Table of Contents

Advertisement

Quick Links

User Guide
GD-RN-BP8616P
GD-RN-BP8632N
GD-RN-DT8864N
www.grundig-security.com

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the GD-RN-BP8616P and is the answer not in the manual?

Questions and answers

Summary of Contents for Grundig GD-RN-BP8616P

  • Page 1 User Guide GD-RN-BP8616P GD-RN-BP8632N GD-RN-DT8864N www.grundig-security.com...
  • Page 2: Table Of Contents

    Contents 1 Introduction ............................5 1.1 Model Overview ........................5 2 Activate via Local Menu ........................6 3 Log In to Your Device ........................8 4 Network Settings ..........................9 4.1 Network Parameter Settings ....................9 4.1.1 Configure TCP/IP ......................9 4.1.2 Configure DDNS......................
  • Page 3 6.2 Add Access Control Device ....................25 6.3 Add Audio Device ......................... 25 6.4 Add POS Device ........................26 7 Camera Settings ..........................28 7.1 Enable H.265 Stream Access ....................28 7.2 Batch Configuration ......................28 7.3 Display Settings ........................28 7.4 Configure Video Parameters ....................
  • Page 4 12.3 Event Playback ........................49 12.4 Sub-Period Playback ......................49 13 Event Center ..........................51 13.1 Event Settings ........................51 13.1.1 Basic/Generic Event ....................51 13.1.2 Perimeter Protection ....................53 13.1.3 Abnormal Behavior Event ..................62 13.1.4 Target Event ......................65 13.1.5 Thermal Camera Detection ..................
  • Page 5 19 Configure Exception Event ......................86 20 View System Info ........................... 87 21 System Maintenance ........................88 21.1 Schedule Reboot ........................ 88 21.2 Upgrade Device ........................88 21.3 Backup and Restore ......................88 21.4 Log Info ..........................88 21.5 Configure Log Server ......................89 21.6 Maintenance Tools ......................
  • Page 6: Introduction

    1 Introduction Thank you for purchasing a Grundig product. Before installing or connecting the product, please read first the following documents: - Legal Disclaimer - Safety Instructions - Installation Manual and/or Quick Guide for the respective product model Further information about the product like Data Sheets, CE Documents, etc. can also be found on our Webpage www.grundig-security.com.
  • Page 7: Activate Via Local Menu

    2 Activate via Local Menu For the first-time access, you have to set an admin password to activate your device. No operation is allowed before activation. You can also activate the device via web browser, SADP or client software. Before You Start Ensure your device is connected with a monitor and mouse.
  • Page 8 4. Optional: Enter a password hint. It will help you remember your password when you forget. 5. Click Activate. Note After the device is activated, you should properly keep the password. 6. Optional: Draw an unlock pattern. 7. Configure at least one password recovery method. What to do next Follow the wizard to set basic parameters.
  • Page 9: Log In To Your Device

    3 Log In to Your Device You have to log in to your device before operating the menu and other functions. Before You Start Ensure your device is activated. Steps 1. Power on your device, you would automatically enter the login interface. Figure 3-1 Login 2.
  • Page 10: Network Settings

    4 Network Settings Network parameters, platform access settings, and network services are configurable. 4.1 Network Parameter Settings You shall configure network parameters before using functions that require network access. 4.1.1 Configure TCP/IP TCP/IP must be properly configured before you operate video recorder over network or access network devices.
  • Page 11: Configure Ddns

    Note Working mode is only available for certain models. 3. Configure network parameters. IPv4 DHCP If the DHCP server is available, you can enable DHCP to automatically obtain an IP address and other network settings from that server. The maximum transmission unit (MTU) is the size of the largest network layer protocol data unit that can be communicated in a single network transaction.
  • Page 12: Configure Pppoe

    Figure 4-2 DDNS 2. Turn on Enable. 3. Select a DDNS type. 4. Set parameters, including service address, domain name, etc. 5. Click Save. 4.1.3 Configure PPPoE If the device is connected to Internet through PPPoE, you need to configure user name and password accordingly.
  • Page 13: Platform Access Settings

    Steps 1. Go to System → System Settings → Network → Network → Other. 2. Set Multicast parameters. Note ● When adding device through network video security client, multicast group IP address should be the same as the device multicast IP address. ●...
  • Page 14: Configure Isup

    Note If the device is already bound with an account, you can click Unbind to unbind with the current account. 8. Click Save. Result ● If your device is connected with SCMS, Connection Status will be Online. ● If your device is bound with a SCMS account, Account Status will be Linked. What to do next You can access your video recorder via SCMS.
  • Page 15: Configure Sdk Service

    The platform server IP address. Access Server Port The platform server port, ranges from 1024 to 65535. The actual port shall be provided by the platform. Device ID Device ID shall be provided by the platform. Protocol Version ISUP protocol version, only ISUP 5.0 is available. Encryption Key Encryption password is required when using ISUP V5.0 version, it provides more secure communication between the device and platform.
  • Page 16: Enable Isapi

    Note The port for Enhanced SDK Service is 8443 by default. 3. Optional: Enable Stream Over TLS. The stream over TLS encryption technology provides more secure stream transmission service. 4. Click Save. 4.2.4 Enable ISAPI ISAPI (Internet Server Application Programming Interface) is an open protocol based on HTTP, which can realize the communication between the system devices (e.g., network camera, NVR, etc.).
  • Page 17: Configure Log Server

    Caution We highly recommend you create a strong password of your own choosing (Using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters.) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product 6.
  • Page 18: Configure Rtsp

    Figure 4-9 HTTP(S) 2. Optional: Turn on HTTP or HTTPS. 3. View or edit Port of HTTP or HTTPS. 4. Set HTTP/HTTPS Authentication. Authentication Type Two authentication types are selectable, for security reasons, it is recommended to select Digest as the authentication type. Digest Algorithm Digest algorithms are based on HTTP/HTTPS and are mainly used for the digest authentication of user authentication.
  • Page 19: Configure Websocket(S)

    Figure 4-10 RTSP 2. Set parameters. Port The port is 554 by default. Authentication Type Two authentication types are selectable, if you select Digest, only the request with digest authentication can access the video stream by RTSP via the IP address. For security reasons, it is recommended to select Digest as the authentication type.
  • Page 20 Before You Start If you want to enable the UPnP™ function of the device, you must enable the UPnP™ function of the router to which your device is connected. When the network working mode of the device is set as multi-address, the Default Route of the device should be in the same network segment as that of the LAN IP address of the router.
  • Page 21 What to do next Enter the virtual server settings page of router, then fill in the blank of internal/external source port with the internal/external port value, and other required contents. 20 English...
  • Page 22: User Management

    5 User Management There is a default account for administrator. The administrator user name is admin. Administrator has the permission to add, delete, and edit user. Guest and operator users only have limited permissions. Go to System → System Settings → User Management. Figure 5-1 User Management Table 5-1 Icon/Button Description Icon/Button...
  • Page 23: Device Access

    6 Device Access The video recorder may be able to access multiple device types, such as network camera, access control device, and alarm device. Please refer to the actual device for the access capability of your video recorder. 6.1 Access Video Device There are several ways to access a video device.
  • Page 24: Add Network Camera Manually

    6.1.2 Add Network Camera Manually Manually add the network cameras to your video recorder. Before You Start ● Ensure your network camera is on the same network segment with that of your video recorder. ● Ensure the network connection is valid and correct. Ensure the network camera is activated.
  • Page 25: Add Network Camera Via Custom Protocol

    6.1.3 Add Network Camera via Custom Protocol For network cameras that are not using standard protocols, you can configure custom protocols to add them. The system provides 8 custom protocols. Before You Start ● Ensure the network camera supports RTSP streaming. ●...
  • Page 26: Add Network Camera Through Camera Configuration File

    Contact the manufacturer of network camera for the URL of getting main stream and sub- stream. The general format is [Type]://[IP Address]:[Port]/[Resource Path], for example, rtsp://192.168.0.1:554/ch1/main/av_stream. Note ● Protocol Name and Path can be automatically generated if you click a brand name below Protocol Name.
  • Page 27: Add Pos Device

    6.4 Add POS Device POS machine/server can be connected for certain device models. The device can receive transaction messages from POS machine/server, overlay transaction messages on the video image, and trigger POS event alarms. Steps 1. Go to System → Device Access → Device → POS. 2.
  • Page 28 TCP Connection When using TCP connection, the port must be set from 1 to 65535, and the port for each POS machine must be unique. UDP Connection When using UDP connection, the port must be set from 1 to 65535, and the port for each POS machine must be unique.
  • Page 29: Camera Settings

    7 Camera Settings You can configure the added camera, such as privacy mask, image parameters, etc. 7.1 Enable H.265 Stream Access The device can automatically switch to the H.265 stream of IP camera (which supports H.265 video format) for the initial access. Steps 1.
  • Page 30: Configure Video Parameters

    Image Settings Customize the image parameters including the brightness, contrast, and saturation for the live view and recording effect. Exposure Set the camera exposure time (1/10000 to 1 sec). A larger exposure value results in a brighter image. Day/Night Switch The camera can be set to day, night, or auto switch mode according to the surrounding illumination conditions.
  • Page 31: Configure Privacy Mask

    It refers to the number of frames captured each second. A higher frame rate is advantageous when there is movement in the video stream, as it maintains image quality throughout. I-Frame Interval I-Frame also referred as intra picture, I-Frame is the first frame of every GOP (a video compression technology of MPEG).
  • Page 32: Device Grouping

    8 Device Grouping The added devices can be classified into different customized groups. Steps 1. Go to System → Device Access → Device Grouping. Figure 8-1 Device Grouping 2. Click to add a group. Note After a group is added, you can click to edit/delete it.
  • Page 33: Storage Management

    9 Storage Management 9.1 Manage HDD A newly installed hard disk drive (HDD) must be initialized before using. You can format HDD, repair database, and view HDD status through HDD management interface. Before You Start Ensure the HDD is properly installed to your device. Steps 1.
  • Page 34: Raid Configuration

    9.2 RAID Configuration A disk array is a data storage virtualization technology that combines multiple physical disk drives into a single logical unit. Also known as a "RAID", an array stores data over multiple HDDs to provide enough redundancy so that data can be recovered if one disk fails. Data is distributed across the drives in one of several ways called "RAID levels", based the redundancy and performance required.
  • Page 35 Figure 9-2 Enable RAID 3. Wait for the device to restart. 4. Go to System → Storage Management → Storage HDD → Array Management again. Figure 9-3 Array Management 5. Create an array. Creation Method Description One-touch Array Click One-touch Array Configuration. Configuration Note By default, the array type created by one-touch configuration is RAID...
  • Page 36: Rebuild Array

    9.2.2 Rebuild Array The array status includes Functional, Degraded, and Offline. To ensure the high security and reliability of the data stored in an array, take immediate and proper maintenance of the arrays according its status. Steps 1. Go to System → Storage Management → Storage HDD → Array Management. 2.
  • Page 37: View Firmware Info

    9.2.4 View Firmware Info You can view array firmware information and set the background task speed. Before You Start Ensure disk array is enabled. Steps 1. Go to System → Storage Management → Storage HDD → Array Management. 2. Click Firmware Info. 3.
  • Page 38 Table 9-3 Parameter Description Parameter Name Description HDD Sleeping When the HDD is not used for a period, it will turn to sleep. When HDD is full, it will continue to write new files by deleting the Overwriting oldest files. After saving VCA data of camera to your device, you will be able to Save Camera VCA Data search it in Event Center.
  • Page 39: Schedule Configuration

    10 Schedule Configuration The device will follow the schedule to store files to the disk. 10.1 Configure Schedule Template After a schedule template is configured, you can use the template as the recording schedule. Steps 1. Go to System → System Settings → Template Configuration → Holiday Schedule. 2.
  • Page 40: Configure Recording Schedule

    Figure 10-2 Edit Template 3) Select a recording type. For example, Event. 4) Drag the cursor on time bar to draw the schedule. Note ● After moving the cursor on time bar, you can also click to set specified time schedule. ●...
  • Page 41 Figure 10-3 Video Recording Configuration 2. Turn on Enable for a camera. 3. Select a schedule type. Note If you set Record Schedule as Custom, you can drag the cursor on time bar to set customized record schedule, or move the cursor on time bar and click to set specified time schedule.
  • Page 42: Configure Picture Capture Schedule

    Parameter Description Note The channel shall have audio function, or have connected an audio device. ANR (Automatic Network Replenishment) can automatically enable SD card of network camera to save the video in the condition of network disconnection, and can synchronize data after the network is recovered. The time you set to record before the scheduled time or event.
  • Page 43 Figure 10-5 Picture Capture Configuration 2. Turn on Enable for a camera. 3. Select a schedule type. Note If you set Record Schedule as Custom, you can drag the cursor on time bar to set customized record schedule, or move the cursor on time bar and click to set specified time schedule.
  • Page 44: Configure Audio Recording

    Parameter Description Set the picture quality to low, medium or high. High picture quality Picture Quality requires more storage space. Interval The time interval of capturing each live picture. 6. Optional: Select channels in the list, and use Batch Schedule Configuration and Batch Advanced Settings to configure channels in a batch.
  • Page 45: Live View

    11 Live View 11.1 Configure Live View Layout Live view displays the video image of each camera in real time. Steps 1. Go to Live View. 2. Click at the lower-right corner. 3. Select a window division type, or click Custom to customize a new type as your desire. 4.
  • Page 46: Ptz Control

    Table 11-1 Interface Description Description Channel list, and target detection list. If you select a channel from the channel list, the device will redirect to the corresponding window. Shortcut menu. It will appear after clicking the cursor on the image area. Channel tool bar.
  • Page 47 Task Description Operation Set a pattern: 1. Click Patterns can be set by recording 2. Use to direction buttons to adjust the the movement of the PTZ. You image, the device will record the Pattern can call the pattern to make the movement.
  • Page 48: Playback

    12 Playback 12.1 GUI Introduction You can play back video or audio files. Figure 12-1 Playback Table 12-1 Interface Description Description Channel list. Calendar for time selection. Playback timeline. ● Position the cursor on the timeline, drag the timeline to position to a certain time. ●...
  • Page 49: Normal Playback

    Description videos by tag. ● Click to lock the video. After a video is locked, it will not be overwritten. After locking, you can go to → Backup → By Tag to search videos by lock. ● Select → Dual-VCA to search videos that can trigger the corresponding event rule.
  • Page 50: Event Playback

    ● : Videos that contain vehicle would be marked in red. 12.3 Event Playback When you select the event playback mode, the system will analyze and mark videos that contain the motion detection, line crossing detection, or intrusion detection information Before You Start ●...
  • Page 51 Figure 12-2 Sub-Period Playback 5. Select the period at the lower-right corner, e.g., 4. Note According to the defined number of split-screens, the video files on the selected date can be divided into average segments for playback. E.g., if there are video files existing between 16:00 and 22:00, and the 6-screen display mode is selected, then it can play the video files for 1 hour on each screen simultaneously.
  • Page 52: Event Center

    13 Event Center 13.1 Event Settings 13.1.1 Basic/Generic Event Steps 1. Go to Event Center → → Event Configuration → Basic Event / Generic Event. 2. Select a channel. 3. Select an event type. 4. Turn on Enable. 5. Click Rule Settings to set the rule. Table 13-1 Normal Event Event Name Event Description...
  • Page 53 Human and Vehicle are selectable, apart from false alarms, only the selected target(s) can trigger alarms. Video tampering Video detection triggered an Use the tool bar at the top of Tampering alarm when the camera image to draw the detection Detection lens is covered and takes area.
  • Page 54: Perimeter Protection

    Table 13-2 Linkage Method Description Linkage Method Description The device can send an exception or alarm signal to the remote Notify Surveillance alarm host when an event occurs. The alarm host refers to the PC Center installed with client software SCMS. When an alarm is triggered, the local monitor displays the alarm Alarm Pop-Up Window pop-up window.
  • Page 55 Steps Note A part of the following steps are only available for certain NVR or camera models. 1. Go to Smart Analysis → Smart Event Configuration → Perimeter Protection. 2. Select a camera. 3. Optional: Turn on Enable AI by NVR. The device will analyze the video, and cameras only transmit video stream.
  • Page 56 Detection Target Select Detection Target as Human or Vehicle to discard alarms which are not triggered by human or vehicle. Detection Target is only available for certain models. 4) Optional: Click to draw Max. Size or Min. Size. Only targets that meet the size requirement can trigger alarms.
  • Page 57 9. Optional: Set Shield Area when AI by NVR is enabled. After a shield area is set, the device will not analyze target behavior in the area, so that the perimeter protection events will not be triggered within the area. 10.
  • Page 58 6. Click Rule Settings to detection rules. 1) Select a rule number. For example, select 1. 2) Click , and click on the image 4 times respectively to draw each point of a quadrilateral area. 3) Set Time Threshold, Sensitivity, and Detection Target. Time Threshold The time an object loiters in the region.
  • Page 59 Linkage Method Description videos. Note Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System → Storage Management → Storage Schedule → Video Recording to configure video recording schedule. 9. Optional: Set Shield Area when AI by NVR is enabled. After a shield area is set, the device will not analyze target behavior in the area, so that the perimeter protection events will not be triggered within the area.
  • Page 60 Figure 13-3 Region Entrance Detection 6. Click Rule Settings to detection rules. 1) Select a rule number. For example, select 1. 2) Click , and click on the image 4 times respectively to draw each point of a quadrilateral area. 3) Set Sensitivity and Detection Target.
  • Page 61 Linkage Method Description When an alarm is triggered, the local monitor displays the alarm Alarm Pop-Up Window pop-up window. Buzzer When an alarm is detected, the buzzer will make an audible beep. The system can send an email with alarm information to a user or Send Email users when an alarm is detected.
  • Page 62 2. Select a camera. 3. Optional: Turn on Enable AI by NVR. The device will analyze the video, and cameras only transmit video stream. 4. Select Region Exiting. 5. Turn on Enable. Figure 13-4 Region Exiting Detection 6. Click Rule Settings to detection rules. 1) Select a rule number.
  • Page 63: Abnormal Behavior Event

    Table 13-6 Linkage Method Description Linkage Method Description The device can send an exception or alarm signal to the remote Notify Surveillance alarm host when an event occurs. The alarm host refers to the PC Center installed with client software SCMS. When an alarm is triggered, the local monitor displays the alarm Alarm Pop-Up Window pop-up window.
  • Page 64 Steps 1. Go to Smart Analysis → Smart Event Settings → Other Event. 2. Select a camera 3. Select an event type. 4. Turn on Enable. 5. Click Rule Settings to set the rule. Table 13-7 Abnormal Behavior Events Event Name Event Description Rule Configuration Loitering detection is...
  • Page 65 The object removal detection function detects the objects removed from a Object Removal predefined region, such Detection as the exhibits on display, and a series of actions can be taken when the alarm is triggered. Fast moving detection is used to detect suspicious running and chasing, over-speed, and fast moving.
  • Page 66: Target Event

    Table 13-8 Linkage Method Description Linkage Method Description The device can send an exception or alarm signal to the remote Notify Surveillance alarm host when an event occurs. The alarm host refers to the PC Center installed with client software SCMS. When an alarm is triggered, the local monitor displays the alarm Alarm Pop-Up Window pop-up window.
  • Page 67 Event Name Event Description Rule Configuration The face capture detects and captures faces appearing in the Face Capture scene. Linkage actions can be triggered when a human face is detected. The function compares detected Face Picture face pictures with specified list Comparison library.
  • Page 68 Multi-target-type detection enables Multi-Target- the device to detect the faces, Type Detection human bodies and vehicles simultaneously in a scene. 6. Click Arming Schedule to select an arming schedule type. Note If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized arming schedule, or move the cursor on time bar and click to set specified time schedule.
  • Page 69: Thermal Camera Detection

    13.1.5 Thermal Camera Detection The NVR supports the event detection modes of the thermal network cameras: fire and smoke detection, temperature detection, temperature difference detection, etc. Before You Start Add the thermal network camera to your device and make sure the camera is activated. Steps 1.
  • Page 70: Alarm Input Event

    Linkage Method Description users when an alarm is detected. The alarm output can be triggered by the alarm input, motion Alarm Output detection, video tampering detection, face detection, line crossing detection, and any other events. When an alarm is detected, the selected channel would record videos.
  • Page 71 Note For example, Local<-1 represents the alarm input number at the device rear panel is 1. 3. Edit Alarm Name. 4. Turn on Enable. 5. Set Quick Disarming. Quick disarming can disable the selected alarm linkage methods in a batch. 6.
  • Page 72: Audio Analysis Event

    Linkage Method Description The alarm output can be triggered by the alarm input, motion Alarm Output detection, video tampering detection, face detection, line crossing detection, and any other events. When an alarm is detected, the selected channel would record videos. Note Video recording schedule shall be enabled for the channel, Record...
  • Page 73 6. Click Arming Schedule to select an arming schedule type. Note If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized arming schedule, or move the cursor on time bar and click to set specified time schedule.
  • Page 74: Linkage Configuration

    13.2 Linkage Configuration Configure parameters for event linkages. Steps 1. Go to Event Center → → Linkage Configuration. 2. Click Email to configure email parameters. Table 13-15 Email Linkage Item Description Enable it if the SMTP server requires user authentication Server Authentication and enter the user name and password accordingly.
  • Page 75: Event Search

    4. Click Alarm Output to set alarm output parameters. Note ● Click the name of each alarm output to edit it. ● The alarm output No. is the same as the one at the device rear panel. For example, Local->1 means the alarm out No.
  • Page 76: View Alarms

    What to do next Select the items from the result list and export them for backup. 13.4 View Alarms You can view real-time alarm videos and pictures, and play them back. Steps 1. Go to Event Center → 2. Click Real-Time Alarm. 3.
  • Page 77: Search And Backup

    14 Search and Backup You can search files according to different searching conditions, including file type, event type, time, tag, etc. The searching results can be exported to another device, such as a USB flash drive. Before You Start Ensure HDD is correctly installed and recording parameters are properly configured. Steps 1.
  • Page 78 Figure 14-2 Searching Result 5. Optional: Perform the following operations. Click to select a file. Click to lock a file. After a file is locked, it will not be overwritten. Click to export a file. Use the tool bar at the top to filter results by channel. Use the tool bar at the top to switch display effect.
  • Page 79: Smart Settings

    15 Smart Settings 15.1 Algorithm Management Algorithms are used for device engines to analyze different smart functions. Smart function would be usable after allocating the corresponding algorithm to an engine. Go to Smart Analysis → Engine Settings. The available algorithms would be listed, and you can click the required algorithm to link engine(s).
  • Page 80 3. Click Add or Import. 4. Import picture(s). – Add: Click to upload a picture at a time. If the picture has multiple targets, you have to pick one from them. – Import: Multiple pictures can be imported at a time. The device will use the file name as its picture name and leave other attributes empty, or import picture files by specified rules.
  • Page 81: Application Center

    16 Application Center 16.1 Human and Vehicle Detection The human and vehicle information will be displayed for the selected channel at real-time. Human and vehicle detection should be configured in advance. Go to System → Event to configure. Figure 16-1 Human and Vehicle Detection Table 16-1 Human and Vehicle Detection Description Description Right-click to display menu bar.
  • Page 82: Check-In Task

    16.2.1 Check-In Task Before starting person check-in, the corresponding task should be properly configured. Before You Start ● A camera for person check-in is properly connected. ● Go to Smart Analysis → Smart Event Settings → Face Recognition. Allocate Target Recognition to at least one engine.
  • Page 83: Statistic Report

    Figure 16-3 Search Check-In Records 4. Set time. 5. Click Search. 16.3 Statistic Report You can view reports of people counting and heat map. Table 17-2 Statistic Report Introduction Function Icon Condition Description Name ● The function must be supported by the connected IP People counting calculates the camera.
  • Page 84: System Parameter Settings

    17 System Parameter Settings System parameters include device name, time, lock screen time, language, etc. Go to System → System Settings → System Configuration to configure parameter. Table 17-1 Parameter Description Type Parameter Name Description The screen would be locked when the cursor is not moving Lock Screen Time for the specified time.
  • Page 85: Hot Spare Device Backup

    18 Hot Spare Device Backup The video recorder GD-RN-DT8864N can form an N+M hot spare system. The system consists of several working video recorders and at least one hot spare video recorder. When a working video recorder fails, the hot spare video recorder would switch into operation, which increases the reliability of the system.
  • Page 86 Note ● The camera connection will be disabled when the device works in hot spare mode. ● It is highly recommended to restore the device defaults after switching the work mode of hot spare devices to normal mode to ensure the normal operation afterwards. 4.
  • Page 87: Configure Exception Event

    19 Configure Exception Event Exception events can be configured to take the event hint in the live view interface and trigger alarm output and linkage actions. Steps 1. Go to System → Event → Exception. Figure 19-1 Exception Event Configuration 2.
  • Page 88: View System Info

    20 View System Info Go to Maintenance → System Info→ Device Info to view the system information. Figure 20-1 System Info 87 English...
  • Page 89: System Maintenance

    21 System Maintenance System maintenance functions include log search, schedule reboot, upgrade, etc. 21.1 Schedule Reboot The device will automatically restart according to the schedule. Go to System → System Maintenance → Maintenance → Schedule Reboot to enable the function, and set the reboot schedule. 21.2 Upgrade Device The device system can be upgraded with a local USB flash drive, remote FTP server, etc.
  • Page 90: Configure Log Server

    Expired Time Settings When the log disk is full, logs that exceed the period will be overwritten. 21.5 Configure Log Server You can upload system logs to the server for backup. Steps 1. Go to System → CX → System Settings → Network → Network → Log Server. 2.
  • Page 91 You can view the health status of a 4 TB to 8 TB Seagate HDD that generated after October 1, 2017. Use this function to help HDD Status Detection troubleshoot HDD problems. Health Detection shows a more detailed HDD status than the S.M.A.R.T. function. S.M.A.R.T.
  • Page 92: Security Management

    22 Security Management 22.1 Address Filter 22.2 Stream Encryption After enabling stream encryption, encryption key would be required for remote live view, remote playback, and the downloaded videos. Steps 1. Go to System → System Maintenance → Security Management → Stream Encryption. 2.
  • Page 93: Appendix

    23 Appendix 23.1 List of Applicable Power Adapter Only use power adapters listed below. Power Adapter Model Specifications Manufacturer Shenzhen Honor ADS-26FSG-12 12024EPG 12 V, 2 A Electronic Co., Ltd. Moso Power Supply MSA-Z3330IC12.0-48W-Q 12 V, 3.33 A Technology Co., Ltd. MOSO Technology Co., MSA-C1500IC12.0-18P-DE 12 V, 1.5 A...
  • Page 94: Glossary

    23.2 Glossary Dual-Stream Dual-stream is a technology used to record high resolution video locally while transmitting a lower resolution stream over the network. The two streams are generated by the DVR, with the main stream having a maximum resolution of 1080P and the sub-stream having a maximum resolution of CIF.
  • Page 95: Frequently Asked Questions

    in such countries as the United States and Japan. Each frame of an NTSC signal contains 525 scan lines at 60Hz. Acronym for Network Video Recorder. An NVR can be a PC-based or embedded system used for centralized management and storage for IP cameras, IP Domes and other DVRs. Acronym for Phase Alternating Line.
  • Page 96 Solution Change the camera password. Warning We highly recommend you create a strong password of your own choosing (Using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters.) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product.
  • Page 97: Notification For Corrosive Gas

    Reason 1. The camera does not support coaxitron. 2. The coaxitron protocol is incorrect. 3. The signal is affected by video optical transceiver. Solution 1. Ensure the video input signal is HDTVI, and the camera supports coaxitron. 2. Ensure coaxitron protocol parameters are correct, such as baud rate and address. 3.
  • Page 98 requirements of the chemical active substance 3C2 level in IEC 60721-3-3:2002. Table 24-1 Corrosive Gas Concentration Limit Corrosive Gas Category Average Value (mg/m Max. Value (mg/m (Sulfur Dioxide) S (Hydrogen Sulfide) (Chlorine) HCl (Hydrogen Chloride) HF (Hydrogen Fluoride) 0.01 0.03 (Ammonia) (Ozone) 0.05...
  • Page 99 Category Primary Sources Combustion, automobile exhaust, microbial activity, tree CO (Carbon Monoxide) decay, etc. (Chlorine), ClO (Chlorine Chlorine manufacturing, aluminum manufacturing, zinc Dioxide) manufacturing, waste decomposition, etc. Automobile exhaust, combustion, forest fires, marine process HCl (Hydrogen Chloride) polymer combustion, etc. HBr (Hydrobromic Acid), HI Automobile exhaust, etc.
  • Page 100 99 English...

This manual is also suitable for:

Gd-rn-bp8632nGd-rn-dt8864n

Table of Contents