Flexible intensifier technology 1080p bullet ip camera with motorized lens (22 pages)
Summary of Contents for Speco O2BFR
Page 1
User Manual 2MP Face Recognition IP Camera O2BFR/O2BFRM/O2DFR/O2DFRM Please read this instruction carefully before operating the unit and keep it for further reference...
Page 2
Important Safeguards and Warnings 1. Electrical safety All installation and operation here should conform to local electrical safety codes. Use a certified/listed 12VDC Class2 power supply only. Please note: Do not connect two power supplying sources to the device at the same time; it may result in device damage! The product must be grounded to reduce the risk of electric shock.
Page 3
Statement This guide is for reference only. Product, manuals and specifications may be modified without prior notice. Speco Technologies reserves the right to modify these without notice and without incurring any obligation. Speco Technologies is not liable for any loss caused by improper operation.
Table of Contents Introduction ..........................................2 Web Access and Login ......................................3 Live View..........................................4 Camera Configuration ......................................6 System Configuration ................................6 4.1.1 System Information ..............................6 4.1.2 Date and Time ................................6 4.1.3 Local Recording ................................7 4.1.4 Storage ..................................
Page 5
4.6.4 Security Management...............................38 Maintenance Configuration ..............................38 4.7.1 Backup and Restore ..............................38 4.7.2 Reboot ..................................39 4.7.3 Upgrade ..................................39 4.7.4 Operation Log ................................39 Search ............................................ 41 Image Search ..................................41 Video Search ..................................43 5.2.1 Local Video Search ..............................43 5.2.2 SD Card Video Search..............................44 Appendix ............................................
Thank you for purchasing this network camera! Please read this manual carefully before operating the unit and retain it for further reference. Should you require any technical assistance, please contact Speco Technologies Technical Support. Main Features Built-in PoE (Power over Ethernet) ...
2 Web Access and Login The IP camera settings can be accessed via a web browser through the LAN. Access through IP Scanner Network connection: ① Make sure the PC and IP-Cam are connected on the same local network. The camera is set to DHCP by default and will be assigned an IP address by the DHCP server.
3 Live View The window below will be shown after logging in. The following table describes the icons on the live view interface Icon Description Icon Description Original size of resolution SD card recording indicator Abnormal color Fit (correct scale) indicator Auto (fill the window) Abnormal clarity indicator...
Page 9
Click the zoom/focus control button to show the control panel. The descriptions of the control panel are as follows: Icon Description Icon Description Zoom - Zoom + Focus - Focus + One key focus (used when image is out of focus after manual adjustment) The camera can be installed in a compatible external PTZ enclosure through RS485.
4 Camera Configuration Press the “Setup” button to go to the configuration interface. Note: Wherever applicable, click the “Save” button to save the settings. 4.1 System Configuration 4.1.1 System Information In the “System Information” interface, the system information of the device is listed. 4.1.2 Date and Time To set the time and date, go to SystemDate and Time.
4.1.3 Local Recording Go to SystemLocal Recording to set up the storage path of captured pictures and recorded videos on the local PC. There is also an option to enable or disable the bitrate display in the recorded files. Additionally, face snapshots storage can be enabled or disabled here. 4.1.4 Storage Go to SystemStorage to go to the interface as shown below.
Page 12
3. Set schedule recording. Check “Enable Schedule Record” and set the schedule. Weekly schedule Set the alarm time from Monday to Sunday for a single week. Each day is divided in one hour increments. Green means scheduled. Blank means unscheduled. “Add”: Add the schedule for a special day.
snapshot here. Snapshot Quantity: The number you set here is the maximum quantity of snapshots. The actual quantity of snapshots may be less than this number. Supposing the occurrence time of an alarm event is less than the time of capturing pictures, the actual quantity of snapshots is less than the set quantity of snapshots.
Defog: Activating this function and setting an appropriate value as needed in foggy, dusty, smoggy or rainy environment to get clear images. Backlight Compensation (BLC): Off: disables the backlight compensation function. It is the default mode. HLC: lowers the brightness of the entire image by suppressing the brightness of the image’s bright area and reducing the size of ...
Page 15
Click the “Audio” tab to go to the interface as shown below. Three video streams can be adjustable. Resolution: The size of image. Frame rate: The higher the frame rate, the video is smoother. Bitrate type: CBR and VBR are optional. Bitrate is related to image quality. CBR means that no matter how much change is seen in the video scene, the compression bitrate will be kept constant.
4.2.3 OSD Configuration Go to VideoOSD interface as shown below. Set time stamp, device name, OSD content and picture overlap here. After enabling the corresponding display and entering the content, drag them to change their position. Then click the “Save” button to save the settings. Picture Overlap Settings: Check “OSD Content1”, choose “Picture Overlay”...
To clear the video mask: Click the “Clear” button to delete the current video mask area. 4.2.5 ROI Configuration Go to ImageROI Config interface as shown below. An area in the image can be set as a region of interest. This area will have a higher bitrate than the rest of the image, resulting in better image quality for the identified area.
4.2.6 Zoom/Focus This function is only available for the model with motorized zoom lens. Within this section, zoom and focus can be controlled. If the image is out of focus after a manual adjustment, one key focus can be used to set the focus automatically. 4.2.7 PTZ Configuration This function is only available to use with a compatible external PTZ enclosure.
1. Check “Enable” check box to activate motion based alarms. If unchecked, the camera will not send out any signals to trigger motion-based recording to the NVR or CMS, even if there is motion in the video. Alarm Out: If selected, this would trigger an external relay output that is connected to the camera on detecting a motion based alarm.
Page 20
SD Card Error When there are some errors in writing SD card, the corresponding alarms will be triggered. 1. Go to Event Setup AnomalySD Card Error as shown below. 2. Click “Enable” and set the alarm holding time. 3. Set alarm trigger options. Trigger alarm out, Email and FTP. The setup steps are the same as motion detection. Please refer to motion detection chapter for details.
2. Click “Enable” and set the alarm holding time. 3. Trigger alarm out. When the camera is disconnected, the system will trigger the alarm out. 4.3.3 Alarm In (Sensor Input) This function is only available for some models. To set sensor alarm (alarm in): Go to Event SetupAlarm In interface as shown below.
Alarm Out Mode: Alarm linkage, manual operation, day/night switch linkage and schedule are optional. Alarm Linkage: Having selected this mode, select alarm out name and alarm holding time at the “Alarm Holding Time” pull down list box. Manual Operation: Having selected this mode, click “Open” to trigger the alarm out immediately; click “Close” to stop alarm. Day/Night Switch Linkage: Having selected this mode, choose to open or close alarm out when the camera switches to day mode or night mode.
4.4.1 Object Removal Alarms will be triggered when objects are removed from or left at the pre-defined area. To set object removal: Go to AnalyticsObject Removal interface as shown below. 1. Enable object removal detection and then select the detection type. Enable Left Detection: Alarms will be triggered if there are items left in the pre-defined area.
※ The configuration requirements of camera and surrounding areas 1. The range of the detection object should occupy from 1/50 to 1/3 of the entire image. 2. The detection time of objects in the camera shall be from 3 to 5 seconds. 3.
The sensitivity value of Video Blur Detection: The higher the value is, the more sensitive the system responds to the blurriness of the image. The sensitivity value of Video Color Cast Detection: The higher the value is, the more sensitive the system responds to the obscuring of the image.
Click the “Draw Area” button and then drag the mouse to draw a line in the image. Click the “Stop Draw” button to stop drawing. Click the “Clear” button to delete the lines. Click the “Save” button to save the settings. 5.
Set the alarm area number on the right side. Up to 4 alarm areas can be added. Click the “Draw Area” button and then click around the area where you want to set as the alarm area in the image on the left side (the alarm area should be a closed area).
Set the schedule of the crowd density detection. The setup steps of the schedule are the same as schedule recording setup (See Schedule Recording). ※Configuration of camera and surrounding area 1. The camera lens should face to the people flow. The direction of the people flow is allowed to deviate slightly from the direction of the camera lens (The angle (a) shall be less than 45°).
※ Configuration requirements of camera and surrounding area The detection area should have stable and adequate light. In order to detect all moving people in the detection area, the height range of the camera installation should be from 1 meter to 3 meters.
Page 30
Set the area of the people counting. Click the “Area” tab to go to the area setting interface. Click “Draw Area” and drag the mouse to draw a rectangle area. Drag the four border lines or the four corners of the rectangle to modify its size.
※ Configuration requirements of camera and surrounding area 1. Cameras must be installed in the area with stable and adequate light sources. 2. The background color (like floor color) should be light color. 3. The lens of the camera should be adjusted straight down to ensure that the whole head of the people can be captured. 4.
Page 32
Set alarm detection area. Use this to draw the approximate size of the face that you want the camera to capture. This is useful when there are multiple faces in the background or foreground that are not needed to be captured. To enable, Click “Draw Area” and drag the border lines of the rectangle to modify its size.
Distance O2BFRM/O2DFRM 3.6m(11.8ft) 2.1m(6.9ft) 10° 2.4m(7.9ft) O2BFRM/O2DFRM 22mm 6.0m(19.7ft) 2.6m(8.5ft) 10° 2.4m(7.9ft) O2BFR/O2DFR 3.2m(10.5ft) 2.1m(6.9ft) 10° 2.4m(7.9ft) O2BFR/O2DFR 12mm 5.1m(16.7ft) 2.4m(7.9ft) 10° 2.4m(7.9ft) 4. The object distance depends on the focal-length of the lens mounted in the camera. 5. In order to guarantee the captured face recognition rate, the requirement for face capture are: left or right face turn angle is less than about 30°;...
Either method of network connection can be used. If PPPoE is used to connect internet, the camera will get a dynamic WAN IP address. This IP address will change frequently. To be notified, the IP change notification function can be used. Click “IP Change Notification Config”...
1. Go to Network DDNS. 2. Enable, save and use DDNS to log in. 4.5.5 SNMP To get camera status, parameters and alarm information and remotely manage the camera, the SNMP function can be used. Before using SNMP, please install an SNMP management tool and set the parameters of the SNMP, such as SNMP port, trap address. 1.
2. Check the corresponding version checkbox (Enable SNMPv1, Enable SNMPv2, Enable SNMPv3) according to the version of the SNMP software that will be used. 3. Set the values for “Read SNMP Community”, “Write SNMP Community”, “Trap Address”, “Trap Port” and so on. Please make sure the settings are the same as that of the SNMP software.
authentication system to identify the device in a local network. If the camera connected to the network interface of the switch has passed the authentication of the switch, it can be accessed via the local network. Protocol type and EAPOL version: Please use the default settings. User name and password: The user name and password must be the same with the user name and password applied for and registered in the authentication server.
Sender Address: sender’s e-mail address. User name and password: sender’s user name and password. Server Address: The SMTP IP address or host name. Select the secure connection type at the “Secure Connection” pull-down list according to what’s required. SMTP Port: The SMTP port. Send Interval(S): The time interval of sending email.
Upload Path: The directory where files will be uploaded to. Port: The port of the FTP server. Use Name and Password: The username and password that are used to login to the FTP server. 4.5.11 HTTPS HTTPs provides authentication of the web site and protects user privacy. Go to NetworkHTTPS as shown below.
Click “Create” to create the certificate request. Then download the certificate request and submit it to the trusted certificate authority for signature. After receiving the signed certificate, import the certificate to the device. 4.5.12 QoS QoS (Quality of Service) function is used to provide different quality of services for different network applications. With the deficient bandwidth, the router or switch will sort the data streams and transfer them according to their priority to solve the network delay and network congestion by using this function.
2. Enter user name in “User Name” textbox. 3. Enter letters or numbers in “Password” and “Confirm Password” textbox. 4. Choose the user type. Administrator has all permissions. Normal user can only view the live video. Advanced user has the same permissions as an Administrator except for;...
4.6.3 Block and Allow Lists Go to SecurityBlock and Allow Lists as shown below. The setup steps are as follows: Check the “Enable address filtering” check box. Select “Block/Allow the following address”, IPv4/IPv6/MAC and then enter IP address or MAC address in the address box and click the “Add”...
Import & Export Settings Configuration settings of the camera can be exported form a camera into another camera. 1. Click “Browse” to select the save path for import or export information on the PC. 2. Click the “Import Setting” or “Export Setting” button. Default Settings ...
Page 44
2. Select the main type, sub type, start and end time. 3. Click “Search” to view the operation log. 4. Click “Export” to export the operation log.
5 Search 5.1 Image Search In the Setup interface, click Search to go to the interface as shown below. Images that are saved on the PC or SD card can be found here. Local Image Search 1. Choose “Picture”—“Local”. 2.
Page 46
Click to return to the previous interface. SD Card Image Search 1. Choose “Picture”—“SD Card”. 2. Set time: Select date and choose the start and end time. 3. Choose the alarm events at the bottom of the interface. 4. Click to search the images.
Icon Description Icon Description Close: Select an image and click Close all: Click this button to close all this button to close the image. images. Save: Click this button to select the Save all: Click this button to select the path for saving the image on the path for saving all pictures on the PC.
Icon Description Icon Description Play button. After pausing the video, Pause button click this button to continue playing. Stop button Speed down Speed up Watermark display Enable / disable audio; drag the slider to adjust the volume after enabling audio. 5.2.2 SD Card Video Search Click Search to go to the interface as shown below.
Page 49
4. Select the alarm events at the bottom of the interface. 5. Select mix stream (video and audio stream) or video stream as needed. 6. Double click on a file name in the list to start playback. The time table can be shown in 24H/12H/2H/1H format by clicking the corresponding buttons. Video clip and downloading 1.
Page 50
Click “Set up” to set the storage directory of the video files. Click “Open” to play the video. Click “Clear List” to clear the downloading list. Click “Close” to close the downloading window.
Appendix Appendix 1 Troubleshooting IP Scanner does not show any device. Make sure that the PC that’s running IP Scanner is on the same local network as the devices. Internet Explorer cannot download ActiveX control. IE browser may be set up to block ActiveX. Follow the steps below. 1.
Appendix 2 Specifications Specification /Model O2BFR Image Sensor 1/2.8”CMOS Image Size 1920×1080 Electronic Shutter 1/25s~1/100000s Iris Type Fixed Iris Min. llumination 0 lux 8mm@F1.6, horizontal FoV: 40.6°, recommended face capturing distance: 3m Camera Lens 12mm@F2.0, horizontal FoV: 26.6°, recommended face capturing distance: 5m Lens Mount Day&Night...
Page 53
Specification /Model O2BFRM Image Sensor 1/2.8”CMOS Image Size 1920×1080 Electronic Shutter 1/25s~1/100000s Iris Type Fixed Iris Min. llumination 0 lux Camera Lens 7~22mm@F1.4, horizontal FoV:37°~22.5°, recommended face capturing distance: 5~15m Lens Mount Ø 14 Day&Night Digital WDR Digital NR 3D DNR Angle Adjustment Pan: 0°~360°;...
Page 54
Specification /Model O2DFR Image Sensor 1/2.8”CMOS Image Size 1920×1080 Electronic Shutter 1/25s~1/100000s Iris Type Fixed Iris Min. llumination 0 lux 8mm@F1.6, horizontal FoV: 40.6°, recommended face capturing distance: 3m Camera Lens 12mm@F2.0, horizontal FoV: 26.6°, recommended face capturing distance: 5m Lens Mount Day&Night Digital WDR...
Page 55
Installation Ceiling mounting (Wall mounting available with the junction box and bracket) Models: O2BFR/O2BFRM/O2DFR/O2DFRM Federal Communications Commission (FCC) Statements This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation.