also used to the report (see Configuring the SNMP server -
p.187).
1. Click the Add new email list button, and then specify the name of the new list.
2. Click OK to confirm.
The new list is displayed.
3. To remove the list, activate it and click the Delete list marked for deletion button.
All activated lists (except for alarm addresses and system addresses) are deleted.

Alarm addresses and system addresses


The lists of alarm addresses and system addresses are already created. The system messages
are sent by default to all email addresses in system addresses.
1. Select the desired list.
2. Click the Add new email address button, and then enter the new e-mail address.
3. Click OK to confirm.
The new e-mail is displayed in the list.
4. To change the e-mail address, click Rename.
5. To remove the e-mail address, activate the e-mail and then click the Delete email addresses
marked for deletion button.
All activated e-mail addresses are deleted.

Configuring the SNMP server


It is possible to send SNMP v1, v2 and v3 traps.
1. Activate the SNMP server to report system errors by means of SNMP messages.
2. Enter the ManagementHost.
3. Enter the ManagementHostTrapListenPort, the LocalTrapSendPort and the Com-
munityString in accordance with the settings required for the SNMP server.

If the SNMP component (Simple Network Management Protocol) is installed in the

187 / 251
Configuration mode

Control Panel > Software > Add/Remove Windows Components > Management and
Monitoring Programs, a different port for LocalTrapSendPort must be set, because trans-
mission is not possible via port 161. If port 161 is set as the default, it will not work.

SNMP v1/v2
1. Activate SNMP v1 or SNMP v2. SNMP v2 adds simple security features, whereas SNMP v1
has none.
2. Enter the CommunityString to enable correct responses from the host.

SNMP v3
SNMP v3 is currently the most secure protocol version.
1. Activate SNMP v3.
2. Enter the Security Name, Authentication Type, Authentication Password, Encryption
Type, and the Encryption Password.
3. To test the settings, click Send SNMP test message to check the settings.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

Configuring the NAT list


The NAT feature is only available for the client in the SeeTec software over the Internet without
requiring a VPN tunnel; port forwarding must be activated on your router or firewall. Ports 60000-
60008 are required by default for NAT.
These ports have to be open on all distributed servers.

1. Click the Add new NAT entry button.


2. Enter the internal and public address.
3. To remove an entry, select list, select Delete at the end of each line, and then click the Delete
NAT entries marked for deletion button.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

Configuring the entity numbering


Each hardware item is assigned a unique entity number (ID) by the system on installation of the
hardware. The number serves as a reference point for the SDK or the keyboard assignment (see
Select and display cameras with the keyboard). The number can also be changed later.
1. If necessary, change the entity number of the device by entering the new ID directly into the
text box or changing the numbers up or down step by step with the arrow keys.
Only change the entity numbering if necessary during configuration of the software
by third-party vendors.
2. Click the Renumber all button to assign a unique entity number to every device.
3. Click the Insert missing numbering button to assign a unique entity number to devices
without entity numbers.
4. Apply the set values if you want to make further settings.
5. Save the set values to apply the values and conclude input.

188 / 251
Configuration mode

Configuring the AlarmWatchDog


The AlarmWatchDog monitors the alarm scenarios of multiple SeeTec installed systems at once.
If an alarm occurs on any of the monitored systems, the user can establish a connection to the
system and see the alarm. To activate the respective alarm transmission , configure the
AlarmWatchDog setting in the Alarm settings in the control bar.
Each system can only be connected to one AlarmWatchDog.

1. To configure the AlarmWatchDog, select AlarmWatchDog in the System control bar.


2. Activate the AlarmWatchDog and specify the IP address and port number (default: 12000) of
the client with the AlarmWatchDog installed. For obtaining the correct IP address, see the
section on the AlarmWatchDog configuration).
3. Specify the IP address and port number of the VMS server. All clients to be watched must be
connected to this server.
4. Set the user name and password of the user who will be logged into the server in case of an
alarm.
5. Specify the user profile (default: user name).
6. Enter a description of the server.
7. Activate NAT if the client can reach the server only via NAT (network address translation),
e.g. through a router.
8. Apply the set values if you want to make further settings.
9. Save the set values to apply the values and conclude input.

189 / 251
10
Video Analytics
The SeeTec counting suite is part of the Video Analytics module. Like the SeeTec Analytics mod-
ule, the counting suite analyzes defined dynamic objects. The counting suite counts how often the
parameters defined in the Video Analytics module have been met and generates statistical fig-
ures. The results are displayed in the Count analysis.

190 / 251
Video Analytics

Installing the Video Analytics module


1. To install the Video Analytics module separately, select the user-defined installation.
2. Select Analytics in the menu.
3. Click Next and proceed with the installation.

191 / 251
Video Analytics

Adding and configuring the module in the


SeeTec VA Administration tool
After the module has been installed, it must be activated in the SeeTec VA Administration tool.
1. Start the SeeTec VA Administration tool.
2. Add and configure the Video Analytics module as Object Video module. See Adding an
ObjectVideo module - p.210.

192 / 251
Video Analytics

Configuring the module in Configuration


mode
The configuration of the SeeTec Counting Suite is similar to the configuration of SeeTec Ana-
lytics. However, a scene change cannot be set.
1. Start the SeeTec client and login with the administrator's user name and password.
2. Select the Configuration mode.
3. If required, create a new camera and set the video stream settings according the following
recommendation:
The camera is capable of multi-streaming (refer to the camera manufacturer's documentation)
n Video stream is set to Motion JPEG
n Frame rate is set to 8 - 12 fps
n Quality is set to 80%
n Resolution is to 352x288 (CIF)
4. If Multistream is used, add a classification for the stream (e.g. "Analytics").
5. Select Other hardware and create a new object.
6. Enter a name and select "SeeTec Video Analytics" as manufacturer.
7. Select "SeeTec Counting Suite" as type.
8. Select the Video Analysis module "Analytics & Counting" to specify which video analysis
channel is to analyze the image data.
9. Click OK.
10. For the configuration steps, refer to the procedure described in SeeTec Analytics.

193 / 251
Video Analytics

Count analysis
The count analysis is based on SeeTec Analytics (also refer to SeeTec Analytics - p.149 in con-
figuration mode). It provides a graphical analysis of the objects (people or vehicles) that have
broken an analytics rule (e. g. entering an "area of interest" or passing a "tripwire").
1. Select Count analysis from the View menu. The following viewing options are displayed:
n Scenarios/templates: Scenarios are defined rules, which describe fixed recurrent
scenarios. Templates can be used for any rule in different combinations. Templates
can be considered as "scenarios without rules". Thereby, they can be used for multiple
rules and serve as predefined time frame and interval settings for a query.
n Complex scenarios: Scenarios and rules can be combined using Boolean operators.
n Individual query: Individual queries allow a broad range of search definitions and dia-
grams.
2. Select the desired option.

Adding a new scenario 195


Editing a scenario 195
Searching occurrences of rules 196
Deleting a scenario 196
Adding a new template 196
Editing a template 197
Searching occurrences according to the template 197
Deleting a template 197
Configuring a complex scenario 197
Configuring a complex scenario 198
Removing an item 199
Deleting a complex scenario 199
Configuring an individual query 199
Adding an individual query 199
Editing a query 199
Deleting a query 199
Defining a report 199

Requirements
The camera should be mounted at least in 3 meters above the object. The higher the camera is
positioned the better the perspective for object recognition.To get best possible counting results
an optimal camera position is required:
n Overhead, i.e. the camera points vertically downwards.
n According to the results of the camera placement tool.
MOBOTIX cameras are supported with Motion JPEG-Streaming only.

194 / 251
Video Analytics

Adding a new scenario


1. Click Add in the Scenarios region.

2. In the Add new scenario window, enter a name for the scenario and select the counting chan-
nel.
3. Select a rule and specify the time frame in which the rule must have occurred.
4. Select the interval, for which the counted rules can be evaluated and visualized.
On the server, counted rules will be stored in the following intervals:
n Last 3 months: every minute
n 3 - 6 months: every hour
n Older than 6 months: daily
5. Click Expert mode to define the number of occurrences in which the rule has been met within
the time frame. Additionally, you may specify the number with Boolean operators (larger than,
equal to, etc.).
6. Click Save. The new scenario will be added to the list.

Editing a scenario
1. Select a scenario in the list. The details are displayed.
2. Click Edit and adjust the settings as required.

195 / 251
Video Analytics

3. Click Save.

Searching occurrences of rules


1. Select the scenario and click OK. All occurrences are displayed in the counting data pane.

Deleting a scenario
1. To delete a scenario, select the scenario in the Scenarios region and click Delete.

Adding a new template


1. Click Add in the template region.

2. In the Add new template window, enter a name for the template and specify the time frame in
which any rule must have occurred.
3. Select the interval in which the counted rules should be analysed and visualized..

196 / 251
Video Analytics

4. Click Expert mode to define the number of occurrences in which the rule has been met within
the time frame. Additionally, you may specify the number with Boolean operators (larger than,
equal to, etc.).
5. Click Save. The new template will be added to the list.

Editing a template
1. Select a template in the list. The details are displayed.
2. Click Edit.and adjust the settings as required.

Searching occurrences according to the template


1. Select the template and click OK. All occurrences are displayed in the counting data pane.

Deleting a template
1. To delete a template, select the template and click Delete.

Configuring a complex scenario


In complex scenarios, existing scenarios can be combined using the Boolean operators (+, -, x,
&).
When using the operators +, -, x the intervals of the combined time ranges have to be
the same.

197 / 251
Video Analytics

Configuring a complex scenario


1. Select the Complex scenarios tab.

2. Select a scenario from the existing scenarios area. The scenario is displayed below.
3. Drag the scenario onto the pane below the tabs.
4. Drag a Boolean operator from the bottom of the window onto the pane.
5. Select an existing rule. The rule is displayed below.
6. Drag the rule onto the pane below the tabs.
7. Arrange the scenarios and rules according to the desired rule settings.
8. Define the settings and time intervals that have to be met.
9. Click Expert mode to define the number of occurrences in which the rule has been met within
the time frame. Additionally, you may specify the number with Boolean operators (larger than,
equal to, etc.).
10. To add rules or scenarios, click the required Boolean operator and connect with the respective
settings.
11. Click Save.
12. Enter a name and click OK.

198 / 251
Video Analytics

Removing an item
1. To remove an item, drag the item onto the trash can icon.

Deleting a complex scenario


1. In the Scenarios / Templates tab, select the scenario and click Delete.

Configuring an individual query

Adding an individual query


1. Enter a name for the query.
2. Select the channel and rule for the filtering of the results.
3. Specify the start time and end time for the query.
4. Select the interval for the query.
5. Specify start time and end time of the time frame within the search will be conducted.
6. Select expert mode, if appropriate, and then specify the query criteria.
7. Click the New query button to start the query.
8. Click Save to save the query.

Editing a query
1. Select the query in the Query region of the Individual query tab and click Edit to change the
settings.

Deleting a query
1. Select the query in the Query region of the Individual query tab and click Delete.

Defining a report

199 / 251
Video Analytics

1. Select a chart type for displaying the result of the query. The results are displayed as charts
or data (numbers) in the counting data pane.
2. To print the chart,select With input data to print the chart with numerical values.
3. Select a query and click the Print button to print the selected query.
4. Select the export format, and then click the Export button to export the selected query. The
data can be exported as:
n CSV (comma separated values) for importing into spreadsheet applications
n PDF (portable document format) for easy distribution

200 / 251
11
Controlling the Cayuga client
remotely
The client can be administered and controlled by using the Remote Desktop connection or by a
Terminal Server session.
Activating the Remote Desktop connection 202
Activating the Terminal Server connection 203
Possible issues when using remote control 204

201 / 251
Controlling the Cayuga client remotely

Activating the Remote Desktop connection


After installing the .NET 4.5 framework on the client computer, no additional installation is required
on the client computer.
1. Activate Remote Desktop on the remote computer. Refer to the Windows help system for fur-
ther assistance.
2. Log in to the Cayuga client computer by entering the client's network address.

202 / 251
Controlling the Cayuga client remotely

Activating the Terminal Server connection


1. Activate Remote Desktop Services in the Server Roles configuration on the Terminal
Server.
2. Activate Remote Desktop Virtualization Host > RemoteFX in the Role Services configuration
on the Terminal Server.

203 / 251
Controlling the Cayuga client remotely

Possible issues when using remote control


No video data visible on the remote computer
1. Check if video data are displayed on the Cayuga client.
2. If no data are visible on the Cayuga client, check if the graphics card installed is compatible
with DirectX 9.
3. If the Cayuga client is used on a virtual machine, check if the 2D/3D acceleration rendering
mode settings are activated.
4. If using VMware©, go to Virtual Machine settings > Display and check 3D graphics.
5. If using VirtualBox©, go to Settings > Display and check Enable 3D Acceleration and
Enable 2D Video Acceleration in the Video tab.
6. If using Remote Desktop©, make sure that the color depth of the remote desktop connection
is set to 32Bit.

204 / 251
12
Admintools
The SeeTec Cayuga admintools contain a suite of administration tools required to manage the
servers, clients and additional modules such as the UpdateService and the AlarmWatchDog.
n SeeTec VA Administration Tool The SeeTec VA Administration tool is used to configure
the settings for the core server and installing the "Versatile Application" extension. The
extension parameters are then configured from within the SeeTec client.
n SeeTec Administration Tool: The SeeTec Administration Tool is used to configure the
image database and the administration database of the SeeTec servers.
n SeeTec ServiceManager. The SeeTec ServiceManager is used for starting and stopping
SeeTec services.
n UpdateService Configuration Tool: The UpdateService Configuration Tool manages the
configuration of the UpdateService on the core service master (CSM) and the UpdateA-
gents on the clients.
SeeTec VA Administration Tool 207
Switching the display language 207
Creating a new configuration file 208
Adding an LPR module 208
Adding an AlarmManager Extension module 209
Adding an ObjectVideo module 210
Adding a Transcoding engine module 210
Adding a gateway service module 211
Adding an Analytics interface module 211
Adding server-based motion detection module 212
Adding a Generic DVR module 212
Adding an Access Control module 213
SeeTec Administration Tool 214
General settings 215

205 / 251
Admintools

Management database (MaxDB) 215


Backup and restore 215
Increase storage space (add volume) 216
Cache 217
Multimedia database 217
About zones 217
Add zone 217
Add zone in network drive 218
Editing a zone 218
Remove zone 218
SeeTec ServiceManager 219
Switching the display language 219
Editing the settings 220
Starting and stopping the services 220
UpdateService Configuration Tool 222
Configuring the UpdateService 223
Manually triggering an action 224
Configuring a group 224
Creating a group 225
Renaming a group 225
Deleting a group 225
Update and patch settings 225
Editing the Server configuration 226
Configuring the FTP server 227
Import of updates and patches at the UpdateAgent 227

206 / 251
Admintools

SeeTec VA Administration Tool


The SeeTec VA Administration tool is used to configure the settings for the core server and
installing the "Versatile Application" extension. The extension parameters are then configured
from within the SeeTec client.
1. Start the SeeTec VA administration tool in the SeeTec Cayuga installation folder.

Switching the display language 207


Creating a new configuration file 208
Adding an LPR module 208
Adding an AlarmManager Extension module 209
Adding an ObjectVideo module 210
Adding a Transcoding engine module 210
Adding a gateway service module 211
Adding an Analytics interface module 211
Adding server-based motion detection module 212
Adding a Generic DVR module 212
Adding an Access Control module 213

Switching the display language


1. Exit the SeeTec VA administration tool.
2. Start the command prompt as the administrator and enter "VMS_VA_ConfigurationTool.exe -
l:<code_for_the_display_language>".
Example1
3. Start the SeeTec VA administration tool.

1For English: "VMS_VA_ConfigurationTool.exe -l:en-gb or "VMS_VA_ConfigurationTool.exe -


l:en-us", or for French: "VMS_VA_ConfigurationTool.exe -l:fr-fr"

207 / 251
Admintools

Creating a new configuration file

1. Click the Settings (1) icon, and then choose Create new configuration file from the File
menu.

Adding an LPR module


You may only operate one LPR-Module per server at the same time. You may however
install multiple LPR modules on multiple servers if only one server is activated in the
SeeTec VA Administration Tool settings in the configuration mode.

1. Right-click the configuration file in the column on the left and choose License plate recog-
nition from the Add new module context menu.
A new entry is created under the configuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.

208 / 251
Admintools

Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port used by the LPR module.
7. Specify the number of concurrent jobs that are to be transferred. This number should
exceed the number of lanes to be monitored.
Example1
8. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
9. Click Save to save the changes.
10. Restart the services (see Starting and stopping the services - p.220) or add further mod-
ules.

Adding an AlarmManager Extension module


1. Right-click the configuration file in the column on the left and choose AlarmManager Exten-
sion from the Add new module context menu.
A new entry is created under the configuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port and the Streaming port used by the AlarmManager Extension mod-
ule.
7. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
8. Click Save to save the changes.
9. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.

1For each lane, more than one vehicle may be waiting. Hence, multiple concurrent jobs may be
present per lane. The jobs will then be set on a "waiting list" where the queue is processed one
after the other.
Do not change to 32bit mode without talking to SeeTec Support first.

209 / 251
Admintools

Adding an ObjectVideo module


1. Right-click the configuration file in the column on the left, and choose ObjectVideo from the
Add new module context menu.
A new entry is created under the configuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port used by the OV module.
7. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
8. Click Save to save the changes.
9. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.

Adding a Transcoding engine module


1. Right-click the configuration file in the column on the left and choose Transcoding engine
from the Add new module context menu.
A new entry is created under the configuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port used by the transcoding module.
7. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
8. Click Save to save the changes.
9. Restart the services (see SeeTec ServiceManager - p.219), or add further modules.

210 / 251
Admintools

Adding a gateway service module


1. Right-click the configuration file in the column on the left, and choose Gateway service from
the Add new module context menu.
A new entry is created under the configuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port used by the SGS module.
7. Enter the SOAP IP and the SOAP port.
8. If accessing the network from the intranet (internal access), enter the local IP of the server.
9. If accessing the network from the internet (external access), enter the public IP of the router
or firewall. Additionally, transparent port forwarding must be activated at the router or firewall.
10. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
11. Click Save to save the changes.
12. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.

Adding an Analytics interface module


1. Right-click the configuration file in the column on the left and choose Analytics interface
from the Add new module context menu.
A new entry is created under the configuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port used by the VCA module.
7. Select the VCA plug-in.
The SeeTec supplied plugin must have been installed in the plugin folder before (C:\Program
Files\SeeTec\plugins).

211 / 251
Admintools

8. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
9. Click Save to save the changes.
10. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.

Adding server-based motion detection module


1. Right-click the configuration file in the column on the left and choose Server-based motion
detection from the Add new module context menu. A new entry is created under the con-
figuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes on the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port used by the motion detection module.
7. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
8. Click Save to save the changes.
9. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.

Adding a Generic DVR module


1. Right-click the configuration file in the column on the left and choose Generic DVR from the
Add new module context menu.
A new entry is created under the configuration file in the menu tree.
2. Change the module name.
3. Enter the IP address of the core server.
Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.
4. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
5. Select the module IP.
6. Enter the module port used by the Generic DVR module.

212 / 251
Admintools

7. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.
Do not change to 32bit mode without talking to SeeTec Support first.
8. Click Save to save the changes.
9. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.

Adding an Access Control module


Right-click the configuration file in the column on the left and choose Generic Access Control
from the Add new module context menu.
A new entry is created under the configuration file in the menu tree.
1. Change the module name.
2. Enter the IP address of the core server.

Do not use localhost or 127.0.0.1 as the entry as other services must communicate via
these IP addresses.
The service ID changes after the first connection to the SeeTec server.
Do not reset the service ID without talking to SeeTec Support first.

3. Click the Connection test button to check the connection between the module and the main
server.
If the module does not connect, check and configure the network and the firewall settings.
4. Select the module IP.
5. Enter the module port used by the Generic DVR module.
6. Select Enforce 32bit if the devices are not 64-bit capable. This setting only applies to
devices that have not yet been released for 64bit.

Do not change to 32bit mode without talking to SeeTec Support first.


7. Click Save to save the changes.
8. Restart the services (see SeeTec ServiceManager - p.219) or add further modules.

213 / 251
Admintools

SeeTec Administration Tool


The SeeTec Administration Tool is used to configure the image database and the administration
database of the SeeTec servers.
Note that incorrect settings in the administration tool may result in a non-operational
system.

1. Start the SeeTec Administration Tool in the SeeTec Cayuga installation folder.

All settings in the administration tool are not valid until the services or the complete
computer have been restarted (to start the services see SeeTec ServiceManager - p.219)

General settings 215


Management database (MaxDB) 215
Backup and restore 215
Increase storage space (add volume) 216
Cache 217
Multimedia database 217
About zones 217
Add zone 217
Add zone in network drive 218
Editing a zone 218
Remove zone 218

214 / 251
Admintools

General settings

1. Configure the server and port of the CoreService server if SeeTec administration was started
on a distributed server.
If SeeTec administration was started on the main server, leave these settings unchanged
(default: server: localhost, port: (60000).
2. Enter the IP address of the server and the host name for the SeeTec services to connect to
in the "IP address/host name for server communication" area.
3. Enter the network password.
4. Click the Settings (1) icon, and then choose Save from the File menu to save the changes.
5. Restart the services (seeSeeTec ServiceManager - p.219).

Management database (MaxDB)

Backup and restore


1. To create a backup of the management database, click Backup.
The database is backed up in the "\SeeTec\sapdb\backup" folder.
2. To restore a data backup, click Restore and select the required data backup.

215 / 251
Admintools

Increase storage space (add volume)

If more storage space has to be made available to the multimedia database because, for example,
the event data is to remain available for an extended period, an additional volume can be added to
the MaxDB. The default size of the MaxDB is 4 GB.
A maximum of four volumes can be added to the MaxDB.
This extension has no influence on the actual multimedia database.

1. Enter the size [MB] of the additional storage space for the expansion of the multimedia data-
base (minimum: 512 MB, maximum: 4000 MB).
2. Click Add new volume.
The additional storage space is available immediately under DISK000X in the MaxDB install-
ation folder.
3. Click the Refresh (3) button for an estimate of how long (in days) the space in the MaxDB will
last at the current alarm rate.
A reliable estimate can only be made if the system is running under normal load with reference
to the alarm occurrence.

216 / 251
Admintools

Cache
If a large number of events occurs with resulting high loading times, the MaxDB cache size can be
increased.
However, this value should be selected carefully. Enlarging the cache is not useful if the computer
does not actually have enough free RAM available.
The current cache size of the RAM reserved for the MaxDB is displayed. The actual size of the
MaxDB is shown under Current capacity utilization of the management database.
The cache size of MaxDB is an extremely system-critical parameter that should not be
changed unless there are good reasons for it. The throughput is optimal if the compete
database is kept in the cache.

1. Enter a value in MB for the desired size, and click Adjust cache size.

Multimedia database
The multimedia database tab is used for maintenance and editing of zones of the multimedia data-
base. The zones are paths in which the multimedia database stores its image data. Both local
drives and network drives can be addressed. The specified zone size is not reserved immediately
but only used as required.

About zones
Zones specify the maximum storage depth of the multimedia database and thus of the software.
By default, the SeeTec software does not set any limits on the zone of the multimedia database.
The default zone is placed in the following folder in a new installation: "SeeTec installation folder-
\re\md\mds\data\.
However, we recommend replacing it with a zone on a dedicated partition.
If the volume of the existing zone is not sufficient, another zone can be added. A maximum of ten
zones should be created. A larger number has a negative effect on the performance of the mul-
timedia database. It is also better to have a few large zones than a larger number of small zones.
If more storage space than is available on the zones or on the hard disk is assigned to the con-
nected cameras, the database stops recording.
We strongly recommend against setting a hard disk that is connected by USB or
FireWire as a multimedia database zone, because this will have a very negative effect
on the performance. The multimedia database should be placed on another hard disk or
a RAID system to ensure satisfactory performance.

Add zone
1. Create a folder on a dedicated partition as a zone to store the image data.
The cluster size should be 64 KB.
2. Click Add zone.
3. Enter the path and the maximum size (in GB).
If necessary, click Browse to go to the new folder.
4. Activate Unlimited to use all the physical space in the partition.
We recommend using no more than 90% of the physical space on a partition, because any

217 / 251
Admintools

more will adversely affect the performance of the operating system.


5. Click OK to confirm.

Add zone in network drive


1. Create a folder on a server in the network to store the image data.
2. Click Add zone.
3. Enter the UNC path and the maximum size (in GB) (e.g. "\\192.168.2.20\Path\To\Accept").
4. Activate Unlimited to use all the physical space in the partition.
5. Activate A user name and password are required in the network authorization area, and
enter the authorization data of the network drive, i.e. the server login information.
6. Enter the user name and password.
Note that the user must also be available locally on the computer and the domain is also
required, e.g.: DOMAIN\firstname.lastname
7. Click Test to check the availability and authorization on the network drive.

Editing a zone
1. Select the desired multimedia database in the zones field.
2. Click Edit zone to change the path and/or size.
We recommend using no more than 90% of the physical space on a partition, because any
more will adversely affect the performance of the operating system.
3. Click OK to confirm.

Remove zone
1. Select the desired multimedia database in the zones field.
2. Click Remove zone.
The image data in the deleted zone are no longer available in SeeTec Cayuga, but are not auto-
matically deleted.

218 / 251
Admintools

SeeTec ServiceManager
The SeeTec ServiceManager is used for starting and stopping SeeTec services. The following
functions are available in the SeeTec ServiceManager:
n Restart all SeeTec services
n Stop all SeeTec services
n Start all SeeTec services
The SeeTec ServiceManager is automatically installed when a server service is installed.
To start the SeeTec ServiceManager automatically at login, add "-autostart" as the command line
parameter (see Command line parameters - p.230).
1. Start the SeeTec ServiceManager in the SeeTec Cayuga installation folder or the Windows
Start menu.

Switching the display language 219


Editing the settings 220
Starting and stopping the services 220

Switching the display language


1. Exit the SeeTec ServiceManager.
2. Start the command prompt as the administrator and enter "VMS_ServiceManager.exe -l:<-
code_for_the_display_language>".
Example1
3. Start the SeeTec ServiceManager.

1For English: "VMS_ServiceManager.exe -l:en-us", or for French: "VMS_ServiceManager.exe -


l:fr-fr"

219 / 251
Admintools

Editing the settings

1. Click the Settings (1) icon to edit the ServiceManager settings.


2. Activate Show services that are not installed to show all available services in the list. By
default, services not installed are not displayed.
3. Activate Minimize to the notification area on the taskbar at program startup for faster
access to the SeeTec ServiceManager.
4. Activate Show balloon tip for status changes to see an immediate notification on the screen
in the event of changes to the services.
5. Define the Wait time between stopping and restarting services (default 15 seconds).
Increase the interval to allow the services to start and terminate correctly with large install-
ations.
6. Click OK to confirm.

Starting and stopping the services


The state of the services is displayed and color-coded:
n green = service is started
n red = service is stopped

220 / 251
Admintools

n yellow = service is started or stopped


n black = service is not installed
1. Click Restart all SeeTec services to stop all services regardless of the state of the services
and to restart them after the defined wait time (see Starting and stopping the services).
2. Click Stop all SeeTec services to stop all services regardless of the state of the services.
3. Click Start all SeeTec services to start all services regardless of the state of the services.
You can also optionally start, stop or restart specific services by clicking the service with the right
mouse button.

221 / 251
Admintools

UpdateService Configuration Tool


The UpdateService Configuration Tool manages the configuration of the UpdateService on the
core service master (CSM) and the UpdateAgents on the clients. The configuration tool will be
installed automatically with the UpdateService (see Installing and configuring the UpdateSer-
vice and the UpdateAgent - p.41). The UpdateService Configuration Tool supports the following
features:
n Displaying all connected UpdateAgents, their hardware specification, their installed fea-
ture, and the applied patches of each UpdateAgent
n Displaying status information of all UpdateAgents in a group
n Creating groups of UpdateAgents to configure
n Renaming and deleting groups and old UpdateAgents from the configuration
n Import and export of download packages and patch files for the UpdateService (no dir-
ectories necessary
n Export of patches and updates and import them with the help of a small tool to the
UpdateAgents
n Configuration for getting updates/patches and how they should be deployed to the
UpdateAgents
n Checking for updates or patches at the SeeTec server

1. Start the UpdateService configuration tool in the SeeTec Cayuga installation folder. If
required, confirm the system's administration privileges.
The information tab is displayed.

Configuring the UpdateService 223


Manually triggering an action 224
Configuring a group 224
Update and patch settings 225
Editing the Server configuration 226
Configuring the FTP server 227
Import of updates and patches at the UpdateAgent 227

222 / 251
Admintools

Configuring the UpdateService

The Groups column displays all groups managed by the UpdateService alphabetically. The default
group contains all UpdateAgents (clients) not assigned to a group.
Clients in the default group are updated automatically. Clients that should not receive
updates or patches have to be located in a separate group (see Configuring a group -
p.224).

1. Click on a group folder icon to display the status overview of all clients within the group. Am
colored bullet point shows the current status of each client:
n Red: An error occurred at the client or the UpdateAgent of the client is offline for more
than 3 minutes.
n Yellow: UpdateAgent is currently busy (patching, downloading, etc.) or waiting for an
event triggered by the UpdateService (e.g. manual distribution of patches).
n Green: The client's UpdateAgent is up-to-date.

1. Click on a client name to display the installed components (e.g. the system software, the soft-
ware version, the status, and the installed patches).
2. Click Refresh list to see a more current status.
3. Click Configure group to create, rename or delete a group and specify the group's update
settings (see Configuring a group - p.224).
4. Click Delete clients to remove clients from the configuration tool.

223 / 251
Admintools

Manually triggering an action


If a group is configured to be updated manually, Start patch/update at the UpdateAgents is dis-
played in the group's status pane.
1. Click Start patch/update at the UpdateAgent to start the update.
It will require up to 60 seconds before the update process is started.

Configuring a group

The group configuration allows the configuration of:


n Specific download date and time of the update package or the patch files.

If the time is in the past, downloads and patches will start immediately.
n Download interval between each UpdateAgent for in minutes (e.g. the first UpdateAgent
starts the download at 10:00, the second UpdateAgent starts the download at 10:10, the
third at 10:20, etc).
n Update and patch date and time.
n Specific update and patch behavior for the UpdateAgents in the current group.
1. Specify the required update and patch settings for the group.
2. Select Don't distribute patches or updates to these clients to prevent automatic dis-
tribution at low bandwidth.
If this option is activated, the patches have to be distributed manually.
3. Select Don't start patching or updating automatically to prevent automatic installation of
patches and updates.
Patching and updating has to be performed manually.

224 / 251
Admintools

4. Select Automatic restart before and after the patch/update to shut down the software and
log out all users before applying the patch.
The clients will be restarted automatically.
5. If required, deselect clients from the groups list. Only the selected clients will be affected by
the group settings.
Creating a group
1. Click Create new group, enter a name for the new group and click OK. The new group will
be displayed in the Groups column.
Renaming a group
1. Click Rename group, change the name of the group and click OK. All assigned UpdateA-
gents will remain in the group and adhere to the group's settings.
Deleting a group
1. Select a group in the Groups column and click Delete group. All clients in the group will be
moved into the default group and will be exempted from the update settings. UpdateAgents in
the default group will get updates and patches as soon as they are available.

The default group cannot be deleted.

Update and patch settings

225 / 251
Admintools

The tab displays the available updates and patches. If the UpdateService has been configured for
manual distribution in the Server configuration tab (see Editing the Server configuration -
p.226), all updates and patches can be imported from the server and exported to a directory on the
server or an attached media.
1. Click Import updates to download the available updates from a directory that is available in
the local network.
2. Click Refresh to check at the server for updates not yet displayed.
3. Click Export to copy the updates and a "SeeTec.UpdatePatchImport.exe" to a directory that
can be copied to any media such as a USB stick.
The SeeTec.UpdatePatchImport.exe updates and patches can be installed at each client sep-
arately (see Import of updates and patches at the UpdateAgent - p.227).
4. Click Import patches to download the available patches from a directory that is available in
the local network. The available patches are displayed.
5. Click Export to copy the patches and a "SeeTec.UpdatePatchImport.exe" to a directory that
can be copied to any media such as a USB stick.
The SeeTec.UpdatePatchImport.exe updates and patches can be installed at each client sep-
arately (see Import of updates and patches at the UpdateAgent - p.227).
6. If patches are not required, select the patches from the list and click Delete patches before
exporting them. Only the patches listed will be distributed.
7. Click Refresh to check at the server for patches not yet displayed.

Editing the Server configuration

226 / 251
Admintools

With the Server configuration tab, the basic settings for the communication between the Update
server and the clients are managed. By default, the UpdateService connects to the server provid-
ing the updates (i.e. SeeTec), downloads and distributes the updates and patches to the UpdateA-
gents. However, if manual distribution or a different server for downloads is preferred, the
automatic setting can be changed.
1. Select an option from the menu:
n Download and install updates/patches automatically from the internet. This is the
recommended setting for automatic updates and distribution of patches.
n Download updates/patches from the internet, but don't install them automatically.
Updates and patches will be automatically downloaded from the server, but will not be dis-
tributed to the UpdateAgents. The updates and patches must be updated and installed
manually (see Update and patch settings - p.225).
n Download and install updates/patches automatically from a defined remote loc-
ation. The updates and patches will be downloaded from an FTP server that has to be con-
figured and automatically installed at the UpdateAgents (see Configuring the FTP
server - p.227).
n Download and install updates/patches from a defined remote location, but don't
install them automatically. The updates and patches will be downloaded from an FTP
server that has to be configured, but will not be distributed to the UpdateAgents. The
updates and patches must be updated and installed manually (see Configuring the FTP
server - p.227).
n Don't look for updates from the internet or any remote location. The option is not
recommended, as no updates or patches will be downloaded or distributed automatically.
The updates and patches will have to be downloaded and exported manually (see Update
and patch settings - p.225).
2. Select the required option from the menu.
3. Specify the daytime when updates and patches will be downloaded and installed.
4. Click Check for updates/patches now to manually check for available downloads. Currently
active downloads are displayed.
5. Click Restart SeeTec UpdateServer to restart the UpdateServer with the applied settings.
6. Click Save to apply the settings.

Configuring the FTP server


1. After selecting the option Download and install updates/patches automatically from a
defined remote location, enter the IP address and port number of the FTP server.
2. Provide the user name and password for the FTP server.
3. To establish a secure connection, activate Use FTP via SSL, if the server supports SFTP.
(Contact the network administrator for the correct settings.)

Import of updates and patches at the UpdateAgent


1. After successfully exporting patches or updates (see Update and patch settings - p.225)
copy the directory to an USB stick, and plug it into the computer where the UpdateAgent is
running.
2. Start the application "SeeTec.UpdatePatchImport.exe" and click Yes.
3. Click OK and start the update and patching process. The UpdateAgent will be stopped for the
update/patch process. After the process, the UpdateAgent will be restarted automatically.

227 / 251
13
LPR mode
The automatic recognition of license plates in the video image and comparison with a license-plate
database allows items such as entry checks and barrier control, parking and loading area admin-
istration and triggering of alarms.
LPR mode is for analyzing the LPR events and displaying the information associated with the
event (including master data, if available). In addition, statistics can be kept.

Editing LPR master data


LPR master data are all information that is assigned to a specific license plate (such as group,
validity). The master data are created and administered with the LPR master data editor (see LPR
master data editor - p.67).

Displaying license plate recognition details


When a license plate is recognized, the master data and alarm messages belonging to that license
plate are displayed.
1. Click a column header in the main window to sort the column (alarm, layer/camera, start,
stop) in ascending or descending order.
2. Select the required layer or camera (or start or end of recording).
The selected object is displayed in the player.

228 / 251
LPR mode

Player
The player is operated in LPR mode in the same way as in archive mode (see Archive mode -
p.105).

Call license plate


In the Administration control, the stored events for a license plate in the master data set can be
searched for in the database.
1. Click a column header in the main window to sort the license plates in ascending or des-
cending order on the basis of the column's category (time, license plate, group).
2. Click Start query to display all stored events for the selected license plate.
3. Limit the search filter by selecting the query mode and, if appropriate, entering information on
the license plate, container, group, lane and period.
4. If only the statistics are to be searched through, select Query statistics only and the type.
5. Click Start query to search the database.
6. The search results are displayed in the License plate recognition details window.
7. Click the event found.
The player skips automatically to the selected point in time.

229 / 251
14
Command line parameters
Command line para- Meaning
meters

lang:<language> Change language:


The client can be started in a different language with this com-
mand line parameter.
The following languages are available:
de-de (German), en-us (English), fr-fr (French), ru-ru (Russian),
tr-tr (Turkish), nl-nl (Dutch), es-es (Spanish)
pass:<password> Password
pass2:<password> Second password (if required)
AutoADLogin Automatic login by means of Active Directory® login details
host:<IP/hostname> IP address or name of the SeeTec server
port:<port> Port for login, default: 60000
nat:<true/false> Login by means of NAT yes (true)/no (false)
user:<user name> User name
nolayers Start client without layers
profile:<profile> Profile (user or group profile)
nosip Start client with deactivated SIP protocol
camerano:<CameraID> Open the camera with the specified ID
alarmid:<AlarmEventID> Open the alarm event with the specified ID
noserverip If set, the label and the textbox of the login screen are invisible.

230 / 251
Command line parameters

Command line para- Meaning


meters

The "Switch installation" item in the menu is not affected.


profile:<profile> Profile (user or group profile)
The command line parameters are entered in the form <key>:<value>.
1. Add the required command line parameters to the properties of the client.
2. Right-click the program icon and select Properties.
3. Navigate to the Link tab, and add the required parameters to the text in the Destination text
box.
4. Click OK to confirm and start the program.
The client is started with the specified parameters.
Example1

1To start the SeeTec client in English at the server with the IP address 192.168.0.10, right-click
the link and append the command line parameter "lang:en-us" at the end of the line.
The line then appears as follows for a default installation path: "C:\Program Files\SeeTec\Cli-
ent\VMS_Client.exe" lang:en-us host:192.168.0.10
Note that no spaces are allowed after the colons.

231 / 251
15
Shortcut key
The following keyboard shortcuts are available for users in the client to speed up function calls.

Shortcut key Meaning

CTRL+1 Switch to surveillance mode


CTRL+2 Switch to archive mode
CTRL+3 Switch to report mode
CTRL+4 Switch to configuration mode Only possible as administrator
CTRL+5 Switch to LPR mode
F10 Switch full-image mode on or off
F1 Show SeeTec User's Guide
F2 Moves all windows to primary display (only when multiple displays
are connected)
ESC Hide all controls
+/- When digital zoom is active, pressing + or - zooms in or out

232 / 251
16
The SeeTec Cayuga Viewer
The SeeTec Viewer can be used to access exported image data that are in the SeeTec image
format.
The SeeTec Viewer is automatically installed with a default or client installation. It can also be
installed separately in a user-defined installation.
1. Start the Viewer.
You will find the Viewer in the SeeTec installation folder.

Switching the display language 234


Select and play recording 235
Play recording 235
Export a recording 237
Save sequence as AVI file 238
Selecting multiple layers 239

233 / 251
The SeeTec Cayuga Viewer

Switching the display language


To switch the display language of the Viewer, you have to change the display language of the oper-
ating system and restart the Viewer.

234 / 251
The SeeTec Cayuga Viewer

Select and play recording

1. Click the Select file button and navigate through the file folder to the file that you want to
view.
2. Click the Import data button to import the selected data into the viewer.

Importing data into the SeeTec Viewer may take some time.

1. Select the recording that you wish to view in the area on the left (1).
2. Enter the password specified during export.
3. Right-click the current camera and select Delete camera from layer to select a different
recording.
4. Click the new time period that you wish to view.
Alternatively, you can drag the desired time period to the previously occupied tile.

Play recording
1. Navigate through the recording with the player in the area on the right (12):
n Fast rewind (2): plays the recording backwards at high speed (time lapse)
n Play backward (3): plays the recording in reverse chronological order
n Slow rewind (4): plays the recording backwards at low speed (slow motion)
n Previous frame (5): jumps to the recording's previous i-frame.
n Pause (6): pauses the playback.
n Next frame (7): jumps to the recording's next i-frame.

235 / 251
The SeeTec Cayuga Viewer

n Slow forward (8): plays the recording forwards at low speed (slow motion).
n Play (9): plays the recording in normal chronological order.
n Fast forward (10): plays the recording forwards at high speed (time
lapse).
2. If the recording has an additional sound track, activate Sound output (11), and then adjust
the volume if necessary.
3. The Additional information field shows exported data of the CIT, license plate recognition
and ATM add-on modules.

236 / 251
The SeeTec Cayuga Viewer

Export a recording
1. Right-click the corresponding sequence under the camera name in the camera tree to delete
it.
2. Right-click the camera image to print a single image, save it as a JPG image or rotate the
image.
3. Right-click the camera image to activate the digital zoom.

If the image data that are to be played originate from a camera with an ImmerVision
lens, the digital zoom activates the distortion of the camera image.

1. Draw a rectangle in the camera image with the mouse.


This area is then magnified.
You can also use the + and - keys on the number pad of your keyboard, or the mouse wheel.
2. Draw another rectangle to enlarge the image area.
3. Click the image to restore the previous image size.
4. Move the camera image with the activated zoom function by pressing and holding the mouse
wheel button (the button must be configured as the third mouse button).
You can also use the arrow keys on the keyboard.

237 / 251
The SeeTec Cayuga Viewer

Save sequence as AVI file


1. To save a sequence as an AVI file, right-click the camera image and select Save images as
AVI files.
2. Select the start and stop time, the export format and the name of the file.
3. The export settings can be used to influence the properties of the video to be created. By
default, the best codec available on your system is used.
4. If you want to use a different codec and/or change the settings of the selected codec, select
the Advanced settings option.
You can also select the audio export option.
5. Click Select to select the name and the export path for the film sequence.
6. Click Export to start the export.
The size of the AVI file is restricted to 4 GB.

Do not export uncompressed images as film. Ten seconds of exported image material
uncompressed is about 350 MB. If possible, do not use Windows® default codecs. They
yield a poor-quality export result.

MOBOTIX cameras can only be exported in the MOBOTIX format.recommends the XviD
codec.
If there are different frame rates and resolutions in the time period that is to be exported (e.g.
change from standard to alarm recording), check the film sequence, because the selected codec
may yield a distorted image from the time of the change in some cases.

238 / 251
The SeeTec Cayuga Viewer

Selecting multiple layers


1. Select the desired multiple layer in the Layer menu.
The layers 1x1, 2x2, 3x3 and 4x4 are available for selection.
2. Select the desired time period that you wish to view in the first tile of the multiple layer.
3. Repeat the above step for the remaining empty tiles.
Alternatively, you can drag the recordings into the tiles by drag & drop.
4. Right-click the current camera and select Delete camera from layer to select a different
recording.
5. Click the new time period that you wish to view.
Alternatively, you can drag the desired time period to the previously occupied tile.

239 / 251
17
Configuring the SeeTec Mobile
Client
The SeeTec Mobile Client is an application (app) that allows you to access an existing SeeTec
installation via WiFi or 3G network. With the Mobile Client app, the user may access camera
images, archives, enable button actions or process alarm events among other settings.
Installing the Mobile Client on a mobile device 241
Installing the SeeTec Mobile Client services on the SeeTec server 242
Configuring the SeeTec Mobile Client on the mobile device 243
Connecting with the SeeTec Mobile Client 244

240 / 251
Configuring the SeeTec Mobile Client

Installing the Mobile Client on a mobile


device
1. Download the application from the appropriate app store. The client is available on "Google
Play" for Android OS version 2.3 or later, and on the iTunes App Store for iOS 7 or later.
Before downloading, verify that your device meets the necessary requirements.

241 / 251
Configuring the SeeTec Mobile Client

Installing the SeeTec Mobile Client services


on the SeeTec server
1. If not already installed, install the mobile client module via User-defined installation.
2. Switch to configuration mode and select the Server control bar.
3. Select SGS module (SeeTec Gateway Service). If the SGS module is not installed, see
Adding a gateway service in the SeeTec VA Administration Tool.
4. Activate the SGS module.
5. Check if the server IP and port number are displayed correctly.
If the server is not displayed correctly, check the firewall settings and the server settings in
the client and the SeeTec VA Administration Tool.
6. Optionally, change the SOAP IP address and port numbers for the SOAP port and the
RTSP port.
n If accessing the network from the intranet (internal access), enter the local IP of the
server.
n If accessing the network from the internet (external access), enter the public IP of the
router or firewall. Additionally, transparent port forwarding must be activated at the
router or firewall.
7. Select Transcoding module. If the transcoding module is not installed, see Adding a
TranscodingEngine in the SeeTec VA Administration Tool.
8. Set the maximum number of channels that provide the camera streams. Each module can
provide up to 15 channels. If more channels are required, a second module has to be installed
(which may decrease CPU performance) or another module has to be installed on a second
computer.
For each smartphone or tablet, a separate channel has to be available. Increase the maximum
number according to the number of mobile clients.
9. Specify the port range (lowest and highest port number) available for transmission. The num-
ber of ports must correspond to the number of channels.
10. Activate the Assigned DeviceManager server. The selected server will provide the image
data via the gateway. The camera signal will be automatically supplied by the server in a com-
patible format for the client.
11. Click Apply to apply the settings or click Save to apply the settings and close the window.

242 / 251
Configuring the SeeTec Mobile Client

Configuring the SeeTec Mobile Client on the


mobile device
1. Start the app on the mobile device.
2. Tap Add Server and enter the user name.
3. Enter a description to identify the server.
4. Enter the SOAP IP or URL of the server.
5. Enter the port number of the server.
6. For iOS devices: Specify the FPS (frames per second) and the horizontal resolution when
connecting via 3G network. The default settings are: 3 fps and a resolution of 200.
7. Select the server type (SeeTec 5 or SeeTec Cayuga).
8. Tap Save.

243 / 251
Configuring the SeeTec Mobile Client

Connecting with the SeeTec Mobile Client


1. Start the app on the mobile device.
2. Select the configured server or tap Add server to add a new server (refer to Configuring the
SeeTec Mobile Client - p.240).
3. Enter the password and tap Login.

244 / 251
18
Using the AlarmWatchDog
The AlarmWatchDog service displays all alarm scenarios on all clients connected to the
AlarmWatchDog server. For setup and configuration of the service, see AlarmWatchDog in the
configuration mode.
1. Start the AlarmWatchDog service from the tools folder in the installation directory.

Configuring the AlarmWatchDog 246


Using the AlarmWatchDog 248

245 / 251
Using the AlarmWatchDog

Configuring the AlarmWatchDog

1. Open the settings menu (1).

2. Specify the Location of the alarm data by setting the file path to the storage directory.

Read and write permissions must be enabled.


3. For Location of the VMS client, specify the installation directory of the client (e.g. "C:\Pro-
gram Files\...").
4. For TCP port of the AlarmWatchDog,, specify the port number that has been set in the
server configuration of the AlarmWatchDog (see AlarmWatchDog in the System menu in the
control bar).
5. The available TCP IP addresses of the client are displayed.

246 / 251
Using the AlarmWatchDog

6. Select one IP address from the TCP IP address list and copy it to the clipboard.
7. Paste the IP address in the AlarmWatchDog settings in the System menu (see
AlarmWatchDog in the System menu in the control bar).
8. Click OK.

247 / 251
Using the AlarmWatchDog

Using the AlarmWatchDog


1. Start the AlarmWatchDog service from the tools folder in the installation directory.All occur-
ring alarms on all connected clients are displayed in the list according to their
n Alarm scenario name
n The date and time of the occurrence
n The name of the client where the alarm occurs
n The status of the alarm
2. Double click on the alarm to open it. The client will be started and a connection to the respect-
ive server is established.
3. After responding to the alarm, close the client. The alarm is displayed as "finished" in the
AlarmWatchDog window.
4. To remove all finished alarms from the list, click Remove finished alarms.

248 / 251
19
The Cayuga web client
With the web client, the SeeTecsystem is displayed with a web based interface within a browser.

Overview
In live mode, the web interface provides basic functions of the client, such as:
n Accessing cameras
n Accessing predefined layers
n Accessing maps
n Accessing webpages
n Recieving alarms and confirm them
n Controlling PTZ cameras and activating PTZ preset positions
n Displaying buttons and triggering their actions
n Displaying the same entity tree as in the Windows client with folders and subfolders
n Exporting the actual live image as JPEG

In archive mode, the web client provides


n Stepping forward/backward in single image steps in the archive
n Playing the archive forward in real time (without speed choice and rewind)
n Displaying the timeline of the archive cameras
n Exporting a single JPEG image from a specific time.

249 / 251
The Cayuga web client

Installing the web client


1. Perform a custom installation of the SeeTec system (see The Cayuga web client - p.249)
and additionally add the web client feature.
2. Switch to the Cayuga client and open the Server menu in the configuration mode.
3. Click on Transcoding Module and configure the settings (see Configuring the transcod-
ing module - p.183). The Gateway Service should be automatically configured by the
installer, if you have chosen the correct IP of the core server (for looking up the IP address,
refer to Configuring the CoreService - p.181).
4. Start a browser and enter the IP address of the Cayuga client in the URL bar: "https://<your-
client-ip>.
Make sure the URL starts with "https"and not "http".
The web client window is displayed.

250 / 251
The Cayuga web client

Remarks, limitations and known issues


n It is recommended to use a current browser version (i.e. Chrome version 38 and newer,
Firefox version 33 and newer, Internet Explorer version 11 and newer)
n Upload speed of at least 2 MB/s is required (for 2-3 simultaneous camera views). For
increasing number of connections and camera views, more bandwidth is required.
n The following ports must be routed transparently if you are using a firewall:
n Port 62000 (SGS, if changed after setup, change it in the file "web-
root/seetec/restservice.js")
n Port 9100 (RTSP proxy)
n Port 443 (webserver)
n Port 8081 (NodeJS, which is delivering the images)
n User profiles which are configured in the SeeTec system are not supported. Assigned start
layers to the user profile will not be displayed automatically in the web client. The user and
group rights are not affected.
n Newly added or deleted cameras only show after reloading the web client in the browser.
They will not automatically appear in the tree.
n No restriction of the number of cameras displayed simultaneously, but beware that the web
browser has to render all images AND the images have to be delivered through the
transcoding service which is only serving the number of channels configured. The image
rendering also depends on the hardware.
n Grandeye IPC fisheye cameras are currently not supported; there is no live stream pos-
sible.
n Mobotix (MxPEG) cameras have a mirrored image if exporting a single image.
n If a layer contains an insecure (non-HTTPS) web page or a predefined insecure (non-
HTTPS) web page in the web client is displayed, the browser may not display the webpage
because it is blocked automatically as "unsafe" by the browser or system settings. You
can deactivate these checks permanently or for the current session, depending on the
browser.

251 / 251

You might also like