(hereinafter referred to as "the Device" or "EVS"). Read carefully before using the device, and keep the manual safe for future reference. Models Series Models EVS71 Series EVS7124S; EVS7136S; EVS7148S EVS72 Series EVS7224S; EVS7236S; EVS7248S; EVS7285S EVS52 Series EVS5224S; EVS5236S; EVS5248S EVS51 Series EVS5124S;...
Page 3
User's Manual Version Revision Content Release Time Added particulate and gaseous V4.0.1 February 2022 contamination specifications. ● Added one-click disarming. ● Added one-click diagnosis. December 2021 V4.0.0 ● Added the talk function. ● Added SSD health detection. Deleted the strategy of shortcut RAID V3.1.1 August 2021 creation.
Page 4
User's Manual contact customer service for the latest program and supplementary documentation. ● There might be errors in the print or deviations in the description of the functions, operations and technical data. If there is any doubt or dispute, we reserve the right of final explanation. ●...
Page 5
User's Manual Icon/Button Description Search column. Enter key words, click to search the corresponding information. Text column. Enter number, letter, symbol and so on. Close button. Click the icon to close the window.
User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, and comply with the guidelines when using it. Operation Requirements ●...
Page 7
User's Manual any injuries or damages caused by the use of a nonstandard power adapter. ● Do not place the Device in a place exposed to sunlight or near heat sources. ● Keep the Device away from dampness, dust, and soot. ●...
Page 8
User's Manual Storage Requirements Store the Device under allowed humidity and temperature conditions.
Page 16
User's Manual 6.6.3.1.2 Changing Password of Other Users .................... 185 6.6.3.2 Resetting the Password ..........................185 6.6.3.2.1 Leaving Email Address and Security Questions ..............185 6.6.3.2.2 Resetting Password on Local Interface ..................186 6.6.3.2.3 Resetting Password on the Web Interface or PC Client ............ 187 6.6.4 Adding ONVIF User ..............................
User's Manual 1 Overview 1.1 Introduction The Device is designed for the management, storage and application of high-definition video data. It uses Linux operation system and professional customized hardware platform, and it is configured with multiple Hard Disk Drive (HDD) management system, front-end HD device management system, HD video analysis system and large capacity video storage system.
Page 19
User's Manual Figure 1-2 EVS7148S/EVS7248S/EVS5248S/EVS5148S/EVS5160S Table 1-1 Front panel description Name Description ● Turns on or off the Device. ● If the Device is off, press this button to turn the Power button Device on. ● To turn off the Device, press and hold this button for five seconds.
User's Manual 1.2.2 EVS7285S Figure 1-3 Front panel Table 1-2 Front panel description Name Description ● The light is off when no HDD is installed. ● The light glows when there is no read and write HDD status indicator operation on the installed HDD. light ●...
User's Manual 1.2.3 EVS5016S-V2/EVS5016S-R-V2 Figure 1-4 Front panel Table 1-3 Front panel description Name Description Turns on or off the device. ● If the Device is off, press this button to turn the Power button Device on. ● To turn off the Device, press and hold this button for five seconds.
Page 23
User's Manual Figure 1-7 EVS7148S Table 1-4 Rear panel description Port Description Connects to AC power supply. Contains fans for case Power module cooling. Used to debug general serial ports, configure IP address RS-232 and transmit transparent serial data. Gigabit management port. Can be used as data port. SAS HD Connects the IN interface of the expansion cabinet.
Page 25
User's Manual Figure 1-10 EVS7248S/EVS5248S Table 1-5 Rear panel description Port Description Connects to AC power supply. Contains fans for Power module case cooling. Used to debug general serial ports, configure IP RS-232 address and transmit transparent serial data. Gigabit management port which can be used as data port.
User's Manual 1.3.3 EVS7285S Figure 1-11 Rear panel Table 1-6 Rear panel description Port Description Connects to AC power supply. Contains fans for case Power module cooling. Fans Used for device cooling. Used to debug general serial ports, configure IP RS-232 address and transmit transparent serial data.
Page 28
User's Manual Figure 1-14 EVS5148S Figure 1-15 EVS5160S Table 1-7 Rear panel description Port Description Power Connects to AC power supply. Contains fans for case cooling. module Used to debug general serial ports, configure IP address and RS-232 transmit transparent serial data. Gigabit management port.
User's Manual Port Description Connects the IN interface of the expansion cabinet. SAS HD The port is optionally available on select models. eSATA Connects to external storage devices. USB 3.0 Connects the mouse or other USB storage devices. Outputs high definition video data and multi-channel audio data to external displays.
Page 30
User's Manual Port Description Used to debug general serial ports, configure IP address RS-232 and transmit transparent serial data. VGA video output port. Outputs analog video signal. It can connect to the monitor to view analog video. The port is for system installation and after-sales maintenance only.
User's Manual 2 Installation and Powering Up 2.1 Installing HDD 2.1.1 EVS7124S/EVS7136S/EVS7148S/EVS7224S/EVS7236S/EVS7248S/EV S5224S/EVS5236S/EVS5248S/EVS5124S/EVS5136S/EVS5148S/EVS5 160S The HDD is not installed by default on factory delivery. You need to install it by yourself. Some devices are heavy and should be carried jointly by several persons to avoid injury. Procedure Step 1 Press the red button on the disk tray to unlock the handle.
Page 32
User's Manual Figure 2-2 Disk tray Step 3 Put the disk into the disk tray and fasten the screws at the bottom of the tray.
User's Manual Figure 2-3 Fasten the screws Step 4 Insert the disk tray into the HDD slot, push it to the bottom and lock the handle. To avoid any damage to the slot, do not lock the handle until the disk tray has been pushed to the bottom.
Page 34
User's Manual Figure 2-4 Remove the cover Step 2 Take out the disk tray. Figure 2-5 Take out disk tray Step 3 Remove the fake disk. Figure 2-6 Remove fake disk Step 4 Put the real disk into the disk tray.
User's Manual Figure 2-7 Install real disk Step 5 Re-insert the disk tray into the device. Figure 2-8 Re-insert disk tray Step 6 Re-attach the cover, and then turn the lock. Figure 2-9 Re-attach the cover 2.1.3 EVS5016S-V2/EVS5016S-R-V2 Procedure Step 1 Press the red button on the HDD box in the front panel and unlock the handle.
Page 36
User's Manual Figure 2-10 Open the handle Step 2 Pull out to take the empty HDD box. Figure 2-11 HDD box Step 3 Put the HDD into the disk box and fasten the screws on both sides of the box. Figure 2-12 Fasten the screws...
User's Manual To avoid any damage to the slot, do not close the handle if the HDD box has not been pushed to the bottom. Step 4 Insert the HDD box into the HDD slot, push it to the bottom, and then lock the handle. 2.2 Installing Device to Cabinet For EVS7285S, the Device should be installed to cabinet.
User's Manual Figure 2-15 Install slide rail Step 4 When pushing the Device into the cabinet, slide to remove the handle, and then press the tab. Figure 2-16 Push device into cabinet Step 5 Tighten the screws. Figure 2-17 Tighten the screws 2.3 Powering Up Prerequisites Properly connect the cables before powering up the Device and check against the following items:...
Page 39
User's Manual Background Information This section uses EVS7124S as an example, and slight difference might be found in the actual. Press the power button on the front panel. Figure 2-18 Front panel See Table 1-1 to check whether the indicators are normally displayed. ●...
User's Manual 3 Initial Settings When using the Device for the first time, initialize the device, and set basic information and functions first. 3.1 Initializing the Device If it is your first time to use the device after purchasing or after restoring factory defaults, set a login password of admin (system default user).
Page 41
User's Manual Figure 3-2 Time Table 3-1 Time parameters description Parameter Description Time Zone Select the time zone of the Device. Set system date and time manually or by synchronizing with NTP server time. ● Manual Settings: Select date and time from the calendar. Time ●...
Page 42
User's Manual Table 3-2 Description of password parameters Parameter Description Username The default username is admin. Password Set admin login password, and then confirm the password. Confirm Password Click to view the password requirement. Step 5 Configure password protection settings. You can use the linked email address or answer the security questions to reset admin password.
User's Manual 3.2 Configuring IP Address Configure the IP address and DNS server information of the Device according to network planning. Make sure that at least one Ethernet port has been connected to the network before you set IP address. Procedure Step 1 On the page that prompts you initialization succeeded, click Quick Config.
User's Manual Table 3-4 NIC parameters description Parameter Description The maximum network transmission speed that the current NIC Rate (Mbps) supports. Type Select IPv4 or IPv6. ● DHCP: When there is a DHCP server on the network, you can enable DHCP.
User's Manual After initializing the Device, you have logged in by default. Now you can configure system settings and operate. 3.3.1 Logging in to the PC Client Log in to the PC client for system configuration and operation. Procedure Step 1 Download the PC client.
User's Manual 3.3.2 Logging in to Local Interface Prerequisites Ensure that the Device is connected with display, mouse and keyboard. Procedure Step 1 Turn on the Device. Step 2 Enter username and password. ● The default administrator username is admin. The password of the admin account is what you set during initialization.
User's Manual When you log in to the local interface, you can click to control the screens. Table 3-5 Home page description Name Description Home page Go back to the home page. Displays enabled application icon. Point to the app and then click to close the app.
Page 49
User's Manual Figure 3-10 Camera Under the Quick Add tab, click Start Search. Step 4 The search results are displayed. To filter the search results, you can click Step 5 Select an uninitialized remote device and then click Initialize. Click next to Initialization Status and then select Uninitialized to show uninitialized remote devices only.
User's Manual ● Click Add: The system completes initializing the remote device and then adds the remote device to the Device. ● Click OK: The system completes initializing remote device without adding the remote device to the Device. 3.5.2 Adding Remote Devices You can add remote devices to the Device in any of the following ways.
Page 51
User's Manual Figure 3-11 Search results Table 3-7 Description of search results Parameter Description Click Start Search to search for remote devices again. Click Stop Search Start Search to stop search. Click Connection Password to set the username and password for the remote devices.
User's Manual Select one or more remote devices, and then click OK. Step 2 ● During the adding process, click Cancel to cancel adding the remote device. ● If a remote device is in exception due to network disconnection or other reasons, it can still be added.
Page 53
User's Manual Figure 3-13 Remote device setting Table 3-8 Parameters of adding remote device Parameters Description Select a channel number for the remote device on IVSS. Channel No. If you select Auto Allocation, IVSS will provide a channel number automatically. Select the connection protocol of the remote device.
User's Manual Parameters Description Enter the HTTP port number. The default port number is 80. The value ranges from 1 through 65535. HTTPS Port When Manufacturer is Onvifs, you need to configure this parameter. Username Enter the username and password of the remote device. Password Enter the TCP port number of the remote device.
User's Manual Figure 3-14 Camera Step 4 Under the RTSP tab, enter the RTSP address. The RTSP address format is rtsp://<username>:<password>@<IP address >:<port>/cam/realmonitor?channel=1&subtype=0. For example, rtsp://admin:admin@192.168.20.25:554/cam/realmonitor?channel=1&subtype=0. ● Username: Username of the remote device. ● Password: Password of the remote device. ●...
Page 56
User's Manual Figure 3-16 Camera Step 4 Under the Batch Import tab, click Download Template to download the template. ● On the PC client, click at the top of the client, select Download to view the storage path. ● On the local interface, you can select the file storage path. ●...
Page 57
User's Manual If the information on remote devices is not filled in completely, you can improve it after importing the template. Step 7 Select one or more remote devices, and then click OK. ● During the adding process, click Cancel to cancel adding the remote device. ●...
User's Manual 4 AI Operations The device supports AI by camera. When configuring an intelligent detection, if you select AI by camera, the intelligent analysis job is completed on the camera, and the device just receives and processes the results. This chapter introduces how to configure the AI functions respectively.
User's Manual AI Event AI by Camera AI by Recorder Call Alarm Smoking Alarm ANPR Click after the video detection device to go the Web page of the corresponding device quickly. 4.2 Face Detection An alarm is triggered when human faces are detected within the detection zone. 4.2.1 Enabling the Smart Plan To use AI by Camera, you need to enable the smart plan first.
User's Manual 1. Click AI by Camera, and then click to enable face detection. 2. Click to enable face enhancement, which enables the system to preferably guarantee clear faces with low stream. 3. Click to set the minimum size or maximum size of the face detection zone.
User's Manual select Male, Female or Unknown for Gender. Figure 4-2 Attribute display Step 6 Click Save. 4.2.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. ● The video window displays the target boxes of currently detected faces. ●...
Page 62
User's Manual Figure 4-3 Face records Table 4-2 Management of face records Icon Operation Download the face snapshot and related video. When operating on the local interface, you need to insert a USB storage device into the Device.
User's Manual Icon Operation Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot. 4.2.4 Face Search Search for face detection information, including face detection image, record and features. 4.2.4.1 Searching by Attributes Procedure Step 1 Log in to the PC client.
User's Manual Export more than one record. Support specifying file formats. 1. Select one or more face records. To export all records, select the checkbox next to Select All. 2. Click Export, and then select the format of the information that you want to export. You can export the images, videos and an excel that contains attributes information.
User's Manual You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule. For details, see "6.7.3 Schedule". Step 6 Click Select next to Event Linkage to set alarm actions. For details, see "6.4.1 Alarm Actions".
Page 66
User's Manual Figure 4-4 Attribute display Step 5 Click Save. and then select the Human tab. Step 6 Click Step 7 Configure AI attributes settings. With AI Attributes Settings enabled by default. You can configure the style of the features panel and the attributes that you want to display.
User's Manual Figure 4-5 Attribute display Step 8 Click Save. 4.3.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. ● The video window displays the target boxes of currently detected faces. ●...
User's Manual 4.3.4 Face Search You can search face records by attributes or by image, and then export the search results. 4.3.4.1 Searching by Attributes Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the Live page, or select AI Search on the home page.
User's Manual 4.4 People Counting This Device can count the people flow, in-area people number, and queuing number in the detection zone. ● The people counting function is only available with AI by Camera. Make sure that the camera has been configured with people counting rules.
User's Manual The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule. For details, see "6.7.3 Schedule". Step 8 Click Select next to Event Linkage to set alarm actions. For details, see "6.4.1 Alarm Actions".
User's Manual Table 4-7 Parameter description of in-area people counting Parameter Description 1. Click to enable the alarm. 2. Set people number threshold. ● If you select≥ Threshold and then enter a number, an alarm is triggered when the detected number is larger or equal to the number that you entered.
User's Manual ● Click to set the whole image as the detection area. Step 6 Set parameters. Table 4-8 Parameter description of queuing detection Parameter Description 1. Click to enable the alarm. 2. Set people number threshold. ● If you select≥ Threshold and then enter a number, an alarm is triggered when the detected number is larger or equal to the number that you entered.
User's Manual 4.4.6 Viewing AI Report Procedure Step 1 Log in to the PC client. Step 2 On the home page, select AI Report > AI Report > People Counting. Step 3 Select a device. You can only select an AI fisheye camera or people counting camera. Step 4 Select an event type from People Counting, Area People Counting and Queue People Counting.
User's Manual 4.5.2 Configuring Video Metadata After enabling video metadata, the Device links the current remote device to record video when an alarm is triggered. You cannot set other linkage actions for video metadata when AI by Camera is used. Procedure Step 1 Log in to the PC client.
User's Manual ● You can select up to 4 attributes. ● 4 attributes have been selected by default. To select other attributes, cancel the selected attributes, and then select the ones you need. 3) On the AI Attributes section, select the attribute groups for video metadata. Each attribute is broken down into more specific groups.
User's Manual Table 4-9 Management of detection results Icon Operation Download the snapshot and related video. When operating on the local interface, you need to insert a USB storage device into the Device. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
Page 77
User's Manual Figure 4-7 Search by human attributes Click Search. Step 6 ● If face is captured, the human and face snapshots are displayed. ● If no face is captured, the human snapshot and human attributes are displayed. Related Operations Point to a record, and then the following icons are displayed.
User's Manual Icon Operation Export the snapshot, video and video player. To export in batches, select multiple records, and then click Export to export snapshots, videos or excel. After you set alarm linkage snapshot, the system exports detected images and panoramic images at the time of snapshot. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
Page 79
User's Manual Figure 4-8 Search by vehicle attributes Step 6 Click Search. If license plate is detected, both the scene of the vehicle and the license plate will be displayed. Related Operations Point to a record, and then the following icons are displayed. Table 4-11 Management of search results Icon Operation...
User's Manual Icon Operation Export the snapshot, video and video player. To export in batches, select multiple records, and then click Export to export snapshots, videos or excel. After you set alarm linkage snapshot, the system exports detected images and panoramic images at the time of snapshot. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
User's Manual 4.6.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first. For details, see "4.2.1 Enabling the Smart Plan". 4.6.2 Configuring IVS 4.6.2.1 Global Configuration Configure global rules of IVS. Procedure Step 1 Log in to the PC client.
Page 82
User's Manual Functions Description Scene When the target enters, leaves, or appears in the detection area, an Intrusion alarm is triggered, and the system performs configured alarm linkages. When an object is abandoned in Scenes with sparse targets and without the detection area over the obvious and frequent light change.
User's Manual You can also click Event from the configuration list on the home page. Select a remote device on the device tree, and then select Smart Plan > IVS. Step 3 Step 4 Set tripwire rules. 1. Select AI By Camera > Rule Config. 2.
User's Manual 4.6.3.1 Setting Attribute Display Configure the display rule of IVS detection results. Prerequisites Before using this function, make sure that view has been created. Procedure Step 1 Log in to the PC client. Step 2 Under the Live tab, open a view window. Step 3 Click and then select the Human, and Motor Vehicle tab.
User's Manual Figure 4-10 Motor vehicle Step 4 Configure AI attributes settings. With AI Attributes Settings enabled by default, when the system detects a target, a features panel appears on the live video. You can configure the style of the features panel and the attributes that you want to display.
User's Manual ● You can view the detection statistics on the upper-righter corner of the Live page. Figure 4-11 Detection statistics ● Features panels are displayed on the right side of the video image. Point to the features panel, and the icons are displayed. ◇...
User's Manual 4.7 Vehicle Recognition An alarm is triggered when the detected vehicle meets detection rule. The Device supports only ANPR through AI by Camera. Make sure that the vehicle recognition parameters of camera are configured. For details, see the user's manual of the camera. 4.7.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first.
User's Manual 4.7.3.1 Setting Attribute Display Configure the display rule of vehicle recognition results. Prerequisites Before using this function, make sure that view has been created. Procedure Step 1 Log in to the PC client. Step 2 Under the Live tab, open a view window. Step 3 Click and then select the Motor Vehicle tab.
User's Manual Bus, Heavy Truck, Van and more for Vehicle Type. Click Save. Step 5 4.7.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. The video image of the view is displayed. ●...
User's Manual Select a remote device on the device tree, and then select Smart Plan > IVS. Step 3 Select AI By Camera > Global Config. Step 4 Step 5 Draw 1 horizontal line and 3 vertical lines. ● Click , draw vertical lines, and then enter their geographical distance values. ●...
User's Manual 4.8.3 Live View of Crowd Distribution Log in to the PC client, and then under the Live tab, open a view window. The video image of the view is displayed. The video shows people numbers and distribution status in the detection zones in real time. The frame around the detection zone flashes red when there is an alarm in the zone.
User's Manual 4.9.2 Configuring Call Alarm Configure call alarm rules. The call alarm is only available with thermal cameras. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event. You can also click Event from the configuration list on the home page. Step 3 On the device tree, select the visible light channel of a thermal camera.
User's Manual You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule. For details, see "6.7.3 Schedule". Step 8 Click Select next to Event Linkage to set alarm actions. For details, see "6.4.1 Alarm Actions".
User's Manual 5 General Operations This chapter introduces general operations such as live view, playback, alarm, and more. 5.1 Live and Monitor Log in to the PC client, and then under the Live tab, you can view the live videos. Point to the left and right edges of the video windows, and then click to hide or display the left and right columns.
User's Manual Description ● : Take a snapshot of live view. ● : Display the live view in full screen. ● : Edit the view window and save as a new view. ● : Start tour. You need to enable the function first in System > General > System Settings.
User's Manual 5.1.1.1 View Group A view group is a group of views. The view group helps you to categorize, search for and manage views quickly. Under View Group created by default, you can create view groups. ● You can create up to 100 view groups. ●...
User's Manual Table 5-2 View group management Operation Description Right-click a view group and select Rename. Set view group name Rename and click any blank space. Please be advised that once you delete a view group, all views under the view group will be deleted at the same time. Delete View group ●...
User's Manual ● The Device automatically creates the view grids according to the number of the selected remote devices. Device supports maximum 36 view windows. ● The view window fills in the whole layout grid by default. Right-click to select Original Scale >...
User's Manual When adjusting the positions of video windows, drag the video window to the layout grid whose background color is green. You cannot drag the video window to the grid of red background color. ● Change the window size: Drag the edges of the video window to adjust its size, and then click OK.
User's Manual Operation Description ● When there are more than 9 video windows, click one video window to display it at the center of all windows in the zoom in mode. Click any other blank position to restore the original size. Zoom in video window ●...
User's Manual 5.1.1.3.1 Taskbar Log in to the PC client, under the Live tab, open a view and then point to a video window. The taskbar is displayed. Figure 5-6 View window Table 5-5 Window taskbar Icon Description Zoom. Click the icon, and then select a zone on the video window to zoom in.
User's Manual Icon Description Manual snapshot. The snapshot storage path varies on different interfaces. ● Local interface. ◇ When a USB storage device is connected, snapshots are saved to the USB storage device. ◇ Otherwise, the snapshots are saved on the Device. You can search for and export videos under the Search tab.
User's Manual Parameter Description Set an audio output mode from Audio 1, Audio 2, Mixing and Close. Audio Set installation methods and display modes of fisheye cameras. Fisheye Dewarp This function is only available on fisheye camera. Crowd Distribution Enable the crowd distribution map to view and monitor crowd density. Intelligently track targets.
User's Manual Figure 5-8 Thermal 5.1.1.3.7 Talk The Talk function enables voice interaction between the Device and remote devices, improving the efficiency in handling emergency events. Procedure Step 1 Log in to the PC client. Step 2 Open a view under the Live client. Step 3 Click at the upper-right corner of the view window to enable the Talk function.
Page 107
User's Manual Figure 5-9 Device tree Table 5-8 Device tree description Operation Description Enter keywords in Search for devices Support fuzzy search. Click and then select All, Online, Offline, Device mismatch and Incorrect Username or Password to filter the remote devices. Filter devices Device mismatch refers to the situation where the remote device is not compatible with IVSS due to inconsistent languages.
User's Manual 5.1.3 PTZ Log in to the PC client. Use the PTZ panel at the lower-left corner of the Live tab to perform PTZ control so that the PTZ camera can rotate accordingly to monitor all directions. The PTZ functions might vary depending on the device models. Figure 5-10 PTZ Table 5-9 PTZ control panel Icons...
User's Manual Icons Description Click to use PTZ functions. ● : preset. ● : tour group. ● : pattern. ● : scan. 5.1.3.1 PTZ Menu Settings Device displays PTZ main menu on the view window. The PTZ main menu enables you to perform camera settings, PTZ settings, system management, and more.
User's Manual ● Click to select options . ● Click to set values. ● Click to confirm. Step 5 Click to exit PTZ menu mode. 5.1.3.2 Configuring PTZ Functions Control PTZ device to implement corresponding operations. The PTZ functions might vary depending on the device models. 5.1.3.2.1 Setting a Preset A preset is the saved information of a specific position, angle, and focal length of the PTZ camera.
User's Manual 5.1.3.2.2 Setting a Tour Group A tour group is a sequential set of presets. When a tour group is used, the PTZ camera automatically rotates to the presets one by one at the predefined interval. Procedure Step 1 Log in to the PC client.
User's Manual Related Operations ● Edit a pattern Select the pattern, and then click . Click Start Record and record a new pattern, and then click Stop Record. ● Select a pattern and then click to delete it. ● Click to refresh the list of patterns.
User's Manual 5.2 Recorded Files You can search for, play back, export the recorded videos or images, and more. 5.2.1 Playing back Recorded Videos Search for and play back recorded videos according to remote device, recording type, and recording time. Procedure Step 1 Log in to the PC client.
Page 114
User's Manual ◇ You can click to divide a video into multiple splices that are equally long. ◇ Select Only locked videos on the upper-right corner of the File Playback tab to display locked videos only. ◇ Click on the upper-right corner of the File Playback tab to switch the display mode of the video files.
Page 115
User's Manual Signal Words Description When you play back several videos at the same time, click the icon to switch to time synchronization mode. All other windows play the video of the same time of current window. Click to cancel time synchronization. When you click , the system enables operation synchronization as well.
User's Manual Signal Words Description Time bar. Displays recording type and recording period. ● There are 2 recording file bars on the time bar. The top bar displays recording time of selected window. The bottom bar displays recording time of all selected remote devices. ●...
User's Manual Figure 5-15 Clip a video Step 5 Drag the left and right edges of the blue frame to select the start time and end time of clipping. Step 6 Click OK. Step 7 Select a file format, and then click Browse to select the storage path. Figure 5-16 Save the video Step 8 Click OK.
User's Manual 4. Click Search. ● Click to view the corresponding video. ● Click to edit the tag. ● Click to delete the tag. ● Select multiple tags and click Delete to delete the tags in batches. ● Click Refresh to refresh the tag list. Figure 5-17 Tags 5.2.4 Searching for Snapshots Search for and view snapshots according to remote device, image type, and snapshot time.
User's Manual Connect a USB device to the Device if you are operating on the local interface. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Search. Step 3 Search for videos or images. Step 4 Under the File Playback tab, select one or more files to back up.
User's Manual Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Aux > Watermark. Step 3 Click Browse to select a video file. Step 4 After the file is uploaded, click Parity. ● Normal: If the verification result is normal, the correct watermark is displayed. ●...
User's Manual ● The 1–3 monitors represent monitors connected to HDMI 1–HDMI 3. The main screen refers to the monitor connected to VGA or HDMI 1 port. The monitors connected to the HDMI 2 and HDMI 3 are the sub screens. The main screen and sub screen display different content and support different resolutions and refresh intervals.
User's Manual 5.7 Buzzer Log in to the PC client, and then click to view buzzer alarm messages. 5.8 Audio Management Upload and manage audio files that the Device plays when an alarm event occurs. ● You can upload .pcm, .mp3, .wav,and .aac files. ●...
User's Manual 6 System Configuration This chapter introduces system configurations such as managing remote device, user information, and HDD storage, and setting network, alarm events, security strategy, and system parameters. 6.1 Device Management Log in to the PC client, click on the upper-right corner and then click Camera, or click Camera from the configuration list on the home page.
User's Manual status, and more. ● indicates that the remote device is offline. ● indicates that the remote device is online. ● indicates that the connection with the remote device failed. You can click to filter the remote devices. 6.1.2 Changing IP Address Modify IP address of the remote devices that are connected or not connected to the Device.
Page 125
User's Manual Figure 6-4 Search results Select one or more remote devices and then click Modify IP. Step 5 ● You can only modify the IP address of initialized devices. ● You can only modify the IP address of remote devices that are using the private or ONVIF protocol.
User's Manual ● Enter incremental value only when you want to change IP addresses of several devices at the same time. The system will allocate IP address one by one with the fourth part of the IP address increasing by the incremental value. ●...
User's Manual You can also click Camera from the configuration list on the home page. Under the Camera tab, select one or remote devices, and then click Modify IP. Step 3 ● You can only modify the IP address of initialized devices. ●...
User's Manual The pages might vary with remote devices. 6.1.3.1 Configuring Attributes of Remote Devices Set the name of remote devices, and view information on the remote devices. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the page and then click Camera.
Page 129
User's Manual You can also click Camera from the configuration list on the home page. Select a remote device from the device tree and then click the Video tab. Step 3 You can view information on the remote device, such as its model, MAC address, system version, and more.
User's Manual Parameter Description ● General: Use general coding strategy. Encoding ● Smart Codec: Enable this function to enhance performance of video Strategy compression and reduce required storage space. Set video resolution. The higher the resolution, the better the video quality. Resolution Different models of remote devices support different resolutions.
User's Manual Figure 6-8 OSD Step 4 Configure OSD information. ● Device name. 1. Click to enable OSD of device name. 2. Click 3. Enter the device name. 4. Drag the text box to the proper position. ● Time. 1. Click to enable OSD of time.
User's Manual You can also click Camera from the configuration list on the home page. Select a remote device from the device tree and then click the Audio tab. Step 3 Figure 6-9 Audio Step 4 Select an audio output type. ●...
User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the page and then click Camera. You can also click Camera from the configuration list on the home page. Step 3 Select the root node in the device tree, and then click the Camera tab.
User's Manual Click Download Template to download the template. You can use the template to import remote devices. Figure 6-11 Export Step 4 (Optional) Click to enable export encryption. The function is enabled by default. The exported .backup file is encrypted and cannot be edited. If do not enable encryption, the system exports .csv file, which can be opened with Excel.
User's Manual When the icon is red, for example , the remote device is offline. ● Right-click an offline remote device, and then select Connect to connect the remote device. ● Right-click an online remote device, and then select Disconnect to disconnect the remote device.
Page 136
User's Manual Make sure that at least one Ethernet port has connected to the network before you set IP address. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Network. Step 2 Click You can also click Network from the configuration list on the home page.
User's Manual Parameter Description Set NIC MTU value. The default setup is 1500 bytes. We recommend you check the MTU value of the gateway first and then set the MTU value of the Device equal to or smaller than the gateway value, which helps to reduce the packets slightly and enhance network transmission efficiency.
User's Manual Aggregation mode Description The Device bonds several NICs and all NICs are working together to share the network load. The system allocates data to each NIC according to your allocation strategy. Once the system detects that one NIC breaks down, it stops sending data through this NIC, and transmits the data among the rest NICs.
Page 139
User's Manual The setting page varies depending on the aggregation mode you have selected. The following figure is the load balance setting page. Figure 6-14 Edit load balance 5) Set parameters. Table 6-6 NIC parameters description Parameters Description The maximum network transmission speed that the bonded NICs Rate (Mbps) support.
User's Manual Parameters Description Set NIC MTU value. The default setup is 1500 bytes. We recommend you check the MTU value of the gateway first and then set the MTU value of the Device equal to or smaller than the gateway value, which helps to reduce the packets slightly and enhance network transmission efficiency.
User's Manual Among the split NICs that were bonded together, the first NIC reserves the IP address configured during binding, and the rest NICs restore their default IP addresses. 6.2.1.3 Setting Port Number Set device port number. Procedure Step 1 Log in to the PC client.
User's Manual Parameter Description Set according to the actual requirements. The default value is 80. The value ranges from 1 to 65535. HTTP If the value you set is not 80, remember to add the port number after the IP address when you are using a browser to log in to the device. Set according to the actual requirements.
User's Manual Figure 6-17 P2P Step 4 Click to enable the P2P function. Step 5 Click Apply. You can register the Device to the app for remote monitoring and management. For details, see the corresponding user's manual of the app. 6.2.2.2 Auto Register Register the Device on a designated proxy server so that client software can access the Device through the proxy server.
User's Manual Figure 6-18 Register Step 4 Click to enable the function. Step 5 Set parameters. Table 6-8 Register Parameter Description Select an IP type from IPv4 and IPv6. Type IP Address Enter the IP address of the server that you are registering the Device to. Port Enter the port number of the server for registration.
Page 145
User's Manual Figure 6-19 Email Step 4 Click to enable the email function. Step 5 Set parameters. Table 6-9 Emails parameter description Parameter Description Select a server type from Custom, Gmail, Hotmail, and Yahoo Mail. Server Server Address Enter the address of the email server. Select an encryption type from NONE, SSL, and TLS.
User's Manual 2) Click ● If the configuration is correct, the system pops up a message of success, and the receiver will receive the test mail. ● Otherwise, the system pops up a message of failure, and the receiver will not receive the test mail.
User's Manual Parameter Description Auto Report Plan Select time cycle and specific time for uploading alarms. Step 6 Click Apply. 6.2.2.5 UPnP Through the UPnP (Universal Plug and Play) protocol, you can establish a mapping relationship between the LAN and the WAN. The WAN user can use the WAN IP address to directly access the Device on the LAN.
User's Manual Parameter Description The LAN IP address of the router. LAN IP The IP address is automatically obtained after the mapping succeeds. The WAN IP address of router. WAN IP The IP address is automatically obtained after the mapping succeeds. The list is consistent with the UPnP port mapping list on the router.
Page 149
User's Manual Figure 6-22 SNMP Step 4 Click to enable the function. Step 5 Select SNMP version. For data security, we recommend V3. Set parameters. For Trap Address, enter the IP address of the computer installed with the Step 6 MG-SOFT MIB Browser.
User's Manual Parameter Description Read or Write Community supported by the agent programs. Read Community, Write Community The name can only contain numbers, letters, underscores, and middle lines. The destination address of Trap information sent by the agent Trap Server program.
User's Manual Step 4 Click to enable multicast. Step 5 Set parameters. Table 6-13 Multicast parameter Parameter Description IPV4/IPV6 Select an IP type and then enter the IP address Enter the IP address that IP Address/Server you want to use as the multicast IP. Address Port Set the multicast port.
Page 152
User's Manual Step 2 Click on the upper-right corner and then click Network. You can also click Network from the configuration list on the home page. Step 3 Select Network Application > DDNS. Figure 6-24 DDNS Step 4 Click to enable the DDNS function. After you enable the DDNS function, the third-party server might collect your device information.
User's Manual Click Apply. Step 6 After successful configuration, enter domain name in address bar of the browser or PC client, and press Enter key to access the IVSS. 6.2.2.9 Routing Table Configure the route table so that the system can automatically calculates the best path for data transmission.
User's Manual The system supports pre-check and routine inspection, and you can obtain real-time storage status of the Device and avoid data loss. ● Pre-check: During device operation, the system automatically detects disk status in case of change (restart, insert and pull the disk). ●...
User's Manual Figure 6-26 S.M.A.R.T 6.3.1.1.3 Formatting ● Please be advised that formatting will clear all data on the disk. ● The hot standby disk cannot be formatted. Log in to the PC client. Click on the upper-right corner and then select Storage > Storage Resource >...
User's Manual ● The Device supports RAID0, RAID1, RAID5, RAID6, RAID10, RAID50 and RAID60. See "Appendix 3 RAID" for detailed information. ● We recommend you use enterprise HDD when you are creating RAID, and use surveillance HDD for single-HDD mode. 6.3.1.2.1 Creating RAID Background Information RAID has different levels such as RAID5, RAID6 and more.
Page 157
User's Manual Table 6-15 Manual creation parameters description Parameter Description Select the storage device where the disks are located and select the disks you want to add to the RAID. Storage Device Different levels of RAID might need different number of disks. RAID Select the level of RAID that you want to create.
User's Manual Parameter Description Set RAID resources allocation mode. The default mode is self-adaptive. ● Self-adaptive: The system automatically adjusts RAID synchronization speed according to current business load. When there is no external business, the synchronization speed is high. When there is external business, the synchronization speed is low. Working mode ●...
Page 159
User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page. Step 3 Select Storage Resource > RAID > Hot Standby . Step 4 Click Add.
User's Manual Figure 6-31 Hot standby 6.3.1.3 Network Disk Network disk is a network-based online storage service that stores device information on the network hard disk through the iSCSI protocol. 6.3.1.3.1 iSCSI Application Log in to the PC client. Click on the upper-right corner and then select Storage >...
Page 161
User's Manual You can also click Storage from the configuration list on the home page. Select Storage Resource > Network Disk > iSCSI Management. Step 3 Step 4 Click Add. Figure 6-32 Add iSCSI Step 5 Set parameters. Table 6-18 Network disk parameters Parameter Description IP Address...
User's Manual ● Click to delete a disk; click Refresh to refresh the disk list. ● On the Disk Group Settings page, you can configure network disk groups. 6.3.2 Storage Settings 6.3.2.1 Configuring Disk Groups The installed disks and created RAID groups are allocated to group 1 by default. You can create more disk groups and allocate disks and RAID groups to other groups.
User's Manual or RAID groups, and then click OK. ● Move disks or RAID groups to another disk group. ◇ One by one: Click Move to under Operation, select a disk group, and then click OK. ◇ In bathes: Select one or more disks or RAID groups and then click Move to next to Add, select a disk group, and then click OK.
User's Manual 6.3.2.2.1 Configuring Recording Mode Configure recording modes for channels. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page. Step 3 Select Storage >...
Page 165
User's Manual Figure 6-36 Set a recording schedule Step 5 Select General, Record Events, or both as the recording type. ● General: Click the box next to General to select a schedule or click Add Schedule to add a new schedule. The Device records in the configured schedule. ●...
User's Manual Parameter Description The number of images for each manual capture action. You can also Manual Snapshot configure the interval between manual snapshots. Event Snap Configure the interval between event snapshots. Copy to Copy the current settings to other channels. Step 7 Click Apply.
User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page. Step 3 Select Storage > Basic. Step 4 Set automatic file deletion.
User's Manual recovers, the Device can not automatically download the recording during the disconnection, but you can manually create a download task. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page.
Page 169
User's Manual Figure 6-41 Add task Table 6-20 Parameter description Parameter Description Task Type Supports Scheduled Task and Single Task. Channel No. Enter the channel No. of the device. Start Time Set the time period. End Time IP Address IP adress of remote device. Port Port of remote device, 37777 by default.
User's Manual 6.4 Event Management Log in to the PC client. Click on the upper-right corner and then click Event. On the page, configure alarm events for the Device and remote devices. ● Select the root node on the device tree to set alarm events for the Device. ●...
Page 171
User's Manual Figure 6-43 Event linkage Table 6-21 Actions description Action Description Preparation The system links the selected remote device to record A remote device, such as IPC, Record videos when a linkage event has been added. occurs. The system activates a buzzer Buzzer alarm when a linkage event occurs.
User's Manual Action Description Preparation corresponding device to The remote device has been generate alarms. added, and the remote device is connected with an alarm Remote Device Alarm Output output device. See "3.5.2 Adding Remote Devices" for detailed information. When a linkage event occurs, the system triggers the See "3.5.2 Adding Remote Access Control...
User's Manual 6.4.1.2 Buzzer The system activates a buzzer alarm when a linkage event occurs. On the alarm configuration page, click Select next to Event Linkage, select Buzzer, and then click Apply. Figure 6-45 Buzzer 6.4.1.3 Log Enable the log function. The system notes down the alarm information in the log when a linkage event occurs.
User's Manual Figure 6-46 Preset Step 2 Select a PTZ device, and then enter the preset number. Step 3 (Optional) Click to link multiple PTZ devices to turn to designated presets. Click Apply. Step 4 6.4.1.6 Picture Storage Set the picture storage linkage. When a linkage event occurs, a snapshot is taken and saved on the Device.
User's Manual Make sure that the remote device has been added, and the remote device is connected with alarm output device. See "3.5.2 Adding Remote Devices" for detailed information. Procedure Step 1 On the alarm configuration page, click Select next to Event Linkage, and then select Remote Device Alarm Output.
User's Manual Step 2 Select the audio file and then set the play mode. ● Play Times: After the event ends, the system continues to play the audio file according to the play times. ● Duration: After the event ends, the system continues to play the audio file according to the duration.
User's Manual 6.4.2 Local Device You can set alarms for system errors, system offline, configure smart plans, and more. 6.4.2.1 One-click Disarming Disarm alarm linkage actions as needed to avoid interference caused by alarms. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event.
Page 178
User's Manual Table 6-22 Abnormal events Name Description The system triggers an alarm when there is no disk. It is enabled by No Disk default. Disk health exception The system triggers an alarm when SSD health exception occurs. The system triggers an alarm when disk error occurs. It is enabled by Storage error default.
User's Manual Select Exception > No Disk. Step 4 Figure 6-51 No disk Step 5 Click to enable the alarm against no disk. Click Select next to Event Linkage to set alarm actions. See "6.4.1 Alarm Actions" for Step 6 detailed information.
User's Manual Figure 6-52 Offline alarm Step 5 Click to enable the offline alarm. Step 6 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule.
User's Manual indicates that AI by Camera is enabled. Figure 6-53 Smart plan 6.4.3 Remote Device Set alarm actions for remote devices, including video detection alarm, offline alarm and smart detection alarm. The parameters might be different depending on the model you purchased. 6.4.3.1 Video Detection The system monitors and analyzes the video image.
Page 182
User's Manual Step 3 Select a remote device from the device tree. Step 4 Select Video Detection > Motion Detection. Figure 6-54 Motion detection Step 5 Click to enable video motion detection. Step 6 Configure the anti-dither period. The system only records one alarm event during the anti- dither period.
User's Manual Click Schedule to select a schedule from the drop-down list. Step 8 The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule.
User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event. You can also click Event from the configuration list on the home page. Step 3 Select a remote device from the device tree. Select Offline >...
Page 185
User's Manual Step 3 Select a remote device from the device tree. Step 4 Select External Alarm > Alarm-in Port1. Figure 6-57 Alarm-in port 1 Step 5 Click to enable the alarm. Step 6 Set parameters. Table 6-24 External alarm parameters description Parameter Description Name...
User's Manual 6.4.3.4 Thermal Alarm ● Alarm types might vary depending on the models of thermal cameras. ● Make sure that thermal detections such as heat detection and temperature detection have been configured on the thermal camera. Support the following thermal camera alarms. Table 6-25 Thermal alarms Function Description...
User's Manual 6.5 Security Strategy 6.5.1 Security Status Background Information Security scanning helps get a whole picture of the device security status. ● User and service detection: Detects whether the current login authentication, user status, and configuration security conform to recommended settings. ●...
User's Manual Figure 6-59 Details 6.5.2 System Service 6.5.2.1 Basic Services Enable basic system services for third-party access. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Security > System Service > Basic Services.
Page 189
User's Manual Figure 6-60 Basic services Step 3 Enable or disable system services. Table 6-26 System services Name Description After enabling this function, you can access the Device through SSH protocol to carry out system debugging and IP configuration. This function is disabled by default.
User's Manual Name Description After this function is enabled, a third-party platform can connect the Device through CGI protocol. For data security, we recommend you disable this function when it is not needed. After this function is enabled, other devices can connect the Device through ONVIF protocol.
User's Manual Figure 6-61 HTTPS Step 4 (Optional) Click to enable Compatible with TLSv1.1 and earlier versions. TLS (Transport Layer Security) provides privacy and data integrity between two communications application programs. Step 5 Click Apply. You can use HTTPS to access the web interface. Open the browser, enter https://IP address:port in the address bar, and then press Enter, and then you can log in to the web interface.
User's Manual Allowlist and blocklist cannot be used at the same time. Step 4 If you select Allowlist or Blocklist, click Add to add an allowlist or blocklist. You can allow or prohibit a specific IP address, IP addresses on a specific network segment, or a specific MAC address to access the Device.
User's Manual Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Security > Attack Defense > Anti-Dos Attack. Figure 6-64 Account lockout to enable SYN Flood Attack Defense or ICMP Flood Attack Defense. Step 3 Click Step 4...
User's Manual You can allow or prohibit a specific IP address, IP addresses on a specific network segment, or a specific MAC address to synchronize time with the Device. Step 6 Add IP addresses to the allowlist or blocklist . 1) Click Add.
Page 195
User's Manual Figure 6-67 Create certificate 2. Enter the information. Figure 6-68 Certificate information 3. Click Create and install certificate. ● Apply for and import a certificate. 1. Select Apply for CA Certificate and Import (Recommended) and then click Next. 2.
User's Manual request file. Submit the file to a CA institute to apply for a signed certificate. 4. Click Browse to select the certificate. Figure 6-69 Import the certificate 5. Click Import and Install. ● Import an existing certificate. 1. Select Install Existing Certificate and then click Next. 2.
User's Manual Click Install Trusted Certificate. Step 3 Click Browse to select a trusted certificate. Step 4 Click OK. Step 5 Related Operations You can edit and download the installed certificate. ● Edit Click Enter Edit Mode, enter a custom name for the certificate, and then click Save Config. ●...
User's Manual Encryption Method Description Click to enable RTSP encryption using the TLS tunnel, and then select a device certificate. We recommend you enable this function to ensure data security. RTSP over TLS You can click Certificate Management to install a device certificate. Click Apply.
Page 199
User's Manual Step 2 Click on the upper-right corner and then click Account. You can also click Account from the configuration list on the home page. Step 3 Select the root node at the upper-left corner and then click at the lower-left corner. Step 4 Enter the login password of the current account, and then click OK.
User's Manual Figure 6-74 Permission 2) Select the permissions for the user group. Click Apply. Step 7 Related Operations Select a user group, click , enter the login password, and then click OK to delete the user group. ● Before you delete a user group, you need to delete all users in the current group first. ●...
Page 201
User's Manual Enter the login password of the current account, and then click OK. Step 4 Figure 6-75 User attributes Step 5 Configure the parameters. Table 6-29 User attributes parameters Parameter Description Set the username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
User's Manual ◇ Before deleting an online user, you need to block the user first. For details, see "7.4.1 Online User". ◇ The deleted user cannot be restored. 6.6.3 Password Maintenance Maintain and manage the login passwords of users. 6.6.3.1 Changing Password Change the login password of the user.
User's Manual use the local interface to set security questions. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Account. Step 2 Click You can also click Account from the configuration list on the home page. Step 3 Select the root node at the upper-left corner.
User's Manual 6.6.3.2.3 Resetting Password on the Web Interface or PC Client Prerequisites Make sure that you have configured the linked email address. Procedure Step 1 Enter the IP address of the Device in the address bar of the browser or PC client, and then press Enter.
User's Manual Figure 6-76 ONVIF user group Step 4 Enter the login password of current user, and then click OK. Step 5 Set parameters. Table 6-32 User attributes parameters Parameter Description Set the username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
Page 206
User's Manual Step 3 Configure the parameters. Figure 6-77 Basic system settings Table 6-33 System parameters description Parameter Description Language Set system language. Select a video standard. ● PAL is mainly used in China, Middle East and Europe. ● NTSC is mainly used in Japan, United States, Canada and Mexico. Video Standard As a technical standard of processing video and audio signals, PAL and NTSC mainly differ in the encoding and decoding modes and...
User's Manual Click Apply. Step 4 6.7.2 System Time Set system time, and enable the NTP function according to your need. After you enable the NTP function, the Device can automatically synchronize time with the NTP server. Procedure Step 1 Log in to the PC client.
User's Manual Table 6-34 Time parameters description Parameters Description Set system date and time. You can set the time manually or enable NTP so that the Device can automatically synchronize time with the NTP server. ● Manual Settings: Set the actual date and time in either of the following ways.
User's Manual Figure 6-79 Schedule Step 3 Add a schedule. 1) Click Create. 2) Click to edit the schedule name. Step 4 Set the validity periods. ● Always: The schedule is always effective. ● Custom: Customize validity periods for the schedule. Click the time bar and then drag the blue strip to set a period.
User's Manual In the N+M cluster system, there is a management server, the DCS (Dispatching Console) server, which is responsible for timely and correct scheduling management of the main and sub devices. When you create a cluster, the current IVSS is used as the first sub device and the DCS server by default.
Page 211
User's Manual Figure 6-81 Cluster setting Step 5 Add a main device. 1) Click Add under Main Device. Figure 6-82 Add a main device 2) Set parameters. Table 6-35 Parameters description Parameter Description Device Name Enter a name for the main device. IP Address Enter the IP address of the main device.
Page 212
User's Manual Parameter Description Port Enter the port number. It is 37777 by default. Username Enter the login username and password of the Device. Password Select the checkbox to enable cluster, and then enter the cluster IP address, subnet mask and gateway. Cluster IP is a virtual IP that is used to access and manage the main Enable Cluster devices and sub devices in the cluster.
User's Manual Click Next. Step 7 Step 8 Set the arbitrage IP. When there are only 2 devices in the cluster, a third-party device is required to determine whether the main device is faulty, so arbitration IP must be set for the cluster to perform a normal replacement operation.
User's Manual Figure 6-85 Add a transfer task Step 4 Configure the parameters. Table 6-37 Parameters of transfer task Parameters Description Main Device Enter the IP address of the main device. Sub Device Enter the IP address of the sub device. Select the channel whose recorded files are to be transferred.
User's Manual 6.9 Network Storage Network storage is a storage technology based on IP network. After you create a storage pool, you can share your storage directory with other devices through iSCSI. Figure 6-88 Configuring network storage 6.9.1 Creating Storage Pool Background Information Storage pool is a logical storage space after the storage device is virtualized.
User's Manual By default, in the Device Name column, "sdx" (x ranges from a to z) is a disk, such as /dev/sda, and "mdx" (x is number) is a RAID group, such as /dev/md0. Step 4 Click OK. The confirmation dialogue box is displayed. Step 5 Click OK.
User's Manual Parameter Description Select a pool. Pool Name The available free space of the selected pool is displayed beside the pool name. Share Capacity Set the space of the folder. Set the block size of the folder, such as 512 Byte, 1024 Byte, 2048 Byte and 4096 Byte.
Page 218
User's Manual Procedure , or on the home page, select Network Storage > Storage Pool. Step 1 Click Step 2 Click to enable share service. Step 3 Click OK.
User's Manual 7 System Maintenance 7.1 Overview Log in to the PC client. On the home page, select Maintain > Overview. Figure 7-1 Overview Table 7-1 Overview Function Description View device version and the number of online users. Overview Click to refresh the data.
User's Manual Function Description ● View disk status and storage usage. ◇ : disk online. ◇ : disk error. ◇ : disk warning. ◇ : no disk detected. Disk ● Click , click to enable device positioning and then set the interval at which the positioning indicator light of the Device flashes.
User's Manual 7.3 System Resources Log in to the PC client. On the home page, select Maintain > System Resources > Device Resource. You can view resource status including CPU and memory usage, mainboard temperature and fan speed. Figure 7-3 System resources ●...
User's Manual ● Block in batches: Select multiple users and then click Block. Step 4 Set the block period. The default period is 30 minutes. Step 5 Click OK. 7.4.2 Network Test You can test network connection and capture packets. Packet capture is the practice of intercepting a data packet that is crossing or moving over a specific computer network.
User's Manual 7.5.1 S.M.A.R.T Detection Run S.M.A.R.T detection to check HDD status. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Maintain > Disk Maintenance > S.M.A.R.T Detection. Figure 7-6 S.M.A.R.T detection Step 3 Set the detection period.
7.5.4 Health Monitoring Monitors the disk operation status. On the home page, select Maintain > Disk Maintenance > Health Monitoring Only supports Dahua Disk. Figure 7-9 Health monitoring 7.6 Logs The logs record all kinds of system running information. We recommend you check the logs periodically and fix the problems in time.
User's Manual Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Maintain > Log > System Logs. Step 3 Set the search period, and then select the log type. Step 4 (Optional) Click , and then select a log level.
User's Manual Click Export to export the diagnosis results. Step 4 7.7.2 Run Log View system run logs for troubleshooting. Make sure that you have enabled Run Log in Security > System Service. Otherwise there is no log data. Log in to the PC client. On the home page, select Maintain > Intelligent Diagnosis > Run Log. The logs might be overwritten when the storage space runs out.
User's Manual ● During update, do not disconnect the Device from power and network, or restart or shut down the Device. ● Make sure that the update file is correct. Improper update file might result in device error. Procedure Step 1 Log in to the PC client.
User's Manual Figure 7-11 Default Select a method between Quick Restoration and Custom Restoration. Step 3 Step 4 Click OK. The system begins to restore default settings. After that, the system prompts you to restart the Device. 7.8.3 Automatic Maintenance If the device has run for a long time, you can set the Device to automatically restart at idle time.
User's Manual 7.8.4 Backing up Configurations You can export the configuration file of the Device to your computer or a USB storage device for backup. When the configurations are lost due to abnormal operation, you can import the backup configuration file to restore system configurations quickly. Exporting Configuration File On the home page, select Maintain >...
User's Manual 8 PC Client After installing the PC client, you can access the Device remotely through the PC client to carry out system configuration, function operations and system maintenance. For details on installing the PC client, see "3.3.1 Logging in to the PC Client". 8.1 Page Description Double-click the shortcut icon of the PC client on the desktop of your computer.
User's Manual 8.4 Configuring the Client Settings When the theme of your computer is not Areo, videos might not be displayed normally on the PC client. We recommend you switch the computer theme to Areo, or enable the compatibility mode of the client.
User's Manual 9 Log Out, Restart, Shut Down, Lock Log out of, restart, shut down and lock out the Device. Figure 9-1 User operation Logging Out , and then select Logout. Click Restart , select Restart, and then click OK. Click Shutting Down Shutting down the Device by unplug the power cable might cause data loss, and is not...
User's Manual Appendix 1 Glossary Appendix Table 1-1 Glossary Name Description Common Gateway Interface (CGI) is an important Internet technology. With CGI, client can ask data from program running on network server. CGI describes data transmission standard between server and asking processing program.
Page 234
User's Manual Name Description Maximum Transmission Unit (MTU) refers to the maximum data packet amount (byte) on one layer of the communication protocol. Open Network Video Interface Forum (ONVIF) is the defined general protocol for information exchange among the network video devices. It ONVIF includes search device, real-time audio/video, metadata, information control, and so on.
User's Manual Appendix 2 Mouse and Keyboard Operations This section introduces mouse and keyboard operations. Appendix 2.1 Mouse Operations Connect mouse to the USB port, you can use the mouse to control the local menu. For details, see the following table. Appendix Table 2-1 Mouse operations Operation Description...
User's Manual Appendix 2.2 Virtual Keyboard The local menu supports virtual keyboard. Click the text box to display virtual keyboard. For details, see the following pictures and table. If the device has connected to the peripheral keyboard, click the text column. Virtual keyboard will disappear.
Page 237
User's Manual Signal Words Description Click to delete letter. Click to input letter. Now the icon turns into . Click to restore previous input mode. Click to input space. Click to control cursor position. Click to switch to the next line. Select text and click the icon to cut the selected contents.
User's Manual Appendix 3 RAID RAID is an abbreviation for Redundant Array of Independent Disks. It is to combine several independent HDDs (physical HDD) to form a HDD group (logic HDD). Comparing with one HDD, RAID provides more storage capacity and data redundancy. The different redundant arrays have different RAID level.
Page 239
User's Manual RAID Level Description Min. HDD Needed RAID 10 is a combination of the RAID 1 and RAID 0. It uses the extra high speed efficient of the RAID 0 and high data protection and restores RAID10 capability of the RAID 1. It has high read/write performance and security.
User's Manual Appendix 4 HDD Capacity Calculation HDD capacity calculation formula: Total capacity (M) = Channel number× Demand time length (hour) × HDD capacity occupied per hour (M/hour) According to the above formula, get recording time calculation formula. Recording time (hour) = For example, for single-channel recording, HDD capacity occupied per hour is 200 M/hour.
User's Manual Appendix 5 Particulate and Gaseous Contamination Specifications Appendix 5.1 Particulate Contamination Specifications The following table defines the limitations of the particulate contamination in the operating environment of the device. If the level of particulate contamination exceeds the specified limitations and result in device damage or failure, you need to rectify the environmental conditions.
Page 242
User's Manual Appendix Table 5-3 Gaseous contamination specifications Gaseous contamination Specifications Copper coupon corrosion < 300 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 rate Silver coupon corrosion rate < 200 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 Appendix Table 5-4 ANSI/ISA-71.04-2013 classification of reactive environments Class Copper Reactivity Silver Reactivity...
IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations from Dahua on how to create a more secured security system.
Page 244
User's Manual 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing.
Page 245
User's Manual device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
Need help?
Do you have a question about the EVS71 Series and is the answer not in the manual?
Questions and answers