Hikvision DS-2CD4065F-A Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Hikvision DS-2CD4065F-A an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Hikvision DS-2CD4065F-A, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Hikvision DS-2CD4065F-A die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Hikvision DS-2CD4065F-A. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Hikvision DS-2CD4065F-A sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Hikvision DS-2CD4065F-A
- Den Namen des Produzenten und das Produktionsjahr des Geräts Hikvision DS-2CD4065F-A
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Hikvision DS-2CD4065F-A
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Hikvision DS-2CD4065F-A zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Hikvision DS-2CD4065F-A und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Hikvision finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Hikvision DS-2CD4065F-A zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Hikvision DS-2CD4065F-A, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Hikvision DS-2CD4065F-A widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Network Camera User Manual V5.2.0 UD.6L0201D1514A 01[...]

  • Seite 2

    User Manual of Network Camera 1 Thank you for purchasing our pr oduct. If there are any questions, or requ ests, please do not hesitate to contact the dealer. This manual applies to Network Camera (V5.2.0), and the detailed models are list below . T ype Model T ype I DS -2CD20 Series Cam era T ype II DS -2CD21 Series Cam era, DS - 2CD11 Series Came[...]

  • Seite 3

    User Manual of Network Camera 2 This manual may contai n several te chnical incorr ect places or printing errors, and the content is subject to change without notice. Th e updates will be added to the new version of this manual. W e will readily improve or update the products or procedure s described in the manual. DISCLAIMER STATEMENT “Underwrit[...]

  • Seite 4

    User Manual of Network Camera 3 Regulatory Information FCC Information FCC compliance: This equipment has been tested and found to compl y with the limits for a digital device, pursuant to part 15 of the FCC Rules. Thes e limits a re designed to provide reasonable protection against harmful interference when the equipment is operated in a commercia[...]

  • Seite 5

    User Manual of Network Camera 4 Safety Instruction These instructions are intended to ensure that the user can us e the prod uct correctly t o avoid danger or property loss. The precaution measure is divided into ‘W arning s’ and ‘Cautions’: W arnings : Serious injury or death ma y be caused if an y of these warnings are neglected. Cautions[...]

  • Seite 6

    User Manual of Network Camera 5 Cautions:  Make sure the power suppl y voltag e is correct before using the camera.  Do not drop the camera or subject it to physical shock.  Do not touch sensor modules with fingers. I f cleaning is necessary , use a c lean cloth with a bit of ethano l and wipe it gently . If the camera will not be use d fo[...]

  • Seite 7

    User Manual of Network Camera 6 T able of Contents Chapter 1 System R equir ement .................................................................................. 9 Chapter 2 Network Connection ............................................................................... 10 2.1 Setting the Ne twork Camera ov er the LA N.........................[...]

  • Seite 8

    User Manual of Network Camera 7 6.3.9 Email Sending T riggered by A larm ................................................................................ 48 6.3.10 Con figuring NA T (Network Address T ranslation) Settings ............................................ 50 6.3.1 1 Con figuring FTP Settings ..............................................[...]

  • Seite 9

    User Manual of Network Camera 8 Chapter 1 1 Others ................................................................................................ 1 17 1 1.1 Managing User Accounts .................................................................................... 1 17 1 1.2 Authentication .........................................................[...]

  • Seite 10

    User Manual of Network Camera 9 Chapter 1 System Requir ement Operating System: Microsoft W indows XP SP1 and above version / V ista / W in7 / Server 2003 / Server 2008 32bits CPU: Intel Pentium IV 3.0 GHz to Core i7-4000 series or higher , dependin g on dif ferent video resolutions RAM: 1G or higher Display: 1024× 768 resolution or higher W eb Br[...]

  • Seite 11

    User Manual of Network Camera 10 Chapter 2 Network Connection Befor e you start:  If y ou want to set the network camera via a LAN ( Local Are a Network), please refer to Section 2.1 Setting the Network Camera over the LAN .  If y ou want to set the network camera via a W AN (Wide Area Network), please refer to Section 2.2 Setting the Network[...]

  • Seite 12

    User Manual of Network Camera 11 Figure 2-2 Connecting via a Switch or a Router 2.1.2 Detec ting and Changing the IP Addre ss You need the IP address to visit the network camera. Steps: 1. To get the IP address, you can c hoose either of the following methods:  Use SADP, a soft ware tool which can auto matically detect the on line network camera[...]

  • Seite 13

    User Manual of Network Camera 12 Figure 2-3 SADP I nterface 2.2 Setting the Network Camera over the W AN Purpose: This section explains how to connect the network camera to the W AN with a static IP or a dynamic IP . 2.2.1 S tatic IP Connection Befor e you start: Please appl y a static IP from an ISP (Internet Service P rovider). With the static IP[...]

  • Seite 14

    User Manual of Network Camera 13 2. Assign a LAN IP address, the subnet mask and the gateway . Refer to S ection 2.1.2 Detecting an d Changing the IP Address for detailed I P address c onfiguration of the camera. 3. Save the static IP in the router . 4. Set port mapping, e.g., 8 0, 8000, and 554 ports. The steps for port mappi ng var y according to[...]

  • Seite 15

    User Manual of Network Camera 14 1. Connect the network camera to the router . 2. In the camera, assi gn a LAN IP address, the subnet mask and the gateway . R efer to Section 2.1.2 De tecting and Ch anging the IP Address for detailed LAN configuration. 3. In the router , set the PPPoE user name, password and confirm the password. 4. Set port mappin[...]

  • Seite 16

    User Manual of Network Camera 15 Figure 2-7 Normal Domain Name Resolution S teps: 1. Apply a domain name from a domain name provider . 2. Configure the DDNS sett ings in the DDNS Set tings interface of the network camera. Refer to Section 6.3.4 Configuring DDNS Settings for detailed configuration. 3. V isit the camera via the applied domain name. ?[...]

  • Seite 17

    User Manual of Network Camera 16 Chapter 3 Access to the Netw ork Camera 3.1 Accessing by W eb Br o wsers Steps: 1. Open the web browser. 2. Input the IP address of the network camera in the address bar, e.g., 192.0.0.64 and press the Enter key to enter the login interface. 3. Input the user name and password and click Login . Figure 3-1 Login Inte[...]

  • Seite 18

    User Manual of Network Camera 17 Figure 3-2 Download and Install Plug- in Figure 3-3 Install Plug-in (1) Figure 3-4 Install Plug-in (2) Note: You may have to close the web browser to install the plug-in. Please reopen the web browser and log in again after installing the plug-in.[...]

  • Seite 19

    User Manual of Network Camera 18 3.2 Accessing by Client Softwar e The product CD contains the iVMS-4200 client software . Y ou can view the live video and manage the camera with the software. Follow the installation prompts to install the software. The control panel and live view interface of iVMS-4200 client software are shown as bellow. Figure 3[...]

  • Seite 20

    User Manual of Network Camera 19 Figure 3-6 iVMS-4200 Configuration Panel Note: For detailed information about the software, please refer to the user manual of the iVMS-4200.[...]

  • Seite 21

    User Manual of Network Camera 20 Chapter 4 Wi -Fi Set tings Purpose: By conne cting to the wireless network, you don ’t need to use cable of an y kind for network connection, which is very c onvenient for the actual surveillance application. Note: This chapter is only applicable for the cameras with the built -in Wi -Fi module. 4.1 Configuring W [...]

  • Seite 22

    User Manual of Network Camera 21 4. Check the checkbox to select the Network mode as Manage, and the Security mode of the network is automatically shown when you select the wireless network, please don’ t change it manuall y . Note: These parameters a re exactly identical with those of the r oute r . 5. Enter the key to connect the wireless netwo[...]

  • Seite 23

    User Manual of Network Camera 22 Figure 4-5 Ad -hoc Connection Point 6. Choose the SSID and connect. Security Mode Description: Figure 4-6 Security Mode Y ou can choose the Securit y Mod e as not-encr ypted, WEP , WP A-personal, WP A-e nterprise, WP A2-personal, and W P A2-enterprise. WEP mode: Figure 4-7 WEP Mode  Authentication - Select Open o[...]

  • Seite 24

    User Manual of Network Camera 23 the method used by y o ur access point. Not all acce ss points h ave this opti on, in which case the y probably us e Open S ystem, whi ch is sometimes known as SS I D Authentication.  Key length - This sets th e len gth of the ke y used for the wireless encryption, 64 or 128 bit. The encr yption ke y len gth can [...]

  • Seite 25

    User Manual of Network Camera 24 Figure 4-9 EAP-TLS  Identity - Enter the user ID to present to the network.  Private key password – Enter the password for your user ID.  EAPOL version - Select the version used (1 or 2) in your access point.  CA Certificates - Uplo ad a C A certificate to present to the access p oint for authenticatio[...]

  • Seite 26

    User Manual of Network Camera 25 WPS (W i-Fi Protected Setup) refers to the easy configuration of the e n crypted connection between the device and the wireless router . Th e WPS makes it easy to add new devices to an existing ne twork without entering long passphrases. There are two modes of the WP S connection, the PBC mode and the PIN mode. Note[...]

  • Seite 27

    User Manual of Network Camera 26 4. Push the WPS button to enable the fun ction on the camera. If ther e is not a WP S button on the c ame ra, y ou can also c li ck the virtual button to enable the PBC function on the web interface. 5. Click Conn ect button. When the PBC mode is both enabled in the router and th e c amera, the camera and th e wirel[...]

  • Seite 28

    User Manual of Network Camera 27 3. Click Conn ect . Or Y ou can generate the PIN code on the camera si de. And the ex pired time for the P IN code is 120 seconds. 1. Click Generate . 2. Enter the code to the router , in the example, enter 48167581 to the router . 4.3 IP Pr operty Settings for W irele ss Network Connection The default IP add ress o[...]

  • Seite 29

    User Manual of Network Camera 28 Chapter 5 Live V ie w 5.1 Live V iew Page Purpose: The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters. L og in the network camera to enter the li ve view page, or you c an click Live V iew on the menu bar of the main page to[...]

  • Seite 30

    User Manual of Network Camera 29 Click each tab to adjust the layout and the stream type of the live vi ew . And you can click the drop -down t o select the plu g-in. F or IE (internet explorer) us er , webcomponents and quick time are selectable. And for Non -IE user , webcomponents, quick time, VLC or MJPEG is selectable if they are supported by [...]

  • Seite 31

    User Manual of Network Camera 30 Live view with the third stream. Click to select the third-party plug- in . Manually capture the picture. / Manually start/stop recording. / Audio on and adjust volume /Mute. / Turn on/off microphone. / Turn on/off 3D zooming function. 5.3 Recording and Capturing Pictur es Manually In the live view int erface, click[...]

  • Seite 32

    User Manual of Network Camera 31 Figure 5-3 PTZ Control Panel Click the zoom/iris/focus buttons to realize lens control. Notes :  There are 8 dir ection arr ows ( , , , , , , , ) in the live view window when you click and drag the mouse in the relative positions.  For the cameras which support lens movements only , the direction butt ons ar e[...]

  • Seite 33

    User Manual of Network Camera 32 2. Use the PT Z control buttons to move the lens to the desired position. • Pan the camera to the right or left. • Tilt the camera up or down. • Zoom in or out. • Refocus the lens. 3. C lick to finish the setting of the current preset. 4. You can click to delete the preset. Note : Y ou can configure up to 12[...]

  • Seite 34

    User Manual of Network Camera 33 1. C lick to enter the patrol configuration interface. 2. S elect a path No., and click to add the configured presets. 3. S elect the preset, and input the patrol duration and patrol speed. 4. C lick OK to save the first preset. 5. Follow the steps above to add the other presets. Figure 5-6 Add Patrol Path 6. Click [...]

  • Seite 35

    User Manual of Network Camera 34 Chapter 6 Network Camera Configuration 6.1 Configuring Local Parameters Note: The local configuration refers to the parameters of the live vi ew , record files and captured pictures. The record files and captured pictures are the ones y ou record and captured using the web browser and thus the saving paths of them a[...]

  • Seite 36

    User Manual of Network Camera 35 streaming under some network environments. MUL TICAST : It’ s recommended to select MCAST type wh en using the Multicast function. For detailed information about Multicast, refer to Section 6.3.1 TCP/IP Settings .  Live V iew Performance: Set the live view performance to Shortest Delay , Real T im e, Balanced o[...]

  • Seite 37

    User Manual of Network Camera 36 6.2 Configuring Time Settings Purpose: Y ou can follow the instructions in this section to configure the time synchronization and DST setti ngs. S teps: 1. Enter the T ime Settings interface: Configuration > Basic Configuration > System > Time Settings Or Configuration > Advanced Conf iguration > Syst[...]

  • Seite 38

    User Manual of Network Camera 37 Figure 6-3 T ime Sync by NTP S erver Note : If the camera is connected to a public network, y ou should use a NTP server that has a time s ynchronization function, such as the s erver at the National T im e Center (IP Address: 210.72.145.44). If the camera is set in a customized network, NTP software can be used to [...]

  • Seite 39

    User Manual of Network Camera 38 6.3 Configuring Network Settings 6.3.1 Configuring TCP/IP Settings Purpose: TCP/IP settings must be properly configured before you ope r ate the camera over network. The camera supports both the IPv4 and IPv6. Both versions may be configured simultaneously without conflicting to each other, and at least one IP versi[...]

  • Seite 40

    User Manual of Network Camera 39 and Multicast Address. Notes :  The valid value range of MTU is 500 ~ 1500.  The Multicast sends a stream to the multicast group address and allows multiple clients to acquire the stream at the same time by requesting a cop y from the multicast group address. Before utilizing this function, you have to enable [...]

  • Seite 41

    User Manual of Network Camera 40 HTTPS Port: The default port number is 443, and it can be changed to any port No. which is not occupied. Server Port: The default server port number is 8000, and it ca n be changed to any port No. ranges from 2000 to 65535. 3. Click Save to save the settings. Note : A reboot is required for the settings to take effe[...]

  • Seite 42

    User Manual of Network Camera 41 Registration on the DDNS server is required before configuring the DDNS settings of the camera. S teps: 1. Enter the DDNS Settings interface: Configuration > Advanced Configuration > Network > DDNS Figure 6-9 DDNS Settings 2. C heck the Enable DDNS checkbox to enable this feature. 3. S elect DDNS Type . Fou[...]

  • Seite 43

    User Manual of Network Camera 42 Figure 6-10 DynDNS Settings  IP Server: Steps: (1) Enter the Server Address of the IP Server. (2) Click Save to save the settings. Note: For the IP Server, you have to apply a static IP, subnet mask, gateway and preferred DNS from the ISP. The Server Address should be entered with the static IP address of the com[...]

  • Seite 44

    User Manual of Network Camera 43 Figure 6-12 NO -IP Settings (2) Enter the Server Address as www.noip.com (3) Enter the Domain name you registered. (4) Enter the Port number, if needed. (5) Enter the User Name and Password. (6) Cli ck Save and then you can view the camera with the domain name.  HiDDNS Steps: (1) Choose the DDNS T ype as HiDDNS. [...]

  • Seite 45

    User Manual of Network Camera 44 6.3.5 Configuring SNMP Settings Purpose: You can set th e SNMP function to get camera status, parameters and alarm related information and manage the camera remotely when it is connected to the network. Befor e you start: Before s etting the SN MP, please download t he SNMP software and manage to receive the camera [...]

  • Seite 46

    User Manual of Network Camera 45 Figure 6-14 SNMP Settings 2. C heck the corresponding version checkbox ( , , ) to enable the feature. 3. C onfigure the SNMP settings. Note: The settings of the SNMP software should be the sa me as the settings you configure here. 4. C lick Save to save and finish the settings. Note : A reboot is require d for the s[...]

  • Seite 47

    User Manual of Network Camera 46 6.3.6 Configuring 802.1X Settings Purpose: The IEEE 802.1X standard is supported b y the network cameras, and when the feature is enabled, the camera data is secured and u ser auth entication is needed when connecting the camera to the network protected by the IEEE 802.1X. Befor e you start: The authentication serve[...]

  • Seite 48

    User Manual of Network Camera 47 6.3.7 Configuring QoS Settings Purpose: QoS (Quality of S ervice) can help solve the network del a y and network congestion b y configuring the priority of data sending. S teps: 1. Enter the QoS Settings interface: Configuration >Advanced Configuration > Network > QoS Figure 6-16 QoS Settings 2. Configure t[...]

  • Seite 49

    User Manual of Network Camera 48 and the camera is connected to the Wide Ar e a Network via the router . S teps: 1. Enter the UPnP™ settings interface. Configuration >Advanced Configuration > Network > UPnP 2. Check the checkbox to enable the UPnP™ function. The name of the device when detected online can be edited. Figure 6-17 Configu[...]

  • Seite 50

    User Manual of Network Camera 49 Figure 6-18 Email Settings 3. Configure the following settings: Sender: The name of the email sender . Sender’ s Add r ess: The email address of the se nd er . SMTP Server: The S MTP Server IP address or host name (e.g., smtp.263xmail.com). SMTP Port: The SMTP port. The default TCP/IP port for SMTP is 25 (not secu[...]

  • Seite 51

    User Manual of Network Camera 50 Authentication (optional): If your email server requires authentication, check this checkbox to use authentication to log in to this server and enter th e login user Name and password. Choose Receiver: Select the receiver to which the email is sent. Up to 2 receivers can be configured. Receiver: The nam e of the use[...]

  • Seite 52

    User Manual of Network Camera 51 6.3.11 Configu ring FTP Settin gs Purpose: Y ou can configure the FTP server re l ated information to e nable the uploading of th e captured pictures to the FTP server . The captured pictures can be trigger ed by events or a timing snapshot task. S teps: 1. Enter the FTP Settings interface: Configuration >Advance[...]

  • Seite 53

    User Manual of Network Camera 52 3. Click Save to save the settings. Note : If you w ant to upload the captured pictures to FTP server , you have to enable the continuous snapshot or ev ent-triggered snapshot on Snapshot page. For detailed information, please refer to the Section 6.6.7. 6.3.12 Platfo rm Access Platform access provides you an option[...]

  • Seite 54

    User Manual of Network Camera 53 Configuration > Advanced Configu ration > Network > HTTPS 2. Create the self-signed certificate or authorized certificate. Figure 6-22 HTTPS Settings  Create the self-signed certificate 1) Click Create button to enter the creation interface. Figure 6-23 Create Self-signed Certificate 2) Enter the countr [...]

  • Seite 55

    User Manual of Network Camera 54 Note: If y ou a lready h ad a certificate inst alled, the Create Self-signed Ce rtificate is gr a yed out.  Create the authorized certificate 1) Click Create button to create the certificate request. 2) Download the certificat e request and submit it to the trusted certificate authority for signature. 3) After re[...]

  • Seite 56

    User Manual of Network Camera 55 Figure 6-25 Configure V ideo Settings 2. Select the S tream T ype of the camera to main str eam (normal), sub -stream or third stream. The main strea m is usuall y for recording and live viewin g with g ood bandwidth, and the sub-stream and third stream can b e u sed for live viewing when the bandwidth is limited. 3[...]

  • Seite 57

    User Manual of Network Camera 56 A higher frame rate is advantageous when there is movement in the video stream, as it maintains image quality throu ghout. Max. Bitrate: Set the max . bitrate to 32~16384 Kbps. The hi gher value corresponds to th e higher video quality , but t he higher bandwidth is required. V ideo Encoding: If the S tream T ype is[...]

  • Seite 58

    User Manual of Network Camera 57 Or Configuration > Advanced Conf iguration > V ideo / Audio > Audio Figure 6-26 Audio Settings 2. Configure the following settings. Audio Encoding: G .722.1, G .71 1 ulaw , G .71 1alaw , G .726, and MP2 L2 are selectable. And 32kbps, 64kbps, and 128kbps are supported if MP2L2 is selected. Audio Input: MicIn[...]

  • Seite 59

    User Manual of Network Camera 58 Figure 6-27 Region of Interest Setting s 2. Draw the region of interest on the image. There are f our r egions can be drawn. 3. Choose the stream t ype to set the ROI encoding. 4. Choose the ROI type. There are two options for ROI encoding, the fix ed reg ion encoding and the dynamic tracking.  The fixed region e[...]

  • Seite 60

    User Manual of Network Camera 59  The d y namic region refers to the ROI defined b y int elligent anal ysis such as human face detection. Y o u can choose the Image Quality Enhancing level for the ROI encoding. 5. Click Save to save the settings. 6.4.4 Display Info. on S tr eam Check the checkbox to enable the function of Dual-VCA which can be u[...]

  • Seite 61

    User Manual of Network Camera 60 sets of parameters for user to configure. Day/night Auto-s witch Figure 6-29 Display Settings of Day/night Auto-switch  Image Adjust ment Brightness describes bright of the ima ge, which ranges from 1~100, a nd the default value is 50. Contrast desc ribes the contrast of the image, which ranges from 1 ~100, and t[...]

  • Seite 62

    User Manual of Network Camera 61 is selec table, e.g.: T amron 2.8-8mm F1.2 ( M13VP288- IR ), or if DC lens is a dopted, then manual and auto are selectable. The exposure time refers to the electronic shu tter time , which r anges from 1 ~ 1/100,000s. Adjust it according to the actual luminance co ndition.  Focus Settings For the camera supports[...]

  • Seite 63

    User Manual of Network Camera 62 T rigger ed by alarm inpu t: The switch is triggered by alarm input, and you ca n set the triggered mode to day or night. Smart IR gives user an option to turn ON / OFF the IR LED. Set the smart IR to ON , and Auto and M anual are s electable for IR mode. Select AUT O, and the IR LED changes a ccordin g to the actua[...]

  • Seite 64

    User Manual of Network Camera 63 Mode and Expert Mode are selectable. Set the DNR level from 0~100, an d the default value is 50 in Normal Mode. Set the DNR level from both space DNR level [0~100] and time DNR level [0~100] in Expert Mode. Defog Mode : Y ou c an enable the defog function when the environment i s foggy and the image is misty . It en[...]

  • Seite 65

    User Manual of Network Camera 64 Figure 6-32 Day/Night Scheduled-Switch Configuration Interface S teps: 1. Click the time li ne to select the start tim e and the end time of the switch. 2. Click Common tab to configure the common parameters applicable to the day mode and night mode. Note: The detailed information of e ach parameter please refers to[...]

  • Seite 66

    User Manual of Network Camera 65 Figure 6-33 OSD Settings 2. C heck the co rresponding checkbox to select th e displa y of cam era n ame, date or week if required. 3. Edit t he camera name in the text field of Camera Name . 4. S elect from the drop-down list to set the time format, date format, display mode and the OSD font size. 5. Define the font[...]

  • Seite 67

    User Manual of Network Camera 66 Figure 6-35 Adjust OSD Location 7. C lick Save to activate the above settings. 6.5.3 Configuring T ext Overlay Settings Purpose: Y ou can customize the text overlay . S teps: 1. Enter the T ext Overlay Settings interfac e: Configuration > Advanced Configuration > Image > T ext Overlay Figure 6-36 T ext Over[...]

  • Seite 68

    User Manual of Network Camera 67 2. C heck the checkbox in front of textbox to enable the on-screen display . 3. Input the characters in the textbox. 4. (Optional)Use the mouse to click and drag the r ed text frame in the live view window to adjust the text overlay position. 5. C lick Save . Note: Up to 8 text overlays are configurable. 6.5.4 Confi[...]

  • Seite 69

    User Manual of Network Camera 68 5. Click S top Drawing to finish drawing or click Clear All to clear all of the areas you set without saving them. 6. Click Save to save the settings. 6.5.5 Configuring Pictur e Overlay Purpose: Picture overla y enables you to overlay a pictur e o n the ima ge. This function enables a certain enterprise or users to [...]

  • Seite 70

    User Manual of Network Camera 69 6.6 Configuring and Handling Alarms This section ex plains how to configure the netwo rk camera to r espond to a larm events, including motion detection, video tampering, alarm input, alarm output, exception, face detection, audio ex ception detection, int rusion detection, defocus dete ction, and scene change detec[...]

  • Seite 71

    User Manual of Network Camera 70 Configuration > Advanced Configuration> Events > Motion Detection (2)Check the checkbox of Enable Motion Detection. (3)Check the checkbox of Enable Dynamic Analysis for Motion if you want to mark the detected objects with green rectangle s. Note: Select Disable for rules if you don’ t want the detected ob[...]

  • Seite 72

    User Manual of Network Camera 71 Figure 6-40 Arming T im e (1)Click Edit to edit the arming schedule. The Figure 6-34 shows the editing interface of the arming schedule. (2)Choose the day you want to set the arming schedule. (3)Click to set the time period for the arming schedule. (4)(Optional) After you se t t he arming schedule, y ou can copy the[...]

  • Seite 73

    User Manual of Network Camera 72 3. Set the Alarm Actions for Motion Detection. Check the checkbox to select the linkage meth od. Notify su rveillance center , send email, upload to FTP , trigger channel and tri gger alarm output are selectable. Y ou can specify the linkage method when an event occurs. Figure 6-42 Linkage Method  Audible Warning[...]

  • Seite 74

    User Manual of Network Camera 73 detailed information.  T rigger Alar m Output Trigger one or more external alarm outputs when an event occurs. Note: T o trigger an ala rm output whe n a n e vent oc curs , please refer to Section 6.6.4 to set the related parameters.  Expert Conf ig uratio n Expert mode is mainly used to configure the sensitiv[...]

  • Seite 75

    User Manual of Network Camera 74  Day/Night Auto-Switch S teps: (1) Draw the detection area as in the normal configuration mode. Up to 8 areas are supported. (2) Select Auto-Switch for Switch Day and Night Settings . Figure 6-44 Day/Night Auto-Switch (3) Select the area by clicking the area No. (4) Slide the cursor to adjust the sensitivity and [...]

  • Seite 76

    User Manual of Network Camera 75 Figure 6-45 Day/Night Scheduled-Switch (3) Select the start time and the end time for the switch timing. (4) Select the area by clicking the area No. (5) Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area in the daytime. (6) Slide the cursor to adjust the sensitivit[...]

  • Seite 77

    User Manual of Network Camera 76 Figure 6-46 V ideo T ampering Alarm 2. Check Enable V id eo T amper in g checkbox to enable the video tampering detection. 3. Set the video tampering area; re f er to T ask 1 Set the Motion De tection Area in Section 6.6.1. 4. Click Edit to edit the arming schedule for video tampering. Th e armin g schedule configur[...]

  • Seite 78

    User Manual of Network Camera 77 2. Choose the alarm input No. and the Alarm T ype. The alarm t ype can be NO (Normally Open) and NC (Normally Closed). Edit the name to set a name for the alarm input (optional). Figure 6-47 Alarm Input Settings 3. Click Edit to set the arming schedule for the alarm input. Refer to T ask 2 Set the Arming Schedule fo[...]

  • Seite 79

    User Manual of Network Camera 78 Configuration>Advanced Configuration> Events > Alarm Output 2. Select one alarm output channel in the Alarm Outpu t drop-down list. Y ou can also set a name for the alarm output (optional). 3. The Delay time can be set to 5sec, 10sec, 30sec, 1min, 2 min, 5min, 10min or Manual . The de la y time refers to th[...]

  • Seite 80

    User Manual of Network Camera 79 S teps: 1. Enter the Exception Settings interface: Configuration > Advanced Configuration> Events > Exception 2. Check the checkbox to set the actions taken for the Exception alarm. Refe r to T ask 3 Set the Alarm Actions T aken for Motion Detection in Section 6.6.1. Figure 6-49 Exception Settings 3. Click [...]

  • Seite 81

    User Manual of Network Camera 80 Figure 6-50 Face Detection Interface S teps: 1. Enter the face detection settings int erface: Configuration > Advanced Configuration > Events > Face Detection 2. Check the Enable Face Detection to checkbox to enable the function. 3. (Optional)Y ou can check the Enable D ynamic Analysis for F ace Detection c[...]

  • Seite 82

    User Manual of Network Camera 81 5. Configure the linkage action for face detection. Note : The face detection is only supported by a certain series of camera modes. 6.6.7 Configuring Audio Exception Detection Purpose: Audio exception detection detects the a bnormal sounds, including the audio input exception, sound intensity steep rise, sound in[...]

  • Seite 83

    User Manual of Network Camera 82 Figure 6-51 Audio Exception Configuration 6.6.8 Configuring Line Crossing Detec ti on This function can be used for detecting people, vehicles and objects crossing a pre-defined area. The line crossing direction can be set as bidirectional, from left to right or from right to left. And a series of linkage method wil[...]

  • Seite 84

    User Manual of Network Camera 83 Figure 6-52 Draw Crossing Line And you can select the directions as A<->B, A ->B, and B- >A .  A< ->B : Only the arrow on the B side shows; when an object going across the plane with both direction can be detected and alarms are triggered.  A->B : Only the object crossing the configured li[...]

  • Seite 85

    User Manual of Network Camera 84 Steps: 1. C heck the Enable Intrusion Detection checkbox. 2. C lick Draw Area , and then draw a rectangle on the image as a defense region. Note: when you draw the rectang le, all lines should connect end to end to each other. Up to four areas are supported. Figure 6-53 Configuring Intrusion Area You can click Clear[...]

  • Seite 86

    User Manual of Network Camera 85 enabl ed . 1. C lick Edit to set the arming schedule. 2. C hoose to trigger alarm actions as Notify Surveillance Ce n ter , Send Email , Upload to FTP and Trigger Channel or trigger the Alarm Output . 3. C lick Save to save the settings. 6.6.10 Configu ring Defocus Detection Purpose: The image blur caused by defocus[...]

  • Seite 87

    User Manual of Network Camera 86 change of scene can trigger the alarm. Arming Schedule is configured to set the time you want the function to be enabled. 2. C lick Edit to set the arming schedule. 3. C hoose to trigger alarm actions as Notify Surveillance Ce n ter and Send Email , or trigger the Alarm Output . 4. C lick Save to save the settings. [...]

  • Seite 88

    User Manual of Network Camera 87 Figure 6-56 Behavior Analysis  VCA Info Behavior Analysis V ersion: It lists the version of the algorithms library . Display information includes the display on picture and display on stream. Display T arget info. on Alar m Pictur e : There will be a frame on the target on the uploaded alarm picture if the checkb[...]

  • Seite 89

    User Manual of Network Camera 88 1. C heck the checkbox of Camera Calibration to enable this function. 2. S elect the calibration mode as Input Basic Data or Dra w on Live V iew V ideo. Input Basic Data : Input the mounting h eight, viewing angle, and horizon ratio of the camera manually . Draw on L ive V iew V id eo : Click Draw V erification Line[...]

  • Seite 90

    User Manual of Network Camera 89 1. C lick Shield Region tab to enter the shield region configuration interface. 2. C lick Draw Are a . Draw area by left click end-points in the live view window , and right click to finish the area drawing. Notes: ● Polygon area with up to 10 sides is supported. ● Click Delete to delete the drawn area s. ● If[...]

  • Seite 91

    User Manual of Network Camera 90 S teps: 1. C lick Rule T ab to enter the rule configuration interface. 2. C heck the checkbox of Rule to enable rules of behavior analysis. 3. S elect the rule type as None, Line Crossing, Intrusion, Region Entrance, and Region Exiting. Notes: ● If you select the rule type as None, the rule option is invalid, and [...]

  • Seite 92

    User Manual of Network Camera 91 Figure 6-59 Advanced Configuration Detection S ensitivity [0~4]: Refers to the s ensitivit y of the camera detects a tar get. The higher the v alue, the easier a target be reco gnized, and the higher t he misinformation is. The de fault value of 3 is recommended. Backgr ou nd Update Rate [0~4] : It refers to the spe[...]

  • Seite 93

    User Manual of Network Camera 92 2. S elect the Filter T ype a s Actual Siz e or Pixel. Actual Size : I nput the length a nd width of both the max imum si z e and the minimum size. Only the target size is between the min. size and max . si z e will trigger the alarm. Notes: ● Camera calibration has to be configured if you select the filter b y ac[...]

  • Seite 94

    User Manual of Network Camera 93 Figure 6-60 Face Capture  VCA Info Face Capture V ersion : It lists the version of the algorithms library . Display information includes the display on picture and display on stream. Display T arget info. on Alar m Pictur e : There will be a frame on the tar get on the uploaded alarm picture if the checkbox is ch[...]

  • Seite 95

    User Manual of Network Camera 94  Rule S teps: 1. C heck the checkbox of Rule to enable rules of face ca ptur e. 2. C lick Minimize Pupil Distance to draw the minimum pupil distance. The distance of the drawn pupil will be displayed on the box below the live view . The minimize pupil distance refers to the minimum square size composed by the are[...]

  • Seite 96

    User Manual of Network Camera 95 every frame. Captur e Sensitivity [0~20]: The threshold the camera tr eats the target as a face. Onl y wh en the face score generated by the algorithm is equal or hi gher than the value, the camera will treat the tar get as a face. The de fault value of 2 is recommended. Face Captur e Advan ced Parameters: Face Expo[...]

  • Seite 97

    User Manual of Network Camera 96 6.7.3 Heat Map Heat map is a graphical representation of data represented by colors. The heat map function of the camer a usuall y be used to analyze the visit times and dwell time of customers in a configured area.  Heat Map Configuration Steps: 1. Enter the Heat Map configuration interface: Configu ration > [...]

  • Seite 98

    User Manual of Network Camera 97 Detection Sensitivity [0~100]: It refers to the sensitivity of the camera identify a tar get. The over- high s ensitivity may cause the misinformation. I t is recommended you set the sensitivity as the default value, which is 50. Backgr ou nd Update Rate [0~100]: It refers to the spe ed of th e new scene replaces th[...]

  • Seite 99

    User Manual of Network Camera 98 Figure 6-63 Space Heat Map Notes:  As shown in the figur e above, red c olor block (255, 0, 0) indicates the most welcome area, and blue color block (0, 0, 255) indicates the less-popular area.  It is recommended that you do not adjust the electronic lens aft er the installation is completed, which ma y cause [...]

  • Seite 100

    User Manual of Network Camera 99 Figure 6-64 People Counting Configuration 2. S elect People Counting Configuration tab to set the detailed parameters. 3. C heck the checkbox of Enable People Counting to enable the function. 4. C lick Draw Area to define the area you want to count the entered people and left people. Draw area by left click four end[...]

  • Seite 101

    User Manual of Network Camera 100 Generation Speed (T ime) [0~100] : The speed of the head or should be treated as a tar get. If you set the value lower , the h ead or shoulder will not be recognized as a targ et in t he configured area if it is there from the start. Counting Speed : It refers to the speed of the camera calculates the entered and l[...]

  • Seite 102

    User Manual of Network Camera 101 1. C lick People Counting S tatistics to enter the data statistics interface. 2. S elect the report type by clicking the dropdown menu. Daily report, wee kl y report, monthly report, and annual report are selectable. 3. S elect the S tatistics T ype as People Entered or People Ex ited. 4. S elect the S tatistics T [...]

  • Seite 103

    User Manual of Network Camera 102 Chapter 7 S torage Sett ings Befor e you start: T o configure rec o rd settings, please make sure that you have the network storage device within the network or the SD card inserted in your ca mera. 7.1 Configuring NAS Settings Befor e you start: The network disk should be available within the network and prop erly[...]

  • Seite 104

    User Manual of Network Camera 103 Please refer to the User Manual of NAS for creating the file path. (4) Click Save to add the network disk. 2. Initialize the added network disk. (1) Enter the HDD Settings interface ( Advanced Configuration > S torage > S torage Management ), in which you can view the capacity , free space, status, type and p[...]

  • Seite 105

    User Manual of Network Camera 104 Figure 7-4 Quota Settings Notes:  Up to 8 NAS disks can be connected to the camera.  T o initialize and use the SD card after insert it to the ca me ra, please refer to the steps of NAS disk initialization. 7.2 Configuring Recording Schedule Purpose: There are two kinds of recording for the cameras: manual re[...]

  • Seite 106

    User Manual of Network Camera 105 Figure 7-5 Recording Schedule I nterface 2. C heck the checkbox of Enable Record Schedule to enable scheduled recording. 3. S et the record para meters of the camera. Figure 7-6 Record Parameters  Pre-record: The time you set to start r ecording before the scheduled time or the event. For ex ample, if an alarm t[...]

  • Seite 107

    User Manual of Network Camera 106 The Post-record time can be configured as 5 s, 10 s, 30 s, 1 min, 2 min, 5 min or 10 min. Not e: The record parameter configurations vary depending on the camera model. 4. C lick Edit to edit the record schedule. Figure 7-7 Record Schedule 5. C hoose the day to set the record schedule. (1) Set all-day record or seg[...]

  • Seite 108

    User Manual of Network Camera 107 If you select Continuous , the video will be recorded automatically according to the time of the schedule.  Record T rigger ed by M otion Detection If you select Motion Detection , the video will be recorded when the motion is detected. Besides configuring the recordin g sch edule, y ou have to se t the motio n [...]

  • Seite 109

    User Manual of Network Camera 108 Figure 7-8 Edit Record Schedule (3) Check the checkbox of Select All and click Copy to cop y settings of this day to the whole week. Y ou c an also check any of the checkboxes before the date and click Copy . (4) Click OK to save the settings and exit the Edit Record Schedule interface. 6. C lick Save to save the s[...]

  • Seite 110

    User Manual of Network Camera 109 Check the Enable E vent-trigger ed Snapshot checkbox to check event-triggered snapshot. 3. Select the quality of the snapshot. 4. Set the time interval between two snapshots. 5. Click Save to save the settings. Uploading to FTP Y ou can follow below configuration instructions to upload the snapshots to FTP .  Up[...]

  • Seite 111

    User Manual of Network Camera 1 10 Figure 7-9 Snapshot Settings[...]

  • Seite 112

    User Manual of Network Camera 111 Chapter 8 People Counting Compared with the people counting function supported by the iDS camera, the people counting of the non -iDS do not ne ed to confi gure the calibrations, and the parameter configuration is easier . S teps :  People Counting Configuration 1. Enter the People Counting Configuration inter[...]

  • Seite 113

    User Manual of Network Camera 1 12 6. C onfigure the Detection Sensitivity [0~100]. It refers to the sensitivity of the camera recognize a tar get . The hig h er the sensitivity , the easier the camera judges the head or shoulder as a tar get. It is recommended you set the sensitivity as the default value, which is 50. 7. C onfigure the mounting re[...]

  • Seite 114

    User Manual of Network Camera 1 13 Figure 8-2 Statistics Result[...]

  • Seite 115

    User Manual of Network Camera 1 14 Chapter 9 Playback Purpose: This section explains how to view the remotely recorded video files stored in the network disks or SD cards. S teps: 1. Click Playback on the menu bar to enter playback interface . Figure 9-1 Playback Interface 2. Select the date and click Sear ch . Figure 9-2 Search V ideo 3. Click to [...]

  • Seite 116

    User Manual of Network Camera 1 15 Figure 9-3 Playback T oolbar Table 9-1 Description of the buttons Button Operation Button Operation Play Capture a picture Pause / Star t/Stop clipping video files Stop / Audio on and adjust volume/Mute Speed down Download video files Speed up Download captured pictures Playback by frame / Enable/Disable digital z[...]

  • Seite 117

    User Manual of Network Camera 1 16 Chapter 10 Log Sear ching Purpose: The operation, alar m, exception and information of the c ame ra can be st ored in log files. Y ou can also export the log files on your demand. Befor e you start: Please configure network storage for th e camera or insert a SD card in the camera. S teps: 1. C lick Log on the men[...]

  • Seite 118

    User Manual of Network Camera 117 Chapter 11 Others 11.1 Managing User Accounts Enter the User Management interface: Configuration >Basic Configuration> Security > User Or Configuration > Advanced Conf iguration> Sec u rity > User The admin user h as acc ess to create, modif y or delete other accounts. U p to 31 user accounts can [...]

  • Seite 119

    User Manual of Network Camera 1 18 Figure 11-2 Add a User  Modify a User S teps: 1. Left-click to select the user from the list and click Modif y . 2. Modi fy the User Na me , Level or Password . 3. In th e Basic Permission field and Camera Configuration field, you can check or uncheck the permissions. 4. C lick OK to finish the user modifica ti[...]

  • Seite 120

    User Manual of Network Camera 1 19 Figure 11-3 Modify a User  Delete a User S teps: 1. C lick to select the user you want to delete and click Delete . 2. C lick OK on the pop-up dialogue box to delete the user . 11.2 Authentication Purpose: Y ou can specifically secure the stream data of live view . S teps: 1. Enter the Authenticatio n interface[...]

  • Seite 121

    User Manual of Network Camera 120 Note: If you disable the R TSP authentication, anyone can access the video stream by the R TSP protocol via the IP address. 3. Select the W eb Authentication as Basic or Di gest. Basic : The basic authentication method is adopted. Digest : The di gest authentication method, which is securer , is adopted. 4. Click S[...]

  • Seite 122

    User Manual of Network Camera 121 Note: Only live view is available for the anonymous user . 11.4 IP Addr ess Fil ter Purpose: This function makes it possible for access control. S teps: 1. Enter the IP Address Filter interface: Configuration> Advanced Configuration> Security > IP Add r ess Filter Figure 11-7 IP Address Filter Interface 2.[...]

  • Seite 123

    User Manual of Network Camera 122 Figure 11-8 Add an IP (3) Click the OK to finish adding.  Modify an IP Address S teps: (1) Left-click an IP address from filter list and click Modify . (2) Modify the IP address in the text filed. Figure 11-9 Modify an IP (3) Click the OK to finish modifying.  Delete an IP Address Left-click an IP add ress fr[...]

  • Seite 124

    User Manual of Network Camera 123 2. C heck the checkbox of Enable T elnet to enable the remote login b y the telnet, and uncheck the checkbox to disable the telnet. 3. C heck the checkbox of Enable SSH to e nable the da ta communication security , and uncheck the checkbox to disable the SSH. 11.6 V iewing Device Information Enter the Device Inform[...]

  • Seite 125

    User Manual of Network Camera 124 11.7 Maintenance 11.7.1 Rebooting the Cam e ra S teps: 1. Enter the Maintenance interface: Configuration > Basic Configuration> System > Maintenance Or Configuration > Advanced Conf iguration> System > Maintenance: 2. Click Reboot to reboot the network camera. Figure 11-12 Reboot the Device 11.7.2[...]

  • Seite 126

    User Manual of Network Camera 125 Configuration file is used for the batch configuration of the camera, which can simplify the configuration steps when there are a l ot of cameras needing configuring. S teps: 1. Enter the Maintenance in terface: Configuration > Basic C onfiguration> S ystem > Maintenance, or Configuration>Advanced Confi[...]

  • Seite 127

    User Manual of Network Camera 126 Figure 11-15 Remote Upgrade Note: The upgrading process will take 1 ~10 minutes. P lease don't disconnect power of the camera during th e process , and the camera reboots automatically after upgrade. 11.8 RS -232 Settings The RS-232 port can be used in two ways:  Parameters Configuration: Connect a computer[...]

  • Seite 128

    User Manual of Network Camera 127 11.9 RS -485 Settings Purpose: The RS-485 serial port is used to control the PTZ of the camera. The configuring of the PTZ parameters should be done before you control the PTZ unit. S teps: 1. Enter RS-485 Port S etting interfa ce: Configuration> Advan ced Configuration> System > RS485 Figure 11-17 RS -485[...]

  • Seite 129

    User Manual of Network Camera 128 Appendix Appendix 1 SADP Softwar e Introdu cti on  Description of SADP V 2.0 SADP (Search Active Devices Protocol) is a kind of user-friendly and installation-free online device search tool. I t searches the active o nline devices within y our subnet and displays the information of the devices. Y ou can also mod[...]

  • Seite 130

    User Manual of Network Camera 129 searched devices will be added to the list. Note: Y ou can c li ck or on each column heading to or der the information; you can click to expand the device table a nd hide the network parameter pa nel on the right side, or click to show the network parameter panel.  Modify network para meters S teps: 1. S elect t[...]

  • Seite 131

    User Manual of Network Camera 130 Note: Serial code is a series of characters combined b y the start time and the serial number of the device. 2. Input the code in the Serial code field and c lick Confirm to restore the defa ult password.[...]

  • Seite 132

    User Manual of Network Camera 131 Appendix 2 Port Mapping The following settings are for TP-LINK router ( TL - W R641G). The settings vary depending on dif ferent m odels of routers. S teps: 1. S elect the W AN Connection T ype , as shown below: Figure A.2.1 Select the W AN Connection T y p e 2. Set the LAN parameters of the router as in the follow[...]

  • Seite 133

    User Manual of Network Camera 132 another camera as 81, 8001, 555, 8201 with I P 19 2.168.1.24. Refer to the steps as below: S teps: 1. As the settings mention ed above, m ap the port 80, 8000, 554 and 8200 for the network camera at 192.168.1.23 2. Map the port 81, 8001, 5 55 and 8201 for the network camera at 192.168.1.24. 3. Enable ALL or TC P pr[...]

  • Seite 134

    User Manual of Network Camera 133[...]