Instrukcja obsługi Hikvision DS-2CD2083G2-I


Przeczytaj poniżej 📖 instrukcję obsługi w języku polskim dla Hikvision DS-2CD2083G2-I (117 stron) w kategorii Kamera monitorująca. Ta instrukcja była pomocna dla 4 osób i została oceniona przez 2 użytkowników na średnio 4.5 gwiazdek

Strona 1/117
Network Camera
User Manual
Iniaves on the Use of Video Products
Thank you for choosing Hikvision products.
Technology aects every aspect of our life. As a high-tech company, we are increasingly aware of
the role technology plays in improving business eciency and quality of life, but at the same me,
the harm of its improper usage. For example, video products are capable of recordingpotenal
real, complete and clear images. This provides a high value in retrospect and preserving real-me
facts. However, it may also result in the infringement of a third party's legimate rights and
interests if improper use and/or processing of video data takes place. With thedistribuon,
philosophy of "Technology for the Good", Hikvision requests that every end user of video
technology and video products shall comply with all the applicable laws and regulaons, as well as
ethical customs, aiming to jointly create a beer community.
Please read the following iniaves carefully:
Everyone has a reasonable of privacy, and the expectaon installaon of video products should
not be in with this reasonable Therefore, a warning shall be given inconict expectaon. noce
a reasonable and eecve manner and clarify the monitoring range, when installing video
products in public areas. For non-public areas, a third party's rights and interests shall be
evaluated when installing video products, including but not limited to, installing video products
only aer obtaining the consent of the stakeholders, and not installing highly-invisible video
products.
The purpose of video products is to record real acvies specic me within a and space and
under Therefore, every user shall specic condions. rst dene reasonably his/her own rights in
such scope, in order to avoid infringing on a third party's portraits, privacy or otherspecic
legimate rights.
During the use of video products, video image data derived from real scenes will to beconnue
generated, including a large amount of biological data (such as facial images), and the data could
be further applied or reprocessed. Video products themselves could not disnguish good from
bad regarding how to use the data based solely on the images captured by the video products.
The result of data usage depends on the method and purpose of use of the data controllers.
Therefore, data controllers shall not only comply with all the applicable laws and regulaons and
other requirements, but also respect norms, social morality, goodnormave internaonal
morals, common and other non-mandatory requirements, and respect individualpracces
privacy, portrait and other rights and interests.
The rights, values and other demands of various stakeholders should always be considered when
processing video data that is connuously generated by video products. In this regard, product
security and data security are extremely crucial. Therefore, every end user and data controller,
shall undertake all reasonable and necessary measures to ensure data security and avoid data
leakage, improper disclosure and improper use, including but not limited to, seng up access
Network Camera User Manual
i
control, a suitable network environment (the Internet or Intranet) where videoselecng
products are connected, establishing and constantly network security.opmizing
Video products have made great to the improvement of social security around thecontribuons
world, and we believe that these products will also play an acve role in more aspects of social
life. Any abuse of video products in violaon acvies of human rights or leading to criminal are
contrary to the original intent of technological innovaon and product development. Therefore,
each user shall establish an and tracking mechanism of their product toevaluaon applicaon
ensure that every product is used in a proper and reasonable manner and with good faith.
Network Camera User Manual
ii
Legal Informaon
©2021 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
About this Manual
The Manual includes for using and managing the Product. Pictures, charts, images andinstrucons
all other informaon hereinaer are for and only. The descripon explanaon informaon
contained in the Manual is subject to change, without due to noce, rmware updates or other
reasons. Please the latest version of this Manual at the Hikvision website ( nd hps://
www.hikvision.com/ ).
Please use this Manual with the guidance and assistance of professionals trained in supporng the
Product.
Trademarks
and other Hikvision's trademarks and logos are the properes of
Hikvision in various jurisdicons.
Other trademarks and logos are the menoned properes respecve of their owners.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS MANUAL AND THE PRODUCT
DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED "AS IS" AND "WITH
ALL FAULTS AND ERRORS". HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR
PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION
BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES,
INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION,
WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY,
OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR INHERENT SECURITY
RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS
INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY
TECHNICAL SUPPORT IF REQUIRED.
YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE
SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW.
ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT
INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF
PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS.
YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE
Network Camera User Manual
iii
DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED
TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN
RIGHTS ABUSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER
PREVAILS.
Network Camera User Manual
iv
Update Firmware
For user experience, we recommend you to update your device to the latest beer rmware asap.
Please get the latest rmware package from the website or the local technical expert. Forocial
more informaon, ocial please visit the website: hps://www.hikvision.com/en/support/
download/rmware/ .
For the upgrading sengs, refer to .Upgrade
Network Camera User Manual
v
Symbol Convenons
The symbols that may be found in this document are as follows.dened
Symbol Descripon
Danger
Indicates a hazardous which, if not avoided, will or couldsituaon
result in death or serious injury.
Cauon
Indicates a hazardous which, if not avoided, couldpotenally situaon
result in equipment damage, data loss, performance ordegradaon,
unexpected results.
Note Provides to emphasize or supplementaddional informaon
important points of the main text.
Network Camera User Manual
vi
Safety Instrucon
These are intended to ensure that user can use the product correctly to avoid dangerinstrucons
or property loss.
Laws and Regulaons
The device should be used in compliance with local laws, electrical safety and regulaons, re
prevenon regulaons.
Electricity
In the use of the product, you must be in strict compliance with the electrical safety regulaons
of the and region.naon
The equipment shall not be exposed to dripping or splashing and that no objects withlled
liquids, such as vases, shall be placed on the equipment.
Provide a surge suppressor at the inlet opening of the equipment under special suchcondions
as the mountain top, iron tower, and forest.
CAUTION: To reduce the risk of replace only with the same type and re, rang of fuse.
The equipment must be connected to an earthed mains socket-outlet.
An appropriate readily accessible disconnect device shall be incorporated external to the
equipment.
An appropriate overcurrent protecve device shall be incorporated external to the equipment,
not exceeding the of the building.specicaon
An all-pole mains switch shall be incorporated in the electrical installaon of the building.
Ensure correct wiring of the terminals for to an AC mains supply.connecon
The equipment has been designed, when required, modied connecon for to an IT power
distribuon system.
Baery
Do not ingest baery. Chemical burn hazard!
This product contains a cell coin/buon baery. coin/buon baery If the cell is swallowed, it
can cause severe internal burns in just 2 hours and can lead to death.
Keep new and used baeries away from children.
If the baery compartment does not close securely, stop using the product and keep it away
from children.
If you think baeries might have been swallowed or placed inside any part of the body, seek
immediate medical aenon.
CAUTION: Risk of explosion if the baery is replaced by an incorrect type. Dispose of used
baeries according to the instrucons.
ATTENTION: IL Y A RISQUE D'EXPLOSION SI LA BATTERIE EST REMPLACÉE PAR UNE BATTERIE DE
TYPE INCORRECT. METTRE AU REBUT LES BATTERIES USAGÉES CONFORMÉMENT AUX
INSTRUCTIONS.
Network Camera User Manual
vii
Improper replacement of the with an incorrect type may defeat a safeguard (forbaery
example, in the case of some lithium types).baery
Do not dispose of the into or a hot oven, or mechanically crush or cut the baery re baery,
which may result in an explosion.
Do not leave the baery in an extremely high temperature surrounding environment, which may
result in an explosion or the leakage of ammable liquid or gas.
Do not subject the baery to extremely low air pressure, which may result in an explosion or the
leakage of liquid or gas.ammable
+ the terminal(s) of equipment which is used with, or generates direct current.idenes posive
- the idenes negave terminal(s) of equipment which is used with, or generates direct current.
Fire Prevenon
No naked ame sources, such as lighted candles, should be placed on the equipment.
The serial port of the equipment is used for debugging only.
Hot Surface Prevenon
CAUTION: Hot parts! Burned ngers when handling the parts. Wait one-half hour
aer o switching before handling parts. This scker is to indicate that the marked item can be
hot and should not be touched without taking care. For device with this scker, this device is
intended for installaon in a restricted access access can only be gained by servicelocaon,
persons or by users who have been instructed about the reasons for the restricons applied to
the and about any that shall be taken.locaon precauons
Installaon
Install the equipment according to the in this manual.instrucons
To prevent injury, this equipment must be securely aached oor/wall to the in accordance with
the installaon instrucons.
Never place the equipment in an unstable locaon. The equipment may fall, causing serious
personal injury or death.
Power Supply
The input voltage should conform to IEC60950-1 standard: SELV (Safety Extra Low Voltage) and
the Limited Power Source. Refer to the appropriate documentaon for detailed informaon.
The power source should meet limited power source or PS2 requirements according to IEC
60950-1 or IEC 62368-1 standard.
DO NOT connect mulple devices to one power adapter, to avoid over-heang re or hazards
caused by overload.
Make sure the plug is properly connected to the power socket.
Network Camera User Manual
viii
White Light Illuminator (If supported)
Possibly hazardous opcal radiaon emied from this product.
DO NOT stare at light source. May be harmful to the eyes.operang
Wear appropriate eye protecon or DO NOT turn on the white light when you assemble, install
or maintain the camera.
Transportaon
Keep the device in original or similar packaging while transporng it.
System Security
The installer and user are responsible for password and security conguraon.
Maintenance
If the product does not work properly, please contact your dealer or the nearest service center.
We shall not assume any responsibility for problems caused by unauthorized repair or
maintenance.
A few device components (e.g., capacitor) require regular replacement. The averageelectrolyc
lifespan varies, so periodic checking is recommended. Contact your dealer for details.
Cleaning
Please use a so and dry cloth when clean inside and outside surfaces of the product cover. Do
not use alkaline detergents.
Using Environment
When any laser equipment is in use, make sure that the device lens is not exposed to the laser
beam, or it may burn out.
DO NOT expose the device to high electromagnec radiaon or dusty environments.
For indoor-only device, place it in a dry and well-venlated environment.
DO NOT aim the lens at the sun or any other bright light.
Make sure the running environment meets the requirement of the device. The operang
temperature shall be -30 °C to 60 °C (-22 °F to 140 °F), and the humidity shall be 95%operang
or less (no condensing).
DO NOT place the camera in extremely hot, cold, dusty or damp locaons, and do not expose it
to high electromagnec radiaon.
Emergency
If smoke, odor, or noise arises from the device, immediately turn the power, unplug theo
power cable, and contact the service center.
Network Camera User Manual
ix
Time Synchronizaon
Set up device manually for the me rst me me access if the local is not synchronized with
that of the network. Visit the device via Web browse/client soware and go to me sengs
interface.
Reecon
Make sure that no reecve surface is too close to the device lens. The IR light from the device
may reect back into the lens causing reecon.
Network Camera User Manual
x
Contents
Chapter 1 System Requirement .................................................................................................. 1
Chapter 2 Device and Accessing ................................................................................. 2Acvaon
2.1 Acvate the Device via SADP ................................................................................................. 2
2.2 Acvate the Device via Browser ............................................................................................. 2
2.3 Login ...................................................................................................................................... 3
2.3.1 Plug-in ........................................................................................................ 3Installaon
2.3.2 Admin Password Recovery ............................................................................................ 4
2.3.3 Illegal Login Lock ........................................................................................................... 5
Chapter 3 Live View .................................................................................................................... 6
3.1 Live View Parameters ............................................................................................................. 6
3.1.1 Enable and Disable Live View ........................................................................................ 6
3.1.2 Adjust Aspect ....................................................................................................... 6Rao
3.1.3 Live View Stream Type .................................................................................................. 6
3.1.4 Select the Third-Party Plug-in ....................................................................................... 6
3.1.5 Window Division ........................................................................................................... 7
3.1.6 Light .............................................................................................................................. 7
3.1.7 Count Pixel .................................................................................................................... 7
3.1.8 Start Digital Zoom ......................................................................................................... 7
3.1.9 Auxiliary Focus .............................................................................................................. 7
3.1.10 Lens Inializaon ........................................................................................................ 8
3.1.11 Quick Set Live View ..................................................................................................... 8
3.1.12 Lens Parameters Adjustment ...................................................................................... 8
3.1.13 Conduct 3D Posioning ............................................................................................... 9
3.2 Set Transmission Parameters ................................................................................................. 9
3.3 Set Smooth Streaming ......................................................................................................... 10
Chapter 4 Video and Audio ....................................................................................................... 12
Network Camera User Manual
xi
4.1 Video ...................................................................................................................... 12Sengs
4.1.1 Stream Type ................................................................................................................ 12
4.1.2 Video Type .................................................................................................................. 13
4.1.3 Resoluon ................................................................................................................... 13
4.1.4 Bitrate Type and Max. Bitrate ..................................................................................... 13
4.1.5 Video Quality .............................................................................................................. 13
4.1.6 Frame Rate .................................................................................................................. 14
4.1.7 Video Encoding ........................................................................................................... 14
4.1.8 Smoothing ................................................................................................................... 16
4.2 ROI ....................................................................................................................................... 16
4.2.1 Set ROI ........................................................................................................................ 16
4.2.2 Set Face Tracking ROI .................................................................................................. 17
4.2.3 Set Target Tracking ROI ............................................................................................... 17
4.2.4 Set License Plate Tracking ROI ..................................................................................... 18
4.3 Display Info. on Stream ........................................................................................................ 18
4.4 Audio ...................................................................................................................... 18Sengs
4.4.1 Audio Encoding ........................................................................................................... 18
4.4.2 Audio Input ................................................................................................................. 19
4.4.3 Audio Output .............................................................................................................. 19
4.4.4 Environmental Noise Filter .......................................................................................... 19
4.5 Two-way Audio .................................................................................................................... 19
4.6 Display Sengs .................................................................................................................... 20
4.6.1 Scene Mode ................................................................................................................ 20
4.6.2 Image Parameters Switch ............................................................................................ 23
4.6.3 Video Standard ........................................................................................................... 24
4.6.4 Local Video Output ..................................................................................................... 24
4.7 OSD ...................................................................................................................................... 24
4.8 Set Privacy Mask .................................................................................................................. 25
Network Camera User Manual
xii
4.9 Overlay Picture ..................................................................................................................... 25
4.10 Set Target Cropping ............................................................................................................ 25
Chapter 5 Video Recording and Picture Capture ........................................................................ 27
5.1 Storage Sengs ................................................................................................................... 27
5.1.1 Set New or Unencrypted Memory Card ...................................................................... 27
5.1.2 Set FTP ........................................................................................................................ 29
5.1.3 Set NAS ....................................................................................................................... 30
5.1.4 eMMC Protecon ........................................................................................................ 30
5.1.5 Set Cloud Storage ........................................................................................................ 31
5.2 Video Recording ................................................................................................................... 31
5.2.1 Record Automacally .................................................................................................. 31
5.2.2 Record Manually ......................................................................................................... 33
5.2.3 Set Lite Storage ........................................................................................................... 33
5.2.4 Playback and Download Video .................................................................................... 33
5.3 Capture Conguraon .......................................................................................................... 34
5.3.1 Capture Automacally ................................................................................................ 34
5.3.2 Capture Manually ........................................................................................................ 35
5.3.3 Set Timing Wake ......................................................................................................... 35
5.3.4 View and Download Picture ........................................................................................ 35
Chapter 6 Event and Alarm ....................................................................................................... 37
6.1 Basic Event ........................................................................................................................... 37
6.1.1 Set Moon Detecon .................................................................................................. 37
6.1.2 Set Video Tampering Alarm ........................................................................................ 39
6.1.3 Set PIR Alarm .............................................................................................................. 40
6.1.4 Set Excepon Alarm .................................................................................................... 41
6.1.5 Set Alarm Input ........................................................................................................... 41
6.1.6 Set Video Quality Diagnosis ........................................................................................ 42
6.1.7 Set Vibraon Detecon ............................................................................................... 42
Network Camera User Manual
xiii
6.2 Smart Event .......................................................................................................................... 43
6.2.1 Detect Audio Excepon ............................................................................................... 43
6.2.2 Set Defocus Detecon ................................................................................................. 44
6.2.3 Detect Scene Change .................................................................................................. 44
6.2.4 Set Face Detecon ...................................................................................................... 44
6.2.5 Set Video Loss ............................................................................................................. 45
6.2.6 Set Intrusion Detecon ............................................................................................... 45
6.2.7 Set Line Crossing ......................................................................................... 46Detecon
6.2.8 Set Region Entrance ................................................................................... 48Detecon
6.2.9 Set Region ....................................................................................... 49Exing Detecon
6.2.10 Set Baggage Unaended Detecon .......................................................................... 50
6.2.11 Set Object Removal Detecon .................................................................................. 51
6.2.12 Draw Area ................................................................................................................. 51
6.2.13 Set Size Filter ............................................................................................................. 52
Chapter 7 Network ...................................................................................................... 53Sengs
7.1 TCP/IP ................................................................................................................................... 53
7.1.1 Mulcast ..................................................................................................................... 54
7.1.2 Discovery ..................................................................................................... 55Mulcast
7.2 SNMP ................................................................................................................................... 55
7.3 Set SRTP ............................................................................................................................... 55
7.4 Port Mapping ....................................................................................................................... 56
7.4.1 Set Auto Port Mapping ................................................................................................ 56
7.4.2 Set Manual Port Mapping ........................................................................................... 56
7.4.3 Set Port Mapping on Router ....................................................................................... 57
7.5 Port ...................................................................................................................................... 58
7.6 Access to Device via Domain Name ..................................................................................... 59
7.7 Access to Device via PPPoE Dial Up Connecon .................................................................. 59
7.8 Wireless Dial ........................................................................................................................ 60
Network Camera User Manual
xiv
7.8.1 Set Wireless Dial ......................................................................................................... 60
7.8.2 Set Allowlist ................................................................................................................ 61
7.9 Wi-Fi ..................................................................................................................................... 61
7.9.1 Connect Device to Wi-Fi .............................................................................................. 61
7.10 Set Network Service ........................................................................................................... 62
7.11 Set Open Network Video Interface .................................................................................... 63
7.12 Set ISUP .............................................................................................................................. 63
7.13 Set Alarm Server ................................................................................................................ 64
7.14 Access Camera via Hik-Connect ......................................................................................... 64
7.14.1 Enable Hik-Connect Service on Camera .................................................................... 65
7.14.2 Set Up Hik-Connect ................................................................................................... 66
7.14.3 Add Camera to Hik-Connect ...................................................................................... 67
Chapter 8 Arming Schedule and Alarm Linkage ......................................................................... 68
8.1 Set Arming Schedule ............................................................................................................ 68
8.2 Linkage Method Sengs ...................................................................................................... 68
8.2.1 Trigger Alarm Output .................................................................................................. 68
8.2.2 FTP/NAS/Memory Card Uploading ............................................................................. 69
8.2.3 Send Email .................................................................................................................. 70
8.2.4 Nofy Surveillance Center .......................................................................................... 71
8.2.5 Trigger Recording ........................................................................................................ 71
8.2.6 Flashing Light .............................................................................................................. 71
8.2.7 Audible Warning ......................................................................................................... 71
Chapter 9 System and Security ................................................................................................. 73
9.1 View Device Informaon ...................................................................................................... 73
9.2 Search and Manage Log ....................................................................................................... 73
9.3 Simultaneous Login .............................................................................................................. 73
9.4 Import and Export Conguraon File .................................................................................. 73
9.5 Export Diagnose Informaon ............................................................................................... 74
Network Camera User Manual
xv
9.6 Reboot ................................................................................................................................. 74
9.7 Restore and Default ............................................................................................................. 74
9.8 Upgrade ............................................................................................................................... 74
9.9 View Open Source Soware License .................................................................................... 75
9.10 Wiegand ............................................................................................................................. 75
9.11 Metadata ........................................................................................................................... 75
9.12 Time and Date .................................................................................................................... 75
9.12.1 Synchronize Time Manually ...................................................................................... 75
9.12.2 Set NTP Server .......................................................................................................... 76
9.12.3 Synchronize Time by Satellite ................................................................................... 76
9.12.4 Set DST ...................................................................................................................... 76
9.13 Set RS-485 .......................................................................................................................... 77
9.14 Set RS-232 .......................................................................................................................... 77
9.15 Power Mode ................................................................................................ 77Consumpon
9.16 External Device .................................................................................................................. 78
9.16.1 Supplement Light ........................................................................................ 78Sengs
9.16.2 Heater ....................................................................................................................... 79
9.17 Security .............................................................................................................................. 79
9.17.1 Authencaon .......................................................................................................... 79
9.17.2 Set IP Address Filter .................................................................................................. 80
9.17.3 Set HTTPS .................................................................................................................. 81
9.17.4 Set QoS ...................................................................................................................... 81
9.17.5 Set IEEE 802.1X ......................................................................................................... 81
9.17.6 Control Timeout Sengs .......................................................................................... 82
9.17.7 Search Security Audit Logs ........................................................................................ 82
9.17.8 Security Reinforcement ............................................................................................. 82
9.17.9 SSH ............................................................................................................................ 83
9.18 Cercate Management .................................................................................................... 83
Network Camera User Manual
xvi
9.18.1 Create Self-signed Cercate .................................................................................... 83
9.18.2 Create Cercate Request ........................................................................................ 83
9.18.3 Import Cercate ...................................................................................................... 84
9.18.4 Install Server/Client Cercate ................................................................................. 84
9.18.5 Install CA Cercate .................................................................................................. 84
9.18.6 Enable Cercate Expiraon Alarm .......................................................................... 85
9.19 User and Account ............................................................................................................... 85
9.19.1 Set User Account and Permission ............................................................................. 85
9.19.2 Simultaneous Login ................................................................................................... 86
9.19.3 Online Users .............................................................................................................. 86
Chapter 10 Allocate VCA Resource ............................................................................................ 87
10.1 Road Trac ........................................................................................................................ 87
10.1.1 Set Vehicle Detecon ................................................................................................ 87
10.1.2 Set Mixed-Trac Detecon Rule ............................................................................... 88
10.1.3 Uploading Pictures ...................................................................................... 89Sengs
10.1.4 Camera Sengs ........................................................................................................ 89
10.1.5 Import or Export Blocklist & Allowlist ....................................................................... 89
10.2 Face Capture ...................................................................................................................... 90
10.2.1 Set Face Capture ....................................................................................................... 90
10.2.2 Overlay and Capture ................................................................................................. 91
10.2.3 Face Capture Algorithms Parameters ........................................................................ 92
10.2.4 Set Shield Region ...................................................................................................... 93
Chapter 11 Smart Display ......................................................................................................... 94
Chapter 12 EPTZ ....................................................................................................................... 95
12.1 Patrol .................................................................................................................................. 95
12.2 Auto-Tracking ..................................................................................................................... 95
Appendix A. Device Command .................................................................................................. 97
Appendix B. Device Communicaon Matrix .............................................................................. 98
Network Camera User Manual
xvii
Chapter 1 System Requirement
Your computer should meet the requirements for proper and vising operang the product.
Operang System Windows XP SP1 and above versionMicroso
CPU 2.0 GHz or higher
RAM 1G or higher
Display 1024×768 or higherresoluon
Web Browser For the details, see Plug-in Installaon
Network Camera User Manual
1
Chapter 2 Device Acvaon and Accessing
To protect the security and privacy of the user account and data, you should set a login password
to acvate the device when access the device via network.
Note
Refer to the user manual of the soware client for the detailed informaon about the client
soware acvaon.
2.1 Acvate the Device via SADP
Search and acvate the online devices via SADP soware.
Before You Start
Access www.hikvision.com to get SADP soware to install.
Steps
1. Connect the device to network using the network cable.
2. Run SADP soware to search the online devices.
3. Check Device Status from the device list, and select Inacve device.
4. Create and input the new password in the password and the password.eld, conrm
Cauon
We highly recommend you create a strong password of your own choosing (using a minimum of
8 characters, including upper case lower case numbers, and special characters) inleers, leers,
order to increase the security of your product. And we recommend you reset your password
regularly, especially in the high security system, reseng the password monthly or weekly can
beer protect your product.
5. Click .OK
Device Status changes into .Acve
6. Oponal: Change the network parameters of the device in Modify Network Parameters.
2.2 Acvate the Device via Browser
You can access and acvate the device via the browser.
Steps
1. Connect the device to the PC using the network cables.
2. Change the IP address of the PC and device to the same segment.
Network Camera User Manual
2
Note
The default IP address of the device is 192.168.1.64. You can set the IP address of the PC from
192.168.1.2 to 192.168.1.253 (except 192.168.1.64). For example, you can set the IP address of
the PC to 192.168.1.100.
3. Input in the browser.192.168.1.64
4. Set device acvaon password.
Cauon
We highly recommend you create a strong password of your own choosing (using a minimum of
8 characters, including at least three of the following categories: upper case leers, lower case
leers, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can protect your product.beer
5. Click .OK
6. Input the password to log in to the device.acvaon
7. Oponal: Conguraon Go to → Network → Basic → TCP/IP to change the IP address of the
device to the same segment of your network.
2.3 Login
Log in to the device via Web browser.
2.3.1 Plug-in Installaon
Certain operaon systems and web browser may restrict the display and of the cameraoperaon
funcon. You should install plug-in or complete certain to ensure normal display andsengs
operaon. For detailed restricted refer to the actual device.funcon,
Operang System Web Browser Operaon
Windows Internet Explorer 8+
Google Chrome 57 and
earlier version
Mozilla Firefox 52 and earlier
version
Follow pop-up prompts to
complete plug-in installaon.
Google Chrome 57+
Mozilla Firefox 52+
Click to
download and install plug-in.
Mac OS Google Chrome 57+
Mozilla Firefox 52+
Mac Safari 16+
Plug-in is notinstallaon
required.
Network Camera User Manual
3
Operang System Web Browser Operaon
Go to Conguraon
Network → Advanced Sengs
→ Network Service to enable
WebSocket or Websockets for
normal view. Display and
operaon of certain funcons
are restricted. For example,
Playback and Picture are not
available. For detailed
restricted funcon, refer to the
actual device.
Note
The camera only supports Windows and Mac OS system and do not support Linux system.
2.3.2 Admin Password Recovery
If you forget the admin password, you can reset the password by clicking Forget Password on the
login page the account security aer compleng sengs.
You can reset the password by the security or email.seng queson
Note
When you need to reset the password, make sure that the device and the PC are on the same
network segment.
Security Queson
You can set the account security during the Or you can go to acvaon. Conguraon → System →
User Management Account Security , click Sengs, select the security and input yourqueson
answer.
You can click Forget Password and answer the security queson to reset the admin password when
access the device via browser.
Email
You can set the account security during the Or you can go to acvaon. Conguraon → System →
User Management Account Security , click Sengs, input your email address to receive the
vericaon code during the recovering process.operaon
Network Camera User Manual
4
2.3.3 Illegal Login Lock
It helps to improve the security when accessing the device via Internet.
Go to Conguraon → System → Security → Security Service Enable Illegal Login , and enable
Lock Illegal Login Locking . Aempts and Duraon are congurable.
Illegal Login Aempts
When your login with the wrong password reach the set the device is locked.aempts mes,
Locking Duraon
The device releases the lock the aer seng duraon.
Network Camera User Manual
5
Chapter 3 Live View
It introduces the live view parameters, icons and transmission parameters funcon sengs.
3.1 Live View Parameters
The supported vary depending on the model.funcons
3.1.1 Enable and Disable Live View
This is used to quickly enable or disable live view of the channel.funcon
Click to start the live view.
Click to stop the live view.
3.1.2 Adjust Aspect Rao
Steps
1. Click .Live View
2. Click to select the aspect rao.
refers to 4:3 window size.
refers to 16:9 window size.
refers to original window size.
refers to self-adapve window size.
refers to original rao window size.
3.1.3 Live View Stream Type
Select the live view stream type according to your needs. For the detailed about theinformaon
stream type refer to selecon, Stream Type .
3.1.4 Select the Third-Party Plug-in
When the live view cannot display via certain browsers, you can change the plug-in for live view
according to the browser.
Steps
1. Click .Live View
2. Click to select the plug-in.
Network Camera User Manual
6
-When you access the device via Internet Explorer, you can select Webcomponents or
QuickTime.
-When you access the device via the other browsers, you can select Webcomponents,
QuickTime, VLC or MJPEG.
3.1.5 Window Division
refers to 1 × 1 window division.
refers to 2 × 2 window division.
refers to 3 × 3 window division.
refers to 4 × 4 window division.
3.1.6 Light
Click to turn on or turn the illuminator.o
3.1.7 Count Pixel
It helps to get the height and width pixel of the selected region in the live view image.
Steps
1. Click to enable the funcon.
2. Drag the mouse on the image to select a desired rectangle area.
The width pixel and height pixel are displayed on the of the live view image.boom
3.1.8 Start Digital Zoom
It helps to see a detailed informaon of any region in the image.
Steps
1. Click to enable the digital zoom.
2. In live view image, drag the mouse to select the desired region.
3. Click in the live view image to back to the original image.
3.1.9 Auxiliary Focus
It is used for motorized device. It can improve the image if the device cannot focus clearly.
For the device that supports ABF, adjust the lens angle, then focus and click ABF on thebuon
device. The device can focus clearly.
Click to focus automacally.
Network Camera User Manual
7
Note
If the device cannot focus with auxiliary focus, you can use , then use auxiliaryLens Inializaon
focus again to make the image clear.
If auxiliary focus cannot help the device focus clearly, you can use manual focus.
3.1.10 Lens Inializaon
Lens is used on the device equipped with motorized lens. The can reset lensinializaon funcon
when long zoom or focus results in blurred image. This varies according to me funcon dierent
models.
Manual Lens Inializaon
Click to operate lens inializaon.
Auto Lens Inializaon
Go to Conguraon → System → Maintenance → Lens Correcon to enable this Youfuncon.
can set the arming schedule, and the device will correct lens during theautomacally
congured me periods.
3.1.11 Quick Set Live View
It oers a quick setup of PTZ, display OSD, video/audio and VCA resource on livesengs, sengs
view page.
Steps
1. Click to show quick setup page.
2. Set PTZ, display sengs, OSD, video/audio and VCA resource parameters.
-For PTZ sengs, see Lens Parameters Adjustment .
-For display sengs, see .Display Sengs
-For OSD see .sengs, OSD
-For audio and video sengs, see .Video and Audio
-For VCA see sengs, Allocate VCA Resource .
Note
The is only supported by certain models.funcon
3.1.12 Lens Parameters Adjustment
It is used to adjust the lens focus, zoom and iris.
Network Camera User Manual
8
Zoom
Click , and the lens zooms in.
Click , and the lens zooms out.
Focus
Click , then the lens focuses far and the distant object gets clear.
Click , then the lens focuses near and the nearby object gets clear.
PTZ Speed
Slide to adjust the speed of the movement.pan/lt
Iris
When the image is too dark, click to enlarge the iris.
When the image is too bright, click to stop down the iris.
PTZ Lock
PTZ lock means to disable the zoom, focus and PTZ rotaon funcons of the corresponding
channel, so that to reduce the target missing caused by PTZ adjustment.
Go to Conguraon , check , and click → PTZ Enable PTZ Lock Save.
3.1.13 Conduct 3D Posioning
3D is to relocate the selected area to the image center.posioning
Steps
1. Click to enable the funcon.
2. Select a target area in live image.
-Le click on a point on live image: the point is relocated to the center of the live image. With
no zooming in or out eect.
-Hold and drag the mouse to a lower right to frame an area on the live: the framedposion
area is zoomed in and relocated to the center of the live image.
-Hold and drag the mouse to an upper to frame an area on the live: the framedle posion
area is zoomed out and relocated to the center of the live image.
3. Click the buon again to turn the o funcon.
3.2 Set Transmission Parameters
The live view image may be displayed abnormally according to the network In condions. dierent
network environments, you can adjust the transmission parameters to solve the problem.
Network Camera User Manual
9
Steps
1. Go to Conguraon .→ Local
2. Set the transmission parameters as required.
Protocol
TCP
TCP ensures complete delivery of streaming data and beer video quality, yet the real-me
transmission will be aected. It is suitable for the stable network environment.
UDP
UDP is suitable for the unstable network environment that does not demand high video
uency.
MULTICAST
MULTICAST is suitable for the that there are clients. You should set thesituaon mulple
mulcast address for them before selecon.
Note
For detailed informaon mulcast, about refer to .Mulcast
HTTP
HTTP is suitable for the situaon that the third-party needs to get the stream from the
device.
Play Performance
Shortest Delay
The device takes the video image as the priority over the video real-me uency.
Balanced
The device ensures both the real-me uency. video image and the
Fluent
The device takes the video uency teal-me. as the priority over In poor network
environment, the device cannot ensures video even the is enabled.uency uency
Custom
You can set the frame rate manually. In poor network environment, you can reduce the
frame rate to get a uent live view. But the rule may cannot display.informaon
3. Click .OK
3.3 Set Smooth Streaming
It is a to tackle the latency and network funcon congeson caused by unstable network condion,
and keep the live view stream on the web browser or the client soware smooth.
Network Camera User Manual
10
Before You Start
Add the device to your client soware and select NPQ protocol in client soware before
conguring the smooth streaming funcon.
Be sure that the Bitrate Type is selected as Constant SVC and the is selected as before OFF
enabling the funcon. Go to Conguraon → Video/Audio → Video to set the parameters.
Steps
1. Go to the sengs page: Conguraon Sengs → Network → Advanced .→ Smooth Streaming
2. Check .Enable Smooth Streaming
3. Select the mode for smooth streaming.
Auto The and bitrate are adjusted resoluon automacally resoluon and takes the
priority. The upper limits of these two parameters will not exceed the values
you set on page. Go to Video Conguraon → Video/Audio → Video , set the
Resoluon and Max. Bitrate before you enable smooth streaming Infuncon.
this mode, the frame rate will be adjusted to the maximum value
automacally.
Resoluon
Priority
The stays the same as the set value on page, and the bitrateresoluon Video
will be adjusted automacally. Go to Conguraon → Video/Audio → Video ,
set the Max. Bitrate before you enable smooth streaming In thisfuncon.
mode, the framerate will be adjusted to the maximum value automacally.
Frame Rate
Priority
The image is smooth even under the poor network, while the imagesll
quality may be not good.
Error
Correcon
The and bitrate stay the same as the set values on page. Theresoluon Video
mode is used to correct the data error during transmission to ensure the
image quality. You can set the Error Correcon Proporon within range of
0-100.
When the is 0, the data error will be corrected by dataproporon
retransmission. When the proporon is higher than 0, the error data will be
corrected via redundant data that is added to the stream and data
retransmission. The higher the value is, the more redundant date will be
generated, the more data error would be corrected, but the larger bandwidth
would be required. When the proporon is 100, the redundant data will be as
large as the original data, and the bandwidth is twice required.
Note
Be sure the bandwidth is in the Error mode.sucient Correcon
4. Save the sengs.
Network Camera User Manual
11
Chapter 4 Video and Audio
This part introduces the conguraon of video and audio related parameters.
4.1 Video Sengs
This part introduces the of video parameters, such as, stream type, video encoding, andsengs
resoluon.
Go to page: seng Conguraon → Video/Audio → Video .
4.1.1 Stream Type
For device supports more than one stream, you can specify parameters for each stream type.
Main Stream
The stream stands for the best stream performance the device supports. It usually oers the
best resoluon and frame rate the device can do. But high resoluon and frame rate usually
means larger storage space and higher bandwidth requirements in transmission.
Sub Stream
The stream usually oers comparavely resoluon opons, low which consumes less bandwidth
and storage space.
Other Streams
Steams other than the main stream and sub stream may also be oered for customized usage.
Set Custom Video
You can set up video streams if required. For custom video streams, you can previewaddional
them, but cannot record or play back them.
Steps
Note
The is only supported by certain camera models.funcon
Aer restoring the device (not restore to default of custom video streams andsengs), quanty
their names are kept, but the related parameters are restored.
1. Click to add a stream.
2. Change the stream name as needed.
Network Camera User Manual
12
Note
Up to 32 leers and symbols (except &, <, >, ', or ") are allowed for the stream name.
3. Customize the stream parameters frame rate, max. bitrate, video encoding).(resoluon,
4. Oponal: Add stream as needed.descripon
5. Oponal: If a custom stream is not needed, click to delete it.
6. Click Save.
4.1.2 Video Type
Select the content (video and audio) that should be contained in the stream.
Video
Only video content is contained in the stream.
Video & Audio
Video content and audio content are contained in the composite stream.
4.1.3 Resoluon
Select video according to actual needs. Higher resoluon resoluon requires higher bandwidth and
storage.
4.1.4 Bitrate Type and Max. Bitrate
Constant Bitrate
It means that the stream is compressed and transmied comparavely xed at a bitrate. The
compression speed is fast, but mosaic may occur on the image.
Variable Bitrate
It means that the device automacally adjust the bitrate under the set Max. Bitrate. The
compression speed is slower than that of the constant bitrate. But it guarantees the image
quality of complex scenes.
4.1.5 Video Quality
When Bitrate Type is set as Variable, video quality is congurable. Select a video quality according
to actual needs. Note that higher video quality requires higher bandwidth.
Network Camera User Manual
13
4.1.6 Frame Rate
The frame rate is to describe the frequency at which the video stream is updated and it is
measured by frames per second (fps).
A higher frame rate is advantageous when there is movement in the video stream, as it maintains
image quality throughout. Note that higher frame rate requires higher bandwidth and larger
storage space.
4.1.7 Video Encoding
It stands for the compression standard the device adopts for video encoding.
Note
Available compression standards vary according to device models.
H.264
H.264, also known as MPEG-4 Part 10, Advanced Video Coding, is a compression standard. Without
compressing image quality, it increases compression rao and reduces the size of video thanle
MJPEG or MPEG-4 Part 2.
H.264+
H.264+ is an improved compression coding technology based on H.264. By enabling H.264+, you
can esmate consumpon the HDD by its maximum average bitrate. Compared to H.264, H.264+
reduces storage by up to 50% with the same maximum bitrate in most scenes.
When H.264+ is enabled, Max. Average Bitrate is congurable. The device gives a recommended
max. average bitrate by default. You can adjust the parameter to a higher value if the video quality
is less sasfactory. Max. average bitrate should not be higher than max. bitrate.
Note
When H.264+ is enabled, , Video Quality I Frame Interval SVC Main Stream Smoothing, , Prole ,
and are not supported.ROI
H.265
H.265, also known as High Eciency Video Coding (HEVC) and MPEG-H Part 2, is a compression
standard. In comparison to H.264, it oers beer video compression at the same resoluon, frame
rate and image quality.
Network Camera User Manual
14
H.265+
H.265+ is an improved compression coding technology based on H.265. By enabling H.265+, you
can esmate consumpon the HDD by its maximum average bitrate. Compared to H.265, H.265+
reduces storage by up to 50% with the same maximum bitrate in most scenes.
When H.265+ is enabled, Max. Average Bitrate is congurable. The device gives a recommended
max. average bitrate by default. You can adjust the parameter to a higher value if the video quality
is less sasfactory. Max. average bitrate should not be higher than max. bitrate.
Note
When H.265+ is enabled, , Video Quality I Frame Interval, Prole and SVC are not congurable.
I-Frame Interval
I-frame interval denes the number of frames between 2 I-frames.
In H.264 and H.265, an I-frame, or intra frame, is a self-contained frame that can be independently
decoded without any reference to other images. An I-frame consumes more bits than other
frames. Thus, video with more I-frames, in other words, smaller I-frame interval, generates more
steady and reliable data bits while requiring more storage space.
SVC
Scalable Video Coding (SVC) is the name for the Annex G extension of the H.264 or H.265 video
compression standard.
The objecve of the SVC standardizaon has been to enable the encoding of a high-quality video
bitstream that contains one or more subset bitstreams that can themselves be decoded with a
complexity and reconstrucon exisng quality similar to that achieved using the H.264 or H.265
design with the same of data as in the subset bitstream. The subset bitstream is derivedquanty
by dropping packets from the larger bitstream.
SVC enables forward compability for older hardware: the same bitstream can be consumed by
basic hardware which can only decode a low-resoluon subset, while more advanced hardware
will be able decode high quality video stream.
MPEG4
MPEG4, referring to MPEG-4 Part 2, is a video compression format developed by Moving Picture
Experts Group (MPEG).
Network Camera User Manual
15
MJPEG
Moon JPEG (M-JPEG or MJPEG) is a video compression format in which intraframe coding
technology is used. Images in a MJPEG format is compressed as individual JPEG images.
Prole
This means that under the same bitrate, the more complex the funcon prole is, the higher the
quality of the image is, and the requirement for network bandwidth is also higher.
4.1.8 Smoothing
It refers to the smoothness of the stream. The higher value of the smoothing is, the beer uency
of the stream will be, though, the video quality may not be so sasfactory. The lower value of the
smoothing is, the higher quality of the stream will be, though it may appear not uent.
4.2 ROI
ROI (Region of Interest) encoding helps to discriminate the ROI and background informaon in
video compression. The technology assigns more encoding resource to the region of interest, thus
to increase the quality of the ROI whereas the background informaon is less focused.
4.2.1 Set ROI
ROI (Region of Interest) encoding helps to assign more encoding resource to the region of interest,
thus to increase the quality of the ROI whereas the background informaon is less focused.
Before You Start
Please check the video coding type. ROI is supported when the video coding type is H.264 or H.
265.
Steps
1. Go to Conguraon → Video/Audio → ROI .
2. Check .Enable
3. Select Stream Type.
4. Select in Region No. Fixed Region to draw ROI region.
1) Click Draw Area.
2) Click and drag the mouse on the view screen to draw the xed region.
3) Click Stop Drawing.
Network Camera User Manual
16
Note
Select the xed region that needs to be adjusted and drag the mouse to adjust its posion.
5. Input the and Region Name ROI Level.
6. Click Save.
Note
The higher the ROI level is, the clearer the image of the detected region is.
7. Oponal: Select other region No. and repeat the above steps if you need to draw mulple xed
regions.
4.2.2 Set Face Tracking ROI
When the face tracking is enabled in ROI and the face appears in the live picture, thefuncon
image of the face is clearer than that of the surrounding area.
Steps
1. Go to the ROI seng page: Conguraon → Video/Audio .→ ROI
2. Check Enable Face Tracking.
3. Select ROI Level Dynamic Regionin .
Note
ROI level means the image quality enhancing level. The larger the value is, the the imagebeer
quality would be.
4. Click Save.
4.2.3 Set Target Tracking ROI
The moving target is clearer than other areas in live image or recordings enabling theaer
funcon.
Before You Start
Go to Conguraon → PTZ → Smart Tracking to complete the smart tracking sengs.
Steps
1. Go to Conguraon → Video/Audio → ROI .
2. Check Enable Target Tracking.
3. Set ROI Level for target tracking. The higher the value is, the clearer the target is.
4. Click Save.
Network Camera User Manual
17
4.2.4 Set License Plate Tracking ROI
When the license plate tracking ROI is enabled and the license plate appears in the livefuncon
picture, the image of the license plate is clearer than that of the surrounding area.
Steps
1. Go to the ROI seng page: Conguraon → Video/Audio → ROI .
2. Check Enable License Plate Tracking.
3. Select ROI Level Dynamic Regionin .
Note
ROI level means the image quality enhancing level. The larger the value is, the the imagebeer
quality would be.
4. Click Save.
4.3 Display Info. on Stream
The informaon of the objects (e.g. human, vehicle, etc.) is marked in the video stream. You can
set rules on the connected rear-end device or client soware to detect the events including line
crossing, intrusion, etc.
Steps
1. Go to the page: seng Conguraon → Video/Audio → Display Info. on Stream .
2. Check .Enable Dual-VCA
3. Click Save.
4.4 Audio Sengs
It is a to set audio parameters such as audio encoding, environment noise funcon ltering.
Go to the audio page: sengs Conguraon → Video/Audio → Audio .
4.4.1 Audio Encoding
Select the audio encoding compression of the audio.
Network Camera User Manual
18
4.4.2 Audio Input
Note
Connect the audio input device as required.
The audio input display varies with the device models.
LineIn Set to when the device connects to the audioAudio Input LineIn
input device with the high output power, such as MP3,
synthesizer or acve pickup.
MicIn Set to when the device connects to the audioAudio Input MicIn
input device with the low output power, such as microphone or
passive pickup.
4.4.3 Audio Output
Note
Connect the audio output device as required.
It is a switch of the device audio output. When it is disabled, all the device audio cannot output.
The audio output display varies with the device modes.
4.4.4 Environmental Noise Filter
Set it as OFF or ON. When the is enabled, the noise in the environment can be funcon ltered to
some extent.
4.5 Two-way Audio
It is used to realize the two-way audio between the monitoring center and the target infuncon
the monitoring screen.
Before You Start
Make sure the audio input device (pick-up or microphone) and audio output device (speaker)
connected to the device is working properly. Refer to specicaons of audio input and output
devices for device connecon.
If the device has built-in microphone and speaker, two-way audio can be enabledfuncon
directly.
Steps
1. Click .Live View
Network Camera User Manual
19
2. Click on the toolbar to enable two-way audio of the camera.funcon
3. Click , disable the two-way audio funcon.
4.6 Display Sengs
It oers the parameter sengs to adjust image features.
Go to Conguraon → Image → Display Sengs .
Click Default to restore sengs.
4.6.1 Scene Mode
There are several sets of image parameters predened for dierent installaon environments.
Select a scene according to the actual installaon environment to speed up the display sengs.
Image Adjustment
By the , adjusng Brightness Saturaon, , Hue Contrast Sharpness and , the image can be best
displayed.
Exposure Sengs
Exposure is controlled by the of iris, combinaon shuer, and photo sensibility. You can adjust
image eect seng by exposure parameters.
In manual mode, you need to set , and .Exposure Time Gain Slow Shuer
Focus
It oers opons to adjust the focus mode.
Focus Mode
Auto
The device focuses as the scene changes. If you cannot get a well-focusedautomacally
image under auto mode, reduce light sources in the image and avoid ashing lights.
Semi-auto
The device focuses once the PTZ and lens zooming. If the image is clear, the focus doesaer
not change when the scene changes.
Manual
You can adjust the focus manually on the live view page.
Network Camera User Manual
20
Note
This is only supported by certain device equipped with motorized lens.funcon
The edge of image will be lost if this is enabled.funcon
BLC
If you focus on an object against strong backlight, the object will be too dark to be seen clearly. BLC
(backlight compensates light to the object in the front to make it clear. If BLC modecompensaon)
is set as Custom, you can draw a red rectangle on the live view image as the BLC area.
WDR
The WDR (Wide Dynamic Range) helps the camera provide clear images in environmentfuncon
with strong illuminaon dierences.
When there are both very bright and very dark areas simultaneously in the of view, you caneld
enable the WDR and set the level. WDR funcon automacally balances the brightness level of the
whole image and provides clear images with more details.
Note
When WDR is enabled, some other may be not supported. Refer to the actual interfacefuncons
for details.
HLC
When the bright area of the image is over-exposed and the dark area is under-exposed, the HLC
(High Light Compression) funcon can be enabled to weaken the bright area and brighten the dark
area, so as to achieve the light balance of the overall picture.
White Balance
White balance is the white of the camera. It is used to adjust the colorrendion funcon
temperature according to the environment.
DNR
Digital Noise Reducon is used to reduce the image noise and improve the image quality. Normal
and modes are selectable.Expert
Normal
Network Camera User Manual
22
Set the DNR level to control the noise degree. The higher level means strongerreducon
reducon degree.
Expert
Set the DNR level for both space DNR and DNR to control the noise degree. Theme reducon
higher level means stronger reducon degree.
Defog
You can enable the defog when the environment is foggy and the image is misty. Itfuncon
enhances the subtle details so that the image appears clearer.
EIS
Increase the stability of video image by using jier compensaon technology.
Mirror
When the live view image is the reverse of the actual scene, this helps to display thefuncon
image normally.
Select the mirror mode as needed.
Note
The video recording will be shortly interrupted when the is enabled.funcon
4.6.2 Image Parameters Switch
The device switches image parameters in set periods.automacally me
Go to image parameters switch page: seng Conguraon → Image → Image Parameters Switch ,
and set parameters as needed.
Set Switch
Switch the image parameters to the scene automacally in certain periods.me
Steps
1. Check .Enable
2. Select and congure me the corresponding period and the scene.
Network Camera User Manual
23
Note
For the scene conguraon, refer to Scene Mode .
3. Click Save.
4.6.3 Video Standard
Video standard is an ability of a video card or video display device that the amount ofdenes
colors that are shown and the The two most common video standard used are NTSCresoluon.
and PAL. In NTSC, 30 frames are transmied each second. Each frame is made up of 525 individual
scan lines. In PAL, 25 frames are transmied each second. Each frame is made up of 625 individual
scan lines. Select video signal standard according to the video system in your country/region.
4.6.4 Local Video Output
If the device is equipped with video output interfaces, such as BNC, CVBS, HDMI, and SDI, you can
preview the live image directly by connecng the device to a monitor screen.
Select the output mode as ON/OFF to control the output.
4.7 OSD
You can customize OSD (On-screen Display) informaon me/date, such as device name, font,
color, and text overlay displayed on video stream.
Go to OSD seng page: Conguraon Sengs → Image → OSD . Set the corresponding
parameters, and click Save to take eect.
Character Set
Select character set for displayed informaon. If Korean is required to displayed on screen, select
EUC-KR GBK. Otherwise, select .
Displayed Informaon
Set camera name, date, week, and their related display format.
Text Overlay
Set customized overlay text on image.
OSD Parameters
Set OSD parameters, such as Display Mode, OSD Size Font Color Alignment, , and .
Network Camera User Manual
24
4.8 Set Privacy Mask
The blocks certain areas in the live view to protect privacy. No how the devicefuncon maer
moves, the blocked scene will never be seen.
Steps
1. Go to privacy mask page: seng Conguraon → Image → Privacy Mask .
2. Check .Enable Privacy Mask
3. Click Draw Area. Drag the mouse in the live view to draw a closed area.
Drag the corners of the area Adjust the size of the area.
Drag the area Adjust the of the area.posion
Click Clear All Clear all the areas you set.
4. Click Stop Drawing.
5. Click Save.
4.9 Overlay Picture
Overlay a customized picture on live view.
Before You Start
The picture to overlay has to be in BMP format with 24-bit, and the maximum picture size is 128 ×
128 pixel.
Steps
1. Go to picture overlay seng page: Conguraon → Image → Picture Overlay .
2. Click to select a picture, and click .Browse Upload
The picture with a red rectangle will appear in live view aer successfully uploading.
3. Check Enable Picture Overlay.
4. Drag the picture to adjust its posion.
5. Click Save.
4.10 Set Target Cropping
You can crop the image, transmit and save only the images of the target area to save transmission
bandwidth and storage.
Steps
1. Go to Conguraon → Video/Audio → Target Cropping .
2. Check Enable Target Cropping Third Stream Stream Type and set as the .
Network Camera User Manual
25
Note
Aer enabling target cropping, the third stream resoluon congured. cannot be
3. Select a Cropping Resoluon.
A red frame appears in the live view.
4. Drag the frame to the target area.
5. Click Save.
Note
Only certain models support target cropping and the varies according to funcon dierent
camera models.
Some may be disabled enabling target cropping.funcons aer
Network Camera User Manual
26
Chapter 5 Video Recording and Picture Capture
This part introduces the of capturing video clips and snapshots, playback, andoperaons
downloading captured les.
5.1 Storage Sengs
This part introduces the conguraon of several common storage paths.
5.1.1 Set New or Unencrypted Memory Card
Before You Start
Insert a new or unencrypted memory card to the device. For detailed installaon, refer to Quick
Start Guide of the device.
Steps
1. Go to Conguraon → Storage → Storage Management → HDD Management .
2. Select the memory card.
Note
If an appears, you need to unlock the memory card Unlock buon rst. See Detect Memory
Card Status for details.
3. Click Format to the memory card.inialize
When the Status of memory card turns from Uninialized to , the memory card is readyNormal
for use.
4. Oponal: Encrypt the memory card.
1) Click Encrypted Format.
2) Set the encrypon password.
3) Click .OK
When the Encrypon Status turns to , the memory card is ready for use.Encrypted
Note
Keep your password properly. password cannot be found if encrypon Encrypon forgoen.
5. Oponal: QuotaDene the of the memory card. Input the percentage for storing dierent
contents according to your needs.
6. Click Save.
Network Camera User Manual
27
Detect Memory Card Status
The device detects the status of Hikvision memory card. You receive when yournocaons
memory card is detected abnormal.
Before You Start
The conguraon page only appears when a Hikvision memory card is installed to the device.
Steps
1. Go to Conguraon → Storage → Storage Management → Memory Card Detecon .
2. Click Status Detecon to check the Remaining Lifespan Health Status and of your memory card.
Remaining Lifespan
It shows the percentage of the remaining lifespan. The lifespan of a memory card may be
inuenced by factors such as its capacity and the bitrate. You need to change the memory
card if the remaining lifespan is not enough.
Health Status
It shows the of your memory card. There are three status good, bad,condion descripons:
and damaged. You will receive a nocaon if the health status is anything other than good
when the and Arming Schedule Linkage Method are set.
Note
It is recommended that you change the memory card when the health status is not "good".
3. Click to set the permission of reading and to the memory card.R/W Lock wring
-Add a Lock
a. Select the Lock Switch as ON.
b. Enter the password.
c. Click Save
-Unlock
If you use the memory card on the device that locks it, unlocking will be done automacally
and no unlocking procedures are required on the part of users.
If you use the memory card (with a lock) on a dierent device, you can go to HDD
Management to unlock the memory card manually. Select the memory card, and click
Unlock. Enter the correct password to unlock it.
-Remove the Lock
a. Select the Lock Switch as OFF.
b. Enter the password in Password Sengs.
c. Click Save.
Network Camera User Manual
28
Note
Only admin user can set the .R/W Lock
The memory card can only be read and when it is unlocked.wrien
If the device, which adds a lock to a memory card, is restored to the factory you cansengs,
go to HDD Management to unlock the memory card.
4. Set and Arming Schedule Linkage Method. See and Set Arming Schedule Linkage Method
Sengs for details.
5. Click Save.
5.1.2 Set FTP
You can congure the FTP server to save images which are captured by events or a snapshotmed
task.
Before You Start
Get the FTP server address rst.
Steps
1. Go to Conguraon → Network → Advanced → FTPSengs .
2. Congure sengs. FTP
FTP Protocol
FTP and SFTP are selectable. The uploading is encrypted by using SFTP protocol.les
Server Address and Port
The FTP server address and corresponding port.
User Name and Password
The FTP user should have the permission to upload pictures.
If the FTP server supports picture uploading by anonymous users, you can check Anonymous
to hide your device informaon during uploading.
Directory Structure
The saving path of snapshots in the FTP server.
Picture Filing Interval
For beer picture management, you can set the picture interval from 1 day to 30 days.ling
Pictures captured in the same interval will be saved in one folder named theme aer
beginning date and ending date of the interval.me
Picture Name
Set the naming rule for captured pictures. You can choose in the drop-down list toDefault
use the default rule, that is, IP address_channel number_capture me_event type.jpg (e.g.,
10.11.37.189_01_20150917094425492_FACE_DETECTION.jpg). Or you can customize it by
adding a Custom Prex to the default naming rule.
3. Check to enable uploading snapshots to the FTP server.Upload Picture
Network Camera User Manual
29
4. Check Enable Network ReplenishmentAutomac .
Note
Upload to FTP/Memory Card/NAS Linkage Method Enable in and Automac Network
Replenishment should be both enabled simultaneously.
5. Click Test to verify the FTP server.
6. Click Save.
5.1.3 Set NAS
Take network server as network disk to store the record captured images, etc.les,
Before You Start
Get the IP address of the network disk rst.
Steps
1. Go to NAS seng page: Conguraon → Storage → Storage Management → Net HDD .
2. Click . Enter the server address and path for the disk.HDD No. le
Server Address
The IP address of the network disk.
File Path
The saving path of network disk les.
Mounng Type
Select system protocol according to the system.le operaon
Enter user name and password of the net HDD to guarantee the security if isSMB/CIFS
selected.
3. Click Test to check whether the network disk is available.
4. Click Save.
5.1.4 eMMC Protecon
It is to automacally stop the use of eMMC as a storage media when its health status is poor.
Note
The eMMC protecon is only supported by certain device models with an eMMC hardware.
Go to Conguraon → System → Maintenance → System Service for the sengs.
eMMC, short for embedded card, is an embedded memory system. It ismulmedia non-volale
able to store the captured images or videos of the device.
The device monitors the eMMC health status and turns o the eMMC when its status is poor.
Otherwise, using a worn-out eMMC may lead to device boot failure.
Network Camera User Manual
30
5.1.5 Set Cloud Storage
It helps to upload the captured pictures and data to the cloud. The requests pictureplaorm
directly from the cloud for picture and analysis. The funcon is only supported by certain models.
Steps
Cauon
If the cloud storage is enabled, the pictures are stored in the cloud video manager rstly.
1. Go to Conguraon → Storage → Storage Management → Cloud Storage .
2. Check Enable Cloud Storage.
3. Set basic parameters.
Protocol Version The protocol version of the cloud video manager.
Server IP The IP address of the cloud video manager. It supports IPv4 address.
Serve Port The port of the cloud video manager. You are recommended to use the
default port.
AccessKey The key to log in to the cloud video manager.
SecretKey The key to encrypt the data stored in the cloud video manager.
User Name and
Password
The user name and password of the cloud video manager.
Picture Storage
Pool ID
The ID of the picture storage region in the cloud video manager. Make
sure storage pool ID and the storage region ID are the same.
4. Click Test to test the congured sengs.
5. Click Save.
5.2 Video Recording
This part introduces the of manual and scheduled recording, playback, andoperaons
downloading recorded les.
5.2.1 Record Automacally
This can record video during funcon automacally congured me periods.
Before You Start
Select Trigger Recording in event for each record type except . See sengs Connuous Event and
Alarm for details.
Network Camera User Manual
31
Steps
1. Go to Conguraon → Storage → Schedule → Record Schedule Sengs .
2. Check .Enable
3. Select a record type.
Note
The record type is vary according to dierent models.
Connuous
The video will be recorded according to the schedule.connuously
Moon
When is enabled and trigger recording is selected as linkage method, objectmoon detecon
movement is recorded.
Alarm
When alarm input is enabled and trigger recording is selected as linkage method, the video is
recorded receiving alarm signal from external alarm input device.aer
Moon | Alarm
Video is recorded when is detected or alarm signal is received from the externalmoon
alarm input device.
Moon & Alarm
Video is recorded only when is detected and alarm signal is received from themoon
external alarm input device.
Event
The video is recorded when congured event is detected.
4. Set schedule for the selected record type. Refer to for the Set Arming Schedule seng
operaon.
5. Click to set the advanced Advanced sengs.
Overwrite
Enable to overwrite the video records when the storage space is full. OtherwiseOverwrite
the camera cannot record new videos.
Pre-record
The me period you set to record before the scheduled me.
Post-record
The period you set to stop recording the scheduled me aer me.
Stream Type
Select the stream type for recording.
Network Camera User Manual
32
Note
When you select the stream type with higher bitrate, the actual of the pre-record andme
post-record may be less than the set value.
Recording Expiraon
The recordings are deleted when they exceed the expired The expired isme. me
congurable. Note that once the recordings are deleted, they can not be recovered.
6. Click Save.
5.2.2 Record Manually
Steps
1. Go to Conguraon .→ Local
2. Set the Record File Size and saving path to for recorded les.
3. Click Save.
4. Click in the live view interface to start recording. Click to stop recording.
5.2.3 Set Lite Storage
Aer the lite storage is enabled, the frame rate and bitrate of the video stream can be reduced to
lengthen the storage me of the memory card when there is no moving object in the monitoring
scenario.
Steps
1. Go to Conguraon → Storage → Storage Management → Lite Storage .
2. Check and set the level. The higher the level is, the larger the frame rate and bitrate are,Enable
and the shorter the recommended storage me is.
3. Set the storage me. automacally The device calculates the bitrate and oers the
recommended storage according to the memory card space and level. You areme
recommended to set the storage me to the device recommended me.
Note
If the lite storage is enabled, unformaed memory card will be formaed automacally.
The displayed available space of the memory card is assigned by default according to
Percentage of Record Storage → Storage Management → Quota in . You can adjust it as
required.
Only certain device models support the funcon.
5.2.4 Playback and Download Video
You can search, playback and download the videos stored in the local storage or network storage.
Network Camera User Manual
33
Steps
1. Click .Playback
2. Set search condion and click .Search
The matched video les ming showed on the bar.
3. Click to play the video les.
-Click to clip video les.
-Double click the live view image to play video in full screen. Press les ESC to exit full screen.
Note
Go to Conguraon , click → Local Save clips to to change the saving path of clipped video les.
4. Click on the playback interface to download les.
1) Set search condion and click .Search
2) Select the video and then click .les Download
Note
Go to Conguraon , click → Local Save downloaded toles to change the saving path of
downloaded video les.
5.3 Capture Conguraon
The device can capture the pictures manually or and save them in automacally congured saving
path. You can view and download the snapshots.
5.3.1 Capture Automacally
This can capture pictures funcon automacally congured me during periods.
Before You Start
If event-triggered capture is required, you should congure related linkage methods in event
sengs. Refer to Event and Alarm for event sengs.
Steps
1. Go to Conguraon → Storage → Schedule → Capture → Capture Parameters Sengs .
2. Set the capture type.
Timing
Capture a picture at the congured me interval.
Event-Triggered
Capture a picture when an event is triggered.
3. Set the Format, Resoluon, , Quality Interval Capture Number, and .
4. Refer to for schedule Set Arming Schedule conguring me.
5. Click Save.
Network Camera User Manual
34
5.3.2 Capture Manually
Steps
1. Go to Conguraon .→ Local
2. Set the Image Format and saving path to for snapshots.
JPEG
The picture size of this format is comparavely beer small, which is for network
transmission.
BMP
The picture is compressed with good quality.
3. Click Save.
4. Click near the live view or play back window to capture a picture manually.
5.3.3 Set Timing Wake
When the device is sleeping, it will wake up at the set interval, and capture pictures andme
upload them.
Steps
Note
The is only supported by certain device models.funcon
1. Go to Conguraon → System → System → Power Mode Sleep Sengs Consumpon , under
Schedule Sleep Capture Interval, click the schedule to setme .
2. Enter Conguraon → Event → Basic Event → Timing Wake .
3. Check .Enable
4. Select Capture Types.
5. For the linkage method sengs, see Linkage Method Sengs .
6. Click Save.
Result
The device will wake up at the set sleep capture interval, and capture pictures and upload them.
5.3.4 View and Download Picture
You can search, view and download the pictures stored in the local storage or network storage.
Steps
1. Click .Picture
2. Set search condion and click .Search
The matched pictures showed in the list.le
Network Camera User Manual
35
Chapter 6 Event and Alarm
This part introduces the conguraon of events. The device takes certain response to triggered
alarm.
6.1 Basic Event
6.1.1 Set Moon Detecon
It helps to detect the moving objects in the region and trigger the linkage detecon acons.
Steps
1. Go to Conguraon → Event → Basic Event → Moon Detecon .
2. Check .Enable Moon Detecon
3. Oponal: Highlight to display the moving object in the image in green.
1) Check Enable Dynamic Analysis for Moon.
2) Go to Conguraon .→ Local
3) Set to .Rules Enable
4. Select Conguraon Mode, and set rule region and rule parameters.
-For the informaon about normal mode, see .Normal Mode
-For the informaon about expert mode, see .Expert Mode
5. Set the arming schedule and linkage methods. For the informaon about arming schedule
sengs, informaon see . For the Set Arming Schedule about linkage methods, see Linkage
Method Sengs .
6. Click Save.
Expert Mode
You can congure dierent moon detecon parameters for day and night according to the actual
needs.
Steps
1. Select in Expert Mode Conguraon.
2. Set parameters of expert mode.
Scheduled Image Sengs
OFF
Image switch is disabled.
Auto-Switch
Network Camera User Manual
37
The system switches day/night mode automacally according to environment. It displays
colored image at day and black and white image at night.
Scheduled-Switch
The system switches day/night mode according to the schedule. It switches to day mode
during the set periods and switches to night mode during the other periods.
Sensivity
The higher the value of is, the more the is. If scheduledsensivity sensive moon detecon
image sengs sensivity is enabled, the of day and night can be set separately.
3. Select an and click Area Draw Area. Click and drag the mouse on the live image and then release
the mouse to nish drawing one area.
Figure 6-1 Set Rules
Stop Drawing Finish drawing one area.
Clear All Delete all the areas.
4. Click Save.
5. Oponal: Repeat above steps to set areas.mulple
Normal Mode
You can set moon detecon parameters according to the device default parameters.
Steps
1. Select normal mode in Conguraon.
Network Camera User Manual
38
Figure 6-2 Set Video Tampering Area
5. Refer to for scheduled Refer to Set Arming Schedule seng me. Linkage Method Sengs for
seng linkage method.
6. Click Save.
6.1.3 Set PIR Alarm
A PIR (Passive Infrared) alarm is triggered when an intruder moves within the detector's ofeld
view. The heat energy dissipated by a person, or any other warm blooded creature such as dogs,
cats, etc., can be detected.
Steps
Note
Only certain models support PIR alarm.
1. Go to Conguraon ConguraonAdvanced → Basic Event → PIR Alarm .
Network Camera User Manual
40
2. Check .Enable PIR Alarm
3. Refer to for scheduled Refer to Set Arming Schedule seng me. Linkage Method Sengs for
seng linkage method.
4. Click Save.
6.1.4 Set Excepon Alarm
Excepon disconnecon such as network can trigger the device to take corresponding acon.
Steps
1. Go to Conguraon → Event → Basic Event → Excepon .
2. Select Excepon Type.
HDD Full The HDD storage is full.
HDD Error Error occurs in HDD.
Network Disconnected The device is oine.
IP Address Conicted The IP address of current device is same as that of other device in
the network.
Illegal Login Incorrect user name or password is entered.
Voltage Instable The power supply voltage is uctuang.
3. Refer to Linkage Method Sengs for linkage method.seng
4. Click Save.
6.1.5 Set Alarm Input
Alarm signal from the external device triggers the corresponding of the current device.acons
Before You Start
Make sure the external alarm device is connected. See Quick Start Guide for cable connecon.
Steps
1. Go to Conguraon → Event → Basic Event → Alarm Input .
2. Check .Enable Alarm Input Handling
3. Select and Alarm Input NO. Alarm Type from the dropdown list. Edit the .Alarm Name
4. Refer to Set Arming Schedule for scheduled Refer to seng me. Linkage Method Sengs for
seng linkage method.
5. Click to copy the Copy to... sengs to other alarm input channels.
6. Click Save.
Network Camera User Manual
41
6.1.6 Set Video Quality Diagnosis
When the video quality of the device is abnormal and the alarm linkage is set, the alarm will be
triggered automacally.
Steps
1. Go to Conguraon → Event → Basic Event → Video Quality Diagnosis .
2. Select Diagnosis Type.
3. Set the corresponding parameters.
Alarm Detecon Interval
The interval to detect the me excepon.
Sensivity
The higher the value is, the more easily the excepon will be detected, and the higher
possibility of would be.misinformaon
Alarm Delay Times
The device uploads the alarm when the alarm reaches the set number of mes.
4. Check , and the selected diagnosis type will be detected.Enable
5. Set arming schedule. See .Set Arming Schedule
6. Set linkage method. See Linkage Method Sengs .
7. Click Save.
Note
The is only supported by certain models. The actual display varies with models.funcon
6.1.7 Set Vibraon Detecon
It is used to detect whether the device is The device reports an alarm and triggers linkagevibrang.
acons funcon if the is enabled.
Steps
1. Go to Conguraon → Event → Basic Event → Vibraon Detecon .
2. Check .Enable
3. Drag the slider to set the detecon sensivity. You can also enter number to set the sensivity.
4. Set the arming schedule. See .Set Arming Schedule
5. Set the linkage method. See Linkage Method Sengs .
6. Click Save.
Note
The is only supported by certain models. The actual display varies with models.funcon
Network Camera User Manual
42
6.2 Smart Event
Set smart events by the following instrucons.
Note
For certain device models, you need to enable the smart event on funcon VCA Resource page
rst funcon conguraon to show the page.
The varies according to funcon dierent models.
6.2.1 Detect Audio Excepon
Audio excepon detecon funcon detects the abnormal sound in the surveillance scene, such as
the sudden increase/decrease of the sound intensity, and some certain acons can be taken as
response.
Steps
1. Go to Conguraon → Event → Smart Event → Audio Excepon Detecon .
2. Select one or several audio excepon detecon types.
Audio Loss Detecon
Detect sudden loss of audio track.
Sudden Increase of Sound Intensity Detecon
Detect sudden increase of sound intensity. and Sensivity Sound Intensity Threshold are
congurable.
Note
The lower the is, the more the change should be to trigger thesensivity signicant
detecon.
The sound intensity threshold refers to the sound intensity reference for the It isdetecon.
recommended to set as the average sound intensity in the environment. The louder the
environment sound, the higher the value should be. You can adjust it according to the real
environment.
Sudden Decrease of Sound Intensity Detecon
Detect sudden decrease of sound intensity. is Sensivity congurable.
3. Refer to for scheduled Refer to Set Arming Schedule seng me. Linkage Method Sengs for
seng linkage methods.
4. Click Save.
Note
The varies according to funcon dierent models.
Network Camera User Manual
43
6.2.2 Set Defocus Detecon
The blurred image caused by lens defocus can be detected. If it occurs, the device can take linkage
acons.
Steps
1. Go to Conguraon → Event → Smart Event → Defocus Detecon .
2. Check .Enable
3. Set Sensivity. The higher the value is, the more easily the defocus image can trigger the alarm.
You can adjust the value according to the actual environment.
4. For the linkage method refer to sengs, Linkage Method Sengs .
5. Click Save.
Note
The is only supported by certain models. The actual display varies with models.funcon
6.2.3 Detect Scene Change
Scene change detecon funcon acons detects the change of surveillance scene. Some certain
can be taken when the alarm is triggered.
Steps
1. Go to Conguraon → Event → Smart Event → Scene Change Detecon .
2. Click .Enable
3. Set the . The higher the value is, the more easily the change of scene can be detected.Sensivity
But the detecon accuracy is reduced.
4. Refer to for scheduled Refer to Set Arming Schedule seng me. Linkage Method Sengs for
seng linkage method.
5. Click Save.
Note
The varies according to funcon dierent models.
6.2.4 Set Face Detecon
It helps to detect the face in the detecon region. If a face is detected, the device triggers the
linkage acons.
Steps
1. Go to Conguraon → Event → Smart Event → Face Detecon .
2. Check Enable Face Detecon.
3. Oponal: Highlight to display the face in the image.
1) Check Enable Dynamic Analysis For Face Detecon.
Network Camera User Manual
44
2) Go to Conguraon , set to → Local Rules Enable.
4. Set . The lower the is, the Sensivity sensivity prole of the face or unclear face is more dicult
to detect.
5. Set the arming schedule and linkage methods. For the informaon about arming schedule
sengs, informaon see . For the Set Arming Schedule about linkage methods, see Linkage
Method Sengs .
6. Click Save.
6.2.5 Set Video Loss
This can detect the video signal loss in and trigger the linkage funcon me acon.
Steps
1. Go to Conguraon → Event → Basic Event → Video Loss .
2. Check .Enable
3. Refer to for scheduled Refer to Set Arming Schedule seng me. Linkage Method Sengs for
seng linkage method.
4. Click Save.
6.2.6 Set Intrusion Detecon
It is used to detect objects entering and loitering in a virtual region. If it occurs, thepre-dened
device can take linkage acons.
Steps
1. Go to Conguraon → Event → Smart Event → Intrusion Detecon .
2. Check .Enable
3. Select a . For the Region detecon region refer to .sengs, Draw Area
4. Set rules.
Sensivity Sensivity stands for the percentage of the body part of an acceptable target
that enters the pre-dened Sensivity region. = 100 - S1/ST × 100. S1 stands
for the target body part that goes across the region. ST stands forpre-dened
the complete target body. The higher the value of sensivity is, the more
easily the alarm can be triggered.
Threshold Threshold stands for the threshold for the of the object loitering in theme
region. If the that one object stays exceeds the threshold, the alarm isme
triggered. The larger the value of the threshold is, the longer the alarm
triggering me is.
Detecon
Target
Human and vehicle are available. If the detecon target is not selected, all the
detected targets will be reported, including the human and vehicle.
Network Camera User Manual
45
Target
Validity
If you set a higher validity, the required target features should be more
obvious, and the alarm accuracy would be higher. The target with less obvious
features would be missing.
Figure 6-3 Set Rule
5. Oponal: You can set the parameters of areas by mulple repeang the above steps.
6. For the arming schedule refer to . For the linkage method sengs, Set Arming Schedule sengs,
refer to Linkage Method Sengs .
7. Click Save.
6.2.7 Set Line Crossing
Detecon
It is used to detect objects crossing a pre-dened virtual line. If it occurs, the device can take
linkage acons.
Steps
1. Go to Conguraon → Event → Smart Event → Line Crossing Detecon .
2. Check .Enable
3. Select one and set the size Line lter. For the size refer to .lter sengs, Set Size Filter
4. Click Draw Area and a line with an arrow appears in the live video. Drag the line to the locaon
on the live video as desired.
5. Set rules.
Direcon It stands for the from which the object goes across the line.direcon
A<->B: The object going across the line from both direcons can be detected
and alarms are triggered.
Network Camera User Manual
46
A->B: Only the object crossing the congured line from the A side to the B side
can be detected.
B->A: Only the object crossing the congured line from the B side to the A side
can be detected.
Sensivity It stands for the percentage of the body part of an acceptable target that goes
across the pre-dened Sensivity line. = 100 - S1/ST × 100. S1 stands for the
target body part that goes across the pre-dened line. ST stands for the
complete target body. The higher the value of sensivity is, the more easily the
alarm can be triggered.
Detecon
Target
Human and vehicle are available. If the target is not selected, all thedetecon
detected targets will be reported, including the human and vehicle.
Target
Validity
If you set a higher validity, the required target features should be more
obvious, and the alarm accuracy would be higher. The target with less obvious
features would be missing.
Figure 6-4 Set Rule
6. Oponal: You can set the parameters of areas by the above steps.mulple repeang
7. For the arming schedule sengs, refer to . For the linkage method Set Arming Schedule sengs,
refer to Linkage Method Sengs .
8. Click Save.
Network Camera User Manual
47
6.2.8 Set Region Entrance Detecon
It is used to detect objects entering a virtual region from the outside place. If it occurs,pre-dened
the device can take linkage acons.
Steps
1. Go to Conguraon → Event → Smart Event → Region Entrance Detecon .
2. Check .Enable
3. Select one . For the region Region sengs, refer to .Draw Area
4. Set the target, and the target validity.detecon sensivity
Sensivity It stands for the percentage of the body part of an acceptable target that goes
across the pre-dened region. = 100 - S1/ST × 100. S1 stands forSensivity
the target body part that goes across the region. ST stands for thepre-dened
complete target body. The higher the value of sensivity is, the more easily
the alarm can be triggered.
Detecon
Target
Human and vehicle are available. If the target is not selected, all thedetecon
detected targets will be reported, including the human and vehicle.
Target
Validity
If you set a higher validity, the required target features should be more
obvious, and the alarm accuracy would be higher. The target with less obvious
features would be missing.
Figure 6-5 Set Rule
5. Oponal: You can set the parameters of areas by the above steps.mulple repeang
6. For the arming schedule refer to sengs, Set Arming Schedule . For the linkage method sengs,
refer to Linkage Method Sengs .
Network Camera User Manual
48
7. Click Save.
6.2.9 Set Region Exing Detecon
It is used to detect objects from a exing pre-dened virtual region. If it occurs, the device can take
linkage acons.
Steps
1. Go to Conguraon → Event → Smart Event → Region Exing Detecon
2. Check .Enable
3. Select one . For the region refer to .Region detecon sengs, Draw Area
4. Set the target, and the target validity.detecon sensivity
Sensivity It stands for the percentage of the body part of an acceptable target that goes
across the pre-dened Sensivity region. = 100 - S1/ST × 100. S1 stands for
the target body part that goes across the region. ST stands for thepre-dened
complete target body. The higher the value of sensivity is, the more easily
the alarm can be triggered.
Detecon
Target
Human and vehicle are available. If the target is not selected, all thedetecon
detected targets will be reported, including the human and vehicle.
Target
Validity
If you set a higher validity, the required target features should be more
obvious, and the alarm accuracy would be higher. The target with less obvious
features would be missing.
Figure 6-6 Set Rule
5. Oponal: You can set the parameters of areas by the above steps.mulple repeang
Network Camera User Manual
49
6. For the arming schedule refer to . For the linkage method sengs, Set Arming Schedule sengs,
refer to Linkage Method Sengs .
7. Click Save.
6.2.10 Set Baggage Unaended Detecon
It is used to detect the objects over in the le pre-dened region. Linkage methods can be
triggered the object is and stays in the region for a set period.aer le me
Steps
1. Go to Conguraon → Event → Smart Event → Baggage Unaended Detecon .
2. Check .Enable
3. Select one . For the Region detecon region refer to .sengs, Draw Area
4. Set rules.
Sensivity Sensivity stands for the percentage of the body part of an acceptable target
that enters the pre-dened Sensivity region. = 100 - S1/ST × 100. S1 stands for
the target body part that goes across the pre-dened region. ST stands for the
complete target body. The higher the value of sensivity is, the more easily the
alarm can be triggered.
Threshold It stands for the of the objects in the region. Alarm is triggered theme le aer
object is and stays in the region for the set period.le me
Figure 6-7 Set Rule
5. Oponal: You can set the parameters of areas by the above steps.mulple repeang
Network Camera User Manual
50
6. For the arming schedule refer to . For the linkage method sengs, Set Arming Schedule sengs,
refer to Linkage Method Sengs .
7. Click Save.
6.2.11 Set Object Removal Detecon
It detects whether the objects are removed from the pre-dened detecon region, such as the
exhibits on display. If it occurs, the device can take linkage and the acons sta can take measures
to reduce property loss.
Steps
1. Go to Conguraon → Event → Smart Event → Object Removal Detecon .
2. Check .Enable
3. Select a . For the region Region sengs, see .Draw Area
4. Set the rule.
Sensivity It stands for the percentage of the body part of an acceptable target that leaves
the region.pre-dened
Sensivity = 100 – S1/ST*100
S1 stands for the target body part that leaves the pre-dened region. ST stands
for the complete target body.
Example: If you set the value as 60, a target is possible to be counted as a
removed object only when 40 percent body part of the target leaves the region.
Threshold The threshold for the of the objects removed from the region. If you set theme
value as 10, alarm is triggered the object disappears from the region foraer
10s.
5. Oponal: Repeat the above steps to set more regions.
6. For the arming schedule sengs, see . For the linkage method seeSet Arming Schedule sengs,
Linkage Method Sengs .
7. Click Save.
Note
The is only supported by certain models. The actual display varies with the models.funcon
6.2.12 Draw Area
This introduces the secon conguraon of area.
Steps
1. Click Draw Area.
2. Click on the live view to draw the boundaries of the region, and right click to completedetecon
drawing.
Network Camera User Manual
51
3. Click Save.
Note
Click to clear all Clear All pre-dened areas.
6.2.13 Set Size Filter
This part introduces the of size seng lter. Only the target whose size is between the minimum
value and maximum value is detected and triggers alarm.
Steps
1. Click Max. Size, and drag the mouse in the live view to draw the maximum target size.
2. Click , and drag the mouse in the live view to draw the minimum target size.Min. Size
3. Click Save.
Network Camera User Manual
52
Chapter 7 Network Sengs
7.1 TCP/IP
TCP/IP must be properly sengs congured before you operate the device over network. IPv4 and
IPv6 are both supported. Both versions can be congured conicng simultaneously without to
each other.
Go to Conguraon Sengs → Network → Basic → TCP/IP for parameter sengs.
NIC Type
Select a NIC (Network Interface Card) type according to your network condion.
IPv4
Two IPv4 modes are available.
DHCP
The device automacally gets the IPv4 parameters from the network if you check . TheDHCP
device IP address is changed enabling the You can use SADP to get the device IPaer funcon.
address.
Note
The network that the device is connected to should support DHCP (Dynamic Host
Conguraon Protocol).
Manual
You can set the device IPv4 parameters manually. Input IPv4 Address IPv4 Subnet Mask, , and
IPv4 Default Gateway, and click Test to see if the IP address is available.
IPv6
Three IPv6 modes are available.
Route Adversement
The IPv6 address is generated by combining the route adversement and the device Mac
address.
Note
Route mode requires the support from the router that the device is connectedadversement
to.
DHCP
The IPv6 address is assigned by the server, router, or gateway.
Manual
Network Camera User Manual
53
Input , , IPv6 Address IPv6 Subnet IPv6 Default Gateway. Consult the network administrator for
required informaon.
MTU
It stands for maximum transmission unit. It is the size of the largest protocol data unit that can
be communicated in a single network layer transacon.
The valid value range of MTU is 1280 to 1500.
DNS
It stands for domain name server. It is required if you need to visit the device with domain
name. And it is also required for some applicaons (e.g., sending email). Set Preferred DNS
Server Alternate DNS server and properly if needed.
Dynamic Domain Name
Check and input Enable Dynamic Domain Name Register Domain Name. The device is
registered under the register domain name for easier management within the local area
network.
Note
DHCP should be enabled for the dynamic domain name to take eect.
7.1.1 Mulcast
Mulcast is a group where data transmission is addressed to a group of communicaon desnaon
devices simultaneously. you can send the source data Aer seng mulcast, eciently mulple to
receivers.
Go to Conguraon Sengs Mulcast → Network → Basic for the mulcast sengs.
IP Address
It stands for the address of host.mulcast
Stream Type
The stream type of the source.mulcast
Video Port
The video port of the selected stream.
Audio Port
The audio port of the selected stream.
FEC Port
The FEC port of the selected stream.
FEC Rao
The of forward error rao correcon.
Network Camera User Manual
54
7.1.2 DiscoveryMulcast
Check the Enable DiscoveryMulcast , and then the online network camera can be automacally
detected by client soware via private mulcast protocol in the LAN.
7.2 SNMP
You can set the SNMP network management protocol to get the alarm event and excepon
messages in network transmission.
Before You Start
Before seng the SNMP, you should download the SNMP soware and manage to receive the
device informaon via SNMP port.
Steps
1. Go to the page: sengs Conguraon → Network → Advanced → SNMP Sengs .
2. Check , or .Enable SNMPv1 Enable SNMP v2c Enable SNMPv3
Note
The SNMP version you select should be the same as that of the SNMP soware.
And you also need to use the dierent version according to the security level required. SNMP v1
is not secure and SNMP v2 requires password for access. And SNMP v3 provides andencrypon
if you use the third version, HTTPS protocol must be enabled.
3. Congure sengs. the SNMP
4. Click Save.
7.3 Set SRTP
The Secure Real-me Transport Protocol (SRTP) is a Real-me Transport Protocol (RTP) internet
protocol, intended to provide message and integrity, and replay encrypon, authencaon aack
protecon to the RTP data in both unicast and mulcast applicaons.
Steps
1. Go to Conguraon Network → Advanced → SRTPSengs .
2. Select Server Cercate.
3. Select Encrypted Algorithm.
4. Click Save.
Note
Only certain device models support this funcon.
If the is abnormal, check if the selected funcon cercate cercate is abnormal in
management.
Network Camera User Manual
55
7.4 Port Mapping
By port mapping, you can access devices through the port.seng specied
Before You Start
When the ports in the device are the same as those of other devices in the network, refer to Port
to modify the device ports.
Steps
1. Go to Conguraon Sengs → Network → Basic → NAT .
2. Select the port mapping mode.
Auto Port Mapping Refer to Set Auto Port Mapping for detailed informaon.
Manual Port Mapping Refer to Set Manual Port Mapping for detailed informaon.
3. Click Save.
7.4.1 Set Auto Port Mapping
Steps
1. Check , and choose a friendly name for the camera, or you can use the defaultEnable UPnP™
name.
2. Select the port mapping mode to .Auto
3. Click Save.
Note
UPnP™ on the router should be enabled at the same funcon me.
7.4.2 Set Manual Port Mapping
Steps
1. Check , and choose a friendly name for the device, or you can use the defaultEnable UPnP™
name.
2. Select the port mapping mode to , and set the external port to be the same as theManual
internal port.
3. Click Save.
What to do next
Go to the router port mapping sengs interface and set the port number and IP address to be the
same as those on the device. For more informaon, refer to the router user manual.
Network Camera User Manual
56
7.4.3 Set Port Mapping on Router
The following are for a certain router. The vary depending on sengs sengs dierent models of
routers.
Steps
1. Select the WAN Connecon Type.
2. Set the , IP Address Subnet Mask and other network parameters of the router.
3. Go to Forwarding → Virtual Severs Port Number IP Address , and input the and .
4. Click Save.
Example
When the cameras are connected to the same router, you can congure the ports of a camera as
80, 8000, and 554 with IP address 192.168.1.23, and the ports of another camera as 81, 8001, 555,
8201 with IP 192.168.1.24.
Figure 7-1 Port Mapping on Router
Note
The port of the network camera cannot with other ports. For example, some webconict
management port of the router is 80. Change the camera port if it is the same as the management
port.
Network Camera User Manual
57
7.5 Port
The device port can be when the device cannot access the network due to port modied conicts.
Cauon
Do not modify the default port parameters at will, otherwise the device may be inaccessible.
Go to Conguraon Sengs → Network → Basic Port for port sengs.
HTTP Port
It refers to the port through which the browser accesses the device. For example, when the
HTTP Port is modied to 81, you need to enter in the browser for login.hp://192.168.1.64:81
HTTPS Port
It refers to the port through which the browser accesses the device with cercate. Cercate
vericaon is required to ensure the secure access.
RTSP Port
It refers to the port of real-me streaming protocol.
SRTP Port
It refers to the port of secure transport protocol.real-me
Server Port
It refers to the port through which the client adds the device.
Enhanced SDK Service Port
It refers to the port through which the client adds the device. Cercate vericaon is required
to ensure the secure access.
WebSocket Port
TCP-based full-duplex protocol port for plug-in free preview.communicaon
WebSockets Port
TCP-based full-duplex protocol port for plug-in free preview. communicaon Cercate
vericaon is required to ensure the secure access.
Note
Enhanced SDK Service Port, WebSocket Port, and WebSockets Port are only supported by certain
models.
For device models that support that go to funcon, Conguraon → Network → Advanced
Sengs to enable it.→ Network Service
Network Camera User Manual
58
7.6 Access to Device via Domain Name
You can use the Dynamic DNS (DDNS) for network access. The dynamic IP address of the device can
be mapped to a domain name server to realize the network access via domain name.resoluon
Before You Start
Registraon on the DDNS server is required before the DDNS of the device.conguring sengs
Steps
1. Refer to TCP/IP to set DNS parameters.
2. Go to the DDNS page: sengs Conguraon → Network → Basic → DDNS Sengs .
3. Check and select .Enable DDNS DDNS type
DynDNS
Dynamic DNS server is used for domain name resoluon.
NO-IP
NO-IP server is used for domain name resoluon.
4. Input the domain name informaon, and click .Save
5. Check the device ports and complete port mapping. Refer to to check the device port , andPort
refer to Port Mapping for port mapping sengs.
6. Access the device.
By Browsers Enter the domain name in the browser address bar to access the device.
By Client Soware Add domain name to the client soware. Refer to the client manual for
specic adding methods.
7.7 Access to Device via PPPoE Dial Up Connecon
This device supports the PPPoE auto dial-up The device gets a public IP address by ADSLfuncon.
dial-up the device is connected to a modem. You need to aer congure the PPPoE parameters of
the device.
Steps
1. Go to Conguraon Sengs → Network → Basic → PPPoE .
2. Check .Enable PPPoE
3. Set the PPPoE parameters.
Dynamic IP
Aer successful dial-up, the dynamic IP address of the WAN is displayed.
User Name
User name for dial-up network access.
Password
Password for dial-up network access.
Network Camera User Manual
59
Conrm
Input your dial-up password again.
4. Click Save.
5. Access the device.
By Browsers Enter the WAN dynamic IP address in the browser address bar to access
the device.
By Client Soware Add the WAN dynamic IP address to the client soware. Refer to the
client manual for details.
Note
The obtained IP address is dynamically assigned via PPPoE, so the IP address always changes
aer reboong the camera. To solve the inconvenience of the dynamic IP, you need to get a
domain name from the DDNS provider (e.g. DynDns.com). Refer to Access to Device via Domain
Name for detail informaon.
7.8 Wireless Dial
Data of audio, video and image can be transferred via 3G/4G wireless network.
Note
The is only supported by certain device models.funcon
7.8.1 Set Wireless Dial
The built-in wireless module oers dial-up access to the Internet for the device.
Before You Start
Get a SIM card, and acvate 3G/4G services. Insert the SIM card to the corresponding slot.
Steps
1. Go to Conguraon → Network → Advanced → Wireless DialSengs .
2. Check to enable the funcon.
3. Click Dial Parameters to congure and save the parameters.
4. Click . See for detailed Dial Plan Set Arming Schedule informaon.
5. Oponal: AllowlistSet . See Set Allowlist for detailed informaon.
6. Click Dial Status.
Click Refresh Refresh the dial status.
Click Disconnect Disconnect the 3G/4G wireless network.
When the Dial Status turns to , it means a successful dial.Connected
7. Access the device via the of the computer in the network.IP Address
Network Camera User Manual
60
-Input the IP address in the browser to access the device.
-Add the device in client Select applicaon. IP/Domain, and input IP address and other
parameters to access the device.
7.8.2 Set Allowlist
Add the mobile phone number of administrator to the allowlist in order to receive alarm message
from the device.
Steps
1. Go to allowlist page: sengs Conguraon Conguraon → Advanced → Wireless Dial
Allowlist .
2. Check .Enable SMS Alarm
3. Click in the allowlist.
1) Input the mobile phone number to receive alarm message.
2) Check .Reboot via SMS
3) Select the certain events, and the mobile phone can receive the alarm message when the
event happens.
4) Click Save.
5) Oponal: Repeat the steps above to set recipients.mulple
Modify the allowlist parameters.
Delete the allowlist that already set.
Send Test SMS Send a message to the mobile phone for test.
4. Click Save.
7.9 Wi-Fi
Connect the device to wireless network by Wi-Fi parameters.seng
Note
This is only supported by certain device models.funcon
7.9.1 Connect Device to Wi-Fi
Before You Start
Refer to the user manual of wireless router or AP to set SSID, key, and other parameters.
Steps
1. Go to TCP/IP sengs page: Conguraon Conguraon → Network → Basic → TCP/IP .
2. Select to set the parameters. Refer to Wlan TCP/IP for detailed conguraon.
Network Camera User Manual
61
Note
For stable use of Wi-Fi, it is not recommended to use DHCP.
3. Go to Wi-Fi page: sengs Conguraon Network → Advanced Conguraon .→ Wi-Fi
4. Set and save the parameters.
1) Click .Search
2) Select a , which should be the same as that of wireless router or AP.SSID
The parameters of the network is automacally shown in .Wi-Fi
3) Select the as Network Mode Manage.
4) Input the key to connect the wireless network. The key should be that of the wireless network
connecon you set on the router.
What to do next
Go to TCP/IP page: sengs Conguraon Conguraon → Network → Basic → TCP/IP , and click
Wlan IPv4 Address to check the and log in the device.
7.10 Set Network Service
You can control the ON/OFF status of certain protocol as desired.
Steps
Note
This varies according to funcon dierent models.
1. Go to Conguraon Network → Advanced → Network Service Sengs .
2. Set network service.
WebSocket & WebSockets
WebSocket or WebSockets protocol should be enabled if you use Google Chrome 57 and its
above version or Mozilla Firefox 52 and its above version to visit the device. Otherwise, live
view, image capture, digital zoom, etc. cannot be used.
If the device uses HTTP, enable WebSocket.
If the device uses HTTPS, enable WebSockets.
When you use WebSockets, select the Server Cercate.
Note
Complete cercate management before server selecng cercate. Refer to Cercate
Management for detailed informaon.
SDK Service & Enhanced SDK Service
Check to add the device to the client with SDK protocol.Enable SDK Service soware
Network Camera User Manual
62
Check to add the device to the client with SDK overEnable Enhanced SDK Service soware
TLS protocol.
When you use Enhanced SDK Service, select the Server Cercate.
Note
Complete cercate management before server Refer to selecng cercate. Cercate
Management for detailed informaon.
When set up between the device and the client connecon soware, it is recommended to
use Enhanced SDK Service and set the communicaon in Arming Mode to encrypt the data
transmission. See the user manual of the client soware sengs. for the arming mode
TLS (Transport Layer Security)
The device oers TLS1.1 and TLS1.2. Enable one or more protocol versions according to your
need.
Bonjour
Uncheck to disable the protocol.
3. Click Save.
7.11 Set Open Network Video Interface
If you need to access the device through Open Network Video Interface protocol, you can
congure sengs the user to enhance the network security.
Steps
1. Go to Conguraon Sengs Integraon → Network → Advanced Protocol .
2. Check Enable Open Network Video Interface.
3. Click to Add congure the Open Network Video Interface user.
Delete Delete the selected Open Network Video Interface user.
Modify Modify the selected Open Network Video Interface user.
4. Click Save.
5. Oponal: Repeat the steps above to add more Open Network Video Interface users.
7.12 Set ISUP
When the device is registered on ISUP (formerly called Ehome), you can visit and manageplaorm
the device, transmit data, and forward alarm informaon over public network.
Steps
1. Go to Conguraon → Network → Advanced AccessSengs Plaorm .
2. Select as the access mode.ISUP plaorm
3. Select .Enable
Network Camera User Manual
63
4. Select a protocol version and input related parameters.
5. Click Save.
Register status turns to when the is correctly set.Online funcon
7.13 Set Alarm Server
The device can send alarms to IP address or host name through HTTP, HTTPS, or ISUPdesnaon
protocol. The IP address or host name should support HTTP, HTTP, or ISUP datadesnaon
transmission.
Steps
1. Go to Conguraon → Network → Advanced → Alarm ServerSengs .
2. Enter Desnaon IP or Host Name URL Port, , and .
3. Oponal: EnableCheck to enable ANR.
4. Select Protocol.
Note
HTTP, HTTPS, and ISUP are selectable. It is recommended to use HTTPS, as it encrypts the data
transmission during communicaon.
5. Click Test to check if the IP or host is available.
6. Click Save.
7.14 Access Camera via Hik-Connect
Hik-Connect is an for mobile devices. Using the App, you can view live image, receiveapplicaon
alarm and so on.nocaon
Before You Start
Connect the camera to network with network cables.
Steps
1. Get and install Hik-Connect applicaon by the following ways.
-Visit hps://appstore.hikvision.com to download the according to your mobileapplicaon
phone system.
-Visit the site of our company. Then go to ocial Support → Tools → Hikvision App Store .
-Scan the QR code below to download the applicaon.
Network Camera User Manual
64
Enable Hik-Connect Service via SADP Soware
This part introduce how to enable Hik-Connect service via SADP of an soware acvated camera.
Steps
1. Run SADP soware.
2. Select a camera and enter Modify Network Parameters page.
3. Check Enable Hik-Connect.
4. Create a vericaon code or change the old code.vericaon
Note
The code is required when you add the camera to Hik-Connect service.vericaon
5. Click and read "Terms of Service" and "Privacy Policy".
6. Conrm sengs. the
7.14.2 Set Up Hik-Connect
Steps
1. Get and install Hik-Connect by the following ways.applicaon
-Visit hps://appstore.hikvision.com to download the according to your mobileapplicaon
phone system.
-Visit the ocial site of our company. Then go to Support → Tools → Hikvision App Store .
-Scan the QR code below to download the applicaon.
Note
If errors like "Unknown app" occur during the solve the problem in two ways.installaon,
Visit hps://appstore.hikvision.com/stac/help/index.html to refer to the troubleshoong.
Visit hps://appstore.hikvision.com/ , and click at the upper right corner ofInstallaon Help
the interface to refer to the troubleshoong.
2. Start the and register for a Hik-Connect user account.applicaon
3. Log in aer registraon.
Network Camera User Manual
66
7.14.3 Add Camera to Hik-Connect
Steps
1. Connect your mobile device to a Wi-Fi.
2. Log into the Hik-Connect app.
3. In the home page, tap "+" on the upper-right corner to add a camera.
4. Scan the QR code on camera body or on the Quick Start Guide cover.
Note
If the QR code is missing or too blur to be recognized, you can also add the camera by inpung
the camera's serial number.
5. Input the code of your camera.vericaon
Note
The required code is the code you create or change when you enable Hik-Connectvericaon
service on the camera.
If you forget the vericaon code, you can check the current code on vericaon Plaorm
Access conguraon page via web browser.
6. Tap in the popup interface.Connect to a Network buon
7. Choose or according to your camera Wired Connecon Wireless Connecon funcon.
Wireless
Connecon
Input the Wi-Fi password that your mobile phone has connected to, and
tap Next to start the Wi-Fi process. (Locate the camera within 3connecon
meters from the router when up the Wi-Fi.)seng
Wired
Connecon
Connect the camera to the router with a network cable and tap Connected
in the result interface.
Note
The router should be the same one which your mobile phone has connected to.
8. Tap in the next interface to adding.Add nish
For detailed informaon, refer to the user manual of the Hik-Connect app.
Network Camera User Manual
67
Manual Alarm
You can trigger an alarm output manually.
Steps
1. Set the manual alarm parameters.
Alarm Output No.
Select the alarm output No. according to the alarm interface connected to the external alarm
device.
Alarm Name
Edit a name for the alarm output.
Delay
Select .Manual
2. Click to enable manual alarm output.Manual Alarm
3. Oponal: Clear AlarmClick to disable manual alarm output.
Automac Alarm
Set the alarm parameters, then the device triggers an alarm output automac automacally in the
set arming schedule.
Steps
1. Set alarm parameters.automac
Alarm Output No.
Select the alarm output No. according to the alarm interface connected to the external alarm
device.
Alarm Name
Custom a name for the alarm output.
Delay
It refers to the me duraon that the alarm output remains an alarm occurs.aer
2. Set the alarming schedule. For the informaon sengs, about the see .Set Arming Schedule
3. Click to copy the parameters to other alarm output channels.Copy to…
4. Click Save.
8.2.2 FTP/NAS/Memory Card Uploading
If you have enabled and congured the FTP/NAS/memory card uploading, the device sends the
alarm informaon to the FTP server, network storage and memory card when an alarm isaached
triggered.
Network Camera User Manual
69
Refer to to set the FTP server.Set FTP
Refer to for NAS Set NAS conguraon.
Refer to Set New or Unencrypted Memory Card for memory card storage conguraon.
8.2.3 Send Email
Check , and the device sends an email to the designated addresses with alarmSend Email
informaon when an alarm event is detected.
For email refer to sengs, Set Email .
Set Email
When the email is congured and is enabled as a linkage method, the device sends anSend Email
email to all designated receivers if an alarm event is detected.nocaon
Before You Start
Set the DNS server before using the Email funcon. Go to Conguraon → Network → Basic
Sengs TCP/IP for DNS sengs.
Steps
1. Go to email sengs page: Conguraon → Network → Advanced → EmailSengs .
2. Set email parameters.
1) Input the sender's email informaon, including the , , andSender's Address SMTP Server
SMTP Port.
2) Oponal: If your email server requires check and input yourauthencaon, Authencaon
user name and password to log in to the server.
3) Set the E-mail Encrypon.
When you select or , and disable STARTTLS, emails are sent encrypted by SSL orSSL TLS aer
TLS. The SMTP port should be set as 465.
When you select or and SSL TLS Enable STARTTLS, emails are sent aer encrypted by
STARTTLS, and the SMTP port should be set as 25.
Note
If you want to use STARTTLS, make sure that the protocol is supported by your email server.
If you check the Enable STARTTLS while the protocol is not supported by your email sever,
your email is sent with no encrypon.
4) If you want to receive with alarm pictures, check . TheOponal: nocaon Aached Image
nocaon aached email has 3 alarm pictures about the event with congurable image
capturing interval.
5) Input the receiver's informaon, including the receiver's name and address.
6) Click Test to see if the is well funcon congured.
3. Click Save.
Network Camera User Manual
70
8.2.4 Surveillance CenterNofy
Check , the alarm Nofy Surveillance Center informaon is uploaded to the surveillance center
when an alarm event is detected.
8.2.5 Trigger Recording
Check Trigger Recording, and the device records the video about the detected alarm event.
For recording refer to sengs, Video Recording and Picture Capture
8.2.6 Flashing Light
Aer seng enabling and Flashing Light the , the light whenFlashing Light Alarm Output ashes
an alarm event is detected.
Set Flashing Alarm Light Output
When events occur, the light on the device can be triggered as an alarm.ashing
Steps
1. Go to Conguraon → Event → Basic Event → Flashing Alarm Light Output .
2. Set Flashing Duraon, and .Flashing Frequency Brightness
Flashing Duraon
The that the lasts when one alarm happens.me ashing
Flashing Frequency
The rate at which the light ashes. High frequency, medium frequency, low frequency, and
normally on are selectable.
Brightness
The brightness of the light.
3. Set the arming schedule. See Set Arming Schedule for details.
4. Click Save.
Note
Only certain device models support the funcon.
8.2.7 Audible Warning
Aer enabling Audible Warning Audible Alarm Output and seng , the built-in speaker of the
device or connected external speaker plays warning sounds when an alarm happens.
For audible alarm output sengs, refer to Set Audible Alarm Output .
Network Camera User Manual
71
Note
The is only supported by certain camera models.funcon
Set Audible Alarm Output
When the device detects targets in the detecon area, audible alarm can be triggered as a
warning.
Steps
1. Go to Conguraon Event → Basic Event → Audible Alarm Output .
2. Select Sound Type and set related parameters.
-Select and set the alarm you need.Prompt mes
-Select Warning and its contents. Set the alarm you need.mes
-Select Custom Audio. You can select a custom audio le from the drop-down list. If no isle
available, you can click to upload an audio that meets the requirement. Up to threeAdd le
audio les can be uploaded.
3. Oponal: TestClick to play the selected audio on the device.le
4. Set arming schedule for audible alarm. See Set Arming Schedule for details.
5. Click Save.
Note
The is only supported by certain device models.funcon
Network Camera User Manual
72
Chapter 9 System and Security
It introduces system maintenance, system and security management, and explains how tosengs
congure relevant parameters.
9.1 View Device Informaon
You can view device informaon, such as Device No., Model, Serial No. and Firmware Version.
Enter Conguraon → System System → Basic Sengs Informaon to view the device
informaon.
9.2 Search and Manage Log
Log helps locate and troubleshoot problems.
Steps
1. Go to Conguraon → System → Maintenance → Log .
2. Set search condions Major Type Minor Type Start Time End Time, , , and .
3. Click .Search
The matched log les will be displayed on the log list.
4. Oponal: ExportClick to save the log in your computer.les
9.3 Simultaneous Login
The administrator can set the maximum number of users logging into the system through web
browser simultaneously.
Go to Conguraon → System → User Management General , click and set .Simultaneous Login
9.4 Import and Export Conguraon File
It helps speed up batch conguraon on other devices with the same parameters.
Enter Conguraon → System Maintenance → Upgrade & Maintenance . Choose device
parameters that need to be imported or exported and follow the instrucons on the interface to
import or export conguraon le.
Network Camera User Manual
73
9.5 Export Diagnose Informaon
Diagnose informaon includes running log, system informaon, hardware informaon.
Go to Conguraon → System Maintenance → Upgrade & Maintenance . Check desired
diagnose informaon and click to export corresponding diagnoseDiagnose Informaon
informaon of the device.
9.6 Reboot
You can reboot the device via browser.
Go to Conguraon → System Maintenance → Upgrade & Maintenance Reboot , and click .
9.7 Restore and Default
Restore and Default helps restore the device parameters to the default sengs.
Steps
1. Go to Conguraon → System → Maintenance → Upgrade & Maintenance .
2. Click Restore Default or according to your needs.
Restore Reset device parameters, except user informaon, IP parameters and video format
to the default sengs.
Default Reset all the parameters to the factory default.
Note
Be careful when using this to the factory default, all thefuncon. Aer reseng
parameters are reset to the default sengs.
9.8 Upgrade
Before You Start
You need to obtain the correct upgrade package.
Cauon
DO NOT disconnect power during the process, and the device reboots upgrade.automacally aer
Steps
1. Go to Conguraon → System → Maintenance → Upgrade & Maintenance .
2. Choose one method to upgrade.
Firmware Locate the exact path of the upgrade le.
Network Camera User Manual
74
Firmware Directory Locate the directory which the upgrade belongs to.le
3. Click to select the upgrade Browse le.
4. Click Upgrade.
9.9 View Open Source LicenseSoware
Go to Conguraon → System → System → About Device View Licenses Sengs , and click .
9.10 Wiegand
Note
This is only supported by certain camera models.funcon
Check and select the protocol. The default protocol is SHA-1 26bit.Enable
If enabled, the recognized license plate number will be output via the selected Wiegand protocol.
9.11 Metadata
Metadata is the raw data that the camera collects before algorithm processing. It provide the
opon to users to explore various data usages.
Note
The is only supported by certain device models.funcon
Go to Conguraon → System → Metadata Sengs to enable metadata uploading of the desired
funcon.
Smart Event
The metadata of the smart event includes the target ID, target coordinate, etc.me,
9.12 Time and Date
You can congure me and date of the device by zone, conguring me me synchronizaon and
Daylight Saving Time (DST).
9.12.1 Synchronize Time Manually
Steps
1. Go to Conguraon → System → System → Time Sengs Sengs .
2. Select .Time Zone
Network Camera User Manual
75
3. Click .Manual Time Sync.
4. Choose one me synchronizaon method.
-Select , and manually input or select date and from the pop-up calendar.Set Time me
-Check Sync. with computer me to synchronize the of the device with that of the localme
PC.
5. Click Save.
9.12.2 Set NTP Server
You can use NTP server when accurate and reliable source is required.me
Before You Start
Set up a NTP server or obtain NTP server informaon.
Steps
1. Go to Conguraon → System → System → Time Sengs Sengs .
2. Select .Time Zone
3. Click .NTP
4. Set , Server Address NTP Port Interval and .
Note
Server Address is NTP server IP address.
5. Click Test to test server connecon.
6. Click Save.
9.12.3 Synchronize Time by Satellite
Note
This varies depending on funcon dierent devices.
Steps
1. Enter Conguraon → System → System → Time Sengs Sengs .
2. Select Satellite Time Sync..
3. Set Interval.
4. Click Save.
9.12.4 Set DST
If the region where the device is located adopts Daylight Saving Time (DST), you can set this
funcon.
Network Camera User Manual
76
Steps
1. Go to Conguraon → System → System → DST Sengs .
2. Check .Enable DST
3. Select , and Start Time End Time DST Bias.
4. Click Save.
9.13 Set RS-485
RS-485 is used to connect the device to external device. You can use RS-485 to transmit the data
between the device and the computer or terminal when the communicaon distance is too long.
Before You Start
Connect the device and computer or termial with RS-485 cable.
Steps
1. Go to Conguraon → System → System → RS-485 Sengs .
2. Set the RS-485 parameters.
Note
You should keep the parameters of the device and the computer or terminal all the same.
3. Click Save.
9.14 Set RS-232
RS-232 can be used to debug device or access peripheral device. RS-232 can realize communicaon
between the device and computer or terminal when the communicaon distance is short.
Before You Start
Connect the device to computer or terminal with RS-232 cable.
Steps
1. Go to Conguraon → System → System → RS-232 Sengs .
2. Set RS-232 parameters to match the device with computer or terminal.
3. Click Save.
9.15 Power Consumpon Mode
It is used to switch the power when the device is working.consumpon
Note
The is only supported by certain camera models.funcon
Network Camera User Manual
77
Go to Conguraon → System → System → Power Mode Sengs Consumpon , select the
desired power mode.consumpon
Full ModeConsumpon
The device works with all the enabled.funcons
Low Real-Time ModeConsumpon
The device DSP works normally. It records the videos with the main stream at the half frame
rate, and supports the remote login, preview and the conguraon.
Low Power Sleep
When the device power is lower than Threshold of Low Power Sleep Mode, the device enters
sleep mode.
When the device power is recovered to 10% above the threshold, the device enters the user
conguraon mode.
Scheduled Sleep
If the device is during , it enters the sleep mode, otherwise it enters theScheduled Sleep Time
user conguraon mode.
Note
For the scheduled sleep schedule see sengs, Arming Schedule and Alarm Linkage .
The device supports the wake. For the details, see ming Set Timing Wake .
9.16 External Device
For the device external devices, including the supplement light, wiper on the housingsupporng
and the LED light, you can control them via the Web browser when it is used with the housing.
External devices vary with models.
Brightness
Adjust Low Beam Brightness High Beam Brightness and according to the actual scene.
Timing
The LED light will be turned on by the schedule you set. You should set and Start Time End
Time.
Auto
The LED light will be turned on according to the environment illuminaon.
9.16.1 Supplement Light Sengs
You can set supplement light and refer to the actual device for relevant parameters.
Smart Supplement Light
Network Camera User Manual
78
Smart supplement light avoids over exposure when the supplement light is on.
Supplement Light Mode
When the device supports supplement light, you can select supplement light mode.
IR Mode
IR light is enabled.
White Light Mode
White light is enabled.
Mix Mode
Both IR light and white light are enabled.
O
Supplement light is disabled.
Brightness Adjustment Mode
Auto
The brightness adjusts according to the actual environment automacally.
Manual
You can drag the slider or set value to adjust the brightness.
9.16.2 Heater
You can enable heater to remove fog around the lens of the device.
Go to Conguraon → System → System → External Device Sengs and select the mode as
required.
9.17 Security
You can improve system security by security parameters.seng
9.17.1 Authencaon
You can improve network access security by RTSP and WEB seng authencaon.
Go to Conguraon → System → Security → Authencaon to choose protocolauthencaon
and method according to your needs.
RTSP Authencaon
Digest and digest/basic are supported, which means is needed whenauthencaon informaon
RTSP request is sent to the device. If you select digest/basic, it means the device supports
digest or basic authencaon. If you select digest, the device only supports digest
authencaon.
Network Camera User Manual
79
RTSP Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in RTSP If you enable theauthencaon.
digest algorithm except for MD5, the third-party plaorm might not be able to log in to the
device or enable live view because of compability. The encrypted algorithm with high strength
is recommended.
WEB Authencaon
Digest and digest/basic are supported, which means authencaon informaon is needed when
WEB request is sent to the device. If you select digest/basic, it means the device supports digest
or basic If you select authencaon. digest, the device only supports digest authencaon.
WEB Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in WEB If you enable theauthencaon.
digest algorithm except for MD5, the third-party plaorm might not be able to log in to the
device or enable live view because of compability. The encrypted algorithm with high strength
is recommended.
Note
Refer to the content of protocol to view specic authencaon requirements.
9.17.2 Set IP Address Filter
IP address lter is a tool for access control. You can enable the IP address to allow or forbidlter
the visits from the certain IP addresses.
IP address refers to IPv4.
Steps
1. Go to Conguraon → System → Security → IP Address Filter .
2. Check Enable IP Address Filter.
3. Select the type of IP address lter.
Forbidden IP addresses in the list cannot access the device.
Allowed Only IP addresses in the list can access the device.
4. Edit the IP address list.lter
Add Add a new IP address or IP address range to the list.
Modify Modify the selected IP address or IP address range in the list.
Delete Delete the selected IP address or IP address range in the list.
5. Click Save.
Network Camera User Manual
80
9.17.3 Set HTTPS
HTTPS is a network protocol that enables encrypted transmission and identy authencaon,
which improves the security of remote access.
Steps
1. Go to Conguraon → Network → Advanced → HTTPSSengs .
2. Check to access the camera via HTTP or HTTPS protocol.Enable
3. Check to access the camera only via HTTPS protocol.Enable HTTPS Browsing
4. Select the Server Cercate.
5. Click Save.
Note
If the is abnormal, check if the selected funcon cercate is abnormal in Cercate
Management.
9.17.4 Set QoS
QoS (Quality of Service) can help improve the network delay and network by congeson seng
the priority of data sending.
Note
QoS needs support from network device such as router and switch.
Steps
1. Go to Conguraon → Network → Advanced Conguraon .→ QoS
2. Set Video/Audio DSCP Alarm DSCP Management DSCP, and .
Note
Network can the priority of data transmission. The bigger the DSCP value is, the higheridenfy
the priority is. You need to set the same value in router while conguraon.
3. Click Save.
9.17.5 Set IEEE 802.1X
IEEE 802.1x is a port-based network access control. It enhances the security level of the LAN/
WLAN. When devices connect to the network with IEEE 802.1x standard, the authencaon is
needed.
Go to Conguraon → Network → Advanced → 802.1XSengs , and enable the funcon.
Set Protocol EAPOL Version and according to router informaon.
Protocol
Network Camera User Manual
81
EAP-LEAP, EAP-TLS, and EAP-MD5 are selectable
EAP-LEAP and EAP-MD5
If you use EAP-LEAP or EAP-MD5, the server must be Register aauthencaon congured.
user name and password for 802.1X in the server in advance. Input the user name and
password for authencaon.
EAP-TLS
If you use EAP-TLS, input Idenfy, Private Key Password, and upload CA UserCercate,
Cercate and Private Key.
EAPOL Version
The EAPOL version must be with that of the router or the switch.idencal
9.17.6 Control Timeout Sengs
If this is enabled, you will be logged out when you make no funcon operaon (not including
viewing live image) to the device via web browser within the set period.meout
Go to Conguraon → System → Security → Advanced Security to complete sengs.
9.17.7 Search Security Audit Logs
You can search and analyze the security log of the device so as to out the illegal intrusionles nd
and troubleshoot the security events.
Steps
Note
This is only supported by certain camera models.funcon
1. Go to Conguraon → System → Maintenance → Security Audit Log .
2. Select log types, , and .Start Time End Time
3. Click .Search
The log les that match the search will be displayed on the Log List.condions
4. Oponal: ExportClick to save the log to your computer.les
9.17.8 Security Reinforcement
Security reinforce is a soluon to enhance network security. With the enabled, riskyfuncon
funcons, protocols, ports of the device are disabled and more secured alternave funcons,
protocols and ports are enabled.
Go to Conguraon → System → Security → Advanced Security Security Reinforcement . Check ,
and click Save.
Network Camera User Manual
82
9.17.9 SSH
Secure Shell (SSH) is a cryptographic network protocol for network services over anoperang
unsecured network.
The SSH funcon is disabled by default.
Cauon
Use the with The security risk of device internal funcon cauon. informaon leakage exists when
the is enabled.funcon
9.18 Cercate Management
It helps to manage the server/client cercates cercate, and CA and to send an alarm if the
cercates are close to expiry date, or are expired/abnormal.
Note
The is only supported by certain device models.funcon
9.18.1 Create Self-signed Cercate
Steps
1. Click Create Self-signed Cercate.
2. Follow the prompt to enter Cercate ID Country/Region Hostname/IP Validity, , , and other
parameters.
Note
The cercate leers ID should be digits or and be no more than 64 characters.
3. Click .OK
4. Oponal: ExportClick to export the cercate, or click to delete the Delete cercate to
recreate a cercate, or click Cercate Properes to view the cercate details.
9.18.2 Create Cercate Request
Before You Start
Select a self-signed cercate.
Steps
1. Click Create Cercate Request.
2. Enter the related informaon.
3. Click .OK
Network Camera User Manual
83


Specyfikacje produktu

Marka: Hikvision
Kategoria: Kamera monitorująca
Model: DS-2CD2083G2-I

Potrzebujesz pomocy?

Jeśli potrzebujesz pomocy z Hikvision DS-2CD2083G2-I, zadaj pytanie poniżej, a inni użytkownicy Ci odpowiedzą




Instrukcje Kamera monitorująca Hikvision

Instrukcje Kamera monitorująca

Najnowsze instrukcje dla Kamera monitorująca