Kedacom IPC2860 Series User Manual

Fisheye network camera

Advertisement

Quick Links

KEDACOM
User Manual for
Fisheye Network Camera
V1 (August, 2018)

Advertisement

Table of Contents
loading

Summary of Contents for Kedacom IPC2860 Series

  • Page 1 KEDACOM User Manual for Fisheye Network Camera V1 (August, 2018)
  • Page 2 Trademark Kedacom™ and are trademarks of Suzhou Keda Technology Co., Ltd. in China and various other countries. All other trademarks mentioned in this document are the property of their respective holders. Suzhou Keda Technology Co., Ltd. 131 Jinshan Road New District, Suzhou, 215011 People's Republic of China http://www.kedacom.com/en...
  • Page 3 Target Audience Administrators and Operators of Video Surveillance Products Document Version Applicable Models IPC2860 series Related Document Quick Start Guide Convention Icon Convention Notes Book or document name; italic Filling content > Connector between menus of different level Menu; Button; Option UL Safety Instruction CAUTION: Risk of Explosion if Battery is replaced by an Incorrect Type.
  • Page 4: Table Of Contents

    Contents Product Brief ........................... 1 Appearance ............................. 2 Start Up ............................3 Network Connection ......................3 Activate Camera ........................3 Configure Camera ........................ 5 Login and Log Out of the Web Client ................... 7 Main Interface ........................8 Basic Functions ..........................9 Live View ..........................
  • Page 5 5.3.5 Scene Change ......................25 5.3.6 Entry Guard Area ..................... 26 5.3.7 Exit Guard Area ......................27 5.3.8 Enter Guard Area ..................... 28 5.3.9 Object Left ........................ 28 5.3.10 Object Removal ....................29 5.3.11 Gathering ......................30 5.3.12 Audio Surge ......................30 Alarm Input .........................
  • Page 6 6.3.7 UPnP ........................41 6.3.8 SMTP ........................42 Image Settings ..........................44 Image ..........................44 7.1.1 Image Adjustment ....................44 7.1.2 Exposure ........................44 7.1.3 White Balance ......................45 7.1.4 Night Cut ........................45 7.1.5 IR ..........................45 7.1.6 Image Enhancement ....................46 7.1.7 EIS ...........................
  • Page 7 8.2.3 IP Filter ........................55 8.2.4 Security Service ....................... 56 Time ........................... 56 Serial Port .......................... 58 Log ............................. 58 System Maintenance ......................59 Appendix: Glossary of Terms ...................... 61...
  • Page 8: Product Brief

    Fisheye Network Camera User Manual Product Brief The fisheye network camera is a digital surveillance product that integrates various functions such as video and audio collection, intelligent coding compression and network transmission. With embedded operating system and high-performance hardware processing platform, it has high stability and reliability.
  • Page 9: Appearance

    Fisheye Network Camera User Manual Appearance Picture 2-1 IPC2860 series...
  • Page 10: Start Up

    Start Up 3.1 Network Connection Note: You are responsible for risks of accessing cameras to the Internet, including but not limited to possible cyber-attack, hacking attack, virus infection and etc. This company is not responsible for the product failures and information disclosure caused thereby, but will provide timely technical support for the cameras.
  • Page 11 Select the camera to be activated, right click and select “Activate”. On the popup interface, configure admin user password and email for claiming password. Click “Activate” to activate the device. When there are more than one non-activated devices, select the device and click “Batch processing”.
  • Page 12: Configure Camera

    Picture 3-3 Activate through browser Note: To ensure the safety of device on internet, it is strongly recommended that you set a strong password composed of at least 2 kinds of the following, numbers, upper-case letters, lower-case letters or specific symbols with length of 8 to 16 characters. Please modify the password periodically such as once every 3 months.
  • Page 13 Picture 3-4 Network settings Alternatively, run IPCSearch and select an activated camera whose network parameters should be modified. Click “Modify Params” or right click the mouse, as shown in Picture 3-5. Modify parameters and fill admin user name (admin) and the password set when activating the device.
  • Page 14: Login And Log Out Of The Web Client

    Picture 3-5 Modify Parameter 3.4 Login and Log Out of the Web Client  Login to the Web Client After activation, input camera IP address in the browser to enter the login interface. Input username and the password set during activation and click “Login”, as shown in Picture 3-6. Picture 3-6 Web Client Login Interface...
  • Page 15: Main Interface

    Picture 3-7 Setting interface of web client  Log Out of the Web Client On the live view interface, click to log out. 3.5 Main Interface On the main interface of camera, you can view live video, playback video records, manage snapshots and configure settings.
  • Page 16: Basic Functions

    Basic Functions 4.1 Live View Click “Live View” to enter the preview interface. 4.1.1 PTZ Control Click and the following interface will show: Picture 4-1 PTZ control Button Note Direction buttons, the 8 direction buttons mean the different directions of the image. Click either to adjust the image rotation direction.
  • Page 17: Image Adjustment

    Picture 4-2 Preset Presets can be loaded, saved and deleted anytime once set and saved. Setting steps: Choose a position and adjust lens direction and field of view up to request; select a preset from the list of presets and click the “Save” icon to save the preset. Click the “Load”...
  • Page 18: Mode Setting

    Sharpness: Drag Sharpness slide bar to adjust image sharpness by request. The higher the value is, the more distinct the objects on the image will look. 4.1.4 Mode Setting  Soft Decode and Hard Decode Fisheye network camera supports soft decode and hard decode. Different modes display differently.
  • Page 19 Soft Decode Wall Mount Soft Decode Desk Mount Hard Decode Ceiling Mount Hard Decode Wall Mount Hard Decode Desk Mount The preview image of the camera could be fisheye, panorama or PTZ or the blending of them.  Fisheye image: the omniscient/ wide angle view image monitored by the fisheye lens of fisheye camera.
  • Page 20: Live View Window

     Panorama image: the corrected rectangle image from fisheye image.  PTZ image: the close-up image of certain selected area in the fisheye or panorama images. PTZ image supports ePTZ. The display modes of fisheye camera are explained as follows: Icon Note Display fisheye image...
  • Page 21  means the live view window displays image in wide screen ratio of 16:9.  means the live view window displays image in actual size 1:1.  makes the image window adaptive to your PC resolution.  Stream Selection  Main Stream: the main stream is HD stream.
  • Page 22: Playback

     Video freeze, click this button and the image will freeze at the last frame before clicking. Click again to recover image.  Full screen, click this button to display in full screen. Double click in full screen or press Esc to exit. 4.2 Playback Click “Playback”...
  • Page 23 Click the "Play" button on the interface to playback the video recording. During the playback, user can perform operations such as clipping, accelerating and downloading the video recording; Put the cursor of the mouse on the timeline to show the time of the video. Left-click or press the left button of the mouse and drag the timeline to the left ot right to skip playing.
  • Page 24: Snapshot

    download. Click "Search" to display expected videos on the list below. Select the files to be downloaded and click “Download”. User can view the download progress on the list. Save path for downloaded videos can be set in Settings > Local Setting.
  • Page 25 Picture 4-7 Local setting  Play  Protocol: Select the stream output protocol, options including UDP and TCP, default being TCP; UDP is applicable when the request for image quality is not high and the network is unstable.  Performance: Select playing level from "Real-time", "Balanced" and "Smooth", default being "Balanced".
  • Page 26  Enable Vertical Synchronization: When there is image tearing, enable vertical synchronization to improve image quality. Usually it’s unnecessary to enable this option as it will increase CPU utilization.  Display Status Info: After enabling this function, there will be a status icon in the menu bar at the bottom of the live view window.
  • Page 27  Snapshot Save Path: Configure the local save path for snapshots captured during playback. Click the button of "View" to customize the save path. Click “Opendir” to open the folder where the recordings are saved currently.  Others  Enable Configuration Guide: When it is checked, the configuration guide will pop up during login to lead the user to the Quick Settings interface.
  • Page 28: System Functions

    System Functions 5.1 Recording When the camera is installed with a storage card and works normally, user can configure scheduled recording. When scheduled recording is enabled, the camera will record videos automatically in the configured duration and save the videos in the storage card. Configuration steps are shown below: Go to Settings >...
  • Page 29: Snapshot

    It allows several (max 4) durations on one day and the durations cannot overlap with each other;  Copy: click the green icon behind the timeline and copy the durations on the day to one or several other days;  Delete: click "Delete All"...
  • Page 30: Motion Detection

    The intelligent functions of a camera include motion detection, video blocked, guard line, defocus, scene change, entry guard area, exit guard area, enter guard area, object left, object removal, gathering and audio surge. This chapter will introduce the configuration steps of them one by one.
  • Page 31: Video Blocked

    Click "Save" to validate settings. 5.3.2 Video Blocked When the preset video blocked area is blocked intentionally which disables normal surveillance of this area, an alarm will be triggered. After receiving the alarm, user can find the cause of video blocked quickly and recover the surveillance scene. Configuration steps of video blocked are as follows: Check “Enable”;...
  • Page 32: Defocus

    Set "Target Filter", i.e. target area. Click “Edit” and drag the mouse in the scene to draw a rectangle. Click “Stop” after finishing and drag the slide bar of “Max and Min Target Ratio” (1% by default). Moving objects over max or below min will not trigger an alarm when they enter the guard line(s);...
  • Page 33: Entry Guard Area

    Check linkage type(s), which is/are the alarm output method(s) when an event triggers an alarm; Set arming duration: the default is 24 hours displaying in blue bar, or user can customize durations;  Set duration: select a day and put the mouse on a point of the timeline, left-click and drag the mouse to the right to draw a bright blue color bar, on the top of which shows the start time and end time;...
  • Page 34: Exit Guard Area

     Copy duration: click the green icon behind the timeline and copy the durations on the day to one or several other days.  Delete duration: click "Delete All" on the top of the timeline to delete all the durations. Select duration and click "Delete" on the popup window or on the top of the timeline to delete the duration.
  • Page 35: Enter Guard Area

    5.3.8 Enter Guard Area Enable this function in the interface and set the guard area. Once any moving object enters the guard area and stays for a period of time reaching the set threshold, an alarm will be triggered. Operation steps are as follows: Check “Enable”...
  • Page 36: Object Removal

    (1% by default). Moving objects over max or below min will not trigger an alarm when they enter the guard area(s); Area Setting: to set area. Click “Edit” and click mouse to draw a closed area made up of 3 to 6 points in the scene. Right click or click the starting or end point to close the area, and drag the slide bar of “Sensitivity”...
  • Page 37: Gathering

    shows the start time and end time; click the color bar to pop up a window for editing the accurate start time and end time; click "Save" on the window to validate setting. It allows several (max 10) durations on one day and the durations cannot overlap with each other.
  • Page 38: Alarm Input

    Operation steps are as follows: Check “Enable” and drag the slide bar of Voice Intensity Threshold to adjust the detection sensitivity to voice mutation. The higher the Voice Intensity Threshold is, the more sensitive it is to Voice Mutation; Check linkage type(s), which is/are the alarm output method(s) when an event triggers an alarm;...
  • Page 39: Alarm Output

    The camera connects to alarm input devices such as smoke detector, alarm bell or spray thrower through parallel ports. User needs to configure parameters for each parallel port respectively. Operation steps are as follows: Check "Enable". Select a number from the dropdown list of Parallel Port Extention (default being 0, i.e.
  • Page 40: Abnormality Linkage

    5.6 Abnormality Linkage Picture 5-4 Abnormality linkage Configure the alarm linkage for abnormal events. Operation steps are as follows: Check "Enable" and select an option from the dropdown list of Abnormality Type; Note:  Disk Full: when the disk storage is insufficient. ...
  • Page 41: Network

    Network Go to Settings > Network to configure IP and Port, Access Protocol and Other Protocols. 6.1 IP and Port 6.1.1 Configure network parameters on the interface of LAN. Picture 6-1 LAN IP Version: Select IPV4 or IPV6 from the dropdown list according to actual request. Mode: For IPV4 version, select Static or DHCP mode.
  • Page 42: Port

    Note: Multicast is a method of data packet transmission. The source host can send the data packets to every host in the group by sending a datagram only. It also depends on the group relationship maintenance and selection by the router. MTU: Maximum transmission unit, the maximum size of data packet transmitted through TCP/UDP protocol, ranging 500 ~ 1500, by default 1500.
  • Page 43: Onvif

    Picture 6-3 VSIP Select a method from the dropdown list of VMS Method, "IP Address" or "Domain". If selecting "IP Address", input VMS address in "VMS Address (IPv4)"; if selecting "Domain", input VMS domain name in "Registered VMS Domain"; Input "VMS Port Number", 5510 by default; Input "Camera UUID"...
  • Page 44: Gb28181

    Basic: ONVIF protocol is enabled by default. User can register camera to ONVIF-supported VMS, VMS port being 80 by default. The camera will generate "Server Address (URL)" automatically. Authentication: Set authentication method for ONVIF login. When selecting "N/A", user can login freely;...
  • Page 45: Other Protocol

    6.3 Other Protocol 6.3.1 DDNS DDNS (Dynamic Domain Name Server) is to connect the camera to various servers so that user can login to the camera through servers. Apply domain names at different server websites and then visit the device by domain names directly even if the IP address has been modified.
  • Page 46: Pppoe

    Input FTP server address and port; Input FTP server username and password, and check "Anonymous" to visit FTP server anonymously; Configure directory structure, i.e. file save path. Select from the dropdown list by actual request; Click "Test" to verify if current FTP is available, and click "Save" to validate setting. 6.3.3 PPPoE PPPoE function is to access camera to the internet by dialing the account provided by ISP...
  • Page 47: 802.1X

    The camera supports KEDACOM private network management protocol. Configuration steps are as follows: Input "Network Management Server IP Address" and "Device Location"; Configure "CPU Utilization Threshold", "Memory Utilization Threshold" and "Packet Loss Rate Threshold". The default values are all 100, ranging 1 ~ 100;...
  • Page 48: Upnp

    Picture 6-11 QoS QoS stands for Quality of Service, which can solve the problem of network delay and network congestion efficiently. Configuration steps are as follows: Check "Enable" to enable QoS function; Configure "DSCP for Audio/Video" and “DSCP Management”, ranging 0 ~ 63; Note: There are 64 DSCP priority levels (0-63), which identify different priority levels of packets, 0 with the lowest priority and 63 with the highest.
  • Page 49: Smtp

    By UPnP protocol, it's able to set up mapping relation between Ethernet and internet. Internal port is camera port while external port is router port. User can visit camera when accessing to the external port. Configuration steps are as follows: Check "Enable"...
  • Page 50 Add receiver email address. Input the receiver's email address and click the symbol "+" behind it and the address will be saved to the list below. Select an address from the list and click the symbol "-" to remove the email address; Click "Save"...
  • Page 51: Image Settings

    Image Settings Go to Settings > Camera to configure camera image parameters, including Image, OSD, Video and Audio interfaces. 7.1 Image Go to Settings > Camera > Image, as shown below. Picture 7-1 Image 7.1.1 Image Adjustment The image adjustment in this part is the same as that on the Live View interface, which can be referred to in the chapter of 4.1.3 Image Adjustment.
  • Page 52: White Balance

     Anti-flicker: When there are floating cross stripes on the image under indoor fluorescent lamp, select the correct anti-flicker frequency (50Hz or 60Hz) to solve the problem. The frequency should be in accordance with that of the nation's AC and light frequency.
  • Page 53: Image Enhancement

    7.1.6 Image Enhancement When there are many noise points caused by environment and camera lens, noise reduction function can be enabled to correct images. Images processed by 2D noise reduction will look softer; while those processed by 3D noise reduction will have obviously fewer noise points and will look much clearer.
  • Page 54: Rotate And Bnc

    7.1.8 Rotate and BNC Mirror Mode: When camera is installed upside-down, correct the image upright by this function without re-installing the camera.  Disable: default option, image will not rotate.  Left and Right: image will be reversed horizontally but the vertical is the same. ...
  • Page 55: Video Parameters

    4) Edit OSD positions: drag the OSD in the window with mouse to change its position. Each OSD can be dragged within the blue box only. If you want to drag it out of the blue box, move the blue box first; 5) Load font: Click “Load”...
  • Page 56: Roi

     Bit Rate Type: Options include CBR and VBR, by which you can control stream rate. CBR is fixed bit rate while VBR means the bit rate is adaptive within the upper limit.  Image Quality: According to actual requirements, select image quality level from the dropdown list.
  • Page 57: Privacy Mask

    7.3.3 Privacy Mask Picture 7-5 Privacy Mask Mask sensitive and private part of the image so as to keep sensitive information private. Configuration steps are as follows: Check “Enable" to enable privacy mask; Click “Edit”, and the image is divided into 16 columns and 12 rows of small squares. Click any square and drag an area toward lower right, then this area is the privacy mask detection area.
  • Page 58: Video Info Overlay

     Delete: Click "Delete All" on the top of the duration bars to clear all durations. Click one duration and click "Delete" on the popup window or on the top of the duration bars to remove this duration. Click “Save” to make settings effective. Note: Only “Fisheye”...
  • Page 59: Audio Parameters

    7.4 Audio Parameters 7.4.1 Audio Encoding Picture 7-7 Audio encoding  Audio Source Type: Select audio source type from the dropdown list according to actual request. LINE-IN means talk-back device input while MIC-IN means microphone input.  Sampling Rate: Select a sampling rate from the dropdown list, which means the sampling times of sound signal by the audio-recording device in 1 second.
  • Page 60  Type of Output: Select audio output type, “speaker” being speaker output and “lineout” being linear output.  Decoding Volume: Drag the slide bar to adjust audio decoding volume, i.e. audio output volume.  Audio Mixing Recording: Check it to enable audio mixing recording function. Note: When “Audio Mixing Recording”...
  • Page 61: System

    System 8.1 Device Info Device info includes device name, device model, device serial No. and etc. User can customize device name and check “Set as OSD text”. Device name doesn’t support specific symbols. If “Set as OSD text” is checked, the device name will be synchronized to the OSD, interface shown below: Picture 8-1 Device info 8.2 User Security 8.2.1...
  • Page 62: Rtsp Authorization

     Delete user: Select user IP and click “Delete” to delete the user.  Modify user: Select user IP and click “Modify”. Modify on the popup interface. 8.2.2 RTSP Authorization Select authorization type from the dropdown list, options including none, basic and digest. By default, the type is “digest”.
  • Page 63: Security Service

    After selecting filter method, click “Add” and input IP address on the popup interface, and click “Confirm”; After finish setting, click "Save" to validate setting.  Modify Black/ White List: Select the IP address from the black/ white list and click “Modify”...
  • Page 64 Picture 8-5 Time setting  Time Setting: Set Device timezone and time. Click "Manual Setting", select timezone and set time on the popup interface. You can check "Synchronize time with PC" and click "Save" to validate setting.  Auto Time Correction: Check "Auto Timing" and system will correct time automatically according to access protocol or NTP server or adaptive.
  • Page 65: Serial Port

     NTP Clock Synchronization: Check “Enable” and configure “Server Address”, “NTP Port” and “Time Correction Interval”.  DST: DST (daylight saving time) is the practice of advancing clocks during summer months so that evening daylight lasts longer, while sacrificing normal sunrise times and the time applied during DST is called DST time.
  • Page 66: System Maintenance

    2) Select Start Time and End Time, and click "Search". The search result will show on the list below; 3) Click "Save Logs" to download all logs; click "Delete logs" to clear all logs. Note: The system can save maximum 2,000 entries of logs. 8.6 System Maintenance Picture 8-8 System maintenance On the interface of "System Maintenance", you can reboot and upgrade cameras or perform other...
  • Page 67  Import Parameter: You can import local configuration file, no need of manual setting. Click "Import" to select local configuration file.  Advanced Configuration: Only "admin" user can perform advanced configuration. Click "Configuration", input the right password for advanced user on the popup interface and click "Confirm"...
  • Page 68: Appendix: Glossary Of Terms

    Appendix: Glossary of Terms Term Explanation High Definition QXGA Resolution of 2048*1536 pixels (4:3) UXGA Resolution of 1600*1200 pixels (4:3) 1080P Resolution of 1920*1080 pixels (16:9) 720P Resolution of 1280*720 pixels (16:9) Resolution of 352*288 pixels QCIF Resolution of 176*144 pixels Personal Computer Internet Protocol MPEG4...

Table of Contents