User's Manual Foreword General This manual introduces the installation, functions and operations of the intelligent video surveillance server (hereinafter referred to as "the Device" or "IVSS"). Read carefully before using the device, and keep the manual safe for future reference. Models Number of Models...
Page 3
User's Manual Version Revision Content Release Time ● Added the talk function on the view window. October 2021 V5.0.0 ● Added the audio and light alarm. ● Deleted the strategy of shortcut RAID creation. ● Added 1:1 face recognition. ● Added one-click disarming. ●...
Page 4
User's Manual Privacy Protection Notice As the device user or data controller, you might collect the personal data of others such as their face, fingerprints, and license plate number. You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures which include but are not limited: Providing clear and visible identification to inform people of the existence of the surveillance area and provide required contact information.
Page 5
User's Manual Icon/Button Description Check the box to select one menu item, means selected. Drop-down box. Click the box to view the drop-down menu. Enable icon. ● : Disabled. ● : Enabled ● : The function cannot be enabled. ● : The function cannot be disabled.
User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, comply with the guidelines when using it, and keep the manual safe for future reference. Operation Requirements ●...
Page 7
User's Manual any injuries or damages caused by the use of a nonstandard power adapter. ● Do not place the Device in a place exposed to sunlight or near heat sources. ● Keep the Device away from dampness, dust, and soot. ●...
Page 8
User's Manual Storage Requirements Store the Device under allowed humidity and temperature conditions.
User's Manual Table of Contents Foreword .........................................I Important Safeguards and Warnings .............................. V 1 Overview ........................................1 1.1 Introduction ....................................1 1.2 Login Mode ....................................1 2 The Grand Tour ...................................... 2 2.1 8-HDD Series ....................................2 2.1.1 Front Panel ..................................2 2.1.2 Rear Panel ....................................
Page 11
User's Manual 6.3.2 Face Recognition by Camera ........................... 73 6.3.2.1 Configuration Procedure ..........................73 6.3.2.2 Enabling AI Plan ..............................73 6.3.2.3 Configuring Remote Face Database ......................73 6.3.2.3.1 Creating Face Database for Remote Devices ................73 6.3.2.3.2 Adding Face Images for Remote Devices..................75 6.3.2.4 Configuring Face Recognition (by Camera) ..................
Page 12
User's Manual 6.3.4.7 Face Search ................................. 101 6.3.5 Face Detection by Device + Face Recognition by Device ..............101 6.3.5.1 Configuration Procedure ..........................101 6.3.5.2 Configuring Face Detection (by Device) ....................101 6.3.5.3 Configuring Device Face Database ......................103 6.3.5.4 Configuring Face Recognition (by Device) ..................103 6.3.5.5 Live View ................................
Page 13
User's Manual 6.6 IVS ......................................... 129 6.6.1 Enabling AI Plan ................................129 6.6.2 Configuring IVS................................129 6.6.2.1 Switching IVS Model............................129 6.6.2.2 Global Configuration ............................. 129 6.6.2.3 Rule Configuration ............................130 6.6.3 Live View of IVS ................................134 6.6.3.1 Setting AI Display ............................134 6.6.3.2 Live View ................................
Page 14
User's Manual 6.8.6.1 Searching by Property ........................... 153 6.8.6.2 Searching by Database ..........................155 6.9 Crowd Distribution Map ..............................156 6.9.1 Enabling AI Plan ................................157 6.9.2 Configuring Crowd Distribution Map ....................... 157 6.9.2.1 Global Configuration ............................. 157 6.9.2.2 Rule Configuration ............................157 6.9.3 Live View of Crowd Distribution .........................
Page 15
User's Manual 7.1.3.1 PTZ Menu Settings ............................186 7.1.3.2 Configuring PTZ Functions ......................... 187 7.1.3.2.1 Setting a Preset ............................187 7.1.3.2.2 Setting a Cruise ............................189 7.1.3.2.3 Setting a Pattern ............................ 189 7.1.3.2.4 Setting Linear Scanning ........................190 7.1.3.2.5 Enabling Auxiliary Functions......................191 7.2 Recorded Files..................................
Page 16
User's Manual 8.2 Device Management................................218 8.2.1 Viewing Device Information ..........................219 8.2.2 Remote Device ................................221 8.2.2.1 Viewing Remote Devices..........................221 8.2.2.2 Changing IP Address ............................221 8.2.2.2.1 Modifying IP of Unconnected Devices ..................222 8.2.2.2.2 Modifying IP of Connected Devices ..................... 223 8.2.2.3 Configuring Remote Devices ........................
Page 18
User's Manual 8.5.1.2.1 Creating RAID ............................276 8.5.1.2.2 Creating Hot Spare HDD ........................280 8.5.1.3 Network Hard Disk ............................282 8.5.1.3.1 iSCSI Application ........................... 282 8.5.1.3.2 iSCSI Management ..........................283 8.5.2 Video Recording ................................285 8.5.2.1 Storage Mode ..............................285 8.5.2.1.1 Setting Disk Group ..........................
Page 19
User's Manual 8.7.3.1.2 Changing Password of Other User ....................306 8.7.3.2 Resetting Password ............................307 8.7.3.2.1 Leaving Email Address and Security Questions ..............307 8.7.3.2.2 Resetting Password on Local Interface ..................307 8.7.3.2.3 Resetting Password on the Web ....................310 8.7.4 ONVIF ....................................
User's Manual 1 Overview 1.1 Introduction As an intelligent video surveillance server (hereinafter referred to as IVSS or the Device), IVSS delivers not only the basic video surveillance functions, but also a bunch of advanced AI features including face recognition, perimeter protection, video metadata and ANPR, providing AI-based all-in-one surveillance solution for customers.
User's Manual 2 The Grand Tour This section introduces front panel, rear panel, port function and button function, indicator light status, and so on. 2.1 8-HDD Series 2.1.1 Front Panel Figure 2-1 Front panel Table 2-1 Front panel description Button/Port Description Boot up or shut down device.
Page 24
User's Manual Button/Port Description AUDIO IN Audio input port. AUDIO OUT Audio output port. High definition audio and video signal output port. The port outputs the uncompressed high definition video HDMI and multi-channel audio data to the connected display with HDMI port. The HDMI ports are different source output.
User's Manual 2.1.3 Dimensions Figure 2-5 Dimension (mm [inch]) 2.2 12-HDD Series 2.2.1 Front Panel Figure 2-6 Front panel Table 2-3 Front panel description Button/Port Description Boot up or shut down device. Power indicator light status is as follows: ● When device is off (indicator light is off), press the button Power for a short period to boot up device.
User's Manual Button/Port Description RESET button Click to restart the device. Displays power status. ● Amber light is on: The device has properly connected to Power indicator the power source. light ● The indicator light is off: The device has not connected to the power source.
Page 27
User's Manual Figure 2-9 IVSS7012-M rear panel Figure 2-10 IVSS7112 rear panel (the single-power series) Figure 2-11 IVSS7112 rear panel (the redundant series) Table 2-4 Rear panel description Name Description Power input port Inputs 100–240 VAC power. Displays AI module status. ●...
Page 28
User's Manual Name Description SAS extension port. It can connect to the SAS extension SAS port controller. AUDIO OUT Audio output port. Positioning indicator light. It is controlled by the ID button on the front panel. ● The blue light is on, device is positioning now. ID indicator light ●...
User's Manual 2.2.3 Dimensions Figure 2-12 Dimensions (mm [inch]) 2.3 16-HDD Series ● The Device has an embedded display on select models. ● The Device has power redundancy on select models. 2.3.1 Front Panel Figure 2-13 Front panel with LCD...
Page 30
User's Manual Figure 2-14 Front panel without LCD Table 2-5 Front panel description Button/Port Description Once the front panel lock is secure, it can prevent HDD from Front panel lock being stolen or removed by mistake. Unlock the front panel lock and remove the front panel, you can view 16 HDD slots.
Page 32
User's Manual Table 2-6 IVSS7016 rear panel description Name Description Power input port Inputs 100–240 VAC power. Displays AI module status. ● The yellow light flashes: AI module is running properly. ● The yellow light is on: AI module is AI module indicator light malfunctioning.
Page 33
User's Manual Name Description 8 groups of alarm output ports (NO1 C1–NO8 C8). They output alarm signal to the alarm device. Please make sure there is power to the external alarm device. Alarm Output ● NO: Alarm output port of Normally Open type. ●...
Page 34
User's Manual Name Description High definition audio and video signal output port. The port outputs the uncompressed high HDMI port definition video and multi-channel audio data to the connected display with HDMI port. The two HDMI ports are different source output. AUDIO IN Audio input port.
User's Manual 2.4 24-HDD Series 2.4.1 Front Panel Figure 2-23 Front panel with LCD Figure 2-24 Front panel without LCD Table 2-8 Front panel description Button/Port Description Boot up or shut down device. The power on-off button has the indicator light. It can display device- running status.
User's Manual Button/Port Description Once the front panel lock is secure, it can prevent HDD from being stolen or removed by mistake. Front panel lock Unlock the front panel lock and remove the front panel, you can view 16 HDD slots. After you remove the front panel, you can see there are 24 HDDs.
Page 38
User's Manual Figure 2-27 IVSS7024-M rear panel (single power) Figure 2-28 IVSS7024-M rear panel (redundant power) Table 2-9 Rear panel description (1) Button/Port Description Power input port Inputs 100–240 VAC power. 16 groups (1–16) alarm input ports. They are corresponding to ALARM 1–ALARM 16. The alarm becomes valid in low level.
Page 39
User's Manual Button/Port Description 10/100/1000Mbps self-adaptive Ethernet port. Network port Connects to the network cable. SAS extension port. It can connect to the SAS SAS port extension controller. Connects to external devices such as USB storage USB port device, keyboard and mouse. SATA peripheral port.
Page 40
User's Manual Figure 2-30 IVSS7124-M rear panel (redundant power) Table 2-10 Rear panel description (2) Name Description Power input port Inputs 100V-127V/200-240V AC power. 16 groups (1–16) alarm input ports. They are corresponding to ALARM 1–ALARM 16. The alarm becomes valid in low level. ●...
User's Manual Name Description AUDIO OUT Audio output port High definition audio and video signal output port. The port outputs the uncompressed high definition HDMI port video and multi-channel audio data to the connected display with HDMI port. The two HDMI ports are different source output.
User's Manual 3 Hardware Installation This section introduces HDD installation, cable connection, and so on. Some series product is heavy. It needs several persons to carry or move, in order to prevent person injury. 3.1 Installation Flow Figure 3-1 Installation flow 3.2 Unpacking the Box When you receive the Device, please check against the following checking list.
User's Manual 3.3 HDD Installation The section introduces the detailed operations to install HDD. Different models support different HDD numbers. 3.3.1 8-HDD Series Step 1 Remove the 2 screws on the rear panel. Figure 3-2 Remove screws Step 2 Remove the chassis cover in the direction indicated by the arrow. Figure 3-3 Remove chassis cover Step 3 Remove the screws on the edge of the HDD holder, and then remove the holder.
Page 45
User's Manual Figure 3-4 Remove HDD holder Step 4 Align the 4 screw holes on the HDD to the 4 screw holes on the HDD holder, and then tighten the screws. Figure 3-5 Install HDD (1) Step 5 Repeat step 4 to install the other HDDs on the holder. Figure 3-6 Install HDD (2) Step 6 Repeat step 5 to install HDDs on the other holder.
User's Manual Figure 3-7 Install HDD (3) Step 7 Align the left and right 2 pairs of holes of the two holders to the corresponding holes on the chassis, place the holders on the chassis, and then tighten the screws on the edge of the holders.
User's Manual the HDD slot. Installing HDD ② Place one side of the HDD ① Press the button on the ③ Insert the HDD box into closely along the upper side front panel of IVSS, open the of the box and press down to the HDD slot, press it to the handle, and then pull out the push the HDD down to the...
User's Manual ③ Lock the screws on the back of the HDD box. Insert the box into the HDD slot, push it to the bottom, and ① Press the button on the then close the handle. ② Put the HDD into the box front panel of IVSS, open the along the direction shown in handle, and then pull out the...
User's Manual 3.4.1 Alarm Connection Before using the alarm, connect alarm input or alarm output device. 3.4.1.1 Connection The section introduces alarm connection of the Device. Alarm Input ● Both NO and NC are supported. ● The alarm input port supports alarm signal from ground and device of 12-24 V voltage. ●...
User's Manual Figure 3-12 16/24-HDD series (2) Table 3-2 Alarm port Icon Description They are corresponding to ALARM 1–ALARM 16. The alarm 1–16 becomes valid in low level. NO1 C1–NO8 C8 Eight groups of normally open linkage output (on-off value). +12V Constant power output, 500mA current.
User's Manual Figure 3-13 NC alarm input connection 3.4.1.4 Alarm Output ● The alarm output is on-off output (Normally Open Contact), and there should be external power supply to alarm output device. ● RS-485 A line and B line: connecting the A line and B line on the PTZ decoder. ●...
User's Manual Model HRB1-S-DC5V Operating ambient temperature -30 °C to +70 °C 3.4.2 Connection Diagram The following steps are to connect 16-HDD series device. See the actual product for detailed information. The following figure is for reference only. The actual product shall prevail. ●...
User's Manual 4 Starting the Device ● Before starting the device, make sure that the input voltage shall match the device power requirement. ● To ensure stable operation of the device and prolong service life of HDD, provide stable voltage with less ripple interference by reference to international standard.
User's Manual 5 Initial Settings When using the Device for the first time, initialize the device, and set basic information and functions first. 5.1 Initializing Device If it is your first time to use the device after purchasing or after restoring factory defaults, set a login password of admin (system default user).
Page 56
User's Manual Table 5-1 Time parameters description Parameters Description Time Zone The time zone of the Device. Set system date and time manually or by synchronizing with NTP server time. ● Manual Setting: Select date and time from the calendar. ●...
User's Manual Figure 5-3 Password protection Step 7 Set password protection information. You can use the email you input here or answer the security questions to reset admin password. See "8.7.3.2 Resetting Password" for detailed information. ● Click to cancel the email or security questions. ●...
Page 58
User's Manual Step 1 On the completion page of initialization, click Enter Quick Setting. Figure 5-4 IP setting Step 2 Configure IP address. 1) Click of the corresponding NIC. Figure 5-5 Edit Ethernet network 2) Set parameters. Table 5-4 TCP/IP parameters description Parameters Description Speed...
User's Manual Parameters Description When there is a DHCP server on the network, check Use Dynamic Use dynamic IP address IP Address, system can allocate a dynamic IP address to the device. There is no need to set IP address manually. Check Use Static IP Address, and then set static IP address, subnet Use static IP address mask and gateway to set a static IP address for the device.
User's Manual Figure 5-6 P2P access Step 2 Click to enable P2P function. The function is disabled by default. Step 3 Click Finish to save settings. After the configuration, you can register a device to the APP to view remote video, playback record file, and so on.
Page 61
User's Manual Step 3 Log in to PCAPP. 1) There are two ways to enter PCAPP. ● On the installation completion page, click Run. ● Double-click the shortcut icon on the PC desktop. ● When PC theme is not Aero, the system will remind you to switch the theme. To ensure video smoothness, switch your PC to Areo theme.
User's Manual Figure 5-9 Live view Table 5-5 Home page description Name Description Displays enabled application icon. Point to the app and then click to close the app. Task column The live function is enabled by default and cannot be closed.
User's Manual 5.3.2.1 Preparation Ensure that the Device is connected with display, mouse and keyboard. For cable connection, see "3.4 Cable Connection". 5.3.2.2 Operation Steps Step 1 Turn on the Device. Step 2 Enter username and password. ● Click Login. For your device safety, change the admin password regularly and keep it well.
User's Manual 5.4 Configuring Remote Device Register remote device to the system. You can view the live video from the remote device, change remote device settings, and so on. 5.4.1 Initializing Remote Device After you initialize the remote device, you can change remote device login password and IP address. Remote devices can be connected to the Device only after being initialized.
Page 65
User's Manual Using current device password and password protection information is enabled by default. Keep it enabled so as to automatically use current device admin password and email without manual configuration. Go to Step 6 if you keep it enabled. 1) To manually configure password, click to disable Using current device password and password protection information.
Page 66
User's Manual Figure 5-12 Password protection 4) Set an email address. Enter an email address. You can use the email address here to reset password in case you forgot password in the future. Step 6 Click Next button. Figure 5-13 Modify IP...
Page 67
User's Manual Step 7 Set camera IP address. ● When there is DHCP server in the network, select DHCP, and the remote device gets dynamic IP address automatically. It is unnecessary to enter IP address, subnet mask and gateway. ● Select Static, and then enter static IP address, subnet mask, default gateway and incremental value.
User's Manual 5.4.2 Adding Remote Device Device supports smart add, manual add and template add. Table 5-7 Add mode Add Mode Description Search the remote devices on the same network and then filter to register. For details, see "5.4.2.1 Smart Add". Smart Add It is useful if you do not know the exact IP address.
Page 69
User's Manual Figure 5-15 Smart add Step 3 Click Start Search. To set search conditions, you can click Figure 5-16 Search results...
Page 70
User's Manual Table 5-8 Result description Parameters Description Click Start Search to start searching remote device. Now it becomes Stop Start Search Search button. Click Stop Search button to stop searching remote device. Password Enter the username and password of the selected device for adding it. Select uninitialized remote device and then click Initialize button to Initialize initialize remote device.
User's Manual Step 5 Click Add. ● Click remote device IP address, username, password, SN, channel and port to change corresponding information. ● If system fails to add the remote device, see the reason on the Status column to change the remote device information and then click Retry to try to add again.
Page 72
User's Manual Figure 5-19 Remote device setting Table 5-9 Parameters of adding device Parameters Description Select a channel number for the remote device on IVSS. Channel No. If you select Auto Allocation, IVSS will provide a channel number automatically. Displays the connection protocol of the remote device. Default protocol of Manufacturer the system is Private.
User's Manual Parameters Description Enter the port number of the remote device. Port When the Manufacturer is Private, you need to configure this parameter. Select the channel number for the remote device. 1. Select a link type. Remote CH No. 2.
User's Manual Step 2 On the Device List page, click Add. The Add Device page is displayed. Step 3 Click RTSP. Step 4 Enter RTSP address as required. RTSP address format is rtsp://<username>:<password>@<IP address >:<port>/cam/realmonitor?channel=1&subtype=0. ● Username: Username of the remote device. ●...
Page 75
User's Manual 2) Fill in and save the template file. Step 4 Import template file. 1) Click Browse to select the file that you have filled in. 2) Select an import mode and then click Import. ● Overwrite: The system removes the added remote devices before importing new devices.
Page 76
User's Manual Figure 5-23 Confirm Step 6 Click Continue to add or Finish. ● Click Continue to add, device goes back to Smart add page to add more remote device. ● Click Finish to complete adding remote device process. Device displays Device manager page to view the newly added remote device information.
User's Manual 6 AI Operations In addition to the basic video monitoring functions, the Device can also provide a number of AI functions including face recognition, people counting, video metadata, ANPR, and IVS (behavior detections such as fence-crossing, intrusion, loitering, crowd gathering, parking and more.). This chapter introduces how to configure the AI functions respectively.
User's Manual Table 6-1 AI Events by Device or Camera AI Event AI by Camera AI by Device Face Detection Face Recognition People Counting Video Metadata Crowd Distribution Call Alarm Smoking Alarm Vehicle Recognition Plate Comparison 6.2 Face Detection System triggers alarms when human faces are detected within the detection zone. 6.2.1 Enabling AI Plan To use AI by camera, you need to enable AI plan first.
Page 79
User's Manual Step 2 Select a remote device in the device tree on the left. Step 3 Select AI Plan > Face Detection. Figure 6-2 AI by camera Figure 6-3 AI by device Step 4 Click AI by camera or AI by device, and then click to enable face detection.
User's Manual Step 5 Set detection area on the video (yellow area). Figure 6-4 Area ● Click or white dot on detect region frame, and drag to adjust its range. ● Click to set the minimum size or maximum size of the face detection area. System triggers an alarm once the size of detected target is between the maximum size and the minimum size.
User's Manual ● Click Sync from AI-Dis., obtain global smart detection display rule of IVSS. See "8.4.2.4.2 Setting AI Display" for detailed information. ● Click Apply to all windows to copy current configuration to other window(s). Figure 6-5 Face Step 2 Enable Show Tracking Boxby clicking After it is enabled, when the system detects face or human, the window will display corresponding rule box.
User's Manual Figure 6-6 Live Point to a features panel, and the operation icons are displayed. Figure 6-7 Face database ● Click to add this image to the face database. See "6.8.3.2.3 Adding from Detection Results" for detailed information. ● Click or double-click the detected image, so the system starts to play back the recorded videos (about 10s) at the time of snapshot.
User's Manual Figure 6-8 Detection image On the FACE TOTAL page, the following operations are available. ● Point to a piece of face record, click , and then you can quickly add this image to the face database. See "6.3.3.4.3 Adding Face Image" for detailed information. ●...
Page 84
User's Manual Figure 6-9 Search by property Step 2 Select a remote device, and then set Event Type to be Face Detection. In the Event Type drop-down list, if you select All, the search results will include both face detection records and face recognition records. Step 3 Set face property and time.
Page 85
User's Manual Figure 6-10 Search results Point to a piece of record, and then the following icons are displayed. Figure 6-11 Icons Table 6-2 Description Icon Operation ● Select one by one: Click the panel or move the mouse pointer onto the panel, and then click to select the panel.
User's Manual Icon Operation ● Export one by one: Click to export picture, video and video player. For details, see "6.2.4.3 Exporting Face Records". ● Export in batches: Select the panel and click to export picture, video or excel. For details, see "6.2.4.3 Exporting Face Records". After setting alarm linkage snapshot, during exporting images, the system exports detected images and panoramic images at the time of snapshot.
Page 87
User's Manual Figure 6-12 Choose picture from face database 2) Specify search conditions. 3) Click Query. 4) Select a face image. 5) Drag to set similarity. 6) Click OK to upload face image. ● Upload the image from the passerby database. 1) Click and select Passerby Database.
Page 88
User's Manual Figure 6-13 By image ● When the uploaded image is half-length photo or full-body photo, the system automatically selects the frame of the uploaded image and only the face area will be retained. ● When there are multiple faces in the uploaded images, the system automatically identifies the faces in the images and uploads multiple face images according to the number of faces recognized.
User's Manual Function ● : displays the number of images found. ● : Displays the number of face images found. ● : Displays the number of human body images found. The numbers are displayed only when related search is enabled. ●...
User's Manual Figure 6-16 Search results Table 6-4 Search results page description Function ● Displays the selected search images. The number at the lower-right corner of the image represents the number of records found. ● Click the image to view detailed results. ●...
User's Manual Step 7 Click Query. Figure 6-18 Search results Table 6-5 Search results page description Function ● Displays the selected search images. The number at the lower-right corner of the image represents the number of records found. ● Click the image to view detailed results. ●...
Page 92
User's Manual Figure 6-19 Search results of face records ● Export in batches Export more than one record. Support specifying file formats. Step 1 Select more than one record. To export all records, select the checkbox of All. Step 2 Click , and then select file formats.
User's Manual 6.3 Face Recognition The system compares captured face with the face database and works out the similarity. When the similarity reaches the threshold as you have defined, an alarm will be triggered. 6.3.1 Configuration Modes Face recognition can be configured in the following modes: ●...
Page 94
User's Manual Step 4 Enter Face database name. Figure 6-22 Create a face database for remote devices Step 5 Click Register Face or Save and close. ● To add faces into the database, click Register Face. For details, see #d1415e7a1026. ●...
User's Manual ◇ In batches: Hover over the face database, and then select the database by clicking . After selecting multiple databases, click ◇ Delete all: Select All, and then click ● To clear a face database, select the face database, and then click Clear. 6.3.2.3.2 Adding Face Images for Remote Devices Add face images to the created face database in the way of manual add, batch import, or bin import.
Page 96
User's Manual faces in the images and uploads multiple face images according to the number of faces recognized. Select face image you want to upload. Blue frame means that it is selected. ● Click Cancel to cancel all checked face images. 5.
Page 97
User's Manual Item Description Enter number in the format of yyyymmdd or yyyy-mm-dd. For example, Birthday 20181123. Region Enter the corresponding abbreviation of the region. Province Enter the corresponding spelling or English name of the province. ID type Enter the corresponding number. 1. ID card, 2. Passport, 3. Others. ID number Fill in the corresponding ID number.
User's Manual Bin Import To import face images from another device into the current device, you can import a bin file of face images exported from that device. 1. On the LIVE page, click , and then select FILE > Face Management > Face Database > Remote.
User's Manual Figure 6-28 Face recognition (AI by Camera) Step 4 Click AI by Camera, and then click Step 5 Click Deployment Time to select schedule from the drop-down list. After setting arm period, system triggers actions when there is a motion detection alarm in the specified period.
User's Manual Figure 6-29 Face Step 3 Enable Show Tracking Box. After it is enabled, when the system detects face or human, the window will display corresponding rule box. Step 4 Enable features panel. 1) Click next to Features Panel, to enable the function. When the panel is enabled, the snapshots of detected faces are displayed on the live view.
User's Manual ◇ During face detection, features panel displays detection time, the detected face image and feature. ◇ During face recognition, features panel displays detection time, the detected face image, face image in the database, comparison result and database name. After setting stranger mode, when the detected face image mismatches face image in the database, features panel will have Stranger tag.
User's Manual Point to a piece of face record, click , and then you can save the record, which contains video and picture. ● Search for similar target. Point to a piece of face record, click , and then the system automatically searches for the similar faces in the defined period.
Page 103
User's Manual Step 2 Select a remote device, and then set Event Type to be Face Recognition. Step 3 Select face mode and set face property and time. Step 4 Click Query. Figure 6-33 Search results Point to a piece of record, and then the following icons are displayed. Figure 6-34 Icons Table 6-7 Description Icon...
User's Manual Icon Operation Click to quickly add the image to the face database. See "6.3.3.4.3 Adding Face Image" for detailed information. ● Export one by one: Click to export picture, video and video player. For details, see "6.2.4.3 Exporting Face Records". ●...
User's Manual Figure 6-35 1:1 face recognition Step 2 Click and then upload two images to be compared. Step 3 Click Start. The comparison result will be displayed. 6.3.3 Face Detection by Camera + Face Recognition by Device 6.3.3.1 Configuration Procedure Figure 6-36 Configure face detection (AI by camera) Figure 6-37 Configure face recognition (AI by device) 6.3.3.2 Enabling AI Plan...
Page 106
User's Manual Figure 6-38 AI by camera Step 4 Click AI by camera , and then click to enable face detection. AI by camera supports Face Enhancefunction. After enabling Face Enhancefunction, system displays enhanced human face zone on the surveillance window. Step 5 Set detection area on the video (yellow area).
User's Manual System triggers an alarm once the size of detected target is between the maximum size and the minimum size. Step 6 Click Deployment Time to select a schedule from the drop-down list. System triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Deployment Time drop-down list.
User's Manual ● Number: The proportion of the number of added face images in the face databases and passerby databases to the allowed face images in total. ● Space: The proportion of the space occupied by the face databases and passerby databases to the allowed space in total.
User's Manual ● The Path is the one where the exported bin file is saved. ● The Password is the one used when the file is being imported. If the bin file being exported is larger than 4 GB, the file is divided into multiple parts, with the first named as device name_database name_exporting time_part1.zip.
Page 110
User's Manual Figure 6-43 Face register ● When the uploaded image is half-length photo or full-body photo, the system automatically selects the frame of the uploaded image and only the face area will be retained. ● When there are multiple faces in the uploaded images, the system automatically identifies the faces in the images and uploads multiple face images according to the number of faces recognized.
Page 111
User's Manual Figure 6-44 Face information 7. Click Save and continue to add or OK. ● Click Save and Continue to add to save current face image information and add another human face image. ● Click OK to save current face image information and complete registration. After adding the image, at the lower-left corner of the human face image, there is an icon .
Page 112
User's Manual 1. On LIVE page, click , and then select FILE > Face Management > Face Database > Local. 2. Double-click a face database. 3. Click Batch Import. 4. Import face image. ● Upload a file: Click , select multiple face images, and then click Open. You can select multiple face images by holding Shift and then clicking the first and the last face images, or holding Ctrl and then click the images one by one.
Page 113
User's Manual ● A bin file is divided into multiple parts when being exported if it is larger than 4 GB. When importing the file parts, you just need to select any one part of the file, and then all parts are imported.
User's Manual Figure 6-47 Face register 2. Select a face database, and fill in person information according to your actual situation. 3. Click OK to save the configuration. 6.3.3.4.4 Creating Passerby Database If you configure an alarm to link passerby database, when the detected face is not in the face database, system automatically captures the face image, and then save it to the passerby database.
Page 115
User's Manual databases to the allowed space in total. Step 3 Enter the passerby database information, and then click OK. Figure 6-49 Create a passerby database Table 6-9 Parameters of creating passerby database Parameter Description Name Enter the name of the database. Configure how many face images the database can store.
User's Manual Parameter Description When the captured face image is found in the passerby database, and the quality is higher than that of the one in the database, the system replaces the face image in the database. A successful comparison of the captured image against the database will not be reported.
User's Manual ● During the abstracting process, some intelligent functions (such as human face recognition, search human face and so on.) are null. These functions become normal after the abstracting process is completed. Step 1 On the LIVE page, click , and then select FILE >...
User's Manual Figure 6-52 Copy to 3. Select a face database. ● You can select more than one face databases. ● You can also select a face database by entering the database name in the Face database name box and clicking Query. ●...
Page 119
User's Manual Figure 6-53 Face recognition (AI by Device) Step 4 Click AI by Device, and then click Step 5 Click Deployment Time to select schedule from the drop-down list. After setting arm period, system triggers actions when there is a motion detection alarm in the specified period.
User's Manual Figure 6-55 Face database configuration 2) Click to enable association with the database and then set parameters. Table 6-11 Configuration description Parameters Description Delete the associated database. It is to set human face similarity. System compares the human face with the image on the face Similarity database.
User's Manual Figure 6-57 Configure face recognition (AI by device) 6.3.4.2 Enabling AI Plan To use AI by camera, you need to enable the corresponding AI plan first. For details, see "6.2.1 Enabling AI Plan". 6.3.4.3 Configuring Face Recognition (by Camera) Configure face recognition rules.
Page 122
User's Manual Step 1 Click or click on the configuration page, and then select EVENT. Step 2 Select a remote device in the device tree on the left. Step 3 Select AI Plan > Face Detection. Figure 6-60 AI by device Step 4 Click AI by device, and then click to enable face detection.
User's Manual ● Click to set the minimum size or maximum size of the face detection area. System triggers an alarm once the size of detected target is between the maximum size and the minimum size. Step 6 Click Deployment Time to select a schedule from the drop-down list. System triggers corresponding alarm actions only during the alarm deployment period.
User's Manual Figure 6-63 Configure video metadata (AI by device) Figure 6-64 Configure face recognition (AI by device) 6.3.6.2 Enabling AI Plan Enable AI plan when AI by camera is used. See "6.2.1 Enabling AI Plan" to enable video metadata function.
User's Manual 6.4.2 Configuring People Counting The system counts the number of people in and out of the detection area. When the number of entry, exit or stay is larger or smaller than the threshold, an alarm is triggered. Step 1 Click , click , and then select EVENT.
User's Manual Step 8 Click Save. 6.4.3 Configuring In Area No. The system counts the number of people in and out of the detection area. When the number of entry or exit is larger or smaller than the threshold or when the dwell time of any person in the area is greater than the threshold, an alarm is triggered.
User's Manual Parameters Description Max Detect Height 0–300. Min Detect Height 0–300. Step 6 Select a schedule in the Deployment Time drop-down list. Alarms are triggered only within the scheduled time. Step 7 Click Actions to set alarm linkage actions. Step 8 Click Save.
User's Manual Parameters Description 1. Click to enable the alarm. 2. Set people number threshold. ● If you select and then enter a number, alarm is triggered when the detected number is larger or equal to Area People Counting Alarm the number that you entered.
User's Manual Figure 6-68 Live view The live video displays real-time people number in the region, and the region frame flashes red once there is an alarm. The queue-detection live view also shows head frames and the dwell time of each person.
Page 130
User's Manual Figure 6-69 People counting report Figure 6-70 Average strand time report Figure 6-71 Queuing people counting report ● Click to select the areas of which you need to view the reports. The ordinate of the report displays different areas in different colors, showing the number of people in different areas or the average strand time.
User's Manual ● Point to the report, and then the report shows the details at that time point. ● Drag the gray scroll bar under the ordinate to view the statistics for different time periods. ● Click to view the line chart. ●...
Page 132
User's Manual Figure 6-72 AI by camera Figure 6-73 AI by device Step 4 Click next to Feature Vector Extraction to enable feature extraction, and then the Device can extract features of human, vehicles and non-motor vehicles and display them on the live view.
User's Manual ● Drag to adjust the detection area. ● Click to draw an excluded area which will not be detected. The Device does not detect target within the excluded area. ● Click to set the minimum size or maximum size of the face detection area. System triggers an alarm once the size of detected target is between the maximum size and the minimum size.
User's Manual Create view(s) before setting filtering conditions. To create a view, see "7.1.1 View Management". Step 1 Select a view from LIVE > View > View Group. Step 2 Click at the lower side of the LIVE page, and then select Face, Human, Vehicle or Non- Motor Vehicle.
User's Manual ● Rule box is displayed in real-time in the video image. Different detection targets correspond to different colors of rule box. ● Features panels are displayed on the right side of the video image. Figure 6-76 Live Point to the features panel, and the icons are displayed. Figure 6-77 Icons (vehicle detection) ●...
User's Manual Figure 6-78 Human detection ● Point to the snapshot, and then click to add the face image to face database. For details, see "6.3.3.4.3 Adding Face Image". This function is available when face image is captured. ● Point to the snapshot, and then click or double-click the picture to play back the video record (10 s before and after the snapshot).
User's Manual Figure 6-80 Non-motor vehicle detection ● Point to the detected information, and then click , or double-click detected picture to play back the video record (10 s before and after the snapshot). ● Point to the detected information, and then click to export the video record to specified saving path.
Page 138
User's Manual Figure 6-81 Search by human Step 2 Select one or more devices, and then select Human Detection as Event Type. Step 3 Select alarm type. Step 4 Set human properties and time period. Click to set the color. means more than one color.
Page 139
User's Manual Figure 6-82 Search result Related Operations Click one displayed panel, and the icons are displayed. Figure 6-83 Icons (1) Figure 6-84 Icons (2)
User's Manual Table 6-15 Operation Icon Operation ● Select one by one: Click to select the panel. means the panel is selected. ● Select in batches: Select All to select all the panels on the page. Click or double-click the panel to play back the video record (10 s before and after the snapshot).
Page 141
User's Manual Figure 6-85 Search by image 2. Click the Device tab. 3. Upload a picture. Upload from PC or USB storage device. Up to 50 pictures can be uploaded. Up to 10 pictures can be uploaded at a once. a.
Page 142
User's Manual Figure 6-86 Related search 5. Set similarity. It is 80% by default. 6. Select a remote device in the device list, and then set search time. 7. Click Query. Searching Task List Upload a human body picture search the analyzed video for similar targets. For details about AI tasks, see "7.4.1 AI Analysis Task".
Page 143
User's Manual Figure 6-87 Task list 3. Upload a human body picture. For details, see step 3 in "6.2.4.2.1 Searching Devices". 4. Click to enable related search. If related search is enabled, the system searches for both face detection results and human detection results.
Page 144
User's Manual Figure 6-88 Related search 5. Set similarity. It is 80% by default. 6. Select a task to be searched. 7. Click Query. Managing Search Results Figure 6-89 Search results Table 6-16 Search results page description Function ● Displays the selected search images. The number at the lower-right corner of the image represents the number of records found.
User's Manual Function Select the panel and click to export picture, video or excel. For details, see "6.2.4.3 Exporting Face Records". Filter the search results according to properties. ● : Sort the records by time. ● : Sort the records by similarity. Displays the face panels, including face image, feature property and similarity.
Page 146
User's Manual The search results are displayed. If license plate is detected, both the scenario and the license plate will be displayed. Figure 6-91 Search result Click one displayed panel, and the icons are displayed. Figure 6-92 Icons Table 6-17 Operation Icon Operation ●...
User's Manual Icon Operation ● Export one by one: Click to export picture, video and video player. For details, see "6.2.4.3 Exporting Face Records". ● Export in batches: Select the panel and click to export picture, video or excel. For details, see "6.2.4.3 Exporting Face Records". After setting alarm linkage snapshot, during exporting images, the system exports detected images and panoramic images at the time of snapshot.
Page 148
User's Manual Step 7 Click Query. Figure 6-94 Search results Figure 6-95 Icons Table 6-18 Operation Icon Operation ● Select one by one: Click to select the panel. means the panel is selected. ● Select in batches: Select All to select all the panels on the page. Click or double-click the panel to play back the video record (10 s before and after the snapshot).
User's Manual 6.6 IVS The IVS feature includes a number of behavior detections such as fence-crossing, intrusion, tripwire, parking, crowd gathering, missing object, abandoned object, and loitering. You can configure alarm notifications of those intelligent detections. This section introduces how to configure the intelligent detections. Some device models only support some IVS functions by device.
User's Manual Step 3 Select AI Application > IVS > AI By Camera > Global Config. Figure 6-97 Global config Step 4 Configure anti-disturbance and sensitivity settings. ● Click to enable anti-disturbance function. ● Drag to adjust sensitivity. Step 5 Calibrate horizontal and vertical scales.
Page 151
User's Manual Functions Description Scene When the target enters, leaves, or appears in the detection area, an Intrusion alarm is triggered, and the system performs configured alarm linkages. When an object is abandoned in Scenes with sparse targets and without the detection area over the obvious and frequent light change.
Page 152
User's Manual Figure 6-98 AI by camera Figure 6-99 AI by device Step 4 Set tripwire rules. 1) Click Add Rule, and then select Tripwire. 2) Click to enable detection rule. Click to delete detection rule. 3) Click to edit the tripwire line. ●...
Page 153
User's Manual Figure 6-100 Configure tripwire detection rules 4) Click to set minimum size or maximum size of detection target. System triggers an alarm once the detected target size is between the maximum size and the minimum size. Step 5 Configure AI recognition and sensitivity.
User's Manual 6.6.3 Live View of IVS On the LIVE page, view real-time IVS results. 6.6.3.1 Setting AI Display Set the display rules of detection results. Make sure that view is created before setting AI display. To create view, see "7.1.1 View Management".
Page 155
User's Manual Figure 6-103 Vehicle Figure 6-104 Non-motor vehicle Step 3 Configure feature panel. 1) Click next to Features Panel to enable feature panel. 2) A features panel is displayed on the right side of the video when a target that meets the conditions is detected.
User's Manual Step 4 Click OK. 6.6.3.2 Live View Go to the LIVE page, enable view, and then the Device displays view video. ● When a target triggers cross line or cross region rule, the line or region frame in the view flickers in red.
User's Manual Figure 6-107 Vehicle total ● Point to a picture and click , or double-click the picture, so the system starts playing back video (10 s before and after the snapshot moment). ● Point to a picture and click to export video and picture.
User's Manual Table 6-20 More operations Name Operation ● Select one by one: Move the mouse pointer onto the panel. Click Select a panel to select the panel. means it is selected. ● Click ALL to select all the panels. Click the panel, and click or double-click the panel.
User's Manual Figure 6-109 Vehicle recognition Step 4 Click the Deployment Time drop-down list to select schedule. IVSS links alarm event when alarm is triggered within the defined schedule. ● Click View Schedule to view detailed schedule settings. ● If the schedule is not added or the added schedule does not meet actual needs, click Add Schedule.
User's Manual Figure 6-110 Motor vehicle Step 3 Click next to Show Tracking Box to enable tracking box function. A tracking box is displayed in the video image when target meeting detection rule is detected. Step 4 Set features panel. 1) Click next to Features Panel to enable features panel function.
User's Manual Figure 6-111 Live Point to the features panel, and the operation icons are displayed. ● Click to add license plate information to the plate database. For details, see "6.8.3.2.3 Adding from Detection Results". ● Click or double-click the vehicle image to play back the video image (10 s before and after the snapshot).
User's Manual 6.7.4 Searching for Detection Information Set event type and vehicle properties, and then search for vehicle detection information. For details, see "6.5.4.2 Vehicle Search". 6.8 ANPR The system detects number plates using video metadata or vehicle recognition, and then compares the detected number plates with the ones in the database.
Page 163
User's Manual Figure 6-114 Register vehicle info ● Click Save and close to create database without editing its information. The newly-created database can be viewed on the Vehicle Database page. Related Operations After creating a database, you can modify the database name, register plate information, arm the database, and delete the database.
User's Manual 6.8.3.2 Registering Vehicle Information Add vehicle information to the created database. You can add vehicles one by one, in batches or directly add from the detection results. 6.8.3.2.1 Manual Add Step 1 On the LIVE page, click , and then select FILE > Vehicle Management > Vehicle Database.
User's Manual Parameters Description Plate Color Click to select the color of vehicle plate. Click , and you can select the vehicle type. Blue means already Type selected. Figure 6-117 Vehicle type Step 5 Click Save and continue to add or OK. ●...
Page 166
User's Manual Figure 6-118 Batch import Step 4 Acquire and fill in the template file. 1) Click Download Template to download the template to local PC or USB storage device. The saving path might vary when operating on client or local interface. ●...
User's Manual Figure 6-119 Vehicle information 6.8.3.2.3 Adding from Detection Results Add plate information from vehicle recognition or detection results to the database. Step 1 On the LIVE page, select the vehicle information to be added. ● Click , move the mouse pointer to the information panel, and then click ●...
User's Manual 6.8.3.3.1 Editing Vehicle Information Step 1 Point to the database, and then click Step 2 Modify vehicle information according to actual needs. Step 3 Click OK. 6.8.3.3.2 Copying Vehicle Information Copy the vehicle information in a database to another database. You can only copy and apply the vehicle information to a database of the same type.
User's Manual 6.8.3.3.3 Deleting Vehicle Information ● Delete one by one: Point to the database, and then click at the upper right corner to delete the database. ● Delete in batch ◇ Point to the database, and then click at the upper left corner to select the database. Select multiple databases in this way, and then click to delete selected databases.
User's Manual Figure 6-122 Associate vehicle without database Step 7 Link database. Repeat the following steps to link multiple databases. 1) Click Associate Vehicle Database, and select the database to be linked. Figure 6-123 Database linkage Table 6-23 Database linkage parameters Parameters Description AI Alarm Rule...
User's Manual Step 2 Click , and then select Vehicle tab. Figure 6-124 Vehicle Step 3 Click next to Show Tracking Box to enable tracking box function. A tracking box is displayed in the video image when target meeting detection rule is detected.
User's Manual Figure 6-125 Live Point to the features panel, and the operation icons are displayed. Figure 6-126 Icons ● Click to add license plate information to the plate database. For details, see "6.8.3.2.3 Adding from Detection Results". ● Click or double-click the vehicle image to play back the video image (10 s before and after the snapshot).
User's Manual database. For details, see "6.8.3.2.3 Adding from Detection Results". ● Point to the information panel, and then click or double-click the picture to play back the video image (10 s before and after the snapshot). ● Point to the information panel, and then click to export the video and picture to specified saving path.
Page 174
User's Manual Figure 6-128 Search by property Step 3 Select Plate Comparison as the Event Type. Step 4 Set vehicle properties and time period. Step 5 Click to set the color. means more than one color. Step 6 Click Query. The search result is displayed.
User's Manual Figure 6-130 Icons Table 6-24 Operations Icon Operation ● Select one by one: Point to the panel, and then click at the upper right side to select the panel. means the panel is selected. ● Select in batches: Select All to select all the panels on the page. Point to the panel, and then click or double-click the panel to play back the video record (10 s before and after the snapshot).
User's Manual Figure 6-131 Search by vehicle database Step 3 Select the database to be searched. Step 4 Click Query. Step 5 The search result is displayed. If license plate is detected, both the scenario and the license plate will be displayed. Click one displayed panel, and the icons are displayed.
User's Manual 6.9.1 Enabling AI Plan Enable the corresponding AI plan before using AI by camera functions. For details, see "6.2.1 Enabling AI Plan". 6.9.2 Configuring Crowd Distribution Map Set crowd distribution alarm rules. 6.9.2.1 Global Configuration Draw lines on the image to determine the geographical scale of the image. Step 1 Click or click...
User's Manual ● Set regional detection rules. 1) Click Add Rule. Figure 6-133 Add Rules 2) Drag to adjust the size. 3) Configure alarm threshold. Alarm is triggered when the detected people number reaches the threshold. ● Set global alarm. 1) Click , and then drag to adjust the size of the yellow area.
User's Manual Figure 6-134 Live view of crowd distribution ● Right-click on the live video, and then select Crowd Distribution Map > PIP. A blue section is displayed, and it shows the crowd distribution status inside the current view. ● Right-click on the live video, and then select Crowd Distribution Map > Global to switch to the distribution view.
User's Manual Figure 6-135 Configure call alarm Step 5 Click and drag to adjust the size of the detection area (yellow area). Step 6 Set Sensitivity and Min Duration. ● Sensitivity: The higher the Sensitivity is, the easier the call action is detected. ●...
User's Manual Figure 6-136 Live view of call alarm 6.10.4 Call Alarm Search Search for videos or images of call alarm. Step 1 On the LIVE page, click , and then click Search.
User's Manual Figure 6-137 Search Step 2 Select one or more devices. Step 3 Set search parameters. ● Record 1) Select Thermal as record type. 2) Select Call Detection as detection type. 3) Select a stream type. 4) Set time period. ●...
User's Manual smoking detection rules for the visible light channel of a thermal camera. Smoking alarm is only available with AI by Camera. 6.11.1 Enabling AI Plan Enable the corresponding AI plan before using AI by camera functions. For details, see "6.2.1 Enabling AI Plan".
User's Manual You can select an existing schedule from the Deployment Time drop-down list. You can also add a new schedule. For details, see "8.8.4 Schedule". Step 7 Click Action to set alarm action. See "8.4.1 Alarm Actions" for detailed information. Step 8 Click Save.
User's Manual 7 General Operations This chapter introduces general operations such as live view, playback, alarm, AI functions, and IVS. 7.1 Live and Monitor After you have logged in, the LIVE page is displayed. Point to the middle of video window and the left column. is displayed.
User's Manual Figure 7-2 Live (2) Table 7-1 Live page description Description View zone. Displays the created view and view group. See "7.1.1 View Management" for detailed information. Resource pool. Displays the added remote device list. PTZ zone. It is to control the PTZ. See "7.1.3 PTZ" for detailed information. Smart preview icons.
User's Manual Figure 7-3 View 7.1.1.1 View Group View group is a group of views. The view group allows you to categorize and manage view. It is easy for you to search and find the view. Create view or view group under the View. ●...
User's Manual Figure 7-4 Create view group Step 2 Set view group name. ● The view group name ranges from 1 to 64 characters. It can contain English letters, numbers and special characters. ● View group is to classify or category different view groups. We recommend the view group name shall be easy to recognize.
User's Manual Figure 7-5 Rename Table 7-2 View group Name Operation ● Select a view group and then click . Set view group name and click any spare panel. Rename view group ● Right-click view group and select Rename. Set view group name and click any spare panel.
Page 190
User's Manual Step 1 Follow the steps listed below to create view. ● Select a view group and then click , select Add view. ● Right-click a view group, select Add view. Figure 7-6 Edit view (1) Step 2 Double-click a remote device in resource pool, or drag the remote device to the right panel.
Page 191
User's Manual Figure 7-7 Edit view (2) Step 3 Set view name. The view name ranges from 1 to 64 characters. It can contain English letters, number and special character. Step 4 Click OK to save the configuration. Device pops up a prompt of Successfully operated. Related Operations After creating view, view can be edited, enabled, renamed or deleted.
User's Manual Name Operation ● Delete: Select a view and then click , or right-click view and then select Delete. Delete view ● Batch delete: Click , select views you want to delete and then click Figure 7-8 Menu 7.1.1.2.2 Editing View In edit view mode, you can perform the following functions: ●...
User's Manual Figure 7-9 Edit view Step 2 Edit view as you require. ● Add remote device: Double-click remote device in the resource pool, or drag the remote device to the free layout grid on the right panel. ● Delete remote device: Point to window on the right, and click at the top right corner.
Page 194
User's Manual Figure 7-10 View window When enabling the view, you can change video position, zoom video window. ● When adjusting view window position, drag the view window to the layout grid of the green background color. You cannot drag the view window to the grid of red background color. ●...
User's Manual Name Description In the resource pool, double-click the remote device or drag the remote device to the right panel, you can add remote device to current view. Drag the remote device to the view window to replace the original remote device.
Page 196
User's Manual Figure 7-12 View window Table 7-5 Window task column Name Description Click to start recording manually. Now the icon becomes . Click to stop recording. System stops recording according to the instant record length settings if you do not click again to stop.
User's Manual Name Description Click to snapshot. At different interfaces, snapshot storage path varies. ● Local ◇ When USB storage device is connected, snapshots are saved in USB storage device. ◇ Snapshot Otherwise, the snapshots are saved in the device. Query or export the snapshots by playback control.
User's Manual Table 7-6 Shortcut menu Parameters Description Set current window stream. It includes main stream/sub stream 1/sub Stream stream 2. Digital Zoom Set digital zoom. Zoom in one part of live image to view details. Bit Rate Displays real-time bit rate on the window or not. Set video window scale.
User's Manual ● Select a zone you want to zoom in on the video window again, system zooms in the zone at the larger rate. ● Right-click and then select Digital Zoom > OFF, it is to cancel zoom in effect. The video restores original effect.
Page 200
User's Manual Figure 7-16 Fisheye dewarp Step 1 Right-click on the live video, and then select Fisheye Dewarp. Step 2 Select an installation method. ● Click to select ceiling mount. ● Click to select wall mount. ● Click to select ground mount. Step 3 Select a display mode.
User's Manual 7.1.1.3.6 Smart Tracking Track targets manually or automatically. This function is only available on the multi-sensor panoramic camera + PTZ camera. Make sure that the linked tracking function has been enabled. Step 1 Right-click on the live video, and then select Smart Tracking > ON. Figure 7-17 Smart tracking Step 2 Select the tracking method.
User's Manual Figure 7-18 Thermal 7.1.1.3.8 Talk The Talk function enables voice interaction between the Device and remote devices, improving the efficiency in handling emergency events. Step 1 Log in to PCAPP. Step 2 Open a view on the Live page. Figure 7-19 Talk Step 3 Click...
User's Manual 7.1.2 Resources Pool The resource pool displays the added remote device list. The system automatically divides into groups according to device type. Figure 7-20 Resources pool Table 7-8 Resources pool description Operation Description Input key words at , device displays the corresponding remote devices.
User's Manual Operation Description ● Point to the remote device name, you can view remote device IP address and port number. ● On the device list, click one remote device and then press Ctrl, click other remote device, you can select several remote devices at the same time.
Page 205
User's Manual Figure 7-21 PTZ Table 7-9 PTZ Icons Icons Description Press and hold on , and drag it up and down. It is to set PTZ speed. The higher the value is, the faster the PTZ speed is. Control PTZ movement in the following ways. ●...
User's Manual Icons Description Click to enter the PTZ menu mode. For details, see "7.1.3.1 PTZ Menu Settings". Zoom. Click to adjust lens zoom rate of the remote device. Focus. Click to adjust lens focus of the remote device. Iris. Click it to adjust iris size of the remote device. Click to use windshield wiper, light, IR and linear scan, auxiliary commands.
User's Manual Figure 7-22 PTZ menu Table 7-10 PTZ menu description Parameters Description Set remote device image parameters involving picture, exposure, Camera backlight, WB, day and night, focus and zoom, defog, and default. Set remote device PTZ functions such as preset, cruise, scan, pattern, rotation, and PTZ restart.
Page 208
User's Manual Procedure Step 1 Log in to PCAPP. Step 2 Select a PTZ camera from the views. Step 3 On the PTZ panel, click Figure 7-23 Call a preset Step 4 Click the direction icons to rotate the camera to a specific position. Step 5 Click , enter the name of the new preset, and then click...
User's Manual 7.1.3.2.2 Setting a Cruise A cruise is a sequential set of presets. After you call a cruise, the PTZ camera automatically rotates to the presets one by one at the pre-defined interval. Procedure Step 1 Log in to PCAPP. Step 2 Select a PTZ camera from the views.
User's Manual Step 2 Select a PTZ camera from the views. Step 3 On the PTZ panel, click Step 4 To start recording a pattern, double-click on a pattern name, click Start Record, perform a series of PTZ actions as desired, and then click Stop Record. The maximum number of patterns depends on the camera capability.
User's Manual Figure 7-27 Set a linear scanning Step 5 To call the linear scanning, hover over the name, and then click . To stop, click 7.1.3.2.5 Enabling Auxiliary Functions Enable PTZ windshield wiper, light and IR. Step 1 Log in to PCAPP. Step 2 Select a PTZ camera from the views.
Page 212
User's Manual Figure 7-29 Search Step 2 Select a remote device, and then click Record tab. Click to display only channels. Click to display channels and devices. Step 3 Select a record type from among All Record, Manual Record, Video Detect, and IO Alarm and Thermal.
Page 213
User's Manual Figure 7-30 Schedule Step 5 Click Search. The record thumbnail is at the top of the remote device, and the time bar displays the record period (green color means there is a record). ● The selected remote device is on the left panel. Click a remote device, and the record file thumbnail is on the right panel.
Page 214
User's Manual select. System supports maximum 16 windows. System automatically adjusts each window size according to the original scale of playback file. ● The thumbnail with means system is playing record file of current thumbnail. Figure 7-32 Search Table 7-11 Search icons description Signal Words Description Click to synchronize playback mode.
Page 215
User's Manual Signal Words Description Click to switch to frame by frame playback. It is only valid in pause mode. Click to play back at fast speed. The fast speed includes1, 2, 4, 8, and 16. Click the icon once, the playback speed upgrades one level.
User's Manual Signal Words Description Shortcut menu: Right-click on the playback window, you can view the shortcut menu. ● Zoom: It is to zoom in a specified zone and view the details. ● Original scale: It is to set view window scale. ◇...
User's Manual Figure 7-34 Video clipping frame Step 4 Click the record edit column (the blue column) and drag to the left or right, to select start time and end time of clipping. Step 5 Click Save Immediately. Figure 7-35 Save Step 6 Click Browser to select saving path.
Page 218
User's Manual Figure 7-36 Image playback (1) Step 3 Select image type, including Manual Snap, Video Detect, IO Alarm and Thermal. Step 4 Set search time. ● Method 1: Click the date or time on the time column, change time or date value. ●...
Page 219
User's Manual Figure 7-38 Image thumbnail ● The selected remote device is on the left panel. Click a remote device, and the image thumbnail is on the right panel. ● Click to move thumbnail list, and display the hidden thumbnail. ●...
User's Manual 7.2.4 Exporting File Export record file or image to the designated storage path. ● The default record file mode is .dav and the image file mode is .jpg. ● Connect USB device to the system if you are on the local menu to operate. Step 1 On the LIVE page, click and then select SEARCH.
Page 221
User's Manual Figure 7-42 Save 3) Click Browser to select saving path. For local operation, after you set storage path, the Save page displays the Format button. Click the Format button to clear all data on the USB storage device. The formatting operation will clear all data.
User's Manual Figure 7-43 Download ● Click Pause all to pause all download tasks. Click Start all to resume download tasks. ● Click Clear completed columns to delete all downloaded tasks. ● Click of the corresponding task to pause download task. Click to resume download.
User's Manual Figure 7-44 Tag Step 4 Enter tag name, and then click OK. 7.2.6 Locking Files Lock specific videos or pictures so they cannot be viewed. An locked file can only be viewed after being unlocked. On the LIVE page, click , and then select SEARCH.
User's Manual 7.3.2 Vehicle Management See "6.8.3 Configuring Vehicle Database". 7.3.3 Tag Management Step 1 On the LIVE page, click , and then select FILE > Tag Management > Tag Management. Figure 7-45 Tag management Step 2 Select a channel, set start time and end time, and then click Search. The tags during the set time period are displayed.
User's Manual Figure 7-46 File lock Step 2 Select a channel, set start time and end time, and then click Search. The locked files are displayed. ● Click to view the video of the locked file. ● Click Refresh to view the latest locked files. ●...
User's Manual Figure 7-47 Audio management Step 2 Click Import to select the audio files that you want to import. Step 3 Click OK. The uploaded audio file is displayed. After the audio file is uploaded, it can be renamed or deleted. Table 7-13 Audio file operation Name Operation...
User's Manual Figure 7-48 Watermark Step 2 Click Browse to select a video file. Step 3 Click Verify. ● Normal: If the verification result is normal, the correct watermark is displayed. ● Exception: If the verification result is abnormal, the abnormal watermark and its type are displayed.
User's Manual 7.4.1.2 Importing Task Resources Import task resources from PC or USB storage device for AI analysis. Procedure Step 1 On the LIVE page, click , and then select TASK > Resource Management. Figure 7-51 Resource management Step 2 Click Import to import .dav file from PC or USB storage device.
Page 229
User's Manual Step 4 Select a task type from Analysis Target. 1) Click the analysis target cell. Figure 7-53 Analysis target 2) Select a task type. Table 7-14 Task type description Rule Name Operations ● Click next to Enabled to enable human detection as well as face detection.
User's Manual Figure 7-54 AI analysis task After an AI analysis task is created, the Device automatically runs analysis within the defined execution period. During the period, real-time AI analysis is suspended. On the AI Analysis Task page, you can perform the following operations. Table 7-15 Task operations Function Operation...
User's Manual Step 3 Click to enable the function. Figure 7-55 Extract Eigenvector Again Step 4 Specify the start time and end time of the day. ● The system automatically creates tasks to re-extract Eigenvector of history images with unmatched model versions during the period. ●...
Page 232
User's Manual 3) Set the time period. Step 4 Click Search. Step 5 Back up files by downloading or remote backup. ● Download 1) In the search results, select one or more files, and then click Download. Figure 7-57 Save 2) Select a file type.
User's Manual Figure 7-58 Remote device 2) Click Query to search for connected third-party storage devices. 3) Select a storage device, and then in the Type box, select a target format for the file. 4) Click Format to format the selected storage device. The formatting operation will clear all data of the storage device.
User's Manual ● Click to confirm alarm event. The confirmed event will be removed from the alarm list. ● Click the alarm event on the alarm list. The device displays the 20 seconds video before and after the alarm event occurred. ◇...
Page 235
User's Manual Figure 7-61 Display Table 7-16 Difference between main screen and sub screen Name Main screen Sub screen User operation (Login, log out, change password, lock) Preview and Monitor Search Confirm alarm File Management Intelligent Analytics Function Operations Multiple-screen control System Info Background Task...
User's Manual Name Main screen Sub screen Device, network, event, storage, account, security System Configuration strategy, and system management, and cluster. 7.7.2 Locking Screen Click and then select Lock to lock the screen. The screen stops at current page and cannot operate other functions.
User's Manual 8 System Configuration This chapter introduces system configuration functions such as managing remote device, setting network, setting alarm event, setting HDD storage, managing user information, setting device security strategy, and setting system parameters. 8.1 Configuration Window Click to open the configuration window. Figure 8-1 Configuration window On this window, you can: ●...
User's Manual Figure 8-2 Device management Click or click Add to add remote device to the system. 8.2.1 Viewing Device Information View information of the Device. Step 1 Click , and then select DEVICE. Step 2 Select the root node in the resource tree, and then click the Device Info tab.
Page 240
User's Manual Figure 8-3 Device information Table 8-1 Device info Parameters Description Name Set device name. Description Device description. Displays device info, including type, SN, MAC, number of video, audio and alarm in/out channels, video input Device info bandwidth, system version, security baseline version, web version, and algorithm version.
User's Manual 8.2.2 Remote Device The Device supports to add remote device, modify its IP address and configurations, and export its information. 8.2.2.1 Viewing Remote Devices View connected remote devices. For details about adding devices, see "8.2.2.3 Configuring Remote Devices". Step 1 Click , or click...
User's Manual 8.2.2.2.1 Modifying IP of Unconnected Devices ● You can only modify the IP address of initialized devices. ● You can only modify the IP address of remote devices connected with private protocol. Step 1 Click , or click on the configuration page, and then select DEVICE.
User's Manual Figure 8-6 Modify IP (1) Step 5 Enter the static IP address, subnet mask, gateway, and incremental value. ● Enter incremental value only when multiple remote devices are modified. If you want to change IP addresses of several devices at the same time, system allocates IP address one by one according to your setting at the fourth bit of the IP address.
User's Manual Information". Step 1 Click , or click on the configuration page, and then select DEVICE. Step 2 Select a remote device and then click Modify IP. Figure 8-7 Modify IP (1) Step 3 Enter the IP address, subnet mask, gateway, and incremental value. ●...
User's Manual The page displayed might vary with remote devices. See the actual page for detailed information. 8.2.2.3.1 Configuring Device Property Set remote device name, and view device information. Step 1 Click , or click on the configuration page, and then select DEVICE. Step 2 Select a remote device on the left panel and then click Property tab.
Page 246
User's Manual Figure 8-9 Modify IP 4) Click OK to save setting. Step 4 Change port number. 1) Click of the corresponding port. Figure 8-10 Port 2) Change port number. 3) Click OK to save setting. Step 5 Set other parameters. Table 8-3 Connection parameters description Parameters Description...
User's Manual On the local interface of the Device, you cannot click to go to the web interface of the remote device. 8.2.2.3.3 Configuring Video Parameters Set different video parameters according to different bit stream types based on the bandwidth. Step 1 Click , or click...
User's Manual Parameters Description Set video encode mode. ● H.264: It is a highly compressed video encoding or encoding standard. At the same video quality, it has increased the compression rate by 2X compared with the MPEG-2. Encode mode ● H.265: It is a new video encode standard coming after H.264. It has improved the complicated relationship among bit stream, encode quality, latch and algorithm on the previous standard.
Page 249
User's Manual Figure 8-12 OSD Step 3 Enable OSD information according to actual requirements. ● Set device name 1. Click to enable OSD of device name. 2. Click 3. Enter device name. Figure 8-13 Device name 4. Drag the text box to the proper position. 5.
User's Manual Figure 8-15 Geographical position 4. Drag the text box to the proper position. 5. Click to save the OSD information. ● Set privacy masking This function is available only when the camera supports privacy masking. 1. Click to enable privacy masking. 2.
User's Manual Table 8-5 Audio parameters Parameter Description The audio encoding mode set here applies to both audio streams Compression and voice talks. We recommend leaving it as default. The number of samples of a sound that are taken per second. The Sampling Frequency higher the value, the more accurate the digital representation of the sound can be.
User's Manual 8.2.2.5 Importing Remote Devices in Batches Import devices in batches by using the template. On the Device List page, click Batch Import to go to the Add Device page. On the Add Device page, click the Import CSV File tab. 8.2.2.6 Connecting Remote Devices On the Device page, view connection status of remote device in the device list.
User's Manual 8.2.2.8 Changing Device Password Change passwords of connected devices. You can only modify devices successfully connected to IVSS via private protocol. Step 1 Click , or click on the configuration page, and then select DEVICE. Step 2 Select a remote device and then click Change Password. Figure 8-19 Modify password Step 3 Keep Using current device password and password protection information disabled.
User's Manual Figure 8-20 Network management 8.3.1 Basic Network Set basic network parameters of the device, such as IP address, port aggregation and port number, to connect with other devices in the network. 8.3.1.1 Configuring IP Address Set device IP address, DNS server information and other information according to network planning. Device has 4 Ethernet ports by default.
Page 255
User's Manual Figure 8-21 TCP/IP Step 2 Click of the corresponding NIC to edit network parameters. Figure 8-22 Edit Ethernet network Step 3 Set parameters. Table 8-6 TCP/IP parameters description Parameters Description Speed Current NIC max network transmission speed. IP Type Select IPv4 or IPv6.
User's Manual Parameters Description Set NIC MTU value. The default setup is 1500 Byte. We recommend you to check the MTU value of the gateway first and then set the device MTU value equal to or smaller than the gateway value.
User's Manual Aggregation mode Description In this mode, device has bonded several NICs and set one NIC as the main card and the rest NICs are the alternative NICs. Usually, only the main NIC card is working. System can automatically enable other Fault-tolerance alternate cards to work when the main card breaks down.
Page 258
User's Manual Figure 8-23 Edit load balance 5) Set parameters. Table 8-8 TCP/IP parameters description Parameters Description Speed Maximum network transmission speed of current NIC. IP Type Select IPv4 or IPv6. When there is a DHCP server on the network, check the box to use Use Dynamic IP dynamic IP address.
User's Manual 8.3.1.2.2 Cancelling Binding NIC Cancel port aggregation and allow the bonded NICs to work as independent card. Step 1 Click or click on the configuration page, and then select NETWORK > Basic Network > TCP/IP. Step 2 Select a bonded NIC. Step 3 Click OK.
User's Manual Parameters Description Set according to the actual requirements. The default value is 80. The value ranges from 1 to 65535. HTTP Port If the value you set is not 80, please add the port number after the IP address when you are using browser to login the device.
User's Manual Figure 8-25 P2P Step 2 Click to enable P2P function. Step 3 Click Save. After the configuration, you can register a device to the APP to view remote video, playback record file, and so on. See corresponding cellphone APP for detailed information. After successfully connected to the P2P, the status displayed as Success.
User's Manual 8.3.2.2.2 Procedure Step 1 Click , or click on the configuration page, and then selectNETWORK > Basic Network > DDNS. Figure 8-26 DDNS Step 2 Click to enable DDNS function. After enabling DDNS function, the third-party server might collect your device information. Pay attention to privacy security.
User's Manual Parameters Description Update Circle Enter the amount of time that you want to update the DDNS. Current WAN IP Displays the WAN IP address of IVSS. Status Displays DDNS registration result or update status. Step 4 Click Save. After successful configuration, enter domain name in address bar of the browser or PCAPP, and press Enter key to access the IVSS.
User's Manual Table 8-11 EMAIL parameter description Parameters Description Select email server type, including Customize, Gmail, Hotmail, and Email Server Yahoo. Server Address Enter email server address. Set the encryption type of email server, such as NONE, SSL, and TLS. Encryption You are recommended to select TLS.
Page 265
User's Manual Figure 8-28 SNMP (1) Step 2 Click to enable the function. Step 3 Select SNMP version. ● If you have selected SNMP V1/V2, see the previous figure. ● If you have selected SNMP V3, see the following figure. Figure 8-29 SNMP(2) Step 4 Set parameters.
User's Manual Table 8-12 SNMP parameters Parameters Description Port Listening port of agent programs on the device. Read or Write Community supported by the agent programs. Read Community, Write Community The name can only contain numbers, letters, underscores, and middle lines. The destination address of Trap information sent by the agent Trap Server program.
User's Manual Figure 8-30 Register Step 2 Click to enable the function. Step 3 Set parameters. Table 8-13 Register Parameters Description IP Type Select IP address of server for registration. Server In the Server box, enter the IP address of server for registration. Port Enter the port number of the server for registration.
Page 268
User's Manual Figure 8-31 UPnP Step 2 Set parameters. Table 8-14 UPnP parameters Parameters Description Port Mapping Click to enable UPnP. State The status of port mapping. The LAN IP address of the router. LAN IP The IP address is automatically obtained after the mapping succeeds. The WAN IP address of router.
User's Manual corresponding port number in the router network. 8.3.2.7 Multicast When multiple users are viewing live video of the same device at the same time, it might cause failure due to limited bandwidth. To solve this problem, you can set a multicast IP address (224.0.0.0– 239.255.255.255) for the Device.
User's Manual 8.3.2.8 Alarm Center You can configure the alarm center server to receive the uploaded alarm information. Make sure that alarm center server is deployed. Step 1 Click , or click on the configuration page, and then select NETWORK > Network Apps >...
User's Manual Figure 8-35 Add route table Step 3 Enter the information. Step 4 Click OK. 8.4 Event Management Click or click on the configuration page, select EVENT. On the page, configure alarm event, including alarm event of the Device and remote device. ●...
Page 272
User's Manual The supported actions might be different depending on the model you purchased. On the alarm configuration page, click Actions to display actions. Configure actions according to your actual need. ● After setting actions, click Save on the page. ●...
User's Manual Actions Description Preparation Audio function has been When there is an alarm, configured. See "7.3.5 Voice Voice Prompt system can play the selected Management" for detailed audio file. information. Alarm is triggered when a tripwire or intrusion behavior is detected.
User's Manual 8.4.1.3 Log Enable the log function. The system notes down the alarm information in the log when there is corresponding alarm event. Click Actions and select Log to enable this function. Figure 8-39 Log When log function is enabled, after an alarm is triggered, click on LIVE page, select MAINTAIN >...
User's Manual 8.4.1.6 Snapshot Set the snapshot linkage action for alarms, so that once an alarm happens, it will trigger a snapshot of the alarm. Click Actions, and then select Snapshot. Figure 8-42 Snapshot action 8.4.1.7 Local Alarm Out Set local alarm output. System can trigger the corresponding alarm event when an alarm occurs. Make sure that the Device is connected with alarm output device.
User's Manual 8.4.1.9 Access Set access control function. When there is an alarm, system can trigger the corresponding access control device to open door and close door. Make sure that access control device has been added. See "5.4.2 Adding Remote Device" for detailed information.
User's Manual On the event configuration page, select Actions > Smart Tracking to enable the action. 8.4.1.12 Report Alarm Click Actions and then select Report Alarm to enable this function. Where there is an alarm, the system reports the alarm to alarm center. Make sure that alarm center has been enabled.
User's Manual 8.4.2 Local Device Set IVSS alarm event, including abnormal event, device offline alarm, AI application, and local device alarm. 8.4.2.1 One-click Disarming Disarm alarm linkage actions as needed to avoid interference caused by alarms. Step 1 Click , or click on the configuration page, and then select EVENT.
User's Manual 8.4.2.2 Abnormal Event Set the alarm mode when an abnormal event occurs. The Device supports HDD, storage error, network, AI module, fan and power fault alarm. Table 8-19 Abnormal event description Name Description System triggers an alarm when there is no HDD. It is enabled by No HDD default.
User's Manual Figure 8-50 AI module temp Step 4 Click to enable AI module temperature alarm function. Step 5 Drag to set alarm temperature threshold. The above step is for AI module temperature alarm only. Step 6 Click Actions to set alarm actions. See "8.4.1 Alarm Actions" for detailed information. Step 7 Click Save.
User's Manual Figure 8-51 Offline alarm Step 4 Click to enable device offline alarm. Step 5 Click Deployment Time to select schedule from the drop-down list. After setting deployment period, system triggers corresponding operations when there is a motion detection alarm in the specified period. ●...
User's Manual Figure 8-52 AI plan 8.4.2.4.2 Setting AI Display Set the property to be displayed in rule box and feature property panel. View AI detection result through smart preview, and support to display face, human and vehicle. Take the procedure of configuring face detection AI display as an example. For other AI detection functions, the procedures are similar.
Page 283
User's Manual After setting filter criteria, only the qualified detection result will be displayed. For example, enable Age, and then select youth from the drop-down list. The tracking box and the features panel only display the human face of the youth age. 1) Click to enable corresponding filter type.
User's Manual Figure 8-55 Features panel Step 7 Click Save. 8.4.2.4.3 Setting Entries Frequency Step 1 Click , or click on the configuration page, and then select EVENT. Step 2 Select the root node in the device tree on the left. Step 3 Select AI Application >...
User's Manual Parameter Description ● Set the statistical cycle as needed. Statistical Cycle ● The statistical cycle is 7 days by default. ● Set the threshold of entries frequency as needed. When the entries Entries Detected detected reaches or exceeds the threshold, an alarm is triggered. ●...
Page 286
User's Manual Figure 8-58 Video diagnosis Step 5 Click to enable video quality analysis. Step 6 Configure the parameters 1) Click to enable a type of video quality analysis, for example, tampering. 2) Set the threshold. 3) On the device list, select one or more devices. 4) Set the interval.
User's Manual Figure 8-59 AI report 8.4.2.5 Configuring Device Alarm Set device alarm. When alarm input device sends an alarm signal to the Device, an alarm is triggered. ● Make sure that the Device is connected with alarm input device. ●...
User's Manual Table 8-21 Local alarm parameters description Parameters Description Name In the Alarm name box, enter a name for the alarm. Type Select alarm input device type. Both NO and NC are supported. Debouncing The system records only one event during this period. Step 6 Click Deployment Time to select schedule from the drop-down list.
Page 289
User's Manual Figure 8-61 Video motion Step 4 Click to enable video motion detection. Step 5 Set parameters. Table 8-22 Motion detect parameters description Parameters Description Debouncing System only records one alarm event during the debouncing period. After enabling exclude PTZ control, system does not trigger an alarm when you are manually control the PTZ.
User's Manual Parameters Description Drag to adjust threshold. Once the detected percentage (the percentage of target to detection Threshold zone) is equivalent to or larger than the specified threshold, system triggers alarm. For example, the threshold is 10. Once the detected target occupies the 10% of the detection zone, system triggers an alarm.
User's Manual Step 7 Click Save. 8.4.3.2 Offline Alarm When the remote device and the IVSS are disconnected, system can trigger an alarm. Step 1 Click , or click on the configuration page, and then select EVENT. Step 2 Select a remote device in the device tree on the left. Step 3 Select Device Offline >...
User's Manual Figure 8-64 IO1 Step 4 Click to enable the alarm. Step 5 Set parameters. Table 8-24 Local alarm parameters description Parameters Description Name In the Alarm name box, enter a name for the alarm. Type Select alarm input device type. Both NO and NC are supported. Debouncing The system records only one event during this period.
User's Manual Table 8-25 Thermal alarms Function Description When the thermal camera detects a fire, the alarm signal is transmitted Fire alarm to the Device, which performs an alarm linkage action. When the thermal camera detects that the temperature is above or Temperature alarm below the threshold value, the alarm signal is transmitted to the Device, which performs an alarm linkage action.
User's Manual 8.5.1 Storage Resource 8.5.1.1 Local Hard Disk The local hard disk refers to the HDD installed on the system. You can view HDD space (free space/total space), temperature (centigrade/Fahrenheit), HDD information and so on. Click , or click on the configuration page, and then select STORAGE >...
User's Manual Figure 8-66 S.M.A.R.T 8.5.1.1.2 Format ● Formatting HDD will clear all data on the HDD. Be careful! ● Hot spare HDD cannot be formatted. Enter the Local Hard Disk page, select HDD, and click Format. It is to format the selected HDD. 8.5.1.1.3 File System Repair Once you cannot mount the HDD or you cannot properly use the HDD, you can try to use the File System Repair function to fix the problem.
User's Manual HDD for single-HDD mode. 8.5.1.2.1 Creating RAID RAID has different levels such as RAID5, RAID6 and so on. Different RAID levels have different data protection, data availability and performance levels. Create RAID according to your actual requirements. Creating RAID operation is going to clear all data on these HDD. Be careful! Procedure Step 1 Click...
Page 297
User's Manual RAID. ● Manual RAID: System creates a specified RAID type according to the selected HDD amount. 1) Select Manual RAID. 2) Select HDD you want to use. 3) Set parameters. Table 8-26 Manual creation parameters description Parameters Description Select storage device of the HDD and select the HDD you want to add to the RAID.
Page 298
User's Manual Figure 8-69 Create RAID (2) 2) Set parameters. Table 8-27 Auto parameters description Parameters Description Storage Device Select storage device of the HDD. Set RAID resources allocation mode. The default setup is self- adaptive. ● Self-adaptive means the system can automatically adjust RAID synchronization speed according to current business load.
Page 299
User's Manual Figure 8-70 Confirm info (manual) Figure 8-71 Confirm info (Auto) Step 5 Confirm information. If the input information is wrong, click Back to set RAID parameters again. Step 6 Click Create. System begins to create RAID. It displays RAID information after creation. Figure 8-72 RAID (2) Related Operations After creating RAID, view RAID disk status and details, clear up RAID, and repair file system.
User's Manual Table 8-28 RAID operation Name Operation View RAID HDD Click at the right side of the RAID name to open the RAID HDD list. It status is to view RAID HDD space, status and so on. View RAID details Click to view RAID detailed information.
Page 301
User's Manual Figure 8-74 Global hot spare Figure 8-75 Private hot spare Step 3 Select hot spare creation type. ● Global hot spare: Create hot spare for all RAID. It is not a hot spare HDD for a specified RAID group. ●...
User's Manual Figure 8-76 Confirm info Step 5 Confirm information. Click Back to select hot spare HDD(s) again if you want to change settings. Step 6 Click Create to save settings. System displays the added hot spare HDD information. Figure 8-77 Hot spare (2) Select a hot spare HDD and then click Delete, it is to delete hot spare HDD.
User's Manual Figure 8-78 ISCSI application ● Select a network hard disk, and then click Format to format the disk. Formatting your hard disk will erase all data from your hard disk, so do it carefully. ● Click the HDD Operation column, and then you can select an HDD operation permission type. ◇...
Page 304
User's Manual Figure 8-79 Network hard disk Step 2 Click Figure 8-80 Add iSCSI Step 3 Set parameters. Table 8-29 Network hard disk parameters Parameters Description Server IP Enter iSCSI server IP address. Port Enter iSCSI server port number. It is 3260 by default.
User's Manual Parameters Description If iSCSI server has no permission limitation, you can select anonymous login. ● indicates that anonymous login is enabled and there is no need Anonymous to set username and password. ● indicates that anonymous login is disabled. User Name If access permission has been limited when creating the shared file directory on the iSCSI server, you need to enter username and password.
User's Manual Figure 8-81 Disk group Step 3 Select HDD or RAID group from Disks, and then drag the HDD or the RAID group to another disk group. Disk grouping takes effect immediately. Select All to select all the HDDs and RAID groups of the disk group. After configuring disk groups, you can also view which disk group the selected disk, video or picture belongs to.
Page 307
User's Manual Figure 8-82 Video Step 2 Select filtering way from the Batch Process drop-down list. ● By Channel Name: Select channel according to the channel name. ● By Logical Channel No.: Select channel that is connected to the Device. In this case, Start Channel No.
User's Manual Figure 8-83 Device list Step 3 (Optional) Click to enable load balance, and then the icon turns into blue. To disable it, click it again, and then the icon turns into gray. ● After load balance is enabled, if one disk group has no usable disk, the video of all channels that belong to this disk group will be stored into all the usable disk groups.
User's Manual Step 3 Select a recording method. Step 4 (Optional) click to disabled the recording schedule configuration of the selected channel Step 5 Click Save. Figure 8-84 Recording Mode 8.5.2.2.2 Recording Schedule Configure video and picture recording schedules so the Device records and captures pictures as configured in the specified period.
Page 310
User's Manual Figure 8-86 Add a schedule 6. Click Save. Step 3 Set other parameters and then click OK. ● Record Events: Record event videos. ● Pre-record: The recording duration prior to the event. ● ANR: Automatic Network Replenishment. When ANR is enabled (by clicking ) , the Device will download videos recorded by IPC and stored on camera SD card during network disconnection.
User's Manual 8.5.2.3 Basic Configure the storage mode when the disk space is used up and the automatic deletion of expired files. 8.5.2.3.1 Setting Storage Mode Configure the storage mode when there is no more disk space available. Step 1 Log in to PCAPP.
User's Manual Figure 8-88 Delete expired files Step 4 Click Save. 8.5.2.4 Record Transfer When the device and an IPC are disconnected, the IPC continues to record and stores the recording in the SD card. After the network is recovered, the device will download the recording during the disconnection from the IPC.
User's Manual 8.6.1 HTTPS HTTPS can use the reliable and stable technological means to guarantee user information and device security and communication data security. After installing the certificate, you can use the HTTPS on the PC to access the device. ●...
User's Manual 4) Follow the prompts to import the certificate. System goes back to Certificate page. Step 5 Click OK to complete certificate installation. Figure 8-90 Installed certificate 8.6.1.1.2 Installing Signature Certificate Upload signature certificate to install. Prerequisites Before installation, make sure that you have obtained safe and valid signature certificate. Procedure Step 1 Click...
User's Manual installation. Step 5 Install the root certificate on the PC. See "8.6.1.1.1 Installing the Created Certificate" for detailed information. This root certificate is the one obtained with signed certificate. 8.6.1.2 Enabling HTTPS After you install the certificate and enable HTTPS function, you can use the HTTPS on the PC to access the device.
User's Manual Step 1 Click , or click on the configuration page, and then select SECURITY > Credential. Figure 8-93 Uninstall Step 2 Click Uninstall. System pops up a confirmation box. Step 3 Click OK to uninstall the certificate. 8.6.2 Configuring Access Permission Set the specified IP addresses to access the device, to enhance device network and data security.
User's Manual ● Reject access list: It means the IP address in the list cannot access the device. ● Allow access list: It means the IP address in the list can access the device. Step 3 Add IP host. The following steps are to set reject access list or allow access list. 1) Click Add.
User's Manual Figure 8-95 Safety protection (1) Step 2 Click to enable security protection function. ● Remote: When you are using web interface, PCAPP to access the device remotely, once the login password error has exceeded the threshold within the defined time period, system locks the IP host for a period of time.
Page 319
User's Manual Figure 8-96 System service Step 2 Enable or disable system service according to your actual situation. Table 8-31 System service System service Description After enabling this function, you can access the Device through SSH protocol to carry out system debugging and IP configuration. This function is disabled by default.
User's Manual System service Description Password Configure the password expiration interval. The Device prompts you to Expires in change the password when the password expires. When this function is enabled, stream transmission will be encrypted. Audio/Video Transmission We recommend you enable this function. Otherwise you might risk data Encryption leakage.
User's Manual ● Hosts in the allowlist have the permission to synchronize time of the Device. ● Hosts in the blocklist cannot synchronize time of the Device. Step 4 On the Allowlist page or the Blocklist page, add hosts. 1) Click Add. Figure 8-98 Add a host 2) Select an IP version, and then enter an IP address.
User's Manual ● System has two default user groups (read-only): admin and ONVIF. ● Create new user group under the root. 8.7.1.1 Adding User Group Step 1 Click , or click on the configuration page, and then select ACCOUNT. Step 2 Select the root node in the device tree on the left and then click at the lower-left corner.
User's Manual Figure 8-100 Authority 2) Set user group authorities according to actual situation. ● : means it has the corresponding authority. ● Check the box at the top of the authority list (such as (0) Authority Control) to select all authorities of current category.
Page 324
User's Manual left corner. Step 3 Enter current user’s login password, and then click OK. Figure 8-101 Property Step 4 Set parameters. Table 8-34 User management Parameters Description Set username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
User's Manual Figure 8-102 Authority Step 6 Click Save. 8.7.2.2 Operation After adding a user, you can modify user information or delete the user. The user with account management authority can change its own and other users’ information. Table 8-35 User operation Name Operation Select a user from user list.
User's Manual 8.7.3.1.1 Changing Password of the Current User Step 1 Click at the top right corner, and then select Modify Password. Step 2 Enter the old password, the new password and then confirm. Step 3 Click OK. 8.7.3.1.2 Changing Password of Other User Only Admin account supports this function.
User's Manual Step 5 In the New Password box, enter the new password and enter it again in the Confirm Password box. Step 6 Click OK. 8.7.3.2 Resetting Password You can use email address or answer the security questions to reset password once you forgot it. You can only reset password on the local interface of the Device.
Page 328
User's Manual Figure 8-106 Enter email address Figure 8-107 Scan QR code Step 4 Reset the password.
Page 329
User's Manual Figure 8-108 Security questions Step 5 Click Next. Figure 8-109 New password setting Step 6 Set parameters. Table 8-36 Description of password parameters Parameters Description User The default username is admin. Password In the New Password box, enter the new password and enter it...
User's Manual Parameters Description again in the Confirm Password box. The password must consist of 8–32 non-blank characters and Confirm Password contain at least two types of the following characters: Uppercase, lowercase, numbers, and special characters (excluding ' " ; : &). Enter a strong password according to the password strength indication.
Page 331
User's Manual Figure 8-111 Security questions Step 5 Click Next. Step 6 Set a new password. Figure 8-112 New password setting Table 8-37 Description of password parameters Parameters Description User The default username is admin. Password In the New Password box, enter the new password and enter it again in the Confirm Password box.
User's Manual Parameters Description After setting the prompt, when you point to on the login page, the system pops up a prompt to help you remember the Prompt question password. The prompt question function is for local login only. See the actual page for detailed information.
User's Manual Step 4 Enter the login password of current user, and then click OK. Figure 8-114 ONVIF property Step 5 Set parameters. Table 8-38 ONVIF parameters description Parameters Description Set ONVIF username. username The name ranges from 1 to 31 characters. It can contain English letters, number and special character (_ @ .).
User's Manual Step 4 Click OK. 8.8 System Configuration Click or click on the configuration page, select SYSTEM. The SYSTEM page is displayed. Set system basic settings, such as general parameters, time, display parameter, schedule, and voice. Figure 8-115 System management 8.8.1 Setting System Parameters Set system language, standard, user logout time, virtual keyboard, and mouse moving speed.
User's Manual Parameters Description Select video standard. ● PAL is mainly used in China, Middle East and Europe. ● NTSC is mainly used in Japan, United States of America, Canada and Mexico. Standard As a technical standard of processing video and audio signals, PAL and NTSC mainly differ in encoding, decoding mode and field scanning frequency.
Page 336
User's Manual Figure 8-117 Time Step 2 Set parameters. Table 8-40 System parameters description Parameters Description Set system date and time. You can set manually or set device to synchronize time with the NTP server. ● Manual Setting: Select Manual Setting and then set the actual date and time in the following two ways.
User's Manual 1) Click to enable DST. 2) Select DST mode. It includes Date and Week. 3) Set DST start time and end time. Step 4 Click Save. 8.8.3 Display Set connected display resolution and refresh rate. Step 1 Click , or click on the configuration page, and then select SYSTEM >...
User's Manual Table 8-41 Display parameters description Parameters Description Set display resolution. Different displays support different Resolution resolutions. See your actual interface for detailed information. Refresh rate Set refresh rate of the display. Step 5 Click Save. 8.8.4 Schedule Set schedule. When you are configuring alarm, record arm/disarm period, system can call the schedule directly.
User's Manual ● Click the blue area, and is displayed. Drag to adjust the start time and end time of validity period. ● Press the any blank space on the time bar, and drag to the right to add a validity period. ●...
Page 340
User's Manual Figure 8-120 Procedure of creating a cluster Step 1 Click , or click on the configuration page, and then select CLUSTER SERVICE > CLUSTER. Step 2 Add a main device or sub device. 1) Click Add. Figure 8-121 Add cluster 2) Set parameters.
User's Manual Parameters Description Enter the IP address of the main device or sub device. IP Address When adding the first sub device, you need not enter the IP address, because the first sub device is the current device by default.
User's Manual Figure 8-123 Event log 8.9.1.3 Configuring Arbitration IP When there are only 2 devices in the cluster, a third-party device is required to determine whether the main device is faulty, so arbitration IP must be set for the cluster to perform a normal replacement operation.
User's Manual Figure 8-125 Add Step 3 Set parameters. Table 8-43 Parameters Parameters Description Main Device Main device IP. Sub Device Sub device IP. Select the channel of which the video is to be transferred. Channel No. Click to set the channel range. Start Time The start and end time of the video.
User's Manual 9 System Maintenance Click on the LIVE page, and select MAINTAIN. You can operate and maintain the device working environment to guarantee proper operation. Figure 9-1 Maintain 9.1 Overview Click on the LIVE page, and select MAINTAIN > Overview. Figure 9-2 Overview Table 9-1 Overview Function...
User's Manual Function Description View the connection and idle status of remote devices ● Click Jump To to go to the DEVICE page for detailed Remote Device information. ● Click Refresh to refresh the data. View RAID status. ● Click Jump To to go to the STORAGE page for detailed RAID Status information.
User's Manual Figure 9-3 Device info 9.2.2 Viewing Legal Information View device software license, privacy policy, and open-source software note. Click on the LIVE page, and select MAINTAIN > System Info > Legal Info. 9.2.3 Viewing Algorithm Version View device algorithm license status and AI version information. Click on the LIVE page, and select MAINTAIN >...
User's Manual Figure 9-4 Algorithm version 9.3 System Resources View device and AI module information. 9.3.1 Viewing Device Resource Click on the LIVE page, and select MAINTAIN > System Resources > DEIVCE INFO. The System Resources page is displayed. You can view resource status including CPU and memory usage, panel temperature and fan speed.
User's Manual 9.4 Logs The logs record all kinds of system running information. Check the log periodically and fix the problems in time to guarantee system proper operation. 9.4.1 Log Classification Search system log, user log, event log, and link log. Table 9-2 Log description Type Search system log.
User's Manual Figure 9-7 System log Related Operations Export and clear log. Table 9-3 Log operation Name Operation Click and then the Export window appears. You can select whether to encrypt the exported log information. ● You need to set a password for export encryption. The password is required to unzip the exported file.
User's Manual Figure 9-8 Logs ● Click to export a log. ● After selecting multiple logs, click Export to export them in batches. 9.5.2 One-click Export Export the diagnosis data for troubleshooting when the device is in exception. Step 1 On the LIVE page, click , and select MAINTAIN >...
User's Manual Figure 9-9 Block Step 3 Set block period. The default period is 30 minutes. Step 4 Click OK to save the configuration. 9.6.2 Packet Capture Packet capture is the practice of intercepting a data packet that is crossing or moving over a specific computer network.
User's Manual Packet Capture page later to stop packet capturing. Step 5 (Optional) When operating on the web or PCAPP, click to download the captured packet. 9.7 Device Maintenance Device maintenance is to reboot device, restore factory default setup, or upgrade system and so on. It is to clear the malfunction or error during the system operation and enhance device running performance.
User's Manual Figure 9-12 Default Step 2 Select a method between Quick Restoration and Custom Restoration. Step 3 Click OK. System begins to restore default settings. After successfully restored default settings, system prompts to restart the device. 9.7.3 Automatic Maintenance If the device has run for a long time, you can set to automatically reboot the device at idle time.
User's Manual Click Export to export configuration file to local PC or USB storage device. File path might vary depending on your operations. ● On PCAPP, click , select Download to view file saving path. ● Select file saving path during local operation. Connect USB device to the system if you are on the local menu to operate.
User's Manual 10 PCAPP Introduction After installing PCAPP, system supports to access the Device remotely to carry out system configuration, function operations and system maintenance. For details about installing PCAPP, see "5.3.1 Logging in to PCAPP Client". 10.1 Page Description Double-click on the PC desktop.
User's Manual ● Click Clear Downloads to clear history download records. 10.4 Configuring PCAPP When PC theme is not Areo, video of PCAPP might not be displayed normally. It is suggested that PC theme should be switched to Areo, or compatibility mode of PCAPP should be enabled. Switching PC Theme This section uses Windows 7 as an example.
User's Manual Figure 10-3 Setting Enabling Hardware Acceleration Click , and select Settings. Select Enable hardware acceleration (it will take effect after video is opened again). The live view becomes much more fluent when this function is enabled. 10.5 Viewing Version Details Click and then select About to view PCAPP version information.
User's Manual 11 Log Out, Reboot, Shut Down, Lock Log out, reboot, shut down and lock out the Device. Figure 11-1 User operation Logging Out Click , and then select Log Out. Rebooting Click , and then select Reboot. System pops up confirm dialogue box. Click OK to reboot. Shutting Down To unplug the power cable might result in data (record and image) loss.
Page 361
User's Manual Figure 11-2 Unlock the client...
User's Manual 12 FAQ Problem Possibilities and Solutions ● The AI module is offline. Click on the LIVE page, and select MAINTAIN > System Resources > AI Module Info. You can view status of the AI modules. ● There are too many filter criteria on the AI display page. After enabling AI by ●...
User's Manual Appendix 1 Glossary Name Description Common Gateway Interface (CGI) is an important Internet technology. With CGI, client can ask data from program running on network server. CGI describes data transmission standard between server and asking processing program. Dynamic Domain Name System (DDNS) is to map the user dynamic IP address to a specified domain analysis service.
Page 364
User's Manual Name Description Open Network Video Interface Forum (ONVIF) is the defined general protocol for information exchange among the network video devices. It ONVIF includes search device, real-time audio/video, metadata, information control, and so on. Phase Alteration Line, this is a television standard that television scanning beam is 625 beams, 25 frames per second, phase alteration, odd field first and then it is followed by even field.
User's Manual Appendix 2 Mouse and Keyboard Operations This section introduces mouse and keyboard operations. Appendix 2.1 Mouse Operations Connect mouse to the USB port, you can use the mouse to control the local menu. For details, see the following table. Appendix Table 2-1 Mouse operations Operation Description...
User's Manual Appendix 2.2 Virtual Keyboard The local menu supports virtual keyboard. Click the text box to display virtual keyboard. For details, see the following pictures and table. If the device has connected to the peripheral keyboard, click the text column. Virtual keyboard will disappear.
Page 367
User's Manual Signal Words Description Click to delete letter. Click to input letter. Now the icon turns into . Click to restore previous input mode. Click to input space. Click to control cursor position. Click to switch to the next line. Select text and click the icon to cut the selected contents.
User's Manual Appendix 3 RAID RAID is an abbreviation for Redundant Array of Independent Disks. It is to combine several independent HDDs (physical HDD) to form a HDD group (logic HDD). Comparing with one HDD, RAID provides more storage capacity and data redundancy. The different redundant arrays have different RAID level.
Page 369
User's Manual RAID Level Description Min. HDD Needed RAID 10 is a combination of the RAID 1 and RAID 0. It uses the extra high speed efficient of the RAID 0 and high data protection and restores RAID10 capability of the RAID 1. It has high read/write performance and security.
User's Manual Appendix 4 HDD Capacity Calculation HDD capacity calculation formula: Total capacity (M) = Channel number× Demand time length (hour) × HDD capacity occupied per hour (M/hour) According to the above formula, get recording time calculation formula. Recording time (hour) = For example, for single-channel recording, HDD capacity occupied per hour is 200 M/hour.
User's Manual Appendix 5 Particulate and Gaseous Contamination Specifications Appendix 5.1 Particulate Contamination Specifications The following table defines the limitations of the particulate contamination in the operating environment of the device. If the level of particulate contamination exceeds the specified limitations and result in device damage or failure, you need to rectify the environmental conditions.
Page 372
User's Manual Appendix Table 5-3 Gaseous contamination specifications Gaseous contamination Specifications Copper coupon corrosion < 300 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 rate Silver coupon corrosion rate < 200 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 Appendix Table 5-4 ANSI/ISA-71.04-2013 classification of reactive environments Class Copper Reactivity Silver Reactivity...
User's Manual Appendix 6 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
Page 374
User's Manual We suggest you to change default HTTP and other service ports into any set of numbers between 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel.
Page 375
User's Manual ● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
Need help?
Do you have a question about the IVSS Series and is the answer not in the manual?
Questions and answers