Table of Contents

Advertisement

Quick Links

Questo manuale d'istruzione è fornito da trovaprezzi.it. Scopri tutte le offerte per
HiLook IPC-
D140H-M
o cerca il tuo prodotto tra le
migliori offerte di Videosorveglianza
Network Camera
User Manual
UD11278B
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UD11278B and is the answer not in the manual?

Questions and answers

Summary of Contents for HiLook UD11278B

  • Page 1 Questo manuale d’istruzione è fornito da trovaprezzi.it. Scopri tutte le offerte per HiLook IPC- D140H-M o cerca il tuo prodotto tra le migliori offerte di Videosorveglianza Network Camera User Manual UD11278B...
  • Page 2 User Manual COPYRIGHT ©2018 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings, pictures, graphs are the properties of Hangzhou Hikvision Digital Technology Co., Ltd. or its subsidiaries (hereinafter referred to be "Hikvision"). This user manual (hereinafter referred to be "the Manual") cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.
  • Page 3 SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL OUR COMPANY, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF OUR COMPANY HAS BEEN ADVISED OF THE...
  • Page 4 equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.
  • Page 5 more information, see: www.recyclethis.info. Industry Canada ICES-003 Compliance This device meets the CAN ICES-3 (A)/NMB-3(A) standards requirements. Safety Instruction These instructions are intended to ensure that the user can use the product correctly to avoid danger or property loss. The precaution measure is divided into 'Warnings' and 'Cautions': Warnings: Serious injury or death may be caused if any of these warnings are neglected.
  • Page 6 supply interruption.  Please make sure that the ceiling can support more than 50(N) Newton gravities if the camera is fixed to the ceiling.  If the product does not work properly, please contact your dealer or the nearest service center. Never attempt to disassemble the camera yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.) Cautions:...
  • Page 7 Please use the manufacturer recommended battery type. Notes: For the camera supports IR, you are required to pay attention to the following precautions to prevent IR reflection:  Dust or grease on the dome cover will cause IR reflection. Please do not remove the dome cover film until the installation is finished.
  • Page 8: Table Of Contents

    Table of Contents Chapter 1 System Requirement ................11 Chapter 2 Network Connection ................12 Setting the Network Camera over the LAN ............12 2.1.1 Wiring over the LAN ....................... 12 2.1.2 Activating the Camera ....................13 Setting the Network Camera over the WAN ............ 19 2.2.1 Static IP Connection ......................
  • Page 9 6.3.1 Upgrade & Maintenance ....................48 6.3.2 Log ..........................49 6.3.3 System Service ........................ 50 Security Settings .................... 50 6.4.1 Authentication ........................ 51 6.4.2 IP Address Filter ......................51 6.4.3 Security Service....................... 53 User Management ..................53 6.5.1 User Management ......................53 6.5.2 Online Users ........................
  • Page 10 Event Settings ................94 Chapter 10 10.1 Basic Events ....................94 10.1.1 Configuring Motion Detection ..................94 10.1.2 Configuring Video Tampering Alarm ................100 10.1.3 Configuring Alarm Input ....................102 10.1.4 Configuring Alarm Output .................... 103 10.1.5 Configuring PIR Alarm ....................104 10.1.6 Handling Exception .......................
  • Page 11: Chapter 1 System Requirement

    Chapter 1 System Requirement Operating System: Microsoft Windows XP and above version CPU: 3.0 GHz or higher RAM: 1G or higher Display: 1024× 768 resolution or higher Web Browser: Internet Explorer 8.0 and above version, Apple Safari 8.0 and above version, Mozilla Firefox 30.0-51, and Google Chrome 31.0-44.
  • Page 12: Chapter 2 Network Connection

    Chapter 2 Network Connection Note:  You shall acknowledge that the use of the product with Internet access might be under network security risks. For avoidance of any network attacks and information leakage, please strengthen your own protection. If the product does not work properly, please contact with your dealer or the nearest service center.
  • Page 13: Activating The Camera

     Refer to the Figure 2-2 to set network camera over the LAN via a switch or a router. Figure 2-1 Connecting Directly Figure 2-2 Connecting via a Switch or a Router 2.1.2 Activating the Camera You are required to activate the camera first by setting a strong password for it before you can use the camera.
  • Page 14 the following chapter for Activation via SADP. Figure 2-3 Activation via Web Browser 3. Create a password and input the password into the password field. STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 15 Steps: 1. Run the SADP software to search the online devices. 2. Check the device status from the device list, and select the inactive device. Select inactive device. Input and confirm password. Figure 2-4 SADP Interface 3. Create a password and input the password in the password field, and confirm the password.
  • Page 16 Figure 2-5 Modify the IP Address 6. Input the password and click the Modify button to activate your IP address modification.  Activation via Client Software The client software is versatile video management software for multiple kinds of devices. Get the client software from the supplied disk or the official website, and install the software according to the prompts.
  • Page 17 Figure 2-6 Control Panel 2. Click the Device Management icon to enter the Device Management interface, as shown in the figure below. Figure 2-7 Device Management Interface 3. Check the device status from the device list, and select an inactive device. 4.
  • Page 18 STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 19: Setting The Network Camera Over The Wan

    Figure 2-9 Modifying the Network Parameters 8. Change the device IP address to the same subnet with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP. 9. Input the password to activate your IP address modification. 2.2 Setting the Network Camera over the WAN Purpose: This section explains how to connect the network camera to the WAN with a static IP...
  • Page 20: Dynamic Ip Connection

    2. Assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 for detailed IP address configuration of the network camera. 3. Save the static IP in the router. 4. Set port mapping, e.g., 80, 8000, and 554 ports. The steps for port mapping vary according to the different routers.
  • Page 21 1. Connect the network camera to the router. 2. In the camera, assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 for detailed IP address configuration of the network camera. 3. In the router, set the PPPoE user name, password and confirm the password. 4.
  • Page 22 Figure 2-13 Normal Domain Name Resolution Steps: 1. Apply a domain name from a domain name provider. 2. Configure the DDNS settings in the DDNS Settings interface of the network camera. Refer to Section 7.1.2 Configuring DDNS Settings for detailed configuration.
  • Page 23: Chapter 3 Access To The Network Camera

    Chapter 3 Access to the Network Camera 3.1 Accessing by Web Browsers Steps: 1. Open the web browser. 2. In the browser address bar, input the IP address of the network camera, and press the Enter key to enter the login interface. 3.
  • Page 24: Accessing By Client Software

    6. Install the plug-in before viewing the live video and operating the camera. Please follow the installation prompts to install the plug-in. Figure 3-2 Download and Install Plug-in Note: You may have to close the web browser to install the plug-in. Please reopen the web browser and log in again after installing the plug-in.
  • Page 25: Chapter 4 Wi-Fi Settings

    Chapter 4 Wi-Fi Settings Purpose: By connecting to the wireless network, you don’t need to use cable of any kind for network connection, which is very convenient for the actual surveillance application. Note: This chapter is only applicable for the cameras with the built-in Wi-Fi module. 4.1 Configuring Wi-Fi Connection in Manage and Ad-hoc Modes Purpose:...
  • Page 26 3. Click to choose a wireless connection on the list. Figure 4-2 Wi-Fi Setting- Manage Mode 4. Check the radio button to select the Network mode as Manage, and the Security mode of the network is automatically shown when you select the wireless network, please don’t change it manually.
  • Page 27 2. Customize a SSID for the camera. 3. Choose the Security Mode of the wireless connection. 4. Enable the wireless connection function for your PC. 5. On the PC side, search the network and you can see the SSID of the camera listed.
  • Page 28 Figure 4-6 WEP Mode  Authentication - Select Open or Shared Key System Authentication, depending on the method used by your access point. Not all access points have this option, in which case they probably use Open System, which is sometimes known as SSID Authentication.
  • Page 29 Choose the type of client/server authentication being used by the access point; EAP-TLS or EAP-PEAP. EAP-TLS Figure 4-8 EAP-TLS  Identity - Enter the user ID to present to the network. Private key password – Enter the password for your user ID. ...
  • Page 30: Easy Wi-Fi Connection With Wps Function

    strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
  • Page 31 PBC Mode: PBC refers to the Push-Button-Configuration, in which the user simply has to push a button, either an actual or virtual one (as the button on the configuration interface of the IE browser), on both the Access Point (and a registrar of the network) and the new wireless client device.
  • Page 32: Ip Property Settings For Wireless Network Connection

    Figure 4-10 Use PIN Code If the PIN code is generated from the router side, you should enter the PIN code you get from the router side in the Router PIN code field. 3. Click Connect. You can generate the PIN code on the camera side. And the expired time for the PIN code is 120 seconds.
  • Page 33 Figure 4-11 Setting WLAN Parameters 3. Customize the IPv4 address, the IPv4 Subnet Mask and the Default Gateway. The setting procedure is the same with that of LAN. If you want to be assigned the IP address you can check the checkbox to enable the DHCP.
  • Page 34: Chapter 5 Live View

    Chapter 5 Live View 5.1 Live View Page Purpose: The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters. Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page.
  • Page 35: Starting Live View

    selectable if they are supported by the web browser. PTZ Control: Perform panning, tilting and zooming actions of the camera. Control the light and the wiper. (Only available for cameras supporting PTZ function) Preset/Patrol Settings: Set/call/delete the presets or patrols for PTZ cameras. 5.2 Starting Live View In the live view window as shown in Figure 4-2, click on the toolbar to start the...
  • Page 36: Recording And Capturing Pictures Manually

    5.3 Recording and Capturing Pictures Manually In the live view interface, click on the toolbar to capture the live pictures or click to record the live view. The saving paths of the captured pictures and clips can be set on the Configuration > Local page. To configure remote scheduled recording, please refer to Section 11.1.
  • Page 37: Setting/Calling A Preset

    Notes:  There are eight direction arrows ( , ) in the control panel. Click the arrows to realize adjustment in the relative positions.  For the cameras which support lens movements only, the direction buttons are invalid. Table 5-2 Descriptions of PTZ Control Panel Icon Description Zoom in/out...
  • Page 38: Setting/Calling A Patrol

    • Pan the camera to the right or left. • Tilt the camera up or down. • Zoom in or out. • Refocus the lens. 3. Click to finish the setting of the current preset. 4. You can click to delete the preset. ...
  • Page 39 4. Click OK to save the first preset. 5. Follow the steps above to add the other presets. Figure 5-6 Add Patrol Path 6. Click OK to save a patrol. 7. Click to start the patrol, and click to stop it. 8.
  • Page 40: Chapter 6 Network Camera Configuration

    Chapter 6 Network Camera Configuration 6.1 Configuring Local Parameters Purpose: The local configuration refers to the parameters of the live view, record files and captured pictures. The record files and captured pictures are the ones you record and capture using the web browser and thus the saving paths of them are on the PC running the browser.
  • Page 41 UDP: Provides real-time audio and video streams. HTTP: Allows the same quality as of TCP without setting specific ports for streaming under some network environments. MULTICAST: It's recommended to select MCAST type when using the Multicast function. For detailed information about Multicast, refer to Section 7.1.1 Configuring TCP/IP Settings.
  • Page 42: Configure System Settings

    pictures in live view mode.  Save snapshots when playback to: Set the saving path of the captured pictures in playback mode.  Save clips to: Set the saving path of the clipped video files in playback mode. Note: You can click Browse to change the directory for saving the clips and pictures, and click Open to open the set folder of clips and picture saving.
  • Page 43: Configuring Time Settings

    Figure 6-2 Basic Information 6.2.2 Configuring Time Settings Purpose: You can follow the instructions in this section to configure the time synchronization and DST settings. Steps: 1. Enter the Time Settings interface, Configuration > System> System Settings > Time Settings.
  • Page 44 Figure 6-3 Time Settings 2. Select the Time Zone of your location from the drop-down menu. 3. Configure the NTP settings. (1) Click to enable the NTP function. (2) Configure the following settings: Server Address: IP address of NTP server. NTP Port: Port of NTP server.
  • Page 45: Configuring Dst Settings

    that has a time synchronization function, such as the server at the National Time Center (IP Address: 210.72.145.44). If the camera is set in a customized network, NTP software can be used to establish a NTP server for time synchronization. ...
  • Page 46: Configuring Rs232 Settings

    Figure 6-6 DST Settings 2. Select the start time and the end time. 3. Select the DST Bias. 4. Click Save to activate the settings. 6.2.4 Configuring RS232 Settings The RS232 port can be used in two ways:  Parameters Configuration: Connect a computer to the camera through the serial port.
  • Page 47: Viewing License

    Figure 6-7 RS232 Settings Note: If you want to connect the camera by the RS232 port, the parameters of the RS232 should be exactly the same with the parameters you configured here. 3. Click Save to save the settings. 6.2.5 Viewing License Purpose: You can view the open source software licenses that are applied to the IP camera.
  • Page 48: Maintenance

    6.3 Maintenance 6.3.1 Upgrade & Maintenance Purpose: The upgrade & maintenance interface allows you to process the operations, including reboot, partly restore, restore to default, export/import the configuration files, and upgrade the device. Enter the Maintenance interface: Configuration > System > Maintenance > Upgrade & Maintenance ...
  • Page 49: Log

    required. 2. Click Browse to select the local upgrade file and then click Upgrade to start remote upgrade. Note: The upgrading process will take 1 to 10 minutes. Please don't disconnect power of the camera during the process, and the camera reboots automatically after upgrade.
  • Page 50: System Service

    Figure 6-10 Log Searching 4. To export the log files, click Export to save the log files. 6.3.3 System Service Purpose: System service settings refer to the hardware service the camera supports. Supported functions vary according to the different cameras. For the cameras support IR LED, ABF (Auto Back Focus), Auto Defog, or Status LED, you can select to enable or disable the corresponding service according to the actual demands.
  • Page 51: Authentication

    6.4.1 Authentication Purpose: You can specifically secure the stream data of live view. Steps: 1. Enter the Authentication interface: Configuration > System > Security > Authentication. Figure 6-12 Authentication 2. Set up authentication method for RTSP authentication and WEB authentication. Caution: Digest is the recommended authentication method for better data security.
  • Page 52 Figure 6-13 IP Address Filter Interface 2. Check the checkbox of Enable IP Address Filter. 3. Select the type of IP Address Filter in the drop-down list, Forbidden and Allowed are selectable. 4. Set the IP Address Filter list.  Add an IP Address Steps: (1) Click the Add to add an IP.
  • Page 53: Security Service

    (3) Click the OK to finish modifying.  Delete an IP Address or IP Addresses. Select the IP address(es) and click Delete. 5. Click Save to save the settings. 6.4.3 Security Service To enable the remote login, and improve the data communication security, the camera provides the security service for better user experience.
  • Page 54 properly. Steps: Enter the User Management interface: Configuration >System >User Management. Figure 6-17 User Management Interface  Adding a User The admin user has all permissions by default and can create/modify/delete other accounts. The admin user cannot be deleted and you can only change the admin password. Steps: 1.
  • Page 55 Figure 6-18 Add a User  Modifying a User Steps: 1. Left-click to select the user from the list and click Modify. 2. Modify the User Name, Level, Admin Password and Password. 3. STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 56: Online Users

    4. You can check or uncheck the permissions. 5. Click OK to finish the user modification. Figure 6-19 Modify a User Deleting a User  Steps: 1. Click to select the user you want to delete and click Delete. 2. Click OK on the pop-up dialogue box to confirm the deletion. 6.5.2 Online Users Purpose: You can see the current users who are visiting the device through this interface.
  • Page 57 the User List. Click Refresh to refresh the list. Figure 6-20 View the Online Users...
  • Page 58: Chapter 7 Network Settings

    Chapter 7 Network Settings Purpose: Follow the instructions in this chapter to configure the basic settings and advanced settings. 7.1 Configuring Basic Settings Purpose: You can configure the parameters, including TCP/IP, DDNS, PPPoE, Port, and NAT, etc., by following the instructions in this section. 7.1.1 Configuring TCP/IP Settings Purpose: TCP/IP settings must be properly configured before you operate the camera over...
  • Page 59 Figure 7-1 TCP/IP Settings 2. Configure the basic network settings, including the NIC Type, IPv4 or IPv6 Address, IPv4 or IPv6 Subnet Mask, IPv4 or IPv6 Default Gateway, MTU settings and Multicast Address. 3. (Optional) Check the checkbox of Enable Multicast Discovery, and then the online network camera can be automatically detected by client software via private multicast protocol in the LAN.
  • Page 60: Configuring Ddns Settings

    clients to acquire the stream at the same time by requesting a copy from the multicast group address. Before utilizing this function, you have to enable the Multicast function of your router.  A reboot is required for the settings to take effect. 7.1.2 Configuring DDNS Settings Purpose: If your camera is set to use PPPoE as its default network connection, you can use the...
  • Page 61 Figure 7-2 DynDNS Settings  NO-IP: Steps: (1) Choose the DDNS Type as NO-IP. Figure 7-3 NO-IP DNS Settings (2) Enter the Server Address as www.noip.com...
  • Page 62: Configuring Pppoe Settings

    (3) Enter the Domain name you registered. (4) Enter the User Name and Password. (5) Click Save and then you can view the camera with the domain name. 7.1.3 Configuring PPPoE Settings Steps: Enter the PPPoE Settings interface: Configuration > Network > Basic Settings >...
  • Page 63: Configuring Port Settings

    4. Click Save to save and exit the interface. Note: A reboot is required for the settings to take effect. 7.1.4 Configuring Port Settings Purpose: You can set the port No. of the camera, e.g., HTTP port, RTSP port and HTTPS port. Steps: 1.
  • Page 64: Configure Nat (Network Address Translation) Settings

    7.1.5 Configure NAT (Network Address Translation) Settings Purpose: NAT interface allows you to configure the UPnP™ parameters. Universal Plug and Play (UPnP™) is a networking architecture that provides compatibility among networking equipment, software and other hardware devices. The UPnP protocol allows devices to connect seamlessly and to simplify the implementation of networks in the home and corporate environments.
  • Page 65: Configuring Snmp Settings

    802.1x, etc., by following the instructions in this section. 7.2.1 Configuring SNMP Settings Purpose: You can set the SNMP function to get camera status, parameters and alarm related information, and manage the camera remotely when it is connected to the network. Before you start: Before setting the SNMP, please download the SNMP software and manage to receive the camera information via SNMP port.
  • Page 66 Figure 7-7 SNMP Settings 2. Check the checkbox of Enable SNMPv1, Enable SNMP v2c, Enable SNMPv3 to enable the feature correspondingly. 3. Configure the SNMP settings. Note: The settings of the SNMP software should be the same as the settings you configure here.
  • Page 67: Configuring Ftp Settings

    4. Click Save to save and finish the settings. Notes: • A reboot is required for the settings to take effect. • To lower the risk of information leakage, you are suggested to enable SNMP v3 instead of SNMP v1 or v2. 7.2.2 Configuring FTP Settings Purpose: You can configure the FTP server related information to enable the uploading of the...
  • Page 68 FTP server login.  For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
  • Page 69: Configuring Email Settings

    anonymous access to the FTP server. Note: The anonymous access function must be supported by the FTP server. 6. Click Save to save the settings. 7.2.3 Configuring Email Settings Purpose: The system can be configured to send an Email notification to all designated receivers if an alarm event is detected, e.g., motion detection event, video loss, video tampering, etc.
  • Page 70 The SMTP port should be set as 465 for this encryption method. When you select SSL or TLS and enable STARTTLS, emails will be sent after encrypted by STARTTLS, and the SMTP port should be set as 25. Note: If you want to use STARTTLS, make sure that the protocol is supported by your e-mail server.
  • Page 71: Platform Access

    Figure 7-9 Email Settings 4. Click Save to save the settings. 7.2.4 Platform Access Purpose: Platform access provides you an option to manage the devices via platform. Steps: 1. Enter platform access configuration interface: Configuration > Network > Advanced Settings > Platform Access.
  • Page 72: Https Settings

    Figure 7-10 Platform Access Configuration 2. Check the checkbox of Enable to enable the platform access function of the device. Then a pop-up window is displayed. 3. Click and read Terms of Service and Privacy Policy in pop-up window. 4. Create a verification code or change the verification code for the camera and then enter the confirmed verification code.
  • Page 73 E.g., If you set the port number as 443 and the IP address is 192.168.1.64, you may access the device by inputting https://192.168.1.64:443 via the web browser. Steps: 1. Enter the HTTPS settings interface. Configuration > Network > Advanced Settings > HTTPS. 2.
  • Page 74 Figure 7-12 Create Self-signed Certificate (3) Enter the country, host name/IP, validity and other information. (4) Click OK to save the settings. Note: If you already had a certificate installed, the Create Self-signed Certificate is grayed out.  Create the authorized certificate (1) Select Create the certificate request first and continue the installation as the Installation Method.
  • Page 75: Configuring Qos Settings

    Figure 7-13 Installed Certificate 5. Click the Save button to save the settings. 7.2.6 Configuring QoS Settings Purpose: QoS (Quality of Service) can help solve the network delay and network congestion by configuring the priority of data sending. Steps: 1. Enter the QoS Settings interface: Configuration > Network > Advanced Settings >...
  • Page 76: Configuring 802.1X Settings

    is used in the IP header to indicate the priority of the data. 3. Click Save to save the settings. Note: A reboot is required for the settings to take effect. 7.2.7 Configuring 802.1X Settings Purpose: The IEEE 802.1X standard is supported by the network cameras, and when the feature is enabled, the camera data is secured and user authentication is needed when connecting the camera to the network protected by the IEEE 802.1X.
  • Page 77: Integration Protocol

    Figure 7-15 802.1X Settings 2. Check the Enable IEEE 802.1X checkbox to enable the feature. 3. Configure the 802.1X settings, including Protocol, EAPOL version, User Name, Password and Confirm. Note: The EAPOL version must be identical with that of the router or the switch. 4.
  • Page 78 Steps: 1. Check the Enable ONVIF checkbox to enable the function. 2. Add ONVIF users. Up to 32 users are allowed. Set the user name and password, and confirm the password. You can set the user as media user, operator, and administrator. Note: ONVIF user account is different from the camera user account.
  • Page 79: Chapter 8 Video/Audio Settings

    Chapter 8 Video/Audio Settings Purpose: Follow the instructions below to configure the video setting, audio settings, ROI, and Display info. on Stream. 8.1 Configuring Video Settings Steps: 1. Enter the Video Settings interface, Configuration > Video/Audio > Video Figure 8-1 Video Settings 2.
  • Page 80 Video Type: Select the stream type to video stream, or video & audio composite stream. The audio signal will be recorded only when the Video Type is Video & Audio. Resolution: Select the resolution of the video output. Bitrate Type: Select the bitrate type to constant or variable.
  • Page 81 coding technology based on H.264. By enabling H.264+, users can estimate the HDD consumption by its maximum average bitrate. Compared to H.264, H.264+ reduces storage by up to 50% with the same maximum bitrate in most scenes. • H.265+: If you set the main stream as the stream type, and H.265 as the video encoding, you can see H.265+ available.
  • Page 82: Configuring Audio Settings

    When you select H.264 or H.265 as video encoding, you can set the profile. Selectable profiles vary according to camera models. • I Frame Interval: Set I Frame Interval from 1 to 400. • SVC: Scalable Video Coding is an extension of the H.264/AVC and H.265 standard. Select OFF/ON to disable/enable the SVC function.
  • Page 83: Configuring Roi Encoding

    2. Configure the following settings. Note: Audio settings vary according to different camera models. Audio Encoding: G.722.1, G.711 ulaw, G.711alaw, G.726, MP2L2 and PCM are selectable. For MP2L2, the Sampling Rate and Audio Stream Bitrate are configurable. For PCM, the Sampling Rate can be set. Audio Input: MicIn and LineIn are selectable for the connected microphone and pickup respectively.
  • Page 84 Figure 8-3 Region of Interest Settings Steps: 1. Enter the ROI settings interface: Configuration > Video/Audio > ROI. 2. Select the Stream Type for ROI encoding. 3. Check the checkbox of Enable under Fixed Region item. 4. Set Fixed Region for ROI. (1) Select the Region No.
  • Page 85: Display Info. On Stream

    rectangle as the ROI region. You can click Clear to cancel former drawing. Click Stop Drawing when you finish. (4) Select the ROI level. (5) Enter a region name for the chosen region. (6) Click Save the save the settings of ROI settings for chosen fixed region. (7) Repeat steps (1) to (6) to setup other fixed regions.
  • Page 86: Chapter 9 Image Settings

    Chapter 9 Image Settings Purpose: Follow the instructions in this chapter to configure the image parameters, including display settings, OSD settings, privacy mask, and picture overlay. 9.1 Configuring Display Settings Purpose: Configure the image adjustment, exposure settings, day/night switch, backlight settings, white balance, image enhancement, video adjustment, and other parameters in display settings.
  • Page 87 2. Select the Mounting Scenario for the camera. Normal and Road are selectable for the mounting scenario. Each mounting scenario has a set of image parameters. Choose a suitable scenario may help adjust image more conveniently. 3. Set the image parameters of the camera. Note: In order to guarantee the image quality in different illumination, it provides two sets of parameters for users to configure.
  • Page 88 Figure 9-3 Day/Night Switch Day: the camera stays at day mode. Night: the camera stays at night mode. Auto: the camera switches between the day mode and the night mode according to the illumination automatically. The sensitivity ranges from 0 to 7, the higher the value is, the easier the mode switches.
  • Page 89 too dark to be seen clearly. BLC compensates light to the object in the front to make it clear. OFF, Up, Down, Left, Right, Center, Auto, and Custom are selectable. Note: If BLC mode is set as Custom, you can draw a red rectangle on the live view image as the BLC area.
  • Page 90: Day/Night Scheduled-Switch

     Video Adjustment Mirror: It mirrors the image so you can see it inversed. Left/Right, Up/Down, Center, and OFF are selectable. Rotate: To make a complete use of the 16:9 aspect ratio, you can enable the rotate function when you use the camera in a narrow view scene. When installing, turn the camera to the 90 degrees or rotate the 3-axis lens to 90 degrees, and set the rotate mode as on, you will get a normal view of the scene with 9:16 aspect ratio to ignore the needless information such as the wall, and get...
  • Page 91: Configuring Osd Settings

    Figure 9-5 Day/Night Scheduled-Switch Configuration Interface Steps: 1. Click the calendar icon to select the start time and the end time of the switch. Notes: • The start time and end time refer to the valid time for day mode. •...
  • Page 92 Figure 9-6 OSD Settings Steps: 1. Enter the OSD Settings interface: Configuration > Image > OSD Settings. 2. Check the corresponding checkbox to select the display of camera name, date or week if required. 3. Edit the camera name in the text field of Camera Name. 4.
  • Page 93: Configuring Privacy Mask

    9.3 Configuring Privacy Mask Purpose: Privacy mask enables you to cover certain areas on the live video to prevent certain spots in the surveillance area from being live viewed and recorded. Steps: 1. Enter the Privacy Mask Settings interface: Configuration > Image > Privacy Mask.
  • Page 94: Chapter 10 Event Settings

    Chapter 10 Event Settings This section explains how to configure the network camera to respond to alarm events, including basic event and smart event. 10.1 Basic Events You can configure the basic events by following the instructions in this section, including motion detection, video tampering, alarm input, alarm output, and exception, etc.
  • Page 95 3. Check the checkbox of Enable Dynamic Analysis for Motion if you want to mark the detected objects with green rectangles. Note: Select Disable for rules if you don't want the detected objected displayed with the green rectangles. Select disable rules from Configuration > Local Configuration >...
  • Page 96 Task 2: Set the Arming Schedule for Motion Detection Figure 10-2 Arming Schedule Steps: 1. Click Arming Schedule to edit the arming schedule. 2. Click on the time bar and drag the mouse to select the time period. Figure 10-3 Arming Schedule...
  • Page 97 Note: Click on the selected time period, you can adjust the time period to the desired time by either moving the time bar or input the exact time period. 3. (Optional) Click Delete to delete the current arming schedule, or click Save to save the settings.
  • Page 98 Send an email with alarm information to a user or users when an event occurs. Note: To send the Email when an event occurs, please refer to Section 7.2.3 to complete Email setup in advance.  Upload to FTP/Memory Card/NAS Capture the image when an alarm is triggered and upload the picture to a FTP server.
  • Page 99 Figure 10-5 Expert Mode of Motion Detection  Day/Night Switch OFF Steps: 1. Draw the detection area as in the normal configuration mode. Up to 8 areas are supported. 2. Select OFF for Scheduled Image Settings. 3. Select the area by clicking the area No. 4.
  • Page 100: Configuring Video Tampering Alarm

    the selected area in the daytime. 5. Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area at night. 6. Set the arming schedule and linkage method as in the normal configuration mode. 7.
  • Page 101 1. Enter the video tampering Settings interface, Configuration > Event > Basic Event > Video Tampering. Figure 10-7 Video Tampering Alarm 2. Check Enable Video Tampering checkbox to enable the video tampering detection. 3. Set the video tampering area. Refer to Task 1: Set the Motion Detection Area in Section 10.1.1.
  • Page 102: Configuring Alarm Input

    Audible warning, notify surveillance center, send email and trigger alarm output are selectable. Please refer to Task 3: Set the Linkage Method for Motion Detection in Section 10.1.1. 6. Click Save to save the settings. 10.1.3 Configuring Alarm Input Steps: 1.
  • Page 103: Configuring Alarm Output

    taken for the alarm input. Refer to Task 3: Set the Linkage Method for Motion Detection in Section 10.1.1. 5. You can copy your settings to other alarm inputs. 6. Click Save to save the settings. 10.1.4 Configuring Alarm Output Figure 10-9 Alarm Output Settings Steps: 1.
  • Page 104: Configuring Pir Alarm

    schedule configuration is the same as the settings of the arming schedule for motion detection Refer to Task 2: Set the Arming Schedule for Motion Detection in Section 10.1.1. 5. You can copy the settings to other alarm outputs. 6. Click Save to save the settings. 10.1.5 Configuring PIR Alarm Purpose: A PIR (Passive Infrared) alarm is triggered when an intruder moves within the...
  • Page 105: Handling Exception

    3. Input the alarm name in the text field as desired. 4. Click Arming Schedule to enter the Edit Schedule Time interface. The time schedule configuration is the same as the settings of the arming schedule for motion detection Refer to Task 2: Set the Arming Schedule for Motion Detection in Section 10.1.1.
  • Page 106: Smart Events

    3. Click Save to save the settings. 10.2 Smart Events You can configure the smart events by following the instructions in this section, including audio exception detection, defocus detection, scene change detection, intrusion detection, and line crossing detection, etc. These events can trigger the linkage methods, such as Notify Surveillance Center, Send Email, Trigger Alarm Output, etc.
  • Page 107 Figure 10-12 Intrusion Detection 2. Check the checkbox of Enable to enable the function. 3. Select a region number from the drop-down list of Region. Region: A pre-defined vertexes area on the live view image. Targets, such as, people, vehicle or other objects, who enter and loiter in the region will be detected and trigger the set alarm.
  • Page 108: Configuring Line Crossing Detection

    Max. Size: The maximum size of a valid target. Targets with larger sizes would not trigger detection. Min. Size: The minimum size of a valid target. Targets with smaller sizes would not trigger detection. 7. Click Stop Drawing when finish drawing. 8.
  • Page 109 Line crossing detection function detects people, vehicle or other objects which cross a pre-defined virtual line, and some certain actions can be taken when the alarm is triggered. Note: Line crossing detection function varies according to different camera models. Steps: 1.
  • Page 110 5. Drag the line, and you can locate it on the live video as desired. Click on the line, two red squares are displayed on each end, and you can click-and-drag one of the red squares to define the shape and length of the line. 6.
  • Page 111 11. Click the Arming Schedule to set the arming schedule. 12. Select the linkage methods for line crossing detection, including Notify Surveillance Center, Send Email, Upload to FTP/Memory Card/NAS, Trigger Channel and Trigger Alarm Output. 13. Click Save to save the settings.
  • Page 112: Chapter 11 Storage Settings

    Chapter 11 Storage Settings Before you start: To configure record settings, please make sure that you have the network storage device or local storage device configured. 11.1 Configuring Record Schedule Purpose: There are two kinds of recording for the cameras: manual recording and scheduled recording.
  • Page 113 Figure 11-2 Record Parameters  Pre-record: The time you set to start recording before the scheduled time or the event. For example, if an alarm triggers recording at 10:00, and the pre-record time is set as 5 seconds, the camera starts to record at 9:59:55. The Pre-record time can be configured as No Pre-record, 5s, 10s, 15s, 20s, 25s, 30s or not limited.
  • Page 114 Method of Motion Detection Settings interface. For detailed information, please refer to the Task 1: Set the Motion Detection Area in the Section 10.1.1.  Record Triggered by Alarm If you select Alarm, the video will be recorded when the alarm is triggered via the external alarm input channels.
  • Page 115: Configure Capture Schedule

    11.2 Configure Capture Schedule Purpose: You can configure the scheduled snapshot and event-triggered snapshot. The captured picture can be stored in the local storage or network storage. Steps: 1. Enter the Capture Settings interface: Configuration > Storage > Storage Settings > Capture. Figure 11-3 Capture Configuration 2.
  • Page 116: Configuring Net Hdd

    5. Go to Capture Parameters tab to configure the capture parameters. (1) Check the Enable Timing Snapshot checkbox to enable continuous snapshot. (2) Select the picture format, resolution, quality and capture interval. (3) Check the Enable Event-triggered Snapshot checkbox to enable event-triggered snapshot.
  • Page 117 Steps: 1. Add Net HDD. (1) Enter the Net HDD settings interface, Configuration > Storage > Storage Management > Net HDD. Figure 11-6 Add Network Disk (2) Enter the IP address of the network disk, and enter the file path. (3) Select the mounting type.
  • Page 118 Figure 11-7 Storage Management Interface (2) If the status of the disk is Uninitialized, check the corresponding checkbox to select the disk and click Format to start initializing the disk. When the initialization completed, the status of disk will become Normal. Figure 11-8 View Disk Status 3.
  • Page 119: Chapter 12 Playback

    Chapter 12 Playback Purpose: This section explains how to view the remotely recorded video files stored in the network disks or memory cards. Steps: 1. Click Playback on the menu bar to enter playback interface. Figure 12-1 Playback Interface 2. Select the date and click Search. Figure 12-2 Search Video...
  • Page 120 3. Click to play the video files found on this date. The toolbar on the bottom of Playback interface can be used to control playing process. Figure 12-3 Playback Toolbar Table 12-1 Description of the buttons Button Operation Button Operation Play Capture a picture Start/Stop clipping...
  • Page 121: Chapter 13 Picture

    Chapter 13 Picture Click Picture to enter the picture searching interface. You can search, view, and download the pictures stored in the local storage or network storage. Notes:  Make sure HDD, NAS or memory card are properly configured before you process the picture search.
  • Page 122 Note: Fuzzy searching is supported for plate number. Only numbers and letters are needed for searching by plate number. (2) Click Search. The results will be listed on the picture list area. (3) To download the pictures, check the checkbox of desired pictures and click Download at upper-right corner of the page.
  • Page 123: Appendix

    Appendix Appendix 1 SADP Software Introduction  Description of SADP SADP (Search Active Devices Protocol) is a kind of user-friendly and installation-free online device search tool. It searches the active online devices within your subnet and displays the information of the devices. You can also modify the basic network information of the devices using this software.
  • Page 124 You can also click to refresh the online device list manually. The newly searched devices will be added to the list. You can click on each column heading to order the information; you can click to expand the device table and hide the network parameter panel on the right side, or click to show the network parameter panel.
  • Page 125 Figure A.1.2 Modify Network Parameters...
  • Page 126: Appendix 2 Port Mapping

    Appendix 2 Port Mapping The following settings are for TP-LINK router (TL-WR641G). The settings vary depending on different models of routers. Steps: 1. Select the WAN Connection Type, as shown below: Figure A.2.1 Select the WAN Connection Type 2. Set the LAN parameters of the router as in the following figure, including IP address and subnet mask settings.
  • Page 127 another camera as 81, 8001, 555, 8201 with IP 192.168.1.24. Refer to the steps as below: Steps: 1. As the settings mentioned above, map the port 80, 8000, 554 and 8200 for the network camera at 192.168.1.23 2. Map the port 81, 8001, 555 and 8201 for the network camera at 192.168.1.24. 3.

Table of Contents