Contents About this manual ..................Safety and compliance ................Safety instructions ................Protection against overvoltage ............... Compliance information ................ Connect to network ................... System requirements ................Connect the camera to a LAN ..............Connect the camera to a WAN ............... Get access to the camera ................
About this manual What's in this manual This is version 1 of the user assistance provided in the web interface of the 1004 Series camera. The Help topics give you all the information you need to use this product efficiently.
Safety and compliance This section provides safety instructions and compliance information. In This Chapter 2.1 Safety instructions....................6 2.2 Protection against overvoltage..................7 2.3 Compliance information................... 9 Safety instructions These instructions are intended to make sure that the user can use the product correctly and avoid danger or property loss.
Safety and compliance Cautions ● Make sure the power supply voltage is correct before using the camera. ● Do not drop the camera or subject it to physical shock. ● Do not touch the sensor modules with your fingers. If cleaning is necessary, use a cleaning cloth with a bit of ethanol and wipe it gently.
Page 8
Safety and compliance These international standards apply (equivalent standards may also be used): ● IEC 60364-4-44 Electrical installations of buildings - Part 4-443: Protection against overvoltages of atmospheric origin or due to switching. ● IEC 60364-5-53 Electrical installations of buildings - Part 5-534: Devices for protection against overvoltages ●...
Safety and compliance Compliance information FCC compliance This equipment has been tested and found to comply with the limits for a digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
Connect to network This section gives instructions for connecting the camera to the network. In This Chapter 3.1 System requirements.................... 10 3.2 Connect the camera to a LAN................. 11 3.3 Connect the camera to a WAN................12 System requirements To open communication with the camera, you need: ●...
Connect to network Connect the camera to a LAN To view and configure the camera via a LAN, you need to connect the network camera in the same subnet with your computer, and install the Device Manager software to search and change the IP of the network camera.
Connect to network Note: If no DHCP server is found on the network, the camera is initially assigned the IP address 0.0.0.0. After 30 seconds, an IP address in the range of 192.168.1.2~192.168.1.253 is adopted. Add the camera to the intended subnet Via the web interface of the camera, you can change its network settings to add it to the subnet it will be used in.
Page 13
Connect to network Dynamic IP connection Before you start, obtain a dynamic IP address from an Internet Service Provider (ISP). With the dynamic IP address, you can connect the network camera via a modem or a router. Connect the network camera via a router Establish a connection between the network camera and the router.
Page 14
Connect to network Normal domain name resolution Apply a domain name from a domain name provider. On the DDNS tab of the Network page in the camera, configure the DDNS settings. Visit the camera via the applied domain name. Private domain name resolution Install and run the IP Server software on a computer with a static IP.
Get access to the camera The webpages of the camera offer a user-friendly interface for configuring its settings and viewing live video over the network. This section explains how to log on to the built-in web server. In This Chapter 4.1 Get access via web browser..................15 4.2 Get access via Device Manager................
Device Manager is a Windows-based software tool that you can use to manage and configure TKH Security IP cameras and video encoders. The tool automatically locates TKH Security devices on the network and offers you an intuitive interface to set and manage network settings, configure devices, show device status, and perform firmware upgrade.
Get access to the camera In the pop-up window indicating that you have successfully changed the settings, click Wait one minute, and then rescan the network. To access the webpages of the camera, double-click its entry in the list of found devices. To assign a DHCP server Record the MAC address of the camera (see the Serial no.
Get access to the camera Log on to the camera Admin account When you connect to the web interface of the camera for the first time, you are prompted to set a password. By supplying a password, you create an account with Administrator level that you can use to add "Operator"...
Get access to the camera Install the videoplayer plug-in For (live) video viewing and operating the camera, a videoplayer plug-in is needed. If the plug-in is not detected you are prompted to download and install it. To install the plug-in Click the hyperlink in the webpage of the camera.
Live View The Live View page is the home page of the web interface. It is shown when you successfully connect to the camera. What this page is for On the Live View page, you can view real-time video, capture images and configure various video settings.
Page 21
Selects Stream 1 Selects Stream 2 Opens the video player plug-in list. Use the options to select a plug-in or live video display. Selects the TKH SecurityComponents plug-in Selects the QuickTime plug-in Opens the Two-way Audio list Turns the microphone on/off...
Page 22
Live View Buttons (right side) Description Stops Live View (screen goes blank) Starts Live View Captures the image Starts a recording Stops a recording Enables digital zoom (e-PTZ) Disables digital zoom (e-PTZ) Opens Audio Volume control Enables you to control audio volume by dragging the slider Manual recordings and snapshots Clicking Start Recording starts a manual recording.
Playback Playback What this page is for On the Playback page, you can view recorded video stored on a network disk or on the SD card. To search for recorded video On the Playback page, go to the calender on the right. Select the date you need.
Page 24
Playback Video playback For video playback, use the following buttons in the Playback toolbar. Task Action Button To start playback Click Start To pause playback Click Pause To stop playback Click Stop To accelerate playback speed Click Fast forward To reduce playback speed Click Slow forward To advance one frame Click Single frame...
System The System page is the central place for viewing and configuring device and firmware related information and settings. On the various tabs, you can adjust the time settings, reboot the camera, restore the default settings, upgrade the firmware, view logs, and configure local settings.
System Reference information The non-editable content on this tab serves as reference information for maintenance or future configuration of the camera. Note that this information varies per model. Time settings System > Time Settings What this tab is for On the Time Settings tab, you can set the device date and time manually or use an NTP server.
Page 27
System The interval between two synchronising actions by an NTP server can be set from 1 to 10080 minutes. Click Test. The connection to the time server is tested. If your settings are correct, click Save. Note: If the camera is connected to a public network, use an NTP server that has a time synchronisation function.
System Upgrade and maintenance System > Upgrade & Maintenance What this tab is for Use the Upgrade & Maintenance tab for the following tasks: ● Reboot the camera ● Restore the factory-default camera settings, ● Export/Import a camera configuration file ●...
Page 29
System - or - ● Click Default to perform a complete reset including the network settings and user information. Use this button with caution. Warning: Clicking Default can make the camera unreachable for in-band communications. In that case you can only get access to the web interface by (temporarily) moving a PC to the factory-default subnet of the camera.
System System > Log What this tab is for On the Log tab, you can view and export information kept in the Alarm, Exception, Operation, and Information logs of the camera. This information is often useful when you are troubleshooting occurred issues. Before you start Configure network storage for the camera or insert an SD card into the camera.
System Local configuration System > Local Configuration What this tab is for On the Local Configuration tab, you can configure Live View settings and set the paths to the storage folders for snapshots, clips and downloads. Live View Parameters Use this section to set the protocol type and live view performance. To configure the Live View parameters Select the protocol to be used.
Page 32
System Record File Settings Use this section to set the file size and the paths to the storage folders for video you recorded with your web browser. To set the file size and the paths to your storage Set the packed size of manually recorded and downloaded video files to 256M, 512M or This sets the maximum file size for recordings to the selected value.
Security On the Security page, you can manage user accounts, configure authentication settings and enable an IP address filter. In This Chapter 8.1 User Management....................33 8.2 Authentication...................... 34 8.3 IP Address Filter....................35 User Management Security > User Management What this tab is for The User Management tab is the place where the admin user adds, modifies and deletes user accounts.
Security User management Up to 31 user accounts can be created. Two user levels are available: Operator and User. Per user, different permissions can be assigned. To add a user account Click Add. Type the user name. In the Level list, select Operator or User. Type the password.
Security RTSP Authentication From a security perspective, it may be undesirable that users can freely connect to the camera over RTSP to view a video stream. With RTSP Authentication, it is possible to restrict access to users with a valid account. On attempting to start an RTSP stream, users are prompted to provide a user name and password.
Page 36
Security What this tab is for On the IP Address Filter tab, you can deny/allow access to the camera from specific IP addresses. To turn on the IP address filter Select Enable IP Address Filter. In the IP Address Filter Type list, select Forbidden or Allowed, as required. Forbidden: Forbid the IP addresses added in the IP Address Filter list to log in.
Network On the Network page, you can configure the TCP/IP, DDNS, SNMP, 802.1X, QoS, NAT, HTTPS, Mail, and FTP settings of the camera. In This Chapter 9.1 TCP/IP.........................37 9.2 DDNS........................39 9.3 PPPoE........................40 9.4 SNMP........................41 9.5 802.1X........................ 42 9.6 QoS........................43 9.7 NAT........................
Page 38
Network What this tab is for On the TCP/IP tab, you can configure the basic network settings, the DNS server settings and the port settings. Basic settings The TCP/IP settings must be properly configured before you operate the camera over the network.
Network DNS Server The Preferred DNS Server is the primary domain name server that translates domain names and host names into the corresponding IP addresses. The Alternate DNS Server is a second domain name server that is used if the Preferred DNS Server is unavailable. Configure the DNS server settings if they are required for specific applications, such as sending email.
Network Note: Registration on the DDNS server is required before you configure the DDNS settings of the camera. To turn on DDNS Select Enable DDNS. In the DDNS Type list, select the DDNS type you will be using. Configure the DDNS settings for the selected type as described below . Click Save.
Network What this tab is for If you have no router but only a modem, you can use the Point-to-Point Protocol over Ethernet (PPPoE) function. PPPoE enables users to transfer data securely. To configure PPPoE Select Enable PPPoE. For PPPoE access, type the user name and password (2x). The user name and password should be assigned by your Internet Service Provider (ISP).
Network Before you continue Before you set up SNMP, download and install the SNMP software and configure it to receive the camera information via the SNMP port. By setting the Trap Address, the camera can send the alarm event and exception messages to the surveillance centre. Note: The SNMP version you select on the SNMP tab should be the same as that of the SNMP software.
Network ● If all the information is validated, the switch allows network access to the protected network. To turn on IEEE 802.1X Connect the network camera directly to your PC with a network cable. Log on to the camera. Go to the 802.1X tab of the Network page. Select Enable IEEE 802.1X.
Network Note: Make sure that you enable the QoS function of your network device (such as a router). Network > NAT What this tab is for On this tab, you can turn on UPnP and configure the Network Address Translation (NAT) settings.
Network HTTPS Network > HTTPS What this tab is for On this tab, you can install security certificates to enable secure connections between the camera and web browsers. If, for example, the HTTPS port number is set to 443 and the IP address is 192.168.1.64, you can establish a secure connection to the camera by typing “https://192.168.1.64:443”...
Page 46
Network Item Description Country Two-letter country code (where the certificate is to be used) Hostname/IP Host name or IP address of the device to be certified Validity Valid period (in days) of the certificate Password (Strong) Password State or province Administrative region in which the organisation is located Locality City/Location where the organisation is based...
Network Mail Network > Mail What this tab is for The system can be configured to send an email notification to all designated receivers if an alarm event, such as a motion detection, video loss or video tampering event, is detected. Before you continue Go to the TCP/IP tab of the Network page and make sure that the IPv4 address, the IPv4 subnet mask, the IPv4 default gateway and the preferred DNS server are set correctly.
Network 9.10 Network > FTP What this tab is for On the FTP tab, you can configure the FTP server related information to enable the uploading of captured pictures to the FTP server. Captures can be triggered by events or a timing snapshot task.
Page 49
Network In the Quality list, select the picture quality to be used. In Interval, type the interval (in seconds or milliseconds) to be applied between uploads. In Capture Number, type the number of captures to be uploaded per event. Range: 1~120. Click Save.
Video/Audio On the Video/Audio page, you can configure the settings for video/audio streaming, picture adjustment, text overlays, privacy masks and the region of interest (ROI). In This Chapter 10.1 Streaming......................50 10.2 Picture Adjustment....................52 10.3 Text Overlay.......................54 10.4 Privacy Mask...................... 55 10.5 ROI........................
Page 51
Video/Audio The main stream is usually for recording and live viewing with good bandwidth, whereas the substream can be used for live viewing when the bandwidth is limited. In the Resolution list, select the required resolution for the video output. In the Bitrate Type list, select Variable or Constant.
Video/Audio 10.2 Picture Adjustment Video/Audio > Picture Adjustment What this tab is for On this tab, you can set the image quality of the camera, including brightness, contrast, saturation, sharpness, etc. You can double-click the live view to enter fullscreen mode. Double-click again to exit.
Page 53
Video/Audio Exposure Settings The exposure time refers to the electronic shutter time, which ranges from 1/3 ~ 1/100,000 s. Adjust it according to the actual luminance condition. Day/Night Switch Use this section to select the Day/Night switch mode and to configure the smart IR settings. ●...
Video/Audio Other Video output may vary per camera model. Refer to the actual camera model for details. ● Local Output: Select ON to enable analogue video output via the connector on the camera. To configure the Scheduled-Switch settings In Start Time and End Time, enter the start and end time of the switch. Click Common.
Video/Audio In the Live View window, drag the OSD frame to position it as needed. Click Save. To add a text overlay Select the overlay you wish to add. In the overlay text box, type the text to be displayed. In the Live View window, drag the OSD frame to position it as needed.
Video/Audio Click Add. The privacy mask is saved and added to the Privacy Mask List. (Optional) In the Name box, type a name for the mask. Click Save. To delete a privacy mask In the Privacy Mask List, select the mask. Click Delete.
Page 57
Video/Audio Click Draw Area. Drag your mouse pointer across the Live View window to draw the region. (Optional) Drag the region to position it correctly. Click Stop Drawing. In the ROI Level list, select the image quality level. The higher the value, the better the image quality. In Region Name, type a name for the region.
Events This section explains how to configure the network camera to respond to events, such as motion detection, video tampering, alarm input/output, exception, intrusion detection and line crossing detection. These events can trigger the linkage methods, such as Notify Surveillance Center, Send Email, Upload to FTP, Trigger Alarm Output, and Trigger Channel.
Page 59
Events Modes To detect moving objects accurately and reduce the false alarm rate, the following configuration modes are available for different motion detection environments: ● Normal configuration ● Expert configuration Normal mode The Normal configuration mode adopts the same set of motion detection parameters in the daytime and at night.
Page 60
Events Upload to FTP Capture the image when an alarm is triggered and upload the picture to an FTP server. Before images can be uploaded, the related settings on the FTP tab of the Network page and on the Capture tab of the Storage page must be correctly and completely configured. The captured image can also be uploaded to the available SD card or network disk.
Events 11.2 Video Tampering Events > Video Tampering What this tab is for On the Video Tampering tab, you can configure the camera to raise an alarm when the lens is covered and to link specific response actions to such an event. Steps Video Tampering configuration involves the following steps: On the Area Settings tab, you enable the function and set the sensitivity.
Events You can click a time section to edit, save or delete it. Click Save. To set the alarm actions On the Linkage Method tab, select the required actions (see descriptions below). Options: Send Email, Notify Surveillance Center, Trigger Alarm Output. Click Save.
Page 63
Events Steps Alarm Input configuration involves the following steps: On the Alarm Input tab, you enable alarm input handling. On the Arming Schedule tab, you define the period(s) when you want the function to be active. On the Linkage Method tab, you define the action(s) to be taken when an event occurs. To enable alarm input handling In the Alarm Input No.
Events 11.4 Alarm Output Events > Alarm Output What this tab is for The camera has alarm output functionality for alarm application. On the Alarm Output tab, you can configure the related settings and activate/deactivate a manual alarm. To configure the Alarm Output settings In the Alarm Output No.
Events 11.5 Exception Events > Exception What this tab is for On the Exception tab, you can link actions to the occurrence of an Exception Alarm. The exception type can be HDD Full, HDD Error, Network Disconnected, IP address Conflicted and Illegal Login to the camera.
Events 11.6 Intrusion Detection Events > Intrusion Detection What this tab is for The Intrusion detection function detects people, vehicles or other objects which enter and loiter in a predefined virtual region longer than the set duration. On the Intrusion Detection tab, you can enable and set up the function, and define the actions to be taken when the alarm is triggered.
Page 67
Events Click Stop Drawing. Drag the Threshold(s) slider to set the time threshold. Range: [0 s ~ 10 s]. This is the threshold for the duration of the object loitering in the region. If you set the value to 0, the alarm is triggered immediately after the object has entered the region.
Events 11.7 Line Crossing Detection Events > Line Crossing Detection What this tab is for The Line Crossing Detection function detects people, vehicles or other objects which cross a predefined virtual line. On the Line Crossing Detection tab, you can enable and set up the function, and define the actions to be taken when the alarm is triggered.
Page 69
Events Drag the Sensitivity slider to set the sensitivity of the detection. Range: [1-100]. The higher the value, the more easily the line crossing action can be detected. Click Save. To set the arming schedule On the Arming Schedule tab, drag your mouse pointer across the required day(s) to set the arming schedule.
Storage Before you configure recording and storage settings, make sure that a network storage device is available within the network or that an SD card is inserted in your camera. In This Chapter 12.1 HDD Management....................70 12.2 Record Schedule....................71 12.3 Capture......................
Storage Available storage Network disks added via the Net HDD tab or an SD card inserted into the camera will be available in the HDD Management table. You can see the capacity, free space, status type and property of each item. Up to eight NAS disks can be connected to the camera. If the status is Uninitialised you need to format the disk or card before you can use it.
Page 72
Storage Storage medium By default, the files of recordings and snapshots are stored on the SD card (if supported) or on a network disk. Network disks can be added via the Net HDD tab. On the HDD Management tab, you can initialise connected disks and the SD card. To set up scheduled recording Select Enable.
Storage 12.3 Capture Storage > Capture What this tab is for On the Capture tab, you can configure the settings for snapshot captures. Storage medium By default, the files of recordings and snapshots are stored on the SD card (if supported) or on a network disk.
Storage 12.4 Net HDD Storage > Net HDD What this tab is for On the Net HDD tab, you can configure and test the settings for Network Attached Storage (NAS). Before you continue The network disk should be available within the network and properly configured to store the recorded files, log files, etc.
Page 75
Storage ● Do not use complete words that can be found in a dictionary ● Use a random combination of at least two of the following categories: upper case letters, lower case letters, numbers and special characters Number of network disks You can connect up to eight network disks to the camera.
Index Live View..........20 Local configuration........31 802.1X..........42 Log............30 Log on to the camera......18 About this manual........5 Alarm Input........... 62 Mail............47 Alarm Output......... 64 Motion Detection........58 Authentication........34 NAT............44 Basic information........25 Net HDD..........74 Network..........37 Capture..........73 Compliance information......9 Picture Adjustment.........
Page 77
Index Video Tampering........61 Video/Audio........... 50...
Need help?
Do you have a question about the 1004 Series and is the answer not in the manual?
Questions and answers