Network Camera User Manual (V5.0.1)
Network Camera User Manual (V5.0.1)
Network Camera
User Manual
Copyright © Shenzhen TVT Digital Technology Co., Ltd. 2019. All rights reserved.
is the trademark of Shenzhen TVT Digital Technology Co., Ltd. In this Manual, the trademarks,
product names, service names, company names, products that are not owned by our company are the
properties of their respective owners.
Without the written consent of Shenzhen TVT Digital Technology Co., Ltd. (the “Company”), no entity or
individual may extract, copy, translate, revise, or distribute the content of this Manual (the “Manual”) in part or
all, or transmit in any form.
This manual is suitable for many models. All examples, screenshots, figures, charts, and illustrations used in
the manual are for reference purpose, and actual products may be different with this Manual.
Please read this user manual carefully to ensure that you can use the device correctly and safely.
Within the maximum scope permitted by the law, the products described in this Manual (including hardware,
software, firmware, etc.) are provided “AS IS”. The information in this document (including URL and other
Internet site reference data) is subject to change without notice. This Manual may contain technical incorrect
places or printing errors. This information will be periodically updated, and these changes will be added into the
latest version of this Manual.
Disclaimer
With regard to the product with internet access, the use of product shall be wholly at your own risks. The
company shall be irresponsible for abnormal operation, privacy leakage or other damages resulting from cyber
attack, hacker attack, virus inspection, or other internet security risks; however, the company will provide timely
technical support if necessary.
Surveillance laws vary from country to country. Check all laws in your local region before using this
product for surveillance purposes. We shall not take the responsibility for any consequences resulting from
illegal operations. In the event of any conflicts between this manual and the applicable law, the later prevails.
Notes
This product is intended to be supplied by a Listed Power Unit, marked with 'Limited Power Source', 'LPS'
on unit, output rated minimum 12V/2 A or POE 48V/ 350mA or AC24V (depending on models), no more than
2000m altitude of operation and Tma=60 Deg.C.
As for the modes with PoE function, the function of the ITE being investigated to IEC 60950-1 standard is
considered not likely to require connection to an Ethernet network with outside plant routing, including campus
environment and the ITE is to be connected only to PoE networks without routing to the outside plant.
Do not attempt to disassemble the camera; in order to prevent electric shock, do not remove screws or
covers.
There are no user-serviceable parts inside. Please contact the nearest service center as soon as possible if
there is any failure.
Avoid from incorrect operation, shock vibration, heavy pressing which can cause damage to product.
Do not use corrosive detergent to clean main body of the camera. If necessary, please use soft dry cloth to
wipe dirt; for hard contamination, use neutral detergent. Any cleanser for high grade furniture is applicable.
Avoid aiming the camera directly towards extremely bright objects, such as, sun, as this may damage the
image sensor.
Please follow the instructions to install the camera. Do not reverse the camera, or the reversing image will
be received.
Do not operate it in case temperature, humidity and power supply are beyond the limited stipulations.
Keep away from heat sources such as radiators, heat registers, stove, etc.
Do not expose the product to the direct airflow from an air conditioner.
Cybersecurity Recommendations
Use a strong password. At least 8 characters or a combination of characters, numbers, and upper and lower
case letters should be used in your password.
Regularly change the passwords of your devices to ensure that only authorized users can access the system
(recommended time is 90 days).
Upgrade the firmware of your device timely to ensure the system is current with the latest security patches
and fixes.
It is recommended to change the service default ports (like HTTP-80, HTTPS-443, etc.) to reduce the risk of
outsiders being able to access.
It is recommended to set the firewall of your router. But note that some important ports cannot be closed
(like HTTP port, HTTPS port, Data Port).
It is not recommended to expose the device to the public network. When it is necessary to be exposed to the
public network, please set the external hardware firewall and the corresponding firewall policy.
It is not recommended to use the v1 and v2 functions of SNMP.
In order to enhance the security of WEB client access, please create a TLS certificate to enable HTTPS.
Use black and white list to filter the IP address. This will prevent everyone, except those specified IP
addresses from accessing the system.
If you add multiple users, please limit functions of guest accounts.
If you enable UPnP, it will automatically try to forward ports in your router or modem. It is really very
convenient for users, but this will increase the risk of data leakage when the system automatically forwards ports.
Disabling UPnP is recommended when the function is not used in real applications.
Check the log. If you want to know whether your device has been accessed by unauthorized users or not,
you can check the log. The system log will show you which IP addresses were used to log in your system and
what was accessed.
Regulatory Information
FCC Information
1. FCC compliance
The products have been tested and found in compliance with the council FCC rules and regulations part 15
subpart B. These limits are designed to provide reasonable protection against harmful interference. This
equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance
with the instruction manual, may cause harmful interference to radio communication. However, there is no
guarantee that interference will not occur in a particular installation. The user will be required to correct the
interface at his own expense in case the harmful interference occurs.
2. FCC conditions:
Operation of this product is subject the following two conditions: (1) this device may not cause harmful interface,
and (2) this device must accept any interference received, including interference that may cause undesired
operation.
CE Information
The products have been manufactured to comply with the following directives.
EMC Directive 2014/30/EU
RoHS
The products have designed and manufactured in accordance with Directive EU RoHS Directive 2011/65/EU
and its amendment Directive EU 2015/863 on the restriction of the use of certain hazardous substances in
electrical and electronic equipment.
2012/19/EU (WEEE directive): The Directive on waste electrical and electronic equipment
(WEEE Directive). To improve the environmental management of WEEE, the improvement of
collection, treatment and recycling of electronics at the end of their life is essential. Therefore, the
product marked with this symbol must be disposed of in a responsible manner.
Directive 94/62/EC: The Directive aims at the management of packaging and packaging waste and
environmental protection. The packaging and packaging waste of the product in this manual refers to must be
disposed of at designated collection points for proper recycling and environmental protection.
1 Introduction ................................................................................................................... 1
2 Network Connection ...................................................................................................... 2
2.1 LAN ................................................................................................................................................ 2
2.1.1 Access through IP-Tool .................................................................................................. 2
2.1.2 Directly Access through IE ............................................................................................. 4
2.2 WAN ............................................................................................................................................... 5
3 Live View ........................................................................................................................ 8
4 Network Camera Configuration ................................................................................. 10
4.1 System Configuration.................................................................................................................... 10
4.1.1 Basic Information ......................................................................................................... 10
4.1.2 Date and Time .............................................................................................................. 10
4.1.3 Local Config ................................................................................................................. 11
4.1.4 Storage.......................................................................................................................... 11
4.2 Image Configuration ..................................................................................................................... 14
4.2.1 Display Configuration .................................................................................................. 14
4.2.2 Video / Audio Configuration ........................................................................................ 17
4.2.3 OSD Configuration ....................................................................................................... 18
4.2.4 Video Mask .................................................................................................................. 19
4.2.5 ROI Configuration ........................................................................................................ 20
4.2.6 Zoom/Focus .................................................................................................................. 21
4.3 PTZ Configuration ........................................................................................................................ 22
4.4 Alarm Configuration ..................................................................................................................... 22
4.4.1 Motion Detection .......................................................................................................... 22
4.4.2 Other Alarms ................................................................................................................ 24
4.4.3 Alarm In ....................................................................................................................... 26
4.4.4 Alarm Out..................................................................................................................... 26
4.4.5 Alarm Server ................................................................................................................ 28
4.5 Event Configuration ...................................................................................................................... 28
4.5.1 Exception...................................................................................................................... 28
4.5.2 Line Crossing ............................................................................................................... 30
4.5.3 Intrusion ....................................................................................................................... 32
4.5.4 Region Entrance ........................................................................................................... 34
4.5.5 Region Exiting.............................................................................................................. 35
4.5.6 Target Counting ............................................................................................................ 37
4.5.7 Face Detection .............................................................................................................. 39
4.6 Network Configuration ................................................................................................................. 41
4.6.1 TCP/IP .......................................................................................................................... 41
4.6.2 Port ............................................................................................................................... 42
4.6.3 Server Configuration .................................................................................................... 43
4.6.4 DDNS ........................................................................................................................... 43
Network Camera User Manual
1 Introduction
This IP-CAMERA (short for IP-CAM) is designed for high performance CCTV solutions. It
adopts state of the art video processing chips, integrated with the most advanced technologies
(like video encoding and decoding technology) to make the image transmission more stable
and smooth. Moreover, the built-in WEB server of this series improves the performance of the
traditional surveillance system so that users can be easy to operate and monitor.
This product is widely used in banks, telecommunication systems, electricity power
departments, law systems, factories, storehouses, uptowns, etc. In addition, it is also an ideal
choice for surveillance sites with middle or high risks.
Main Features
H.265+/ H.265 /H.264+/H.264 coding
Some models support H.265S / H.264S coding
ICR auto switch, true day/night
3D DNR, true WDR, ROI coding, BLC, HLC, Defog, Smart IR, NIR, Anti-flicker
Intelligent analytics
Support mobile surveillance by smart phones with iOS and Android OS
Surveillance Application
1
Network Camera User Manual
2 Network Connection
Connect IP-Cam via LAN or WAN. Here only take IE browser for example. The details are as
follows:
2.1 LAN
In LAN, there are two ways to access IP-Cam: 1. access through IP-Tool; 2. directly access
through IE browser.
① Make sure the PC and IP-Cam are connected to the LAN and the IP-Tool is installed in the
PC from the CD.
② Double click the IP-Tool icon on the desktop to run this software as shown below:
③ Modify the IP address. The default IP address of this camera is 192.168.226.201. Click the
information of the camera listed in the above table to show the network information on the
right hand. Modify the IP address and gateway of the camera and make sure its network
address is in the same local network segment as the computer’s. Please modify the IP address
of your device according to the practical situation.
2
Network Camera User Manual
For example, the IP address of your computer is 192.168.1.4. So the IP address of the camera
shall be changed to 192.168.1.X. After modification, please enter the password of the
administrator and click the “Modify” button to modify the setting.
④ Double click the IP address and then the system will pop up the IE browser to connect
IP-CAM. Follow directions to download, install and run the Active X control.
Enter the username and password in the login window to log in.
3
Network Camera User Manual
The system will pop up the above-mentioned textbox to ask you to change the default
password. It is strongly recommended to change the default password for account security. If
“Do not show again” is checked, the textbox will not appear next time.
Use the above default settings when logging in the camera for the first time. Directly connect
the camera to the computer through network cable.
① Manually set the IP address of the PC and the network segment should be as the same as
the default settings of the IP camera. Open the network and share center. Click “Local Area
Connection” to pop up the following window.
Select “Properties” and then select internet protocol according to the actual situation (for
example: IPv4). Next, click the “Properties” button to set the network of the PC.
4
Network Camera User Manual
② Open the IE browser and enter the default address of IP-CAM and confirm.
③ Follow directions to download and install the Active X control.
④ Enter the default username and password in the login window and then enter to view.
2.2 WAN
Access through the router or virtual server
① Make sure the camera is connected to the local network and then log in the camera via
LAN and go to ConfigNetworkPort menu to set the port number.
Port Setup
5
Network Camera User Manual
IP Setup
③ Go to the router’s management interface through IE browser to forward the IP address and
port of the camera in the “Virtual Server”.
Router Setup
④ Open the IE browser and enter its WAN IP and http port to access. (for example, if the http
port is changed to 81, please enter “192.198.1.201:81” in the address bar of web browser to
access).
Network connection
Access the camera through PPPoE auto dial-up. The setup steps are as follow:
6
Network Camera User Manual
③ Go to Config NetworkDDNS menu. Before configuring the DDNS, please apply for a
domain name first. Please refer to DDNS configuration for detail information.
④ Open the IE browser and enter the domain name and http port to access.
Network connection
7
Network Camera User Manual
3 Live View
The following table is the instructions of the icons on the live view interface.
8
Network Camera User Manual
Those smart alarm indicators will flash only when the camera supports those functions and
the corresponding events are enabled.
In full screen mode, double click on the mouse to exit or press the ESC key on the keyboard.
Click AZ control button to show AZ control panel. The descriptions of the control panel are as
follows:
Zoom - Zoom +
Focus - Focus +
One key focus (used when image is out of focus after manual adjustment
② Return to the live view interface. Click to go to the following interface. When there
are faces detected, the face pictures will be listed on the right.
9
Network Camera User Manual
Some versions may support device ID and QR code. If P2P is enabled (see Network
Configuration-P2P), the network camera can be quickly added to mobile surveillance client,
by scanning the QR code or entering device ID.
10
Network Camera User Manual
Additionally, “Local smart snapshot storage” can be enabled or disabled here. If enabled, the
captured pictures triggered by smart events (like line crossing detection, region intrusion, etc.)
will be saved to the local PC.
4.1.4 Storage
Go to ConfigSystemStorage to go to the interface as shown below.
11
Network Camera User Manual
SD Card Management
Click the “Format” button to format the SD card. All data will be cleared by clicking this
button.
Click the “Eject” button to stop writing data to SD card. Then the SD card can be ejected
safely.
Snapshot Quota: Set the capacity proportion of captured pictures on the SD card.
Video Quota: Set the capacity proportion of record files on the SD card.
3. Set schedule recording. Check “Enable Schedule Record” and set the schedule.
12
Network Camera User Manual
Weekly schedule
Set the alarm time from Monday to Sunday for a single week. Each day is divided in one hour
increments. Green means scheduled. Blank means unscheduled.
“Add”: Add the schedule for a special day. Drag the mouse to set the time on the timeline.
“Erase”: Delete the schedule. Drag the mouse to erase the time on the timeline.
Manual Input: Click it for a specific day to enter specific start and end times. This adds more
granularities (minutes).
Day schedule
Set the alarm time for alarm a special day, such as a holiday.
Note: Holiday schedule takes priority over weekly schedule.
Snapshot Settings
Go to ConfigSystemStorageSnapshot to go to the interface as shown below.
13
Network Camera User Manual
Set the format, resolution and quality of the image saved on the SD card and the snapshot
interval and quantity and the timing snapshot here.
Snapshot Quantity: The number you set here is the maximum quantity of snapshots. The
actual quantity of snapshots may be less than this number. Supposing the occurrence time of
an alarm event is less than the time of capturing pictures, the actual quantity of snapshots is
less than the set quantity of snapshots.
Timing Snapshot: Enable timing snapshot first and then set the snapshot interval and
schedule. The setup steps of schedule are the same as the schedule recording (See Schedule
Recording).
14
Network Camera User Manual
15
Network Camera User Manual
Set full time schedule for common, day, night mode and specified time schedule for day and
16
Network Camera User Manual
Drag “ ” icons to set the time of day and night. Blue means day time and blank means night
time. If the current mode of camera parameters is set to schedule, the image configuration
mode will automatically switch between day and night according to the schedule.
17
Network Camera User Manual
Bitrate type: CBR and VBR are optional. Bitrate is related to image quality. CBR means that
no matter how much change is seen in the video scene, the compression bitrate will be kept
constant. VBR means that the compression bitrate will be adjusted according to scene changes.
For example, for scenes that do not have much movement, the bitrate will be kept at a lower
value. This can help optimize the network bandwidth usage.
Bitrate: it can be adjusted when the mode is set to CBR. The higher the bitrate, the better the
image quality will be.
Video Quality: It can be adjusted when the mode is set to VBR. The higher the image quality,
the more bitrate will be required.
I Frame interval: It determines how many frames are allowed between a “group of pictures”.
When a new scene begins in a video, until that scene ends, the entire group of frames (or
pictures) can be considered as a group of pictures. If there is not much movement in the scene,
setting the value higher than the frame rate is fine, potentially resulting in less bandwidth
usage. However, if the value is set too high, and there is a high frequency of movement in the
video, there is a risk of frame skipping.
Video Compression: MJPEG, H264+, H264,H264S, H265, H265+, H265S can be optional.
MJPEG is not available for main stream. Compared to H.265, H.265+ saves more storage
space with the same maximum bitrate in most scenes. Compared to H.264, H.265 reduces the
transmission bitrate under the same resolution, frame rate and image quality. Compared to
H.265+/H.265, smart H.265 can spontaneously adjust the bitrate distribution according to the
requirements of the actual scene. For example, when there is no human or vehicle detected,
the bitrate will be automatically reduced with no effect on image quality by using H.265S.
If H.265/H.265+/H.265S is chosen, make sure the client system is able to decode
H.265/H.265+/H.265S.
Profile: For H.264. Baseline, main and high profiles are selectable.
Send Snapshot: How many snapshots to generate for an event.
Video encode slice split: If this function is enabled, smooth image can be gotten even though
using the low-performance PC.
Watermark: When playing back the local recorded video in the search interface, the
watermark can be displayed. To enable it, check the watermark box and enter the watermark
text.
Audio Encoding: G711A and G711U are selectable.
Audio Type: LIN. MIC can be optional for the model with built-in MIC.
LIN IN/MIC IN Volume: LIN IN Volume can be set here. If MIC is selected, MIC IN
volume can be set.
Audio Out Volume: This function is available for the model with audio out interface.
18
Network Camera User Manual
Set time stamp, device name, OSD content and picture overlap here. After enabling the
corresponding display and entering the content, drag them to change their position. Then click
the “Save” button to save the settings.
19
Network Camera User Manual
20
Network Camera User Manual
4.2.6 Zoom/Focus
This function is only available for the model with motorized zoom lens. Within this
section, zoom and focus can be controlled. If the image is out of focus after a manual
adjustment, one key focus can be used to set the focus automatically. Go to ConfigImage
Zoom/Focus interface to set.
21
Network Camera User Manual
22
Network Camera User Manual
1. Check “Enable” check box to activate motion based alarms. If unchecked, the camera will
not send out any signals to trigger motion-based recording to the NVR or CMS, even if there
is motion in the video.
Alarm Out: If selected, this would trigger an external relay output that is connected to the
camera on detecting a motion based alarm.
Trigger Snap: If selected, the system will capture images on motion detection and save the
images on an SD card.
Trigger SD Recording: If selected, video will be recorded on an SD card on motion
detection.
Trigger Email: If “Trigger Email” and “Attach Picture” are checked (email address must be
set first in the Email configuration interface), the captured pictures and triggered event will be
sent into those addresses.
Trigger FTP: If “Trigger FTP” and “Attach Picture” are checked, the captured pictures will
be sent into FTP server address. Please refer to FTP configuration chapter for more details.
2. Set motion detection area and sensitivity. Click the “Area and Sensitivity” tab to go to the
interface as shown below.
23
Network Camera User Manual
Move the “Sensitivity” scroll bar to set the sensitivity. Higher sensitivity value means that
motion will be triggered more easily.
Select “Add” and click “Draw”. Drag the mouse to draw the motion detection area; Select
“Erase” and drag the mouse to clear motion detection area.
After that, click the “Save” to save the settings.
3. Set the schedule for motion detection. The schedule setup steps of the motion detection are
the same as the schedule recording setup (See Schedule Recording).
SD Card Error
When there are some errors in writing SD card, the corresponding alarms will be triggered.
1. Go to ConfigAlarmAnomalySD Card Error as shown below.
24
Network Camera User Manual
IP Address Conflict
This function is only available for the models with Alarm Out interface.
1. Go to ConfigAlarmAnomalyIP Address Collision as shown below.
Cable Disconnection
This function is only available for the models with Alarm Out interface.
1. Go to ConfigAlarmAnomalyCable Disconnected as shown below.
25
Network Camera User Manual
4.4.3 Alarm In
This function is only available for some models. To set sensor alarm (alarm in):
Go to ConfigAlarmAlarm In interface as shown below.
1. Click “Enable” and set the alarm type, alarm holding time and sensor name.
2. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to
motion detection chapter for details.
3. Click “Save” button to save the settings.
4. Set the schedule of the sensor alarm. The setup steps of the schedule are the same as the
schedule recording setup. (See Schedule Recording).
26
Network Camera User Manual
Alarm Out Mode: Alarm linkage, manual operation, day/night switch linkage and timing are
optional.
Alarm Linkage: Having selected this mode, select alarm out name, alarm holding time at the
“Alarm Holding Time” pull down list box and alarm type.
Manual Operation: Having selected this mode, select the alarm type and click “Open” to
trigger the alarm out immediately; click “Close” to stop alarm.
Day/Night Switch Linkage: Having selected this mode, select the alarm type and then
choose to open or close alarm out when the camera switches to day mode or night mode.
Timing: Select the alarm type. Then click “Add” and drag the mouse on the timeline to set
the schedule of alarm out; click “Erase” and drag the mouse on the timeline to erase the set
time schedule. After this schedule is saved, the alarm out will be triggered in the specified
time.
27
Network Camera User Manual
4.5.1 Exception
This function can detect changes in the surveillance environment affected by the external
factors.
To set exception detection:
Go to ConfigEventException interface as shown below.
28
Network Camera User Manual
Drag the slider to set the sensitivity value or directly enter the sensitivity value in the textbox.
Click “Save” button to save the settings.
The sensitivity value of Scene Change Detection: The higher the value is, the more sensitive
the system responds to the amplitude of the scene change.
The sensitivity value of Video Blur Detection: The higher the value is, the more sensitive
29
Network Camera User Manual
1. Enable line crossing detection and select the snapshot type and the detection target.
Save Panoramic Picture: If it is enabled, the detected panoramic pictures will be captured
and saved to the SD card when the targets cross the alarm line.
Save Target Cutout: If it is enabled, the detected target cutout pictures will be captured and
saved to the SD card when the targets cross the alarm line.
Note: To save snapshots to the local PC, please enable “Local Smart Snapshot Storage” in the
local config interface first. To save snapshots to the SD card, please install an SD card first.
30
Network Camera User Manual
Detection Target:
Human: Select it and then alarms will be triggered if someone crosses the pre-defined alarm
lines.
Motor Vehicle: Select it and then alarms will be triggered if a vehicle with four or more
wheels (eg. a car, bus or truck) crosses the pre-defined alarm lines.
Motorcycle/Bicycle: Select it and then alarms will be triggered if a vehicle with two wheels
(eg. a motorcycle or bicycle) crosses the pre-defined alarm lines.
All of the three types of objects can be selected simultaneously. Please select the detection
objects as needed. If no object/target is selected, alarms will not be triggered even if line
crossing detection is enabled.
2. Set the alarm holding time.
3. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to
motion detection chapter for details.
4. Click “Save” button to save the settings.
5. Set area and sensitivity of the line crossing alarm. Click the “Area and Sensitivity” tab to
go to the interface as shown below.
Set the alarm line number and direction. Up to 4 lines can be added. Multiple lines cannot be
added simultaneously.
Direction:A<->B, A->B and A<-B optional. This indicates the direction of someone or a
vehicle crosses over the alarm line.
A<->B: Alarms will be triggered when someone or a vehicle crosses over the alarm line from
B to A or from A to B.
A->B: Alarms will be triggered when someone or a vehicle crosses over the alarm line from A
to B.
A<-B: Alarms will be triggered when someone or a vehicle crosses over the alarm line from B
to A.
Click the “Draw Area” button and then drag the mouse to draw a line in the image. Click the
“Stop Draw” button to stop drawing. Click the “Clear” button to delete the lines. Click the
“Save” button to save the settings.
6. Set the schedule of the line crossing alarm. The setup steps of the schedule are the same as
the schedule recording setup (See Schedule Recording).
31
Network Camera User Manual
4.5.3 Intrusion
Intrusion: Alarms will be triggered if the target intrudes into the pre-defined areas. This
function can be applicable to important supervision places, danger areas and prohibited areas,
like military administrative zones, high danger areas, no man’s areas, etc.
Go to ConfigEventIntrusion interface as shown below.
1. Enable intrusion detection and select the snapshot type and the detection target.
Save Panoramic Picture: If it is enabled, the detected panoramic pictures will be captured
and saved to the SD card when the targets intrude into the pre-defined areas.
32
Network Camera User Manual
Save Target Cutout: If it is enabled, the detected target cutout pictures will be captured and
saved to the SD card when the targets intrude into the pre-defined areas.
Note: To save snapshots to the local PC, please enable “Local Smart Snapshot Storage” in the
local config interface first. To save snapshots to the SD card, please install an SD card first.
Detection Target:
Human: Select it and then alarms will be triggered if someone intrudes into the pre-defined
area.
Motor Vehicle: Select it and then alarms will be triggered if a vehicle with four or more
wheels (eg. a car, bus or truck) intrudes into the pre-defined area.
Motorcycle/Bicycle: Select it and then alarms will be triggered if a vehicle with two wheels
(eg. a motorcycle or bicycle) intrudes into the pre-defined area.
All of the three types of objects can be selected simultaneously. Please select the detection
objects as needed. If no object/target is selected, alarms will not be triggered even if intrusion
detection is enabled.
2. Set the alarm holding time.
3. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to
motion detection chapter for details.
4. Click the “Save” button to save the settings.
5. Set the alarm area of the intrusion detection. Click the “Area” tab to go to the interface as
shown below.
Set the alarm area number on the right side. Up to 4 alarm areas can be added.
Click the “Draw Area” button and then click around the area where you want to set as the
alarm area in the image on the left side (the alarm area should be a closed area). Click the
“Stop Draw” button to stop drawing. Click the “Clear” button to delete the alarm area. Click
the “Save” button to save the settings.
6. Set the schedule of the intrusion detection. The setup steps of the schedule are the same as
schedule recording setup (See Schedule Recording).
33
Network Camera User Manual
2. Avoid the scenes with many trees or the scenes with various light changes (like many
flashing headlights). The ambient brightness of the scenes shouldn’t be too low.
3. Cameras should be mounted at a height of 2.8 meters or above.
4. Keep the mounting angle of the camera at about 45°.
5. The detected objects should not be less than 1% of the entire image and the largest sizes of
the detected objects should not be more than 1/8 of the entire image.
6. Make sure cameras can view objects for at least 2 seconds in the detected area for accurate
detection.
7. Adequate light and clear scenery are crucial to intrusion detection.
1. Enable region entrance detection and select the snapshot type and the detection target.
Save Panoramic Picture: If it is enabled, the detected panoramic pictures will be captured
and saved to the SD card when the targets enter the pre-defined areas.
Save Target Cutout: If it is enabled, the detected target cutout pictures will be captured and
saved to the SD card when the targets enter the pre-defined areas.
Note: To save snapshots to the local PC, please enable “Local Smart Snapshot Storage” in the
local config interface first. To save snapshots to the SD card, please install an SD card first.
Detection Target:
Human: Select it and then alarms will be triggered if someone enters the pre-defined area.
Motor Vehicle: Select it and then alarms will be triggered if a vehicle with four or more
wheels (eg. a car, bus or truck) enters the pre-defined area.
Motorcycle/Bicycle: Select it and then alarms will be triggered if a vehicle with two wheels
34
Network Camera User Manual
Set the alarm area number on the right side. Up to 4 alarm areas can be added.
Click the “Draw Area” button and then click around the area where you want to set as the
alarm area in the image on the left side (the alarm area should be a closed area). Click the
“Stop Draw” button to stop drawing. Click the “Clear” button to delete the alarm area. Click
the “Save” button to save the settings.
6. Set the schedule of the region entrance detection. The setup steps of the schedule are the
same as schedule recording setup (See Schedule Recording).
* The configuration requirements of camera and surrounding area are the same as intrusion
detection.
35
Network Camera User Manual
1. Enable region exiting detection and select the snapshot type and the detection target.
Save Panoramic Picture: If it is enabled, the detected panoramic pictures will be captured
and saved to the SD card when the targets exit from the pre-defined areas.
Save Target Cutout: If it is enabled, the detected target cutout pictures will be captured and
saved to the SD card when the targets exit from the pre-defined areas.
Note: To save snapshots to the local PC, please enable “Local Smart Snapshot Storage” in the
local config interface first. To save snapshots to the SD card, please install an SD card first.
Detection Target:
Human: Select it and then alarms will be triggered if someone exits from the pre-defined
area.
Motor Vehicle: Select it and then alarms will be triggered if a vehicle with four or more
wheels (eg. a car, bus or truck) exits from the pre-defined area.
Motorcycle/Bicycle: Select it and then alarms will be triggered if a vehicle with two wheels
(eg. a motorcycle or bicycle) exits from the pre-defined area.
All of the three types of objects can be selected simultaneously. Please select the detection
objects as needed. If no object/target is selected, alarms will not be triggered even if region
exiting detection is enabled.
2. Set the alarm holding time.
3. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to
motion detection chapter for details.
4. Click the “Save” button to save the settings.
5. Set the alarm area of the region exiting detection. Click the “Area” tab to go to the interface
as shown below.
36
Network Camera User Manual
Set the alarm area number on the right side. Up to 4 alarm areas can be added.
Click the “Draw Area” button and then click around the area where you want to set as the
alarm area in the image on the left side (the alarm area should be a closed area). Click the
“Stop Draw” button to stop drawing. Click the “Clear” button to delete the alarm area. Click
the “Save” button to save the settings.
6. Set the schedule of the region exiting detection. The setup steps of the schedule are the
same as schedule recording setup (See Schedule Recording).
* The configuration requirements of camera and surrounding area are the same as intrusion
detection
2. Enable target counting and select the snapshot type and the detection target.
Save Panoramic Picture: If it is enabled, the detected panoramic pictures will be captured
and saved to the SD card when the targets cross the pre-defined alarm line.
Save Target Cutout: If it is enabled, the detected target cutout pictures will be captured and
37
Network Camera User Manual
saved to the SD card when the targets cross the pre-defined alarm line.
Note: To save snapshots to the local PC, please enable “Local Smart Snapshot Storage” in the
local config interface first. To save snapshots to the SD card, please install an SD card first.
Detection Target: Select the target to calculate. Human, motor vehicle and
motorcycle/bicycle can be selected.
Counting Reset: The current number of the target counting can be reset. You can choose to
reset the counting daily, weekly or monthly. Click “Reset” to manually reset the current
number of crossing line people/car/bike counting.
3. Set the area of the target counting. Click the “Area” tab to go to the interface as shown
below.
Set the alarm line number and direction. Only one alarm line can be added.
Direction:A->B and A<-B can be optional. The direction of the arrow is entrance.
Click the “Draw Area” button and then drag the mouse to draw a line in the image. Click the
“Stop Draw” button to stop drawing. Click the “Clear” button to delete the lines.
Statistics: If enabled, you can see the statistical information in the live view interface. If
disabled, the statistical information will not be displayed in the live view interface.
Check “Statistics” and then move the red box to change the position of the statistical
information displayed on the screen. Click the “Save” button to save the settings.
4. Set the schedule of the target counting. The setup steps of the schedule are the same as
schedule recording setup (See Schedule Recording).
5. View the statistical information in the live view interface.
38
Network Camera User Manual
39
Network Camera User Manual
Click “Draw Area” and drag the border lines of the rectangle to modify its size. Move the
rectangle to change its position. Click “Stop Draw” to stop drawing the area. Click “Clear” to
clear the area. Then set the detectable face size by defining the maximum value and the
minimum value (The default size range of a single face image occupies from 3% to 50% of
the entire image).
5.Advanced settings. Choose the snapshot interval and number as needed to avoid capturing
multiple similar pictures in a very short period of time.
Snapshot Interval: If 5 seconds is selected, the camera will capture the same target once every
5 seconds during its continuous tracking period.
Snapshot Number: If the snapshot number is enabled and set (eg. 3), the camera will capture
the same target once every 5 seconds and it will capture this target 3 times at most during its
continuous tracking period. If the snapshot number is disabled, the camera will capture the
same target once every 5 seconds until the target disappears in the detected area.
6. Set the schedule of the face detection. The setup steps of the schedule are the same as
schedule recording setup (See Schedule Recording).
1. Cameras must be installed in the area with stable and adequate light sources.
2. The installation height ranges from 2.0m to 3.5m, adjustable according to the focal-length
of different lenses and object distances.
3. The depression angle of the camera shall be less than or equal to 15°.
4. The object distance depends on the focal-length of the lens mounted in the camera.
5. To ensure the accuracy of face detection, the captured faces are only allowed to deviate less
than 30° leftward or rightward or 20° upward or downward.
6. The following scenes are not applicable, like crowded scenes (airport, railway station,
square, etc), backlight scenes, crossroads and so on.
Use IP address (take IPv4 for example)-There are two options for IP setup: obtain an IP
address automatically by DHCP and use the following IP address. Please choose one of the
options as needed.
Test: Test the effectiveness of the IP address by clicking this button.
Use PPPoE-Click the “PPPoE Config” tab to go to the interface as shown below. Enable
41
Network Camera User Manual
PPPoE and then enter the user name and password from your ISP.
Either method of network connection can be used. If PPPoE is used to connect internet, the
camera will get a dynamic WAN IP address. This IP address will change frequently. To be
notified, the IP change notification function can be used.
Click “IP Change Notification Config” to go to the interface as shown below.
Trigger Email: when the IP address of the device is changed, the new IP address will be sent
to the email address that has been set up.
Trigger FTP: when the IP address of the device is changed, the new IP address will be sent to
FTP server that has been set up.
4.6.2 Port
Go to ConfigNetworkPort interface as shown below. HTTP port, Data port and RTSP
port can be set.
HTTP Port: The default HTTP port is 80. It can be changed to any port which is not
occupied.
HTTPS Port: The default HTTPs port is 443. It can be changed to any port which is not
42
Network Camera User Manual
1. Check “Enable”.
2. Check the IP address and port of the transfer media server in the ECMS/NVMS. Then
enable the auto report in the ECMS/NVMS when adding a new device. Next, enter the
remaining information of the device in the ECMS/NVMS. After that, the system will
automatically allot a device ID. Please check it in the ECMS/NVMS.
3. Enter the above-mentioned server address, server port and device ID in the corresponding
boxes. Click the “Save” button to save the settings.
4.6.4 DDNS
If the camera is set up with a DHCP connection, DDNS should be set for the internet.
1. Go to ConfigNetwork DDNS.
43
Network Camera User Manual
After the domain name is successfully applied for, the domain name will be listed as below.
3. Enter the username, password, domain you apply for in the DDNS configuration interface.
4. Click the “Save” button to save the settings.
4.6.5 SNMP
To get camera status, parameters and alarm information and remotely manage the camera, the
SNMP function can be used. Before using SNMP, please install an SNMP management tool
and set the parameters of the SNMP, such as SNMP port, trap address.
1. Go to ConfigNetworkSNMP.
44
Network Camera User Manual
2. Check the corresponding version checkbox (Enable SNMPv1, Enable SNMPv2, Enable
SNMPv3) according to the version of the SNMP software that will be used.
3. Set the values for “Read SNMP Community”, “Write SNMP Community”, “Trap Address”,
“Trap Port” and so on. Please make sure the settings are the same as that of the SNMP
software.
Note: Please use the different version in accordance with the security level you required. The
higher the version is, the higher the level of the security is.
4.6.6 802.1x
If it is enabled, the camera’s data can be protected. When the camera is connected to the
network protected by the IEE802.1x, user authentication is needed.
45
Network Camera User Manual
To use this function, the camera shall be connected to a switch supporting 802.1x protocol.
The switch can be reckoned as an authentication system to identify the device in a local
network. If the camera connected to the network interface of the switch has passed the
authentication of the switch, it can be accessed via the local network.
Protocol type and EAPOL version: Please use the default settings.
User name and password: The user name and password must be the same with the user name
and password applied for and registered in the authentication server.
4.6.7 RTSP
Go to ConfigNetworkRTSP.
Multicast Address
Main stream: The address format is
“rtsp://IP address: rtsp port/profile1?transportmode=mcast”.
Sub stream: The address format is
“rtsp://IP address: rtsp port/profile2?transportmode=mcast”.
Third stream: The address format is
46
Network Camera User Manual
Note:1. This camera support local play through a VLC player. Enter the RTSP address
(unicast or multicast, eg. rtsp://192.168.226.201:554/profile1?transportmode=mcast) in a
VLC player to realize the simultaneous play with the web client.
2. The IP address mentioned above cannot be the address of IPv6.
3. Avoid the use of the same multicast address in the same local network.
4. When playing the video through the multicast streams in a VLC player, please pay
attention to the mode of the VLC player. If it is set to TCP mode, the video cannot be played.
5. If the coding format of the video of the main stream is MJPEG, the video may be
disordered at some resolutions.
4.6.8 UPNP
If this function is enabled, the camera can be quickly accessed through the LAN.
Go to ConfigNetworkUPnP. Enable UPNP and then enter UPnP name.
4.6.9 Email
If you need to trigger Email when an alarm happens or IP address is changed, please set the
Email here first.
Go to ConfigNetwork Email.
47
Network Camera User Manual
4.6.10 FTP
After an FTP server is set up, captured pictures from events will be uploaded to the FTP
server.
Go to ConfigNetwork FTP.
48
Network Camera User Manual
4.6.11 HTTPS
HTTPs provides authentication of the web site and protects user privacy.
Go to Config NetworkHTTPS as shown below.
There is a certificate installed by default as shown above. Enable this function and save it.
Then the camera can be accessed by entering https://IP: https port via the web browser (eg.
https://192.168.226.201:443).
A private certificate can be created if users don’t want to use the default one. Click “Delete”
to cancel the default certificate. Then the following interface will be displayed.
49
Network Camera User Manual
* If there is a signed certificate, click “Browse” to select it and then click “Install” to install it.
* Click “Create a private certificate” to enter the following creation interface.
Click the “Create” button to create a private certificate. Enter the country (only two letters
available), domain (camera’s IP address/domain), validity date, password, province/state,
region and so on. Then click “OK” to save the settings.
* Click “Create a certificate request” to enter the following interface.
Click “Create” to create the certificate request. Then download the certificate request and
submit it to the trusted certificate authority for signature. After receiving the signed certificate,
import the certificate to the device.
50
Network Camera User Manual
4.6.13 QoS
QoS (Quality of Service) function is used to provide different quality of services for different
network applications. With the deficient bandwidth, the router or switch will sort the data
streams and transfer them according to their priority to solve the network delay and network
congestion by using this function.
Go to ConfigNetworkQoS.
Add user:
1. Click the “Add” button to pop up the following textbox.
51
Network Camera User Manual
Modify user:
1. Select a user to modify password and MAC address if necessary in the user configuration
list box.
2. The “Edit user” dialog box pops up by clicking the “Modify” button.
3. Enter the old password of the user in the “Old Password” text box.
4. Enter the new password in the “New password” and “Confirm Password” text box.
5. Enter computer’s MAC address as necessary.
6. Click the “OK” button to save the settings.
Note: To change the access level of a user, the user must be deleted and added again with the
new access level.
Delete user:
1. Select the user to be deleted in the user configuration list box.
2. Click the “Delete” button to delete the user.
Note: The default administrator account cannot be deleted.
52
Network Camera User Manual
An administrator user can kick out all the other users (including other administrators).
In order to prevent against malicious password unlocking, “locking once illegal login”
function can be enabled here. If this function is enabled, login failure after trying six times
will make the login interface locked. The camera can be logged in again after a half hour or
after the camera reboots.
53
Network Camera User Manual
Default Settings
Click the “Load Default” button to restore all system settings to the default factory settings
except those you want to keep.
4.8.2 Reboot
Go to ConfigMaintenanceReboot.
Click the “Reboot” button to reboot the device.
4.8.3 Upgrade
Go to ConfigMaintenanceUpgrade. In this interface, the camera firmware can be
updated.
54
Network Camera User Manual
1. Click the “Browse” button to select the save path of the upgrade file
2. Click the “Upgrade” button to start upgrading the firmware.
3. The device will restart automatically
Caution! Do not close the browser or disconnect the camera from the network during the
upgrade.
2. Select the main type, sub type, start and end time.
3. Click “Search” to view the operation log.
4. Click “Export” to export the operation log.
55
Network Camera User Manual
5 Search
56
Network Camera User Manual
2. Set time: Select date and choose the start and end time.
3. Choose the alarm events at the bottom of the interface.
4. Click to search the images.
5. Double click a file name in the list to view the captured photos.
Click to return to the previous interface.
57
Network Camera User Manual
Close: Select an image and click Close all: Click this button to
this button to close the image. close all images.
Save: Click this button to select Save all: Click this button to
the path for saving the image on select the path for saving all
the PC. pictures on the PC.
1. Choose “Record”—“Local”.
2. Set search time: Select the date and choose the start and end time.
3. Click to search the images.
4. Double click on a file name in the list to start playback.
58
Network Camera User Manual
Enable / disable audio; drag the slider to adjust the volume after
enabling audio.
59
Network Camera User Manual
The time table can be shown in 24H/12H/2H/1H format by clicking the corresponding
buttons.
Video clip and downloading
1. Search the video files according to the above mentioned steps.
2. Select the start time by clicking on the time table.
3. Click to set the start time and then this button turns blue ( ).
4. Select the end time by clicking on the time table. Then click to set the end time.
5. Click to download the video file in the PC.
60
Network Camera User Manual
Click “Set up” to set the storage directory of the video files.
Click “Open” to play the video.
Click “Clear List” to clear the downloading list.
Click “Close” to close the downloading window.
61
Network Camera User Manual
Appendix
Appendix 1 Troubleshooting
62
Network Camera User Manual
63
Network Camera User Manual
64