1 Introduction Thank you for purchasing a Grundig product. Before installing or connecting the product, please read first the following documents: - Legal Disclaimer - Safety Instructions - Installation Manual and/or Quick Guide for the respective product model Further information about the product like Data Sheets, CE Documents, etc. can also be found on our Webpage www.grundig-security.com.
2 Activate via Local Menu For the first-time access, you have to set an admin password to activate your device. No operation is allowed before activation. You can also activate the device via web browser, SADP or client software. Before You Start Ensure your device is connected with a monitor and mouse.
Page 8
4. Optional: Enter a password hint. It will help you remember your password when you forget. 5. Click Activate. Note After the device is activated, you should properly keep the password. 6. Optional: Draw an unlock pattern. 7. Configure at least one password recovery method. What to do next Follow the wizard to set basic parameters.
3 Log In to Your Device You have to log in to your device before operating the menu and other functions. Before You Start Ensure your device is activated. Steps 1. Power on your device, you would automatically enter the login interface. Figure 3-1 Login 2.
4 Network Settings Network parameters, platform access settings, and network services are configurable. 4.1 Network Parameter Settings You shall configure network parameters before using functions that require network access. 4.1.1 Configure TCP/IP TCP/IP must be properly configured before you operate video recorder over network or access network devices.
Note Working mode is only available for certain models. 3. Configure network parameters. IPv4 DHCP If the DHCP server is available, you can enable DHCP to automatically obtain an IP address and other network settings from that server. The maximum transmission unit (MTU) is the size of the largest network layer protocol data unit that can be communicated in a single network transaction.
Figure 4-2 DDNS 2. Turn on Enable. 3. Select a DDNS type. 4. Set parameters, including service address, domain name, etc. 5. Click Save. 4.1.3 Configure PPPoE If the device is connected to Internet through PPPoE, you need to configure user name and password accordingly.
Steps 1. Go to System → System Settings → Network → Network → Other. 2. Set Multicast parameters. Note ● When adding device through network video security client, multicast group IP address should be the same as the device multicast IP address. ●...
Note If the device is already bound with an account, you can click Unbind to unbind with the current account. 8. Click Save. Result ● If your device is connected with SCMS, Connection Status will be Online. ● If your device is bound with a SCMS account, Account Status will be Linked. What to do next You can access your video recorder via SCMS.
The platform server IP address. Access Server Port The platform server port, ranges from 1024 to 65535. The actual port shall be provided by the platform. Device ID Device ID shall be provided by the platform. Protocol Version ISUP protocol version, only ISUP 5.0 is available. Encryption Key Encryption password is required when using ISUP V5.0 version, it provides more secure communication between the device and platform.
Note The port for Enhanced SDK Service is 8443 by default. 3. Optional: Enable Stream Over TLS. The stream over TLS encryption technology provides more secure stream transmission service. 4. Click Save. 4.2.4 Enable ISAPI ISAPI (Internet Server Application Programming Interface) is an open protocol based on HTTP, which can realize the communication between the system devices (e.g., network camera, NVR, etc.).
Caution We highly recommend you create a strong password of your own choosing (Using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters.) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product 6.
Figure 4-9 HTTP(S) 2. Optional: Turn on HTTP or HTTPS. 3. View or edit Port of HTTP or HTTPS. 4. Set HTTP/HTTPS Authentication. Authentication Type Two authentication types are selectable, for security reasons, it is recommended to select Digest as the authentication type. Digest Algorithm Digest algorithms are based on HTTP/HTTPS and are mainly used for the digest authentication of user authentication.
Figure 4-10 RTSP 2. Set parameters. Port The port is 554 by default. Authentication Type Two authentication types are selectable, if you select Digest, only the request with digest authentication can access the video stream by RTSP via the IP address. For security reasons, it is recommended to select Digest as the authentication type.
Page 20
Before You Start If you want to enable the UPnP™ function of the device, you must enable the UPnP™ function of the router to which your device is connected. When the network working mode of the device is set as multi-address, the Default Route of the device should be in the same network segment as that of the LAN IP address of the router.
Page 21
What to do next Enter the virtual server settings page of router, then fill in the blank of internal/external source port with the internal/external port value, and other required contents. 20 English...
5 User Management There is a default account for administrator. The administrator user name is admin. Administrator has the permission to add, delete, and edit user. Guest and operator users only have limited permissions. Go to System → System Settings → User Management. Figure 5-1 User Management Table 5-1 Icon/Button Description Icon/Button...
6 Device Access The video recorder may be able to access multiple device types, such as network camera, access control device, and alarm device. Please refer to the actual device for the access capability of your video recorder. 6.1 Access Video Device There are several ways to access a video device.
6.1.2 Add Network Camera Manually Manually add the network cameras to your video recorder. Before You Start ● Ensure your network camera is on the same network segment with that of your video recorder. ● Ensure the network connection is valid and correct. Ensure the network camera is activated.
6.1.3 Add Network Camera via Custom Protocol For network cameras that are not using standard protocols, you can configure custom protocols to add them. The system provides 8 custom protocols. Before You Start ● Ensure the network camera supports RTSP streaming. ●...
Contact the manufacturer of network camera for the URL of getting main stream and sub- stream. The general format is [Type]://[IP Address]:[Port]/[Resource Path], for example, rtsp://192.168.0.1:554/ch1/main/av_stream. Note ● Protocol Name and Path can be automatically generated if you click a brand name below Protocol Name.
6.4 Add POS Device POS machine/server can be connected for certain device models. The device can receive transaction messages from POS machine/server, overlay transaction messages on the video image, and trigger POS event alarms. Steps 1. Go to System → Device Access → Device → POS. 2.
Page 28
TCP Connection When using TCP connection, the port must be set from 1 to 65535, and the port for each POS machine must be unique. UDP Connection When using UDP connection, the port must be set from 1 to 65535, and the port for each POS machine must be unique.
7 Camera Settings You can configure the added camera, such as privacy mask, image parameters, etc. 7.1 Enable H.265 Stream Access The device can automatically switch to the H.265 stream of IP camera (which supports H.265 video format) for the initial access. Steps 1.
Image Settings Customize the image parameters including the brightness, contrast, and saturation for the live view and recording effect. Exposure Set the camera exposure time (1/10000 to 1 sec). A larger exposure value results in a brighter image. Day/Night Switch The camera can be set to day, night, or auto switch mode according to the surrounding illumination conditions.
It refers to the number of frames captured each second. A higher frame rate is advantageous when there is movement in the video stream, as it maintains image quality throughout. I-Frame Interval I-Frame also referred as intra picture, I-Frame is the first frame of every GOP (a video compression technology of MPEG).
8 Device Grouping The added devices can be classified into different customized groups. Steps 1. Go to System → Device Access → Device Grouping. Figure 8-1 Device Grouping 2. Click to add a group. Note After a group is added, you can click to edit/delete it.
9 Storage Management 9.1 Manage HDD A newly installed hard disk drive (HDD) must be initialized before using. You can format HDD, repair database, and view HDD status through HDD management interface. Before You Start Ensure the HDD is properly installed to your device. Steps 1.
9.2 RAID Configuration A disk array is a data storage virtualization technology that combines multiple physical disk drives into a single logical unit. Also known as a "RAID", an array stores data over multiple HDDs to provide enough redundancy so that data can be recovered if one disk fails. Data is distributed across the drives in one of several ways called "RAID levels", based the redundancy and performance required.
Page 35
Figure 9-2 Enable RAID 3. Wait for the device to restart. 4. Go to System → Storage Management → Storage HDD → Array Management again. Figure 9-3 Array Management 5. Create an array. Creation Method Description One-touch Array Click One-touch Array Configuration. Configuration Note By default, the array type created by one-touch configuration is RAID...
9.2.2 Rebuild Array The array status includes Functional, Degraded, and Offline. To ensure the high security and reliability of the data stored in an array, take immediate and proper maintenance of the arrays according its status. Steps 1. Go to System → Storage Management → Storage HDD → Array Management. 2.
9.2.4 View Firmware Info You can view array firmware information and set the background task speed. Before You Start Ensure disk array is enabled. Steps 1. Go to System → Storage Management → Storage HDD → Array Management. 2. Click Firmware Info. 3.
Page 38
Table 9-3 Parameter Description Parameter Name Description HDD Sleeping When the HDD is not used for a period, it will turn to sleep. When HDD is full, it will continue to write new files by deleting the Overwriting oldest files. After saving VCA data of camera to your device, you will be able to Save Camera VCA Data search it in Event Center.
10 Schedule Configuration The device will follow the schedule to store files to the disk. 10.1 Configure Schedule Template After a schedule template is configured, you can use the template as the recording schedule. Steps 1. Go to System → System Settings → Template Configuration → Holiday Schedule. 2.
Figure 10-2 Edit Template 3) Select a recording type. For example, Event. 4) Drag the cursor on time bar to draw the schedule. Note ● After moving the cursor on time bar, you can also click to set specified time schedule. ●...
Page 41
Figure 10-3 Video Recording Configuration 2. Turn on Enable for a camera. 3. Select a schedule type. Note If you set Record Schedule as Custom, you can drag the cursor on time bar to set customized record schedule, or move the cursor on time bar and click to set specified time schedule.
Parameter Description Note The channel shall have audio function, or have connected an audio device. ANR (Automatic Network Replenishment) can automatically enable SD card of network camera to save the video in the condition of network disconnection, and can synchronize data after the network is recovered. The time you set to record before the scheduled time or event.
Page 43
Figure 10-5 Picture Capture Configuration 2. Turn on Enable for a camera. 3. Select a schedule type. Note If you set Record Schedule as Custom, you can drag the cursor on time bar to set customized record schedule, or move the cursor on time bar and click to set specified time schedule.
Parameter Description Set the picture quality to low, medium or high. High picture quality Picture Quality requires more storage space. Interval The time interval of capturing each live picture. 6. Optional: Select channels in the list, and use Batch Schedule Configuration and Batch Advanced Settings to configure channels in a batch.
11 Live View 11.1 Configure Live View Layout Live view displays the video image of each camera in real time. Steps 1. Go to Live View. 2. Click at the lower-right corner. 3. Select a window division type, or click Custom to customize a new type as your desire. 4.
Table 11-1 Interface Description Description Channel list, and target detection list. If you select a channel from the channel list, the device will redirect to the corresponding window. Shortcut menu. It will appear after clicking the cursor on the image area. Channel tool bar.
Page 47
Task Description Operation Set a pattern: 1. Click Patterns can be set by recording 2. Use to direction buttons to adjust the the movement of the PTZ. You image, the device will record the Pattern can call the pattern to make the movement.
12 Playback 12.1 GUI Introduction You can play back video or audio files. Figure 12-1 Playback Table 12-1 Interface Description Description Channel list. Calendar for time selection. Playback timeline. ● Position the cursor on the timeline, drag the timeline to position to a certain time. ●...
Description videos by tag. ● Click to lock the video. After a video is locked, it will not be overwritten. After locking, you can go to → Backup → By Tag to search videos by lock. ● Select → Dual-VCA to search videos that can trigger the corresponding event rule.
● : Videos that contain vehicle would be marked in red. 12.3 Event Playback When you select the event playback mode, the system will analyze and mark videos that contain the motion detection, line crossing detection, or intrusion detection information Before You Start ●...
Page 51
Figure 12-2 Sub-Period Playback 5. Select the period at the lower-right corner, e.g., 4. Note According to the defined number of split-screens, the video files on the selected date can be divided into average segments for playback. E.g., if there are video files existing between 16:00 and 22:00, and the 6-screen display mode is selected, then it can play the video files for 1 hour on each screen simultaneously.
13 Event Center 13.1 Event Settings 13.1.1 Basic/Generic Event Steps 1. Go to Event Center → → Event Configuration → Basic Event / Generic Event. 2. Select a channel. 3. Select an event type. 4. Turn on Enable. 5. Click Rule Settings to set the rule. Table 13-1 Normal Event Event Name Event Description...
Page 53
Human and Vehicle are selectable, apart from false alarms, only the selected target(s) can trigger alarms. Video tampering Video detection triggered an Use the tool bar at the top of Tampering alarm when the camera image to draw the detection Detection lens is covered and takes area.
Table 13-2 Linkage Method Description Linkage Method Description The device can send an exception or alarm signal to the remote Notify Surveillance alarm host when an event occurs. The alarm host refers to the PC Center installed with client software SCMS. When an alarm is triggered, the local monitor displays the alarm Alarm Pop-Up Window pop-up window.
Page 55
Steps Note A part of the following steps are only available for certain NVR or camera models. 1. Go to Smart Analysis → Smart Event Configuration → Perimeter Protection. 2. Select a camera. 3. Optional: Turn on Enable AI by NVR. The device will analyze the video, and cameras only transmit video stream.
Page 56
Detection Target Select Detection Target as Human or Vehicle to discard alarms which are not triggered by human or vehicle. Detection Target is only available for certain models. 4) Optional: Click to draw Max. Size or Min. Size. Only targets that meet the size requirement can trigger alarms.
Page 57
9. Optional: Set Shield Area when AI by NVR is enabled. After a shield area is set, the device will not analyze target behavior in the area, so that the perimeter protection events will not be triggered within the area. 10.
Page 58
6. Click Rule Settings to detection rules. 1) Select a rule number. For example, select 1. 2) Click , and click on the image 4 times respectively to draw each point of a quadrilateral area. 3) Set Time Threshold, Sensitivity, and Detection Target. Time Threshold The time an object loiters in the region.
Page 59
Linkage Method Description videos. Note Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System → Storage Management → Storage Schedule → Video Recording to configure video recording schedule. 9. Optional: Set Shield Area when AI by NVR is enabled. After a shield area is set, the device will not analyze target behavior in the area, so that the perimeter protection events will not be triggered within the area.
Page 60
Figure 13-3 Region Entrance Detection 6. Click Rule Settings to detection rules. 1) Select a rule number. For example, select 1. 2) Click , and click on the image 4 times respectively to draw each point of a quadrilateral area. 3) Set Sensitivity and Detection Target.
Page 61
Linkage Method Description When an alarm is triggered, the local monitor displays the alarm Alarm Pop-Up Window pop-up window. Buzzer When an alarm is detected, the buzzer will make an audible beep. The system can send an email with alarm information to a user or Send Email users when an alarm is detected.
Page 62
2. Select a camera. 3. Optional: Turn on Enable AI by NVR. The device will analyze the video, and cameras only transmit video stream. 4. Select Region Exiting. 5. Turn on Enable. Figure 13-4 Region Exiting Detection 6. Click Rule Settings to detection rules. 1) Select a rule number.
Table 13-6 Linkage Method Description Linkage Method Description The device can send an exception or alarm signal to the remote Notify Surveillance alarm host when an event occurs. The alarm host refers to the PC Center installed with client software SCMS. When an alarm is triggered, the local monitor displays the alarm Alarm Pop-Up Window pop-up window.
Page 64
Steps 1. Go to Smart Analysis → Smart Event Settings → Other Event. 2. Select a camera 3. Select an event type. 4. Turn on Enable. 5. Click Rule Settings to set the rule. Table 13-7 Abnormal Behavior Events Event Name Event Description Rule Configuration Loitering detection is...
Page 65
The object removal detection function detects the objects removed from a Object Removal predefined region, such Detection as the exhibits on display, and a series of actions can be taken when the alarm is triggered. Fast moving detection is used to detect suspicious running and chasing, over-speed, and fast moving.
Table 13-8 Linkage Method Description Linkage Method Description The device can send an exception or alarm signal to the remote Notify Surveillance alarm host when an event occurs. The alarm host refers to the PC Center installed with client software SCMS. When an alarm is triggered, the local monitor displays the alarm Alarm Pop-Up Window pop-up window.
Page 67
Event Name Event Description Rule Configuration The face capture detects and captures faces appearing in the Face Capture scene. Linkage actions can be triggered when a human face is detected. The function compares detected Face Picture face pictures with specified list Comparison library.
Page 68
Multi-target-type detection enables Multi-Target- the device to detect the faces, Type Detection human bodies and vehicles simultaneously in a scene. 6. Click Arming Schedule to select an arming schedule type. Note If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized arming schedule, or move the cursor on time bar and click to set specified time schedule.
13.1.5 Thermal Camera Detection The NVR supports the event detection modes of the thermal network cameras: fire and smoke detection, temperature detection, temperature difference detection, etc. Before You Start Add the thermal network camera to your device and make sure the camera is activated. Steps 1.
Linkage Method Description users when an alarm is detected. The alarm output can be triggered by the alarm input, motion Alarm Output detection, video tampering detection, face detection, line crossing detection, and any other events. When an alarm is detected, the selected channel would record videos.
Page 71
Note For example, Local<-1 represents the alarm input number at the device rear panel is 1. 3. Edit Alarm Name. 4. Turn on Enable. 5. Set Quick Disarming. Quick disarming can disable the selected alarm linkage methods in a batch. 6.
Linkage Method Description The alarm output can be triggered by the alarm input, motion Alarm Output detection, video tampering detection, face detection, line crossing detection, and any other events. When an alarm is detected, the selected channel would record videos. Note Video recording schedule shall be enabled for the channel, Record...
Page 73
6. Click Arming Schedule to select an arming schedule type. Note If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized arming schedule, or move the cursor on time bar and click to set specified time schedule.
13.2 Linkage Configuration Configure parameters for event linkages. Steps 1. Go to Event Center → → Linkage Configuration. 2. Click Email to configure email parameters. Table 13-15 Email Linkage Item Description Enable it if the SMTP server requires user authentication Server Authentication and enter the user name and password accordingly.
4. Click Alarm Output to set alarm output parameters. Note ● Click the name of each alarm output to edit it. ● The alarm output No. is the same as the one at the device rear panel. For example, Local->1 means the alarm out No.
What to do next Select the items from the result list and export them for backup. 13.4 View Alarms You can view real-time alarm videos and pictures, and play them back. Steps 1. Go to Event Center → 2. Click Real-Time Alarm. 3.
14 Search and Backup You can search files according to different searching conditions, including file type, event type, time, tag, etc. The searching results can be exported to another device, such as a USB flash drive. Before You Start Ensure HDD is correctly installed and recording parameters are properly configured. Steps 1.
Page 78
Figure 14-2 Searching Result 5. Optional: Perform the following operations. Click to select a file. Click to lock a file. After a file is locked, it will not be overwritten. Click to export a file. Use the tool bar at the top to filter results by channel. Use the tool bar at the top to switch display effect.
15 Smart Settings 15.1 Algorithm Management Algorithms are used for device engines to analyze different smart functions. Smart function would be usable after allocating the corresponding algorithm to an engine. Go to Smart Analysis → Engine Settings. The available algorithms would be listed, and you can click the required algorithm to link engine(s).
Page 80
3. Click Add or Import. 4. Import picture(s). – Add: Click to upload a picture at a time. If the picture has multiple targets, you have to pick one from them. – Import: Multiple pictures can be imported at a time. The device will use the file name as its picture name and leave other attributes empty, or import picture files by specified rules.
16 Application Center 16.1 Human and Vehicle Detection The human and vehicle information will be displayed for the selected channel at real-time. Human and vehicle detection should be configured in advance. Go to System → Event to configure. Figure 16-1 Human and Vehicle Detection Table 16-1 Human and Vehicle Detection Description Description Right-click to display menu bar.
16.2.1 Check-In Task Before starting person check-in, the corresponding task should be properly configured. Before You Start ● A camera for person check-in is properly connected. ● Go to Smart Analysis → Smart Event Settings → Face Recognition. Allocate Target Recognition to at least one engine.
Figure 16-3 Search Check-In Records 4. Set time. 5. Click Search. 16.3 Statistic Report You can view reports of people counting and heat map. Table 17-2 Statistic Report Introduction Function Icon Condition Description Name ● The function must be supported by the connected IP People counting calculates the camera.
17 System Parameter Settings System parameters include device name, time, lock screen time, language, etc. Go to System → System Settings → System Configuration to configure parameter. Table 17-1 Parameter Description Type Parameter Name Description The screen would be locked when the cursor is not moving Lock Screen Time for the specified time.
18 Hot Spare Device Backup The video recorder GD-RN-DT8864N can form an N+M hot spare system. The system consists of several working video recorders and at least one hot spare video recorder. When a working video recorder fails, the hot spare video recorder would switch into operation, which increases the reliability of the system.
Page 86
Note ● The camera connection will be disabled when the device works in hot spare mode. ● It is highly recommended to restore the device defaults after switching the work mode of hot spare devices to normal mode to ensure the normal operation afterwards. 4.
19 Configure Exception Event Exception events can be configured to take the event hint in the live view interface and trigger alarm output and linkage actions. Steps 1. Go to System → Event → Exception. Figure 19-1 Exception Event Configuration 2.
21 System Maintenance System maintenance functions include log search, schedule reboot, upgrade, etc. 21.1 Schedule Reboot The device will automatically restart according to the schedule. Go to System → System Maintenance → Maintenance → Schedule Reboot to enable the function, and set the reboot schedule. 21.2 Upgrade Device The device system can be upgraded with a local USB flash drive, remote FTP server, etc.
Expired Time Settings When the log disk is full, logs that exceed the period will be overwritten. 21.5 Configure Log Server You can upload system logs to the server for backup. Steps 1. Go to System → CX → System Settings → Network → Network → Log Server. 2.
Page 91
You can view the health status of a 4 TB to 8 TB Seagate HDD that generated after October 1, 2017. Use this function to help HDD Status Detection troubleshoot HDD problems. Health Detection shows a more detailed HDD status than the S.M.A.R.T. function. S.M.A.R.T.
22 Security Management 22.1 Address Filter 22.2 Stream Encryption After enabling stream encryption, encryption key would be required for remote live view, remote playback, and the downloaded videos. Steps 1. Go to System → System Maintenance → Security Management → Stream Encryption. 2.
23 Appendix 23.1 List of Applicable Power Adapter Only use power adapters listed below. Power Adapter Model Specifications Manufacturer Shenzhen Honor ADS-26FSG-12 12024EPG 12 V, 2 A Electronic Co., Ltd. Moso Power Supply MSA-Z3330IC12.0-48W-Q 12 V, 3.33 A Technology Co., Ltd. MOSO Technology Co., MSA-C1500IC12.0-18P-DE 12 V, 1.5 A...
23.2 Glossary Dual-Stream Dual-stream is a technology used to record high resolution video locally while transmitting a lower resolution stream over the network. The two streams are generated by the DVR, with the main stream having a maximum resolution of 1080P and the sub-stream having a maximum resolution of CIF.
in such countries as the United States and Japan. Each frame of an NTSC signal contains 525 scan lines at 60Hz. Acronym for Network Video Recorder. An NVR can be a PC-based or embedded system used for centralized management and storage for IP cameras, IP Domes and other DVRs. Acronym for Phase Alternating Line.
Page 96
Solution Change the camera password. Warning We highly recommend you create a strong password of your own choosing (Using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters.) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
Reason 1. The camera does not support coaxitron. 2. The coaxitron protocol is incorrect. 3. The signal is affected by video optical transceiver. Solution 1. Ensure the video input signal is HDTVI, and the camera supports coaxitron. 2. Ensure coaxitron protocol parameters are correct, such as baud rate and address. 3.
Page 98
requirements of the chemical active substance 3C2 level in IEC 60721-3-3:2002. Table 24-1 Corrosive Gas Concentration Limit Corrosive Gas Category Average Value (mg/m Max. Value (mg/m (Sulfur Dioxide) S (Hydrogen Sulfide) (Chlorine) HCl (Hydrogen Chloride) HF (Hydrogen Fluoride) 0.01 0.03 (Ammonia) (Ozone) 0.05...
Page 99
Category Primary Sources Combustion, automobile exhaust, microbial activity, tree CO (Carbon Monoxide) decay, etc. (Chlorine), ClO (Chlorine Chlorine manufacturing, aluminum manufacturing, zinc Dioxide) manufacturing, waste decomposition, etc. Automobile exhaust, combustion, forest fires, marine process HCl (Hydrogen Chloride) polymer combustion, etc. HBr (Hydrobromic Acid), HI Automobile exhaust, etc.
Need help?
Do you have a question about the GD-RN-BP8616P and is the answer not in the manual?
Questions and answers