Download Print this page

Advertisement

Quick Links

0

Advertisement

loading
Need help?

Need help?

Do you have a question about the GD-CI-AT20527Q and is the answer not in the manual?

Questions and answers

Summary of Contents for Grundig GD-CI-AT20527Q

  • Page 2 Content Introduc on ........................1 1 System Requirement ....................2 1.1 Installa on of SD-card ..................2 2 Network Connec on ....................3 2.1 Se ng the Network Camera over the LAN ............3 2.1.1 Wiring over the LAN ..................3 2.1.2 Ac va ng the Camera ..................
  • Page 3 5.2.8 Configuring VCA Resource ................28 5.2.9 Open Source So9ware License ..............29 5.3 Maintenance ...................... 29 5.3.1 Upgrade & Maintenance ................29 5.3.2 Log ......................31 5.3.3 System Service .................... 32 5.4 Security Se ngs ....................33 5.4.1 Authen ca on .................... 33 5.4.2 IP Address Filter ..................
  • Page 4 7 Video/Audio Se ngs ....................61 7.1 Configuring Video Se ngs ................61 7.2 Configuring Audio Se ngs ................64 7.3 Configuring ROI Encoding .................. 65 7.4 Display Info. on Stream ..................67 7.5 Configuring Target Cropping ................67 8 Image Se ngs ......................69 8.1 Configuring Display Se ngs ................
  • Page 5 10.3 Configuring Net HDD ..................113 10.4 Memory Card Detec on ................115 10.5 Configuring Lite Storage ................117 11 Playback ........................ 118 12 Picture........................120 Appendix ........................121 Appendix 1 IP-Finder Introduc on ................ 121 Appendix 2 Port Mapping ..................124...
  • Page 6 Introduc on Thank you for purchasing a GRUNDIG product. Before installing or connec ng the product, please read first the following documents which you can find in the product package: - Legal Disclaimer - Safety Instruc ons - Installa on Manual for the respec ve product model Further informa on about the product like Data Sheets, CE Documents, etc.
  • Page 7 Display: 1024×768 resolu on or higher Web Browser: Internet Explorer 8.0 and above version, Apple Safari 5.0.2 and above version, Mozilla Firefox 5.0 and above version and Google Chrome 18 and above version. 1.1 Installa on of SD-card GD-CI-AT20527Q GD-CI-AT30516Q 2 English...
  • Page 8 2 Network Connec on Note: l You shall acknowledge that the use of the product with Internet access might be under network security risks. For avoidance of any network aBacks and informa on leakage, please strengthen your own protec on. If the product does not work properly, please contact with your dealer or the nearest service center.
  • Page 9 IP-FINDER is a tool to detect, activate and modify the IP address of the device over the LAN. Before You Start ● Get the software from the official website www.grundig-security.com, and install it according to the prompts. ● The device and the PC that runs the IP-FINDER tool should belong to the same subnet.
  • Page 10 SCMS is a PC client to manage and operate your devices. Camera activation is supported by the software. Before You Start Get the client software from the official website www.grundig-security.com. Install the software following the prompts. The camera and the PC that runs the software should be in the same subnet.
  • Page 11 3. Check the device status from the device list, and select an inactive camera. 4. Click the Activate. 5. Create and confirm the admin password of the camera. Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 12 3. Create and confirm the admin password. Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 13 Figure 2-10 Accessing the Camera through Router with Sta c IP Connec ng the network camera with sta c IP directly You can also save the sta c IP in the camera and directly connect it to the internet without using a router. Refer to Sec on 2.1.2 for detailed IP address configura on of the network camera.
  • Page 14 configure the PPPoE parameters of the network camera. Refer to Sec on 6.1.3 Configuring PPPoE Se ngs for detailed configura on. Figure 2-12 Accessingt heCamera with Dynamic IP Note: The obtained IP address is dynamically assigned via PPPoE, so the IP address always changes a9er reboo ng the camera.
  • Page 15 3 Access to the Network Camera 3.1 Accessing by Web Browsers Before You Start Check the system requirement to confirm that the operating computer and web browser meets the requirements. Table 1-1 System Requirement Microsoft Windows XP and above version, Mac OS X 10.8 and Operating System above version 3.0 GHz or higher...
  • Page 16 Note Illegal login lock is activated by default. If admin user performs seven failed password attempts (five attempts for user/operator), the IP address is blocked for 30 minutes. If illegal login lock is not needed, go to Configuration → System → Security → Security Service to turn it off.
  • Page 17 Operating System Web Browser Operation functions are restricted. For example, Playback and Picture are not available. For detailed restricted function, refer to the actual device. Note The camera only supports Windows and Mac OS system and does not support Linux system.
  • Page 18 3.1.2 Access Camera via SCMS-VMS Add the camera to client software before further operation. Refer to the SCMS Client Software User Manual for detailed setting steps. 3.1.3 Access Camera via SCMS-App SCMS is an application for mobile devices. Using the App, you can view live image, receive alarm notification and so on.
  • Page 19 2. Enter platform access configuration interface. Configuration → Network → Advanced Settings → Platform Access 3. Select SCMS as the Platform Access Mode. 4. Check Enable. 5. Click and read "Terms of Service" and "Privacy Policy" in pop-up window. 6. Create a verification code or change the old verification code for the camera. Note The verification code is required when you add the camera to SCMS service.
  • Page 20 4 Live View 4.1 Live View Page Purpose: The live view page allows you to view the real- me video, capture images, realize PTZ control, set/call presets and configure video parameters. Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page.
  • Page 21 PTZ Control: Focusing is supported by the camera. Panning, l ng and zooming ac ons are not supported. Preset/Patrol Se2ngs: Not available to set/call/delete the presets or patrols. 4.2 Star ng Live View In the live view window as shown in Figure 4-2, click on the toolbar to start the live view of the camera.
  • Page 22 4.3 Recording and Capturing Pictures Manually In the live view interface, click on the toolbar to capture the live pictures or click to record the live view. The saving paths of the captured pictures and clips can be set on the Configura on > Local page. To configure remote scheduled recording, please refer to Sec on 6.1.
  • Page 23 5 Network Camera Configura on 5.1 Configuring Local Parameters Purpose: The local configura on refers to the parameters of the live view, record files and captured pictures. The record files and captured pictures are the ones you record and capture using the web browser and thus the saving paths of them are on the PC running the browser.
  • Page 24 UDP: Provides real- me audio and video streams. HTTP: Allows the same quality as of TCP without se ng specific ports for streaming under some network environments. MULTICAST: It’s recommended to select MCAST type when using the Mul cast func on. For detailed informa on about Mul cast, refer to Sec on 7.1.1 Configuring TCP/IP Se ngs.
  • Page 25  Save clips to: Set the saving path of the clipped video files in playback mode. Note: You can click Browse to change the directory for saving the clips and pictures, and click Open to open the set folder of clips and picture saving. Click Save to save the se ngs.
  • Page 26 Note: When the camera is upgrading, don't power off the camera. During upgrading, the camera may not be accessible. You need to wait 1 or 2 minutes before the upgrade finishes. 5.2.2 Configuring Time Se2ngs Purpose: You can follow the instruc ons in this sec on to configure the me synchroniza on and DST se ngs.
  • Page 27 NTP Port: Port of NTP server. Interval: The me interval between the two synchronizing ac ons with NTP server. (3) (Op onal) You can click the Test buBon to test the me synchroniza on function via NTP server. Time Sync by NTP Server Note: If the camera is connected to a public network, you should use a NTP server that has a me synchroniza on func on, such as the server at the Na onal Time Center (IP...
  • Page 28 Time Sync Manually Click Save to save the se ngs.  5.2.3 Configuring RS232 Se2ngs The RS232 port can be used in two ways:  Parameters Configura on: Connect a computer to the camera through the serial port. Device parameters can be configured by using so9ware such as HyperTerminal.
  • Page 29 RS232 Settings Note: If you want to connect the camera by the RS232 port, the parameters of the RS232 should be exactly the same with the parameters you configured here. 3. Click Save to save the se ngs. 5.2.4 Configuring RS485 Se2ngs Purpose: The RS485 serial port is used to control the PTZ of the camera.
  • Page 30 RS-485 Settings 2. Set the RS485 parameters and click Save to save the se ngs. By default, the Baud Rate is set as 9600 bps, the Data Bit is 8, the stop bit is 1 and the Parity and Flow Control is None. Note: The Baud Rate, PTZ Protocol and PTZ Address parameters should be exactly the same as the PTZ camera parameters.
  • Page 31 Infrared Light Note: Without the one-to-one control, the enabled infrared lights works as a group. Signal from any camera channel can control their on/off status. 2. (Op onal) Enable one-to-one control. 3. Click Advanced. 4. Check Enable One-to-One Control. 5. Bind infrared lights to camera channels. One-to-One Control 7.
  • Page 32 Daylight Saving Time (DST) is a way of making beBer use of the natural daylight by se ng your clock forward one hour during the summer months, and back again in the fall. Configure the DST according to your actual demand. Steps: 1.
  • Page 33 External Device Settings 2. Check the Enable Supplement Light checkbox to enable the LED Light. 3. Move the slider to adjust the low beam brightness and high bean brightness. 4. Select the mode for LED light. Timing and Auto are selectable. l Timing: The LED will be turned on by the schedule you set.
  • Page 34 VCA Resource Configuration Steps: 1. Enter VCA Resource configura on interface: Configura on > System > System Se2ngs > VCA Resource 2. Select the desired camera No. 3. Click Save to save the se ngs. A reboot is required a9er se ng the VCA Resource. 5.2.9 Open Source SoEware License Informa on about the open source so9ware that applies to the IP camera can be checked if required.
  • Page 35 Notes: A9er restoring the default se ngs, the IP address is also restored to the default • IP address, please be careful for this ac on. For camera that supports Wi-Fi, wireless dial, or wlan func on, Restore ac on •...
  • Page 36 5.3.2 Log Purpose: The opera on, alarm, excep on and informa on of the camera can be stored in log files. You can also export the log files on your demand. Before you start: Please configure network storage for the camera or insert a SD card in the camera. Steps: 1.
  • Page 37 Log Searching 4. To export the log files, click Export to save the log files. 5.3.3 System Service Purpose: System service se ngs refer to the hardware service the camera supports. Supported func ons vary according to the different cameras. For the cameras support IR LED, ABF (Auto Back Focus), Auto Defog, or Status LED, you can select to enable or disable the corresponding service according to the actual demands.
  • Page 38 Enable Third Stream 5.4 Security Se2ngs Configure the parameters, including Authen ca on, Anonymous Visit, IP Address Filter, and Security Service from security interface. 5.4.1 Authen ca on Purpose: You can specifically secure the stream data of live view. Steps: 1.
  • Page 39 5.4.2 IP Address Filter Purpose: This func on makes it possible for access control. Steps: 1. Enter the IP Address Filter interface: Configura on > System > Security > IP Address Filter Figure 5-18 IP Address Filter Interface 2. Check the checkbox of Enable IP Address Filter. 3.
  • Page 40 (2) Modify the IP address in the text filed. Modify an IP (3) Click the OK to finish modifying. Delete an IP Address or IP Addresses.  Select the IP address(es) and click Delete. 5. Click Save to save the se ngs. 5.4.3 Security Service To enable the remote login, and improve the data communica on security, the camera provides the security service for beBer user experience.
  • Page 41 5.5 User Management 5.5.1 User Management  As Administrator The admin user can add, delete or modify user accounts, and grant them different permissions. We highly recommend you manage the user accounts and permissions properly. Enter the User Management interface: Configura on > System > User Management Note: Admin password if required for adding and modifying a user account.
  • Page 42 STRONG PASSWORD RECOMMENDED We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case leBers, lower case leBers, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, rese ng the password monthly or weekly can beBer protect your product.
  • Page 43 5.5.2 Security Ques on Purpose: Security ques on is used to reset the admin password when admin user forgets the password. Set Security Ques on: You can set the security ques ons during camera ac va on. Or you can set the func on at user management interface.
  • Page 44 5.5.3 Online Users Purpose: You can see the current users who are visi ng the device through this interface. User informa on, such as user name, level, IP address, and opera on me, is displayed in the User List. Click Refresh to refresh the list. View the Online Users 39 English...
  • Page 45 6 Network Se2ngs Purpose: Follow the instruc ons in this chapter to configure the basic se ngs and advanced se ngs. 6.1 Configuring Basic Se2ngs Purpose: You can configure the parameters, including TCP/IP, DDNS, PPPoE, Port, and NAT, etc., by following the instruc ons in this sec on. 6.1.1 Configuring TCP/IP Se2ngs Purpose: TCP/IP se ngs must be properly configured before you operate the camera over...
  • Page 46 TCP/IP Settings Configure the basic network se ngs, including the NIC Type, IPv4 or IPv6 Address, IPv4 or IPv6 Subnet Mask, IPv4 or IPv6 Default Gateway, MTU se ngs and Mul cast Address. (Op onal) Check the checkbox of Enable Mul cast Discovery, and then the online network camera can be automa cally detected by client so9ware via private mul cast protocol in the LAN.
  • Page 47 mul cast group address. Before u lizing this func on, you have to enable the Mul cast func on of your router.  A reboot is required for the se ngs to take effect. 6.1.2 Configuring DDNS Se2ngs Purpose: If your camera is set to use PPPoE as its default network connec on, you can use the Dynamic DNS (DDNS) for network access.
  • Page 48 Figure 6-2 DynDNS Settings NO-IP: Steps: (1) Choose the DDNS-Type as NO-IP. Figure 6-3 NO-IP DNS Se ngs (2) Enter the Server Address as www.noip.com (3) Enter the Domain name you registered. (4) Enter the User Name and Password. (5) Click Save and then you can view the camera with the domain name. Note: Reboot the device to make the se ngs take effect.
  • Page 49 6.1.3 Configuring PPPoE Se2ngs Steps: 1. Enter the PPPoE Se ngs interface: Configura on > Network > Basic Se2ngs > PPPoE PPPoE Settings 2. Check the Enable PPPoE checkbox to enable this feature. 3. Enter User Name, Password, and Confirm password for PPPoE access. Note: The User Name and Password should be assigned by your ISP.
  • Page 50 6.1.4 Configuring Port Se2ngs Purpose: You can set the port No. of the camera, e.g., HTTP port, RTSP port and HTTPS port. Steps: 1. Enter the Port Se ngs interface, Configura on > Network > Basic Se2ngs > Port Port Settings 2.
  • Page 51 Universal Plug and Play (UPnP™) is a networking architecture that provides compa bility among networking equipment, so9ware and other hardware devices. The UPnP protocol allows devices to connect seamlessly and to simplify the implementa on of networks in the home and corporate environments. With the func on enabled, you don’t need to configure the port mapping for each port, and the camera is connected to the Wide Area Network via the router.
  • Page 52 6.2.1 Configuring SNMP Se2ngs Purpose: You can set the SNMP func on to get camera status, parameters and alarm related informa on, and manage the camera remotely when it is connected to the network. Before you start: Before se ng the SNMP, please download the SNMP so9ware and manage to receive the camera informa on via SNMP port.
  • Page 53 SNMP Settings 2. Check the checkbox of Enable SNMPv1, Enable SNMP v2c, Enable SNMPv3 to enable the feature correspondingly. 3. Configure the SNMP se ngs. Note: 48 English...
  • Page 54 The se ngs of the SNMP so9ware should be the same as the se ngs you configure here. 4. Click Save to save and finish the se ngs. Notes: A reboot is required for the se ngs to take effect. •...
  • Page 55 2. Input the FTP address and port. 3. Configure the FTP se ngs; and the user name and password are required for the FTP server login. Cau on: For your privacy and to be(er protect your system against security risks, we ...
  • Page 56 Anonymous Access to the FTP Server (in which case the user name and password won’t be required.): Check the Anonymous checkbox to enable the anonymous access to the FTP server. Note: The anonymous access func on must be supported by the FTP server. 6.
  • Page 57 SMTP Port: The SMTP port. The default TCP/IP port for SMTP is 25 (not secured). And the SSL SMTP port is 465. Email Encryp on: None, SSL, and TLS are selectable. When you select SSL or TLS and disable STARTTLS, e-mails will be sent a9er encrypted by SSL or TLS. The SMTP port should be set as 465 for this encryp on method.
  • Page 58 The Receiver table: Select the receiver to which the email is sent. Up to 3 receivers can be configured. Receiver: The name of the user to be no fied. Receiver’s Address: The email address of user to be no fied. Email Settings 4.
  • Page 59 3. Select the Pla?orm Access Mode. 4. Set the pla?orm parameters. 5. Click Save to save the se ngs. 6.2.5 Wireless Dial Purpose: Data stream of audio, video and image can be transferred via 3G/4G wireless network. Notes: The wireless dial func on may not be supported by some camera models. •...
  • Page 60 7) vii.Click Save to save the se ngs. 4. View the dial status. 1) Click the Refresh buBon to view the dial status including real- me mode, UIM status, signal strength, etc. 2) If Manual is selected as the dial mode, you can also manually connect / disconnect the wireless network.
  • Page 61 2. Check the checkbox of Enable to enable the func on. HTTPS Configuration Interface 3. Create the self-signed cer ficate or authorized cer ficate. Create the self-signed cer ficate  (1) Select Create Self-signed Cer ficate as the Installa on Method. (2) Click Create buBon to enter the crea on interface.
  • Page 62 (2) Click Create buBon to create the cer ficate request. Fill in the required informa on in the popup window. (3) Download the cer ficate request and submit it to the trusted cer ficate authority for signature. (4) A9er receiving the signed valid cer ficate, import the cer ficate to the device. 4.
  • Page 63 QoS Settings 2. Configure the QoS se ngs, including Video/Audio DSCP, Event/Alarm DSCP and Management DSCP. The valid value range of the DSCP is 0 to 63. The bigger the DSCP value is, the higher the priority is. Note: DSCP refers to the Differen ated Service Code Point; and the DSCP value is used in the IP header to indicate the priority of the data.
  • Page 64 minimum of 8 characters, including at least three of the following categories: upper case le(ers, lower case le(ers, numbers and special characters) in order to increase the security of your product. Proper configura on of all passwords and other security se3ngs is the ...
  • Page 65 If you need to access to the camera through the third party pla?orm, you can enable CGI func on. And if you need to access to the device through ONVIF protocol, you can configure ONVIF user in this interface. Refer to ONVIF standard for detailed configura on rules.
  • Page 66 7 Video/Audio Se2ngs Purpose: Follow the instruc ons below to configure the video se ng, audio se ngs, ROI, and Display info. on Stream. 7.1 Configuring Video Se2ngs Steps: 1. Enter the Video Se ngs interface, Configura on > Video/Audio > Video and select the Camera No.
  • Page 67 to reboot the system and enable the third stream. The main stream is usually for recording and live view with good bandwidth, • and the sub-stream can be used for live view when the bandwidth is limited. To enable the third stream, go to System>Maintenance>System Service> •...
  • Page 68 If the Stream Type is set to main stream, H.264 and H.265 are selectable, and if the stream type is set to sub stream or third stream, H.264, MJPEG, and H.265 are selectable. H.265 is a new encoding technology. Compared with H.264, it reduces the transmission bitrate under the same resolu on, frame rate and image quality.
  • Page 69 bitrate in the long term. The camera needs at least 24 hours to adapt to a fixed monitoring scene. Max. Average Bitrate: When you set a maximum bitrate, its corresponding recommended maximum average bitrate will be shown in the Max. Average Bitrate box. You can also set the maximum average bitrate manually from 32 Kbps to the value of the set maximum bitrate.
  • Page 70 Audio Settings 2. Configure the following se ngs. Note: Audio se ngs vary according to different camera models. Audio Encoding: G.722.1, G.711 ulaw, G.711alaw, G.726, MP2L2 and PCM are selectable. For MP2L2, the Sampling Rate and Audio Stream Bitrate are configurable.
  • Page 71 Region of Interest Settings Steps: 1. Enter the ROI se ngs interface: Configura on > Video/Audio > ROI. 2. Select the Camera No. and Stream Type for ROI encoding. 3. Check the checkbox of Enable under Fixed Region item. 4. Set Fixed Region for ROI. 66 English...
  • Page 72 (1) Select the Region No. from the drop-down list. (2) Check the Enable checkbox to enable ROI func on for the chosen region. (3) Click Drawing. Click and drag the mouse on the view screen to draw a red rectangle as the ROI region. You can click Clear to cancel former drawing. Click Stop Drawing when you finish.
  • Page 73 Note: Target cropping func on varies according to different camera models. Steps: 1. Enter the Target Cropping se ngs interface. 2. Check Enable Target Cropping checkbox to enable the func on. 3. Set Third Stream as the stream type. 4. Select the cropping resolu on for the video display of target area. A red rectangle is displayed on the live video to mark the target area, and you can click-and-drag the rectangle to locate the target area as desired.
  • Page 74 8 Image Se2ngs Purpose: Follow the instruc ons in this chapter to configure the image parameters, including display se ngs, OSD se ngs, privacy mask, and picture overlay. 8.1 Configuring Display Se2ngs Purpose: Configure the image adjustment, exposure se ngs, day/night switch, backlight se ngs, white balance, image enhancement, video adjustment, and other parameters in display se ngs.
  • Page 75 Image Adjustment Brightness describes bright of the image, which ranges from 1 to 100. Contrast describes the contrast of the image, which ranges from 1 to 100. Satura on describes the colorfulness of the image color, which ranges from 1 to 100.
  • Page 76 Day/NightSwitch Day: the camera stays at day mode. Night: the camera stays at night mode. Auto: the camera switches between the day mode and the night mode according to the illumina on automa cally. The sensi vity ranges from 0 to 7, the higher the value is, the easier the mode switches.
  • Page 77 If BLC mode is set as Custom, you can draw a red rectangle on the live view image as the BLC area. WDR: Wide Dynamic Range can be used when there is a high contrast of the bright area and the dark area of the scene. HLC: High Light Compression func on can be used when there are strong lights in the scene affec ng the image quality.
  • Page 78 Mirror: It mirrors the image so you can see it inversed. Le9/Right, Up/Down, Center, and OFF are selectable. Rotate: To make a complete use of the 16:9 aspect ra o, you can enable the rotate func on when you use the camera in a narrow view scene. When installing, turn the camera to the 90 degrees or rotate the 3-axis lens to 90 degrees, and set the rotate mode as on, you will get a normal view of the scene with 9:16 aspect ra o to ignore the needless informa on such as the wall, and get...
  • Page 79 OSD Settings Steps: 1. Enter the OSD Se ngs interface: Configura on > Image > OSD Se2ngs. 2. Select the Camera No. 3. Check the corresponding checkbox to select the display of camera name, date or week if required. 4. Edit the camera name in the text field of Camera Name. 5.
  • Page 80 Note: The alignment adjustment is only applicable to Text Overlay items. 9. Click Save to save the se ngs. 8.3 Configuring Privacy Mask Purpose: Privacy mask enables you to cover certain areas on the live video to prevent certain spots in the video security area from being live viewed and recorded. Steps: 1.
  • Page 81 8.4 Configuring Picture Overlay Purpose: Picture overlay enables you to overlay a picture on the image. This func on enables a certain enterprise or users to overlay their logo on the image. Steps: 1. Enter the Picture Overlay Se ngs interface, Configura on > Image > Picture Overlay.
  • Page 82 9 Event Se2ngs This sec on explains how to configure the network camera to respond to alarm events, including basic event and smart event. 9.1 Basic Events You can configure the basic events by following the instruc ons in this sec on, including mo on detec on, video tampering, alarm input, alarm output, and excep on, etc.
  • Page 83 2. Select the Camera No. 3. Check the checkbox of Enable Mo on Detec on. 4. Check the checkbox of Enable Dynamic Analysis for Mo on if you want to mark the detected objects with green rectangles. Note: Select Disable for rules if you don’t want the detected objected displayed with the green rectangles.
  • Page 84 Arming Schedule Steps: 1. Click Arming Schedule to edit the arming schedule. 2. Click on the me bar and drag the mouse to select the me period. ArmingSchedule Note: Click on the selected me period, you can adjust the me period to the desired me by either moving the me bar or input the exact me period.
  • Page 85 3. (Op onal) Click Delete to delete the current arming schedule, or click Save to save the se ngs. 4. Move the mouse to the end of each day, a copy dialogue box pops up, and you can copy the current se ngs to other days. 5.
  • Page 86 Send an email with alarm informa on to a user or users when an event occurs. Note: To send the Email when an event occurs, please refer to Sec on 7.2.3 to complete Email setup in advance.  Upload to FTP/Memory Card/NAS Capture the image when an alarm is triggered and upload the picture to a FTP server.
  • Page 87 Expert Mode of Motion Detection  Day/Night Switch OFF Steps: 1. Draw the detec on area as in the normal configura on mode. Up to 8 areas are supported. 2. Select OFF for Switch Day and Night Se2ngs. 3. Select the area by clicking the area No. 4.
  • Page 88 5. Slide the cursor to adjust the sensi vity and propor on of object on the area for the selected area at night. 6. Set the arming schedule and linkage method as in the normal configura on mode. 7. Click Save to save the se ngs. l Day/Night Scheduled-Switch Steps: 1.
  • Page 89 1. Enter the video tampering Se ngs interface, Configura on > Event > Basic Event > Video Tampering. 2. Select the Camera No. Video Tampering 3. Check Enable Video Tampering checkbox to enable the video tampering detec on. 4. Click Edit to edit the arming schedule for video tampering. The arming schedule configura on is the same as the se ng of the arming schedule for mo on detec on.
  • Page 90 9.1.3 Configuring Alarm Input Steps: 1. Enter the Alarm Input Se ngs interface: Configura on > Event > Basic Event > Alarm Input. 2. Choose the alarm input No. and the Alarm Type. The alarm type can be NO (Normally Open) and NC (Normally Closed). Edit the name to set a name for the alarm input (op onal).
  • Page 91 9.1.4 Configuring Alarm Output Alarm Output Settings Steps: 1. Enter the Alarm Output Se ngs interface: Configura on> Event > Basic Event > Alarm Output. 2. Select one alarm output channel in the Alarm Output drop-down list. You can also set a name for the alarm output (op onal).
  • Page 92 9.1.5 Handling Excep on The excep on type can be HDD full, HDD error, network disconnected, IP address conflicted and illegal login to the cameras. Steps: 1. Enter the Excep on Se ngs interface: Configura on > Event > Basic Event > Excep on.
  • Page 93 Setting Wireless Alarm 2. Select the wireless alarm number. Up to 8 channels of external wireless alarm input are supported. 3. Check the checkbox of Enable Wireless Alarm to ac vate the wireless alarm. 4. Input the alarm name in the text field as desired. 5.
  • Page 94 PIR Alarm Purpose: A PIR (Passive Infrared) alarm is triggered when an intruder moves within the detector's field of view. The heat energy dissipated by a person, or any other warm blooded creature such as dogs, cats, etc., can be detected. Steps: 1.
  • Page 95 7. Go to Configura on > Advanced Configura on> System> Remote Control to arm the camera. Figure 9-14 Arming PIR Alarm Emergency Alarm Purpose: You can press the Emergency buBon on the remote control to trigger the Emergency Alarm in case of an emergency. Note: The remote control is required for the Emergency Alarm.
  • Page 96 9.2 Smart Events You can configure the smart events by following the instruc ons in this sec on, including audio excep on detec on, defocus detec on, scene change detec on, intrusion detec on, and line crossing detec on, etc. These events can trigger the linkage methods, such as No fy Surveillance Center, Send Email, Trigger Alarm Output, etc.
  • Page 97 3. Check the checkbox of Sudden Increase of Sound Intensity Detec on to detect the sound steep rise in the video security scene. You can set the detec on sensi vity and threshold for sound steep rise. 4. Check the checkbox of Sudden Decrease of Sound Intensity Detec on to detect the sound steep drop in the video security scene.
  • Page 98 2. Select the Camera No. Configuring Defocus Detection 3. Check the checkbox of Enable to enable the func on. 4. Click-and-drag the slider to set the detec on sensi vity. The sensi vity value ranges from 1 to 100, and the higher the value is, the more easily the defocus image can trigger the alarm.
  • Page 99 Scene Change Detection 3. Check the checkbox of Enable to enable the func on. 4. Click-and-drag the slider to set the detec on sensi vity. The sensi vity value ranges from 1 to 100, and the higher the value is, the more easily the change of scene can trigger the alarm.
  • Page 100 Note: Intrusion detec on func on varies according to different camera models. Steps: 1. Enter the Intrusion Detec on se ngs interface, Configura on> Event > Smart Event > Intrusion Detec on. 2. Select the Camera No Intrusion Detection 3. Check the checkbox of Enable to enable the func on. 4.
  • Page 101 6. Click on the live video to specify the four vertexes of the detec on region, and right click to complete drawing. 7. Set the Max. Size and Min. Size for valid targets. Targets smaller or larger than the valid target size are not able to trigger detec on. Max.
  • Page 102 Card/NAS, Trigger Channel and Trigger Alarm Output. 14. Click Save to save the se ngs. 9.2.5 Configuring Line Crossing Detec on Purpose: Line crossing detec on func on detects people, vehicle or other objects which cross a pre-defined virtual line, and some certain ac ons can be taken when the alarm is triggered.
  • Page 103 Line Crossing Detection 3. Check the checkbox of Enable to enable the func on. 4. Select the line from the drop-down list. 5. Click Area Se2ngs tab and click Draw Area buBon, and a virtual line is displayed on the live video. 6.
  • Page 104 A<->B: The object going across the plane with both direc ons can be detected and alarms are triggered. A->B: Only the object crossing the configured line from the A side to the B side can be detected. B->A: Only the object crossing the configured line from the B side to the A side can be detected.
  • Page 105 9.2.6 Configuring Region Entrance Detec on Purpose: Region entrance detec on func on detects people, vehicle or other objects which enter a pre-defined virtual region from the outside place, and some certain ac ons can be taken when the alarm is triggered. Steps: 1.
  • Page 106 6. Click on the live video to specify the four vertexes of the detec on region, and right click to complete drawing. 7. Set the Max. Size and Min. Size for valid targets. Targets smaller or larger than the valid target size are not able to trigger detec on. Max.
  • Page 107 Region exi ng detec on func on detects people, vehicle or other objects which exit from a pre-defined virtual region, and some certain ac ons can be taken when the alarm is triggered. Steps: 1. Enter the Region Exi ng Detec on se ngs interface, Configura on > Event > Smart Event >...
  • Page 108 7. Set the Max. Size and Min. Size for valid targets. Targets smaller or larger than the valid target size are not able to trigger detec on. Max. Size: The maximum size of a valid target. Targets with larger sizes would not trigger detec on.
  • Page 109 1. Enter the UnaBended Baggage Detec on se ngs interface, Configura on > Event > Smart Event > UnaJended Baggage Detec on. 2. Select the Camera No. Unattended Baggage Detection 3. Check Enable checkbox to enable the func on. 4. Select the Region from the drop-down list for detec on se ngs. 5.
  • Page 110 Max. Size: The maximum size of a valid target. Targets with larger sizes would not trigger detec on. Min. Size: The minimum size of a valid target. Targets with smaller sizes would not trigger detec on. 8. Click Stop Drawing when finish drawing. 9.
  • Page 111 Object removal detec on func on detects the objects removed from the pre-defined region, such as the exhibits on display, and a series of ac ons can be taken when the alarm is triggered. Steps: 1. Enter the Object Removal Detec on se ngs interface, Configura on > Event > Smart Event >...
  • Page 112 7. Set the Max. Size and Min. Size for valid targets. Targets smaller or larger than the valid target size are not able to trigger detec on. Max. Size: The maximum size of a valid target. Targets with larger sizes would not trigger detec on.
  • Page 113 10 Storage Se2ngs Before you start: To configure record se ngs, please make sure that you have the network storage device or local storage device configured. 10.1 Configuring Record Schedule Purpose: There are two kinds of recording for the cameras: manual recording and scheduled recording.
  • Page 114 3. Click Advanced to set the camera record parameters. Record Parameters  Pre-record: The me you set to start recording before the scheduled me or the event. For example, if an alarm triggers recording at 10:00, and the pre- record me is set as 5 seconds, the camera starts to record at 9:59:55. The Pre-record me can be configured as No Pre-record, 5s, 10s, 15s, 20s, 25s, 30s or not limited.
  • Page 115 Besides configuring the recording schedule, you have to set the mo on detec on area and check the checkbox of Trigger Channel in the Linkage Method of Mo on Detec on Se ngs interface. For detailed informa on, please refer to the Task 1: Set the Mo)on Detec)on Area in the Sec on 9.1.1. ...
  • Page 116 10.2 Configure Capture Schedule Purpose: You can configure the scheduled snapshot and event-triggered snapshot. The captured picture can be stored in the local storage or network storage. Steps: 1. Enter the Capture Se ngs interface: Configura on > Storage > Storage Se2ngs > Capture.
  • Page 117 Advanced Setting of Capture Schedule 4. Click Save to save the se ngs. 5. Go to Capture Parameters tab to configure the capture parameters. (1) Check the Enable Timing Snapshot checkbox to enable con nuous snapshot. (2) Select the picture format, resolu on, quality and capture interval. (3) Check the Enable Event-triggered Snapshot checkbox to enable evenBriggered snapshot.
  • Page 118 10.3 Configuring Net HDD Before you start: The network disk should be available within the network and properly configured to store the recorded files, log files, pictures, etc. Steps: 1. Add Net HDD. (1) Enter the Net HDD se ngs interface, Configura on > Storage > Storage Management >...
  • Page 119 Proper configura on of all passwords and other security se3ngs is the  responsibility of the installer and/or end-user. (4) Click Save to add the network disk. 2. Ini alize the added network disk. (1) Enter the HDD-Se ngs interface, Configura on > Storage > Storage Management >...
  • Page 120 Figure 10-9 Quota Se ngs Note: Up to 8 NAS disks can be connected to the camera. 10.4 Memory Card Detec on Purpose: With memory card detec on, you can view the memory card status, lock your memory card, and receive no fica on when your memory card is detected abnormal.
  • Page 121 Remaining Lifespan: It shows the percentage of the remaining lifespan. The lifespan of a memory card may be influenced by factors such as its capacity and the bitrate. You need to change the memory card if the remaining lifespan is not enough.
  • Page 122 Notes: The memory card can only be read and wriBen in when it is unlocked. • If the camera, which adds a lock to a memory card, is restored to the • factory se ngs, you can go to the HDD-Management interface to unlock the memory card.
  • Page 123 11 Playback Purpose: This sec on explains how to view the remotely recorded video files stored in the network disks or SD cards. Steps: 1. Click Playback on the menu bar to enter playback interface. 2. Select the Camera No. Playback Interface 3.
  • Page 124 The toolbar on the boBom of Playback interface can be used to control playing process. Playback Toolbar Table 11-1 Descrip on of the buBons BuJon Opera on BuJon Opera on Play Capture a picture Start/Stop clipping video Pause files Audio on and adjust Stop volume/Mute Speed down...
  • Page 125 12 Picture Click Picture to enter the picture searching interface. You can search, view, and download the pictures stored in the local storage or network storage. Notes: Make sure HDD, NAS or memory card are properly configured before you process the picture search. Make sure the capture schedule is configured.
  • Page 126 Appendix Appendix 1 IP-Finder Introduc on Descrip on of IP-Finder IP-Finder is a kind of user-friendly and installa on-free online device search tool. It searches the ac ve online devices within your subnet and displays the informa on of the devices. You can also modify the basic network informa on of the devices using this so9ware.
  • Page 127 You can also click to refresh the online device list manually. The newly searched devices will be added to the list. You can click on each column heading to order the informa on; you can click to expand the device table and hide the network parameter panel on the right side, or click to show the network parameter panel.
  • Page 128 Figure A.1.2 Modify Network Parameters 123 English...
  • Page 129 Appendix 2 Port Mapping The following se ngs are for TP-LINK router (TL-WR641G). The se ngs vary depending on different models of routers. Steps: 1. Select the WAN Connec on Type, as shown below: Figure A.2.1 Select the WAN Connec on Type 2.
  • Page 130 another camera as 81, 8001, 555, 8201 with IP 192.168.1.24. Refer to the steps as below: Steps: 1. As the se ngs men oned above, map the port 80, 8000, 554 and 8200 for the network camera at 192.168.1.23 2. Map the port 81, 8001, 555 and 8201 for the network camera at 192.168.1.24. 3.
  • Page 131 126 English...

This manual is also suitable for:

Gd-ci-at30516q