Table of Contents

Advertisement

Quick Links

IVSS
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V6.0.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IVSS and is the answer not in the manual?

Questions and answers

Summary of Contents for Dahua Technology IVSS

  • Page 1 IVSS User's Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V6.0.0...
  • Page 2: Foreword

    Foreword General This manual introduces the installation, functions and operations of the intelligent video surveillance server (hereinafter referred to as "the Device" or "IVSS"). Read carefully before using the device, and keep the manual safe for future reference. Models Number of...
  • Page 3 ● Added entries frequency. ● Added HDD installation introduction to December 2020 V3.3.0 the 8-HDD series. ● Added IVSS-M series. ● Added passerby database. ● Added IVS model switch ● Added algorithm version in the device list. November 2020 V3.2.0 ●...
  • Page 4 User's Manual Version Revision Content Release Time V2.0.0 Updated figures of 16-HDD series IVSS. December 2018 V1.0.0 First release. November 2018 Privacy Protection Notice As the device user or data controller, you might collect the personal data of others such as their face, fingerprints, and license plate number.
  • Page 5 User's Manual Icon/Button Description Select the checkboxes to select multiple menu items at the same time. means selected. Check the box to select one menu item, means selected. Click the icon to view the drop-down list. ● : Disabled. ● : Enabled Refresh the data.
  • Page 6: Important Safeguards And Warnings

    User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, and comply with the guidelines when using it. Operation Requirements ●...
  • Page 7 User's Manual any injuries or damages caused by the use of a nonstandard power adapter. ● Do not place the Device in a place exposed to sunlight or near heat sources. ● Keep the Device away from dampness, dust, and soot. ●...
  • Page 8 User's Manual Storage Requirements Store the Device under allowed humidity and temperature conditions.
  • Page 9: Table Of Contents

    User's Manual Table of Contents Foreword ........................................I Important Safeguards and Warnings ............................. V 1 Overview ........................................1 1.1 Introduction ....................................1 1.2 Login Mode ....................................1 2 The Grand Tour ...................................... 2 2.1 8-HDD Series ....................................2 2.1.1 Front Panel ..................................2 2.1.2 Rear Panel ...................................
  • Page 10 User's Manual 3.4.2 Connection Diagram ..............................38 4 Starting the Device .................................... 39 5 Initial Settings ...................................... 40 5.1 Initializing the Device ................................40 5.2 Quick Settings ................................... 43 5.2.1 Configuring IP Address .............................. 43 5.2.2 Configuring P2P Settings ............................45 5.3 Login ......................................
  • Page 11 User's Manual 6.3.2.1 Configuration Procedure ..........................69 6.3.2.2 Enabling the Smart Plan ..........................69 6.3.2.3 Configuring Remote Face Database ......................69 6.3.2.3.1 Creating a Remote Face Database ....................69 6.3.2.3.2 Adding Face Images for Remote Devices ..................70 6.3.2.4 Configuring Face Comparison (by Camera) ..................73 6.3.2.5 Live View of Face Comparison ........................
  • Page 12 User's Manual 6.3.5.2 Configuring Face Detection (by Recorder) .................... 88 6.3.5.3 Configuring Local Face Database ......................89 6.3.5.4 Configuring Face Comparison (by Recorder) ..................89 6.3.5.5 Live View ................................89 6.3.5.6 Face Search ................................90 6.3.6 Video Metadata + Face Comparison by Recorder ..................90 6.3.6.1 Configuration Procedure ..........................
  • Page 13 User's Manual 6.6.3.1 Setting Attribute Display ..........................108 6.6.3.2 Live View ................................110 6.6.4 IVS Search ..................................111 6.7 ANPR ......................................112 6.7.1 Enabling the Smart Plan ............................112 6.7.2 Setting ANPR ................................112 6.7.3 Live View of ANPR ..............................112 6.7.3.1 Setting Attribute Display ..........................
  • Page 14 User's Manual 6.10.1 Enabling the Smart Plan ............................128 6.10.2 Configuring Call Alarm ............................128 6.10.3 Live View of Call Alarm ............................128 6.10.4 Call Alarm Search ..............................128 6.11 Smoking Alarm ..................................129 6.11.1 Enabling the Smart Plan ............................129 6.11.2 Configuring Smoking Alarm ..........................
  • Page 15 User's Manual 7.2 Recorded Files ..................................150 7.2.1 Playing back Recorded Videos ..........................150 7.2.2 Clipping a Video ................................. 153 7.2.3 Video Tag ..................................154 7.2.4 Searching for Snapshots ............................155 7.2.5 Backing up Files ................................155 7.2.6 Locking Files ................................. 156 7.2.7 Auxiliary Functions ..............................
  • Page 16 User's Manual 8.2.1.1 Configuring IP Address ..........................174 8.2.1.2 Port Aggregation ............................175 8.2.1.2.1 Binding NICs ............................176 8.2.1.2.2 Cancelling Binding NIC ........................178 8.2.1.3 Setting Port Number ............................. 179 8.2.2 Network Apps ................................180 8.2.2.1 P2P ..................................180 8.2.2.2 Register ................................181 8.2.2.3 Email ..................................
  • Page 17 User's Manual 8.3.2.4.3 Video Quality Analytics ........................205 8.3.2.5 Configuring Local Alarm ..........................207 8.3.3 Remote Device ................................208 8.3.3.1 Video Detection ............................... 209 8.3.3.1.1 Configuring Video Motion Detection ..................209 8.3.3.1.2 Tampering ............................... 210 8.3.3.2 Offline Alarm ..............................211 8.3.3.3 IPC External Alarm ............................
  • Page 18 User's Manual 8.5.3.1 Firewall ................................. 234 8.5.3.2 Account Lockout .............................. 234 8.5.3.3 Anti-Dos Attack ..............................235 8.5.3.4 Time Synchronization Permission ......................236 8.5.4 CA Certificate ................................237 8.5.4.1 Installing the Device Certificate ......................237 8.5.4.2 Installing the Trusted Certificate ......................239 8.5.5 Video Encryption ...............................
  • Page 19 User's Manual 9.2.4 Viewing Storage Information ..........................262 9.3 System Resources ................................. 262 9.3.1 Viewing Device Resources ............................. 262 9.3.2 Viewing AI Module Information ......................... 263 9.4 Network Maintenance ................................ 263 9.4.1 Online User ..................................263 9.4.2 Network Test ................................264 9.5 Disk Maintenance .................................
  • Page 20 User's Manual Appendix 3 RAID ....................................281 Appendix 4 HDD Capacity Calculation ............................. 283 Appendix 5 Particulate and Gaseous Contamination Specifications ............... 284 Appendix 5.1 Particulate Contamination Specifications ..................284 Appendix 5.2 Gaseous Contamination Specifications ....................284 Appendix 6 Cybersecurity Recommendations ........................286...
  • Page 21: Overview

    1 Overview 1.1 Introduction As an intelligent video surveillance server (hereinafter referred to as IVSS or the Device), IVSS delivers not only the basic video surveillance functions, but also a bunch of advanced AI features including face comparison, perimeter protection, video metadata and ANPR, providing AI-based all-in-one surveillance solution for customers.
  • Page 22: The Grand Tour

    User's Manual 2 The Grand Tour This section introduces front panel, rear panel, port function and button function, indicator light status, and so on. 2.1 8-HDD Series 2.1.1 Front Panel Figure 2-1 Front panel Table 2-1 Front panel description Button/Port Description Boot up or shut down device.
  • Page 23: Rear Panel

    User's Manual 2.1.2 Rear Panel Figure 2-2 IVSS7008 rear panel Figure 2-3 IVSS7008-M rear panel Figure 2-4 IVSS7108-M rear panel Table 2-2 Rear panel description Button/Port Description Power Power on-off button. Power input Inputs 100–240 VAC power. Displays AI module status. ●...
  • Page 24 User's Manual Button/Port Description AUDIO IN Audio input port. AUDIO OUT Audio output port. High definition audio and video signal output port. The port outputs the uncompressed high definition video HDMI and multi-channel audio data to the connected display with HDMI port. The HDMI ports are different source output.
  • Page 25: Dimensions

    User's Manual 2.1.3 Dimensions Figure 2-5 Dimension (mm [inch]) 2.2 12-HDD Series 2.2.1 Front Panel Figure 2-6 Front panel...
  • Page 26 User's Manual Table 2-3 Front panel description Button/Port Description Boot up or shut down device. Power indicator light status is as follows: ● When device is off (indicator light is off), press the button Power for a short period to boot up device. ●...
  • Page 27: Rear Panel

    User's Manual 2.2.2 Rear Panel Figure 2-7 IVSS7012 rear panel (the single-power series) Figure 2-8 IVSS7012 rear panel (the redundant series) Figure 2-9 IVSS7012-M rear panel Figure 2-10 IVSS7112 rear panel (with single power supply)
  • Page 28 User's Manual Figure 2-11 IVSS7112 rear panel (with single power supply) Table 2-4 Rear panel description Name Description Power input port Inputs 100–240 VAC power. Displays AI module status. ● The yellow light flashes: AI module is running properly. AI module indicator light ●...
  • Page 29 User's Manual Name Description High definition audio and video signal output port. The port outputs the uncompressed high definition video HDMI port and multi-channel audio data to the connected display with HDMI port. The HDMI ports are different source output. Connects to external devices such as USB storage USB port device, keyboard and mouse.
  • Page 30: Dimensions

    User's Manual 2.2.3 Dimensions Figure 2-12 Dimensions (mm [inch])
  • Page 31: 16-Hdd Series

    User's Manual 2.3 16-HDD Series ● The Device has an embedded display on select models. ● The Device has power redundancy on select models. 2.3.1 Front Panel Figure 2-13 Front panel with LCD Figure 2-14 Front panel without LCD Table 2-5 Front panel description Button/Port Description Once the front panel lock is secure, it can prevent HDD from...
  • Page 32: Rear Panel

    User's Manual Button/Port Description Displays the system running status. System status ● The blue light is on: Device is running properly. indicator light ● The indicator light is off: The device is not running. Displays local input alarm status. ● Red indicator light is on: There is local alarm input event. Alarm indicator light ●...
  • Page 33 User's Manual Figure 2-16 IVSS7016 rear panel (redundant power) Figure 2-17 IVSS7016-M rear panel (single power) Figure 2-18 IVSS7016-M rear panel (redundant power) Table 2-6 IVSS7016 rear panel description Name Description Power input port Inputs 100–240 VAC power. Displays AI module status. ●...
  • Page 34 User's Manual Name Description RESET button Reserved. High definition audio and video signal output port. The port outputs the uncompressed high HDMI port definition video and multi-channel audio data to the connected display with HDMI port. The three HDMI ports are different source output. VGA video output port.
  • Page 35 User's Manual Figure 2-19 IVSS7116 rear panel (single power) Figure 2-20 IVSS7116 rear panel (redundant power) Table 2-7 IVSS7116 rear panel description Name Description Inputs 100-127 VAC/200-240 VAC power. Power input port Some devices only have one power port. Displays AI module status. ●...
  • Page 36 User's Manual Name Description SATA peripheral port. Connects to SATA port or eSATA port eSATA device. VGA video output port. It outputs analog video VGA port signal. The VGA port and HDMI 1 port are same source output. PCI-E X4 PCI Express port.
  • Page 37: Dimensions

    User's Manual 2.3.3 Dimensions Figure 2-21 Dimensions with LCD (mm [inch])
  • Page 38 User's Manual Figure 2-22 Dimensions without LCD (mm [inch])
  • Page 39: 24-Hdd Series

    User's Manual 2.4 24-HDD Series 2.4.1 Front Panel Figure 2-23 Front panel with LCD Figure 2-24 Front panel without LCD Table 2-8 Front panel description Button/Port Description Boot up or shut down device. The power on-off button has the indicator light. It can display device- running status.
  • Page 40: Rear Panel

    User's Manual Button/Port Description Once the front panel lock is secure, it can prevent HDD from being stolen or removed by mistake. Front panel lock Unlock the front panel lock and remove the front panel, you can view 16 HDD slots. After you remove the front panel, you can see there are 24 HDDs.
  • Page 41 User's Manual Figure 2-27 IVSS7024-M rear panel (single power) Figure 2-28 IVSS7024-M rear panel (redundant power) Table 2-9 Rear panel description (1) Button/Port Description Power input port Inputs 100–240 VAC power. 16 groups (1–16) alarm input ports. They are corresponding to ALARM 1–ALARM 16. The alarm becomes valid in low level.
  • Page 42 User's Manual Button/Port Description 8 groups of alarm output ports (NO1 C1–NO8 C8). They output alarm signal to the alarm device. Please make sure there is power to the external alarm device. Alarm Output ● NO: Alarm output port of Normally Open type. ●...
  • Page 43 User's Manual Figure 2-29 IVSS7124 rear panel (single power) Figure 2-30 IVSS7124-M rear panel (redundant power) Table 2-10 Rear panel description (2) Name Description Power input port Inputs 100V-127V/200-240V AC power. 16 groups (1–16) alarm input ports. They are corresponding to ALARM 1–ALARM 16. The alarm becomes valid in low level.
  • Page 44 User's Manual Name Description 8 groups of alarm output ports (NO1 C1–NO8 C8). They output alarm signal to the alarm device. Please make sure there is power to the external alarm device. Alarm Output ● NO: Alarm output port of Normally Open type. ●...
  • Page 45: Dimensions

    User's Manual 2.4.3 Dimensions Figure 2-31 Dimensions with LCD (mm [inch])
  • Page 46 User's Manual Figure 2-32 Dimensions without LCD (mm [inch])
  • Page 47 User's Manual...
  • Page 48: Hardware Installation

    User's Manual 3 Hardware Installation This section introduces HDD installation, cable connection, and so on. Some series product is heavy. It needs several persons to carry or move, in order to prevent person injury. 3.1 Installation Flow Figure 3-1 Installation flow 3.2 Unpacking the Box When you receive the Device, please check against the following checking list.
  • Page 49: Hdd Installation

    User's Manual 3.3 HDD Installation The section introduces the detailed operations to install HDD. Different models support different HDD numbers. 3.3.1 8-HDD Series Procedure Step 1 Remove the 2 screws on the rear panel. Figure 3-2 Remove screws Step 2 Remove the chassis cover in the direction indicated by the arrow.
  • Page 50 User's Manual Figure 3-4 Remove HDD holder Step 4 Align the 4 screw holes on the HDD to the 4 screw holes on the HDD holder, and then tighten the screws. Figure 3-5 Install HDD (1) Step 5 Repeat step 4 to install the other HDDs on the holder. Figure 3-6 Install HDD (2) Step 6 Repeat step 5 to install HDDs on the other holder.
  • Page 51 User's Manual Figure 3-7 Install HDD (3) Step 7 Align the left and right 2 pairs of holes of the two holders to the corresponding holes on the chassis, place the holders on the chassis, and then tighten the screws on the edge of the holders.
  • Page 52: 12-Hdd Series

    ① Press the button on the ③ Insert the HDD box into closely along the upper side front panel of IVSS, open the of the box and press down to the HDD slot, press it to the handle, and then pull out the...
  • Page 53: 16/24-Hdd Series

    ① Press the button on the then close the handle. ② Put the HDD into the box front panel of IVSS, open the along the direction shown in handle, and then pull out the the figure.
  • Page 54: Cable Connection

    ① Press the button on the ③ Take out the HDD and back of the HDD box. front panel of IVSS, open the reinsert the box to the slot. handle, and then pull out the Push it to the bottom and The screws are at different HDD box.
  • Page 55: Alarm Port

    User's Manual 3.4.1.2 Alarm Port Figure 3-9 8-HDD series Figure 3-10 12-HDD series Figure 3-11 16/24-HDD series (1)
  • Page 56: Alarm Input

    User's Manual Figure 3-12 16/24-HDD series (2) Table 3-2 Alarm port Icon Description They are corresponding to ALARM 1–ALARM 16. The alarm 1–16 becomes valid in low level. NO1 C1–NO8 C8 Eight groups of normally open linkage output (on-off value). +12V Constant power output, 500 mA current.
  • Page 57: Alarm Output

    User's Manual Figure 3-13 NC alarm input connection 3.4.1.4 Alarm Output ● The alarm output is on-off output (Normally Open Contact), and there should be external power supply to alarm output device. ● RS-485 A line and B line: connecting the A line and B line on the PTZ decoder. ●...
  • Page 58: Connection Diagram

    User's Manual Model HRB1-S-DC5V Electrical 30 times per minute Operating ambient temperature -30 °C to +70 °C 3.4.2 Connection Diagram The following steps are to connect 16-HDD series device. See the actual product for detailed information. The following figure is for reference only. ●...
  • Page 59: Starting The Device

    User's Manual 4 Starting the Device ● Before starting the device, make sure that the input voltage shall match the device power requirement. ● To ensure stable operation of the device and prolong service life of HDD, provide stable voltage with less ripple interference by reference to international standard.
  • Page 60: Initial Settings

    User's Manual 5 Initial Settings When using the Device for the first time, initialize the device, and set basic information and functions first. 5.1 Initializing the Device If it is your first time to use the device after purchasing or after restoring factory defaults, set a login password of admin (system default user).
  • Page 61 User's Manual Figure 5-2 Time Table 5-1 Time parameters description Parameter Description Time Zone Select the time zone of the Device. Set system date and time manually or by synchronizing with NTP server time. ● Manual Settings: Select date and time from the calendar. Time ●...
  • Page 62 User's Manual Table 5-2 Description of password parameters Parameter Description Username The default username is admin. Password Set admin login password, and then confirm the password. Confirm Password Click to view the password requirement. Step 5 Configure password protection settings. You can use the linked email address or answer the security questions to reset admin password.
  • Page 63: Quick Settings

    User's Manual 5.2 Quick Settings On the page that prompts you initialization succeeded, click Quick Config to quickly set the IP address and P2P. 5.2.1 Configuring IP Address Configure the IP address and DNS server information of the Device according to network planning. Make sure that at least one Ethernet port has been connected to the network before you set IP address.
  • Page 64 User's Manual Figure 5-6 Edit Ethernet network 2) Set parameters. Table 5-4 NIC parameters description Parameter Description The maximum network transmission speed that the current NIC Rate (Mbps) supports. Type Select IPv4 or IPv6. ● DHCP: When there is a DHCP server on the network, you can enable DHCP.
  • Page 65: Configuring P2P Settings

    User's Manual Make sure that the default NIC is online. Step 5 Click Next. 5.2.2 Configuring P2P Settings P2P is a peer to peer technology. You can scan the QR code to download the mobile app without DDNS service or the port mapping or installing the transmission server. After you register the Device to the app, you can view the remote videos, play back recorded videos and more.
  • Page 66: Logging In To The Pc Client

    User's Manual After initializing the Device, you have logged in by default. Now you can configure system settings and operate. 5.3.1 Logging in to the PC Client Log in to the PC client for system configuration and operation. Procedure Step 1 Download the PC client.
  • Page 67: Logging In To Local Interface

    User's Manual 5.3.2 Logging in to Local Interface Prerequisites Ensure that the Device is connected with display, mouse and keyboard. For cable connection, see "3.4 Cable Connection". Procedure Step 1 Turn on the Device. Step 2 Enter username and password. ●...
  • Page 68: Home Page

    User's Manual Figure 5-9 Login (web) 5.4 Home Page Figure 5-10 Home page...
  • Page 69: Configuring Remote Devices

    User's Manual When you log in to the local interface, you can click to control the screens. For details, see "7.5.1 Multiple-screen Control". Table 5-5 Home page description Name Description You can access the configuration of accounts, network, events, and Configuration list more from the configuration list or by clicking on the upper-right...
  • Page 70 User's Manual Figure 5-11 Access management Step 4 Under the Quick Add tab, click Start Search. The search results are displayed. To filter the search results, you can click Step 5 Select an uninitialized remote device and then click Initialize. next to Initialization Status and then select Uninitialized to show uninitialized Click remote devices only.
  • Page 71: Adding Remote Devices

    User's Manual ● Enter incremental value only when you want to change IP addresses of several devices at the same time. The system will allocate IP address one by one with the fourth part of the IP address increasing by the incremental value. ●...
  • Page 72 User's Manual Figure 5-12 Search results Table 5-7 Description of search results Parameter Description Click Start Search to search for remote devices again. Click Stop Search Start Search to stop search. Click Connection Password to set the username and password for the remote devices.
  • Page 73: Manual Add

    User's Manual ● During the adding process, click Cancel to cancel adding the remote device. ● If a remote device is in exception due to network disconnection or other reasons, it can still be added. It comes online after the exception is resolved. Click Add more or Complete.
  • Page 74 Parameters Description Select a channel number for the remote device on IVSS. Channel No. If you select Auto Allocation, IVSS will provide a channel number automatically. Select the connection protocol of the remote device. Private is selected by Manufacturer default.
  • Page 75: Rtsp

    User's Manual Parameters Description Enter the HTTP port number. The default port number is 80. The value ranges from 1 through 65535. HTTP Port After changing the HTTP port number, you need to add the HTTP port number to the IP address in the address bar of the browser so that you can log in to the web interface of the remote device.
  • Page 76: Batch Add

    User's Manual Step 3 Under the Access Management tab, click Add. You can also click Add under the device tree. Figure 5-15 Access management Step 4 Under the RTSP tab, enter the RTSP address. The RTSP address format is rtsp://<username>:<password>@<IP address >:<port>/cam/realmonitor?channel=1&subtype=0.
  • Page 77 User's Manual You can also click Add under the device tree. Figure 5-17 Access management Step 4 Under the Batch Import tab, click Download Template to download the template. ● On the PC client, click at the top of the client, select Download to view the storage path.
  • Page 78 User's Manual Step 6 Import the template. 1) Under the Batch Import tab, clickBrowse to select the file that you have filled in. 2) Select an import mode. ● Overwrite: The system removes the added remote devices before importing new devices.
  • Page 79: Ai Operations

    The AI detections can be performed by the camera (AI by Camera) or by IVSS (AI by Recorder). ● AI by Camera: If you use AI by Camera for intelligent detection, the intelligent analysis job is completed on the camera, and the Device just receives and displays the results.
  • Page 80: Face Detection

    User's Manual AI Events by Recorder or Camera Table 6-1 AI Events by Recorder or Camera AI Event AI by Camera AI by Recorder Face Detection Face Comparison People Counting Video Metadata Crowd Distribution Call Alarm Smoking Alarm ANPR Plate Comparison 6.2 Face Detection An alarm is triggered when human faces are detected within the detection zone.
  • Page 81: Configuring Face Detection

    User's Manual 6.2.2 Configuring Face Detection Configure the alarm rule of face detection. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event. You can also click Event from the configuration list on the home page. Step 3 Select a remote device on the device tree, and then select Smart Plan >...
  • Page 82: Live View Of Face Detection

    User's Manual Parameter Description Set snapshot sensitivity during the face detection. The higher the Snapshot Sensitivity sensitivity, the easier for the system to detect a face. When the snapshot mode is Quality Priority, the system detects face Quality Threshold attributes only when the quality of captured face image exceeds the configured threshold.
  • Page 83: Live View

    User's Manual Each face attribute is broken down into more specific groups. For example, you can select Male, Female or Unknown for Gender. Figure 6-3 Attribute display Step 6 Click Save. 6.2.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. ●...
  • Page 84: Face Search

    User's Manual Figure 6-4 Face records Table 6-3 Management of face records Icon Operation Use this face image to search all channels for the records of the current face. Download the face snapshot and related video. When operating on the local interface, you need to insert a USB storage device into the Device.
  • Page 85: Searching By Image

    User's Manual Step 3 Select Search by Face > Search by Attributes. Select one or more remote devices, and then set Event Type to Face Detection. Step 4 Step 5 Set face attributes and search period. Step 6 Click Search. Related Operations Point to a record, and then the following icons are displayed.
  • Page 86: Uploading Face Images

    User's Manual connect the USB storage device to the Device. ◇ When operating on the web or PC client, save the images on your computer. The function of search by image is not available with AI by Camera. 6.2.4.2.1 Uploading Face Images You can upload up to 50 face images from the following sources.
  • Page 87: Searching Devices

    User's Manual ● When the uploaded image is half-length photo or full-body photo, the system automatically processes the image to retain only the face area. ● When there are multiple faces in an image, the system automatically identifies the faces in the image and uploads multiple face images according to the number of faces recognized.
  • Page 88: Exporting Face Records

    After you search for face images under the AI Search tab, you can export the search results. ● When operating on the local interface, you need to insert a USB storage device into your IVSS. ● If you have configured alarm-linked picture storage, the exported alarm-linked snapshot contains the face snapshot and the background picture.
  • Page 89: Face Comparison By Camera

    User's Manual ● Face comparison by Camera + face comparison by Recorder. For details, see "6.3.4 Face Comparison by Camera + Face Comparison by Recorder". ● Face detection by Recorder + face comparison by Recorder. For details, see "6.3.5 Face Detection by Recorder + Face Comparison by Recorder".
  • Page 90: Adding Face Images For Remote Devices

    User's Manual Related Operations ● View face database details and status. Figure 6-8 Face database Table 6-5 Parameters of face database Description Face database name. Click to change the name. Number of face images in the face database. Number of face images that failed to be modeled. Remote devices associated to this face database for face comparison.
  • Page 91 User's Manual Make sure that you have obtained the face images and saved them in the proper path. ● When operating on the local interface, save the images in a USB storage device and then connect the USB storage device to the Device. ●...
  • Page 92 User's Manual Item Description Credential type Enter the corresponding number. 1. ID card, 2. Passport, 5. Others. Credential No. Fill in the corresponding credential No. Address Enter the detailed address. 1. Log in to the PC client. 2. Select File Management > Face Database Config > Sample Database > Remote. 3.
  • Page 93: Configuring Face Comparison (By Camera)

    User's Manual ● Click Save to save current face image information and complete registration. 6.3.2.4 Configuring Face Comparison (by Camera) Configure the alarm rule of face comparison. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Event. Step 2 Click You can also click Event from the configuration list on the home page.
  • Page 94: Live View

    User's Manual similarity between a detected face and one in the face database reaches the threshold. ● If the Stranger panel is selected, it is displayed on the live video when the similarity between a detected face and one in the face database does not reach the threshold. ●...
  • Page 95: Face Search

    User's Manual ● The number next to at the upper-right corner of the Live page represents the number of detected faces. ● You can view the detection time, the detected face image, face image in the database, comparison result and database name on the features panel on the right side of the Live page. After enabling the stranger mode, when the detected face image has no match in the database, a Stranger tag appears on the features panel.
  • Page 96: Searching By Image

    User's Manual Related Operations Point to a record, and then the following icons are displayed. Table 6-8 Management of search results Icon Operation Click the icon to select the record. To select all the records at a time, select the checkbox next to Select All. Use this face image to search all channels for the records of the current face.
  • Page 97: Configuring Face Detection (By Camera)

    User's Manual 6.3.3.3 Configuring Face Detection (by Camera) Configure the alarm rule of face detection. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Event. Step 2 Click You can also click Event from the configuration list on the home page. Step 3 Select a remote device on the device tree, and then select Smart Plan >...
  • Page 98 User's Manual ● Quantity: The proportion of the number of added face images in the sample databases and passerby databases to the allowed face images in total. ● Data Capacity: The proportion of the space occupied by the sample databases and passerby databases to the allowed space in total.
  • Page 99: Exporting A Face Database

    User's Manual Click to search for images in the database by name, gender, birthday, credential type and No., and modeling status. ● Arm the face database. For details, see "6.3.2.4 Configuring Face Comparison (by Camera)". ● Delete face databases: ◇ One by one: Click ◇...
  • Page 100 User's Manual 4. Click and select a face image. ● When the uploaded image is half-length photo or full-body photo, the system automatically processes the image to retain only the face area. ● When there are multiple faces in an image, the system automatically identifies the faces in the image.
  • Page 101: Creating A Passerby Database

    User's Manual 4. Click Import Database. 5. Click Browse to select a bin file, enter the password that you set when exporting the database, and then click OK. A bin file is divided into multiple parts when being exported if it is larger than 4 GB. When importing the file parts, you just need to select any one part of the file, and then all parts are imported.
  • Page 102 User's Manual Figure 6-15 Passerby database Table 6-10 Parameters of creating passerby database Parameter Description Name Enter the name of the database. Configure how many face images the database can store. ● Maximum = Total number of face images of the Device - the face Number of Images image number of the current sample databases - the face image number of the current passerby databases.
  • Page 103 User's Manual Parameter Description When the captured face snapshot has a match in the passerby database, and its quality is higher than that of the one in the database, the system replaces the face image in the database with the snapshot. In this case, the duplicate face will not trigger a event.
  • Page 104: Modeling Faces

    User's Manual 6.3.3.4.5 Modeling Faces Model faces to abstract the information of the face image and then import the information to the database. After that, the Device can compare human face, and search for human face. ● After you add face images to the databases, the images will be modeled automatically. This section is for reference when modeling failed or you want to model the images again.
  • Page 105: Configuring Face Comparison (By Recorder)

    User's Manual ● If there are many databases, you can enter all or part of the database and then click Search to search for the database. ● Cancel the selection of Reserve data in original database if you want to delete the copied face images in the original database.
  • Page 106 User's Manual Click and then you can go to the Face Database Config page where you can configure the face databases. Figure 6-17 Configure face comparison (by recorder) 2) Configure the parameters. Table 6-12 Configuration of target face database Icon/Parameter Description The selected database is enabled by default.
  • Page 107: Live View

    User's Manual 6.3.3.6 Live View You can view real-time face comparison images. For details, see "6.3.2.5 Live View of Face Comparison". 6.3.3.7 Face Search You can search face records by attributes or by image, and then export the search results. For details, see "6.2.4 Face Search".
  • Page 108: Face Search

    User's Manual 6.3.4.7 Face Search You can search face records by attributes or by image, and then export the search results. For details, see "6.2.4 Face Search". 6.3.5 Face Detection by Recorder + Face Comparison by Recorder 6.3.5.1 Configuration Procedure Figure 6-20 Configure face detection (AI by recorder) Figure 6-21 Configure face comparison (AI by recorder) 6.3.5.2 Configuring Face Detection (by Recorder)
  • Page 109: Configuring Local Face Database

    User's Manual Figure 6-22 Snapshot mode Table 6-14 Parameters of snapshot mode Parameter Description Snapshot Angle Filter Set snapshot angle to be filtered during face detection. Set snapshot sensitivity during the face detection. The higher Snapshot Sensitivity the sensitivity, the easier for the system to detect a face. When the snapshot mode is Quality Priority, the system Quality Threshold detects face attributes only when the quality of captured face...
  • Page 110: Face Search

    User's Manual Comparison". 6.3.5.6 Face Search You can search face records by attributes or by image, and then export the search results. For details, see "6.2.4 Face Search". 6.3.6 Video Metadata + Face Comparison by Recorder For scenes that prioritize the accuracy of face comparison, we recommend the combination of face detection and face comparison.
  • Page 111: Face Search

    User's Manual 6.3.6.6 Face Search You can search face records by attributes or by image, and then export the search results. For details, see "6.2.4 Face Search". 6.4 People Counting This Device can count the people flow, in-area people number, and queuing number in the detection zone.
  • Page 112: Configuring In Area No

    User's Manual Parameter Description Exit No. Number of people that exited. The number of stay is the result of entry number minus exit Stay No. number. An alarm is triggered when the stay number reaches the threshold. Step 7 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period.
  • Page 113: Configuring Queuing Detection

    User's Manual Table 6-16 Parameter description of in-area people counting Parameter Description 1. Click to enable the alarm. 2. Set people number threshold. ● If you select≥ Threshold and then enter a number, an alarm is triggered when the detected number is larger or equal to the number that you entered.
  • Page 114: Live View

    User's Manual Table 6-17 Parameter description of queuing detection Parameter Description 1. Click to enable the alarm. 2. Set people number threshold. ● If you select≥ Threshold and then enter a number, an alarm is triggered when the detected number is larger or equal to the number that you entered.
  • Page 115: Video Metadata

    User's Manual Counting. Step 5 Select a statistics type. ● When the event type is People counting, you cannot select the statistics type. ● When the event type is Area People counting, you can select the statistics type from People Counting and Average Stay Time, and then select the stay time (5 s, 30 s, 60 ◇...
  • Page 116: Live View Of Video Metadata

    User's Manual You can also click Event from the configuration list on the home page. Select a remote device on the device tree, and then select Smart Plan > Video Metadata. Step 3 Step 4 Configure video metadata. ● AI by Camera. 1.
  • Page 117: Setting Attribute Display

    User's Manual 6.5.3.1 Setting Attribute Display Configure the display rule of video metadata detection results. Prerequisites Before using this function, make sure that view has been created. See "7.1.1 View Management" for detailed information. Procedure Step 1 Log in to the PC client. Under the Live tab, open a view window.
  • Page 118: Live View

    User's Manual Figure 6-26 Attribute display Step 6 Click Save. 6.5.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. The video image of the view is displayed. ● The target box is displayed in real-time in the video image. Different detection targets correspond to different colors of target boxes.
  • Page 119: Ai Search

    User's Manual Icon Operation Download the snapshot and related video. When operating on the local interface, you need to insert a USB storage device into the Device. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 120 User's Manual Figure 6-27 Search by human attributes Step 6 Select an alarm type. ● Match Attributes Alarm: Search for alarms triggered when the detected target matches the defined attributes. ● Mismatch Attributes Alarm: Search for alarms triggered when the detected target does not match the defined attributes.
  • Page 121: Searching By Image

    User's Manual Icon Operation Export the snapshot, video and video player. To export in batches, select multiple records, and then click Export to export snapshots, videos or excel. After you set alarm linkage snapshot, the system exports detected images and panoramic images at the time of snapshot. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 122: Vehicle Search

    User's Manual ● The number on the lower-right corner of the thumbnail represents the number of records found. Click each thumbnail to display the search results of that human image. ● On each panel of search results, you can view the human image, human attributes and similarity.
  • Page 123 User's Manual Figure 6-28 Search by vehicle attributes Step 7 Click Search. If license plate is detected, both the scene of the vehicle and the license plate will be displayed. Related Operations Point to a record, and then the following icons are displayed. Table 6-20 Management of search results Icon Operation...
  • Page 124: Non-Motor Vehicle Search

    User's Manual Icon Operation Add this image to the plate database. 6.5.4.3 Non-motor Vehicle Search Search for non-motor vehicle detection results. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the Live page, or select AI Search on the home page.
  • Page 125: Enabling The Smart Plan

    User's Manual Some models only support some IVS functions by Recorder. 6.6.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first. For details, see "6.2.1 Enabling the Smart Plan". 6.6.2 Configuring IVS 6.6.2.1 Global Configuration Configure global rules of IVS.
  • Page 126 User's Manual Table 6-22 IVS functions description Functions Description Scene When the target crosses tripwire from the defined motion Tripwire direction, an alarm is triggered, and then the system performs Scenes with sparse targets and no configured alarm linkages. occlusion among targets, such as the perimeter protection of unattended When the target enters, leaves, or area.
  • Page 127 User's Manual This section uses the configuration of tripwire as the example. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event. You can also click Event from the configuration list on the home page. Step 3 Select a remote device on the device tree, and then select Smart Plan >...
  • Page 128: Live View Of Ivs

    User's Manual Sensitivity is available when AI by Recorder is used, or when AI by Camera is used and the camera supports this function. Step 6 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period.
  • Page 129 User's Manual Figure 6-29 Human...
  • Page 130: Live View

    User's Manual Figure 6-30 Motor vehicle Step 4 Configure AI attributes settings. With AI Attributes Settings enabled by default, when the system detects a target, a features panel appears on the live video. You can configure the style of the features panel and the attributes that you want to display.
  • Page 131: Ivs Search

    User's Manual ● After setting target filter, when the system detects a person or vehicle, a rule box will appear beside the person and vehicle in the view. ● You can view the detection statistics on the upper-righter corner of the Live page. Figure 6-31 Detection statistics ●...
  • Page 132: Anpr

    User's Manual 6.7 ANPR An alarm is triggered when the detected vehicle meets detection rule. The Device supports only ANPR through AI by Camera. Make sure that the vehicle recognition parameters of camera are configured. For details, see the user's manual of the camera. 6.7.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first.
  • Page 133 User's Manual Procedure Step 1 Log in to the PC client. Under the Live tab, open a view window. Step 2 and then select the Motor Vehicle tab. Step 3 Click Figure 6-32 Motor vehicle Step 4 Configure AI attributes settings. With AI Attributes Settings enabled by default, when the system detects a target, a features panel appears on the live video.
  • Page 134: Live View

    User's Manual 6.7.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. The video image of the view is displayed. ● Target box is displayed in the video image. ● The number next to at the upper-right corner of the Live page represents the number of detected motor vehicles.
  • Page 135: Creating Plate Databases

    User's Manual 6.8.3.1 Creating Plate Databases Create plate databases to classify and manage license plates. You can create allowlist or blocklist databases. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select File Management > Plate Database Config. Step 3 Click Create.
  • Page 136: Manual Add

    User's Manual 6.8.3.2.1 Manual Add Add vehicle information piece by piece. We recommend this method when you do not have much vehicle information to add. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select File Management > Plate Database Config. Step 3 Double-click a database, and then click Manual Add.
  • Page 137: Batch Import

    User's Manual Figure 6-35 Vehicle type Step 6 Click Add More or Save. ● Click Add More: Save the current vehicle information, and you can continue to add more vehicle information ● Click Save: Save the current vehicle information and close the Plate Registration window.
  • Page 138: Adding From Detection Results

    User's Manual Figure 6-36 Batch import Step 4 Download and fill in the template file. 1) Click Download Template to download the template to your computer or the USB storage device. ● On the PC client, click at the top of the client, select Download to view the storage path.
  • Page 139: Managing Vehicle Information

    User's Manual Step 2 Under the Live tab, select the vehicle information to be added. ● Click , point to a record, and then click ● Point to a features panel of Motor Vehicle Detection or Plate Database on the live video, and then click Step 3 Select a vehicle database, and enter the plate number and other information.
  • Page 140: Deleting Vehicle Information

    User's Manual ● You can select multiple databases . ● Select Reserve data in original database to reserve the selected plate records in the original database. ● Select Replace duplicates in target database to use the selected plate to replace the same plate in the target database when the same plate is detected.
  • Page 141 User's Manual Figure 6-37 Plate comparison Step 5 Select device from the device tree on the left side. Step 6 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period.
  • Page 142: Live View Of Plate Comparison

    User's Manual Table 6-26 Database linkage parameters Icon/Parameter Description The selected database is enabled by default. Click the icon to disable it. Delete the database. Alarm Rule Click to select a color for the alarm rule box. Select the checkbox to enable the features pane. The features pane Display Feature Pane appears on the live video once there is an alarm.
  • Page 143: Live View

    User's Manual Figure 6-39 Motor vehicle Step 4 Configure AI attributes settings. With AI Attributes Settings enabled by default, when the system detects a target, a features panel appears on the live video. You can configure the style of the features panel and the attributes that you want to display.
  • Page 144: Ai Search

    User's Manual detected motor vehicles. ● Features panels are displayed on the right side of the video image. Point to the features panel, and the icons are displayed. ◇ : Add the detected plate information to the plate database. For details, see "6.8.3.2.3 Adding from Detection Results".
  • Page 145: Searching By Database

    User's Manual Icon Operation Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot. Add this image to the plate database. 6.8.6.2 Searching by Database Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the Live page, or select AI Search on the home...
  • Page 146: Configuring Crowd Distribution Map

    User's Manual Enabling the Smart Plan". 6.9.2 Configuring Crowd Distribution Map Set crowd distribution alarm rules. 6.9.2.1 Global Configuration Draw lines on the image to determine the geographical scale of the image. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event.
  • Page 147: Live View Of Crowd Distribution

    User's Manual 3. Set the crow density. Click Schedule to select a schedule from the drop-down list. Step 8 The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule.
  • Page 148: Enabling The Smart Plan

    User's Manual detection rules for the visible light channel of a thermal camera. Call alarm is only available with AI by Camera. 6.10.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first. For details, see "6.2.1 Enabling the Smart Plan".
  • Page 149: Smoking Alarm

    User's Manual Procedure Step 1 Log in to the PC client. On the home page, click Search. Step 2 Step 3 Select one or more devices. Step 4 You can search for the videos or images of call detection. ● Videos 1.
  • Page 150: Live View Of Smoking Alarm

    User's Manual the system will trigger an alarm. Click Schedule to select a schedule from the drop-down list. Step 7 The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule.
  • Page 151: General Operations

    User's Manual 7 General Operations This chapter introduces general operations such as live view, playback, alarm, and more. 7.1 Live and Monitor Log in to the PC client, and then under the Live tab, you can view the live videos. Point to the left and right edges of the video windows, and then click to hide or display the left and right columns.
  • Page 152: View Management

    User's Manual Description ● : Take a snapshot of live view. ● : Display the live view in full screen. ● : Edit the view window and save as a new view. ● : Start tour. You need to enable the function first in System > General > System Settings.
  • Page 153: View Group

    User's Manual 7.1.1.1 View Group A view group is a group of views. The view group helps you to categorize, search for and manage views quickly. Under View Group created by default, you can create view groups. ● You can create up to 100 view groups. ●...
  • Page 154: View

    User's Manual Table 7-2 View group management Operation Description Right-click a view group and select Rename. Set view group name Rename and click any blank space. Please be advised that once you delete a view group, all views under Delete View group the view group will be deleted at the same time.
  • Page 155: Editing A View

    User's Manual ● The Device automatically creates the view grids according to the number of the selected remote devices. Device supports maximum 36 view windows. ● The view window fills in the whole layout grid by default. Right-click to select Original Scale >...
  • Page 156: Opening A View

    User's Manual When adjusting the positions of video windows, drag the video window to the layout grid whose background color is green. You cannot drag the video window to the grid of red background color. ● Change the window size: Drag the edges of the video window to adjust its size, and then click OK.
  • Page 157: View Window

    User's Manual ● When adjusting the positions of video windows, drag the video window to the layout grid whose background color is green. You cannot drag the video window to the grid of red background color. ● Point to the video window. The taskbar is displayed. You can take a snapshot, enable recording and close the video window.
  • Page 158: Taskbar

    User's Manual Figure 7-5 View window 7.1.1.3.1 Taskbar Log in to the PC client, under the Live tab, open a view and then point to a video window. The taskbar is displayed. Figure 7-6 View window...
  • Page 159: Shortcut Menu

    User's Manual Table 7-5 Window taskbar Icon Description Zoom. Click the icon, and then select a zone on the video window to zoom in. Talk. The Talk function enables voice interaction between the Device and remote devices. Instant record. Click to start recording manually.
  • Page 160: Digital Zoom

    User's Manual The shortcut menu might vary depending on the remote devices. Figure 7-7 Shortcut menu Table 7-6 Shortcut menu description Parameter Description Select a stream type from Main Stream, Sub Stream 1 and Sub Switch Stream Stream 2. Select whether to display the real-time bit rate on the upper-left corner Bit Rate of the video window.
  • Page 161: Searching By Image

    User's Manual ● Click , select a zone on the video window. The zone is enlarged. Release the mouse to restore the original effect. 7.1.1.3.4 Searching by Image Draw a frame on the video to select an image that contains targets, and then use the image to search for similar faces or human bodies.
  • Page 162: Smart Tracking

    User's Manual Installation Method Display Mode Description Original image + 3 section images. Original image + 4 section images. Corrected 360° panoramic image + 6 section 1P+6 images. Original image + 8 section images. Corrected 180° image from left to right. 1P+3 Corrected 180°...
  • Page 163: Talk

    User's Manual Figure 7-8 Thermal 7.1.1.3.8 Talk The Talk function enables voice interaction between the Device and remote devices, improving the efficiency in handling emergency events. Procedure Step 1 Log in to the PC client. Step 2 Open a view under the Live client. Step 3 Click at the upper-right corner of the view window to enable the Talk function.
  • Page 164: Ptz

    Incorrect Username or Password to filter the remote devices. Filter devices Device mismatch refers to the situation where the remote device is not compatible with IVSS due to inconsistent languages. ● If the icon of the remote device is black, the remote device is online. For example, ●...
  • Page 165 User's Manual The PTZ functions might vary depending on the device models. Figure 7-10 PTZ Table 7-9 PTZ control panel Icons Description Drag to set PTZ speed. The higher the value, the faster the PTZ speed. Control PTZ movement in the following ways. ●...
  • Page 166: Ptz Menu Settings

    User's Manual Icons Description Click to use PTZ functions. Before using PTZ functions, you need to configure the PTZ functions. For details, see "7.1.3.2 Configuring PTZ Functions". ● : preset. ● : tour group. ● : pattern. ● : scan. 7.1.3.1 PTZ Menu Settings Device displays PTZ main menu on the view window.
  • Page 167: Configuring Ptz Functions

    User's Manual Parameter Description Configure system settings of the remote device. You can set PTZ simulator, restore default, manage peripheral devices of the remote System device, view the software version and PTZ version of the remote device, and more. Exit Exit the PTZ menu.
  • Page 168: Setting A Tour Group

    User's Manual ◇ Select the preset, click to adjust the position of the preset, and then click ◇ Click to quit. ● Select a preset and then click to delete it. ● Click to refresh the preset list. 7.1.3.2.2 Setting a Tour Group A tour group is a sequential set of presets.
  • Page 169: Setting A Pattern

    User's Manual ◇ Double-click a tour group to rename it. ◇ Select the tour group, click to modify the tour group, and then click ◇ Click to quit. ● Select a tour group and then click to delete it. ● Click to refresh the list of tour groups.
  • Page 170: Enabling Auxiliary Functions

    User's Manual The maximum number of scans depends on the camera capability. If the camera permits, you can configure up to 5 scans by default. Step 6 Execute the scan. 1) Hover over the name of the scan. 2) Click next to the name of the scan.
  • Page 171 User's Manual ● External Alarm: Videos linked with internal and external alarms. ● Thermal: Videos linked with thermal alarms. Step 5 Select a stream type from Main Stream and Sub Stream. Step 6 Set the search period. Click Search. Step 7 The search results are displayed.
  • Page 172 User's Manual Table 7-11 Search icons description Signal Words Description Global control. Click the icon to control several windows simultaneously, such as fast forward or stop the playback of several videos at the same time. Click the icon again to cancel global control. Set a time period.
  • Page 173: Clipping A Video

    User's Manual Signal Words Description Time bar. Displays recording type and recording period. ● There are 2 recording file bars on the time bar. The top bar displays recording time of selected window. The bottom bar displays recording time of all selected remote devices. ●...
  • Page 174: Video Tag

    User's Manual Figure 7-16 Clip a video Step 5 Drag the left and right edges of the blue frame to select the start time and end time of clipping. Click OK. Step 6 Step 7 Select a file format, and then click Browse to select the storage path. Figure 7-17 Save the video Step 8 Click OK.
  • Page 175: Searching For Snapshots

    User's Manual 4. Click Search. ● Click to view the corresponding video. ● Click to edit the tag. ● Click to delete the tag. ● Select multiple tags and click Delete to delete the tags in batches. ● Click Refresh to refresh the tag list. Figure 7-18 Tags 7.2.4 Searching for Snapshots Search for and view snapshots according to remote device, image type, and snapshot time.
  • Page 176: Locking Files

    User's Manual Connect a USB device to the Device if you are operating on the local interface. Procedure Step 1 Log in to the PC client. On the home page, select Search. Step 2 Step 3 Search for videos or images. Step 4 Under the File Playback tab, select one or more files to back up.
  • Page 177: 1:1 Face Comparison

    User's Manual Procedure Step 1 Log in to the PC client. On the home page, select Aux > Watermark. Step 2 Click Browse to select a video file. Step 3 After the file is uploaded, click Parity. Step 4 ● Normal: If the verification result is normal, the correct watermark is displayed. ●...
  • Page 178: Alarm List

    User's Manual ● You can upload .pcm, .mp3, .wav,and .aac files. ● A single audio file must not be less than 2 KB and must not exceed 10 MB. ● The total size of imported audio files must not exceed 200 MB. Procedure Step 1 Log in to the PC client.
  • Page 179: Display Management

    User's Manual Figure 7-21 Alarm list ● The number on the icon is the number of unprocessed alarm events. The alarm list displays up to 200 unprocessed alarm events. ● Click to confirm the alarm event. The confirmed event will be removed from the alarm list. 7.5 Display Management Enable connected monitors or lock the screen.
  • Page 180: System Messages

    User's Manual 7.6 System Messages Log in to the PC client, and then click on the upper-right corner to view system messages including system errors, system alarms and system notifications. Figure 7-22 System messages ● Click All, System Error, System Warning, or System Notifications to view the corresponding system messages.
  • Page 181: System Configuration

    You can also click Access Management from the configuration list on the home page. Step 3 Select the root node in the device tree, and then under the Access Management tab, you can view the remote devices added to IVSS.
  • Page 182: Changing Ip Address

    User's Manual Figure 8-2 Device list Step 4 View details on the connected devices, including IP address, serial number, connection status, and more. ● indicates that the remote device is offline. ● indicates that the remote device is online. ● indicates that the connection with the remote device failed.
  • Page 183 User's Manual Figure 8-3 Access management Step 4 Under the Quick Add tab, click Start Search. You can click to filter the search results. Figure 8-4 Search results Step 5 Select one or more remote devices and then click Modify IP. ●...
  • Page 184: Modifying Ip Of Connected Devices

    User's Manual ● Enter incremental value only when you want to change IP addresses of several devices at the same time. The system will allocate IP address one by one with the fourth part of the IP address increasing by the incremental value. ●...
  • Page 185 User's Manual Step 2 Click on the upper-right corner of the page and then click Access Management. You can also click Access Management from the configuration list on the home page. Step 3 Under the Access Management tab, select one or remote devices, and then click Modify ●...
  • Page 186: Configuring Remote Devices

    User's Manual 8.1.3 Configuring Remote Devices Set the attributes, video parameters and other parameters of remote devices connected to IVSS. The pages might vary with remote devices. 8.1.3.1 Configuring Attributes of Remote Devices Set the name of remote devices, and view information on the remote devices.
  • Page 187 User's Manual Procedure Step 1 Log in to the PC client. on the upper-right corner of the page and then click Access Management. Step 2 Click You can also click Access Management from the configuration list on the home page. Select a remote device from the device tree and then click the Video tab.
  • Page 188 User's Manual Table 8-1 General video parameters Parameter Description Select a video encoding mode. ● H.264: a highly compressed video encoding standard. It includes H.264B (baseline profile encode mode), H.264 (main profile encode mode) and Encode mode H.264H (high profile encode mode). Under the same image quality, the bandwidth of the three decreases in turn.
  • Page 189: Configuring Osd

    User's Manual 8.1.3.4 Configuring OSD Set OSD information on the video. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the page and then click Access Management. You can also click Access Management from the configuration list on the home page. Step 3 Select a remote device from the device tree and then click the OSD tab.
  • Page 190: Configuring Audio Parameters

    User's Manual This function is available only when the camera supports privacy masking. 1. Click to enable privacy masking. 2. Click Add, select the masking type and color, and then draw mosaic or color blocks in the image as needed. 3.
  • Page 191: Configuring Connection Information

    User's Manual This function is available with select models of remote devices. Step 6 Click the Main Stream, Sub Stream 1 or Sub Stream 2 tab, and then configure the parameters. Table 8-2 Audio parameters Parameter Description The audio encoding mode applies to both audio streams and Audio Encoding voice talks.
  • Page 192: Exporting Remote Devices

    User's Manual Parameter Description Set cache strategy of remote device video stream. ● Self-adaptive: The system automatically adjusts video stream cache status according to the network bandwidth. Cache Method ● Realtime: Guarantee video real-timeness. When the network bandwidth is not sufficient, the video might not be fluent. ●...
  • Page 193: Importing Remote Devices

    User's Manual username (excluding password) of the remote device. When unencrypted file is exported, keep the file safe to avoid data leakage. Step 5 Click OK. Step 6 Click Save File. File path might be different depending on your operations. ●...
  • Page 194: Network Management

    User's Manual then click Delete next to Batch Import. 8.2 Network Management Log in to the PC client. Click on the upper-right corner of the page and then click Network. You can set basic network parameters and applications. 8.2.1 Basic Network Set basic network parameters of the Device, such as IP address, port aggregation and port number, to make sure the Device can connect with other devices on the network.
  • Page 195: Port Aggregation

    User's Manual Table 8-4 NIC parameters description Parameter Description The maximum network transmission speed that the current NIC Rate (Mbps) supports. Type Select IPv4 or IPv6. ● DHCP: When there is a DHCP server on the network, you can enable DHCP.
  • Page 196: Binding Nics

    User's Manual Table 8-5 Aggregation mode description Aggregation mode Description The Device bonds several NICs at the same time and use one IP address to communicate with other devices. The bonded NICs are working together to bear the network load. Load balance The load balance mode adds the network throughput data amount and enhances network flexibility and availability.
  • Page 197 User's Manual Figure 8-13 NIC bonding 4) Click OK. The setting page varies depending on the aggregation mode you have selected. The following figure is the load balance setting page. Figure 8-14 Edit load balance 5) Set parameters. Table 8-6 NIC parameters description Parameters Description The maximum network transmission speed that the bonded NICs...
  • Page 198: Cancelling Binding Nic

    User's Manual Parameters Description IP Type Select IPv4 or IPv6. When there is a DHCP server on the network, you can enable DHCP. The Use Dynamic IP system allocates a dynamic IP address to the Device. There is no need to Address set IP address manually.
  • Page 199: Setting Port Number

    User's Manual Step 5 Click OK. The system splits the bonded NICs. Among the split NICs that were bonded together, the first NIC reserves the IP address configured during binding, and the rest NICs restore their default IP addresses. 8.2.1.3 Setting Port Number Set device port number.
  • Page 200: Network Apps

    User's Manual Parameter Description Set according to the actual requirements. The default value is 554. The RTSP value ranges from 1 to 65535. Set according to the actual requirements. The default value is 80. The value ranges from 1 to 65535. HTTP If the value you set is not 80, remember to add the port number after the IP address when you are using a browser to log in to the device.
  • Page 201: Register

    User's Manual Figure 8-17 P2P Step 4 Click to enable the P2P function. Click Apply. Step 5 You can register the Device to the app for remote monitoring and management. For details, see the corresponding user's manual of the app. 8.2.2.2 Register Register the Device on a designated proxy server so that client software can access the Device through the proxy server.
  • Page 202: Email

    User's Manual Step 5 Set parameters. Table 8-8 Register Parameter Description Select an IP type from IPv4 and IPv6. Type IP Address Enter the IP address of the server that you are registering the Device to. Port Enter the port number of the server for registration. The destination address of the trap information from the agent on the Trap Address Device.
  • Page 203: Alarm Center

    User's Manual Table 8-9 Emails parameter description Parameter Description Server Select a server type from Custom, Gmail, Hotmail, and Yahoo Mail. Server Address Enter the address of the email server. Select an encryption type from NONE, SSL, and TLS. Encryption We recommend you select TLS.
  • Page 204: Upnp

    User's Manual Figure 8-20 Alarm center Step 4 Click to enable alarm center. Step 5 Configure the parameters. Table 8-10 Alarm center parameters Parameter Description IP Type Select the IP type of the alarm center server. Server Address The IP address and communication port of the alarm center server.
  • Page 205 User's Manual Please be advised that services and ports of the Device will be mapped to the public network after UPnP is enabled. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Network. You can also click Network from the configuration list on the home page.
  • Page 206: Snmp

    Description The list is consistent with the UPnP port mapping list on the router. ● Internal Port: The ports of the IVSS to be mapped on the router. ● External Port: The ports mapped on the router. Click , and then you can modify the external ports.
  • Page 207 User's Manual Figure 8-22 SNMP (1) Step 4 Click to enable the function. Step 5 Select SNMP version. For data security, we recommend V3. Step 6 Set parameters. For Trap Address, enter the IP address of the computer installed with the MG-SOFT MIB Browser.
  • Page 208: Ddns

    User's Manual Parameter Description Read or Write Community supported by the agent programs. Read Community, Write Community The name can only contain numbers, letters, underscores, and middle lines. The destination address of Trap information sent by the agent Trap Server program.
  • Page 209 User's Manual After registration, you can log in to the DDNS website to view the information of all the connected devices under the registered account. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Network. You can also click Network from the configuration list on the home page.
  • Page 210: Multicast

    Step 6 After successful configuration, enter domain name in address bar of the browser or PC client, and press Enter key to access the IVSS. 8.2.2.8 Multicast When multiple users are viewing live video of the same device at the same time, it might cause failure due to limited bandwidth.
  • Page 211: Routing Table

    User's Manual Figure 8-24 Log in through multicast 8.2.2.9 Routing Table Configure the route table so that the system can automatically calculates the best path for data transmission. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Network. Step 2 Click You can also click Network from the configuration list on the home page.
  • Page 212: Event Management

    User's Manual 8.3 Event Management Log in to the PC client. Click on the upper-right corner and then click Event. On the page, configure alarm events for the Device and remote devices. ● Select the root node on the device tree to set alarm events for the Device. ●...
  • Page 213 User's Manual Figure 8-27 Event linkage Table 8-15 Actions description Action Description Preparation The system links the selected A remote device, such as IPC, remote device to record has been added. See "5.5.2 Record videos when a linkage event Adding Remote Devices" for occurs.
  • Page 214 — Picture Storage linked remote device takes a snapshot and saves it on IVSS. ● AI by Recorder: When a linkage event occurs, the systems takes a snapshot of the linked channel and saves on IVSS.
  • Page 215: Record

    User's Manual Action Description Preparation The remote device that When a linkage event occurs, supports this function has the system associates with the Remote Warning Light been connected. For details, remote device to turn on the see "8.3.1.13 Remote Warning warning light.
  • Page 216: Email

    User's Manual After the log function is enabled, you can select Maintain > Log > Event Logs on the home page to search for logs. 8.3.1.4 Email After you enable the email function, the system sends alarm emails to all added receivers when a linkage event occurs.
  • Page 217: Local Alarm Output

    User's Manual 8.3.1.7 Local Alarm Output Set local alarm output. The alarm output device connected with the Device generates an alarm the corresponding alarm when a linkage event occurs. Make sure that the Device is connected with an alarm output device. Procedure Step 1 On the alarm configuration page, click Select next to Event Linkage, and then select...
  • Page 218: Audio Linkage

    User's Manual Make sure that access control device has been added. See "5.5.2 Adding Remote Devices" for detailed information. Procedure On the alarm configuration page, click Select next to Event Linkage, and then select Step 1 Access Control. Step 2 Select an access control device.
  • Page 219: Uploading Alarms

    User's Manual then click Apply. 8.3.1.12 Uploading Alarms After you enable alarm upload, when a linkage event occurs, the system reports the alarm to alarm center. On the alarm configuration page, click Select next to Event Linkage, and then select Upload Alarms.
  • Page 220: Abnormal Events

    User's Manual Figure 8-34 Disarming Step 5 Click to enable disarming. Step 6 Cancel the selection of alarm linkage actions as needed. Step 7 (Optional) Configure disarming by period. 1) Click to enable disarming by period. 2) Click Add Schedule to add a disarming schedule. The alarm linkage actions remain armed during periods beyond the disarming schedule.
  • Page 221 User's Manual Name Description The system triggers an alarm when the number of failed login attempts has reached the threshold. At the same time, the system locks current account. It is disabled by default. Account lockout Go to Security > Attack Defense > Account Lockout to set the allowed number of failed login attempts.
  • Page 222: Offline Alarm

    8.3.2.3 Offline Alarm Set the offline alarm for IVSS. If you have not set offline alarm for a remote device, once the remote device is disconnected from the system, the system adopts the alarm strategy for IVSS to trigger an alarm.
  • Page 223: Configuring Smart Plan

    You can view smart plans, and configure entries frequency, and video quality analytics. 8.3.2.4.1 Viewing Smart Plans After you add the remote devices to the IVSS, the system obtains the smart detection functions of the remote devices. Log in to the PC client. Click on the upper-right corner of the page and then click Event.
  • Page 224: Setting Entries Frequency

    User's Manual indicates that AI by Camera is enabled; indicates that AI by Recorder is enabled. Figure 8-37 Smart plan 8.3.2.4.2 Setting Entries Frequency Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Event. Step 2 Click You can also click Event from the configuration list on the home page.
  • Page 225: Video Quality Analytics

    User's Manual Parameter Description Statistical Cycle Set the statistical cycle. The statistical cycle is 7 days by default. Set the threshold of entries frequency. When the entries detected Entries Detected reaches or exceeds the threshold, an alarm is triggered. Reset Clear all entry counts.
  • Page 226 User's Manual Figure 8-39 Video quality analytics Step 5 Click to enable video quality analytics. Step 6 Configure the parameters 1) Click to enable the corresponding diagnosis item, for example, video tampering. 2) Set the threshold. 3) On the device list, select one or more devices. 4) Set the detection interval.
  • Page 227: Configuring Local Alarm

    User's Manual ● Click to display the statistics in a bar chart. ● Click to display the statistics in a pie chart. Figure 8-40 Video quality analytics report 8.3.2.5 Configuring Local Alarm Set local alarm. When the alarm input device sends an alarm signal to the Device, an alarm is triggered.
  • Page 228: Remote Device

    User's Manual Figure 8-41 Alarm-in port 1 Step 5 Click to enable local alarm. Step 6 Set parameters. Table 8-18 Local alarm parameters description Parameter Description Name Enter a name for the alarm. Type Select a type of the alarm input device. Both NO and NC are supported. Anti-dither The system records only one alarm event during this period.
  • Page 229: Video Detection

    User's Manual The parameters might be different depending on the model you purchased. 8.3.3.1 Video Detection The system monitors and analyzes the video image. When there are considerable changes on the video, for example, the image becomes blurry, the system triggers an alarm. 8.3.3.1.1 Configuring Video Motion Detection The system generates a video motion alarm when the detected moving target reaches the configured sensitivity.
  • Page 230: Tampering

    User's Manual zone. ● Click to clear all the detection zones. 3) Set parameters. Table 8-19 Motion detection zone parameters Parameter Description Name Set detection zone name to distinguish different zones. Drag to set sensitivity. The higher the sensitivity, the easier it is to trigger an alarm. At the same Sensitivity time, the false alarm rate increases as well.
  • Page 231: Offline Alarm

    Step 7 Step 8 Click Save. 8.3.3.2 Offline Alarm When the remote device is disconnected from the IVSS, the system triggers an alarm. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Event.
  • Page 232: Ipc External Alarm

    User's Manual You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule. Step 7 Click Select next to Event Linkage to set alarm actions. Step 8 Click Save. 8.3.3.3 IPC External Alarm Set the external alarm input event, so that when there is an alarm input to the remote device, the remote device uploads the alarm to the Device.
  • Page 233: Thermal Alarm

    User's Manual Parameter Description Select the type of the alarm input device. Both NO and NC are Type supported. Anti-dither The system records only one event during this period. Step 7 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period.
  • Page 234: Storage Management

    User's Manual Step 4 Select Thermal Alarm > Temperature Alarm. Step 5 Click to enable the alarm. Step 6 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period.
  • Page 235: Viewing S.m.a.r.t

    User's Manual ● : RAID. ● : Global hot spare disk. ● : Invalid disk of RAID group. Slight difference might be found on the user interface. Figure 8-46 HDD 8.4.1.1.1 Viewing S.M.A.R.T S.M.A.R.T is Self-Monitoring Analysis and Reporting Technology. It is a technical standard to check disk status and report potential problems.
  • Page 236: Formatting

    User's Manual Figure 8-47 S.M.A.R.T 8.4.1.1.2 Formatting ● Please be advised that formatting will clear all data on the disk. ● The hot standby disk cannot be formatted. Log in to the PC client. Click on the upper-right corner and then select Storage > Storage Resource >...
  • Page 237: Creating Raid

    User's Manual ● The Device supports RAID0, RAID1, RAID5, RAID6, RAID10, RAID50 and RAID60. See "Appendix 3 RAID" for detailed information. ● We recommend you use enterprise HDD when you are creating RAID, and use surveillance HDD for single-HDD mode. 8.4.1.2.1 Creating RAID RAID has different levels such as RAID5, RAID6 and more.
  • Page 238 User's Manual Table 8-22 Manual creation parameters description Parameter Description Select the storage device where the disks are located and select the disks you want to add to the RAID. Storage Device Different levels of RAID might need different number of disks. RAID Select the level of RAID that you want to create.
  • Page 239 User's Manual Table 8-23 One-click creation parameters description Parameter Description Storage Device Select the storage device where the disks are located. Set RAID resources allocation mode. The default mode is self-adaptive. ● Self-adaptive: The system automatically adjusts RAID synchronization speed according to current business load. When there is no external business, the synchronization speed is high.
  • Page 240: Creating A Hot Standby Disk

    User's Manual 8.4.1.2.2 Creating a Hot Standby Disk When a disk in the RAID group is malfunctioning or has a problem, the hot spare disk can replace the malfunctioning disk to avoid data loss and ensure reliability of the storage system. Procedure Step 1 Log in to the PC client.
  • Page 241: Network Disk

    User's Manual Figure 8-51 Private hot standby Step 6 Click Next. Step 7 Confirm information, and then click Create. If the information is wrong, click Back to modify the hot standby parameters. Step 8 Click Create. Figure 8-52 Hot standby 8.4.1.3 Network Disk Network disk is a network-based online storage service that stores device information on the network hard disk through the iSCSI protocol.
  • Page 242: Iscsi Management

    User's Manual type. ◇ Read/Write: One can read, edit, add, and delete data on this disk. ◇ Read Only: One can only read data on this disk. 8.4.1.3.2 iSCSI Management Set up the network disk through iSCSI and map the network disk to the Device so that the Device can use the network disk for storage.
  • Page 243: Storage Settings

    User's Manual Parameter Description server, you need to enter username and password. Password Click Search to select the storage directory. Storage Path The storage directory is generated when the shared file directory is being created on the iSCSI server. Each directory represents an iSCSI disk.
  • Page 244 User's Manual ● The value (such as ) next to the group name refers to the number of disks and RAID groups in the disk group. If is displayed, it means there were videos or images stored in the disk group but now there is no available disk or RAID group in the disk group.
  • Page 245: Recording Control

    User's Manual Figure 8-55 Add channels ● Move channels to another disk group for video or image storage. ◇ One by one: Click Move to under Operation, select a disk group, and then click OK. ◇ In bathes: Select one or more channels and then click Move to next to Add, select a disk group, and then click OK.
  • Page 246: Configuring Recording Schedule

    User's Manual ● Scheduled: The Device records automatically according to the schedule. ● Manual: The Device records around the clock and does not respond to the recording schedule. ● Close: The Device does not records for the channel. ● means that the type is selected. ●...
  • Page 247 User's Manual Figure 8-57 Set a recording schedule Step 5 Select General, Record Events, or both as the recording type. ● General: Click the box next to General to select a schedule or click Add Schedule to add a new schedule. The Device records in the configured schedule. For details, see "8.7.4 Schedule".
  • Page 248: Basic Storage Settings

    User's Manual Parameter Description The number of images for each manual capture action. You can also Manual Snapshot configure the interval between manual snapshots. Event Snap Configure the interval between event snapshots. Copy to Copy the current settings to other channels. Click Apply.
  • Page 249: Setting Image Storage Strategy

    User's Manual Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Storage. Step 2 Click You can also click Storage from the configuration list on the home page. Select Storage > Basic. Step 3 Step 4 Set automatic file deletion.
  • Page 250: Security Strategy

    User's Manual recovers, the Device can not automatically download the recording during the disconnection, but you can manually create a download task. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page.
  • Page 251: System Service

    User's Manual Figure 8-62 Security status Related Operations Different colors indicate different security statuses (green: normal; yellow: abnormal). For abnormal items, you can click Details to view details. ● Click Ignore to ignore the abnormal item. The item will not be checked in subsequent scans. Click Rejoin Detection to include the ignored item into the security scan.
  • Page 252 User's Manual Figure 8-64 Basic services Step 3 Enable or disable system services. Table 8-27 System services Name Description After enabling this function, you can access the Device through SSH protocol to carry out system debugging and IP configuration. This function is disabled by default.
  • Page 253: Enabling Https

    User's Manual Name Description After enabling this function, you can use your mobile phone to receive notifications from the Device. Mobile Push Notifications For data security, we recommend you disable this function when it is not needed. After enabling it, you can view system running logs in Maintain > Intelligent Run Log Diagnosis >...
  • Page 254: Attack Defense

    User's Manual IP address:port Open the browser, enter https:// in the address bar, and then press Enter, and then you can log in to the web interface. ● IP address is IP address or the domain name of the Device. ●...
  • Page 255: Anti-Dos Attack

    User's Manual Figure 8-67 Account lockout Step 3 Click to enable the lockout limitation for different types of login accounts, and then configure the number of allowed login attempts and lock duration. The lockout limitation for network login of the device account and login of the ONVIF account is enabled by default and cannot be disabled.
  • Page 256: Time Synchronization Permission

    User's Manual Figure 8-68 Account lockout Step 3 Click to enable SYN Flood Attack Defense or ICMP Flood Attack Defense. Step 4 Click Apply. 8.5.3.4 Time Synchronization Permission Configure permissions of time synchronization actions from other devices or servers. Procedure Step 1 Log in to the PC client.
  • Page 257: Ca Certificate

    8.5.4.1 Installing the Device Certificate A device certificate is a proof of device legal status. For example, if you want to access IVSS through a browser, you need to install the root certificate on your computer in advance. Procedure Step 1 Log in to the PC client.
  • Page 258 User's Manual Figure 8-71 Create certificate 2. Enter the information. Figure 8-72 Certificate information 3. Click Create and install certificate. ● Apply for and import a certificate. 1. Select Apply for CA Certificate and Import (Recommended) and then click Next. 2.
  • Page 259: Installing The Trusted Certificate

    User's Manual request file. Submit the file to a CA institute to apply for a signed certificate. 4. Click Browse to select the certificate. Figure 8-73 Import the certificate 5. Click Import and Install. ● Import an existing certificate. 1. Select Install Existing Certificate and then click Next. 2.
  • Page 260: Video Encryption

    User's Manual Step 3 Click Install Trusted Certificate. Click Browse to select a trusted certificate. Step 4 Step 5 Click OK. Related Operations You can edit and download the installed certificate. ● Edit Click Enter Edit Mode, enter a custom name for the certificate, and then click Save Config. ●...
  • Page 261: Security Warning

    User's Manual Encryption Method Description Click to enable RTSP encryption using the TLS tunnel, and then select a device certificate. We recommend you enable this function to ensure data security. RTSP over TLS You can click Certificate Management to install a device certificate. For details, see "8.5.4.1 Installing the Device Certificate".
  • Page 262: Adding User Groups

    User's Manual To ensure device security, you need to enter the correct login password to operate on the ACCOUNT page (for example, add or delete a user). 8.6.1 Adding User Groups The admin and Onvif groups are 2 default user groups. You can create more user groups to manage users with different levels of permissions.
  • Page 263: Adding Device Users

    User's Manual Figure 8-78 Permission 2) Select the permissions for the user group. Step 7 Click Apply. Related Operations Select a user group, click , enter the login password, and then click OK to delete the user group. ● Before you delete a user group, you need to delete all users in the current group first. ●...
  • Page 264 User's Manual Figure 8-79 User attributes Step 5 Configure the parameters. Table 8-30 User attributes parameters Parameter Description Set the username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", "."). Parent Node Displays the user group that the user belongs to.
  • Page 265: Password Maintenance

    User's Manual ◇ Before deleting an online user, you need to block the user first. For details, see "9.4.1 Online User". ◇ The deleted user cannot be restored. 8.6.3 Password Maintenance Maintain and manage the login passwords of users. 8.6.3.1 Changing Password Change the login password of the user.
  • Page 266: Resetting Password On Local Interface

    User's Manual Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Account. Step 2 Click You can also click Account from the configuration list on the home page. Step 3 Select the root node at the upper-left corner. Step 4 Click to enable the password reset function.
  • Page 267: Adding Onvif User

    User's Manual Procedure Step 1 Enter the IP address of the Device in the address bar of the browser or PC client, and then press Enter. Step 2 Click Forgot password?. Click OK. Step 3 Step 4 Follow on-screen instructions to get security code and then enter the security code. Step 5 Click Next.
  • Page 268: System Settings

    User's Manual Figure 8-80 ONVIF user group Step 4 Enter the login password of current user, and then click OK. Step 5 Set parameters. Table 8-33 User attributes parameters Parameter Description Set the username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
  • Page 269 User's Manual Figure 8-81 Basic system settings Table 8-34 System parameters description Parameter Description Language Set system language. Select a video standard. ● PAL is mainly used in China, Middle East and Europe. ● NTSC is mainly used in Japan, United States, Canada and Mexico. Video Standard As a technical standard of processing video and audio signals, PAL and NTSC mainly differ in the encoding and decoding modes and...
  • Page 270: System Time

    User's Manual 8.7.2 System Time Set system time, and enable the NTP function according to your need. After you enable the NTP function, the Device can automatically synchronize time with the NTP server. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click System.
  • Page 271: Display

    Set the time and date format. Time Zone Select a time zone. After you enable this function, IVSS detects the system time of remote devices once in every interval. When the time of a remote device is CAM Time Sync inconsistent with IVSS time, IVSS will calibrate the time of the remote device automatically.
  • Page 272: Schedule

    User's Manual Figure 8-83 Display ● SN 1–3 refers HDMI 1–HDMI 3. Among which, HDMI/VGA is the main display, while the VGA and HDMI 1 outputs the same video. The 1–3 monitors represent monitors connected to HDMI 1–HDMI 3. The main screen refers to the monitor connected to VGA or HDMI 1 port.
  • Page 273 User's Manual Default Schedule has been created by default, which is always effective and cannot be modified or deleted. Procedure Step 1 Log in to the PC client. Step 2 Click , or click on the configuration page, and then select SYSTEM > Schedule > Schedule .
  • Page 274: Cluster Service

    In the N+M cluster system, there is a management server, the DCS (Dispatching Console) server, which is responsible for timely and correct scheduling management of the main and sub devices. When you create a cluster, the current IVSS is used as the first sub device and the DCS server by default.
  • Page 275 User's Manual Procedure Step 1 Log in to the PC client. Step 2 Select Step 3 Click on the upper-right corner and then click Cluster Management. You can also click Cluster Management from the configuration list on the home page. Step 4 Click Cluster Setting, and then click Enable Cluster.
  • Page 276 User's Manual Figure 8-87 Add a main device 2) Set parameters. Table 8-37 Parameters description Parameter Description Device Name Enter a name for the main device. IP Address Enter the IP address of the main device. Port Enter the port number. It is 37777 by default. Username Enter the login username and password of the Device.
  • Page 277 User's Manual Figure 8-88 Add a sub device 2) Set parameters. Table 8-38 Parameters description Parameter Description Device Name Enter a name for the sub device. Enter the IP address of the sub device. IP Address When adding the first sub device, you do not need to enter the IP address, because the first sub device is the current device by default.
  • Page 278: Record Transfer

    User's Manual Related Operations ● Under the Cluster Services tab, you can: ◇ Click Delete Cluster to delete the cluster. ◇ Click Even Info under Operation to view the event logs of the main device or sub device. ◇ Click Cluster IP under Operation to change the cluster IP. ◇...
  • Page 279: Viewing Cluster Log

    User's Manual Step 5 Click OK. 8.8.3 Viewing Cluster Log Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Cluster Management. Step 2 Click You can also click Cluster Management from the configuration list on the home page. Step 3 Set the search period, and then click Search.
  • Page 280: System Maintenance

    User's Manual 9 System Maintenance 9.1 Overview Log in to the PC client. On the home page, select Maintain > Overview. Figure 9-1 Overview Table 9-1 Overview Function Description View device version and the number of online users. Overview Click to refresh the data.
  • Page 281: System Information

    User's Manual Function Description View the connection and idle status of remote devices ● Click to go to the Access Management page for Camera List detailed information. ● Click to refresh the data. View RAID status. ● Click to go to the Storage page for detailed RAID Status information.
  • Page 282: Viewing Algorithm Version

    User's Manual 9.2.3 Viewing Algorithm Version Log in to the PC client. On the home page, select Maintain > System Info > Algorithm Version. You can view the algorithm license status and versions of smart functions. Figure 9-2 Algorithm version 9.2.4 Viewing Storage Information Log in to the PC client.
  • Page 283: Viewing Ai Module Information

    User's Manual Figure 9-4 System resources ● Click to select the items that you want to view. ● Click Refresh to refresh the data. 9.3.2 Viewing AI Module Information Log in to the PC client. On the home page, select Maintain > System Resources > AI Module Resource.
  • Page 284: Network Test

    User's Manual ● Block in batches: Select multiple users and then click Block. Step 4 Set the block period. The default period is 30 minutes. Click OK. Step 5 9.4.2 Network Test You can test network connection and capture packets. Packet capture is the practice of intercepting a data packet that is crossing or moving over a specific computer network.
  • Page 285: Ssd Health Detection

    User's Manual Procedure Step 1 Log in to the PC client. On the home page, select Maintain > Disk Maintenance > S.M.A.R.T Detection. Step 2 Figure 9-7 S.M.A.R.T detection Step 3 Set the detection period. Step 4 Click OK. 9.5.2 SSD Health Detection On the home page, select Maintain >...
  • Page 286: Logs

    User's Manual Step 3 Click Download Template to download the update template , select Download, and then open and fill in the downloaded template. Step 4 Click Step 5 Select a disk, click Import Firmware Info, click Browse to choose the template to be imported, and then click OK.
  • Page 287: Intelligent Diagnosis

    User's Manual Figure 9-10 System logs Related Operations ● Export logs. Click Export to export the logs. You can select whether to encrypt the exported logs. ◇ Select Yes, set a password, and then click OK. The exported logs will be encrypted. The password is required to unzip the exported file.
  • Page 288: Maintenance Manager

    ● When operating on the local interface, save the update file in the USB storage device and then connect the USB storage device to the IVSS. ● When operating on the web interface or PC client, save the update file on your computer.
  • Page 289: Updating Cameras

    ● When operating on the local interface, save the update file in the USB storage device and then connect the USB storage device to the IVSS. ● When operating on the web interface or PC client, save the update file on your computer.
  • Page 290: Automatic Maintenance

    User's Manual All configurations are lost after factory default operation. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Maintain > Manager > Default. Figure 9-11 Default Select a method between Quick Restoration and Custom Restoration. Step 3 Click OK.
  • Page 291: Backing Up Configurations

    User's Manual Figure 9-12 Auto Maintain Step 3 Set the automatic time. Step 4 Click to enable emergency maintenance. When an upgrade power outage, running error and other problems occur, and you cannot log in, you can restart or update the Device, and clear configurations through emergency maintenance.
  • Page 292: Pc Client

    User's Manual 10 PC Client After installing the PC client, you can access the Device remotely through the PC client to carry out system configuration, function operations and system maintenance. For details on installing the PC client, see "5.3.1 Logging in to the PC Client". 10.1 Page Description Double-click the shortcut icon of the PC client on the desktop of your computer.
  • Page 293: Configuring The Client Settings

    User's Manual ● Double-click a file name to open it. ● Click Displayed in Folder to open the folder where the file is located. ● Click Clear Downloads to clear history download records. 10.4 Configuring the Client Settings When the theme of your computer is not Areo, videos might not be displayed normally on the PC client.
  • Page 294: Log Out, Restart, Shut Down, Lock

    User's Manual 11 Log Out, Restart, Shut Down, Lock Log out of, restart, shut down and lock out the Device. Figure 11-1 User operation Logging Out , and then select Logout. Click Restart , select Restart, and then click OK. Click Shutting Down Shutting down the Device by unplug the power cable might cause data loss, and is not...
  • Page 295: Faq

    User's Manual 12 FAQ Table 12-1 FAQ Problem Possibilities and Solutions ● The AI module is offline. Click Maintain > System Resources > AI Module Resource. You can view status of the AI modules. ● There are too many filter criteria on the AI display page. After you enable face ●...
  • Page 296: Appendix 1 Glossary

    User's Manual Appendix 1 Glossary Appendix Table 1-1 Glossary Name Description Common Gateway Interface (CGI) is an important Internet technology. With CGI, client can ask data from program running on network server. CGI describes data transmission standard between server and asking processing program.
  • Page 297 User's Manual Name Description Maximum Transmission Unit (MTU) refers to the maximum data packet amount (byte) on one layer of the communication protocol. Open Network Video Interface Forum (ONVIF) is the defined general protocol for information exchange among the network video devices. It ONVIF includes search device, real-time audio/video, metadata, information control, and so on.
  • Page 298: Appendix 2 Mouse And Keyboard Operations

    User's Manual Appendix 2 Mouse and Keyboard Operations This section introduces mouse and keyboard operations. Appendix 2.1 Mouse Operations Connect mouse to the USB port, and then you can use the mouse to control the local menu. Appendix Table 2-1 Mouse operations Operation Description Click to select a function menu, to enter the corresponding menu page.
  • Page 299 User's Manual If the device has connected to the peripheral keyboard, click the text column. Virtual keyboard will disappear. Appendix Figure 2-1 Virtual keyboard (global keyboard) Appendix Figure 2-2 Virtual keyboard (digital keyboard) Appendix Figure 2-3 Virtual keyboard (input letter) Appendix Table 2-2 Virtual keyboard icon Signal Words Description...
  • Page 300 User's Manual Signal Words Description Click to input letter. Now the icon turns into . Click to restore previous input mode. Click to input space. Click to control cursor position. Click to switch to the next line. Select text and click the icon to cut the selected contents. Select text and click the icon to copy the selected contents.
  • Page 301: Appendix 3 Raid

    User's Manual Appendix 3 RAID RAID is an abbreviation for Redundant Array of Independent Disks. It is to combine several independent HDDs (physical HDD) to form a HDD group (logic HDD). Comparing with one HDD, RAID provides more storage capacity and data redundancy. The different redundant arrays have different RAID level.
  • Page 302 User's Manual RAID Level Description Min. HDD Needed RAID 10 is a combination of the RAID 1 and RAID 0. It uses the extra high speed efficient of the RAID 0 and high data protection and restores RAID10 capability of the RAID 1. It has high read/write performance and security.
  • Page 303: Appendix 4 Hdd Capacity Calculation

    User's Manual Appendix 4 HDD Capacity Calculation HDD capacity calculation formula: Total capacity (M) = Channel number× Demand time length (hour) × HDD capacity occupied per hour (M/hour) According to the above formula, get recording time calculation formula. Recording time (hour) = For example, for single-channel recording, HDD capacity occupied per hour is 200 M/hour.
  • Page 304: Appendix 5 Particulate And Gaseous Contamination Specifications

    User's Manual Appendix 5 Particulate and Gaseous Contamination Specifications Appendix 5.1 Particulate Contamination Specifications The following table defines the limitations of the particulate contamination in the operating environment of the device. If the level of particulate contamination exceeds the specified limitations and result in device damage or failure, you need to rectify the environmental conditions.
  • Page 305 User's Manual Appendix Table 5-3 Gaseous contamination specifications Gaseous contamination Specifications Copper coupon corrosion < 300 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 rate Silver coupon corrosion rate < 200 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 Appendix Table 5-4 ANSI/ISA-71.04-2013 classification of reactive environments Class Copper Reactivity Silver Reactivity...
  • Page 306: Appendix 6 Cybersecurity Recommendations

    User's Manual Appendix 6 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 307 User's Manual 5. Change Default HTTP and Other Service Ports We suggest you to change default HTTP and other service ports into any set of numbers between 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6.
  • Page 308 User's Manual private networks. ● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
  • Page 309 User's Manual...
  • Page 310 IVSS User's Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V5.0.2...
  • Page 311 Foreword General This manual introduces the installation, functions and operations of the intelligent video surveillance server (hereinafter referred to as "the Device" or "IVSS"). Read carefully before using the device, and keep the manual safe for future reference. Models Number of...
  • Page 312 ● Added video metadata, vehicle recognition, and vehicle comparison June 2019 V2.1.0 functions. ● Updated the intelligent operation chapter. Added attention in important safeguards and V2.0.1 January 2019 warnings. V2.0.0 Updated figures of 16-HDD series IVSS. December 2018 V1.0.0 First release. November 2018...
  • Page 313 User's Manual Privacy Protection Notice As the device user or data controller, you might collect the personal data of others such as their face, fingerprints, and license plate number. You need to be in compliance with your local privacy protection laws and regulations to protect the legitimate rights and interests of other people by implementing measures which include but are not limited: Providing clear and visible identification to inform people of the existence of the surveillance area and provide required contact information.
  • Page 314 User's Manual Icon/Button Description Check the box to select one menu item, means selected. Drop-down box. Click the box to view the drop-down menu. Enable icon. ● : Disabled. ● : Enabled ● : The function cannot be enabled. ● : The function cannot be disabled.
  • Page 315 User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, comply with the guidelines when using it, and keep the manual safe for future reference. Operation Requirements ●...
  • Page 316 User's Manual any injuries or damages caused by the use of a nonstandard power adapter. ● Do not place the Device in a place exposed to sunlight or near heat sources. ● Keep the Device away from dampness, dust, and soot. ●...
  • Page 317 User's Manual Storage Requirements Store the Device under allowed humidity and temperature conditions.
  • Page 318 User's Manual Table of Contents Foreword .........................................I Important Safeguards and Warnings .............................. V 1 Overview ........................................1 1.1 Introduction ....................................1 1.2 Login Mode ....................................1 2 The Grand Tour ...................................... 2 2.1 8-HDD Series ....................................2 2.1.1 Front Panel ..................................2 2.1.2 Rear Panel ....................................
  • Page 319 User's Manual 3.4.2 Connection Diagram ..............................33 4 Starting the Device .................................... 34 5 Initial Settings ....................................... 35 5.1 Initializing Device..................................35 5.2 Quick Settings .................................... 37 5.2.1 Configuring IP Address ............................... 37 5.2.2 Configuring P2P Settings ............................39 5.3 Login ....................................... 40 5.3.1 Logging in to PCAPP Client ............................
  • Page 320 User's Manual 6.3.2 Face Recognition by Camera ........................... 73 6.3.2.1 Configuration Procedure ..........................73 6.3.2.2 Enabling AI Plan ..............................73 6.3.2.3 Configuring Remote Face Database ......................73 6.3.2.3.1 Creating Face Database for Remote Devices ................73 6.3.2.3.2 Adding Face Images for Remote Devices..................75 6.3.2.4 Configuring Face Recognition (by Camera) ..................
  • Page 321 User's Manual 6.3.4.7 Face Search ................................. 101 6.3.5 Face Detection by Device + Face Recognition by Device ..............101 6.3.5.1 Configuration Procedure ..........................101 6.3.5.2 Configuring Face Detection (by Device) ....................101 6.3.5.3 Configuring Device Face Database ......................103 6.3.5.4 Configuring Face Recognition (by Device) ..................103 6.3.5.5 Live View ................................
  • Page 322 User's Manual 6.6 IVS ......................................... 129 6.6.1 Enabling AI Plan ................................129 6.6.2 Configuring IVS................................129 6.6.2.1 Switching IVS Model............................129 6.6.2.2 Global Configuration ............................. 129 6.6.2.3 Rule Configuration ............................130 6.6.3 Live View of IVS ................................134 6.6.3.1 Setting AI Display ............................134 6.6.3.2 Live View ................................
  • Page 323 User's Manual 6.8.6.1 Searching by Property ........................... 153 6.8.6.2 Searching by Database ..........................155 6.9 Crowd Distribution Map ..............................156 6.9.1 Enabling AI Plan ................................157 6.9.2 Configuring Crowd Distribution Map ....................... 157 6.9.2.1 Global Configuration ............................. 157 6.9.2.2 Rule Configuration ............................157 6.9.3 Live View of Crowd Distribution .........................
  • Page 324 User's Manual 7.1.3.1 PTZ Menu Settings ............................186 7.1.3.2 Configuring PTZ Functions ......................... 187 7.1.3.2.1 Setting a Preset ............................187 7.1.3.2.2 Setting a Cruise ............................189 7.1.3.2.3 Setting a Pattern ............................ 189 7.1.3.2.4 Setting Linear Scanning ........................190 7.1.3.2.5 Enabling Auxiliary Functions......................191 7.2 Recorded Files..................................
  • Page 325 User's Manual 8.2 Device Management................................218 8.2.1 Viewing Device Information ..........................219 8.2.2 Remote Device ................................221 8.2.2.1 Viewing Remote Devices..........................221 8.2.2.2 Changing IP Address ............................221 8.2.2.2.1 Modifying IP of Unconnected Devices ..................222 8.2.2.2.2 Modifying IP of Connected Devices ..................... 223 8.2.2.3 Configuring Remote Devices ........................
  • Page 326 User's Manual 8.4.1 Alarm Actions ................................251 8.4.1.1 Record ................................... 253 8.4.1.2 Buzzer ..................................253 8.4.1.3 Log ..................................254 8.4.1.4 Email ..................................254 8.4.1.5 Preset ..................................254 8.4.1.6 Snapshot ................................255 8.4.1.7 Local Alarm Out ..............................255 8.4.1.8 Remote Device Alarm Output........................255 8.4.1.9 Access ..................................
  • Page 327 User's Manual 8.5.1.2.1 Creating RAID ............................276 8.5.1.2.2 Creating Hot Spare HDD ........................280 8.5.1.3 Network Hard Disk ............................282 8.5.1.3.1 iSCSI Application ........................... 282 8.5.1.3.2 iSCSI Management ..........................283 8.5.2 Video Recording ................................285 8.5.2.1 Storage Mode ..............................285 8.5.2.1.1 Setting Disk Group ..........................
  • Page 328 User's Manual 8.7.3.1.2 Changing Password of Other User ....................306 8.7.3.2 Resetting Password ............................307 8.7.3.2.1 Leaving Email Address and Security Questions ..............307 8.7.3.2.2 Resetting Password on Local Interface ..................307 8.7.3.2.3 Resetting Password on the Web ....................310 8.7.4 ONVIF ....................................
  • Page 329 User's Manual 9.7 Device Maintenance ................................332 9.7.1 Updating Device ................................. 332 9.7.1.1 Updating the Device ............................332 9.7.1.2 Updating AI Module ............................332 9.7.1.3 Updating Cameras ............................333 9.7.2 Default ..................................... 333 9.7.3 Automatic Maintenance ............................334 9.7.4 IMP/EXP ................................... 334 9.8 Disk Maintenance ..................................
  • Page 330 1 Overview 1.1 Introduction As an intelligent video surveillance server (hereinafter referred to as IVSS or the Device), IVSS delivers not only the basic video surveillance functions, but also a bunch of advanced AI features including face recognition, perimeter protection, video metadata and ANPR, providing AI-based all-in-one surveillance solution for customers.
  • Page 331 User's Manual 2 The Grand Tour This section introduces front panel, rear panel, port function and button function, indicator light status, and so on. 2.1 8-HDD Series 2.1.1 Front Panel Figure 2-1 Front panel Table 2-1 Front panel description Button/Port Description Boot up or shut down device.
  • Page 332 User's Manual 2.1.2 Rear Panel Figure 2-2 IVSS7008 rear panel Figure 2-3 IVSS7008-M rear panel Figure 2-4 IVSS7108-M rear panel Table 2-2 Rear panel description Button/Port Description Power Power on-off button. Power input Inputs 100–240 VAC power. Displays AI module status. ●...
  • Page 333 User's Manual Button/Port Description AUDIO IN Audio input port. AUDIO OUT Audio output port. High definition audio and video signal output port. The port outputs the uncompressed high definition video HDMI and multi-channel audio data to the connected display with HDMI port. The HDMI ports are different source output.
  • Page 334 User's Manual 2.1.3 Dimensions Figure 2-5 Dimension (mm [inch]) 2.2 12-HDD Series 2.2.1 Front Panel Figure 2-6 Front panel Table 2-3 Front panel description Button/Port Description Boot up or shut down device. Power indicator light status is as follows: ● When device is off (indicator light is off), press the button Power for a short period to boot up device.
  • Page 335: Rear Panel

    User's Manual Button/Port Description RESET button Click to restart the device. Displays power status. ● Amber light is on: The device has properly connected to Power indicator the power source. light ● The indicator light is off: The device has not connected to the power source.
  • Page 336 User's Manual Figure 2-9 IVSS7012-M rear panel Figure 2-10 IVSS7112 rear panel (the single-power series) Figure 2-11 IVSS7112 rear panel (the redundant series) Table 2-4 Rear panel description Name Description Power input port Inputs 100–240 VAC power. Displays AI module status. ●...
  • Page 337 User's Manual Name Description SAS extension port. It can connect to the SAS extension SAS port controller. AUDIO OUT Audio output port. Positioning indicator light. It is controlled by the ID button on the front panel. ● The blue light is on, device is positioning now. ID indicator light ●...
  • Page 338: Dimensions

    User's Manual 2.2.3 Dimensions Figure 2-12 Dimensions (mm [inch]) 2.3 16-HDD Series ● The Device has an embedded display on select models. ● The Device has power redundancy on select models. 2.3.1 Front Panel Figure 2-13 Front panel with LCD...
  • Page 339 User's Manual Figure 2-14 Front panel without LCD Table 2-5 Front panel description Button/Port Description Once the front panel lock is secure, it can prevent HDD from Front panel lock being stolen or removed by mistake. Unlock the front panel lock and remove the front panel, you can view 16 HDD slots.
  • Page 340: Rear Panel

    User's Manual 2.3.2 Rear Panel Figure 2-15 IVSS7016 rear panel (single power) Figure 2-16 IVSS7016 rear panel (redundant power) Figure 2-17 IVSS7016-M rear panel (single power) Figure 2-18 IVSS7016-M rear panel (redundant power)
  • Page 341 User's Manual Table 2-6 IVSS7016 rear panel description Name Description Power input port Inputs 100–240 VAC power. Displays AI module status. ● The yellow light flashes: AI module is running properly. ● The yellow light is on: AI module is AI module indicator light malfunctioning.
  • Page 342 User's Manual Name Description 8 groups of alarm output ports (NO1 C1–NO8 C8). They output alarm signal to the alarm device. Please make sure there is power to the external alarm device. Alarm Output ● NO: Alarm output port of Normally Open type. ●...
  • Page 343 User's Manual Name Description High definition audio and video signal output port. The port outputs the uncompressed high HDMI port definition video and multi-channel audio data to the connected display with HDMI port. The two HDMI ports are different source output. AUDIO IN Audio input port.
  • Page 344: Dimensions

    User's Manual 2.3.3 Dimensions Figure 2-21 Dimensions with LCD (mm [inch]) Figure 2-22 Dimensions without LCD (mm [inch])
  • Page 345: 24-Hdd Series

    User's Manual 2.4 24-HDD Series 2.4.1 Front Panel Figure 2-23 Front panel with LCD Figure 2-24 Front panel without LCD Table 2-8 Front panel description Button/Port Description Boot up or shut down device. The power on-off button has the indicator light. It can display device- running status.
  • Page 346: Rear Panel

    User's Manual Button/Port Description Once the front panel lock is secure, it can prevent HDD from being stolen or removed by mistake. Front panel lock Unlock the front panel lock and remove the front panel, you can view 16 HDD slots. After you remove the front panel, you can see there are 24 HDDs.
  • Page 347 User's Manual Figure 2-27 IVSS7024-M rear panel (single power) Figure 2-28 IVSS7024-M rear panel (redundant power) Table 2-9 Rear panel description (1) Button/Port Description Power input port Inputs 100–240 VAC power. 16 groups (1–16) alarm input ports. They are corresponding to ALARM 1–ALARM 16. The alarm becomes valid in low level.
  • Page 348 User's Manual Button/Port Description 10/100/1000Mbps self-adaptive Ethernet port. Network port Connects to the network cable. SAS extension port. It can connect to the SAS SAS port extension controller. Connects to external devices such as USB storage USB port device, keyboard and mouse. SATA peripheral port.
  • Page 349 User's Manual Figure 2-30 IVSS7124-M rear panel (redundant power) Table 2-10 Rear panel description (2) Name Description Power input port Inputs 100V-127V/200-240V AC power. 16 groups (1–16) alarm input ports. They are corresponding to ALARM 1–ALARM 16. The alarm becomes valid in low level. ●...
  • Page 350: Dimensions

    User's Manual Name Description AUDIO OUT Audio output port High definition audio and video signal output port. The port outputs the uncompressed high definition HDMI port video and multi-channel audio data to the connected display with HDMI port. The two HDMI ports are different source output.
  • Page 351 User's Manual Figure 2-32 Dimensions without LCD (mm [inch])
  • Page 352: Hardware Installation

    User's Manual 3 Hardware Installation This section introduces HDD installation, cable connection, and so on. Some series product is heavy. It needs several persons to carry or move, in order to prevent person injury. 3.1 Installation Flow Figure 3-1 Installation flow 3.2 Unpacking the Box When you receive the Device, please check against the following checking list.
  • Page 353: Hdd Installation

    User's Manual 3.3 HDD Installation The section introduces the detailed operations to install HDD. Different models support different HDD numbers. 3.3.1 8-HDD Series Step 1 Remove the 2 screws on the rear panel. Figure 3-2 Remove screws Step 2 Remove the chassis cover in the direction indicated by the arrow. Figure 3-3 Remove chassis cover Step 3 Remove the screws on the edge of the HDD holder, and then remove the holder.
  • Page 354 User's Manual Figure 3-4 Remove HDD holder Step 4 Align the 4 screw holes on the HDD to the 4 screw holes on the HDD holder, and then tighten the screws. Figure 3-5 Install HDD (1) Step 5 Repeat step 4 to install the other HDDs on the holder. Figure 3-6 Install HDD (2) Step 6 Repeat step 5 to install HDDs on the other holder.
  • Page 355: 12-Hdd Series

    User's Manual Figure 3-7 Install HDD (3) Step 7 Align the left and right 2 pairs of holes of the two holders to the corresponding holes on the chassis, place the holders on the chassis, and then tighten the screws on the edge of the holders.
  • Page 356: 16/24-Hdd Series

    ① Press the button on the ③ Insert the HDD box into closely along the upper side front panel of IVSS, open the of the box and press down to the HDD slot, press it to the handle, and then pull out the...
  • Page 357: Cable Connection

    ① Press the button on the then close the handle. ② Put the HDD into the box front panel of IVSS, open the along the direction shown in handle, and then pull out the the figure.
  • Page 358: Alarm Connection

    User's Manual 3.4.1 Alarm Connection Before using the alarm, connect alarm input or alarm output device. 3.4.1.1 Connection The section introduces alarm connection of the Device. Alarm Input ● Both NO and NC are supported. ● The alarm input port supports alarm signal from ground and device of 12-24 V voltage. ●...
  • Page 359: Alarm Port

    User's Manual 3.4.1.2 Alarm Port Figure 3-9 8-HDD series Figure 3-10 12-HDD series Figure 3-11 16/24-HDD series (1)
  • Page 360: Alarm Input

    User's Manual Figure 3-12 16/24-HDD series (2) Table 3-2 Alarm port Icon Description They are corresponding to ALARM 1–ALARM 16. The alarm 1–16 becomes valid in low level. NO1 C1–NO8 C8 Eight groups of normally open linkage output (on-off value). +12V Constant power output, 500mA current.
  • Page 361: Alarm Output

    User's Manual Figure 3-13 NC alarm input connection 3.4.1.4 Alarm Output ● The alarm output is on-off output (Normally Open Contact), and there should be external power supply to alarm output device. ● RS-485 A line and B line: connecting the A line and B line on the PTZ decoder. ●...
  • Page 362: Connection Diagram

    User's Manual Model HRB1-S-DC5V Operating ambient temperature -30 °C to +70 °C 3.4.2 Connection Diagram The following steps are to connect 16-HDD series device. See the actual product for detailed information. The following figure is for reference only. The actual product shall prevail. ●...
  • Page 363: Starting The Device

    User's Manual 4 Starting the Device ● Before starting the device, make sure that the input voltage shall match the device power requirement. ● To ensure stable operation of the device and prolong service life of HDD, provide stable voltage with less ripple interference by reference to international standard.
  • Page 364: Initial Settings

    User's Manual 5 Initial Settings When using the Device for the first time, initialize the device, and set basic information and functions first. 5.1 Initializing Device If it is your first time to use the device after purchasing or after restoring factory defaults, set a login password of admin (system default user).
  • Page 365 User's Manual Table 5-1 Time parameters description Parameters Description Time Zone The time zone of the Device. Set system date and time manually or by synchronizing with NTP server time. ● Manual Setting: Select date and time from the calendar. ●...
  • Page 366: Quick Settings

    User's Manual Figure 5-3 Password protection Step 7 Set password protection information. You can use the email you input here or answer the security questions to reset admin password. See "8.7.3.2 Resetting Password" for detailed information. ● Click to cancel the email or security questions. ●...
  • Page 367 User's Manual Step 1 On the completion page of initialization, click Enter Quick Setting. Figure 5-4 IP setting Step 2 Configure IP address. 1) Click of the corresponding NIC. Figure 5-5 Edit Ethernet network 2) Set parameters. Table 5-4 TCP/IP parameters description Parameters Description Speed...
  • Page 368: Configuring P2P Settings

    User's Manual Parameters Description When there is a DHCP server on the network, check Use Dynamic Use dynamic IP address IP Address, system can allocate a dynamic IP address to the device. There is no need to set IP address manually. Check Use Static IP Address, and then set static IP address, subnet Use static IP address mask and gateway to set a static IP address for the device.
  • Page 369: Login

    User's Manual Figure 5-6 P2P access Step 2 Click to enable P2P function. The function is disabled by default. Step 3 Click Finish to save settings. After the configuration, you can register a device to the APP to view remote video, playback record file, and so on.
  • Page 370 User's Manual Step 3 Log in to PCAPP. 1) There are two ways to enter PCAPP. ● On the installation completion page, click Run. ● Double-click the shortcut icon on the PC desktop. ● When PC theme is not Aero, the system will remind you to switch the theme. To ensure video smoothness, switch your PC to Areo theme.
  • Page 371: Logging In To Local Interface

    User's Manual Figure 5-9 Live view Table 5-5 Home page description Name Description Displays enabled application icon. Point to the app and then click to close the app. Task column The live function is enabled by default and cannot be closed.
  • Page 372: Preparation

    User's Manual 5.3.2.1 Preparation Ensure that the Device is connected with display, mouse and keyboard. For cable connection, see "3.4 Cable Connection". 5.3.2.2 Operation Steps Step 1 Turn on the Device. Step 2 Enter username and password. ● Click Login. For your device safety, change the admin password regularly and keep it well.
  • Page 373: Configuring Remote Device

    User's Manual 5.4 Configuring Remote Device Register remote device to the system. You can view the live video from the remote device, change remote device settings, and so on. 5.4.1 Initializing Remote Device After you initialize the remote device, you can change remote device login password and IP address. Remote devices can be connected to the Device only after being initialized.
  • Page 374 User's Manual Using current device password and password protection information is enabled by default. Keep it enabled so as to automatically use current device admin password and email without manual configuration. Go to Step 6 if you keep it enabled. 1) To manually configure password, click to disable Using current device password and password protection information.
  • Page 375 User's Manual Figure 5-12 Password protection 4) Set an email address. Enter an email address. You can use the email address here to reset password in case you forgot password in the future. Step 6 Click Next button. Figure 5-13 Modify IP...
  • Page 376 User's Manual Step 7 Set camera IP address. ● When there is DHCP server in the network, select DHCP, and the remote device gets dynamic IP address automatically. It is unnecessary to enter IP address, subnet mask and gateway. ● Select Static, and then enter static IP address, subnet mask, default gateway and incremental value.
  • Page 377: Adding Remote Device

    User's Manual 5.4.2 Adding Remote Device Device supports smart add, manual add and template add. Table 5-7 Add mode Add Mode Description Search the remote devices on the same network and then filter to register. For details, see "5.4.2.1 Smart Add". Smart Add It is useful if you do not know the exact IP address.
  • Page 378 User's Manual Figure 5-15 Smart add Step 3 Click Start Search. To set search conditions, you can click Figure 5-16 Search results...
  • Page 379 User's Manual Table 5-8 Result description Parameters Description Click Start Search to start searching remote device. Now it becomes Stop Start Search Search button. Click Stop Search button to stop searching remote device. Password Enter the username and password of the selected device for adding it. Select uninitialized remote device and then click Initialize button to Initialize initialize remote device.
  • Page 380: Manual Add

    User's Manual Step 5 Click Add. ● Click remote device IP address, username, password, SN, channel and port to change corresponding information. ● If system fails to add the remote device, see the reason on the Status column to change the remote device information and then click Retry to try to add again.
  • Page 381 Parameters Description Select a channel number for the remote device on IVSS. Channel No. If you select Auto Allocation, IVSS will provide a channel number automatically. Displays the connection protocol of the remote device. Default protocol of Manufacturer the system is Private. Click Private to select other protocols.
  • Page 382: Rtsp

    User's Manual Parameters Description Enter the port number of the remote device. Port When the Manufacturer is Private, you need to configure this parameter. Select the channel number for the remote device. 1. Select a link type. Remote CH No. 2.
  • Page 383: Batch Add

    User's Manual Step 2 On the Device List page, click Add. The Add Device page is displayed. Step 3 Click RTSP. Step 4 Enter RTSP address as required. RTSP address format is rtsp://<username>:<password>@<IP address >:<port>/cam/realmonitor?channel=1&amp;subtype=0. ● Username: Username of the remote device. ●...
  • Page 384 User's Manual 2) Fill in and save the template file. Step 4 Import template file. 1) Click Browse to select the file that you have filled in. 2) Select an import mode and then click Import. ● Overwrite: The system removes the added remote devices before importing new devices.
  • Page 385 User's Manual Figure 5-23 Confirm Step 6 Click Continue to add or Finish. ● Click Continue to add, device goes back to Smart add page to add more remote device. ● Click Finish to complete adding remote device process. Device displays Device manager page to view the newly added remote device information.
  • Page 386: Ai Operations

    This chapter introduces how to configure the AI functions respectively. The AI detections can be done by camera (AI by camera) or by IVSS (AI by device). ● AI by camera: When configuring an intelligent detection, if you select AI by camera, the intelligent analysis job is completed on the camera, and the Device just receives and processes the results.
  • Page 387: Face Detection

    User's Manual Table 6-1 AI Events by Device or Camera AI Event AI by Camera AI by Device Face Detection Face Recognition People Counting Video Metadata Crowd Distribution Call Alarm Smoking Alarm Vehicle Recognition Plate Comparison 6.2 Face Detection System triggers alarms when human faces are detected within the detection zone. 6.2.1 Enabling AI Plan To use AI by camera, you need to enable AI plan first.
  • Page 388 User's Manual Step 2 Select a remote device in the device tree on the left. Step 3 Select AI Plan > Face Detection. Figure 6-2 AI by camera Figure 6-3 AI by device Step 4 Click AI by camera or AI by device, and then click to enable face detection.
  • Page 389: Live View Of Face Detection

    User's Manual Step 5 Set detection area on the video (yellow area). Figure 6-4 Area ● Click or white dot on detect region frame, and drag to adjust its range. ● Click to set the minimum size or maximum size of the face detection area. System triggers an alarm once the size of detected target is between the maximum size and the minimum size.
  • Page 390: Live View

    User's Manual ● Click Sync from AI-Dis., obtain global smart detection display rule of IVSS. See "8.4.2.4.2 Setting AI Display" for detailed information. ● Click Apply to all windows to copy current configuration to other window(s). Figure 6-5 Face Step 2...
  • Page 391: Face Records

    User's Manual Figure 6-6 Live Point to a features panel, and the operation icons are displayed. Figure 6-7 Face database ● Click to add this image to the face database. See "6.8.3.2.3 Adding from Detection Results" for detailed information. ● Click or double-click the detected image, so the system starts to play back the recorded videos (about 10s) at the time of snapshot.
  • Page 392: Face Search

    User's Manual Figure 6-8 Detection image On the FACE TOTAL page, the following operations are available. ● Point to a piece of face record, click , and then you can quickly add this image to the face database. See "6.3.3.4.3 Adding Face Image" for detailed information. ●...
  • Page 393 User's Manual Figure 6-9 Search by property Step 2 Select a remote device, and then set Event Type to be Face Detection. In the Event Type drop-down list, if you select All, the search results will include both face detection records and face recognition records. Step 3 Set face property and time.
  • Page 394 User's Manual Figure 6-10 Search results Point to a piece of record, and then the following icons are displayed. Figure 6-11 Icons Table 6-2 Description Icon Operation ● Select one by one: Click the panel or move the mouse pointer onto the panel, and then click to select the panel.
  • Page 395: Searching By Image

    User's Manual Icon Operation ● Export one by one: Click to export picture, video and video player. For details, see "6.2.4.3 Exporting Face Records". ● Export in batches: Select the panel and click to export picture, video or excel. For details, see "6.2.4.3 Exporting Face Records". After setting alarm linkage snapshot, during exporting images, the system exports detected images and panoramic images at the time of snapshot.
  • Page 396 User's Manual Figure 6-12 Choose picture from face database 2) Specify search conditions. 3) Click Query. 4) Select a face image. 5) Drag to set similarity. 6) Click OK to upload face image. ● Upload the image from the passerby database. 1) Click and select Passerby Database.
  • Page 397 User's Manual Figure 6-13 By image ● When the uploaded image is half-length photo or full-body photo, the system automatically selects the frame of the uploaded image and only the face area will be retained. ● When there are multiple faces in the uploaded images, the system automatically identifies the faces in the images and uploads multiple face images according to the number of faces recognized.
  • Page 398: Searching Face Database

    User's Manual Function ● : displays the number of images found. ● : Displays the number of face images found. ● : Displays the number of human body images found. The numbers are displayed only when related search is enabled. ●...
  • Page 399: Searching Task Lists

    User's Manual Figure 6-16 Search results Table 6-4 Search results page description Function ● Displays the selected search images. The number at the lower-right corner of the image represents the number of records found. ● Click the image to view detailed results. ●...
  • Page 400: Exporting Face Records

    The search results of face records can be exported. You can select to export video, picture and excel that contain detailed information. ● Make sure that you have inserted USB storage device into your IVSS. ● The exported alarm-linked snapshot contains the face snapshot and the background picture.
  • Page 401 User's Manual Figure 6-19 Search results of face records ● Export in batches Export more than one record. Support specifying file formats. Step 1 Select more than one record. To export all records, select the checkbox of All. Step 2 Click , and then select file formats.
  • Page 402: Face Recognition

    User's Manual 6.3 Face Recognition The system compares captured face with the face database and works out the similarity. When the similarity reaches the threshold as you have defined, an alarm will be triggered. 6.3.1 Configuration Modes Face recognition can be configured in the following modes: ●...
  • Page 403 User's Manual Step 4 Enter Face database name. Figure 6-22 Create a face database for remote devices Step 5 Click Register Face or Save and close. ● To add faces into the database, click Register Face. For details, see #d1415e7a1026. ●...
  • Page 404: Adding Face Images For Remote Devices

    User's Manual ◇ In batches: Hover over the face database, and then select the database by clicking . After selecting multiple databases, click ◇ Delete all: Select All, and then click ● To clear a face database, select the face database, and then click Clear. 6.3.2.3.2 Adding Face Images for Remote Devices Add face images to the created face database in the way of manual add, batch import, or bin import.
  • Page 405 User's Manual faces in the images and uploads multiple face images according to the number of faces recognized. Select face image you want to upload. Blue frame means that it is selected. ● Click Cancel to cancel all checked face images. 5.
  • Page 406 User's Manual Item Description Enter number in the format of yyyymmdd or yyyy-mm-dd. For example, Birthday 20181123. Region Enter the corresponding abbreviation of the region. Province Enter the corresponding spelling or English name of the province. ID type Enter the corresponding number. 1. ID card, 2. Passport, 3. Others. ID number Fill in the corresponding ID number.
  • Page 407: Configuring Face Recognition (By Camera)

    User's Manual Bin Import To import face images from another device into the current device, you can import a bin file of face images exported from that device. 1. On the LIVE page, click , and then select FILE > Face Management > Face Database > Remote.
  • Page 408: Live View Of Face Recognition

    Click and select the Face tab. ● Click Sync from AI-Dis., obtain global smart detection display rule of IVSS. See "8.4.2.4.2 Setting AI Display" for detailed information. ● Click Apply to all windows, it is to copy current configuration to other window(s).
  • Page 409: Live View

    User's Manual Figure 6-29 Face Step 3 Enable Show Tracking Box. After it is enabled, when the system detects face or human, the window will display corresponding rule box. Step 4 Enable features panel. 1) Click next to Features Panel, to enable the function. When the panel is enabled, the snapshots of detected faces are displayed on the live view.
  • Page 410: Face Total

    User's Manual ◇ During face detection, features panel displays detection time, the detected face image and feature. ◇ During face recognition, features panel displays detection time, the detected face image, face image in the database, comparison result and database name. After setting stranger mode, when the detected face image mismatches face image in the database, features panel will have Stranger tag.
  • Page 411: Face Search

    User's Manual Point to a piece of face record, click , and then you can save the record, which contains video and picture. ● Search for similar target. Point to a piece of face record, click , and then the system automatically searches for the similar faces in the defined period.
  • Page 412 User's Manual Step 2 Select a remote device, and then set Event Type to be Face Recognition. Step 3 Select face mode and set face property and time. Step 4 Click Query. Figure 6-33 Search results Point to a piece of record, and then the following icons are displayed. Figure 6-34 Icons Table 6-7 Description Icon...
  • Page 413: Searching By Property

    User's Manual Icon Operation Click to quickly add the image to the face database. See "6.3.3.4.3 Adding Face Image" for detailed information. ● Export one by one: Click to export picture, video and video player. For details, see "6.2.4.3 Exporting Face Records". ●...
  • Page 414: Face Detection By Camera + Face Recognition By Device

    User's Manual Figure 6-35 1:1 face recognition Step 2 Click and then upload two images to be compared. Step 3 Click Start. The comparison result will be displayed. 6.3.3 Face Detection by Camera + Face Recognition by Device 6.3.3.1 Configuration Procedure Figure 6-36 Configure face detection (AI by camera) Figure 6-37 Configure face recognition (AI by device) 6.3.3.2 Enabling AI Plan...
  • Page 415 User's Manual Figure 6-38 AI by camera Step 4 Click AI by camera , and then click to enable face detection. AI by camera supports Face Enhancefunction. After enabling Face Enhancefunction, system displays enhanced human face zone on the surveillance window. Step 5 Set detection area on the video (yellow area).
  • Page 416: Configuring Device Face Database

    User's Manual System triggers an alarm once the size of detected target is between the maximum size and the minimum size. Step 6 Click Deployment Time to select a schedule from the drop-down list. System triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Deployment Time drop-down list.
  • Page 417: Exporting Face Database

    User's Manual ● Number: The proportion of the number of added face images in the face databases and passerby databases to the allowed face images in total. ● Space: The proportion of the space occupied by the face databases and passerby databases to the allowed space in total.
  • Page 418: Adding Face Image

    User's Manual ● The Path is the one where the exported bin file is saved. ● The Password is the one used when the file is being imported. If the bin file being exported is larger than 4 GB, the file is divided into multiple parts, with the first named as device name_database name_exporting time_part1.zip.
  • Page 419 User's Manual Figure 6-43 Face register ● When the uploaded image is half-length photo or full-body photo, the system automatically selects the frame of the uploaded image and only the face area will be retained. ● When there are multiple faces in the uploaded images, the system automatically identifies the faces in the images and uploads multiple face images according to the number of faces recognized.
  • Page 420 User's Manual Figure 6-44 Face information 7. Click Save and continue to add or OK. ● Click Save and Continue to add to save current face image information and add another human face image. ● Click OK to save current face image information and complete registration. After adding the image, at the lower-left corner of the human face image, there is an icon .
  • Page 421 User's Manual 1. On LIVE page, click , and then select FILE > Face Management > Face Database > Local. 2. Double-click a face database. 3. Click Batch Import. 4. Import face image. ● Upload a file: Click , select multiple face images, and then click Open. You can select multiple face images by holding Shift and then clicking the first and the last face images, or holding Ctrl and then click the images one by one.
  • Page 422 User's Manual ● A bin file is divided into multiple parts when being exported if it is larger than 4 GB. When importing the file parts, you just need to select any one part of the file, and then all parts are imported.
  • Page 423: Creating Passerby Database

    User's Manual Figure 6-47 Face register 2. Select a face database, and fill in person information according to your actual situation. 3. Click OK to save the configuration. 6.3.3.4.4 Creating Passerby Database If you configure an alarm to link passerby database, when the detected face is not in the face database, system automatically captures the face image, and then save it to the passerby database.
  • Page 424 User's Manual databases to the allowed space in total. Step 3 Enter the passerby database information, and then click OK. Figure 6-49 Create a passerby database Table 6-9 Parameters of creating passerby database Parameter Description Name Enter the name of the database. Configure how many face images the database can store.
  • Page 425: Human Face Abstract

    User's Manual Parameter Description When the captured face image is found in the passerby database, and the quality is higher than that of the one in the database, the system replaces the face image in the database. A successful comparison of the captured image against the database will not be reported.
  • Page 426: Managing Face Pictures

    User's Manual ● During the abstracting process, some intelligent functions (such as human face recognition, search human face and so on.) are null. These functions become normal after the abstracting process is completed. Step 1 On the LIVE page, click , and then select FILE >...
  • Page 427: Configuring Face Recognition (By Device)

    User's Manual Figure 6-52 Copy to 3. Select a face database. ● You can select more than one face databases. ● You can also select a face database by entering the database name in the Face database name box and clicking Query. ●...
  • Page 428 User's Manual Figure 6-53 Face recognition (AI by Device) Step 4 Click AI by Device, and then click Step 5 Click Deployment Time to select schedule from the drop-down list. After setting arm period, system triggers actions when there is a motion detection alarm in the specified period.
  • Page 429: Live View

    User's Manual Figure 6-55 Face database configuration 2) Click to enable association with the database and then set parameters. Table 6-11 Configuration description Parameters Description Delete the associated database. It is to set human face similarity. System compares the human face with the image on the face Similarity database.
  • Page 430: Enabling Ai Plan

    User's Manual Figure 6-57 Configure face recognition (AI by device) 6.3.4.2 Enabling AI Plan To use AI by camera, you need to enable the corresponding AI plan first. For details, see "6.2.1 Enabling AI Plan". 6.3.4.3 Configuring Face Recognition (by Camera) Configure face recognition rules.
  • Page 431 User's Manual Step 1 Click or click on the configuration page, and then select EVENT. Step 2 Select a remote device in the device tree on the left. Step 3 Select AI Plan > Face Detection. Figure 6-60 AI by device Step 4 Click AI by device, and then click to enable face detection.
  • Page 432: Configuring Device Face Database

    User's Manual ● Click to set the minimum size or maximum size of the face detection area. System triggers an alarm once the size of detected target is between the maximum size and the minimum size. Step 6 Click Deployment Time to select a schedule from the drop-down list. System triggers corresponding alarm actions only during the alarm deployment period.
  • Page 433: Enabling Ai Plan

    User's Manual Figure 6-63 Configure video metadata (AI by device) Figure 6-64 Configure face recognition (AI by device) 6.3.6.2 Enabling AI Plan Enable AI plan when AI by camera is used. See "6.2.1 Enabling AI Plan" to enable video metadata function.
  • Page 434: Configuring People Counting

    User's Manual 6.4.2 Configuring People Counting The system counts the number of people in and out of the detection area. When the number of entry, exit or stay is larger or smaller than the threshold, an alarm is triggered. Step 1 Click , click , and then select EVENT.
  • Page 435: Configuring In Area No

    User's Manual Step 8 Click Save. 6.4.3 Configuring In Area No. The system counts the number of people in and out of the detection area. When the number of entry or exit is larger or smaller than the threshold or when the dwell time of any person in the area is greater than the threshold, an alarm is triggered.
  • Page 436: Configuring Queuing Detection

    User's Manual Parameters Description Max Detect Height 0–300. Min Detect Height 0–300. Step 6 Select a schedule in the Deployment Time drop-down list. Alarms are triggered only within the scheduled time. Step 7 Click Actions to set alarm linkage actions. Step 8 Click Save.
  • Page 437: Live View

    User's Manual Parameters Description 1. Click to enable the alarm. 2. Set people number threshold. ● If you select and then enter a number, alarm is triggered when the detected number is larger or equal to Area People Counting Alarm the number that you entered.
  • Page 438: Viewing Ai Report

    User's Manual Figure 6-68 Live view The live video displays real-time people number in the region, and the region frame flashes red once there is an alarm. The queue-detection live view also shows head frames and the dwell time of each person.
  • Page 439 User's Manual Figure 6-69 People counting report Figure 6-70 Average strand time report Figure 6-71 Queuing people counting report ● Click to select the areas of which you need to view the reports. The ordinate of the report displays different areas in different colors, showing the number of people in different areas or the average strand time.
  • Page 440: Video Metadata

    User's Manual ● Point to the report, and then the report shows the details at that time point. ● Drag the gray scroll bar under the ordinate to view the statistics for different time periods. ● Click to view the line chart. ●...
  • Page 441 User's Manual Figure 6-72 AI by camera Figure 6-73 AI by device Step 4 Click next to Feature Vector Extraction to enable feature extraction, and then the Device can extract features of human, vehicles and non-motor vehicles and display them on the live view.
  • Page 442: Live View Of Video Metadata

    User's Manual ● Drag to adjust the detection area. ● Click to draw an excluded area which will not be detected. The Device does not detect target within the excluded area. ● Click to set the minimum size or maximum size of the face detection area. System triggers an alarm once the size of detected target is between the maximum size and the minimum size.
  • Page 443: Live View

    User's Manual Create view(s) before setting filtering conditions. To create a view, see "7.1.1 View Management". Step 1 Select a view from LIVE > View > View Group. Step 2 Click at the lower side of the LIVE page, and then select Face, Human, Vehicle or Non- Motor Vehicle.
  • Page 444: Detection Statistics

    User's Manual ● Rule box is displayed in real-time in the video image. Different detection targets correspond to different colors of rule box. ● Features panels are displayed on the right side of the video image. Figure 6-76 Live Point to the features panel, and the icons are displayed. Figure 6-77 Icons (vehicle detection) ●...
  • Page 445: Motor Vehicle

    User's Manual Figure 6-78 Human detection ● Point to the snapshot, and then click to add the face image to face database. For details, see "6.3.3.4.3 Adding Face Image". This function is available when face image is captured. ● Point to the snapshot, and then click or double-click the picture to play back the video record (10 s before and after the snapshot).
  • Page 446: Ai Search

    User's Manual Figure 6-80 Non-motor vehicle detection ● Point to the detected information, and then click , or double-click detected picture to play back the video record (10 s before and after the snapshot). ● Point to the detected information, and then click to export the video record to specified saving path.
  • Page 447 User's Manual Figure 6-81 Search by human Step 2 Select one or more devices, and then select Human Detection as Event Type. Step 3 Select alarm type. Step 4 Set human properties and time period. Click to set the color. means more than one color.
  • Page 448 User's Manual Figure 6-82 Search result Related Operations Click one displayed panel, and the icons are displayed. Figure 6-83 Icons (1) Figure 6-84 Icons (2)
  • Page 449: Searching By Image

    User's Manual Table 6-15 Operation Icon Operation ● Select one by one: Click to select the panel. means the panel is selected. ● Select in batches: Select All to select all the panels on the page. Click or double-click the panel to play back the video record (10 s before and after the snapshot).
  • Page 450 User's Manual Figure 6-85 Search by image 2. Click the Device tab. 3. Upload a picture. Upload from PC or USB storage device. Up to 50 pictures can be uploaded. Up to 10 pictures can be uploaded at a once. a.
  • Page 451 User's Manual Figure 6-86 Related search 5. Set similarity. It is 80% by default. 6. Select a remote device in the device list, and then set search time. 7. Click Query. Searching Task List Upload a human body picture search the analyzed video for similar targets. For details about AI tasks, see "7.4.1 AI Analysis Task".
  • Page 452 User's Manual Figure 6-87 Task list 3. Upload a human body picture. For details, see step 3 in "6.2.4.2.1 Searching Devices". 4. Click to enable related search. If related search is enabled, the system searches for both face detection results and human detection results.
  • Page 453 User's Manual Figure 6-88 Related search 5. Set similarity. It is 80% by default. 6. Select a task to be searched. 7. Click Query. Managing Search Results Figure 6-89 Search results Table 6-16 Search results page description Function ● Displays the selected search images. The number at the lower-right corner of the image represents the number of records found.
  • Page 454: Vehicle Search

    User's Manual Function Select the panel and click to export picture, video or excel. For details, see "6.2.4.3 Exporting Face Records". Filter the search results according to properties. ● : Sort the records by time. ● : Sort the records by similarity. Displays the face panels, including face image, feature property and similarity.
  • Page 455 User's Manual The search results are displayed. If license plate is detected, both the scenario and the license plate will be displayed. Figure 6-91 Search result Click one displayed panel, and the icons are displayed. Figure 6-92 Icons Table 6-17 Operation Icon Operation ●...
  • Page 456: Non-Motor Vehicle Search

    User's Manual Icon Operation ● Export one by one: Click to export picture, video and video player. For details, see "6.2.4.3 Exporting Face Records". ● Export in batches: Select the panel and click to export picture, video or excel. For details, see "6.2.4.3 Exporting Face Records". After setting alarm linkage snapshot, during exporting images, the system exports detected images and panoramic images at the time of snapshot.
  • Page 457 User's Manual Step 7 Click Query. Figure 6-94 Search results Figure 6-95 Icons Table 6-18 Operation Icon Operation ● Select one by one: Click to select the panel. means the panel is selected. ● Select in batches: Select All to select all the panels on the page. Click or double-click the panel to play back the video record (10 s before and after the snapshot).
  • Page 458: Ivs

    User's Manual 6.6 IVS The IVS feature includes a number of behavior detections such as fence-crossing, intrusion, tripwire, parking, crowd gathering, missing object, abandoned object, and loitering. You can configure alarm notifications of those intelligent detections. This section introduces how to configure the intelligent detections. Some device models only support some IVS functions by device.
  • Page 459: Rule Configuration

    User's Manual Step 3 Select AI Application > IVS > AI By Camera > Global Config. Figure 6-97 Global config Step 4 Configure anti-disturbance and sensitivity settings. ● Click to enable anti-disturbance function. ● Drag to adjust sensitivity. Step 5 Calibrate horizontal and vertical scales.
  • Page 460 User's Manual Functions Description Scene When the target enters, leaves, or appears in the detection area, an Intrusion alarm is triggered, and the system performs configured alarm linkages. When an object is abandoned in Scenes with sparse targets and without the detection area over the obvious and frequent light change.
  • Page 461 User's Manual Figure 6-98 AI by camera Figure 6-99 AI by device Step 4 Set tripwire rules. 1) Click Add Rule, and then select Tripwire. 2) Click to enable detection rule. Click to delete detection rule. 3) Click to edit the tripwire line. ●...
  • Page 462 User's Manual Figure 6-100 Configure tripwire detection rules 4) Click to set minimum size or maximum size of detection target. System triggers an alarm once the detected target size is between the maximum size and the minimum size. Step 5 Configure AI recognition and sensitivity.
  • Page 463: Live View Of Ivs

    User's Manual 6.6.3 Live View of IVS On the LIVE page, view real-time IVS results. 6.6.3.1 Setting AI Display Set the display rules of detection results. Make sure that view is created before setting AI display. To create view, see "7.1.1 View Management".
  • Page 464 User's Manual Figure 6-103 Vehicle Figure 6-104 Non-motor vehicle Step 3 Configure feature panel. 1) Click next to Features Panel to enable feature panel. 2) A features panel is displayed on the right side of the video when a target that meets the conditions is detected.
  • Page 465: Live View

    User's Manual Step 4 Click OK. 6.6.3.2 Live View Go to the LIVE page, enable view, and then the Device displays view video. ● When a target triggers cross line or cross region rule, the line or region frame in the view flickers in red.
  • Page 466: Ivs Search

    User's Manual Figure 6-107 Vehicle total ● Point to a picture and click , or double-click the picture, so the system starts playing back video (10 s before and after the snapshot moment). ● Point to a picture and click to export video and picture.
  • Page 467: Vehicle Recognition

    User's Manual Table 6-20 More operations Name Operation ● Select one by one: Move the mouse pointer onto the panel. Click Select a panel to select the panel. means it is selected. ● Click ALL to select all the panels. Click the panel, and click or double-click the panel.
  • Page 468: Live View Of Vehicle Recognition

    Step 4 Click the Deployment Time drop-down list to select schedule. IVSS links alarm event when alarm is triggered within the defined schedule. ● Click View Schedule to view detailed schedule settings. ● If the schedule is not added or the added schedule does not meet actual needs, click Add Schedule.
  • Page 469: Live View

    User's Manual Figure 6-110 Motor vehicle Step 3 Click next to Show Tracking Box to enable tracking box function. A tracking box is displayed in the video image when target meeting detection rule is detected. Step 4 Set features panel. 1) Click next to Features Panel to enable features panel function.
  • Page 470: Detection Statistics

    User's Manual Figure 6-111 Live Point to the features panel, and the operation icons are displayed. ● Click to add license plate information to the plate database. For details, see "6.8.3.2.3 Adding from Detection Results". ● Click or double-click the vehicle image to play back the video image (10 s before and after the snapshot).
  • Page 471: Searching For Detection Information

    User's Manual 6.7.4 Searching for Detection Information Set event type and vehicle properties, and then search for vehicle detection information. For details, see "6.5.4.2 Vehicle Search". 6.8 ANPR The system detects number plates using video metadata or vehicle recognition, and then compares the detected number plates with the ones in the database.
  • Page 472 User's Manual Figure 6-114 Register vehicle info ● Click Save and close to create database without editing its information. The newly-created database can be viewed on the Vehicle Database page. Related Operations After creating a database, you can modify the database name, register plate information, arm the database, and delete the database.
  • Page 473: Registering Vehicle Information

    User's Manual 6.8.3.2 Registering Vehicle Information Add vehicle information to the created database. You can add vehicles one by one, in batches or directly add from the detection results. 6.8.3.2.1 Manual Add Step 1 On the LIVE page, click , and then select FILE > Vehicle Management > Vehicle Database.
  • Page 474: Batch Import

    User's Manual Parameters Description Plate Color Click to select the color of vehicle plate. Click , and you can select the vehicle type. Blue means already Type selected. Figure 6-117 Vehicle type Step 5 Click Save and continue to add or OK. ●...
  • Page 475 User's Manual Figure 6-118 Batch import Step 4 Acquire and fill in the template file. 1) Click Download Template to download the template to local PC or USB storage device. The saving path might vary when operating on client or local interface. ●...
  • Page 476: Adding From Detection Results

    User's Manual Figure 6-119 Vehicle information 6.8.3.2.3 Adding from Detection Results Add plate information from vehicle recognition or detection results to the database. Step 1 On the LIVE page, select the vehicle information to be added. ● Click , move the mouse pointer to the information panel, and then click ●...
  • Page 477: Editing Vehicle Information

    User's Manual 6.8.3.3.1 Editing Vehicle Information Step 1 Point to the database, and then click Step 2 Modify vehicle information according to actual needs. Step 3 Click OK. 6.8.3.3.2 Copying Vehicle Information Copy the vehicle information in a database to another database. You can only copy and apply the vehicle information to a database of the same type.
  • Page 478: Deleting Vehicle Information

    User's Manual 6.8.3.3.3 Deleting Vehicle Information ● Delete one by one: Point to the database, and then click at the upper right corner to delete the database. ● Delete in batch ◇ Point to the database, and then click at the upper left corner to select the database. Select multiple databases in this way, and then click to delete selected databases.
  • Page 479: Live View Of Anpr

    User's Manual Figure 6-122 Associate vehicle without database Step 7 Link database. Repeat the following steps to link multiple databases. 1) Click Associate Vehicle Database, and select the database to be linked. Figure 6-123 Database linkage Table 6-23 Database linkage parameters Parameters Description AI Alarm Rule...
  • Page 480: Live View

    User's Manual Step 2 Click , and then select Vehicle tab. Figure 6-124 Vehicle Step 3 Click next to Show Tracking Box to enable tracking box function. A tracking box is displayed in the video image when target meeting detection rule is detected.
  • Page 481: Detection Statistics

    User's Manual Figure 6-125 Live Point to the features panel, and the operation icons are displayed. Figure 6-126 Icons ● Click to add license plate information to the plate database. For details, see "6.8.3.2.3 Adding from Detection Results". ● Click or double-click the vehicle image to play back the video image (10 s before and after the snapshot).
  • Page 482: Ai Search

    User's Manual database. For details, see "6.8.3.2.3 Adding from Detection Results". ● Point to the information panel, and then click or double-click the picture to play back the video image (10 s before and after the snapshot). ● Point to the information panel, and then click to export the video and picture to specified saving path.
  • Page 483 User's Manual Figure 6-128 Search by property Step 3 Select Plate Comparison as the Event Type. Step 4 Set vehicle properties and time period. Step 5 Click to set the color. means more than one color. Step 6 Click Query. The search result is displayed.
  • Page 484: Searching By Database

    User's Manual Figure 6-130 Icons Table 6-24 Operations Icon Operation ● Select one by one: Point to the panel, and then click at the upper right side to select the panel. means the panel is selected. ● Select in batches: Select All to select all the panels on the page. Point to the panel, and then click or double-click the panel to play back the video record (10 s before and after the snapshot).
  • Page 485: Crowd Distribution Map

    User's Manual Figure 6-131 Search by vehicle database Step 3 Select the database to be searched. Step 4 Click Query. Step 5 The search result is displayed. If license plate is detected, both the scenario and the license plate will be displayed. Click one displayed panel, and the icons are displayed.
  • Page 486: Enabling Ai Plan

    User's Manual 6.9.1 Enabling AI Plan Enable the corresponding AI plan before using AI by camera functions. For details, see "6.2.1 Enabling AI Plan". 6.9.2 Configuring Crowd Distribution Map Set crowd distribution alarm rules. 6.9.2.1 Global Configuration Draw lines on the image to determine the geographical scale of the image. Step 1 Click or click...
  • Page 487: Live View Of Crowd Distribution

    User's Manual ● Set regional detection rules. 1) Click Add Rule. Figure 6-133 Add Rules 2) Drag to adjust the size. 3) Configure alarm threshold. Alarm is triggered when the detected people number reaches the threshold. ● Set global alarm. 1) Click , and then drag to adjust the size of the yellow area.
  • Page 488: Call Alarm

    User's Manual Figure 6-134 Live view of crowd distribution ● Right-click on the live video, and then select Crowd Distribution Map > PIP. A blue section is displayed, and it shows the crowd distribution status inside the current view. ● Right-click on the live video, and then select Crowd Distribution Map > Global to switch to the distribution view.
  • Page 489: Live View Of Call Alarm

    User's Manual Figure 6-135 Configure call alarm Step 5 Click and drag to adjust the size of the detection area (yellow area). Step 6 Set Sensitivity and Min Duration. ● Sensitivity: The higher the Sensitivity is, the easier the call action is detected. ●...
  • Page 490: Call Alarm Search

    User's Manual Figure 6-136 Live view of call alarm 6.10.4 Call Alarm Search Search for videos or images of call alarm. Step 1 On the LIVE page, click , and then click Search.
  • Page 491: Smoking Alarm

    User's Manual Figure 6-137 Search Step 2 Select one or more devices. Step 3 Set search parameters. ● Record 1) Select Thermal as record type. 2) Select Call Detection as detection type. 3) Select a stream type. 4) Set time period. ●...
  • Page 492: Enabling Ai Plan

    User's Manual smoking detection rules for the visible light channel of a thermal camera. Smoking alarm is only available with AI by Camera. 6.11.1 Enabling AI Plan Enable the corresponding AI plan before using AI by camera functions. For details, see "6.2.1 Enabling AI Plan".
  • Page 493: Live View Of Smoking Alarm

    User's Manual You can select an existing schedule from the Deployment Time drop-down list. You can also add a new schedule. For details, see "8.8.4 Schedule". Step 7 Click Action to set alarm action. See "8.4.1 Alarm Actions" for detailed information. Step 8 Click Save.
  • Page 494: General Operations

    User's Manual 7 General Operations This chapter introduces general operations such as live view, playback, alarm, AI functions, and IVS. 7.1 Live and Monitor After you have logged in, the LIVE page is displayed. Point to the middle of video window and the left column. is displayed.
  • Page 495: View Management

    User's Manual Figure 7-2 Live (2) Table 7-1 Live page description Description View zone. Displays the created view and view group. See "7.1.1 View Management" for detailed information. Resource pool. Displays the added remote device list. PTZ zone. It is to control the PTZ. See "7.1.3 PTZ" for detailed information. Smart preview icons.
  • Page 496: View Group

    User's Manual Figure 7-3 View 7.1.1.1 View Group View group is a group of views. The view group allows you to categorize and manage view. It is easy for you to search and find the view. Create view or view group under the View. ●...
  • Page 497: Operation

    User's Manual Figure 7-4 Create view group Step 2 Set view group name. ● The view group name ranges from 1 to 64 characters. It can contain English letters, numbers and special characters. ● View group is to classify or category different view groups. We recommend the view group name shall be easy to recognize.
  • Page 498: View

    User's Manual Figure 7-5 Rename Table 7-2 View group Name Operation ● Select a view group and then click . Set view group name and click any spare panel. Rename view group ● Right-click view group and select Rename. Set view group name and click any spare panel.
  • Page 499 User's Manual Step 1 Follow the steps listed below to create view. ● Select a view group and then click , select Add view. ● Right-click a view group, select Add view. Figure 7-6 Edit view (1) Step 2 Double-click a remote device in resource pool, or drag the remote device to the right panel.
  • Page 500 User's Manual Figure 7-7 Edit view (2) Step 3 Set view name. The view name ranges from 1 to 64 characters. It can contain English letters, number and special character. Step 4 Click OK to save the configuration. Device pops up a prompt of Successfully operated. Related Operations After creating view, view can be edited, enabled, renamed or deleted.
  • Page 501: Editing View

    User's Manual Name Operation ● Delete: Select a view and then click , or right-click view and then select Delete. Delete view ● Batch delete: Click , select views you want to delete and then click Figure 7-8 Menu 7.1.1.2.2 Editing View In edit view mode, you can perform the following functions: ●...
  • Page 502: Enabling View

    User's Manual Figure 7-9 Edit view Step 2 Edit view as you require. ● Add remote device: Double-click remote device in the resource pool, or drag the remote device to the free layout grid on the right panel. ● Delete remote device: Point to window on the right, and click at the top right corner.
  • Page 503 User's Manual Figure 7-10 View window When enabling the view, you can change video position, zoom video window. ● When adjusting view window position, drag the view window to the layout grid of the green background color. You cannot drag the view window to the grid of red background color. ●...
  • Page 504: View Window

    User's Manual Name Description In the resource pool, double-click the remote device or drag the remote device to the right panel, you can add remote device to current view. Drag the remote device to the view window to replace the original remote device.
  • Page 505 When USB storage device is connected, recordings are saved in Recording USB storage device. ◇ Otherwise, the recordings are saved in the device. Query or export manual recording by playback control. ● PCAPP Default storage path of recording is C:/Program Files (x86)/iVSS/video. Set storage path.
  • Page 506: Shortcut Menu

    ● PCAPP Default storage path of snapshot is C:/Program Files (x86)/iVSS/pictures. Set storage path. Take snapshots of face or human during live view, and use the snapshot Search by image to search for similar targets.
  • Page 507: Digital Zoom

    User's Manual Table 7-6 Shortcut menu Parameters Description Set current window stream. It includes main stream/sub stream 1/sub Stream stream 2. Digital Zoom Set digital zoom. Zoom in one part of live image to view details. Bit Rate Displays real-time bit rate on the window or not. Set video window scale.
  • Page 508: Searching By Image

    User's Manual ● Select a zone you want to zoom in on the video window again, system zooms in the zone at the larger rate. ● Right-click and then select Digital Zoom > OFF, it is to cancel zoom in effect. The video restores original effect.
  • Page 509 User's Manual Figure 7-16 Fisheye dewarp Step 1 Right-click on the live video, and then select Fisheye Dewarp. Step 2 Select an installation method. ● Click to select ceiling mount. ● Click to select wall mount. ● Click to select ground mount. Step 3 Select a display mode.
  • Page 510: Smart Tracking

    User's Manual 7.1.1.3.6 Smart Tracking Track targets manually or automatically. This function is only available on the multi-sensor panoramic camera + PTZ camera. Make sure that the linked tracking function has been enabled. Step 1 Right-click on the live video, and then select Smart Tracking > ON. Figure 7-17 Smart tracking Step 2 Select the tracking method.
  • Page 511: Talk

    User's Manual Figure 7-18 Thermal 7.1.1.3.8 Talk The Talk function enables voice interaction between the Device and remote devices, improving the efficiency in handling emergency events. Step 1 Log in to PCAPP. Step 2 Open a view on the Live page. Figure 7-19 Talk Step 3 Click...
  • Page 512: Resources Pool

    User's Manual 7.1.2 Resources Pool The resource pool displays the added remote device list. The system automatically divides into groups according to device type. Figure 7-20 Resources pool Table 7-8 Resources pool description Operation Description Input key words at , device displays the corresponding remote devices.
  • Page 513: Ptz

    User's Manual Operation Description ● Point to the remote device name, you can view remote device IP address and port number. ● On the device list, click one remote device and then press Ctrl, click other remote device, you can select several remote devices at the same time.
  • Page 514 User's Manual Figure 7-21 PTZ Table 7-9 PTZ Icons Icons Description Press and hold on , and drag it up and down. It is to set PTZ speed. The higher the value is, the faster the PTZ speed is. Control PTZ movement in the following ways. ●...
  • Page 515: Ptz Menu Settings

    User's Manual Icons Description Click to enter the PTZ menu mode. For details, see "7.1.3.1 PTZ Menu Settings". Zoom. Click to adjust lens zoom rate of the remote device. Focus. Click to adjust lens focus of the remote device. Iris. Click it to adjust iris size of the remote device. Click to use windshield wiper, light, IR and linear scan, auxiliary commands.
  • Page 516: Configuring Ptz Functions

    User's Manual Figure 7-22 PTZ menu Table 7-10 PTZ menu description Parameters Description Set remote device image parameters involving picture, exposure, Camera backlight, WB, day and night, focus and zoom, defog, and default. Set remote device PTZ functions such as preset, cruise, scan, pattern, rotation, and PTZ restart.
  • Page 517 User's Manual Procedure Step 1 Log in to PCAPP. Step 2 Select a PTZ camera from the views. Step 3 On the PTZ panel, click Figure 7-23 Call a preset Step 4 Click the direction icons to rotate the camera to a specific position. Step 5 Click , enter the name of the new preset, and then click...
  • Page 518: Setting A Cruise

    User's Manual 7.1.3.2.2 Setting a Cruise A cruise is a sequential set of presets. After you call a cruise, the PTZ camera automatically rotates to the presets one by one at the pre-defined interval. Procedure Step 1 Log in to PCAPP. Step 2 Select a PTZ camera from the views.
  • Page 519: Setting Linear Scanning

    User's Manual Step 2 Select a PTZ camera from the views. Step 3 On the PTZ panel, click Step 4 To start recording a pattern, double-click on a pattern name, click Start Record, perform a series of PTZ actions as desired, and then click Stop Record. The maximum number of patterns depends on the camera capability.
  • Page 520: Enabling Auxiliary Functions

    User's Manual Figure 7-27 Set a linear scanning Step 5 To call the linear scanning, hover over the name, and then click . To stop, click 7.1.3.2.5 Enabling Auxiliary Functions Enable PTZ windshield wiper, light and IR. Step 1 Log in to PCAPP. Step 2 Select a PTZ camera from the views.
  • Page 521 User's Manual Figure 7-29 Search Step 2 Select a remote device, and then click Record tab. Click to display only channels. Click to display channels and devices. Step 3 Select a record type from among All Record, Manual Record, Video Detect, and IO Alarm and Thermal.
  • Page 522 User's Manual Figure 7-30 Schedule Step 5 Click Search. The record thumbnail is at the top of the remote device, and the time bar displays the record period (green color means there is a record). ● The selected remote device is on the left panel. Click a remote device, and the record file thumbnail is on the right panel.
  • Page 523 User's Manual select. System supports maximum 16 windows. System automatically adjusts each window size according to the original scale of playback file. ● The thumbnail with means system is playing record file of current thumbnail. Figure 7-32 Search Table 7-11 Search icons description Signal Words Description Click to synchronize playback mode.
  • Page 524 User's Manual Signal Words Description Click to switch to frame by frame playback. It is only valid in pause mode. Click to play back at fast speed. The fast speed includes1, 2, 4, 8, and 16. Click the icon once, the playback speed upgrades one level.
  • Page 525: Clipping Recorded Video

    User's Manual Signal Words Description Shortcut menu: Right-click on the playback window, you can view the shortcut menu. ● Zoom: It is to zoom in a specified zone and view the details. ● Original scale: It is to set view window scale. ◇...
  • Page 526: Playing Back Snapshots

    User's Manual Figure 7-34 Video clipping frame Step 4 Click the record edit column (the blue column) and drag to the left or right, to select start time and end time of clipping. Step 5 Click Save Immediately. Figure 7-35 Save Step 6 Click Browser to select saving path.
  • Page 527 User's Manual Figure 7-36 Image playback (1) Step 3 Select image type, including Manual Snap, Video Detect, IO Alarm and Thermal. Step 4 Set search time. ● Method 1: Click the date or time on the time column, change time or date value. ●...
  • Page 528 User's Manual Figure 7-38 Image thumbnail ● The selected remote device is on the left panel. Click a remote device, and the image thumbnail is on the right panel. ● Click to move thumbnail list, and display the hidden thumbnail. ●...
  • Page 529: Exporting File

    User's Manual 7.2.4 Exporting File Export record file or image to the designated storage path. ● The default record file mode is .dav and the image file mode is .jpg. ● Connect USB device to the system if you are on the local menu to operate. Step 1 On the LIVE page, click and then select SEARCH.
  • Page 530 User's Manual Figure 7-42 Save 3) Click Browser to select saving path. For local operation, after you set storage path, the Save page displays the Format button. Click the Format button to clear all data on the USB storage device. The formatting operation will clear all data.
  • Page 531: Video Tag

    User's Manual Figure 7-43 Download ● Click Pause all to pause all download tasks. Click Start all to resume download tasks. ● Click Clear completed columns to delete all downloaded tasks. ● Click of the corresponding task to pause download task. Click to resume download.
  • Page 532: Locking Files

    User's Manual Figure 7-44 Tag Step 4 Enter tag name, and then click OK. 7.2.6 Locking Files Lock specific videos or pictures so they cannot be viewed. An locked file can only be viewed after being unlocked. On the LIVE page, click , and then select SEARCH.
  • Page 533: Vehicle Management

    User's Manual 7.3.2 Vehicle Management See "6.8.3 Configuring Vehicle Database". 7.3.3 Tag Management Step 1 On the LIVE page, click , and then select FILE > Tag Management > Tag Management. Figure 7-45 Tag management Step 2 Select a channel, set start time and end time, and then click Search. The tags during the set time period are displayed.
  • Page 534: Voice Management

    User's Manual Figure 7-46 File lock Step 2 Select a channel, set start time and end time, and then click Search. The locked files are displayed. ● Click to view the video of the locked file. ● Click Refresh to view the latest locked files. ●...
  • Page 535: Watermark Verification

    User's Manual Figure 7-47 Audio management Step 2 Click Import to select the audio files that you want to import. Step 3 Click OK. The uploaded audio file is displayed. After the audio file is uploaded, it can be renamed or deleted. Table 7-13 Audio file operation Name Operation...
  • Page 536: Task Management

    User's Manual Figure 7-48 Watermark Step 2 Click Browse to select a video file. Step 3 Click Verify. ● Normal: If the verification result is normal, the correct watermark is displayed. ● Exception: If the verification result is abnormal, the abnormal watermark and its type are displayed.
  • Page 537: Importing Task Resources

    User's Manual 7.4.1.2 Importing Task Resources Import task resources from PC or USB storage device for AI analysis. Procedure Step 1 On the LIVE page, click , and then select TASK > Resource Management. Figure 7-51 Resource management Step 2 Click Import to import .dav file from PC or USB storage device.
  • Page 538 User's Manual Step 4 Select a task type from Analysis Target. 1) Click the analysis target cell. Figure 7-53 Analysis target 2) Select a task type. Table 7-14 Task type description Rule Name Operations ● Click next to Enabled to enable human detection as well as face detection.
  • Page 539: Viewing Analysis Results

    User's Manual Figure 7-54 AI analysis task After an AI analysis task is created, the Device automatically runs analysis within the defined execution period. During the period, real-time AI analysis is suspended. On the AI Analysis Task page, you can perform the following operations. Table 7-15 Task operations Function Operation...
  • Page 540: Backup

    User's Manual Step 3 Click to enable the function. Figure 7-55 Extract Eigenvector Again Step 4 Specify the start time and end time of the day. ● The system automatically creates tasks to re-extract Eigenvector of history images with unmatched model versions during the period. ●...
  • Page 541 User's Manual 3) Set the time period. Step 4 Click Search. Step 5 Back up files by downloading or remote backup. ● Download 1) In the search results, select one or more files, and then click Download. Figure 7-57 Save 2) Select a file type.
  • Page 542: Alarm List

    User's Manual Figure 7-58 Remote device 2) Click Query to search for connected third-party storage devices. 3) Select a storage device, and then in the Type box, select a target format for the file. 4) Click Format to format the selected storage device. The formatting operation will clear all data of the storage device.
  • Page 543: Display Management

    User's Manual ● Click to confirm alarm event. The confirmed event will be removed from the alarm list. ● Click the alarm event on the alarm list. The device displays the 20 seconds video before and after the alarm event occurred. ◇...
  • Page 544 User's Manual Figure 7-61 Display Table 7-16 Difference between main screen and sub screen Name Main screen Sub screen User operation (Login, log out, change password, lock) Preview and Monitor Search Confirm alarm File Management Intelligent Analytics Function Operations Multiple-screen control System Info Background Task...
  • Page 545: Locking Screen

    User's Manual Name Main screen Sub screen Device, network, event, storage, account, security System Configuration strategy, and system management, and cluster. 7.7.2 Locking Screen Click and then select Lock to lock the screen. The screen stops at current page and cannot operate other functions.
  • Page 546: Background Task

    User's Manual 7.9 Background Task View background task running status. Click , device displays background task list. Click All, Running, or Waiting to view the corresponding background task list. Figure 7-64 Background task 7.10 Buzzer View buzzer alarm messages. Click .
  • Page 547: System Configuration

    You can set the Device or remote devices. ● Select the root node in the resource tree to set IVSS name and storage plan. ● Select a remote device in the device list. Set its property, connection, video, OSD, and storage...
  • Page 548: Viewing Device Information

    User's Manual Figure 8-2 Device management Click or click Add to add remote device to the system. 8.2.1 Viewing Device Information View information of the Device. Step 1 Click , and then select DEVICE. Step 2 Select the root node in the resource tree, and then click the Device Info tab.
  • Page 549 User's Manual Figure 8-3 Device information Table 8-1 Device info Parameters Description Name Set device name. Description Device description. Displays device info, including type, SN, MAC, number of video, audio and alarm in/out channels, video input Device info bandwidth, system version, security baseline version, web version, and algorithm version.
  • Page 550: Remote Device

    User's Manual 8.2.2 Remote Device The Device supports to add remote device, modify its IP address and configurations, and export its information. 8.2.2.1 Viewing Remote Devices View connected remote devices. For details about adding devices, see "8.2.2.3 Configuring Remote Devices". Step 1 Click , or click...
  • Page 551: Modifying Ip Of Unconnected Devices

    User's Manual 8.2.2.2.1 Modifying IP of Unconnected Devices ● You can only modify the IP address of initialized devices. ● You can only modify the IP address of remote devices connected with private protocol. Step 1 Click , or click on the configuration page, and then select DEVICE.
  • Page 552: Modifying Ip Of Connected Devices

    User's Manual Figure 8-6 Modify IP (1) Step 5 Enter the static IP address, subnet mask, gateway, and incremental value. ● Enter incremental value only when multiple remote devices are modified. If you want to change IP addresses of several devices at the same time, system allocates IP address one by one according to your setting at the fourth bit of the IP address.
  • Page 553: Configuring Remote Devices

    User's Manual Information". Step 1 Click , or click on the configuration page, and then select DEVICE. Step 2 Select a remote device and then click Modify IP. Figure 8-7 Modify IP (1) Step 3 Enter the IP address, subnet mask, gateway, and incremental value. ●...
  • Page 554: Configuring Device Property

    User's Manual The page displayed might vary with remote devices. See the actual page for detailed information. 8.2.2.3.1 Configuring Device Property Set remote device name, and view device information. Step 1 Click , or click on the configuration page, and then select DEVICE. Step 2 Select a remote device on the left panel and then click Property tab.
  • Page 555 User's Manual Figure 8-9 Modify IP 4) Click OK to save setting. Step 4 Change port number. 1) Click of the corresponding port. Figure 8-10 Port 2) Change port number. 3) Click OK to save setting. Step 5 Set other parameters. Table 8-3 Connection parameters description Parameters Description...
  • Page 556: Configuring Video Parameters

    User's Manual On the local interface of the Device, you cannot click to go to the web interface of the remote device. 8.2.2.3.3 Configuring Video Parameters Set different video parameters according to different bit stream types based on the bandwidth. Step 1 Click , or click...
  • Page 557: Configuring Osd

    User's Manual Parameters Description Set video encode mode. ● H.264: It is a highly compressed video encoding or encoding standard. At the same video quality, it has increased the compression rate by 2X compared with the MPEG-2. Encode mode ● H.265: It is a new video encode standard coming after H.264. It has improved the complicated relationship among bit stream, encode quality, latch and algorithm on the previous standard.
  • Page 558 User's Manual Figure 8-12 OSD Step 3 Enable OSD information according to actual requirements. ● Set device name 1. Click to enable OSD of device name. 2. Click 3. Enter device name. Figure 8-13 Device name 4. Drag the text box to the proper position. 5.
  • Page 559: Configuring Audio Parameters

    User's Manual Figure 8-15 Geographical position 4. Drag the text box to the proper position. 5. Click to save the OSD information. ● Set privacy masking This function is available only when the camera supports privacy masking. 1. Click to enable privacy masking. 2.
  • Page 560: Exporting Remote Devices In Batches

    User's Manual Table 8-5 Audio parameters Parameter Description The audio encoding mode set here applies to both audio streams Compression and voice talks. We recommend leaving it as default. The number of samples of a sound that are taken per second. The Sampling Frequency higher the value, the more accurate the digital representation of the sound can be.
  • Page 561: Importing Remote Devices In Batches

    User's Manual 8.2.2.5 Importing Remote Devices in Batches Import devices in batches by using the template. On the Device List page, click Batch Import to go to the Add Device page. On the Add Device page, click the Import CSV File tab. 8.2.2.6 Connecting Remote Devices On the Device page, view connection status of remote device in the device list.
  • Page 562: Changing Device Password

    User's Manual 8.2.2.8 Changing Device Password Change passwords of connected devices. You can only modify devices successfully connected to IVSS via private protocol. Step 1 Click , or click on the configuration page, and then select DEVICE. Step 2 Select a remote device and then click Change Password.
  • Page 563: Basic Network

    User's Manual Figure 8-20 Network management 8.3.1 Basic Network Set basic network parameters of the device, such as IP address, port aggregation and port number, to connect with other devices in the network. 8.3.1.1 Configuring IP Address Set device IP address, DNS server information and other information according to network planning. Device has 4 Ethernet ports by default.
  • Page 564 User's Manual Figure 8-21 TCP/IP Step 2 Click of the corresponding NIC to edit network parameters. Figure 8-22 Edit Ethernet network Step 3 Set parameters. Table 8-6 TCP/IP parameters description Parameters Description Speed Current NIC max network transmission speed. IP Type Select IPv4 or IPv6.
  • Page 565: Port Aggregation

    User's Manual Parameters Description Set NIC MTU value. The default setup is 1500 Byte. We recommend you to check the MTU value of the gateway first and then set the device MTU value equal to or smaller than the gateway value.
  • Page 566: Binding Nic

    User's Manual Aggregation mode Description In this mode, device has bonded several NICs and set one NIC as the main card and the rest NICs are the alternative NICs. Usually, only the main NIC card is working. System can automatically enable other Fault-tolerance alternate cards to work when the main card breaks down.
  • Page 567 User's Manual Figure 8-23 Edit load balance 5) Set parameters. Table 8-8 TCP/IP parameters description Parameters Description Speed Maximum network transmission speed of current NIC. IP Type Select IPv4 or IPv6. When there is a DHCP server on the network, check the box to use Use Dynamic IP dynamic IP address.
  • Page 568: Cancelling Binding Nic

    User's Manual 8.3.1.2.2 Cancelling Binding NIC Cancel port aggregation and allow the bonded NICs to work as independent card. Step 1 Click or click on the configuration page, and then select NETWORK > Basic Network > TCP/IP. Step 2 Select a bonded NIC. Step 3 Click OK.
  • Page 569: Network Apps

    User's Manual Parameters Description Set according to the actual requirements. The default value is 80. The value ranges from 1 to 65535. HTTP Port If the value you set is not 80, please add the port number after the IP address when you are using browser to login the device.
  • Page 570: Ddns

    Device, without need to note down IP address. 8.3.2.2.1 Preparation Confirm whether IVSS supports the DDNS Type and log in the website provided by the DDNS service provider to register the information such as domain from PC located in the WAN.
  • Page 571: Procedure

    User's Manual 8.3.2.2.2 Procedure Step 1 Click , or click on the configuration page, and then selectNETWORK > Basic Network > DDNS. Figure 8-26 DDNS Step 2 Click to enable DDNS function. After enabling DDNS function, the third-party server might collect your device information. Pay attention to privacy security.
  • Page 572: Email

    Click Save. After successful configuration, enter domain name in address bar of the browser or PCAPP, and press Enter key to access the IVSS. 8.3.2.3 Email Configure email information, and enable alarm linked email. When NVR has alarm events, the system automatically sends emails to the user.
  • Page 573: Snmp

    User's Manual Table 8-11 EMAIL parameter description Parameters Description Select email server type, including Customize, Gmail, Hotmail, and Email Server Yahoo. Server Address Enter email server address. Set the encryption type of email server, such as NONE, SSL, and TLS. Encryption You are recommended to select TLS.
  • Page 574 User's Manual Figure 8-28 SNMP (1) Step 2 Click to enable the function. Step 3 Select SNMP version. ● If you have selected SNMP V1/V2, see the previous figure. ● If you have selected SNMP V3, see the following figure. Figure 8-29 SNMP(2) Step 4 Set parameters.
  • Page 575: Register

    User's Manual Table 8-12 SNMP parameters Parameters Description Port Listening port of agent programs on the device. Read or Write Community supported by the agent programs. Read Community, Write Community The name can only contain numbers, letters, underscores, and middle lines. The destination address of Trap information sent by the agent Trap Server program.
  • Page 576: Upnp

    In the Server box, enter the IP address of server for registration. Port Enter the port number of the server for registration. Enter Device ID to identify IVSS uniquely. Device ID shall be consistent Device ID with server configuration. Step 4 Click Save.
  • Page 577 The IP address is automatically obtained after the mapping succeeds. The list is consistent with the UPnP port mapping list on the router. ● Internal Port: The IVSS port to be mapped on the router. ● External Port: The WAN port of the internal port.
  • Page 578: Multicast

    User's Manual corresponding port number in the router network. 8.3.2.7 Multicast When multiple users are viewing live video of the same device at the same time, it might cause failure due to limited bandwidth. To solve this problem, you can set a multicast IP address (224.0.0.0– 239.255.255.255) for the Device.
  • Page 579: Alarm Center

    User's Manual 8.3.2.8 Alarm Center You can configure the alarm center server to receive the uploaded alarm information. Make sure that alarm center server is deployed. Step 1 Click , or click on the configuration page, and then select NETWORK > Network Apps >...
  • Page 580: Event Management

    User's Manual Figure 8-35 Add route table Step 3 Enter the information. Step 4 Click OK. 8.4 Event Management Click or click on the configuration page, select EVENT. On the page, configure alarm event, including alarm event of the Device and remote device. ●...
  • Page 581 User's Manual The supported actions might be different depending on the model you purchased. On the alarm configuration page, click Actions to display actions. Configure actions according to your actual need. ● After setting actions, click Save on the page. ●...
  • Page 582: Record

    User's Manual Actions Description Preparation Audio function has been When there is an alarm, configured. See "7.3.5 Voice Voice Prompt system can play the selected Management" for detailed audio file. information. Alarm is triggered when a tripwire or intrusion behavior is detected.
  • Page 583: Log

    User's Manual 8.4.1.3 Log Enable the log function. The system notes down the alarm information in the log when there is corresponding alarm event. Click Actions and select Log to enable this function. Figure 8-39 Log When log function is enabled, after an alarm is triggered, click on LIVE page, select MAINTAIN >...
  • Page 584: Snapshot

    User's Manual 8.4.1.6 Snapshot Set the snapshot linkage action for alarms, so that once an alarm happens, it will trigger a snapshot of the alarm. Click Actions, and then select Snapshot. Figure 8-42 Snapshot action 8.4.1.7 Local Alarm Out Set local alarm output. System can trigger the corresponding alarm event when an alarm occurs. Make sure that the Device is connected with alarm output device.
  • Page 585: Access

    User's Manual 8.4.1.9 Access Set access control function. When there is an alarm, system can trigger the corresponding access control device to open door and close door. Make sure that access control device has been added. See "5.4.2 Adding Remote Device" for detailed information.
  • Page 586: Report Alarm

    User's Manual On the event configuration page, select Actions > Smart Tracking to enable the action. 8.4.1.12 Report Alarm Click Actions and then select Report Alarm to enable this function. Where there is an alarm, the system reports the alarm to alarm center. Make sure that alarm center has been enabled.
  • Page 587: Local Device

    User's Manual 8.4.2 Local Device Set IVSS alarm event, including abnormal event, device offline alarm, AI application, and local device alarm. 8.4.2.1 One-click Disarming Disarm alarm linkage actions as needed to avoid interference caused by alarms. Step 1 Click , or click on the configuration page, and then select EVENT.
  • Page 588: Abnormal Event

    User's Manual 8.4.2.2 Abnormal Event Set the alarm mode when an abnormal event occurs. The Device supports HDD, storage error, network, AI module, fan and power fault alarm. Table 8-19 Abnormal event description Name Description System triggers an alarm when there is no HDD. It is enabled by No HDD default.
  • Page 589: Offline Alarm

    Click Save. 8.4.2.3 Offline Alarm Set IVSS network offline alarm. If you have not set offline alarm for a specified remote device, once the remote device is disconnected from the system, system adopts IVSS alarm strategy to trigger an alarm.
  • Page 590: Configuring Ai Application

    8.4.2.4.1 Viewing AI Plan After adding remote device, on IVSS, obtain AI detection type and status of the remote device. On the EVENT page, select the root node in the device tree on the left. Select AI Application > AI Plan >...
  • Page 591: Setting Ai Display

    User's Manual Figure 8-52 AI plan 8.4.2.4.2 Setting AI Display Set the property to be displayed in rule box and feature property panel. View AI detection result through smart preview, and support to display face, human and vehicle. Take the procedure of configuring face detection AI display as an example. For other AI detection functions, the procedures are similar.
  • Page 592 User's Manual After setting filter criteria, only the qualified detection result will be displayed. For example, enable Age, and then select youth from the drop-down list. The tracking box and the features panel only display the human face of the youth age. 1) Click to enable corresponding filter type.
  • Page 593: Setting Entries Frequency

    User's Manual Figure 8-55 Features panel Step 7 Click Save. 8.4.2.4.3 Setting Entries Frequency Step 1 Click , or click on the configuration page, and then select EVENT. Step 2 Select the root node in the device tree on the left. Step 3 Select AI Application >...
  • Page 594: Video Diagnosis

    User's Manual Parameter Description ● Set the statistical cycle as needed. Statistical Cycle ● The statistical cycle is 7 days by default. ● Set the threshold of entries frequency as needed. When the entries Entries Detected detected reaches or exceeds the threshold, an alarm is triggered. ●...
  • Page 595 User's Manual Figure 8-58 Video diagnosis Step 5 Click to enable video quality analysis. Step 6 Configure the parameters 1) Click to enable a type of video quality analysis, for example, tampering. 2) Set the threshold. 3) On the device list, select one or more devices. 4) Set the interval.
  • Page 596: Configuring Device Alarm

    User's Manual Figure 8-59 AI report 8.4.2.5 Configuring Device Alarm Set device alarm. When alarm input device sends an alarm signal to the Device, an alarm is triggered. ● Make sure that the Device is connected with alarm input device. ●...
  • Page 597: Remote Device

    User's Manual Table 8-21 Local alarm parameters description Parameters Description Name In the Alarm name box, enter a name for the alarm. Type Select alarm input device type. Both NO and NC are supported. Debouncing The system records only one event during this period. Step 6 Click Deployment Time to select schedule from the drop-down list.
  • Page 598 User's Manual Figure 8-61 Video motion Step 4 Click to enable video motion detection. Step 5 Set parameters. Table 8-22 Motion detect parameters description Parameters Description Debouncing System only records one alarm event during the debouncing period. After enabling exclude PTZ control, system does not trigger an alarm when you are manually control the PTZ.
  • Page 599: Tampering

    User's Manual Parameters Description Drag to adjust threshold. Once the detected percentage (the percentage of target to detection Threshold zone) is equivalent to or larger than the specified threshold, system triggers alarm. For example, the threshold is 10. Once the detected target occupies the 10% of the detection zone, system triggers an alarm.
  • Page 600: Offline Alarm

    User's Manual Step 7 Click Save. 8.4.3.2 Offline Alarm When the remote device and the IVSS are disconnected, system can trigger an alarm. Step 1 Click , or click on the configuration page, and then select EVENT. Step 2 Select a remote device in the device tree on the left.
  • Page 601: Thermal Alarm

    User's Manual Figure 8-64 IO1 Step 4 Click to enable the alarm. Step 5 Set parameters. Table 8-24 Local alarm parameters description Parameters Description Name In the Alarm name box, enter a name for the alarm. Type Select alarm input device type. Both NO and NC are supported. Debouncing The system records only one event during this period.
  • Page 602: Storage Management

    User's Manual Table 8-25 Thermal alarms Function Description When the thermal camera detects a fire, the alarm signal is transmitted Fire alarm to the Device, which performs an alarm linkage action. When the thermal camera detects that the temperature is above or Temperature alarm below the threshold value, the alarm signal is transmitted to the Device, which performs an alarm linkage action.
  • Page 603: Storage Resource

    User's Manual 8.5.1 Storage Resource 8.5.1.1 Local Hard Disk The local hard disk refers to the HDD installed on the system. You can view HDD space (free space/total space), temperature (centigrade/Fahrenheit), HDD information and so on. Click , or click on the configuration page, and then select STORAGE >...
  • Page 604: Format

    User's Manual Figure 8-66 S.M.A.R.T 8.5.1.1.2 Format ● Formatting HDD will clear all data on the HDD. Be careful! ● Hot spare HDD cannot be formatted. Enter the Local Hard Disk page, select HDD, and click Format. It is to format the selected HDD. 8.5.1.1.3 File System Repair Once you cannot mount the HDD or you cannot properly use the HDD, you can try to use the File System Repair function to fix the problem.
  • Page 605: Creating Raid

    User's Manual HDD for single-HDD mode. 8.5.1.2.1 Creating RAID RAID has different levels such as RAID5, RAID6 and so on. Different RAID levels have different data protection, data availability and performance levels. Create RAID according to your actual requirements. Creating RAID operation is going to clear all data on these HDD. Be careful! Procedure Step 1 Click...
  • Page 606 User's Manual RAID. ● Manual RAID: System creates a specified RAID type according to the selected HDD amount. 1) Select Manual RAID. 2) Select HDD you want to use. 3) Set parameters. Table 8-26 Manual creation parameters description Parameters Description Select storage device of the HDD and select the HDD you want to add to the RAID.
  • Page 607 User's Manual Figure 8-69 Create RAID (2) 2) Set parameters. Table 8-27 Auto parameters description Parameters Description Storage Device Select storage device of the HDD. Set RAID resources allocation mode. The default setup is self- adaptive. ● Self-adaptive means the system can automatically adjust RAID synchronization speed according to current business load.
  • Page 608 User's Manual Figure 8-70 Confirm info (manual) Figure 8-71 Confirm info (Auto) Step 5 Confirm information. If the input information is wrong, click Back to set RAID parameters again. Step 6 Click Create. System begins to create RAID. It displays RAID information after creation. Figure 8-72 RAID (2) Related Operations After creating RAID, view RAID disk status and details, clear up RAID, and repair file system.
  • Page 609: Creating Hot Spare Hdd

    User's Manual Table 8-28 RAID operation Name Operation View RAID HDD Click at the right side of the RAID name to open the RAID HDD list. It status is to view RAID HDD space, status and so on. View RAID details Click to view RAID detailed information.
  • Page 610 User's Manual Figure 8-74 Global hot spare Figure 8-75 Private hot spare Step 3 Select hot spare creation type. ● Global hot spare: Create hot spare for all RAID. It is not a hot spare HDD for a specified RAID group. ●...
  • Page 611: Network Hard Disk

    User's Manual Figure 8-76 Confirm info Step 5 Confirm information. Click Back to select hot spare HDD(s) again if you want to change settings. Step 6 Click Create to save settings. System displays the added hot spare HDD information. Figure 8-77 Hot spare (2) Select a hot spare HDD and then click Delete, it is to delete hot spare HDD.
  • Page 612: Iscsi Management

    User's Manual Figure 8-78 ISCSI application ● Select a network hard disk, and then click Format to format the disk. Formatting your hard disk will erase all data from your hard disk, so do it carefully. ● Click the HDD Operation column, and then you can select an HDD operation permission type. ◇...
  • Page 613 User's Manual Figure 8-79 Network hard disk Step 2 Click Figure 8-80 Add iSCSI Step 3 Set parameters. Table 8-29 Network hard disk parameters Parameters Description Server IP Enter iSCSI server IP address. Port Enter iSCSI server port number. It is 3260 by default.
  • Page 614: Video Recording

    The default number of disk group is the same as the maximum number of HDD that IVSS supports. Fox example, the Device supports a maximum number of 16 HDDs, and then the default number of disk group is 16.
  • Page 615: Setting Video/Image Storage

    User's Manual Figure 8-81 Disk group Step 3 Select HDD or RAID group from Disks, and then drag the HDD or the RAID group to another disk group. Disk grouping takes effect immediately. Select All to select all the HDDs and RAID groups of the disk group. After configuring disk groups, you can also view which disk group the selected disk, video or picture belongs to.
  • Page 616 User's Manual Figure 8-82 Video Step 2 Select filtering way from the Batch Process drop-down list. ● By Channel Name: Select channel according to the channel name. ● By Logical Channel No.: Select channel that is connected to the Device. In this case, Start Channel No.
  • Page 617: Recording Schedule

    User's Manual Figure 8-83 Device list Step 3 (Optional) Click to enable load balance, and then the icon turns into blue. To disable it, click it again, and then the icon turns into gray. ● After load balance is enabled, if one disk group has no usable disk, the video of all channels that belong to this disk group will be stored into all the usable disk groups.
  • Page 618: Recording Schedule

    User's Manual Step 3 Select a recording method. Step 4 (Optional) click to disabled the recording schedule configuration of the selected channel Step 5 Click Save. Figure 8-84 Recording Mode 8.5.2.2.2 Recording Schedule Configure video and picture recording schedules so the Device records and captures pictures as configured in the specified period.
  • Page 619 User's Manual Figure 8-86 Add a schedule 6. Click Save. Step 3 Set other parameters and then click OK. ● Record Events: Record event videos. ● Pre-record: The recording duration prior to the event. ● ANR: Automatic Network Replenishment. When ANR is enabled (by clicking ) , the Device will download videos recorded by IPC and stored on camera SD card during network disconnection.
  • Page 620: Basic

    User's Manual 8.5.2.3 Basic Configure the storage mode when the disk space is used up and the automatic deletion of expired files. 8.5.2.3.1 Setting Storage Mode Configure the storage mode when there is no more disk space available. Step 1 Log in to PCAPP.
  • Page 621: Record Transfer

    User's Manual Figure 8-88 Delete expired files Step 4 Click Save. 8.5.2.4 Record Transfer When the device and an IPC are disconnected, the IPC continues to record and stores the recording in the SD card. After the network is recovered, the device will download the recording during the disconnection from the IPC.
  • Page 622: Https

    User's Manual 8.6.1 HTTPS HTTPS can use the reliable and stable technological means to guarantee user information and device security and communication data security. After installing the certificate, you can use the HTTPS on the PC to access the device. ●...
  • Page 623: Installing Signature Certificate

    User's Manual 4) Follow the prompts to import the certificate. System goes back to Certificate page. Step 5 Click OK to complete certificate installation. Figure 8-90 Installed certificate 8.6.1.1.2 Installing Signature Certificate Upload signature certificate to install. Prerequisites Before installation, make sure that you have obtained safe and valid signature certificate. Procedure Step 1 Click...
  • Page 624: Enabling Https

    User's Manual installation. Step 5 Install the root certificate on the PC. See "8.6.1.1.1 Installing the Created Certificate" for detailed information. This root certificate is the one obtained with signed certificate. 8.6.1.2 Enabling HTTPS After you install the certificate and enable HTTPS function, you can use the HTTPS on the PC to access the device.
  • Page 625: Configuring Access Permission

    User's Manual Step 1 Click , or click on the configuration page, and then select SECURITY > Credential. Figure 8-93 Uninstall Step 2 Click Uninstall. System pops up a confirmation box. Step 3 Click OK to uninstall the certificate. 8.6.2 Configuring Access Permission Set the specified IP addresses to access the device, to enhance device network and data security.
  • Page 626: Safety Protection

    User's Manual ● Reject access list: It means the IP address in the list cannot access the device. ● Allow access list: It means the IP address in the list can access the device. Step 3 Add IP host. The following steps are to set reject access list or allow access list. 1) Click Add.
  • Page 627: Enabling System Service

    User's Manual Figure 8-95 Safety protection (1) Step 2 Click to enable security protection function. ● Remote: When you are using web interface, PCAPP to access the device remotely, once the login password error has exceeded the threshold within the defined time period, system locks the IP host for a period of time.
  • Page 628 User's Manual Figure 8-96 System service Step 2 Enable or disable system service according to your actual situation. Table 8-31 System service System service Description After enabling this function, you can access the Device through SSH protocol to carry out system debugging and IP configuration. This function is disabled by default.
  • Page 629: Configuring Firewall

    User's Manual System service Description Password Configure the password expiration interval. The Device prompts you to Expires in change the password when the password expires. When this function is enabled, stream transmission will be encrypted. Audio/Video Transmission We recommend you enable this function. Otherwise you might risk data Encryption leakage.
  • Page 630: Account Management

    User's Manual ● Hosts in the allowlist have the permission to synchronize time of the Device. ● Hosts in the blocklist cannot synchronize time of the Device. Step 4 On the Allowlist page or the Blocklist page, add hosts. 1) Click Add. Figure 8-98 Add a host 2) Select an IP version, and then enter an IP address.
  • Page 631: Adding User Group

    User's Manual ● System has two default user groups (read-only): admin and ONVIF. ● Create new user group under the root. 8.7.1.1 Adding User Group Step 1 Click , or click on the configuration page, and then select ACCOUNT. Step 2 Select the root node in the device tree on the left and then click at the lower-left corner.
  • Page 632: Deleting User Group

    User's Manual Figure 8-100 Authority 2) Set user group authorities according to actual situation. ● : means it has the corresponding authority. ● Check the box at the top of the authority list (such as (0) Authority Control) to select all authorities of current category.
  • Page 633 User's Manual left corner. Step 3 Enter current user’s login password, and then click OK. Figure 8-101 Property Step 4 Set parameters. Table 8-34 User management Parameters Description Set username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
  • Page 634: Operation

    User's Manual Figure 8-102 Authority Step 6 Click Save. 8.7.2.2 Operation After adding a user, you can modify user information or delete the user. The user with account management authority can change its own and other users’ information. Table 8-35 User operation Name Operation Select a user from user list.
  • Page 635: Changing Password Of The Current User

    User's Manual 8.7.3.1.1 Changing Password of the Current User Step 1 Click at the top right corner, and then select Modify Password. Step 2 Enter the old password, the new password and then confirm. Step 3 Click OK. 8.7.3.1.2 Changing Password of Other User Only Admin account supports this function.
  • Page 636: Resetting Password

    User's Manual Step 5 In the New Password box, enter the new password and enter it again in the Confirm Password box. Step 6 Click OK. 8.7.3.2 Resetting Password You can use email address or answer the security questions to reset password once you forgot it. You can only reset password on the local interface of the Device.
  • Page 637 User's Manual Figure 8-106 Enter email address Figure 8-107 Scan QR code Step 4 Reset the password.
  • Page 638 User's Manual Figure 8-108 Security questions Step 5 Click Next. Figure 8-109 New password setting Step 6 Set parameters. Table 8-36 Description of password parameters Parameters Description User The default username is admin. Password In the New Password box, enter the new password and enter it...
  • Page 639: Resetting Password On The Web

    User's Manual Parameters Description again in the Confirm Password box. The password must consist of 8–32 non-blank characters and Confirm Password contain at least two types of the following characters: Uppercase, lowercase, numbers, and special characters (excluding ' " ; : &). Enter a strong password according to the password strength indication.
  • Page 640 User's Manual Figure 8-111 Security questions Step 5 Click Next. Step 6 Set a new password. Figure 8-112 New password setting Table 8-37 Description of password parameters Parameters Description User The default username is admin. Password In the New Password box, enter the new password and enter it again in the Confirm Password box.
  • Page 641: Onvif

    User's Manual Parameters Description After setting the prompt, when you point to on the login page, the system pops up a prompt to help you remember the Prompt question password. The prompt question function is for local login only. See the actual page for detailed information.
  • Page 642: Deleting Onvif User

    User's Manual Step 4 Enter the login password of current user, and then click OK. Figure 8-114 ONVIF property Step 5 Set parameters. Table 8-38 ONVIF parameters description Parameters Description Set ONVIF username. username The name ranges from 1 to 31 characters. It can contain English letters, number and special character (_ @ .).
  • Page 643: System Configuration

    User's Manual Step 4 Click OK. 8.8 System Configuration Click or click on the configuration page, select SYSTEM. The SYSTEM page is displayed. Set system basic settings, such as general parameters, time, display parameter, schedule, and voice. Figure 8-115 System management 8.8.1 Setting System Parameters Set system language, standard, user logout time, virtual keyboard, and mouse moving speed.
  • Page 644: System Time

    User's Manual Parameters Description Select video standard. ● PAL is mainly used in China, Middle East and Europe. ● NTSC is mainly used in Japan, United States of America, Canada and Mexico. Standard As a technical standard of processing video and audio signals, PAL and NTSC mainly differ in encoding, decoding mode and field scanning frequency.
  • Page 645 Set time and date display format. Format Time Zone Set device time zone. After enabling this function, IVSS detects system time of remote device Auto Time once in every interval. When time of remote device is inconsistent with Synchronization IVSS time, IVSS will calibrate the time of remote device automatically.
  • Page 646: Display

    User's Manual 1) Click to enable DST. 2) Select DST mode. It includes Date and Week. 3) Set DST start time and end time. Step 4 Click Save. 8.8.3 Display Set connected display resolution and refresh rate. Step 1 Click , or click on the configuration page, and then select SYSTEM >...
  • Page 647: Schedule

    User's Manual Table 8-41 Display parameters description Parameters Description Set display resolution. Different displays support different Resolution resolutions. See your actual interface for detailed information. Refresh rate Set refresh rate of the display. Step 5 Click Save. 8.8.4 Schedule Set schedule. When you are configuring alarm, record arm/disarm period, system can call the schedule directly.
  • Page 648: Cluster Service

    In the N+M cluster system, there is a management server, the DCS (Dispatching Console) server, which is responsible for timely and correct scheduling management of the main and sub devices. When you create a cluster, the current IVSS is used as the first sub device and the DCS server by default.
  • Page 649 User's Manual Figure 8-120 Procedure of creating a cluster Step 1 Click , or click on the configuration page, and then select CLUSTER SERVICE > CLUSTER. Step 2 Add a main device or sub device. 1) Click Add. Figure 8-121 Add cluster 2) Set parameters.
  • Page 650: Viewing Details

    User's Manual Parameters Description Enter the IP address of the main device or sub device. IP Address When adding the first sub device, you need not enter the IP address, because the first sub device is the current device by default.
  • Page 651: Configuring Arbitration Ip

    User's Manual Figure 8-123 Event log 8.9.1.3 Configuring Arbitration IP When there are only 2 devices in the cluster, a third-party device is required to determine whether the main device is faulty, so arbitration IP must be set for the cluster to perform a normal replacement operation.
  • Page 652: Viewing Cluster Log

    User's Manual Figure 8-125 Add Step 3 Set parameters. Table 8-43 Parameters Parameters Description Main Device Main device IP. Sub Device Sub device IP. Select the channel of which the video is to be transferred. Channel No. Click to set the channel range. Start Time The start and end time of the video.
  • Page 653: System Maintenance

    User's Manual 9 System Maintenance Click on the LIVE page, and select MAINTAIN. You can operate and maintain the device working environment to guarantee proper operation. Figure 9-1 Maintain 9.1 Overview Click on the LIVE page, and select MAINTAIN > Overview. Figure 9-2 Overview Table 9-1 Overview Function...
  • Page 654: System Information

    User's Manual Function Description View the connection and idle status of remote devices ● Click Jump To to go to the DEVICE page for detailed Remote Device information. ● Click Refresh to refresh the data. View RAID status. ● Click Jump To to go to the STORAGE page for detailed RAID Status information.
  • Page 655: Viewing Legal Information

    User's Manual Figure 9-3 Device info 9.2.2 Viewing Legal Information View device software license, privacy policy, and open-source software note. Click on the LIVE page, and select MAINTAIN > System Info > Legal Info. 9.2.3 Viewing Algorithm Version View device algorithm license status and AI version information. Click on the LIVE page, and select MAINTAIN >...
  • Page 656: System Resources

    User's Manual Figure 9-4 Algorithm version 9.3 System Resources View device and AI module information. 9.3.1 Viewing Device Resource Click on the LIVE page, and select MAINTAIN > System Resources > DEIVCE INFO. The System Resources page is displayed. You can view resource status including CPU and memory usage, panel temperature and fan speed.
  • Page 657: Logs

    User's Manual 9.4 Logs The logs record all kinds of system running information. Check the log periodically and fix the problems in time to guarantee system proper operation. 9.4.1 Log Classification Search system log, user log, event log, and link log. Table 9-2 Log description Type Search system log.
  • Page 658: Intelligent Diagnosis

    User's Manual Figure 9-7 System log Related Operations Export and clear log. Table 9-3 Log operation Name Operation Click and then the Export window appears. You can select whether to encrypt the exported log information. ● You need to set a password for export encryption. The password is required to unzip the exported file.
  • Page 659: One-Click Export

    User's Manual Figure 9-8 Logs ● Click to export a log. ● After selecting multiple logs, click Export to export them in batches. 9.5.2 One-click Export Export the diagnosis data for troubleshooting when the device is in exception. Step 1 On the LIVE page, click , and select MAINTAIN >...
  • Page 660: Packet Capture

    User's Manual Figure 9-9 Block Step 3 Set block period. The default period is 30 minutes. Step 4 Click OK to save the configuration. 9.6.2 Packet Capture Packet capture is the practice of intercepting a data packet that is crossing or moving over a specific computer network.
  • Page 661: Device Maintenance

    ● When operating on the local interface, save the update file in the USB storage device and then connect the USB storage device to the IVSS. ● When operating on the web or PCAPP interface, save the update file on the PC in which the web or PCAPP is located.
  • Page 662: Updating Cameras

    ● When operating on the local interface, save the update file in the USB storage device and then connect the USB storage device to the IVSS. ● When operating on the web or PCAPP interface, save the update file on the PC in which the Web or PCAPP is located.
  • Page 663: Automatic Maintenance

    User's Manual Figure 9-12 Default Step 2 Select a method between Quick Restoration and Custom Restoration. Step 3 Click OK. System begins to restore default settings. After successfully restored default settings, system prompts to restart the device. 9.7.3 Automatic Maintenance If the device has run for a long time, you can set to automatically reboot the device at idle time.
  • Page 664: Disk Maintenance

    User's Manual Click Export to export configuration file to local PC or USB storage device. File path might vary depending on your operations. ● On PCAPP, click , select Download to view file saving path. ● Select file saving path during local operation. Connect USB device to the system if you are on the local menu to operate.
  • Page 665: Firmware Update

    User's Manual Figure 9-17 SSD health detection 9.8.3 Firmware Update Import update file to update HDD information. Step 1 On the LIVE page, click , and select MAINTAIN > Disk Maintain > Firmware Update. Figure 9-18 Firmware update Step 2 Click Download Template to download update template Step 3 Click...
  • Page 666: Pcapp Introduction

    User's Manual 10 PCAPP Introduction After installing PCAPP, system supports to access the Device remotely to carry out system configuration, function operations and system maintenance. For details about installing PCAPP, see "5.3.1 Logging in to PCAPP Client". 10.1 Page Description Double-click on the PC desktop.
  • Page 667: Configuring Pcapp

    User's Manual ● Click Clear Downloads to clear history download records. 10.4 Configuring PCAPP When PC theme is not Areo, video of PCAPP might not be displayed normally. It is suggested that PC theme should be switched to Areo, or compatibility mode of PCAPP should be enabled. Switching PC Theme This section uses Windows 7 as an example.
  • Page 668: Viewing Version Details

    User's Manual Figure 10-3 Setting Enabling Hardware Acceleration Click , and select Settings. Select Enable hardware acceleration (it will take effect after video is opened again). The live view becomes much more fluent when this function is enabled. 10.5 Viewing Version Details Click and then select About to view PCAPP version information.
  • Page 669: Log Out, Reboot, Shut Down, Lock

    User's Manual 11 Log Out, Reboot, Shut Down, Lock Log out, reboot, shut down and lock out the Device. Figure 11-1 User operation Logging Out Click , and then select Log Out. Rebooting Click , and then select Reboot. System pops up confirm dialogue box. Click OK to reboot. Shutting Down To unplug the power cable might result in data (record and image) loss.
  • Page 670 User's Manual Figure 11-2 Unlock the client...
  • Page 671: Faq

    User's Manual 12 FAQ Problem Possibilities and Solutions ● The AI module is offline. Click on the LIVE page, and select MAINTAIN > System Resources > AI Module Info. You can view status of the AI modules. ● There are too many filter criteria on the AI display page. After enabling AI by ●...
  • Page 672: Appendix 1 Glossary

    User's Manual Appendix 1 Glossary Name Description Common Gateway Interface (CGI) is an important Internet technology. With CGI, client can ask data from program running on network server. CGI describes data transmission standard between server and asking processing program. Dynamic Domain Name System (DDNS) is to map the user dynamic IP address to a specified domain analysis service.
  • Page 673 User's Manual Name Description Open Network Video Interface Forum (ONVIF) is the defined general protocol for information exchange among the network video devices. It ONVIF includes search device, real-time audio/video, metadata, information control, and so on. Phase Alteration Line, this is a television standard that television scanning beam is 625 beams, 25 frames per second, phase alteration, odd field first and then it is followed by even field.
  • Page 674: Appendix 2 Mouse And Keyboard Operations

    User's Manual Appendix 2 Mouse and Keyboard Operations This section introduces mouse and keyboard operations. Appendix 2.1 Mouse Operations Connect mouse to the USB port, you can use the mouse to control the local menu. For details, see the following table. Appendix Table 2-1 Mouse operations Operation Description...
  • Page 675: Appendix 2.2 Virtual Keyboard

    User's Manual Appendix 2.2 Virtual Keyboard The local menu supports virtual keyboard. Click the text box to display virtual keyboard. For details, see the following pictures and table. If the device has connected to the peripheral keyboard, click the text column. Virtual keyboard will disappear.
  • Page 676 User's Manual Signal Words Description Click to delete letter. Click to input letter. Now the icon turns into . Click to restore previous input mode. Click to input space. Click to control cursor position. Click to switch to the next line. Select text and click the icon to cut the selected contents.
  • Page 677: Appendix 3 Raid

    User's Manual Appendix 3 RAID RAID is an abbreviation for Redundant Array of Independent Disks. It is to combine several independent HDDs (physical HDD) to form a HDD group (logic HDD). Comparing with one HDD, RAID provides more storage capacity and data redundancy. The different redundant arrays have different RAID level.
  • Page 678 User's Manual RAID Level Description Min. HDD Needed RAID 10 is a combination of the RAID 1 and RAID 0. It uses the extra high speed efficient of the RAID 0 and high data protection and restores RAID10 capability of the RAID 1. It has high read/write performance and security.
  • Page 679: Appendix 4 Hdd Capacity Calculation

    User's Manual Appendix 4 HDD Capacity Calculation HDD capacity calculation formula: Total capacity (M) = Channel number× Demand time length (hour) × HDD capacity occupied per hour (M/hour) According to the above formula, get recording time calculation formula. Recording time (hour) = For example, for single-channel recording, HDD capacity occupied per hour is 200 M/hour.
  • Page 680: Appendix 5 Particulate And Gaseous Contamination Specifications

    User's Manual Appendix 5 Particulate and Gaseous Contamination Specifications Appendix 5.1 Particulate Contamination Specifications The following table defines the limitations of the particulate contamination in the operating environment of the device. If the level of particulate contamination exceeds the specified limitations and result in device damage or failure, you need to rectify the environmental conditions.
  • Page 681 User's Manual Appendix Table 5-3 Gaseous contamination specifications Gaseous contamination Specifications Copper coupon corrosion < 300 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 rate Silver coupon corrosion rate < 200 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 Appendix Table 5-4 ANSI/ISA-71.04-2013 classification of reactive environments Class Copper Reactivity Silver Reactivity...
  • Page 682: Appendix 6 Cybersecurity Recommendations

    User's Manual Appendix 6 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 683 User's Manual We suggest you to change default HTTP and other service ports into any set of numbers between 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel.
  • Page 684 User's Manual ● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
  • Page 685 User's Manual...
  • Page 686 IVSS7008...
  • Page 687 IVSS7012...
  • Page 688 IVSS7016/IVSS7024...

Table of Contents