TKH 1004 Series User Manual

TKH 1004 Series User Manual

4 mp intelligent ip cameras

Advertisement

Quick Links

1004 Series
4 MP Intelligent IP cameras
BL1004F4-EI / BL1004M1-EI / CD1004F2-EI / FD1004M1-EI

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 1004 Series and is the answer not in the manual?

Questions and answers

Summary of Contents for TKH 1004 Series

  • Page 1 1004 Series 4 MP Intelligent IP cameras BL1004F4-EI / BL1004M1-EI / CD1004F2-EI / FD1004M1-EI...
  • Page 2 Note: To ensure proper operation, please read this manual thoroughly before using the product and retain the information for future reference. Copyright © 2017 Siqura B.V. All rights reserved. 1004 Series User Manual v1 (173103-1) AIT55 Nothing from this publication may be copied, translated, reproduced, and/or published by means of printing, photocopying, or by any other means without the prior written permission of Siqura.
  • Page 3: Table Of Contents

    Contents About this manual ..................Safety and compliance ................Safety instructions ................Protection against overvoltage ............... Compliance information ................ Connect to network ................... System requirements ................Connect the camera to a LAN ..............Connect the camera to a WAN ............... Get access to the camera ................
  • Page 4 Contents 10.4 Privacy Mask ..................10.5 ROI ....................Events ....................... 11.1 Motion Detection ................. 11.2 Video Tampering ................. 11.3 Alarm Input ..................11.4 Alarm Output ..................11.5 Exception ................... 11.6 Intrusion Detection ................11.7 Line Crossing Detection ................ Storage ..................... 12.1 HDD Management ................
  • Page 5: About This Manual

    About this manual What's in this manual This is version 1 of the user assistance provided in the web interface of the 1004 Series camera. The Help topics give you all the information you need to use this product efficiently.
  • Page 6: Safety And Compliance

    Safety and compliance This section provides safety instructions and compliance information. In This Chapter 2.1 Safety instructions....................6 2.2 Protection against overvoltage..................7 2.3 Compliance information................... 9 Safety instructions These instructions are intended to make sure that the user can use the product correctly and avoid danger or property loss.
  • Page 7: Protection Against Overvoltage

    Safety and compliance Cautions ● Make sure the power supply voltage is correct before using the camera. ● Do not drop the camera or subject it to physical shock. ● Do not touch the sensor modules with your fingers. If cleaning is necessary, use a cleaning cloth with a bit of ethanol and wipe it gently.
  • Page 8 Safety and compliance These international standards apply (equivalent standards may also be used): ● IEC 60364-4-44 Electrical installations of buildings - Part 4-443: Protection against overvoltages of atmospheric origin or due to switching. ● IEC 60364-5-53 Electrical installations of buildings - Part 5-534: Devices for protection against overvoltages ●...
  • Page 9: Compliance Information

    Safety and compliance Compliance information FCC compliance This equipment has been tested and found to comply with the limits for a digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
  • Page 10: Connect To Network

    Connect to network This section gives instructions for connecting the camera to the network. In This Chapter 3.1 System requirements.................... 10 3.2 Connect the camera to a LAN................. 11 3.3 Connect the camera to a WAN................12 System requirements To open communication with the camera, you need: ●...
  • Page 11: Connect The Camera To A Lan

    Connect to network Connect the camera to a LAN To view and configure the camera via a LAN, you need to connect the network camera in the same subnet with your computer, and install the Device Manager software to search and change the IP of the network camera.
  • Page 12: Connect The Camera To A Wan

    Connect to network Note: If no DHCP server is found on the network, the camera is initially assigned the IP address 0.0.0.0. After 30 seconds, an IP address in the range of 192.168.1.2~192.168.1.253 is adopted. Add the camera to the intended subnet Via the web interface of the camera, you can change its network settings to add it to the subnet it will be used in.
  • Page 13 Connect to network Dynamic IP connection Before you start, obtain a dynamic IP address from an Internet Service Provider (ISP). With the dynamic IP address, you can connect the network camera via a modem or a router. Connect the network camera via a router Establish a connection between the network camera and the router.
  • Page 14 Connect to network Normal domain name resolution Apply a domain name from a domain name provider. On the DDNS tab of the Network page in the camera, configure the DDNS settings. Visit the camera via the applied domain name. Private domain name resolution Install and run the IP Server software on a computer with a static IP.
  • Page 15: Get Access To The Camera

    Get access to the camera The webpages of the camera offer a user-friendly interface for configuring its settings and viewing live video over the network. This section explains how to log on to the built-in web server. In This Chapter 4.1 Get access via web browser..................15 4.2 Get access via Device Manager................
  • Page 16: Get Access Via Device Manager

    Device Manager is a Windows-based software tool that you can use to manage and configure TKH Security IP cameras and video encoders. The tool automatically locates TKH Security devices on the network and offers you an intuitive interface to set and manage network settings, configure devices, show device status, and perform firmware upgrade.
  • Page 17: Get Access Via Upnp

    Get access to the camera In the pop-up window indicating that you have successfully changed the settings, click Wait one minute, and then rescan the network. To access the webpages of the camera, double-click its entry in the list of found devices. To assign a DHCP server Record the MAC address of the camera (see the Serial no.
  • Page 18: Log On To The Camera

    Get access to the camera Log on to the camera Admin account When you connect to the web interface of the camera for the first time, you are prompted to set a password. By supplying a password, you create an account with Administrator level that you can use to add "Operator"...
  • Page 19: Install The Videoplayer Plug-In

    Get access to the camera Install the videoplayer plug-in For (live) video viewing and operating the camera, a videoplayer plug-in is needed. If the plug-in is not detected you are prompted to download and install it. To install the plug-in Click the hyperlink in the webpage of the camera.
  • Page 20: Live View

    Live View The Live View page is the home page of the web interface. It is shown when you successfully connect to the camera. What this page is for On the Live View page, you can view real-time video, capture images and configure various video settings.
  • Page 21 Selects Stream 1 Selects Stream 2 Opens the video player plug-in list. Use the options to select a plug-in or live video display. Selects the TKH SecurityComponents plug-in Selects the QuickTime plug-in Opens the Two-way Audio list Turns the microphone on/off...
  • Page 22 Live View Buttons (right side) Description Stops Live View (screen goes blank) Starts Live View Captures the image Starts a recording Stops a recording Enables digital zoom (e-PTZ) Disables digital zoom (e-PTZ) Opens Audio Volume control Enables you to control audio volume by dragging the slider Manual recordings and snapshots Clicking Start Recording starts a manual recording.
  • Page 23: Playback

    Playback Playback What this page is for On the Playback page, you can view recorded video stored on a network disk or on the SD card. To search for recorded video On the Playback page, go to the calender on the right. Select the date you need.
  • Page 24 Playback Video playback For video playback, use the following buttons in the Playback toolbar. Task Action Button To start playback Click Start To pause playback Click Pause To stop playback Click Stop To accelerate playback speed Click Fast forward To reduce playback speed Click Slow forward To advance one frame Click Single frame...
  • Page 25: System

    System The System page is the central place for viewing and configuring device and firmware related information and settings. On the various tabs, you can adjust the time settings, reboot the camera, restore the default settings, upgrade the firmware, view logs, and configure local settings.
  • Page 26: Time Settings

    System Reference information The non-editable content on this tab serves as reference information for maintenance or future configuration of the camera. Note that this information varies per model. Time settings System > Time Settings What this tab is for On the Time Settings tab, you can set the device date and time manually or use an NTP server.
  • Page 27 System The interval between two synchronising actions by an NTP server can be set from 1 to 10080 minutes. Click Test. The connection to the time server is tested. If your settings are correct, click Save. Note: If the camera is connected to a public network, use an NTP server that has a time synchronisation function.
  • Page 28: Upgrade And Maintenance

    System Upgrade and maintenance System > Upgrade & Maintenance What this tab is for Use the Upgrade & Maintenance tab for the following tasks: ● Reboot the camera ● Restore the factory-default camera settings, ● Export/Import a camera configuration file ●...
  • Page 29 System - or - ● Click Default to perform a complete reset including the network settings and user information. Use this button with caution. Warning: Clicking Default can make the camera unreachable for in-band communications. In that case you can only get access to the web interface by (temporarily) moving a PC to the factory-default subnet of the camera.
  • Page 30: Log

    System System > Log What this tab is for On the Log tab, you can view and export information kept in the Alarm, Exception, Operation, and Information logs of the camera. This information is often useful when you are troubleshooting occurred issues. Before you start Configure network storage for the camera or insert an SD card into the camera.
  • Page 31: Local Configuration

    System Local configuration System > Local Configuration What this tab is for On the Local Configuration tab, you can configure Live View settings and set the paths to the storage folders for snapshots, clips and downloads. Live View Parameters Use this section to set the protocol type and live view performance. To configure the Live View parameters Select the protocol to be used.
  • Page 32 System Record File Settings Use this section to set the file size and the paths to the storage folders for video you recorded with your web browser. To set the file size and the paths to your storage Set the packed size of manually recorded and downloaded video files to 256M, 512M or This sets the maximum file size for recordings to the selected value.
  • Page 33: Security

    Security On the Security page, you can manage user accounts, configure authentication settings and enable an IP address filter. In This Chapter 8.1 User Management....................33 8.2 Authentication...................... 34 8.3 IP Address Filter....................35 User Management Security > User Management What this tab is for The User Management tab is the place where the admin user adds, modifies and deletes user accounts.
  • Page 34: Authentication

    Security User management Up to 31 user accounts can be created. Two user levels are available: Operator and User. Per user, different permissions can be assigned. To add a user account Click Add. Type the user name. In the Level list, select Operator or User. Type the password.
  • Page 35: Ip Address Filter

    Security RTSP Authentication From a security perspective, it may be undesirable that users can freely connect to the camera over RTSP to view a video stream. With RTSP Authentication, it is possible to restrict access to users with a valid account. On attempting to start an RTSP stream, users are prompted to provide a user name and password.
  • Page 36 Security What this tab is for On the IP Address Filter tab, you can deny/allow access to the camera from specific IP addresses. To turn on the IP address filter Select Enable IP Address Filter. In the IP Address Filter Type list, select Forbidden or Allowed, as required. Forbidden: Forbid the IP addresses added in the IP Address Filter list to log in.
  • Page 37: Network

    Network On the Network page, you can configure the TCP/IP, DDNS, SNMP, 802.1X, QoS, NAT, HTTPS, Mail, and FTP settings of the camera. In This Chapter 9.1 TCP/IP.........................37 9.2 DDNS........................39 9.3 PPPoE........................40 9.4 SNMP........................41 9.5 802.1X........................ 42 9.6 QoS........................43 9.7 NAT........................
  • Page 38 Network What this tab is for On the TCP/IP tab, you can configure the basic network settings, the DNS server settings and the port settings. Basic settings The TCP/IP settings must be properly configured before you operate the camera over the network.
  • Page 39: Ddns

    Network DNS Server The Preferred DNS Server is the primary domain name server that translates domain names and host names into the corresponding IP addresses. The Alternate DNS Server is a second domain name server that is used if the Preferred DNS Server is unavailable. Configure the DNS server settings if they are required for specific applications, such as sending email.
  • Page 40: Pppoe

    Network Note: Registration on the DDNS server is required before you configure the DDNS settings of the camera. To turn on DDNS Select Enable DDNS. In the DDNS Type list, select the DDNS type you will be using. Configure the DDNS settings for the selected type as described below . Click Save.
  • Page 41: Snmp

    Network What this tab is for If you have no router but only a modem, you can use the Point-to-Point Protocol over Ethernet (PPPoE) function. PPPoE enables users to transfer data securely. To configure PPPoE Select Enable PPPoE. For PPPoE access, type the user name and password (2x). The user name and password should be assigned by your Internet Service Provider (ISP).
  • Page 42: 802.1X

    Network Before you continue Before you set up SNMP, download and install the SNMP software and configure it to receive the camera information via the SNMP port. By setting the Trap Address, the camera can send the alarm event and exception messages to the surveillance centre. Note: The SNMP version you select on the SNMP tab should be the same as that of the SNMP software.
  • Page 43: Qos

    Network ● If all the information is validated, the switch allows network access to the protected network. To turn on IEEE 802.1X Connect the network camera directly to your PC with a network cable. Log on to the camera. Go to the 802.1X tab of the Network page. Select Enable IEEE 802.1X.
  • Page 44: Nat

    Network Note: Make sure that you enable the QoS function of your network device (such as a router). Network > NAT What this tab is for On this tab, you can turn on UPnP and configure the Network Address Translation (NAT) settings.
  • Page 45: Https

    Network HTTPS Network > HTTPS What this tab is for On this tab, you can install security certificates to enable secure connections between the camera and web browsers. If, for example, the HTTPS port number is set to 443 and the IP address is 192.168.1.64, you can establish a secure connection to the camera by typing “https://192.168.1.64:443”...
  • Page 46 Network Item Description Country Two-letter country code (where the certificate is to be used) Hostname/IP Host name or IP address of the device to be certified Validity Valid period (in days) of the certificate Password (Strong) Password State or province Administrative region in which the organisation is located Locality City/Location where the organisation is based...
  • Page 47: Mail

    Network Mail Network > Mail What this tab is for The system can be configured to send an email notification to all designated receivers if an alarm event, such as a motion detection, video loss or video tampering event, is detected. Before you continue Go to the TCP/IP tab of the Network page and make sure that the IPv4 address, the IPv4 subnet mask, the IPv4 default gateway and the preferred DNS server are set correctly.
  • Page 48: Ftp

    Network 9.10 Network > FTP What this tab is for On the FTP tab, you can configure the FTP server related information to enable the uploading of captured pictures to the FTP server. Captures can be triggered by events or a timing snapshot task.
  • Page 49 Network In the Quality list, select the picture quality to be used. In Interval, type the interval (in seconds or milliseconds) to be applied between uploads. In Capture Number, type the number of captures to be uploaded per event. Range: 1~120. Click Save.
  • Page 50: Video/Audio

    Video/Audio On the Video/Audio page, you can configure the settings for video/audio streaming, picture adjustment, text overlays, privacy masks and the region of interest (ROI). In This Chapter 10.1 Streaming......................50 10.2 Picture Adjustment....................52 10.3 Text Overlay.......................54 10.4 Privacy Mask...................... 55 10.5 ROI........................
  • Page 51 Video/Audio The main stream is usually for recording and live viewing with good bandwidth, whereas the substream can be used for live viewing when the bandwidth is limited. In the Resolution list, select the required resolution for the video output. In the Bitrate Type list, select Variable or Constant.
  • Page 52: Picture Adjustment

    Video/Audio 10.2 Picture Adjustment Video/Audio > Picture Adjustment What this tab is for On this tab, you can set the image quality of the camera, including brightness, contrast, saturation, sharpness, etc. You can double-click the live view to enter fullscreen mode. Double-click again to exit.
  • Page 53 Video/Audio Exposure Settings The exposure time refers to the electronic shutter time, which ranges from 1/3 ~ 1/100,000 s. Adjust it according to the actual luminance condition. Day/Night Switch Use this section to select the Day/Night switch mode and to configure the smart IR settings. ●...
  • Page 54: Text Overlay

    Video/Audio Other Video output may vary per camera model. Refer to the actual camera model for details. ● Local Output: Select ON to enable analogue video output via the connector on the camera. To configure the Scheduled-Switch settings In Start Time and End Time, enter the start and end time of the switch. Click Common.
  • Page 55: Privacy Mask

    Video/Audio In the Live View window, drag the OSD frame to position it as needed. Click Save. To add a text overlay Select the overlay you wish to add. In the overlay text box, type the text to be displayed. In the Live View window, drag the OSD frame to position it as needed.
  • Page 56: Roi

    Video/Audio Click Add. The privacy mask is saved and added to the Privacy Mask List. (Optional) In the Name box, type a name for the mask. Click Save. To delete a privacy mask In the Privacy Mask List, select the mask. Click Delete.
  • Page 57 Video/Audio Click Draw Area. Drag your mouse pointer across the Live View window to draw the region. (Optional) Drag the region to position it correctly. Click Stop Drawing. In the ROI Level list, select the image quality level. The higher the value, the better the image quality. In Region Name, type a name for the region.
  • Page 58: Events

    Events This section explains how to configure the network camera to respond to events, such as motion detection, video tampering, alarm input/output, exception, intrusion detection and line crossing detection. These events can trigger the linkage methods, such as Notify Surveillance Center, Send Email, Upload to FTP, Trigger Alarm Output, and Trigger Channel.
  • Page 59 Events Modes To detect moving objects accurately and reduce the false alarm rate, the following configuration modes are available for different motion detection environments: ● Normal configuration ● Expert configuration Normal mode The Normal configuration mode adopts the same set of motion detection parameters in the daytime and at night.
  • Page 60 Events Upload to FTP Capture the image when an alarm is triggered and upload the picture to an FTP server. Before images can be uploaded, the related settings on the FTP tab of the Network page and on the Capture tab of the Storage page must be correctly and completely configured. The captured image can also be uploaded to the available SD card or network disk.
  • Page 61: Video Tampering

    Events 11.2 Video Tampering Events > Video Tampering What this tab is for On the Video Tampering tab, you can configure the camera to raise an alarm when the lens is covered and to link specific response actions to such an event. Steps Video Tampering configuration involves the following steps: On the Area Settings tab, you enable the function and set the sensitivity.
  • Page 62: Alarm Input

    Events You can click a time section to edit, save or delete it. Click Save. To set the alarm actions On the Linkage Method tab, select the required actions (see descriptions below). Options: Send Email, Notify Surveillance Center, Trigger Alarm Output. Click Save.
  • Page 63 Events Steps Alarm Input configuration involves the following steps: On the Alarm Input tab, you enable alarm input handling. On the Arming Schedule tab, you define the period(s) when you want the function to be active. On the Linkage Method tab, you define the action(s) to be taken when an event occurs. To enable alarm input handling In the Alarm Input No.
  • Page 64: Alarm Output

    Events 11.4 Alarm Output Events > Alarm Output What this tab is for The camera has alarm output functionality for alarm application. On the Alarm Output tab, you can configure the related settings and activate/deactivate a manual alarm. To configure the Alarm Output settings In the Alarm Output No.
  • Page 65: Exception

    Events 11.5 Exception Events > Exception What this tab is for On the Exception tab, you can link actions to the occurrence of an Exception Alarm. The exception type can be HDD Full, HDD Error, Network Disconnected, IP address Conflicted and Illegal Login to the camera.
  • Page 66: Intrusion Detection

    Events 11.6 Intrusion Detection Events > Intrusion Detection What this tab is for The Intrusion detection function detects people, vehicles or other objects which enter and loiter in a predefined virtual region longer than the set duration. On the Intrusion Detection tab, you can enable and set up the function, and define the actions to be taken when the alarm is triggered.
  • Page 67 Events Click Stop Drawing. Drag the Threshold(s) slider to set the time threshold. Range: [0 s ~ 10 s]. This is the threshold for the duration of the object loitering in the region. If you set the value to 0, the alarm is triggered immediately after the object has entered the region.
  • Page 68: Line Crossing Detection

    Events 11.7 Line Crossing Detection Events > Line Crossing Detection What this tab is for The Line Crossing Detection function detects people, vehicles or other objects which cross a predefined virtual line. On the Line Crossing Detection tab, you can enable and set up the function, and define the actions to be taken when the alarm is triggered.
  • Page 69 Events Drag the Sensitivity slider to set the sensitivity of the detection. Range: [1-100]. The higher the value, the more easily the line crossing action can be detected. Click Save. To set the arming schedule On the Arming Schedule tab, drag your mouse pointer across the required day(s) to set the arming schedule.
  • Page 70: Storage

    Storage Before you configure recording and storage settings, make sure that a network storage device is available within the network or that an SD card is inserted in your camera. In This Chapter 12.1 HDD Management....................70 12.2 Record Schedule....................71 12.3 Capture......................
  • Page 71: Record Schedule

    Storage Available storage Network disks added via the Net HDD tab or an SD card inserted into the camera will be available in the HDD Management table. You can see the capacity, free space, status type and property of each item. Up to eight NAS disks can be connected to the camera. If the status is Uninitialised you need to format the disk or card before you can use it.
  • Page 72 Storage Storage medium By default, the files of recordings and snapshots are stored on the SD card (if supported) or on a network disk. Network disks can be added via the Net HDD tab. On the HDD Management tab, you can initialise connected disks and the SD card. To set up scheduled recording Select Enable.
  • Page 73: Capture

    Storage 12.3 Capture Storage > Capture What this tab is for On the Capture tab, you can configure the settings for snapshot captures. Storage medium By default, the files of recordings and snapshots are stored on the SD card (if supported) or on a network disk.
  • Page 74: Net Hdd

    Storage 12.4 Net HDD Storage > Net HDD What this tab is for On the Net HDD tab, you can configure and test the settings for Network Attached Storage (NAS). Before you continue The network disk should be available within the network and properly configured to store the recorded files, log files, etc.
  • Page 75 Storage ● Do not use complete words that can be found in a dictionary ● Use a random combination of at least two of the following categories: upper case letters, lower case letters, numbers and special characters Number of network disks You can connect up to eight network disks to the camera.
  • Page 76: Index

    Index Live View..........20 Local configuration........31 802.1X..........42 Log............30 Log on to the camera......18 About this manual........5 Alarm Input........... 62 Mail............47 Alarm Output......... 64 Motion Detection........58 Authentication........34 NAT............44 Basic information........25 Net HDD..........74 Network..........37 Capture..........73 Compliance information......9 Picture Adjustment.........
  • Page 77 Index Video Tampering........61 Video/Audio........... 50...

This manual is also suitable for:

Bl1004f4-eiBl1004m4-eiCd1004f2-eiFd1004m1-ei

Table of Contents