Dahua DH-PFR5QI-E60 User Manual

Dahua DH-PFR5QI-E60 User Manual

Visual radar web
Hide thumbs Also See for DH-PFR5QI-E60:

Advertisement

Quick Links

Visual Radar WEB
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V1.0.0
V1.0.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DH-PFR5QI-E60 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Dahua DH-PFR5QI-E60

  • Page 1 Visual Radar WEB User’s Manual V1.0.0 ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.0 ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
  • Page 2: Foreword

    Foreword General This manual introduces the functions and operations of the Visual Radar (hereinafter referred to as "the radar"). Model DH-PFR5QI-E60, DH-PFR5QI-E60-PV. Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
  • Page 3 User’s Manual There still might be deviation in technical data, functions and operations description, or  errors in print. If there is any doubt or dispute, we reserve the right of final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF ...
  • Page 4: Important Safeguards And Warnings

    User’s Manual Important Safeguards and Warnings This chapter introduces the contents covering proper handling of the product, hazard prevention, and prevention of property damage. Read these contents carefully before using the product, comply with them when using, and keep the manual well for future reference. Environmental Requirement As for ground within the monitoring area, hard ground like concrete ground is optimal.
  • Page 5 User’s Manual be degraded. Use accessories suggested by the manufacturer, and install and maintain the radar by  professional personnel. Don’t provide two or more than two kinds of power supply modes; otherwise, the radar may  be damaged.
  • Page 6: Table Of Contents

    User’s Manual Table of Contents Foreword ..............................I Important Safeguards and Warnings ....................III 1 Product Overview ..........................1 General............................1 Functions ............................1 1.2.1 Basic Functions ........................1 1.2.2 Intelligent Functions ......................2 2 Network Configuration.......................... 3 Device Initialization ........................3 Logging in to the Web Interface ....................
  • Page 7 User’s Manual 3.5.2 Configuring Schedule ....................... 52 3.5.3 Configuring Destination ....................54 System ............................57 3.6.1 General ..........................57 3.6.2 Date & Time ........................58 3.6.3 Account ..........................59 3.6.4 Safety ..........................65 4 Configuring Radar ..........................75 Configuring Region Management ....................75 Configuring IVS Setup ........................
  • Page 8: Product Overview

    User’s Manual Product Overview General There are mainly two connection methods between the radar and PC. See Figure 1-1 and Figure 1-2. The IP address of the radar is 192.168.1.108 by default. Use IP segment reasonably according to actual network environment so that the radar can connect to network. Connected by network cable Connected through router or switch Functions...
  • Page 9: Intelligent Functions

    User’s Manual subsequent view and processing. Record abnormalities of monitoring image for subsequent view and processing.  Configure coding parameters, and adjust live view image.  Record Auto record as schedule.  Play back recorded video and picture as needed. ...
  • Page 10: Network Configuration

    User’s Manual Network Configuration Device Initialization The radar needs to be initialized for the first-time use or after restoring to factory defaults. Open IE browser, enter the IP address of the radar in the address bar, and then press the Enter key. Device initialization Set the password.
  • Page 11 User’s Manual End-user license agreement On the P2P interface, select P2P, and then click Next. Select Auto-check for updates check box as needed, and then click Next to complete initialization.
  • Page 12: Logging In To The Web Interface

    User’s Manual Online Upgrade Logging in to the Web Interface You need to download and install the plug-in for the first-time login. Enter username and password, and then click Login. Login interface The default username is admin, and the password is the one set during initialization. ...
  • Page 13 User’s Manual Installing the plug-in After the plug-in is installed, the login interface is displayed automatically. Enter username and password again, and then click Login. The Live interface is displayed. Live view Live: To view the real-time monitoring image.  Playback: Play back or download recorded video or image files.
  • Page 14: Changing Ip Address

    User’s Manual Changing IP Address To ensure that the radar can be connected to the network, set an appropriate IP address. On the web interface, select Setting > Network > TCP/IP. Configure IP related parameters, and then click Save. TCP/IP...
  • Page 15: Basic Configuration

    User’s Manual Basic Configuration Live This section introduces the layout of the interface and function configuration. 3.1.1 Live Interface Live interface Table 3-1 Live interface description Function Description Encode bar Sets stream type and protocol. Live view Displays the real-time monitoring image, bitrate and resolution. Function bar Functions and operations in live viewing.
  • Page 16: Function Bar

    User’s Manual TCP, UDP and Multicast. 3.1.3 Function Bar Function bar Table 3-2 Description of function bar Function Description Displays alarm output state. Click to enable or disable alarm output. Relay-out Red: Alarm output enabled. Grey: Alarm output disabled. : Off. Warning Light : On.
  • Page 17: Window Adjustment Bar

    User’s Manual Function Description About viewing or changing storage path, see "3.3.2.4 Path". Audio Click to enable or disable audio output. Talk Click to enable or disable audio talk. 3.1.4 Window Adjustment Bar This section introduces the adjustment of image. For details, see Table 3-3. Adjusting device image Table 3-3 Description of adjustment bar Function...
  • Page 18 User’s Manual Video playback Picture playback Table 3-4 Playback interface description Function Description Click to display the smart rules and object detection box on the live view interface. It is enabled by default. Rule Info Rules Info is valid only when you enabled the rule during recording. Sound Controls the sound during playback.
  • Page 19 User’s Manual Function Description Controls playback. : Click to play. : Click to stop playing. : Click to play the next frame. Play Control Bar You need to pause the playback before using play by frame. : Click to slow down the playback. : Click the icon to speed up the playback.
  • Page 20: Playing Back Video Or Picture

    User’s Manual 3.2.2 Playing Back Video or Picture This section introduces the operation of video and picture playback. This section takes video playback as an example. Select dav from the Record Type drop-down list when playing back videos. Select jpg from Record Type drop-down list when playing back pictures. The data source is SD card by default.
  • Page 21: Clipping Video

    User’s Manual Playback file list 3.2.3 Clipping Video Click Select dav or mp4 in Download Format. Click on the progress bar to select the start time of the target video, and then click Clipping video Click again on the progress bar to select the end time, and then click Click to download the video.
  • Page 22: Camera

    User’s Manual Operations might vary with different browsers, and the actual interface shall prevail.  For details of viewing or setting storage path, see "3.3.2.4 Path".  To download a file: Select dav from the Record Type drop-down list when playing back videos. Select jpg from Record Type drop-down list when playing back pictures, and you do not need to select data source.
  • Page 23 User’s Manual Camera conditions 3.3.1.1.2 Picture You can configure picture parameters as needed. Select Setting > Camera > Conditions > Conditions > Picture. Configure parameters. For details, see Table 3-5. Picture Table 3-5 Description of picture parameters Parameter Description The overall brightness of the picture. The higher the value is, the brighter the Brightness picture will be.
  • Page 24 User’s Manual Parameter Description Corrects the device shaking with difference comparison algorithm and improves the image clarity, effectively solves the picture shaking problem. Click Save. 3.3.1.1.3 Exposure Configure iris and shutter to improve image clarity. Select Setting > Camera > Conditions > Conditions > Exposure. Configure exposure parameters.
  • Page 25 User’s Manual Parameter Description Works with multi-frame (no less than 2 frames) images and reduces noise by 3D NR using the frame information between previous and latter frames. Unabled by default. Click Save. 3.3.1.1.4 Backlight You can select backlight mode from Auto, BLC, WDR, and HLS. Select Setting >...
  • Page 26 User’s Manual 3.3.1.1.5 WB WB function makes the image color display precisely as it is. When in WB mode, white objects will always display white color in different environments. Select Setting > Camera > Conditions > Conditions > WB. Configure WB parameters, for the detailed description, see Table 3-8. Table 3-8 Description of WB parameters WB Mode Description...
  • Page 27 User’s Manual Table 3-9 Description of day and night parameters Parameter Description You can select device display mode from Color, Auto, and B/W. Color: The system displays color image. Auto: The system switches between color and black-and-white display according to the actual condition. B/W: The system displays black-and-white image.
  • Page 28 User’s Manual 3.3.1.1.8 Defog The image quality is compromised in foggy or hazy environment, and defog can be used to improve image clarity. Select Setting > Camera > Conditions > Conditions > Defog. Configure defog parameters. For the detailed description, see Table 3-11. Defog Table 3-11 Description of defog parameters Defog...
  • Page 29 User’s Manual Table 3-12 LDC parameters description Parameters Description Correction The correction strength of the image. The smaller the value is, the more obvious Strength the image stretch effect is. Far-end The far-end amplication of the image. The bigger the value is, the more obvious Amplification the amplification effect is.
  • Page 30: Configuring Video Parameters

    User’s Manual 3.3.2 Configuring Video Parameters This section introduces video parameters, such as stream, overlay, and path. 3.3.2.1 Video Configure video stream parameters, such as stream type, encode mode, resolution, frame rate, bit rate type, bit rate, I frame interval, SVC, and watermark. Select Setting >...
  • Page 31 User’s Manual Parameter Description This parameter can be configured only when the Bit Rate Type is set as VBR. Quality The better the quality is, the larger the bandwidth will be requested. Reference The most suitable bit rate value range recommended to user according to the Bit Rate defined resolution and frame rate.
  • Page 32 User’s Manual Parameter Description Image Size The same resolution with main stream. Quality Configures the snapshot quality. Configure the snapshot frequency. Select Customized, and then you can Interval configure snapshot frequency manually. Click Save. 3.3.2.3 Overlay Configure overlay information, and it will be displayed on the Live interface. 3.3.2.3.1 Configuring Privacy Masking You can enable this function when you need to protect privacy of some area on the video image.
  • Page 33 User’s Manual Click + to add channel titles, and you can expand 1 line at most. Move the title box to the position that you want in the image. Channel title Click Save. 3.3.2.3.3 Configuring Time Title You can enable this function when you need to display time in the video image. Select Setting >...
  • Page 34 User’s Manual 3.3.2.3.4 Configuring Text Overlay You can enable this function if you need to display additional information such as geographical location in the video image. Text overlay and OSD overlay (Setting > Radar Settings > IVS Setup) cannot be enabled at the same time.
  • Page 35 User’s Manual Font attribute Click Save. 3.3.2.3.6 Configuring Custom Overlay You can enable this function if you need to display custom information on the video image. Select Setting > Camera > Video > Overlay > Custom Overlay. Select the Enable check box, and then select the text align. Click + to expand the custom overlay, and you can expand 1 line at most.
  • Page 36 User’s Manual Select Setting > Camera > Video > Overlay > Abnormal. Select the Enable check box. Move the custom box to the position that you want in the image. Abnormal Click Save. 3.3.2.4 Path You can configure the storage path for live snapshot, live recording, playback snapshot, playback download, and video clips.
  • Page 37: Audio

    User’s Manual Table 3-15 Path description Parameter Description Live The snapshot of live interface. Snapshot The default path is "C:\Users\admin\WebDownload\LiveSnapshot". Live The recorded video of live interface. Record The default path is "C:\Users\admin\WebDownload\LiveRecord". "Admin" in The snapshot of playback interface. Playback the path The default path is...
  • Page 38 User’s Manual Audio Step 2 Select the Enable check box in Main Stream or Sub Stream. For the camera with multiple channels, select the channel number. Step 3 Configure audio parameters. Table 3-16 Description of audio parameters Parameter Description The configured audio encode mode applies to both audio and Encode Mode intercom.
  • Page 39: Network

    User’s Manual 3.3.3.2 Configuring Alarm Audio You can record or upload alarm audio file. The audio file will be played when the alarm is triggered. ● Click to play the selected audio. ● Click to download the audio to local storage. Step 1 Select Setting >...
  • Page 40: Tcp/Ip

    User’s Manual 3.4.1 TCP/IP You can configure IP address and DNS (Domain Name System) server and so on according to network planning. Prerequisites The camera has connected to the network. Procedure Step 1 Select Setting > Network > TCP/IP. TCP/IP Step 2 Configure TCP/IP parameters.
  • Page 41 User’s Manual Parameter Description The mode that the camera gets IP: ● Static Configure IP Address, Subnet Mask, and Default Gateway manually, and then click Save, the login interface with the Mode configured IP address is displayed. ● DHCP When there is DHCP server in the network, select DHCP, and the camera acquires IP address automatically.
  • Page 42 User’s Manual Parameter Description Select the check box, get the camera MAC address, and then you can modify and configure the device IP address with ARP/ping command. This is enabled by default. During reboot, you will have no more than 2 minutes to configure the device IP address by a ping packet with certain length.
  • Page 43: Port

    User’s Manual 3.4.2 Port Configure the port numbers and the maximum number of users (includes web, platform client, and mobile phone client) that can connect to the device simultaneously. Step 1 Select Setting > Network > Port. Port Step 2 Configure port parameters.
  • Page 44 User’s Manual Parameter Description ● Real time streaming protocol port, and the value is 554 by default. If you play live view with QuickTime, VLC or Blackberry smart phone, the following URL format is available. ● When the URL format requiring RTSP, you need to specify channel number and bit stream type in the URL, and also user name and password if needed.
  • Page 45: Pppoe

    User’s Manual The configuration of Max Connection takes effect immediately, and others will take effect after reboot. 3.4.3 PPPoE Point-to-Point Protocol over Ethernet, it is one of the protocols that device uses to connect to the internet. Get the PPPoE username and password from the internet service provider, and then set up network connection through PPPoE, the camera will acquire a WAN dynamic IP address.
  • Page 46: Ddns

    User’s Manual 3.4.4 DDNS Properly configure DDNS, and then the domain name on the DNS server matches your IP address and the matching relation refreshes in real time. You can always visit the camera with the same domain name no matter how the IP address changes. Prerequisites Check the type of DNS server supported by the camera.
  • Page 47: Smtp (Email)

    User’s Manual Parameter Description The update cycle of the connection between the device and the Interval server, and the time is 10 minutes by default. Step 3 Click Save. Result Open the browser on PC, enter the domain name at the address bar, and then press Enter, the login interface is displayed.
  • Page 48 User’s Manual Parameter Description The port number of the SMTP Port server. Username The account of SMTP server. For details, see Table 4-26. Password The password of SMTP server. Select the check box, and the sender's information is not displayed Anonymity in the email.
  • Page 49: Upnp

    User’s Manual Step 3 Click Save. Step 4 Click Test to test whether the emails can be sent and received successfully. 3.4.6 UPnP UPnP (Universal Plug and Play), a protocol that establishes mapping relation between local area and wide area networks. This function enables you to visit local area device through wide area IP address.
  • Page 50: Snmp

    User’s Manual 3.4.7 SNMP SNMP (Simple Network Management Protocol), which can be used to enable software such as MIB Builder and MG-SOFT MIB Browser to connect to the camera and manage and monitor the camera. Prerequisites ● Install SNMP monitoring and managing tools such as MIB Builder and MG-SOFT MIB Browser.
  • Page 51 User’s Manual SNMP (1) SNMP (2) Step 2 Select SNMP version to enable SNMP. ● Select V1, and the system can only process information of V1 version.
  • Page 52 User’s Manual ● Select V2, and the system can only process information of V2 version. ● Select V3, and then V1 and V2 become unavailable. You can configure user name, password and authentication type. It requires corresponding user name, password and authentication type to visit your device from the server.
  • Page 53: Bonjour

    User’s Manual Result View device configuration through MIB Builder or MG-SOFT MIB Browser. 1. Run MIB Builder and MG-SOFT MIB Browser. 2. Compile the two MIB files with MIB Builder. 3. Load the generated modules with MG-SOFT MIB Browser. 4. Enter the IP address of the device you need to manage in the MG-SOFT MIB Browser, and then select version to search.
  • Page 54: Multicast

    User’s Manual 1. Click Show All Bookmarks in Safari. 2. Enable Bonjour. The OS or client automatically detects the network cameras with Bonjour enabled in the LAN. 3. Click the camera to visit the corresponding web interface. 3.4.9 Multicast When multiple users are previewing the device video image simultaneously through network, it might fail due to limited bandwidth.
  • Page 55 User’s Manual Select Enable, and configure parameters. Auto register Table 3-24 Description of auto register Parameters Description IP Address Server IP address or server domian that needs to be registered. Port Port of the server for auto registration. Sub-Device ID Custom device ID.
  • Page 56: Qos

    User’s Manual 3.4.12 QoS You can solve problems such as network delay and congestion with this function. It helps to assure bandwidth, reduce transmission delay, packet loss rate, and delay jitter to improve experience. 0–63 means 64 degrees of priority; 0 for the lowest and 63 the highest. Step 1 Select Setting >...
  • Page 57 User’s Manual ● When P2P is enabled, remote management on device is supported. ● When P2P is enabled and the device accesses to the network, the status shows online. The information of the IP address, MAC address, device name, and device SN will be collected.
  • Page 58 User’s Manual ONVIF Step 2 Select On in Authentication. Step 3 Click Save. 3.4.13.3 RTMP Through RTMP, you can access a third-party platform (such as Ali and YouTube) to realize video live view. ● RTMP can be configured by admin only. ●...
  • Page 59: Storage

    User’s Manual Table 3-27 Description of RTMP parameters Parameter Description The stream for live view. Make sure that the video format is the Stream Type H.264, H.264 B and H.264H, and the audio format is AAC. Includes Non-custom and Custom. Address Type ●...
  • Page 60 User’s Manual ● Configure holiday record and snapshot schedule. For details, see "5.1.1.3.1 Configuring Record Plan" and "5.1.1.4.1 Configuring Snapshot Plan". Procedure Step 1 Select Setting > Storage > Schedule > Holiday Schedule. Holiday schedule Step 2 Select Record or Snapshot. Step 3 Select the days you need to set as holiday.
  • Page 61: Configuring Destination

    User’s Manual 3.5.3 Configuring Destination This section introduces the configuration of the storage method for the recorded videos and snapshots. 3.5.3.1 Path You can select different storage paths for the recorded videos and snapshots according to event type. You can select from SD card, FTP and NAS. Local is displayed only on models that support SD card.
  • Page 62 User’s Manual ● Unauthorized mode: The SD card authorized by other devices shows unauthorized mode. The SD cards of this status do not support operations of setting read only, read & write, formatting and encryption. ● Encrypted mode: The SD cards encrypted and authorized on this camera show encrypted mode.
  • Page 63 User’s Manual Step 2 Select the Enable check box to enable FTP function, and select the FTP type. You select FTP or SFPT from the drop-down list. SFTP is recommended to enhance network security. Step 3 Configure FTP parameters. Table 3-29 Description of FTP parameters Parameter Description Server Address...
  • Page 64: System

    User’s Manual Step 2 Select the Enable check box to enable NAS function, and select NAS protocol type. ● NFS (Network File System): A file system which enables computers in the same network share files through TCP/IP. ● SMB (Server Message Block): Provides shared access for clients and the server. Step 3 Configure NAS parameters.
  • Page 65: Date & Time

    User’s Manual General Step 2 Configure general parameters. Table 3-31 Description of general parameters Parameter Description The name of the device. Name Each device has its own name. Language Select system language. Video Standard Select video standard from PAL and NTSC. Step 3 Click Save.
  • Page 66: Account

    User’s Manual Table 3-32 Description of date and time parameters Parameter Description Date Format Configure the date format. Time Format Configure the time format. You can select from 12-Hour or 24-Hour. Time Zone Configure the time zone that the camera is at. Configure system time.
  • Page 67 User’s Manual 3.6.3.1 Adding a User You are admin user by default. You can add users, and configure different authorities. Step 1 Select Setting > System > Account > Account > Username. Username Step 2 Click Add User. Add user (operation permission)
  • Page 68 User’s Manual Add user (restricted login) Step 3 Configure user parameters. Table 3-33 Description of user parameters (1) Parameter Description User’s unique identification. You cannot use existed Username user name. Password Enter password and confirm it again. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters Confirm Password among upper case, lower case, number, and special...
  • Page 69 User’s Manual Parameter Description Select authorities as needed. Operation Permission You are recommended giving fewer authorities to normal users than premium users. Set the PC address that allows the defined user to log in to the camera and the validity period and time range. You can log in to the web interface with the defined IP in the defined time range of validity period.
  • Page 70 User’s Manual ● After adding user, click to modify password, group, memo or authorities; click to delete the added users. Admin user cannot be deleted. ● Click in the admin row to modify its username and email address. 3.6.3.2 Adding User Group You have two groups named admin and user by default, and you can add new group, delete added group or modify group authority and memo.
  • Page 71 User’s Manual Step 4 Click Save to finish configuration. The newly added group displays in the group name list. ● After adding group, click to modify group memo or authorities; click delete the added group, admin group and user group cannot be deleted. ●...
  • Page 72: Safety

    User’s Manual Table 3-34 Description of user parameters (2) Parameter Description Username User’s unique identification. You cannot use existed user name. Password Enter password and confirm it again. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower Confirm Password case, number, and special character (excluding ' "...
  • Page 73 User’s Manual System service Step 2 Enable the system service according to the actual needs. Table 3-35 Description of system service parameters Function Description You can enable SSH authentication to perform safety management. Enable this function, and then when multiple users are viewing Multicast/Broadcast the device video image simultaneously through network, they Search...
  • Page 74 User’s Manual Function Description Enable to encrypt bit rate transmission. Ensure that the supporting device or software supports  video decryption. RTSP over TLS The audio and video data with third-party platforms or  devices do not support encrypted transmission. To ensure the security of audio and video data, it is recommended to turn off the CGI service and ONVIF service.
  • Page 75 User’s Manual HTTPS (1) Step 2 Create a certificate or upload an authenticated certificate. ● For creating a certificate, click Create. HTTPS dialog box ● For uploading the authenticated certificate, click Browse to select the certificate and certificate key, click Upload to upload them, and then skip to Step5. Step 3 Enter the required information and then click Create.
  • Page 76 User’s Manual The entered IP or Domain name must be the same as the IP or domain name of the device. Step 4 Click Install. Certificate installation Step 5 Click Download to download root certificate. Step 6 Click Download Root Certificate. File download Step 7 Click Open.
  • Page 77 User’s Manual Certificate information Step 8 Click Install Certificate.
  • Page 78 User’s Manual Certificate import wizard (1) Step 9 Click Next. Certificate Store Step 10 Select the storage location and click Next.
  • Page 79 User’s Manual Certificate import wizard (2) Step 11 Click Finish and then click OK in the pop-up box. Import succeeds 3.6.4.4 Firewall Configure Network Access, PING prohibited and Prevent Semijoin to enhance network and data security. ● Network Access: Set trusted list and restricted list to limit access. Trust list: Only when the IP/MAC of your PC in the trusted list, can you access the camera.
  • Page 80 User’s Manual ● Prevent Semijoin: Enable Prevent Semijoin function, and the camera can provide service normally under Semijoin attack. ● You cannot set trust or banned list for camera IP or MAC addresses. ● You cannot set trust or banned list for port MAC addresses. ●...
  • Page 81 User’s Manual Add IP/MAC Step 3 Configure parameters. Table 3-36 Description of adding IP/MAC parameters Parameter Description Select IP address, IP segment, MAC address or all IP addresses. ● IP address: Select IP version and enter the IP address of the host to be added.
  • Page 82: Configuring Radar

    User’s Manual Configuring Radar Configure radar functions, including region management, IVS setup, device attitude and linkage. Configuring Region Management You can configure functions, including setting alarm rules, area type, arming/disarming period and region filtering. Procedures Select Setting > Radar Settings > Region. Region management Click , and then enter rule name at Name column, and then select an alarm type...
  • Page 83: Configuring Ivs Setup

    User’s Manual Rule Description Draw 1 detection area. When the target enters/exits or presents in the detection area, the alarm is triggered and the linkage is executed. Intrusion Applicable scene: areas with sparse targets and nearly no obstacles between them, such as unmanned perimeter protection. To configure arming/disarming period and alarm linkage, see "5.1.1 Alarm Linkage".
  • Page 84: Configuring Device Attitude

    User’s Manual Table 4-3 IVS setup parameter description Parameter Description After enabling radar structuring, the live view will display information including target distance, angle, speed, and type. Radar Structuring You need to enable Fusion before enable Radar Structuring. After enabling fusion, the live view will display the historic track of the Fusion moving target within the detection range.
  • Page 85: Configuring Linkage

    User’s Manual Configuring Linkage To raise the detection accuracy, it is recommended that you calibrate the radar by taking a moving human or object as reference. After enabling fusion and calibrating accurately, the trajectory displayed on live view will be more accurate.
  • Page 86: Manual Calibration

    User’s Manual 4.4.2 Manual Calibration In the pull-down list, select Manual. See Figure 4-5. Taking a moving human or vehicle as reference, click Start Calibration. Adjust the calibration box position by manually controlling the directional buttons and speed. Preferred effect: The target and the box is consistent with each other during calibration. Manual calibration Click Stop Calibration.
  • Page 87: Configuring Alarms And Abnormality

    User’s Manual Configuring Alarms and Abnormality Configuring Alarm Linkage 5.1.1 Alarm Linkage When configuring alarm events in Setting > Event > Alarm, select alarm linkages (such as record, snapshot). When the corresponding alarm is triggered in the configured arming period, the alarm will be triggered.
  • Page 88 User’s Manual Period Step 2 Set arming periods. Alarms will be triggered in the time period in green on the timeline. ● Directly press and drag the left mouse button on the timeline. ● Enter an actual time period. 1. Click Setting next to a day. 2.
  • Page 89 User’s Manual 5.1.1.3.1 Configuring Record Plan After the corresponding alarm type (General and Alarm) is enabled, the record channel links recording. Step 1 Select Setting > Storage > Schedule > Record. Record Step 2 Set record plan. Green represents normal record plan (such as timing recording); yellow represents motion record plan (such as recording triggered by intelligent events);...
  • Page 90 5.1.1.3.2 Configuring Record Control Set parameters such as pack duration, pre-event record, disk full, record mode, and record stream. Make sure that the SD card is authenticated before recording if you use Dahua smart card. For details, see "3.3.2.4 Path". Step 1 Select Setting >...
  • Page 91 User’s Manual Parameter Description When you select Manual, the system starts recording; when you Record Mode select Auto, the system starts recording in the configured time period of record plan. Record Stream Select record stream, including Main Stream and Sub Stream. Step 3 Click Save.
  • Page 92 User’s Manual Snapshot Step 2 Select snapshot type and set time period. Green represents normal snapshot plan (such as timing snapshot); yellow represents motion snapshot plan (such as snapshot triggered by intelligent events); red represents alarm snapshot plan (such as snapshot triggered by alarm-in). ●...
  • Page 93 User’s Manual Select All or check boxes of some days to set the time period of multiple ◇ days at one time. You can set 6 time periods per day. ◇ 3. You can set 6 time periods per day. The Snapshot interface is displayed.
  • Page 94: Subscribing Alarm

    User’s Manual ● Duration: After setting white light duration, the white light is turned off after an extended time of period after an alarm. It is 5 seconds–30 seconds. 5.1.1.8 Audio Linkage The system broadcasts alarm audio file when an alarm event occurs. Select Setting > Radar Settings >...
  • Page 95 User’s Manual Alarm Type Description Preparation The alarm is triggered when Voltage detection is enabled. For Security Exception the device detects malicious details, see "5.3.4 Configuring attack. Security Exception". Radar Alarm The alarm triggered by radar. Enable radar alarm function. 5.1.2.2 Subscribing Alarm Information You can subscribe alarm event.
  • Page 96: Configuring Relay-In

    User’s Manual Configuring Relay-in When an alarm is triggered at the alarm-in port, the system performs alarm linkage. Step 1 Select Setting > Event > Alarm Settings > Alarm. Alarm linkage Step 2 Select the Enable check box to enable the alarm linkage function. Step 3 Select a relay-in port and a sensor type.
  • Page 97: Sd Card Abnormality

    User’s Manual Only the device with SD card has the abnormality functions, including No SD Card, SD Card Error, and Capacity Warning. 5.3.1 SD Card Abnormality In case of SD card abnormality, the system performs alarm linkage. The event types include No SD Card, Capacity Warning, and SD Card Error.
  • Page 98: Configuring Illegal Access

    User’s Manual Network Step 2 Select the event type from the Event Type drop-down list, and then select the Enable check box to enable the network detection function. Step 3 Set alarm linkage actions. For details, see "5.1.1 Alarm Linkage". Step 4 Click Save.
  • Page 99: Configuring Security Exception

    User’s Manual If you consecutively enter a wrong password more than the defined value, the account will be locked. Step 4 Set alarm linkage actions. For details, see "5.1.1 Alarm Linkage". Step 5 Click Save. 5.3.4 Configuring Security Exception When a hostile attack is detected, the system performs alarm linkage. Step 1 Select Setting >...
  • Page 100: Maintenance

    User’s Manual Maintenance Requirements To make sure that the system runs normally, maintain it as the following requirements: ● Check surveillance images regularly. ● Clear regularly user and user group information that are not frequently used. ● Change the password every three months. ●...
  • Page 101: Resetting Password

    User’s Manual Resetting Password When you need to reset the password for the admin account, there will be a security code sent to the entered email address which can be used to reset the password. Prerequisites You have enabled password reset service. Procedure Step 1 Open IE browser, enter the IP address of the device in the address bar and press Enter.
  • Page 102 User’s Manual Clicking OK means that you are informed that some of your personal data might be collected to help reset the password, such as phone number, MAC address, and device serial number. Read the prompt carefully to decide whether to authorize the collection activity.
  • Page 103: Backup And Default

    User’s Manual Reset the password (2) Step 7 Reset and confirm the password. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special character (excluding ' "...
  • Page 104: Default

    User’s Manual ● Import: Select local configuration file, and click Open to import the local system configuration file to the system. ● Export: Select the storage path, and click Save to export the system configuration file to local storage. Step 3 Click Save to finish configuration.
  • Page 105: Information

    User’s Manual Upgrade Step 2 Select upgrading method according to the actual needs. ● File Upgrade 1. Click Browse, and then upload upgrade file. 2. The upgrade file should be a .bin file. 3. Click Upgrade. The upgrade starts. ● Online Upgrade 1.
  • Page 106: Log

    User’s Manual 6.6.2 Log You can view and back up logs. Step 1 Select Setting > Information > Log. Step 2 Configure Start Time and End Time, and then select the log type. The start time should be later than January 1st, 2000, and the end time should be earlier than December 31, 2037.
  • Page 107: Remote Log

    User’s Manual ● Click a certain log, and then you can view the detailed information in Detailed Information area. ● Click Backup, and then you can back up all found logs to local PC. Log (details) 6.6.3 Remote Log Configure remote log, and you can get the related log by accessing the set address. Step 1 Select Setting >...
  • Page 108: Online User

    User’s Manual 6.6.4 Online User View all the current users logging in to web. Select Setting > Information > Online User. Online user...
  • Page 109: Logout

    User’s Manual Logout Click Logout tab. The login interface is displayed. Logout interface...
  • Page 110: Cybersecurity Recommendations

    User’s Manual Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 111 User’s Manual We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel.
  • Page 112 User’s Manual Establish the 802.1x access authentication system to reduce the risk of unauthorized  access to private networks. Enable IP/MAC address filtering function to limit the range of hosts allowed to access  the device.
  • Page 113 User’s Manual...

This manual is also suitable for:

Dh-pfr5qi-e60-pv

Table of Contents