Table of Contents

Advertisement

Quick Links

User's Manual
V2.1.1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Elite IPEL-DL80F-IRW1 and is the answer not in the manual?

Questions and answers

Summarization of Contents

Foreword
General
Introduces the manual's scope: functions, configuration, operation, and maintenance.
Safety Instructions
Explains signal words used in the manual for hazard communication.
Revision History
Details manual versions, content changes, and release dates.
Important Safeguards and Warnings
Electrical Safety
Covers electrical safety codes, power supply, wiring, and cable handling.
Environment
Details environmental conditions for device operation and storage.
Operation and Daily Maintenance
Provides instructions for safe operation and routine maintenance.
Basic Configuration
Login
Instructions for logging into the web interface of the IP camera.
Live
Overview of the live view interface and its functionalities.
PTZ Operation
Covers configuration and control of PTZ (Pan-Tilt-Zoom) functions.
Playback
Instructions for accessing and managing recorded video and images.
Camera
Settings related to camera image and lighting parameters.
Network
Configuration of network settings like TCP/IP, PPPoE, DDNS, etc.
Event
Configuration of intelligent event settings like alarm linkage.
1 Overview
1.1 Introduction
Explains what an IP camera is and its basic functionality.
1.2 Network Connection
Describes the typical network topology for IP cameras.
1.3 Function
Overview of camera functions, which may vary by model.
1.3.1 Basic Function
Details basic functions like live view and recording.
2 Configuration Flow
Login
Detailed steps for logging into the web interface.
4.2 Live
4.2.1 Live Interface
Details the system menu, encode bar, and function bars.
4.2.2 Encode Bar
Explains settings for stream types and network protocols.
4.2.3 Live View Function Bar
Describes icons and functions on the live view toolbar.
4.2.4 Window Adjustment Bar
Controls for adjusting the display window layout.
4.2.4.1 Adjustment
Options for adjusting image brightness, contrast, hue, and saturation.
4.2.4.2 Zoom and Focus
Adjusting focal length for zoom and focus to improve image clarity.
4.3 PTZ Operation
4.3.1 Configuring External PTZ Protocol
Steps to configure PTZ protocol for external PTZ cameras.
4.3.2 Configuring PTZ Function
Overview of configuring PTZ functions.
4.3.2.1 Preset
Setting user-specified positions for quick camera orientation.
4.3.2.2 Tour
Configuring a series of camera movements along several presets.
4.3.2.3 Scan
Enabling camera to move horizontally between left and right limits.
4.3.2.4 Pattern
Recording and replaying a series of camera operations.
4.3.2.5 Pan
Enabling continuous 360° horizontal rotation at a set speed.
4.3.2.6 PTZ Speed
Setting the rotation speed for PTZ operations like touring or tracking.
4.3.2.7 Idle Motion
Configuring PTZ operations to run automatically when idle.
4.3.2.8 PowerUp
Configuring PTZ motion to execute automatically after power-on.
4.3.2.9 PTZ Limit
Restricting camera rotation within a configured area.
4.3.2.10 Time Task
Configuring camera actions to perform during specific time periods.
4.3.2.11 PTZ Restart
Procedure to restart the PTZ functionality.
4.3.2.12 Default
Restoring PTZ function to its default configuration.
4.3.3 Calling PTZ
Accessing PTZ control and functions from the Live interface.
4.3.3.1 PTZ Control
Rotating device, zooming, and adjusting iris via control or joystick.
4.3.3.2 PTZ Function
Selecting and calling PTZ functions like Scan, Preset, Tour, etc.
4.4 Playback
4.4.1 Playback Interface
Describes the interface for playing back recorded video and images.
4.4.2 Playing back Video or Picture
Introduces operations for playing back video and picture files.
4.4.3 Clipping Video
Allows clipping specific time frames from video recordings.
4.4.4 Downloading Video or Picture
Downloading single files or batches of video or picture files.
4.5 Camera
4.5.1 Conditions
Configuring image and lighting parameters for optimal image quality.
4.5.2 Setting Video Parameters
Introduces video parameters like stream type, resolution, and watermark.
4.5.2.1 Video
Configuring video stream parameters: stream type, encode mode, resolution.
4.5.2.2 Snapshot
Configuring snapshot parameters: type, image size, quality, and interval.
4.5.2.3 Overlay
Configuring overlay information displayed on the Live interface.
4.5.2.3.1 Configuring Privacy Masking
Enabling privacy masking to protect specific areas on the video image.
4.5.2.3.7 Configuring OSD Info
Displaying information like preset, PTZ coordinates, zoom, tour, and location.
4.5.2.3.8 Configuring Counting
Displaying statistics of people entering/leaving numbers via overlay.
4.5.2.3.9 Configuring Structured Statistics
Displaying structured statistics via overlay.
4.5.2.3.10 Configuring Face Statistics
Displaying face statistics information via overlay.
4.5.2.4 ROI
Configuring image quality for Region of Interest (ROI).
4.5.2.5 Path
Configuring storage paths for various files like snapshots and recordings.
4.5.3 Audio
Configuring audio parameters and alarm audio.
4.5.3.1 Configuring Audio Parameter
Setting audio parameters: encode mode, sampling frequency, audio type.
4.5.3.2 Configuring Alarm Audio
Recording or uploading audio files for event-triggered playback.
4.6 Network
4.6.1 TCP/IP
Configuring IP address and DNS server according to network standards.
4.6.2 Port
Configuring port numbers and maximum concurrent users.
4.6.3 PPPoE
Setting up PPPoE for internet connection via WAN dynamic IP.
4.6.4 DDNS
Configuring Dynamic DNS for automatic domain updates with external IP.
4.6.5 SMTP (Email)
Configuring email parameters and enabling email linkage for alarms.
4.6.6 UPnP
Enabling UPnP for automatic port forwarding and remote camera access.
4.6.7 SNMP
Configuring SNMP for network management using MIB Builder or MG-SOFT.
4.6.8 Bonjour
Enabling Bonjour for zero-configuration networking and device discovery.
4.6.9 Multicast
Setting up multicast IP and protocol for efficient video streaming.
4.6.10 802.1x
Configuring 802.1x authentication for network access.
4.6.11 QoS
Configuring Quality of Service to manage network delay and congestion.
4.6.12 Access Platform
Overview of accessing platforms.
4.6.13.1 P2P
Enabling P2P for easy device management without DDNS or port forwarding.
4.6.13.2 ONVIF
Configuring ONVIF authentication for connecting with other manufacturers' devices.
4.6.13.3 RTMP
Configuring RTMP for streaming live video to third-party platforms.
4.7 Storage
4.7.1 Setting Storage Plan
Setting record plan and record control for continuous or event-linked recording.
4.7.2 Setting Schedule
Configuring record, snapshot, and holiday schedules for events.
4.7.3 Setting Destination
Explains storage method configurations for recorded videos and snapshots.
4.7.3.1 Path
Selecting different storage paths (SD card, FTP, NAS) based on event type.
4.7.3.2 Local
Displays information of local SD card and settings for read-only or read-write.
4.7.3.3 FTP
Enabling FTP as a destination path for saving files.
4.7.3.4 NAS
Enabling NAS as a destination path to save files to a Network Attached Storage.
4.8 System
4.8.1 General
Configuring device name, language, and video standard.
4.8.2 Date & Time
Configuring date format, time zone, current time, DST, and NTP server.
4.8.3 Account
Managing users: adding, deleting, or modifying users and groups.
4.8.3.1 Adding a User
Steps to add a new user and configure their authorities and permissions.
4.8.3.2 Adding User Group
Adding, deleting, or modifying user groups and their authorities.
4.8.3.3 ONVIF User
Adding, deleting ONVIF users, and modifying their passwords.
4.8.4 Security
Configuring system service, HTTPS, and firewall for network security.
4.8.4.1 System Service
Configuring services like CGI, ONVIF, Genetec, and audio/video encryption.
4.8.4.2 HTTPS
Creating or uploading certificates for secure web access.
4.8.4.3 Firewall
Configuring firewall to enhance network and data security.
4.8.5 Peripheral
Configuring peripheral devices like serial ports and external lights.
4.8.5.1 Serial Port Settings
Configuring serial port settings for PTZ control via RS485 cable.
4.8.5.2 External Light
Configuring external lighting equipment attached via serial cable.
4.8.5.3 Wiper
Configuring wiper work mode and parameters.
5 Event
5.1 Setting Alarm Linkage
Configuring alarm events like record, email, or snapshot upon event trigger.
5.1.1 Alarm Linkage
Overview of alarm linkage and its configurations.
5.1.1.1 Setting Period
Configuring date and time schedules for event activity.
5.1.1.2 Record Linkage
Configuring camera recording after an event, based on Record Delay.
5.1.1.2.1 Setting Record Plan
Setting record plans for Normal, Motion, and Alarm event types.
Setting Record Control
Setting parameters like pack duration, pre-event record, and disk full strategy.
5.1.1.3 Snapshot Linkage
Configuring automatic snapshots upon event triggers.
5.1.1.3.1 Setting Snapshot Plan
Determining when snapshots will be active based on timing or event triggers.
5.1.1.4 Relay-out Linkage
Triggering alarm relay-out devices when events are triggered.
5.1.1.5 Email Linkage
Sending emails to users when events are triggered.
5.1.1.6 PTZ Linkage
Linking PTZ operations to events, like rotating to a preset.
5.1.1.7 Warning Light Linkage
Automatically enabling a warning light upon event triggers.
5.1.1.8 Audio Linkage
Broadcasting alarm audio files when alarm events occur.
5.1.2 Subscribing Alarm
Outputting detailed alarm information when subscribed events are triggered.
5.1.2.1 About Alarm Types
Information on various alarm types and their prerequisites.
5.1.2.2 Subscribing Alarm Information
Outputting detailed alarm information on the interface when events are triggered.
Setting Panoramic Splicing
Performing seamless image stitching for panoramic cameras using multiple lenses.
Setting Video Detection
Triggering events for pixellation changes, moving objects, or tampering.
Setting Motion Detection
Configuring motion detection to trigger events for movement detection.
Setting Video Tampering
Triggering events when the lens is covered or video output is mono-color.
Setting Scene Changing
Triggering events when the video image changes scene or camera position.
Setting Intelligent Motion Detection
Detecting human, vehicle, or motor vehicles to avoid false alarms.
Setting Audio Detection
Triggering events for tone changes or rapid sound intensity changes.
Setting Smart Plan
Overview of smart plans including face detection, heat map, IVS, and people counting.
Basic Smart Plan
Selecting desired smart functions like face detection or crowd map.
Schedule
Configuring time periods for Smart Plans to be active.
Setting IVS
Steps to optimize IVS rule setup and avoid false positive alerts.
Rule Configuration
Setting IVS parameters like direction, action, object tracking, and track linkage.
Setting Crowd Map
Viewing crowd distribution in real time for crowd monitoring.
Rule Configuration
Configuring crowd map rules, detection areas, and parameters.
Setting Face Recognition
Performing event linkage and database search when faces are detected or recognized.
Setting Face Detection
Detecting faces in the detection area and performing alarm linkage.
Setting Face Database
Configuring face database for comparison with detected faces.
5.10.2.1 Creating Face Database
Steps to create a face database and configure its capacity limit.
5.10.2.2 Adding Face Picture
Adding face pictures to the database, including single adding and batch importing.
5.10.2.3 Managing Face Picture
Managing and maintaining face pictures in the database.
5.10.2.3.1 Modifying Face Information
Modifying face information, including search, edit, and delete options.
5.10.2.3.2 Deleting Face Picture
Deleting face pictures from the database (single or batch).
5.10.2.4 Face Modeling
Extracting face information to establish feature models for recognition.
Setting People Counting
Configuring people counting function, calibration, and viewing reports.
People Counting
Counting people entering/leaving detection area and creating events.
Parameters of People Counting
Details on OSD, flip, flowrate alarm, and people number statistics.
Viewing People Counting Report
Generating people counting data reports.
Setting Heat Map
Creating statistics on object movements and viewing heat map reports.
Viewing Heat Map Report
Exporting heat map data as a report.
Setting Video Metadata
Extracting metadata from people, vehicles, and displaying attributes.
Scene Configuration
Setting detection scenes and rules for people, vehicles, and metadata.
Setting Picture Information
Setting overlay for motor vehicle, non-motor vehicle, and people.
Viewing Video Metadata Report
Generating video metadata recognition reports.
Setting Relay-in
Performing alarm linkage when an alarm is triggered at the alarm-in port.
Relay-in (1)
Enabling alarm linkage function for relay-in ports.
Relay-in (2)
Selecting alarm or arming/disarming mode for external alarm systems.
Setting Abnormality
Handling abnormalities like SD card, network, illegal access, voltage, security.
Setting SD Card
Performing alarm linkage for SD card abnormalities: No SD Card, Capacity Warning, Error.
Setting Network
Performing alarm linkage for network abnormalities like disconnection or IP conflict.
Setting Illegal Access
Performing alarm linkage when wrong login passwords exceed set times.
Setting Voltage Detection
Performing alarm linkage when input voltage is higher or lower than rated value.
Setting Security Exception
Performing alarm linkage when hostile attacks are detected.
Setting Disarming
Disabling linkage actions via smart phone app, but still generating alarm records.
6 Maintenance
Covers requirements, auto maintain, password reset, backup, default, upgrade.
6.1 Requirements
Steps to ensure reliable camera system operation and maintenance.
6.2 Auto Maintain
Restarting system manually, setting auto reboot, and auto deletion of old files.
6.3 Resetting Password
Steps to reset camera password using security questions.
6.4 Backup and Default
Importing/exporting system configuration and restoring default settings.
6.4.1 Import/Export
Exporting configuration for backup and importing for quick configuration.
6.4.2 Default
Restoring the device to default or factory settings.
6.5 Upgrade
Upgrading firmware for security, compatibility, and stability improvements.
6.6 Information
Viewing device information, logs, and online users.
6.6.1 Version
Viewing hardware, system, and web version information.
6.6.2 Log
Viewing and backing up system logs.
6.6.3 Remote Log
Configuring remote log access by setting address, port, and device number.
6.6.4 Online User
Viewing all current users logged into the web interface.
Appendix 1 Cybersecurity Recommendations
Tips and recommendations for creating a more secured security system.
Mandatory actions to be taken for basic equipment network security:
Essential actions for basic equipment network security.
1. Use complex, strong Passwords
Suggestions for creating strong passwords to prevent breaches.
2. Update Firmware and Client Software regularly
Recommendations for keeping firmware and software up-to-date for security.
"Nice to have" recommendations to improve your equipment network security:
"Nice to have" recommendations to improve equipment network security.
1. Physical Protection
Protecting equipment physically, especially storage devices.
2. Change Passwords Regularly
Changing passwords regularly to reduce the risk of guessing or breach.
3. Set and Update Passwords Reset Information Timely
Setting up password reset information, including security questions.
4. Enable Account Lock
Keeping account lock enabled to guarantee security against brute force attacks.
5. Change Default HTTP and Other Service Ports
Changing default ports to reduce the risk of guessing by outsiders.
6. Enable HTTPS
Enabling HTTPS for secure communication channels for web services.
7. MAC Address Binding
Binding IP and MAC addresses to equipment to reduce ARP spoofing risk.
8. Assign Accounts and Privileges Reasonably
Assigning minimum permissions to users based on requirements.
9. Disable Unnecessary Services and Choose Secure Modes
Turning off unnecessary services and using safe modes for reduced risks.
10. Audio and Video Encrypted Transmission
Using encrypted transmission for sensitive audio/video data to prevent theft.
11. Secure Auditing
Regularly checking online users and equipment logs for unauthorized access.
12. Network Log
Enabling network log function for long duration log storage and tracing.
13. Construct a Safe Network Environment
Recommends disabling port mapping, partitioning networks, and using 802.1x.
More information
Information on visiting the official website for security announcements.

Table of Contents