Page 2
Network Camera User Manual User Manual About this Manual This Manual is applicable to Network Camera. The Manual includes instructions for using and managing the product. Pictures, charts, images and all other information hereinafter are for description and explanation only. The information contained in the Manual is subject to change, without notice, due to firmware updates or other reasons.
Page 3
Network Camera User Manual SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
Page 4
Network Camera User Manual To reduce the risk of fire or electrical shock, do not expose this product to rain or moisture. This installation should be made by a qualified service person and should conform to all the local codes. ...
Page 5
Network Camera User Manual While shipping, pack the camera in its original, or equivalent, packing materials. Or packing the same texture. Improper use or replacement of the battery may result in hazard of explosion. Please use the manufacturer recommended battery type. Notes: For the camera supports IR, you are required to pay attention to the following precautions to prevent IR reflection:...
Page 6
Network Camera User Manual Table of Contents Chapter 1 System Requirement ................9 Chapter 2 Network Connection ................10 Setting the Network Camera over the LAN ............10 Wiring over the LAN......................10 Activating the Camera ....................11 (Optional) Setting Security Question ................18 Setting the Network Camera over the WAN .............
Page 7
Network Camera User Manual Configuring VCA Resource ....................49 Open Source Software License ..................50 Maintenance ....................50 Upgrade & Maintenance ....................50 Log ..........................51 System Service ........................ 52 Security Settings ....................53 Authentication ........................ 53 IP Address Filter ......................54 Security Service .......................
Page 9
Network Camera User Manual Configure Capture Schedule................156 Configuring Net HDD ..................157 Memory Card Detection .................160 Configuring Lite Storage ..................162 Playback ..................164 Chapter 12 Picture ..................166 Chapter 13 Application ..................168 Chapter 14 Face Capture Statistics ..................168 People Counting Statistics ................168 Heat Map Statistics ..................169 Counting Statistics ..................170 Queue Management Statistics ................171 Queuing-Up Time Analysis ....................
Page 10
Network Camera User Manual Chapter 1 System Requirement Operating System Microsoft Windows XP SP1 and above version 2.0 GHz or higher 1G or higher Display 1024×768 resolution or higher Web Browser Internet Explorer 8.0 and above version, Apple Safari 5.0.2 and above version, Mozilla Firefox 30.0 and above version and Google Chrome 31.0 and above version.
Page 11
Network Camera User Manual Chapter 2 Network Connection Note: You shall acknowledge that the use of the product with Internet access might be under network security risks. For avoidance of any network attacks and information leakage, please strengthen your own protection. If the product does not work properly, please contact with your dealer or the nearest service center.
Page 12
Network Camera User Manual computer with a network cable as shown in Figure 2-1. Refer to the Figure 2-2 to set network camera over the LAN via a switch or a router. Network Cable Network Camera Computer Connecting Directly Network Camera Computer Connecting via a Switch or a Router...
Page 13
Network Camera User Manual Activation via Web Browser 3. Create a password and input the password into the password field. A password with user name in it is not allowed. STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Page 14
Network Camera User Manual 2. Check the device status from the device list, and select the inactive device. Device Tool Interface Note: The DEVICE SEARCH software supports activating the camera in batch. Refer to the user manual of DEVICE SEARCH software for details. 3.
Page 15
Network Camera User Manual 5. Change the device IP address to the same subnet with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP. Modify the IP Address 6. Input the password and click the Modify button to activate your IP address modification.
Page 16
Network Camera User Manual 1. Run the client software and the control panel of the software pops up, as shown in the figure below. Control Panel 2. Click the Device Management icon to enter the Device Management interface, as shown in the figure below.
Page 17
Network Camera User Manual Device Management Interface 3. Check the device status from the device list, and select an inactive device. 4. Click the Activate button to pop up the Activation interface. 5. Create a password and input the password in the password field, and confirm the password.
Page 18
Network Camera User Manual Activation Interface (Client Software) 6. Click OK button to start activation. 7. Click the Modify Netinfo button to pop up the Network Parameter Modification interface, as shown in the figure below. Modifying the Network Parameters 8. Change the device IP address to the same subnet with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP.
Page 19
Network Camera User Manual (Optional) Setting Security Question Security question is used to reset the admin password when admin user forgets the password. Admin user can follow the pop-up window to complete security question settings during camera activation. Or, admin user can go to User Management interface to set up the function.
Page 20
Network Camera User Manual 5. Visit the network camera through a web browser or the client software over the internet. Accessing the Camera through Router with Static IP Connecting the network camera with static IP directly You can also save the static IP in the camera and directly connect it to the internet without using a router.
Page 21
Network Camera User Manual with port mapping. Note: Refer to Appendix 2 for detailed information about port mapping. 5. Apply a domain name from a domain name provider. 6. Configure the DDNS settings in the setting interface of the router. 7.
Page 22
Network Camera User Manual Steps: 1. Apply a domain name from a domain name provider. 2. Configure the DDNS settings in the DDNS Settings interface of the network camera. Refer to Section 7.1.2 Configuring DDNS Settings for detailed configuration. 3. Visit the camera via the applied domain name.
Page 23
Chapter 3 Access to the Network Camera Accessing by Web Browsers Note: For certain camera models, HTTPS is enabled by default and the camera creates an unsigned certificate automatically. When you access to the camera the first time, the web browser prompts a notification about the certificate issue. To cancel the notification, install a signed-certificate to the camera.
Page 24
Network Camera User Manual 4. Click Login. 5. (Optional) Install the plug-in before viewing the live video and operating the camera. Follow the installation prompts to install the plug-in Note: If you are using Google Chrome 45 and its above version or Mozilla Firefox 52 and its above version, plug-in installation is not required.
Page 25
Network Camera User Manual Guarding Expert Main View...
Page 26
Network Camera User Manual Chapter 4 Wi-Fi Settings Purpose: By connecting to the wireless network, you don’t need to use cable of any kind for network connection, which is very convenient for the actual surveillance application. Note: This chapter is only applicable for the cameras with the built-in Wi-Fi module. Configuring Wi-Fi Connection in Manage and Ad- hoc Modes Purpose:...
Page 27
Network Camera User Manual 3. Click to choose a wireless connection on the list. Wi-Fi Setting- Manage Mode 4. Check the radio button to select the Network mode as Manage, and the Security mode of the network is automatically shown when you select the wireless network, please don’t change it manually.
Page 28
Network Camera User Manual 2. Customize a SSID for the camera. 3. Choose the Security Mode of the wireless connection. 4. Enable the wireless connection function for your PC. 5. On the PC side, search the network and you can see the SSID of the camera listed.
Page 29
Network Camera User Manual WEP Mode Authentication - Select Open or Shared Key System Authentication, depending on the method used by your access point. Not all access points have this option, in which case they probably use Open System, which is sometimes known as SSID Authentication.
Page 30
Network Camera User Manual TLS or EAP-PEAP. EAP-TLS EAP-TLS Identity - Enter the user ID to present to the network. Private key password – Enter the password for your user ID. EAPOL version - Select the version used (1 or 2) in your access point. ...
Page 31
Network Camera User Manual devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
Page 32
Network Camera User Manual PBC refers to the Push-Button-Configuration, in which the user simply has to push a button, either an actual or virtual one (as the button on the configuration interface of the IE browser), on both the Access Point (and a registrar of the network) and the new wireless client device.
Page 33
Network Camera User Manual Use PIN Code If the PIN code is generated from the router side, you should enter the PIN code you get from the router side in the Router PIN code field. 3. Click Connect. You can generate the PIN code on the camera side. And the expired time for the PIN code is 120 seconds.
Page 34
Network Camera User Manual Setting WLAN Parameters 3. Customize the IPv4 address, the IPv4 Subnet Mask and the Default Gateway. The setting procedure is the same with that of LAN. If you want to be assigned the IP address you can check the checkbox to enable the DHCP.
Page 35
Chapter 5 Live View Live View Page Purpose: The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters. Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page.
Page 36
Network Camera User Manual selectable. And for Non-IE users, webcomponents, quick time, VLC or MJPEG is selectable if they are supported by the web browser. Note: If you are using Google Chrome 45 and its above version or Mozilla Firefox 52 and its above version, plug-in installation is not required.
Page 37
Network Camera User Manual Icon Description Turn on/off microphone. Start/stop digital zoom function. Note: The icons vary according to the different camera models. Recording and Capturing Pictures Manually In the live view interface, click on the toolbar to capture the live pictures or click to record the live view.
Page 38
Network Camera User Manual PTZ Control Panel Click the zoom/focus/iris buttons to realize lens control. Notes: There are eight direction arrows ( , ) in the control panel. Click the arrows to realize adjustment in the relative positions. For the cameras which support lens movements only, the direction buttons are invalid.
Page 39
Network Camera User Manual 1. In the PTZ control panel, select a preset number from the preset list. Setting a Preset 2. Use the PTZ control buttons to move the lens to the desired position. • Pan the camera to the right or left. •...
Page 40
Network Camera User Manual Setting/Calling a Patrol Note: No less than 2 presets have to be configured before you set a patrol. Steps: 1. Click to enter the patrol configuration interface. 2. Select a path No., and click to add the configured presets. 3.
Page 41
Chapter 6 Network Camera Configuration Configuring Local Parameters Purpose: The local configuration refers to the parameters of the live view, record files and captured pictures. The record files and captured pictures are the ones you record and capture using the web browser and thus the saving paths of them are on the PC running the browser.
Page 42
Network Camera User Manual TCP: Ensures complete delivery of streaming data and better video quality, yet the real-time transmission will be affected. UDP: Provides real-time audio and video streams. HTTP: Allows the same quality as of TCP without setting specific ports for streaming under some network environments.
Page 43
Network Camera User Manual Picture and Clip Settings: Set the saving paths of the captured pictures and clipped video files. Valid for the pictures you capture with the web browser. Save snapshots in live view to: Set the saving path of the manually captured pictures in live view mode.
Page 44
Network Camera User Manual firmware for the camera. Online Upgrade Note: When the camera is upgrading, don't power off the camera. During upgrading, the camera may not be accessible. You need to wait 1 or 2 minutes before the upgrade finishes.
Page 45
Network Camera User Manual (1) Click to enable the NTP function. (2) Configure the following settings: Server Address: IP address of NTP server. NTP Port: Port of NTP server. Interval: The time interval between the two synchronizing actions with NTP server.
Page 46
Network Camera User Manual Time Sync Manually Click Save to save the settings. Configuring RS232 Settings The RS232 port can be used in two ways: Parameters Configuration: Connect a computer to the camera through the serial port. Device parameters can be configured by using software such as HyperTerminal.
Page 47
Network Camera User Manual RS232 Settings Note: If you want to connect the camera by the RS232 port, the parameters of the RS232 should be exactly the same with the parameters you configured here. 3. Click Save to save the settings. Configuring RS485 Settings Purpose: The RS485 serial port is used to control the PTZ of the camera.
Page 48
Network Camera User Manual RS-485 Settings 2. Set the RS485 parameters and click Save to save the settings. By default, the Baud Rate is set as 9600 bps, the Data Bit is 8, the stop bit is 1 and the Parity and Flow Control is None. Note: The Baud Rate, PTZ Protocol and PTZ Address parameters should be exactly the same as the PTZ camera parameters.
Page 49
Network Camera User Manual DST Settings 2. Select the start time and the end time. 3. Select the DST Bias. 4. Click Save to activate the settings. Configuring External Devices Purpose: For the device supported external devices, including the wiper on the housing or the LED light, you can control them via the Web browser.
Page 50
Network Camera User Manual the Start Time and End Time. Set Schedule Auto: The LED will be turned on according to the environment illumination. 5. Click Save to save the settings. Configuring VCA Resource Purpose: VCA resource offers you options to enable certain VCA functions according to actual need when several VCA functions are available.
Page 51
Network Camera User Manual Open Source Software License Information about the open source software that applies to the IP camera can be checked if required. Go to Configuration > System Settings > About. Maintenance Upgrade & Maintenance Purpose: The upgrade & maintenance interface allows you to process the operations, including reboot, partly restore, restore to default, export/import the configuration files, and upgrade the device.
Page 52
Network Camera User Manual Import Config. File Configuration file is used for the batch configuration of the cameras. Steps: 1. Click Browse to select the saved configuration file. 2. Click Import and input encryption password to start importing configuration file.
Page 53
Network Camera User Manual Log Searching Interface 2. Set the log search conditions to specify the search, including the Major Type, Minor Type, Start Time and End Time. 3. Click Search to search log files. The matched log files will be displayed on the log list interface.
Page 54
Network Camera User Manual IR LED, ABF (Auto Back Focus), Auto Defog, or Status LED, you can select to enable or disable the corresponding service according to the actual demands. ABF: When ABF function is enabled, you can click on PTZ control panel to realize auxiliary focus.
Page 55
Network Camera User Manual Digest is the recommended authentication method for better data security. You must be aware of the risk if you adopt basic as the authentication method. 3. Click Save to save the settings. IP Address Filter Purpose: This function makes it possible for access control.
Page 56
Network Camera User Manual Add an IP (3) Click the OK to finish adding. Modify an IP Address Steps: (1) Left-click an IP address from filter list and click Modify. (2) Modify the IP address in the text filed. Modify an IP (3) Click the OK to finish modifying.
Page 57
Network Camera User Manual the IP address is rejected if admin user performs 7 failed user name/password attempts (5 times for the operator/user). Note: If the IP address is rejected, you can try to login the device after 30 minutes. User Management User Management ...
Page 58
Network Camera User Manual Notes: ● Up to 31 user accounts can be created. ● Users of different levels own different default permissions. Operator and user are selectable. STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
Page 59
Network Camera User Manual As Operator or User Operator or user can modify password. Old password is required for this action. Security Question Purpose: Security question is used to reset the admin password when admin user forgets the password. Set Security Question: You can set the security questions during camera activation.
Page 60
Network Camera User Manual questions. Online Users Purpose: You can see the current users who are visiting the device through this interface. User information, such as user name, level, IP address, and operation time, is displayed in the User List. Click Refresh to refresh the list.
Page 61
Chapter 7 Network Settings Purpose: Follow the instructions in this chapter to configure the basic settings and advanced settings. Configuring Basic Settings Purpose: You can configure the parameters, including TCP/IP, DDNS, PPPoE, Port, and NAT, etc., by following the instructions in this section. Configuring TCP/IP Settings Purpose: TCP/IP settings must be properly configured before you operate the camera over...
Page 62
Network Camera User Manual TCP/IP Settings 2. Configure the basic network settings, including the NIC Type, IPv4 or IPv6 Address, IPv4 or IPv6 Subnet Mask, IPv4 or IPv6 Default Gateway, MTU settings and Multicast Address. 3. (Optional) Check the checkbox of Enable Multicast Discovery, and then the online network camera can be automatically detected by client software via private multicast protocol in the LAN.
Page 63
Network Camera User Manual multicast group address. Before utilizing this function, you have to enable the Multicast function of your router. A reboot is required for the settings to take effect. Configuring DDNS Settings Purpose: If your camera is set to use PPPoE as its default network connection, you can use the Dynamic DNS (DDNS) for network access.
Page 64
Network Camera User Manual Figure 7-2 DynDNS Settings NO-IP: Steps: (1) Choose the DDNS Type as NO-IP. Figure 7-3 NO-IP DNS Settings (2) Enter the Server Address as www.noip.com (3) Enter the Domain name you registered. (4) Enter the User Name and Password. (5) Click Save and then you can view the camera with the domain name.
Page 65
Network Camera User Manual Configuring PPPoE Settings Steps: Enter the PPPoE Settings interface: Configuration > Network > Basic Settings > PPPoE PPPoE Settings 2. Check the Enable PPPoE checkbox to enable this feature. 3. Enter User Name, Password, and Confirm password for PPPoE access. Note: The User Name and Password should be assigned by your ISP.
Page 66
Network Camera User Manual You can set the port No. of the camera, e.g., HTTP port, RTSP port and HTTPS port. Steps: 1. Enter the Port Settings interface, Configuration > Network > Basic Settings > Port Port Settings 2. Set the ports of the camera. HTTP Port: The default port number is 80, and it can be changed to any port No.
Page 67
Network Camera User Manual Note: WebSocket and WebSockets protocol are used for plug-in free live view. For detailed information, see 7.2.11 Network Service. 3. Click Save to save the settings. Note: A reboot is required for the settings to take effect. Configure NAT (Network Address Translation) Settings Purpose: NAT interface allows you to configure the UPnP™...
Page 68
Network Camera User Manual 3. Choose a friendly name for the camera, or you can use the default name. 4. Select the port mapping mode. Manual and Auto are selectable. Note: If you select Auto, you should enable UPnP™ function on the router. If you select Manual, you can customize the value of the external port and complete port mapping settings on router manually.
Page 69
Network Camera User Manual strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
Page 70
Network Camera User Manual SNMP Settings 2. Check the checkbox of Enable SNMPv1, Enable SNMP v2c, Enable SNMPv3 to enable the feature correspondingly. 3. Configure the SNMP settings. Note: The settings of the SNMP software should be the same as the settings you...
Page 71
Network Camera User Manual configure here. 4. Click Save to save and finish the settings. Notes: A reboot is required for the settings to take effect. • To lower the risk of information leakage, you are suggested to enable SNMP v3 •...
Page 72
Network Camera User Manual FTP server login. For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
Page 73
Network Camera User Manual anonymous access to the FTP server. Note: The anonymous access function must be supported by the FTP server. 6. Click Save to save the settings. 7.2.3 Configuring Email Settings Purpose: The system can be configured to send an Email notification to all designated receivers if an alarm event is detected, e.g., motion detection event, video loss, video tampering, etc.
Page 74
Network Camera User Manual The SMTP port should be set as 465 for this encryption method. When you select SSL or TLS and enable STARTTLS, emails will be sent after encrypted by STARTTLS, and the SMTP port should be set as 25. Note: If you want to use STARTTLS, make sure that the protocol is supported by your e-mail server.
Page 75
Network Camera User Manual Email Settings 4. Click Save to save the settings. Platform Access Purpose: Platform access provides you an option to manage the devices via platform. Steps: 1. Enter the Platform Access settings interface: Configuration > Network > Advanced Settings >...
Page 76
Network Camera User Manual 1) Click and read "Terms of Service" and "Privacy Policy" in pop-up window. 2) Create a verification code or change the verification code for the camera. Note: The verification code is required when you add the camera to Guarding Vision •...
Page 77
Network Camera User Manual selectable. If Auto is selected, the network selection priority comes as: 4G > 3G > Wired Network. 4) Input the offline time if Manual is selected as the dial mode. 5) Input the UIM Number (Mobile Phone Number). 6) Click the Edit button to set the arming schedule if Auto is selected as the dial mode.
Page 78
Network Camera User Manual E.g., If you set the port number as 443 and the IP address is 192.168.1.64, you may access the device by inputting https://192.168.1.64:443 via the web browser. Note: If you use HTTPS to visit the camera, you should enable WebSockets for live view. Go to Configuration >...
Page 79
Network Camera User Manual Create Self-signed Certificate (3) Enter the country, host name/IP, validity and other information. (4) Click OK to save the settings. Note: If you already had a certificate installed, the Create Self-signed Certificate is grayed out. Create the authorized certificate (1) Select Create the certificate request first and continue the installation as the Installation Method.
Page 80
Network Camera User Manual 5. Click the Save button to save the settings. Configuring QoS Settings Purpose: QoS (Quality of Service) can help solve the network delay and network congestion by configuring the priority of data sending. Steps: 1. Enter the QoS Settings interface: Configuration > Network > Advanced Settings > QoS Settings 2.
Page 81
Network Camera User Manual connecting the camera to the network protected by the IEEE 802.1X. Before you start: The authentication server must be configured. Please apply and register a user name and password for 802.1X in the server. For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices.
Page 82
Network Camera User Manual 4. Enter the user name and password to access the server. 5. Click Save to finish the settings. Note: A reboot is required for the settings to take effect. Integration Protocol Purpose: If you need to access to the device through ONVIF protocol, you can configure ONVIF user in this interface.
Page 83
Network Camera User Manual The function is supported by certain camera model. • WebSocket or WebSockets protocol are used for non-plug-in live view. When you use Google Chrome 45 and its above version or Mozilla Firefox 52 and its above version to visit your camera, you should enable WebSocket or Websokets protocol.
Page 84
Chapter 8 Video/Audio Settings Purpose: Follow the instructions below to configure the video setting, audio settings, ROI, Display info. on Stream, etc. Configuring Video Settings For certain camera models, you can configure parameters for available video streams, for example, the main stream, the sub-stream, etc. And you can also customize additional video streams for further needs.
Page 85
Network Camera User Manual 2. Select the Stream Type. Supported stream types are listed in the drop-down list. Notes: For some models, the Third Stream is not enabled by default. Go to System > • Maintenance > System Service> Software to enable the function is required. The main stream is usually for recording and live view with good bandwidth, •...
Page 86
Network Camera User Manual and MPEG4. Supported encoding type for different stream types may differ. H.265 is a new encoding technology. Compared with H.264, it reduces the transmission bitrate under the same resolution, frame rate and image quality. Note: Selectable video encoding types may vary according to different camera modes.
Page 87
Network Camera User Manual bitrate in the long term. The camera needs at least 24 hours to adapt to a fixed monitoring scene. Max. Average Bitrate: When you set a maximum bitrate, its corresponding recommended maximum average bitrate will be shown in the Max. Average Bitrate box. You can also set the maximum average bitrate manually from 32 Kbps to the value of the set maximum bitrate.
Page 88
Network Camera User Manual can live view them, but cannot record or playback them. Notes: Custom video function requires the support of the camera. • After a camera restore action (not restore to default setting), quantity of custom • video streams and their names are kept, but the related parameters are restored. Custom Video Settings Steps: 1.
Page 89
Network Camera User Manual Configuring Audio Settings Steps: 1. Enter the Audio Settings interface: Configuration > Video/Audio > Audio. Audio Settings 2. Configure the following settings. Note: Audio settings vary according to different camera models. Audio Encoding: G.722.1, G.711 ulaw, G.711alaw, G.726, MP2L2 and PCM are selectable.
Page 90
Network Camera User Manual resource to the region of interest, thus to increase the quality of the ROI whereas the background information is less focused. Note: ROI function varies according to different camera models. Region of Interest Settings Steps: 1. Enter the ROI settings interface: Configuration > Video/Audio > ROI. 2.
Page 91
Network Camera User Manual 4. Set Fixed Region for ROI. (1) Select the Region No. from the drop-down list. (2) Check the Enable checkbox to enable ROI function for the chosen region. (3) Click Drawing. Click and drag the mouse on the view screen to draw a red rectangle as the ROI region.
Page 92
Network Camera User Manual Configuring Target Cropping Purpose: You can specify a target area on the live video, and then the specified video area can be displayed via the third stream in certain resolution, providing more details of the target area if needed.
Page 93
Chapter 9 Image Settings Purpose: Follow the instructions in this chapter to configure the image parameters, including display settings, OSD settings, privacy mask, and picture overlay. Configuring Display Settings Purpose: Configure the image adjustment, exposure settings, day/night switch, backlight settings, white balance, image enhancement, video adjustment, and other parameters in display settings.
Page 94
Network Camera User Manual 2. Set the image parameters of the camera. Note: In order to guarantee the image quality in different illumination, it provides two sets of parameters for users to configure. Image Adjustment Brightness describes bright of the image, which ranges from 1 to 100. Contrast describes the contrast of the image, which ranges from 1 to 100.
Page 95
Network Camera User Manual and auxiliary focus manually. Semi-Auto: Camera will focus automatically when you adjust the zoom parameters. Day/Night Switch Select the Day/Night Switch mode according to different surveillance demand. Day, Night, Auto, Scheduled-Switch, and Triggered by alarm input are selectable for day/night switch.
Page 96
Network Camera User Manual if the object is near the camera, the device adjusts the supplement light to lower power, and the light is in higher power if the object is far away. Backlight Settings BLC Area: If you focus on an object against strong backlight, the object will be too dark to be seen clearly.
Page 97
Network Camera User Manual clearer. EIS (Electrical Image Stabilizer): EIS reduces the effects of vibration in a video. Grey Scale: You can choose the range of the grey scale as [0-255] or [16-235]. Video Adjustment Mirror: It mirrors the image so you can see it inversed. Left/Right, Up/Down, Center, and OFF are selectable.
Page 98
Network Camera User Manual Day/Night Scheduled-Switch Configuration Interface Steps: 1. Click the calendar icon to select the start time and the end time of the switch. Notes: The start time and end time refer to the valid time for day mode. •...
Page 99
Network Camera User Manual OSD Settings Steps: 1. Enter the OSD Settings interface: Configuration > Image > OSD Settings. 2. Check the corresponding checkbox to select the display of camera name, date or week if required. 3. Edit the camera name in the text field of Camera Name. 4.
Page 100
Network Camera User Manual 8. Click Save to save the settings. Configuring Privacy Mask Purpose: Privacy mask enables you to cover certain areas on the live video to prevent certain spots in the surveillance area from being live viewed and recorded. Steps: 1.
Page 101
Network Camera User Manual you set without saving them. 6. Click Save to save the settings. Configuring Picture Overlay Purpose: Picture overlay enables you to overlay a picture on the image. This function enables a certain enterprise or users to overlay their logo on the image. Steps: 1.
Page 102
Chapter 10 Event Settings This section explains how to configure the network camera to respond to alarm events, including basic event and smart event. Basic Events You can configure the basic events by following the instructions in this section, including motion detection, video tampering, alarm input, alarm output, and exception, etc.
Page 103
Network Camera User Manual 3. Check the checkbox of Enable Dynamic Analysis for Motion if you want to mark the detected objects with green rectangles. Note: Select Disable for rules if you don’t want the detected objected displayed with the green rectangles. Select disable rules from Configuration > Local Configuration >...
Page 104
Network Camera User Manual Task 2: Set the Arming Schedule for Motion Detection Arming Schedule Steps: 1. Click Arming Schedule to edit the arming schedule. 2. Click on the time bar and drag the mouse to select the time period. Arming Schedule Note: Click on the selected time period, you can adjust the time period to the...
Page 105
Network Camera User Manual 4. Move the mouse to the end of each day, a copy dialogue box pops up, and you can copy the current settings to other days. 5. Click Save to save the settings. Note: The time of each period can’t be overlapped. Up to 8 periods can be configured for each day.
Page 106
Network Camera User Manual Capture the image when an alarm is triggered and upload the picture to a FTP server. Notes: ● Set the FTP address and the remote FTP server first. Refer to Section 7.2.2 Configuring FTP Settings for detailed information. ●...
Page 107
Network Camera User Manual Expert Mode of Motion Detection Day/Night Switch OFF Steps: 1. Draw the detection area as in the normal configuration mode. Up to 8 areas are supported. 2. Select OFF for Switch Day and Night Settings. 3.
Page 108
Network Camera User Manual Day/Night Scheduled-Switch 3. Select the start time and the end time for the switch timing. 4. Select the area by clicking the area No.. 5. Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area in the daytime.
Page 109
Network Camera User Manual 10.1.1. 5. Click Save to save the settings. 10.1.3 Configuring Alarm Input Steps: 1. Enter the Alarm Input Settings interface: Configuration > Event > Basic Event > Alarm Input. 2. Choose the alarm input No. and the Alarm Type. The alarm type can be NO (Normally Open) and NC (Normally Closed).
Page 110
Network Camera User Manual 6. Click Save to save the settings. 10.1.4 Configuring Alarm Output Alarm Output Settings Steps: 1. Enter the Alarm Output Settings interface: Configuration> Event > Basic Event > Alarm Output. 2. Select one alarm output channel in the Alarm Output drop-down list. You can also set a name for the alarm output (optional).
Page 111
Network Camera User Manual 5. You can copy the settings to other alarm outputs. 6. Click Save to save the settings. 10.1.5 Handling Exception The exception type can be HDD full, HDD error, network disconnected, IP address conflicted and illegal login to the cameras. Steps: 1.
Page 112
Network Camera User Manual 1. Enter the Wireless Alarm Settings interface: Configuration > Advanced Configuration> Basic Event > Wireless Alarm Setting Wireless Alarm 2. Select the wireless alarm number. Up to 8 channels of external wireless alarm input are supported. 3.
Page 113
Network Camera User Manual PIR Alarm Purpose: A PIR (Passive Infrared) alarm is triggered when an intruder moves within the detector's field of view. The heat energy dissipated by a person, or any other warm blooded creature such as dogs, cats, etc., can be detected. Steps: 1.
Page 114
Network Camera User Manual Arming PIR Alarm Emergency Alarm Purpose: You can press the Emergency button on the remote control to trigger the Emergency Alarm in case of an emergency. Note: The remote control is required for the Emergency Alarm. Go to Configuration >...
Page 115
Network Camera User Manual including audio exception detection, defocus detection, scene change detection, intrusion detection, and line crossing detection, etc. These events can trigger the linkage methods, such as Notify Surveillance Center, Send Email, Trigger Alarm Output, etc. Configuring Audio Exception Detection Purpose: Audio exception detection function detects the abnormal sounds in the surveillance scene, such as the sudden increase/decrease of the sound intensity, and some certain...
Page 116
Network Camera User Manual the sound steep rise in the surveillance scene. You can set the detection sensitivity and threshold for sound steep rise. 4. Check the checkbox of Sudden Decrease of Sound Intensity Detection to detect the sound steep drop in the surveillance scene. You can set the detection sensitivity and threshold for sound steep drop.
Page 117
Network Camera User Manual Configuring Defocus Detection 2. Check the checkbox of Enable to enable the function. 3. Click-and-drag the slider to set the detection sensitivity. The sensitivity value ranges from 1 to 100, and the higher the value is, the more easily the defocus image can trigger the alarm.
Page 118
Network Camera User Manual Scene Change Detection 2. Check the checkbox of Enable to enable the function. 3. Click-and-drag the slider to set the detection sensitivity. The sensitivity value ranges from 1 to 100, and the higher the value is, the more easily the change of scene can trigger the alarm.
Page 119
Network Camera User Manual Enter the Face Detection settings interface, Configuration > Event > Smart Event > Face Detection. Check the Enable Face Detection checkbox to enable the function. Check the checkbox of Enable Dynamic Analysis for Face Detection, and then the detected face is marked with green rectangle on the live video.
Page 120
Network Camera User Manual Configuring Intrusion Detection Purpose: Intrusion detection function detects people, vehicle or other objects which enter and loiter in a pre-defined virtual region, and some certain actions can be taken when the alarm is triggered. Note: Intrusion detection function varies according to different camera models. Steps: 1.
Page 121
Network Camera User Manual 3. Select a region number from the drop-down list of Region. Region: A pre-defined vertexes area on the live view image. Targets, such as, people, vehicle or other objects, who enter and loiter in the region will be detected and trigger the set alarm.
Page 122
Network Camera User Manual can click the Clear button to clear all pre-defined regions. 11. Click Arming Schedule to set the arming schedule. 12. Click Linkage Method to select the linkage methods for intrusion detection, including Notify Surveillance Center, Send Email, Upload to FTP/Memory Card/NAS, Trigger Channel and Trigger Alarm Output.
Page 123
Network Camera User Manual Line Crossing Detection 2. Check the checkbox of Enable to enable the function. 3. Select the line from the drop-down list. 4. Click Area Settings tab and click Draw Area button, and a virtual line is displayed on the live video.
Page 124
Network Camera User Manual Max. Size: The maximum size of a valid target. Targets with larger sizes would not trigger detection. Min. Size: The minimum size of a valid target. Targets with smaller sizes would not trigger detection. 7. Select the direction for line crossing detection. And you can select the directions as A<->B, A ->B, and B->A.
Page 125
Network Camera User Manual Configuring Region Entrance Detection Purpose: Region entrance detection function detects people, vehicle or other objects which enter a pre-defined virtual region from the outside place, and some certain actions can be taken when the alarm is triggered. Steps: 1.
Page 126
Network Camera User Manual click to complete drawing. 6. Set the Max. Size and Min. Size for valid targets. Targets smaller or larger than the valid target size are not able to trigger detection. Max. Size: The maximum size of a valid target. Targets with larger sizes would not trigger detection.
Page 127
Network Camera User Manual Steps: 1. Enter the Region Exiting Detection settings interface, Configuration > Event > Smart Event > Region Exiting Detection. Region Exiting Detection 2. Check Enable checkbox to enable the function. 3. Select the Region from the drop-down list for detection settings. 4.
Page 128
Network Camera User Manual 6. Set the Max. Size and Min. Size for valid targets. Targets smaller or larger than the valid target size are not able to trigger detection. Max. Size: The maximum size of a valid target. Targets with larger sizes would not trigger detection.
Page 129
Network Camera User Manual 1. Enter the Unattended Baggage Detection settings interface, Configuration > Event > Smart Event > Unattended Baggage Detection. Unattended Baggage Detection 2. Check Enable checkbox to enable the function. 3. Select the Region from the drop-down list for detection settings. 4.
Page 130
Network Camera User Manual 7. Click Stop Drawing when finish drawing. 8. Set the time threshold and detection sensitivity for unattended baggage detection. Threshold: Range [5-100s], the threshold for the time of the objects left over in the region. If you set the value as 10, alarm is triggered after the object is left and stay in the region for 10s.
Page 131
Network Camera User Manual Object Removal Detection 2. Check Enable checkbox to enable the function. 3. Select the Region from the drop-down list for detection settings. 4. Click Area Settings and click Draw Area button to start the area drawing. 5.
Page 132
Network Camera User Manual the region. If you set the value as 10, alarm is triggered after the object disappears from the region for 10s. 9. Drag the slider to set the sensitivity value. Sensitivity: Range [1-100]. It stands for the percentage of the body part of an acceptable target that leaves the pre-defined region.
Page 133
Network Camera User Manual Behavior Analysis Overlay & Capture Display information includes the display on picture and display on stream. Display VCA info. on Stream: The green frames will be displayed on the target if in a live view or playback. Display Target info.
Page 134
Network Camera User Manual more accurate if the camera calibration is configured. Steps: 1. Check the checkbox of Camera Calibration to enable this function. 2. Select the calibration mode as Input Basic Data or Draw on Live View Video. Input Basic Data: Input the mounting height, viewing angle, and horizon ratio of the camera manually.
Page 135
Network Camera User Manual 4. You can click to delete the drawn lines. 5. Click Save to save the settings. Shield Region The shield region allows you to set the specific region in which the behavior analysis will not function. Up to 4 shield regions are supported. Steps: 1.
Page 136
Network Camera User Manual Configure the Rule Filter type: Pixels and Actual Size are selectable. If Pixels is selected, draw the area of maximum size and minimum size on the live video for each rule. If Actual Size is selected, input the length and width of the maximum size and minimum size.
Page 137
Network Camera User Manual finish the area drawing. Note: If the live view is stopped, the detection area / line cannot be draw and the rules cannot be set. 4. Check the checkbox of the combined rule to enable the rule for behavior analysis.
Page 138
Network Camera User Manual Advanced Configuration Detection Sensitivity [0~4]: Refers to the sensitivity of the camera detects a target. The higher the value, the easier a target be recognized, and the higher the misinformation is. The default value of 3 is recommended. Background Update Rate [0~4]: It refers to the speed of the new scene replaces the previous scene.
Page 139
Network Camera User Manual 1. Check the checkbox of Global Size Filter to enable the function. 2. Select the Filter Type as Actual Size or Pixel. Actual Size: Input the length and width of both the maximum size and the minimum size.
Page 140
Network Camera User Manual Snapshot Setting: Select the picture quality for the captured picture. Good, better, and best are selectable. Background Upload: Check the checkbox of background upload if you want to upload the background picture as well. Shield Region The shield region allows you to set the specific region in which the face capture will not function.
Page 141
Network Camera User Manual The minimize pupil distance refers to the minimum square size composed by the area between two pupils, and it is the basic standard for a camera to identify a target. 3. Click the hexagons sign to draw the detection area you want the face capture to take effect.
Page 142
Network Camera User Manual recommended. Capture Times [1~10]: Refers to the capture times a face will be captured during its stay in the configured area. The default value is 1. Sensitivity [1~5]: The sensitivity to identify a target. The higher the value, the easier a face will be recognized, and the higher misinformation is.
Page 143
Network Camera User Manual configured area and it is widely applied to the entrances or exits. Notes: It is recommended to install the camera as right above the entrance/exit as possible, and make sure it is horizontal to improve the counting accuracy. :...
Page 144
Network Camera User Manual Note: The detection line should be drawn at the position right below the camera, and it should cover the whole entrance/exit. Don’t draw the line at the place where people may linger. 4) You can click to delete the detection line.
Page 145
Network Camera User Manual Figure 10-32 People Counting Configuration-Advanced 5. Counting data setting and display. 1) Check Enable OSD Overlay checkbox, and the real-time number of people entered and exited is displayed on the live video. 2) You can drag the OSD text frame to adjust its position according to the actual needs.
Page 146
Counting Counting function helps to calculate the number of people entered or exited a certain configured area and is widely applied to the entrances or exits. Compared with the people counting function supported by iDS camera, counting function needs no camera calibration. Notes: It is recommended to install the camera as right above the entrance/exit as possible, and make sure it is horizontal to improve the counting accuracy.
Page 147
Network Camera User Manual 4. Set the detection line. An orange line, named as detection line can be set on the live video, and the object entering or exiting through the line will be detected and counted. 1) Click to draw a detection line, and an orange detection line will appear on the image.
Page 148
Network Camera User Manual Heat Map Configuration 2. Check Enable Heat Map checkbox to enable the function. 3. Go to Area Settings to draw detection area. Draw area by left click the end- points in the live view window, and right click to finish the area drawing. Up to 8 areas are configurable.
Page 149
Network Camera User Manual camera treats the cabinet (on which the good removed) as a new scene. The default value of 50 is recommended. Scene Change Level [0~100]: It refers to level of the camera responses to the dynamic environment, e.g., a swaying curtain. The camera may treat the swaying curtain as a target.
Page 150
Network Camera User Manual Detection Configuration Steps: 1. Select the detection type from the list. Vehicle Detection and Mixed-traffic Detection are selectable. Note: Reboot the device to activate the new settings when switching the detection type of road traffic. 2.
Page 151
Network Camera User Manual triggered and upload the picture to a FTP server. And save the picture on the local SD card or connected NAS. 9. Click the Save button to activate the settings. Queue Management Queue Management is a function to detect queuing-up people number and waiting time of each person.
Page 152
Network Camera User Manual Steps: Click Add Region. (Optional) Select a color for a region from the color drop-down list. iii. Draw a region by right click to determine the region boundary. Up to 10 edges are supported for a region. Move the region: select and drag the region.
Page 153
Network Camera User Manual trigger one notification. Set people queuing-up settings. Check OSD to display the region name and its real-time queuing-up people number. Alarm Threshold: When the people number in the region exceeds the set threshold, an alarm is triggered. iii.
Page 154
Chapter 11 Storage Settings Before you start: To configure record settings, please make sure that you have the network storage device or local storage device configured. Configuring Record Schedule Purpose: There are two kinds of recording for the cameras: manual recording and scheduled recording.
Page 155
Network Camera User Manual Record Parameters Pre-record: The time you set to start recording before the scheduled time or the event. For example, if an alarm triggers recording at 10:00, and the pre-record time is set as 5 seconds, the camera starts to record at 9:59:55. The Pre-record time can be configured as No Pre-record, 5s, 10s, 15s, 20s, 25s, 30s or not limited.
Page 156
Network Camera User Manual refer to the Task 1: Set the Motion Detection Area in the Section 10.1.1. Record Triggered by Alarm If you select Alarm, the video will be recorded when the alarm is triggered via the external alarm input channels. Besides configuring the recording schedule, you have to set the Alarm Type and check the checkbox of Trigger Channel in the Linkage Method of Alarm Input Settings interface.
Page 157
Network Camera User Manual Configure Capture Schedule Purpose: You can configure the scheduled snapshot and event-triggered snapshot. The captured picture can be stored in the local storage or network storage. Steps: 1. Enter the Capture Settings interface: Configuration > Storage > Storage Settings > Capture.
Page 158
Network Camera User Manual 5. Go to Capture Parameters tab to configure the capture parameters. (1) Check the Enable Timing Snapshot checkbox to enable continuous snapshot. (2) Select the picture format, resolution, quality and capture interval. (3) Check the Enable Event-triggered Snapshot checkbox to enable event- triggered snapshot.
Page 159
Network Camera User Manual store the recorded files, log files, pictures, etc. Steps: 1. Add Net HDD. (1) Enter the Net HDD settings interface, Configuration > Storage > Storage Management > Net HDD. Add Network Disk (2) Enter the IP address of the network disk, and enter the file path. (3) Select the mounting type.
Page 160
Network Camera User Manual space, status, type and property of the disk. Storage Management Interface (2) If the status of the disk is Uninitialized, check the corresponding checkbox to select the disk and click Format to start initializing the disk. When the initialization completed, the status of disk will become Normal.
Page 161
Network Camera User Manual Quota Settings Note: Up to 8 NAS disks can be connected to the camera. Memory Card Detection Purpose: With memory card detection, you can view the memory card status, lock your memory card, and receive notification when your memory card is detected abnormal. Note: Memory card detection function is only supported by certain types of memory cards and camera models.
Page 162
Network Camera User Manual Memory Card Detection 2. View the memory card status on Status Detection tab. Remaining Lifespan: It shows the percentage of the remaining lifespan. The lifespan of a memory card may be influenced by factors such as its capacity and the bitrate.
Page 163
Network Camera User Manual (3) Click Save to save the settings. Unlock (1) If you use the memory card on the camera that locks it, unlocking will be done automatically and no unlocking procedures are required on the part of users. (2) If you use the memory card (with a lock) on a different camera, you can go to HDD Management interface to unlock the memory card.
Page 164
Network Camera User Manual The video files recorded in lite storage mode will be played back in full frame rate (25fps/30fps), and thus the playback process is speeded up to the eye. 1. Enter the Lite Storage interface: Configuration > Storage > Storage Management > Lite Storage 2.
Page 165
Chapter 12 Playback Purpose: This section explains how to view the remotely recorded video files stored in the network disks or memory cards. Steps: 1. Click Playback on the menu bar to enter playback interface. Playback Interface 2. Select the date and click Search. Search Video 3.
Page 166
Network Camera User Manual The toolbar on the bottom of Playback interface can be used to control playing process. Playback Toolbar Table 12-1 Description of the buttons Button Operation Button Operation Play Capture a picture Start/Stop clipping video Pause files Audio on and adjust Stop volume/Mute...
Page 167
Chapter 13 Picture Click Picture to enter the picture searching interface. You can search, view, and download the pictures stored in the local storage or network storage. Notes: Make sure HDD, NAS or memory card are properly configured before you process the picture search.
Page 168
Network Camera User Manual Up to 4000 pictures can be displayed at one time.
Page 169
Chapter 14 Application Click Application to enter the statistics counting interface. You can search, view, and download the counting data stored in the local storage or network storage. Note: Application function varies according to the different camera models. Face Capture Statistics After you enable the face capture function, you can view and download the captured face data from application tab.
Page 170
Network Camera User Manual counting data from application tab. To get more intuitional results, you can display the data in different charts. Steps: 1. Select the report type. Daily report, weekly report, monthly report, and annual report are selectable. Note: Daily report calculates the data on the date you selected;...
Page 171
Network Camera User Manual Note: Daily report calculates the data on the date you selected; weekly report calculates for the week your selected date belongs to; monthly report calculates for the month your selected date belongs to; and the annual report calculates for the year your selected date belongs to.
Page 172
Network Camera User Manual different charts. Steps: 1. Select the report type. Daily report, weekly report, monthly report, and annual report are selectable. Note: Daily report calculates the data on the date you selected; weekly report calculates for the week your selected date belongs to; monthly report calculates for the month your selected date belongs to;...
Page 173
Network Camera User Manual length level. To compare the time and duration that a queue stays at different length in multiple • queues/regions, use queue status analysis, check target regions and set queue length levels. Queuing-Up Time Analysis Purpose: Queuing-Up Time Analysis calculates people number of different waiting time levels. Regional comparison and multiple waiting time level comparison are supported.
Page 174
Network Camera User Manual format (.txt and xls. are selectable.). Queue Status Analysis Purpose: Queue Status Analysis calculates the time and duration that a queue stays a certain length. Regional comparison and multiple queue length level comparison are supported. Steps: 1.
Page 175
Network Camera User Manual Raw data of queue management is saved in local storage of the device. With an on-board memory card installed, the device can save up to one mouth’s data. With NO memory card installed, the device can only save up to one week’s data. Raw Data Exporting Raw data exporting of queue management is not available on web browser.
Page 176
Appendix Appendix 1 DEVICE SEARCH Software Introduction Description of DEVICE SEARCH DEVICE SEARCH (Search Active Devices Protocol) is a kind of user-friendly and installation-free online device search tool. It searches the active online devices within your subnet and displays the information of the devices. You can also modify the basic network information of the devices using this software.
Page 177
Network Camera User Manual You can also click to refresh the online device list manually. The newly searched devices will be added to the list. You can click on each column heading to order the information; you can click to expand the device table and hide the network parameter panel on the right side, or click to show the network parameter panel.
Page 178
Network Camera User Manual Figure A.1.2 Modify Network Parameters...
Page 179
Network Camera User Manual Appendix 2 Port Mapping The following settings are for TP-LINK router (TL-WR641G). The settings vary depending on different models of routers. Steps: 1. Select the WAN Connection Type, as shown below: Figure A.2.1 Select the WAN Connection Type 2.
Page 180
Network Camera User Manual camera as 81, 8001, 555, 8201 with IP 192.168.1.24. Refer to the steps as below: Steps: 1. As the settings mentioned above, map the port 80, 8000, 554 and 8200 for the network camera at 192.168.1.23 2.
Need help?
Do you have a question about the Mercury IP-352 IR and is the answer not in the manual?
Questions and answers