Table of Contents System Requirement ............... 5 Chapter 1 Network Connection ............... 6 Chapter 2 Setting the Network Camera over the LAN ............6 2.1.1 Wiring over the LAN ......................6 2.1.2 Detecting and Changing the IP Address ................7 Setting the Network Camera over the WAN ............
Chapter 1 System Requirement Operating System: Microsoft Windows XP SP1 and above version / Vista / Win7 / Server 2003 / Server 2008 32bits CPU: Intel Pentium IV 3.0 GHz or higher RAM: 1G or higher Display: 1024×768 resolution or higher Web Browser: Internet Explorer 6.0 and above version, Safari 5.02 and above version, Mozilla Firefox 3.5 and above version and Google Chrome8 and above versions.
Chapter 2 Network Connection Before you start: Please refer to Section 2.1 Setting the Network Camera over the LAN to set the network camera via a LAN (Local Area Network). Please refer to Section 2.2 Setting the Network Camera over the WAN to set the network camera via a WAN (Wide Area Network).
Figure 2-2 Connecting via a Switch or a Router 2.1.2 Detecting and Changing the IP Address You need the IP address to visit the network camera. Steps: 1. To get the IP address, you can choose either of the following methods: ...
Figure 2-3 HVS Discovery Toll Interface 2.2 Setting the Network Camera over the WAN Purpose: This section explains how to connect the network camera to the WAN with a static IP or a dynamic IP. 2.2.1 Static IP Connection Before you start: Please apply a static IP from an ISP (Internet Service Provider).
2. Assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 Detecting and Changing the IP Address for detailed IP address configuration of the camera. 3. Save the static IP in the router. 4. Set port mapping, e.g., 80, 8000, and 554 ports. The steps for port mapping vary according to the different routers.
Page 11
Connecting the network camera via a router Steps: 1. Connect the network camera to the router. 2. In the camera, assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 Detecting and Changing the IP Address for detailed LAN configuration.
Page 12
Normal Domain Name Resolution Figure 2-7 Normal Domain Name Resolution Steps: 1. Apply a domain name from a domain name provider. 2. Configure the DDNS settings in the DDNS Settings interface of the network camera. Refer to Section 6.3.4 Configuring DDNS Settings for detailed configuration.
Chapter 3 Access to the Network Camera 3.1 Accessing by Web Browsers Steps: 1. Open the web browser. 2. Input the IP address of the network camera in the address bar, e.g., 10.1.1.1 and press the Enter key to enter the login interface. 3.
3.2 Accessing by Client Software Download HVS PC Client software from website www.hills.com.au/videosecurity. You can view the live video and manage the camera with the software. Follow the installation prompts to install the software. The control panel and live view interface of HVS PC Client software are shown as bellow.
Page 17
Figure 3-6 HVS PC Client Configuration Panel Note: For detailed information about the software, please refer to the user manual of the HVS PC Client.
Chapter 4 Live View 4.1 Live View Page Purpose: The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters. Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page.
Toolbar: Operations on the live view page, e.g., live view, capture, record, audio on/off, two-way audio, etc. 4.2 Starting Live View In the live view window as shown in Figure 5-2, click on the toolbar to start the live view of the camera. Figure 4-2 Live View Toolbar Table 4-1 Descriptions of the Toolbar Icon...
Page 20
scheduled recording, please refer to Section 7.2. Note: The captured image will be saved as JPEG file or BMP file in your computer.
Chapter 5 Network Camera Configuration 5.1 Configuring Local Parameters Note: The local configuration refers to the parameters of the live view, record files and captured pictures. The record files and captured pictures are the ones you record and captured using the web browser and thus the saving paths of them are on the PC running the browser.
Page 22
streaming under some network environments. MULTICAST: It’s recommended to select MCAST type when using the Multicast function. For detailed information about Multicast, refer to Section 6.3.1 TCP/IP Settings. Live View Performance: Set the live view performance to Shortest Delay, Real Time, Balanced or Best Fluency.
5.2 Configuring Time Settings Purpose: You can follow the instructions in this section to configure the time synchronization and DST settings. Steps: 1. Enter the Time Settings interface: Configuration > Basic Configuration > System > Time Settings Or Configuration > Advanced Configuration > System > Time Settings Figure 5-2 Time Settings ...
Page 24
Figure 5-3 Time Sync by NTP Server Note: If the camera is connected to a public network, you should use a NTP server that has a time synchronization function, such as the server at the National Time Center (IP Address: 210.72.145.44). If the camera is set in a customized network, NTP software can be used to establish a NTP server for time synchronization.
5.3 Configuring Network Settings 5.3.1 Configuring TCP/IP Settings Purpose: TCP/IP settings must be properly configured before you operate the camera over network. The camera supports both the IPv4 and IPv6. Both versions may be configured simultaneously without conflicting to each other, and at least one IP version should be configured.
and Multicast Address. Notes: The valid value range of MTU is 500 ~ 1500. The Multicast sends a stream to the multicast group address and allows multiple clients to acquire the stream at the same time by requesting a copy from the multicast group address.
HTTPS Port: The default port number is 443, and it can be changed to any port No. which is not occupied. Server Port: The default server port number is 8000, and it can be changed to any port No. ranges from 2000 to 65535. 3.
Page 28
Registration on the DDNS server is required before configuring the DDNS settings of the camera. Steps: 1. Enter the DDNS Settings interface: Configuration > Advanced Configuration > Network > DDNS Figure 5-9 DDNS Settings 2. Check the Enable DDNS checkbox to enable this feature. 3.
Page 29
Figure 5-10 DynDNS Settings IP Server: Steps: (1) Enter the Server Address of the IP Server. (2) Click Save to save the settings. Note: For the IP Server, you have to apply a static IP, subnet mask, gateway and preferred DNS from the ISP.
Figure 5-12 NO-IP DNS Settings (2) Enter the Server Address as www.noip.com (3) Enter the Domain name you registered. (4) Enter the Port number, if needed. (5) Enter the User Name and Password. (6) Click Save and then you can view the camera with the domain name. 5.3.5 Configuring SNMP Settings Purpose: You can set the SNMP function to get camera status, parameters and alarm related...
Page 31
Configuration > Advanced Configuration > Network > SNMP Figure 5-13 SNMP Settings 2. Check the corresponding version checkbox ( ) to enable the feature. 3. Configure the SNMP settings. Note: The settings of the SNMP software should be the same as the settings you configure here.
5.3.6 Configuring 802.1X Settings Purpose: The IEEE 802.1X standard is supported by the network cameras, and when the feature is enabled, the camera data is secured and user authentication is needed when connecting the camera to the network protected by the IEEE 802.1X. Before you start: The authentication server must be configured.
QoS (Quality of Service) can help solve the network delay and network congestion by configuring the priority of data sending. Steps: 1. Enter the QoS Settings interface: Configuration >Advanced Configuration > Network > QoS Figure 5-15 QoS Settings 2. Configure the QoS settings, including video / audio DSCP, event / alarm DSCP and Management DSCP.
2. Check the checkbox to enable the UPnP™ function. The name of the device when detected online can be edited. Figure 5-16 Configure UPnP Settings 5.3.9 Email Sending Triggered by Alarm Purpose: The system can be configured to send an Email notification to all designated receivers if an alarm event is detected, e.g., motion detection event, video loss, video tampering, etc.
Page 35
Figure 5-17 Email Settings 3. Configure the following settings: Sender: The name of the email sender. Sender’s Address: The email address of the sender. SMTP Server: The SMTP Server IP address or host name (e.g., smtp.263xmail.com). SMTP Port: The SMTP port. The default TCP/IP port for SMTP is 25 (not secured).
Name and password. Choose Receiver: Select the receiver to which the email is sent. Up to 2 receivers can be configured. Receiver: The name of the user to be notified. Receiver’s Address: The email address of user to be notified. 4.
Page 37
Steps: 1. Enter the FTP Settings interface: Configuration >Advanced Configuration > Network > FTP Figure 5-19 FTP Settings 2. Configure the FTP settings; and the user name and password are required for login the FTP server. Directory: In the Directory Structure field, you can select the root directory, parent directory and child directory.
3. Click Save to save the settings. Note: If you want to upload the captured pictures to FTP server, you have to enable the continuous snapshot or event-triggered snapshot on Snapshot page. For detailed information, please refer to the Section 6.6.7. 5.3.12 HTTPS Settings Purpose: HTTPS provides authentication of the web site and associated web server that one is...
Page 39
1) Click Create button to enter the creation interface. Figure 5-22 Create Self-signed Certificate 2) Enter the country, host name/IP, validity and other information. 3) Click OK to save the settings. Note: If you already had a certificate installed, the Create Self-signed Certificate is grayed out.
5.4 Configuring Video and Audio Settings 5.4.1 Configuring Video Settings Steps: 1. Enter the Video Settings interface: Configuration >Basic Configuration > Video / Audio > Video Or Configuration > Advanced Configuration > Video / Audio > Video Figure 5-24 Configure Video Settings 2.
Page 41
Resolution: Select the resolution of the video output. Bitrate Type: Select the bitrate type to constant or variable. Video Quality: When bitrate type is selected as Variable, 6 levels of video quality are selectable. Frame Rate: Set the frame rate to 1/16~25 fps. The frame rate is to describe the frequency at which the video stream is updated and it is measured by frames per second (fps).
appear not fluent. 4. Click Save to save the settings. 5.4.2 Configuring Audio Settings Steps: 1. Enter the Audio Settings interface Configuration > Basic Configuration > Video / Audio > Audio Or Configuration > Advanced Configuration > Video / Audio > Audio Figure 5-25 Audio Settings 2.
Page 43
quality of the ROI whereas the background information is less focused. Steps: 1. Enter the ROI settings interface Configuration > Advanced Configuration > Video / Audio >ROI Figure 5-26 Region of Interest Settings 2. Draw the region of interest on the image. There are four regions can be drawn. 3.
The fixed region encoding is the ROI encoding for the manually configured area. And you can choose the Image Quality Enhancing level for ROI encoding, and you can also name the ROI area. The dynamic region refers to the ROI defined by intelligent analysis such as human face detection.
Figure 5-27 Display Settings of Day/night Auto-switch Image Adjustment Brightness describes bright of the image, which ranges from 1~100, and the default value is 50. Contrast describes the contrast of the image, which ranges from 1~100, and the default value is 50. Saturation describes the colorfulness of the image color, which ranges from 1~100, and the default value is 50.
Page 46
1/100,000s. Adjust it according to the actual luminance condition. Focus Settings For the camera supports electronic lens, you can set the focus mode as Manual or Auto. If auto is selected, the focus is adjusted automatically, and if manual is selected, you can control the lens by adjusting the zoom, focus, lens initialization, and auxiliary focus via the PTZ control interface.
Page 47
AUTO, and the IR LED changes according to the actual luminance. E.g.: if the current scene is bright enough, then the IR LED adjusts itself to lower power; and if the scene is not bright enough, the IR LED adjusts itself to higher power. Select Manual, and you can adjust the IR LED by adjusting the distance.
Page 48
the image is misty. It enhances the subtle details so that the image appears clearer. Electrical Image Stabilizer: EIS reduces the effects of vibration in a video. Grey Scale: You can choose the range of the grey scale as [0-255] or [16-235]. ...
Figure 5-30 Day/Night Scheduled-Switch Configuration Interface Steps: 1. Click the time line to select the start time and the end time of the switch. 2. Click Common tab to configure the common parameters applicable to the day mode and night mode. Note: The detailed information of each parameter please refers to day/night auto switch session.
Page 50
Configuration > Advanced Configuration > Image > OSD Settings Figure 5-31 OSD Settings 2. Check the corresponding checkbox to select the display of camera name, date or week if required. 3. Edit the camera name in the text field of Camera Name. 4.
Figure 5-33 Adjust OSD Location 7. Click Save to activate the above settings. 5.5.3 Configuring Text Overlay Settings Purpose: You can customize the text overlay. Steps: 1. Enter the Text Overlay Settings interface: Configuration > Advanced Configuration > Image > Text Overlay Figure 5-34 Text Overlay...
2. Check the checkbox in front of textbox to enable the on-screen display. 3. Input the characters in the textbox. 4. (Optional)Use the mouse to click and drag the red text frame in the live view window to adjust the text overlay position. 5.
5. Click Stop Drawing to finish drawing or click Clear All to clear all of the areas you set without saving them. 6. Click Save to save the settings. 5.5.5 Configuring Picture Overlay Purpose: Picture overlay enables you to overlay a picture on the image. This function enables a certain enterprise or users to overlay their logo on the image.
5.6 Configuring and Handling Alarms This section explains how to configure the network camera to respond to alarm events, including motion detection, video tampering, alarm input, alarm output, exception, face detection, audio exception detection, intrusion detection, defocus detection, and scene change detection, etc. These events can trigger the linkage methods, such as Notify Surveillance Center, Send Email, Trigger Alarm Output, etc.
Page 55
Configuration > Advanced Configuration> Events > Motion Detection (2)Check the checkbox of Enable Motion Detection. (3)Check the checkbox of Enable Dynamic Analysis for Motion if you want to mark the detected objects with green rectangles. Select Disable for rules if you don’t want the detected objected Note: displayed with the rectangles.
Page 56
Figure 5-38 Arming Time (1)Click Edit to edit the arming schedule. The Figure 6-34 shows the editing interface of the arming schedule. (2)Choose the day you want to set the arming schedule. (3)Click to set the time period for the arming schedule. (4)(Optional) After you set the arming schedule, you can copy the schedule to other days.
Page 57
3. Set the Alarm Actions for Motion Detection. Check the checkbox to select the linkage method. Notify surveillance center, send email, upload to FTP, trigger channel and trigger alarm output are selectable. You can specify the linkage method when an event occurs. Figure 5-40 Linkage Method ...
Page 58
detailed information. Trigger Alarm Output Trigger one or more external alarm outputs when an event occurs. Note: To trigger an alarm output when an event occurs, please refer to Section 6.6.4 to set the related parameters. Expert Configuration Expert mode is mainly used to configure the sensitivity and proportion of object on area of each area for different day/night switch.
Page 59
Day/Night Auto-Switch Steps: (1) Draw the detection area as in the normal configuration mode. Up to 8 areas are supported. (2) Select Auto-Switch for Switch Day and Night Settings. Figure 5-42 Day/Night Auto-Switch (3) Select the area by clicking the area No. (4) Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area in the daytime.
Figure 5-43 Day/Night Scheduled-Switch (3) Select the start time and the end time for the switch timing. (4) Select the area by clicking the area No. (5) Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area in the daytime.
Figure 5-44 Video Tampering Alarm 2. Check Enable Video Tampering checkbox to enable the video tampering detection. 3. Set the video tampering area; refer to Task 1 Set the Motion Detection Area in Section 6.6.1. 4. Click Edit to edit the arming schedule for video tampering. The arming schedule configuration is the same as the setting of the arming schedule for motion detection.
2. Choose the alarm input No. and the Alarm Type. The alarm type can be NO (Normally Open) and NC (Normally Closed). Edit the name to set a name for the alarm input (optional). Figure 5-45 Alarm Input Settings 3. Click Edit to set the arming schedule for the alarm input. Refer to Task 2 Set the Arming Schedule for Motion Detection in Section 6.6.1.
Configuration>Advanced Configuration> Events > Alarm Output 2. Select one alarm output channel in the Alarm Output drop-down list. You can also set a name for the alarm output (optional). 3. The Delay time can be set to 5sec, 10sec, 30sec, 1min, 2min, 5min, 10min or Manual.
Steps: 1. Enter the Exception Settings interface: Configuration > Advanced Configuration> Events > Exception 2. Check the checkbox to set the actions taken for the Exception alarm. Refer to Task 3 Set the Alarm Actions Taken for Motion Detection in Section 6.6.1. Figure 5-47 Exception Settings 3.
Page 65
Figure 5-48 Draw Virtual Plane And you can select the directions as A<->B, A ->B, and B->A. A<->B: Only the arrow on the B side shows; when an object going across the plane with both direction can be detected and alarms are triggered. A->B: Only the object crossing the virtual plane from the A side to the B side can be detected.
5.6.7 Configuring Intrusion Detection Intrusion detection can set an area in the surveillance scene and once the area is been entered, a set of alarm action is triggered. Steps: 1. Check the Enable Intrusion Detection checkbox. 2. Click Draw Area, and then draw a rectangle on the image as a defense region. Note: when you draw the rectangle, all lines should connect end to end to each other.
part of the object which can trigger the alarm. For example, when you set the percentage as 50%, half of the object entering the region will trigger the alarm. Arming Schedule is configured to set the time you want the function to be enabled.
affected by the external factors; such as the intentional rotation of the camera. Steps: 1. Check the Enable Scene Change Detection checkbox. Sensitivity: Range [1%-100%]. The higher the sensitivity, the easier the change of scene can trigger the alarm. Arming Schedule is configured to set the time you want the function to be enabled.
Figure 5-52 Behavior Analysis VCA Info Behavior Analysis Version: It lists the version of the algorithms library. Display information includes the display on picture and display on stream. Display Target info. on Alarm Picture: There will be a frame on the target on the uploaded alarm picture if the checkbox is checked.
Page 70
1. Check the checkbox of Camera Calibration to enable this function. 2. Select the calibration mode as Input Basic Data or Draw on Live View Video. Input Basic Data: Input the mounting height, viewing angle, and horizon ratio of the camera manually. Draw on Live View Video: Click Draw Verification Line (Horizontal) / (Vertical) to draw a horizontal/vertical line in the live view, and input the actual length in Real Length field.
Page 71
and right click to finish the area drawing. Notes: ● Polygon area with up to 10 sides is supported. ● Click Delete to delete the drawn areas. ● If live view is stopped, there is no way to draw the shield regions. 3.
Page 72
2. Check the checkbox of Rule to enable rules of behavior analysis. 3. Select the rule type as Null, Traversing Virtual Plane, Intrusion, Region Entrance, and Region Exiting. Notes: ● If you select the rule type as Null, the rule option is invalid, and no behavior analysis can be configured.
Page 73
Figure 5-55 Advanced Configuration Detection Sensitivity [0~4]: Refers to the sensitivity of the camera detects a target. The higher the value, the easier a target be recognized, and the higher the misinformation is. The default value of 3 is recommended. Background Update Rate [0~4]: It refers to the speed of the new scene replaces the previous scene.
2. Select the Filter Type as Actual Size or Pixel. Actual Size: Input the length and width of the maximum size and the length and width of the minimum size. Only the target size is between the min. size and max. size will trigger the alarm.
Page 75
Figure 5-56 Face Capture VCA Info Face Capture Version: It lists the version of the algorithms library. Display information includes the display on picture and display on stream. Display Target info. on Alarm Picture: There will be a frame on the target on the uploaded alarm picture if the checkbox is checked.
Page 76
Rule Steps: 1. Check the checkbox of Rule to enable rules of face capture. 2. Click Minimize Pupil Distance to draw the minimum pupil distance. The distance of the drawn pupil will be displayed on the box below the live view. The minimize pupil distance refers to the minimum square size composed by the area between two pupils, and it is the basic standard for a camera to identify a target.
Page 77
every frame. Capture Sensitivity [0~20]: The threshold the camera treats the target as a face. Only when the face score generated by the algorithm is equal or higher than the value, the camera will treat the target as a face. The default value of 2 is recommended. Face Capture Advanced Parameters: Face Exposure: Check the checkbox to enable the face exposure.
Chapter 6 Storage Settings Before you start: To configure record settings, please make sure that you have the network storage device within the network or the SD card inserted in your camera. 6.1 Configuring NAS Settings Before you start: The network disk should be available within the network and properly configured to store the recorded files, log files, etc.
Page 79
Please refer to the User Manual of NAS for creating the file path. (4) Click Save to add the network disk. 2. Initialize the added network disk. (1) Enter the HDD Settings interface (Advanced Configuration > Storage > Storage Management), in which you can view the capacity, free space, status, type and property of the disk.
Figure 6-4 Quota Settings Notes: Up to 8 NAS disks can be connected to the camera. To initialize and use the SD card after insert it to the camera, please refer to the steps of NAS disk initialization. 6.2 Configuring Recording Schedule Purpose: There are two kinds of recording for the cameras: manual recording and scheduled...
Page 81
Figure 6-5 Recording Schedule Interface 2. Check the checkbox of Enable Record Schedule to enable scheduled recording. 3. Set the record parameters of the camera. Figure 6-6 Record Parameters Pre-record: The time you set to start recording before the scheduled time or the event.
Page 82
The Post-record time can be configured as 5 s, 10 s, 30 s, 1 min, 2 min, 5 min or 10 min. Note: The record parameter configurations vary depending on the camera model. 4. Click Edit to edit the record schedule. Figure 6-7 Record Schedule 5.
Page 83
to the time of the schedule. Record Triggered by Motion Detection If you select Motion Detection, the video will be recorded when the motion is detected. Besides configuring the recording schedule, you have to set the motion detection area and check the checkbox of Trigger Channel in the Linkage Method of Motion Detection Settings interface.
Figure 6-8 Edit Record Schedule (3) Check the checkbox of Select All and click Copy to copy settings of this day to the whole week. You can also check any of the checkboxes before the date and click Copy. (4) Click OK to save the settings and exit the Edit Record Schedule interface. 6.
Page 85
Check the Enable Event-triggered Snapshot checkbox to check event-triggered snapshot. 3. Select the quality of the snapshot. 4. Set the time interval between two snapshots. 5. Click Save to save the settings. Uploading to FTP You can follow below configuration instructions to upload the snapshots to FTP. ...
Chapter 7 Playback Purpose: This section explains how to view the remotely recorded video files stored in the network disks or SD cards. Steps: 1. Click Playback on the menu bar to enter playback interface. Figure 7-1 Playback Interface 2. Select the date and click Search. Figure 7-2 Search Video 3.
Page 88
The toolbar on the bottom of Playback interface can be used to control playing process. Figure 7-3 Playback Toolbar Table 7-1 Description of the buttons Button Operation Button Operation Play Capture a picture Start/Stop clipping video Pause files Audio on and adjust Stop volume/Mute Speed down...
Chapter 8 Log Searching Purpose: The operation, alarm, exception and information of the camera can be stored in log files. You can also export the log files on your demand. Before you start: Please configure network storage for the camera or insert a SD card in the camera. Steps: 1.
Chapter 9 Others 9.1 Managing User Accounts Enter the User Management interface: Configuration >Basic Configuration> Security > User Or Configuration > Advanced Configuration> Security > User The admin user has access to create, modify or delete other accounts. Up to 15 user accounts can be created.
Page 92
Figure 9-2 Add a User Modify a User Steps: 1. Left-click to select the user from the list and click Modify. 2. Modify the User Name, Level or Password. 3. In the Basic Permission field and Camera Configuration field, you can check or uncheck the permissions.
Figure 9-3 Modify a User Delete a User Steps: 1. Click to select the user you want to delete and click Delete. 2. Click OK on the pop-up dialogue box to delete the user. 9.2 Authentication Purpose: You can specifically secure the stream data of live view. Steps: 1.
the RTSP protocol via the IP address. 3. Select the Web Authentication as Basic or Digest. Basic: The basic authentication method is adopted. Digest: The digest authentication method, which is securer, is adopted. 4. Click Save to save the settings. 9.3 Anonymous Visit Purpose: Enabling this function allows visit for whom doesn’t have the user name and...
IP Address Filter Purpose: This function makes it possible for access control. Steps: 1. Enter the IP Address Filter interface: Configuration> Advanced Configuration> Security > IP Address Filter Figure 9-7 IP Address Filter Interface 2. Check the checkbox of Enable IP Address Filter. 3.
Steps: (1) Left-click an IP address from filter list and click Modify. (2) Modify the IP address in the text filed. Figure 9-9 Modify an IP (3) Click the OK to finish modifying. Delete an IP Address Left-click an IP address from filter list and click Delete. ...
9.6 Viewing Device Information Enter the Device Information interface: Configuration > Basic Configuration> System > Device Information Or Configuration > Advanced Configuration> System > Device Information In the Device Information interface, you can edit the Device Name. Other information of the network camera, such as Model, Serial No., Firmware Version, Encoding Version, Number of Channels, Number of HDDs, Number of Alarm Input and Number of Alarm Output are displayed.
Figure 9-12 Reboot the Device 9.7.2 Restoring Default Settings Steps: 1. Enter the Maintenance interface: Configuration > Basic Configuration> System > Maintenance Or Configuration > Advanced Configuration> System > Maintenance 2. Click Restore or Default to restore the default settings. Figure 9-13 Restore Default Settings Note: After restoring the default settings, the IP address is also restored to...
4. Click Export and set the saving path to save the configuration file in local storage. Figure 9-14 Import/Export Configuration File 9.7.4 Upgrading the System Steps: 1. Enter the Maintenance interface: Configuration > Basic Configuration> System > Maintenance , or Configuration > Advanced Configuration> System > Maintenance 2.
Page 100
service settings interface. Service settings refer to the hardware service the camera supports, and it varies according to the different cameras. For the cameras support IR LED, ABF (Auto Back Focus), Auto Defog, or Status LED, you can go to the hardware service, and select to enable or disable the corresponding service according to the actual demands.
Page 101
Appendix Appendix 1 HVS Discovery Tool Software Introduction Description of HVS Discovery Tool Software HVS Discovery Tool software is a kind of user-friendly and installation-free online device search tool. It searches the active online devices within your subnet and displays the information of the devices.
Page 102
Search online devices manually You can also click Refresh to refresh the online device list manually. The newly searched devices will be added to the list. Note: You can click on each column heading to order the information; you can click to expand the device table and hide the network parameter panel on the right side, or click to show the network...
Page 103
1. Contact our technical engineers to get the serial code. Note: Serial code is a series of characters combined by the start time and the serial number of the device. 2. Input the code in the Serial code field and click Confirm to restore the default password.
Appendix 2 Port Mapping The following settings are for TP-LINK router (TL-WR641G). The settings vary depending on different models of routers. Steps: 1. Select the WAN Connection Type, as shown below: Figure A.2.1 Select the WAN Connection Type 2. Set the LAN parameters of the router as in the following figure, including IP address and subnet mask settings.
Page 105
another camera as 81, 8001, 555, 8201 with IP 192.168.1.24. Refer to the steps as below: Steps: 1. As the settings mentioned above, map the port 80, 8000, 554 and 8200 for the network camera at 192.168.1.23 2. Map the port 81, 8001, 555 and 8201 for the network camera at 192.168.1.24. 3.
Page 106
For further information, including full user and installation manual, and technical support please visit: www.hills.com.au/videosecurity...