Dahua Technology DH-PFR4K-B240 User Manual
Dahua Technology DH-PFR4K-B240 User Manual

Dahua Technology DH-PFR4K-B240 User Manual

Security radar

Advertisement

Quick Links

Security Radar
User's Manual
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V1.0.2

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DH-PFR4K-B240 and is the answer not in the manual?

Questions and answers

Summary of Contents for Dahua Technology DH-PFR4K-B240

  • Page 1 Security Radar User’s Manual User’s Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.2...
  • Page 2: Foreword

    The manual is applicable to multiple radar models. The figures are for reference only, and might differ from the actual products. Models DH-PFR4K-E50, DH-PFR4K-E120, DH-PFR4K-B240, DH-PFR4K-D300, DH-PFR4K-D450 Safety Instructions The following categorized signal words with defined meaning might appear in the manual.
  • Page 3 User’s Manual For detailed information, see the paper manual, CD-ROM, QR code or our official website. If there is inconsistency between paper manual and the electronic version, the electronic version shall prevail. All the designs and software are subject to change without prior written notice. The product ...
  • Page 4: Important Safeguards And Warnings

    User’s Manual Important Safeguards and Warnings The following contents are about the proper ways of using the radar, preventing dangers and property damage when it is in use. Read the manual carefully before using the radar, strictly abide by the manual and properly keep it for future reference. Operation Requirements Do not place or install the radar in a place exposed to sunlight or near the heat source.
  • Page 5: Table Of Contents

    User’s Manual Table of Contents Foreword ................................I Important Safeguards and Warnings ......................III 1 Network Configuration ..........................1 Network Connection................................. 1 Logging in to Web Client ................................. 1 1.2.1 Device Initialization ..............................1 1.2.2 First-time Login ................................4 1.2.3 Forgetting Password ..............................6 2 Live View ................................
  • Page 6 User’s Manual 4.2.5 SMTP (Email) ................................. 44 4.2.6 UPnP ....................................46 4.2.7 SNMP ....................................47 4.2.8 Bonjour ................................... 49 4.2.9 Multicast ..................................50 4.2.10 802.1x .................................... 51 4.2.11 QoS ....................................51 4.2.12 Access Platform ................................. 52 Event Management ................................. 53 4.3.1 Alarm ....................................
  • Page 7: Network Configuration

    User’s Manual Network Configuration Network Connection There are mainly two connection methods between the radar and PC. See Figure 1-1 and Figure 1-2. Figure 1-1 Connected by network cable Figure 1-2 Connected through router or switch The IP address of the radar is 192.168.1.108 by default. You need to use IP segment reasonably according to actual network environment so that the radar can connect to network.
  • Page 8 User’s Manual Figure 1-3 Device initialization Step 2 Set the password. See Figure 1-4. The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special characters (excluding ' "...
  • Page 9 User’s Manual Click Save. Step 4 The End-User License Agreement interface is displayed. Step 5 Select I have read and agree to all terms check box, and then click Next. Figure 1-5 Read on-screen notifications, select P2P check box as needed, and then click Next. Step 6 Figure 1-6 Online upgrade...
  • Page 10: First-Time Login

    User’s Manual Figure 1-7 Country or region setting Select region, language, and video standard as needed, and then click Save. Step 8 The login interface is displayed. See Figure 1-8. Figure 1-8 Login 1.2.2 First-time Login You need to download and install the plug-in for the first-time login. Step 1 Enter username and password, and then click Login.
  • Page 11 User’s Manual Figure 1-9 Install the plug-in If you enter the wrong password for continuously 5 times, the account will be locked for 5 minutes. After the locked time ends, you can log in to the radar again. You can set the allowed wrong password times in Setting >...
  • Page 12: Forgetting Password

    User’s Manual The Live interface might vary with different device models, and the actual interface shall prevail. 1.2.3 Forgetting Password You can reset the admin password through the reserved email address when you forget it. Step 1 Open IE browser, enter the IP address of the radar in the address bar, and then press Enter. The login interface is displayed.
  • Page 13 User’s Manual Figure 1-13 QR code Step 4 Read notes and scan the QR code. Enter security code acquired from the reserved email and then click Next. The password resetting interface is displayed. See Figure 1-14. Reset the password within 24 hours after you get the security code; otherwise it will be invalid.
  • Page 14 User’s Manual The password must consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special characters (excluding ' " ; : &). Follow the password strength prompt to set a password with high security. Click Save.
  • Page 15: Live View

    User’s Manual Live View You can do the operations such as watching live video, taking snapshots and records, and setting video stream. Figure 2-1 Live view Table 2-1 Live view parameter descriptions Description Name Set encoding mode. Video tool. Adjust video window. Function tabs.
  • Page 16: Video Window Adjustment

    User’s Manual Figure 2-3 Video tool Table 2-2 Video tool parameter descriptions Name Description Bit Rate Display the current video bit rate. Resolution Display the current video resolution. Click the icon, and then draw a box at any area to zoom in the selected part. Digital Scroll on the selected part to zoom in or zoom out the image;...
  • Page 17: System Menu

    User’s Manual Name Description Click the icon to set window split mode. Single live image: . It is set by default. 4–6 Window split Double live images: Four live images: Click the icon, click the small window at the lower-right corner of the main Picture in live image, and then double-click the linked camera from the Device List.
  • Page 18: Device List

    User’s Manual Name Description You can click the icon to enable or disable alarm manually. Snapshot See Table 2-2. Record See Table 2-2. Device List You can view IP addresses of radar and the linked cameras, and set video stream. See Figure 2-7. Figure 2-7 Device list Click...
  • Page 19 User’s Manual Before using PTZ control, you need to add a PTZ camera. For details, see "4.1.2 PTZ Camera."  PTZ control can only be operated on the selected camera channel.  For PTZ control bar, see Figure 2-9. For detailed icon descriptions, see Table 2-6. Figure 2-9 PTZ Control Table 2-6 PTZ control descriptions...
  • Page 20: Playback

    User’s Manual Playback You can play back snapshots and videos saved in SD card. Snapshot and video playback configurations are only for radar on this web.  Before playback, you need to configure parameters such as record and snapshot schedule, ...
  • Page 21: Playing Video

    User’s Manual Figure 3-2 Video playback Table 3-1 Video playback function descriptions Description Video playing bar. For details, see "3.1.1 Playing Video." Time bar. Record type. For details, see "3.1.2 Record Types." Auxiliary functions. For details, see "3.1.3 Auxiliary Functions. " Record files.
  • Page 22: Record Types

    User’s Manual Name Description Slow play Click the icon to play slowly. Fast play Click the icon to play fast. 3.1.2 Record Types Select the record type, and only selected files will be displayed in the time bar and file list. See Figure 3-4.
  • Page 23: Clipping Records

    User’s Manual Figure 3-6 Select records Table 3-4 Record parameter descriptions Parameter Description File Type Select dav for video playback. Data Src Data source. It is from SD card by default. File list. Click the icon, and then the video files of the selected date will be displayed in the list.
  • Page 24: Time Format Of The Time Bar

    User’s Manual Step 7 Click , and the clipped video will be saved in the path of video clips. For details, see "4.1.1.4 Storage Path." 3.1.6 Time Format of the Time Bar You can set time format of the time bar as 24 h, 2 h, 1 h, and 30 min. For details, see Figure 3-8 and Table 3-5.
  • Page 25: Playing Snapshots

    User’s Manual Snapshot type. For details, see "3.2.2 Snapshot Files. " Snapshot file. For details, see "3.2.3 Snapshot Types. " 3.2.1 Playing Snapshots You can play and pause playing snapshots. See Figure 3-10. Figure 3-10 Picture playing bar 3.2.2 Snapshot Files Select file type, data source, and date, and then you can play back snapshots.
  • Page 26: Snapshot Types

    User’s Manual Figure 3-12 Device list On device list interface, you can double-click the file to play back pictures. For more icon descriptions, see Table 3-8. Table 3-8 Device list icon descriptions Icon Description Click the icon to search all snapshot files within the start time and end time of selected date.
  • Page 27: Setting

    User’s Manual Setting This chapter introduces how to configure and view the radar information, including settings about radar, network, event, storage, and system. Radar You can make configurations about radar such as setting video and snapshot parameters, adding PTZ cameras, doing radar and camera linkage, managing protection zone, and setting IVS. 4.1.1 Video You can set video stream, snapshots, overlay, and storage path.
  • Page 28 User’s Manual Table 4-1 Video stream parameter descriptions Parameter Description By selecting Enable check box or not, you can enable or disable the sub Enable stream. It is enabled by default. Encode Mode Select the encode mode from H.264, H.264H, H.264B, and H.265. Enable smart codec to improve video compressibility and save storage space.
  • Page 29 User’s Manual Figure 4-2 Set snapshot Step 2 Configure parameters as needed. For details, see Table 4-2. Table 4-2 Snapshot parameter descriptions Parameter Description General: The system takes snapshots as scheduled. For details of schedule  setting, see "4.4.1 Schedule. " Snapshot Type Event: The system takes snapshots when the external alarm is triggered.
  • Page 30 User’s Manual Figure 4-3 Channel title Figure 4-4 Time title...
  • Page 31 User’s Manual Figure 4-5 OSD information Figure 4-6 Font...
  • Page 32 User’s Manual Figure 4-7 Picture overlay Figure 4-8 Abnormal Table 4-3 Overlay configuration parameter descriptions Name Description Enable or disable Channel Title to be overlaid on the video image. Drag the Channel Title Channel Title box to adjust the display position. Enable or disable Time Title to be overlaid on the video image.
  • Page 33: Ptz Camera

    User’s Manual Name Description Set the font colour and font size of channel title, time title, and OSD Font information. Enable or disable picture to be overlaid on the video image. Click Upload Picture to overlay the local picture on the video image. Drag the yellow box to adjust the picture display position.
  • Page 34: Linkage

    User’s Manual Figure 4-10 Add PTZ camera Step 2 Click Add PTZ Camera. Figure 4-11 Add PTZ camera Step 3 Enter IP address, port, camera name, type, username, and password. Port is set to 80 by default. Keep the port consistent with the PTZ camera. Step 4 Click Save.
  • Page 35 User’s Manual Figure 4-12 Linkage Click Choose to import a map. Step 2 .png, .jpg, and .bmp format are supported. Figure 4-13 Import a map Step 3 Crop the map according to the detection range of the radar. Drag the box to select the range, and then click Cut Map.
  • Page 36 User’s Manual On the web client, click Draw Line to draw the measured distance on the image. Click and hold the left mouse button to start drawing, and then release the button to complete drawing. Double-click the map to enter full screen display to draw the line more ...
  • Page 37 User’s Manual Radar calibration is only for Radar-PTZ Linkage, and you can skip this setting as needed. Select a PTZ camera in PTZ Camera List, and then enter the username and password used Step 1 to log in to the web interface of the camera. You must log in to the PTZ camera before calibration.
  • Page 38: Region Management

    User’s Manual to the feet of A and adjust the PTZ camera image to make sure the target takes up 1/2 of the image. Click to save the settings. For separate installation, repeat the above steps to add the second set of radar coordinate.
  • Page 39 User’s Manual The area you draw can exceed the edges of the detection region. Figure 4-17 Draw an area Click Setup to configure arming periods. Step 6 Figure 4-18 Set arming periods Set arming periods, and the alarm can only be triggered when it occurs during the defined period.
  • Page 40 User’s Manual  Method two: Click Setting of the day you want to set. Select the check box in front of the time period to enable it. Enter start time and end time of that time period. Select All or the check box of any other day, and the set time period will apply to ...
  • Page 41: Protection Zone Management

    User’s Manual Name Description The alarm keeps running for the defined time (from 10 s to 300 s) after the Alarm Delay alarm is ended. By selecting Send Email, the system automatically sends email to the specified mailbox when the alarm is triggered. You can configure the mailbox Send Email in Setting >...
  • Page 42 User’s Manual Figure 4-19 50 m/120 m protection zone management Figure 4-20 240 m protection zone management...
  • Page 43 User’s Manual Figure 4-21 300 m/450 m protection zone management Step 2 Configure parameters as needed. Table 4-6 Parameter descriptions of protection zone management Name Description Trajectory Trajectory duration of targets, ranging from 3 s to 30 s. Duration You can select different channels for radar to avoid co-channel interference. Applicable to 50 m/120 m radar.
  • Page 44: Ivs Setup

    User’s Manual Name Description The maximum tracking time of each target, ranging from 1 s to 15 s. Track Time Track time is only for Tour track mode. Step 3 Click Save. 4.1.6 IVS Setup You can select environment mode, set displaying scale of the tracked target, and radar structuring. Select Setting >...
  • Page 45 User’s Manual Confirm the radar has connected to network correctly before setting network parameters.  Allocate IP address of the same network segment if there is no router in the network.  Set corresponding gateway and subnet mask if there is a router in the network. ...
  • Page 46 User’s Manual Parameter Description selecting Static mode. Subnet Mask IPV6 has no subnet mask.  The default gateway must be in the same network segment with the IP  Default Gateway address. Preferred DNS IP address of the preferred DNS. Alternate DNS IP address of the Alternate DNS.
  • Page 47: Port

    User’s Manual Table 4-9 Command list Parameter Description Arp -s <IP Address> <MAC> Ping -l 480 -t < IP Address > Windows syntax Example: Arp -s 192.168.0.125 11-40-8c-18-10-11 Ping -l 480 -t 192.168.0.125 Arp -s <IP Address> <MAC> Ping -s 480 < IP Address > UNIX/Linux/Mac Example: syntax...
  • Page 48 User’s Manual Step 2 Configure port parameters. See Table 4-10. The configuration of Max Connection takes effect immediately and others after the  radar is restarted. 0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, 42323 are  occupied for specific uses. It is not recommended to use the default value of other ports during port ...
  • Page 49: Pppoe

    User’s Manual Parameter Description HTTPs communication port, the default value is 443, and it can be modified as HTTPs Port needed. Click Save. Step 3 4.2.3 PPPoE Point-to-Point Protocol over Ethernet, it is one of the protocols that device uses to connect to the Internet.
  • Page 50: Smtp (Email)

    User’s Manual Figure 4-26 DDNS (1) Step 2 Select DDNS Type, and then configure the parameters as needed. See Table 4-11. Table 4-11 DDNS parameter descriptions Parameter Description The name and web address of the DDNS service provider, see the matching relationship below: Type CN99 DDNS...
  • Page 51 User’s Manual Figure 4-27 SMTP (Email) Step 2 Configure parameters. See Table 4-12. Table 4-12 SMTP (Email) parameter descriptions Parameter Description IP address of SMTP server that sends SMTP Server emails. Port number of the SMTP server that Port For the detailed configuration, see sends emails.
  • Page 52: Upnp

    User’s Manual For the configuration of major mailboxes, see Table 4-13. Table 4-13 Major mailbox configuration Mailbox SMTP Server Authentication Port Description The authentication type cannot be  None. You need to enable SMTP service in  your mailbox. The authentication code is required ...
  • Page 53: Snmp

    User’s Manual For UPnP configuration on radar web interface, see following steps. Select Setting > Network > UPnP. Step 1 The UPnP interface is displayed. See Figure 4-28. Figure 4-28 UPnP Step 2 Select Enable to enable UPnP function, and there are two mapping modes: Custom and Default.
  • Page 54 User’s Manual Figure 4-30 SNMP (2) Step 2 Select SNMP version to enable SNMP. In the Trap Address, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB Browser installed, and leave other parameters as the default. Table 4-14 SNMP parameter descriptions Parameter Description...
  • Page 55: Bonjour

    User’s Manual Parameter Description The target port of the trap information sent by the software agent of the Trap Port radar. The name is public by default. Read-only Username You can enter number, letter, and underline to form the name. The name is private by default.
  • Page 56: Multicast

    User’s Manual Figure 4-31 Bonjour Step 2 Select Enable, and then configure server name. Step 3 Click Save. In the operating system and clients that support Bonjour, follow steps below to visit the radar web interface with Safari browser. Click Show all bookmarks in Safari. Step 1 Step 2 Enable Bonjour, and then, in your LAN, all the radars which enable Bonjour are displayed.
  • Page 57: Qos

    User’s Manual Click Save. Step 4 The multicast configuration of TS is similar to RTP, and you can refer to the previous steps. 4.2.10 802.1x 802.1x (port based network access control protocol) supports manual selection of authentication method. Device can be connected to LAN after passing 802.1 x authentications. It well supports authentication, charging, safety and management requirement of network.
  • Page 58: Access Platform

    User’s Manual Figure 4-34 Step 2 Configure parameters. See Table 4-17. Table 4-17 QoS parameter descriptions Parameter Description Realtime Configure the priority of the data packets that used for network monitoring. 0 Monitor is the lowest and 63 is the highest. Configure the priority of the data packets that used for configuration or Command search.
  • Page 59: Event Management

    User’s Manual Step 2 Log in to mobile phone client, and then tap the cross icon at the upper-right corner of the app on the Device interface. Scan the QR code on the P2P interface. Step 3 Step 4 Follow on-screen instructions to finish the configurations. 4.2.12.2 ONVIF The ONVIF (Open Network Video Interface Forum) allows the network video products (including video recording device and other recording devices) from different manufacturers to mutually...
  • Page 60 User’s Manual Figure 4-37 Alarm linkage Select Enable check box to enable the alarm linkage, and configure parameters as Step 2 needed. Configure arming period.  Click Setting. The Period interface is displayed. See Figure 4-38.
  • Page 61 User’s Manual Figure 4-38 Set arm period Set arming periods, and the alarm can only be triggered when it occurs during the defined period. The time period in green on the timeline is armed.  Method one: Click Setting of the day you want to set. Directly press and drag the left mouse button on the timeline.
  • Page 62: Abnormality

    User’s Manual Parameter Description By selecting Record, the system will record automatically when the alarm is triggered. Record Before enabling this function, you need to configure record period in Setting > Storage > Schedule > Record. For details, see "4.4.1.1 Record Schedule." In Setting >...
  • Page 63 User’s Manual Step 2 Configure parameters as needed. For details, see Table 4-19. For other parameter descriptions, see Table 4-18. Table 4-19 SD card parameter descriptions Parameter Description Event Type Select SD card abnormality from no SD card, SD card error, and capacity warning. Enable Select Enable check box to enable SD card abnormality detection.
  • Page 64 User’s Manual 4.3.2.3 Illegal Access When the entering times of wrong password have exceeded the defined times, the alarm is triggered. Select Setting > Event > Abnormality > Illegal Access. Step 1 The Illegal Access interface is displayed. See Figure 4-41. Figure 4-41 Illegal access Step 2...
  • Page 65 User’s Manual Figure 4-42 Security exception Step 2 Configure parameters as needed. For other parameter descriptions, see Table 4-18. Click Save. Step 3 4.3.2.5 Scene Changing When scene changing happens, the alarm will be triggered. See conditions below. The vertical detection range of the radar is covered for more than 50%. ...
  • Page 66: Storage

    User’s Manual Storage This chapter introduces configurations of schedules for records, snapshots, and holiday, storage methods, and record control. 4.4.1 Schedule You can configure schedules of records, snapshots, and holidays. Before configuring schedule, set Record Mode as Auto in Setting > Storage > Record Control. If you select Off, the system will not record video or take snapshot as scheduled.
  • Page 67 User’s Manual Figure 4-45 Set schedule Enter start time and end time of the time period, and select record type from General and Alarm. Select All or the check box of any other day, and the set time period will apply to ...
  • Page 68 User’s Manual Figure 4-46 Snapshot schedule Step 2 Configure time periods. For details, see previous record schedule settings. Click Save. Step 3 4.4.1.3 Holiday Schedule Set certain days as holiday, and when the Record or Snapshot is selected in the holiday schedule, the system takes snapshot or records as holiday schedule defined.
  • Page 69: Destination

    User’s Manual Figure 4-47 Holiday schedule Step 2 Select the days to be set as holiday as needed. The selected days has yellow background. Step 3 Select from Record and Snapshot, and then click Save. Step 4 On Record or Snapshot interface, click Setting behind Holiday, and then you can set detection type and detection period.
  • Page 70 User’s Manual Figure 4-48 Path Step 2 Select the storage path for the records and snapshots of different event types as needed. For detailed parameter descriptions, see Table 4-22. Table 4-22 Path parameter descriptions Parameter Description Select from Scheduled and Alarm. It matches with the record types on the Event Type schedule interface.
  • Page 71 User’s Manual 4.4.2.3 FTP When the network fails or is disconnected, you can save all the files to the internal SD card for emergency. FTP function can be enabled only when the storage path is selected as FTP. Select Setting > Storage > Destination > FTP. Step 1 The FTP interface is displayed.
  • Page 72: Record Control

    User’s Manual The NAS interface is displayed. See Figure 4-51. Figure 4-51 Step 2 Configure NAS parameters. See Table 4-24. Table 4-24 NAS parameter descriptions Parameter Description Select Enable check box to enable NFS or SMB function. NFS (Network File System): A file system which enables computers in the ...
  • Page 73: System

    User’s Manual Figure 4-52 Record control Step 2 Configure record control parameters. See Step 2. Table 4-25 Record control parameter descriptions Parameter Description Pack Set the pack duration of each record; it is 30 min by default. Duration The time period for which the system records video before alarm starts. If the value is 5, then the system records video for 5 s before alarm starts and then save it to the record.
  • Page 74: General

    User’s Manual 4.5.1 General You can configure radar name, system language and video format. Select Setting > System > General > General. Step 1 The General interface is displayed, see Figure 4-53. Figure 4-53 General Configure General parameters. See Table 4-26. Step 2 Table 4-26 General parameter descriptions Parameter...
  • Page 75 User’s Manual Figure 4-54 Date & Time Step 2 Configure Date & Time parameters. See Table 4-27. Table 4-27 Date & Time parameter descriptions Parameter Description Date Format Select the date format. Time Format Select the time format from 12-hour or 24-hour. Time Zone Select the time zone that the radar is at.
  • Page 76: Account

    User’s Manual 4.5.3 Account You can add, delete, or modify users and groups. Managing users and groups are only available for administrator users. The maximum length of the user or group name is 15 characters. A user name can only ...
  • Page 77 User’s Manual Adding a User You can add users to the group, and configure user authority. As a default user with the highest authority, admin cannot be deleted. Step 1 Click Add User. The Add User interface is displayed. See Figure 4-56. Figure 4-56 Add user Step 2...
  • Page 78 User’s Manual Figure 4-57 Restricted login Click Save. Step 4 Modifying a User Step 1 Click of the selected user. The Modify User interface is displayed. See Figure 4-58.
  • Page 79 User’s Manual Figure 4-58 Modify user Step 2 Modify user information as needed. Click Save. Step 3 Modifying the Password Step 1 Click of the selected user. The Modify User interface is displayed. Step 2 Select Modify Password check box. Step 3 Enter the old password, new password, and then confirm the password.
  • Page 80: Onvif User

    User’s Manual Figure 4-59 Group name Adding a Group For details, see "4.5.3.1 User. " Modifying a Group For details, see "4.5.3.1 User. " Deleting a Group For details, see "4.5.3.1 User. " 4.5.4 Onvif User You can add, delete, and modify Onvif users. Select Setting >...
  • Page 81: Safety

    User’s Manual Figure 4-61 Add user Step 3 Set username, password, and select group. Click Save. Step 4 Click to modify user information. 4.5.5 Safety You can set RTSP authentication, system service, HTTPS, and firewall to ensure the safety of data transmission.
  • Page 82 User’s Manual If you select Basic and click Save, the prompt "Basic authentication mode may have  risk. Are you sure to enable it?" will pop up to remind you about the risk. Be careful. 4.5.5.2 System Service You can configure system services and ensure system security. Select Setting >...
  • Page 83 User’s Manual Function Description decryption. Encryption function is not supported when transmitting audio and  video date between the radar and the third party platform and device. To ensure data security, we recommend you to disable CGI service, Onvif service, and Genetec service. Enabled by default.
  • Page 84 User’s Manual Figure 4-65 Install certificate Click Download to download root certificate. The Save As dialog box is displayed. See Figure 4-66. Figure 4-66 Download certificate Select storage path, and then click Save. Double-click the RootCert.cer icon. The Certificate interface is displayed. See Figure 4-67.
  • Page 85 User’s Manual Figure 4-67 Certificate Click Install Certificate…. The Certificate Import Wizard interface is displayed. See Figure 4-68.
  • Page 86 User’s Manual Figure 4-68 Certificate import wizard Click Next. Select Trusted Root Certification Authorities. See Figure 4-69. Figure 4-69 Store certificate Click Next.
  • Page 87 User’s Manual The Completing the Certificate Import Wizard interface is displayed. See Figure 4-70. Figure 4-70 Complete certificate import wizard Click Finish. The Security Warning dialog box is displayed. See Figure 4-71. Figure 4-71 Security warning...
  • Page 88: Firewall

    User’s Manual Click Yes. The The import was successful dialog box is displayed. Click OK to finish download. See Figure 4-72. Figure 4-72 Import successfully If you select Install Signed Certificate, follow the steps below.  Select Setting > System > Security > HTTPS. The HTTPS interface is displayed.
  • Page 89 User’s Manual You cannot set port number when MAC address is added to the trusted or banned list.  When the IP addresses of the radar and your PC are in the same LAN, MAC verification takes  effect. When you access the radar through Internet, MAC address verifies according to the router ...
  • Page 90: Default

    User’s Manual Figure 4-75 Add IP/MAC Configure parameters. For details, see Table 4-29. Table 4-29 Parameter descriptions of adding IP/MAC Parameter Description IP address: Select IP version and enter the IP address of the host  to be added. IP segment: Select IP version and enter the start address and ...
  • Page 91: Import/Export

    User’s Manual Figure 4-76 Default Click Default, and then all the configurations except IP address and account management will  be restored to default. Click Factory Default, and all the configurations will be restored to factory settings.  4.5.8 Import/Export Export the system configuration file to back up the system configuration.
  • Page 92: Upgrade

    User’s Manual Step 2 Configure auto maintain parameters. See Table 4-30. Table 4-30 Auto maintain parameter descriptions Parameter Description Auto Reboot Select Auto Reboot, and then configure the auto rebooting time. Select Auto Delete Old Files check box, and then configure the time; the time range is 1 to 31 days.
  • Page 93: Information

    User’s Manual In order to inform you to upgrade in time, we need to collect the information such as device name, device IP address, firmware version, and device serial number. All the collected information is only used to verify device legality and send upgrade messages.
  • Page 94 User’s Manual Figure 4-81 Configure Start time and End time, and then select log type. Step 2 The start time should be later than January 1st, 2000, and the end time should be  earlier than December 31, 2037. The log type includes All, System, Setting, Data, Event, Record, Account, and ...
  • Page 95: Remote Log

    User’s Manual 4.6.3 Remote Log You can upload the log information to the log server. Select Setting > Information > Log > Remote Log. Step 1 The Remote Log interface is displayed. See Figure 4-82. Figure 4-82 Remote log Select Enable check box to enable the remote log function. Step 2 Step 3 Set the IP address, port, and device number as needed.
  • Page 96: Alarm

    User’s Manual Alarm You can subscribe alarm messages and view the triggered alarm event information on the right column of Alarm interface. Alarm prompt and alarm tone can also be selected as a reminder. Click Alarm tab, and then the Alarm interface is displayed. See Figure 5-1. For more parameter descriptions, see Table 5-1.
  • Page 97 User’s Manual Parameter Name Description Select the function and choose audio file. When alarm Play Alarm Tone occurs, system automatically generates alarm audio. Alarm Tone Tone Path Select Browse… to choose alarm audio file.
  • Page 98: Logging Out

    User’s Manual Logging out Click Logout tab, and then the system goes back to login interface. See Figure 6-1. Figure 6-1 Login...
  • Page 99: Appendix 1 Cybersecurity Recommendations

    User’s Manual Cybersecurity Recommendations Appendix 1 Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 100 User’s Manual We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel.
  • Page 101 User’s Manual Establish the 802.1x access authentication system to reduce the risk of unauthorized  access to private networks. Enable IP/MAC address filtering function to limit the range of hosts allowed to access the  device.
  • Page 102 User’s Manual...

This manual is also suitable for:

Dh-pfr4k-e120Dh-pfr4k-e50Dh-pfr4k-d300Dh-pfr4k-d450

Table of Contents