Content 1.1 Activate Your Device ......................2 1.1.1 Default User and IP Address ..................2 1.1.2 Activate via IP-FINDER....................2 1.1.3 Activate Camera via SCMS-VMS ................. 3 1.1.4 Activate Device via Web Browser ................4 1.2 Access Camera ........................5 1.2.1 Access Camera via Web Browser ................
Page 4
2.8.12 Metadata ......................... 68 2.8.13 Time and Date ......................68 2.8.14 Set RS-485 ....................... 70 2.8.15 Set RS-232 ....................... 70 2.8.16 Power Consumption Mode ..................71 2.8.17 External Device ....................... 71 2.8.18 Security........................72 2.8.19 Certificate Management ..................76 2.8.20 User and Account ....................78 2.9 VCA Resource ........................
Page 5
1 Introduction Thank you for purchasing a GRUNDIG product. Before installing or connecting the product, please read first the following documents which you can find in the product package: - Legal Disclaimer - Safety Instructions - Installation Manual for the respective product model Further information about the product like Data Sheets, CE Documents, etc.
1.1 Activate Your Device For the first-time access, you need to activate the device by setting an admin password. No operation is allowed before activation. You can also activate the device via Web Browser, Grundig IP-Finder or Client Software. 1.1.1 Default User and IP Address ●...
SCMS is a PC client to manage and operate your devices. Camera activation is supported by the software. Before You Start Get the client software from the official website www.grundig-security.com. Install the software following the prompts. The camera and the PC that runs the software should be in the same subnet.
Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Page 10
Figure 1-3 Login Window Steps 1. Open the web browser. Note For some web browsers, a plug-in is required. For detailed requirements, see Plug-in Installation. 2. Input IP address of the camera to enter the login interface. 3. Input user name and password. Note Illegal login lock is activated by default.
Page 11
Operating System Web Browser Operation ● Internet Explorer 8+ ● Google Chrome 57 and earlier version Follow pop-up prompts to ● Mozilla Firefox 52 and complete plug-in installation. earlier version Windows ● Google Chrome 57+ Click ● Mozilla Firefox 52+ download and install plug-in.
→ User Management, click Account Security Settings, select the security question and input your answer. You can click Forget Password and answer the security question to reset the admin password when access the device via browser. Email You can set the account security during the activation. Or you can go to Configuration → System →...
Page 13
2. Start the application and register for an SCMS user account. 3. Log in after registration. 4. In the app, tap "+" on the upper-right corner and then scan the QR code of the camera to add the camera. You can find the QR code on the camera or on the cover of the Quick Start Guide of the camera in the package.
2 Network Camera Configuration 2.1 System Requirement Your computer should meet the requirements for proper visiting and operating the product. Operating System Microsoft Windows XP SP1 and above version 2.0 GHz or higher 1G or higher Display 1024×768 resolution or higher Web Browser For the details, see Plug-in Installation 2.2 Live View...
Page 15
Select the Third-Party Plug-in When the live view cannot display via certain browsers, you can change the plug-in for live view according to the browser. Steps 1. Click Live View. 2. Click to select the plug-in. When you access the device via Internet Explorer, you can select Webcomponents or QuickTime. When you access the device via the other browsers, you can select Webcomponents, QuickTime, VLC or MJPEG.
Page 16
Click to focus automatically. Note ● If the device cannot focus with auxiliary focus, you can use Lens Initialization, then use auxiliary focus again to make the image clear. ● If auxiliary focus cannot help the device focus clearly, you can use manual focus. Lens Initialization Lens initialization is used on the device equipped with motorized lens.
PTZ Speed Slide to adjust the speed of the pan/tilt movement. Iris ● When the image is too dark, click to enlarge the iris. ● When the image is too bright, click to stop down the iris. PTZ Lock PTZ lock means to disable the zoom, focus and PTZ rotation functions of the corresponding channel, so that to reduce the target missing caused by PTZ adjustment.
MULTICAST MULTICAST is suitable for the situation that there are multiple clients. You should set the multicast address for them before selection. Note For detailed information about multicast, refer to Multicast. HTTP HTTP is suitable for the situation that the third-party needs to get the stream from the device.
exceed the values you set on Video page. Go to Configuration → Video/Audio → Video, set the Resolution and Max. Bitrate before you enable smooth streaming function. In this mode, the frame rate will be adjusted to the maximum value automatically. Resolution Priority The resolution stays the same as the set value on Video page, and the bitrate will be adjusted automatically.
Page 20
Stream Type For device supports more than one stream, you can specify parameters for each stream type. Main Stream The stream stands for the best stream performance the device supports. It usually offers the best resolution and frame rate the device can do. But high resolution and frame rate usually means larger storage space and higher bandwidth requirements in transmission.
Page 21
Resolution Select video resolution according to actual needs. Higher resolution requires higher bandwidth and storage. Bitrate Type and Max. Bitrate Constant Bitrate It means that the stream is compressed and transmitted at a comparatively fixed bitrate. The compression speed is fast, but mosaic may occur on the image. Variable Bitrate It means that the device automatically adjusts the bitrate under the set Max.
Page 22
H.264+ H.264+ is an improved compression coding technology based on H.264. By enabling H.264+, you can estimate the HDD consumption by its maximum average bitrate. Compared to H.264, H.264+ reduces storage by up to 50% with the same maximum bitrate in most scenes. When H.264+ is enabled, Max.
bitstream that contains one or more subset bitstreams that can themselves be decoded with a complexity and reconstruction quality similar to that achieved using the existing H.264 or H.265 design with the same quantity of data as in the subset bitstream. The subset bitstream is derived by dropping packets from the larger bitstream.
4. Select Region No. in Fixed Region to draw ROI region. 1) Click Draw Area. 2) Click and drag the mouse on the view screen to draw the fixed region. 3) Click Stop Drawing. Note Select the fixed region that needs to be adjusted and drag the mouse to adjust its position. 5.
Audio Input Note ● Connect the audio input device as required. ● The audio input display varies with the device models. Set Audio Input to LineIn when the device connects to the LineIn audio input device with the high output power, such as MP3, synthesizer or active pickup.
2.3.6 Display Settings It offers the parameter settings to adjust image features. Go to Configuration → Image → Display Settings. Click Default to restore settings. Scene Mode There are several sets of image parameters predefined for different installation environments. Select a scene according to the actual installation environment to speed up the display settings. Image Adjustment By adjusting the Brightness, Saturation, Hue, Contrast &...
Page 27
Day/Night Switch Day/Night Switch function can provide color images in the day mode and turn on fill light in the night mode. Switch mode is configurable. The image is always in color. Night The image is black/white or colorful and the supplement light will be enabled to ensure clear live view image at night.
Page 28
If you focus on an object against strong backlight, the object will be too dark to be seen clearly. BLC (backlight compensation) compensates light to the object in the front to make it clear. If BLC mode is set as Custom, you can draw a red rectangle on the live view image as the BLC area. The WDR (Wide Dynamic Range) function helps the camera provide clear images in environment with strong illumination differences.
Page 29
Figure 2-3 White Balance Digital Noise Reduction is used to reduce the image noise and improve the image quality. Normal and Expert modes are selectable. Normal Set the DNR level to control the noise reduction degree. The higher level means stronger reduction degree.
Page 30
Figure 2-5 Defog Increase the stability of video image by using jitter compensation technology. Mirror When the live view image is the reverse of the actual scene, this function helps to display the image normally. Select the mirror mode as needed. Note The video recording will be shortly interrupted when the function is enabled.
scan lines. In PAL, 25 frames are transmitted each second. Each frame is made up of 625 individual scan lines. Select video signal standard according to the video system in your country/region. Local Video Output If the device is equipped with video output interfaces, such as BNC, CVBS, HDMI, and SDI, you can preview the live image directly by connecting the device to a monitor screen.
Drag the area Adjust the position of the area. Click Clear All Clear all the areas you set. 4. Click Stop Drawing. 5. Click Save. 2.3.9 Overlay Picture Overlay a customized picture on live view. Before You Start The picture to overlay has to be in BMP format with 24-bit, and the maximum picture size is 128 × 128 pixel.
2.4 Video Recording and Picture Capture This part introduces the operations of capturing video clips and snapshots, playback, and downloading captured files. 2.4.1 Storage Settings This part introduces the configuration of several common storage paths. Set Memory Card If you choose to store the files to memory card, make sure you insert and format the memory card in advance.
Page 34
and damaged. You will receive a notification if the health status is anything other than good when the Arming Schedule and Linkage Method are set. Note It is recommended that you change the memory card when the health status is not "good". 3.
Page 35
Server Address and Port The FTP server address and corresponding port. User Name and Password The FTP user should have the permission to upload pictures. If the FTP server supports picture uploading by anonymous users, you can check Anonymous to hide your device information during uploading. Directory Structure The saving path of snapshots in the FTP server.
Page 36
Mounting Type Select file system protocol according to the operation system. Enter user name and password of the net HDD to guarantee the security if SMB/CIFS is selected. 3. Click Test to check whether the network disk is available. 4. Click Save. eMMC Protection It is to automatically stop the use of eMMC as a storage media when its health status is poor.
User Name and The user name and password of the cloud video manager. Password Picture Storage Pool The ID of the picture storage region in the cloud video manager. Make sure storage pool ID and the storage region ID are the same. 4.
Page 38
Video is recorded only when motion is detected and alarm signal is received from the external alarm input device. Event The video is recorded when configured event is detected. 4. Set schedule for the selected record type. Refer to Set Arming Schedule for the setting operation.
Steps 1. Go to Configuration → Storage → Storage Management → Lite Storage. 2. Check Enable and set the level. The higher the level is, the larger the frame rate and bitrate are, and the shorter the recommended storage time is. 3.
Page 40
Capture Automatically This function can capture pictures automatically during configured time periods. Before You Start If event-triggered capture is required, you should configure related linkage methods in event settings. Refer to Event and Alarm for event settings. Steps 1. Go to Configuration → Storage → Schedule Settings → Capture → Capture Parameters. 2.
1. Go to Configuration → System → System Settings → Power Consumption Mode, under Sleep Schedule, click the time schedule to set Sleep Capture Interval. 2. Enter Configuration → Event → Basic Event → Timing Wake. 3. Check Enable. 4. Select Capture Types. 5.
Page 42
– For the information about expert mode, see Expert Mode. 5. Set the arming schedule and linkage methods. For the information about arming schedule settings, see Set Arming Schedule. For the information about linkage methods, see Linkage Method Settings. 6. Click Save. Expert Mode You can configure different motion detection parameters for day and night according to the actual needs.
Page 43
Stop Drawing Finish drawing one area. Clear All Delete all the areas. 4. Click Save. 5. Optional: Repeat above steps to set multiple areas. Normal Mode You can set motion detection parameters according to the device default parameters. Steps 1. Select normal mode in Configuration. 2.
Page 44
Figure 2-7 Set Video Tampering Area 5. Refer to Set Arming Schedule for setting scheduled time. Refer to Linkage Method Settings for setting linkage method. 6. Click Save. Set PIR Alarm A PIR (Passive Infrared) alarm is triggered when an intruder moves within the detector's field of view.
Page 45
HDD Full The HDD storage is full. HDD Error Error occurs in HDD. Network The device is offline. Disconnected IP Address Conflicted The IP address of current device is same as that of other device in the network. Illegal Login Incorrect user name or password is entered.
Alarm Delay Times The device uploads the alarm when the alarm reaches the set number of times. 4. Check Enable, and the selected diagnosis type will be detected. 5. Set arming schedule. See Set Arming Schedule. 6. Set linkage method. See Linkage Method Settings. 7.
Page 47
Audio Loss Detection Detect sudden loss of audio track. Sudden Increase of Sound Intensity Detection Detect sudden increase of sound intensity. Sensitivity and Sound Intensity Threshold are configurable. Note ● The lower the sensitivity is, the more significant the change should be to trigger the detection.
Page 48
Steps 1. Go to Configuration → Event → Smart Event → Scene Change Detection. 2. Click Enable. 3. Set the Sensitivity. The higher the value is, the more easily the change of scene can be detected. But the detection accuracy is reduced. 4.
Page 49
Before You Start ● For certain device models, you need to enable the smart event function on VCA Resource page first. Steps 1. Go to VCA → Smart Event → Intrusion Detection. For certain device models, you should go to Configuration →...
Page 50
Set Line Crossing Detection It is used to detect objects crossing a predefined virtual line. If it occurs, the device can take linkage actions. Before You Start ● For certain device models, you need to enable the smart event function on VCA Resource page first.
Page 51
Figure 2-9 Set Rule 6. Optional: You can set the parameters of multiple areas by repeating the above steps. 7. For the arming schedule settings, refer to Set Arming Schedule. For the linkage method settings, refer to Linkage Method Settings. 8.
Page 52
targets will be reported, including the human and vehicle. Target Validity If you set a higher validity, the required target features should be more obvious, and the alarm accuracy would be higher. The target with less obvious features would be missing. Figure 2-10 Set Rule 6.
Page 53
Sensitivity It stands for the percentage of the body part of an acceptable target that goes across the predefined region. Sensitivity = 100 - S1/ST × 100. S1 stands for the target body part that goes across the predefined region. ST stands for the complete target body. The higher the value of sensitivity is, the more easily the alarm can be triggered.
Page 54
acceptable target that enters the pre-defined region. Sensitivity = 100 - S1/ST × 100. S1 stands for the target body part that goes across the pre-defined region. ST stands for the complete target body. The higher the value of sensitivity is, the more easily the alarm can be triggered.
Page 55
Sensitivity It stands for the percentage of the body part of an acceptable target that leaves the pre-defined region. Sensitivity = 100 – S1/ST*100 S1 stands for the target body part that leaves the pre-defined region. ST stands for the complete target body. Example: If you set the value as 60, a target is possible to be counted as a removed object only when 40 percent body part of the target leaves the region.
2.6 Network Settings 2.6.1 TCP/IP TCP/IP settings must be properly configured before you operate the device over network. IPv4 and IPv6 are both supported. Both versions can be configured simultaneously without conflicting to each other. Go to Configuration → Network → Basic Settings → TCP/IP for parameter settings. NIC Type Select a NIC (Network Interface Card) type according to your network condition.
It stands for maximum transmission unit. It is the size of the largest protocol data unit that can be communicated in a single network layer transaction. The valid value range of MTU is 1280 to 1500. It stands for domain name server. It is required if you need to visit the device with domain name.
Before You Start Before setting the SNMP, you should download the SNMP software and manage to receive the device information via SNMP port. Steps 1. Go to Configuration → Network → Advanced Settings → SNMP. 2. Check Enable SNMP v1, Enable SNMP v2c or Enable SNMP v3. Note The SNMP version you select should be the same as that of the SNMP software.
Page 59
Auto Port Mapping Refer to Set Auto Port Mapping for detailed information. Manual Port Refer to Set Manual Port Mapping for detailed information. Mapping 3. Click Save. Set Auto Port Mapping Steps 1. Check Enable UPnP™, and choose a friendly name for the camera, or you can use the default name.
Example When the cameras are connected to the same router, you can configure the ports of a camera as 80, 8000, and 554 with IP address 192.168.1.23, and the ports of another camera as 81, 8001, 555, 8201 with IP 192.168.1.24. Figure 2-13 Port Mapping on Router Note The port of the network camera cannot conflict with other ports.
HTTPS Port It refers to the port through which the browser accesses the device with certificate. Certificate verification is required to ensure the secure access. RTSP Port It refers to the port of real-time streaming protocol. SRTP Port It refers to the port of secure real-time transport protocol. Server Port It refers to the port through which the client adds the device.
NO-IP NO-IP server is used for domain name resolution. 4. Input the domain name information, and click Save. 5. Check the device ports and complete port mapping. Refer to Port to check the device port , and refer to Port Mapping for port mapping settings. 6.
Note The obtained IP address is dynamically assigned via PPPoE, so the IP address always changes after rebooting the camera. To solve the inconvenience of the dynamic IP, you need to get a domain name from the DDNS provider (e.g. DynDns.com). Refer to Access to Device via Domain Name for detail information.
TLS (Transport Layer Security) The device offers TLS1.1, TLS1.2 and TLS1.3. Enable one or more protocol versions according to your need. Bonjour Uncheck to disable the protocol. 3. Click Save. 2.6.9 Set Open Network Video Interface If you need to access the device through Open Network Video Interface protocol, you can configure the user settings to enhance the network security.
2. Enter Destination IP or Host Name, URL, and Port. 3. Optional: Check Enable to enable ANR. 4. Select Protocol. Note HTTP, HTTPS, and ISUP are selectable. It is recommended to use HTTPS, as it encrypts the data transmission during communication. 5.
Page 66
Steps Note This function is only supported by certain models. 1. Go to Configuration → Event → Basic Event → Alarm Output. 2. Set alarm output parameters. Automatic Alarm For the information about the configuration, see Automatic Alarm. Manual Alarm For the information about the configuration, see Manual Alarm.
Page 67
2. Set the alarming schedule. For the information about the settings, see Set Arming Schedule. 3. Click Copy to… to copy the parameters to other alarm output channels. 4. Click Save. FTP/NAS/Memory Card Uploading If you have enabled and configured the FTP/NAS/memory card uploading, the device sends the alarm information to the FTP server, network attached storage and memory card when an alarm is triggered.
Page 68
Note If you want to use STARTTLS, make sure that the protocol is supported by your email server. If you check the Enable STARTTLS while the protocol is not supported by your email sever, your email is sent with no encryption. 4) Optional: If you want to receive notification with alarm pictures, check Attached Image.
4. Click Save. Note Only certain camera models support the function. Audible Warning After enabling Audible Warning and setting Audible Alarm Output, the built-in speaker of the device or connected external speaker plays warning sounds when an alarm happens. For audible alarm output settings, refer to Set Audible Alarm Output. Note The function is only supported by certain camera models.
2.8.1 View Device Information You can view device information, such as Device No., Model, Serial No. and Firmware Version. Enter Configuration → System → System Settings → Basic Information to view the device information. 2.8.2 Search and Manage Log Log helps locate and troubleshoot problems. Steps 1.
2.8.7 Restore and Default Restore and Default helps restore the device parameters to the default settings. Steps 1. Go to Configuration → System → Maintenance → Upgrade & Maintenance. 2. Click Restore or Default according to your needs. Restore Reset device parameters, except user information, IP parameters and video format to the default settings.
Note This function is only available for Administrator. Warning After enabling auto maintenance, the device will automatically restart according to the maintenance plan. The device cannot record video during the restarting process. 2.8.10 View Open Source Software License Go to Configuration → System → System Settings → About Device, and click View Licenses. 2.8.11 Wiegand Note This function is only supported by certain camera models.
Page 73
Synchronize Time Manually Steps 1. Go to Configuration → System → System Settings → Time Settings. 2. Select Time Zone. 3. Click Manual Time Sync.. 4. Choose one time synchronization method. – Select Set Time, and manually input or select date and time from the pop-up calendar. Check Sync.
Set DST If the region where the device is located adopts Daylight Saving Time (DST), you can set this function. Steps 1. Go to Configuration → System → System Settings → DST. 2. Check Enable DST. 3. Select Start Time, End Time and DST Bias. 4.
2.8.16 Power Consumption Mode It is used to switch the power consumption when the device is working. Note The function is only supported by certain camera models. Go to Configuration → Proactive Mode → Power Consumption Mode, select the desired power consumption mode.
When the device supports supplement light, you can select supplement light mode. IR Mode IR light is enabled. White Light Mode White light is enabled. Mix Mode Both IR light and white light are enabled. Supplement light is disabled. Brightness Adjustment Mode Auto The brightness adjusts according to the actual environment automatically.
Page 77
digest algorithm except for MD5, the third-party platform might not be able to log in to the device or enable live view because of compatibility. The encrypted algorithm with high strength is recommended. WEB Authentication Digest and digest/basic are supported, which means authentication information is needed when WEB request is sent to the device.
Page 78
Steps 1. Go to Configuration → Network → Advanced Settings → HTTPS. 2. Check Enable to access the camera via HTTP or HTTPS protocol. 3. Check Enable HTTPS Browsing to access the camera only via HTTPS protocol. 4. Select the Server Certificate. 5.
Page 79
EAP-TLS If you use EAP-TLS, input Identify, Private Key Password, and upload CA Certificate, User Certificate and Private Key. EAPOL Version The EAPOL version must be identical with that of the router or the switch. Control Timeout Settings If this function is enabled, you will be logged out when you make no operation (not including viewing live image) to the device via web browser within the set timeout period.
Caution Use the function with caution. The security risk of device internal information leakage exists when the function is enabled. 2.8.19 Certificate Management It helps to manage the server/client certificates and CA certificate, and to send an alarm if the certificates are close to expiry date, or are expired/abnormal.
Page 81
4. Click Browser to select the desired server/client certificate. 5. Select the desired import method and enter the required information. 6. Click OK. 7. Optional: Click Export to export the certificate, or click Delete to delete the certificate to recreate a certificate, or click Certificate Properties to view the certificate details. Note ●...
Enable Certificate Expiration Alarm Steps 1. Check Enable Certificate Expiration Alarm. If enabled, you will receive an email or the camera links to the surveillance center that the certificate will expire soon, or is expired or abnormal. 2. Set the Remind Me Before Expiration (day), Alarm Frequency (day) and Detection Time (hour). Note ●...
creating accounts. Modify Select a user and click Modify to change the password and permission. Delete Select a user and click Delete. Note The administrator can add up to 31 user accounts. 3. Click OK. Simultaneous Login The administrator can set the maximum number of users logging into the system through web browser simultaneously.
2.9.2 Road Traffic Vehicle Detection and Mixed-traffic Detection are available for the road traffic monitoring. The device captures the passing motor vehicles and non-motor vehicles and uploads the relevant information together with the captured pictures. Note ● For certain device models, you need to select Road Traffic on VCA Resource page first. ●...
Page 85
Note When Alarm Input is selected, the alarm input A<-1 will automatically be assigned to trigger vehicle detection and its alarm type is always NO. If the A<-1 alarm input is used to trigger vehicle detection, it cannot be used for other basic events. When Alarm Input is selected and saved, previously configured linkage method for A<-1 will be canceled.
Page 86
Note Up to 8 license plates are supported. 8. Set arming schedule and linkage method. For the arming schedule settings, refer to Set Arming Schedule. For the linkage method settings, refer to Linkage Method Settings. 9. Click Save. Uploading Pictures Settings You can set the image parameters of the captured images in vehicle detection and mixed-traffic detection.
Note The file to import should corresponds with the file template that is required by the camera. You are recommended to export an empty blocklist & allowlist file from the camera as the template and fill in the content. The file should be in the .xls format and the cell format should be Text. 3.
Page 88
Result You can view and download captured face images in Picture. Refer to View and Download Picture for details. Overlay and Capture Choose to configure capture parameters and the information you want to display on stream and picture. Display VCA info. on Stream Display smart information on stream, including the target and rules information.
Page 89
Detection Parameters Generation Speed The speed to identify a target. The higher the value, the faster the target will be recognized. Setting the value quite low, and if there was a face in the configured area from the start, this face will not be captured.
detected face stays in the scene for less than the set filtering time, capture will not be triggered. For example, if the face filtering time is set as 5 seconds, the camera will capture the detected face when the face keeps staying in the scene for 5 seconds. Note The face filtering time (longer than 0s) may increase the possibility of the actual capture times less than the set value above.
Download Display Pictures Click and the device stores captured pictures to the browser cache. Hover the pointer over the icon to see the number of pictures in the cache. Click again to download the pictures in a package. Note The browser cache has a limited size. The recommended number of pictures to download is no more than 200.
2.11.2 Auto-Tracking Steps 1. Go to Configuration → EPTZ. 2. Check Enable EPTZ. 3. The default Stream Type is Third Stream and cannot be configured. 4. Select Auto-tracking in Application. 5. Click Detection Area to start drawing. 6. Click on the live video to specify the four vertexes of the detection area, and right click to complete drawing.
Page 93
example, if you set the number of the ePTZ channels as 6, then the live view is seven channels: one 8 MP panoramic image and six ePTZ images. Panorama One stitched panoramic image (32 MP) and the panoramic image output from 1 or 3 encoder track. Original Four independent original images (8 MP).
Need help?
Do you have a question about the GD-CI-Essential Series and is the answer not in the manual?
Questions and answers