Page 3
3.15 Operate via Mobile Client ....................20 3.15.1 Enable SCMS Service on Camera ................. 20 3.15.2 Set Up SCMS ....................... 21 3.15.3 Add Camera to SCMS ..................21 4 Live View ............................ 23 4.1 Live View Parameters ...................... 23 4.1.1 Window Proportion ....................23 4.1.2 Live View Stream Type ..................
1 Overview Thank you for purchasing a GRUNDIG product. Before installing or connecting the product, please read first the following documents which you can find in the product package: - Legal Disclaimer - Safety Instructions - Installation Manual for the respective product model Further information about the product like Data Sheets, CE Documents, etc.
2.1 Activate Device For the first-time access, you need to activate the device by setting an admin password. No operation is allowed before activation. You can also activate the device via Web Browser, Grundig IP-Finder or Client Software. 2.1.1 Default User and IP Address ●...
Page 10
SCMS is a PC client to manage and operate your devices. Camera activation is supported by the software. Before You Start Get the client software from the official website www.grundig-security.com. Install the software following the prompts. The camera and the PC that runs the software should be in the same subnet.
Page 11
3. Check the device status from the device list, and select an inactive camera. 4. Click the Activate. 5. Create and confirm the admin password of the camera. Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
2. Open a web browser and input the default IP address. 3. Create and confirm the admin password. Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Operating System Web Browser Operation available. For detailed restricted function, refer to the actual device. Plug-in installation is not required. Go to Configuration > Network > Advanced Settings > Network Service to enable WebSocket or WebSockets for normal view. Mac OS 10.13+ Mac Safari 12+ Display and operation of certain functions are...
3 Network Settings 3.1 TCP/IP TCP/IP settings must be properly configured before you operate the device over network. IPv4 and IPv6 are both supported. Both versions can be configured simultaneously without conflicting to each other. Go to Configuration > Basic Configuration > Network > TCP/IP for parameter settings. NIC Type Select a NIC (Network Interface Card) type according to your network condition.
It stands for maximum transmission unit. It is the size of the largest protocol data unit that can be communicated in a single network layer transaction. The valid value range of MTU is 1280 to 1500. It stands for domain name server. It is required if you need to visit the device with domain name.
verification is required to ensure the secure access. ModbusTCP It refers to the protocol through which the device transmits data, such as the thermometry data. Note ● WebSocket Port, and WebSockets Port are only supported by certain models. ● For device models that support that function, go to Configuration > Network > Advanced Settings >...
3.3.2 Set Manual Port Mapping Steps 1. Check Enable UPnP™, and choose a friendly name for the device, or you can use the default name. 2. Select the port mapping mode to Manual, and set the external port to be the same as the internal port.
Steps 1. Go to Configuration > Network > Advanced Settings > SNMP. 2. Check Enable SNMPv1, Enable SNMP v2c or Enable SNMPv3. Note The SNMP version you select should be the same as that of the SNMP software. And you also need to use the different version according to the security level required. SNMP v1 is not secure and SNMP v2 requires password for access.
3.7 Access to Device via PPPoE Dial Up Connection This device supports the PPPoE auto dial-up function. The device gets a public IP address by ADSL dial-up after the device is connected to a modem. You need to configure the PPPoE parameters of the device.
2. Select ISUP as the platform access mode. 3. Select Enable. 4. Select a protocol version and input related parameters. 5. Click Save. Register status turns to Online when the function is correctly set. 3.9 Set Open Network Video Interface If you need to access the device through Open Network Video Interface protocol, you can configure the user settings to enhance the network security.
transmission. Steps 1. Go to Configuration > Network > Advanced Settings > Alarm Server. 2. Enter Destination IP or Host Name, URL, and Port. 3. Select Protocol. Note HTTP, HTTPS, and ISUP are selectable. It is recommended to use HTTPS, as it encrypts the data transmission during communication.
3.13 Set SRTP The Secure Real-time Transport Protocol (SRTP) is a Real-time Transport Protocol (RTP) internet protocol, intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both unicast and multicast applications. Steps 1.
Page 23
Figure 3-1 Main Mode Configuration 2. Check to enable the function of transmitting data via Modbus. 3. Click Add to configure the transmission parameters between the device and the subordinate. Subordinate Name Customized subordinate for distinguishing between different subordinates. Connection type Note Only when System >...
Note ● If the connection status displays online, the device is connected to the subordinate normally; if it displays offline, the device is disconnected from the subordinate, which may be caused by the subordinate not being online. If the status shows Error, refer to the contents of the error code description below to diagnose the connection problem.
authorized access can improve data communication security. Steps Note You can set the Modbus TCP port, go to Configuration > Network > Basic Settings > Port. 1. Go to Configuration > Network > Advanced Settings > Modbus. 2. Select Modbus TCP mode. Device Mode The device is set as subordinate, which means that the device operates as a Modbus server processing the request from the client.
Page 26
Error Name Description Code combination of reference number and transfer length is invalid. For a controller with 100 registers, the PDU addresses the first register as 0, and the last one as 99. If a request is submitted with a starting register address of 96 and a quantity of registers of 4, then this request will successfully operate (address-wise at least) on registers 96, 97, 98, 99.
Error Name Description Code request, but service may be required on the server device. Specialized use in conjunction with gateways, indicates that the gateway was unable to allocate an intern Gateway Path Unavailable communication path from the input port to the output port for processing the request.
6. Create a verification code or change the old verification code for the camera. Note The verification code is required when you add the camera to SCMS service. 7. Save the settings. Enable SCMS Service via IP-FINDER Software This part introduces how to enable SCMS service via IP-FINDER software of an activated camera. Steps 1.
Page 29
Note ● The required verification code is the code you create or change when you enable SCMS service on the camera. ● If you forget the verification code, you can check the current verification code on Platform Access configuration page via web browser. 6.
4 Live View It introduces the live view parameters, function icons and transmission parameters settings. 4.1 Live View Parameters The supported functions vary depending on the model. 4.1.1 Window Proportion ● refers to the window size is 16 : 9. ●...
live view among multiple channels. Click to switch live view among multiple channels. 4.1.6 Full Screen This function is used to view the image in full screen mode. Click to start full screen mode and press ESC button to exit. 4.1.7 Light Click to turn on or turn off the illuminator.
– For PTZ settings, see Lens Parameters Adjustment . – For display settings, see Display Settings. – For OSD settings, see OSD. – For audio and video settings, see Video and Image Settings. – For VCA settings, see Fire Detection, Temperature Measurement, and Perimeter Protection. Note The function is only supported by certain models.
Page 33
UDP is suitable for the unstable network environment that does not demand high video fluency. MULTICAST MULTICAST is suitable for the situation that there are multiple clients. You should set the multicast address for them before selection. Note For detailed information about multicast, refer to Multicast. HTTP HTTP is suitable for the situation that the third-party needs to get the stream from the device.
5 Video and Image Settings This part introduces the configuration of video/audio and image related parameters. 5.1 Video Settings This part introduces the settings of video parameters, such as, stream type, video encoding, and resolution. Go to setting page: Configuration > Video/Audio > Video. 5.1.1 Stream Type For device supports more than one stream, you can specify parameters for each stream type.
and storage. 5.1.4 Bitrate Type and Max. Bitrate Constant Bitrate It means that the stream is compressed and transmitted at a comparatively fixed bitrate. The compression speed is fast, but mosaic may occur on the image. Variable Bitrate It means that the device automatically adjusts the bitrate under the set Max. Bitrate. The compression speed is slower than that of the constant bitrate.
standard. In comparison to H.264, it offers better video compression at the same resolution, frame rate and image quality. MJPEG Motion JPEG (M-JPEG or MJPEG) is a video compression format in which intraframe coding technology is used. Images in a MJPEG format is compressed as individual JPEG images. Profile This function means that under the same bitrate, the more complex the profile is, the higher the quality of the image is, and the requirement for network bandwidth is also higher.
Player means the VCA info can be displayed by the dedicated player provided by the manufacturer. Video Video means the VCA info can be displayed by any general video player. 5.1.10 Audio Settings It is a function to set audio parameters such as audio encoding, environment noise filtering. Go to the audio settings page: Configuration >...
devices for device connection. ● If the device has built-in microphone and speaker, two-way audio function can be enabled directly. Steps Note The function varies according to different camera models. 1. Click Live View. 2. Click on the toolbar to enable two-way audio function of the camera. 3.
5.1.13 Metadata Metadata is the raw data that the device collects before algorithm processing. It is often used for the third-party integration. Go to Configuration > Video/Audio > Metadata Settings to enable metadata uploading of the desired function for the camera channels. 5.2 Display Settings It offers the parameter settings to adjust image features.
Set the DNR level to control the noise reduction degree. The higher level means stronger reduction degree. Expert Set the DNR level for both space DNR and time DNR to control the noise reduction degree. The higher level means stronger reduction degree. 5.2.4 Set Palette You can select the palette mode to display the thermal grayscale image to colored image.
Disable this function. Normal Set the DDE level to control the details of the image. The higher the level, the more details are shown, but the higher the noise. 5.2.7 Brightness Sudden Change When the brightness of target and the background is hugely different (the temperature difference of target and background is huge), the system reduces the difference for viewing.
5.2.12 Scene Mode There are several sets of image parameters predefined for different installation environments. Select a scene according to the actual installation environment to speed up the display settings. 5.2.13 Local Output Some camera models support CVBS, SDI, or HDMI output. Set the local output ON or OFF according to the actual device.
Steps 1. Go to privacy mask setting page: Configuration > Image > Privacy Mask. 2. Check Enable Privacy Mask. 3. Click Draw Area. Drag the mouse in the live view to draw a closed area. Drag the corners of Adjust the size of the area. the area Drag the area Adjust the position of the area.
Page 44
Then after locating other pixels, click to correct them simultaneously. ● This function is only supported by certain camera models. 6. Optional: Click to cancel defective pixel correction. 37 English...
6 Video Recording and Picture Capture This part introduces the operations of capturing video clips and snapshots, playback, and downloading captured files. 6.1 Storage Settings This part introduces the configuration of several common storage paths. 6.1.1 Set Memory Card If you choose to store the files to memory card, make sure you insert and format the memory card in advance.
Steps 1. Go to NAS setting page: Configuration > Storage > Storage Management > Net HDD. 2. Click HDD No.. Enter the server address and file path for the disk. Server Address The IP address of the network disk. File Path The saving path of network disk files.
4. Click Test to verify the FTP server. 5. Click Save. 6.1.4 Set Cloud Storage It helps to upload the captured pictures and data to the cloud. The platform requests picture directly from the cloud for picture and analysis. The function is only supported by certain models. Steps Caution If the cloud storage is enabled, the pictures are stored in the cloud video manager firstly.
6.2.1 Record Automatically This function can record video automatically during configured time periods. Before You Start Select Trigger Recording in event settings for each record type except Continuous. See Event and Alarm for details. Steps Note The function varies according to different models. 1.
Enable Overwrite to overwrite the video records when the storage space is full. Otherwise, the camera cannot record new videos. Pre-record The time period you set to record before the scheduled time. Post-record The time period you set to stop recording after the scheduled time. Stream Type Select the stream type for recording.
4. Click on the playback interface to download files. 1) Set search condition and click Search. 2) Select the video files and then click Download. Note Go to Configuration > Local, click Save downloaded files to to change the saving path of downloaded video files.
The picture is compressed with good quality. 3. Click Save. 4. Click near the live view or play back window to capture a picture manually. 6.3.3 View and Download Picture You can search, view and download the pictures stored in the local storage or network storage. Steps 1.
7 VCA Resource VCA resource is a collection of smart functions supported by the device. 7.1 Temperature Measurement When you enable this function, the device measures the actual temperature of the scene. It alarms when temperature exceeds the temperature threshold value. 7.1.1 Thermography Configuration Flow Chart This part introduces the process of configuring temperature measurement.
Note Please refer to the Quick Start Guide for detailed information of Installation part in the flow chart. 7.1.2 Automatic Thermography Configure the temperature measurement parameters and temperature measurement rules. The device can measure the actual temperature and output alarms when temperature exceeds the alarm threshold value.
Page 54
Display the information on the top left of screen. Add Original Data on Capture Check to add data on alarm triggered capture of thermal channel. Add Original Data on Stream Add and save original raw data to stream. The function requires higher network bandwidth. Picture Quality Set picture quality as high, medium, or low.
Page 55
Optical Transmissivity Set the optical transmissivity of external optical material (e.g.: germanium window) to improve the temperature measuring accuracy. This parameter varies according to different camera models. Calibration Coefficient Check to enable it and set the value of calibration coefficient to get the temperature of the external window or optical material automatically.
Page 56
An OSD will be displayed when the function is enabled. Restart Algorithm Library Click Restart to restart the algorithm library of the corresponding filter function. Note ● The Smoking Filter and Forklift Filter vary according to different camera models. ● Perimeter Protection and Forklift Filter are mutually exclusive. 5.
Page 57
Note Temperature sudden change alarm is only supported by certain device models. 5. Refer to Set Arming Schedule for setting scheduled time. Refer to Linkage Method Settings for setting linkage method. 6. Optional: Set the offsite pre-alarm/alarm specially during off-hours when there are less causes of false alarms.
Page 58
Steps 1. Go to Configuration > Temperature Measurement & Fire Prevention > Basic Settings, check Enable Temperature Measurement. 2. Refer to Set Thermography Parameters to set the parameters. 3. Go to Configuration > Temperature Measurement & Fire Prevention > Advanced Settings, select Expert.
Page 59
Alarm Temperature and Pre-Alarm Temperature Set the alarm temperature and pre-alarm temperature. E.g., select Alarm Rule as Above (Average Temperature), set the Pre-Alarm Temperature to 50 °C, and set the Alarm Temperature to 55 °C. The device pre-alarms when its average temperature is higher than 50 °C and alarms when its average temperature is higher than 55 °C.
Page 60
Offsite Pre-Alarm Temperature When the temperature of target exceeds the Offsite Pre-Alarm Temperature during the Offsite Arming Schedule, and this status lasts not shorter than the Filtering Time, the pre- alarm is triggered. Offsite Alarm Temperature When the temperature of target exceeds the Offsite Alarm Temperature during the Offsite Arming Schedule, and this status lasts not shorter than the Filtering Time, the alarm is triggered.
2. Click and move the area to adjust the position. 3. Drag the corners of the area to adjust the size and shape. Go to Live View interface to view the maximum temperature and rule of the area in thermal channel.
7.2.1 Recommended Scene This part introduces the recommended scenes of fire source detection and helps you select the appropriate scene. Fire source detection can be applied to indoor and outdoor monitoring with a large detection radius. To achieve the best monitoring effect, please set the installation place as requirements below.
Note When VCA Resource Type is selected as Temperature Measurement + Perimeter Protection, only Smoking Mode is supported in Fire Source Detection. When VCA Resource Type is selected as Temperature Measurement + Fire Detection, Dynamic Fire is also supported in Fire Source Detection.
Page 64
Steps 1. Go to Configuration > Perimeter Protection > Rule. 2. Check Intelligent Analysis. 3. Set perimeter protection rules. 1) Click to add a new rule. 2) Enter the rule name, and click the drop-down menu to select Rule Type. Line Crossing If any target moves across the setting line, the alarm will be triggered.
Page 65
4) Set other parameters for the rule. Target Detection You are recommended to select the target as Human & Vehicle. Scene Mode The scene mode is set to be General by default. Select Distant View when you are far from the targets.
5. Set Arming Schedule and Linkage Method Settings for each rule. 6. Optional: You can shield certain areas from being detected. Refer to Set Perimeter Protection Shield Region for detailed settings. 7. Optional: Set displayed VCA information on stream or picture. Refer to Set Overlay & Capture Parameters for detailed settings.
2. Click Save. Go to Configuration > Local, check Enable rules to display rules information on the live view. 7.3.4 Calibration You can calibrate the camera first to improve the detection accuracy of perimeter protection. The calibration is optional, take the actual condition for reference. Note The function and the path to the calibration page vary according to different camera models.
Page 68
5. When the person exits, click to stop calibration. Note After auto calibration, refer to Verify the Calibration Result to verify if the calibration is successful. Set manual calibration if the auto calibration failed, or the verified result turns bad. Result After calibration, the height and angle of camera will be shown in live view.
Verify the Calibration Result The function can verify whether the calibrated value is consistent with the actual value. Steps 1. Click 2. Click , and drag a vertical line in the view. 3. Move the line to the target, then click to calculate the length.
Note Only certain device models support the function. 7.4.1 Set Open Platform You can install the application for the third-party to develop and run its function and service. For the device supporting this function, you can follow the steps to import and run smart applications. Before You Start Go to Configuration >...
8 Event and Alarm This part introduces the configuration of events. The device takes certain response to triggered alarm. Certain events may not be supported by certain device models. 8.1 Set Motion Detection It helps to detect the moving objects in the detection region and trigger the linkage actions. Steps 1.
8.1.2 Expert Mode You can configure the motion detection parameters of day/night switch according to the actual needs. Steps 1. Select expert mode in Configuration. 2. Set parameters of expert mode. Scheduled Image Settings OFF: Switch is disabled. Auto-Switch: The system switches day/night mode automatically according to environment. It displays colored image at day and black and white image at night.
Figure 8-1 Set Video Tampering Area 5. Refer to Set Arming Schedule for setting scheduled time. Refer to Linkage Method Settings for setting linkage method. 6. Click Save. 8.3 Set Alarm Input Alarm signal from the external device triggers the corresponding actions of the current device. Before You Start Make sure the external alarm device is connected.
HDD Full The HDD storage is full. HDD Error Error occurs in HDD. Network The device is offline. Disconnected IP Address Conflicted The IP address of current device is same as that of other device in the network. Illegal Login Incorrect user name or password is entered.
Note The function varies according to different models. 8.6 Detect Scene Change Scene change detection function detects the change of the scene. Some certain actions can be taken when the alarm is triggered. Steps 1. Go to Configuration > Event > Smart Event > Scene Change Detection. 2.
9 Arming Schedule and Alarm Linkage Arming schedule is a customized time period in which the device performs certain tasks. Alarm linkage is the response to the detected certain incident or target during the scheduled time. 9.1 Set Arming Schedule Set the valid time of the device tasks.
Page 78
4. Go to Live View. You can click for a quick alarm output configuration and check to enable Manual Alarm or turn it off. Automatic Alarm Set the automatic alarm parameters, then the device triggers an alarm output automatically in the set arming schedule.
Steps 1. Check Enable Auto Trigger. 2. Set Trigger Time, and the device will trigger an alarm output to the alarm server automatically in the set time. 3. Set Auto Trigger Delay. It refers to the time duration that the alarm output remains in effect after the auto trigger.
Note If you want to use STARTTLS, make sure that the protocol is supported by your email server. If you check the Enable STARTTLS while the protocol is not supported by your email sever, your email is sent with no encryption. 4) Optional: If you want to receive notification with alarm pictures, check Attached Image.
9.2.6 External Alarm Module You can connect the device with the external alarm module to send alarm to the external device. Steps 1. Go to Configuration > Event > Basic Event > External Alarm Module. 2. Click Add to add an external device. 3.
available, you can click Add to upload an audio file that meets the requirement. Up to six audio files can be uploaded, and each audio file shall not exceed 512 KB. 4. Optional: Click Test to play the selected audio file on the device. 5.
10 System and Security It introduces system maintenance, system settings and security management, and explains how to configure relevant parameters. 10.1 View Device Information You can view device information, such as Device No., Model, Serial No. and Firmware Version. Enter Configuration > System > System Settings > Basic Information to view the device information.
Note You can import the exported Device Common Parameters to devices of the same series. 4) Click Browse to select the saved configuration file. 5) Input the encryption password you have set when exporting the configuration file. 6) Click Import. 10.4 Export Diagnose Information Diagnose information includes running log, system information, hardware information.
Restore Reset device parameters, except user information, IP parameters and video format to the default settings. Default Reset all the parameters to the factory default. Note Be careful when using this function. After resetting to the factory default, all the parameters are reset to the default settings. 10.8 Upgrade Before You Start You need to obtain the correct upgrade package.
10.10.1 Synchronize Time Manually Steps 1. Go to Configuration > System > System Settings > Time Settings. 2. Select Time Zone. 3. Click Manual Time Sync.. 4. Choose one time synchronization method. – Select Set Time, and manually input or select date and time from the pop-up calendar. Check Sync.
10.11 Set RS-232 RS-232 can be used to debug device or access peripheral device. RS-232 can realize communication between the device and computer or terminal when the communication distance is short. Before You Start Connect the device to computer or terminal with RS-232 cable. Steps 1.
3. Set the temperature unit and distance unit. 4. Click Save. 10.14 Security You can improve system security by setting security parameters. 10.14.1 Authentication You can improve network access security by setting RTSP and WEB authentication. Go to Configuration > System > Security > Authentication to choose authentication protocol and method according to your needs.
Security audit logs can be saved on device internal storage. The log will be saved every half hour after device booting. Due to limited storage space, you can also save the logs on a log server. Search Security Audit Logs You can search and analyze the security log files of the device so as to find out the illegal intrusion and troubleshoot the security events.
10.14.4 Set MAC Address Filter MAC address filter is a tool for access control. You can enable the MAC address filter to allow or forbid the visits from the certain MAC addresses. Steps Note MAC Address Filter is mutually exclusive with IP Address Filter. 1.
Page 91
3. Click OK. 4. Optional: Click Export to export the certificate, or click Delete to delete the certificate to recreate a certificate, or click Certificate Properties to view the certificate details. Create Certificate Request Before You Start Select a self-signed certificate. Steps 1.
Install CA Certificate Steps 1. Click Import. 2. Enter the Certificate ID. 3. Click Browser to select the desired server/client certificate. 4. Select the desired import method and enter the required information. 5. Click OK. Note Up to 16 certificates are allowed. Enable Certificate Expiration Alarm Steps 1.
10.14.8 Set HTTPS HTTPS is a network protocol that enables encrypted transmission and identity authentication, which improves the security of remote access. Steps 1. Go to Configuration > Network > Advanced Settings > HTTPS. 2. Check Enable. 3. Optional: Check HTTPS Browsing to access the device only via HTTPS protocol. 4.
Note ● If you set the Protocol to EAP-TLS, select the Client Certificate and CA Certificate. ● If the function is abnormal, check if the selected certificate is abnormal in Certificate Management. 10.15 User and Account 10.15.1 Set User Account and Permission The administrator can add, modify, or delete other accounts, and grant different permission to different user levels.
Note The administrator can add up to 31 user accounts. 3. Click General to set the allowed number of multi-user simultaneous login. Note Only the administrator has the authority to the operation. 4. Click OK. 10.15.2 Online Users The information of users logging into the device is shown. Go to Configuration >...
Need help?
Do you have a question about the GD-TI-AT26 T Series and is the answer not in the manual?
Questions and answers