Advertisement

Quick Links

Our Brands: FlinQ | iProtect | Park Assist | ParkEyes | Siqura | VDG
Installations in over 80 countries
BL2002PID
User Manual
Status:
v1 (20230312)
TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com
BL2002PID
User Manual
March 14, 2023
Meridiaan 32
2801 DA, Gouda
Page 1
The Netherlands
14-Mar-23

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the BL2002PID and is the answer not in the manual?

Questions and answers

Summary of Contents for TKH security BL2002PID

  • Page 1 The Netherlands Our Brands: FlinQ | iProtect | Park Assist | ParkEyes | Siqura | VDG Installations in over 80 countries BL2002PID User Manual Status: v1 (20230312) 14-Mar-23 TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 2 The Netherlands Our Brands: FlinQ | iProtect | Park Assist | ParkEyes | Siqura | VDG Installations in over 80 countries Revision history Date Remarks 11-Mar-23 Initial revision TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 3 Any brand names mentioned in this manual are registered trademarks of their respective owners. Liability TKH Security accepts no liability for claims from third parties arising from improper use other than that stated in this manual. Although considerable care has been taken to ensure a correct and suitably comprehensive description of all relevant product components, this manual may nonetheless contain errors and inaccuracies.
  • Page 4: Table Of Contents

    Set Privacy Mask ....................... 36 4.4.9 Overlay Picture ......................37 4.4.10 Set Target Cropping ....................37 Video Recording and Picture Capture ....................38 4.5.1 Storage Settings ......................38 TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 5 Import and Export Configuration File ................. 76 4.9.5 Export Diagnose Information ..................76 4.9.6 Reboot ........................76 4.9.7 Restore and Default ....................76 4.9.8 Upgrade........................77 4.9.9 Device Auto Maintenance ..................77 TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 6 Set RS-232 ........................ 80 4.9.16 Power Consumption Mode..................80 4.9.17 External Device ......................81 4.9.18 Security ........................82 4.9.19 Certificate Management ..................... 85 4.9.20 User and Account ...................... 87 TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 7: About This Manual

    What's in this manual This is version 1 of the user assistance which is embedded in the web interface of the BL2002PID camera. The Help topics give you all the information you need to use this product efficiently. They tell you: •...
  • Page 8 As we continuously seek to improve our products and user experience, all features and specifications are subject to change without notice. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 9: Safety And Compliance

    Install blackout equipment into the power supply circuit for convenient supply interruption. ● Make sure that the ceiling can support more than 50 (N) Newton if the camera is fixed to the ceiling. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 10 The IR light from the camera may reflect back into the lens causing a reflection in the video image. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 11 Emergency ● If smoke, odor, or noise arises from the device, immediately turn off the power, unplug the power cable, and contact the service center. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 12: Compliance Information

    Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see: www.recyclethis.info. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 13 (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see: www.recyclethis.info. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 14: Device Activation And Accessing

    4. Click OK to complete activation and enter Live View page. 5. Modify IP address of the camera. 1) Enter IP address modification page. Configuration → Network → TCP/IP 2) Change IP address. 3) Save the settings. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 15: Access Camera

    (five attempts for user/operator), the IP address is blocked for 30 minutes. If illegal login lock is not needed, go to Configuration → System → Security → Security Service to turn it off. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 16 Playback and Picture are not available. For detailed restricted function, refer to the actual device. NOTE: The camera only supports Windows and Mac OS system and does not support Linux system. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 17 2801 DA, Gouda User ManualBL2002PID Page 17 The Netherlands Our Brands: FlinQ | iProtect | Park Assist | ParkEyes | Siqura | VDG Installations in over 80 countries TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 18 Illegal Login Attempts When your login attempts with the wrong password reach the set times, the device is locked. Locking Duration The device releases the lock after the setting duration. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 19: Network Camera Configuration

    4.3.1 Live View Parameters The supported functions vary depending on the model. Enable and Disable Live View This function is used to quickly enable or disable live view of the channel. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 20 - When you access the device via the other browsers, you can select Webcomponents, QuickTime, VLC or MJPEG. Window Division Light Count Pixel It helps to get the height and width pixel of the selected region in the live view image. Steps TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 21 Parameters Adjustment . - For display settings, see Display Settings . - For OSD settings, see OSD . - For audio and video settings, see Video and Audio . TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 22 - Hold and drag the mouse to an upper left position to frame an area on the live: the framed area is zoomed out and relocated to the center of the live image. 3. Click the button again to turn off the function. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 23: Set Transmission Parameters

    You can set the frame rate manually. In poor network environment, you can reduce the frame rate to get a fluent live view. But the rule information may cannot display. 3. Click OK. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 24: Set Smooth Streaming

    When the proportion is 100, the redundant data will be as large as the original data, and the bandwidth is twice required. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 25: Video And Audio

    ● After restoring the device (not restore to default settings), quantity of custom video streams and their names are kept, but the related parameters are restored. Steps 2. Change the stream name as needed. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 26 Note that higher frame rate requires higher bandwidth and larger storage space. Video Encoding It stands for the compression standard the device adopts for video encoding. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 27 In H.264 and H.265, an I-frame, or intra frame, is a self-contained frame that can be independently decoded without any reference to other images. An I-frame consumes more bits than other frames. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 28: Roi

    ROI (Region of Interest) encoding helps to assign more encoding resource to the region of interest, thus to increase the quality of the ROI whereas the background information is less focused. Before You Start TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 29: Display Info. On Stream

    4.4.4 Audio Settings It is a function to set audio parameters such as audio encoding, environment noise filtering. Go to the audio settings page: Configuration → Video/Audio → Audio . TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 30: Two-Way Audio

    Refer to specifications of audio input and output devices for device connection. ● If the device has built-in microphone and speaker, two-way audio function can be enabled directly. Steps TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 31: Display Settings

    The device focuses automatically as the scene changes. If you cannot get a well-focused image under auto mode, reduce light sources in the image and avoid flashing lights. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 32 Enabling this function can change the effective range of monitoring in the vertical direction. Lens Distortion Correction For device equipped with motorized lens, image may appear distorted to some extent. Enable this function to correct the distortion. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 33 White Balance White balance is the white rendition function of the camera. It is used to adjust the color temperature according to the environment. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 34 Defog You can enable the defog function when the environment is foggy and the image is misty. It enhances the subtle details so that the image appears clearer. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 35 The two most common video standard used are NTSC and PAL. In NTSC, 30 frames are transmitted each second. Each frame is made up of 525 individual scan TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 36: Osd

    Drag the corners of the area: Adjust the size of the area. Drag the area: Adjust the position of the area. Click Clear All: Clear all the areas you set. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 37: Overlay Picture

    Click Save. NOTE: ● Only certain models support target cropping and the function varies according to different camera models. ● Some functions may be disabled after enabling target cropping. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 38: Video Recording And Picture Capture

    It shows the percentage of the remaining lifespan. The lifespan of a memory card may be influenced by factors such as its capacity and the bitrate. You need to change the memory card if the remaining lifespan is not enough. Health Status TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 39 You can configure the FTP server to save images which are captured by events or a timed snapshot task. Before You Start Get the FTP server address first. Steps 1. Go to Configuration → Network → Advanced Settings → FTP . TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 40 Click HDD No.. Enter the server address and file path for the disk. Server Address The IP address of the network disk. File Path The saving path of network disk files. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 41 The key to log in to the cloud video manager. SecretKey The key to encrypt the data stored in the cloud video manager. User Name and The user name and password of the cloud video manager. Password TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 42: Video Recording

    Video is recorded when motion is detected or alarm signal is received from the external alarm input device. Motion & Alarm Video is recorded only when motion is detected and alarm signal is received from the external alarm input device. Event TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 43 3. Set the storage time. The device automatically calculates the bitrate and offers the recommended storage time according to the memory card space and level. You are recommended to set the storage time to the device recommended time. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 44: Capture Configuration

    This function can capture pictures automatically during configured time periods. Before You Start If event-triggered capture is required, you should configure related linkage methods in event settings. Refer to Event and Alarm for event settings. Steps TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 45 The device will wake up at the set sleep capture interval, and capture pictures and upload them. View and Download Picture You can search, view and download the pictures stored in the local storage or network storage. Steps 1. Click Picture. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 46: Event And Alarm

    You can configure different motion detection parameters for day and night according to the actual needs. Steps 1. Select Expert Mode in Configuration. 2. Set parameters of expert mode. Scheduled Image Settings TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 47 5. Optional: Repeat above steps to set multiple areas. Normal Mode You can set motion detection parameters according to the device default parameters. Steps 1. Select normal mode in Configuration. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 48 3. Set the Sensitivity. The higher the value is, the easier to detect the area covering. 4. Click Draw Area and drag the mouse in the live view to draw the area. Stop Drawing Finish drawing. Clear All Delete all the drawn areas. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 49 1. Go to Configuration → Advanced Configuration → Basic Event → PIR Alarm . 2. Check Enable PIR Alarm. 3. Refer to Set Arming Schedule for setting scheduled time. Refer to Linkage Method Settings for setting linkage method. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 50 1. Go to Configuration → Event → Basic Event → Video Quality Diagnosis . 2. Select Diagnosis Type. 3. Set the corresponding parameters. Alarm Detection Interval The time interval to detect the exception. Sensitivity TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 51: Smart Event

    Steps 1. Go to Configuration → Event → Smart Event → Audio Exception Detection . 2. Select one or several audio exception detection types. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 52 NOTE: The function is only supported by certain models. The actual display varies with models. Detect Scene Change Scene change detection function detects the change of the scene. Some certain actions can be taken when the alarm is triggered. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 53 Set Intrusion Detection It is used to detect objects entering and loitering in a predefined virtual region. If it occurs, the device can take linkage actions. Before You Start TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 54 Linkage Method Settings . 8. Click Save. Set Line Crossing Detection It is used to detect objects crossing a predefined virtual line. If it occurs, the device can take linkage actions. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 55 If you set a higher validity, the required target features should be more obvious, and the alarm accuracy would be higher. The target with less obvious features would be missing. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 56 Detection Target Human and vehicle are available. If the detection target is not selected, all the detected targets will be reported, including the human and vehicle. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 57 Configuration → Event → Smart Event → Region Exiting Detection . 2. Check Enable. 3. Select a Region. For the detection region settings, refer to Draw Area . TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 58 It is used to detect the objects left over in the pre-defined region. Linkage methods can be triggered after the object is left and stays in the region for a set time period. Steps TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 59 If it occurs, the device can take linkage actions and the staff can take measures to reduce property loss. Steps 1. Go to Configuration → Event → Smart Event → Object Removal Detection . TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 60 1. Click Max. Size, and drag the mouse in the live view to draw the maximum target size. 2. Click Min. Size, and drag the mouse in the live view to draw the minimum target size. 3. Click Save. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 61: Network Settings

    It stands for maximum transmission unit. It is the size of the largest protocol data unit that can be communicated in a single network layer transaction. The valid value range of MTU is 1280 to 1500. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 62: Snmp

    SNMP port. Steps 1. Go to the settings page: Configuration → Network → Advanced Settings → SNMP . 2. Check Enable SNMPv1, Enable SNMP v2c or Enable SNMPv3. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 63: Set Srtp

    2. Select the port mapping mode. Auto Port Mapping Refer to Set Auto Port Mapping for detailed information. Manual Port Mapping Refer to Set Manual Port Mapping for detailed information. 3. Click Save. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 64 When the cameras are connected to the same router, you can configure the ports of a camera as 80, 8000, and 554 with IP address 192.168.1.23, and the ports of another camera as 81, 8001, 555, 8201 with IP 192.168.1.24. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 65: Port

    It refers to the port through which the browser accesses the device with certificate. Certificate verification is required to ensure the secure access. RTSP Port It refers to the port of real-time streaming protocol. SRTP Port TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 66: Access To Device Via Domain Name

    Port Mapping for port mapping settings. 6. Access the device. By Browsers Enter the domain name in the browser address bar to access the device. By Client Software TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 67: Access To Device Via Pppoe Dial Up Connection

    DynDns.com). Refer to Access to Device via Domain Name for detail information. 4.7.8 Wireless Dial Data of audio, video and image can be transferred via 3G/4G wireless network. NOTE: The function is only supported by certain device models. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 68: Wi-Fi

    For stable use of Wi-Fi, it is not recommended to use DHCP. 3. Go to Wi-Fi settings page: Configuration → Network → Advanced Configuration → Wi-Fi . 4. Set and save the parameters. 1) Click Search. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 69: Set Network Service

    Check Enable Enhanced SDK Service to add the device to the client software with SDK over TLS protocol. When you use Enhanced SDK Service, select the Server Certificate. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 70: Set Open Network Video Interface

    Steps 1. Go to Configuration → Network → Advanced Settings → Platform Access . 2. Select ISUP as the platform access mode. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 71: Set Alarm Server

    Set the valid time of the device tasks. Steps 1. Click Arming Schedule. 2. Drag the time bar to draw desired valid time. NOTE: Up to 8 periods can be configured per day. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 72: Linkage Method Settings

    Edit a name for the alarm output. Delay Select Manual. 2. Click Manual Alarm to enable manual alarm output. 3. Optional: Click Clear Alarm to disable manual alarm output. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 73 1. Go to email settings page: Configuration → Network → Advanced Settings → Email . 2. Set email parameters. 1) Input the sender's email information, including the Sender's Address, SMTP Server, and SMTP Port. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 74 The time period the flashing lasts when one alarm happens. Flashing Frequency The flashing speed of the light. High, Medium, and Low are selectable. Brightness The brightness of the light. 3. Edit the arming schedule. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 75: System And Security

    Steps 1. Go to Configuration → System → Maintenance → Log . 2. Set search conditions Major Type, Minor Type, Start Time, and End Time. 3. Click Search. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 76: Simultaneous Login

    2. Click Restore or Default according to your needs. Restore Reset device parameters, except user information, IP parameters and video format to the default settings. Default Reset all the parameters to the factory default. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 77: Upgrade

    After enabling auto maintenance, the device will automatically restart according to the maintenance plan. The device cannot record video during the restarting process. 4.9.10 View Open Source Software License TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 78: Wiegand

    - Select Set Time, and manually input or select date and time from the pop-up calendar. - Check Sync. with computer time to synchronize the time of the device with that of the local 5. Click Save. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 79 1. Go to Configuration → System → System Settings → DST . 2. Check Enable DST. 3. Select Start Time, End Time and DST Bias. 4. Click Save. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 80: Set Rs-485

    It is used to switch the power consumption when the device is working. Go to Configuration → Proactive Mode → Power Consumption Mode , select the desired power consumption mode. Performance Mode TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 81: External Device

    Supplement light is disabled. Brightness Adjustment Mode Auto The brightness adjusts according to the actual environment automatically. Manual You can drag the slider or set value to adjust the brightness. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 82: Security

    Set IP Address Filter IP address filter is a tool for access control. You can enable the IP address filter to allow or forbid the visits from the certain IP addresses. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 83 NOTE: Network can identify the priority of data transmission. The bigger the DSCP value is, the higher the priority is. You need to set the same value in router while configuration. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 84 3. Click Search. The log files that match the search conditions will be displayed on the Log List. 4. Optional: Click Export to save the log files to your computer. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 85: Certificate Management

    4. Optional: Click Export to export the certificate, or click Delete to delete the certificate to recreate a certificate, or click Certificate Properties to view the certificate details. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 86 2. Enter the Certificate ID. 3. Click Browser to select the desired server/client certificate. 4. Select the desired import method and enter the required information. 5. Click OK. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 87: User And Account

    Users can be assigned permission of viewing live video, setting PTZ parameters, and changing their own passwords, but no permission for other operations. Operator Operators can be assigned all permission except for operations on the administrator and creating accounts. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...
  • Page 88 The information of users logging into the device is shown. Go to Configuration → System → User Management → Online Users to view the list of online users. TKH Security B.V. | +31 182 592 333 | info.nl@tkhsecurity.com | tkhsecurity.com...

Table of Contents