Dahua EVS71 Series User Manual
Dahua EVS71 Series User Manual

Dahua EVS71 Series User Manual

Embedded video storage
Table of Contents

Advertisement

Quick Links

Embedded Video Storage
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V5.0.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the EVS71 Series and is the answer not in the manual?

Questions and answers

Summary of Contents for Dahua EVS71 Series

  • Page 1 Embedded Video Storage User's Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V5.0.0...
  • Page 2: Foreword

    (hereinafter referred to as "the Device" or "EVS"). Read carefully before using the device, and keep the manual safe for future reference. Models Series Models EVS71 Series EVS7124S; EVS7136S; EVS7148S EVS72 Series EVS7224S; EVS7236S; EVS7248S; EVS7285S EVS52 Series EVS5224S; EVS5236S; EVS5248S EVS51 Series EVS5124S;...
  • Page 3 User's Manual Version Revision Content Release Time Added particulate and gaseous V4.0.1 February 2022 contamination specifications. ● Added one-click disarming. ● Added one-click diagnosis. December 2021 V4.0.0 ● Added the talk function. ● Added SSD health detection. Deleted the strategy of shortcut RAID V3.1.1 August 2021 creation.
  • Page 4 User's Manual contact customer service for the latest program and supplementary documentation. ● There might be errors in the print or deviations in the description of the functions, operations and technical data. If there is any doubt or dispute, we reserve the right of final explanation. ●...
  • Page 5 User's Manual Icon/Button Description Search column. Enter key words, click to search the corresponding information. Text column. Enter number, letter, symbol and so on. Close button. Click the icon to close the window.
  • Page 6: Important Safeguards And Warnings

    User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, and comply with the guidelines when using it. Operation Requirements ●...
  • Page 7 User's Manual any injuries or damages caused by the use of a nonstandard power adapter. ● Do not place the Device in a place exposed to sunlight or near heat sources. ● Keep the Device away from dampness, dust, and soot. ●...
  • Page 8 User's Manual Storage Requirements Store the Device under allowed humidity and temperature conditions.
  • Page 9: Table Of Contents

    User's Manual Table of Contents Foreword ........................................I Important Safeguards and Warnings ............................. V 1 Overview ........................................1 1.1 Introduction ....................................1 1.2 Front Panel ....................................1 1.2.1 EVS7124S/EVS7136S/EVS7224S/EVS7236S/EVS5224S/EVS5236S/EVS5124S/EVS5136S/EVS71 48S/EVS7248S/EVS5248S/EVS5148S/EVS5160S ....................1 1.2.2 EVS7285S .................................... 3 1.2.3 EVS5016S-V2/EVS5016S-R-V2 ..........................4 1.3 Rear Panel ...................................... 5 1.3.1 EVS7124S/EVS7136S/EVS7148S ..........................
  • Page 10 User's Manual 3.5.2.1 Quick Add ................................33 3.5.2.2 Manual Add ................................35 3.5.2.3 RTSP ..................................37 3.5.2.4 Batch Add ................................38 4 AI Operations ......................................41 4.1 Overview ...................................... 41 4.2 Face Detection ................................... 42 4.2.1 Enabling the Smart Plan ............................42 4.2.2 Configuring Face Detection .............................
  • Page 11 User's Manual 4.5.4 AI Search .................................... 59 4.5.4.1 Human Search ..............................59 4.5.4.2 Vehicle Search ..............................61 4.5.4.3 Non-motor Vehicle Search ..........................63 4.6 IVS ........................................63 4.6.1 Enabling the Smart Plan ............................64 4.6.2 Configuring IVS ................................64 4.6.2.1 Global Configuration ............................64 4.6.2.2 Rule Configuration ............................
  • Page 12 User's Manual 5.1 Live and Monitor ..................................78 5.1.1 View Management ............................... 79 5.1.1.1 View Group ................................80 5.1.1.1.1 Creating a View Group ......................... 80 5.1.1.1.2 Managing View Groups ........................80 5.1.1.2 View ..................................81 5.1.1.2.1 Creating a View ............................81 5.1.1.2.2 Editing a View ............................
  • Page 13 User's Manual 5.4.2 Locking the Screen ..............................104 5.5 System Messages .................................. 104 5.6 Background Task .................................. 104 5.7 Buzzer ......................................105 5.8 Audio Management ................................105 6 System Configuration ................................... 106 6.1 Device Management ................................106 6.1.1 Viewing Remote Devices ............................106 6.1.2 Changing IP Address ..............................
  • Page 14 User's Manual 6.2.2.8 DDNS ..................................134 6.2.2.9 Routing Table ..............................136 6.3 Storage Management ................................. 136 6.3.1 Storage Resource ............................... 137 6.3.1.1 Disks ..................................137 6.3.1.1.1 Sleep Strategy ............................137 6.3.1.1.2 Viewing S.M.A.R.T ..........................137 6.3.1.1.3 Formatting .............................. 138 6.3.1.1.4 Fixing the File System ........................138 6.3.1.2 RAID ..................................
  • Page 15 User's Manual 6.4.1.10 Audio Linkage ..............................158 6.4.1.11 Smart Tracking .............................. 159 6.4.1.12 Uploading Alarms ............................159 6.4.1.13 Remote Warning Light ..........................159 6.4.2 Local Device .................................. 160 6.4.2.1 One-click Disarming ............................160 6.4.2.2 Abnormal Events ............................. 160 6.4.2.3 Offline Alarm ..............................162 6.4.2.4 Viewing Smart Plans ............................
  • Page 16 User's Manual 6.6.3.1.2 Changing Password of Other Users .................... 185 6.6.3.2 Resetting the Password ..........................185 6.6.3.2.1 Leaving Email Address and Security Questions ..............185 6.6.3.2.2 Resetting Password on Local Interface ..................186 6.6.3.2.3 Resetting Password on the Web Interface or PC Client ............ 187 6.6.4 Adding ONVIF User ..............................
  • Page 17 User's Manual 7.7 Intelligent Diagnosis ................................208 7.7.1 One-click Export ................................. 208 7.7.2 Run Log ................................... 209 7.7.3 One-click Diagnosis ..............................209 7.8 Maintenance Manager ............................... 209 7.8.1 Update ..................................... 209 7.8.1.1 Updating the Device ............................209 7.8.1.2 Updating Cameras ............................210 7.8.2 Default .....................................
  • Page 18: Overview

    User's Manual 1 Overview 1.1 Introduction The Device is designed for the management, storage and application of high-definition video data. It uses Linux operation system and professional customized hardware platform, and it is configured with multiple Hard Disk Drive (HDD) management system, front-end HD device management system, HD video analysis system and large capacity video storage system.
  • Page 19 User's Manual Figure 1-2 EVS7148S/EVS7248S/EVS5248S/EVS5148S/EVS5160S Table 1-1 Front panel description Name Description ● Turns on or off the Device. ● If the Device is off, press this button to turn the Power button Device on. ● To turn off the Device, press and hold this button for five seconds.
  • Page 20: Evs7285S

    User's Manual 1.2.2 EVS7285S Figure 1-3 Front panel Table 1-2 Front panel description Name Description ● The light is off when no HDD is installed. ● The light glows when there is no read and write HDD status indicator operation on the installed HDD. light ●...
  • Page 21: Evs5016S-V2/Evs5016S-R-V2

    User's Manual 1.2.3 EVS5016S-V2/EVS5016S-R-V2 Figure 1-4 Front panel Table 1-3 Front panel description Name Description Turns on or off the device. ● If the Device is off, press this button to turn the Power button Device on. ● To turn off the Device, press and hold this button for five seconds.
  • Page 22: Rear Panel

    User's Manual 1.3 Rear Panel 1.3.1 EVS7124S/EVS7136S/EVS7148S Figure 1-5 EVS7124S Figure 1-6 EVS7136S...
  • Page 23 User's Manual Figure 1-7 EVS7148S Table 1-4 Rear panel description Port Description Connects to AC power supply. Contains fans for case Power module cooling. Used to debug general serial ports, configure IP address RS-232 and transmit transparent serial data. Gigabit management port. Can be used as data port. SAS HD Connects the IN interface of the expansion cabinet.
  • Page 24: Evs7224S/Evs7236S/Evs7248S/Evs5224S/Evs5236S/Evs5248S

    User's Manual EVS7224S/EVS7236S/EVS7248S/EVS5224S/EVS5236S/EVS5248S Figure 1-8 EVS7224S/EVS5224S Figure 1-9 EVS7236S/EVS5236S...
  • Page 25 User's Manual Figure 1-10 EVS7248S/EVS5248S Table 1-5 Rear panel description Port Description Connects to AC power supply. Contains fans for Power module case cooling. Used to debug general serial ports, configure IP RS-232 address and transmit transparent serial data. Gigabit management port which can be used as data port.
  • Page 26: Evs7285S

    User's Manual 1.3.3 EVS7285S Figure 1-11 Rear panel Table 1-6 Rear panel description Port Description Connects to AC power supply. Contains fans for case Power module cooling. Fans Used for device cooling. Used to debug general serial ports, configure IP RS-232 address and transmit transparent serial data.
  • Page 27: Evs5124S/Evs5136S/Evs5148S/Evs5160S

    User's Manual 1.3.4 EVS5124S/EVS5136S/EVS5148S/EVS5160S Figure 1-12 EVS5124S Figure 1-13 EVS7136S...
  • Page 28 User's Manual Figure 1-14 EVS5148S Figure 1-15 EVS5160S Table 1-7 Rear panel description Port Description Power Connects to AC power supply. Contains fans for case cooling. module Used to debug general serial ports, configure IP address and RS-232 transmit transparent serial data. Gigabit management port.
  • Page 29: Evs5016S-V2/Evs5016S-R-V2

    User's Manual Port Description Connects the IN interface of the expansion cabinet. SAS HD The port is optionally available on select models. eSATA Connects to external storage devices. USB 3.0 Connects the mouse or other USB storage devices. Outputs high definition video data and multi-channel audio data to external displays.
  • Page 30 User's Manual Port Description Used to debug general serial ports, configure IP address RS-232 and transmit transparent serial data. VGA video output port. Outputs analog video signal. It can connect to the monitor to view analog video. The port is for system installation and after-sales maintenance only.
  • Page 31: Installation And Powering Up

    User's Manual 2 Installation and Powering Up 2.1 Installing HDD 2.1.1 EVS7124S/EVS7136S/EVS7148S/EVS7224S/EVS7236S/EVS7248S/EV S5224S/EVS5236S/EVS5248S/EVS5124S/EVS5136S/EVS5148S/EVS5 160S The HDD is not installed by default on factory delivery. You need to install it by yourself. Some devices are heavy and should be carried jointly by several persons to avoid injury. Procedure Step 1 Press the red button on the disk tray to unlock the handle.
  • Page 32 User's Manual Figure 2-2 Disk tray Step 3 Put the disk into the disk tray and fasten the screws at the bottom of the tray.
  • Page 33: Evs7285S

    User's Manual Figure 2-3 Fasten the screws Step 4 Insert the disk tray into the HDD slot, push it to the bottom and lock the handle. To avoid any damage to the slot, do not lock the handle until the disk tray has been pushed to the bottom.
  • Page 34 User's Manual Figure 2-4 Remove the cover Step 2 Take out the disk tray. Figure 2-5 Take out disk tray Step 3 Remove the fake disk. Figure 2-6 Remove fake disk Step 4 Put the real disk into the disk tray.
  • Page 35: Evs5016S-V2/Evs5016S-R-V2

    User's Manual Figure 2-7 Install real disk Step 5 Re-insert the disk tray into the device. Figure 2-8 Re-insert disk tray Step 6 Re-attach the cover, and then turn the lock. Figure 2-9 Re-attach the cover 2.1.3 EVS5016S-V2/EVS5016S-R-V2 Procedure Step 1 Press the red button on the HDD box in the front panel and unlock the handle.
  • Page 36 User's Manual Figure 2-10 Open the handle Step 2 Pull out to take the empty HDD box. Figure 2-11 HDD box Step 3 Put the HDD into the disk box and fasten the screws on both sides of the box. Figure 2-12 Fasten the screws...
  • Page 37: Installing Device To Cabinet

    User's Manual To avoid any damage to the slot, do not close the handle if the HDD box has not been pushed to the bottom. Step 4 Insert the HDD box into the HDD slot, push it to the bottom, and then lock the handle. 2.2 Installing Device to Cabinet For EVS7285S, the Device should be installed to cabinet.
  • Page 38: Powering Up

    User's Manual Figure 2-15 Install slide rail Step 4 When pushing the Device into the cabinet, slide to remove the handle, and then press the tab. Figure 2-16 Push device into cabinet Step 5 Tighten the screws. Figure 2-17 Tighten the screws 2.3 Powering Up Prerequisites Properly connect the cables before powering up the Device and check against the following items:...
  • Page 39 User's Manual Background Information This section uses EVS7124S as an example, and slight difference might be found in the actual. Press the power button on the front panel. Figure 2-18 Front panel See Table 1-1 to check whether the indicators are normally displayed. ●...
  • Page 40: Initial Settings

    User's Manual 3 Initial Settings When using the Device for the first time, initialize the device, and set basic information and functions first. 3.1 Initializing the Device If it is your first time to use the device after purchasing or after restoring factory defaults, set a login password of admin (system default user).
  • Page 41 User's Manual Figure 3-2 Time Table 3-1 Time parameters description Parameter Description Time Zone Select the time zone of the Device. Set system date and time manually or by synchronizing with NTP server time. ● Manual Settings: Select date and time from the calendar. Time ●...
  • Page 42 User's Manual Table 3-2 Description of password parameters Parameter Description Username The default username is admin. Password Set admin login password, and then confirm the password. Confirm Password Click to view the password requirement. Step 5 Configure password protection settings. You can use the linked email address or answer the security questions to reset admin password.
  • Page 43: Configuring Ip Address

    User's Manual 3.2 Configuring IP Address Configure the IP address and DNS server information of the Device according to network planning. Make sure that at least one Ethernet port has been connected to the network before you set IP address. Procedure Step 1 On the page that prompts you initialization succeeded, click Quick Config.
  • Page 44: Login

    User's Manual Table 3-4 NIC parameters description Parameter Description The maximum network transmission speed that the current NIC Rate (Mbps) supports. Type Select IPv4 or IPv6. ● DHCP: When there is a DHCP server on the network, you can enable DHCP.
  • Page 45: Logging In To The Pc Client

    User's Manual After initializing the Device, you have logged in by default. Now you can configure system settings and operate. 3.3.1 Logging in to the PC Client Log in to the PC client for system configuration and operation. Procedure Step 1 Download the PC client.
  • Page 46: Logging In To Local Interface

    User's Manual 3.3.2 Logging in to Local Interface Prerequisites Ensure that the Device is connected with display, mouse and keyboard. Procedure Step 1 Turn on the Device. Step 2 Enter username and password. ● The default administrator username is admin. The password of the admin account is what you set during initialization.
  • Page 47: Home Page

    User's Manual Figure 3-8 Login (web) 3.4 Home Page Figure 3-9 Home page...
  • Page 48: Configuring Remote Devices

    User's Manual When you log in to the local interface, you can click to control the screens. Table 3-5 Home page description Name Description Home page Go back to the home page. Displays enabled application icon. Point to the app and then click to close the app.
  • Page 49 User's Manual Figure 3-10 Camera Under the Quick Add tab, click Start Search. Step 4 The search results are displayed. To filter the search results, you can click Step 5 Select an uninitialized remote device and then click Initialize. Click next to Initialization Status and then select Uninitialized to show uninitialized remote devices only.
  • Page 50: Adding Remote Devices

    User's Manual ● Click Add: The system completes initializing the remote device and then adds the remote device to the Device. ● Click OK: The system completes initializing remote device without adding the remote device to the Device. 3.5.2 Adding Remote Devices You can add remote devices to the Device in any of the following ways.
  • Page 51 User's Manual Figure 3-11 Search results Table 3-7 Description of search results Parameter Description Click Start Search to search for remote devices again. Click Stop Search Start Search to stop search. Click Connection Password to set the username and password for the remote devices.
  • Page 52: Manual Add

    User's Manual Select one or more remote devices, and then click OK. Step 2 ● During the adding process, click Cancel to cancel adding the remote device. ● If a remote device is in exception due to network disconnection or other reasons, it can still be added.
  • Page 53 User's Manual Figure 3-13 Remote device setting Table 3-8 Parameters of adding remote device Parameters Description Select a channel number for the remote device on IVSS. Channel No. If you select Auto Allocation, IVSS will provide a channel number automatically. Select the connection protocol of the remote device.
  • Page 54: Rtsp

    User's Manual Parameters Description Enter the HTTP port number. The default port number is 80. The value ranges from 1 through 65535. HTTPS Port When Manufacturer is Onvifs, you need to configure this parameter. Username Enter the username and password of the remote device. Password Enter the TCP port number of the remote device.
  • Page 55: Batch Add

    User's Manual Figure 3-14 Camera Step 4 Under the RTSP tab, enter the RTSP address. The RTSP address format is rtsp://<username>:<password>@<IP address >:<port>/cam/realmonitor?channel=1&subtype=0. For example, rtsp://admin:admin@192.168.20.25:554/cam/realmonitor?channel=1&subtype=0. ● Username: Username of the remote device. ● Password: Password of the remote device. ●...
  • Page 56 User's Manual Figure 3-16 Camera Step 4 Under the Batch Import tab, click Download Template to download the template. ● On the PC client, click at the top of the client, select Download to view the storage path. ● On the local interface, you can select the file storage path. ●...
  • Page 57 User's Manual If the information on remote devices is not filled in completely, you can improve it after importing the template. Step 7 Select one or more remote devices, and then click OK. ● During the adding process, click Cancel to cancel adding the remote device. ●...
  • Page 58: Ai Operations

    User's Manual 4 AI Operations The device supports AI by camera. When configuring an intelligent detection, if you select AI by camera, the intelligent analysis job is completed on the camera, and the device just receives and processes the results. This chapter introduces how to configure the AI functions respectively.
  • Page 59: Face Detection

    User's Manual AI Event AI by Camera AI by Recorder Call Alarm Smoking Alarm ANPR Click after the video detection device to go the Web page of the corresponding device quickly. 4.2 Face Detection An alarm is triggered when human faces are detected within the detection zone. 4.2.1 Enabling the Smart Plan To use AI by Camera, you need to enable the smart plan first.
  • Page 60: Live View Of Face Detection

    User's Manual 1. Click AI by Camera, and then click to enable face detection. 2. Click to enable face enhancement, which enables the system to preferably guarantee clear faces with low stream. 3. Click to set the minimum size or maximum size of the face detection zone.
  • Page 61: Live View

    User's Manual select Male, Female or Unknown for Gender. Figure 4-2 Attribute display Step 6 Click Save. 4.2.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. ● The video window displays the target boxes of currently detected faces. ●...
  • Page 62 User's Manual Figure 4-3 Face records Table 4-2 Management of face records Icon Operation Download the face snapshot and related video. When operating on the local interface, you need to insert a USB storage device into the Device.
  • Page 63: Face Search

    User's Manual Icon Operation Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot. 4.2.4 Face Search Search for face detection information, including face detection image, record and features. 4.2.4.1 Searching by Attributes Procedure Step 1 Log in to the PC client.
  • Page 64: Face Comparison

    User's Manual Export more than one record. Support specifying file formats. 1. Select one or more face records. To export all records, select the checkbox next to Select All. 2. Click Export, and then select the format of the information that you want to export. You can export the images, videos and an excel that contains attributes information.
  • Page 65: Live View Of Face Comparison

    User's Manual You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule. For details, see "6.7.3 Schedule". Step 6 Click Select next to Event Linkage to set alarm actions. For details, see "6.4.1 Alarm Actions".
  • Page 66 User's Manual Figure 4-4 Attribute display Step 5 Click Save. and then select the Human tab. Step 6 Click Step 7 Configure AI attributes settings. With AI Attributes Settings enabled by default. You can configure the style of the features panel and the attributes that you want to display.
  • Page 67: Live View

    User's Manual Figure 4-5 Attribute display Step 8 Click Save. 4.3.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. ● The video window displays the target boxes of currently detected faces. ●...
  • Page 68: Face Search

    User's Manual 4.3.4 Face Search You can search face records by attributes or by image, and then export the search results. 4.3.4.1 Searching by Attributes Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the Live page, or select AI Search on the home page.
  • Page 69: People Counting

    User's Manual 4.4 People Counting This Device can count the people flow, in-area people number, and queuing number in the detection zone. ● The people counting function is only available with AI by Camera. Make sure that the camera has been configured with people counting rules.
  • Page 70: Configuring In Area No

    User's Manual The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule. For details, see "6.7.3 Schedule". Step 8 Click Select next to Event Linkage to set alarm actions. For details, see "6.4.1 Alarm Actions".
  • Page 71: Configuring Queuing Detection

    User's Manual Table 4-7 Parameter description of in-area people counting Parameter Description 1. Click to enable the alarm. 2. Set people number threshold. ● If you select≥ Threshold and then enter a number, an alarm is triggered when the detected number is larger or equal to the number that you entered.
  • Page 72: Live View

    User's Manual ● Click to set the whole image as the detection area. Step 6 Set parameters. Table 4-8 Parameter description of queuing detection Parameter Description 1. Click to enable the alarm. 2. Set people number threshold. ● If you select≥ Threshold and then enter a number, an alarm is triggered when the detected number is larger or equal to the number that you entered.
  • Page 73: Viewing Ai Report

    User's Manual 4.4.6 Viewing AI Report Procedure Step 1 Log in to the PC client. Step 2 On the home page, select AI Report > AI Report > People Counting. Step 3 Select a device. You can only select an AI fisheye camera or people counting camera. Step 4 Select an event type from People Counting, Area People Counting and Queue People Counting.
  • Page 74: Configuring Video Metadata

    User's Manual 4.5.2 Configuring Video Metadata After enabling video metadata, the Device links the current remote device to record video when an alarm is triggered. You cannot set other linkage actions for video metadata when AI by Camera is used. Procedure Step 1 Log in to the PC client.
  • Page 75: Live View

    User's Manual ● You can select up to 4 attributes. ● 4 attributes have been selected by default. To select other attributes, cancel the selected attributes, and then select the ones you need. 3) On the AI Attributes section, select the attribute groups for video metadata. Each attribute is broken down into more specific groups.
  • Page 76: Ai Search

    User's Manual Table 4-9 Management of detection results Icon Operation Download the snapshot and related video. When operating on the local interface, you need to insert a USB storage device into the Device. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 77 User's Manual Figure 4-7 Search by human attributes Click Search. Step 6 ● If face is captured, the human and face snapshots are displayed. ● If no face is captured, the human snapshot and human attributes are displayed. Related Operations Point to a record, and then the following icons are displayed.
  • Page 78: Vehicle Search

    User's Manual Icon Operation Export the snapshot, video and video player. To export in batches, select multiple records, and then click Export to export snapshots, videos or excel. After you set alarm linkage snapshot, the system exports detected images and panoramic images at the time of snapshot. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 79 User's Manual Figure 4-8 Search by vehicle attributes Step 6 Click Search. If license plate is detected, both the scene of the vehicle and the license plate will be displayed. Related Operations Point to a record, and then the following icons are displayed. Table 4-11 Management of search results Icon Operation...
  • Page 80: Non-Motor Vehicle Search

    User's Manual Icon Operation Export the snapshot, video and video player. To export in batches, select multiple records, and then click Export to export snapshots, videos or excel. After you set alarm linkage snapshot, the system exports detected images and panoramic images at the time of snapshot. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 81: Enabling The Smart Plan

    User's Manual 4.6.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first. For details, see "4.2.1 Enabling the Smart Plan". 4.6.2 Configuring IVS 4.6.2.1 Global Configuration Configure global rules of IVS. Procedure Step 1 Log in to the PC client.
  • Page 82 User's Manual Functions Description Scene When the target enters, leaves, or appears in the detection area, an Intrusion alarm is triggered, and the system performs configured alarm linkages. When an object is abandoned in Scenes with sparse targets and without the detection area over the obvious and frequent light change.
  • Page 83: Live View Of Ivs

    User's Manual You can also click Event from the configuration list on the home page. Select a remote device on the device tree, and then select Smart Plan > IVS. Step 3 Step 4 Set tripwire rules. 1. Select AI By Camera > Rule Config. 2.
  • Page 84: Setting Attribute Display

    User's Manual 4.6.3.1 Setting Attribute Display Configure the display rule of IVS detection results. Prerequisites Before using this function, make sure that view has been created. Procedure Step 1 Log in to the PC client. Step 2 Under the Live tab, open a view window. Step 3 Click and then select the Human, and Motor Vehicle tab.
  • Page 85: Live View

    User's Manual Figure 4-10 Motor vehicle Step 4 Configure AI attributes settings. With AI Attributes Settings enabled by default, when the system detects a target, a features panel appears on the live video. You can configure the style of the features panel and the attributes that you want to display.
  • Page 86: Ivs Search

    User's Manual ● You can view the detection statistics on the upper-righter corner of the Live page. Figure 4-11 Detection statistics ● Features panels are displayed on the right side of the video image. Point to the features panel, and the icons are displayed. ◇...
  • Page 87: Vehicle Recognition

    User's Manual 4.7 Vehicle Recognition An alarm is triggered when the detected vehicle meets detection rule. The Device supports only ANPR through AI by Camera. Make sure that the vehicle recognition parameters of camera are configured. For details, see the user's manual of the camera. 4.7.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first.
  • Page 88: Setting Attribute Display

    User's Manual 4.7.3.1 Setting Attribute Display Configure the display rule of vehicle recognition results. Prerequisites Before using this function, make sure that view has been created. Procedure Step 1 Log in to the PC client. Step 2 Under the Live tab, open a view window. Step 3 Click and then select the Motor Vehicle tab.
  • Page 89: Live View

    User's Manual Bus, Heavy Truck, Van and more for Vehicle Type. Click Save. Step 5 4.7.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. The video image of the view is displayed. ●...
  • Page 90: Rule Configuration

    User's Manual Select a remote device on the device tree, and then select Smart Plan > IVS. Step 3 Select AI By Camera > Global Config. Step 4 Step 5 Draw 1 horizontal line and 3 vertical lines. ● Click , draw vertical lines, and then enter their geographical distance values. ●...
  • Page 91: Live View Of Crowd Distribution

    User's Manual 4.8.3 Live View of Crowd Distribution Log in to the PC client, and then under the Live tab, open a view window. The video image of the view is displayed. The video shows people numbers and distribution status in the detection zones in real time. The frame around the detection zone flashes red when there is an alarm in the zone.
  • Page 92: Configuring Call Alarm

    User's Manual 4.9.2 Configuring Call Alarm Configure call alarm rules. The call alarm is only available with thermal cameras. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event. You can also click Event from the configuration list on the home page. Step 3 On the device tree, select the visible light channel of a thermal camera.
  • Page 93: Smoking Alarm

    User's Manual 2. Select Call Detection as detection type. 3. Select a stream type. 4. Set the search period. 5. Click Search. ● Images 1. Under the Picture tab, select Thermal as snapshot type. 2. Select Call Detection as detection type. 3.
  • Page 94: Live View Of Smoking Alarm

    User's Manual You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule. For details, see "6.7.3 Schedule". Step 8 Click Select next to Event Linkage to set alarm actions. For details, see "6.4.1 Alarm Actions".
  • Page 95: General Operations

    User's Manual 5 General Operations This chapter introduces general operations such as live view, playback, alarm, and more. 5.1 Live and Monitor Log in to the PC client, and then under the Live tab, you can view the live videos. Point to the left and right edges of the video windows, and then click to hide or display the left and right columns.
  • Page 96: View Management

    User's Manual Description ● : Take a snapshot of live view. ● : Display the live view in full screen. ● : Edit the view window and save as a new view. ● : Start tour. You need to enable the function first in System > General > System Settings.
  • Page 97: View Group

    User's Manual 5.1.1.1 View Group A view group is a group of views. The view group helps you to categorize, search for and manage views quickly. Under View Group created by default, you can create view groups. ● You can create up to 100 view groups. ●...
  • Page 98: View

    User's Manual Table 5-2 View group management Operation Description Right-click a view group and select Rename. Set view group name Rename and click any blank space. Please be advised that once you delete a view group, all views under the view group will be deleted at the same time. Delete View group ●...
  • Page 99: Editing A View

    User's Manual ● The Device automatically creates the view grids according to the number of the selected remote devices. Device supports maximum 36 view windows. ● The view window fills in the whole layout grid by default. Right-click to select Original Scale >...
  • Page 100: Opening A View

    User's Manual When adjusting the positions of video windows, drag the video window to the layout grid whose background color is green. You cannot drag the video window to the grid of red background color. ● Change the window size: Drag the edges of the video window to adjust its size, and then click OK.
  • Page 101: View Window

    User's Manual Operation Description ● When there are more than 9 video windows, click one video window to display it at the center of all windows in the zoom in mode. Click any other blank position to restore the original size. Zoom in video window ●...
  • Page 102: Taskbar

    User's Manual 5.1.1.3.1 Taskbar Log in to the PC client, under the Live tab, open a view and then point to a video window. The taskbar is displayed. Figure 5-6 View window Table 5-5 Window taskbar Icon Description Zoom. Click the icon, and then select a zone on the video window to zoom in.
  • Page 103: Shortcut Menu

    User's Manual Icon Description Manual snapshot. The snapshot storage path varies on different interfaces. ● Local interface. ◇ When a USB storage device is connected, snapshots are saved to the USB storage device. ◇ Otherwise, the snapshots are saved on the Device. You can search for and export videos under the Search tab.
  • Page 104: Digital Zoom

    User's Manual Parameter Description Set an audio output mode from Audio 1, Audio 2, Mixing and Close. Audio Set installation methods and display modes of fisheye cameras. Fisheye Dewarp This function is only available on fisheye camera. Crowd Distribution Enable the crowd distribution map to view and monitor crowd density. Intelligently track targets.
  • Page 105: Smart Tracking

    User's Manual Installation Method Display Mode Description mount 2 corrected 180° images that together constitute a 360° panoramic image. Original image + 3 section images. Original image + 4 section images. Corrected 360° panoramic image + 6 section 1P+6 images. Original image + 8 section images.
  • Page 106: Talk

    User's Manual Figure 5-8 Thermal 5.1.1.3.7 Talk The Talk function enables voice interaction between the Device and remote devices, improving the efficiency in handling emergency events. Procedure Step 1 Log in to the PC client. Step 2 Open a view under the Live client. Step 3 Click at the upper-right corner of the view window to enable the Talk function.
  • Page 107 User's Manual Figure 5-9 Device tree Table 5-8 Device tree description Operation Description Enter keywords in Search for devices Support fuzzy search. Click and then select All, Online, Offline, Device mismatch and Incorrect Username or Password to filter the remote devices. Filter devices Device mismatch refers to the situation where the remote device is not compatible with IVSS due to inconsistent languages.
  • Page 108: Ptz

    User's Manual 5.1.3 PTZ Log in to the PC client. Use the PTZ panel at the lower-left corner of the Live tab to perform PTZ control so that the PTZ camera can rotate accordingly to monitor all directions. The PTZ functions might vary depending on the device models. Figure 5-10 PTZ Table 5-9 PTZ control panel Icons...
  • Page 109: Ptz Menu Settings

    User's Manual Icons Description Click to use PTZ functions. ● : preset. ● : tour group. ● : pattern. ● : scan. 5.1.3.1 PTZ Menu Settings Device displays PTZ main menu on the view window. The PTZ main menu enables you to perform camera settings, PTZ settings, system management, and more.
  • Page 110: Configuring Ptz Functions

    User's Manual ● Click to select options . ● Click to set values. ● Click to confirm. Step 5 Click to exit PTZ menu mode. 5.1.3.2 Configuring PTZ Functions Control PTZ device to implement corresponding operations. The PTZ functions might vary depending on the device models. 5.1.3.2.1 Setting a Preset A preset is the saved information of a specific position, angle, and focal length of the PTZ camera.
  • Page 111: Setting A Tour Group

    User's Manual 5.1.3.2.2 Setting a Tour Group A tour group is a sequential set of presets. When a tour group is used, the PTZ camera automatically rotates to the presets one by one at the predefined interval. Procedure Step 1 Log in to the PC client.
  • Page 112: Setting A Scan

    User's Manual Related Operations ● Edit a pattern Select the pattern, and then click . Click Start Record and record a new pattern, and then click Stop Record. ● Select a pattern and then click to delete it. ● Click to refresh the list of patterns.
  • Page 113: Recorded Files

    User's Manual 5.2 Recorded Files You can search for, play back, export the recorded videos or images, and more. 5.2.1 Playing back Recorded Videos Search for and play back recorded videos according to remote device, recording type, and recording time. Procedure Step 1 Log in to the PC client.
  • Page 114 User's Manual ◇ You can click to divide a video into multiple splices that are equally long. ◇ Select Only locked videos on the upper-right corner of the File Playback tab to display locked videos only. ◇ Click on the upper-right corner of the File Playback tab to switch the display mode of the video files.
  • Page 115 User's Manual Signal Words Description When you play back several videos at the same time, click the icon to switch to time synchronization mode. All other windows play the video of the same time of current window. Click to cancel time synchronization. When you click , the system enables operation synchronization as well.
  • Page 116: Clipping A Video

    User's Manual Signal Words Description Time bar. Displays recording type and recording period. ● There are 2 recording file bars on the time bar. The top bar displays recording time of selected window. The bottom bar displays recording time of all selected remote devices. ●...
  • Page 117: Video Tag

    User's Manual Figure 5-15 Clip a video Step 5 Drag the left and right edges of the blue frame to select the start time and end time of clipping. Step 6 Click OK. Step 7 Select a file format, and then click Browse to select the storage path. Figure 5-16 Save the video Step 8 Click OK.
  • Page 118: Searching For Snapshots

    User's Manual 4. Click Search. ● Click to view the corresponding video. ● Click to edit the tag. ● Click to delete the tag. ● Select multiple tags and click Delete to delete the tags in batches. ● Click Refresh to refresh the tag list. Figure 5-17 Tags 5.2.4 Searching for Snapshots Search for and view snapshots according to remote device, image type, and snapshot time.
  • Page 119: Locking Files

    User's Manual Connect a USB device to the Device if you are operating on the local interface. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Search. Step 3 Search for videos or images. Step 4 Under the File Playback tab, select one or more files to back up.
  • Page 120: Alarm List

    User's Manual Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Aux > Watermark. Step 3 Click Browse to select a video file. Step 4 After the file is uploaded, click Parity. ● Normal: If the verification result is normal, the correct watermark is displayed. ●...
  • Page 121: Locking The Screen

    User's Manual ● The 1–3 monitors represent monitors connected to HDMI 1–HDMI 3. The main screen refers to the monitor connected to VGA or HDMI 1 port. The monitors connected to the HDMI 2 and HDMI 3 are the sub screens. The main screen and sub screen display different content and support different resolutions and refresh intervals.
  • Page 122: Buzzer

    User's Manual 5.7 Buzzer Log in to the PC client, and then click to view buzzer alarm messages. 5.8 Audio Management Upload and manage audio files that the Device plays when an alarm event occurs. ● You can upload .pcm, .mp3, .wav,and .aac files. ●...
  • Page 123: System Configuration

    User's Manual 6 System Configuration This chapter introduces system configurations such as managing remote device, user information, and HDD storage, and setting network, alarm events, security strategy, and system parameters. 6.1 Device Management Log in to the PC client, click on the upper-right corner and then click Camera, or click Camera from the configuration list on the home page.
  • Page 124: Changing Ip Address

    User's Manual status, and more. ● indicates that the remote device is offline. ● indicates that the remote device is online. ● indicates that the connection with the remote device failed. You can click to filter the remote devices. 6.1.2 Changing IP Address Modify IP address of the remote devices that are connected or not connected to the Device.
  • Page 125 User's Manual Figure 6-4 Search results Select one or more remote devices and then click Modify IP. Step 5 ● You can only modify the IP address of initialized devices. ● You can only modify the IP address of remote devices that are using the private or ONVIF protocol.
  • Page 126: Modifying Ip Of Connected Devices

    User's Manual ● Enter incremental value only when you want to change IP addresses of several devices at the same time. The system will allocate IP address one by one with the fourth part of the IP address increasing by the incremental value. ●...
  • Page 127: Configuring Remote Devices

    User's Manual You can also click Camera from the configuration list on the home page. Under the Camera tab, select one or remote devices, and then click Modify IP. Step 3 ● You can only modify the IP address of initialized devices. ●...
  • Page 128: Configuring Attributes Of Remote Devices

    User's Manual The pages might vary with remote devices. 6.1.3.1 Configuring Attributes of Remote Devices Set the name of remote devices, and view information on the remote devices. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the page and then click Camera.
  • Page 129 User's Manual You can also click Camera from the configuration list on the home page. Select a remote device from the device tree and then click the Video tab. Step 3 You can view information on the remote device, such as its model, MAC address, system version, and more.
  • Page 130: Configuring Osd

    User's Manual Parameter Description ● General: Use general coding strategy. Encoding ● Smart Codec: Enable this function to enhance performance of video Strategy compression and reduce required storage space. Set video resolution. The higher the resolution, the better the video quality. Resolution Different models of remote devices support different resolutions.
  • Page 131: Configuring Audio Parameters

    User's Manual Figure 6-8 OSD Step 4 Configure OSD information. ● Device name. 1. Click to enable OSD of device name. 2. Click 3. Enter the device name. 4. Drag the text box to the proper position. ● Time. 1. Click to enable OSD of time.
  • Page 132: Configuring Connection Information

    User's Manual You can also click Camera from the configuration list on the home page. Select a remote device from the device tree and then click the Audio tab. Step 3 Figure 6-9 Audio Step 4 Select an audio output type. ●...
  • Page 133: Exporting Remote Devices

    User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner of the page and then click Camera. You can also click Camera from the configuration list on the home page. Step 3 Select the root node in the device tree, and then click the Camera tab.
  • Page 134: Importing Remote Devices

    User's Manual Click Download Template to download the template. You can use the template to import remote devices. Figure 6-11 Export Step 4 (Optional) Click to enable export encryption. The function is enabled by default. The exported .backup file is encrypted and cannot be edited. If do not enable encryption, the system exports .csv file, which can be opened with Excel.
  • Page 135: Deleting Remote Devices

    User's Manual When the icon is red, for example , the remote device is offline. ● Right-click an offline remote device, and then select Connect to connect the remote device. ● Right-click an online remote device, and then select Disconnect to disconnect the remote device.
  • Page 136 User's Manual Make sure that at least one Ethernet port has connected to the network before you set IP address. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Network. Step 2 Click You can also click Network from the configuration list on the home page.
  • Page 137: Port Aggregation

    User's Manual Parameter Description Set NIC MTU value. The default setup is 1500 bytes. We recommend you check the MTU value of the gateway first and then set the MTU value of the Device equal to or smaller than the gateway value, which helps to reduce the packets slightly and enhance network transmission efficiency.
  • Page 138: Binding Nics

    User's Manual Aggregation mode Description The Device bonds several NICs and all NICs are working together to share the network load. The system allocates data to each NIC according to your allocation strategy. Once the system detects that one NIC breaks down, it stops sending data through this NIC, and transmits the data among the rest NICs.
  • Page 139 User's Manual The setting page varies depending on the aggregation mode you have selected. The following figure is the load balance setting page. Figure 6-14 Edit load balance 5) Set parameters. Table 6-6 NIC parameters description Parameters Description The maximum network transmission speed that the bonded NICs Rate (Mbps) support.
  • Page 140: Cancelling Binding Nic

    User's Manual Parameters Description Set NIC MTU value. The default setup is 1500 bytes. We recommend you check the MTU value of the gateway first and then set the MTU value of the Device equal to or smaller than the gateway value, which helps to reduce the packets slightly and enhance network transmission efficiency.
  • Page 141: Setting Port Number

    User's Manual Among the split NICs that were bonded together, the first NIC reserves the IP address configured during binding, and the rest NICs restore their default IP addresses. 6.2.1.3 Setting Port Number Set device port number. Procedure Step 1 Log in to the PC client.
  • Page 142: Network Application

    User's Manual Parameter Description Set according to the actual requirements. The default value is 80. The value ranges from 1 to 65535. HTTP If the value you set is not 80, remember to add the port number after the IP address when you are using a browser to log in to the device. Set according to the actual requirements.
  • Page 143: Auto Register

    User's Manual Figure 6-17 P2P Step 4 Click to enable the P2P function. Step 5 Click Apply. You can register the Device to the app for remote monitoring and management. For details, see the corresponding user's manual of the app. 6.2.2.2 Auto Register Register the Device on a designated proxy server so that client software can access the Device through the proxy server.
  • Page 144: Email

    User's Manual Figure 6-18 Register Step 4 Click to enable the function. Step 5 Set parameters. Table 6-8 Register Parameter Description Select an IP type from IPv4 and IPv6. Type IP Address Enter the IP address of the server that you are registering the Device to. Port Enter the port number of the server for registration.
  • Page 145 User's Manual Figure 6-19 Email Step 4 Click to enable the email function. Step 5 Set parameters. Table 6-9 Emails parameter description Parameter Description Select a server type from Custom, Gmail, Hotmail, and Yahoo Mail. Server Server Address Enter the address of the email server. Select an encryption type from NONE, SSL, and TLS.
  • Page 146: Alarm Center

    User's Manual 2) Click ● If the configuration is correct, the system pops up a message of success, and the receiver will receive the test mail. ● Otherwise, the system pops up a message of failure, and the receiver will not receive the test mail.
  • Page 147: Upnp

    User's Manual Parameter Description Auto Report Plan Select time cycle and specific time for uploading alarms. Step 6 Click Apply. 6.2.2.5 UPnP Through the UPnP (Universal Plug and Play) protocol, you can establish a mapping relationship between the LAN and the WAN. The WAN user can use the WAN IP address to directly access the Device on the LAN.
  • Page 148: Snmp

    User's Manual Parameter Description The LAN IP address of the router. LAN IP The IP address is automatically obtained after the mapping succeeds. The WAN IP address of router. WAN IP The IP address is automatically obtained after the mapping succeeds. The list is consistent with the UPnP port mapping list on the router.
  • Page 149 User's Manual Figure 6-22 SNMP Step 4 Click to enable the function. Step 5 Select SNMP version. For data security, we recommend V3. Set parameters. For Trap Address, enter the IP address of the computer installed with the Step 6 MG-SOFT MIB Browser.
  • Page 150: Multicast

    User's Manual Parameter Description Read or Write Community supported by the agent programs. Read Community, Write Community The name can only contain numbers, letters, underscores, and middle lines. The destination address of Trap information sent by the agent Trap Server program.
  • Page 151: Ddns

    User's Manual Step 4 Click to enable multicast. Step 5 Set parameters. Table 6-13 Multicast parameter Parameter Description IPV4/IPV6 Select an IP type and then enter the IP address Enter the IP address that IP Address/Server you want to use as the multicast IP. Address Port Set the multicast port.
  • Page 152 User's Manual Step 2 Click on the upper-right corner and then click Network. You can also click Network from the configuration list on the home page. Step 3 Select Network Application > DDNS. Figure 6-24 DDNS Step 4 Click to enable the DDNS function. After you enable the DDNS function, the third-party server might collect your device information.
  • Page 153: Routing Table

    User's Manual Click Apply. Step 6 After successful configuration, enter domain name in address bar of the browser or PC client, and press Enter key to access the IVSS. 6.2.2.9 Routing Table Configure the route table so that the system can automatically calculates the best path for data transmission.
  • Page 154: Storage Resource

    User's Manual The system supports pre-check and routine inspection, and you can obtain real-time storage status of the Device and avoid data loss. ● Pre-check: During device operation, the system automatically detects disk status in case of change (restart, insert and pull the disk). ●...
  • Page 155: Formatting

    User's Manual Figure 6-26 S.M.A.R.T 6.3.1.1.3 Formatting ● Please be advised that formatting will clear all data on the disk. ● The hot standby disk cannot be formatted. Log in to the PC client. Click on the upper-right corner and then select Storage > Storage Resource >...
  • Page 156: Creating Raid

    User's Manual ● The Device supports RAID0, RAID1, RAID5, RAID6, RAID10, RAID50 and RAID60. See "Appendix 3 RAID" for detailed information. ● We recommend you use enterprise HDD when you are creating RAID, and use surveillance HDD for single-HDD mode. 6.3.1.2.1 Creating RAID Background Information RAID has different levels such as RAID5, RAID6 and more.
  • Page 157 User's Manual Table 6-15 Manual creation parameters description Parameter Description Select the storage device where the disks are located and select the disks you want to add to the RAID. Storage Device Different levels of RAID might need different number of disks. RAID Select the level of RAID that you want to create.
  • Page 158: Creating A Hot Standby Disk

    User's Manual Parameter Description Set RAID resources allocation mode. The default mode is self-adaptive. ● Self-adaptive: The system automatically adjusts RAID synchronization speed according to current business load. When there is no external business, the synchronization speed is high. When there is external business, the synchronization speed is low. Working mode ●...
  • Page 159 User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page. Step 3 Select Storage Resource > RAID > Hot Standby . Step 4 Click Add.
  • Page 160: Network Disk

    User's Manual Figure 6-31 Hot standby 6.3.1.3 Network Disk Network disk is a network-based online storage service that stores device information on the network hard disk through the iSCSI protocol. 6.3.1.3.1 iSCSI Application Log in to the PC client. Click on the upper-right corner and then select Storage >...
  • Page 161 User's Manual You can also click Storage from the configuration list on the home page. Select Storage Resource > Network Disk > iSCSI Management. Step 3 Step 4 Click Add. Figure 6-32 Add iSCSI Step 5 Set parameters. Table 6-18 Network disk parameters Parameter Description IP Address...
  • Page 162: Storage Settings

    User's Manual ● Click to delete a disk; click Refresh to refresh the disk list. ● On the Disk Group Settings page, you can configure network disk groups. 6.3.2 Storage Settings 6.3.2.1 Configuring Disk Groups The installed disks and created RAID groups are allocated to group 1 by default. You can create more disk groups and allocate disks and RAID groups to other groups.
  • Page 163: Recording Control

    User's Manual or RAID groups, and then click OK. ● Move disks or RAID groups to another disk group. ◇ One by one: Click Move to under Operation, select a disk group, and then click OK. ◇ In bathes: Select one or more disks or RAID groups and then click Move to next to Add, select a disk group, and then click OK.
  • Page 164: Configuring Recording Mode

    User's Manual 6.3.2.2.1 Configuring Recording Mode Configure recording modes for channels. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page. Step 3 Select Storage >...
  • Page 165 User's Manual Figure 6-36 Set a recording schedule Step 5 Select General, Record Events, or both as the recording type. ● General: Click the box next to General to select a schedule or click Add Schedule to add a new schedule. The Device records in the configured schedule. ●...
  • Page 166: Basic Storage Settings

    User's Manual Parameter Description The number of images for each manual capture action. You can also Manual Snapshot configure the interval between manual snapshots. Event Snap Configure the interval between event snapshots. Copy to Copy the current settings to other channels. Step 7 Click Apply.
  • Page 167: Setting Image Storage Strategy

    User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page. Step 3 Select Storage > Basic. Step 4 Set automatic file deletion.
  • Page 168: Video Retrieval

    User's Manual recovers, the Device can not automatically download the recording during the disconnection, but you can manually create a download task. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Storage. You can also click Storage from the configuration list on the home page.
  • Page 169 User's Manual Figure 6-41 Add task Table 6-20 Parameter description Parameter Description Task Type Supports Scheduled Task and Single Task. Channel No. Enter the channel No. of the device. Start Time Set the time period. End Time IP Address IP adress of remote device. Port Port of remote device, 37777 by default.
  • Page 170: Event Management

    User's Manual 6.4 Event Management Log in to the PC client. Click on the upper-right corner and then click Event. On the page, configure alarm events for the Device and remote devices. ● Select the root node on the device tree to set alarm events for the Device. ●...
  • Page 171 User's Manual Figure 6-43 Event linkage Table 6-21 Actions description Action Description Preparation The system links the selected remote device to record A remote device, such as IPC, Record videos when a linkage event has been added. occurs. The system activates a buzzer Buzzer alarm when a linkage event occurs.
  • Page 172: Record

    User's Manual Action Description Preparation corresponding device to The remote device has been generate alarms. added, and the remote device is connected with an alarm Remote Device Alarm Output output device. See "3.5.2 Adding Remote Devices" for detailed information. When a linkage event occurs, the system triggers the See "3.5.2 Adding Remote Access Control...
  • Page 173: Buzzer

    User's Manual 6.4.1.2 Buzzer The system activates a buzzer alarm when a linkage event occurs. On the alarm configuration page, click Select next to Event Linkage, select Buzzer, and then click Apply. Figure 6-45 Buzzer 6.4.1.3 Log Enable the log function. The system notes down the alarm information in the log when a linkage event occurs.
  • Page 174: Picture Storage

    User's Manual Figure 6-46 Preset Step 2 Select a PTZ device, and then enter the preset number. Step 3 (Optional) Click to link multiple PTZ devices to turn to designated presets. Click Apply. Step 4 6.4.1.6 Picture Storage Set the picture storage linkage. When a linkage event occurs, a snapshot is taken and saved on the Device.
  • Page 175: Access Control

    User's Manual Make sure that the remote device has been added, and the remote device is connected with alarm output device. See "3.5.2 Adding Remote Devices" for detailed information. Procedure Step 1 On the alarm configuration page, click Select next to Event Linkage, and then select Remote Device Alarm Output.
  • Page 176: Smart Tracking

    User's Manual Step 2 Select the audio file and then set the play mode. ● Play Times: After the event ends, the system continues to play the audio file according to the play times. ● Duration: After the event ends, the system continues to play the audio file according to the duration.
  • Page 177: Local Device

    User's Manual 6.4.2 Local Device You can set alarms for system errors, system offline, configure smart plans, and more. 6.4.2.1 One-click Disarming Disarm alarm linkage actions as needed to avoid interference caused by alarms. Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event.
  • Page 178 User's Manual Table 6-22 Abnormal events Name Description The system triggers an alarm when there is no disk. It is enabled by No Disk default. Disk health exception The system triggers an alarm when SSD health exception occurs. The system triggers an alarm when disk error occurs. It is enabled by Storage error default.
  • Page 179: Offline Alarm

    User's Manual Select Exception > No Disk. Step 4 Figure 6-51 No disk Step 5 Click to enable the alarm against no disk. Click Select next to Event Linkage to set alarm actions. See "6.4.1 Alarm Actions" for Step 6 detailed information.
  • Page 180: Viewing Smart Plans

    User's Manual Figure 6-52 Offline alarm Step 5 Click to enable the offline alarm. Step 6 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule.
  • Page 181: Remote Device

    User's Manual indicates that AI by Camera is enabled. Figure 6-53 Smart plan 6.4.3 Remote Device Set alarm actions for remote devices, including video detection alarm, offline alarm and smart detection alarm. The parameters might be different depending on the model you purchased. 6.4.3.1 Video Detection The system monitors and analyzes the video image.
  • Page 182 User's Manual Step 3 Select a remote device from the device tree. Step 4 Select Video Detection > Motion Detection. Figure 6-54 Motion detection Step 5 Click to enable video motion detection. Step 6 Configure the anti-dither period. The system only records one alarm event during the anti- dither period.
  • Page 183: Tampering

    User's Manual Click Schedule to select a schedule from the drop-down list. Step 8 The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list. You can also add a new schedule.
  • Page 184: Ipc External Alarm

    User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Event. You can also click Event from the configuration list on the home page. Step 3 Select a remote device from the device tree. Select Offline >...
  • Page 185 User's Manual Step 3 Select a remote device from the device tree. Step 4 Select External Alarm > Alarm-in Port1. Figure 6-57 Alarm-in port 1 Step 5 Click to enable the alarm. Step 6 Set parameters. Table 6-24 External alarm parameters description Parameter Description Name...
  • Page 186: Thermal Alarm

    User's Manual 6.4.3.4 Thermal Alarm ● Alarm types might vary depending on the models of thermal cameras. ● Make sure that thermal detections such as heat detection and temperature detection have been configured on the thermal camera. Support the following thermal camera alarms. Table 6-25 Thermal alarms Function Description...
  • Page 187: Security Strategy

    User's Manual 6.5 Security Strategy 6.5.1 Security Status Background Information Security scanning helps get a whole picture of the device security status. ● User and service detection: Detects whether the current login authentication, user status, and configuration security conform to recommended settings. ●...
  • Page 188: System Service

    User's Manual Figure 6-59 Details 6.5.2 System Service 6.5.2.1 Basic Services Enable basic system services for third-party access. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Security > System Service > Basic Services.
  • Page 189 User's Manual Figure 6-60 Basic services Step 3 Enable or disable system services. Table 6-26 System services Name Description After enabling this function, you can access the Device through SSH protocol to carry out system debugging and IP configuration. This function is disabled by default.
  • Page 190: Enabling Https

    User's Manual Name Description After this function is enabled, a third-party platform can connect the Device through CGI protocol. For data security, we recommend you disable this function when it is not needed. After this function is enabled, other devices can connect the Device through ONVIF protocol.
  • Page 191: Attack Defense

    User's Manual Figure 6-61 HTTPS Step 4 (Optional) Click to enable Compatible with TLSv1.1 and earlier versions. TLS (Transport Layer Security) provides privacy and data integrity between two communications application programs. Step 5 Click Apply. You can use HTTPS to access the web interface. Open the browser, enter https://IP address:port in the address bar, and then press Enter, and then you can log in to the web interface.
  • Page 192: Account Lockout

    User's Manual Allowlist and blocklist cannot be used at the same time. Step 4 If you select Allowlist or Blocklist, click Add to add an allowlist or blocklist. You can allow or prohibit a specific IP address, IP addresses on a specific network segment, or a specific MAC address to access the Device.
  • Page 193: Time Synchronization Permission

    User's Manual Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Security > Attack Defense > Anti-Dos Attack. Figure 6-64 Account lockout to enable SYN Flood Attack Defense or ICMP Flood Attack Defense. Step 3 Click Step 4...
  • Page 194: Ca Certificate

    User's Manual You can allow or prohibit a specific IP address, IP addresses on a specific network segment, or a specific MAC address to synchronize time with the Device. Step 6 Add IP addresses to the allowlist or blocklist . 1) Click Add.
  • Page 195 User's Manual Figure 6-67 Create certificate 2. Enter the information. Figure 6-68 Certificate information 3. Click Create and install certificate. ● Apply for and import a certificate. 1. Select Apply for CA Certificate and Import (Recommended) and then click Next. 2.
  • Page 196: Installing The Trusted Certificate

    User's Manual request file. Submit the file to a CA institute to apply for a signed certificate. 4. Click Browse to select the certificate. Figure 6-69 Import the certificate 5. Click Import and Install. ● Import an existing certificate. 1. Select Install Existing Certificate and then click Next. 2.
  • Page 197: Video Encryption

    User's Manual Click Install Trusted Certificate. Step 3 Click Browse to select a trusted certificate. Step 4 Click OK. Step 5 Related Operations You can edit and download the installed certificate. ● Edit Click Enter Edit Mode, enter a custom name for the certificate, and then click Save Config. ●...
  • Page 198: Security Warning

    User's Manual Encryption Method Description Click to enable RTSP encryption using the TLS tunnel, and then select a device certificate. We recommend you enable this function to ensure data security. RTSP over TLS You can click Certificate Management to install a device certificate. Click Apply.
  • Page 199 User's Manual Step 2 Click on the upper-right corner and then click Account. You can also click Account from the configuration list on the home page. Step 3 Select the root node at the upper-left corner and then click at the lower-left corner. Step 4 Enter the login password of the current account, and then click OK.
  • Page 200: Adding Device Users

    User's Manual Figure 6-74 Permission 2) Select the permissions for the user group. Click Apply. Step 7 Related Operations Select a user group, click , enter the login password, and then click OK to delete the user group. ● Before you delete a user group, you need to delete all users in the current group first. ●...
  • Page 201 User's Manual Enter the login password of the current account, and then click OK. Step 4 Figure 6-75 User attributes Step 5 Configure the parameters. Table 6-29 User attributes parameters Parameter Description Set the username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
  • Page 202: Password Maintenance

    User's Manual ◇ Before deleting an online user, you need to block the user first. For details, see "7.4.1 Online User". ◇ The deleted user cannot be restored. 6.6.3 Password Maintenance Maintain and manage the login passwords of users. 6.6.3.1 Changing Password Change the login password of the user.
  • Page 203: Resetting Password On Local Interface

    User's Manual use the local interface to set security questions. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Account. Step 2 Click You can also click Account from the configuration list on the home page. Step 3 Select the root node at the upper-left corner.
  • Page 204: Resetting Password On The Web Interface Or Pc Client

    User's Manual 6.6.3.2.3 Resetting Password on the Web Interface or PC Client Prerequisites Make sure that you have configured the linked email address. Procedure Step 1 Enter the IP address of the Device in the address bar of the browser or PC client, and then press Enter.
  • Page 205: System Settings

    User's Manual Figure 6-76 ONVIF user group Step 4 Enter the login password of current user, and then click OK. Step 5 Set parameters. Table 6-32 User attributes parameters Parameter Description Set the username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
  • Page 206 User's Manual Step 3 Configure the parameters. Figure 6-77 Basic system settings Table 6-33 System parameters description Parameter Description Language Set system language. Select a video standard. ● PAL is mainly used in China, Middle East and Europe. ● NTSC is mainly used in Japan, United States, Canada and Mexico. Video Standard As a technical standard of processing video and audio signals, PAL and NTSC mainly differ in the encoding and decoding modes and...
  • Page 207: System Time

    User's Manual Click Apply. Step 4 6.7.2 System Time Set system time, and enable the NTP function according to your need. After you enable the NTP function, the Device can automatically synchronize time with the NTP server. Procedure Step 1 Log in to the PC client.
  • Page 208: Schedule

    User's Manual Table 6-34 Time parameters description Parameters Description Set system date and time. You can set the time manually or enable NTP so that the Device can automatically synchronize time with the NTP server. ● Manual Settings: Set the actual date and time in either of the following ways.
  • Page 209: Cluster Service

    User's Manual Figure 6-79 Schedule Step 3 Add a schedule. 1) Click Create. 2) Click to edit the schedule name. Step 4 Set the validity periods. ● Always: The schedule is always effective. ● Custom: Customize validity periods for the schedule. Click the time bar and then drag the blue strip to set a period.
  • Page 210: Creating A Cluster

    User's Manual In the N+M cluster system, there is a management server, the DCS (Dispatching Console) server, which is responsible for timely and correct scheduling management of the main and sub devices. When you create a cluster, the current IVSS is used as the first sub device and the DCS server by default.
  • Page 211 User's Manual Figure 6-81 Cluster setting Step 5 Add a main device. 1) Click Add under Main Device. Figure 6-82 Add a main device 2) Set parameters. Table 6-35 Parameters description Parameter Description Device Name Enter a name for the main device. IP Address Enter the IP address of the main device.
  • Page 212 User's Manual Parameter Description Port Enter the port number. It is 37777 by default. Username Enter the login username and password of the Device. Password Select the checkbox to enable cluster, and then enter the cluster IP address, subnet mask and gateway. Cluster IP is a virtual IP that is used to access and manage the main Enable Cluster devices and sub devices in the cluster.
  • Page 213: Record Transfer

    User's Manual Click Next. Step 7 Step 8 Set the arbitrage IP. When there are only 2 devices in the cluster, a third-party device is required to determine whether the main device is faulty, so arbitration IP must be set for the cluster to perform a normal replacement operation.
  • Page 214: Viewing Cluster Log

    User's Manual Figure 6-85 Add a transfer task Step 4 Configure the parameters. Table 6-37 Parameters of transfer task Parameters Description Main Device Enter the IP address of the main device. Sub Device Enter the IP address of the sub device. Select the channel whose recorded files are to be transferred.
  • Page 215: Network Storage

    User's Manual 6.9 Network Storage Network storage is a storage technology based on IP network. After you create a storage pool, you can share your storage directory with other devices through iSCSI. Figure 6-88 Configuring network storage 6.9.1 Creating Storage Pool Background Information Storage pool is a logical storage space after the storage device is virtualized.
  • Page 216: Managing Share Account

    User's Manual By default, in the Device Name column, "sdx" (x ranges from a to z) is a disk, such as /dev/sda, and "mdx" (x is number) is a RAID group, such as /dev/md0. Step 4 Click OK. The confirmation dialogue box is displayed. Step 5 Click OK.
  • Page 217: Configuring Share Control

    User's Manual Parameter Description Select a pool. Pool Name The available free space of the selected pool is displayed beside the pool name. Share Capacity Set the space of the folder. Set the block size of the folder, such as 512 Byte, 1024 Byte, 2048 Byte and 4096 Byte.
  • Page 218 User's Manual Procedure , or on the home page, select Network Storage > Storage Pool. Step 1 Click Step 2 Click to enable share service. Step 3 Click OK.
  • Page 219: System Maintenance

    User's Manual 7 System Maintenance 7.1 Overview Log in to the PC client. On the home page, select Maintain > Overview. Figure 7-1 Overview Table 7-1 Overview Function Description View device version and the number of online users. Overview Click to refresh the data.
  • Page 220: System Information

    User's Manual Function Description ● View disk status and storage usage. ◇ : disk online. ◇ : disk error. ◇ : disk warning. ◇ : no disk detected. Disk ● Click , click to enable device positioning and then set the interval at which the positioning indicator light of the Device flashes.
  • Page 221: System Resources

    User's Manual 7.3 System Resources Log in to the PC client. On the home page, select Maintain > System Resources > Device Resource. You can view resource status including CPU and memory usage, mainboard temperature and fan speed. Figure 7-3 System resources ●...
  • Page 222: Network Test

    User's Manual ● Block in batches: Select multiple users and then click Block. Step 4 Set the block period. The default period is 30 minutes. Step 5 Click OK. 7.4.2 Network Test You can test network connection and capture packets. Packet capture is the practice of intercepting a data packet that is crossing or moving over a specific computer network.
  • Page 223: Detection

    User's Manual 7.5.1 S.M.A.R.T Detection Run S.M.A.R.T detection to check HDD status. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Maintain > Disk Maintenance > S.M.A.R.T Detection. Figure 7-6 S.M.A.R.T detection Step 3 Set the detection period.
  • Page 224: Health Monitoring

    7.5.4 Health Monitoring Monitors the disk operation status. On the home page, select Maintain > Disk Maintenance > Health Monitoring Only supports Dahua Disk. Figure 7-9 Health monitoring 7.6 Logs The logs record all kinds of system running information. We recommend you check the logs periodically and fix the problems in time.
  • Page 225: Intelligent Diagnosis

    User's Manual Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Maintain > Log > System Logs. Step 3 Set the search period, and then select the log type. Step 4 (Optional) Click , and then select a log level.
  • Page 226: Run Log

    User's Manual Click Export to export the diagnosis results. Step 4 7.7.2 Run Log View system run logs for troubleshooting. Make sure that you have enabled Run Log in Security > System Service. Otherwise there is no log data. Log in to the PC client. On the home page, select Maintain > Intelligent Diagnosis > Run Log. The logs might be overwritten when the storage space runs out.
  • Page 227: Updating Cameras

    User's Manual ● During update, do not disconnect the Device from power and network, or restart or shut down the Device. ● Make sure that the update file is correct. Improper update file might result in device error. Procedure Step 1 Log in to the PC client.
  • Page 228: Automatic Maintenance

    User's Manual Figure 7-11 Default Select a method between Quick Restoration and Custom Restoration. Step 3 Step 4 Click OK. The system begins to restore default settings. After that, the system prompts you to restart the Device. 7.8.3 Automatic Maintenance If the device has run for a long time, you can set the Device to automatically restart at idle time.
  • Page 229: Backing Up Configurations

    User's Manual 7.8.4 Backing up Configurations You can export the configuration file of the Device to your computer or a USB storage device for backup. When the configurations are lost due to abnormal operation, you can import the backup configuration file to restore system configurations quickly. Exporting Configuration File On the home page, select Maintain >...
  • Page 230: Pc Client

    User's Manual 8 PC Client After installing the PC client, you can access the Device remotely through the PC client to carry out system configuration, function operations and system maintenance. For details on installing the PC client, see "3.3.1 Logging in to the PC Client". 8.1 Page Description Double-click the shortcut icon of the PC client on the desktop of your computer.
  • Page 231: Configuring The Client Settings

    User's Manual 8.4 Configuring the Client Settings When the theme of your computer is not Areo, videos might not be displayed normally on the PC client. We recommend you switch the computer theme to Areo, or enable the compatibility mode of the client.
  • Page 232: Log Out, Restart, Shut Down, Lock

    User's Manual 9 Log Out, Restart, Shut Down, Lock Log out of, restart, shut down and lock out the Device. Figure 9-1 User operation Logging Out , and then select Logout. Click Restart , select Restart, and then click OK. Click Shutting Down Shutting down the Device by unplug the power cable might cause data loss, and is not...
  • Page 233: Appendix 1 Glossary

    User's Manual Appendix 1 Glossary Appendix Table 1-1 Glossary Name Description Common Gateway Interface (CGI) is an important Internet technology. With CGI, client can ask data from program running on network server. CGI describes data transmission standard between server and asking processing program.
  • Page 234 User's Manual Name Description Maximum Transmission Unit (MTU) refers to the maximum data packet amount (byte) on one layer of the communication protocol. Open Network Video Interface Forum (ONVIF) is the defined general protocol for information exchange among the network video devices. It ONVIF includes search device, real-time audio/video, metadata, information control, and so on.
  • Page 235: Appendix 2 Mouse And Keyboard Operations

    User's Manual Appendix 2 Mouse and Keyboard Operations This section introduces mouse and keyboard operations. Appendix 2.1 Mouse Operations Connect mouse to the USB port, you can use the mouse to control the local menu. For details, see the following table. Appendix Table 2-1 Mouse operations Operation Description...
  • Page 236: Appendix 2.2 Virtual Keyboard

    User's Manual Appendix 2.2 Virtual Keyboard The local menu supports virtual keyboard. Click the text box to display virtual keyboard. For details, see the following pictures and table. If the device has connected to the peripheral keyboard, click the text column. Virtual keyboard will disappear.
  • Page 237 User's Manual Signal Words Description Click to delete letter. Click to input letter. Now the icon turns into . Click to restore previous input mode. Click to input space. Click to control cursor position. Click to switch to the next line. Select text and click the icon to cut the selected contents.
  • Page 238: Appendix 3 Raid

    User's Manual Appendix 3 RAID RAID is an abbreviation for Redundant Array of Independent Disks. It is to combine several independent HDDs (physical HDD) to form a HDD group (logic HDD). Comparing with one HDD, RAID provides more storage capacity and data redundancy. The different redundant arrays have different RAID level.
  • Page 239 User's Manual RAID Level Description Min. HDD Needed RAID 10 is a combination of the RAID 1 and RAID 0. It uses the extra high speed efficient of the RAID 0 and high data protection and restores RAID10 capability of the RAID 1. It has high read/write performance and security.
  • Page 240: Appendix 4 Hdd Capacity Calculation

    User's Manual Appendix 4 HDD Capacity Calculation HDD capacity calculation formula: Total capacity (M) = Channel number× Demand time length (hour) × HDD capacity occupied per hour (M/hour) According to the above formula, get recording time calculation formula. Recording time (hour) = For example, for single-channel recording, HDD capacity occupied per hour is 200 M/hour.
  • Page 241: Appendix 5 Particulate And Gaseous Contamination Specifications

    User's Manual Appendix 5 Particulate and Gaseous Contamination Specifications Appendix 5.1 Particulate Contamination Specifications The following table defines the limitations of the particulate contamination in the operating environment of the device. If the level of particulate contamination exceeds the specified limitations and result in device damage or failure, you need to rectify the environmental conditions.
  • Page 242 User's Manual Appendix Table 5-3 Gaseous contamination specifications Gaseous contamination Specifications Copper coupon corrosion < 300 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 rate Silver coupon corrosion rate < 200 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 Appendix Table 5-4 ANSI/ISA-71.04-2013 classification of reactive environments Class Copper Reactivity Silver Reactivity...
  • Page 243: Appendix 6 Cybersecurity Recommendations

    IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations from Dahua on how to create a more secured security system.
  • Page 244 User's Manual 1024–65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing.
  • Page 245 User's Manual device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.
  • Page 246 User's Manual...

Table of Contents