Page 1
GV-BX2802, BX4802 User's Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. TVTBX-UM-A...
Page 2
GeoVision. Every effort has been made to ensure that the information in this manual is accurate. GeoVision, Inc. makes no expressed or implied warranty of any kind and assumes no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages arising from the use of the information or products contained herein.
Page 3
Safety Instruction ⚫ This product is intended to be supplied by a Listed Power Unit, marked with 'Limited Power Source', 'LPS' on unit, output rated minimum 12V/2 A or POE 48V/ 350mA or AC24V (depending on models), no more than 2000m altitude of operation and Tma=60 Deg.C.
Page 4
Disclaimer With regard to the product with internet access, the use of product shall be wholly at your ⚫ own risks. Our company shall be irresponsible for abnormal operation, privacy leakage or other damages resulting from cyber attack, hacker attack, virus inspection, or other internet security risks;...
Page 5
Regulatory Information FCC Information FCC compliance The products have been tested and found in compliance with the council FCC rules and regulations part 15 subpart B. These limits are designed to provide reasonable protection against harmful interference. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communication.
Chapter 1 Introduction 1.1 GV-BX2802 Main Features ⚫ IR auto switch, true day/night ⚫ 3D DNR, WDR Pro ⚫ BLC, Defog, Anti-flicker, corridor pattern ⚫ ROI coding ⚫ Face detection, line crossing / region intrusion / region entrance / region exiting (human / vehicle classification), video exception detection, heat map, crowd density, target counting, etc.
Chapter 2 Network Connection System Requirement For proper operation of the product, the following requirements should be met for your computer. Web browser: IE (plug-in required) / Firefox / Edge / Safari / Google Chrome *It is recommended to use the latest version of these web browsers. The menu display and operation of the camera may be slightly different by using the browser with plug-in or without plug-in.
Page 10
Find the camera with its Mac Address, click on its IP address. For the first-time users, you will be requested to set up a password. Type a new password and click OK. On your Web browser, type the IP address accessed on GV-IP Device Utility. IMPORTANT: By default, the Administrator’s username is admin and cannot be modified.
Page 11
If the first-time user accesses the camera’s Web interface on the browser directly by using the IP address found in GV-IP Device Utility, the following dialog box will appear. If “Activate Onvif User” is enabled, the ONVIF user can be activated simultaneously for the third-party platform connection via ONVIF, using the default username and set password set above to connect.
2.1.2 Directly Access through IE The default network settings are as shown below: IP address: 192.168.0.10 Subnet Mask: 255.255.255.0 Gateway: 192.168.226.1 HTTP: 80 Data port: 9008 Use the above default settings when logging in the camera for the first time. Directly connect the camera to the computer through network cable.
Page 13
Next, click the “Properties” button to set the network of the PC. Open the Web browser and enter the default address of the IP-camera. Follow directions to download and install the plug-in. Enter the default username and password on the login page and click “Login”.
2.2 WAN Access through the router or virtual server Make sure the camera is connected to the local network and then log in the camera via LAN and go to Config→Network→Port menu to set the port number. Port Setup Go to Config →Network→TCP/IP menu to modify the IP address. IP Setup Go to the router’s management interface through IE browser to forward the IP address and port of the camera in the “Virtual Server”.
Page 15
Access through PPPoE dial-up Network connection Access the camera through PPPoE auto dial-up. The setup steps are as follow: Go to Config→Network→Port menu to set the port number. Go to Config →Network→TCP/IP→PPPoE Config menu. Enable PPPoE and then enter the user name and password from your internet service provider. Go to Config →Network→DDNS menu.
Chapter 3 Live View After logging in, the following window will be shown. The following table is the instructions of the icons on the live view interface. Icon Description Icon Description Original size Sensor alarm indicator Fit correct scale Motion alarm indicator Adapt Color abnormal indicator Full screen...
Page 17
Some cameras can be installed in a compatible external PTZ enclosure through RS485. Click the PTZ icon to reveal the PTZ control panel. The descriptions of the control panel are as follows: Icon Description Icon Description Move upper left Move upper right direction direction Move up...
Chapter 4 Network Camera Configuration In the Webcam client, choose “Config” to go to the configuration interface. Note: Wherever applicable, click the “Save” button to save the settings. 4.1 System Configuration 4.1.1 Basic Information In the “Basic Information” interface, the system information of the device is listed. 4.1.2 Date and Time Go to Config→System→Date and Time.
Note: The time zone of the camera and the computer must be the same. It is recommended to modify the time zone of the camera according to the time zone of the computer. If the time zone of the computer is modified, the current web client needs to be closed.
4.1.4 Storage Go to Config→System→Storage to go to the interface as shown below. ⚫ SD Card Management Click the “Format” button to format the SD card. All data will be cleared by clicking this button. Click the “Eject” button to stop writing data to SD card. Then the SD card can be ejected safely.
Page 21
Set schedule recording. Check “Enable Schedule Record” and set the schedule. Weekly Schedule Set the alarm time from Monday to Sunday for a single week. Each day is divided in one-hour increments. Green means scheduled. Blank means unscheduled. “Add”: Add the schedule for a special day. Drag the mouse to set the time on the timeline. “Erase”: Delete the schedule.
Set the format, resolution and quality of the image saved on the SD card and the snapshot interval and quantity and the timing snapshot here. Snapshot Quantity: The number you set here is the maximum quantity of snapshots. The actual quantity of snapshots may be less than this number. Supposing the occurrence time of an alarm event is less than the time of capturing pictures, the actual quantity of snapshots is less than the set quantity of snapshots.
Page 23
Sharpness: Set the resolution level of the image plane and the sharpness level of the image edge. Noise Reduction: Decrease the noise and make the image more thorough. Increasing the value will make the noise reduction effect better but it will reduce the image resolution. Defog: Activating this function and setting an appropriate value as needed in foggy, dusty, smoggy, or rainy environment to get clear images.
Image Flip: Turn the current video image vertically. Schedule Settings of Image Parameters Click the “Profile Management” tab as shown below. Set full time schedule for common, day, night mode and specified time schedule for day and night. Choose “Timing” in the drop-down box of schedule as shown below. Drag “...
Page 25
Video Quality: It can be adjusted when the bitrate type is set to VBR. The higher the image quality, the more bitrate will be required. I Frame interval: It determines how many frames are allowed between a “group of pictures”. When a new scene begins in a video, until that scene ends, the entire group of frames (or pictures) can be considered as a group of pictures.
4.2.3 OSD Configuration Go to Image→OSD interface as shown below. Set time stamp, device name, OSD content and picture overlap here. After enabling the corresponding display and entering the content, drag them to change their position. Then click the “Save” button to save the settings. Picture Overlap Settings: Check “OSD Content1”, choose “Picture Overlay”...
Click the “Save” button to save the settings. Return to the live to verify that the area have been drawn as shown as blocked out in the image. To clear the video mask: Click the “Clear” button to delete the current video mask area. 4.2.5 ROI Configuration Go to Image→ROI Config interface as shown below.
4.2.6 Lens Control This function is only available for the model with motorized zoom lens. Within this section, zoom and focus can be controlled. If the image is out of focus after a manual adjustment, one key focus can be used to set the focus automatically. Go to Config→Image→ Zoom/Focus interface to set.
4.4 Alarm Configuration 4.4.1 Motion Detection Go to Alarm→Motion Detection to set motion detection alarm. Check “Enable” check box to activate motion based alarms. If unchecked, the camera will not send out any signals to trigger motion-based recording to the NVR or CMS, even if there is motion in the video.
Set motion detection area and sensitivity. Click the “Area and Sensitivity” tab to go to the interface as shown below. Move the “Sensitivity” scroll bar to set the sensitivity. Higher sensitivity value means that motion will be triggered more easily. Select “Add”...
Page 31
⚫ SD Card Error When there are some errors in writing SD card, the corresponding alarms will be triggered. Go to Config→Alarm→Anomaly→SD Card Error as shown below. Click “Enable”. Set the alarm holding time and alarm trigger options. Trigger alarm out, Email and FTP. The setup steps are the same as motion detection.
⚫ Cable Disconnection Go to Config→Alarm→Anomaly→Cable Disconnected as shown below. Click “Enable” and set the alarm holding time. Trigger alarm out. When the camera is disconnected, the system will trigger the alarm out. 4.4.3 Alarm In To set sensor alarm (alarm in): Go to Config→Alarm→Alarm In interface as shown below.
Click “Save” button to save the settings. Set the schedule of the sensor alarm. The setup steps of the schedule are the same as the schedule recording setup. (See 4.1.4.1 Schedule Recording Settings). If there are two sensors, please select the sensor ID. Click “Apply settings to” to quickly apply the settings to the other alarm input.
Timing: Select the alarm type. Then click “Add” and drag the mouse on the timeline to set the schedule of alarm out; click “Erase” and drag the mouse on the timeline to erase the set time schedule. After this schedule is saved, the alarm out will be triggered in the specified time. 4.4.5 Alarm Server Go to Alarm→Alarm Server interface as shown below.
4.5 Event Configuration For more accuracy, here are some recommendations for installation. Cameras should be installed on stable surfaces, as vibrations can affect the accuracy of ⚫ detection. Avoid pointing the camera at the reflective surfaces (like shiny floors, mirrors, glass, lake ⚫...
Page 36
Set the alarm holding time and alarm trigger options. The setup steps are the same as motion detection. Please refer to 4.4.1 Motion Detection for details. Click “Save” button to save the settings. Set the alarm area of the abandoned/missing object detection. Click the “Area” tab to go to the interface as shown below.
4.5.2 Video Exception This function can detect changes in the surveillance environment affected by the external factors. To set exception detection: Go to Config→Event→Video Exception interface as shown below. Enable the applicable detection that’s desired. Scene Change Detection: Alarms will be triggered if the scene of the monitor video has changed.
The sensitivity value of Video Blur Detection: The higher the value is, the more sensitive the system responds to the blurriness of the image. The sensitivity value of Video Cast Detection: The higher the value is, the more sensitive the system responds to the obscuring of the image. ※...
Page 39
⚫ Motor Vehicle: Select it and then alarms will be triggered if a vehicle with four or more wheels (eg. a car, bus or truck) crosses the pre-defined alarm lines. ⚫ Non-motor Vehicle: Select it and then alarms will be triggered if a vehicle with two wheels (eg.
Avoid the scenes with many trees or the scenes with various light changes (like many flashing headlights). The ambient brightness of the scenes shouldn’t be too low. Cameras should be mounted at a height of 2.8 meters or above. Keep the mounting angle of the camera at about 45°. The detected objects should not be less than 1% of the entire image and the largest sizes of the detected objects should not be more than 1/8 of the entire image.
Page 41
Detection Target: ⚫ Human: Select it and then alarms will be triggered if someone intrudes into the pre-defined area. ⚫ Motor Vehicle: Select it and then alarms will be triggered if a vehicle with four or more wheels (eg. a car, bus or truck) intrudes into the pre-defined area. ⚫...
4.5.5 Region Exiting Region Exiting: Alarms will be triggered if the target exits from the pre-defined areas. Go to Config→Event→Region Exiting interface as shown below. Enable region exiting detection and select the snapshot type and the detection target. Set the alarm holding time and alarm trigger options. Set the alarm area of the region exiting detection.
4.5.6 Target Counting by Line This function is to calculate the number of the people or vehicles crossing the alarm line through detecting, tracking and counting the shapes of the people or vehicles. Go to Config→Event→Target Counting by Line as shown below. Enable target counting by line and select the snapshot type and the detection target.
Page 44
Set the alarm line. Click the “Area” tab to go to the interface as shown below. Set the alarm line number and direction. Only one alarm line can be added. Direction:A->B and A<-B can be optional. The direction of the arrow is entrance. Statistics: If enabled, you can see the statistical information in the live view interface.
Page 45
View the statistical information of target counting by line. Click Statistics→Target Counting by Line to enter the following interface. Select the Report Type. Daily Report, Weekly Report, Monthly Report, and Annual Report are selectable. Select the Count Type. Enter or leave can be optional. Select the start time and then click “Count”.
4.5.7 Target Counting by Area This function is to calculate the number of the people or vehicles intruding into the pre-defined area through detecting, tracking and counting the shapes of the people or vehicles. Go to Config→Event→Target Counting by Area as shown below. Enable target counting by area, select the snapshot type, the detection target, counting reset and alarm linkages.
Page 47
View the statistical information in the live view interface. View the statistical information of target counting by area. Click Statistics→Target Counting by Area to enter the following interface. Please select Report Type, Count Type and Count Time as needed. Then click “Count” to search the statistic result.
4.5.8 Region Intrusion Region Intrusion: Alarms will be triggered if the target intrudes into the pre-defined areas. This function can be applicable to important supervision places, danger areas and prohibited areas, like military administrative zones, high danger areas, no man’s areas, etc. Go to Config→Event→Region Intrusion interface as shown below.
Page 49
Set the alarm holding time. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to motion detection chapter for details. Click the “Save” button to save the settings. Set the alarm area of the region intrusion detection. Click the “Area” tab to go to the interface as shown below.
Crowd Density function is to detect the number of people in the surveillance scene. Alarms will be triggered when crowd density exceeds the set threshold. Note that this function is only applicable to GV-BX2802. The setting steps are as follows: 1.
Page 51
Set the alarm area of crowd density detection. Click the “Area” tab to go to the interface as shown below. Click the “Draw Area” button and then click around the area where you want to set as the alarm area in the image on the left side (the alarm area should be a closed area). Click the “Stop Draw”...
4.5.10 Face Detection Face detection function is to detect the face appearing in the surveillance scene. Alarms will be triggered when a face is detected. The setting steps are as follows: Go to Config→Event→Face Detection as shown below. Enable the face detection function. Save Source Information to SD Card: if checked, the whole picture will be saved to the local PC or SD card when detecting a face.
Page 53
Set alarm detection area. Click “Draw Area” and drag the border lines of the rectangle to modify its size. Move the rectangle to change its position. Click “Stop Draw” to stop drawing the area. Click “Clear” to clear the area. Then set the detectable face size by defining the maximum value and the minimum value (The default size range of a single face image occupies from 3% to 50% of the entire image).
The depression angle of the camera shall be less than or equal to 15°. The object distance depends on the focal-length of the lens mounted in the camera. To ensure the accuracy of face detection, the requirements for face capture are: left or right turn angle is less than about 30°;...
Page 55
Click the “Draw Area” button and then click around the area where you want to set as the alarm area in the image on the left side (the alarm area should be a closed area). Click the “Stop Draw” button to stop drawing. Click the “Clear” button to delete the alarm area. Click the “Save”...
4.6 Network Configuration 4.6.1 TCP/IP Go to Config→Network→TCP/IP interface as shown below. There are two ways for network connection. Use IP address (take IPv4 for example): There are two options for IP setup: obtain an IP address automatically by DHCP and use the following IP address. Please choose one of the options as needed.
4.6.2 Port Go to Config→Network→Port interface as shown below. HTTP port, Data port and RTSP port can be set. HTTP Port: The default HTTP port is 80. It can be changed to any port which is not occupied. HTTPS Port: The default HTTPs port is 443. It can be changed to any port which is not occupied.
4.6.4 Onvif The camera can be searched and connected to the third-party platform via ONVIF/RTSP protocol. If “Activate Onvif User” is enabled in the device activation interface, the ONVIF user can be activated simultanously. When you connect the camera through the ONVIF protocol in the third-party platform, you can use this onvif user to connect.
Apply for a domain name. Take www.dvrdyndns.com for example. Enter www.dvrdydns.com in the IE address bar to visit its website. Then Click the “Registration” button. Create domain name. After the domain name is successfully applied for, the domain name will be listed as below. Enter the username, password, domain you apply for in the DDNS configuration interface.
Page 60
Go to Config→Network→SNMP. Check the corresponding version checkbox (Enable SNMPv1, Enable SNMPv2, Enable SNMPv3) according to the version of the SNMP software that will be used. Set the values for “Read SNMP Community”, “Write SNMP Community”, “Trap Address”, “Trap Port” and so on. Please make sure the settings are the same as that of the SNMP software.
4.6.7 802.1x If it is enabled, the camera’s data can be protected. When the camera is connected to the network protected by the IEE802.1x, user authentication is needed. To use this function, the camera shall be connected to a switch supporting 802.1x protocol. The switch can be reckoned as an authentication system to identify the device in a local network.
Audio: Having entered the main/sub stream in a VLC player, the video and audio will play automatically. If “Allow anonymous login…” is checked, there is no need to enter the username and password to view the video. If “Automatic Start” is enabled, the multicast received data should be added into a VLC player to play the video.
4.6.10 UPNP If this function is enabled, the camera can be quickly accessed through the LAN. Go to Config→Network→UPnP. Enable UPNP and then enter UPnP name. 4.6.11 Email If you need to trigger Email when an alarm happens or IP address is changed, please set the Email here first.
Click the “Test” button to test the connection of the account. Recipient Address: Receiver’s e-mail address. 4.6.12 FTP After an FTP server is set up, captured pictures from events will be uploaded to the FTP server. 1. Go to Config→Network →FTP. Click “Add”...
FTP file path: \00-18-ae-a8-da-2a\VFD\2021-01-09\14\ Event name table: File Name Event Type IP address change MOTION Motion Detection SENSOR Sensor Alarm TRIPWIRE Line Crossing Detection PERIMETER Region Intrusion Detection Object Abandoned/Missing Video Exception Face Detection AOIENTRY Region Entrance AOILEAVE Region Exiting PASSLINECOUNT Target Counting by Line TRAFFIC...
After the above parameters are set, click “Save” to save the settings. Then the camera will automatically connect the third-party platform. The online state can be viewed in the above interface. After the camera is successfully connected, it will send the alarm information (HTTP format) to the third-party platform once the smart alarm is triggered.
*Click “Create a certificate request” to enter the following interface. Click “Create” to create the certificate request. Then download the certificate request and submit it to the trusted certificate authority for signature. After receiving the signed certificate, import the certificate to the device. 4.6.15 QoS QoS (Quality of Service) function is used to provide different quality of services for different network applications.
4.7 Security Configuration 4.7.1 User Configuration Go to Config→Security→User interface as shown below. Add user: Click the “Add” button to pop up the following textbox. Enter user name in the “User Name” textbox. Enter the password in the “Password” and “Confirm Password” textbox. Please set the password according to the requirement of the password security level (Go to Config→Security→Security Management→Password Security interface to set the security level).
Page 69
Modify user: Select a user to modify password in the user configuration list box. The “Edit user” dialog box pops up by clicking the “Modify” button. Enter the old password of the user in the “Old Password” text box. Enter the new password in the “New password” and “Confirm Password” text box. Select the user permissions for advanced or normal user.
4.7.2 Online User Go to Config→Security→Online User to view the user who is viewing the live video. An administrator user can kick out all the other users (including other administrators). 4.7.3 Block and Allow Lists Go to Config→Security→Block and Allow Lists as shown below. The setup steps are as follows: Check the “Enable address filtering”...
Page 71
⚫ Password Security Please set the password level and expiration time as needed. Password Level: Weak, Medium or Strong. ⚫ Weak: Numbers, special characters, upper or lower case letters can be used. You can choose one of them or any combination of them when setting the password. ⚫...
4.8 Maintenance Configuration 4.8.1 Backup and Restore Go to Config→Maintenance→Backup & Restore. Import & Export Settings ⚫ Configuration settings of the camera can be exported form a camera into another camera. Click “Browse” to select the save path for import or export information on the PC. Click the “Import Setting”...
4.8.3 Upgrade Go to Config→Maintenance→Upgrade. In this interface, the camera firmware can be updated. Click the “Browse” button to select the save path of the upgrade file Click the “Upgrade” button to start upgrading the firmware. Enter the correct password and then the device will restart automatically IMPORTANT: Do not close the browser or disconnect the camera from the network during the upgrade.
Chapter 5 Search 5.1 Image Search Click Search to go to the interface as shown below. Images that are saved on the SD card can be found here. Note: When using the plug-in free browser, the local images cannot be searched. ⚫...
Page 75
Click to return to the previous interface. ⚫ SD Card Image Search 1. Choose “Picture”—“SD Card”. 2. Set time: Select date and choose the start and end time. 3. Choose the alarm events at the bottom of the interface. 4. Click to search the images.
5.2 Video Search 5.2.1 Local Video Search Click Search to go to the interface as shown below. Videos were recorded locally to the PC can be played in this interface. Note: When using the plug-in free browser, the local videos cannot be searched. 1.
Icon Description Icon Description Play button. After pausing the video, click this Pause button button to continue playing. Stop button Speed down Watermark Speed up display Enable / disable audio; drag the slider to adjust the volume after enabling audio. 5.2.2 SD Card Video Search Click Search to go to the interface as shown below.
Page 78
Note: cannot be displayed in the above interface via the plug-in free browser. Additionally, for plug-in free playback, playback mode switch (balanced / real-time / fluent mode) and downloading functions are not supported too. The time table can be shown in 24H / 12H / 2H / 1H format by clicking the corresponding buttons.
Appendix Troubleshooting How to find the password? A: The password for admin can be reset through “Edit Safety Question” function. Click “Forget Password?” on the login page and enter the corresponding answer of the selected question in the popup window. After you correctly answer all questions, you can reset the password for admin.
Page 80
B. Other plug-ins or anti-virus blocks the plug-in. Please uninstall or close them. No sound can be heard. A: Audio input device is not connected. Please connect and try again. B: Audio function is not enabled at the corresponding channel. Please enable this function.
Need help?
Do you have a question about the GV-BX2802 and is the answer not in the manual?
Questions and answers