Hide thumbs Also See for NVC-BM1:
Table of Contents

Advertisement

Network Cameras

NVC-BM1
NVC-DF1
NVC-DT1
NVC-DM1
User Manual
0
V1.0

Advertisement

Table of Contents
loading

Summary of Contents for Hills NVC-BM1

  • Page 1: Network Cameras

    Network Cameras NVC-BM1 NVC-DF1 NVC-DT1 NVC-DM1 User Manual V1.0...
  • Page 2 For further information, including full user and installation manual, and technical support please visit: www.hills.com.au/videosecurity...
  • Page 3: Table Of Contents

    Table of Contents System Requirement ............... 5 Chapter 1 Network Connection ............... 6 Chapter 2 Setting the Network Camera over the LAN ............6 2.1.1 Wiring over the LAN ......................6 2.1.2 Detecting and Changing the IP Address ................7 Setting the Network Camera over the WAN ............
  • Page 4 5.5.1 Configuring Display Settings ................... 43 5.5.2 Configuring OSD Settings ....................48 5.5.3 Configuring Text Overlay Settings ................... 50 5.5.4 Configuring Privacy Mask....................51 5.5.5 Configuring Picture Overlay .................... 52 Configuring and Handling Alarms ..............53 5.6.1 Configuring Motion Detection ..................53 5.6.2 Configuring Video Tampering Alarm ................
  • Page 5 Appendix ......................100 Appendix 1 HVS Discovery Tool Software Introduction ......... 100 Appendix 2 Port Mapping ..................103...
  • Page 6: Chapter 1 System Requirement

    Chapter 1 System Requirement Operating System: Microsoft Windows XP SP1 and above version / Vista / Win7 / Server 2003 / Server 2008 32bits CPU: Intel Pentium IV 3.0 GHz or higher RAM: 1G or higher Display: 1024×768 resolution or higher Web Browser: Internet Explorer 6.0 and above version, Safari 5.02 and above version, Mozilla Firefox 3.5 and above version and Google Chrome8 and above versions.
  • Page 7: Chapter 2 Network Connection

    Chapter 2 Network Connection Before you start:  Please refer to Section 2.1 Setting the Network Camera over the LAN to set the network camera via a LAN (Local Area Network).  Please refer to Section 2.2 Setting the Network Camera over the WAN to set the network camera via a WAN (Wide Area Network).
  • Page 8: Detecting And Changing The Ip Address

    Figure 2-2 Connecting via a Switch or a Router 2.1.2 Detecting and Changing the IP Address You need the IP address to visit the network camera. Steps: 1. To get the IP address, you can choose either of the following methods: ...
  • Page 9: Setting The Network Camera Over The Wan

    Figure 2-3 HVS Discovery Toll Interface 2.2 Setting the Network Camera over the WAN Purpose: This section explains how to connect the network camera to the WAN with a static IP or a dynamic IP. 2.2.1 Static IP Connection Before you start: Please apply a static IP from an ISP (Internet Service Provider).
  • Page 10: Dynamic Ip Connection

    2. Assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 Detecting and Changing the IP Address for detailed IP address configuration of the camera. 3. Save the static IP in the router. 4. Set port mapping, e.g., 80, 8000, and 554 ports. The steps for port mapping vary according to the different routers.
  • Page 11  Connecting the network camera via a router Steps: 1. Connect the network camera to the router. 2. In the camera, assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 Detecting and Changing the IP Address for detailed LAN configuration.
  • Page 12  Normal Domain Name Resolution Figure 2-7 Normal Domain Name Resolution Steps: 1. Apply a domain name from a domain name provider. 2. Configure the DDNS settings in the DDNS Settings interface of the network camera. Refer to Section 6.3.4 Configuring DDNS Settings for detailed configuration.
  • Page 14: Chapter 3 Access To The Network Camera

    Chapter 3 Access to the Network Camera 3.1 Accessing by Web Browsers Steps: 1. Open the web browser. 2. Input the IP address of the network camera in the address bar, e.g., 10.1.1.1 and press the Enter key to enter the login interface. 3.
  • Page 15 Figure 3-2 Download and Install Plug-in Figure 3-3 Install Plug-in (1) Figure 3-4 Install Plug-in (2)
  • Page 16: Accessing By Client Software

    3.2 Accessing by Client Software Download HVS PC Client software from website www.hills.com.au/videosecurity. You can view the live video and manage the camera with the software. Follow the installation prompts to install the software. The control panel and live view interface of HVS PC Client software are shown as bellow.
  • Page 17 Figure 3-6 HVS PC Client Configuration Panel Note: For detailed information about the software, please refer to the user manual of the HVS PC Client.
  • Page 18: Chapter 4 Live View

    Chapter 4 Live View 4.1 Live View Page Purpose: The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters. Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page.
  • Page 19: Starting Live View

    Toolbar: Operations on the live view page, e.g., live view, capture, record, audio on/off, two-way audio, etc. 4.2 Starting Live View In the live view window as shown in Figure 5-2, click on the toolbar to start the live view of the camera. Figure 4-2 Live View Toolbar Table 4-1 Descriptions of the Toolbar Icon...
  • Page 20 scheduled recording, please refer to Section 7.2. Note: The captured image will be saved as JPEG file or BMP file in your computer.
  • Page 21: Chapter 5 Network Camera Configuration

    Chapter 5 Network Camera Configuration 5.1 Configuring Local Parameters Note: The local configuration refers to the parameters of the live view, record files and captured pictures. The record files and captured pictures are the ones you record and captured using the web browser and thus the saving paths of them are on the PC running the browser.
  • Page 22 streaming under some network environments. MULTICAST: It’s recommended to select MCAST type when using the Multicast function. For detailed information about Multicast, refer to Section 6.3.1 TCP/IP Settings.  Live View Performance: Set the live view performance to Shortest Delay, Real Time, Balanced or Best Fluency.
  • Page 23: Configuring Time Settings

    5.2 Configuring Time Settings Purpose: You can follow the instructions in this section to configure the time synchronization and DST settings. Steps: 1. Enter the Time Settings interface: Configuration > Basic Configuration > System > Time Settings Or Configuration > Advanced Configuration > System > Time Settings Figure 5-2 Time Settings ...
  • Page 24 Figure 5-3 Time Sync by NTP Server Note: If the camera is connected to a public network, you should use a NTP server that has a time synchronization function, such as the server at the National Time Center (IP Address: 210.72.145.44). If the camera is set in a customized network, NTP software can be used to establish a NTP server for time synchronization.
  • Page 25: Configuring Network Settings

    5.3 Configuring Network Settings 5.3.1 Configuring TCP/IP Settings Purpose: TCP/IP settings must be properly configured before you operate the camera over network. The camera supports both the IPv4 and IPv6. Both versions may be configured simultaneously without conflicting to each other, and at least one IP version should be configured.
  • Page 26: Configuring Port Settings

    and Multicast Address. Notes:  The valid value range of MTU is 500 ~ 1500.  The Multicast sends a stream to the multicast group address and allows multiple clients to acquire the stream at the same time by requesting a copy from the multicast group address.
  • Page 27: Configuring Pppoe Settings

    HTTPS Port: The default port number is 443, and it can be changed to any port No. which is not occupied. Server Port: The default server port number is 8000, and it can be changed to any port No. ranges from 2000 to 65535. 3.
  • Page 28 Registration on the DDNS server is required before configuring the DDNS settings of the camera. Steps: 1. Enter the DDNS Settings interface: Configuration > Advanced Configuration > Network > DDNS Figure 5-9 DDNS Settings 2. Check the Enable DDNS checkbox to enable this feature. 3.
  • Page 29 Figure 5-10 DynDNS Settings  IP Server: Steps: (1) Enter the Server Address of the IP Server. (2) Click Save to save the settings. Note: For the IP Server, you have to apply a static IP, subnet mask, gateway and preferred DNS from the ISP.
  • Page 30: Configuring Snmp Settings

    Figure 5-12 NO-IP DNS Settings (2) Enter the Server Address as www.noip.com (3) Enter the Domain name you registered. (4) Enter the Port number, if needed. (5) Enter the User Name and Password. (6) Click Save and then you can view the camera with the domain name. 5.3.5 Configuring SNMP Settings Purpose: You can set the SNMP function to get camera status, parameters and alarm related...
  • Page 31 Configuration > Advanced Configuration > Network > SNMP Figure 5-13 SNMP Settings 2. Check the corresponding version checkbox ( ) to enable the feature. 3. Configure the SNMP settings. Note: The settings of the SNMP software should be the same as the settings you configure here.
  • Page 32: Configuring 802.1X Settings

    5.3.6 Configuring 802.1X Settings Purpose: The IEEE 802.1X standard is supported by the network cameras, and when the feature is enabled, the camera data is secured and user authentication is needed when connecting the camera to the network protected by the IEEE 802.1X. Before you start: The authentication server must be configured.
  • Page 33: Configuring Upnp™ Settings

    QoS (Quality of Service) can help solve the network delay and network congestion by configuring the priority of data sending. Steps: 1. Enter the QoS Settings interface: Configuration >Advanced Configuration > Network > QoS Figure 5-15 QoS Settings 2. Configure the QoS settings, including video / audio DSCP, event / alarm DSCP and Management DSCP.
  • Page 34: Email Sending Triggered By Alarm

    2. Check the checkbox to enable the UPnP™ function. The name of the device when detected online can be edited. Figure 5-16 Configure UPnP Settings 5.3.9 Email Sending Triggered by Alarm Purpose: The system can be configured to send an Email notification to all designated receivers if an alarm event is detected, e.g., motion detection event, video loss, video tampering, etc.
  • Page 35 Figure 5-17 Email Settings 3. Configure the following settings: Sender: The name of the email sender. Sender’s Address: The email address of the sender. SMTP Server: The SMTP Server IP address or host name (e.g., smtp.263xmail.com). SMTP Port: The SMTP port. The default TCP/IP port for SMTP is 25 (not secured).
  • Page 36: Configuring Nat (Network Address Translation) Settings

    Name and password. Choose Receiver: Select the receiver to which the email is sent. Up to 2 receivers can be configured. Receiver: The name of the user to be notified. Receiver’s Address: The email address of user to be notified. 4.
  • Page 37 Steps: 1. Enter the FTP Settings interface: Configuration >Advanced Configuration > Network > FTP Figure 5-19 FTP Settings 2. Configure the FTP settings; and the user name and password are required for login the FTP server. Directory: In the Directory Structure field, you can select the root directory, parent directory and child directory.
  • Page 38: Https Settings

    3. Click Save to save the settings. Note: If you want to upload the captured pictures to FTP server, you have to enable the continuous snapshot or event-triggered snapshot on Snapshot page. For detailed information, please refer to the Section 6.6.7. 5.3.12 HTTPS Settings Purpose: HTTPS provides authentication of the web site and associated web server that one is...
  • Page 39 1) Click Create button to enter the creation interface. Figure 5-22 Create Self-signed Certificate 2) Enter the country, host name/IP, validity and other information. 3) Click OK to save the settings. Note: If you already had a certificate installed, the Create Self-signed Certificate is grayed out.
  • Page 40: Configuring Video And Audio Settings

    5.4 Configuring Video and Audio Settings 5.4.1 Configuring Video Settings Steps: 1. Enter the Video Settings interface: Configuration >Basic Configuration > Video / Audio > Video Or Configuration > Advanced Configuration > Video / Audio > Video Figure 5-24 Configure Video Settings 2.
  • Page 41 Resolution: Select the resolution of the video output. Bitrate Type: Select the bitrate type to constant or variable. Video Quality: When bitrate type is selected as Variable, 6 levels of video quality are selectable. Frame Rate: Set the frame rate to 1/16~25 fps. The frame rate is to describe the frequency at which the video stream is updated and it is measured by frames per second (fps).
  • Page 42: Configuring Audio Settings

    appear not fluent. 4. Click Save to save the settings. 5.4.2 Configuring Audio Settings Steps: 1. Enter the Audio Settings interface Configuration > Basic Configuration > Video / Audio > Audio Or Configuration > Advanced Configuration > Video / Audio > Audio Figure 5-25 Audio Settings 2.
  • Page 43 quality of the ROI whereas the background information is less focused. Steps: 1. Enter the ROI settings interface Configuration > Advanced Configuration > Video / Audio >ROI Figure 5-26 Region of Interest Settings 2. Draw the region of interest on the image. There are four regions can be drawn. 3.
  • Page 44: Configuring Image Parameters

     The fixed region encoding is the ROI encoding for the manually configured area. And you can choose the Image Quality Enhancing level for ROI encoding, and you can also name the ROI area.  The dynamic region refers to the ROI defined by intelligent analysis such as human face detection.
  • Page 45: Image Adjustment

    Figure 5-27 Display Settings of Day/night Auto-switch  Image Adjustment Brightness describes bright of the image, which ranges from 1~100, and the default value is 50. Contrast describes the contrast of the image, which ranges from 1~100, and the default value is 50. Saturation describes the colorfulness of the image color, which ranges from 1~100, and the default value is 50.
  • Page 46 1/100,000s. Adjust it according to the actual luminance condition.  Focus Settings For the camera supports electronic lens, you can set the focus mode as Manual or Auto. If auto is selected, the focus is adjusted automatically, and if manual is selected, you can control the lens by adjusting the zoom, focus, lens initialization, and auxiliary focus via the PTZ control interface.
  • Page 47 AUTO, and the IR LED changes according to the actual luminance. E.g.: if the current scene is bright enough, then the IR LED adjusts itself to lower power; and if the scene is not bright enough, the IR LED adjusts itself to higher power. Select Manual, and you can adjust the IR LED by adjusting the distance.
  • Page 48 the image is misty. It enhances the subtle details so that the image appears clearer. Electrical Image Stabilizer: EIS reduces the effects of vibration in a video. Grey Scale: You can choose the range of the grey scale as [0-255] or [16-235]. ...
  • Page 49: Configuring Osd Settings

    Figure 5-30 Day/Night Scheduled-Switch Configuration Interface Steps: 1. Click the time line to select the start time and the end time of the switch. 2. Click Common tab to configure the common parameters applicable to the day mode and night mode. Note: The detailed information of each parameter please refers to day/night auto switch session.
  • Page 50 Configuration > Advanced Configuration > Image > OSD Settings Figure 5-31 OSD Settings 2. Check the corresponding checkbox to select the display of camera name, date or week if required. 3. Edit the camera name in the text field of Camera Name. 4.
  • Page 51: Configuring Text Overlay Settings

    Figure 5-33 Adjust OSD Location 7. Click Save to activate the above settings. 5.5.3 Configuring Text Overlay Settings Purpose: You can customize the text overlay. Steps: 1. Enter the Text Overlay Settings interface: Configuration > Advanced Configuration > Image > Text Overlay Figure 5-34 Text Overlay...
  • Page 52: Configuring Privacy Mask

    2. Check the checkbox in front of textbox to enable the on-screen display. 3. Input the characters in the textbox. 4. (Optional)Use the mouse to click and drag the red text frame in the live view window to adjust the text overlay position. 5.
  • Page 53: Configuring Picture Overlay

    5. Click Stop Drawing to finish drawing or click Clear All to clear all of the areas you set without saving them. 6. Click Save to save the settings. 5.5.5 Configuring Picture Overlay Purpose: Picture overlay enables you to overlay a picture on the image. This function enables a certain enterprise or users to overlay their logo on the image.
  • Page 54: Configuring And Handling Alarms

    5.6 Configuring and Handling Alarms This section explains how to configure the network camera to respond to alarm events, including motion detection, video tampering, alarm input, alarm output, exception, face detection, audio exception detection, intrusion detection, defocus detection, and scene change detection, etc. These events can trigger the linkage methods, such as Notify Surveillance Center, Send Email, Trigger Alarm Output, etc.
  • Page 55 Configuration > Advanced Configuration> Events > Motion Detection (2)Check the checkbox of Enable Motion Detection. (3)Check the checkbox of Enable Dynamic Analysis for Motion if you want to mark the detected objects with green rectangles. Select Disable for rules if you don’t want the detected objected Note: displayed with the rectangles.
  • Page 56 Figure 5-38 Arming Time (1)Click Edit to edit the arming schedule. The Figure 6-34 shows the editing interface of the arming schedule. (2)Choose the day you want to set the arming schedule. (3)Click to set the time period for the arming schedule. (4)(Optional) After you set the arming schedule, you can copy the schedule to other days.
  • Page 57 3. Set the Alarm Actions for Motion Detection. Check the checkbox to select the linkage method. Notify surveillance center, send email, upload to FTP, trigger channel and trigger alarm output are selectable. You can specify the linkage method when an event occurs. Figure 5-40 Linkage Method ...
  • Page 58 detailed information.  Trigger Alarm Output Trigger one or more external alarm outputs when an event occurs. Note: To trigger an alarm output when an event occurs, please refer to Section 6.6.4 to set the related parameters.  Expert Configuration Expert mode is mainly used to configure the sensitivity and proportion of object on area of each area for different day/night switch.
  • Page 59  Day/Night Auto-Switch Steps: (1) Draw the detection area as in the normal configuration mode. Up to 8 areas are supported. (2) Select Auto-Switch for Switch Day and Night Settings. Figure 5-42 Day/Night Auto-Switch (3) Select the area by clicking the area No. (4) Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area in the daytime.
  • Page 60: Configuring Video Tampering Alarm

    Figure 5-43 Day/Night Scheduled-Switch (3) Select the start time and the end time for the switch timing. (4) Select the area by clicking the area No. (5) Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area in the daytime.
  • Page 61: Configuring Alarm Input

    Figure 5-44 Video Tampering Alarm 2. Check Enable Video Tampering checkbox to enable the video tampering detection. 3. Set the video tampering area; refer to Task 1 Set the Motion Detection Area in Section 6.6.1. 4. Click Edit to edit the arming schedule for video tampering. The arming schedule configuration is the same as the setting of the arming schedule for motion detection.
  • Page 62: Configuring Alarm Output

    2. Choose the alarm input No. and the Alarm Type. The alarm type can be NO (Normally Open) and NC (Normally Closed). Edit the name to set a name for the alarm input (optional). Figure 5-45 Alarm Input Settings 3. Click Edit to set the arming schedule for the alarm input. Refer to Task 2 Set the Arming Schedule for Motion Detection in Section 6.6.1.
  • Page 63: Handling Exception

    Configuration>Advanced Configuration> Events > Alarm Output 2. Select one alarm output channel in the Alarm Output drop-down list. You can also set a name for the alarm output (optional). 3. The Delay time can be set to 5sec, 10sec, 30sec, 1min, 2min, 5min, 10min or Manual.
  • Page 64: Traversing Virtual Plane

    Steps: 1. Enter the Exception Settings interface: Configuration > Advanced Configuration> Events > Exception 2. Check the checkbox to set the actions taken for the Exception alarm. Refer to Task 3 Set the Alarm Actions Taken for Motion Detection in Section 6.6.1. Figure 5-47 Exception Settings 3.
  • Page 65 Figure 5-48 Draw Virtual Plane And you can select the directions as A<->B, A ->B, and B->A. A<->B: Only the arrow on the B side shows; when an object going across the plane with both direction can be detected and alarms are triggered. A->B: Only the object crossing the virtual plane from the A side to the B side can be detected.
  • Page 66: Configuring Intrusion Detection

    5.6.7 Configuring Intrusion Detection Intrusion detection can set an area in the surveillance scene and once the area is been entered, a set of alarm action is triggered. Steps: 1. Check the Enable Intrusion Detection checkbox. 2. Click Draw Area, and then draw a rectangle on the image as a defense region. Note: when you draw the rectangle, all lines should connect end to end to each other.
  • Page 67: Configuring Defocus Detection

    part of the object which can trigger the alarm. For example, when you set the percentage as 50%, half of the object entering the region will trigger the alarm. Arming Schedule is configured to set the time you want the function to be enabled.
  • Page 68: Vca Configuration

    affected by the external factors; such as the intentional rotation of the camera. Steps: 1. Check the Enable Scene Change Detection checkbox. Sensitivity: Range [1%-100%]. The higher the sensitivity, the easier the change of scene can trigger the alarm. Arming Schedule is configured to set the time you want the function to be enabled.
  • Page 69: Camera Calibration

    Figure 5-52 Behavior Analysis  VCA Info Behavior Analysis Version: It lists the version of the algorithms library. Display information includes the display on picture and display on stream. Display Target info. on Alarm Picture: There will be a frame on the target on the uploaded alarm picture if the checkbox is checked.
  • Page 70 1. Check the checkbox of Camera Calibration to enable this function. 2. Select the calibration mode as Input Basic Data or Draw on Live View Video. Input Basic Data: Input the mounting height, viewing angle, and horizon ratio of the camera manually. Draw on Live View Video: Click Draw Verification Line (Horizontal) / (Vertical) to draw a horizontal/vertical line in the live view, and input the actual length in Real Length field.
  • Page 71 and right click to finish the area drawing. Notes: ● Polygon area with up to 10 sides is supported. ● Click Delete to delete the drawn areas. ● If live view is stopped, there is no way to draw the shield regions. 3.
  • Page 72 2. Check the checkbox of Rule to enable rules of behavior analysis. 3. Select the rule type as Null, Traversing Virtual Plane, Intrusion, Region Entrance, and Region Exiting. Notes: ● If you select the rule type as Null, the rule option is invalid, and no behavior analysis can be configured.
  • Page 73 Figure 5-55 Advanced Configuration Detection Sensitivity [0~4]: Refers to the sensitivity of the camera detects a target. The higher the value, the easier a target be recognized, and the higher the misinformation is. The default value of 3 is recommended. Background Update Rate [0~4]: It refers to the speed of the new scene replaces the previous scene.
  • Page 74: Face Capture

    2. Select the Filter Type as Actual Size or Pixel. Actual Size: Input the length and width of the maximum size and the length and width of the minimum size. Only the target size is between the min. size and max. size will trigger the alarm.
  • Page 75 Figure 5-56 Face Capture  VCA Info Face Capture Version: It lists the version of the algorithms library. Display information includes the display on picture and display on stream. Display Target info. on Alarm Picture: There will be a frame on the target on the uploaded alarm picture if the checkbox is checked.
  • Page 76  Rule Steps: 1. Check the checkbox of Rule to enable rules of face capture. 2. Click Minimize Pupil Distance to draw the minimum pupil distance. The distance of the drawn pupil will be displayed on the box below the live view. The minimize pupil distance refers to the minimum square size composed by the area between two pupils, and it is the basic standard for a camera to identify a target.
  • Page 77 every frame. Capture Sensitivity [0~20]: The threshold the camera treats the target as a face. Only when the face score generated by the algorithm is equal or higher than the value, the camera will treat the target as a face. The default value of 2 is recommended. Face Capture Advanced Parameters: Face Exposure: Check the checkbox to enable the face exposure.
  • Page 78: Chapter 6 Storage Settings

    Chapter 6 Storage Settings Before you start: To configure record settings, please make sure that you have the network storage device within the network or the SD card inserted in your camera. 6.1 Configuring NAS Settings Before you start: The network disk should be available within the network and properly configured to store the recorded files, log files, etc.
  • Page 79 Please refer to the User Manual of NAS for creating the file path. (4) Click Save to add the network disk. 2. Initialize the added network disk. (1) Enter the HDD Settings interface (Advanced Configuration > Storage > Storage Management), in which you can view the capacity, free space, status, type and property of the disk.
  • Page 80: Configuring Recording Schedule

    Figure 6-4 Quota Settings Notes:  Up to 8 NAS disks can be connected to the camera.  To initialize and use the SD card after insert it to the camera, please refer to the steps of NAS disk initialization. 6.2 Configuring Recording Schedule Purpose: There are two kinds of recording for the cameras: manual recording and scheduled...
  • Page 81 Figure 6-5 Recording Schedule Interface 2. Check the checkbox of Enable Record Schedule to enable scheduled recording. 3. Set the record parameters of the camera. Figure 6-6 Record Parameters  Pre-record: The time you set to start recording before the scheduled time or the event.
  • Page 82 The Post-record time can be configured as 5 s, 10 s, 30 s, 1 min, 2 min, 5 min or 10 min. Note: The record parameter configurations vary depending on the camera model. 4. Click Edit to edit the record schedule. Figure 6-7 Record Schedule 5.
  • Page 83 to the time of the schedule.  Record Triggered by Motion Detection If you select Motion Detection, the video will be recorded when the motion is detected. Besides configuring the recording schedule, you have to set the motion detection area and check the checkbox of Trigger Channel in the Linkage Method of Motion Detection Settings interface.
  • Page 84: Configuring Snapshot Settings

    Figure 6-8 Edit Record Schedule (3) Check the checkbox of Select All and click Copy to copy settings of this day to the whole week. You can also check any of the checkboxes before the date and click Copy. (4) Click OK to save the settings and exit the Edit Record Schedule interface. 6.
  • Page 85 Check the Enable Event-triggered Snapshot checkbox to check event-triggered snapshot. 3. Select the quality of the snapshot. 4. Set the time interval between two snapshots. 5. Click Save to save the settings. Uploading to FTP You can follow below configuration instructions to upload the snapshots to FTP. ...
  • Page 86 Figure 6-9 Snapshot Settings...
  • Page 87: Chapter 7 Playback

    Chapter 7 Playback Purpose: This section explains how to view the remotely recorded video files stored in the network disks or SD cards. Steps: 1. Click Playback on the menu bar to enter playback interface. Figure 7-1 Playback Interface 2. Select the date and click Search. Figure 7-2 Search Video 3.
  • Page 88 The toolbar on the bottom of Playback interface can be used to control playing process. Figure 7-3 Playback Toolbar Table 7-1 Description of the buttons Button Operation Button Operation Play Capture a picture Start/Stop clipping video Pause files Audio on and adjust Stop volume/Mute Speed down...
  • Page 89 Figure 7-6 Video Types...
  • Page 90: Chapter 8 Log Searching

    Chapter 8 Log Searching Purpose: The operation, alarm, exception and information of the camera can be stored in log files. You can also export the log files on your demand. Before you start: Please configure network storage for the camera or insert a SD card in the camera. Steps: 1.
  • Page 91: Chapter 9 Others

    Chapter 9 Others 9.1 Managing User Accounts Enter the User Management interface: Configuration >Basic Configuration> Security > User Or Configuration > Advanced Configuration> Security > User The admin user has access to create, modify or delete other accounts. Up to 15 user accounts can be created.
  • Page 92 Figure 9-2 Add a User  Modify a User Steps: 1. Left-click to select the user from the list and click Modify. 2. Modify the User Name, Level or Password. 3. In the Basic Permission field and Camera Configuration field, you can check or uncheck the permissions.
  • Page 93: Authentication

    Figure 9-3 Modify a User  Delete a User Steps: 1. Click to select the user you want to delete and click Delete. 2. Click OK on the pop-up dialogue box to delete the user. 9.2 Authentication Purpose: You can specifically secure the stream data of live view. Steps: 1.
  • Page 94: Anonymous Visit

    the RTSP protocol via the IP address. 3. Select the Web Authentication as Basic or Digest. Basic: The basic authentication method is adopted. Digest: The digest authentication method, which is securer, is adopted. 4. Click Save to save the settings. 9.3 Anonymous Visit Purpose: Enabling this function allows visit for whom doesn’t have the user name and...
  • Page 95: Ip Address Filter

    IP Address Filter Purpose: This function makes it possible for access control. Steps: 1. Enter the IP Address Filter interface: Configuration> Advanced Configuration> Security > IP Address Filter Figure 9-7 IP Address Filter Interface 2. Check the checkbox of Enable IP Address Filter. 3.
  • Page 96: Security Service

    Steps: (1) Left-click an IP address from filter list and click Modify. (2) Modify the IP address in the text filed. Figure 9-9 Modify an IP (3) Click the OK to finish modifying.  Delete an IP Address Left-click an IP address from filter list and click Delete. ...
  • Page 97: Viewing Device Information

    9.6 Viewing Device Information Enter the Device Information interface: Configuration > Basic Configuration> System > Device Information Or Configuration > Advanced Configuration> System > Device Information In the Device Information interface, you can edit the Device Name. Other information of the network camera, such as Model, Serial No., Firmware Version, Encoding Version, Number of Channels, Number of HDDs, Number of Alarm Input and Number of Alarm Output are displayed.
  • Page 98: Restoring Default Settings

    Figure 9-12 Reboot the Device 9.7.2 Restoring Default Settings Steps: 1. Enter the Maintenance interface: Configuration > Basic Configuration> System > Maintenance Or Configuration > Advanced Configuration> System > Maintenance 2. Click Restore or Default to restore the default settings. Figure 9-13 Restore Default Settings Note: After restoring the default settings, the IP address is also restored to...
  • Page 99: Upgrading The System

    4. Click Export and set the saving path to save the configuration file in local storage. Figure 9-14 Import/Export Configuration File 9.7.4 Upgrading the System Steps: 1. Enter the Maintenance interface: Configuration > Basic Configuration> System > Maintenance , or Configuration > Advanced Configuration> System > Maintenance 2.
  • Page 100 service settings interface. Service settings refer to the hardware service the camera supports, and it varies according to the different cameras. For the cameras support IR LED, ABF (Auto Back Focus), Auto Defog, or Status LED, you can go to the hardware service, and select to enable or disable the corresponding service according to the actual demands.
  • Page 101 Appendix Appendix 1 HVS Discovery Tool Software Introduction  Description of HVS Discovery Tool Software HVS Discovery Tool software is a kind of user-friendly and installation-free online device search tool. It searches the active online devices within your subnet and displays the information of the devices.
  • Page 102  Search online devices manually You can also click Refresh to refresh the online device list manually. The newly searched devices will be added to the list. Note: You can click on each column heading to order the information; you can click to expand the device table and hide the network parameter panel on the right side, or click to show the network...
  • Page 103 1. Contact our technical engineers to get the serial code. Note: Serial code is a series of characters combined by the start time and the serial number of the device. 2. Input the code in the Serial code field and click Confirm to restore the default password.
  • Page 104: Appendix 2 Port Mapping

    Appendix 2 Port Mapping The following settings are for TP-LINK router (TL-WR641G). The settings vary depending on different models of routers. Steps: 1. Select the WAN Connection Type, as shown below: Figure A.2.1 Select the WAN Connection Type 2. Set the LAN parameters of the router as in the following figure, including IP address and subnet mask settings.
  • Page 105 another camera as 81, 8001, 555, 8201 with IP 192.168.1.24. Refer to the steps as below: Steps: 1. As the settings mentioned above, map the port 80, 8000, 554 and 8200 for the network camera at 192.168.1.23 2. Map the port 81, 8001, 555 and 8201 for the network camera at 192.168.1.24. 3.
  • Page 106 For further information, including full user and installation manual, and technical support please visit: www.hills.com.au/videosecurity...

This manual is also suitable for:

Nvc-dt1Nvc-df1Nvc-dm1

Table of Contents