Speco O8B8M User Manual

Speco O8B8M User Manual

8mp ip camera
Hide thumbs Also See for O8B8M:

Advertisement

Quick Links

User Manual
8MP IP Camera
O8B8M/ O8D8M/ O8T8M
Please read this manual carefully before operating the unit and keep it for further reference

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the O8B8M and is the answer not in the manual?

Questions and answers

Summary of Contents for Speco O8B8M

  • Page 1 User Manual 8MP IP Camera O8B8M/ O8D8M/ O8T8M Please read this manual carefully before operating the unit and keep it for further reference...
  • Page 2 Important Safeguards and Warnings 1. Electrical safety All installation and operation here should conform to local electrical safety codes. Use a certified/listed 12VDC Class2 power supply only. Please note: Do not connect two power supplying sources to the device at the same time; it may result in device damage! The product must be grounded to reduce the risk of electric shock.
  • Page 3 Statement This guide is for reference only. Product, manuals, and specifications may be modified without prior notice. Speco Technologies reserves the right to modify these without notice and without incurring any obligation. Speco Technologies is not liable for any loss caused by improper operation.
  • Page 4: Table Of Contents

    Table of Contents Introduction ..........................................2 Web Access and Login ......................................3 Live View..........................................4 Camera Configuration ......................................6 System Configuration ................................6 4.1.1 System Information ..............................6 4.1.2 Date and Time ................................6 4.1.3 Local Recording ................................7 4.1.4 Storage ..................................
  • Page 5 4.6.3 Block and Allow Lists ..............................38 4.6.4 Security Management...............................39 Maintenance Configuration ..............................40 4.7.1 Backup and Restore ..............................40 4.7.2 Reboot ..................................40 4.7.3 Upgrade ..................................40 4.7.4 Operation Log ................................41 Search ............................................ 42 Image Search ..................................42 Video Search ..................................44 5.2.1 Local Video Search ..............................44 5.2.2 SD Card Video Search..............................45 Appendix ............................................
  • Page 6: Introduction

    Thank you for purchasing this network camera! Please read this manual carefully before operating the unit and retain it for further reference. Should you require any technical assistance, please contact Speco Technologies Technical Support at 1-800-645-5516. Main Features ⚫ Built-in PoE (Power over Ethernet) ⚫...
  • Page 7: Web Access And Login

    2 Web Access and Login The IP camera settings can be accessed via a web browser through the LAN. Available web browser: IE (plug-in required)/ Firefox/Edge/Safari/Google Chrome It is recommended to use the latest version of these web browsers. The menu display and operation of the camera may be slightly different by using the browser with plug-in or without plug-in. Installing plug-in will display more functions of the camera.
  • Page 8: Live View

    3 Live View The window below will be shown after logging in. The following table describes the icons on the live view interface Icon Description Icon Description Original size of resolution SD card recording indicator Fit (correct scale) Abnormal color indicator Auto (fill the window) Abnormal clarity indicator Full screen (show video only)
  • Page 9 *Plug-in free live view: PTZ control, two-way audio and local recording are not supported. ⚫ All indicator icons above will flash in live view interface only when the corresponding events are enabled. ⚫ In full screen mode, to exit, double click on the mouse or press the ESC key on the keyboard. Click the zoom/focus control button to show the control panel.
  • Page 10: Camera Configuration

    4 Camera Configuration Press the “Setup” button to go to the configuration interface. Note: Wherever applicable, click the “Save” button to save the settings. 4.1 System Configuration 4.1.1 System Information In the “System Information” interface, the system information of the device is listed. 4.1.2 Date and Time To set the time and date, go to System→Date and Time.
  • Page 11: Local Recording

    4.1.3 Local Recording Go to System→Local Recording to set up the storage path of captured pictures and recorded videos on the local PC. There is also an option to enable or disable the bitrate display in the recorded files. Additionally, the snapshots triggered by smart events (including face detection, line crossing detection and intrusion detection) can be selected to save to the local PC.
  • Page 12 1. Go to Storage→Record to go to the interface as shown below. 2. Set record stream, pre-record time and cycle writing. Pre Record Time: Set the time to record before the actual recording begins. 3. Set schedule recording. Check “Enable Schedule Record” and set the schedule. Weekly schedule Set the alarm time from Monday to Sunday for a single week.
  • Page 13: Video Configuration

    Set the format, resolution and quality of the image saved on the SD card and the snapshot interval and quantity and the timing snapshot here. Snapshot Quantity: The number you set here is the maximum quantity of snapshots. The actual quantity of snapshots may be less than this number.
  • Page 14 Brightness: Set the brightness level of the camera’s image. Contrast: Set the color difference between the brightest and darkest parts. Hue: Set the total color degree of the image. Saturation: Set the degree of color purity. The purer the color, the brighter the image is. Sharpness: Set the resolution level of the image plane and the sharpness level of the image edge.
  • Page 15: Video / Audio Configuration

    Smart IR: Choose “ON” or “OFF”. This function can effectively avoid image overexposure and underexposure by controlling the brightness of the IR lights according to the actual conditions to make the image more realistic. Please enable it as needed. White Balance: Adjust the color temperature according to the environment automatically. Frequency: 50Hz and 60Hz can be optional.
  • Page 16: Osd Configuration

    Click the “Audio” tab to go to the interface as shown below. Three video streams can be adjustable. Resolution: The size of image. Frame rate: The higher the frame rate, the video is smoother. Bitrate type: CBR and VBR are optional. Bitrate is related to image quality. CBR means that no matter how much change is seen in the video scene, the compression bitrate will be kept constant.
  • Page 17: Video Mask

    Set time stamp, device name, OSD content and picture overlap here. After enabling the corresponding display and entering the content, drag them to change their position. Then click the “Save” button to save the settings. Picture Overlap Settings: Check “OSD Content1”, choose “Picture Overlay” and click “Browse” to select the overlap picture. Then click “Upload” to upload the overlap picture.
  • Page 18: Roi Configuration

    To clear the video mask: Click the “Clear” button to delete the current video mask area. 4.2.5 ROI Configuration Go to Image→ROI Config interface as shown below. An area in the image can be set as a region of interest. This area will have a higher bitrate than the rest of the image, resulting in better image quality for the identified area.
  • Page 19: Event Setup

    4.3 Event Setup 4.3.1 Motion Detection Go to Alarm→Motion Detection to set motion detection alarm. 1. Check “Enable” check box to activate motion-based alarms. If unchecked, the camera will not send out any signals to trigger motion-based recording to the NVR or CMS, even if there is motion in the video. Alarm Out: If selected, this would trigger an external relay output that is connected to the camera on detecting a motion-based alarm.
  • Page 20: Other Alarms

    Move the “Sensitivity” scroll bar to set the sensitivity. Higher sensitivity value means that motion will be triggered more easily. Select “Add” and click “Draw”. Drag the mouse to draw the motion detection area; Select “Erase” and drag the mouse to clear motion detection area.
  • Page 21 2. Click “Enable” and set the alarm holding time. 3. Set alarm trigger options. Trigger alarm out, Email and FTP. The setup steps are the same as motion detection. Please refer to motion detectionchapter for details. ⚫ IP Address Conflict This function is only available for the models with Alarm Out interface.
  • Page 22: Alarm In (Sensor Input)

    4.3.3 Alarm In (Sensor Input) This function is only available for some models. To set sensor alarm (alarm in): Go to Alarm→Alarm In interface as shown below. 1. Click “Enable” and set the alarm type, alarm holding time and sensor name. 2.
  • Page 23: Alarm Server

    Timing: Select the alarm type. Then click “Add” and drag the mouse on the timeline to set the schedule of alarm out; click “Erase” and drag the mouse on the timeline to erase the set time schedule. After this schedule is saved, the alarm out will be triggered in the specified time.
  • Page 24: Line Crossing

    1. Enable the applicable detection that is desired. Scene Change Detection: Alarms will be triggered if the scene of the video has changed. Video Blur Detection: Alarms will be triggered if the video becomes blurry. Video Cast Detection: Alarms will be triggered if the video becomes obscured. 2.
  • Page 25 1. Enable line crossing alarm and select the snapshot type and the detection target. Save Panoramic Picture: If it is enabled, the detected panoramic pictures will be captured and saved to the SD card when there are targets detected. Save Target Cutout: If it is enabled, the detected target cutout pictures will be captured and saved to the SD card when there are targets detected.
  • Page 26: Intrusion

    Set the alarm line number and direction. Up to 4 lines can be added. Multiple lines cannot be added simultaneously. Direction:A<->B, A->B and A<-B optional. This indicates the direction of the intruder who crosses over the alarm line that would trigger the alarm.
  • Page 27 1. Enable intrusion alarm and select the snapshot type and the detection target. 2. Set the alarm holding time. 3. Click the “Save” button to save the settings. 4. Set the alarm area of the intrusion detection. Click the “Area” tab to go to the interface as shown below. Set the alarm area number on the right side.
  • Page 28: Face Detection

    4.4.4 Face Detection Face detection function is to detect the face appearing in the surveillance scene. Alarms will be triggered when a face is detected. The setting steps are as follows: 1. Go to Event→Face Detection as shown below. 2. Enable the face detection function. Save Source Information: if checked, the whole picture will be saved to an SD card when detecting a face.
  • Page 29: Region Entrance

    rectangle to modify its size. Move the rectangle to change its position. Click “Stop Draw” to stop drawing the area. Click “Clear” to clear the area. Then set the detectable face size by defining the maximum value and the minimum value(The default size range of a single face image occupies from 3% to 50% of the entire image).
  • Page 30: Region Exiting

    1. Enable region entrance detection and select the snapshot type and the detection target. 2. Set the alarm holding time. 3. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to motion detection chapter for details. 4.
  • Page 31 Go to Config→Event→Region Exiting interface as shown below. 1. Enable region exiting detection and select the snapshot type and the detection target. 2. Set the alarm holding time. 3. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to motion detection chapter for details. 4.
  • Page 32: Target Counting

    4.4.7 Target Counting This function is to calculate the number of the people or vehicles crossing the alarm line through detecting, tracking and counting the shapes of the people or vehicles. 1. Go to Config→Event→Target Counting as shown below. 2. Enable target counting and select the snapshot type and the detection target. Detection Target: Select the target to calculate.
  • Page 33: Network Configuration

    Set the alarm line number and direction. Only one alarm line can be added. Direction:A->B and A<-B can be optional. The direction of the arrow is entrance. Statistics: If enabled, you can see the statistical information in the live view interface. If disabled, the statistical information will not be displayed in the live view interface.
  • Page 34: Port

    Use IP address (take IPv4 for example)-obtain a local IP address automatically through DHCP. A typical router has a DHCP server built in, and therefore is able to assign an IP address to the camera. Use PPPoE-Click the “PPPoE Config” tab to go to the interface as shown below. Enable PPPoE and then enter the user name and password from your ISP.
  • Page 35: Server Configuration

    4.5.3 Server Configuration This function is mainly used for connecting network video management system. 1. Check “Enable”. 2. Check the IP address and port of the transfer media server in the VMS. Then enable the auto report in the VMS when adding a new device.
  • Page 36: Snmp

    4.5.6 SNMP To get camera status, parameters and alarm information and remotely manage the camera, the SNMP function can be used. Before using SNMP, please install an SNMP management tool and set the parameters of the SNMP, such as SNMP port, trap address. 1.
  • Page 37: 802.1X

    4.5.7 802.1x If it is enabled, the camera’s data can be protected. When the camera is connected to the network protected by the IEE802.1x, user authentication is needed. To use this function, the camera shall be connected to a switch supporting 802.1x protocol. The switch can be reckoned as an authentication system to identify the device in a local network.
  • Page 38: Rtmp

    4.5.9 RTMP You can access the third-party (like YouTube) to realize video live view through RTMP protocol. Go to Config→Network→RTMP. Check “Enable”, select stream type, set the reconnection time after timeout and server address as needed. Server address: Enter the server address allocated by the third party server. After that, click “Save”...
  • Page 39: Ftp

    Select the secure connection type at the “Secure Connection” pull-down list according to what’s required. SMTP Port: The SMTP port. Send Interval(S): The time interval of sending email. For example, if it is set to 60 seconds and multiple motion detection alarms are triggered within 60 seconds, they will be considered as only one alarm event and only one email will be sent.
  • Page 40: Qos

    the following interface will be displayed. * If there is a signed certificate, click “Browse” to select it and then click “Install” to install it. * Click “Create a private certificate” to enter the following creation interface. Click the “Create” button to create a private certificate. Enter the country (only two letters available), domain (camera’s IP address/domain), validity date, password, province/state, region and so on.
  • Page 41: Security Configuration

    Manager DSCP: The range is from 0 to 63. Generally speaking, the larger the number is, the higher the priority is. 4.6 Security Configuration 4.6.1 User Admin Go to Security→User Admin interface as shown below. Add user: 1. Click “Add” to pop up the following textbox. 2.
  • Page 42: Online User

    3. Enter the old password of the user in the “Old Password” text box. 4. Enter the new password in the “New password” and “Confirm Password” text box. 5. Modify the permission as necessary. 6. Click the “OK” button to save the settings. Note: To change the access level of a user, the user must be deleted and added again with the new access level.
  • Page 43: Security Management

    The setup steps are as follows: Check the “Enable address filtering” check box. Select “Block/Allow the following address”, IPv4/IPv6 and then enter IP address in the address box and click the “Add” button. 4.6.4 Security Management Go to Security→Security Management as shown below. In order to prevent against malicious password unlocking, “locking once illegal login”...
  • Page 44: Maintenance Configuration

    4.7 Maintenance Configuration 4.7.1 Backup and Restore Go to Maintenance→Backup & Restore. Import & Export Settings ⚫ Configuration settings of the camera can be exported form a camera into another camera. 1. Click “Browse” to select the save path for import or export information on the PC. 2.
  • Page 45: Operation Log

    Caution! Do not close the browser or disconnect the camera from the network during the upgrade. 4.7.4 Operation Log To query and export log: 1. Go to Maintenance→Operation Log. 2. Select the main type, sub type, start and end time. 3.
  • Page 46: Search

    5 Search 5.1 Image Search In the Setup interface, click Search to go to the interface as shown below. Images that are saved on the PC or SD card can be found here. ⚫ Local Image Search 1. Choose “Picture”—“Local”. 2.
  • Page 47 Click to return to the previous interface. ⚫ SD Card Image Search 1. Choose “Picture”—“SD Card”. 2. Set time: Select date and choose the start and end time. 3. Choose the alarm events at the bottom of the interface. 4. Click to search the images.
  • Page 48: Video Search

    Icon Description Icon Description Close: Select an image and click Close all: Click this button to close all this button to close the image. images. Save: Click this button to select the Save all: Click this button to select the path for saving the image on the path for saving all pictures on the PC.
  • Page 49: Sd Card Video Search

    Icon Description Icon Description Play button. After pausing the video, Pause button click this button to continue playing. Stop button Speed down Speed up Watermark display Enable / disable audio; drag the slider to adjust the volume after enabling audio. 5.2.2 SD Card Video Search Click Search to go to the interface as shown below.
  • Page 50 4. Select the alarm events at the bottom of the interface. 5. Select mix stream (video and audio stream) or video stream as needed. 6. Double click on a file name in the list to start playback. The time table can be shown in 24H/12H/2H/1H format by clicking the corresponding buttons. Video clip and downloading 1.
  • Page 51 Click “Set up” to set the storage directory of the video files. Click “Open” to play the video. Click “Clear List” to clear the downloading list. Click “Close” to close the downloading window.
  • Page 52: Appendix

    Appendix Appendix 1 Troubleshooting IP Scanner does not show any device. Make sure that the PC that’s running IP Scanner is on the same local network as the devices. Internet Explorer cannot download ActiveX control. IE browser may be set up to block ActiveX. Follow the steps below. 1.
  • Page 53: Appendix 2 Specifications

    Built-in micro SD card storage slot, up to 256GB Alarm 1CH Alarm input; 1CH Alarm Ouput Remote Web browser, SecureGuard CMS/VMS, Apple TV, Amazon Fire TV, Speco Blue Monitoring Online Support simultaneous monitoring for up to 10 users and multi-stream transmission Connection UDP, IPv4, IPv6, DHCP, NTP, RTSP, RTP, RTCP, ICMP, IGMP, PPPoE, DDNS, SMTP, FTP, SNMP,HTTP, 802.1x,...
  • Page 54 Alarm 1CH Alarm input; 1CH Alarm Ouput Remote Monitoring Web browser, SecureGuard CMS/VMS, Apple TV, Amazon Fire TV, Speco Blue Online Connection Support simultaneous monitoring for up to 10 users and multi-stream transmission UDP, IPv4, IPv6, DHCP, NTP, RTSP, RTP, RTCP, ICMP, IGMP, PPPoE, DDNS, SMTP, FTP, SNMP,HTTP, Network Protocol 802.1x, UPnP, HTTPs, QoS...
  • Page 55 Storage Built-in micro SD card slot; up to 256GB Remote Monitoring Web browser, SecureGuard CMS/VMS, Apple TV, Amazon Fire TV, Speco Blue Online Connection Support simultaneous monitoring for up to 10 users and multi-stream transmission UDP, IPv4, IPv6, DHCP, NTP, RTSP, RTP, RTCP, ICMP, IGMP, PPPoE, DDNS, SMTP, FTP, SNMP,HTTP, 802.1x,...
  • Page 56 Models: O8B8M/ O8D8M/ O8T8M Federal Communications Commission (FCC) Statements This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation.

This manual is also suitable for:

O8d8mO8t8m

Table of Contents