Operation Manual Foreword General This manual introduces the functions, configuration, general operation, and system maintenance of network camera. Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
Operation Manual Important Safeguards and Warnings Electrical Safety ● All installation and operation shall conform to your local electrical safety codes. ● The power source shall conform to the Safety Extra Low Voltage (SELV) standard, and supply power with rated voltage which conforms to Limited Power Source requirement according to IEC60950-1.
Page 4
Operation Manual mild detergent. To avoid possible damage on device body coating which could cause performance to decrease, do not use volatile solvent such as alcohol, benzene, diluent and so on to clean the device body, nor can strong, abrasive detergent be used. ●...
Operation Manual Table of Contents Foreword ..............................I Important Safeguards and Warnings ..................... II 1 Overview ..............................1 1.1 Introduction ........................... 1 1.2 Network Connection ........................1 1.3 Function ............................1 1.3.1 Basic Function ........................1 1.3.2 AI Function ..........................2 2 Configuration Flow ..........................
Page 6
Operation Manual 6.2.2.2.9 Configuring Face Detection ................30 6.2.2.2.10 Configuring Face Recognition ................ 30 6.2.2.2.11 Configuring Face Statistics ................31 6.2.2.3 ROI ..........................31 6.2.3 Setting Audio Parameters ....................32 6.3 Network ............................33 6.3.1 TCP/IP ........................... 33 6.3.2 Port ............................36 6.3.3 PPPoE ..........................
Page 7
Operation Manual 6.4.3.1 Setting Motion Detection ................... 60 6.4.3.2 Setting Video Tampering ................... 62 6.4.3.3 Setting Scene Changing .................... 62 6.4.4 Setting Audio Detection ..................... 63 6.5 Storage ............................64 6.6 System ............................65 6.6.1 General ..........................65 6.6.1.1 Basic ..........................65 6.6.1.2 Date &...
Page 8
Operation Manual 8.1.2 Rule Configuration ......................86 8.2 Setting Face Recognition ......................87 8.2.1 Setting Face Detection ....................... 88 8.2.2 Setting Face Database ....................... 90 8.2.2.1 Creating Face Database ..................... 90 8.2.2.2 Adding Face Picture ....................92 8.2.2.2.1 Single Adding ..................... 92 8.2.2.2.2 Batch Importing ....................
Page 9
Operation Manual 12.4.2 Installing Trusted CA Certificate ................... 123 12.5 A/V Encryption ........................124 12.6 Security Warning ........................125 13 Record .............................. 126 13.1 Playback ........................... 126 13.1.1 Playing Back Video ......................126 13.1.2 Clipping Video ......................... 128 13.1.3 Downloading Video ......................129 13.2 Setting Record Control ......................
Operation Manual 1 Overview 1.1 Introduction IP camera (Internet Protocol camera), is a type of digital video camera that receives control data and sends image data through internet. They are commonly used for surveillance, requiring no local recording device, but only a local area network. IP camera is divided into single-channel camera and multi-channel camera according to the channel quantity.
Operation Manual ● Record abnormality of monitoring image for subsequent view and processing. ● Configure coding parameters, and adjust live view image. Alarm ● Set alarm prompt mode and tone according to alarm type. ● View alarm prompt message. Exception ●...
Page 12
Operation Manual Face Detection ● Detect face and display the related attributes on the live interface. ● When an alarm is triggered, the system performs linkages such as recording, alarm output, sending email, PTZ operation, and snapshot. Face Recognition ● After detecting face, make comparison between the detected face with the face in face database, and activates alarm output.
Operation Manual 2 Configuration Flow For the device configuration flow, see Figure 2-1. For details, see Table 2-1. Configure the device according to the actual situation. Figure 2-1 Configuration flow Table 2-1 Description of flow Configuration Description Reference Open IE browser and enter IP address to log in to the web Login "4 Login".
Operation Manual 3 Device Initialization Device initialization is required for the first-time use. This manual is based on the operation on the web interface. You can also initialize device through ConfigTool, NVR, or platform devices. ● To ensure the device safety, keep the password properly after initialization and change the password regularly.
Page 15
Operation Manual Figure 3-2 Disclaimer Step 3 Select the I have read and agree to the terms of the Software License Agreement and Privacy Policy check box, and then click Next. Figure 3-3 Time zone setting Step 4 Configure the time parameters, and then click Next.
Page 16
Operation Manual Figure 3-4 Password setting Step 5 Set the password for admin account. Table 3-1 Description of password configuration Parameter Description Username The default username is admin. Password The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' "...
Operation Manual 4 Login 4.1 Device Login This section introduces how to log in to and log out of the web interface. This section takes Chrome as an example. ● You need to initialize the camera before logging in to the web interface. For details, see "3 Device Initialization".
Operation Manual Figure 4-2 Live interface 4.2 Resetting Password When you need to reset the password for the admin account, there will be a security code sent to the entered email address which can be used to reset the password. Prerequisites You have enabled password resetting service.
Page 20
Operation Manual that is set during the initialization. Figure 4-4 Login...
Operation Manual 5 Main Interface Click at the left-upper corner of the interface to display the main interface. Figure 5-1 Main interface ● Live: View the real-time monitoring image. ● AI: Configure AI functions of the camera. ● Camera: Configure camera parameters, including image parameters, encoder parameters, and audio parameters.
Operation Manual 6 Setting This section introduces the basic setting of the camera, including the configuration of Local, Camera, Network, Event, Storage, System, System Information and Log. 6.1 Local You can select protocol and configure the storage path for live snapshot, live record, playback snapshot, playback download, and video clips.
Operation Manual Parameter Description The recorded video of live interface. Live Record The default path is C:\Users\admin\WebDownload\LiveRecord. The downloaded video of playback interface. Playback The default path is Download C:\Users\admin\WebDownload\PlaybackRe cord. The clipped video of playback interface. Admin in the path Video Clips C:\Users\admin\WebDownload\VideoClips.
Page 24
Operation Manual Figure 6-2 Interface layout (self-adaptive) ● Customized scene: You can select the profile as needed. Select the profile in Time Plan Setting and drag the slide block to set certain time as the selected profile. For example, set 8:00–18:00 as day, and 0:00–8:00 and 18:00–24:00 as night Figure 6-3 Interface layout (customized scene) ●...
Operation Manual Parameter Description Makes the color deeper or lighter. The higher the value is, the Saturation deeper the color will be, and the lower the lighter. Saturation value does not change image brightness. Changes the sharpness of picture edges. The higher the value is, Sharpness the clearer the picture edges will be, and if the value is set too big, picture noises are more likely to appear.
Page 27
Operation Manual Table 6-3 Description of exposure parameters Parameter Description You can select from 50 Hz, 60 Hz and Outdoor. ● 50 Hz: When the electric supply is 50 Hz, the system adjusts the exposure according to ambient light automatically to ensure that there is no stripe appears.
Operation Manual Parameter Description Works with multi-frame (no less than 2 frames) images and reduces 3D NR noise by using the frame information between previous and latter frames. This configuration is available only when the 3D NR is enabled. Level The higher the level is, the better the result will be.
Operation Manual Step 3 Click Apply. 6.2.1.5 WB WB function makes the image color display precisely as it is. When in WB mode, white objects would always display white color in different environments. Step 1 Select > Camera > WB. Figure 6-8 WB Step 2 Configure WB parameters.
Operation Manual Figure 6-9 Day/night Step 2 Configure day and night parameters. Table 6-6 Description of day and night parameters Parameter Description You can select device display mode from Color, Auto, and B/W. Day/Night configuration is independent from profile management configuration.
Operation Manual Table 6-7 Description of illuminator parameters Parameter Description Set Fill Light for sound and siren cameras. ● IR Mode: Enable the IR illuminator, and the white light is disabled. When an alarm is triggered, the system will link white light. ●...
Operation Manual Figure 6-11 Light Step 2 Configure defog parameters. Table 6-8 Description of defog parameters Defog Description Configure function intensity and atmospheric light mode manually, and Manual then the system adjusts image clarity accordingly. Atmospheric light mode can be adjusted automatically or manually. Auto The system adjusts image clarity according to the actual condition.
Page 33
Operation Manual Figure 6-12 Encode Step 2 Configure encode parameters. Table 6-9 Description of encode parameters Parameter Description Click to enable sub stream, it is enabled by default. Sub Stream You can enable multiple sub streams simultaneously. Select encode mode. ●...
Operation Manual Parameter Description The bit rate control type during video data transmission. You can select bit rate type from: ● CBR (Constant Bit Rate): The bit rate changes a little and keeps close to the defined bit rate value. ●...
Operation Manual Step 1 Select > Camera > Encode > Overlay > Privacy Masking. Figure 6-13 Privacy masking Step 2 Configure privacy masking. 1) Click next to Enable, and then drag the block to the area that you need to cover.
Operation Manual 6.2.2.2.3 Configuring Time Title You can enable this function when you need to display time in the video image. Step 1 Select > Camera > Encode > Overlay > Time Title. Figure 6-15 Time title Step 2 Click next to Enable.
Operation Manual 6.2.2.2.5 Configuring Font Properties You can enable this function if you need to adjust the font size in the video image. Step 1 Select > Camera > Encode > Overlay > Font Properties. Figure 6-17 Font properties Step 2 Select the font color and size.
Operation Manual Step 1 Select > Camera > Encode > Overlay > Custom Title Figure 6-19 Custom Title Step 2 Click next to Enable, enter the text that you want to display, and then select the text alignment. Click to add the text overlay, and you can add 1 line at most. Step 3 Move the custom box to the position that you want in the image.
Operation Manual 6.2.2.2.9 Configuring Face Detection The image displays face statistics information. When the overlay function enabled during intelligent rules configuration, this function is enabled simultaneously. Step 1 Select > Camera > Encode > Overlay > Face Detection. Figure 6-21 Face detection Step 2 Click next to Enable, and select the text alignment.
Operation Manual Click Reset to clear the statistics data. Step 3 Move the statistics box to the position that you want in the image. Step 4 Click Apply. The information will be displayed on the image after the face recognition function is enabled.
Operation Manual Figure 6-24 ROI Step 2 Click next to Enable, draw an area on the image, and then configure the image quality of ROI. ● You can draw 4 area boxes at most. ● The higher the image quality value is, the better the quality will be. ●...
Operation Manual Step 3 Configure audio parameters. Table 6-10 Description of audio parameters Parameter Description You can select audio Encode Mode from PCM, G.711A, G.711Mu, G.726, AAC, G.723. Compression The configured audio encode mode applies to both audio and intercom. The default value is recommended. Sampling number per second.
Page 43
Operation Manual Figure 6-26 TCP/IP Step 2 Configure TCP/IP parameters. Table 6-11 Description of TCP/IP parameters Parameter Description Host Name Enter the host name, and the maximum length is 15 characters.
Page 44
Operation Manual Parameter Description Click to enable ARP/Ping to set IP address service. Get the camera MAC address, and then you can change and configure the device IP address with ARP/ping command. This is enabled by default. During restart, you will have no more than 2 minutes to configure the device IP address by a ping packet with certain length, the server will be turned off in 2 minutes, or it will be turned off immediately after the IP address is...
Operation Manual Parameter Description MAC Address Displays host MAC address. Select IPv4 or IPv6. IP Version IP Address When you select Static in Mode, enter the IP address and subnet mask that you need. Subnet Mask ● IPv6 does not have subnet mask. Default Gateway ●...
Page 46
Operation Manual ● 0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, 42323 are occupied for specific uses. ● Do not use the same value of any other port during port configuration. Table 6-12 Description of port parameters Parameter Description The max number of users (web client, platform client or mobile Max Connection phone client) that can connect to the device simultaneously.
Operation Manual The configuration of Max Connection takes effect immediately, and others will take effect after reboot. 6.3.3 PPPoE Point-to-Point Protocol over Ethernet, is one of the protocols that device uses to connect to the internet. Get the PPPoE username and password from the internet service provider, and then set up network connection through PPPoE, the camera will acquire a WAN dynamic IP address.
Operation Manual ● Third party server might collect your device information after DDNS is enabled. ● Register and log in to the DDNS website, and then you can view the information of all the connected devices in your account. Figure 6-29 DDNS Step 2 Click to enable the function.
Page 49
Operation Manual Step 1 Select > Network > Email. Figure 6-30 Email Step 2 Click to enable the function. Step 3 Configure email parameters. Table 6-14 Description of email parameters Parameter Description SMTP Server SMTP server address The port number of the SMTP Port server.
Page 50
Operation Manual Parameter Description ● Receiver’s email address. Supports 3 addresses at most. ● After entering the receiver's email address, the Test button is Receiver display. Click Test to test whether the emails can be sent and received successfully. The system sends test mail to check if the connection is Health Mail successfully configured.
Operation Manual SMTP Mailbox Authentication Port Description server ● You need to enable SMTP service in your mailbox. ● The authentication code is required; the email password is not applicable. none Authentication code: the code you receive when enabling SMTP service. smtp.sina.co Enable SMTP service in your Sina...
Operation Manual Figure 6-31 UPnP Step 2 Click next to Enable, and there are two mapping modes: Custom and Default. ● Select Custom, click and then you can change external port as needed. ● Select Default, and then the system finishes mapping with unoccupied port automatically, and you cannot edit mapping relation.
Page 53
Operation Manual Figure 6-32 SNMP (1) Figure 6-33 SNMP (2) Step 2 Select SNMP version to enable SNMP. ● Select V1, and the system can only process information of V1 version. ● Select V2, and the system can only process information of V2 version. ●...
Page 54
Operation Manual and authentication type to visit your device from the server. Using V1 and V2 might cause data leakage, and V3 is recommended. Step 3 In Trap Address, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB Browser installed, and leave other parameters to the default.
Operation Manual 6.3.8 Bonjour Enable this function, and the OS and clients that support Bonjour would find the camera automatically. You can have quick visit to the camera with Safari browser. Bonjour is enabled by default. Procedure Step 1 Select >...
Operation Manual Table 6-17 Description of multicast parameters Parameter Description The multicast IP address of Main Stream/Sub Stream is Multicast Address 224.1.2.4 by default, and the range is 224.0.0.0– 239.255.255.255. The multicast port of corresponding stream: Main Stream: Port 40000; Sub Stream1: 40016; Sub Stream2: 40032, and all the range is 1025–65500.
Operation Manual Step 1 Select > Network > QoS. Figure 6-37 QoS Step 2 Configure QoS parameters. Table 6-19 Description of QoS parameters Parameter Description Configure the priority of the data packets that used for network Realtime Monitor surveillance. 0 for the lowest and 63 the highest. Configure the priority of the data packets that used for configure or Command checking.
Operation Manual cancel Enable selection to reject the collection. Step 2 Log in to mobile phone client and tap Device management. Step 3 Tap + at the upper-right corner. Step 4 Scan the QR code on the P2P interface. Step 5 Follow the instructions to finish the settings.
Operation Manual Figure 6-40 RTMP Step 2 Click Make sure that the IP address is trustable when enabling RTMP. Step 3 Configure RTMP parameters. Table 6-20 Description of RTMP parameters Parameter Description The stream for live view. Make sure that the video format is Stream Type H.264, H.264 B and H.264H, and the audio format is AAC.
Page 60
Operation Manual Figure 6-41 Basic service Step 2 Enable the basic service according to the actual needs. Table 6-21 Description of basic service parameters Function Description You can enable SSH authentication to perform safety management. Enable this function, and then when multiple users are Multicast/Broadcast viewing the device video image simultaneously through Search...
Operation Manual 6.4 Event 6.4.1 Setting Alarm Linkage 6.4.1.1 Setting Alarm-in When an alarm is triggered by the device connected to the alarm-in port, the system performs the defined alarm linkage. Step 1 Select > Event > Alarm. Step 2 Click next to Enable to enable alarm linkage.
Operation Manual 6.4.1.2 Alarm Linkage When configuring alarm events, select alarm linkages (such as record, snapshot). When the corresponding alarm is triggered in the configured arming period, the system will alarm. Select > Event > Alarm, and then click next to Enable to enable alarm linkage. Figure 6-43 Alarm linkage 6.4.1.2.1 Adding Schedule Set arming periods.
Operation Manual Figure 6-44 Schedule Step 2 Press and drag the left mouse button on the timeline to set arming periods. Alarms will be triggered in the time period in green on the timeline. ● Click Copy next to a day, and select the days that you want to copy to in the prompt interface, you can copy the configuration to the selected days.
Operation Manual Figure 6-45 Record linkage 6.4.1.2.3 Snapshot Linkage After snapshot linkage is configured, the system can automatically alarm and take snapshots when an alarm is triggered. Prerequisites After the corresponding alarm type (Normal, Motion, or Alarm) is enabled, the snapshot channel links capturing picture.
Operation Manual Figure 6-48 Email linkage 6.4.1.3 Subscribing Alarm 6.4.1.3.1 About Alarm Types For alarm types and preparations of alarm events, see Table 6-22. Table 6-22 Description of alarm types Alarm Type Description Preparation Motion detection is enabled. For The alarm is triggered when Motion Detection details, see "6.4.3.1 Setting moving object is detected.
Operation Manual Functions of different devices might vary, and the actual product shall prevail. Step 1 Click at the right-upper corner of the main interface. Figure 6-49 Alarm (subscription) Step 2 Click next to Enable Alarm. Step 3 Select alarm type according to the actual need. For details, see "6.4.1.3.2 Subscribing Alarm Information".
Operation Manual Only the device with SD card has the abnormality functions, including No SD Card, SD Card Error, and Capacity Warning. 6.4.2.1 Setting SD Card Exception In case of SD card exception, the system performs alarm linkage. The event types include No SD Card, Low SD Card Space, and SD Card Error.
Operation Manual Figure 6-51 Network exception Step 2 Click to enable the network detection function. Step 3 Set alarm linkage actions. For details, see "6.4.1.2 Alarm Linkage". Step 4 Click Apply. 6.4.2.3 Setting Voltage Detection When the input voltage is higher than or lower than the rated value of the device, the system performs alarm linkage.
Operation Manual Figure 6-52 Voltage detection Step 2 Click to enable the voltage detection function. When enabling Overlay, the alarm icon is displayed by overlapping when the alarm is triggered. Step 3 Set alarm linkage actions. For details, see "6.4.1.2 Alarm Linkage". Step 4 Click Apply.
Page 70
Operation Manual Figure 6-53 Motion detection Step 2 Click to enable the motion detection function. Step 3 Set the area for motion detection. 1) Click Setting next to Area. Figure 6-54 Area 2) Select a color and set the region name. Select an effective area for motion detection in the image and set Sensitivity and Threshold.
Operation Manual and threshold according to the waveform. 3) Click OK. Step 4 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". If the exiting schedules cannot meet the scene requirement, you can click Add Schedule to add a new schedule. For details, see "6.4.1.2.1 Adding Schedule". Anti-dither: After the Anti-dither time is set, the system only records one motion detection event in the period.
Operation Manual Step 1 Select > Event > Video Detection > Scene Changing. Figure 6-56 Scene changing Step 2 Select the schedule and arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". If the exiting schedules cannot meet the scene requirement, you can click Add Schedule to add a new schedule.
Operation Manual Figure 6-57 Audio detection Step 2 Set parameters. ● Input abnormal: Click next to Audio Abnormal, and the alarm is triggered when the system detects abnormal sound input. ● Intensity change: Click next to Intensity Change, and then set Sensitivity and Threshold.
Operation Manual Functions might vary with different models, and the actual product shall prevail. Select > Storage. ● Click Read-Only, and then the SD card is set to read only. ● Click Read & Write, and then the SD card is set to read & write. ●...
Operation Manual Parameter Description Select video standard from PAL and NTSC. Video Standard Step 3 Click Apply. 6.6.1.2 Date & Time You can configure date and time format, time zone, current time, DST (Daylight Saving Time) or NTP server. Step 1 Select >...
Operation Manual Parameter Description Configure system time. Current Time Click Sync PC, and the system time changes to the PC time. Enable DST as needed. Click , and configure start time and end time of DST with Date or Week. Step 3 Click Apply.
Page 77
Operation Manual Figure 6-61 User Step 2 Click Add. Figure 6-62 Add user (system)
Page 78
Operation Manual Figure 6-63 Add user (restricted login) Step 3 Configure user parameters. Table 6-25 Description of user parameters (1) Parameter Description User’s unique identification. You cannot use existed username. Username Password Enter password and confirm it again. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower Confirm Password case, number, and special character (excluding ' "...
Operation Manual Parameter Description Set the PC address that allows the defined user to log in to the camera and the validity period and time range. You can log in to the web interface with the defined IP in the defined time range of validity period.
Operation Manual camera. Step 3 Enter the reserved email address. Step 4 Click Apply. 6.6.2.2 Adding User Group You have two groups named admin and user by default, and you can add new group, delete added group or edit group authority and memo. Step 1 Select >...
Operation Manual 6.6.2.3 ONVIF User You can add, delete ONVIF user, and change their passwords. Step 1 Select > System > Account > ONVIF User. Figure 6-67 ONVIF user Step 2 Click Add. Figure 6-68 Add ONVIF user Step 3 Configure user parameters.
Operation Manual The admin account cannot be deleted. 6.6.3 Manager 6.6.3.1 Requirements To make sure the system runs normally, maintain it as the following requirements: ● Check surveillance images regularly. ● Clear regularly user and user group information that are not frequently used. ●...
Operation Manual When you enable and confirm the Auto Delete function, the deleted files cannot be restored. Operate it carefully. Step 3 Click Apply. 6.6.3.3 Import/Export ● Export the system configuration file to back up the system configuration. ● Import system configuration file to make quick configuration or recover system configuration.
Operation Manual Figure 6-71 Default 6.6.4 Upgrade Upgrading to the latest system can refine camera functions and improve stability. If wrong upgrade file has been used, restart the device; otherwise some functions might not work properly. Step 1 Select > System > Upgrade. Figure 6-72 Upgrade Step 2 Click Browse, and then upload upgrade file.
Operation Manual 6.7.2 Online User Select > System Info > Online User to view all the current users logging in to web. 6.8 Setting Log 6.8.1 Log You can view and back up logs. Step 1 Select > Log > Log. Step 2 Configure Start Time and End Time, and then select the log type.
Operation Manual Figure 6-73 Log 6.8.2 Remote Log Configure remote log, and you can get the related log by accessing the set address. Step 1 Select > Log > Remote Log. Step 2 Click to enable remote log function. Step 3 Set address, port and device number.
Operation Manual 7 Live This section introduces the layout of the interface and function configuration. 7.1 Live Interface Log in and click the Live tab. Interface might vary with different models, and the actual interface shall prevail. Figure 7-1 Live (single-channel) Figure 7-2 Live (multi-channels) Table 7-1 Description of function bar Function...
Operation Manual Function Description Live view Displays the real-time monitoring image. Live view function bar Functions and operations in live viewing. 7.2 Setting Encode Click , and then select the stream as needed. Figure 7-3 Encode bar ● Main Stream: It has large bit stream value and image with high resolution, but also requires large bandwidth.
Operation Manual Icon Function Description Click the icon to capture one picture of the current image, and it will be saved to the configured storage path. Snapshot About viewing or configuring storage path, see "6.1 Local". Click the icon to capture three pictures of the current image, and they will be saved to the configured storage path.
Operation Manual Icon Function Description Click the icon to enter full screen Full Screen mode; double-click or press Esc to exit. Click the icon to resume original ratio or change ratio. Click the icon to select the fluency from Realtime, General and Fluent. ●...
Page 91
Operation Manual The focus would adjust automatically after zooming in or out. Figure 7-4 Zoom and focus Table 7-4 Description of zoom and focus parameter Parameter Description Changes the focal length of the camera to zoom in or out the image.
Operation Manual 7.4.3 Image Adjustment Click Image Adjustment at the lower-left corner of Live interface, and click + or– button, or drag to adjust image parameters, including brightness, contrast, hue, and saturation. The adjustment is only available on the web interface, and it does not adjust the camera parameters.
Page 93
Operation Manual Make sure that you have enabled face detection function. Figure 7-6 Face mode ● Select Metadata Mode from the display mode drop-down list. Make sure that you have enabled video metadata detection function. Figure 7-7 Metadata mode Table 7-5 Description of face mode layout Function Description Displays the real-time monitoring image.
Operation Manual 8 AI 8.1 Setting Crowd Distribution Map You can view crowd distribution on the map in real time for timely arming, to prevent stampede and other accidents. 8.1.1 Global Configuration Set the calibration parameters of panoramic cameras. Calibration Purpose Determine corresponding relationship between 2D image captured by the camera and 3D actual object according to one horizontal ruler and three vertical rulers calibrated by the user and the corresponding actual distance.
Operation Manual 8.1.2 Rule Configuration When the number of people or the crowd density in the detection area exceeds the configured threshold, the system performs alarm linkages. Prerequisites ● Select AI > Smart Plan, and enable Crowd Distribution Map. ● You have configured the parameters on the Global Config interface. Procedure Step 1 Select AI >...
Operation Manual Parameter Description The system detects crowd distribution in the global area. When the crowd density exceeds the configured threshold, the system Crowd Density performs alarm linkages. Step 7 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". Click + Event Linkage to set the linkage action.
Operation Manual Figure 8-5 Face recognition flowchart 8.2.1 Setting Face Detection When a face is recognized in the detection area, the system performs alarm linkage. Procedure Step 1 Select AI > Smart Plan. Step 2 Click next to Face Recognition to enable face recognition of the corresponding channel, and then click Next.
Page 98
Operation Manual ● Click to draw the minimum size of the target, and click to draw the maximum size of the target. Only when the target size between the maximum size and the minimum size, can the alarm be triggered. ●...
Operation Manual Parameter Description Properties Click next to Properties to enable the properties display. Click next to Face Exposure. When a face is detected, the Face Exposure camera can enhance brightness of the face to make the face image clear. Face Target Set the face target brightness.
Page 100
Operation Manual Figure 8-7 Face database configuration Step 4 Click Add Face Database. Step 5 Set the name of the face database. Figure 8-8 Add face database Step 6 Click OK. Figure 8-9 Face database successfully added ● Edit the name of the face database. Click the text box under Name to edit the name of the face database.
Operation Manual 8.2.2.2 Adding Face Picture Add face picture to the created face database. Single adding and batch importing are supported. Requirements on face pictures. ● A single face picture size is 50K–150K in JPEG format. The resolution is less than 1080p. ●...
Page 102
Operation Manual Figure 8-10 Register Step 4 Enter the information about face picture according to the actual situation. Step 5 Click Add to task list. Step 6 Click , and then click Operation. ● If the operation is successful, the system prompts that stored successfully, modeled successfully.
Operation Manual Parameter Error Description Multiple faces in the picture. Change the picture. Failed to decode the picture. Change the picture. The picture is not suitable to be imported to the face database. Change the picture. The database error. Restart the camera and model faces again.
Operation Manual Figure 8-11 Task list Step 4 Click Import to import the face pictures. After the importing is completed, the result will be displayed. ● If the picture is imported successfully, click Next to do modeling operation. ● If the picture importing failed, click Query to view the details of the pictures and error code.
Operation Manual Figure 8-12 Face information modification Step 5 Click , and then click Operation. 8.2.2.3.2 Deleting Face Picture On the Face Database Config interface, click next to the face database to be configured. Click Query, set the search criteria as needed, click Search, select the face information that needs to be deleted and delete it.
Operation Manual establish relevant face feature models. Through this function, the face recognition and other intelligent detections can be realized. ● The more the selected face pictures are, the longer time the face modeling takes. Please wait patiently. ● During modeling, some intelligent detection functions (such as face recognition) are not available temporarily, and will be available after modeling.
Operation Manual The snapshot will be compared to the pictures in the armed face database. 2) Set the similarity. The detected face matches the face database only when the similarity between the detected face and the face feature in face database reaches the configured similarity threshold.
Operation Manual Figure 8-15 Face recognition result 8.3 Setting Face Detection When a face is detected in the detection area, the system performs an alarm linkage. Procedure Step 1 Select AI > Smart Plan. Step 2 Click next to Face Detection to enable face detection of the corresponding channel, and then click Next.
Page 109
Operation Manual ● Click to draw an exclusion area for face detection in the image. ● Click to draw the minimum size of the target, and click to draw the maximum size of the target. Only when the target size between the maximum size and the minimum size, can the alarm be triggered.
Operation Manual Parameter Description ● Snapshot Angle Filter: Set snapshot angle to be filtered during the face detection. ● Snapshot Sensitivity: Set snapshot sensitivity during the face Advanced detection. It is easier to detect face with higher sensitivity. ● Optimized Time: Set a time period to capture the clearest picture after the camera detects face.
Operation Manual object in the image should be no less than 15 × 15 pixels (CIF image). The target height and width should no more than a third of the image height and width. The recommended target height is 10% of the image height. ●...
Operation Manual Procedure 1. Select AI > Smart Plan. 2. Click next to IVS to enable IVS of the corresponding channel, and then click Next. 3. Click the Global Config tab. Figure 8-18 Global configuration of IVS 4. Set calibration area and ruler. a.
Page 113
Operation Manual Table 8-6 Description of IVS functions Rule Description Applicable Scene When the target crosses tripwire from the defined motion direction, an Tripwire alarm is triggered, and then the Scenes with sparse targets system performs configured alarm and no occlusion among linkages.
Page 114
Operation Manual Rule Description Applicable Scene When the target stays over the configured time, an alarm is Road monitoring and traffic Parking detection triggered, and then the system management. performs configured alarm linkages. Scenes with medium or long When the crowd gathers or the distance, such as outdoor crowd density is large, an alarm is plaza, government entrance,...
Page 115
Operation Manual Rule Description triggered if pedestrian or vehicle stays for a long time. If the Missing object abandoned object is smaller than pedestrian and vehicle, Fast moving set the target size to filter pedestrian and vehicle or properly Parking detection extend the duration to avoid false alarm triggered by Crowd gathering transient staying of pedestrian.
Operation Manual Parameter Description ● For fast moving, sensitivity is related to the triggering speed. Lower sensitivity requires faster moving speed to trigger the alarm. Sensitivity ● For crowd gathering, sensitivity is related to the alarm triggering time. It is easier to trigger the alarm with higher sensitivity.
Operation Manual Figure 8-20 Global configuration of video metadata Table 8-9 Description of scene set parameters (video metadata) Parameter Description Overlay target box on the captured pictures to mark the target position. Four types of target boxes are supported. Select the target Target Box Overlay box as needed.
Page 118
Operation Manual Procedure Step 1 Select AI > Smart Plan Step 2 Click next to Video Metadata, and then click Next. Step 3 Click the Rule Config tab. Step 4 Click Add Rule to select rules. The added rules will be display in the list. Click the text box under Name to edit the rule name.
Operation Manual Step 7 Set parameters. Table 8-10 Description of crowd map parameters Parameter Description Click next to People Flow Statistics to count the number People Flow Statistics of people in the detection area. Flow Statistics Click next to Flow Statistics (Non-motor Vehicle) to (Non-motor Vehicle) count the number of non-motor vehicles in the detection area.
Page 120
Operation Manual Figure 8-23 Video metadata report...
Operation Manual 9 Camera Click Camera to configure camera parameters, including image parameters, encoder parameters, and audio parameters. For details, see "6.2 Camera".
Operation Manual 10 Event Click Event to configure general events, including alarm linkage exception, video detection, and audio detection. For details. see "6.4 Event".
Operation Manual 11 System Click System, and you can configure system parameters, including general, date & time, account, safety, PTZ settings, default, import/export, remote, auto maintain and upgrade. For details, see "6.6 System".
Operation Manual 12 Security 12.1 Security Status Background Information Detect the user and service, and scan the security modules to check the security status of the camera, so that when abnormality appears, you can process it timely. ● User and service detection: Detect login authentication, user status, and configuration security to check whether the current configuration conforms to recommendation.
Operation Manual Figure 12-2 Security Status 12.2 System Service 12.2.1 802.1x Cameras can connect to LAN after passing 802.1x authentication. Step 1 Select Security > System Service > 802.1x. Step 2 Select the NIC name as needed, and click to enable it. Step 3 Select the authentication mode, and then configure parameters.
Operation Manual If there is no certificate in the list, click Certificate Management at the left navigation bar. For details, see "12.4.2 Installing Trusted CA Certificate". Figure 12-4 802.1x (TLS) Step 4 Click Apply. 12.2.2 HTTPS Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS with your PC.
Operation Manual 12.3.2 Account Lockout If you consecutively enter a wrong password more than the configured value, the account will be locked. Step 1 Select Security > Attack Defense > Account Lockout. Step 2 Configure the login attempt and lock time for device account and ONVIF user. ●...
Operation Manual Figure 12-9 Anti-DoS attack 12.4 CA Certificate 12.4.1 Installing Device Certificate Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS with your PC. 12.4.1.1 Creating Certificate Creating certificate in the device. Step 1 Select Security >...
Operation Manual Figure 12-10 Certificate information (1) Step 5 Click Create and install certificate. After the certificate is created successfully, you can view the created certificate on the Device Certificate interface. Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ●...
Operation Manual Figure 12-11 Certificate information (2) Step 5 Click Create and Download. Save the request file to your PC. Step 6 Apply the CA certificate from the third-party certificate authority. Step 7 Import the signed CA certificate. 1) Save the CA certificate to the PC. 2) Do Step1 to Step3, and click Browse to select the signed CE certificate.
Operation Manual Figure 12-12 Certificate and private key Step 5 Click Import and Install. After the certificate is created successfully, you can view the created certificate on the Device Certificate interface. Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ●...
Operation Manual 12.5 A/V Encryption The device supports audio and video encryption during data transmission. You are recommended to enable A/V Encryption function. There might be safety risk if this function is disabled. Step 1 Select Security > A/V Encryption. Step 2 Configure the parameters.
Operation Manual 12.6 Security Warning When security exception event is detected, the camera sends a warning to remind you to process it timely, to avoid security risk. Step 1 Select Security > Security Warning. Step 2 Click next to Enable to enable security warning. Step 3 Configure the parameters.
Operation Manual 13 Record This section introduces the functions and operations of video playback. 13.1 Playback 13.1.1 Playing Back Video This section introduces the operation of video playback. Prerequisites ● This function is available on the camera with SD card. ●...
Page 136
Operation Manual Figure 13-2 Video playback Table 13-1 Description of video playback interface Function Description Displays all searched recorded video files. Click any files to play back it. Recorded video list Click Back at the upper-left corner to go to the Search Video interface.
Operation Manual Function Description Controls the sound during playback. ● Sound : Mute mode. ● : Vocal state. You can adjust the sound. Click to capture one picture of the current image, and it will be saved to the configured storage path.
Operation Manual Figure 13-4 Clipping video Step 5 Click Start Download. The playback stops and the clipped file is saved in the configured storage path. For details of storage path, see "6.1 Local". 13.1.3 Downloading Video Download videos to a defined path. You can download a single video, or download them in batches.
Operation Manual Figure 13-6 Downloading video Step 6 Click Start Download. The downloaded files are saved in the configured storage path. For details of storage path, see "6.1 Local". 13.2 Setting Record Control Set parameters such as pack duration, pre-event record, disk full, record mode, and record stream.
Operation Manual Parameter Description The time to record the video in advance of a triggered alarm event. For example, if the pre-event record is set to be 5 s, the system saves the recorded video 5 s before the alarm is triggered.
Operation Manual ● Click Copy next to a day, and select the days that you want to copy to in the prompt interface, you can copy the configuration to the selected days. Select the Select All check box to select all day to copy the configuration. ●...
Operation Manual Figure 13-10 Live Step 2 Select the storage method that you need for different types of recorded videos. Table 13-3 Description of storage parameters Parameter Description Select from Scheduled, Motion Detection and Alarm. Event Type Recording strategy when the disk is full. ●...
Operation Manual 13.4.2 Network Storage You can select from FTP and NAS. When the network does not work, you can save all the files to the internal SD card for emergency. 13.4.2.1 FTP Enable this function, and you can save all the files in the FTP server. Step 1 Select Record >...
Operation Manual Table 13-4 Description of FTP parameters Parameter Description Server IP The IP address of the FTP server. Port The port number of the FTP server. Username The username to log in to the FTP server. Password The password to log in to the FTP server. Storage Path The destination path in the FTP server.
Page 145
Operation Manual Figure 13-13 FTP Step 5 Configure NAS parameters. Table 13-5 Description of NAS parameters Parameter Description Server IP The IP address of the NAS server. Storage Path The destination path in the NAS server. Username When selecting SMB protocol, you are required to enter username and password.
Operation Manual 14 Picture This section introduces the related functions and operations of picture playback. 14.1 Playback 14.1.1 Playing Back Picture This section introduces the operation of picture playback. Prerequisites ● This function is available on the camera with SD card. ●...
Operation Manual Figure 14-2 Picture playback Table 14-1 Description of playback interface Function Description Displays all searched snapshots. Click any files to play back it. Snapshot list Click Back at the upper-left corner to go to the Picture Query interface. ●...
Operation Manual Figure 14-3 Selecting picture file Step 4 Click Download. Step 5 Select the download format and storage path. Figure 14-4 Downloading picture Step 6 Click Start Download. The downloaded pictures are saved in the configured storage path. For details of storage path, see "6.1 Local".
Operation Manual Figure 14-5 Snapshot Table 14-2 Description of snapshot parameters Parameter Description You can select from Scheduled and Event. ● Scheduled: Capture images in configured period. For details, see ● Event: Capture images when configured event is triggered, such as Motion Detection, Video Tamper and Scene Changing.
Operation Manual 15 Report You can search the result of face detection. Step 1 Select Report > Face Detection. Step 2 Select the channel, and set the time. Click Advance, and you can set face attributes. Step 3 Click Search. Figure 15-1 Face detection Report Step 4 Click the picture, and you can view the details.
Operation Manual Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
Page 152
Operation Manual between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing.