Content Introduction 3 Network access 4 Checking your web browser security level 4 Activating the camera 5 Overview of the camera web browser 7 Camera configuration 9 Configuration menu overview 9 Local configuration 10 System time 11 Network settings 12 Recording parameters 20 Video image 23 OSD (On Screen Display) 27...
Page 4
Searching event logs 66 Index 69 TruVision Series 5 IP Camera Configuration Manual...
Introduction This is the user manual for the following TruVision IP camera models: TVB-5501 (3MPX IP bullet camera) TVB-5502 (8MPX IP bullet camera) TVT-5501 (3MPX IP turret camera) TVT-5502 (8MPX IP turret camera) TVD-5501 (3MPX IP dome camera) ...
Network access This manual explains how to configure the camera over the network with a web browser. TruVision IP cameras can be configured and controlled using Microsoft Internet Explorer (IE) and other browsers. The procedures described use Microsoft Internet Explorer (IE) web browser. Checking your web browser security level When using the web browser interface, you can install ActiveX controls to connect and view video using Internet Explorer.
To add the camera’s IP address to Internet Explorer’s list of trusted sites: 1. Open Internet Explorer. 2. Click Tools, and then Internet Options. 3. Click the Security tab, and then select the Trusted sites icon. 4. Click the Sites button.
Page 8
Note: A valid password range must be between 8 and 16 characters. You can use a combination of numbers, lower and upper case letters, and special characters : _ - , . * & @ / $ ? Space. The password must contain characters from at least two of these groups.
6. Input the password and click the Save button to activate your IP address modification. Overview of the camera web browser The camera web browser lets you view, record, and play back recorded videos as well as manage the camera from any PC with Internet access. The browser’s easy-to-use controls give you quick access to all camera functions.
Page 10
Table 1: Overview of the web browser interface Name Description Live view Click to view live video. Playback Click to play back video. Click to search for event logs. There are three main types: Alarm, Exception and Operation. Configuration Click to display the configuration window for setting up the camera. Viewer View live video.
Camera configuration This chapter explains how to configure the cameras through a web browser. Once the camera hardware has been installed, configure the camera’s settings through the web browser. You must have administrator rights in order to configure the cameras over the internet.
Configuration menus Description Video/Audio Defines recording parameters. Image Defines the image parameters, OSD settings, overlay text, and privacy mask. See “Video image” on page 23 for further information on the setup. Security Defines who can use the camera, their passwords and access privileges, RTSP authentication, IP address filter, and telnet access.
Table 3: Overview of the Local configuration window Parameters Description Live View Parameters Protocol Specifies the network protocol used. Options include: TCP, UDP, MULTICAST and HTTP. Live View Performance Specifies the transmission speed. Options include: Shortest Delay or Auto. Rules It refers to the rules on your local browser.
To define the system time and date: 1. From the menu toolbar, click Configuration > System > Time Settings. 2. From the Time Zone drop-down list, select the time zone that is the closest to the camera’s location. 3. Under Time Sync, check one of the options for setting the time and date: Synchronize with an NTP server: Check the...
Page 15
Figure 4: Network window (TCP/IP tab shown) Table 4: Network parameters Menu tabs Description TCP/IP NIC Type: Enter the NIC type. Default is Auto. Other options include: 10M Half-dup, 10M Full-dup, 100M Half-dup and 100M Full-dup. DHCP: Enable to automatically obtain an IP address and other network settings from that server.
Page 16
Menu tabs Description See page 15 for setup information. Port HTTP Port: The HTTP port is used for remote internet browser access. Enter the port used for the Internet Explorer (IE) browser. Default value is RTSP Port: RTSP (Real Time Streaming Protocol) is a network control protocol designed for use in entertainment and communications systems to control streaming media servers.
Page 17
Menu tabs Description Email Enter the email address to which messages are sent when an alarm occurs. See page 17 for setup information. A NAT (Network Address Translation) is used for network connection. Select the port mapping mode: auto or manual. See page 18 for setup information.
Page 18
the port number (443 (HTTPS)), and your user name and password used to log into your DDNS account. The domain name displayed under “Host Name” is that which you created on the DynDNS web site. • NO-IP: Enter the address of the NO-IP, host name for your camera, the port number, your user name and password..
Page 19
To define the FTP parameters: 1. From the menu toolbar, click Configuration > Network > FTP. 2. Configure the FTP settings, including server address, port, user name, password, directory, and upload type. Anonymous: Check the check box to enable the anonymous access to the FTP server.
Page 20
Sender’s Address: The email address of the sender. SMTP Server: The SMTP Server, IP address or host name. SMTP Port: The SMTP port. The default is 25. E-mail Encryption: Encrypt via SSL, TLS. NONE is default. Attached Snapshot: Check the check box of Attached Snapshot if you want to send emails with attached alarm images.
Page 21
2. To create a self-signed certificate: Click the Create button beside “Create Self-signed Certificate”. Enter the country, host name/IP, validity and the other information requested. Click to save the settings. -Or- To create a certificate request: Click the Create button beside “Create Certificate Request”. Enter the country, host name/IP and the other information requested.
3. Click to save the settings. Download the certificate request and submit it to the trusted certificate authority for signature, such as Symantec or RSA. After receiving the signed valid certificate, upload the certificate to the device Recording parameters You can adjust the video and audio recording parameters to obtain the picture quality and file size best suited to your needs.
Page 23
Parameter descriptions Video Type: Specifies the stream type you wish to record. Select Video Stream to record video stream only. Select Video&Audio to record both video and audio streams. Note: Video&Audio is only available for those camera models that support audio.
Page 24
To configure audio settings: 1. From the menu toolbar, click Configuration > Video/Audio > Audio. To configure ROI settings: 1. From the menu toolbar, click Configuration > Video/Audio > ROI. 2. Select the desired channel from the drop-down list. 3. Draw the region of interest on the image. Up to four regions can be drawn. 4.
When Dual-VCA mode is enabled, the camera sends video analytics results (metadata) to an NVR or other platforms to generate a VCA alarm. For example, with an Interlogix NVR (please check Interlogix website for the latest NVR models supporting this feature), you can draw a virtual line in the NVR playback window, and search the objects or people crossing this virtual line.
Page 26
Figure 6: Camera image settings menu – Display Settings tab Parameter Description 1. Image Settings Auto D/N Switch The camera automatically switches between day and night mode. All image settings remain the same for both modes. The image settings are: Image Adjustment, Exposure Settings, Day/Night Switch, Backlight Settings, White Balance, Image Enhancement, and Video Adjustment.
Page 27
Parameter Description Common: The settings are identical for both day and night modes for Exposure Settings, Day/Night Switch, and Video Adjustment. Day: Image Adjustment, Exposure Settings, Backlight Settings, White Balance, and Image Enhancement for day mode only. Night: Image Adjustment, Exposure Settings, Backlight Settings, White Balance, and Image Enhancement for night mode only.
Page 28
Parameter Description IR Light Select On/OFF to Enable/disable IR. Enable: The IR LEDs are ON when the camera changes to night mode. Disable: The IR LEDs are OFF when the camera changes to night mode Note: The IR LEDs are always OFF in day mode. 5.
Parameter Description Hallway View This function adjusts the image to suit long narrow scenes, such as corridors. Produces an image with a 9:16 ratio aspect to avoid including walls. During installing, turn the camera to 90 degrees or rotate the 3-axis lens to 90 degrees, and then set the rotate mode as ON.
7. Select a display mode for the camera from the Display Mode drop-down list box. Display modes include: • Transparent & Not flashing. The image appears through the text. • Transparent & Flashing. The image appears through the text. The text flashes on and off.
To add on-screen text: 1. From the menu toolbar, click Configuration > Image > Text Overlay. 2. Select the check box for the first line of text. 3. Enter the text in the text box. 4. Use the mouse to click and drag the red text in the live view window to adjust the text overlay position.
5. Click Stop Drawing to finish drawing, or click Clear All to clear all of the areas you set without saving them. 6. Click Save to save changes. Motion detection alarms You can define motion detection alarms. A motion detection alarm refers to an alarm triggered when the camera detects motion.
Page 33
Figure 9: Motion detection window Defining a motion detection alarm requires the following tasks: 1. Area settings: Define the on-screen area that can trigger a motion detection alarm and the detection sensitivity level (see Figure 9, item 1). 2. Arming schedule: Define the schedule during which the system detects motion (see Figure 9, item 2).
Page 34
To set up motion detection in normal mode: 1. From the menu toolbar, click Configuration > Basic Event > Motion Detection. 2. Select the Enable Motion Detection check box. Select the Enable Dynamic Analysis for Motion check box if you want to see real-time motion events. Note: If you do not want the detected object to be marked with the green frame, select...
Page 35
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Send an email to a specified address when there is a motion detection alarm. Note: You must configure email settings before enabling this option.
Page 36
4. Under Image Settings, select OFF, Auto D/N Switch or Scheduled D/N settings. Default is OFF. Auto D/N Switch and Scheduled D/N settings allow you to set different settings for day and night as well as different periods. 5. Select Area No.
Page 37
12. Choose the day and click to set the detailed time period. You can copy the schedule to other days. 13. Click to save changes. 14. Specify the linkage method when an event occurs. Check one or more response methods for the system when a motion detection alarm is triggered. Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs.
Tamper-proof alarms You can configure the camera to trigger an alarm when the lens is covered and to take an alarm response action. Figure 10: Tamper-proof alarm window To set up tamper-proof alarms: 1. From the menu toolbar, click Configuration >...
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Sends an email to a specified address when there is an alarm triggered. Note: You must configure email settings before enabling this option.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Sends an email to a specified address when there is an exception alarm. Note: You must configure email settings before enabling this option.
Upload Snapshot Capture the image when an alarm is triggered and upload the picture to NAS or FTP server. Note: To upload the snapshot to NAS, you must first configure the NAS settings. See “NAS settings” on page 49 for further information.
Page 42
Figure 12: Face detection window To define face detection: 1. From the menu toolbar, click Configuration > Smart Event > Face Detection. 2. Select the Enable Face Detection check box to enable the function. 3. Select the Enable Dynamic Analysis check box for Face Detection if you want the...
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Sends an email to a specified address when there is a face detection alarm. Note: You must configure email settings before enabling this option.
Page 44
To define cross line detection: 1. From the menu toolbar, click Configuration > Smart Event > Cross Line. 2. Check the Enable Cross Line detection check box (1) to enable the function. 3. Click Draw Area (2), and a crossing plane will show on the image. 4.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Send an email to a specified address when there is a cross line detection alarm. Note: You must configure email settings before enabling this option.
Page 46
To define intrusion detection: 1. From the menu toolbar, click Configuration > Smart Event > Intrusion Detection. 2. Select the Enable Intrusion Detection check box to enable the function. 3. Click Draw Area, and then draw a rectangle on the image as the defense region. When you draw the rectangle, all lines should connect end-to-end to each other.
7. Click Save to save changes. Unattended Baggage Detection Unattended baggage detection function detects the objects left over in the pre-defined region such as the baggage, purse, dangerous materials, etc. A series of actions can be taken when the alarm is triggered. Figure 20: Unattended baggage detection window To define unattended baggage detection: 1.
Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Send an email to a specified address when there is a motion detection alarm. Note: You must configure email settings before enabling this option.
Page 49
To define object removal detection: 1. From the menu toolbar, click Configuration > Smart Event > Object Removal Detection. 2. Select the Enable Unattended Baggage Detection check box to enable the function. 3. Click Draw Area, and then draw a rectangle on the image as the defense region. When you draw the rectangle, all lines should connect end-to-end to each other.
Snapshot parameters You can configure scheduled snapshots and event-triggered snapshots. The captured snapshots can be stored in the SD card (if supported) or the NAS. You can also upload the snapshots to an FTP server. You can set up the format, resolution and quality of the snapshots. The quality can be low, medium, or high.
To set up scheduled snapshots: 1. From the menu toolbar, click Configuration > Storage > Snapshot. 2. Select Enable Timing Snapshot check box to enable continuous snapshots. 3. Select the desired format of the snapshot, such as JPEG. 4. Select the desired resolution and quality of the snapshot. 5.
Figure 22: NAS menu To set up a NAS system: 1. From the menu toolbar, click Configuration > Storage > NAS. 2. Enter the IP address of the network disk, and the NAS file path. 3. Click Save to save changes. Storage devices Use the storage management window to display the capacity, free space available, and the working status of the HDD of the NAS and the SD card in the camera.
Figure 14: Storage window To format the storage devices: 1. From the menu toolbar, click Configuration > Storage > Storage Management. 2. Check the HDD Number column to select the storage. 3. Define the quota percentage for snapshots and recordings, modify the values for each in Percentage of Snapshot Percentage of...
Page 54
Pre-record time The pre-record time is set to start recording before the scheduled time or event. For example, if an alarm triggers recording at 10:00, and the pre-record time is set to 5 seconds, the camera starts to record at 9:59:55. The pre-record time can be configured as No Pre-record, 5 s, 10 s, 15 s, 20 s, 25 s, 30 s, or Not Limited.
Page 55
4. Select whether the recording will be for the whole week (All Day recording) or for specific days of the week. If you have selected “All day”, select one of the record types to record from the drop- down list box: •...
Page 56
6. Set the recording periods for the other days of the week if required. Click Copy to copy the recording periods to another day of the week. 7. Click Save to save changes. Note: If you set the record type to “Motion detection” or “Alarm”, you must also define the arming schedule in order to trigger motion detection or alarm input recording.
Camera management This chapter describes how to use the camera once it is installed and configured. The camera is accessed through a web browser. User management This section describes how to manage users. You can: Add or delete users ...
Page 58
Operator: This user can only change the configuration of his/her own account. An operator cannot create or delete other users. Viewer: This user has the permission of live view, playback and log search. However, they cannot change any configuration settings. Add and delete users The administrator can create up to 31 users.
Basic Permissions Camera Configuration Alarm Output Remote: Video Output Control Remote: Serial Port Control 7. Click to save the settings. To delete a user: 1. Select the desired user under the User tab. 2. Click Delete button. A message box appears. Note: Only the administrator can delete a user.
To define RTSP authentication: 1. From the menu toolbar, click Configuration > Security > RTSP Authentication. 2. Select the Authentication type Enable Disable in the drop-down list to enable or disable the RTSP authentication. 3. Click Save to save the changes. IP address filter This function allows you to give or deny access rights to defined IP addresses.
Defining the security service This function enables Telnet and let you define its password. It is only used by Technical Support. Figure 18: Security service window To enable the illegal login lock: 1. Click Configuration > Security > Security Service. 2.
To upgrade firmware version: 1. Download on to your computer the latest firmware from our web site at: www.interlogix.com/video/product/truvision-ip-open-standards-outdoor-cameras/ - Or - www.utcfssecurityproductspages.eu/videoupgrades/ 2. When the firmware file is downloaded to your computer, extract the file to the desired destination.
Page 63
3. From the menu toolbar, click Configuration > System > Maintenance. Select the Firmware Firmware Directory option. Then click the Browse button to locate latest firmware file on your computer. • Firmware directory – Locate the upgrading folder of Firmware files. The camera will choose the corresponding firmware file automatically.
Reboot camera It is easy to reboot the camera remotely. To reboot the camera through the web browser: 1. In Configuration > System, click the Maintenance tab. 2. Click the Reboot button to reboot the device. 3. Click in the pop-up message box to confirm reboot operation. TruVision Series 5 IP Camera Configuration Manual...
Camera operation This chapter describes how to use the camera once it is installed and configured. Logging on and off You can easily log out of the camera browser window by clicking the Logout button on the menu toolbar. You will be asked each time to enter your user name and password when logging in.
Playing back recorded video You can easily search and play back recorded video in the playback interface. Note: You must configure the NAS or insert an SD card in the dome camera to be able to use the playback functions. See “Storage devices” on page 50 for more information. To search recorded video stored on the camera’s storage device for playback, click Playback on the menu toolbar.
Page 67
Name Description Enable digital zoom. Capture a snapshot image of the playback video. Start/Stop clipping video files. Recording type The color code displays the recording type. Recording types are schedule recording, alarms recording and manual recording. The recording type name is also displayed in the current status window.
Page 68
To archive recorded snapshots: 1. Click to open the snapshots search window. 2. Select the snapshot type as well as the start and end time. 3. Click Search to search for the snapshots. 4. Select the desired snapshots, and click Download to download them.
Page 69
Figure 21: Log window 1. Major Type 4. Start search 5. Save searched logs 2. Minor Type 3. Start and end search time You can search for recorded logs by the following criteria: Major type: There are four types of logs: All Types, Alarm, Exception, and Operation. See Table 6 below for their descriptions.
Page 70
Main log type Minor log types: Description of events included Operation Power On, Abnormal Shutdown, Remote Reboot, Remote Login, Remote Logout, Remote Configure parameters, Remote Start Record, Remote Stop Record, Remote PTZ Control, Remote Initialize HDD, Remote Playback by File, Remote Playback by Time, Remote Export Config file, Remote import config file, Remote Get Parameters, Remote Get Working Status, Establish Transparent Channel, Disconnect Transparent Channel, Start Bidirectional Audio, Stop...
Page 71
Index Events searching logs, 66 Alarm inputs Exception alarms set up, 38 types, 37 Alarm outputs set up, 38 Alarm types motion detection, 30 Firmware upgrade, 60 Archive files using TruVision Navigator, 61 recorded files, 65 snapshots of recorded files, 65 Archived files play back, 65 capacity, 50...
Page 72
SNMP, 16 Snapshot, 48 TC/IP, 15 Snapshots UPnP, 17 archive snapshots from recorded files, 65 NTP synchronization, 11 save during live view mode, 63 System time set up, 11 Object removal detection, 46 Tamper-proof alarms set up, 36 Password activation, 5 Text overlay, 28 Passwords Time format set up, 27...
Need help?
Do you have a question about the TruVision 5 Series and is the answer not in the manual?
Questions and answers