Advertisement

Quick Links

GV-GPH2800
User's Manual
Before attempting to connect or operate this product,
please read these instructions carefully and save this manual for future use.
TPH-UM-A

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the GV-GPH2800 and is the answer not in the manual?

Questions and answers

Summary of Contents for GeoVision GV-GPH2800

  • Page 1 GV-GPH2800 User's Manual Before attempting to connect or operate this product, please read these instructions carefully and save this manual for future use. TPH-UM-A...
  • Page 2 GeoVision. Every effort has been made to ensure that the information in this manual is accurate. GeoVision, Inc. makes no expressed or implied warranty of any kind and assumes no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages arising from the use of the information or products contained herein.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1. Introduction ....................1 Safety Instruction ........................1 Privacy Protection ........................2 Disclaimer ..........................3 Cybersecurity Recommendations ..................3 Regulatory Information ......................4 Chapter 2. Introduction ....................7 Main Features ......................... 7 Connection ........................8 Chapter 3. Network Connection ..................9 LAN ..........................
  • Page 4 Network Configuration ....................54 TCP/IP ............................54 5.5.1 Port ..............................54 5.5.2 DDNS.............................. 55 5.5.3 5.5.4 SNMP ............................. 57 5.5.5 802.1x ............................. 58 RTSP .............................. 58 5.5.6 RTMP.............................. 59 5.5.7 UPNP .............................. 60 5.5.8 5.5.9 Email ............................... 60 5.5.10 FTP ..............................61 5.5.11 HTTP POST ..........................
  • Page 5: Chapter 1. Introduction

    Chapter 1. Introduction Safety Instruction About the Manual  Please read this user manual carefully to ensure that you can use the device correctly and safely.  Within the maximum scope permitted by the law, the products described in this Manual (including hardware, software, firmware, etc.) are provided “AS IS”.
  • Page 6: Privacy Protection

    ⚠ Warning: Wear anti-static gloves or discharge static electricity before installing the  camera. ⚠ Caution: Do not provide two power supply sources at the same time for the device  unless otherwise specified; it may result in device damage! Environment ...
  • Page 7: Disclaimer

     As the device user or data controller, you might collect the personal data of others, such as face, car plate number, etc. As a result, you shall implement reasonable and necessary measures to protect the legitimate rights and interests of other people, avoiding data leakage, improper use, including but not limited to, setting up access control, providing clear and visible notice to inform people of the existence of the surveillance area, providing required contact information and so on.
  • Page 8: Regulatory Information

     It is not recommended to expose the device to the public network. When it is necessary to be exposed to the public network, please set the external hardware firewall and the corresponding firewall policy.  It is not recommended to use the v1 and v2 functions of SNMP. ...
  • Page 9 FCC compliance This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 10 this manual refers to must be disposed of at designated collection points for proper recycling and environmental protection. REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization and Restriction of Chemicals, which aims to ensure a high level of protection of human health and the environment through better and earlier identification of the intrinsic properties of chemical substances.
  • Page 11: Chapter 2. Introduction

    Chapter 2. Introduction 2.1 Main Features  Max. resolution: 1920 ×1080  3D DNR, WDR, BLC, Defog, etc.  ROI coding  Face detection, line crossing/region intrusion/region entrance/region exiting (human/vehicle classification), video exception detection, heat map, target counting by line or area, etc. ...
  • Page 12: Connection

    2.2 Connection Rear panel 12 V Powering the camera Power the camera by adopting the two alternatives: Connect a DC 12 V power adapter to the camera. Connect two power wires (+, -) from the camera to the power output ports (12 V, GND) on the main body.
  • Page 13: Chapter 3. Network Connection

    Chapter 3. Network Connection System Requirement For proper operating the product, the following requirements should be met for your computer. Operating System: Windows 7 Home basic or higher CPU: 2.0GHz or higher RAM: 1G or higher Display: 1920*1080 resolution or higher (recommended) Web browser: IE (plug-in required)/ Firefox/Edge/Safari/Google Chrome It is recommended to use the latest version of these web browsers.
  • Page 14 Utility (V8.9.8 or later) is installed on the PC from our website. On GV-IP Device Utility window, click the button to search for the IP devices in the same LAN. Click the Name or Mac Address column to sort. Find the camera with its Mac Address, click on its IP address. For first-time users, you are requested to create a password.
  • Page 15: Directly Access Through Ie

    A login box will appear as the following. Please enter the user name (admin) and password. Then select the stream type and language as needed. Stream Type: The plug-in free live view only supports1080P or lower resolution. The security questions should be set after you click “Login” button. It is very important for you to reset your password.
  • Page 16 Subnet Mask: 255.255.255.0 Gateway: 192.168.226.1 HTTP: 80 Data port: 9008 Use the above default settings when logging in the device for the first time. Directly connect the device to the computer through network cable. Manually set the IP address of the PC and the network segment should be as the same as the default settings of the device.
  • Page 17: Wan

    Select “Properties” and then select internet protocol according to the actual situation (for example: IPv4). Next, click the “Properties” button to set the network of the PC. Open the IE browser and enter the default address of the device and confirm. Follow directions to download and install the plug-in.
  • Page 18 Go to the router’s management interface through IE browser to forward the IP address and port of the device in the “Virtual Server”. Open the IE browser and enter its WAN IP and http port to access. (for example, if the http port is changed to 81, please enter “192.198.1.201:81”...
  • Page 19 Go to Config →Network→DDNS menu. Before configuring the DDNS, please apply for a domain name first. Please refer to DDNS configuration for detail information. Open the IE browser and enter the domain name and http port to access. Access through static IP Network connection The setup steps are as follow: Go to Config→Network→Port menu to set the port number.
  • Page 20: Chapter 4. Live View

    Chapter 4. Live View After logging in the network camera web GUI successfully, user is allowed to view live video as follows. The following table is the instructions of the icons on the live view interface. Icon Description Icon Description Original size SD card recording indicator Fit correct scale...
  • Page 21 Those smart alarm indicators will flash only when the device supports those functions and the corresponding events are enabled. Plug-in free live view: Two-way audio and local recording are not supported and the preview mode switch (real-time/balanced/fluent mode) is not available too. In full screen mode, double click on the mouse to exit or press the ESC key on the keyboard.
  • Page 22 Move up or down to select the left menu by clicking . After selecting the desired menu, click to enter the sub-menu or confirm the selection. Select the right menu by clicking means that there are sub-menus. After it is selected, click to view the detailed menus.
  • Page 23: Chapter 5. Network Camera Configuration

    Chapter 5. Network Camera Configuration In the Webcam client, choose “Config” to go to the configuration interface. Note: Wherever applicable, click the “Save” button to save the settings. 5.1 System Configuration 5.1.1 Basic Information In the “Basic Information” interface, the system information of the device is listed. 5.1.2 Date and Time Go to Config→System→Date and Time.
  • Page 24: Local Config

    Note: The time zone of the device and the computer must be the same. It is recommended to modify the time zone of the device according to the time zone of the computer. If the time zone of the computer is modified, the current web client needs to be closed. Then re- open it and log in again.
  • Page 25: Storage

    5.1.4 Storage Go to Config→System→Storage to go to the interface as shown below. ⚫ SD Card Management Click the “Format” button to format the SD card. All data will be cleared by clicking this button. Click the “Eject” button to stop writing data to SD card. Then the SD card can be ejected safely.
  • Page 26 Set schedule recording. Check “Enable Schedule Record” and set the schedule. Weekly schedule Set the alarm time from Monday to Sunday for a single week. Each day is divided in one- hour increments. Green means scheduled. Blank means unscheduled. Add: Add the schedule for a special day. Drag the mouse to set the time on the timeline. Erase: Delete the schedule.
  • Page 27 ⚫ Snapshot Settings Go to Config→System→Storage→Snapshot to go to the interface as shown below. Set the format, resolution and quality of the image saved on the SD card and the snapshot interval and quantity and the timing snapshot here. Snapshot Quantity: The number you set here is the maximum quantity of snapshots. The actual quantity of snapshots may be less than this number.
  • Page 28: Image Configuration

    5.2 Image Configuration 5.2.1 Display Settings Go to Image→Display interface as shown below. The image’s brightness, contrast, hue and saturation and so on for common, day and night mode can be set up separately. The image effect can be quickly seen by switching the configuration file. Brightness: Set the brightness level of the camera’s image.
  • Page 29: Video / Audio Configuration

    Schedule Settings of Image Parameters: Click the “Profile Management” tab as shown below. Set full time schedule for common mode and specified time schedule for day and night. Choose “Timing” in the drop-down box of schedule as shown below. Drag “ ” icons to set the time of day and night. Blue means day time and blank means night time.
  • Page 30 pictures”. When a new scene begins in a video, until that scene ends, the entire group of frames (or pictures) can be considered as a group of pictures. If there is not much movement in the scene, setting the value higher than the frame rate is fine, potentially resulting in less bandwidth usage.
  • Page 31: Osd Configuration

    5.2.3 OSD Configuration Go to Image→OSD interface as shown below. Set time stamp, device name, OSD content and picture overlap here. After enabling the corresponding display and entering the content, drag them to change their position. Then click the “Save” button to save the settings. Picture Overlap Settings: Check “OSD Content1”, choose “Picture Overlay”...
  • Page 32: Roi Configuration

    To set up video mask: Enable video mask. Click the “Draw Area” button and then drag the mouse to draw the video mask area. Click the “Save” button to save the settings. Return to the live to verify that the area has been drawn as shown as blocked out in the image.
  • Page 33: Alarm Configuration

    5.3 Alarm Configuration 5.3.1 Motion Detection Go to Alarm→Motion Detection to set motion detection alarm. Check “Enable” check box to activate motion-based alarms. If unchecked, the camera will not send out any signals to trigger motion-based recording to the NVR or CMS, even if there is motion in the video.
  • Page 34: Exception Alarm

    Move the “Sensitivity” scroll bar to set the sensitivity. Higher sensitivity value means that motion will be triggered more easily. Select “Add” and click “Draw”. Drag the mouse to draw the motion detection area; Select “Erase” and drag the mouse to clear motion detection area. After that, click the “Save”...
  • Page 35 ⚫ SD Card Error When there are some errors in writing SD card, the corresponding alarms will be triggered. Go to Config→Alarm→Exception Alarm→SD Card Error as shown below. Click “Enable”. Set the alarm holding time and alarm trigger options. Trigger alarm out, Email and FTP.
  • Page 36: Alarm In

    5.3.3 Alarm In This function is only available for some models. To set sensor alarm (alarm in): Go to Config→Alarm→Alarm In interface as shown below. 1. Click “Enable” and set the alarm type, alarm holding time and sensor name. 2. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to 5.3.1 Motion Detection for details.
  • Page 37: Alarm Out

    5.3.4 Alarm Out This function is only available for some models. Go to Config→Alarm→Alarm Out. Alarm Out ID: The alarm out can be set respectively by selecting alarm out ID. Alarm Out Mode: Alarm linkage, manual operation and timing are optional. Alarm Linkage: Having selected this mode, select alarm out name, alarm holding time at the “Alarm Holding Time”...
  • Page 38: Alarm Server

    5.3.5 Alarm Server Go to Alarm→Alarm Server interface as shown below. Set the server address, port, heartbeat and heartbeat interval. When an alarm occurs, the device will transfer the alarm event to the alarm server. If an alarm server is not needed, there is no need to configure this section.
  • Page 39: Event Configuration

    5.4 Event Configuration For more accuracy, here are some recommendations for installation. Cameras should be installed on stable surfaces, as vibrations can affect the accuracy ⚫ of detection. Avoid pointing the camera at the reflective surfaces (like shiny floors, mirrors, glass, ⚫...
  • Page 40 Duration of Delay: It is the alarm delay time of the object left in the region (ranging from 10~3600s) or the alarm delay time of the object removed from the region (ranging from 3~3600s). For example, if “Enable Abandoned Object Detection” is selected and the duration of delay is set as 10, alarms will be triggered after the object is left and stay in the region for 10s, but when someone takes away the object within 10s, alarms will not be triggered.
  • Page 41: Video Exception

    5.4.2 Video Exception This function can detect changes in the surveillance environment affected by the external factors. To set exception detection: Go to Config→Event→Video Exception interface as shown below. 1. Enable the applicable detection that’s desired. Scene Change Detection: Alarms will be triggered if the scene of the monitor video has changed.
  • Page 42: Line Crossing

    The sensitivity value of Scene Change Detection: The higher the value is, the more sensitive the system responds to the amplitude of the scene change. The sensitivity value of Video Blur Detection: The higher the value is, the more sensitive the system responds to the blurriness of the image. The sensitivity value of Abnormal Color Detection: The higher the value is, the more sensitive the system responds to the color shift of the image.
  • Page 43 Detection Target: Human: Select it and then alarms will be triggered if someone crosses the pre-defined alarm lines. Motor Vehicle: Select it and then alarms will be triggered if a vehicle with four or more wheels (eg. a car, bus or truck) crosses the pre-defined alarm lines. Motorcycle/Bicycle: Select it and then alarms will be triggered if a vehicle with two wheels (eg.
  • Page 44 3. Cameras should be mounted at a height of 2.8 meters or above. 4. Keep the mounting angle of the camera at about 45°. 5. The detected objects should not be less than 1% of the entire image and the largest sizes of the detected objects should not be more than 1/8 of the entire image.
  • Page 45: Region Intrusion

    5.4.4 Region Intrusion Region Intrusion: Alarms will be triggered if the target intrudes into the pre-defined areas. This function can be applicable to important supervision places, danger areas and prohibited areas, like military administrative zones, high danger areas, no man’s areas, etc. Go to Config→Event→Region Intrusion interface as shown below.
  • Page 46 refer to 5.3.1 Motion Detection for details. 4. Click the “Save” button to save the settings. 5. Set the alarm area of the region intrusion detection. Click the “Area” tab to go to the interface as shown below. Set the alarm area number on the right side. Up to 4 alarm areas can be added. Click the “Draw Area”...
  • Page 47: Region Entrance

    5.4.5 Region Entrance Region Entrance: Alarms will be triggered if the target enters the pre-defined areas. Go to Config→Event→Region Entrance interface. 1. Enable region entrance detection and select the snapshot type and the detection target. 2. Set the alarm holding time and alarm trigger options. 3.
  • Page 48: Target Counting By Line

    5.4.7 Target Counting by Line This function is to calculate the number of the people or vehicles crossing the alarm line through detecting, tracking and counting the shapes of the people or vehicles. 1. Go to Config→Event→Target Counting by Line as shown below. 2.
  • Page 49 4. Set the alarm line. Click the “Area” tab to go to the interface as shown below. Set the alarm line number and direction. Only one alarm line can be added. Direction: A->B and A<-B can be optional. The direction of the arrow is entrance. Statistics: If enabled, you can see the statistical information in the live view interface.
  • Page 50 7. View the statistical information of target counting by line. Click “Statistics” to enter the following interface. Select the report type. Daily report, weekly report, monthly report and annual report are selectable. Select the count type. Enter or leave can be optional. Select the start time and then click “Count”.
  • Page 51: Target Counting By Area

    5.4.8 Target Counting by Area This function is to calculate the number of the people or vehicles intruding into the pre- defined area through detecting, tracking and counting the shapes of the people or vehicles. 1. Go to Config→Event→Target Counting by Area as shown below. 2.
  • Page 52 4. Set the schedule of the target counting by area. The setup steps of the schedule are the same as schedule recording setup (See Schedule Recording Settings). 5. View the statistical information in the live view interface. 6. View the statistical information of target counting by area. Click Statistics→Target Counting by Area to enter the following interface.
  • Page 53: Face Detection

    5.4.9 Face Detection Face detection function is to detect the face appearing in the surveillance scene. Alarms will be triggered when a face is detected. The setting steps are as follows: 1. Go to Config→Event→Face Detection as shown below. 2. Enable the face detection function. Save Source Information to SD Card: if checked, the whole picture will be saved to the local PC or SD card when detecting a face.
  • Page 54 Trigger alarm condition: all or mask off can be selectable. All: Alarms will be triggered when the camera detects a face (with/without a mask). Mask off: Alarms will be triggered when the detected person is not wearing a mask on the face.
  • Page 55 Face Capture View After enabling face detection function, return to the live view interface. Click to go to the following interface. When there are faces detected, the face pictures will be listed on the right. The features of captured faces also can be displayed, such as gender, whether to wear a mask, whether to wear glasses, age group, etc.
  • Page 56: Heat Map

    5.4.10 Heat Map Heat Map is to display the flow distribution of people/vehicles in pre-defined areas by different colors. 1. Enable Heat Map, set snapshot type and detection target type as needed. 2. Set heat map display area. Up to 4 areas can be set. Click the “Draw Area”...
  • Page 57 Click “Count” to view the heat map as shown below. The default heat map is people flow data display. Click “Motor Vehicle” or “Non-motor Vehicle” to view the corresponding data.
  • Page 58: Network Configuration

    5.5 Network Configuration 5.5.1 TCP/IP Go to Config→Network→TCP/IP interface as shown below. There are two ways for network connection. Use IP address (take IPv4 for example)-There are two options for IP setup: obtain an IP address automatically by DHCP and use the following IP address. Please choose one of the options as needed.
  • Page 59: Ddns

    port can be set. HTTP Port: The default HTTP port is 80. It can be changed to any port which is not occupied. HTTPS Port: The default HTTPs port is 443. It can be changed to any port which is not occupied.
  • Page 60 Create domain name. After the domain name is successfully applied for, the domain name will be listed as below.
  • Page 61: Snmp

    3. Enter the username, password, domain you apply for in the DDNS configuration interface. 4. Click the “Save” button to save the settings. 5.5.4 SNMP To get camera status, parameters and alarm information and remotely manage the camera, the SNMP function can be used. Before using SNMP, please install an SNMP management tool and set the parameters of the SNMP, such as SNMP port, trap address.
  • Page 62: 802.1X

    3. Set the values for “Read SNMP Community”, “Write SNMP Community”, “Trap Address”, “Trap Port” and so on. Please make sure the settings are the same as that of the SNMP software. Note: Please use the different version in accordance with the security level you required. The higher the version is, the higher the level of the security is.
  • Page 63: Rtmp

    RTSP Address: The RTSP address (unicast) format that can be used to play the stream in a media player. Multicast Address Main stream: The address format is “rtsp://IP address: rtsp port/profile1?transportmode=mcast”. Sub stream: The address format is “rtsp://IP address: rtsp port/profile2?transportmode=mcast”. Third stream: The address format is “rtsp://IP address: rtsp port/profile3?transportmode=mcast”.
  • Page 64: Upnp

    Check “Enable”, select stream type, set the reconnection time after timeout and server address as needed. Server address: Enter the server address allocated by the third-party server. After that, click “Save” to save the settings. Then click “Refresh” to view the connection status.
  • Page 65: Ftp

    SMTP Port: The SMTP port. Send Interval(S): The time interval of sending email. For example, if it is set to 60 seconds and multiple motion detection alarms are triggered within 60 seconds, they will be considered as only one alarm event and only one email will be sent. If one motion alarm event is triggered and then another motion detection alarm event is triggered after 60 seconds, two emails will be sent.
  • Page 66 3. In the event setting interface (like intrusion, line crossing, etc.), trigger FTP as shown below. Rule of FTP storage path: /device MAC address/event type/date/time/ For example: a face detection alarm occurs FTP file path: \00-18-ae-a8-da-2a\VFD\2021-01-09\14\ Event name table: File Name Event Type IP address change MOTION...
  • Page 67: Http Post

    5.5.11 HTTP POST Go to Config→Network →HTTP POST interface. Check “Enable”, select protocol type and then set the server address (IP address/domain name), server port and heartbeat interval. Server address: the IP address/domain name of the third-party platform. Server port: the server port of the third-party platform. After the above parameters are set, click “Save”...
  • Page 68 A private certificate can be created if users don’t want to use the default one. Click “Delete” to cancel the default certificate. Then the following interface will be displayed. * If there is a signed certificate, click “Browse” to select it and then click “Install” to install it. * Click “Create a private certificate”...
  • Page 69: Qos

    5.5.13 QoS (Quality of Service) function is used to provide different quality of services for different network applications. With the deficient bandwidth, the router or switch will sort the data streams and transfer them according to their priority to solve the network delay and network congestion by using this function.
  • Page 70: Security Configuration

    5.6 Security Configuration 5.6.1 User Configuration Go to Config→Security→User interface as shown below. Add user: 1. Click the “Add” button to pop up the following textbox. 2. Enter user name in the “User Name” textbox. 3. Enter the password in the “Password” and “Confirm Password” textbox. Please set the password according to the requirement of the password security level (Go to Config→Security→Security Management→Password Security interface to set the security level).
  • Page 71 Modify user: 1. Select a user to modify password if necessary, in the user configuration list box. 2. The “Edit user” dialog box pops up by clicking the “Modify” button. 3. Enter the old password of the user in the “Old Password” text box. 4.
  • Page 72: Online User

    5.6.2 Online User Go to Config→Security→Online User to view the user who is viewing the live video. An administrator user can kick out all the other users (including other administrators). 5.6.3 Block and Allow Lists Go to Config→Security→Block and Allow Lists as shown below. The setup steps are as follows: Check the “Enable address filtering”...
  • Page 73 ⚫ Password Security Please set the password level and expiration time as needed. Password Level: Weak, Medium or Strong. Weak level: Numbers, special characters, upper or lower case letters can be used. You can choose one of them or any combination of them when setting the password. Medium Level: 8~16 characters, including at least two of the following categories: numbers, special characters, upper case letters and lower case letters.
  • Page 74: Maintenance Configuration

    5.7 Maintenance Configuration 5.7.1 Backup and Restore Go to Config→Maintenance→Backup & Restore. Import & Export Settings ⚫ Configuration settings of the device can be exported form a device into another device. 1. Click “Browse” to select the save path for import or export information on the PC. 2.
  • Page 75: Reboot

    5.7.2 Reboot Go to Config→Maintenance→Reboot. Click the “Reboot” button and then enter the password to reboot the device. Timed Reboot Setting: If necessary, the device can be set up to reboot on a time interval. Enable “Time Settings”, set the date and time, click the “Save” button and then enter the password to save the settings.
  • Page 76 5.7.3.2 Upgrading the Firmware Using GV-IP Device Utility Optionally use GV-IP Device Utility (V8.9.8 or later) to upgrade the firmware. Note that the computer used to upgrade firmware must be under the same network as the camera. Make sure the PC and the camera are connected to the LAN, and GV-IP Device Utility (V8.9.8 or later) is installed on the PC from our website.
  • Page 77: Operation Log

    5.7.4 Operation Log To query and export log: 1. Go to Config→Maintenance→Operation Log. 2. Select the main type, sub type, start and end time. 3. Click “Search” to view the operation log. 4. Click “Export” to export the operation log.
  • Page 78: Chapter 6. Search

    Chapter 6. Search 6.1 Image Search Click Search to go to the interface as shown below. Images that are saved on the SD card can be found here. Note: When using the plug-in free browser, the local images cannot be searched. ⚫...
  • Page 79 2. Set time: Select date and choose the start and end time. 3. Choose the alarm events at the bottom of the interface. 4. Click to search the images. 5. Double click a file name in the list to view the captured photos. Click to return to the previous interface.
  • Page 80 The descriptions of the buttons are shown as follows. Icon Description Icon Description Close: Select an image and click Close all: Click this button this button to close the image. to close all images. Save all: Click this button to Save: Click this button to select the select the path for saving all path for saving the image on the PC.
  • Page 81: Video Search

    6.2 Video Search 6.2.1 Local Video Search Click Search to go to the interface as shown below. Videos were recorded locally to the PC can be played in this interface. Note: When using the plug-in free browser, the local videos cannot be searched. 1.
  • Page 82: Sd Card Video Search

    Icon Description Icon Description Play button. After pausing the video, click Pause button this button to continue playing. Stop button Speed down Watermark Speed up display Enable / disable audio; drag the slider to adjust the volume after enabling audio. 6.2.2 SD Card Video Search Click Search to go to the interface as shown below.
  • Page 83 6. Double click on a file name in the list to start playback. Note: cannot be displayed in the above interface via the plug-in free browser. For plug-in free playback, playback mode switch (balanced/real-time/fluent mode) and downloading functions are not supported too. For the fluent playback, it is recommended to use the plug-in required browser to play the recorded file whose resolution exceeds 2MP.
  • Page 84: Appendix

    Appendix Troubleshooting How to find the password? A: The password for admin can be reset through “Edit Safety Question” function. Click “Forget Password?” on the login page and enter the corresponding answer of the selected question in the popup window. After you correctly answer all questions, you can reset the password for admin.
  • Page 85 B. Other plug-ins or anti-virus blocks the plug-in. Please uninstall or close them. No sound can be heard. A: Audio input device is not connected. Please connect and try again. B: Audio function is not enabled at the corresponding channel. Please enable this function.

Table of Contents