Table of Contents

Advertisement

Quick Links

User's Manual
V2.1.1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Elite IPEL-E80F-IRB2 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ICRealtime Elite IPEL-E80F-IRB2

  • Page 1 User's Manual V2.1.1...
  • Page 2 Foreword General This manual introduces the functions, configuration, general operation, and system maintenance of the network camera. Safety Instructions The following signal words may appear in the manual. Signal Words Meaning Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
  • Page 3 Privacy Protection Notice As the device user or data controller, you may collect the personal data of others such as their face, fingerprints, and license plate number. You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures that include but are not limited: Providing clear and visible identification to inform people of the existence of the surveillance area and provide required contact information.
  • Page 4: Important Safeguards And Warnings

    Important Safeguards and Warnings Electrical Safety ● All installation and operation shall conform to your local electrical safety codes. ● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no higher than PS2. Note that the power supply requirements are subject to the device label.
  • Page 5 the lightning protection. ● We recommend grounding the device to enhance reliability. ● Do not touch the image sensor (CMOS) directly. Dust and dirt could be removed with air blower, or you can wipe the lens gently with a soft cloth that is moistened with alcohol. ●...
  • Page 6: Table Of Contents

    Table of Contents Foreword General Safety Instructions Revision History About the Manual Important Safeguards and Warnings Electrical Safety Environment Operation and Daily Maintenance Table of Contents 1 Overview Introduction Network Connection Function Basic Function Real-time Monitoring Record Account Intelligent Function Alarm Smart Track Video Detection...
  • Page 7 Basic Configuration Login Live Live Interface Encode Bar Live View Function Bar Window Adjustment Bar Adjustment Zoom and Focus Fisheye PTZ Operation Configuring External PTZ Protocol Prerequisites Procedure Configuring PTZ Function Preset Related Operations Tour Prerequisites Procedure Scan Pattern PTZ Speed Idle Motion Prerequisites Procedure...
  • Page 8 Downloading Video or Picture Downloading a Single File Downloading Files in Batches Camera Conditions Conditions Profile Management Zoom and Focus Splicing Setting Video Parameters Video Snapshot Overlay Privacy Masking (1) Privacy Masking (2) Related Operations Path Audio Configuring Audio Parameter Configuring Alarm Audio Network TCP/IP...
  • Page 9 Multicast 4.6.10 802.1x Access Platform ONVIF RTMP Storage Setting Storage Plan Setting Schedule Prerequisites Procedure Setting Destination Path Local System General Date & Time Account Adding a User Related Operations Adding User Group ONVIF User Procedure Related Operations Security System Service HTTPS Firewall Peripheral...
  • Page 10 Snapshot Linkage Relay-out Linkage Email Linkage PTZ Linkage Warning Light Linkage Audio Linkage Subscribing Alarm About Alarm Types Subscribing Alarm Information Setting Panoramic Splicing Setting Video Detection Setting Motion Detection Setting Video Tampering Setting Scene Changing Setting Intelligent Motion Detection Prerequisites Procedure Setting Audio Detection...
  • Page 11 Setting Face Detection Prerequisites Procedure Setting People Counting People Counting Prerequisites Procedure Result Queuing Prerequisites Procedure Result Viewing People Counting Report Setting Heat Map Heat Map Prerequisites Procedure Viewing Heat Map Report Setting Video Metadata Scene Configuration Result Setting Picture Information Viewing Video Metadata Report Setting Relay-in Relay-in (1)
  • Page 12 Upgrade Information Version Remote Log Online User Appendix 1 Cybersecurity Recommendations More information...
  • Page 13: Overview

    1 Overview 1.1 Introduction An IP camera (Internet Protocol camera), is a type of digital video camera that receives control data and sends image data through the internet. They are commonly used for surveillance, requiring no local recording device, but only a local area network, although adding them to an NVR greatly increases its utility.
  • Page 14: Record

    ● Adjust the PTZ image to the proper position. ● Snapshot or triple snapshot of the monitoring image for subsequent view and processing. Record Record events when monitoring for subsequent view and processing. ● Configure coding parameters, and adjust the live view image. ●...
  • Page 15: Crowd Map

    people gathering, and loitering detection. When an event is triggered, the system can activate linkages such as recording, ● alarm output, sending email, PTZ operation, and snapshot. Crowd Map View crowd distribution in real-time for a timely arm to avoid accidents like stampedes. ●...
  • Page 16: Abnormality

    alarm output, sending email, PTZ operation, and snapshot. Abnormality ● SD card error, network disconnection, illegal access, voltage detection, and security exception. When there is an SD card error or illegal access is triggered, the system can activate ● the alarm output and send an email. When a network disconnection event is triggered, the system can activate recording ●...
  • Page 17: Device Initialization

    Adjust image parameters Image according to the environment to "4.5.1 Conditions" parameters ensure the image quality. Configure necessary Detection detection rules, such as video "5 Event" rules detection and IVS. Intelligent Event Subscribe alarm event. When the subscribed event is triggered, the Subscribe "5.1.2 Subscribing system will record the event on...
  • Page 18: Basic Configuration

    Step 4 Set the password for the admin account as well as the security questions in case the password is lost. Click Next when finished to save. Table 3-1 Description of password configuration Parameter Description Username The default username is admin. Password The password must consist of 8 to 32 non-blank characters and contain at least two types of characters: upper case,...
  • Page 19: Login

    The chapter introduces the basic configuration, including login, live view, PTZ operation, playback, camera configuration, network configuration, storage configuration, and system configuration. 4.1 Login This section introduces how to log in to and log out of the web interface. This section takes IE Explorer 9 as an example.
  • Page 20: Live

    4.2 Live This section introduces the Live View layout of the interface and function configuration. ● Alarm: Select Alarm to subscribe and view alarm information. ● Logout: Select Logout to go to the login interface. ● The system will sleep automatically after idling for a period of time. Figure 4-2 Live 4.2.1 Live Interface This section introduces the system menu, encode bar, live view function bar, and window...
  • Page 21: Encode Bar

    Table 4-1 Description of function bar Function Description Encode bar Sets stream type and protocol. Live view Displays the real-time monitoring image. Live view function bar Functions and operations in live viewing. Window adjustment bar Adjustment operations in live viewing. (available with IE+ Plugins) 4.2.2 Encode Bar Figure 4-4 Encode bar...
  • Page 22: Live View Function Bar

    4.2.3 Live View Function Bar Options in the Live function Bar vary dispensing on IPC model. For the live view function bar, see Table 4-2. Table 4-2 Description of live view function bar Icon Function Description Manually position the tracking PTZ to the selected location of the corresponding panoramic camera.
  • Page 23 Icon Function Description Controls PTZ by operating the mouse on the live view of the tracking PTZ camera. Select the live view of the tracking PTZ Gesture camera, click the icon, press the left button, and drag the image to control PTZ. You can zoom in or out of the image by rolling the mouse wheel.
  • Page 24 Icon Function Description Click the icon to capture one picture of the current image. The snapshot will be stored on your computer. Snapshot For viewing or configuring the storage path, see "4.5.2.5 Path". Click the icon to capture three pictures of the current image.
  • Page 25: Window Adjustment Bar

    4.2.4 Window Adjustment Bar...
  • Page 26: Adjustment

    4.2.4.1 Adjustment This section introduces the image adjustment options. Table 4-3 Description of adjustment bar Icon Function Description Click the icon, and then the Image Adjustment interface is displayed on the right side of the Live interface. You can then adjust brightness, contrast, hue, and saturation.
  • Page 27 Click the icon to resume the original Width: Height ratio or change the ratio. Click the icon to select the fluency: Realtime, Fluency, and Normal. ● Realtime: Guarantees the real-time display of the image. When the bandwidth is not enough, the image may not be Fluency smooth.
  • Page 28: Zoom And Focus

    Icon Function Description ● Click the icon, and the face detection or face recognition results are displayed on the Live Face interface. ● For face recognition, see "5.10.1 Setting Face Detection". ● For face detection: see "5.11 Setting Face Detection". Click the icon, and the video metadata results will be displayed Video Metadata...
  • Page 29 Figure 4-5 Zoom and focus...
  • Page 30: Fisheye

    Table 4-4 Description of zoom and focus Parameter Description Changes the focal length of the camera to zoom in or out the image. 1. Set the Speed value. The Speed is the adjustment range in one Zoom click. The greater the value is, the more the image will zoom in or out in one click.
  • Page 31 ● Install Mode: Select the installation mode according to the camera mounting situation. ● Display Mode: Select the display mode of live view. ● VR Mode: Select VR mode to display images in stereo mode. Figure 4-6 Fisheye Table 4-5 Description of fisheye configuration Parameter Description Installation mode...
  • Page 32 installation mode. Ceiling/Wall/ The original image before dewarping. Ground mount Original image 360° rectangular panoramic image screen + independent sub-screens. ● You can zoom or drag the image on all the screens. 1P+1 ● You can move the start point (left and right) on a rectangular panoramic image screen.
  • Page 33 360° rectangular panoramic screen + six independent sub-screens. ● You can zoom or drag the image on all the screens. 1P+6 ● You can move the start point (left and right) on a rectangular panoramic image screen. Original image screen + eight independent sub-screens.
  • Page 34: Ptz Operation

    ● You can drag the image in the upper/lower/left/right direction. Press I to display the panorama, and press O to resume the original size. Semi-circle ● Press S to rotate the image in an VR mode anticlockwise direction. Press E to stop the rotation.
  • Page 35: Prerequisites

    Prerequisites Access external PTZ through RS-485. ● ● You have configured the parameters of serial port. For details, see "4.8.5.1 Serial Port Settings". Procedure Step 1 Select Setting > PTZ Setting > Protocol. Figure 4-7 PTZ setting Step 2 Select the PTZ protocol. Step 3 Click OK.
  • Page 36: Related Operations

    Step 2 Set the speed, click to adjust the parameters of direction, zoom, focus and iris, to move the camera to the desired position. Step 3 Click Add to add the current position as a preset, and the preset will be displayed in preset list.
  • Page 37: Scan

    Step 2 Click Add ① to add tour. Double-click the tour name to edit the name. Step 3 Click Add ② to add preset. Double-click the duration to set the duration. Step 4 Select the tour mode. ● Original path: The PTZ camera moves in the order of the selected presets. ●...
  • Page 38: Pattern

    Step 2 Select the scan number and set the speed. Step 3 Click Setup to set the left limit and right limit. 1) Click Set Left Limit to set the current position to be the left limit. 2) Click Set Right Limit to set the current position to be the right limit. Step 4 Click Start to start scanning.
  • Page 39: Pan

    Step 2 Select the pattern number. Step 3 Click Setup, and then click Start Rec. Adjust the parameters of direction, zoom, focus and iris according to the environmental conditions. Step 4 Click Stop Rec to stop recording. Step 5 Click Start to start patterning. Step 6 Click Stop to stop patterning.
  • Page 40: Ptz Speed

    Click Stop to stop rotation. 4.3.2.6 PTZ Speed PTZ speed means the rotation speed of the PTZ camera during touring, pattern, or auto-tracking. Step 1 Select Setting > PTZ settings > Function > PTZ Speed. Figure 4-13 PTZ speed Step 2 Select the PTZ speed: Low, Middle, and High.
  • Page 41: Powerup

    Step 2 Select the Enable checkbox to enable the idle motion function. Step Select the idle motion and set the idle time. You need to select the corresponding number for some selected idle motions, such as Preset001. Step 4 Click Save. 4.3.2.8 PowerUp After setting the Powerup motion, the camera will perform the configured motion after it is powered...
  • Page 42: Ptz Limit

    Step 3 Select the power up motion. If you select Auto, the system will perform the last motion that is executed for more than 20 s before power-off. Step 4 Click OK. 4.3.2.9 PTZ Limit After setting PTZ limit, the camera can only rotate within the configured area. Step 1 Select Setting >...
  • Page 43: Related Operations

    Step 2 Select the Enable checkbox to enable the time task function. Step 3 Select the time task number. Step 4 Select the time task action. You need to select the corresponding action number for some selected time task actions. Step 5 Set the auto home time in AutoHome.
  • Page 44: Default

    Step 2 Click PTZ Restart to restart PTZ. 4.3.2.12 Default Be careful when doing this operation. It will restore the camera to default configuration, and result in data loss. Step 1 Select Setting > PTZ settings > Function > Default. Figure 4-19 Default Step 2 Click Default and the PTZ function is restored to default.
  • Page 45: Calling Ptz

    4.3.3 Calling PTZ Click on Live interface, and the PTZ configuration panel is displayed. You can control PTZ and call PTZ function. 4.3.3.1 PTZ Control You can rotate device, zoom image, and adjust iris through PTZ control or virtual joystick. See Figure 4-20 and Figure 4-21.
  • Page 46: Ptz Function

    : Rotates the PTZ direction using the directional buttons. PTZ supports eight directions: ● left/right/up/down/upper left/upper right/bottom left/bottom right. Click , and draw a box in the image, PTZ will rotate, focus and quickly position the defined scene. ● : Rotate PTZ direction through joystick. Select and hold , and drag it to the direction that you need, then PTZ will move to the defined direction.
  • Page 47: Playback

    Table 4-6 Description of PTZ function Parameter Description Set the scan number and click Start, the camera moves horizontally at a certain speed between the set left and right limit. Click Stop to Scan stop scanning. Set the preset number and click Go to, the camera quickly positions Preset the corresponding preset.
  • Page 48 Figure 4-24 Picture playback Table 4-7 Playback interface description Function Description Click the icon to select display mode according to the installation mode during playback. Fisheye This function is only available on fisheye cameras. Click the icon to display intelligent rules and object detection box.
  • Page 49: Playing Back Video Or Picture

    Controls the sound during playback. Sound : Mute mode. ● ● : Vocal state. You can adjust the sound. Controls playback. ● : Click the icon to play back recorded videos. : Click the icon to stop playing back recorded ●...
  • Page 50 Step 1 Select dav from the Record Type drop-down list and SD card from the Data Src drop-down list. If jpg is selected from Record Type drop-down list when playing back pictures, you do not need to select a data source. Figure 4-25 File type selection Step 2 Select the record type in Record Type.
  • Page 51: Clipping Video

    The system will play the recorded video of the selected date (in the order of time). ● The system will play the recorded video of the selected date (in the order of time). ● Click any point in the colored area on the progress bar. The playback starts from that moment.
  • Page 52: Downloading Video Or Picture

    Step 3 Click on the progress bar to select the start time of the target video, and then click See Figure 4-30. Figure 4-30 Clipping video Step 4 Click again on the progress bar to select the end time of the target video, and then click Step 5 Click to download the video.
  • Page 53: Camera

    Step 2 Select the record type, set the start time and end time, and then click Search. The searched files are listed. Step 3 Select the files to be downloaded, select dav or mp4 from the Format drop-down list, and then set the storage path.
  • Page 54 light mode. Parameters (such as contrast and saturation) will change to match the style. You also further modify the configurations for select modes (such as picture, exposure and backlight) after changing the main style. Flowing light is suitable for situations where there is dim lighting, and the panoramic function is unable to effectively detect targets.
  • Page 55 4.5.1.1.2 Picture You can configure picture parameters like brightness, contrast or image flip as necessary. Step 1 Select Setting > Camera > Conditions > Conditions > Picture. Figure 4-34 Picture Step 2 Configure picture parameters. Table 4-8 Description of picture parameters Parameter Description Select the picture style from soft, standard and vivid.
  • Page 56 ● Vivid: The image is more vivid than normal. Changes the value to adjust the picture brightness. The greater the value, the brighter the picture will be, and the smaller the Brightness darker. The picture may be hazy if the value is configured too big.
  • Page 57 This section allows you to configure the iris and shutter settings to improve image clarity. Cameras with true WDR do not support long exposure when WDR is enabled in Backlight. Step 1 Select Setting > Camera > Conditions > Conditions > Exposure. Figure 4-35 Exposure Step 2 Configure exposure parameters.
  • Page 58 Device exposure modes. ● Auto: Adjusts the image brightness according to the environmental condition automatically. ● Gain Priority: If the image brightness is not enough and the gain has reached an upper or lower limit, the camera adjusts the shutter value automatically to ensure the image at the ideal brightness.
  • Page 59 Parameter Description This configuration is available only when the camera is equipped with auto-iris lens. ● When auto iris is enabled, the iris size changes automatically according to the ambient lighting Auto Iris condition, and the image brightness changes accordingly. ●...
  • Page 60 Table 4-10 Description of backlight parameters Backlight mode Description The system adjusts image brightness according to ambient lighting Auto condition automatically to ensure image clarity. Backlight Compensation. If BLC is enabled, the camera increases light exposure for darkened areas, making subjects appear more naturally lit and increasing detail.
  • Page 61 Step 2 Configure WB parameters. Table 4-11 Description of WB parameters WB mode Description The system compensates WB according to color temperature to Auto ensure color precision. The system auto compensates WB to environments without Natural artificial light to ensure color precision. The system compensates WB for outdoor night scenes to ensure Street Lamp color precision.
  • Page 62 Step 2 Configure day and night parameters. Table 4-12 Description of day and night parameters Parameter Description You can select a device display mode from Color, Auto, and B/W. Day & Night configuration is independent of profile management configuration. Mode ●...
  • Page 63 Step 2 Configure zoom and focus parameters. Table 4-13 Description of zoom and focus parameters Parameter Description Select On to enable the digital zoom function. Digital Zoom Adjusts zoom speed. the greater the value, the higher the speed Zoom Speed will be.
  • Page 64 Step 1 Select Setting > Camera > Conditions > Conditions > Illuminator. Figure 4-40 Illuminator Step 2 Configure illuminator parameters. Table 4-14 Description of illuminator parameters Illuminator Description Set Fill Light for Active Deterrence (sound and siren) cameras. ● IR Mode: If the IR illuminator is enabled, the white light will be disabled.
  • Page 65 The camera adjusts the illuminator intensity automatically according to the change in the ambient light. ● When the ambient light turns darker, the system turns on the low beam lights first. If Mode the brightness is still not enough, then it will turn on the high beam lights.
  • Page 66 Auto The system adjusts image clarity according to the environmental conditions. Defog function is disabled. Step 3 Click Save. 4.5.1.1.10 Fisheye This function allows you to dewarp the 360 fisheye cameras to different layouts. This function is only available on fisheye device. Step 1 Select Setting >...
  • Page 67: Profile Management

    Step 3 Click Save. 4.5.1.1.11 Image Correction The image correction function corrects some bent objects (such as roads) in the image of panoramic splicing cameras at the cost of influencing the field of view. Figure 4-43 Image correction ● If the camera has multiple sensors, the image correction function will only displayed if the number of splicing sensors is 4 or less.
  • Page 68 You can set different time periods with their own image condition settings. Step 1 Select Setting > Camera > Conditions > Profile Management. The Profile Management interface is displayed. Step 2 Manage profile. ● When Profile Management is set as General, the camera works under the default configuration.
  • Page 69: Zoom And Focus

    ● When Profile Management is set as Day & Night, the camera works under Day & Night configuration. Figure 4-48 Day/Night Step 3 Click Save. 4.5.1.3 Zoom and Focus You can adjust image clarity through auto or manual focus; and adjust the image size through zoom. For details, see "4.2.4.2 Zoom and Focus".
  • Page 70: Setting Video Parameters

    You will need to select the continuous splicing screens. The screen with the icon (deeper color) is the first screen of the splicing. You can select any screen as the first one, and then select the following screens continuously. The system supports the splicing of 2 to 8 lenses.
  • Page 71 Step 2 Configure video parameters. Table 4-17 Description of video parameters Parameter Description Select the Enable checkbox to enable sub stream. It is enabled by default. Disabling sub stream can cause issues with viewing on mobile apps. Enable ● You can enable multiple sub streams simultaneously if it is supported by the camera model.
  • Page 72 Select the encoding strategy as necessary. ● General: Disables smart codec. ● Smart Codec: Enable smart codec to improve video compressibility and save storage space. It is applicable to static scenes. ● AI Code: When the bandwidth and storage space are restricted, the camera will select the encoding strategy with Encoding Strategy a lower bit rate to save storage space.
  • Page 73 The bit rate control type during video data transmission. You can select bit rate type from: ● CBR (Constant Bit Rate): The bit rate changes a little and keeps close to the defined bit rate value. ● VBR (Variable Bit Rate): The bit rate changes as the Bit Rate Type monitoring scene changes.
  • Page 74: Snapshot

    4.5.2.2 Snapshot You can configure snapshot parameters, including snapshot type, image size, quality and interval. Step 1 Select Setting > Camera > Video > Snapshot. Figure 4-51 Snapshot Step 2 Configure snapshot parameters. Table 4-18 Description of snapshot parameter Parameter Description You can select General and Event.
  • Page 75 Step 1 Select Setting > Camera > Video > Overlay > Privacy Masking. Figure 4-52 Privacy masking (1) Figure 4-53 Privacy masking (PTZ dome) Step 2 Configure privacy masking. PTZ dome ● 1. Select the SN. 2. Adjust the live image to the proper location through PTZ, select the color, and then click Draw.
  • Page 76: Related Operations

    ◇ You can drag 4 rectangles max. ◇ Click Remove All to delete all the area boxes; select one box, and then click Delete or right-click to delete it. 2. Adjust the size of the rectangle to protect privacy. 3. Click Save. Privacy Masking (2) You can select the type of masking from Color Lump and Mosaic.
  • Page 77 Figure 4-55 Channel title Step 2 Select the Enable checkbox, enter the channel title, and then select the text align. Click to expand the channel title, and you can expand 1 line at most. Step 3 Move the title box to the position that you want in the image. Step Click Save.
  • Page 78 Step 2 Select the Enable checkbox. Step 3 Select the Week Display checkbox. Step 4 Move the time box to the position that you want in the image. Step Click Save. 4.5.2.3.3 Configure Text Overlay You can enable this function if you need to display text in the video image. Text overlay and picture overlay cannot be enabled simultaneously.
  • Page 79 Step 2 Select the Enable checkbox, enter the text you need, and then select alignment. The text will be displayed in the video image. Click to expand the text overlay, and you can expand 9 lines at most. Step 3 Move the text box to the position that you want in the image.
  • Page 80 Step 3 Click Save. 4.5.2.3.5 Configure Picture Overlay You can enable this function if you need to display picture information on the video image. Text overlay and picture overlay cannot work at the same time. Step 1 Select Setting > Camera > Video > Overlay > Picture Overlay. Figure 4-59 Picture overlay Step 2 Select the Enable checkbox, click Upload Picture, and then select the picture to be...
  • Page 81 Step 2 Select the Enable checkbox, and then select the text align. Click to expand the custom overlay, and you can expand 1 line at most. Step 3 Move the custom box to the position that you want in the image. Step Click Save.
  • Page 82 Step 2 Configure OSD information. Table 4-19 Description of OSD information Parameter Description Select Enable, and the preset name is displayed in the image when Preset the camera turns to the preset, and it will disappear 3 s later. Select Enable and the internal temperature of the current device is Temperature displayed.
  • Page 83 Step 2 Select the Enable checkbox, and then configure the counting method and alignment. Step 3 Move the counting box to the position that you want in the image. Step 4 Click Save. 4.5.2.3.9 Configuring Structured Statistics The image displays structured statistics. When the overlay function is enabled during intelligent rules configuration, this function is enabled simultaneously.
  • Page 84: Roi

    4.5.2.3.10 Configuring Face Statistics The image displays face statistics information. When the overlay function enabled during intelligent rules configuration, this function is enabled simultaneously. Step 1 Select Setting > Camera > Video > Overlay > Face Statistics. Figure 4-67 Face statistics Step 2 Select the Enable checkbox, and select text align.
  • Page 85: Path

    Step 2 Select the Enable checkbox, draw the area on the image, and then configure the image quality of ROI. ● You can draw four area boxes at most. ● The higher the image quality value is, the better the quality will be. ●...
  • Page 86: Audio

    Parameter Description The snapshot of live interface. The default path is Live Snapshot C:\Users\admin\WebDownload\LiveSnapsh The recorded video of live interface. Live Record The default path is C:\Users\admin\WebDownload\LiveRecord. The snapshot of playback interface. The default path is Playback Snapshot C:\Users\admin\WebDownload\PlaybackSna Admin in the path pshot.
  • Page 87 Step 2 Select the Enable checkbox in Main Stream or Sub Stream. For the camera with multiple channels, select the channel number. Please be mindful of local laws and regulations when enabling and recording audio. Step 3 Configure audio parameters. Table 4-21 Description of audio parameters Parameter Description...
  • Page 88: Configuring Alarm Audio

    4.5.3.2 Configuring Alarm Audio You can record or upload an event audio file. The audio file will be played when the event is triggered. ● Click to play the selected audio. ● Click to download the audio to local storage. Step 1 Select Setting >...
  • Page 89: Procedure

    Procedure Step 1 Select Setting > Network > TCP/IP. Figure 4-73 TCP/IP Step 2 Configure TCP/IP parameters. Table 4-22 Description of TCP/IP parameters Parameter Description Host Name Enter the host name, and the maximum length is 15 characters. Select the Ethernet card to be configured, and the default one Ethernet Card is Wired.
  • Page 90 IP Address When you select Static in Mode, enter the IP address and subnet mask as necessary. Subnet Mask Parameter Description ● IPv6 does not have subnet mask. Default Gateway ● The default gateway must be in the same network segment with the IP address.
  • Page 91: Port

    Step 3 Click Save. 4.6.2 Port This section allows the configuration of the port numbers and the maximum number of users (includes web, platform client, and mobile phone client) that can connect to the device simultaneously. Step 1 Select Setting > Network > Port. Figure 4-74 Port Step 2 Configure port parameters.
  • Page 92: Pppoe

    Table 4-23 Description of port parameters Parameter Description ● Real time streaming protocol port, the value is 554 by default. You can use software like VLC player to view the RTSP stream with a command. URL format example: rtsp://username:password@ip:port/cam/realmonitor?channel=1 &sub type=0 ●...
  • Page 93: Prerequisites

    Point-to-Point Protocol over Ethernet, a type of remote access protocol that the camera uses to connect to the internet by acquiring a WAN dynamic IP address. You will need to acquire the PPPoE username and password from the internet service provider, and then set up network connection through PPPoE. Prerequisites ●...
  • Page 94: Smtp (Email)

    ● You can register and log in to the ICDDNS website, to view and manage all the connected devices in your account. Figure 4-76 DDNS Step 2 Select Type, and configure the parameters as needed. Table 4-24 Description of DDNS parameters Parameter Description Type...
  • Page 95 Figure 4-77 SMTP (Email) Step 2 Configure SMTP (Email) parameters. Table 4-25 Description of SMTP (Email) parameters Parameter Description SMTP Server SMTP server address The port number of the Port SMTP server. For details, see Table 4-26. Username The account of SMTP server. Password The password of SMTP server.
  • Page 96: Upnp

    Table 4-26 Description of major mailbox configuration SMTP Authentication Mailbox Port Description server ● The authentication type cannot be None. ● The SMTP service in your smtp.gmail mailbox must be enabled. .com Google You may need to create an app password in your Google account to use as the password.
  • Page 97: Snmp

    Step 2 Select the Enable checkbox, and there are two mapping modes: Custom and Default. ● Select Custom, click to modify the external port as needed. Select Default, to finish mapping with an unoccupied port automatically, and you ● cannot modify port mapping Step 3 Click Save.
  • Page 98 Figure 4-80 SNMP (2) Step 2 Select SNMP version to enable SNMP. ● Select V1 to only process information of V1 version. ● Select V2 to only process information of V2 version. ● Select V3, (V1 and V2 will become unavailable.) You can configure user name, password and authentication type from your server.
  • Page 99: Result

    Set the read-only username accessing the device, it is public by default. Read-only Username You can enter number, letter, and underline to form the name. Set the read/write username access device, it is public by default. Read/Write Username You can enter number, letter, and underline to form the name.
  • Page 100: Multicast

    Step 1 Select Setting > Network > Bonjour. Figure 4-81 Bonjour Step 2 Select the Enable checkbox, and then configure server name. Step 3 Click Save. In the OS and clients that support Bonjour, follow the steps below to visit the network camera with the Safari browser.
  • Page 101: Qos

    The multicast port of corresponding stream: Main Stream: Port 40000; Sub Stream1: 40016; Sub Stream2: 40032, and all the range is 1025–65500. Step 3 Click Save. In the Live interface, select RTSP in Multicast to view the video image with multicast protocol.
  • Page 102: Access Platform

    Figure 4-84 QoS Step 2 Configure QoS parameters. Table 4-30 Description of QoS parameters Parameter Description Configure the priority of the data packets that used for network Realtime Monitor surveillance. 0 for the lowest and 63 the highest. Configure the priority of the data packets that used for configure Command or checking.
  • Page 103: Onvif

    ● If P2P is enabled and the status is Online, remote management on the device is supported. ● When P2P is enabled and the status is Offline, make sure the IPC is connected to a network and set it on DHCP. Step 2 Log in to mobile phone client and tap Device management.
  • Page 104 Using RTMP, you can access the third-party platforms (such as Ali and YouTube) to stream video live view. RTMP can only be configured with the admin account. ● RTMP supports the H.264, H.264 B and H.264H video formats, and the AAC audio format ●...
  • Page 105: Storage

    4.7 Storage This section introduces how to manage saved resources (such as recorded video) and storage space. The storage management helps to make efficient use of storage space. 4.7.1 Setting Storage Plan ● Setting record plan and record control to achieve all-time recording, recording in a specific period or alarm linked recording.
  • Page 106: Setting Destination

    Step 2 Select Record or Snapshot. Step 3 Select the days you need to set as holiday. Those days with yellow color indicates that they were set as holidays. If the holiday schedule setting takes priority over the general setting. Step 4 Click Save.
  • Page 107: Local

    Step 2 Select the storage method that you need for the recorded videos and snapshots of different types. Table 4-33 Description of path parameters Parameter Description Event Type Select from Scheduled, Motion Detection and Alarm. Local Save in the internal SD card. Save in the FTP server.
  • Page 108 Select FTP or SFPT from the drop-down list. SFTP is recommended to enhance network security. Step 3 Configure FTP parameters. Figure 4-93 FTP Figure 4-94 Picture name settings...
  • Page 109: Nas

    Table 4-34 Description of FTP parameters Parameter Description Server Address The IP address of the FTP server. Port The port number of the FTP server. Username The user name to log in to the FTP server. Password The password to log in to the FTP server. Remote Directory The destination path in the FTP server, it is shared by default.
  • Page 110: System

    Figure 4-95 NAS Step 2 Select the Enable checkbox to enable NAS function, and select NAS protocol type. ● NFS (Network File System): Enables computers in the same network to share files through TCP/IP. ● SMB (Server Message Block): Provides shared access for clients and the server. Step 3 Configure NAS parameters.
  • Page 111: Date & Time

    Step 2 Configure general parameters. Table 4-36 Description of general parameters Parameter Description The name of the device. Name Each device has its own unique name. Language Select system language. Video Standard Select video standard from PAL and NTSC. Select On or Off. This function is available on models with analog output.
  • Page 112 Step 2 Configure date and time parameters. Table 4-37 Description of date and time parameters Parameter Description Date Format Configure the date format. Time Format Configure the time format. You can select from 12-Hour or 24-Hour. Time Zone Configure the time zone that the camera is at. Configure system time.
  • Page 113: Account

    4.8.3 Account Manage all the users. You can add, delete, or modify users. Users include admin, added users and ONVIF users. Managing users and groups are only available for administrator users. ● The max length of the user or group name is 31 characters which consisted of number, letters, underline, dash, dot and @.
  • Page 114 Figure 4-100 Add user (restricted login)
  • Page 115 Step 3 Configure user parameters. Table 4-38 Description of user parameters (1) Parameter Description User’s unique identification. You cannot use existed Username user name. Password Enter password and confirm it again. The password must consist of 8 to 32 non-blank characters and contain at least two types of Confirm Password characters among upper case, lower case, number,...
  • Page 116: Related Operations

    users than advance users. Parameter Description Set the PC address that allows the defined user to log in to the camera and the validity period and time range. You can log in to web with the defined IP in the defined time range of validity period. ●...
  • Page 117 Figure 4-101 Change password through old password (login with non-admin account) ◇ Admin Account: Change the password through entering the admin password, and then the new password for the non-admin account to be changed. Figure 4-102 Change password through admin password (login with admin account) ●...
  • Page 118: Adding User Group

    4.8.3.2 Adding User Group You have two groups named admin and user by default, and you can add new group, delete added group or modify group authority and memo. Step 1 Select Setting > System > Account > Account > Group Name. Figure 4-103 Group name Step 2 Click Add Group.
  • Page 119 Table 4-39 Description of user group parameters Group Authority Admin User Functions Add, delete and User check user/user group. Live Real-time stream view. Playback Playback view. System time setting System and more. Version information, System Info system logs and more. Manual Control PTZ settings.
  • Page 120: Onvif User

    ● The function of the device correspond to the authority control respectively. Only user with specified authority can use corresponding function; the Admin group has all the authorities. Step 4 Click Save to finish configuration. The newly added group displays in the group name list. ●...
  • Page 121: Related Operations

    Step 3 Configure user parameters. Table 4-40 Description of user parameters Parameter Description Username User’s unique identification. You cannot use existed user name. Password Enter password and confirm it again. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower Confirm Password case, number, and special character (excluding ' "...
  • Page 122: Security

    Figure 4-107 Change password through old password (login with non-admin account) ◇ Admin Account: Change the password through entering the admin password, and then the new password for the non-admin account to be changed. Figure 4-108 Change password through admin password (login with admin account) ●...
  • Page 123: System Service

    4.8.4.1 System Service This section allows configuration of different services such as CGI ot ONVIF. Step 1 Select Setting > System > Safety > System Service. Figure 4-109 System service Step 2 Enable the system service according as necessary. Table 4-41 Description of system service parameters Function Description Enables SSH authentication.
  • Page 124: Https

    When enabled, the system will send a snapshot that was Mobile Push taken when alarm is triggered to your phone, this is enabled by default. Step 3 Click Save. 4.8.4.2 HTTPS This section allows you to create a certificate or upload an authenticated certificate, to log in via HTTPS with a web browser.
  • Page 125 ● For uploading the authenticated certificate, click Browse to select the certificate and certificate key, click Upload to upload them, and then skip to Step5. Step 3 Enter the required information and then click Create. The entered IP or Domain name must be the same as the IP or domain name of the device. Step 4 Click Install.
  • Page 126 Step 7 Click Open. Figure 4-114 Certificate information Step 8 Click Install Certificate.
  • Page 127 Step 9 Click Next. Figure 4-116 Certificate store Step 10 Select the storage location and click Next.
  • Page 128: Firewall

    Step 11 Click Finish and a dialog box showing The import was successful will pop up. Figure 4-118 Import succeeds 4.8.4.3 Firewall Configure Network Access, PING prohibited and Prevent Semijoin to enhance network and data security. ● Network Access: Set trusted list and restricted list to limit access. ◇...
  • Page 129 Step 2 Select Network Access from Rule Type list, and then select the Enable checkbox. ● Enable PING prohibited and Prevent Semijoin, and click Save. You do not need to configure parameters. ● Enable Network Access, and configure allowlist and blocklist. ◇...
  • Page 130: Peripheral

    you cannot select the Device All Ports checkbox. Device End Server ● Device start server port and Device end server port: Set Device Port start server port and device end server port, and the range is 1–65535. Step 4 Click OK, and the Firewall interface is displayed. Step 5 Click Save.
  • Page 131: Prerequisites

    For models with an external lighting equipment attached via serial cable. Prerequisites ● Connect an external lighting device using the RS-485 port. ● You have configured serial port parameters. For details, see "4.8.5.1 Serial Port Settings". Procedure Step 1 Select Setting > System > Peripheral > External Light. Figure 4-122 External light Step 2 Configure external light work mode.
  • Page 132: Wiper

    ● Time: When selecting Time in Auto Mode, click Setting to set the arming period. During the arming period, the external light is on. For details of arming period setting, see "5.1.1.1 Auto Mode Setting Period". ● Photoresister: When you select Photoresister in Auto Mode, the camera turns on or turns off the light automatically according to the built-in photoresister.
  • Page 133: Event

    Event This section explains intelligent event settings, including smart track, panoramic calibration, video detection, audio detection, smart plan, IVS, face detection, face recognition, people counting, heat map, video Metadata, alarm, and abnormality. 5.1 Setting Alarm Linkage 5.1.1 Alarm Linkage When an event is triggered, the IPC will trigger an alarm event such as record, send e-mail, or take a snapshot.
  • Page 134: Record Linkage

    Step 2 Set arming periods. Alarms will be triggered in the time period in green on the timeline. ● Method 1: Click and drag the left mouse button on the timeline. ● Method 2: Manually enter a time period. 1. Click Setting next to a day. 2.
  • Page 135 Step 2 Set the record plan. Green represents normal record plan (such as constant recording); yellow represents motion record plan (such as recording triggered by intelligent events); red represents alarm record plan (such as recording triggered by alarm-input). ● Method one: Select a record type, such as Normal, then click and drag the left mouse button to set the time period for normal record on the timeline.
  • Page 136: Snapshot Linkage

    Step 1 Select Setting > Storage > Record Control. Figure 5-5 Record control Step 2 Set parameters. Table 5-1 Description of record control parameters Parameter Description Pack Duration Constant recording files are limited to the pack duration value. For example, if set to 5, each video file with constant recording is 5 minutes each.
  • Page 137 5.1.1.3.1 Setting Snapshot Plan The snapshot plan determines when the snapshots will be active. Step 1 Select Setting > Storage > Schedule > Snapshot. Figure 5-7 Snapshot Step 2 Select snapshot type and set time period. Green represents normal snapshot plan (such as timing snapshot); yellow represents motion snapshot plan (such as snapshot triggered by intelligent events);...
  • Page 138: Relay-Out Linkage

    ◇ You can set 6 time periods per day. Step 3 Click Save. 5.1.1.3.2 Setting Snapshot Linkage When enabled, the IPC will take a snapshot when the event is triggered. Figure 5-9 Snapshot linkage 5.1.1.4 Relay-out Linkage When enabled, the IPC will take a trigger the alarm relay-out device when the event is triggered. The Alarm Delay value determines the amount of time the alarm out will continue to trigger after the event has ended.
  • Page 139: Audio Linkage

    For Active Deterrence cameras with red and blue alarm light, only Flicker is supported in Mode. ● Duration: After setting warning light duration, the warning light is turned off after an extended time of period after an alarm. It is 5 seconds–30 seconds. ●...
  • Page 140: Subscribing Alarm Information

    The device has alarm input An event is triggered port and external alarm External Alarm when there the alarm function is enabled. For input has been triggered. details, see "5.18 Setting Relay-in". An event is triggered when Illegal access detection is the number of consecutive Illegal Access enabled.
  • Page 141: Setting Panoramic Splicing

    Step 2 Select Alarm Type as needed. ● Select Prompt. This will allow the subscribed events to be displayed when triggered. ◇ If a subscribed alarm event is triggered and the Alarm interface is not displayed, is displayed on the Alarm tab and the alarm information is recorded automatically.
  • Page 142: Setting Video Detection

    Setting Video Detection The camera will trigger an event if there are considerable pixellation changes on the video such as moving objects or if the camera as been tampered and moved from its original position. Setting Motion Detection The camera will trigger an event if there is pixellation change due to movement. ●...
  • Page 143: Setting Video Tampering

    2) Select a color and set the region name. Select the desired area for Motion Detection in the image and set Sensitivity and Threshold. If an area is transparent, motion will not trigger in that area. ● Select a color on to set different detection parameters for each region.
  • Page 144: Setting Scene Changing

    Figure 5-24 Video tampering Step 2 Set arming periods and alarm linkage action such as E-mail or Snapshot. For details, see "5.1.1 Alarm Linkage". Step 4 Click Save. Setting Scene Changing The IPC will trigger an event when the video image changes from the current scene to another one, such an unauthorized movement of the camera position.
  • Page 145: Setting Intelligent Motion Detection

    Step 2 Set arming periods and alarm linkage action. For details, see "5.1.1 Alarm Linkage". Step 3 Click Save. Setting Intelligent Motion Detection The IPC will trigger an event if a human, non-motorized vehicle, or motor vehicle appear on the image.
  • Page 146: Setting Audio Detection

    Step 2 Select the Enable checkbox to enable the Intelligent Motion detection function. Step 3 Set effective object and sensitivity. ● Effective object: Includes Human and Motor vehicle. When you select Human, the camera will detect human and non-motorized vehicle. ●...
  • Page 147: Setting Smart Plan

    and Threshold. When the IPC detects that the sound intensity exceeds the set threshold, an event is triggered. ◇ It is easier to trigger the alarm with higher sensitivity or smaller threshold. Set a high threshold for noisy environment. ◇ The red line in the waveform indicates audio detection is triggered, and the green indicates no audio detection.
  • Page 148: Schedule

    Click an icon to enable it, and the selected smart function will be highlighted. Click it again to cancel the selection. If the icon on the interface, click it to enable the smart function switch. ● Enable smart plan through Add Plan. Select a preset point (if using a PTZ) from the Add Plan the interface.
  • Page 149 Figure 5-29 Add plan (1) Figure 5-30 Add plan (2) Step 4 Configure the time settings. 1. Click Settings. 2. Configure the period. In the Smart Plan list, select the type as needed. 3. Click Save. 4. (Optional) Repeat step 1-4 to add more plans for different time periods. ●...
  • Page 150: Setting Ivs

    Step 5 Click Save. Schedule function is only available on single-channel cameras. Setting IVS Below are steps you can take to ensure your IVS rule setup is optimized: ● Reduce the complexity of the target area as much as possible. ●...
  • Page 151 Table 5-7 Description of IVS functions Rule Description Applicable Scene When the target crosses Scenes with sparse targets and no the virtual tripwire from Tripwire occlusion among targets. the defined motion direction, the IPC will trigger an event. Intrusion When the target enters, leaves, or appears in the detection area, IPC will trigger an event...
  • Page 152 Scenes with sparse targets and without obvious and frequent light change. A simple scene in the detection area is recommended ● Missed alarms may increase in the scenes with dense targets, frequent occlusion, When an object is and people staying. Missing object removed from the ●...
  • Page 153 Navigate to the Rule Config interface of the PTZ camera. The PTZ lock function is automatically enabled. The locking time is 180 seconds. You can only manually control the PTZ during the locking time. Click Unlock at lower left corner of the Rule Config interface to manually unlock the PTZ, and click Lock again to relock the PTZ.
  • Page 154 Rule Description Tripwire Draw a detection line. Intrusion Draw a detection area. ● When abandoned object is utilized, an event will be Abandoned object triggered if a pedestrian or vehicle loiters. Set the target Missing object size to filter pedestrian and vehicles accordingly. Fast moving ●...
  • Page 155: Setting Crowd Map

    Parameter Description The time in which the PTZ will track an object. Before enabling this function, you need to enable or disable the Alarm Track function under Smart Track as necessary. ● When the Channel is set as 1, disable Alarm Track under Track Time Smart Track.
  • Page 156: Global Configuration

    Global Configuration Set the calibration parameters of panoramic cameras. Calibration Purpose Determine corresponding relationship between 2D image captured by the camera and 3D actual object according to one horizontal ruler and three vertical rulers calibrated by the user and the corresponding actual distance.
  • Page 157: Rule Configuration

    Rule Configuration When the number of people or the crowd density in the detection area exceeds the configured threshold, the system performs event and alarm linkages. Prerequisites ● Select Setting > Event > Smart Plan, and enable Crowd Map. ● Select Setting > Event > Crowd Map > Global Setup to configure the crowd map. Procedure Step 1 Select Setting >...
  • Page 158 system will create an event. The default alarm people amount is 20. Step 4 Set parameters. Table 5-10 Description of crowd map parameters Parameter Description Global Select the Global checkbox and set the crowd density threshold. The system detects crowd distribution in the global area.
  • Page 159: Result

    Result Step 5 Set arming periods and alarm linkage actions. For details, see "5.1.1 Alarm Linkage" Step 6 Click Save. Click on the Live interface to view the crowd map. Figure 5-37 Crowd map (1) Double-click the rendering area at the lower-right corner in the image to view crowd distribution in the area.
  • Page 160: Setting Face Detection

    Setting Face Detection When a face is recognized in the detection area, the system performs event linkage. Prerequisites Select Setting > Event > Smart Plan, and then enable Face Recognition. Procedure Step 1 Select Setting > Face Recognition > Face Detection. Figure 5-40 Face detection Step 2 Select the Enable checkbox to enable the face detection function.
  • Page 161 Detect Region. Step 5 (Optional) Select Max Size or Min Size, click Draw Target at the right side of Target filter, and then draw the target in the image. Step 6 Set parameters. Table 5-11 Description of face detection parameters Parameter Description Toggles statistics in OSD.
  • Page 162: Setting Face Database

    ● Snapshot Angle Filter: Set snapshot angle to be filtered during the face detection. ● Snapshot Sensitivity: Set snapshot sensitivity during face Advanced detection. It is easier to detect faces with higher sensitivity. ● Optimized Time: Set a time period to capture the clearest picture after the camera detects a face.
  • Page 163 Step 2 Click Add Face Database. Figure 5-42 Add face database Step 3 Set the name of the face database. Step 4 Click OK. Figure 5-43 Face database successfully added Step 5 Set parameters.
  • Page 164: Adding Face Picture

    Table 5-12 Description of face database parameters Parameter Description Enables the face database. The captured face images will be compared to the armed face database. Deploy The detected face matches the face database only when the similarity between the detected face and the face feature in Similarity Threshold face database reaches the configured similarity threshold.
  • Page 165 Figure 5-45 Registration (1) Step 4 Click Upload Picture, select a face picture to be uploaded, and then click Open. You can manually select the area for a face. After uploading picture, box select a face and click OK. When there are multiple faces in a photo, select the target face and click OK to save face picture.
  • Page 166 one click. Figure 5-47 Task list (manually add) If adding user fails, the error code will be displayed on the interface. For details, see Table 5-13. For face modeling operation, see "5.10.2.4 Face Modeling". Table 5-13 Description of error code Parameter Error Description...
  • Page 167 5.10.2.2.2 Batch Importing This function allows for importing face pictures in batches. Select this method if you need to add a large number of face pictures to the database. Before importing pictures in batches, it is recommended to name the face image files in the following format: "Name#SGender#BDateofBirth#NRegion#TCredentialsType#MIDNo.jpg"...
  • Page 168: Managing Face Picture

    Step 4 Click to select file path. Figure 5-49 Batch import Step 5 Click Browse. The interface shows import process. After finishing the import, the interface is displayed as in Figure 5-50. Figure 5-50 Imported successfully 5.10.2.3 Managing Face Picture Add face pictures to face database, and then manage and maintain face pictures to ensure correct information.
  • Page 169: Face Modeling

    Step 3 Modify face information as necessary. Click Add to task list. Step 4 Click , and then click OK. 5.10.2.3.2 Deleting Face Picture Navigate to the Face Database Config interface, and delete a face picture in the database. ● Single delete: Select the row where the face picture or the personnel information is located, and click to delete the face picture.
  • Page 170 Step 2 Click next to the face database to be set. Figure 5-52 Face database configuration Step 3 Start modeling. ● Selective modeling. If there are many face pictures in the face database, you can set search criteria to select the pictures that need to be modeled.
  • Page 171: Setting Face Recognition Alarm Linkage

    Click Search, and the face details are displayed. Click to view the face picture in list format. See Figure 5-55. Click to view the face picture in thumbnail format. See Figure 5-56. ◇ When the modeling status is Valid in the list or is displayed on the left corner of the thumbnail, it means the modeling succeeded.
  • Page 172: Setting Face Detection

    Figure 5-57 Alarm (face recognition) Step 2 Select a face database and an alarm rule. ● Face recognition succeeded: When the detected face matches that in the face database, the device links alarm out. ● Face recognition failed: When the detected face fails to match that in the face database, the device links alarm out.
  • Page 173 Step 2 Select the Enable checkbox to enable the face detection function. Step 3 (Optional) Click Draw next to Detect Region to draw a face detection area in the image. Step 4 (Optional) Click Draw next to Exclude Region, and then draw an area that will exclude face detection in the image.
  • Page 174 ● Customized face height: Sets face height in snapshot; Snap Face Image enter a value for the height. It ranges from 1–2. ● Customized body height: Set body height: in snapshot; enter a value for the body height. It ranges from 0–4. If the value is 0,only the face image will be cut out.
  • Page 175: Setting People Counting

    Setting People Counting Configures the People counting function (including enter, leave and strand number in the area), calibration configuration, queuing number, and view the people counting data report. People Counting This function counts the people entering and leaving the detection area. When the number of counted people exceeds the configured value, the system will create an event.
  • Page 176 Step 2 Click to add the people counting function. Step 3 Double-click the name to modify the rule name. Select People Counting or In Area No. ● People Counting: The IPC counts the people entering and leaving the detection area. When the number of counted number of people who enter, leave, or stay in the area exceeds the configured value, the system will create an event.
  • Page 177: Result

    Set Enter No., Leave No., and Stranded No. The alarm is triggered Flowrate Alarm when the configured value is reached. Regional People Set the number of people in the people counting region. When the Number Statistics people count reaches the threshold or the stay duration exceeds Alarm the configured value, the alarm is triggered.
  • Page 178 Step 2 Click to add the queuing function. You can add a maximum of 4 rules. Step 3 Double-click the name to modify the rule name. Click Draw Rule to draw a detection area in the image, and right-click to complete the drawing. Step 4 Set parameters.
  • Page 179: Result

    Result Step 5 Set arming periods and alarm linkage actions. For details, see "5.1.1 Alarm Linkage". Step 6 Click Save. To view alarm information on the Alarm tab, subscribe relevant alarm event. For details, see "5.1.2 Subscribing Alarm". You can view the queuing result on the Live interface. The queuing number and the stranding time of each target are displayed on the interface.
  • Page 180: Setting Heat Map

    Select the period for the report. ● When selecting People Counting, you can view daily report, monthly report and annual report. Time Range ● When selecting In Area No., you can view daily report and monthly report. Begin Time The begin time and the end time of people counting. End Time In and out directions of people counting report.
  • Page 181: Viewing Heat Map Report

    Step 2 Select the Enable checkbox to enable the heat map function. Step 3 Set the arming period. For details, see "5.1.1.1 Setting Period". Step 4 Click Save. Viewing Heat Map Report The system can export heat map data as a report. Step 1 Select Setting >...
  • Page 182: Setting Video Metadata

    Setting Video Metadata This function extracts metadata information from people, non-motor vehicles (such as motorcycles and scooters) and motor vehicles in the captured video, and displays the relevant attributes on the live interface. Scene Configuration Set the detection scenes and rules, including rules for people, non-motor vehicles, and motor vehicles. Select Setting >...
  • Page 183: Result

    Parameter Description Counts the number of people in the detection area. People Flow Statistics Counts the number of motor vehicles in the detection Traffic Flow Stat area. Select the Capture Whole Vehicle checkbox to capture whole vehicle. The snapshot is saved in the preset path Capture whole vehicle for monitoring snapshots.
  • Page 184: Setting Picture Information

    The plate no. and attributes of motor vehicle are displayed at the right side, and ● pictures of people and non-motor vehicles and their attributes at the bottom. Click the picture in the display area, and the detailed information is displayed. ●...
  • Page 185: Setting Relay-In

    Setting Relay-in When an alarm is triggered at the alarm-in port, the system performs alarm linkage. Functions may vary with different models. Relay-in (1) Step 1 Select Setting > Event > Alarm. Figure 5-92 Alarm linkage Step 2 Select the Enable checkbox to enable the alarm linkage function.
  • Page 186: Relay-In

    Step 3 Select a relay-in port and a sensor type. ● Sensor Type: NO or NC. ● Anti-Dither: Only record one alarm event during the anti-dither period. Step 4 Set arming periods and alarm linkage action. For details, see "5.1.1 Alarm Linkage". Step 5 Click Save.
  • Page 187: Setting Abnormality

    Setting Abnormality Abnormality includes SD card, network, illegal access, voltage detection, and security exception. Only the device with SD card has the abnormality functions, including No SD Card, SD Card Error, and Capacity Warning. Setting SD Card In case of SD card abnormality, the system performs alarm linkage. The event types include No SD Card, Capacity Warning, and SD Card Error.
  • Page 188: Setting Illegal Access

    Figure 5-96 Network Step 2 Select the event type from the Event Type drop-down list, and then select the Enable checkbox to enable the network detection function. Step 3 Set alarm linkage actions. For details, see "5.1.1 Alarm Linkage". Step 4 Click Save.
  • Page 189: Setting Voltage Detection

    Step 3 Set Login Error. If you consecutively enter a wrong password more than the set value, the account will be locked. Step 4 Set alarm linkage actions. For details, see "5.1.1 Alarm Linkage". Step 5 Click Save. Setting Voltage Detection This function performs alarm linkage when the camera detects if the input voltage is higher than or lower than the rated value of the device.
  • Page 190 Figure 5-99 Security exception Step 3 Select the event to be monitored as needed. Table 5-25 Security exception description Parameter Description Monitors the programs that run in the trusted environment to detect whether there are programs Trusted environment detected running without trusted signature. program Select to prevent the programs with trojan and virus.
  • Page 191: Setting Disarming

    Monitors if the number of users (web, platform or mobile phone client) exceeds the max number of users that can connect to the device simultaneously. Session connection exceeds limit Configure the Max Connection in Setting > Network > Port. Step 4 Set alarm linkage actions.
  • Page 192: Requirements

    6.1 Requirements To ensure the camera system operates reliably, take the following maintenance steps: ● Check the surveillance images regularly (to spot if a camera has been moved or is not operating). ● Clear regularly user and user group information that is not being used. ●...
  • Page 193: Prerequisites

    Prerequisites You have enabled password reset service by setting up security questions when first initializing the camera. Procedure Step 1 Open a web browser, enter the IP address of the device in the address bar and press Enter. Figure 6-2 Login Step 2 Click Forgot password? Figure 6-3 Prompt...
  • Page 194: Backup And Default

    6.4 Backup and Default 6.4.1 Import/Export ● Export the system configuration file to back up the system configuration. ● Import system configuration file to make quick configuration or recover system configuration. Step 1 Select Setting > System > Import/Export. Figure 6-6 Import/Export Step 2 Click Import or Export.
  • Page 195: Upgrade

    This function will restore the device to default configuration or factory setting. Select Setting > System > Default. ● Click Default, and then all the configurations except the IP address and accounts are reset to default. ● Click Factory Default, and all the configurations are reset to factory settings. Figure 6-7 Default 6.5 Upgrade Upgrading to the latest firmware can help with security improvements, compatibility with newer...
  • Page 196: Version

    6.6.1 Version You can view device information such as hardware, system version, and web version. Select Setting > Information > Version to view the version information. 6.6.2 Log You can view and backup logs. Step 1 Select Setting > Information > Log. Figure 6-9 Log Step 2 Configure Start Time and End Time, and then select the log type.
  • Page 197: Remote Log

    ● Click a specific log to can view the detailed information in Detailed Information area. ● Click Backup to back up all found logs to local PC. Figure 6-10 Log (details) 6.6.3 Remote Log Configure the remote log to acquire the log by accessing a set address. Step 1 Select Setting >...
  • Page 198: Online User

    6.6.4 Online User View all the current users logging in to web. Select Setting > Information > Online User. Figure 6-12 Online user Appendix 1 Cybersecurity Recommendations Cybersecurity is something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 199 We suggest that you perform physical protection to equipment, especially storage devices. For example, place the equipment in a special computer room and cabinet, and implement access control permission and key management to prevent unauthorized personnel from carrying out physical contacts such as damaging hardware, unauthorized connection of removable equipment (such as USB flash disk, serial port), etc.
  • Page 200: More Information

    Please visit the IC Realtime official website security emergency response center for security announcements and the latest security recommendations. IC Realtime LLC Address: 3050 N Andrews Ave Ext Pompano Beach, FL USA 33064 Website: www.icrealtime.com.com Email: tech@ICRealtime.com Tel: 1(866) 997-9009...

Table of Contents