Network Speed Dome & PTZ Camera User's Manual
Network Speed Dome & PTZ Camera User's Manual
Network Speed Dome & PTZ Camera User's Manual
User’s Manual
Web 3.0
V2.0.0
Foreword
General
The manual introduces the functions and operations of the web interface of the network speed
dome and PTZ camera (hereinafter referred to as "the Device").
Safety Instructions
The following categorized signal words with defined meaning might appear in the manual.
Signal Words Meaning
Revision History
Version Revision Content Release Time
Add some functions of the
V2.0.0 Baseline, and refine the whole January 2020
manual.
Update some functions of Security
V1.1.1 September 2019
Baseline.
I
All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for the latest program and supplementary documentation.
There still might be deviation in technical data, functions and operations description, or
errors in print. If there is any doubt or dispute, please refer to our final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and the company names in the manual are the
properties of their respective owners.
Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
If there is any uncertainty or controversy, please refer to our final explanation.
II
Important Safeguards and Warnings
The manual will help you to use the Device properly. Read the manual carefully before using
the Device, and keep it well for future reference.
Operation Requirements
Avoid heavy stress, violent vibration, and water splash during transportation, storage, and
installation. Complete package is necessary during the transportation. We assume no
responsibility for any damage or problem caused by the incomplete package during the
transportation.
To avoid damage, protect the Device from falling down and heavy vibration. Arrange more
than one person to move the Device when necessary.
Buckle the safety hook before installing the Device if it is included.
Keep the Device away from devices that generate electromagnetic field like televisions,
radio transmitters, electromagnetic devices, electric machine, transformers, and speakers;
otherwise image quality will be influenced.
Keep the Device away from smoke, vapor, heat, and dust.
Do not install the Device near heating furnace, spotlight, and other heat sources. If it is
installed on ceiling, in kitchen or near boiler room, the Device temperature might rise.
Do not dissemble the Device; otherwise it might cause dangers or device damage. Contact
your local retailer or customer service center for internal setup or maintenance
requirement.
Make sure that there is no metal, or inflammable, explosive substance in the Device;
otherwise it might cause fire, short-circuit, or other damage. Power off the Device and
disconnect the power cord immediately if there is water or liquid falling into the Device. And
contact your local retailer or customer service center. Avoid sea water or rain eroding the
Device.
Avoid aiming the lens at intense light source, including sunlight, and incandescent light;
otherwise the lens might be damaged.
Clean the enclosure with soft cloth. To remove the dirt, you can dip the soft cloth in proper
detergent, wring the soft cloth out, and then dry the enclosure with soft cloth. Do not use
gasoline, paint thinner, or other chemicals to clean the enclosure; otherwise it might result
in enclosure transfiguration or paint flake. Read all the manuals included before using
chemical cloth. Avoid long time touch between the plastic or rubber material and the
enclosure; otherwise it might result in device damage and paint flake.
It is recommended to use the Device with a lightning-proof device for better lightning-proof
effect.
III
Requirements for Installation and Maintenance Personnel
Have certificates or experiences related to installation and maintenance of the
closed-circuit television (CCTV), and have certificates related to working at height.
Have basic knowledge and installation skills of CCTV system.
Have basic knowledge and operation technique for low-voltage wiring and low-voltage
electronic circuit connection.
Have the ability to read and understand the manual.
All installation and operations shall conform to local electrical safety regulations.
The power source shall conform to the requirements of the Safety Extra Low Voltage
(SELV) standard, and supply power with rated voltage which conforms to Limited Power
Source requirement according to IEC60950-1. Note that the power supply requirement is
subject to the device label.
Use the power adapter recommended by the manufacturer.
For the Device that supports laser, do not aim the laser directly at eyes. And keep a proper
distance from the flammable to avoid fire.
Do not connect several devices to one power adapter; otherwise it might result in overheat
or fire if it exceeds the rated load.
Make sure that the power is off when you connect the cables, install or uninstall the Device.
Power off the Device and disconnect the power cord immediately if there is any smoke,
disgusting smell, or noise from the Device. And contact your local retailer or customer
service center.
Contact your local retailer or customer service center if the Device is abnormal. Do not
disassemble or repair the Device by yourself. We assume no responsibility for any
problems caused by unauthorized modifications, disassembly or repair, incorrect
installation or use, and overuse of certain components.
IV
Table of Contents
Foreword ..................................................................................................................................................I
Important Safeguards and Warnings ...................................................................................................III
1 Network Configuration ........................................................................................................................1
Network Connection ....................................................................................................................1
Logging in to the Web Interface...................................................................................................1
1.2.1 Device Initialization ...........................................................................................................1
1.2.2 First Time Login.................................................................................................................5
1.2.3 Device Login .....................................................................................................................6
1.2.4 Resetting Password ..........................................................................................................7
2 Live .......................................................................................................................................................9
Encoding Setting .........................................................................................................................9
Video Window Adjustment .........................................................................................................10
System Menu ............................................................................................................................15
Video Window Functions ...........................................................................................................15
PTZ Configuration .....................................................................................................................18
PTZ Status ................................................................................................................................22
3 AI Live .................................................................................................................................................24
AI Live Interface.........................................................................................................................24
3.1.2 Information Display Area of Detected Targets .................................................................24
3.1.3 Snapshot Display Area ....................................................................................................25
3.1.4 Statistics Area of the Detected Targets............................................................................25
AI Live Settings .........................................................................................................................26
4 Playback .............................................................................................................................................28
Video Playback..........................................................................................................................28
4.1.1 Video Play Function Bar ..................................................................................................29
4.1.2 Recording Type ...............................................................................................................29
4.1.3 Auxiliary Functions ..........................................................................................................29
4.1.4 Video Playback File Search and Display Area ................................................................30
4.1.5 Video Clipping Area .........................................................................................................33
4.1.6 Progress Bar Time Formats ............................................................................................33
Picture Playback........................................................................................................................34
4.2.1 Picture Playing Functions ................................................................................................34
4.2.2 Picture Playback File Search and Display Area ..............................................................35
4.2.3 Snapshot Types ..............................................................................................................36
5 Setting ................................................................................................................................................37
Camera .....................................................................................................................................37
5.1.1 Conditions Settings .........................................................................................................37
5.1.2 Video ...............................................................................................................................53
5.1.3 Audio ...............................................................................................................................62
Network Settings .......................................................................................................................64
5.2.1 TCP/IP.............................................................................................................................64
5.2.2 Port .................................................................................................................................66
5.2.3 PPPoE ............................................................................................................................68
V
5.2.4 DDNS ..............................................................................................................................69
5.2.5 SMTP (Email) ..................................................................................................................70
5.2.6 UPnP ...............................................................................................................................73
5.2.7 SNMP ..............................................................................................................................74
5.2.8 Bonjour ............................................................................................................................76
5.2.9 Multicast ..........................................................................................................................77
5.2.10 Auto Register.................................................................................................................78
5.2.11 Wi-Fi ..............................................................................................................................79
5.2.12 802.1x ...........................................................................................................................80
5.2.13 QoS ...............................................................................................................................81
5.2.14 4G .................................................................................................................................82
5.2.15 Access Platform ............................................................................................................85
PTZ Settings .............................................................................................................................88
5.3.1 Protocol ...........................................................................................................................88
5.3.2 Function ..........................................................................................................................89
Event Management .................................................................................................................100
5.4.1 Video Detection .............................................................................................................100
5.4.2 Smart Motion Detection .................................................................................................106
5.4.3 Audio Detection .............................................................................................................107
5.4.4 Smart Plan ....................................................................................................................109
5.4.5 IVS ................................................................................................................................ 110
5.4.6 Face Recognition .......................................................................................................... 116
5.4.7 People Counting............................................................................................................126
5.4.8 Heat Map.......................................................................................................................127
5.4.9 Video Metadata .............................................................................................................129
5.4.10 Alarm ...........................................................................................................................133
5.4.11 Abnormality ..................................................................................................................133
Storage ....................................................................................................................................138
5.5.1 Schedule .......................................................................................................................138
5.5.2 Snapshot by Location ....................................................................................................141
5.5.3 Destination ....................................................................................................................142
5.5.4 Record Control ..............................................................................................................145
System Management ..............................................................................................................146
5.6.1 Device Settings .............................................................................................................146
5.6.2 Account Settings ...........................................................................................................148
5.6.3 Safety ............................................................................................................................154
5.6.4 Peripheral ......................................................................................................................165
5.6.5 Default ...........................................................................................................................166
5.6.6 Import/Export.................................................................................................................166
5.6.7 Auto Maintain ................................................................................................................167
5.6.8 Upgrade ........................................................................................................................168
Information ..............................................................................................................................168
5.7.1 Version ..........................................................................................................................168
5.7.2 Log Information .............................................................................................................169
5.7.3 Online User ...................................................................................................................171
5.7.4 Life Statistics .................................................................................................................171
6 Alarm ................................................................................................................................................172
VI
7 Logout ..............................................................................................................................................174
Cybersecurity Recommendations ................................................................................175
VII
1 Network Configuration
Network Connection
To view the web interface on your PC, connect the Device to the PC first. There are mainly two
connection modes between the Device and PC. See Figure 1-1 and Figure 1-2.
Direct connection by using a network cable
The models presented in the figures are for reference only, and the actual product shall prevail.
All devices have the same IP address (192.168.1.108 by default) when they are delivered out of
factory. To make the device get access to network smoothly, plan available IP segment
reasonably according to practical network environment.
1
The Country/Region Setting interface is displayed. Set the Country/Region,
Language and Video Standard as needed. See Figure 1-3.
Country/region setting interface
Click Next.
The Device Initialization interface is displayed. For the interface, see Figure 1-5. For
the parameter description, see Table 1-1.
2
Device initialization
Email Address
Email address is enabled by default. You can disable the function as
needed.
Click Save.
The P2P interface is displayed. See Figure 1-6.
3
P2P interface
Scan the QR code on the interface, download the app, and then finish configurations
according to the instructions on your mobile device. After that, click Next.
The Online Upgrade interface is displayed. See Figure 1-7.
Online upgrade
4
Login interface
If you enter the wrong password for 5 times, the account will be locked for 5
minutes. After the locked time, you can log in to the web interface again.
You can set the number of allowed password attempts and locked time in
"5.4.11.3 Illegal Access."
Download and install the plug-in according to the on-screen instruction after logging in
to the web interface. See Figure 1-9.
Installing the plug-in
After the plug-in is installed, the web interface will be refreshed automatically, and the
video is displayed in Live interface. See Figure 1-10.
5
Live interface
The Live interface shown in the manual is for reference only, and the actual interface shall
prevail.
If you enter the wrong password for 5 times, the account will be locked for 5
minutes. After the locked time, you can log in to the web interface again.
You can set the number of allowed password attempts and locked time. For
details, see "5.4.11.3 Illegal Access."
6
1.2.4 Resetting Password
If you forget the password of the admin user, you can set the password through the provided
email address.
Before resetting the password, you need to provide the email address in advance. For details,
see "1.2.1 Device Initialization" or "5.6.3.2 System Service."
Open the browser, enter the IP address of the Device in the address bar, and then
press the Enter key.
The Login interface is displayed. See Figure 1-12.
Login
Click Forgot password?, and the Prompt interface is displayed. See Figure 1-13.
Prompt
Click OK to reset the password. The Reset the password (1/2) interface is displayed.
If you click OK, your email address, MAC address, device serial number, and other
information might be collected.
7
Resetting the password (1)
Scan the QR code on the actual interface according to the instructions, and then enter
the security code received in the mailbox.
Reset the password with the security code you received within 24 hours, otherwise the
code will be invalid.
Click Next.
The Reset the password (2/2) interface is displayed. See Figure 1-15.
Resetting the password (2)
The password should consist of 8 to 32 non-blank characters and contain at least two
types of characters among upper case, lower case, number, and special characters
(excluding ' " ; : &). Set a high security password according to the prompt of password
strength.
Click Save.
8
2 Live
Click the Live tab, and the Live interface is displayed. See Figure 2-1.
Live interface
For descriptions of function bars on the Live interface, see Table 2-1.
3 System menu
5 PTZ configuration
6 PTZ status
Encoding Setting
9
Table 2-2 Encoding setting parameter description
Parameter Description
It has large bit stream value and image with high resolution, but requires
Main Stream
large bandwidth. This option can be used for storage and monitoring.
It has small bit stream value and smooth image, and requires little
Sub Stream 1 bandwidth. This option is normally used to replace main stream when
bandwidth is not enough.
It has small bit stream value and smooth image, and requires little
Sub Stream 2 bandwidth. This option is normally used to replace main stream when
bandwidth is not enough.
Select a protocol for video monitoring. The supported protocols include
Protocol TCP (Transmission Control Protocol), UDP (User Datagram Protocol), and
Multicast.
Click this button, and smart rules are displayed on the Live
6 Rules Info
interface after the function is enabled. The function is
10
No. Parameter Description
enabled by default.
Image Adjustment
For Image Adjustment interface, see Figure 2-4. For parameter description, see Table 2-4.
Image Adjustment
11
Only brightness, contrast, hue, and saturation of live view image on the web interface can be
adjusted with this function. To adjust the brightness, contrast, hue, and saturation of the Device,
you can go to Setting > Camera > Conditions.
Panorama
For the Panorama interface, see Figure 2-5.
Panorama interface
You can perform positioning in this window by drawing a box with the left mouse button.
The located area is displayed on the Live interface and enlarged.
After you click Refresh, the Device rotates from 0 to 360 degrees horizontally and from 6
to 65 degrees vertically to obtain a new panoramic image.
You can adjust the size of the panoramic image by dragging the screen ratio bar
You can click to call a corresponding preset on the right side of the window. For
the interface, see Figure 2-6. For how to set a preset, see "5.3.2.1 Preset."
Preset
You can click to call a corresponding tour on the right side of the window. For the
interface, see Figure 2-7. For how to set a tour, see "5.3.2.2 Tour."
12
Tour
Face
For the Face interface, see Figure 2-8. Face recognition result is displayed on the left side, and
the captured face picture and attributes are displayed on the right side.
Face
Face recognition result display area: Displays the captured small face pictures, the
corresponding face pictures in the database, and the similarities between them. After you
click the picture, the attributes and details are displayed. See Figure 2-9.
13
Face recognition result display
Face and attributes display zone: Displays the captured small face pictures and
information such as gender, age, and expression. After you click the picture, the details are
displayed. See Figure 2-10.
Face and attributes display
Video Metadata
For the interface, see Figure 2-11. Motor vehicle information is displayed on the right side, and
the information about human and non-motor vehicles is at the bottom of the interface. For more
details, see "5.4.9 Video Metadata."
14
Video metadata
System Menu
To access an interface, click the corresponding tab on the system menu. For the system menu,
see Figure 2-12.
System menu
15
No. Parameter Description
left to right for one time.
Click this button, right-click on the Live interface, and the
function menu is displayed. See Figure 2-14. You can add
information on the Live interface, and also manage added
comments.
2 Mark Add Info: Select Add Info from the pop-up menu, and
enter the comment. For the interface, see Figure 2-15.
Managing comments: Select Info Management from
the pop-up menu to display, hide, or delete added
comments. For the interface, see Figure 2-16.
Click the button, draw a box with the mouse on the live view,
3 Regional Focus and then the Device will automatically focus on the area in
the box.
Click the button, and an alarm will be triggered. When an
4 Relay-out alarm is triggered, the icon turns red; and when an alarm is
canceled, the icon turns grey.
Click the button, and you can drag the live view by pressing
5 Gesture Control and holding the left mouse button to control PTZ; and you
can also zoom in or out through the mouse wheel.
Click the button, and then select an area in the live view
to zoom in; right-click on the image to restore to the
original status. In enlarged status, drag the image to
6 Digital Zoom
check other area.
Click the button, and then scroll the mouse wheel in the
live view to zoom in or out.
Click the button to capture one picture of the current image,
7 Snapshot and it will be saved to the live snapshot storage path set in
"5.1.2.5 Path."
Click the button, and three pictures of the current image are
captured with one snapshot per second. These snapshots
8 Triple Snapshot
will be saved to the live snapshot storage path set in "5.1.2.5
Path."
Click the button to record videos. The recording will be
9 Record saved to the live recording storage path set in "5.1.2.5
Path."
Click the button and select any area by dragging the left
10 Manual Track mouse button in the video window; the Device tracks objects
in this area intelligently.
Click the button to enable or disable audio output of the
monitoring stream.
11 Audio
Before using the function, you need to enable the audio of
the corresponding stream in Setting > Camera > Audio
first.
12 Talk Click the button to enable or disable the two-way audio.
16
Mark—menu
Mark—adding comments
17
Mark—managing comments
PTZ Configuration
You can control PTZ by using the PTZ Control panel or joystick. You can also set preset,
scanning, and other functions in the PTZ Function area.
PTZ Control
Before using the PTZ Control panel, you need to set the PTZ protocol by selecting Setting >
PTZ > Protocol.
For PTZ Control panel, See Figure 2-17. For parameter description, see Table 2-6.
18
PTZ control
Joystick
You can drag the middle button to simulate joystick operations to control device rotation. For
the operation interface, see Figure 2-18. Speed, zoom, focus, and iris configurations are the
same as that of PTZ Control panel.
19
Joystick
PTZ Functions
using the function, and then click to stop using the function. For the configuration
interface, see Figure 2-19. For the supported functions and settings, see Table 2-7.
PTZ function
Select Preset from the list, enter a preset number, and then click Go to. The
Preset
PTZ will rotate to the preset position.
Select Tour from the list, enter a tour number, and then click Start. The PTZ
Tour
starts to tour.
20
Parameter Description
Select Pattern from the list, enter a pattern number, and then click Start. The
Pattern
PTZ starts to pattern.
Select Go to from the list, enter horizontal angle value, vertical angle
value and zoom, and then click Go to. The Device will turn to the position
Go to you want.
One unit of the horizontal angle value or vertical angle value you enter
equals 0.1 degree.
Menu
For the menu interface, see Figure 2-20. For the parameter description, see Table 2-8.
Menu interface
OK Confirmation button.
Click Open to open the OSD menu. The OSD menu is displayed on the live view. See Figure
2-21.
21
OSD menu
You can change the location of the OSD menu in "5.1.2.3 Overlay."
PTZ Status
On the Live interface, the PTZ status is displayed at the lower right corner. See Figure 2-22.
When the PTZ lifespan is close to the threshold, the warning will be displayed on the Live
interface. See Figure 2-23 and Figure 2-24.
Warning (1)
22
Warning (2)
23
3 AI Live
You can check the information of the detected human faces, human bodies, motor vehicles,
and non-motor vehicles.
AI Live Interface
For the AI Live interface, see Figure 3-1. For the layout description, see Table 3-1.
AI live interface
24
Information display of the detected targets
25
Statistics area of the detected targets
AI Live Settings
Preparation
Select Setting > Event > Smart Plan, and then enable Face Detection, Face Recognition or
Video Metadata. For the method to enable the function, see "5.4.4 Smart Plan.". For the
operations, see "5.4.6 Face Recognition" or "5.4.9 Video Metadata."
Procedure
Click the AI Live tab. The AI Live interface is displayed. See Figure 3-5. The
information display area of detected targets is on the right side; the snapshot display
26
area is on the bottom; the statistics area of the detected targets is on the lower right
corner.
AI live interface
Click to set the detection items of the targets. See Figure 3-6.
Detection items selection interface
27
4 Playback
You can watch the saved pictures and videos on the Playback interface.
Before using the function, you need to set the period, storage method, and record control of
recording and snapshot first. For details, see "5.5 Storage."
Click the Playback tab, and the Playback interface is displayed. See Figure 4-1.
Playback interface
Video Playback
Select dav from the File Type list, and the video playback interface is displayed. See Figure 4-2.
For parameter description, see Table 4-1.
Video playback
28
No. Description
3 Recording types
4 Auxiliary functions
5 Video playback file search and display area
6 Video clipping area
7 Progress bar time formats
3 Next Frame
You need to pause the playback before playing the next
frame.
4 Slow Slow down video playing.
5 Fast Speed up video playing.
6 Sound Mute or unmute the sound.
7 Volume Adjust the volume.
Click this button, and smart rules will be displayed on the
8 Rules Info
video playback interface if the smart rules are enabled.
29
Auxiliary functions
30
Table 4-4 Playback file parameter description (1)
Parameter Description
To play back a recording, select dav.
File Type
To play back a picture, select jpg.
Data Src The SD Card is used by default.
Click this button, and recordings or pictures of a certain type on specific
dates can be downloaded in batch.
Download in Batches
Click .
The Batch Download interface is displayed. See Figure 4-7.
Batch download
Configure parameters as needed. For the parameter description, see Table 4-5.
31
You can select multiple files to download them.
Click , and videos recorded on the selected day will be displayed in a list.
For the playback file list, see Figure 4-9. For the parameter description, see Table 4-6.
To play back a file in the list, double-click the file.
Playback file (2)
32
Table 4-6 Playback file parameter description (2)
Parameter Description
Search all the recorded files from the start time to the end time on the
selected date.
Download
There are two options: dav and mp4.
Format
Click the download button, and the files will be saved to the storage path
set in "5.1.2.5 Path."
Click the time axis to select the start time for video clipping. The time must be within the
progress bar range.
Click , and the clipped video will be saved in the path set in "5.1.2.5 Path."
33
Table 4-7 Progress bar time format description
Parameter Description
Click the button, and then the progress bar displays the recordings in
24-hour mode.
Click the button, and then the video within the 2-hour period in which this
video was recorded is displayed.
Click the button, and then the video within the 1-hour period in which this
video was recorded is displayed.
Click the button, and then the video within the 30-minute period in which
this video was recorded is displayed.
Picture Playback
Select jpg from the File Type list. For the picture playback interface, see Figure 4-12. For the
parameter description, see Table 4-8.
Picture playback
The status button is displayed as by default, indicating the picture play is paused or no
picture is being played.
34
To pause the picture play, click .
35
Playback file (2)
36
5 Setting
Camera
5.1.1.1 Conditions
Picture
Set camera attributes and picture parameters to achieve the best display effect.
Select Setting > Camera > Conditions > Conditions > Picture.
The Picture interface is displayed. See Figure 5-1.
Picture interface
37
Table 5-1 Picture setting parameter description
Parameter Description
There are three options: General, Day, and Night. You can view the
Profile
configurations and the effect of the selected mode. Day is selected by default.
Set the image display style. There are three options: Soft, Standard, and
Style
Vivid. Standard is selected by default.
Set the overall image brightness. The larger the value is, the brighter the image
Brightness
will be. The value ranges from 0 to 100.
Set the image contrast. The larger the value is, the greater the contrast will be.
Contrast
The value ranges from 0 to 100.
Set the intensity of colors. The larger the value is, the brighter the colors will
Saturation
be. The value ranges from 0 to 100.
The larger the value, the higher suppression on image colors. The value
ranges from 0 to 100.
Chroma
CNT
This parameter takes effect only when the Device is in the environment with
low luminance.
Set the sharpness of picture edges. The larger the value is, the more obvious
the edge will be. The value ranges from 0 to 100.
Sharpness
If the value is too large, there might be image noise. Set the value according to
the actual condition.
The larger the value is , the stronger the sharpness CNT will be. The value
ranges from 0 to 100.
Sharpness
CNT
This parameter takes effect only when the Device is in the environment with
low luminance.
Change image brightness through non-linear tuning to expand the dynamic
Gamma display range of images. The larger the value is, the brighter the image will be.
The value ranges from 0 to 100.
Monitoring videos can be flipped over. There are two options.
Flip 0°: The monitoring video is normally displayed. It is 0° by default.
180°: The monitoring video is flipped over.
Electronic image stabilization (EIS) is used to effectively solve the problem of
image shaking during use, thus presenting clearer images. It is Off by default.
38
Exposure
You can control the amount of light per unit area reaching the electronic image sensor by
adjusting parameters on the Exposure interface.
Select Setting > Camera > Conditions > Conditions > Exposure.
The Exposure interface is displayed. See Figure 5-2 to Figure 5-6.
Exposure—auto mode
39
Exposure—shutter priority mode
40
Exposure—manual mode
41
Parameter Description
Gain You can set the exposure gain. The value ranges from 0 to 100.
You can adjust the exposure time of the Device. The larger the shutter
Shutter
value, the brighter the image.
You can set the Device luminous flux. The larger the iris value, the brighter
Iris
the image.
Exposure You can set the exposure compensation value. The value ranges from 0 to
Comp 100.
Automatic exposure is an automated digital camera system that adjusts the
aperture and shutter speed, based on the external lighting conditions for
AE Recovery images and videos. If you have selected an AE Recovery time, the
exposure mode will be restored to the previous mode after you adjusted the
Iris value. There are five options: Off, 5Min, 15Min, 1Hour, and 2Hour.
2D noise reduction is the process of removing noise from a signal. The
2D NR higher the grade is, the less the noise will be, and images appear to be
blurrier.
3D noise reduction is the process of removing noise from a signal. The
3D NR higher the grade is, the less the noise will be, and images appear to be
blurrier.
Noise reduction grade. The value ranges from 0 to 100. The larger the
Grade
value is, the less the noise will be.
Realize noise suppression effect through 3D and 2D video filtering method.
Advanced NR
The function is available on select models.
Click Save.
Backlight
The backlight function cannot be configured if defog function is enabled. There will be a prompt
on the interface.
You can use this function to adjust the backlight compensation mode of the monitoring screen.
Select Setting > Camera > Conditions > Conditions > Backlight.
The Backlight interface is displayed. See Figure 5-7.
42
Backlight settings
If you select Off, other backlight mode configurations will not be effective.
WB
In this mode, you can make a white object displaying itself clearly on the video image in all
environments.
Select Setting > Camera > Conditions > Conditions > WB.
The WB interface is displayed. See Figure 5-8.
43
WB settings
Defog function cannot be configured if Day & Night function is enabled. There will be a prompt
on the interface.
This function allows you to switch between the color mode and the black & white mode,
ensuring clear monitoring screen in a dim environment.
Select Setting > Camera > Conditions > Conditions > Day & Night.
The Day & Night interface is displayed. See Figure 5-9.
44
Day & night settings
You can set sensitivity only when Day & Night mode is set to Auto.
Adjust the delay time to switch between different modes. The value ranges
from 2 s to 10 s.
Delay
You can set Delay only when Day & Night mode is set to Auto.
Click Save.
45
Select Setting > Camera > Conditions > Conditions > Focus & Zoom.
The Focus & Zoom interface is displayed. See Figure 5-10.
Focus & zoom settings
46
Parameter Description
Lens Click this button, and the lens will be initialized automatically. The lens will
Initialization be extended to calibrate the zoom and focus.
Click Save.
IR Light
Common illuminators are classified into infrared IR lights, white lights, and laser lights. Different
device models support different types of illuminators, and have different configuration interfaces.
The actual interface shall prevail. This section describes how to configure these light types.
Some models are equipped with photoresistor that can turn on different types of
illuminators based on the ambient brightness.
Perform the following steps to set illuminators.
Select Setting > Camera > Conditions > Conditions > IR Light.
The IR Light interface is displayed. See Figure 5-11.
IR light settings—ZoomPrio
47
IR light settings—SmartIR
IR light settings—manual
48
IR light setting—timing
IR light setting—off
Configure each parameter as needed. For the parameter description, see Table 5-5.
49
Parameter Description
conditions.
Manual: Set IR light brightness manually.
Timing: Enable different light types in different time periods according
to actual condition.
Off: Turn off the IR light.
Laser Light
Laser light makes compensation for the ambient environment when it is used for long-distance
monitoring.
Select Setting > Camera > Conditions > Conditions > IR Light.
The IR Light interface is displayed. See Figure 5-16.
Laser light settings
50
Table 5-6 Laser light setting parameter description
Parameter Description
Select the laser light mode from ZoomPrio and Manual. It is ZoomPrio by
default.
Mode ZoomPrio: The Device can automatically adjust laser light brightness
according to the zoom times.
Manual: Manually set laser light brightness and angle value.
Laser
Set the intensity of the laser light. The value ranges from 0 to 100.
Intensity
Laser Angle Set the angle value from 0 to 100.
Click Save.
Defog
The defog function cannot be configured if backlight function is enabled. There will be a prompt
on the interface.
Image quality drops if the Device is installed in foggy or hazy environment. You can enable
defog to improve image quality.
Select Setting > Camera > Conditions > Conditions > Defog.
The Defog interface is displayed. See Figure 5-17 and Figure 5-18.
Defog settings—manual
51
Defog settings—auto
Mode
For the Device that supports optical defog, in Auto mode, optical defog
and electronic defog switch automatically according to the algorithm.
And in Off mode, electronic defog is enabled by default.
Set the defog intensity of the Device. You can select from Low, Medium,
Intensity
or High.
Only the Device that supports optical defog has this parameter.
Defog
In Manual mode, if you enable this function, both optical defog and
Enhancement
electronic defog are enabled. (You need to enable Auto mode for Day &
Night to use the function.)
Click Save.
52
Profile management—general
If you select Full Time, Day and Night are selectable, and the corresponding
camera property profile is day or night. See Figure 5-20.
Profile management—full time
If you select Schedule, you can select one period for day configuration and another
period for night configuration. For the configuration interface, see Figure 5-21. For
example, you can set the day-time configuration from 6:00 to 18:00, and set the
night-time configuration from 18:00 to 6:00 on the next day.
Profile management—schedule
Click Save.
5.1.2 Video
You can set the video stream, snapshot stream, video overlay, ROI, and storage path of the
Device.
This section describes how to set the video stream for the monitoring screen.
Select Setting > Camera > Video > Video.
The Video interface is displayed. See Figure 5-22.
53
Video stream settings
The stream configuration interfaces might vary depending on devices, and the
actual interface shall prevail.
The default bit rate of different devices might vary, and the actual product shall
prevail.
Configure parameters as needed. For parameter description, see Table 5-8.
54
Parameter Description
Watermark
You can verify the watermark to check if the video has been tampered.
Settings
You can verify the watermark to check if the video has been tampered. Select
Watermark Settings check box to enable Watermark Character. The
Watermark watermark character is DigitalCCTV by default, and you can modify it.
Character
Watermark character consists of up to 128 characters from letters, standard
symbols, spaces, and special characters.
Click Save.
5.1.2.2 Snapshot
55
5.1.2.3 Overlay
This section describes how to set the overlay information on the monitoring screen.
Select Setting > Camera > Video > Overlay.
The Overlay interface is displayed.
Configure overlay information as needed. For the configuration interfaces, see the
following figures. For the parameter description, see Table 5-10.
Overlay settings—privacy masking
56
Overlay settings—time title
57
Overlay settings—font attribute
58
Overlay settings—abnormal
59
Overlay settings—custom overlay
channel title.
Set whether to display time on the monitoring screen, and you can select
Time Title whether to display the week. You can adjust the time title location by
dragging the box.
Set whether to display the preset, temperature, PTZ coordinate, zoom, north
direction, RS485, and other information on the monitoring screen. You can
OSD info
adjust the OSD info location by dragging the box. There are two options for
Text Align: Left and Right.
Set the font of the channel title, time title, and OSD info, and you can also set
Font Attribute
the color and size of the font.
Set whether to display the overlaid picture on the monitoring screen. Click
Upload Picture to overlay local pictures on the monitoring screen. You can
Picture Overlay adjust the location of an overlaid picture by dragging the yellow box.
60
Parameter Description
Add custom OSD information on the monitoring screen. Click to add one
Custom Overlay
line of custom OSD information. You can also select the Text Align of the
channel title.
Click Save.
5.1.2.4 ROI
61
5.1.2.5 Path
The storage path is associated with the snapshot and recording on the Live interface. You can
set the path of Live Snapshot and Live Record respectively.
The storage path is associated with the snapshot, downloaded and clipped files on the
Playback interface. You can set the path of Playback Snapshot, Playback Download, and
Video Clips respectively.
Select Setting > Camera > Video > Path.
The Path interface is displayed. See Figure 5-34.
Path settings
5.1.3 Audio
5.1.3.1 Audio
62
Audio settings
63
Parameter Description
Adjust the noise reduction level from 0 to 100.
NR (Noise
Reduction) Level
This parameter takes effect when noise filter is enabled.
Microphone
Adjust the microphone volume from 0 to 100.
Volume
Speaker Volume Adjust the speaker volume from 0 to 100.
Click Save.
Network Settings
5.2.1 TCP/IP
Configure the IP address and DNS server of the Device to connect it to other devices in the
network.
Before configuring network parameters, make sure that the Device is connected to the network
properly.
If there is no router in the network, assign an IP address in the same network segment.
If there is a router in the network, set the corresponding gateway and subnet mask.
Select Setting > Network > TCP/IP.
The TCP/IP interface is displayed. See Figure 5-36.
TCP/IP settings
64
Set TCP/IP parameters. For details, see Table 5-12.
Ethernet Card If the Device is configured with multiple Ethernet cards, the default
Ethernet card can be changed. If you reset the default Ethernet card,
restart the Device.
Static and DHCP modes are available.
If DHCP is selected, the IP address is obtained automatically. In this
Mode case, the IP address, subnet mask, and gateway cannot be set.
If Static is selected, you need to set the IP address, subnet mask, and
gateway manually.
MAC Address Display the MAC address of the Device.
You can select IPv4 or IPv6. Both versions are supported and can be
IP Version
accessed.
IP Address Enter correct digits to change the IP address.
Set the subnet mask according to actual conditions. The subnet prefix is a
number in the range of 1 to 255. The subnet prefix identifies a specific
network link, and usually contains a hierarchical structure.
Subnet Mask
The Device checks the validity of all IPv6 addresses. The IP address and
the default gateway must be in the same network segment. Make sure that
a certain part of the subnet prefix in the IP address and default gateway
are the same.
Configure as needed. The default gateway
Default
must be in the same network segment as the IP For IPv6 version, in the
Gateway
address. IP Address, Default
Preferred DNS IP address of the DNS server. Gateway, Preferred
DNS, and Alternate
DNS fields, enter 128
Alternate DNS Alternate IP address of the DNS server.
bits, and these fields
cannot be blank.
Select the check box, and then you can modify and set the device IP
address through ARP/Ping command if the MAC address is known.
Enable The function is enabled by default. During reboot, you will have no more
ARP/Ping to set than 2 minutes to configure the Device IP address by a ping packet with
IP address certain length. The server will be turned off in 2 minutes, or it will be turned
service off immediately after the IP address is successfully configured. If the
function is not enabled, the IP address cannot be configured with ping
packet.
Click Save.
65
An Example of Configuring IP Address with ARP/Ping
To obtain a usable IP address, make sure that the Device and your PC are in the same
LAN.
Get the MAC address from the Device label.
Open command editor on the PC and enter the following command. See Table 5-13.
5.2.2 Port
Configure the maximum port numbers and values on this interface.
Select Setting > Network > Port.
The Port interface is displayed. See Figure 5-37.
66
Port interface
Configure each port value of the Device. For details, see Table 5-14.
Except Max Connection, modifications of other parameters will take effect after
restart.
0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, and 42323
are occupied for specific uses.
It is not recommended to use the default values of other ports during port
configuration.
67
Parameter Description
Real Time Streaming Protocol port. Keep the default value 554 if it is
displayed. If you play live view through Apple’s QuickTime or VLC, the
following format is available. This function is also supported by Blackberry
mobile phone.
When the URL format requiring RTSP, you need to specify channel number
and bit stream type in the URL, and also username and password if needed.
When playing live view with Blackberry mobile phone, you need to disable the
audio, and then set the stream encoding mode to H.264B and resolution to
CIF.
URL format example:
rtsp://username:password@ip:port/cam/realmonitor?channel=1&subtype=0
Username: Your username. For example, admin.
Password: Your password. For example, admin.
RTSP Port
IP: Your device IP. For example, 192.168.1.122.
Port: Leave it if the value is 554 by default.
Channel: Channel number starting from 1. For example, if it is channel 2,
then enter channel=2.
Subtype: stream type. The main stream is 0 (subtype=0); the sub stream
is 1 (subtype=1).
For example, if you require the sub stream of channel 2 from a certain device,
then the URL shall be:
rtsp://admin:admin@192.168.1.123:554/cam/realmonitor?channel=2&subtyp
e=1
If certification is not required, you do not need to specify the username and
password. Use the following format:
rtsp://ip:port/cam/realmonitor?channel=1&subtype=0
A network protocol for real-time data communication. The value is 1935 by
default. You can enter the value as needed.
RTSP Port
Enable RTMP to push audio and video data to the third-party server. Make
sure that the address is trusted; otherwise it might cause data leakage.
HTTPS communication port. The value is 443 by default. You can set this
HTTPS Port
parameter as needed.
Click Save.
5.2.3 PPPoE
You can enable PPPoE (Point-to-Point Protocol over Ethernet) to establish network connection.
In this case, the Device obtains a dynamic IP address. To use this function, you need to obtain
the PPPoE username and password from the Internet Service Provider (ISP).
Select Setting > Network > PPPoE.
The PPPoE interface is displayed. See Figure 5-38.
68
PPPoE interface (1)
5.2.4 DDNS
Properly configure DDNS, and then the domain name on the DNS server matches your IP
address and refresh the matching relation in real time. You can always access your device with
the same domain name no matter how much your device IP address changes. Before making
any changes, check whether your device supports the DNS server.
The third party servers might collect your device information if DDNS is enabled.
Register and log in to the DDNS website, and then you can view the information of all the
connected cameras in your account.
Select Setting > Network > DDNS.
The DDNS interface is displayed. See Figure 5-40.
69
DDNS
Select Type, and then configure the parameters as needed. For details, see Table
5-15.
After this function is enabled, the device data will be sent to the given server. There is data
leakage risk. Think twice before enabling the function.
Configure SMTP (Email). When alarms, video detection and abnormal events are triggered, an
email will be sent to the recipient server through SMTP server. The recipient can log in to the
incoming mail server to receive emails.
Select Setting > Network > SMTP (Email).
The SMTP (Email) interface is displayed. See Figure 5-41.
70
SMTP (Email)
71
Parameter Description
Select authentication type from None, SSL and TLS. TLS is selected by
default.
Authentication
For the detailed configuration, see Table 5-17.
There might be risks if you select the authentication type other than TLS.
TLS is recommended.
You can enter no more than 63 characters in Chinese, English, and Arabic
Title
numerals.
Mail Receiver Email address of the receiver. Support 3 addresses at most.
Attachment Select the check box to support attachment in the email.
The system sends test mail to check if the connection is successfully
Health Mail configured. Select the Health Mail check box and configure the Update
Period, and then the system sends test mails according to the defined period.
Test whether the email function is normal. If the configuration is correct, the
Test email address of the receiver will receive the test email. Save the email
configuration before running rest.
For common email configurations, see Table 5-17.
— 25
Authentication code is the code
you receive when enabling SMTP
service.
SSL 465 You need to enable SMTP service
Sina smtp.sina.com
— 25 in your mailbox.
You need to enable SMTP service
126 smtp.126.com — 25
in your mailbox.
Click Save.
72
5.2.6 UPnP
After UPnP is enabled, Intranet service and port of the Device will be mapped to Extranet. Think
twice before enabling it.
UPnP (Universal Plug and Play) allows you to establish the mapping relationship between
Intranet and Extranet. Extranet users can access Intranet device by visiting Extranet IP address.
Intranet port is device port and Extranet port is router port. Users can access the Device by
accessing Extranet port. When you are not using routers for UPnP, disable UPnP to avoid
affecting other functions.
Once UPnP is enabled, the Device supports UPnP protocol. In Windows XP or Windows Vista,
after UPnP is enabled, the Device can be automatically searched by Windows network.
Perform the following steps to add UPnP network service in the Windows system.
Open Control Panel, and select Add or Remove Programs.
Click Add/Remove Windows Components.
Select Network Service from the Windows Components Wizard and click Details
button.
Select Internet Gateway Device Discovery and Control Client, and UPnP User
Interface, and then click OK to start installation.
Perform the following steps to configure UPnP:
Select Setting > Network > UPnP.
The UPnP interface is displayed. See Figure 5-42.
UPnP
Select Enable.
Select a mode from the drop-down list.
There are 2 mapping modes: Custom and Default. In Custom mode, users can modify
the external port. Select Default, and then the system finishes mapping with
unoccupied port automatically. In this case, you do not need to modify mapping
relation.
Select Start Device Discover as needed.
Click Save.
73
5.2.7 SNMP
SNMP (Simple Network Management Protocol) is a basic network management framework.
You need to install certain software to the Device to obtain the configuration information of the
Device.
The following requirements must be satisfied if you want to use SNMP function:
Install SNMP monitoring and managing tools, such as MIB Builder and MG-SOFT MIB
Browser.
Obtain two MIB files corresponding to the current version from the technical personnel.
Select Setting > Network > SNMP.
The SNMP interface is displayed. See Figure 5-43 and Figure 5-44.
SNMP (1)
74
SNMP (2)
75
Parameter Description
The read and write community strings that the software agent
Read supports.
Community/Write
Community The name can only consist of number, letter, underline (_), and
strikethrough (-).
The target address of the trap information sent by the software
Trap Address
agent in the Device.
The target port of the trap information sent by the software agent in
Trap Port
the Device.
Select the Keep Alive check box, and the system can send data
Keep Alive
package to ensure network connection without interruption.
The name is public by default.
Read-only Username
The username can only consist of number, letter, and underline.
The name is private by default.
Read&write
Username
The username can only consist of number, letter, and underline.
Authentication Type You can select from MD5 and SHA, and it is MD5 by default.
Authentication
It shall be no less than 8 digits.
Password
Encryption Type It is CBC-DES by default.
Encryption Password It shall be no less than 8 digits.
Click Save.
View device information.
1) Run MIB Builder and MG-SOFT MIB Browser.
2) Compile the two MIB files with MIB Builder.
3) Load the generated modules with MG-SOFT MIB Browser.
4) Enter the IP address of the Device you need to manage in the MG-SOFT MIB
Browser, and then select version to search.
5) Expand all the tree lists displayed in the MG-SOFT MIB Browser, and then you can
view the configuration information, video channel amount, audio channel amount,
and software version.
Use PC with Windows operating system (OS) and disable SNMP Trap service. The
MG-SOFT MIB Browser will display prompt when an alarm is triggered.
5.2.8 Bonjour
Bonjour is also called zero-configuration networking, which can automatically discover
computers, devices and services on IP networks. Bonjour is a protocol of industry standard
which allows devices to search and find each other. IP address or DNS server is not required
during the process.
76
Enable this function, and the network camera will be automatically detected by the OS and
client with Bonjour function. When the network camera is automatically detected by Bonjour,
server name you have set will be displayed.
Select Setting > Network > Bonjour.
The Bonjour interface is displayed. See Figure 5-45.
Bonjour interface
5.2.9 Multicast
Access the Device by network to see live view. If the access times exceed its upper limit,
preview might fail. You can set multicast IP to access by multicast protocol to solve the problem.
The Device supports two multicast protocols: RTP and TS. RTP is enabled by default when
main stream and sub stream are used. TS is disabled by default.
5.2.9.1 RTP
77
Click Save.
5.2.9.2 TS
78
Table 5-19 Auto register parameter description
Parameter Description
IP Address The IP address of server that needs to be registered to.
Port The port for auto-registration.
Sub-Device ID Sub device ID assigned by server.
Click Save.
5.2.11 Wi-Fi
Devices with Wi-Fi function can access network through Wi-Fi.
5.2.11.1.1 Wi-Fi
The name, status and IP information of current hotspot are displayed in the Wi-Fi information
bar. Click Refresh after reconnection to make sure that the operating status is displayed in real
time. Connecting Wi-Fi hotspot takes some time depending on network signal strength. For
Wi-Fi configuration interface, see Figure 5-49.
Wi-Fi interface
To manually add Wi-Fi, click Add SSID, and the Add WiFi interface is displayed. See
Figure 5-51.
Enter a network name in the dialog box.
79
It is recommended to set a secure encryption method for the Device to connect routers.
Adding Wi-Fi
Double-click one hotspot to display the Signal Quality and the Authentication
Manner.
If the password is required, enter it. When entering the password, its index number
shall be consistent with that on the router.
Click Connection if password is not required.
5.2.11.1.2 WPS
PIN and SSID can be obtained from the router. Enter PIN and SSID, and then click Refresh to
display operating status in real time.
5.2.12 802.1x
802.1x is a port-based network access control protocol. It allows users to manually select
authentication mode to control device access to LAN, and meet authentication, billing, safety
and management requirements of the network.
Select Setting > Network > 802.1x.
The 802.1x interface is displayed, see Figure 5-53.
80
802.1x interface
5.2.13 QoS
QoS (Quality of Service) is a network security mechanism, and is also a technology to solve
network delay, congestion, and other problems. For network business, QoS includes
transmission bandwidth, time delay in transmission, and packet loss of data. In network, QoS
can be improved by ensuring transmission bandwidth, and reducing time delay in transmission,
packet loss rate, and delay jitter.
For DSCP (Differentiated Services Code Point), there are 64 priority degrees (0–63) of data
packets. 0 represents the lowest priority, and 63 the highest priority. Based on the priority, the
packets are classified into different groups. Each group occupies different bandwidth and has
different discard percentage when there is congestion so as to improve service quality.
Select Setting > Network > QoS.
The QoS interface is displayed. See Figure 5-54.
QoS interface
81
Configure Realtime Monitor and Command. For parameter description, see Table
5-21.
5.2.14 4G
Log in to web interface, select Setting > Network > 4G > Dialing Setting and the Dialing
Setting interface is displayed. See Figure 5-55.
Dialing setting interface
Some devices only support certain mobile carriers, and only the supported carriers are
displayed in Network Support.
Select the Enable check box.
Enter APN, Authorize Mode, Dial-up Number, Username, and Password according
to the SIM card inserted.
82
These parameters might vary by countries. Contact local carrier or customer service for
details.
Set the period to use 4G. See Figure 5-56.
If the current time is in the period you set, 4G network connection will be enabled.
The IP address of the SIM card will be displayed in IP Address. And you can
access the device through 4G after finishing the rest steps.
If the current time is not in the period you set, 4G network connection will not be
enabled. Only the corresponding Wireless Signal is displayed on the interface.
And you cannot access the device through 4G.
Period setting
Set the interval to enable 4G through message or phone call if you want to use 4G
outside the period set in Step 3.
Log in to web interface, select Setting > Network > 4G > Mobile Settings, and the Mobile
Setting interface is displayed. See Figure 5-55.
83
You can add the phone number to receive alarms. You also can add phone number used to
activate 4G through message or phone call if you want to use 4G outside the period set in Step
3 of "5.2.14.1 Dialing Setting." See Figure 5-57.
Mobile setting interface
Message Send: When alarms are triggered, the phone number added will receive
message.
Message Activation: You can enable 4G through message outside the period you set to
use 4G. You need to send "ON" or "OFF" to phone number of the SIM card in the Device.
"ON" indicates and "OFF" indicates disabling.
Phone Activation: You can enable 4G through phone calls outside the period you set to
use 4G. You need to call the phone number of the SIM card in the Device. If the call gets
through, it means 4G has been enabled.
Make sure that your SIM card supports making phone calls and sending messages, and it
can be used normally.
Make sure that you use activation function outside the time range you set; otherwise it
does not work.
Select the check box of the service you need to enable. You can select one or more
services.
84
Message link
Click Save on the interface of the corresponding event. And you will receive message if
the alarm is triggered.
5.2.15.1 P2P
P2P is a private network traversal technology which enables users to manage devices easily
without requiring DDNS, port mapping or transit server. Scan the QR code with your smart
phone, and then you can add and manage more devices on your mobile client.
Select Setting > Network > Access Platform > P2P.
The P2P interface is displayed.
85
P2P interface
5.2.15.2 ONVIF
The ONVIF authentication is On by default, which allows the network video products (including
video recording device and other recording devices) from other manufacturers to connect to the
Service.
86
Select On for Authentication.
Click Save.
5.2.15.3 RTMP
You can connect the third party platforms (such as YouTube) to play live video through RTMP
protocol.
When enabling RTMP, make sure that the address can be trusted.
Set parameters. For details, see Table 4-20.
87
Parameter Description
Custom If you have selected Custom, the address allocated by the server needs
Address to be filled in.
Click Save.
PTZ Settings
5.3.1 Protocol
Network PTZ setting and analog PTZ setting are available on select models.
Select a protocol as needed. You can select DH-SD1, DH-SD3, PELCOD, or PELCOP.
DH-SD1 is selected by default.
88
Analog PTZ setting
Address
Make sure that the address is the same as the device address; otherwise
you cannot control the device.
Baud Rate Select the baud rate of the Device.
Data Bit It is 8 by default.
Stop Bit It is 1 by default.
Parity It is NONE by default.
Click Save.
5.3.2 Function
5.3.2.1 Preset
Select Setting > PTZ > Function > Preset. The Preset interface is displayed. See Figure 5-64.
If you click Remove All, all presets and special presets will be cleared.
89
Preset settings
Preset
Preset means a certain position of the Device. Users can adjust the PTZ and camera to the
location quickly through calling presets.
At the lower left corner of the Preset interface, click the direction buttons,
90
Special Preset
Special presets serve as the shortcut for some special functions switch or calling, and they no
longer represent the location of the PTZ camera.
Click to add a special preset. The added special preset will be displayed in the list.
See Figure 4-60.
The number of special presets starts from 51 by default, and 100 is the largest number.
Special presets
Click to quickly call the function configured for the special preset.
If the PTZ is restored to default settings, all preset configurations will be cleared, but
the called function will remain.
5.3.2.2 Tour
Tour means a series of movements that the Device makes along several presets.
91
Tour settings
Select the Tour Mode from Original Path and Shortest Path. Original Path is
selected by default.
Original Path: Tour in the order of adding presets.
Shortest Path: Starting from the preset with largest horizontal zoom value and
vertical zoom value, pass all presets in the tour to ensure the shortest path. The
Device reaches the corresponding preset and ensure the minimum number of
rotation.
Click Add at the bottom of the list at the upper right corner of the interface to add a tour
path.
Click Add at the bottom of the list at the lower right corner of the interface to add
several presets.
Perform tour operations.
Double-click tour name to edit the name of the corresponding tour.
Double-click duration to set the time that the Device stays at the corresponding
preset.
Double-click speed to modify the tour speed. The default value is 7, and the value
range is 1–10. The larger the value, the faster the speed.
Click Start to start the tour.
5.3.2.3 Scan
Scan means the Device moves horizontally at a certain speed between the defined left and
right limits.
Select Setting > PTZ > Function > Scan.
92
The Scan interface is displayed. See Figure 5-68.
Scan settings
5.3.2.4 Pattern
Pattern means a record of a series of operations that users make to the Device. The operations
include horizontal and vertical movements, zoom and preset calling. Record and save the
operations, and then you can call the pattern path directly.
Select Setting > PTZ > Function > Pattern.
The Pattern interface is displayed. See Figure 5-69.
93
Pattern settings
5.3.2.5 Pan
Pan refers to the continuous 360° rotation of the Device at a certain speed.
Select Setting > PTZ > Function > Pan.
The Pan interface is displayed. See Figure 5-70.
Pan settings
94
5.3.2.6 PTZ Speed
PTZ speed is the automatical running speed of the Device when touring, patterning, or auto
tracking.
Select Setting > PTZ > Function > PTZ Speed.
The PTZ Speed interface is displayed. See Figure 5-71.
PTZ speed settings
5.3.2.7 Intelligence
95
Intelligence settings
Idle motion refers to a set motion when the Device does not receive any valid command within
a certain period.
96
Select the action number of the selected motion.
Set Idle Time for the selected motion.
Click Save.
5.3.2.9 PowerUp
PowerUp means the automatic operation of the Device after it is powered on.
Select Auto and the last motion before you shut down the Device last time will be
performed.
Select the action number of the selected motion.
Click Save.
After setting the PTZ limit, the Device can only move in the set area.
Select Setting > PTZ > Function > PTZ Limit.
The PTZ Limit interface is displayed. See Figure 5-75.
97
PTZ limit settings
Adjust the PTZ direction and click Setting to set the Up Line.
Adjust the PTZ direction and click Setting to set the Down Line.
Click Live to preview the already-set up line and down line.
Select the Enable check box to enable the PTZ limit function.
After setting time task, the Device performs the selected motions during the set period.
98
Set the time for AutoHome.
AutoHome refers to the time needed to automatically recover the time task in case of
manually calling the PTZ to stop the time task.
Click Period setting to set the period to perform time tasks.
Select the task number to copy settings to the selected task, and then click Copy.
Click Save.
5.3.2.13 Default
This function will restore the Device to defaults. Think twice before performing the operation.
Select Setting > PTZ > Function > Default.
The Default interface is displayed. See Figure 5-78.
99
Default setting
Click Default.
The PTZ will be restored to factory defaults.
Event Management
When the moving object appears and moves fast enough to reach the preset sensitivity value,
alarms will be triggered.
Select Setting > Event > Video Detection > Motion Detection.
The Motion Detection interface is displayed. See Figure 5-79.
100
Motion detection settings
Select the Enable check box, and then configure parameters as needed.
Set arming and disarming period.
1) Click Setting, and then set the arming and disarming period on the interface. See
Figure 5-80.
101
Arming and disarming period settings
2) Set the alarm period to enable alarm events in the period you set.
There are 6 time periods for each day. Select the check box for the time period to
enable it.
Select the day of week (Sunday is selected by default; If All is selected, the setting
is applied to the whole week. You can also select the check box next to the day to
set it separately).
3) After completing the settings, click Save.
You will return to the Motion Detection interface.
Set the area.
Click Setting, and the Area interface is displayed. See Figure 5-81. Refer to Table
5-24 and Table 5-25 for parameters description. Each color represents a certain
region, and you can set different motion detection regions for each area. The
detection region can be irregular and discontinuous.
102
Area setting
103
Parameter Description
Record After you enable the function, when an alarm is triggered, the system will start
recording automatically. Before using the function, you need to set the
recording period of the alarm in Storage > Schedule, and select Auto for
Record Mode on the Record Control interface.
Record When the alarm is over, the alarm recording will continue for an extended
Delay period of time. The time unit is second, and the value range is 10–300.
Relay-out Select the check box, and you can enable the alarm linkage output port, and
link corresponding relay-out devices after an alarm is triggered.
Alarm Delay When the alarm is over, the alarm will continue for an extended period of
time. The time unit is second, and the value range is 10–300.
Send Email After you select the check box, when an alarm is triggered, the system sends
email to the specified email address. You can configure the email address in
"5.2.5 SMTP (Email)."
PTZ Select PTZ, and then configure the linkage action. When an alarm is
triggered, the system links PTZ to rotate to the preset. The Activation
options include None, Preset, Tour and Pattern.
Snapshot Select the Snapshot check box, and then the system takes snapshot
automatically when an alarm is triggered. You need to set the alarm snapshot
period as described in "5.5.1.2 Snapshot."
Click Save.
104
Video tamper settings
Select the Enable check box, and then configure parameters as needed.
105
Scene changing settings
Select the Enable check box, and then configure parameters as needed.
The function depends on the result of motion detection, and all other parameters (except
sensitivity) of motion detection function are used, including arming period, area settings,
and linkage configurations. If no motion detection is triggered, smart motion detection will
not be triggered.
If motion detection is not enabled, when smart motion detection is enabled, motion
detection will also be enabled. If both functions are enabled, when motion detection is
disabled, smart motion detection will also be disabled.
When smart motion detection is triggered and recording is linked, back-end devices can
filter recording with human or vehicles through smart search function. For details, see the
corresponding user’s manual.
106
Preparation
Select Setting > Event > Video Detection > Motion Detection, and then enable the
motion detection function.
Set the arming period and detection area. The sensitivity of each region is larger than 0,
and the threshold is not equal to 100.
Procedure
Select the Enable check box, and then the Smart Motion Detection is enabled.
Select the effective object and sensitivity.
Effective object: Select Human or Motor Vehicle. When Human is selected,
both people and non-motor vehicles will be detected.
Sensitivity: Select High, Medium, or Low. The higher the sensitivity, the easier
the alarm is triggered.
Click Save.
107
Audio detection settings
Configure parameters as needed. For the parameter description, see Table 5-26.
108
5.4.4 Smart Plan
Each preset can be configured with different smart functions. You need to select a certain
function for it to come into effect.
Before configuring the smart plan, you need to set presets in advance. For setting methods,
see "5.3.2.1 Preset."
Select Settings > Event> Smart Plan.
The Smart Plan interface is displayed, see Figure 5-86.
Smart plan (1)
109
Smart plan (3)
Click Save.
5.4.5 IVS
Before using the function, you need to set presets in advance. For setting methods, see
"5.3.2.1 Preset."
110
Adding smart rules
5.4.5.1.1 Tripwire
Alarms are triggered when the target crosses the warning line in the defined direction.
It requires certain stay time and moving space for the target to be confirmed, so you need to
leave some space at both sides of the warning line during configuration and do not draw it near
obstacles.
Applicable scenes: Scenes with sparse targets and no occlusion between targets, such as
perimeter protection of unattended areas.
Select Tripwire from the Rule Type list.
The configuration interface is displayed. See Figure 5-90.
111
Tripwire rule settings
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
The locking function only takes effect in the rule configuration interface. After
switching to the Live interface, the Device can track the target normally.
Configure parameters as needed. For the parameter description, see Table 5-28.
112
Table 5-28 Tripwire parameter description
Parameter Description
Set the alarming period to enable alarm events in the period you set.
1. Click Setting, and then the Period interface is displayed.
2. Enter the time value or press and hold the left mouse button, and
drag directly on the setting interface. There are six periods for
setting each day. Select the check box next to the period, and the
Period
set period will be effective.
3. Select the day of week (Sunday is selected by default; If All is
selected, the setting is applied to the whole week. You can also
select the check box next to the day to set it separately).
4. After completing the setting, click Save to return to the rule
configuration interface.
Direction Configure the tripwire direction. You can select A->B, B->A or A<->B.
Select the check box, and there will be alarm tracking when an smart rule is
Alarm Track
triggered.
Track Time Set the alarm tracking time.
Select the check box, and when an alarm is triggered, the system will start
recording automatically. Before using the function, you need to set the
Record
recording period of the alarm in Storage > Schedule, and select Auto for
Record Mode in the Record Control interface.
Record When the alarm is over, the recording will continue for an extended period of
Delay time. The value range is 10–300 s.
Select the check box, and you can enable the alarm linkage output port, and
Relay-out
link corresponding relay-out devices when an alarm is triggered.
When the alarm is over, the alarm will continue for an extended period of
Alarm Delay
time. The value range is 10–300 s.
Select the Send Email check box, and when an alarm is triggered, the
Send Email system sends an email to the specified mailbox. You can configure the
mailbox in Setting > Network > SMTP (Email).
Select the check box, and the system will automatically take snapshots in
Snapshot
case of alarms. You need to set snapshot period in Storage > Schedule.
Click Save.
5.4.5.1.2 Intrusion
113
Applicable scenes: Scenes with sparse targets and no occlusion between targets, such as
perimeter protection of unattended areas.
Select Intrusion from the Rule Type list.
The configuration interface is displayed. See Figure 5-91.
Intrusion settings
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Configure parameters as needed. For the parameter description, see Table 5-29.
An alarm will be triggered when the selected target in the monitoring scene stays in the screen
for more than the set time.
Pedestrians or vehicles that stay for too long would be regarded as abandoned objects. To filter
out such alarms, you can use Target filter. In addition, the duration can be properly extended
to avoid false alarm due to a short stay of people.
114
Applicable scenes: Scenes with sparse targets, no obvious and frequent light changes. For
scenes with intensive targets or too many obstacles, missed alarms would increase; for scenes
in which too many people stay, false alarms would increase. Select detection areas with simple
texture, because this function is not applicable to scenes with complex texture.
Select Abandoned Object from the Rule Type list.
The configuration interface is displayed. See Figure 5-92.
Abandoned object settings
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Configure parameters as needed. For the parameter description, see Table 5-30.
An alarm will be triggered when the selected target in the scene is taken away for the time
longer than the set duration.
The system analyzes static areas from the foreground, and determines whether it is missing
object or abandoned object from the similarity of its foreground and background. When the time
exceeds the set period, an alarm is triggered.
115
Applicable scenes: Scenes with sparse targets, no obvious and frequent light changes. For
scenes with intensive targets or too many obstacles, the missed alarm would increase; for
scenes in which too many people stay, the false alarm would increase. Keep the detection area
texture as possible simple as possible, because this function is not applicable to scenes with
complex texture.
Select Moving Object from the Rule Type list.
The configuration interface is displayed. See Figure 5-93.
Missing object setting
Click Draw Rule, and you can draw rules on the monitoring screen. For parameter
description, see Table 5-27.
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Configure parameters as needed. For the parameter description, see Table 5-31.
Select Setting > Event > Smart Plan, and then enable face recognition.
116
This function is available on select models.
The function can detect faces and compare them with those in the configured face database.
When human face is detected in the monitoring screen, an alarm is triggered and the linked
activity is executed.
Select Setting > Event > Face Recognition > Face Detection.
The Face Detection interface is displayed. See Figure 5-94.
Face detection interface
Select Enable, and you can enable the face detection function.
Configure parameters as needed. For the parameter description, see Table 5-32.
117
Parameter Description
Select Send Email, and when alarms are triggered, the system sends
Send Email email to the specified mailbox. For the email settings, see "5.2.5 SMTP
(Email)."
Select Snapshot, and the system takes snapshot when alarms are
triggered.
Snapshot
Enable the motion detection snapshot first. For details, see "5.5.1.1
Record."
For searching and setting snapshot storage path, see "5.1.2.5 Path."
Snap Face
Set the snapshot scope, including Face and One-inch photo.
Image
Select the Attribute check box, click , and then you can set the human
Attribute
attributes during face detection.
Click Save.
After you successfully configure the face database, the detected faces can be compared with
the information in the face database. Configuring a face database includes creating a face
database, adding face pictures, and face modeling.
Create a face database, and then register face images, that is to add face pictures to the newly
created face database.
Select Setting > Event > Face Recognition > Face Database Config.
The Face Database Config interface is displayed. See Figure 5-95.
Face database config
118
The added face database is displayed. See Figure 5-97.
Adding face database completed
Configure parameters as needed. For the parameter description, see Table 5-33.
Add face pictures to the created face database. Manual addition and batch import are
supported.
Manual Addition
Add a single face picture. Use this method when registering a small number of face pictures.
Select Setting > Event > Face Recognition > Face Database Config.
The Face Database Config interface is displayed.
Set filtering conditions as needed, and then click Search. The search result is
displayed.
Click Registration.
The Registration interface is displayed. See Figure 5-99.
119
Registration interface
You can manually select a face area. After uploading the picture, select a face area and
click OK. If there are multiple faces in a picture, select the target face and click OK to
save the face picture.
120
Addition completed
Click .
The Task List interface is displayed. See Figure 5-101.
Task list addition completed
Click Remove All, and you can remove all the tasks.
Batch Registration
Import multiple face pictures in batch. Use this method when registering a large number of face
pictures.
Before importing pictures in batches, name the face pictures in the format of
"Name#SGender#BDate of Birth#NRegion#TCredentials Type#MID No. jpg" (for example,
"John#S1#B1990-01-01#NCN#T1#M330501199001016222"). For naming rules, see Table
5-34.
121
Table 5-34 Naming rules for batch import
Naming Rules Description
Name Enter the corresponding name.
Gender Enter a number. 1: Male; 2: Female.
Date of Birth Enter numbers in the format of yyyy-mm-dd. For example, 2017-11-23.
Region Enter the region name.
Credentials
Enter a number. 1: ID card; 2: passport.
Type
ID No. Enter ID No.
Select Setting > Event > Face Recognition > Face Database Config.
The Face Database Config interface is displayed.
Click Browse.
The registering interface is displayed. See Figure 5-103.
122
Registering
After the registration is completed, click Next to view the registration result.
Add face pictures to face database; manage and maintain face pictures to ensure correct
information.
information line. Click or , and the Registration interface is displayed. See Figure
5-105. After modifying the face picture information as needed, click Add to task list.
Registration interface
123
Batch deletion: Move the mouse pointer to the face picture or people information line, and
then click at the upper right corner of the face pictures, or click on person
information line. After selecting multiple items, click Add to the delete list, click
Delete all: When viewing face pictures in a list, click on people information line (or
select All when viewing face pictures in pictures), click Add to the delete list, click
Extract and import the relevant information of face pictures into the database through face
modeling, and create a face feature mode for smart detection such as face comparison.
The more face pictures you choose, the longer the modeling time is. Wait patiently.
During the modeling process, some smart detection functions (such as face comparison)
are temporarily unavailable and can be resumed after the modeling is completed.
Select Setting > Event > Face Recognition > Face Database Config.
The Face Database Config interface is displayed.
Click to view the face picture in a list. Click to view the face image as a
thumbnail.
Modeling All
Click Modeling All, and all face pictures in the face database will be modeled.
Selective Modeling
If there are many face pictures in the face database, set filtering conditions and click
Search to select face pictures for modeling.
124
Modeling completed
Configure parameters as needed. For the parameter description, see Table 5-35.
125
5.4.7 People Counting
Before using this function, you need to enable People Counting in Smart Plan.
The people counting data will be overwritten if the disk is full. Back up the data in time as
needed.
This function is available on select models.
You can use this function to count the number of people in the area and generate reports.
With the function, the system can count the number of people appearing in the monitoring
screen within a certain period of time.
Select Setting > Event > People Counting > People Counting.
The People Counting interface is displayed. See Figure 5-109.
People counting settings
Click Clear to the right of Draw Rule, and you can clear all drawn rules.
Configure parameters as needed. For the parameter description, see Table 5-36.
126
Table 5-36 People counting parameter description
Parameter Description
Display the number of people displayed in the area in real time. Click Clear,
OSD
and the current number will be zero.
Set the Enter No., and when the number of people entering reaches the set
Enter No.
value, an alarm will be triggered.
Set the Leave No., and when the number of people leaving reaches the set
Leave No.
value, an alarm will be triggered.
Stranded Set the Stranded No., and when the number of people staying reaches the
No. set value, an alarm will be triggered.
For other parameters, refer to "5.4.5.1.1 Tripwire."
Click Save.
5.4.7.2 Report
You can view the statistics results of people in the scene during the selected period.
Select Setting > Event > People Counting > Report.
The Report interface is displayed. See Figure 5-110.
People counting–report
Select a preset.
Select the Rule, Statistics Type, and Time Range.
Select the start time and end time for searching reports.
Select Flow Direction and Chart Type.
Click Search to generate reports, and click Export to export the report to local storage.
Before enabling Heat Map, you need to set presets in PTZ section, and select the function
in the Smart Plan.
The data will be overwritten if the disk is full. Back up the data in time as needed.
127
This function is available on select models.
The function can be used to detect the activity level of moving objects in the scene during a
certain period of time.
Select Setting > Event > Heat Map > Heat Map.
The Heat Map interface is displayed. See Figure 5-111.
Heat map interface
5.4.8.2 Report
You can view the heat map report for the scene in the selected time period.
Select Setting > Event > Heat Map > Report.
The Report interface is displayed.
Set the start time and end time to search for the heat map report.
Select a preset.
Click Search, and the search results will be displayed on the interface. See Figure
5-112.
128
Report
Before using video metadata, you need to enable the function in the Smart Plan.
This function is available on select models.
129
Video metadata–scene set
Click the Preset list to select the preset to configure video metadata.
Click to add a rule type.
Modify the parameters as needed.
Double-click the name to modify the rule name.
Select the rule type from People, Non-motor Vehicle and Motor Vehicle.
130
Click Save.
131
Picture overlay–people
If you select Location, you need to manually enter the location of the Device.
Click Save.
5.4.9.3 Report
You can view the number of vehicles, non-vehicles and people in the scene during the selected
period.
Select Setting > Event > Video Metadata > Report.
The Report interface is displayed.
Select the Report Type.
Select the start time and end time for searching reports.
Select the Traffic Flow Statistics Type.
Click Search to generate reports. See Figure 5-117.
Video metadata report
132
5.4.10 Alarm
Select Setting > Event > Alarm.
The Alarm interface is displayed. See Figure 5-118.
Alarm
5.4.11 Abnormality
Abnormality includes 7 alarm events: No SD Card, Capacity Warning, SD Card Error,
Disconnection, IP Conflict, Illegal Access, and Security Exception.
133
5.4.11.1 SD Card
In case of an SD card exception, an alarm will be triggered. Follow these steps to complete the
configuration.
Select Setting > Event > Abnormality > SD Card.
The SD Card interface is displayed. See Figure 5-119, Figure 5-120, and Figure 5-121.
No SD card
SD card error
134
Capacity warning
In case of a network exception, an alarm will be triggered. Follow these steps to complete the
configuration.
Select Setting > Event > Abnormality > Network.
The Network interface is displayed. See Figure 5-122 and Figure 5-123.
135
Disconnection
IP conflict
Illegal access alarm is triggered when the login password has been wrongly entered for more
than the times you set.
Select Setting > Event > Abnormality > Illegal Access.
The Illegal Access interface is displayed. See Figure 5-124.
136
Illegal access
When an event affecting the Device safety occurs, an alarm for safety exception will be
triggered.
Select Setting > Event > Abnormality > Security Exception.
The Security Exception interface is displayed. See Figure 5-125.
Security exception
Configure each parameter as needed. For details, refer to "5.4.1.1 Motion Detection."
Click Save.
137
Storage
5.5.1 Schedule
Before setting the schedule, make sure that the Record Mode is Auto in Record Control.
If the Record Mode is Off, the Device will not record or take snapshots according to the
schedule.
5.5.1.1 Record
Select the day for recording from Monday to Sunday. Click Setting on the right, and the
Setting interface is displayed. See Figure 5-127.
Set the recording period as needed. You can set up to six periods for one day.
You can select 3 types of recording: General, Motion and Alarm.
To set the time period, you can also press and hold the left mouse button and drag
directly on the Record interface.
138
Record schedule setting
On the Record interface, click Save, and the Save Succeeded! prompt will be
displayed, which means the recording schedule has been set.
5.5.1.2 Snapshot
139
Snapshot
For the snapshot schedule settings, refer to Step 2 and Step 3 in "5.5.1.1 Record."
Click Save, and the Save Succeeded! prompt will be displayed, which means the
snapshot schedule has been set.
140
Holiday schedule
Select a date.
The selected date will be a holiday and displayed in yellow.
Select Record or Snapshot, and then click Save. The Save Succeeded! prompt will
be displayed.
On the Record or Snapshot interface, click Setting to the right of Holiday. The setting
method is the same as that of Monday to Sunday.
Set the time period of one day for the Holiday, and the recording or snapshot will be
taken according to the holiday time period.
141
Snapshot by location
Select presets.
Enable snapshot by location.
Click , and then select All Enabled to enable the function for all
presets.
Disable snapshot by location.
Click , and then select All Disabled to disable the function for all
presets.
Click Save.
5.5.3 Destination
5.5.3.1 Path
Configure the storage path of recordings and snapshots of the Device, and select local SD card,
FTP and NAS for storage. Store recordings and snapshots according to the event type,
respectively corresponding to General, Motion and Alarm in the schedule, and then select the
corresponding type of recordings or snapshots for storage.
Select Setting > Storage > Destination > Path.
142
The Path interface is displayed, see Figure 5-132.
Path settings
Select the corresponding event type and storage method as needed. For details, refer
to Table 5-42.
5.5.3.2 Local
Display the SD card information. You can set it as read only or read & write; you can also hot
swap or refresh it.
Select Setting > Storage > Destination > Local, and the Local interface is displayed. See
Figure 5-133.
Local storage
After the SD card is formatted, the data will be cleared. Think twice before performing the
operation.
5.5.3.3 FTP
FTP function can be enabled only when it is selected as a destination path. When the network
is disconnected or does not work, you can save recordings and snapshots to the SD card by
using Emergency (Local) function.
Select Setting > Storage > Destination > FTP.
143
The FTP interface is displayed. See Figure 5-134.
FTP settings
Select the Enable check box, and the FTP function is enabled.
There might be risks if the FTP function is enabled. Think twice before enabling the
function.
SFTP is recommended to ensure network security.
Configure parameters as needed. For parameter description, see Table 5-43.
5.5.3.4 NAS
This function can be enabled only when NAS is selected as a destination path. Select NAS to
store files on the NAS server.
Select Setting > Storage > Destination > NAS.
The NAS interface is displayed. See Figure 5-135.
144
NAS settings
145
Table 5-45 Record control parameter description
Parameter Description
Pack Duration Set the pack duration of each recording file. It is 30 minutes by default.
Pre-event Set the pre-recording time. For example, if you enter 5, when an alarm is
Record triggered, the system reads the recording of the first 5 seconds in memory,
and then records it into a file.
The data will be overwritten if the disk is full. Back up the file in time as
needed.
Record Mode You can select Auto, Manual or Off. Select Manual mode to start
recording immediately, and select Auto mode to record within the
schedule.
Record Stream Select Main Stream or Sub Stream.
Click Save.
System Management
5.6.1.1 General
146
Table 5-46 General setting parameter description
Parameter Description
Set the device name.
Name
Different devices have different names.
Language Select the language to be displayed.
Video Standard Select video standard from PAL and NTSC.
Click Save.
147
Parameter Description
format.
NTP Select the NTP check box to enable the network time sync function.
Set the address of the time server.
Server
Set the network timing function of NTP server, and the Device time will be
synchronized with the server time.
Port Set the port number of the time server.
Interval Set the synchronization interval of the Device and the time server.
Click Save.
5.6.2.1 Account
5.6.2.1.1 Username
Select Setting > System > Account > Account > Username, and you can enable anonymous
login, add users, delete users, modify user passwords, and perform other operations. For the
configuration interface, see Figure 5-139.
Account interface
148
No permission is available for version information and other buttons except Relay-out, Mark,
and Wiper Control in Live interface for the time being.
Anonymous Login
Select the Anonymous Login check box, and you can log in to the Device anonymously
without username and password after entering IP. Anonymous users only have preview
permission in the permission list. In the anonymous login, click Logout to log in to the Device
by using other usernames.
After Anonymous Login is enabled, the user can view audio and video data without
authentication. Think twice before enabling the function.
Adding Users
Add users in the group and set permissions.
As the default user with the highest authority, admin cannot be deleted.
Click Add User.
The Add User interface is displayed. See Figure 5-140.
149
Adding users
Enter Username and Password, confirm password, select Group Name, and then
add Memo.
Set Operation Permission and Restricted Login.
Operation Permission: Click Operation Permission, and then select the operation
permission of the user as needed.
Restricted Login: Click Restricted Login, and the interface shown in Figure 5-141
is displayed. You can control login to the Device by setting the IP Address,
Validity Period and Time Range.
150
Restricted login
Once the group is selected as needed, the user permission can only be a subset of
the group, and cannot exceed its permission attributes.
It is recommended to give less permissions to general users than advanced users.
Click Save.
Modifying Users
151
Modifying users
Modifying Password
Select the Modify Password check box.
Enter old password and new password, and confirm password.
Click Save.
Deleting Users
Click corresponding to the user to be deleted, and the user can be deleted.
Users/user groups cannot be recovered after deletion. Think twice before performing the
operation.
Select Setting > System > Account > Account > Group Name, and you can add groups,
delete groups, modify group passwords, and perform other operations. For the interface, see
Figure 5-143.
User group settings
152
Adding Groups
For specific operations, refer to "5.6.2.1.1 Username."
Modifying Groups
For specific operations, refer to "5.6.2.1.1 Username."
Deleting Groups
For specific operations, refer to "5.6.2.1.1 Username."
On the web interface, you can add ONVIF users, or modify existing users.
Select Setting > System > Account > Onvif User.
The Onvif User interface is displayed. See Figure 5-144.
Onvif user
Set the username and password, confirm password, and then select the group name.
Click Save.
153
5.6.3 Safety
Select the Authorize Mode. You can select from Digest, Basic and None. It is Digest
by default.
154
System service
Configure system service parameters. For the detailed description, see Table 5-48.
Password Reset
If the function is disabled, you can only reset the password after restoring
the Device to factory defaults through pressing the Reset button on the
device.
You can access the Device through this protocol. The function is enabled
by default.
CGI Service
It is recommended to disable the function. If this function is enabled, there
might be security risks.
You can access the Device through this protocol. The function is enabled
Onvif Service by default.
155
Function Description
5.6.3.3 HTTPS
It is recommended to enable HTTPS service. If the service is disabled, there might be risk of
data leakage.
Create certificate or upload signed certificate, and then you can log in through HTTPS with your
PC. HTTPS can ensure data security, and protect user information and device security with
reliable and stable technology.
Create certificate or upload the signed certificate.
If you select Create Certificate, refer to the following steps.
1) Select Setting > System > Safety > HTTPS.
The HTTPS interface is displayed. See Figure 5-148.
156
HTTPS (1)
2) Click Create.
The HTTPS dialog box is displayed. See Figure 5-149.
HTTPS (2)
The entered IP or domain name must be the same as the IP or domain name of
the Device.
4) Click Install to install the certificate on the Device. See Figure 5-150.
157
Certificate installation
158
Certificate information
159
Certificate import wizard
9) Click Next.
Select Trusted Root Certification Authorities. See Figure 5-154.
160
Certificate storage area
161
Completing the certificate import wizard
162
Security warning
163
Install signed certificate
2) Click Browse to upload the signed certificate and certificate key, and then click
Upload.
3) To install the root certificate, refer to Step 5) to 12) in Create Certificate.
Select Enable HTTPS and click Save.
The Reboot interface is displayed, and the configuration takes effect after reboot. See
Figure 5-159.
Reboot
If HTTPS is enabled, you cannot access the Device through HTTP. The system will
switch to HTTPS if you access the Device through HTTP.
The deletion of created and installed certificates cannot be restored. Think twice
before deleting them.
5.6.3.4 Firewall
Set a firewall for the Device to prevent network attacks after the Device is connected to the
network.
Select Setting > System > Safety > Firewall.
The Firewall interface is displayed. See Figure 5-160.
164
Firewall
Select the type of network attack that the firewall resists as needed. You can select
Network Access, PING Prohibited, or Prevent Semijoin.
Select Enable, and then the Firewall is enabled.
Click Save.
5.6.4 Peripheral
The peripheral functions might vary with different models, and the actual interface shall prevail.
5.6.4.1 Wiper
165
5.6.5 Default
All information except IP address and user management will be restored to defaults. Think
twice before performing the operation.
Select Setting > System > Default, and click Default to restore the Device. The configuration
interface is displayed. See Figure 5-162.
Default interface
5.6.6 Import/Export
When multiple devices share the same configuration methods, they can be quickly configured
by importing and exporting configuration files.
On the web interface of one device, select Setting > System > Import/Export.
The Import/Export interface is displayed. See Figure 5-163.
166
Import/Export
Click Export to export the configuration file (.backup file) to the local storage path.
Click Import on the Import/Export interface of the Device to be configured to import
the configuration file, and the Device will complete the configurations.
167
5.6.8 Upgrade
Upgrade the system to improve device function and stability.
If wrong upgrade file has been used, restart the Device; otherwise some functions might not
work properly.
Select Setting > System > Upgrade. The configuration interface is displayed. See Figure
5-165.
System upgrade
File Upgrade: Click Browse, select the upgrade file, and then click Upgrade to upgrade
the firmware. The upgrade file is in the format of *.bin.
Online Upgrade
1) Select the Auto-check for updates check box.
This will enable the system to check for upgrade once a day automatically, and
there will be system notice if any upgrade is available.
We need to collect the data such as IP address, device name, firmware version,
and device serial number to perform auto-check. The collected information is only
used to verify the legitimacy of the Device, and push the upgrade notification.
2) Click Save.
Click Manual Check, and you can check for upgrade manually.
Information
You can view information such as version, online users, log, and life statistics.
5.7.1 Version
You can view information such as system hardware features, software version and release
date.
168
Select Setting > Information > Version > Version, and then you can see the version
information of current web interface. See Figure 5-166.
Version
5.7.2.1 Log
Select Setting > Information > Log > Log, and then you can see the operation information of
the Device, and some system information. See Figure 5-167. For parameter description, see
Table 5-51.
Log
169
Table 5-51 Log parameter description
Parameter Description
The start time of the log to be searched (January 1, 2000 is the earliest
Start Time
time).
The end time of the log to be searched (December 31, 2037 is the latest
End Time
time).
The log type includes All, System, Setting, Data, Event, Record, Account,
Type
Clear Log, and Safety.
Set the start time and end time of the log to be searched, select the log
Search type, and then click Search. The searched log number and time period will
be displayed.
Detailed
Click a log to display the details.
Information
Clear Clear all logs of the Device, and classified clearing is not supported.
Back up the searched system logs to the PC currently used by the user.
Backup
The data will be overwritten if the disk is full. Back up the data in time as
needed.
Here are the meanings of different log types:
System: Includes program launch, force exit, exit, program reboot, device
shutdown/restart, system reboot, and system upgrade.
Setting: Includes saving configurations, and deleting configuration files.
Data: Includes disk type configurations, data erasing, hot swap, FTP state, and recording
mode.
Event (records events such as video detection, smart plan, alarm, and abnormality):
Includes starting events, and ending events.
Record: Includes file access, file access error, and file search.
Account (records modification of user management, login, and logout): Includes login,
logout, adding user, deleting user, modifying user, adding group, deleting group, and
modifying group.
Safety: Includes security-related information.
Clear Log: Clearing logs.
170
Remote log
171
6 Alarm
You can select alarm types on the interface. When the selected alarms are triggered, detailed
alarm information will be displayed on the right side of the interface. You can also select
Prompt or Play Alarm Tone. When an alarm occurs, the alarm prompt or tone will be triggered.
For the Alarm setting interface, see Figure 6-1. For parameter description, see Table 6-1.
Alarm setting interface
172
Category Parameter Description
triggered.
Tone Path Customize the storage path for alarm tones.
173
7 Logout
Click Logout to log out, and the login interface is displayed. See Figure 7-1. Enter the
username and password to log in again.
Login interface
174
Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic
steps toward protecting and strengthening networks and networked appliances will make them
less susceptible to attacks. Below are some tips and recommendations on how to create a
more secured security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
The length should not be less than 8 characters;
Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
Do not contain the account name or the account name in reverse order;
Do not use continuous characters, such as 123, abc, etc.;
Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
According to the standard procedure in Tech-industry, we recommend to keep your
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the
system is equipped with the latest security patches and fixes. When the equipment is
connected to the public network, it is recommended to enable the “auto-check for
updates” function to obtain timely information of firmware updates released by the
manufacturer.
We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices.
For example, place the equipment in a special computer room and cabinet, and implement
well-done access control permission and key management to prevent unauthorized
personnel from carrying out physical contacts such as damaging hardware, unauthorized
connection of removable equipment (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or
cracked.
3. Set and Update Passwords Reset Information Timely
The equipment supports password reset function. Please set up related information for
password reset in time, including the end user’s mailbox and password protection
questions. If the information changes, please modify it in time. When setting password
protection questions, it is suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you
are using.
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure
communication channel.
7. Enable Whitelist
We suggest you to enable whitelist function to prevent everyone, except those with
specified IP addresses, from accessing the system. Therefore, please be sure to add your
computer’s IP address and the accompanying equipment’s IP address to the whitelist.
8. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment,
thus reducing the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP,
etc., to reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to
the following services:
SNMP:Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP:Choose TLS to access mailbox server.
FTP:Choose SFTP, and set up strong passwords.
AP hotspot:Choose WPA2-PSK encryption mode, and set up strong passwords.
11. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that
you use encrypted transmission function, to reduce the risk of audio and video data being
stolen during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the
device is logged in without authorization.
Check equipment log: By viewing the logs, you can know the IP addresses that were
used to log in to your devices and their key operations.
13. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need
to save the log for a long time, it is recommended that you enable the network log function
to ensure that the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs.
If there are no communication requirements between two sub networks, it is
suggested to use VLAN, network GAP and other technologies to partition the network,
so as to achieve the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized
access to private networks.