Page 1
KEDACOM User Manual for Fisheye Network Camera V1 (August, 2018)
Page 2
Trademark Kedacom™ and are trademarks of Suzhou Keda Technology Co., Ltd. in China and various other countries. All other trademarks mentioned in this document are the property of their respective holders. Suzhou Keda Technology Co., Ltd. 131 Jinshan Road New District, Suzhou, 215011 People's Republic of China http://www.kedacom.com/en...
Page 3
Target Audience Administrators and Operators of Video Surveillance Products Document Version Applicable Models IPC2860 series Related Document Quick Start Guide Convention Icon Convention Notes Book or document name; italic Filling content > Connector between menus of different level Menu; Button; Option UL Safety Instruction CAUTION: Risk of Explosion if Battery is replaced by an Incorrect Type.
Contents Product Brief ........................... 1 Appearance ............................. 2 Start Up ............................3 Network Connection ......................3 Activate Camera ........................3 Configure Camera ........................ 5 Login and Log Out of the Web Client ................... 7 Main Interface ........................8 Basic Functions ..........................9 Live View ..........................
Page 5
5.3.5 Scene Change ......................25 5.3.6 Entry Guard Area ..................... 26 5.3.7 Exit Guard Area ......................27 5.3.8 Enter Guard Area ..................... 28 5.3.9 Object Left ........................ 28 5.3.10 Object Removal ....................29 5.3.11 Gathering ......................30 5.3.12 Audio Surge ......................30 Alarm Input .........................
Page 6
6.3.7 UPnP ........................41 6.3.8 SMTP ........................42 Image Settings ..........................44 Image ..........................44 7.1.1 Image Adjustment ....................44 7.1.2 Exposure ........................44 7.1.3 White Balance ......................45 7.1.4 Night Cut ........................45 7.1.5 IR ..........................45 7.1.6 Image Enhancement ....................46 7.1.7 EIS ...........................
Page 7
8.2.3 IP Filter ........................55 8.2.4 Security Service ....................... 56 Time ........................... 56 Serial Port .......................... 58 Log ............................. 58 System Maintenance ......................59 Appendix: Glossary of Terms ...................... 61...
Fisheye Network Camera User Manual Product Brief The fisheye network camera is a digital surveillance product that integrates various functions such as video and audio collection, intelligent coding compression and network transmission. With embedded operating system and high-performance hardware processing platform, it has high stability and reliability.
Start Up 3.1 Network Connection Note: You are responsible for risks of accessing cameras to the Internet, including but not limited to possible cyber-attack, hacking attack, virus infection and etc. This company is not responsible for the product failures and information disclosure caused thereby, but will provide timely technical support for the cameras.
Page 11
Select the camera to be activated, right click and select “Activate”. On the popup interface, configure admin user password and email for claiming password. Click “Activate” to activate the device. When there are more than one non-activated devices, select the device and click “Batch processing”.
Picture 3-3 Activate through browser Note: To ensure the safety of device on internet, it is strongly recommended that you set a strong password composed of at least 2 kinds of the following, numbers, upper-case letters, lower-case letters or specific symbols with length of 8 to 16 characters. Please modify the password periodically such as once every 3 months.
Page 13
Picture 3-4 Network settings Alternatively, run IPCSearch and select an activated camera whose network parameters should be modified. Click “Modify Params” or right click the mouse, as shown in Picture 3-5. Modify parameters and fill admin user name (admin) and the password set when activating the device.
Picture 3-5 Modify Parameter 3.4 Login and Log Out of the Web Client Login to the Web Client After activation, input camera IP address in the browser to enter the login interface. Input username and the password set during activation and click “Login”, as shown in Picture 3-6. Picture 3-6 Web Client Login Interface...
Picture 3-7 Setting interface of web client Log Out of the Web Client On the live view interface, click to log out. 3.5 Main Interface On the main interface of camera, you can view live video, playback video records, manage snapshots and configure settings.
Basic Functions 4.1 Live View Click “Live View” to enter the preview interface. 4.1.1 PTZ Control Click and the following interface will show: Picture 4-1 PTZ control Button Note Direction buttons, the 8 direction buttons mean the different directions of the image. Click either to adjust the image rotation direction.
Picture 4-2 Preset Presets can be loaded, saved and deleted anytime once set and saved. Setting steps: Choose a position and adjust lens direction and field of view up to request; select a preset from the list of presets and click the “Save” icon to save the preset. Click the “Load”...
Sharpness: Drag Sharpness slide bar to adjust image sharpness by request. The higher the value is, the more distinct the objects on the image will look. 4.1.4 Mode Setting Soft Decode and Hard Decode Fisheye network camera supports soft decode and hard decode. Different modes display differently.
Page 19
Soft Decode Wall Mount Soft Decode Desk Mount Hard Decode Ceiling Mount Hard Decode Wall Mount Hard Decode Desk Mount The preview image of the camera could be fisheye, panorama or PTZ or the blending of them. Fisheye image: the omniscient/ wide angle view image monitored by the fisheye lens of fisheye camera.
Panorama image: the corrected rectangle image from fisheye image. PTZ image: the close-up image of certain selected area in the fisheye or panorama images. PTZ image supports ePTZ. The display modes of fisheye camera are explained as follows: Icon Note Display fisheye image...
Page 21
means the live view window displays image in wide screen ratio of 16:9. means the live view window displays image in actual size 1:1. makes the image window adaptive to your PC resolution. Stream Selection Main Stream: the main stream is HD stream.
Video freeze, click this button and the image will freeze at the last frame before clicking. Click again to recover image. Full screen, click this button to display in full screen. Double click in full screen or press Esc to exit. 4.2 Playback Click “Playback”...
Page 23
Click the "Play" button on the interface to playback the video recording. During the playback, user can perform operations such as clipping, accelerating and downloading the video recording; Put the cursor of the mouse on the timeline to show the time of the video. Left-click or press the left button of the mouse and drag the timeline to the left ot right to skip playing.
download. Click "Search" to display expected videos on the list below. Select the files to be downloaded and click “Download”. User can view the download progress on the list. Save path for downloaded videos can be set in Settings > Local Setting.
Page 25
Picture 4-7 Local setting Play Protocol: Select the stream output protocol, options including UDP and TCP, default being TCP; UDP is applicable when the request for image quality is not high and the network is unstable. Performance: Select playing level from "Real-time", "Balanced" and "Smooth", default being "Balanced".
Page 26
Enable Vertical Synchronization: When there is image tearing, enable vertical synchronization to improve image quality. Usually it’s unnecessary to enable this option as it will increase CPU utilization. Display Status Info: After enabling this function, there will be a status icon in the menu bar at the bottom of the live view window.
Page 27
Snapshot Save Path: Configure the local save path for snapshots captured during playback. Click the button of "View" to customize the save path. Click “Opendir” to open the folder where the recordings are saved currently. Others Enable Configuration Guide: When it is checked, the configuration guide will pop up during login to lead the user to the Quick Settings interface.
System Functions 5.1 Recording When the camera is installed with a storage card and works normally, user can configure scheduled recording. When scheduled recording is enabled, the camera will record videos automatically in the configured duration and save the videos in the storage card. Configuration steps are shown below: Go to Settings >...
It allows several (max 4) durations on one day and the durations cannot overlap with each other; Copy: click the green icon behind the timeline and copy the durations on the day to one or several other days; Delete: click "Delete All"...
The intelligent functions of a camera include motion detection, video blocked, guard line, defocus, scene change, entry guard area, exit guard area, enter guard area, object left, object removal, gathering and audio surge. This chapter will introduce the configuration steps of them one by one.
Click "Save" to validate settings. 5.3.2 Video Blocked When the preset video blocked area is blocked intentionally which disables normal surveillance of this area, an alarm will be triggered. After receiving the alarm, user can find the cause of video blocked quickly and recover the surveillance scene. Configuration steps of video blocked are as follows: Check “Enable”;...
Set "Target Filter", i.e. target area. Click “Edit” and drag the mouse in the scene to draw a rectangle. Click “Stop” after finishing and drag the slide bar of “Max and Min Target Ratio” (1% by default). Moving objects over max or below min will not trigger an alarm when they enter the guard line(s);...
Check linkage type(s), which is/are the alarm output method(s) when an event triggers an alarm; Set arming duration: the default is 24 hours displaying in blue bar, or user can customize durations; Set duration: select a day and put the mouse on a point of the timeline, left-click and drag the mouse to the right to draw a bright blue color bar, on the top of which shows the start time and end time;...
Copy duration: click the green icon behind the timeline and copy the durations on the day to one or several other days. Delete duration: click "Delete All" on the top of the timeline to delete all the durations. Select duration and click "Delete" on the popup window or on the top of the timeline to delete the duration.
5.3.8 Enter Guard Area Enable this function in the interface and set the guard area. Once any moving object enters the guard area and stays for a period of time reaching the set threshold, an alarm will be triggered. Operation steps are as follows: Check “Enable”...
(1% by default). Moving objects over max or below min will not trigger an alarm when they enter the guard area(s); Area Setting: to set area. Click “Edit” and click mouse to draw a closed area made up of 3 to 6 points in the scene. Right click or click the starting or end point to close the area, and drag the slide bar of “Sensitivity”...
shows the start time and end time; click the color bar to pop up a window for editing the accurate start time and end time; click "Save" on the window to validate setting. It allows several (max 10) durations on one day and the durations cannot overlap with each other.
Operation steps are as follows: Check “Enable” and drag the slide bar of Voice Intensity Threshold to adjust the detection sensitivity to voice mutation. The higher the Voice Intensity Threshold is, the more sensitive it is to Voice Mutation; Check linkage type(s), which is/are the alarm output method(s) when an event triggers an alarm;...
The camera connects to alarm input devices such as smoke detector, alarm bell or spray thrower through parallel ports. User needs to configure parameters for each parallel port respectively. Operation steps are as follows: Check "Enable". Select a number from the dropdown list of Parallel Port Extention (default being 0, i.e.
5.6 Abnormality Linkage Picture 5-4 Abnormality linkage Configure the alarm linkage for abnormal events. Operation steps are as follows: Check "Enable" and select an option from the dropdown list of Abnormality Type; Note: Disk Full: when the disk storage is insufficient. ...
Network Go to Settings > Network to configure IP and Port, Access Protocol and Other Protocols. 6.1 IP and Port 6.1.1 Configure network parameters on the interface of LAN. Picture 6-1 LAN IP Version: Select IPV4 or IPV6 from the dropdown list according to actual request. Mode: For IPV4 version, select Static or DHCP mode.
Note: Multicast is a method of data packet transmission. The source host can send the data packets to every host in the group by sending a datagram only. It also depends on the group relationship maintenance and selection by the router. MTU: Maximum transmission unit, the maximum size of data packet transmitted through TCP/UDP protocol, ranging 500 ~ 1500, by default 1500.
Picture 6-3 VSIP Select a method from the dropdown list of VMS Method, "IP Address" or "Domain". If selecting "IP Address", input VMS address in "VMS Address (IPv4)"; if selecting "Domain", input VMS domain name in "Registered VMS Domain"; Input "VMS Port Number", 5510 by default; Input "Camera UUID"...
Basic: ONVIF protocol is enabled by default. User can register camera to ONVIF-supported VMS, VMS port being 80 by default. The camera will generate "Server Address (URL)" automatically. Authentication: Set authentication method for ONVIF login. When selecting "N/A", user can login freely;...
6.3 Other Protocol 6.3.1 DDNS DDNS (Dynamic Domain Name Server) is to connect the camera to various servers so that user can login to the camera through servers. Apply domain names at different server websites and then visit the device by domain names directly even if the IP address has been modified.
Input FTP server address and port; Input FTP server username and password, and check "Anonymous" to visit FTP server anonymously; Configure directory structure, i.e. file save path. Select from the dropdown list by actual request; Click "Test" to verify if current FTP is available, and click "Save" to validate setting. 6.3.3 PPPoE PPPoE function is to access camera to the internet by dialing the account provided by ISP...
The camera supports KEDACOM private network management protocol. Configuration steps are as follows: Input "Network Management Server IP Address" and "Device Location"; Configure "CPU Utilization Threshold", "Memory Utilization Threshold" and "Packet Loss Rate Threshold". The default values are all 100, ranging 1 ~ 100;...
Picture 6-11 QoS QoS stands for Quality of Service, which can solve the problem of network delay and network congestion efficiently. Configuration steps are as follows: Check "Enable" to enable QoS function; Configure "DSCP for Audio/Video" and “DSCP Management”, ranging 0 ~ 63; Note: There are 64 DSCP priority levels (0-63), which identify different priority levels of packets, 0 with the lowest priority and 63 with the highest.
By UPnP protocol, it's able to set up mapping relation between Ethernet and internet. Internal port is camera port while external port is router port. User can visit camera when accessing to the external port. Configuration steps are as follows: Check "Enable"...
Page 50
Add receiver email address. Input the receiver's email address and click the symbol "+" behind it and the address will be saved to the list below. Select an address from the list and click the symbol "-" to remove the email address; Click "Save"...
Image Settings Go to Settings > Camera to configure camera image parameters, including Image, OSD, Video and Audio interfaces. 7.1 Image Go to Settings > Camera > Image, as shown below. Picture 7-1 Image 7.1.1 Image Adjustment The image adjustment in this part is the same as that on the Live View interface, which can be referred to in the chapter of 4.1.3 Image Adjustment.
Anti-flicker: When there are floating cross stripes on the image under indoor fluorescent lamp, select the correct anti-flicker frequency (50Hz or 60Hz) to solve the problem. The frequency should be in accordance with that of the nation's AC and light frequency.
7.1.6 Image Enhancement When there are many noise points caused by environment and camera lens, noise reduction function can be enabled to correct images. Images processed by 2D noise reduction will look softer; while those processed by 3D noise reduction will have obviously fewer noise points and will look much clearer.
7.1.8 Rotate and BNC Mirror Mode: When camera is installed upside-down, correct the image upright by this function without re-installing the camera. Disable: default option, image will not rotate. Left and Right: image will be reversed horizontally but the vertical is the same. ...
4) Edit OSD positions: drag the OSD in the window with mouse to change its position. Each OSD can be dragged within the blue box only. If you want to drag it out of the blue box, move the blue box first; 5) Load font: Click “Load”...
Bit Rate Type: Options include CBR and VBR, by which you can control stream rate. CBR is fixed bit rate while VBR means the bit rate is adaptive within the upper limit. Image Quality: According to actual requirements, select image quality level from the dropdown list.
7.3.3 Privacy Mask Picture 7-5 Privacy Mask Mask sensitive and private part of the image so as to keep sensitive information private. Configuration steps are as follows: Check “Enable" to enable privacy mask; Click “Edit”, and the image is divided into 16 columns and 12 rows of small squares. Click any square and drag an area toward lower right, then this area is the privacy mask detection area.
Delete: Click "Delete All" on the top of the duration bars to clear all durations. Click one duration and click "Delete" on the popup window or on the top of the duration bars to remove this duration. Click “Save” to make settings effective. Note: Only “Fisheye”...
7.4 Audio Parameters 7.4.1 Audio Encoding Picture 7-7 Audio encoding Audio Source Type: Select audio source type from the dropdown list according to actual request. LINE-IN means talk-back device input while MIC-IN means microphone input. Sampling Rate: Select a sampling rate from the dropdown list, which means the sampling times of sound signal by the audio-recording device in 1 second.
Page 60
Type of Output: Select audio output type, “speaker” being speaker output and “lineout” being linear output. Decoding Volume: Drag the slide bar to adjust audio decoding volume, i.e. audio output volume. Audio Mixing Recording: Check it to enable audio mixing recording function. Note: When “Audio Mixing Recording”...
System 8.1 Device Info Device info includes device name, device model, device serial No. and etc. User can customize device name and check “Set as OSD text”. Device name doesn’t support specific symbols. If “Set as OSD text” is checked, the device name will be synchronized to the OSD, interface shown below: Picture 8-1 Device info 8.2 User Security 8.2.1...
Delete user: Select user IP and click “Delete” to delete the user. Modify user: Select user IP and click “Modify”. Modify on the popup interface. 8.2.2 RTSP Authorization Select authorization type from the dropdown list, options including none, basic and digest. By default, the type is “digest”.
After selecting filter method, click “Add” and input IP address on the popup interface, and click “Confirm”; After finish setting, click "Save" to validate setting. Modify Black/ White List: Select the IP address from the black/ white list and click “Modify”...
Page 64
Picture 8-5 Time setting Time Setting: Set Device timezone and time. Click "Manual Setting", select timezone and set time on the popup interface. You can check "Synchronize time with PC" and click "Save" to validate setting. Auto Time Correction: Check "Auto Timing" and system will correct time automatically according to access protocol or NTP server or adaptive.
NTP Clock Synchronization: Check “Enable” and configure “Server Address”, “NTP Port” and “Time Correction Interval”. DST: DST (daylight saving time) is the practice of advancing clocks during summer months so that evening daylight lasts longer, while sacrificing normal sunrise times and the time applied during DST is called DST time.
2) Select Start Time and End Time, and click "Search". The search result will show on the list below; 3) Click "Save Logs" to download all logs; click "Delete logs" to clear all logs. Note: The system can save maximum 2,000 entries of logs. 8.6 System Maintenance Picture 8-8 System maintenance On the interface of "System Maintenance", you can reboot and upgrade cameras or perform other...
Page 67
Import Parameter: You can import local configuration file, no need of manual setting. Click "Import" to select local configuration file. Advanced Configuration: Only "admin" user can perform advanced configuration. Click "Configuration", input the right password for advanced user on the popup interface and click "Confirm"...
Appendix: Glossary of Terms Term Explanation High Definition QXGA Resolution of 2048*1536 pixels (4:3) UXGA Resolution of 1600*1200 pixels (4:3) 1080P Resolution of 1920*1080 pixels (16:9) 720P Resolution of 1280*720 pixels (16:9) Resolution of 352*288 pixels QCIF Resolution of 176*144 pixels Personal Computer Internet Protocol MPEG4...