Table of Contents

Advertisement

Quick Links

User Guide
GD-TI-AT26xxT
GD-TI-AT36xxT
www.grundig-security.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the GD-TI-AT26 T Series and is the answer not in the manual?

Questions and answers

Summary of Contents for Grundig GD-TI-AT26 T Series

  • Page 1 User Guide GD-TI-AT26xxT GD-TI-AT36xxT www.grundig-security.com...
  • Page 2: Table Of Contents

    Contents 1 Overview ............................1 1.1 Brief Description ........................ 1 1.2 Function ..........................1 2 Device Activation and Accessing ....................2 2.1 Activate Device ........................2 2.2 Login ..........................5 2.2.1 Plug-in Installation ....................5 2.2.2 Illegal Login Lock ..................... 6 3 Network Settings ..........................
  • Page 3 3.15 Operate via Mobile Client ....................20 3.15.1 Enable SCMS Service on Camera ................. 20 3.15.2 Set Up SCMS ....................... 21 3.15.3 Add Camera to SCMS ..................21 4 Live View ............................ 23 4.1 Live View Parameters ...................... 23 4.1.1 Window Proportion ....................23 4.1.2 Live View Stream Type ..................
  • Page 4 5.1.11 Two-way Audio ....................30 5.1.12 Set ROI ........................ 31 5.1.13 Metadata ......................32 5.2 Display Settings ....................... 32 5.2.1 Image Adjustment ....................32 5.2.2 Image Adjustment (Thermal Channel) ..............32 5.2.3 DNR ........................32 5.2.4 Set Palette ......................33 5.2.5 Set Target Enhancement ..................
  • Page 5 6.2.3 Playback and Download Video ................42 6.3 Capture Configuration ..................... 43 6.3.1 Capture Automatically ..................43 6.3.2 Capture Manually ....................43 6.3.3 View and Download Picture .................. 44 7 VCA Resource ..........................45 7.1 Temperature Measurement .................... 45 7.1.1 Thermography Configuration Flow Chart .............. 45 7.1.2 Automatic Thermography ..................
  • Page 6 9 Arming Schedule and Alarm Linkage ..................70 9.1 Set Arming Schedule ......................70 9.2 Linkage Method Settings ....................70 9.2.1 Trigger Alarm Output .................... 70 9.2.2 FTP/NAS/Memory Card Uploading ................ 72 9.2.3 Send Email ......................72 9.2.4 Notify Surveillance Center ..................73 9.2.5 Trigger Recording ....................
  • Page 7 10.14.2 Security Audit Log ..................... 81 10.14.3 Set IP Address Filter ..................82 10.14.4 Set MAC Address Filter ..................83 10.14.5 Certificate Management ................... 83 10.14.6 Control Timeout Settings .................. 85 10.14.7 Set SSH ......................85 10.14.8 Set HTTPS ......................86 10.14.9 Set QoS ......................
  • Page 8: Overview

    1 Overview Thank you for purchasing a GRUNDIG product. Before installing or connecting the product, please read first the following documents which you can find in the product package: - Legal Disclaimer - Safety Instructions - Installation Manual for the respective product model Further information about the product like Data Sheets, CE Documents, etc.
  • Page 9: Device Activation And Accessing

    2.1 Activate Device For the first-time access, you need to activate the device by setting an admin password. No operation is allowed before activation. You can also activate the device via Web Browser, Grundig IP-Finder or Client Software. 2.1.1 Default User and IP Address ●...
  • Page 10 SCMS is a PC client to manage and operate your devices. Camera activation is supported by the software. Before You Start Get the client software from the official website www.grundig-security.com. Install the software following the prompts. The camera and the PC that runs the software should be in the same subnet.
  • Page 11 3. Check the device status from the device list, and select an inactive camera. 4. Click the Activate. 5. Create and confirm the admin password of the camera. Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 12: Login

    2. Open a web browser and input the default IP address. 3. Create and confirm the admin password. Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 13: Illegal Login Lock

    Operating System Web Browser Operation available. For detailed restricted function, refer to the actual device. Plug-in installation is not required. Go to Configuration > Network > Advanced Settings > Network Service to enable WebSocket or WebSockets for normal view. Mac OS 10.13+ Mac Safari 12+ Display and operation of certain functions are...
  • Page 14: Network Settings

    3 Network Settings 3.1 TCP/IP TCP/IP settings must be properly configured before you operate the device over network. IPv4 and IPv6 are both supported. Both versions can be configured simultaneously without conflicting to each other. Go to Configuration > Basic Configuration > Network > TCP/IP for parameter settings. NIC Type Select a NIC (Network Interface Card) type according to your network condition.
  • Page 15: Multicast Discovery

    It stands for maximum transmission unit. It is the size of the largest protocol data unit that can be communicated in a single network layer transaction. The valid value range of MTU is 1280 to 1500. It stands for domain name server. It is required if you need to visit the device with domain name.
  • Page 16: Port Mapping

    verification is required to ensure the secure access. ModbusTCP It refers to the protocol through which the device transmits data, such as the thermometry data. Note ● WebSocket Port, and WebSockets Port are only supported by certain models. ● For device models that support that function, go to Configuration > Network > Advanced Settings >...
  • Page 17: Set Manual Port Mapping

    3.3.2 Set Manual Port Mapping Steps 1. Check Enable UPnP™, and choose a friendly name for the device, or you can use the default name. 2. Select the port mapping mode to Manual, and set the external port to be the same as the internal port.
  • Page 18: Access To Device Via Domain Name

    Steps 1. Go to Configuration > Network > Advanced Settings > SNMP. 2. Check Enable SNMPv1, Enable SNMP v2c or Enable SNMPv3. Note The SNMP version you select should be the same as that of the SNMP software. And you also need to use the different version according to the security level required. SNMP v1 is not secure and SNMP v2 requires password for access.
  • Page 19: Access To Device Via Pppoe Dial Up Connection

    3.7 Access to Device via PPPoE Dial Up Connection This device supports the PPPoE auto dial-up function. The device gets a public IP address by ADSL dial-up after the device is connected to a modem. You need to configure the PPPoE parameters of the device.
  • Page 20: Set Open Network Video Interface

    2. Select ISUP as the platform access mode. 3. Select Enable. 4. Select a protocol version and input related parameters. 5. Click Save. Register status turns to Online when the function is correctly set. 3.9 Set Open Network Video Interface If you need to access the device through Open Network Video Interface protocol, you can configure the user settings to enhance the network security.
  • Page 21: Set Network Service

    transmission. Steps 1. Go to Configuration > Network > Advanced Settings > Alarm Server. 2. Enter Destination IP or Host Name, URL, and Port. 3. Select Protocol. Note HTTP, HTTPS, and ISUP are selectable. It is recommended to use HTTPS, as it encrypts the data transmission during communication.
  • Page 22: Set Srtp

    3.13 Set SRTP The Secure Real-time Transport Protocol (SRTP) is a Real-time Transport Protocol (RTP) internet protocol, intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both unicast and multicast applications. Steps 1.
  • Page 23 Figure 3-1 Main Mode Configuration 2. Check to enable the function of transmitting data via Modbus. 3. Click Add to configure the transmission parameters between the device and the subordinate. Subordinate Name Customized subordinate for distinguishing between different subordinates. Connection type Note Only when System >...
  • Page 24: Set Modbus Subordinate Mode

    Note ● If the connection status displays online, the device is connected to the subordinate normally; if it displays offline, the device is disconnected from the subordinate, which may be caused by the subordinate not being online. If the status shows Error, refer to the contents of the error code description below to diagnose the connection problem.
  • Page 25: Modbus Error Code Description

    authorized access can improve data communication security. Steps Note You can set the Modbus TCP port, go to Configuration > Network > Basic Settings > Port. 1. Go to Configuration > Network > Advanced Settings > Modbus. 2. Select Modbus TCP mode. Device Mode The device is set as subordinate, which means that the device operates as a Modbus server processing the request from the client.
  • Page 26 Error Name Description Code combination of reference number and transfer length is invalid. For a controller with 100 registers, the PDU addresses the first register as 0, and the last one as 99. If a request is submitted with a starting register address of 96 and a quantity of registers of 4, then this request will successfully operate (address-wise at least) on registers 96, 97, 98, 99.
  • Page 27: Operate Via Mobile Client

    Error Name Description Code request, but service may be required on the server device. Specialized use in conjunction with gateways, indicates that the gateway was unable to allocate an intern Gateway Path Unavailable communication path from the input port to the output port for processing the request.
  • Page 28: Set Up Scms

    6. Create a verification code or change the old verification code for the camera. Note The verification code is required when you add the camera to SCMS service. 7. Save the settings. Enable SCMS Service via IP-FINDER Software This part introduces how to enable SCMS service via IP-FINDER software of an activated camera. Steps 1.
  • Page 29 Note ● The required verification code is the code you create or change when you enable SCMS service on the camera. ● If you forget the verification code, you can check the current verification code on Platform Access configuration page via web browser. 6.
  • Page 30: Live View

    4 Live View It introduces the live view parameters, function icons and transmission parameters settings. 4.1 Live View Parameters The supported functions vary depending on the model. 4.1.1 Window Proportion ● refers to the window size is 16 : 9. ●...
  • Page 31: Full Screen

    live view among multiple channels. Click to switch live view among multiple channels. 4.1.6 Full Screen This function is used to view the image in full screen mode. Click to start full screen mode and press ESC button to exit. 4.1.7 Light Click to turn on or turn off the illuminator.
  • Page 32: Lens Parameters Adjustment

    – For PTZ settings, see Lens Parameters Adjustment . – For display settings, see Display Settings. – For OSD settings, see OSD. – For audio and video settings, see Video and Image Settings. – For VCA settings, see Fire Detection, Temperature Measurement, and Perimeter Protection. Note The function is only supported by certain models.
  • Page 33 UDP is suitable for the unstable network environment that does not demand high video fluency. MULTICAST MULTICAST is suitable for the situation that there are multiple clients. You should set the multicast address for them before selection. Note For detailed information about multicast, refer to Multicast. HTTP HTTP is suitable for the situation that the third-party needs to get the stream from the device.
  • Page 34: Video And Image Settings

    5 Video and Image Settings This part introduces the configuration of video/audio and image related parameters. 5.1 Video Settings This part introduces the settings of video parameters, such as, stream type, video encoding, and resolution. Go to setting page: Configuration > Video/Audio > Video. 5.1.1 Stream Type For device supports more than one stream, you can specify parameters for each stream type.
  • Page 35: Bitrate Type And Max. Bitrate

    and storage. 5.1.4 Bitrate Type and Max. Bitrate Constant Bitrate It means that the stream is compressed and transmitted at a comparatively fixed bitrate. The compression speed is fast, but mosaic may occur on the image. Variable Bitrate It means that the device automatically adjusts the bitrate under the set Max. Bitrate. The compression speed is slower than that of the constant bitrate.
  • Page 36: Smoothing

    standard. In comparison to H.264, it offers better video compression at the same resolution, frame rate and image quality. MJPEG Motion JPEG (M-JPEG or MJPEG) is a video compression format in which intraframe coding technology is used. Images in a MJPEG format is compressed as individual JPEG images. Profile This function means that under the same bitrate, the more complex the profile is, the higher the quality of the image is, and the requirement for network bandwidth is also higher.
  • Page 37: Audio Settings

    Player means the VCA info can be displayed by the dedicated player provided by the manufacturer. Video Video means the VCA info can be displayed by any general video player. 5.1.10 Audio Settings It is a function to set audio parameters such as audio encoding, environment noise filtering. Go to the audio settings page: Configuration >...
  • Page 38: Set Roi

    devices for device connection. ● If the device has built-in microphone and speaker, two-way audio function can be enabled directly. Steps Note The function varies according to different camera models. 1. Click Live View. 2. Click on the toolbar to enable two-way audio function of the camera. 3.
  • Page 39: Metadata

    5.1.13 Metadata Metadata is the raw data that the device collects before algorithm processing. It is often used for the third-party integration. Go to Configuration > Video/Audio > Metadata Settings to enable metadata uploading of the desired function for the camera channels. 5.2 Display Settings It offers the parameter settings to adjust image features.
  • Page 40: Set Palette

    Set the DNR level to control the noise reduction degree. The higher level means stronger reduction degree. Expert Set the DNR level for both space DNR and time DNR to control the noise reduction degree. The higher level means stronger reduction degree. 5.2.4 Set Palette You can select the palette mode to display the thermal grayscale image to colored image.
  • Page 41: Brightness Sudden Change

    Disable this function. Normal Set the DDE level to control the details of the image. The higher the level, the more details are shown, but the higher the noise. 5.2.7 Brightness Sudden Change When the brightness of target and the background is hugely different (the temperature difference of target and background is huge), the system reduces the difference for viewing.
  • Page 42: Scene Mode

    5.2.12 Scene Mode There are several sets of image parameters predefined for different installation environments. Select a scene according to the actual installation environment to speed up the display settings. 5.2.13 Local Output Some camera models support CVBS, SDI, or HDMI output. Set the local output ON or OFF according to the actual device.
  • Page 43: Overlay Picture

    Steps 1. Go to privacy mask setting page: Configuration > Image > Privacy Mask. 2. Check Enable Privacy Mask. 3. Click Draw Area. Drag the mouse in the live view to draw a closed area. Drag the corners of Adjust the size of the area. the area Drag the area Adjust the position of the area.
  • Page 44 Then after locating other pixels, click to correct them simultaneously. ● This function is only supported by certain camera models. 6. Optional: Click to cancel defective pixel correction. 37 English...
  • Page 45: Video Recording And Picture Capture

    6 Video Recording and Picture Capture This part introduces the operations of capturing video clips and snapshots, playback, and downloading captured files. 6.1 Storage Settings This part introduces the configuration of several common storage paths. 6.1.1 Set Memory Card If you choose to store the files to memory card, make sure you insert and format the memory card in advance.
  • Page 46: Set Ftp

    Steps 1. Go to NAS setting page: Configuration > Storage > Storage Management > Net HDD. 2. Click HDD No.. Enter the server address and file path for the disk. Server Address The IP address of the network disk. File Path The saving path of network disk files.
  • Page 47: Set Cloud Storage

    4. Click Test to verify the FTP server. 5. Click Save. 6.1.4 Set Cloud Storage It helps to upload the captured pictures and data to the cloud. The platform requests picture directly from the cloud for picture and analysis. The function is only supported by certain models. Steps Caution If the cloud storage is enabled, the pictures are stored in the cloud video manager firstly.
  • Page 48: Record Automatically

    6.2.1 Record Automatically This function can record video automatically during configured time periods. Before You Start Select Trigger Recording in event settings for each record type except Continuous. See Event and Alarm for details. Steps Note The function varies according to different models. 1.
  • Page 49: Record Manually

    Enable Overwrite to overwrite the video records when the storage space is full. Otherwise, the camera cannot record new videos. Pre-record The time period you set to record before the scheduled time. Post-record The time period you set to stop recording after the scheduled time. Stream Type Select the stream type for recording.
  • Page 50: Capture Configuration

    4. Click on the playback interface to download files. 1) Set search condition and click Search. 2) Select the video files and then click Download. Note Go to Configuration > Local, click Save downloaded files to to change the saving path of downloaded video files.
  • Page 51: View And Download Picture

    The picture is compressed with good quality. 3. Click Save. 4. Click near the live view or play back window to capture a picture manually. 6.3.3 View and Download Picture You can search, view and download the pictures stored in the local storage or network storage. Steps 1.
  • Page 52: Vca Resource

    7 VCA Resource VCA resource is a collection of smart functions supported by the device. 7.1 Temperature Measurement When you enable this function, the device measures the actual temperature of the scene. It alarms when temperature exceeds the temperature threshold value. 7.1.1 Thermography Configuration Flow Chart This part introduces the process of configuring temperature measurement.
  • Page 53: Automatic Thermography

    Note Please refer to the Quick Start Guide for detailed information of Installation part in the flow chart. 7.1.2 Automatic Thermography Configure the temperature measurement parameters and temperature measurement rules. The device can measure the actual temperature and output alarms when temperature exceeds the alarm threshold value.
  • Page 54 Display the information on the top left of screen. Add Original Data on Capture Check to add data on alarm triggered capture of thermal channel. Add Original Data on Stream Add and save original raw data to stream. The function requires higher network bandwidth. Picture Quality Set picture quality as high, medium, or low.
  • Page 55 Optical Transmissivity Set the optical transmissivity of external optical material (e.g.: germanium window) to improve the temperature measuring accuracy. This parameter varies according to different camera models. Calibration Coefficient Check to enable it and set the value of calibration coefficient to get the temperature of the external window or optical material automatically.
  • Page 56 An OSD will be displayed when the function is enabled. Restart Algorithm Library Click Restart to restart the algorithm library of the corresponding filter function. Note ● The Smoking Filter and Forklift Filter vary according to different camera models. ● Perimeter Protection and Forklift Filter are mutually exclusive. 5.
  • Page 57 Note Temperature sudden change alarm is only supported by certain device models. 5. Refer to Set Arming Schedule for setting scheduled time. Refer to Linkage Method Settings for setting linkage method. 6. Optional: Set the offsite pre-alarm/alarm specially during off-hours when there are less causes of false alarms.
  • Page 58 Steps 1. Go to Configuration > Temperature Measurement & Fire Prevention > Basic Settings, check Enable Temperature Measurement. 2. Refer to Set Thermography Parameters to set the parameters. 3. Go to Configuration > Temperature Measurement & Fire Prevention > Advanced Settings, select Expert.
  • Page 59 Alarm Temperature and Pre-Alarm Temperature Set the alarm temperature and pre-alarm temperature. E.g., select Alarm Rule as Above (Average Temperature), set the Pre-Alarm Temperature to 50 °C, and set the Alarm Temperature to 55 °C. The device pre-alarms when its average temperature is higher than 50 °C and alarms when its average temperature is higher than 55 °C.
  • Page 60 Offsite Pre-Alarm Temperature When the temperature of target exceeds the Offsite Pre-Alarm Temperature during the Offsite Arming Schedule, and this status lasts not shorter than the Filtering Time, the pre- alarm is triggered. Offsite Alarm Temperature When the temperature of target exceeds the Offsite Alarm Temperature during the Offsite Arming Schedule, and this status lasts not shorter than the Filtering Time, the alarm is triggered.
  • Page 61: Manual Thermography

    2. Click and move the area to adjust the position. 3. Drag the corners of the area to adjust the size and shape. Go to Live View interface to view the maximum temperature and rule of the area in thermal channel.
  • Page 62: Recommended Scene

    7.2.1 Recommended Scene This part introduces the recommended scenes of fire source detection and helps you select the appropriate scene. Fire source detection can be applied to indoor and outdoor monitoring with a large detection radius. To achieve the best monitoring effect, please set the installation place as requirements below.
  • Page 63: Set Detection Shield Region

    Note When VCA Resource Type is selected as Temperature Measurement + Perimeter Protection, only Smoking Mode is supported in Fire Source Detection. When VCA Resource Type is selected as Temperature Measurement + Fire Detection, Dynamic Fire is also supported in Fire Source Detection.
  • Page 64 Steps 1. Go to Configuration > Perimeter Protection > Rule. 2. Check Intelligent Analysis. 3. Set perimeter protection rules. 1) Click to add a new rule. 2) Enter the rule name, and click the drop-down menu to select Rule Type. Line Crossing If any target moves across the setting line, the alarm will be triggered.
  • Page 65 4) Set other parameters for the rule. Target Detection You are recommended to select the target as Human & Vehicle. Scene Mode The scene mode is set to be General by default. Select Distant View when you are far from the targets.
  • Page 66: Set Perimeter Protection Shield Region

    5. Set Arming Schedule and Linkage Method Settings for each rule. 6. Optional: You can shield certain areas from being detected. Refer to Set Perimeter Protection Shield Region for detailed settings. 7. Optional: Set displayed VCA information on stream or picture. Refer to Set Overlay & Capture Parameters for detailed settings.
  • Page 67: Calibration

    2. Click Save. Go to Configuration > Local, check Enable rules to display rules information on the live view. 7.3.4 Calibration You can calibrate the camera first to improve the detection accuracy of perimeter protection. The calibration is optional, take the actual condition for reference. Note The function and the path to the calibration page vary according to different camera models.
  • Page 68 5. When the person exits, click to stop calibration. Note After auto calibration, refer to Verify the Calibration Result to verify if the calibration is successful. Set manual calibration if the auto calibration failed, or the verified result turns bad. Result After calibration, the height and angle of camera will be shown in live view.
  • Page 69: Set Advanced Configuration Parameters

    Verify the Calibration Result The function can verify whether the calibrated value is consistent with the actual value. Steps 1. Click 2. Click , and drag a vertical line in the view. 3. Move the line to the target, then click to calculate the length.
  • Page 70: Set Open Platform

    Note Only certain device models support the function. 7.4.1 Set Open Platform You can install the application for the third-party to develop and run its function and service. For the device supporting this function, you can follow the steps to import and run smart applications. Before You Start Go to Configuration >...
  • Page 71 Figure 7-2 Set VCA Resource 64 English...
  • Page 72: Event And Alarm

    8 Event and Alarm This part introduces the configuration of events. The device takes certain response to triggered alarm. Certain events may not be supported by certain device models. 8.1 Set Motion Detection It helps to detect the moving objects in the detection region and trigger the linkage actions. Steps 1.
  • Page 73: Expert Mode

    8.1.2 Expert Mode You can configure the motion detection parameters of day/night switch according to the actual needs. Steps 1. Select expert mode in Configuration. 2. Set parameters of expert mode. Scheduled Image Settings OFF: Switch is disabled. Auto-Switch: The system switches day/night mode automatically according to environment. It displays colored image at day and black and white image at night.
  • Page 74: Set Alarm Input

    Figure 8-1 Set Video Tampering Area 5. Refer to Set Arming Schedule for setting scheduled time. Refer to Linkage Method Settings for setting linkage method. 6. Click Save. 8.3 Set Alarm Input Alarm signal from the external device triggers the corresponding actions of the current device. Before You Start Make sure the external alarm device is connected.
  • Page 75: Detect Audio Exception

    HDD Full The HDD storage is full. HDD Error Error occurs in HDD. Network The device is offline. Disconnected IP Address Conflicted The IP address of current device is same as that of other device in the network. Illegal Login Incorrect user name or password is entered.
  • Page 76: Detect Scene Change

    Note The function varies according to different models. 8.6 Detect Scene Change Scene change detection function detects the change of the scene. Some certain actions can be taken when the alarm is triggered. Steps 1. Go to Configuration > Event > Smart Event > Scene Change Detection. 2.
  • Page 77: Arming Schedule And Alarm Linkage

    9 Arming Schedule and Alarm Linkage Arming schedule is a customized time period in which the device performs certain tasks. Alarm linkage is the response to the detected certain incident or target during the scheduled time. 9.1 Set Arming Schedule Set the valid time of the device tasks.
  • Page 78 4. Go to Live View. You can click for a quick alarm output configuration and check to enable Manual Alarm or turn it off. Automatic Alarm Set the automatic alarm parameters, then the device triggers an alarm output automatically in the set arming schedule.
  • Page 79: Ftp/Nas/Memory Card Uploading

    Steps 1. Check Enable Auto Trigger. 2. Set Trigger Time, and the device will trigger an alarm output to the alarm server automatically in the set time. 3. Set Auto Trigger Delay. It refers to the time duration that the alarm output remains in effect after the auto trigger.
  • Page 80: Notify Surveillance Center

    Note If you want to use STARTTLS, make sure that the protocol is supported by your email server. If you check the Enable STARTTLS while the protocol is not supported by your email sever, your email is sent with no encryption. 4) Optional: If you want to receive notification with alarm pictures, check Attached Image.
  • Page 81: External Alarm Module

    9.2.6 External Alarm Module You can connect the device with the external alarm module to send alarm to the external device. Steps 1. Go to Configuration > Event > Basic Event > External Alarm Module. 2. Click Add to add an external device. 3.
  • Page 82: Set Flashing Alarm Light Output

    available, you can click Add to upload an audio file that meets the requirement. Up to six audio files can be uploaded, and each audio file shall not exceed 512 KB. 4. Optional: Click Test to play the selected audio file on the device. 5.
  • Page 83: System And Security

    10 System and Security It introduces system maintenance, system settings and security management, and explains how to configure relevant parameters. 10.1 View Device Information You can view device information, such as Device No., Model, Serial No. and Firmware Version. Enter Configuration > System > System Settings > Basic Information to view the device information.
  • Page 84: Export Diagnose Information

    Note You can import the exported Device Common Parameters to devices of the same series. 4) Click Browse to select the saved configuration file. 5) Input the encryption password you have set when exporting the configuration file. 6) Click Import. 10.4 Export Diagnose Information Diagnose information includes running log, system information, hardware information.
  • Page 85: Upgrade

    Restore Reset device parameters, except user information, IP parameters and video format to the default settings. Default Reset all the parameters to the factory default. Note Be careful when using this function. After resetting to the factory default, all the parameters are reset to the default settings. 10.8 Upgrade Before You Start You need to obtain the correct upgrade package.
  • Page 86: Synchronize Time Manually

    10.10.1 Synchronize Time Manually Steps 1. Go to Configuration > System > System Settings > Time Settings. 2. Select Time Zone. 3. Click Manual Time Sync.. 4. Choose one time synchronization method. – Select Set Time, and manually input or select date and time from the pop-up calendar. Check Sync.
  • Page 87: Set Rs-232

    10.11 Set RS-232 RS-232 can be used to debug device or access peripheral device. RS-232 can realize communication between the device and computer or terminal when the communication distance is short. Before You Start Connect the device to computer or terminal with RS-232 cable. Steps 1.
  • Page 88: Security

    3. Set the temperature unit and distance unit. 4. Click Save. 10.14 Security You can improve system security by setting security parameters. 10.14.1 Authentication You can improve network access security by setting RTSP and WEB authentication. Go to Configuration > System > Security > Authentication to choose authentication protocol and method according to your needs.
  • Page 89: Set Ip Address Filter

    Security audit logs can be saved on device internal storage. The log will be saved every half hour after device booting. Due to limited storage space, you can also save the logs on a log server. Search Security Audit Logs You can search and analyze the security log files of the device so as to find out the illegal intrusion and troubleshoot the security events.
  • Page 90: Set Mac Address Filter

    10.14.4 Set MAC Address Filter MAC address filter is a tool for access control. You can enable the MAC address filter to allow or forbid the visits from the certain MAC addresses. Steps Note MAC Address Filter is mutually exclusive with IP Address Filter. 1.
  • Page 91 3. Click OK. 4. Optional: Click Export to export the certificate, or click Delete to delete the certificate to recreate a certificate, or click Certificate Properties to view the certificate details. Create Certificate Request Before You Start Select a self-signed certificate. Steps 1.
  • Page 92: Control Timeout Settings

    Install CA Certificate Steps 1. Click Import. 2. Enter the Certificate ID. 3. Click Browser to select the desired server/client certificate. 4. Select the desired import method and enter the required information. 5. Click OK. Note Up to 16 certificates are allowed. Enable Certificate Expiration Alarm Steps 1.
  • Page 93: Set Https

    10.14.8 Set HTTPS HTTPS is a network protocol that enables encrypted transmission and identity authentication, which improves the security of remote access. Steps 1. Go to Configuration > Network > Advanced Settings > HTTPS. 2. Check Enable. 3. Optional: Check HTTPS Browsing to access the device only via HTTPS protocol. 4.
  • Page 94: User And Account

    Note ● If you set the Protocol to EAP-TLS, select the Client Certificate and CA Certificate. ● If the function is abnormal, check if the selected certificate is abnormal in Certificate Management. 10.15 User and Account 10.15.1 Set User Account and Permission The administrator can add, modify, or delete other accounts, and grant different permission to different user levels.
  • Page 95: Online Users

    Note The administrator can add up to 31 user accounts. 3. Click General to set the allowed number of multi-user simultaneous login. Note Only the administrator has the authority to the operation. 4. Click OK. 10.15.2 Online Users The information of users logging into the device is shown. Go to Configuration >...
  • Page 96: Appendix

    11 Appendix 11.1 Common Material Emissivity Reference Material Emissivity Human Skin 0.98 Printed Circuit Board 0.91 Concrete 0.95 Ceramic 0.92 Rubber 0.95 Paint 0.93 Wood 0.85 Pitch 0.96 Brick 0.95 Sand 0.90 Soil 0.92 Cloth 0.98 Hard Paperboard 0.90 White Paper 0.90 Water 0.96...

Table of Contents