Table of Contents

Advertisement

Quick Links

Network Camera Web 5.0
Operation Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V1.0.0

Advertisement

Table of Contents
loading

Summary of Contents for Dahua Technology WizMind IPC-PDBW82041-B360

  • Page 1 Network Camera Web 5.0 Operation Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.0...
  • Page 2: Foreword

    Operation Manual Foreword General This manual introduces the functions, configuration, general operation, and system maintenance of network camera. Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
  • Page 3: Important Safeguards And Warnings

    Operation Manual Important Safeguards and Warnings Electrical Safety ● All installation and operation shall conform to your local electrical safety codes. ● The power source shall conform to the Safety Extra Low Voltage (SELV) standard, and supply power with rated voltage which conforms to Limited Power Source requirement according to IEC60950-1.
  • Page 4 Operation Manual mild detergent. To avoid possible damage on device body coating which could cause performance to decrease, do not use volatile solvent such as alcohol, benzene, diluent and so on to clean the device body, nor can strong, abrasive detergent be used. ●...
  • Page 5: Table Of Contents

    Operation Manual Table of Contents Foreword ..............................I Important Safeguards and Warnings ..................... II 1 Overview ..............................1 1.1 Introduction ........................... 1 1.2 Network Connection ........................1 1.3 Function ............................1 1.3.1 Basic Function ........................1 1.3.2 AI Function ..........................2 2 Configuration Flow ..........................
  • Page 6 Operation Manual 6.2.2.2.9 Configuring Face Detection ................30 6.2.2.2.10 Configuring Face Recognition ................ 30 6.2.2.2.11 Configuring Face Statistics ................31 6.2.2.3 ROI ..........................31 6.2.3 Setting Audio Parameters ....................32 6.3 Network ............................33 6.3.1 TCP/IP ........................... 33 6.3.2 Port ............................36 6.3.3 PPPoE ..........................
  • Page 7 Operation Manual 6.4.3.1 Setting Motion Detection ................... 60 6.4.3.2 Setting Video Tampering ................... 62 6.4.3.3 Setting Scene Changing .................... 62 6.4.4 Setting Audio Detection ..................... 63 6.5 Storage ............................64 6.6 System ............................65 6.6.1 General ..........................65 6.6.1.1 Basic ..........................65 6.6.1.2 Date &...
  • Page 8 Operation Manual 8.1.2 Rule Configuration ......................86 8.2 Setting Face Recognition ......................87 8.2.1 Setting Face Detection ....................... 88 8.2.2 Setting Face Database ....................... 90 8.2.2.1 Creating Face Database ..................... 90 8.2.2.2 Adding Face Picture ....................92 8.2.2.2.1 Single Adding ..................... 92 8.2.2.2.2 Batch Importing ....................
  • Page 9 Operation Manual 12.4.2 Installing Trusted CA Certificate ................... 123 12.5 A/V Encryption ........................124 12.6 Security Warning ........................125 13 Record .............................. 126 13.1 Playback ........................... 126 13.1.1 Playing Back Video ......................126 13.1.2 Clipping Video ......................... 128 13.1.3 Downloading Video ......................129 13.2 Setting Record Control ......................
  • Page 10: Overview

    Operation Manual 1 Overview 1.1 Introduction IP camera (Internet Protocol camera), is a type of digital video camera that receives control data and sends image data through internet. They are commonly used for surveillance, requiring no local recording device, but only a local area network. IP camera is divided into single-channel camera and multi-channel camera according to the channel quantity.
  • Page 11: Ai Function

    Operation Manual ● Record abnormality of monitoring image for subsequent view and processing. ● Configure coding parameters, and adjust live view image. Alarm ● Set alarm prompt mode and tone according to alarm type. ● View alarm prompt message. Exception ●...
  • Page 12 Operation Manual Face Detection ● Detect face and display the related attributes on the live interface. ● When an alarm is triggered, the system performs linkages such as recording, alarm output, sending email, PTZ operation, and snapshot. Face Recognition ● After detecting face, make comparison between the detected face with the face in face database, and activates alarm output.
  • Page 13: Configuration Flow

    Operation Manual 2 Configuration Flow For the device configuration flow, see Figure 2-1. For details, see Table 2-1. Configure the device according to the actual situation. Figure 2-1 Configuration flow Table 2-1 Description of flow Configuration Description Reference Open IE browser and enter IP address to log in to the web Login "4 Login".
  • Page 14: Device Initialization

    Operation Manual 3 Device Initialization Device initialization is required for the first-time use. This manual is based on the operation on the web interface. You can also initialize device through ConfigTool, NVR, or platform devices. ● To ensure the device safety, keep the password properly after initialization and change the password regularly.
  • Page 15 Operation Manual Figure 3-2 Disclaimer Step 3 Select the I have read and agree to the terms of the Software License Agreement and Privacy Policy check box, and then click Next. Figure 3-3 Time zone setting Step 4 Configure the time parameters, and then click Next.
  • Page 16 Operation Manual Figure 3-4 Password setting Step 5 Set the password for admin account. Table 3-1 Description of password configuration Parameter Description Username The default username is admin. Password The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' "...
  • Page 17 Operation Manual Figure 3-5 P2P...
  • Page 18: Login

    Operation Manual 4 Login 4.1 Device Login This section introduces how to log in to and log out of the web interface. This section takes Chrome as an example. ● You need to initialize the camera before logging in to the web interface. For details, see "3 Device Initialization".
  • Page 19: Resetting Password

    Operation Manual Figure 4-2 Live interface 4.2 Resetting Password When you need to reset the password for the admin account, there will be a security code sent to the entered email address which can be used to reset the password. Prerequisites You have enabled password resetting service.
  • Page 20 Operation Manual that is set during the initialization. Figure 4-4 Login...
  • Page 21: Main Interface

    Operation Manual 5 Main Interface Click at the left-upper corner of the interface to display the main interface. Figure 5-1 Main interface ● Live: View the real-time monitoring image. ● AI: Configure AI functions of the camera. ● Camera: Configure camera parameters, including image parameters, encoder parameters, and audio parameters.
  • Page 22: Setting

    Operation Manual 6 Setting This section introduces the basic setting of the camera, including the configuration of Local, Camera, Network, Event, Storage, System, System Information and Log. 6.1 Local You can select protocol and configure the storage path for live snapshot, live record, playback snapshot, playback download, and video clips.
  • Page 23: Camera

    Operation Manual Parameter Description The recorded video of live interface. Live Record The default path is C:\Users\admin\WebDownload\LiveRecord. The downloaded video of playback interface. Playback The default path is Download C:\Users\admin\WebDownload\PlaybackRe cord. The clipped video of playback interface. Admin in the path Video Clips C:\Users\admin\WebDownload\VideoClips.
  • Page 24 Operation Manual Figure 6-2 Interface layout (self-adaptive) ● Customized scene: You can select the profile as needed. Select the profile in Time Plan Setting and drag the slide block to set certain time as the selected profile. For example, set 8:00–18:00 as day, and 0:00–8:00 and 18:00–24:00 as night Figure 6-3 Interface layout (customized scene) ●...
  • Page 25: Image

    Operation Manual Figure 6-4 Interface layout (Day/night switch) 6.2.1.2 Image You can configure picture parameters as needed. Step 1 Select > Camera > Image. Figure 6-5 Image Step 2 Configure picture parameters. Table 6-2 Description of picture parameters Parameter Description Select the picture style from soft, standard and vivid.
  • Page 26: Exposure

    Operation Manual Parameter Description Makes the color deeper or lighter. The higher the value is, the Saturation deeper the color will be, and the lower the lighter. Saturation value does not change image brightness. Changes the sharpness of picture edges. The higher the value is, Sharpness the clearer the picture edges will be, and if the value is set too big, picture noises are more likely to appear.
  • Page 27 Operation Manual Table 6-3 Description of exposure parameters Parameter Description You can select from 50 Hz, 60 Hz and Outdoor. ● 50 Hz: When the electric supply is 50 Hz, the system adjusts the exposure according to ambient light automatically to ensure that there is no stripe appears.
  • Page 28: Backlight

    Operation Manual Parameter Description Works with multi-frame (no less than 2 frames) images and reduces 3D NR noise by using the frame information between previous and latter frames. This configuration is available only when the 3D NR is enabled. Level The higher the level is, the better the result will be.
  • Page 29: Day/Night

    Operation Manual Step 3 Click Apply. 6.2.1.5 WB WB function makes the image color display precisely as it is. When in WB mode, white objects would always display white color in different environments. Step 1 Select > Camera > WB. Figure 6-8 WB Step 2 Configure WB parameters.
  • Page 30: Illuminator

    Operation Manual Figure 6-9 Day/night Step 2 Configure day and night parameters. Table 6-6 Description of day and night parameters Parameter Description You can select device display mode from Color, Auto, and B/W. Day/Night configuration is independent from profile management configuration.
  • Page 31: Defog

    Operation Manual Table 6-7 Description of illuminator parameters Parameter Description Set Fill Light for sound and siren cameras. ● IR Mode: Enable the IR illuminator, and the white light is disabled. When an alarm is triggered, the system will link white light. ●...
  • Page 32: Setting Encode Parameters

    Operation Manual Figure 6-11 Light Step 2 Configure defog parameters. Table 6-8 Description of defog parameters Defog Description Configure function intensity and atmospheric light mode manually, and Manual then the system adjusts image clarity accordingly. Atmospheric light mode can be adjusted automatically or manually. Auto The system adjusts image clarity according to the actual condition.
  • Page 33 Operation Manual Figure 6-12 Encode Step 2 Configure encode parameters. Table 6-9 Description of encode parameters Parameter Description Click to enable sub stream, it is enabled by default. Sub Stream You can enable multiple sub streams simultaneously. Select encode mode. ●...
  • Page 34: Overlay

    Operation Manual Parameter Description The bit rate control type during video data transmission. You can select bit rate type from: ● CBR (Constant Bit Rate): The bit rate changes a little and keeps close to the defined bit rate value. ●...
  • Page 35: Configuring Channel Title

    Operation Manual Step 1 Select > Camera > Encode > Overlay > Privacy Masking. Figure 6-13 Privacy masking Step 2 Configure privacy masking. 1) Click next to Enable, and then drag the block to the area that you need to cover.
  • Page 36: Configuring Time Title

    Operation Manual 6.2.2.2.3 Configuring Time Title You can enable this function when you need to display time in the video image. Step 1 Select > Camera > Encode > Overlay > Time Title. Figure 6-15 Time title Step 2 Click next to Enable.
  • Page 37: Configuring Font Properties

    Operation Manual 6.2.2.2.5 Configuring Font Properties You can enable this function if you need to adjust the font size in the video image. Step 1 Select > Camera > Encode > Overlay > Font Properties. Figure 6-17 Font properties Step 2 Select the font color and size.
  • Page 38: Configuring Target Statistics

    Operation Manual Step 1 Select > Camera > Encode > Overlay > Custom Title Figure 6-19 Custom Title Step 2 Click next to Enable, enter the text that you want to display, and then select the text alignment. Click to add the text overlay, and you can add 1 line at most. Step 3 Move the custom box to the position that you want in the image.
  • Page 39: Configuring Face Detection

    Operation Manual 6.2.2.2.9 Configuring Face Detection The image displays face statistics information. When the overlay function enabled during intelligent rules configuration, this function is enabled simultaneously. Step 1 Select > Camera > Encode > Overlay > Face Detection. Figure 6-21 Face detection Step 2 Click next to Enable, and select the text alignment.
  • Page 40: Configuring Face Statistics

    Operation Manual Click Reset to clear the statistics data. Step 3 Move the statistics box to the position that you want in the image. Step 4 Click Apply. The information will be displayed on the image after the face recognition function is enabled.
  • Page 41: Setting Audio Parameters

    Operation Manual Figure 6-24 ROI Step 2 Click next to Enable, draw an area on the image, and then configure the image quality of ROI. ● You can draw 4 area boxes at most. ● The higher the image quality value is, the better the quality will be. ●...
  • Page 42: Network

    Operation Manual Step 3 Configure audio parameters. Table 6-10 Description of audio parameters Parameter Description You can select audio Encode Mode from PCM, G.711A, G.711Mu, G.726, AAC, G.723. Compression The configured audio encode mode applies to both audio and intercom. The default value is recommended. Sampling number per second.
  • Page 43 Operation Manual Figure 6-26 TCP/IP Step 2 Configure TCP/IP parameters. Table 6-11 Description of TCP/IP parameters Parameter Description Host Name Enter the host name, and the maximum length is 15 characters.
  • Page 44 Operation Manual Parameter Description Click to enable ARP/Ping to set IP address service. Get the camera MAC address, and then you can change and configure the device IP address with ARP/ping command. This is enabled by default. During restart, you will have no more than 2 minutes to configure the device IP address by a ping packet with certain length, the server will be turned off in 2 minutes, or it will be turned off immediately after the IP address is...
  • Page 45: Port

    Operation Manual Parameter Description MAC Address Displays host MAC address. Select IPv4 or IPv6. IP Version IP Address When you select Static in Mode, enter the IP address and subnet mask that you need. Subnet Mask ● IPv6 does not have subnet mask. Default Gateway ●...
  • Page 46 Operation Manual ● 0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, 42323 are occupied for specific uses. ● Do not use the same value of any other port during port configuration. Table 6-12 Description of port parameters Parameter Description The max number of users (web client, platform client or mobile Max Connection phone client) that can connect to the device simultaneously.
  • Page 47: Pppoe

    Operation Manual The configuration of Max Connection takes effect immediately, and others will take effect after reboot. 6.3.3 PPPoE Point-to-Point Protocol over Ethernet, is one of the protocols that device uses to connect to the internet. Get the PPPoE username and password from the internet service provider, and then set up network connection through PPPoE, the camera will acquire a WAN dynamic IP address.
  • Page 48: Email

    Operation Manual ● Third party server might collect your device information after DDNS is enabled. ● Register and log in to the DDNS website, and then you can view the information of all the connected devices in your account. Figure 6-29 DDNS Step 2 Click to enable the function.
  • Page 49 Operation Manual Step 1 Select > Network > Email. Figure 6-30 Email Step 2 Click to enable the function. Step 3 Configure email parameters. Table 6-14 Description of email parameters Parameter Description SMTP Server SMTP server address The port number of the SMTP Port server.
  • Page 50 Operation Manual Parameter Description ● Receiver’s email address. Supports 3 addresses at most. ● After entering the receiver's email address, the Test button is Receiver display. Click Test to test whether the emails can be sent and received successfully. The system sends test mail to check if the connection is Health Mail successfully configured.
  • Page 51: Upnp

    Operation Manual SMTP Mailbox Authentication Port Description server ● You need to enable SMTP service in your mailbox. ● The authentication code is required; the email password is not applicable. none Authentication code: the code you receive when enabling SMTP service. smtp.sina.co Enable SMTP service in your Sina...
  • Page 52: Snmp

    Operation Manual Figure 6-31 UPnP Step 2 Click next to Enable, and there are two mapping modes: Custom and Default. ● Select Custom, click and then you can change external port as needed. ● Select Default, and then the system finishes mapping with unoccupied port automatically, and you cannot edit mapping relation.
  • Page 53 Operation Manual Figure 6-32 SNMP (1) Figure 6-33 SNMP (2) Step 2 Select SNMP version to enable SNMP. ● Select V1, and the system can only process information of V1 version. ● Select V2, and the system can only process information of V2 version. ●...
  • Page 54 Operation Manual and authentication type to visit your device from the server. Using V1 and V2 might cause data leakage, and V3 is recommended. Step 3 In Trap Address, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB Browser installed, and leave other parameters to the default.
  • Page 55: Bonjour

    Operation Manual 6.3.8 Bonjour Enable this function, and the OS and clients that support Bonjour would find the camera automatically. You can have quick visit to the camera with Safari browser. Bonjour is enabled by default. Procedure Step 1 Select >...
  • Page 56: Register

    Operation Manual Table 6-17 Description of multicast parameters Parameter Description The multicast IP address of Main Stream/Sub Stream is Multicast Address 224.1.2.4 by default, and the range is 224.0.0.0– 239.255.255.255. The multicast port of corresponding stream: Main Stream: Port 40000; Sub Stream1: 40016; Sub Stream2: 40032, and all the range is 1025–65500.
  • Page 57: Platform Access

    Operation Manual Step 1 Select > Network > QoS. Figure 6-37 QoS Step 2 Configure QoS parameters. Table 6-19 Description of QoS parameters Parameter Description Configure the priority of the data packets that used for network Realtime Monitor surveillance. 0 for the lowest and 63 the highest. Configure the priority of the data packets that used for configure or Command checking.
  • Page 58: Onvif

    Operation Manual cancel Enable selection to reject the collection. Step 2 Log in to mobile phone client and tap Device management. Step 3 Tap + at the upper-right corner. Step 4 Scan the QR code on the P2P interface. Step 5 Follow the instructions to finish the settings.
  • Page 59: Basic Service

    Operation Manual Figure 6-40 RTMP Step 2 Click Make sure that the IP address is trustable when enabling RTMP. Step 3 Configure RTMP parameters. Table 6-20 Description of RTMP parameters Parameter Description The stream for live view. Make sure that the video format is Stream Type H.264, H.264 B and H.264H, and the audio format is AAC.
  • Page 60 Operation Manual Figure 6-41 Basic service Step 2 Enable the basic service according to the actual needs. Table 6-21 Description of basic service parameters Function Description You can enable SSH authentication to perform safety management. Enable this function, and then when multiple users are Multicast/Broadcast viewing the device video image simultaneously through Search...
  • Page 61: Event

    Operation Manual 6.4 Event 6.4.1 Setting Alarm Linkage 6.4.1.1 Setting Alarm-in When an alarm is triggered by the device connected to the alarm-in port, the system performs the defined alarm linkage. Step 1 Select > Event > Alarm. Step 2 Click next to Enable to enable alarm linkage.
  • Page 62: Alarm Linkage

    Operation Manual 6.4.1.2 Alarm Linkage When configuring alarm events, select alarm linkages (such as record, snapshot). When the corresponding alarm is triggered in the configured arming period, the system will alarm. Select > Event > Alarm, and then click next to Enable to enable alarm linkage. Figure 6-43 Alarm linkage 6.4.1.2.1 Adding Schedule Set arming periods.
  • Page 63: Record Linkage

    Operation Manual Figure 6-44 Schedule Step 2 Press and drag the left mouse button on the timeline to set arming periods. Alarms will be triggered in the time period in green on the timeline. ● Click Copy next to a day, and select the days that you want to copy to in the prompt interface, you can copy the configuration to the selected days.
  • Page 64: Snapshot Linkage

    Operation Manual Figure 6-45 Record linkage 6.4.1.2.3 Snapshot Linkage After snapshot linkage is configured, the system can automatically alarm and take snapshots when an alarm is triggered. Prerequisites After the corresponding alarm type (Normal, Motion, or Alarm) is enabled, the snapshot channel links capturing picture.
  • Page 65: Subscribing Alarm

    Operation Manual Figure 6-48 Email linkage 6.4.1.3 Subscribing Alarm 6.4.1.3.1 About Alarm Types For alarm types and preparations of alarm events, see Table 6-22. Table 6-22 Description of alarm types Alarm Type Description Preparation Motion detection is enabled. For The alarm is triggered when Motion Detection details, see "6.4.3.1 Setting moving object is detected.
  • Page 66: Setting Exception

    Operation Manual Functions of different devices might vary, and the actual product shall prevail. Step 1 Click at the right-upper corner of the main interface. Figure 6-49 Alarm (subscription) Step 2 Click next to Enable Alarm. Step 3 Select alarm type according to the actual need. For details, see "6.4.1.3.2 Subscribing Alarm Information".
  • Page 67: Setting Sd Card Exception

    Operation Manual Only the device with SD card has the abnormality functions, including No SD Card, SD Card Error, and Capacity Warning. 6.4.2.1 Setting SD Card Exception In case of SD card exception, the system performs alarm linkage. The event types include No SD Card, Low SD Card Space, and SD Card Error.
  • Page 68: Setting Voltage Detection

    Operation Manual Figure 6-51 Network exception Step 2 Click to enable the network detection function. Step 3 Set alarm linkage actions. For details, see "6.4.1.2 Alarm Linkage". Step 4 Click Apply. 6.4.2.3 Setting Voltage Detection When the input voltage is higher than or lower than the rated value of the device, the system performs alarm linkage.
  • Page 69: Setting Video Detection

    Operation Manual Figure 6-52 Voltage detection Step 2 Click to enable the voltage detection function. When enabling Overlay, the alarm icon is displayed by overlapping when the alarm is triggered. Step 3 Set alarm linkage actions. For details, see "6.4.1.2 Alarm Linkage". Step 4 Click Apply.
  • Page 70 Operation Manual Figure 6-53 Motion detection Step 2 Click to enable the motion detection function. Step 3 Set the area for motion detection. 1) Click Setting next to Area. Figure 6-54 Area 2) Select a color and set the region name. Select an effective area for motion detection in the image and set Sensitivity and Threshold.
  • Page 71: Setting Video Tampering

    Operation Manual and threshold according to the waveform. 3) Click OK. Step 4 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". If the exiting schedules cannot meet the scene requirement, you can click Add Schedule to add a new schedule. For details, see "6.4.1.2.1 Adding Schedule". Anti-dither: After the Anti-dither time is set, the system only records one motion detection event in the period.
  • Page 72: Setting Audio Detection

    Operation Manual Step 1 Select > Event > Video Detection > Scene Changing. Figure 6-56 Scene changing Step 2 Select the schedule and arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". If the exiting schedules cannot meet the scene requirement, you can click Add Schedule to add a new schedule.
  • Page 73: Storage

    Operation Manual Figure 6-57 Audio detection Step 2 Set parameters. ● Input abnormal: Click next to Audio Abnormal, and the alarm is triggered when the system detects abnormal sound input. ● Intensity change: Click next to Intensity Change, and then set Sensitivity and Threshold.
  • Page 74: System

    Operation Manual Functions might vary with different models, and the actual product shall prevail. Select > Storage. ● Click Read-Only, and then the SD card is set to read only. ● Click Read & Write, and then the SD card is set to read & write. ●...
  • Page 75: Date & Time

    Operation Manual Parameter Description Select video standard from PAL and NTSC. Video Standard Step 3 Click Apply. 6.6.1.2 Date & Time You can configure date and time format, time zone, current time, DST (Daylight Saving Time) or NTP server. Step 1 Select >...
  • Page 76: Account

    Operation Manual Parameter Description Configure system time. Current Time Click Sync PC, and the system time changes to the PC time. Enable DST as needed. Click , and configure start time and end time of DST with Date or Week. Step 3 Click Apply.
  • Page 77 Operation Manual Figure 6-61 User Step 2 Click Add. Figure 6-62 Add user (system)
  • Page 78 Operation Manual Figure 6-63 Add user (restricted login) Step 3 Configure user parameters. Table 6-25 Description of user parameters (1) Parameter Description User’s unique identification. You cannot use existed username. Username Password Enter password and confirm it again. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower Confirm Password case, number, and special character (excluding ' "...
  • Page 79: Resetting Password

    Operation Manual Parameter Description Set the PC address that allows the defined user to log in to the camera and the validity period and time range. You can log in to the web interface with the defined IP in the defined time range of validity period.
  • Page 80: Adding User Group

    Operation Manual camera. Step 3 Enter the reserved email address. Step 4 Click Apply. 6.6.2.2 Adding User Group You have two groups named admin and user by default, and you can add new group, delete added group or edit group authority and memo. Step 1 Select >...
  • Page 81: Onvif User

    Operation Manual 6.6.2.3 ONVIF User You can add, delete ONVIF user, and change their passwords. Step 1 Select > System > Account > ONVIF User. Figure 6-67 ONVIF user Step 2 Click Add. Figure 6-68 Add ONVIF user Step 3 Configure user parameters.
  • Page 82: Manager

    Operation Manual The admin account cannot be deleted. 6.6.3 Manager 6.6.3.1 Requirements To make sure the system runs normally, maintain it as the following requirements: ● Check surveillance images regularly. ● Clear regularly user and user group information that are not frequently used. ●...
  • Page 83: Import/Export

    Operation Manual When you enable and confirm the Auto Delete function, the deleted files cannot be restored. Operate it carefully. Step 3 Click Apply. 6.6.3.3 Import/Export ● Export the system configuration file to back up the system configuration. ● Import system configuration file to make quick configuration or recover system configuration.
  • Page 84: Upgrade

    Operation Manual Figure 6-71 Default 6.6.4 Upgrade Upgrading to the latest system can refine camera functions and improve stability. If wrong upgrade file has been used, restart the device; otherwise some functions might not work properly. Step 1 Select > System > Upgrade. Figure 6-72 Upgrade Step 2 Click Browse, and then upload upgrade file.
  • Page 85: Online User

    Operation Manual 6.7.2 Online User Select > System Info > Online User to view all the current users logging in to web. 6.8 Setting Log 6.8.1 Log You can view and back up logs. Step 1 Select > Log > Log. Step 2 Configure Start Time and End Time, and then select the log type.
  • Page 86: Remote Log

    Operation Manual Figure 6-73 Log 6.8.2 Remote Log Configure remote log, and you can get the related log by accessing the set address. Step 1 Select > Log > Remote Log. Step 2 Click to enable remote log function. Step 3 Set address, port and device number.
  • Page 87: Live

    Operation Manual 7 Live This section introduces the layout of the interface and function configuration. 7.1 Live Interface Log in and click the Live tab. Interface might vary with different models, and the actual interface shall prevail. Figure 7-1 Live (single-channel) Figure 7-2 Live (multi-channels) Table 7-1 Description of function bar Function...
  • Page 88: Setting Encode

    Operation Manual Function Description Live view Displays the real-time monitoring image. Live view function bar Functions and operations in live viewing. 7.2 Setting Encode Click , and then select the stream as needed. Figure 7-3 Encode bar ● Main Stream: It has large bit stream value and image with high resolution, but also requires large bandwidth.
  • Page 89: Window Adjustment Bar

    Operation Manual Icon Function Description Click the icon to capture one picture of the current image, and it will be saved to the configured storage path. Snapshot About viewing or configuring storage path, see "6.1 Local". Click the icon to capture three pictures of the current image, and they will be saved to the configured storage path.
  • Page 90: Zoom And Focus

    Operation Manual Icon Function Description Click the icon to enter full screen Full Screen mode; double-click or press Esc to exit. Click the icon to resume original ratio or change ratio. Click the icon to select the fluency from Realtime, General and Fluent. ●...
  • Page 91 Operation Manual The focus would adjust automatically after zooming in or out. Figure 7-4 Zoom and focus Table 7-4 Description of zoom and focus parameter Parameter Description Changes the focal length of the camera to zoom in or out the image.
  • Page 92: Image Adjustment

    Operation Manual 7.4.3 Image Adjustment Click Image Adjustment at the lower-left corner of Live interface, and click + or– button, or drag to adjust image parameters, including brightness, contrast, hue, and saturation. The adjustment is only available on the web interface, and it does not adjust the camera parameters.
  • Page 93 Operation Manual Make sure that you have enabled face detection function. Figure 7-6 Face mode ● Select Metadata Mode from the display mode drop-down list. Make sure that you have enabled video metadata detection function. Figure 7-7 Metadata mode Table 7-5 Description of face mode layout Function Description Displays the real-time monitoring image.
  • Page 94: Setting Crowd Distribution Map

    Operation Manual 8 AI 8.1 Setting Crowd Distribution Map You can view crowd distribution on the map in real time for timely arming, to prevent stampede and other accidents. 8.1.1 Global Configuration Set the calibration parameters of panoramic cameras. Calibration Purpose Determine corresponding relationship between 2D image captured by the camera and 3D actual object according to one horizontal ruler and three vertical rulers calibrated by the user and the corresponding actual distance.
  • Page 95: Rule Configuration

    Operation Manual 8.1.2 Rule Configuration When the number of people or the crowd density in the detection area exceeds the configured threshold, the system performs alarm linkages. Prerequisites ● Select AI > Smart Plan, and enable Crowd Distribution Map. ● You have configured the parameters on the Global Config interface. Procedure Step 1 Select AI >...
  • Page 96: Setting Face Recognition

    Operation Manual Parameter Description The system detects crowd distribution in the global area. When the crowd density exceeds the configured threshold, the system Crowd Density performs alarm linkages. Step 7 Set arming periods and alarm linkage action. For details, see "6.4.1.2 Alarm Linkage". Click + Event Linkage to set the linkage action.
  • Page 97: Setting Face Detection

    Operation Manual Figure 8-5 Face recognition flowchart 8.2.1 Setting Face Detection When a face is recognized in the detection area, the system performs alarm linkage. Procedure Step 1 Select AI > Smart Plan. Step 2 Click next to Face Recognition to enable face recognition of the corresponding channel, and then click Next.
  • Page 98 Operation Manual ● Click to draw the minimum size of the target, and click to draw the maximum size of the target. Only when the target size between the maximum size and the minimum size, can the alarm be triggered. ●...
  • Page 99: Setting Face Database

    Operation Manual Parameter Description Properties Click next to Properties to enable the properties display. Click next to Face Exposure. When a face is detected, the Face Exposure camera can enhance brightness of the face to make the face image clear. Face Target Set the face target brightness.
  • Page 100 Operation Manual Figure 8-7 Face database configuration Step 4 Click Add Face Database. Step 5 Set the name of the face database. Figure 8-8 Add face database Step 6 Click OK. Figure 8-9 Face database successfully added ● Edit the name of the face database. Click the text box under Name to edit the name of the face database.
  • Page 101: Adding Face Picture

    Operation Manual 8.2.2.2 Adding Face Picture Add face picture to the created face database. Single adding and batch importing are supported. Requirements on face pictures. ● A single face picture size is 50K–150K in JPEG format. The resolution is less than 1080p. ●...
  • Page 102 Operation Manual Figure 8-10 Register Step 4 Enter the information about face picture according to the actual situation. Step 5 Click Add to task list. Step 6 Click , and then click Operation. ● If the operation is successful, the system prompts that stored successfully, modeled successfully.
  • Page 103: Batch Importing

    Operation Manual Parameter Error Description Multiple faces in the picture. Change the picture. Failed to decode the picture. Change the picture. The picture is not suitable to be imported to the face database. Change the picture. The database error. Restart the camera and model faces again.
  • Page 104: Managing Face Picture

    Operation Manual Figure 8-11 Task list Step 4 Click Import to import the face pictures. After the importing is completed, the result will be displayed. ● If the picture is imported successfully, click Next to do modeling operation. ● If the picture importing failed, click Query to view the details of the pictures and error code.
  • Page 105: Deleting Face Picture

    Operation Manual Figure 8-12 Face information modification Step 5 Click , and then click Operation. 8.2.2.3.2 Deleting Face Picture On the Face Database Config interface, click next to the face database to be configured. Click Query, set the search criteria as needed, click Search, select the face information that needs to be deleted and delete it.
  • Page 106: Setting Arm Alarm

    Operation Manual establish relevant face feature models. Through this function, the face recognition and other intelligent detections can be realized. ● The more the selected face pictures are, the longer time the face modeling takes. Please wait patiently. ● During modeling, some intelligent detection functions (such as face recognition) are not available temporarily, and will be available after modeling.
  • Page 107: Viewing Face Recognition Result

    Operation Manual The snapshot will be compared to the pictures in the armed face database. 2) Set the similarity. The detected face matches the face database only when the similarity between the detected face and the face feature in face database reaches the configured similarity threshold.
  • Page 108: Setting Face Detection

    Operation Manual Figure 8-15 Face recognition result 8.3 Setting Face Detection When a face is detected in the detection area, the system performs an alarm linkage. Procedure Step 1 Select AI > Smart Plan. Step 2 Click next to Face Detection to enable face detection of the corresponding channel, and then click Next.
  • Page 109 Operation Manual ● Click to draw an exclusion area for face detection in the image. ● Click to draw the minimum size of the target, and click to draw the maximum size of the target. Only when the target size between the maximum size and the minimum size, can the alarm be triggered.
  • Page 110: Setting Ivs

    Operation Manual Parameter Description ● Snapshot Angle Filter: Set snapshot angle to be filtered during the face detection. ● Snapshot Sensitivity: Set snapshot sensitivity during the face Advanced detection. It is easier to detect face with higher sensitivity. ● Optimized Time: Set a time period to capture the clearest picture after the camera detects face.
  • Page 111: Global Configuration

    Operation Manual object in the image should be no less than 15 × 15 pixels (CIF image). The target height and width should no more than a third of the image height and width. The recommended target height is 10% of the image height. ●...
  • Page 112: Rule Configuration

    Operation Manual Procedure 1. Select AI > Smart Plan. 2. Click next to IVS to enable IVS of the corresponding channel, and then click Next. 3. Click the Global Config tab. Figure 8-18 Global configuration of IVS 4. Set calibration area and ruler. a.
  • Page 113 Operation Manual Table 8-6 Description of IVS functions Rule Description Applicable Scene When the target crosses tripwire from the defined motion direction, an Tripwire alarm is triggered, and then the Scenes with sparse targets system performs configured alarm and no occlusion among linkages.
  • Page 114 Operation Manual Rule Description Applicable Scene When the target stays over the configured time, an alarm is Road monitoring and traffic Parking detection triggered, and then the system management. performs configured alarm linkages. Scenes with medium or long When the crowd gathers or the distance, such as outdoor crowd density is large, an alarm is plaza, government entrance,...
  • Page 115 Operation Manual Rule Description triggered if pedestrian or vehicle stays for a long time. If the Missing object abandoned object is smaller than pedestrian and vehicle, Fast moving set the target size to filter pedestrian and vehicle or properly Parking detection extend the duration to avoid false alarm triggered by Crowd gathering transient staying of pedestrian.
  • Page 116: Setting Video Metadata

    Operation Manual Parameter Description ● For fast moving, sensitivity is related to the triggering speed. Lower sensitivity requires faster moving speed to trigger the alarm. Sensitivity ● For crowd gathering, sensitivity is related to the alarm triggering time. It is easier to trigger the alarm with higher sensitivity.
  • Page 117: Rule Configuration

    Operation Manual Figure 8-20 Global configuration of video metadata Table 8-9 Description of scene set parameters (video metadata) Parameter Description Overlay target box on the captured pictures to mark the target position. Four types of target boxes are supported. Select the target Target Box Overlay box as needed.
  • Page 118 Operation Manual Procedure Step 1 Select AI > Smart Plan Step 2 Click next to Video Metadata, and then click Next. Step 3 Click the Rule Config tab. Step 4 Click Add Rule to select rules. The added rules will be display in the list. Click the text box under Name to edit the rule name.
  • Page 119: Viewing Video Metadata Result

    Operation Manual Step 7 Set parameters. Table 8-10 Description of crowd map parameters Parameter Description Click next to People Flow Statistics to count the number People Flow Statistics of people in the detection area. Flow Statistics Click next to Flow Statistics (Non-motor Vehicle) to (Non-motor Vehicle) count the number of non-motor vehicles in the detection area.
  • Page 120 Operation Manual Figure 8-23 Video metadata report...
  • Page 121: Camera

    Operation Manual 9 Camera Click Camera to configure camera parameters, including image parameters, encoder parameters, and audio parameters. For details, see "6.2 Camera".
  • Page 122: Event

    Operation Manual 10 Event Click Event to configure general events, including alarm linkage exception, video detection, and audio detection. For details. see "6.4 Event".
  • Page 123: System

    Operation Manual 11 System Click System, and you can configure system parameters, including general, date & time, account, safety, PTZ settings, default, import/export, remote, auto maintain and upgrade. For details, see "6.6 System".
  • Page 124: Security

    Operation Manual 12 Security 12.1 Security Status Background Information Detect the user and service, and scan the security modules to check the security status of the camera, so that when abnormality appears, you can process it timely. ● User and service detection: Detect login authentication, user status, and configuration security to check whether the current configuration conforms to recommendation.
  • Page 125: System Service

    Operation Manual Figure 12-2 Security Status 12.2 System Service 12.2.1 802.1x Cameras can connect to LAN after passing 802.1x authentication. Step 1 Select Security > System Service > 802.1x. Step 2 Select the NIC name as needed, and click to enable it. Step 3 Select the authentication mode, and then configure parameters.
  • Page 126: Https

    Operation Manual If there is no certificate in the list, click Certificate Management at the left navigation bar. For details, see "12.4.2 Installing Trusted CA Certificate". Figure 12-4 802.1x (TLS) Step 4 Click Apply. 12.2.2 HTTPS Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS with your PC.
  • Page 127: Attack Defense

    Operation Manual 12.3 Attack Defense 12.3.1 Firewall Configure firewall to limit access to the camera. Step 1 Select Security > Attack Defense > Firewall. Step 2 Click to enable the firewall function. Figure 12-6 Firewall Step 3 Select the mode: Allowlist and Blocklist. ●...
  • Page 128: Account Lockout

    Operation Manual 12.3.2 Account Lockout If you consecutively enter a wrong password more than the configured value, the account will be locked. Step 1 Select Security > Attack Defense > Account Lockout. Step 2 Configure the login attempt and lock time for device account and ONVIF user. ●...
  • Page 129: Ca Certificate

    Operation Manual Figure 12-9 Anti-DoS attack 12.4 CA Certificate 12.4.1 Installing Device Certificate Create a certificate or upload an authenticated certificate, and then you can log in through HTTPS with your PC. 12.4.1.1 Creating Certificate Creating certificate in the device. Step 1 Select Security >...
  • Page 130: Applying For And Importing Ca Certificate

    Operation Manual Figure 12-10 Certificate information (1) Step 5 Click Create and install certificate. After the certificate is created successfully, you can view the created certificate on the Device Certificate interface. Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ●...
  • Page 131: Installing Existing Certificate

    Operation Manual Figure 12-11 Certificate information (2) Step 5 Click Create and Download. Save the request file to your PC. Step 6 Apply the CA certificate from the third-party certificate authority. Step 7 Import the signed CA certificate. 1) Save the CA certificate to the PC. 2) Do Step1 to Step3, and click Browse to select the signed CE certificate.
  • Page 132: Installing Trusted Ca Certificate

    Operation Manual Figure 12-12 Certificate and private key Step 5 Click Import and Install. After the certificate is created successfully, you can view the created certificate on the Device Certificate interface. Related Operations ● Click Enter Edit Mode, you can edit the custom name of the certificate. ●...
  • Page 133: A/V Encryption

    Operation Manual 12.5 A/V Encryption The device supports audio and video encryption during data transmission. You are recommended to enable A/V Encryption function. There might be safety risk if this function is disabled. Step 1 Select Security > A/V Encryption. Step 2 Configure the parameters.
  • Page 134: Security Warning

    Operation Manual 12.6 Security Warning When security exception event is detected, the camera sends a warning to remind you to process it timely, to avoid security risk. Step 1 Select Security > Security Warning. Step 2 Click next to Enable to enable security warning. Step 3 Configure the parameters.
  • Page 135: Record

    Operation Manual 13 Record This section introduces the functions and operations of video playback. 13.1 Playback 13.1.1 Playing Back Video This section introduces the operation of video playback. Prerequisites ● This function is available on the camera with SD card. ●...
  • Page 136 Operation Manual Figure 13-2 Video playback Table 13-1 Description of video playback interface Function Description Displays all searched recorded video files. Click any files to play back it. Recorded video list Click Back at the upper-left corner to go to the Search Video interface.
  • Page 137: Clipping Video

    Operation Manual Function Description Controls the sound during playback. ● Sound : Mute mode. ● : Vocal state. You can adjust the sound. Click to capture one picture of the current image, and it will be saved to the configured storage path.
  • Page 138: Downloading Video

    Operation Manual Figure 13-4 Clipping video Step 5 Click Start Download. The playback stops and the clipped file is saved in the configured storage path. For details of storage path, see "6.1 Local". 13.1.3 Downloading Video Download videos to a defined path. You can download a single video, or download them in batches.
  • Page 139: Setting Record Control

    Operation Manual Figure 13-6 Downloading video Step 6 Click Start Download. The downloaded files are saved in the configured storage path. For details of storage path, see "6.1 Local". 13.2 Setting Record Control Set parameters such as pack duration, pre-event record, disk full, record mode, and record stream.
  • Page 140: Setting Record Plan

    Operation Manual Parameter Description The time to record the video in advance of a triggered alarm event. For example, if the pre-event record is set to be 5 s, the system saves the recorded video 5 s before the alarm is triggered.
  • Page 141: Storage

    Operation Manual ● Click Copy next to a day, and select the days that you want to copy to in the prompt interface, you can copy the configuration to the selected days. Select the Select All check box to select all day to copy the configuration. ●...
  • Page 142: Local Storage

    Operation Manual Figure 13-10 Live Step 2 Select the storage method that you need for different types of recorded videos. Table 13-3 Description of storage parameters Parameter Description Select from Scheduled, Motion Detection and Alarm. Event Type Recording strategy when the disk is full. ●...
  • Page 143: Network Storage

    Operation Manual 13.4.2 Network Storage You can select from FTP and NAS. When the network does not work, you can save all the files to the internal SD card for emergency. 13.4.2.1 FTP Enable this function, and you can save all the files in the FTP server. Step 1 Select Record >...
  • Page 144: Nas

    Operation Manual Table 13-4 Description of FTP parameters Parameter Description Server IP The IP address of the FTP server. Port The port number of the FTP server. Username The username to log in to the FTP server. Password The password to log in to the FTP server. Storage Path The destination path in the FTP server.
  • Page 145 Operation Manual Figure 13-13 FTP Step 5 Configure NAS parameters. Table 13-5 Description of NAS parameters Parameter Description Server IP The IP address of the NAS server. Storage Path The destination path in the NAS server. Username When selecting SMB protocol, you are required to enter username and password.
  • Page 146: Picture

    Operation Manual 14 Picture This section introduces the related functions and operations of picture playback. 14.1 Playback 14.1.1 Playing Back Picture This section introduces the operation of picture playback. Prerequisites ● This function is available on the camera with SD card. ●...
  • Page 147: Downloading Picture

    Operation Manual Figure 14-2 Picture playback Table 14-1 Description of playback interface Function Description Displays all searched snapshots. Click any files to play back it. Snapshot list Click Back at the upper-left corner to go to the Picture Query interface. ●...
  • Page 148: Setting Snapshot Parameters

    Operation Manual Figure 14-3 Selecting picture file Step 4 Click Download. Step 5 Select the download format and storage path. Figure 14-4 Downloading picture Step 6 Click Start Download. The downloaded pictures are saved in the configured storage path. For details of storage path, see "6.1 Local".
  • Page 149: Setting Snapshot Plan

    Operation Manual Figure 14-5 Snapshot Table 14-2 Description of snapshot parameters Parameter Description You can select from Scheduled and Event. ● Scheduled: Capture images in configured period. For details, see ● Event: Capture images when configured event is triggered, such as Motion Detection, Video Tamper and Scene Changing.
  • Page 150: Report

    Operation Manual 15 Report You can search the result of face detection. Step 1 Select Report > Face Detection. Step 2 Select the channel, and set the time. Click Advance, and you can set face attributes. Step 3 Click Search. Figure 15-1 Face detection Report Step 4 Click the picture, and you can view the details.
  • Page 151: Appendix 1 Cybersecurity Recommendations

    Operation Manual Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 152 Operation Manual between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing.
  • Page 153 Operation Manual device.
  • Page 154 Operation Manual...

Table of Contents