Download Print this page

Advertisement

Quick Links

IVSS
User's Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V6.2.0

Advertisement

loading
Need help?

Need help?

Do you have a question about the IVSS Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Dahua IVSS Series

  • Page 1 IVSS User's Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V6.2.0...
  • Page 2 User's Manual Foreword General This manual introduces the installation, functions and operations of the intelligent video surveillance server (hereinafter referred to as "the Device" or "IVSS"). Read carefully before using the device, and keep the manual safe for future reference. Models Number of Models...
  • Page 3 User's Manual Revision History Version Revision Content Release Time Updated the baseline. ● Added one model. ● V6.2.0 March 2024 Added the RTMP,VPN, EPTZ and other ● platform functions. Updated the important safeguards and V6.1.3 January 2024 warnings. V6.1.2 Added the rear panel of 12/16/24 HDD series. September 2023 Added high toss.
  • Page 4 User's Manual Version Revision Content Release Time Added passerby database. ● Added IVS model switch ● Added algorithm version in the device list. ● V3.2.0 November 2020 Added Re-extract Eigenvector Again. ● Optimized people-counting, call alarm and ● smoking alarm. Optimized storage and recording ●...
  • Page 5 User's Manual visit our official website. The manual is for reference only. Slight differences might be found between the electronic version and the paper version. All designs and software are subject to change without prior written notice. Product updates ● might result in some differences appearing between the actual product and the manual.
  • Page 6 User's Manual Icon/Button Description Enter keywords, and then click to search for the corresponding information. Enter numbers, letters, symbols and more. Click the icon to close the window.
  • Page 7 User's Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the Device, hazard prevention, and prevention of property damage. Read carefully before using the Device, and comply with the guidelines when using it. Transportation Requirements Transport the Device under allowed humidity and temperature conditions.
  • Page 8 User's Manual We recommend using the power adapter provided with the Device. When selecting the power adapter, the power supply requirements (such as rated voltage) are subject to the Device label. Rotating Fan Blades Hazard ● Avoid touching the fan blades, especially when they are moving. Before installation, disconnect all the power cords.
  • Page 9 User's Manual Do not dispose the batteries in fire or a hot oven, or mechanically crush or cut the batteries to avoid an explosion. Do not leave the batteries in environments with extremely high temperatures to avoid explosions and leakage of flammable liquid or gas. Do not subject the batteries to extremely low air pressure to avoid explosions and the leakage of flammable liquid or gas.
  • Page 10 User's Manual Power off the Device before maintenance to make sure that the Device is disconnected from the ● power supply. AI module does not support hot plug. If you need to install or replace the AI module, unplug the ●...
  • Page 11 User's Manual Table of Contents Foreword................................I Important Safeguards and Warnings......................VI 1 Overview................................1 1.1 Introduction............................1 1.2 Login Mode ............................1 2 The Grand Tour..............................2 2.1 8-HDD Series............................2 2.1.1 Front Panel...........................2 2.1.2 Rear Panel............................ 3 2.1.3 Dimensions..........................6 2.2 12-HDD Series............................
  • Page 12 User's Manual 5.2.2 Configuring P2P Settings......................45 5.3 Login..............................46 5.3.1 Logging in to the PC Client....................... 46 5.3.2 Logging in to Local Interface....................47 5.3.3 Logging in to Webpage......................48 5.4 Home Page............................49 5.5 Configuring Remote Devices......................50 5.5.1 Initializing Remote Devices...................... 50 5.5.2 Adding Remote Devices......................51 6 AI Operations..............................
  • Page 13 User's Manual 6.6.5 Viewing AI Report........................115 6.7 IVS............................... 116 6.7.1 Enabling the Smart Plan......................116 6.7.2 Configuring IVS........................116 6.7.3 Live View of IVS........................120 6.7.4 IVS Search..........................122 6.8 ANPR..............................123 6.8.1 Enabling the Smart Plan......................123 6.8.2 Setting ANPR........................... 123 6.8.3 Live View of ANPR........................
  • Page 14 User's Manual 6.15 Smart Sound Detection........................146 6.15.1 Enabling the Smart Plan....................... 146 6.15.2 Configuring Smart Sound Detection................... 146 6.15.3 Live View of Smart Sound Detection................... 147 6.15.4 Smart Sound Detection Search.................... 147 7 General Operations............................. 149 7.1 Live and Monitor..........................149 7.1.1 View Management........................
  • Page 15 User's Manual 8.3 Event Management........................... 219 8.3.1 Alarm Actions.......................... 220 8.3.2 Local Device..........................228 8.3.3 Remote Device.........................236 8.4 Storage Management........................242 8.4.1 Storage Resource........................243 8.4.2 Storage Settings........................252 8.5 Security Strategy..........................259 8.5.1 Security Status.........................259 8.5.2 System Service.........................260 8.5.3 Attack Defense........................263 8.5.4 CA Certificate...........................
  • Page 16 User's Manual 9.2.5 Online User..........................295 9.3 System Resources..........................296 9.3.1 Viewing Device Resources...................... 296 9.3.2 Viewing AI Module Information.....................296 9.4 Network Detection..........................296 9.5 Disk Maintenance..........................297 9.5.1 S.M.A.R.T Detection.........................297 9.5.2 System Disk Health Detection....................298 9.5.3 Firmware Update........................298 9.6 Log Info...............................299 9.6.1 Log Classification........................
  • Page 17 User's Manual Appendix 5.2 Gaseous Contamination Specifications................317 Appendix 6 Cybersecurity Recommendations................... 319...
  • Page 18 User's Manual 1 Overview 1.1 Introduction As an intelligent video surveillance server (hereinafter referred to as IVSS or the Device), IVSS delivers not only the basic video surveillance functions, but also a bunch of advanced AI features including face comparison, perimeter protection, video metadata and ANPR, providing AI-based all- in-one surveillance solution for customers.
  • Page 19 User's Manual 2 The Grand Tour This section introduces front panel, rear panel, port function and button function, indicator light status, and so on. 2.1 8-HDD Series 2.1.1 Front Panel Figure 2-1 Front panel Table 2-1 Front panel description Button/Port Description Boot up or shut down device.
  • Page 20 User's Manual 2.1.2 Rear Panel Figure 2-2 Rear panel (1) Figure 2-3 Rear panel (2) Figure 2-4 Rear panel (3)
  • Page 21 User's Manual Figure 2-5 Rear panel (4) Table 2-2 Rear panel description Button/Port Description Power Power on-off button. Power input Inputs 100–240 VAC power. Displays AI module status. Yellow light flashes: AI module is running properly. ● Yellow light is on: AI module is malfunctioning. ●...
  • Page 22 User's Manual Button/Port Description 10/100/1000 Mbps self-adaptive Ethernet port. Connect to Network the network cable. 8 groups of alarm output ports (NO1 C1–NO8 C8). Output alarm signal to the alarm device. Please make sure there is power to the external alarm device. Alarm output NO: Alarm output port of Normally Open type.
  • Page 23 User's Manual 2.1.3 Dimensions Figure 2-6 Dimensions (mm [inch]) 2.2 12-HDD Series...
  • Page 24 User's Manual 2.2.1 Front Panel Figure 2-7 Front panel Table 2-3 Front panel description Button/Port Description Boot up or shut down device. Power indicator light status is as follows: When device is off (indicator light is off), press the button for ●...
  • Page 25 User's Manual Button/Port Description Displays network statuses of Ethernet port 3 and Ethernet port Network indicator The indicator light flashes green: At least one Ethernet port ● light 2 has connected to the network. The indicator light is off: All Ethernet ports are not ●...
  • Page 26 User's Manual Table 2-4 Rear panel description Name Description Power input port Inputs 100–240 VAC power. Displays AI module status. The yellow light flashes: AI module is running ● properly. AI module indicator light The yellow light is on: AI module is malfunctioning. ●...
  • Page 27 User's Manual Name Description 8 groups of alarm output ports (NO1 C1–NO8 C8). Output alarm signal to the alarm device. Please make sure there is power to the external alarm device. Alarm output NO: Alarm output port of Normally Open type. ●...
  • Page 28 User's Manual 2.2.3 Dimensions Figure 2-11 Dimensions (mm [inch]) 2.3 16-HDD Series The Device has an embedded display on select models. ● The Device has power redundancy on select models. ●...
  • Page 29 User's Manual 2.3.1 Front Panel Figure 2-12 Front panel with LCD Figure 2-13 Front panel without LCD Table 2-5 Front panel description Button/Port Description Once the front panel lock is secure, it can prevent HDD from Front panel lock being stolen or removed by mistake. Unlock the front panel lock and remove the front panel, you can view 16 HDD slots.
  • Page 30 User's Manual Button/Port Description Displays local input alarm status. Alarm indicator light Red indicator light is on: There is local alarm input event. ● The indicator light is off: There is no local alarm input event. ● Displays current network status. The indicator light is blue: It means at least one Ethernet port ●...
  • Page 31 User's Manual Figure 2-15 Rear panel (2) Figure 2-16 Rear panel (3) Figure 2-17 Rear panel (4)
  • Page 32 User's Manual Figure 2-18 Rear panel (5) Figure 2-19 Rear panel (6) Table 2-6 Rear panel description (1) Name Description Power input port Inputs 100–240 VAC power. Displays AI module status. The yellow light flashes: AI module is running ● properly.
  • Page 33 User's Manual Name Description VGA video output port. It outputs analog video VGA port signal. The VGA port and HDMI 1 port are same source output. RS-232 COM debug. It is used for general COM RS-232 port debug, setting IP address, and transmitting transparent COM data.
  • Page 34 User's Manual Figure 2-20 Rear panel (5) Figure 2-21 Rear panel (6) Table 2-7 Rear panel description (2) Name Description Inputs 100-127 VAC/200-240 VAC power. Power input port Some devices only have one power port. Displays AI module status. The yellow light flashes: AI module is running ●...
  • Page 35 User's Manual Name Description High definition audio and video signal output port. The port outputs the uncompressed high HDMI port definition video and multi-channel audio data to the connected display with HDMI port. The two HDMI ports are different source output. AUDIO IN Audio input port.
  • Page 36 User's Manual 2.3.3 Dimensions Figure 2-22 Dimensions with LCD (mm [inch]) Figure 2-23 Dimensions without LCD (mm [inch])
  • Page 37 User's Manual 2.4 24-HDD Series 2.4.1 Front Panel Figure 2-24 Front panel with LCD Figure 2-25 Front panel without LCD Table 2-8 Front panel description Button/Port Description Boot up or shut down device. The power on-off button has the indicator light. It can display device- running status.
  • Page 38 User's Manual Button/Port Description Connects to external devices such as USB storage USB port device, keyboard and mouse. Once the front panel lock is secure, it can prevent HDD from being stolen or removed by mistake. Front panel lock Unlock the front panel lock and remove the front panel, you can view 16 HDD slots.
  • Page 39 User's Manual Figure 2-27 Rear panel (2) Figure 2-28 Rear panel (3) Figure 2-29 Rear panel (4)
  • Page 40 User's Manual Figure 2-30 Rear panel (5) Figure 2-31 Rear panel (6) Table 2-9 Rear panel description (1) Button/Port Description Power input port Inputs 100–240 VAC power. 16 groups (1–16) alarm input ports. They are corresponding to ALARM 1–ALARM 16. The alarm becomes valid in low level.
  • Page 41 User's Manual Button/Port Description 8 groups of alarm output ports (NO1 C1–NO8 C8). They output alarm signal to the alarm device. Please make sure there is power to the external alarm device. Alarm Output NO: Alarm output port of Normally Open type. ●...
  • Page 42 User's Manual Figure 2-32 Rear panel (5) Figure 2-33 Rear panel (6) Table 2-10 Rear panel description (2) Name Description Power input port Inputs 100V-127V/200-240V AC power. 16 groups (1–16) alarm input ports. They are corresponding to ALARM 1–ALARM 16. The alarm becomes valid in low level.
  • Page 43 User's Manual Name Description 8 groups of alarm output ports (NO1 C1–NO8 C8). They output alarm signal to the alarm device. Please make sure there is power to the external alarm device. Alarm Output NO: Alarm output port of Normally Open type. ●...
  • Page 44 User's Manual 2.4.3 Dimensions Figure 2-34 Dimensions with LCD (mm [inch])
  • Page 45 User's Manual Figure 2-35 Dimensions without LCD (mm [inch])
  • Page 46 User's Manual 3 Hardware Installation This section introduces HDD installation, cable connection, and so on. Some series product is heavy. It needs several persons to carry or move, in order to prevent person injury. 3.1 Installation Flow Figure 3-1 Installation flow 3.2 Unpacking the Box When you receive the Device, please check against the following checking list.
  • Page 47 User's Manual Different models support different HDD numbers. 3.3.1 8-HDD Series Procedure Step 1 Remove the 2 screws on the rear panel. Figure 3-2 Remove screws Step 2 Remove the chassis cover in the direction indicated by the arrow. Figure 3-3 Remove chassis cover Step 3 Remove the screws on the edge of the HDD holder, and then remove the holder.
  • Page 48 User's Manual Figure 3-4 Remove HDD holder Step 4 Align the 4 screw holes on the HDD to the 4 screw holes on the HDD holder, and then tighten the screws. Figure 3-5 Install HDD (1) Step 5 Repeat step 4 to install the other HDDs on the holder. Figure 3-6 Install HDD (2) Step 6 Repeat step 5 to install HDDs on the other holder.
  • Page 49 User's Manual Figure 3-7 Install HDD (3) Step 7 Align the left and right 2 pairs of holes of the two holders to the corresponding holes on the chassis, place the holders on the chassis, and then tighten the screws on the edge of the holders.
  • Page 50 User's Manual 3.3.2 12-HDD Series If you have not pushed the HDD box to the bottom, do not close the handle to avoid any damage to the HDD slot. Installing HDD ② Place one side of the HDD closely along the upper side of ③...
  • Page 51 User's Manual Installing HDD ③ Lock the screws on the back of the HDD box. Insert the box into the HDD slot, push it to the bottom, and then close the handle. ①Press the button on the front ② Put the HDD into the box panel of IVSS, open the handle, along the direction shown in and then pull out the HDD box.
  • Page 52 User's Manual 3.4 Cable Connection The section introduces cable connection of the Device. 3.4.1 Alarm Connection Before using the alarm, connect alarm input or alarm output device. 3.4.1.1 Connection The section introduces alarm connection of the Device. Alarm Input Both NO and NC are supported. ●...
  • Page 53 User's Manual 3.4.1.2 Alarm Port Figure 3-9 8-HDD series Figure 3-10 12-HDD series Figure 3-11 16/24-HDD series (1)
  • Page 54 User's Manual Figure 3-12 16/24-HDD series (2) Table 3-2 Alarm port Icon Description They are corresponding to ALARM 1–ALARM 16. The alarm 1–16 becomes valid in low level. NO1 C1–NO8 C8 Eight groups of normally open linkage output (on-off value). +12V Constant power output, 500 mA current.
  • Page 55 User's Manual Figure 3-13 NC alarm input connection 3.4.1.4 Alarm Output The alarm output is on-off output (Normally Open Contact), and there should be external power ● supply to alarm output device. RS-485 A line and B line: connecting the A line and B line on the PTZ decoder. ●...
  • Page 56 User's Manual 3.4.2 Connection Diagram The following steps are to connect 16-HDD series device. See the actual product for detailed information. The following figure is for reference only. Display, mouse and keyboard are needed for local operation. ● Before using the smart detection functions such as face detection and face comparison, you ●...
  • Page 57 User's Manual 4 Starting the Device Before starting the device, make sure that the input voltage shall match the device power ● requirement. To ensure stable operation of the device and prolong service life of HDD, provide stable voltage ● with less ripple interference by reference to international standard.
  • Page 58 User's Manual 5 Initial Settings When using the Device for the first time, initialize the device, and set basic information and functions first. 5.1 Initializing the Device If it is your first time to use the device after purchasing or after restoring factory defaults, set a login password of admin (system default user).
  • Page 59 User's Manual Parameter Description Set system date and time manually or by synchronizing with NTP server time. Manual Settings : Select date and time from the calendar. ● Time NTP : Select NTP, enter the IP address or domain of the NTP server, and ●...
  • Page 60 User's Manual Figure 5-3 Password protection Table 5-3 Password protection Password Protection Description Mode Email Address Leave an email address for resetting password. Set security questions and corresponding answers. You can reset the Security Question password by answering the security questions. Click OK.
  • Page 61 User's Manual Figure 5-4 IP setting Step 2 Configure the IP address. 1. Click of the corresponding NIC. Figure 5-5 Edit Ethernet network 2. Set parameters. Table 5-4 NIC parameters description Parameter Description The maximum network transmission speed that the current NIC Rate (Mbps) supports.
  • Page 62 User's Manual Parameter Description Test Test whether the IP address is valid. Set NIC MTU value. The default setup is 1500 bytes. We recommend you check the MTU value of the gateway first and then set the MTU value of the Device equal to or smaller than the gateway value, which helps to reduce the packets slightly and enhance network transmission efficiency.
  • Page 63 User's Manual Figure 5-6 P2P access Step 2 Click to enable P2P function. The function is disabled by default. Click OK. Step 3 You can register the Device to the app for remote monitoring and management. For details, see the corresponding user's manual of the app. 5.3 Login You can operate the device by using the local interface, web interface and PC client.
  • Page 64 User's Manual When the theme of your computer is not Aero, the system will prompt you to switch the theme. To ensure video smoothness, switch your computer to Areo theme. Step 4 Enter the username and password, select a login type, and then click Login. The default administrator username is admin.
  • Page 65 User's Manual 5.3.3 Logging in to Webpage You can use the general browser such as Google Chrome, Firefox to access the web interface to manage the Device remotely, operate and maintain the system. When you are using a general browser to access the webpage, some functions might be not available.
  • Page 66 User's Manual 5.4 Home Page Click on the upper right corner of the page, you can scan the QR code to get more user information. Figure 5-9 Home page When you log in to the local interface, you can click to control the screens.
  • Page 67 User's Manual Name Description Change the password, lock the user, log out, restart or shut down the Login user Device. 5.5 Configuring Remote Devices Register remote devices to the system. You can view the live video from the remote device, change remote device settings, and so on.
  • Page 68 User's Manual You can skip this step if you keep Using current device password and password protection information enabled as default. The remote device automatically uses the current admin password and email address of the Device. 1. To manually configure the password, disable Using current device password and password protection information.
  • Page 69 User's Manual Method Description Enter the IP address, username and password of the remote device. For details, see "5.5.2.2 Manual Add". Manual Add We recommend this method when you want to add only a few remote devices and you know their IP addresses, usernames, and passwords.
  • Page 70 User's Manual Table 5-7 Description of search results Parameter Description Click Start Search to search for remote devices again. Click Stop Search Start Search to stop search. Click Connection Password to set the username and password for the remote devices. Connection Password If you do not set the username and password for the remote device, the system will try to add the remote device by using the username and...
  • Page 71 User's Manual You can also click Add under the device tree. Figure 5-12 Camera Step 4 Under the Manual Add tab, click Add Device. Set parameters and then click OK. Step 5 Figure 5-13 Remote device settings Table 5-8 Parameters of adding remote device Parameters Description Type...
  • Page 72 User's Manual Parameters Description Select a channel number for the remote device on IVSS. Channel No. If you select Auto Allocation, IVSS will provide a channel number automatically. Select the connection protocol of the remote device. Private is selected by Manufacturer default.
  • Page 73 User's Manual Parameters Description Remote CH No. When the remote device has multiple channels, you can select one or more channels of the remote device that you want to add to the Device. 1. Click Connect to get the total number of channels of the remote channel. 2.
  • Page 74 User's Manual Port: 554 by default. ● Channel: The channel number of the stream media device to be added. ● Subtype: Stream type. 0 for main stream, and 1 for sub stream. ● Figure 5-15 RTSP Step 5 Select a channel No. and connection type. Step 6 Click OK.
  • Page 75 User's Manual On the PC client, click at the top of the client, select Download to view the storage ● path. On the local interface, you can select the file storage path. ● On the web interface, files are saved to the default downloading path of the browser. ●...
  • Page 76 User's Manual Click Add more or Complete. Step 8 Click Add more , the Device goes back to the Quick Add window and you can add ● more remote devices. Click Complete if you do not want to add more remote devices at the moment. The ●...
  • Page 77 User's Manual 6 AI Operations In addition to the basic video monitoring functions, the Device can also provide a number of AI functions including face comparison, people counting, video metadata, ANPR, and IVS (behavior detections such as fence-crossing, intrusion, loitering, crowd gathering, and parking). The AI detections can be performed by the camera (AI by Camera) or by IVSS (AI by Recorder).
  • Page 78 User's Manual AI Events by Recorder or Camera Table 6-1 AI events by recorder or camera AI Event AI by Camera AI by Recorder Face Detection Face Comparison People Counting Video Metadata Crowd Distribution Call Alarm Smoking Alarm ANPR Plate Comparison Click to go the webpage of the corresponding device quickly.
  • Page 79 User's Manual Figure 6-2 Enable AI by Recorder Step 6 Click Apply. 6.2.2 Searching by Image Fiter out the images whose similarity reaches the set value according to the given images. It supports faces, human bodies and motor vehicles. Search by image through the preview interface 1.
  • Page 80 User's Manual Figure 6-3 Manually Select Search by image through intelligent playback interface The system supports uploading up to 50 face images, and supports searching 10 face images at a time. 1. Log in to the PC client. 2. Click AI Search , and then select Face Search, Human Search or Motor Vehicle Search. 3.
  • Page 81 User's Manual Click Reselect, and you can cancel selected face pictures. ● Click Only Display Selected Images, the page only shows the selected face pictures. ● Click Clear, and you can clear all uploaded face pictures. ● 4. Tap to slide back, and then set the comparison similarity . 5.
  • Page 82 User's Manual 6.3.1 Enabling the Smart Plan To use AI by Camera, you need to enable the smart plan first. The Device automatically shows the smart functions available on the connected remote devices. ● Smart plan is available on select remote devices. ●...
  • Page 83 User's Manual Click the dots on the frame of the detection zone, and drag to adjust its range. Click to set the minimum size or maximum size of the face detection zone. The system triggers an alarm only when the size of detected target is between the maximum size and the minimum size.
  • Page 84 User's Manual 6.3.3 Live View of Face Detection You can view real-time face detection images and video. 6.3.3.1 Setting Attribute Display You can configure the display rule of face detection results. Prerequisites Before using this function, make sure that view has been created. See "7.1.1 View Management" for detailed information.
  • Page 85 User's Manual Figure 6-5 Attribute display Click Save. Step 6 6.3.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. The video window displays the target boxes of currently detected faces. ●...
  • Page 86 User's Manual Figure 6-6 Face records Table 6-4 Management of face records Icon Operation Download the face snapshot and related video. When operating on the local interface, you need to insert a USB storage device into the Device. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 87 User's Manual 6.3.4 Face Search Search for face detection information, including face detection image, record and features. 6.3.4.1 Searching by Attributes Procedure Step 1 Log in to the PC client. on the upper-right corner of the Live page, or select AI Search on the home Step 2 Click page.
  • Page 88 User's Manual Icon Operation Click the icon or double-click the record to play back the video 10 seconds before and after the snapshot. : Stop playing the video. ● : Starts to play the video. ● : Last/next video. ● : Auto play the following videos continuously.
  • Page 89 User's Manual Click and then you can use credential No. to narrow down the search. 4. Select face images and then click OK. You can view the selected images under Selected Feature Image. Images in the passerby database: Use images in the passerby database to search for similar ●...
  • Page 90 User's Manual The number on the lower-right corner of the thumbnail represents the number of ● records found. Click each thumbnail to display the search results of that face image. You can select the AI attributes to filter the search results and sort the results by time ●...
  • Page 91 User's Manual Export one by one. ● The exported file contains the image, video and video player by default. 1. Point to the panel of a record, and then click 2. Select a file type for the video, set the storage path, and then click OK. 3.
  • Page 92 User's Manual 6.4.2.3.1 Creating a Remote Face Database Procedure Step 1 Log in to the PC client. On the home page, select File Management > Face Database Config > Sample Step 2 Database > Remote. Select a remote device from Camera List. Step 3 Step 4 Click Create.
  • Page 93 User's Manual Click to search for images in the database by name, gender, birthday, credential type and No., and modeling status. Arm the face database. ● For details, see "6.4.2.4 Configuring Face Comparison (by Camera)". Delete face databases: ● One by one: Click In batches: Hover over the face database, and then select the database by clicking .
  • Page 94 User's Manual Batch Import Before the batch import, name the face image in the format of "Name#SGender#BBirthday#NCountry/Region#TCredential Type#MCredential No.#AAddress.jpg". After successful import, the system will identify the face image automatically. Name is required and the rest are optional. For example, if you want to enter the name and ID number only, the name can be Tim#S#B#N#R#T#M0000#A.jpg or Tim#M0000.jpg.
  • Page 95 User's Manual Click Complete to save current face image information and complete registration. ● Bin Import To import face images from another device into the current device, you can import a bin file of face images exported from that device. 1.
  • Page 96 User's Manual 6.4.2.5.1 Setting Attribute Display You can configure display rule of AI detection results. Before using this function, make sure that view has been created. See "7.1.1 View Management" for detailed information. Procedure Step 1 Log in to the PC client. Under the Live tab, open a view window.
  • Page 97 User's Manual Figure 6-11 Attribute display Click Save. Step 6 6.4.2.5.2 Live View Log in to the PC client, and then under the Live tab, open a view window. The video window displays the target boxes of currently detected faces. ●...
  • Page 98 User's Manual Icon Operation Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot. 6.4.2.6 Face Search You can search face records by attributes or by image, and then export the search results. 6.4.2.6.1 Searching by Attributes Procedure Step 1...
  • Page 99 User's Manual Icon Operation Export the face snapshot, video and video player. To export in batches, select multiple face records, and then click Export to export snapshots, videos or excel. After you set alarm linkage snapshot, the system exports detected images and panoramic images at the time of snapshot.
  • Page 100 User's Manual 6.4.3.2 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first. For details, see "6.3.1 Enabling the Smart Plan". 6.4.3.3 Configuring Face Detection (by Camera) Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner, and then click Event.
  • Page 101 User's Manual Quantity : The proportion of the number of added face images in the sample ● databases and passerby databases to the allowed face images in total. Data Capacity : The proportion of the space occupied by the sample databases and ●...
  • Page 102 User's Manual Parameter Description When the captured face snapshot has a match in the passerby database, and its quality is higher than that of the one in the database, the system replaces the face image in the database with the snapshot. In this case, the duplicate face will not trigger the event.
  • Page 103 User's Manual Click to search for images in the database by name, gender, birthday, credential type and No., and modeling status. Arm the face database. ● For details, see "6.4.2.4 Configuring Face Comparison (by Camera)". Delete face databases: ● One by one: Click In batches: Hover over the face database, and then select the database by clicking .
  • Page 104 User's Manual 2. Select File Management > Face Database Config > Sample Database > Remote. 3. Select a face database, and then click Manual Add. 4. Click and select a face image. When the uploaded image is half-length photo or full-body photo, the system automatically ●...
  • Page 105 User's Manual 5. Click Browse to select a bin file, enter the password that you set when exporting the database, and then click OK. A bin file is divided into multiple parts when being exported if it is larger than 4 GB. When importing the file parts, you just need to select any one part of the file, and then all parts are imported.
  • Page 106 User's Manual Figure 6-17 Passerby database Table 6-12 Parameters of creating passerby database Parameter Description Name Enter the name of the database. Configure how many face images the database can store. Maximum = Total number of face images of the Device - the face image ●...
  • Page 107 User's Manual Parameter Description When the captured face snapshot has a match in the passerby database, and its quality is higher than that of the one in the database, the system replaces the face image in the database with the snapshot. In this case, the duplicate face will not trigger an event.
  • Page 108 User's Manual Delete face databases: ● One by one: Click In batches: Hover over the face database, and then select the database by clicking . After selecting multiple databases, click Delete all: Select Select All , and then click Delete. Clear a face database.
  • Page 109 User's Manual You cannot edit the face images in the remote sample databases or passerby databases. 2. Edit the information. 3. Click OK. Copying Face Images 1. Double-click a face database,select one or more face images, and then click Copy. 2.
  • Page 110 User's Manual 1. Click Target Face database, and then select a face database. and then you can go to the Face Database Config page where you can Click configure the face databases. Figure 6-19 Configure face comparison (by recorder) 2. Configure the parameters. Table 6-14 Configuration of target face database Icon/Parameter Description...
  • Page 111 User's Manual Table 6-15 Stranger control mode description Parameter Description Click to select a color for the alarm rule Alarm Rule box. Click to enable the features pane. The Display Feature Pane features pane appears on the live video once there is an alarm.
  • Page 112 User's Manual 6.4.4.4 Configuring Local Face Databases You can create local face databases on the Device to manage face images for face comparison (by Recorder). For details, see "6.4.3.4 Configuring Local Face Database". 6.4.4.5 Configuring Face Comparison (by Recorder) Configure face comparison rules. For details, see "6.4.3.5 Configuring Face Comparison (by Recorder)".
  • Page 113 User's Manual Step 5 Click to draw a detection zone on the video. Click the dots on the frame of the detection zone, and drag to adjust its range. ● Click to set the minimum size or maximum size of the face detection zone. ●...
  • Page 114 User's Manual 6.4.5.3 Configuring Local Face Database You can create local face databases on the Device to manage face images for face comparison (by Recorder). For details, see "6.4.3.4 Configuring Local Face Database". 6.4.5.4 Configuring Face Comparison (by Recorder) Configure face comparison rules. For details, see "6.4.3.5 Configuring Face Comparison (by Recorder)".
  • Page 115 User's Manual 6.4.6.3 Configuring Video Metadata The Device supports metadata (AI by Camera or by Recorder). For details on the configuration operations, see "6.6.2 Configuring Video Metadata". 6.4.6.4 Configuring Face Comparison (by Recorder) Configure face comparison rules. For details, see "6.4.3.5 Configuring Face Comparison (by Recorder)".
  • Page 116 User's Manual Click Add Rule , select People Counting, and then click Step 4 to enable the function. Step 5 Draw a people counting zone. Click to draw the detection zone. ● Click to draw the counting line. The line must be perpendicular to direction of the ●...
  • Page 117 User's Manual Click to set the whole image as the detection area. ● Step 6 Set parameters. Table 6-18 Parameter description of in-area people counting Parameter Description 1. Click to enable the alarm. 2. Set people number threshold. If you select ≥ Threshold and then enter a number, an alarm is ●...
  • Page 118 User's Manual Click Add Rule , select Queuing, and then click Step 4 to enable the function. Step 5 Draw a detection zone. Click to draw the detection zone. ● Click to set the whole image as the detection area. ●...
  • Page 119 User's Manual on the upper-right corner of the page and then click Event. Step 2 Click You can also click Event from the configuration list on the home page. Step 3 Select a remote device from the device tree. Step 4 Select Smart Plan >...
  • Page 120 User's Manual 6.5.7 AI Search By setting retrieval conditions such as event type, you can search for the statistical information of people who meet the conditions. Procedure Step 1 Log in to the PC client. Select AI Search > People Counting on the home page, or you can also click Step 2 on live view page, and then select People Counting.
  • Page 121 User's Manual Average Stay Time : The report shows the average stay time during different periods. When the event type is Queue People Counting, select the queue time. The report ● shows the number of people queuing longer or shorter than the queue time in different colors.
  • Page 122 User's Manual next to On to enable people detection, motor vehicle detection and 2. Click non-motor vehicle detection. AI by Recorder. ● 1. Select Rule Config tab, and then click to enable this function. 2. Select Enable next to Extract Eigenvector to enable eigenvector extraction, and then the Device can extract features of human, vehicles and non-motor vehicles and display them on the live view.
  • Page 123 User's Manual Click to draw an exclusion area. The Device does not detect targets within the excluded area. Click to set the minimum size or maximum size of the detection zone. The system triggers an alarm only when the size of the detected target is between the maximum size and the minimum size.
  • Page 124 User's Manual 6.6.3 Live View of Video Metadata View the detection results of face, people, motor vehicle and non-motor vehicle under the Live tab. 6.6.3.1 Setting Attribute Display Configure the display rule of video metadata detection results. Prerequisites Before using this function, make sure that view has been created. See "7.1.1 View Management" for detailed information.
  • Page 125 User's Manual Figure 6-30 Attribute display Click Save. Step 6 6.6.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. The video image of the view is displayed. The target box is displayed in real-time in the video image. Different detection targets ●...
  • Page 126 User's Manual Table 6-22 Management of detection results Icon Operation Use this image to search all channels for similar records. Download the snapshot and related video. When operating on the local interface, you need to insert a USB storage device into the Device. Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 127 User's Manual Figure 6-31 Search by human attributes Step 6 Select an alarm type. Match Attributes Alarm : Search for alarms triggered when the detected target ● matches the defined attributes. Mismatch Attributes Alarm : Search for alarms triggered when the detected target ●...
  • Page 128 User's Manual Related Operations Point to a record, and then the following icons are displayed. Table 6-23 Management of search results Icon Operation Click the icon to configure the sorting method. Click the icon to select the record. To select all the records at a time, select the checkbox next to Select All. Use this image to search all channels for similar records.
  • Page 129 User's Manual on the upper-right corner of the Live page, or select AI Search on the home Step 2 Click page. Step 3 Select Search by Human > Search by Image. Step 4 Upload human images. You can upload up to 50 images. After uploading face images, you can select up to 10 images for search at one time.
  • Page 130 User's Manual Click to select a color. indicates all colors. Figure 6-32 Search by vehicle attributes Click Search. Step 7 If license plate is detected, both the scene of the vehicle and the license plate will be displayed. Related Operations Point to a record, and then the following icons are displayed.
  • Page 131 User's Manual Table 6-24 Management of search results Icon Operation Click the icon to select the record. To select all the records at a time, select the checkbox next to Select All. Export the snapshot, video and video player. To export in batches, select multiple records, and then click Export to export snapshots, videos or excel.
  • Page 132 User's Manual Icon Operation Export the snapshot, video and video player. To export in batches, select multiple records, and then click Export to export snapshots, videos or excel. After you set alarm linkage snapshot, the system exports detected images and panoramic images at the time of snapshot.
  • Page 133 User's Manual 6.7 IVS The IVS feature includes a number of behavior detections such as fence-crossing, intrusion, tripwire, parking, crowd gathering, missing object, abandoned object, and loitering. Some models only support some IVS functions by Recorder. 6.7.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first.
  • Page 134 User's Manual detection, people gathering, object removed, loitering, stay and climbing. Different cameras support different functions. Table 6-26 IVS functions description Functions Description Scene When the target crosses tripwire from the defined motion direction, Tripwire an alarm is triggered, and then the system performs configured alarm Scenes with sparse targets and no linkages.
  • Page 135 User's Manual Functions Description Scene When the target loiters over the shortest alarm period, an alarm is triggered, and then the system performs configured alarm linkages. Loitering Set the Repeat Alarm Time, when the alarm is triggered and this state lasts for repetitive alarm time, the alarm will be triggered again.
  • Page 136 User's Manual AI by Recorder. ● 1. Click AI by Recorder. 2. Click to enable IVS. 3. Click Add Rule , and then select Tripwire. 4. Click to enable the detection rule. 5. Click to edit the tripwire line. Click the dots on the 2 ends of the line to adjust its length. Drag the line to adjust its position.
  • Page 137 User's Manual 6.7.3 Live View of IVS Under the Live tab, view the real-time IVS results. 6.7.3.1 Setting Attribute Display Configure the display rule of IVS detection results. Prerequisites Before using this function, make sure that view has been created. See "7.1.1 View Management" for detailed information.
  • Page 138 User's Manual Figure 6-35 Motor vehicle Step 4 Configure AI attributes settings. With AI Attributes Settings enabled by default, when the system detects a target, a features panel appears on the live video. You can configure the style of the features panel and the attributes that you want to display.
  • Page 139 User's Manual You can view the detection statistics on the upper-righter corner of the Live page. ● Figure 6-36 Detection statistics Features panels are displayed on the right side of the video image. ● Point to the features panel, and the icons are displayed. : Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 140 User's Manual Icon Operation Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot. 6.8 ANPR An alarm is triggered when the detected vehicle meets detection rule. The Device supports only ANPR through AI by Camera. Make sure that the vehicle recognition parameters of camera are configured.
  • Page 141 User's Manual 6.8.3.1 Setting Attribute Display Configure the display rule of ANPR results. Prerequisites Before using this function, make sure that view has been created. See "7.1.1 View Management" for detailed information. Procedure Step 1 Log in to the PC client. Under the Live tab, open a view window.
  • Page 142 User's Manual Each attribute is broken down into more specific groups. For example, you can select Bus , Heavy Truck, Van and more for Vehicle Type. Click Save. Step 5 6.8.3.2 Live View Log in to the PC client, and then under the Live tab, open a view window. The video image of the view is displayed.
  • Page 143 User's Manual 6.9.3 Configuring Plate Databases Configure plate databases so that the Device can compare license plates with information in the database. 6.9.3.1 Creating Plate Databases Create plate databases to classify and manage license plates. You can create allowlist or blocklist databases.
  • Page 144 User's Manual Operation Description Link the database to a camera channel for vehicle plate comparison. For Arm the database details, see "6.9.4 Configuring Plate Comparison". Delete one by one: Point to the database, and click at the upper-right ● corner to delete it. Delete in batch: Point to a database, and select to select the database.
  • Page 145 User's Manual Figure 6-40 Plate registration Table 6-29 Vehicle register parameters Parameters Description Region The country or region that the vehicle belongs to. Name Driver's name. Driver's License Driver's license number. Phone number Driver's phone number. Email Driver's email address. Address Driver's address.
  • Page 146 User's Manual Figure 6-41 Vehicle type Step 6 Click Add More or Save. Click Add More : Save the current vehicle information, and you can continue to add ● more vehicle information Click Save : Save the current vehicle information and close the Plate Registration ●...
  • Page 147 User's Manual Figure 6-42 Batch import Step 4 Download and fill in the template file. 1. Click Download Template to download the template to your computer or the USB storage device. at the top of the client, select Download to view the On the PC client, click ●...
  • Page 148 User's Manual 6.9.3.2.3 Adding from Detection Results Add plate information from vehicle recognition or motor vehicle detection results to the database. Procedure Step 1 Log in to the PC client. Under the Live tab, select the vehicle information to be added. Step 2 Click , point to a record, and then click...
  • Page 149 User's Manual You can select multiple databases . ● Select Reserve data in original database to reserve the selected plate records in the ● original database. Select Replace duplicates in target database to use the selected plate to replace the ●...
  • Page 150 User's Manual Figure 6-43 Plate comparison Step 5 Select device from the device tree on the left side. Step 6 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period.
  • Page 151 User's Manual Table 6-30 Database linkage parameters Icon/Parameter Description The selected database is enabled by default. Click the icon to disable it. Delete the database. Alarm Rule Click to select a color for the alarm rule box. Select the checkbox to enable the features pane. The features pane Display Feature Pane appears on the live video once there is an alarm.
  • Page 152 User's Manual Figure 6-45 Motor vehicle Step 4 Configure AI attributes settings. With AI Attributes Settings enabled by default, when the system detects a target, a features panel appears on the live video. You can configure the style of the features panel and the attributes that you want to display.
  • Page 153 User's Manual Point to the features panel, and the icons are displayed. : Add the detected plate information to the plate database. For details, see "6.9.3.2.3 Adding from Detection Results". : Click the icon or double-click the record to play back the 10 seconds of video before and after the snapshot.
  • Page 154 User's Manual Icon Operation Export the snapshot, video and video player. To export in batches, select multiple records, and then click Export to export snapshots, videos or excel. After you set alarm linkage snapshot, the system exports detected images and panoramic images at the time of snapshot.
  • Page 155 User's Manual 6.10 Crowd Distribution Map View and monitor people crowd to avoid crowd incidents, for example, stampede. This function is only available with AI by Camera. 6.10.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first. For details, see "6.3.1 Enabling the Smart Plan".
  • Page 156 User's Manual Set regional alarm. ● An alarm is triggered when the number of detected people exceeds the threshold. 1. Click Add Rule. 2. Click and then drag the corners to adjust the size of the yellow zone. 3. Drag the corners to adjust the size of the regional detection zone (red). Make sure that the red zone is smaller than the yellow zone.
  • Page 157 User's Manual Figure 6-46 Live view of crowd distribution Right-click the live video, and then select Crowd Distribution Map > PIP. A blue section is ● displayed, and you can view the crowd distribution status inside the current view. Right-click the live video, and then select Crowd Distribution Map > Global to view overall ●...
  • Page 158 User's Manual Step 6 Click and then drag the corners to adjust the detection zone. Step 7 Set the sensitivity and minimum duration. Sensitivity: The higher the sensitivity, the easier the call action is detected but ● meanwhile the higher probability of false alarms. Minimum duration: If the call action still lasts longer than the minimum duration, the ●...
  • Page 159 User's Manual 6.12 Smoking Alarm An alarm is triggered when the system detects a person smoking. Smoking alarm is only available with AI by Camera. 6.12.1 Enabling the Smart Plan To use AI by Camera, you need to enable the corresponding smart plan first. For details, see "6.3.1 Enabling the Smart Plan".
  • Page 160 User's Manual 6.12.4 Smoking Alarm Search Search for videos or images of smoking alarm. Procedure Step 1 Log in to the PC client. On the home page, click Search. Step 2 Step 3 Select one or more devices. Step 4 You can search for the videos or images of smoking detection.
  • Page 161 User's Manual Sensitivity: The higher the sensitivity, the easier the motion is detected but meanwhile ● the higher probability of false alarms. Figure 6-47 Smart motion detection Step 6 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period.
  • Page 162 User's Manual Table 6-33 Management of search results Icon Operation Click the icon to select the record. To select all the records at a time, select the checkbox next to Select All. Use this image to search all channels for similar records. Export the snapshot, video and video player.
  • Page 163 User's Manual Select High Toss tab. Step 3 Select one or more remote devices, configure the time, and then click Search. Step 4 Figure 6-49 AI search Step 5 Double click the select image or click to check the playback (10 seconds of video before and after the alarm triggered).
  • Page 164 User's Manual Figure 6-50 Smart sound detection Click Schedule to select a schedule from the drop-down list. Step 7 The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list or add a new schedule.
  • Page 165 User's Manual Figure 6-51 AI search Step 6 Double click the select image or click to check the playback (10 seconds of video before and after the alarm triggered).
  • Page 166 User's Manual 7 General Operations This chapter introduces general operations such as live view, playback, alarm, and more. 7.1 Live and Monitor Log in to the PC client, and then under the Live tab, you can view the live videos. Point to the left and right edges of the video windows, and then click or to hide or display the left and right columns.
  • Page 167 User's Manual Description Layout adjustment. Click to set the layout. ● Click to switch the channel. ● : Take a snapshot of live view. ● : Displays the live view in full screen. ● : Edit the view window and save as a new view. ●...
  • Page 168 User's Manual Figure 7-2 View 7.1.1.1 View Group A view group is a group of views. The view group helps you to categorize, search for and manage views quickly. Under View Group created by default, you can create view groups. You can create up to 100 view groups.
  • Page 169 User's Manual Figure 7-3 Manage view groups Table 7-2 View group management Operation Description Right-click a view group and select Rename. Set view group name and Rename click any blank space. Please be advised that once you delete a view group, all views under the view group will be deleted at the same time.
  • Page 170 User's Manual Step 3 Double-click a remote device in resource pool, or drag the remote device to the view window. After one remote device is added, the view window is split into several grids. Each grid supports one remote device. If you want to add more remote devices, drag ●...
  • Page 171 User's Manual Delete a remote device: Point to a video window, and then click at the upper-right ● corner, and then click OK. Move the video windows: Drag a video window to a proper position and then release ● the mouse, and then click OK. Change window positions: Drag a video window to another video window, and then ●...
  • Page 172 User's Manual Table 7-4 View function Operation Description Drag a video window to another video window, and then click OK. The change in the window positions is valid only once. After you Change window position close and then open the view again, the view restores its original layout.
  • Page 173 User's Manual Figure 7-5 View window 7.1.1.3.1 Taskbar Log in to the PC client, under the Live tab, open a view and then point to a video window. The taskbar is displayed. Figure 7-6 View window...
  • Page 174 User's Manual Table 7-5 Window taskbar Icon Description Zoom. Click the icon, and then select a zone on the video window to zoom in. Talk. The Talk function enables voice interaction between the Device and remote devices. Instant record. Click to start recording manually.
  • Page 175 User's Manual Figure 7-7 Shortcut menu Table 7-6 Shortcut menu description Parameter Description Select a stream type from Main Stream , Sub Stream 1 and Sub Stream Switch Stream Select whether to display the real-time bit rate on the upper-left corner Bit Rate of the video window.
  • Page 176 User's Manual Parameter Description Click EPTZ and select On. Display mode: Select the number of channels tracked. ● : Full screen : 1Full screen+1Detail or : 1Full screen+3Detail : 1Full screen+5Detail Linkage track and tracking duration: After turning on linkage track ●...
  • Page 177 User's Manual The system automatically searches all channels for similar snapshots within the last week. 7.1.1.3.5 Fisheye Dewarp Set the installation method and display mode of fisheye cameras. This function is available on select models. Procedure Step 1 Log in to the PC client. Step 2 Under the Live tab, open a view.
  • Page 178 User's Manual Procedure Step 1 Log in to the PC client. Under the Live tab, open a view. Step 2 Right-click the live video, and then select Smart Tracking > ON. Step 3 Step 4 Select the tracking method. Manual positioning: Click a spot or select a zone on the bullet camera video, and then ●...
  • Page 179 User's Manual 7.1.1.3.8 Talk The Talk function enables voice interaction between the Device and remote devices, improving the efficiency in handling emergency events. Procedure Step 1 Log in to the PC client. Open a view under the Live client. Step 2 Step 3 Click at the upper-right corner of the view window to enable the Talk function.
  • Page 180 User's Manual Operation Description If the icon of the remote device is black, the remote device is online. For ● example, If the icon of the remote device is red, the remote device is offline. For ● View device status example, appears, the remote device is abnormal, alarming, and more.
  • Page 181 User's Manual Table 7-9 PTZ control panel Icons Description Drag to set PTZ speed. The higher the value, the faster the PTZ speed. Control PTZ movement in the following ways. Drag in different directions to control the PTZ direction. ● Click the arrows to control the PTZ direction.
  • Page 182 User's Manual 7.1.3.1 PTZ Menu Settings The Device displays PTZ main menu on the view window. The PTZ main menu enables you to perform camera settings, PTZ settings, system management, and more. You can use the direction and confirm buttons to set the remote device. Procedure Step 1 Log in to the PC client.
  • Page 183 User's Manual 7.1.3.2 Configuring PTZ Functions Control PTZ device to implement corresponding operations. The PTZ functions might vary depending on the device models. 7.1.3.2.1 Setting a Preset A preset is the saved information of a specific position, angle, and focal length of the PTZ camera. You can set a preset so that you can quickly adjust the PTZ to the desired position when needed.
  • Page 184 User's Manual Procedure Step 1 Log in to the PC client. Under the Live tab, open a view. Step 2 Step 3 Select the video window of a PTZ camera. Step 4 On the PTZ panel, click Step 5 Click , enter the name of the new tour group, and then click to save.
  • Page 185 User's Manual Click to refresh the list of tour groups. ● 7.1.3.2.3 Setting a Pattern A pattern is a recorded series of PTZ operations such as pan, tilt, zoom and focusing. You use a pattern to let the camera repeat the corresponding operations. Procedure Step 1 Log in to the PC client.
  • Page 186 User's Manual 2. Click next to the name of the scan. The PTZ camera executes the scan. 3. Click to stop the scan. Related Operations Edit the scan. 1. Select a scan, and then click 2. Rotate the PTZ camera to a new left limit, and then click 3.
  • Page 187 User's Manual Select a stream type from Main Stream and Sub Stream. Step 5 Step 6 Set the search period. Step 7 Click Search. The search results are displayed. You can select Timeline Playback or File Playback to play back the videos. Timeline playback: Play back videos automatically.
  • Page 188 User's Manual Figure 7-15 File playback Table 7-11 Search icons description Signal Words Description Set a time period. Click to start playing the videos in the configured time period. When you play back several videos at the same time, click the icon to switch to time synchronization mode.
  • Page 189 User's Manual Signal Words Description Play back at a fast speed. The fast speed includes 1, 2, 4, 8, and 16. Click the icon once, the playback speed becomes one level faster. Select a playback speed. Capture an image. Add tags to mark important points in time on the video. Clip one part of the video, and then save it in designated storage path.
  • Page 190 User's Manual Signal Words Description Select faces or humans on the video to search for similar targets. Close the playback window. 7.2.2 Clipping a Video Clip one part of the recorded video, and save it to the designated storage path. Connect a USB device to the Device if you are operating on the local interface.
  • Page 191 User's Manual 7.2.3 Video Tag During playback, you can add a tag to mark an important point in time on the video. After playback, you can use time or the tag keywords to search for the corresponding video and then play. Procedure Step 1 Log in to the PC client.
  • Page 192 User's Manual Select a remote device, and then click the Picture tab. Step 3 Step 4 Select an image type. Manual Snapshot : Manual snapshots. ● Video Detection : Snapshots linked with video detection. ● External Alarm : Snapshots linked with internal and external alarms. ●...
  • Page 193 User's Manual Procedure Step 1 Log in to the PC client. On the home page, select Search. Step 2 Step 3 Search for videos or snapshots Step 4 Under the File Playback tab, select one or more search results and then click The files are locked.
  • Page 194 User's Manual Figure 7-19 1:1 face comparison Click Upload and then upload 2 images to be compared. Step 3 Click Start. Step 4 The comparison result is displayed. 7.3 Audio Management Upload and manage audio files that the Device plays when an alarm event occurs. You can upload .pcm, .mp3, .wav, and .aac files.
  • Page 195 User's Manual Figure 7-20 Audio file Related Operations Rename the audio file. ● Click Edit in the Edit column, enter the new name, and then click OK. Delete the audio file. ● Delete one by one: Click Delete next to Edit. Delete in batches: Select one or more files, and then click Delete next to Import.
  • Page 196 User's Manual 7.5.1 Multiple-screen Control The Device can connect to multiple monitors at the same time. You can select a monitor you want to use. The multiple-screen control function only available on the local interface. ● Go to System > General > Display to enable a monitor or set its resolution. See "8.7.3 Display" ●...
  • Page 197 User's Manual Click to delete the corresponding system message. ● Click Clear to clear all system messages under current tab. ● For example, you can click Clear under the All tab to clear all system messages, or click Clear under the System Error tab to clear all system error messages. 7.7 Background Task View the status of the tasks running in the background.
  • Page 198 User's Manual 8 System Configuration This chapter introduces system configurations such as managing remote device, user information, and HDD storage, and setting network, alarm events, security strategy, and system parameters. 8.1 Device Management on the upper-right corner and then click Camera , or click Camera Log in to the PC client, click from the configuration list on the home page.
  • Page 199 User's Manual Step 4 View details on the connected devices, including IP address, serial number, connection status, and more. indicates that the remote device is offline. ● indicates that the remote device is online. ● indicates that the connection with the remote device failed. ●...
  • Page 200 User's Manual Figure 8-3 Camera Under the Quick Add tab, click Start Search. Step 4 You can click to filter the search results. Figure 8-4 Search results Step 5 Select one or more remote devices and then click Modify IP. You can only modify the IP address of initialized devices.
  • Page 201 User's Manual Enter incremental value only when you want to change IP addresses of several devices ● at the same time. The system will allocate IP address one by one with the fourth part of the IP address increasing by the incremental value. If an IP conflict occurs when you change the static IP address, the system will notify ●...
  • Page 202 User's Manual You can also click Camera from the configuration list on the home page. Under the Camera tab, select one or remote devices, and then click Modify IP. Step 3 You can only modify the IP address of initialized devices. ●...
  • Page 203 User's Manual 8.1.4.1 Configuring Attributes of Remote Devices View information on the remote devices. Procedure Step 1 Log in to the PC client. on the upper-right corner of the page and then click Camera. Step 2 Click You can also click Camera from the configuration list on the home page. Select a remote device from the device tree, and then click the Attribute tab.
  • Page 204 User's Manual 8.1.4.2 Managing Video Channels of Multichannel Devices When the connected remote device has multiple video channels, you can add or delete the video channels connected to the Device. Procedure Step 1 Log in to the PC client. on the upper-right corner of the page and then click Camera. Step 2 Click You can also click Camera from the configuration list on the home page.
  • Page 205 User's Manual Figure 8-8 Video Set the parameters under the Main Stream , Sub Stream 1 and Sub Stream 2 tab. Step 5 This section uses configuration for the main stream as an example. 1. Click to enable SVC, and then select 1 or 2 from the drop-down list on the right. SVC refers to the scaled video coding, which can split the video stream to basic stream and enhanced scale.
  • Page 206 User's Manual Parameter Description Set video resolution. The higher the resolution, the better the video quality. Resolution Different models of remote devices support different resolutions. See the actual page for detailed information. Set the number of frames displayed each second. The higher the FPS, the more Frame Rate vivid and fluent the video.
  • Page 207 User's Manual Figure 8-9 OSD Step 4 Configure OSD information. Device name. ● 1. Click to enable OSD of device name. 2. Click 3. Enter the device name. 4. Drag the text box to the proper position. Time. ● 1. Click to enable OSD of time.
  • Page 208 User's Manual 1. Click to enable privacy masking. 2. Click Add, select the masking type and color, and then draw mosaic or color blocks in the image as needed. 3. Drag blocks to the proper position. 4. Click Click Apply. Step 5 8.1.4.5 Configuring Audio Parameters Procedure...
  • Page 209 User's Manual Click the Main Stream , Sub Stream 1 or Sub Stream 2 tab, and then configure the Step 6 parameters. Table 8-2 Audio parameters Parameter Description The audio encoding mode applies to both audio streams and Audio Encoding voice talks.
  • Page 210 User's Manual Parameter Description Set cache strategy of remote device video stream. Self-adaptive : The system automatically adjusts video stream cache ● status according to the network bandwidth. Cache Method Realtime : Guarantee video real-timeness. When the network ● bandwidth is not sufficient, the video might not be fluent. Fluent : Guarantee video fluency.
  • Page 211 User's Manual The exported .backup file is encrypted and cannot be edited. If do not enable encryption, the system exports .csv file, which can be opened with Excel. The exported .csv file contains IP address, port number, channel number, channel name, manufacturer and username (excluding password) of the remote device.
  • Page 212 User's Manual Click next to the root node on the device tree, select multiple remote devices, and then click On the device list under the Access Management tab, select a remote device, press Shift and then select another remote device. All remote devices between these two are selected. Click Delete next to Batch Import to delete them.
  • Page 213 User's Manual Figure 8-13 Edit Ethernet network Table 8-4 NIC parameters description Parameter Description The maximum network transmission speed that the current NIC Rate (Mbps) supports. Type Select IPv4 or IPv6. DHCP : When there is a DHCP server on the network, you can enable ●...
  • Page 214 User's Manual 8.2.1.2 Port Aggregation Bind multiple NICs to create one logic NIC and use one IP address for peripheral devices. The working mode of bonded NICs work is dependent on the aggregation mode. Port aggregation enhances network bandwidth and network reliability. The system supports 3 aggregation modes: load balance, fault tolerance, and link aggregation.
  • Page 215 User's Manual Figure 8-14 NIC bonding 4. Click OK. The setting page varies depending on the aggregation mode you have selected. The following figure is the load balance setting page.
  • Page 216 User's Manual Figure 8-15 Edit load balance 5. Set parameters. Table 8-6 NIC parameters description Parameters Description The maximum network transmission speed that the bonded NICs Rate (Mbps) support. IP Type Select IPv4 or IPv6. When there is a DHCP server on the network, you can enable DHCP. The Use Dynamic IP system allocates a dynamic IP address to the Device.
  • Page 217 User's Manual Parameters Description Set NIC MTU value. The default setup is 1500 bytes. We recommend you check the MTU value of the gateway first and then set the MTU value of the Device equal to or smaller than the gateway value, which helps to reduce the packets slightly and enhance network transmission efficiency.
  • Page 218 User's Manual Among the split NICs that were bonded together, the first NIC reserves the IP address configured during binding, and the rest NICs restore their default IP addresses. 8.2.1.3 Setting Port Number Set device port number. Procedure Step 1 Log in to the PC client.
  • Page 219 User's Manual Parameter Description Set according to the actual requirements. The default value is 554. The RTSP value ranges from 1 to 65535. Set according to the actual requirements. The default value is 80. The value ranges from 1 to 65535. HTTP If the value you set is not 80, remember to add the port number after the IP address when you are using a browser to log in to the device.
  • Page 220 User's Manual Figure 8-18 P2P Step 4 Click to enable the P2P function. Click Apply. Step 5 You can register the Device to the app for remote monitoring and management. For details, see the corresponding user's manual of the app. 8.2.2.1.2 GB Access Enable the GB28181 service and connect the device to the server through the GB28181 protocol or the remote device to the device through the the GB28181 protocol.
  • Page 221 User's Manual Figure 8-19 GB Access Table 8-8 The description of parameter Parameter Description Protocol Version Set the protocol version of access. Set the number of the server, the default is SIP Server No. 34020000002000000001. Set the domain name number of the server, the default is SIP Domain 3402000000.
  • Page 222 User's Manual Step 5 Set up channel information. When the alarm event is triggered, the system automatically uploads the viedo to the server after adding viedo information. 1. Click Add. 2. Select the device in the list on the left. The system automatically generates the channel ID.
  • Page 223 User's Manual 8.2.2.1.3 GB28181 Server After opening the GB access, the remote device can be registered to the device through a certain agreement. Procedure Step 1 Log in to the PC client. on the upper-right corner, and then click Network. Step 2 Click Step 3...
  • Page 224 User's Manual Parameter Description Set the interval between the device to send registration messages Keep Alive Interval to the server, the default is 60 seconds. Set the maximum number of times to allow a heartbeat connection to timeout. Max Failure Times When the number of heartbeat connections between the device and the server exceeds this value, the device actively disconnects from the server.
  • Page 225 User's Manual Figure 8-22 RTMP Table 8-10 The description of parameter Parameter Description Select the type of stream of the live broadcast. Make sure that video format is H.264, H.264B or H.264H and audio format is AAC of the stream. Stream Type When the device IP address changes, the GB server needs to be reconfigured.
  • Page 226 User's Manual on the upper-right corner and then click Network. Step 2 Click You can also click Network from the configuration list on the home page. Select Network Application > Auto Registration. Step 3 Figure 8-23 Register Step 4 Click to enable the function.
  • Page 227 User's Manual Procedure Step 1 Log in to PC client. Step 2 Click on the upper-right corner and then click Network. You can also click Network from the configuration list on the home page. Select Network Application > Email. Step 3 Figure 8-24 Email Step 4 Click...
  • Page 228 User's Manual 1. Click Add. 2. Enter the email address of the receiver. 3. Click Add to add more receiver email addresses. Click to delete the added receiver. ● Select a receiver and then click Delete to delete the selected receiver. ●...
  • Page 229 User's Manual Step 4 Click to enable alarm center. Step 5 Configure the parameters. Table 8-13 Alarm center parameters Parameter Description IP Type Select the IP type of the alarm center server. Server Address The IP address and communication port of the alarm center server.
  • Page 230 User's Manual Figure 8-26 UPnP Step 4 Set parameters. Table 8-14 UPnP parameters Parameter Description Port Mapping Click to enable port mapping. Status The status of port mapping. The LAN IP address of the router. LAN IP The IP address is automatically obtained after the mapping succeeds. The WAN IP address of router.
  • Page 231 User's Manual 8.2.2.6 SNMP After setting SNMP (Simple Network Management Protocol) and successfully connecting the Device through relevant software tools such as MIB Builder, and MG-SOFT MIB Browser, you can directly manage and monitor the Device on the software tools. Prerequisites Install SNMP monitoring and management tools, such as MIB Builder and MG-SOFT MIB Browser.
  • Page 232 User's Manual Figure 8-27 SNMP Step 4 Click to enable the function. Step 5 Select SNMP version. For data security, we recommend V3. Set parameters. For Trap Address, enter the IP address of the computer installed with the Step 6 MG-SOFT MIB Browser.
  • Page 233 User's Manual Parameter Description Read or Write Community supported by the agent programs. Read Community, Write Community The name can only contain numbers, letters, underscores, and middle lines. The destination address of Trap information sent by the agent Trap Server program.
  • Page 234 User's Manual You can also click Network from the configuration list on the home page. Step 3 Select Network Application > Multicast. Step 4 Click to enable multicast. Step 5 Set parameters. Table 8-16 Multicast parameter Parameter Description IPV4/IPV6 Select an IP type and then enter the IP address Enter the IP address that IP Address/Server you want to use as the multicast IP.
  • Page 235 User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Network. You can also click Network from the configuration list on the home page. Select Network Application > DDNS. Step 3 Figure 8-29 DDNS Step 4...
  • Page 236 User's Manual Parameters Description Username Enter the username and password obtained from DDNS service provider. You need to register (including username and password) on the website of Password DDNS service provider in advance. Interval Enter the interval at which you want to update the DDNS. WAN IP Displays the WAN IP address of IVSS.
  • Page 237 User's Manual On the page, configure alarm events for the Device and remote devices. Select the root node on the device tree to set alarm events for the Device. ● Select a remote device on the device tree to set alarm events for the remote device. ●...
  • Page 238 User's Manual Figure 8-32 Event linkage Table 8-18 Actions description Action Description Preparation A remote device, such as IPC, The system links the selected has been added. See "5.5.2 Record remote device to record videos Adding Remote Devices" for when a linkage event occurs. detailed information.
  • Page 239 User's Manual Action Description Preparation The system takes snapshots of the linked channel and save them on the Device when there is a corresponding event. AI by Camera: When a ● linkage event occurs, the linked remote device takes Picture Storage —...
  • Page 240 User's Manual Action Description Preparation The remote device that When a linkage event occurs, supports this function has been the system associates with the Remote Warning Light connected. For details, see remote device to turn on the "8.3.1.13 Remote Warning warning light.
  • Page 241 User's Manual 8.3.1.3 Log Enable the log function. The system notes down the alarm information in the log when a linkage event occurs. On the alarm configuration page, click Select next to Event Linkage, select Log, and then click Apply. After the log function is enabled, you can select Maintain >...
  • Page 242 User's Manual When AI by Camera is used, make sure that the remote device has been configured with snapshot linkage. On the alarm configuration page, click Select next to Event Linkage, select Picture Storage, and then click Apply. 8.3.1.7 Local Alarm Output Set local alarm output.
  • Page 243 User's Manual 8.3.1.9 Access Control Set access control function. When a linkage event occurs, the system links the corresponding access control device to open door and close door. Make sure that access control device has been added. See "5.5.2 Adding Remote Devices" for detailed information.
  • Page 244 User's Manual Smart tracking is only available for AI by Camera. ● Smart tracking is only available on the multi-sensor panoramic camera + PTZ camera. ● On the alarm configuration page, click Select next to Event Linkage, select Smart Tracking, and then click Apply.
  • Page 245 User's Manual 8.3.2 Local Device You can set alarms for system errors, system offline, configure smart plans, and more. 8.3.2.1 One-click Disarming Disarm alarm linkage actions as needed to avoid interference caused by alarms. Procedure Step 1 Log in to the PC client. on the upper-right corner, and then click Event.
  • Page 246 User's Manual Table 8-19 Abnormal events Name Description The system triggers an alarm when there is no available disk. It is No Available Disk enabled by default. SSD health exception The system triggers an alarm when SSD health exception occurs. The system triggers an alarm when disk error occurs.
  • Page 247 User's Manual Figure 8-40 No disk Step 5 Click to enable the alarm against no disk. Click Select next to Event Linkage to set alarm actions. See "8.3.1 Alarm Actions" for Step 6 detailed information. Step 7 Click Save. 8.3.2.3 Offline Alarm Set the offline alarm for IVSS.
  • Page 248 User's Manual Figure 8-41 Offline alarm Step 5 Click to enable the offline alarm. Click Schedule to select a schedule from the drop-down list. Step 6 The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list or add a new schedule.
  • Page 249 User's Manual Figure 8-42 Smart plan 8.3.2.4.2 Setting Entries Frequency Procedure Step 1 Log in to the PC client. on the upper-right corner, and then click Event. Step 2 Click You can also click Event from the configuration list on the home page. Step 3 Select the root node on the device tree.
  • Page 250 User's Manual Table 8-20 Entries frequency parameters Parameter Description Entries Counter Click to enable entries counter. Entries will be counted. Statistical Cycle Set the statistical cycle. The statistical cycle is 7 days by default. Set the threshold of entries frequency. When the entries detected Entries Detected reaches or exceeds the threshold, an alarm is triggered.
  • Page 251 User's Manual Figure 8-44 Video quality analytics Step 5 Click to enable video quality analytics. Step 6 Configure the parameters. 1. Click to enable the corresponding diagnosis item, for example, video tampering. 2. Set the threshold. 3. On the device list, select one or more devices. 4.
  • Page 252 User's Manual The diagnosis statistics are displayed in a statistical chart. You can view the channel name and diagnosis time on the list below the chart. Click to display the statistics in a bar chart. ● Click to display the statistics in a pie chart. ●...
  • Page 253 User's Manual Figure 8-46 Alarm-in port 1 Step 5 Click to enable local alarm. Step 6 Set parameters. Table 8-21 Local alarm parameters description Parameter Description Name Enter a name for the alarm. Type Select a type of the alarm input device. Both NO and NC are supported. Anti-dither The system records only one alarm event during this period.
  • Page 254 User's Manual 8.3.3.1 Video Detection The system monitors and analyzes the video image. When there are considerable changes on the video, for example, the image becomes blurry, the system triggers an alarm. 8.3.3.1.1 Configuring Video Motion Detection The system generates a video motion alarm when the detected moving target reaches the configured sensitivity.
  • Page 255 User's Manual Click to clear all the detection zones. ● 3. Set parameters. Table 8-22 Motion detection zone parameters Parameter Description Name Set detection zone name to distinguish different zones. Drag to set sensitivity. The higher the sensitivity, the easier it is to trigger an alarm. At the same Sensitivity time, the false alarm rate increases as well.
  • Page 256 User's Manual Figure 8-48 Tampering Step 5 Click to enable tampering alarm. Click Schedule to select a schedule from the drop-down list. Step 6 The system triggers corresponding alarm actions only during the alarm deployment period. You can select an existing schedule from the Schedule drop-down list or add a new schedule.
  • Page 257 User's Manual Figure 8-49 Offline alarm Step 5 Click to enable offline alarm. The offline alarm is enabled by default. You can skip this step. Step 6 Click Schedule to select a schedule from the drop-down list. The system triggers corresponding alarm actions only during the alarm deployment period.
  • Page 258 User's Manual Figure 8-50 Alarm-in port 1 Step 5 Click to enable the alarm. Step 6 Set parameters. Table 8-23 External alarm parameters description Parameter Description Name Enter a name for the alarm. Type Select the type of the alarm input device. Both NO and NC are supported. Anti-dither The system records only one event during this period.
  • Page 259 User's Manual Make sure that thermal detections such as heat detection and temperature detection have been ● configured on the thermal camera. Table 8-24 Thermal alarms Function Description When the thermal camera detects a heat source, the alarm signal is Heat alarm transmitted to the Device, and the Device will perform an alarm linkage action.
  • Page 260 User's Manual The system supports pre-check and routine inspection, and you can obtain real-time storage status of the Device and avoid data loss. Pre-check: During device operation, the system automatically detects disk status in case of ● change (restart, insert and pull the disk). Routine inspection: The system executes t routine inspection on the disks continuously.
  • Page 261 User's Manual You can only view S.M.A.R.T information of a disk at one time. Log in to the PC client. Click on the upper-right corner and then select Storage > Storage Resource > Disk. Select a disk, and then click S.M.A.R.T. You can check the disk status. If there is any problem, fix it in time.
  • Page 262 User's Manual 8.4.1.2 RAID RAID (Redundant Array of Independent Disks) is a data storage virtualization technology that combines multiple physical disks into a single logical unit for the purposes of data redundancy, performance improvement, or both. The Device supports RAID0, RAID1, RAID5, RAID6, RAID10, RAID50 and RAID60. See "Appendix 1 ●...
  • Page 263 User's Manual Figure 8-53 Manual create Table 8-25 Manual creation parameters description Parameter Description Select the storage device where the disks are located and select the disks you want to add to the RAID. Storage Device Different levels of RAID might need different number of disks. RAID Select the level of RAID that you want to create.
  • Page 264 User's Manual Figure 8-54 One-click create Table 8-26 One-click creation parameters description Parameter Description Storage Device Select the storage device where the disks are located. Set RAID resources allocation mode. The default mode is self-adaptive. Self-adaptive : The system automatically adjusts RAID synchronization speed according to current business load.
  • Page 265 User's Manual Table 8-27 RAID operations Name Operation View the status of Click next to the RAID name to open the RAID disk list. You can view RAID member disks the space and status of the member disks. Click the icon under Status to view details on the RAID. View RAID details When you cannot mount the RAID or you cannot properly use the RAID, you can try to fix the file system.
  • Page 266 User's Manual Figure 8-55 Global hot standby Figure 8-56 Private hot standby Click Next. Step 6 Step 7 Confirm information, and then click Create. If the information is wrong, click Back to modify the hot standby parameters. Click Create. Step 8 Figure 8-57 Hot standby...
  • Page 267 User's Manual 8.4.1.3 Network Disk Network disk is a network-based online storage service that stores device information on the network hard disk through the iSCSI protocol. 8.4.1.3.1 iSCSI Application on the upper-right corner and then select Storage > Storage Log in to the PC client. Click Resource >...
  • Page 268 User's Manual Figure 8-58 Add iSCSI Step 5 Set parameters. Table 8-28 Network disk parameters Parameter Description IP Address Enter the IP address of the iSCSI server. Port Enter the port number of the iSCSI server. It is 3260 by default. Click to enable anonymous login.
  • Page 269 User's Manual 8.4.2 Storage Settings 8.4.2.1 Configuring Disk Groups The installed disks and created RAID groups are allocated to group 1 by default. You can create more disk groups and allocate disks and RAID groups to other groups. The videos and images of all channels are stored in disk group 1 by default.
  • Page 270 User's Manual In bathes: Select one or more disks or RAID groups and then click Move to next to Add, select a disk group, and then click OK. Click a disk group and then under the Video or Picture tab, you can allocate the video or Step 6 image storage of different channels to disk groups.
  • Page 271 User's Manual Manual : The Device records around the clock and does not respond to the recording ● schedule. Close : The Device does not records for the channel. ● means that the type is selected. ● Sub Stream 1 and Sub Stream 2 cannot be enabled at the same time. ●...
  • Page 272 User's Manual Figure 8-62 Set a recording schedule Select General , Record Events, or both as the recording type. Step 5 General : Click the box next to General to select a schedule or click Add Schedule to ● add a new schedule. The Device records in the configured schedule. For details, see "8.7.4.1 Configuring Time Plan".
  • Page 273 User's Manual Parameter Description The duration of instant recording. After starting instant recording under the Live tab, if you do not stop recording, the system will Instant Record Duration automatically stops after the defined duration. The number of images for each manual capture action. You can also Manual Snapshot configure the interval between manual snapshots.
  • Page 274 User's Manual 8.4.2.3.2 Setting Automatic File Deletion You can enable the Device to automatically delete files older than a certain number of days. Procedure Step 1 Log in to the PC client. on the upper-right corner and then click Storage. Step 2 Click You can also click Storage from the configuration list on the home page.
  • Page 275 User's Manual 8.4.2.4 Record Transfer When the Device and an IPC are disconnected, the IPC continues to record and stores the recording in the SD card. After the network recovers, the Device will download the recording during the disconnection from the IPC. There are 2 ways for record transfer after the network recovers.
  • Page 276 User's Manual 8.5 Security Strategy 8.5.1 Security Status Background Information Security scanning helps get a whole picture of the device security status. User and service detection: Detects whether the current login authentication, user status, and ● configuration security conform to recommended settings. Security modules scanning: Scans the running status of the security modules such as attach ●...
  • Page 277 User's Manual Figure 8-68 Details 8.5.2 System Service 8.5.2.1 Basic Services Enable basic system services for third-party access. Procedure Step 1 Log in to the PC client. Step 2 On the home page, select Security > System Service > Basic Services.
  • Page 278 User's Manual Figure 8-69 Basic services Step 3 Enable or disable system services. Table 8-30 System services Name Description After enabling this function, you can access the Device through SSH protocol to carry out system debugging and IP configuration. This function is disabled by default.
  • Page 279 User's Manual Name Description After this function is enabled, a third-party platform can connect the Device through CGI protocol. For data security, we recommend you disable this function when it is not needed. After this function is enabled, other devices can connect the Device through ONVIF protocol.
  • Page 280 User's Manual Figure 8-70 HTTPS to enable Compatible with TLSv1.1 and earlier versions. Step 4 (Optional) Click TLS (Transport Layer Security) provides privacy and data integrity between two communications application programs. Step 5 Click Apply. You can use HTTPS to access the web interface. Open the browser, enter https://IP address:port in the address bar, and then press Enter, and then you can log in to the webpage.
  • Page 281 User's Manual Allowlist and blocklist cannot be used at the same time. Step 4 If you select Allowlist or Blocklist, click Add to add an allowlist or blocklist. You can allow or prohibit a specific IP address, IP addresses on a specific network segment, or a specific MAC address to access the Device.
  • Page 282 User's Manual On the home page, select Security > Attack Defense > Anti-Dos Attack. Step 2 Figure 8-73 Account lockout Step 3 Click to enable SYN Flood Attack Defense or ICMP Flood Attack Defense. Click Apply. Step 4 8.5.3.4 Time Synchronization Permission Configure permissions of time synchronization actions from other devices or servers.
  • Page 283 User's Manual Click Add to add an allowlist or blocklist. Step 5 1. Select an IP version. Support IPv4, IPv6 and domain. 2. Enter an IP address. 3. Click OK. Step 6 Click Apply. 8.5.4 CA Certificate A CA certificate is a digital certificate issued by a certificate authority (CA). The CA verifies trusted certificates for trusted roots.
  • Page 284 User's Manual Figure 8-76 Create certificate 2. Enter the information. Figure 8-77 Certificate information 3. Click Create and install certificate. Apply for and import a certificate. ● 1. Select Apply for CA Certificate and Import (Recommended) and then click Next.
  • Page 285 User's Manual 2. Enter the information. 3. Click Create and Download. The Device creates and downloads a certificate request file. Submit the file to a CA institute to apply for a signed certificate. 4. Click Browse to select the certificate. Figure 8-78 Import the certificate 5.
  • Page 286 User's Manual Figure 8-79 Trusted certificate Click Install Trusted Certificate. Step 3 Click Browse to select a trusted certificate. Step 4 Step 5 Click OK. Related Operations You can edit and download the installed certificate. Edit ● Click Enter Edit Mode , enter a custom name for the certificate, and then click Save Config. Download ●...
  • Page 287 User's Manual Table 8-31 Encryption parameters Encryption Method Description Click to enable encryption using the private protocol. Encryption Type : Leave it as default. Private Protocol ● Update Period of Secret Key : The value range from 0 hours ● through 720 hours.
  • Page 288 User's Manual Figure 8-82 Security Authentication Click Apply. Step 4 8.6 Account Management The Device adopts two-level account management mode: user and user group. Every user must belong to a group, and one user only belongs to one group. To conveniently manage the users, we recommend the permissions of general users should be lower than those of high-level users.
  • Page 289 User's Manual Figure 8-83 User group property Step 5 Configure the parameters. Table 8-32 User group attribute parameters Parameter Description Customize a user group name. Name The name ranges from 1 to 64 characters. It can contain English letters, numbers and special characters ("_", "@", "."). Displays the organization node that the user group belongs to.
  • Page 290 User's Manual Figure 8-84 Permission 2. Select the permissions for the user group. Click Apply. Step 7 Related Operations , enter the login password, and then click OK to delete the user group. Select a user group, click Before you delete a user group, you need to delete all users in the current group first. ●...
  • Page 291 User's Manual Step 4 Enter the login password of the current account, and then click OK. Figure 8-85 User attributes Step 5 Configure the parameters. Table 8-33 User attributes parameters Parameter Description Set the username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
  • Page 292 User's Manual Select a user, and then click Before deleting an online user, you need to block the user first. The deleted user cannot be restored. 8.6.3 Password Maintenance Maintain and manage the login passwords of users. 8.6.3.1 Changing Password Change the login password of the user.
  • Page 293 User's Manual Procedure Step 1 Log in to the PC client. Step 2 Click on the upper-right corner and then click Account. You can also click Account from the configuration list on the home page. Step 3 Select the root node at the upper-left corner. Step 4 Click to enable the password reset function.
  • Page 294 User's Manual 8.6.3.2.3 Resetting Password on the Web Interface or PC Client Prerequisites Make sure that you have configured the linked email address. Procedure Step 1 Enter the IP address of the Device in the address bar of the browser or PC client, and then press Enter.
  • Page 295 User's Manual Figure 8-86 ONVIF user group Step 4 Enter the login password of current user, and then click OK. Step 5 Set parameters. Table 8-36 User attributes parameters Parameter Description Set the username. Name The name ranges from 1 to 31 characters. It can contain English letters, number and special character ("_", "@", ".").
  • Page 296 User's Manual You can also click System from the configuration list on the home page. Step 3 Configure the parameters. Figure 8-87 Basic system settings Table 8-37 System parameters description Parameter Description Language Set system language. Select a video standard. PAL is mainly used in China, Middle East and Europe.
  • Page 297 User's Manual Parameter Description Enable virtual keyboard on the local interface. See "Appendix 1.2 Virtual Keyboard" for detailed information. Virtual Keyboard This function is available only on the local interface. Set mouse moving speed on the local interface. Mouse Moving Speed This function is available only on the local interface.
  • Page 298 User's Manual Figure 8-88 Time Step 4 Configure the parameters. Table 8-38 Time parameters description Parameters Description Set system date and time. You can set the time manually or enable NTP so that the Device can automatically synchronize time with the NTP server. Manual Settings : Set the actual date and time in either of the following ●...
  • Page 299 User's Manual DST is a system to stipulate local time, in order to save energy. If the country or region where the Device is located follows DST, you can enable DST to ensure that system time is correct. 1. Click to enable DST.
  • Page 300 User's Manual means the monitor is connected and enabled. means the monitor is ● connected but has not enabled. means no monitor is connected. Step 4 Select a monitor, and then click to enable the selected monitor. Step 5 Set parameters. Table 8-39 Display parameters description Parameter Description...
  • Page 301 User's Manual Figure 8-90 Time plan Step 3 Add a schedule. 1. Click Create. 2. Click to edit the schedule name. Step 4 Set the validity periods. Always : The schedule is always effective. ● Custom : Customize validity periods for the schedule. Click the time bar, and then drag ●...
  • Page 302 User's Manual 3. Set the effctive mode and period. 4. Set the time, and then click OK. Figure 8-91 Add holiday Step 4 Click Apply. 8.8 Cluster Service The cluster function, also known as cluster redundancy, is a kind of deployment method that can improve the reliability of device.
  • Page 303 User's Manual When you create a cluster, the current Device is taken as the first sub device and the DCS server by default, and the priority of the other sub devices is determined by the order in which they are added, with the first sub device being the highest priority.
  • Page 304 User's Manual Figure 8-93 Cluster setting Step 4 Add a main device. 1. Click Add under Main Device. Figure 8-94 Add a main device 2. Set parameters.
  • Page 305 User's Manual Table 8-40 Parameters description Parameter Description Device Name Enter a name for the main device. IP Address Enter the IP address of the main device. Port Enter the port number. It is 37777 by default. Username Enter the login username and password of the Device. Password Select the checkbox to enable cluster, and then enter the cluster IP address, subnet mask and gateway.
  • Page 306 User's Manual Parameter Description Port Enter the port number. It is 37777 by default. Username Enter the login username and password of the Device. Password 3. Click OK. Click Next. Step 6 Step 7 Set the arbitrage IP. When there are only 2 devices in the cluster, a third-party device is required to determine whether the main device is faulty, so arbitration IP must be set for the cluster to perform a normal replacement operation.
  • Page 307 User's Manual Figure 8-97 Add a transfer task Step 4 Configure the parameters. Table 8-42 Parameters of transfer task Parameters Description Main Device Enter the IP address of the main device. Sub Device Enter the IP address of the sub device. Select the channel whose recorded files are to be transferred.
  • Page 308 User's Manual 8.9 Task Management 8.9.1 Resource Management You can import and manage the video resource. Procedure Step 1 Log in to the PC client. On the home page, select Task > Resource. Step 2 Click Import to import files in .dav or .mp4 format from local or external storage devices. Step 3 When importing files in .mp4 format, you need to configure the Start time for the video.
  • Page 309 User's Manual To enable the non-motor vehicle analysis function, the non-motor vehicle analysis ● function must be enabled first. It is not supported to enable the non-motor vehicle analysis function separately. Step 5 Select the start time and end time. Step 6 Click Add.
  • Page 310 User's Manual 9 System Maintenance 9.1 Overview Log in to the PC client. On the home page, select Maintenance Center > Overview. Figure 9-1 Overview Table 9-1 Overview Function Description View device version and the number of online users. Overview Click to refresh the data.
  • Page 311 User's Manual Function Description View disk status and storage usage. ● : disk online. : disk error. : disk degraded or abnormal. : no disk detected. Disk Click , click to enable device positioning and ● then set the interval at which the positioning indicator light of the Device flashes.
  • Page 312 User's Manual Figure 9-2 Algorithm version 9.2.4 Viewing Storage Information Log in to the PC client. On the home page, select Maintenance Center > System Info > Storage Info. You can view the storage information of each channel. Figure 9-3 Storage information 9.2.5 Online User Manage the online user that can access the Device.
  • Page 313 User's Manual Figure 9-4 Online user Step 3 Block one or more users. Block one by one: Click corresponding to the user. ● Block in batches: Select multiple users and then click Block. ● Step 4 Set the block period. The default period is 30 minutes. Click OK.
  • Page 314 User's Manual Procedure Step 1 Log in to the PC client. On the home page, select Maintenance Center > Network Detection > Network Test. Step 2 Figure 9-6 Network test In the Network Test section, enter the target address, and then click Test. Step 3 After testing is completed, the test result is displayed.
  • Page 315 User's Manual Figure 9-7 S.M.A.R.T detection Step 3 Set the detection period. Click OK. Step 4 9.5.2 System Disk Health Detection On the home page, select Maintenance Center > Disk Maintenance > System Disk Health Detection, and then you can view the storage allocation and remaining P/E cycle of system disk. Figure 9-8 System Disk health detection 9.5.3 Firmware Update Import update file to update HDD information.
  • Page 316 User's Manual Select a disk, click Import Firmware Info , click Browse to choose the template to be Step 5 imported, and then click OK. Click Firmware Update to update the firmware information. Step 6 Click Detect Firmware to refresh the firmware information on the page. Step 7 9.6 Log Info The logs record all kinds of system running information.
  • Page 317 User's Manual Related Operations Export logs. ● Click Export to export the logs. You can select whether to encrypt the exported logs. Select Yes , set a password, and then click OK. The exported logs will be encrypted. The password is required to unzip the exported file. If you select No, the logs will be exported to your computer or USB storage device without encryption.
  • Page 318 User's Manual The logs might be overwritten when the storage space runs out. Back up the logs in time. Export logs one by one: Click to export a log. ● Export logs in batches: Select multiple logs, and then click Export. ●...
  • Page 319 User's Manual Click OK. Step 6 The system starts updating the AI module. The Device automatically restarts after the update is complete. 9.9.3 Camera Update You can import the update file to update the cameras. Prerequisites You need to obtain the correct update file and save it in the corresponding path. When operating on the local interface, save the update file in the USB storage device and then ●...
  • Page 320 User's Manual Figure 9-11 Default Select a method between Quick Restoration and Custom Restoration. Step 3 Step 4 Click OK. The system begins to restore default settings. After that, the system prompts you to restart the Device. 9.10.2 Maintenance If the device has run for a long time, you can set the Device to automatically restart at idle time. Procedure Step 1 Log in to thee PC client.
  • Page 321 User's Manual Figure 9-12 Auto Maintain Step 3 Set the automatic time. Step 4 Click to enable emergency maintenance. When an upgrade power outage, running error and other problems occur, and you cannot log in, you can restart or update the Device, and clear configurations through emergency maintenance.
  • Page 322 User's Manual 10 PC Client After installing the PC client, you can access the Device remotely through the PC client to carry out system configuration, function operations and system maintenance. For details on installing the PC client, see "5.3.1 Logging in to the PC Client". 10.1 Page Description Double-click the shortcut icon of the PC client on the desktop of your computer.
  • Page 323 User's Manual 10.4 Configuring the Client Settings When the theme of your computer is not Areo, videos might not be displayed normally on the PC client. We recommend you switch the computer theme to Areo, or enable the compatibility mode of the client.
  • Page 324 User's Manual 11 Log Out, Restart, Shut Down, Lock Log out of, restart, shut down and lock out the Device. Figure 11-1 User operation Logging Out , and then select Logout. Click Restart , select Restart , and then click OK. Click Shutting Down Shutting down the Device by unplug the power cable might cause data loss, and is not...
  • Page 325 User's Manual To unlock the client, click anywhere on the client, and then the Unlock window appears. Enter the username and password, and then click OK. You can also click Switch User to switch to another user account.
  • Page 326 User's Manual 12 FAQ Table 12-1 FAQ Problem Possibilities and Solutions The AI module is offline. ● Click Maintain > System Resources > AI Module Resource. You can view status of the AI modules. There are too many filter criteria on the AI display page. After you enable face ●...
  • Page 327 User's Manual Appendix 1 Glossary Appendix Table 1-1Glossary Name Description Common Gateway Interface (CGI) is an important Internet technology. With CGI, client can ask data from program running on network server. CGI describes data transmission standard between server and asking processing program.
  • Page 328 User's Manual Name Description Open Network Video Interface Forum (ONVIF) is the defined general protocol for information exchange among the network video devices. It includes ONVIF search device, real-time audio/video, metadata, information control, and so Phase Alteration Line, this is a television standard that television scanning beam is 625 beams, 25 frames per second, phase alteration, odd field first and then it is followed by even field.
  • Page 329 User's Manual Appendix 2 Mouse and Keyboard Operations This section introduces mouse and keyboard operations. Appendix 2.1 Mouse Operations Connect mouse (wireless mouse is supported) to the USB port, and then you can use the mouse to control the local menu. Appendix Table 2-1Mouse operations Operation Description...
  • Page 330 User's Manual Appendix Figure 2-1 Virtual keyboard (global keyboard) Appendix Figure 2-2 Virtual keyboard (input letter)
  • Page 331 User's Manual Appendix 3 RAID RAID is an abbreviation for Redundant Array of Independent Disks. It is to combine several independent HDDs (physical HDD) to form a HDD group (logic HDD). Comparing with one HDD, RAID provides more storage capacity and data redundancy. The different redundant arrays have different RAID level.
  • Page 332 User's Manual RAID Level Description Min. HDD Needed RAID50 is a combination of the RAID5 and RAID0. RAID50 It has higher fault-tolerance. There is no data loss even one HDD in the set malfunctions. RAID60 is a combination of the RAID6 and RAID0. It has higher fault-tolerance and read RAID60 performance.
  • Page 333 User's Manual Appendix 4 HDD Capacity Calculation HDD capacity calculation formula: Total capacity (M) = Channel number × Demand time length (hour) × HDD capacity occupied per hour (M/hour) According to the above formula, get recording time calculation formula. Recording time (hour) = For example, for single-channel recording, HDD capacity occupied per hour is 200 M/hour.
  • Page 334 User's Manual Appendix 5 Particulate and Gaseous Contamination Specifications Appendix 5.1 Particulate Contamination Specifications The following table defines the limitations of the particulate contamination in the operating environment of the device. If the level of particulate contamination exceeds the specified limitations and result in device damage or failure, you need to rectify the environmental conditions.
  • Page 335 User's Manual Appendix Table 5-5Gaseous contamination specifications Gaseous contamination Specifications Copper coupon corrosion < 300 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 rate Silver coupon corrosion rate < 200 Å/month per Class G1 as defined by ANSI/ISA71.04-2013 Appendix Table 5-6ANSI/ISA-71.04-2013 classification of reactive environments Class Copper Reactivity Silver Reactivity...
  • Page 336 IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations from Dahua on how to create a more secured security system.
  • Page 337 ● to private networks. Enable IP/MAC address filtering function to limit the range of hosts allowed to access the ● device. More information Please visit Dahua official website security emergency response center for security announcements and the latest security recommendations.