Table of Contents

Advertisement

Quick Links

Network Camera User Manual
Network Camera
User Manual
UD09130B-A
0

Advertisement

Table of Contents
loading

Summary of Contents for HIKVISION DS-2CD7026G0-EP-I-H

  • Page 1 Network Camera User Manual Network Camera User Manual UD09130B-A...
  • Page 2 With the philosophy of "Technology for the Good", Hikvision requests that every end user of video technology and video products shall comply with all the applicable laws and regulations, as well as ethical customs, aiming to jointly create a better community.
  • Page 3 Network Camera User Manual Therefore, every end user and data controller, shall undertake all reasonable and necessary measures to ensure data security and avoid data leakage, improper disclosure and improper use, including but not limited to, setting up access control, selecting a suitable network environment (the Internet or Intranet) where video products are connected, establishing and constantly optimizing network security.
  • Page 4 Any and all information, including, among others, wordings, pictures, graphs are the properties of Hangzhou Hikvision Digital Technology Co., Ltd. or its subsidiaries (hereinafter referred to be “Hikvision”). This user manual (hereinafter referred to be “the Manual”) cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.
  • Page 5 LOSS DATA DOCUMENTATION, CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL...
  • Page 6 Network Camera User Manual with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.
  • Page 7 Network Camera User Manual This device meets the CAN ICES-3 (A)/NMB-3(A) standards requirements. Safety Instruction These instructions are intended to ensure that the user can use the product correctly to avoid danger or property loss. The precaution measure is divided into ‘Warnings’ and ‘Cautions’: Warnings: Serious injury or death may be caused if any of these warnings are neglected.
  • Page 8 Network Camera User Manual service center. Never attempt to disassemble the camera yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.) Cautions:  Make sure the power supply voltage is correct before using the camera. ...
  • Page 9 Network Camera User Manual the dome cover film until the installation is finished. If there is dust or grease on the dome cover, clean the dome cover with clean soft cloth and isopropyl alcohol.  Make certain the installation location does not have reflective surfaces of objects too close to the camera.
  • Page 10: Table Of Contents

    Network Camera User Manual Table of Contents Chapter 1 System Requirement ................1 Chapter 2 Network Connection ................2 Setting the Network Camera over the LAN ............2 2.1.1 Wiring over the LAN ......................2 2.1.2 Activating the Camera ...................... 3 Setting the Network Camera over the WAN ............
  • Page 11 Network Camera User Manual 6.3.2 Log ..........................42 6.3.3 System Service ........................ 43 Security Settings .................... 44 6.4.1 Authentication ........................ 44 6.4.2 IP Address Filter ......................44 6.4.3 Security Service....................... 46 User Management ..................47 6.5.1 User Management ......................47 6.5.2 Online Users ........................
  • Page 12 Network Camera User Manual Event Settings ................89 Chapter 10 10.1 Basic Events ....................89 10.1.1 Configuring Motion Detection ..................89 10.1.2 Configuring Video Tampering Alarm ................95 10.1.3 Configuring Alarm Input ....................97 10.1.4 Configuring Alarm Output ....................98 10.1.5 Handling Exception ......................
  • Page 13 Network Camera User Manual 14.4 Counting Statistics ..................158 Appendix ......................160 Appendix 1 SADP Software Introduction ............... 160 Appendix 2 Port Mapping ..................163...
  • Page 14: Chapter 1 System Requirement

    Network Camera User Manual Chapter 1 System Requirement Operating System: Microsoft Windows XP SP1 and above version CPU: 2.0 GHz or higher RAM: 1G or higher Display: 1024× 768 resolution or higher Web Browser: Internet Explorer 8.0 and above version, Apple Safari 5.0.2 and above version, Mozilla Firefox 5.0 and above version and Google Chrome 18 and above version.
  • Page 15: Chapter 2 Network Connection

    Network Camera User Manual Chapter 2 Network Connection Note:  You shall acknowledge that the use of the product with Internet access might be under network security risks. For avoidance of any network attacks and information leakage, please strengthen your own protection. If the product does not work properly, please contact with your dealer or the nearest service center.
  • Page 16: Activating The Camera

    Network Camera User Manual  Refer to the Figure 2-2 to set network camera over the LAN via a switch or a router. Figure 2-1 Connecting Directly Figure 2-2 Connecting via a Switch or a Router 2.1.2 Activating the Camera You are required to activate the camera first by setting a strong password for it before you can use the camera.
  • Page 17 Network Camera User Manual to search the IP address. Figure 2-3 Activation via Web Browser 3. Create a password and input the password into the password field. STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 18 Network Camera User Manual Figure 2-4 SADP Interface Note: The SADP software supports activating the camera in batch. Refer to the user manual of SADP software for details. 3. Create a password and input the password in the password field, and confirm the password.
  • Page 19 Network Camera User Manual Figure 2-5 Modify the IP Address 6. Input the admin password and click Modify to activate your IP address modification. The batch IP address modification is supported by the SADP. Refer to the user manual of SADP for details. ...
  • Page 20 Network Camera User Manual Figure 2-6 Control Panel 2. Click the Device Management icon to enter the Device Management interface, as shown in the figure below. Figure 2-7 Device Management Interface...
  • Page 21 Network Camera User Manual 3. Check the device status from the device list, and select an inactive device. 4. Click the Activate button to pop up the Activation interface. 5. Create a password and input the password in the password field, and confirm the password.
  • Page 22: Setting The Network Camera Over The Wan

    Network Camera User Manual Figure 2-9 Modifying the Network Parameters 8. Change the device IP address to the same subnet with your computer by either modifying the IP address manually or checking the checkbox of Enable DHCP. 9. Input the password to activate your IP address modification. 2.2 Setting the Network Camera over the WAN Purpose: This section explains how to connect the network camera to the WAN with a static IP...
  • Page 23: Dynamic Ip Connection

    Network Camera User Manual 2. Assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 for detailed IP address configuration of the network camera. 3. Save the static IP in the router. 4. Set port mapping, e.g., 80, 8000, and 554 ports. The steps for port mapping vary according to the different routers.
  • Page 24 Network Camera User Manual 1. Connect the network camera to the router. 2. In the camera, assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 for detailed IP address configuration of the network camera. 3.
  • Page 25 Network Camera User Manual Figure 2-13 Normal Domain Name Resolution Steps: 1. Apply a domain name from a domain name provider. 2. Configure the DDNS settings in the DDNS Settings interface of the network camera. Refer to Section 7.1.2 Configuring DDNS Settings for detailed configuration.
  • Page 26: Chapter 3 Access To The Network Camera

    Network Camera User Manual Chapter 3 Access to the Network Camera 3.1 Accessing by Web Browsers Before you start: While using https, the device automatically creates a self-signed certificate, and prompts a warning of an untrusted website. Import a purchased license into the device and the warning will disappear.
  • Page 27: Accessing By Client Software

    Network Camera User Manual 4. Click Login. 5. Install the plug-in before viewing the live video and operating the camera. Follow the installation prompts to install the plug-in. Figure 3-2 Download and Install Plug-in Note: You may have to close the web browser to finish the installation of the plug-in.
  • Page 28 Network Camera User Manual Figure 3-3 iVMS-4200 Control Panel Figure 3-4 iVMS-4200 Main View...
  • Page 29: Chapter 4 Wi-Fi Settings

    Network Camera User Manual Chapter 4 Wi-Fi Settings Purpose: By connecting to the wireless network, you don’t need to use cable of any kind for network connection, which is very convenient for the actual surveillance application. Note: This chapter is only applicable for the cameras with the built-in Wi-Fi module. 4.1 Configuring Wi-Fi Connection in Manage and Ad-hoc Modes Purpose:...
  • Page 30 Network Camera User Manual 3. Click to choose a wireless connection on the list. Figure 4-2 Wi-Fi Setting- Manage Mode 4. Check the radio button to select the Network mode as Manage, and the Security mode of the network is automatically shown when you select the wireless network, please don’t change it manually.
  • Page 31 Network Camera User Manual 2. Customize a SSID for the camera. 3. Choose the Security Mode of the wireless connection. 4. Enable the wireless connection function for your PC. 5. On the PC side, search the network and you can see the SSID of the camera listed.
  • Page 32 Network Camera User Manual Figure 4-6 WEP Mode  Authentication - Select Open or Shared Key System Authentication, depending on the method used by your access point. Not all access points have this option, in which case they probably use Open System, which is sometimes known as SSID Authentication.
  • Page 33 Network Camera User Manual Choose the type of client/server authentication being used by the access point; EAP-TLS or EAP-PEAP. EAP-TLS Figure 4-8 EAP-TLS  Identity - Enter the user ID to present to the network. Private key password – Enter the password for your user ID. ...
  • Page 34: Easy Wi-Fi Connection With Wps Function

    Network Camera User Manual strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
  • Page 35 Network Camera User Manual PBC Mode: PBC refers to the Push-Button-Configuration, in which the user simply has to push a button, either an actual or virtual one (as the button on the configuration interface of the IE browser), on both the Access Point (and a registrar of the network) and the new wireless client device.
  • Page 36: Ip Property Settings For Wireless Network Connection

    Network Camera User Manual Figure 4-10 Use PIN Code If the PIN code is generated from the router side, you should enter the PIN code you get from the router side in the Router PIN code field. 3. Click Connect. You can generate the PIN code on the camera side.
  • Page 37 Network Camera User Manual Figure 4-11 Setting WLAN Parameters 3. Customize the IPv4 address, the IPv4 Subnet Mask and the Default Gateway. The setting procedure is the same with that of LAN. If you want to be assigned the IP address you can check the checkbox to enable the DHCP.
  • Page 38: Chapter 5 Live View

    Network Camera User Manual Chapter 5 Live View 5.1 Live View Page Purpose: The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters. Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page.
  • Page 39: Starting Live View

    Network Camera User Manual For IE (Internet Explorer) users, plug-ins as webcomponents and quick time are selectable. And for Non-IE users, webcomponents, quick time, VLC or MJPEG is selectable if they are supported by the web browser. PTZ Control: Perform panning, tilting and zooming actions of the camera. Control the light and the wiper (only available for cameras supporting PTZ function).
  • Page 40: Recording And Capturing Pictures Manually

    Network Camera User Manual 5.3 Recording and Capturing Pictures Manually In the live view interface, click on the toolbar to capture the live pictures or click to record the live view. The saving paths of the captured pictures and clips can be set on the Configuration >...
  • Page 41: Setting/Calling A Preset

    Network Camera User Manual Click the zoom/focus/iris buttons to realize lens control. Notes:  There are eight direction arrows ( , ) in the control panel. Click the arrows to realize adjustment in the relative positions.  For the cameras which support lens movements only, the direction buttons are invalid.
  • Page 42: Setting/Calling A Patrol

    Network Camera User Manual Figure 5-4 Setting a Preset 2. Use the PTZ control buttons to move the lens to the desired position. • Pan the camera to the right or left. • Tilt the camera up or down. • Zoom in or out. •...
  • Page 43 Network Camera User Manual 2. Select a path No., and click to add the configured presets. 3. Select the preset, and input the patrol duration and patrol speed. 4. Click OK to save the first preset. 5. Follow the steps above to add the other presets. Figure 5-6 Add Patrol Path 6.
  • Page 44: Chapter 6 Network Camera Configuration

    Network Camera User Manual Chapter 6 Network Camera Configuration 6.1 Configuring Local Parameters Purpose: The local configuration refers to the parameters of the live view, record files and captured pictures. The record files and captured pictures are the ones you record and capture using the web browser and thus the saving paths of them are on the PC running the browser.
  • Page 45 Network Camera User Manual UDP: Provides real-time audio and video streams. HTTP: Allows the same quality as of TCP without setting specific ports for streaming under some network environments. MULTICAST: It’s recommended to select MCAST type when using the Multicast function. For detailed information about Multicast, refer to Section 7.1.1 Configuring TCP/IP Settings.
  • Page 46: Configure System Settings

    Network Camera User Manual  Save clips to: Set the saving path of the clipped video files in playback mode. Note: You can click Browse to change the directory for saving the clips and pictures, and click Open to open the set folder of clips and picture saving. 3.
  • Page 47 Network Camera User Manual Figure 6-2 Basic Information Online Upgrade For some camera models, when memory card is mounted, you can click the Update button that appears on the right of Firmware Version text field to see if there is a new version available.
  • Page 48: Configuring Time Settings

    Network Camera User Manual 6.2.2 Configuring Time Settings Purpose: You can follow the instructions in this section to configure the time synchronization and DST settings. Steps: 1. Enter the Time Settings interface, Configuration > System> System Settings > Time Settings. Figure 6-4 Time Settings 2.
  • Page 49 Network Camera User Manual function via NTP server. Figure 6-5 Time Sync by NTP Server Note: If the camera is connected to a public network, you should use a NTP server that has a time synchronization function, such as the server at the National Time Center (IP Address: 210.72.145.44).
  • Page 50: Configuring Rs232 Settings

    Network Camera User Manual 6.2.3 Configuring RS232 Settings The RS232 port can be used in two ways:  Parameters Configuration: Connect a computer to the camera through the serial port. Device parameters can be configured by using software such as HyperTerminal.
  • Page 51: Configuring Dst Settings

    Network Camera User Manual The RS485 serial port is used to control the PTZ of the camera. The configuring of the PTZ parameters should be done before you control the PTZ unit. Steps: 1. Enter RS-485 Port Setting interface: Configuration > System > System Settings >...
  • Page 52: Configuring External Devices

    Network Camera User Manual 1. Enter the DST configuration interface. Configuration > System > System Settings > DST Figure 6-9 DST Settings 2. Select the start time and the end time. 3. Select the DST Bias. 4. Click Save to activate the settings. 6.2.6 Configuring External Devices Purpose: For the device supported external devices, including the wiper on the housing or the...
  • Page 53: Configuring Vca Resource

    Network Camera User Manual 4. Select the mode for LED light. Timing and Auto are selectable.  Timing: The LED will be turned on by the schedule you set. You should set the Start Time and End Time. Figure 6-11 Set Schedule ...
  • Page 54: Maintenance

    Network Camera User Manual Notes: • VCA Resource function varies according to different camera models. • Face Detection and Heat Map are mutually exclusive. When SMART Event + Heat Map is enabled, Face Detection interface will not be displayed. • The function may not be supported by some camera models.
  • Page 55: Log

    Network Camera User Manual  Upgrade: Upgrade the device to a certain version. Steps: 1. Select firmware or firmware directory to locate the upgrade file. Firmware: Locate the exact path of the upgrade file. Firmware Directory: Only the directory the upgrade file belongs to is required.
  • Page 56: System Service

    Network Camera User Manual 3. Click Search to search log files. The matched log files will be displayed on the log list interface. Figure 6-14 Log Searching 4. To export the log files, click Export to save the log files. 6.3.3 System Service Purpose: System service settings refer to the hardware service the camera supports.
  • Page 57: Security Settings

    Network Camera User Manual Figure 6-15 Enable Third Stream 6.4 Security Settings Configure the parameters, including Authentication, Anonymous Visit, IP Address Filter, and Security Service from security interface. 6.4.1 Authentication Purpose: You can specifically secure the stream data of live view. Steps: 1.
  • Page 58 Network Camera User Manual 1. Enter the IP Address Filter interface: Configuration > System > Security > IP Address Filter Figure 6-17 IP Address Filter Interface 2. Check the checkbox of Enable IP Address Filter. 3. Select the type of IP Address Filter in the drop-down list, Forbidden and Allowed are selectable.
  • Page 59: Security Service

    Network Camera User Manual Figure 6-19 Modify an IP (3) Click the OK to finish modifying.  Delete an IP Address or IP Addresses. Select the IP address(es) and click Delete. 5. Click Save to save the settings. 6.4.3 Security Service To enable the remote login, and improve the data communication security, the camera provides the security service for better user experience.
  • Page 60: User Management

    Network Camera User Manual Note: If the IP address is locked, you can try to login the device after 30 minutes. 6.5 User Management 6.5.1 User Management Purpose: The admin user can add, delete or modify user accounts, and grant them different permissions.
  • Page 61 Network Camera User Manual ● STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 62 Network Camera User Manual 3. STRONG PASSWORD RECOMMENDED–We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.
  • Page 63: Online Users

    Network Camera User Manual 6.5.2 Online Users Purpose: You can see the current users who are visiting the device through this interface. User information, such as user name, level, IP address, and operation time, is displayed in the User List. Click Refresh to refresh the list.
  • Page 64: Chapter 7 Network Settings

    Network Camera User Manual Chapter 7 Network Settings Purpose: Follow the instructions in this chapter to configure the basic settings and advanced settings. 7.1 Configuring Basic Settings Purpose: You can configure the parameters, including TCP/IP, DDNS, PPPoE, Port, and NAT, etc., by following the instructions in this section.
  • Page 65 Network Camera User Manual Figure 7-1 TCP/IP Settings 2. Configure the basic network settings, including the NIC Type, IPv4 or IPv6 Address, IPv4 or IPv6 Subnet Mask, IPv4 or IPv6 Default Gateway, MTU settings and Multicast Address. 3. (Optional) Check the checkbox of Enable Multicast Discovery, and then the online network camera can be automatically detected by client software via private multicast protocol in the LAN.
  • Page 66: Configuring Ddns Settings

    Network Camera User Manual multicast group address. Before utilizing this function, you have to enable the Multicast function of your router.  A reboot is required for the settings to take effect. 7.1.2 Configuring DDNS Settings Purpose: If your camera is set to use PPPoE as its default network connection, you can use the Dynamic DNS (DDNS) for network access.
  • Page 67 Network Camera User Manual Figure 7-2 DynDNS Settings NO-IP:  Steps: (1) Choose the DDNS Type as NO-IP. Figure 7-3 NO-IP DNS Settings (2) Enter the Server Address as www.noip.com (3) Enter the Domain name you registered. (4) Enter the User Name and Password. (5) Click Save and then you can view the camera with the domain name.
  • Page 68: Configuring Pppoe Settings

    Network Camera User Manual 7.1.3 Configuring PPPoE Settings Steps: Enter the PPPoE Settings interface: Configuration > Network > Basic Settings > PPPoE Figure 7-4 PPPoE Settings 2. Check the Enable PPPoE checkbox to enable this feature. 3. Enter User Name, Password, and Confirm password for PPPoE access. Note: The User Name and Password should be assigned by your ISP.
  • Page 69: Configure Nat (Network Address Translation) Settings

    Network Camera User Manual You can set the port No. of the camera, e.g., HTTP port, RTSP port and HTTPS port. Steps: 1. Enter the Port Settings interface, Configuration > Network > Basic Settings > Port Figure 7-5 Port Settings 2.
  • Page 70: Configure Advanced Settings

    Network Camera User Manual implementation of networks in the home and corporate environments. With the function enabled, you don’t need to configure the port mapping for each port, and the camera is connected to the Wide Area Network via the router. Steps: 1.
  • Page 71 Network Camera User Manual information, and manage the camera remotely when it is connected to the network. Before you start: Before setting the SNMP, please download the SNMP software and manage to receive the camera information via SNMP port. By setting the Trap Address, the camera can send the alarm event and exception messages to the surveillance center.
  • Page 72 Network Camera User Manual Figure 7-7 SNMP Settings 2. Check the checkbox of Enable SNMPv1, Enable SNMP v2c, Enable SNMPv3 to enable the feature correspondingly. 3. Configure the SNMP settings. Note: The settings of the SNMP software should be the same as the settings you...
  • Page 73: Configuring Ftp Settings

    Network Camera User Manual configure here. 4. Click Save to save and finish the settings. Notes: • A reboot is required for the settings to take effect. • To lower the risk of information leakage, you are suggested to enable SNMP v3 instead of SNMP v1 or v2.
  • Page 74 Network Camera User Manual FTP server login.  For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.
  • Page 75: Configuring Email Settings

    Network Camera User Manual anonymous access to the FTP server. Note: The anonymous access function must be supported by the FTP server. 6. Click Save to save the settings. 7.2.3 Configuring Email Settings Purpose: The system can be configured to send an Email notification to all designated receivers if an alarm event is detected, e.g., motion detection event, video loss, video tampering, etc.
  • Page 76 Network Camera User Manual The SMTP port should be set as 465 for this encryption method. When you select SSL or TLS and enable STARTTLS, emails will be sent after encrypted by STARTTLS, and the SMTP port should be set as 25. Note: If you want to use STARTTLS, make sure that the protocol is supported by your e-mail server.
  • Page 77: Platform Access

    Network Camera User Manual Figure 7-9 Email Settings 4. Click Save to save the settings. 7.2.4 Platform Access Purpose: Platform access provides you an option to manage the devices via platform. Steps: 1. Enter the Platform Access settings interface: Configuration > Network > Advanced Settings >...
  • Page 78: Wireless Dial

    Network Camera User Manual If you select Platform Access Mode as Hik-Connect, 1) Click and read "Terms of Service" and "Privacy Policy" in pop-up window. 2) Create a verification code or change the verification code for the camera. Note: • The verification code is required when you add the camera to Hik-Connect app.
  • Page 79 Network Camera User Manual 1) Select the dial mode from the drop-down list. Auto and Manual are selectable. If Auto is selected, you can set the arming schedule for dialing; If Manual is selected, you can set the offline time and manual dialing parameters. 2) Set the access number, user name, password, APN, MTU and verification protocol.
  • Page 80: Https Settings

    Network Camera User Manual 7.2.6 HTTPS Settings Purpose: HTTPS provides authentication of the web site and its associated web server, which protects against Man-in-the-middle attacks. Perform the following steps to set the port number of https. E.g., If you set the port number as 443 and the IP address is 192.168.1.64, you may access the device by inputting https://192.168.1.64:443 via the web browser.
  • Page 81 Network Camera User Manual Figure 7-11 Create Self-signed Certificate (3) Enter the country, host name/IP, validity and other information. (4) Click OK to save the settings. Note: If you already had a certificate installed, the Create Self-signed Certificate is grayed out. ...
  • Page 82: Configuring Qos Settings

    Network Camera User Manual 5. Click the Save button to save the settings. 7.2.7 Configuring QoS Settings Purpose: QoS (Quality of Service) can help solve the network delay and network congestion by configuring the priority of data sending. Steps: 1. Enter the QoS Settings interface: Configuration > Network > Advanced Settings >...
  • Page 83 Network Camera User Manual connecting the camera to the network protected by the IEEE 802.1X. Before you start: The authentication server must be configured. Please apply and register a user name and password for 802.1X in the server.  For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices.
  • Page 84 Network Camera User Manual 4. Enter the user name and password to access the server. 5. Click Save to finish the settings. Note: A reboot is required for the settings to take effect.
  • Page 85: Chapter 8 Video/Audio Settings

    Network Camera User Manual Chapter 8 Video/Audio Settings Purpose: Follow the instructions below to configure the video setting, audio settings, ROI, and Display info. on Stream. 8.1 Configuring Video Settings Steps: 1. Enter the Video Settings interface, Configuration > Video/Audio > Video Figure 8-1 Video Settings 2.
  • Page 86 Network Camera User Manual reboot the system and enable the third stream. • The main stream is usually for recording and live view with good bandwidth, and the sub-stream can be used for live view when the bandwidth is limited. •...
  • Page 87 Network Camera User Manual selectable. H.265 is a new encoding technology. Compared with H.264, it reduces the transmission bitrate under the same resolution, frame rate and image quality. Note: Selectable video encoding types may vary according to different camera modes. H.264+ and H.265+: •...
  • Page 88: Configuring Audio Settings

    Network Camera User Manual bitrate in the long term. The camera needs at least 3 days to adapt to a fixed monitoring scene. Max. Average Bitrate: When you set a maximum bitrate, its corresponding recommended maximum average bitrate will be shown in the Max. Average Bitrate box. You can also set the maximum average bitrate manually from 32 Kbps to the value of the set maximum bitrate.
  • Page 89: Configuring Roi Encoding

    Network Camera User Manual Figure 8-2 Audio Settings 2. Configure the following settings. Note: Audio settings vary according to different camera models. Audio Encoding: G.722.1, G.711 ulaw, G.711alaw, G.726, MP2L2 and PCM are selectable. For MP2L2, the Sampling Rate and Audio Stream Bitrate are configurable.
  • Page 90 Network Camera User Manual Figure 8-3 Region of Interest Settings Steps: 1. Enter the ROI settings interface: Configuration > Video/Audio > ROI. 2. Select the Stream Type for ROI encoding. 3. Check the checkbox of Enable under Fixed Region item. 4.
  • Page 91: Display Info. On Stream

    Network Camera User Manual (3) Click Drawing. Click and drag the mouse on the view screen to draw a red rectangle as the ROI region. You can click Clear to cancel former drawing. Click Stop Drawing when you finish. (4) Select the ROI level. (5) Enter a region name for the chosen region.
  • Page 92: Configuring Target Cropping

    Network Camera User Manual 8.5 Configuring Target Cropping Purpose: You can specify a target area on the live video, and then the specified video area can be displayed via the third stream in certain resolution, providing more details of the target area if needed.
  • Page 93: Chapter 9 Image Settings

    Network Camera User Manual Chapter 9 Image Settings Purpose: Follow the instructions in this chapter to configure the image parameters, including display settings, OSD settings, privacy mask, and picture overlay. 9.1 Configuring Display Settings Purpose: Configure the image adjustment, exposure settings, day/night switch, backlight settings, white balance, image enhancement, video adjustment, and other parameters in display settings.
  • Page 94 Network Camera User Manual 2. Set the image parameters of the camera. Note: In order to guarantee the image quality in different illumination, it provides two sets of parameters for users to configure.  Image Adjustment Brightness describes bright of the image, which ranges from 1 to 100. Contrast describes the contrast of the image, which ranges from 1 to 100.
  • Page 95 Network Camera User Manual Figure 9-3 Day/Night Switch Day: the camera stays at day mode. Night: the camera stays at night mode. Auto: the camera switches between the day mode and the night mode according to the illumination automatically. The sensitivity ranges from 0 to 7, the higher the value is, the easier the mode switches.
  • Page 96 Network Camera User Manual Note: If BLC mode is set as Custom, you can draw a red rectangle on the live view image as the BLC area. WDR: Wide Dynamic Range can be used when there is a high contrast of the bright area and the dark area of the scene.
  • Page 97: Day/Night Scheduled-Switch

    Network Camera User Manual Center, and OFF are selectable. Rotate: To make a complete use of the 16:9 aspect ratio, you can enable the rotate function when you use the camera in a narrow view scene. When installing, turn the camera to the 90 degrees or rotate the 3-axis lens to 90 degrees, and set the rotate mode as on, you will get a normal view of the scene with 9:16 aspect ratio to ignore the needless information such as the wall, and get more meaningful information of the scene.
  • Page 98: Configuring Osd Settings

    Network Camera User Manual Figure 9-5 Day/Night Scheduled-Switch Configuration Interface Steps: 1. Click the calendar icon to select the start time and the end time of the switch. Notes: • The start time and end time refer to the valid time for day mode. •...
  • Page 99 Network Camera User Manual Figure 9-6 OSD Settings Steps: 1. Enter the OSD Settings interface: Configuration > Image > OSD Settings. 2. Check the corresponding checkbox to select the display of camera name, date or week if required. 3. Edit the camera name in the text field of Camera Name. 4.
  • Page 100: Configuring Privacy Mask

    Network Camera User Manual 8. Click Save to save the settings. 9.3 Configuring Privacy Mask Purpose: Privacy mask enables you to cover certain areas on the live video to prevent certain spots in the surveillance area from being live viewed and recorded. Steps: 1.
  • Page 101: Configuring Picture Overlay

    Network Camera User Manual 6. Click Save to save the settings. 9.4 Configuring Picture Overlay Purpose: Picture overlay enables you to overlay a picture on the image. This function enables a certain enterprise or users to overlay their logo on the image. Steps: 1.
  • Page 102: Chapter 10 Event Settings

    Network Camera User Manual Chapter 10 Event Settings This section explains how to configure the network camera to respond to alarm events, including basic event and smart event. 10.1 Basic Events You can configure the basic events by following the instructions in this section, including motion detection, video tampering, alarm input, alarm output, and exception, etc.
  • Page 103 Network Camera User Manual 3. Check the checkbox of Enable Dynamic Analysis for Motion if you want to mark the detected objects with green rectangles. Select Disable for rules if you don’t want the detected objected displayed Note: with the green rectangles. Select disable rules from Configuration > Local Configuration >...
  • Page 104 Network Camera User Manual Task 2: Set the Arming Schedule for Motion Detection Figure 10-2 Arming Schedule Steps: 1. Click Arming Schedule to edit the arming schedule. 2. Click on the time bar and drag the mouse to select the time period. Figure 10-3 Arming Schedule Note: Click on the selected time period, you can adjust the time period to the...
  • Page 105 Network Camera User Manual save the settings. 4. Move the mouse to the end of each day, a copy dialogue box pops up, and you can copy the current settings to other days. 5. Click Save to save the settings. The time of each period can’t be overlapped.
  • Page 106 Network Camera User Manual complete Email setup in advance.  Upload to FTP/Memory Card/NAS Capture the image when an alarm is triggered and upload the picture to a FTP server. Notes: ● Set the FTP address and the remote FTP server first. Refer to Section 7.2.2 Configuring FTP Settings for detailed information.
  • Page 107 Network Camera User Manual Figure 10-5 Expert Mode of Motion Detection  Day/Night Switch OFF Steps: 1. Draw the detection area as in the normal configuration mode. Up to 8 areas are supported. 2. Select OFF for Switch Day and Night Settings. 3.
  • Page 108: Configuring Video Tampering Alarm

    Network Camera User Manual 6. Set the arming schedule and linkage method as in the normal configuration mode. 7. Click Save to save the settings.  Day/Night Scheduled-Switch Steps: 1. Draw the detection area as in the normal configuration mode. Up to 8 areas are supported.
  • Page 109 Network Camera User Manual Figure 10-7 Video Tampering Alarm 2. Check Enable Video Tampering checkbox to enable the video tampering detection. 3. Set the video tampering area. Refer to Task 1: Set the Motion Detection Area in Section 10.1.1. 4. Click Edit to edit the arming schedule for video tampering. The arming schedule configuration is the same as the setting of the arming schedule for motion detection.
  • Page 110: Configuring Alarm Input

    Network Camera User Manual 6. Click Save to save the settings. 10.1.3 Configuring Alarm Input Steps: 1. Enter the Alarm Input Settings interface: Configuration > Event > Basic Event > Alarm Input. 2. Choose the alarm input No. and the Alarm Type. The alarm type can be NO (Normally Open) and NC (Normally Closed).
  • Page 111: Configuring Alarm Output

    Network Camera User Manual 6. Click Save to save the settings. 10.1.4 Configuring Alarm Output Figure 10-9 Alarm Output Settings Steps: 1. Enter the Alarm Output Settings interface: Configuration> Event > Basic Event > Alarm Output. 2. Select one alarm output channel in the Alarm Output drop-down list. You can also set a name for the alarm output (optional).
  • Page 112: Handling Exception

    Network Camera User Manual 5. You can copy the settings to other alarm outputs. 6. Click Save to save the settings. 10.1.5 Handling Exception The exception type can be HDD full, HDD error, network disconnected, IP address conflicted and illegal login to the cameras. Steps: 1.
  • Page 113 Network Camera User Manual 1. Enter the Wireless Alarm Settings interface: Configuration > Advanced Configuration> Basic Event> Wireless Alarm Figure 10-11 Setting Wireless Alarm 2. Select the wireless alarm number. Up to 8 channels of external wireless alarm input are supported. 3.
  • Page 114 Network Camera User Manual Purpose: A PIR (Passive Infrared) alarm is triggered when an intruder moves within the detector's field of view. The heat energy dissipated by a person, or any other warm blooded creature such as dogs, cats, etc., can be detected. Steps: 1.
  • Page 115: Smart Events

    Network Camera User Manual Figure 10-14 Arming PIR Alarm  Emergency Alarm Purpose: You can press the Emergency button on the remote control to trigger the Emergency Alarm in case of an emergency. Note: The remote control is required for the Emergency Alarm. Go to Configuration >...
  • Page 116: Configuring Audio Exception Detection

    Network Camera User Manual including audio exception detection, defocus detection, scene change detection, intrusion detection, and line crossing detection, etc. These events can trigger the linkage methods, such as Notify Surveillance Center, Send Email, Trigger Alarm Output, etc. 10.2.1 Configuring Audio Exception Detection Purpose: Audio exception detection function detects the abnormal sounds in the surveillance scene, such as the sudden increase/decrease of the sound intensity, and some certain...
  • Page 117: Configuring Defocus Detection

    Network Camera User Manual 3. Check the checkbox of Sudden Increase of Sound Intensity Detection to detect the sound steep rise in the surveillance scene. You can set the detection sensitivity and threshold for sound steep rise. 4. Check the checkbox of Sudden Decrease of Sound Intensity Detection to detect the sound steep drop in the surveillance scene.
  • Page 118: Configuring Scene Change Detection

    Network Camera User Manual Figure 10-17 Configuring Defocus Detection 2. Check the checkbox of Enable to enable the function. 3. Click-and-drag the slider to set the detection sensitivity. The sensitivity value ranges from 1 to 100, and the higher the value is, the more easily the defocus image can trigger the alarm.
  • Page 119: Configuring Face Detection

    Network Camera User Manual Figure 10-18 Scene Change Detection 2. Check the checkbox of Enable to enable the function. 3. Click-and-drag the slider to set the detection sensitivity. The sensitivity value ranges from 1 to 100, and the higher the value is, the more easily the change of scene can trigger the alarm.
  • Page 120 Network Camera User Manual Enter the Face Detection settings interface, Configuration > Event > Smart Event > Face Detection. Check the Enable Face Detection checkbox to enable the function. Check the checkbox of Enable Dynamic Analysis for Face Detection, and then the detected face is marked with green rectangle on the live video.
  • Page 121: Configuring Intrusion Detection

    Network Camera User Manual Click Save to save the settings. 10.2.5 Configuring Intrusion Detection Purpose: Intrusion detection function detects people, vehicle or other objects which enter and loiter in a pre-defined virtual region, and some certain actions can be taken when the alarm is triggered.
  • Page 122 Network Camera User Manual 2. Check the checkbox of Enable to enable the function. 3. Select a region number from the drop-down list of Region. Region: A pre-defined vertexes area on the live view image. Targets, such as, people, vehicle or other objects, who enter and loiter in the region will be detected and trigger the set alarm.
  • Page 123: Configuring Line Crossing Detection

    Network Camera User Manual 10. Repeat the above steps to configure other regions. Up to 4 regions can be set. You can click the Clear button to clear all pre-defined regions. 11. Click Arming Schedule to set the arming schedule. 12.
  • Page 124 Network Camera User Manual Figure 10-21 Line Crossing Detection 2. Check the checkbox of Enable to enable the function. 3. Select the line from the drop-down list. 4. Click Area Settings tab and click Draw Area button, and a virtual line is displayed on the live video.
  • Page 125 Network Camera User Manual Max. Size: The maximum size of a valid target. Targets with larger sizes would not trigger detection. Min. Size: The minimum size of a valid target. Targets with smaller sizes would not trigger detection. 7. Select the direction for line crossing detection. And you can select the directions as A<->B, A ->B, and B->A.
  • Page 126: Configuring Region Entrance Detection

    Network Camera User Manual 10.2.7 Configuring Region Entrance Detection Purpose: Region entrance detection function detects people, vehicle or other objects which enter a pre-defined virtual region from the outside place, and some certain actions can be taken when the alarm is triggered. Steps: 1.
  • Page 127 Network Camera User Manual 2. Check the Enable checkbox to enable the function. 3. Select the Region from the drop-down list for detection settings. 4. Click Area Settings and click Draw Area button to start the area drawing. 5. Click on the live video to specify the four vertexes of the detection region, and right click to complete drawing.
  • Page 128: Configuring Region Exiting Detection

    Network Camera User Manual 10.2.8 Configuring Region Exiting Detection Purpose: Region exiting detection function detects people, vehicle or other objects which exit from a pre-defined virtual region, and some certain actions can be taken when the alarm is triggered. Steps: 1.
  • Page 129 Network Camera User Manual 2. Check Enable checkbox to enable the function. 3. Select the Region from the drop-down list for detection settings. 4. Click Area Settings and click Draw Area button to start the area drawing. 5. Click on the live video to specify the four vertexes of the detection region, and right click to complete drawing.
  • Page 130: Configuring Unattended Baggage Detection

    Network Camera User Manual 10.2.9 Configuring Unattended Baggage Detection Purpose: Unattended baggage detection function detects the objects left over in the pre-defined region such as the baggage, purse, dangerous materials, etc. A series of actions can be taken when the alarm is triggered. Steps: 1.
  • Page 131 Network Camera User Manual 2. Check Enable checkbox to enable the function. 3. Select the Region from the drop-down list for detection settings. 4. Click Area Settings and click Draw Area to start the area drawing. 5. Click on the live video to specify the four vertexes of the detection region, and right click to complete drawing.
  • Page 132: Configuring Object Removal Detection

    Network Camera User Manual 13. Click Save to save the settings. 10.2.10 Configuring Object Removal Detection Purpose: Object removal detection function detects the objects removed from the pre-defined region, such as the exhibits on display, and a series of actions can be taken when the alarm is triggered.
  • Page 133 Network Camera User Manual Figure 10-25 Object Removal Detection 2. Check Enable checkbox to enable the function. 3. Select the Region from the drop-down list for detection settings. 4. Click Area Settings and click Draw Area button to start the area drawing. 5.
  • Page 134: Vca Configuration

    Network Camera User Manual Min. Size: The minimum size of a valid target. Targets with smaller sizes would not trigger detection. 7. Click Stop Drawing when finish drawing. 8. Set the time threshold for object removal detection. Threshold: Range [5-100s], the threshold for the time of the objects removed from the region.
  • Page 135 Network Camera User Manual Figure 10-26 Behavior Analysis  Overlay & Capture Display information includes the display on picture and display on stream. Display VCA info. on Stream: The green frames will be displayed on the target if in a live view or playback. Display Target info.
  • Page 136 Network Camera User Manual be more accurate if the camera calibration is configured. Steps: 1. Check the checkbox of Camera Calibration to enable this function. 2. Select the calibration mode as Input Basic Data or Draw on Live View Video. Input Basic Data: Input the mounting height, viewing angle, and horizon ratio of the camera manually.
  • Page 137 Network Camera User Manual 4. You can click to delete the drawn lines. 5. Click Save to save the settings.  Shield Region The shield region allows you to set the specific region in which the behavior analysis will not function. Up to 4 shield regions are supported. Steps: 1.
  • Page 138 Network Camera User Manual Figure 10-28 Configure the Rule Filter type: Pixels and Actual Size are selectable. If Pixels is selected, draw the area of maximum size and minimum size on the live video for each rule. If Actual Size is selected, input the length and width of the maximum size and minimum size.
  • Page 139 Network Camera User Manual to left click on the live video to set the end points of the area and right click to finish the area drawing. Note: If the live view is stopped, the detection area / line cannot be draw and the rules cannot be set.
  • Page 140 Network Camera User Manual Figure 10-29 Advanced Configuration Detection Sensitivity [0~4]: Refers to the sensitivity of the camera detects a target. The higher the value, the easier a target be recognized, and the higher the misinformation is. The default value of 3 is recommended. Background Update Rate [0~4]: It refers to the speed of the new scene replaces the previous scene.
  • Page 141: Face Capture

    Network Camera User Manual 1. Check the checkbox of Global Size Filter to enable the function. 2. Select the Filter Type as Actual Size or Pixel. Actual Size: Input the length and width of both the maximum size and the minimum size.
  • Page 142 Network Camera User Manual if in a live view or playback. Display Target info. on Alarm Picture: There will be a frame on the target on the uploaded alarm picture if the checkbox is checked. Snapshot Setting: Select the picture quality for the captured picture. Good, better, and best are selectable.
  • Page 143 Network Camera User Manual 1. Check the checkbox of Rule to enable rules of face capture. 2. Click the rectangle sign to draw the minimum pupil distance. The distance of the drawn pupil will be displayed on the box below the live view. The minimize pupil distance refers to the minimum square size composed by the area between two pupils, and it is the basic standard for a camera to identify a target.
  • Page 144 Network Camera User Manual faster the target will be recognized. Setting the value quite low, and if there was a face in the configured area from the start, this face will not be captured. It can reduce the misinformation of the faces in the wall painting or posters. The default value of 3 is recommended.
  • Page 145: People Counting

    Network Camera User Manual 10.3.3 People Counting Purpose: People function is used to calculate the number of object entered or exited a certain configured area and it is widely applied to the entrances or exits. Notes: It is recommended to install the camera right above the entrance/exit. To improve the counting accuracy, make sure your camera is installed horizontally.
  • Page 146 Network Camera User Manual 3. Set the detection line. An orange line, named as detection line can be set on the live video, and the object entering or exiting through the line will be detected and counted. 1) Click button on the left of the live view image. An orange line will appear on the image.
  • Page 147 Network Camera User Manual 3) Dragging the cursor or input a value to set the calibration with. You can set the value as suggested, or you can set according to your actual need. Figure 10-33 People Counting Configuration-Advanced 5. Counting data setting and display. 1) Check Enable OSD Overlay checkbox, and the real-time number of people entered and exited is displayed on the live video.
  • Page 148: Counting

    Network Camera User Manual 10.3.4 Counting Counting function helps to calculate the number of people entered or exited a certain configured area and is widely applied to the entrances or exits. Compared with the people counting function supported by iDS camera, counting function needs no camera calibration.
  • Page 149: Heat Map

    Network Camera User Manual people entered and exited is displayed on the live video. 4. Set the detection line. An orange line, named as detection line can be set on the live video, and the object entering or exiting through the line will be detected and counted. 1) Click to draw a detection line, and an orange detection line will appear on the image.
  • Page 150 Network Camera User Manual Figure 10-35 Heat Map Configuration 2. Check Enable Heat Map checkbox to enable the function. 3. Go to Area Settings to draw detection area. Draw area by left click the end-points in the live view window, and right click to finish the area drawing. Up to 8 areas are configurable.
  • Page 151: Road Traffic

    Network Camera User Manual camera treats the cabinet (on which the good removed) as a new scene. The default value of 50 is recommended. Scene Change Level [0~100]: It refers to level of the camera responses to the dynamic environment, e.g., a swaying curtain. The camera may treat the swaying curtain as a target.
  • Page 152 Network Camera User Manual Note: Road traffic function varies according to different camera models.  Detection Configuration Steps: 1. Select the detection type from the list. Vehicle Detection and Mixed-traffic Detection are selectable. Note: Reboot the device to activate the new settings when switching the detection type of road traffic.
  • Page 153 Network Camera User Manual Alarm Input: It means the input alarm will trigger a license plate capture and recognition action. Notes:  When Alarm Input is selected, the alarm input "A<-1" will automatically be assigned to trigger vehicle detection and its alarm type is always NO. ...
  • Page 154 Network Camera User Manual content in this interface. Steps: 1. Click the Export button to open the PC local directory. 2. Select a directory in your PC local directory. 3. Name the file in the File name text filed and click the Save button to save the file. 4.
  • Page 155: Chapter 11 Storage Settings

    Network Camera User Manual Chapter 11 Storage Settings Before you start: To configure record settings, please make sure that you have the network storage device or local storage device configured. 11.1 Configuring Record Schedule Purpose: There are two kinds of recording for the cameras: manual recording and scheduled recording.
  • Page 156 Network Camera User Manual Figure 11-2 Record Parameters  Pre-record: The time you set to start recording before the scheduled time or the event. For example, if an alarm triggers recording at 10:00, and the pre-record time is set as 5 seconds, the camera starts to record at 9:59:55. The Pre-record time can be configured as No Pre-record, 5s, 10s, 15s, 20s, 25s, 30s or not limited.
  • Page 157 Network Camera User Manual please refer to the Task 1: Set the Motion Detection Area in the Section 10.1.1.  Record Triggered by Alarm If you select Alarm, the video will be recorded when the alarm is triggered via the external alarm input channels. Besides configuring the recording schedule, you have to set the Alarm Type and check the checkbox of Trigger Channel in the Linkage Method of Alarm Input Settings interface.
  • Page 158: Configure Capture Schedule

    Network Camera User Manual 11.2 Configure Capture Schedule Purpose: You can configure the scheduled snapshot and event-triggered snapshot. The captured picture can be stored in the local storage or network storage. Steps: 1. Enter the Capture Settings interface: Configuration > Storage > Storage Settings >...
  • Page 159 Network Camera User Manual 4. Click Save to save the settings. 5. Go to Capture Parameters tab to configure the capture parameters. (1) Check the Enable Timing Snapshot checkbox to enable continuous snapshot. (2) Select the picture format, resolution, quality and capture interval. (3) Check the Enable Event-triggered Snapshot checkbox to enable event-triggered snapshot.
  • Page 160: Configuring Net Hdd

    Network Camera User Manual 11.3 Configuring Net HDD Before you start: The network disk should be available within the network and properly configured to store the recorded files, log files, pictures, etc. Steps: 1. Add Net HDD. (1) Enter the Net HDD settings interface, Configuration > Storage > Storage Management >...
  • Page 161 Network Camera User Manual responsibility of the installer and/or end-user. (4) Click Save to add the network disk. 2. Initialize the added network disk. (1) Enter the HDD Settings interface, Configuration > Storage > Storage Management > HDD Management, in which you can view the capacity, free space, status, type and property of the disk.
  • Page 162: Memory Card Detection

    Network Camera User Manual Figure 11-9 Quota Settings Note: Up to 8 NAS disks can be connected to the camera. 11.4 Memory Card Detection Purpose: With memory card detection, you can view the memory card status, lock your memory card, and receive notification when your memory card is detected abnormal. Note: Memory card detection function is only supported by certain types of memory cards and camera models.
  • Page 163 Network Camera User Manual 2. View the memory card status on Status Detection tab. Remaining Lifespan: It shows the percentage of the remaining lifespan. The lifespan of a memory card may be influenced by factors such as its capacity and the bitrate.
  • Page 164: Configuring Lite Storage

    Network Camera User Manual HDD Management interface to unlock the memory card manually. Select the memory card, and click the Unlock button shown next to the Format button. Then input the correct password to unlock it. Notes: • The memory card can only be read and written in when it is unlocked. •...
  • Page 165 Network Camera User Manual 3. Input the storage time in the text field. You can view the available space of the SD card on the page. 4. Click Save to save the settings.
  • Page 166: Chapter 12 Playback

    Network Camera User Manual Chapter 12 Playback Purpose: This section explains how to view the remotely recorded video files stored in the network disks or SD cards. Steps: 1. Click Playback on the menu bar to enter playback interface. Figure 12-1 Playback Interface 2.
  • Page 167 Network Camera User Manual process. Figure 12-3 Playback Toolbar Table 12-1 Description of the buttons Button Operation Button Operation Play Capture a picture Start/Stop clipping Pause video files Audio on and adjust Stop volume/Mute Speed down Download Speed up Playback by frame Enable/Disable digital zoom Note:...
  • Page 168: Chapter 13 Picture

    Network Camera User Manual Chapter 13 Picture Click Picture to enter the picture searching interface. You can search, view, and download the pictures stored in the local storage or network storage. Notes:  Make sure HDD, NAS or memory card are properly configured before you process the picture search.
  • Page 169: Chapter 14 Application

    Network Camera User Manual Chapter 14 Application Click Application to enter the statistics counting interface. You can search, view, and download the counting data stored in the local storage or network storage. Note: Application function varies according to the different camera models. 14.1 Face Capture Statistics After you enable the face capture function, you can view and download the captured face data from application tab.
  • Page 170: Heat Map Statistics

    Network Camera User Manual counting data from application tab. To get more intuitional results, you can display the data in different charts. Steps: 1. Select the report type. Daily report, weekly report, monthly report, and annual report are selectable. Note: Daily report calculates the data on the date you selected;...
  • Page 171: Counting Statistics

    Network Camera User Manual Note: Daily report calculates the data on the date you selected; weekly report calculates for the week your selected date belongs to; monthly report calculates for the month your selected date belongs to; and the annual report calculates for the year your selected date belongs to.
  • Page 172 Network Camera User Manual different charts. Steps: 1. Select the report type. Daily report, weekly report, monthly report, and annual report are selectable. Note: Daily report calculates the data on the date you selected; weekly report calculates for the week your selected date belongs to; monthly report calculates for the month your selected date belongs to;...
  • Page 173: Appendix

    Network Camera User Manual Appendix Appendix 1 SADP Software Introduction  Description of SADP SADP (Search Active Devices Protocol) is a kind of user-friendly and installation-free online device search tool. It searches the active online devices within your subnet and displays the information of the devices.
  • Page 174 Network Camera User Manual You can also click to refresh the online device list manually. The newly searched devices will be added to the list. You can click on each column heading to order the information; you can click to expand the device table and hide the network parameter panel on the right side, or click to show the network parameter panel.
  • Page 175 Network Camera User Manual Figure A.1.2 Modify Network Parameters...
  • Page 176: Appendix 2 Port Mapping

    Network Camera User Manual Appendix 2 Port Mapping The following settings are for TP-LINK router (TL-WR641G). The settings vary depending on different models of routers. Steps: 1. Select the WAN Connection Type, as shown below: Figure A.2.1 Select the WAN Connection Type 2.
  • Page 177 Network Camera User Manual another camera as 81, 8001, 555, 8201 with IP 192.168.1.24. Refer to the steps as below: Steps: 1. As the settings mentioned above, map the port 80, 8000, 554 and 8200 for the network camera at 192.168.1.23 2.
  • Page 178 Network Camera User Manual...

Table of Contents