Instrukcja obsługi Vitek VTC-TNT4RFS

Vitek Niesklasyfikowane VTC-TNT4RFS

Przeczytaj poniżej 📖 instrukcję obsługi w języku polskim dla Vitek VTC-TNT4RFS (52 stron) w kategorii Niesklasyfikowane. Ta instrukcja była pomocna dla 5 osób i została oceniona przez 2 użytkowników na średnio 4.5 gwiazdek

Strona 1/52
VITEK
VITEK
OPERATION MANUAL
Transcendent IP
4MP Cameras
Transcendent Series 4 Megapixel
Indoor/Outdoor WDR IP Dome
Cameras with IR Illumination
FEATURES
• 1/3” 4.0 Megapixel Progressive Scan CMOS image sensor
• Up to 30fps live view @ 4 MegaPixel (2592x1520)
• Motorized Varifocal & Fixed Lens Options
• Infrared IR LED Illumination
• 120dB Super Wide Dynamic Range (WDR)
• True Mechanical Day/Night function by ICR
• XD-DNR (2D-DNR & 3D-DNR) Noise Reduction
• Fully Programmable Intelligent Analytics including Object Removal/
Museum Search, Line Crossing, and Area Intrusion Detection
• H.265/H.264/MJPEG Triple Streaming
• Secondary Video Output (CVBS)
• Remote Viewing via CMS, Internet Explorer, and iOS & Android Apps
• IP66 Weather Resistance & IK10 Impact Rating
• ONVIF Compliant
• Optional Mounts Available
• 12VDC & PoE (Power over Ethernet) Operation
PLEASE NOTE:
Complete User Guide, Software, Tools,
and Updates are available online. Scan
the QR Code or visit:
http://www.vitekcctv.com/Downloads
Transcendent IP Cameras v4: Operation Manual
1
n Please use the specified power supply to connect.
n Do not attempt to disassemble the camera; in order to prevent electric shock, do not remove
screws or covers.
n There are no user-serviceable parts inside. Please contact the nearest service center as soon as
possible if there is any failure.
n Avoid from incorrect operation, shock vibration, heavy pressing which can cause damage to
product.
n Do not use corrosive detergent to clean main body of the camera. If necessary, please use soft dry
cloth to wipe dirt; for hard contamination, use neutral detergent. Any cleanser for high grade
furniture is applicable.
n Avoid aiming the camera directly towards extremely bright objects, such as, sun, as this may
damage the image sensor.
n Please follow the instructions to install the camera. Do not reverse the camera, or the reversing
image will be received.
n Do not operate it incase temperature, humidity and power supply are beyond the limited
stipulations.
n Keep away from heat sources such as radiators, heat registers, stove, etc.
n Do not expose the product to the direct airflow from an air conditioner.
n This is product instructions not quality warranty. We may reserve the rights of amending the
typographical errors, inconsistencies with the latest version, software upgrades and product
improvements, interpretation and modification. These changes will be published in the latest
version without special notification.
n When this product is in use, the relevant contents of Microsoft, Apple and Google will be
involved in. The pictures and screenshots in this manual are only used to explain the usage of our
product. The ownerships of trademarks, logos and other intellectual properties related to
Microsoft, Apple and Google belong to the above-mentioned companies.
n This manual is suitable for IR water-proof network camera. All pictures and examples used in the
manual are for reference only.
Transcendent IP Cameras v4: Operation Manual
2
Table of Contents
1Introduction ...................................................................................................................... 4
2 IE Remote Access............................................................................................................ 5
2.1LAN ........................................................................................................................ 5
1.1.1 - Access through IP Tool ................................................................................................................... 5
1.1.2 Directly A ccess through IE .............................................................................................................. 6
2.2WAN ....................................................................................................................... 8
3 Remote Preview ............................................................................................................. 11
4 Remote Live Surveillance.............................................................................................. 12
1.2 System Configuration............................................................................................... 12
1.2.1 Basic Information........................................................................................................................... 12
1.2.2 Time Date and ............................................................................................................................... 12
1.2.3 .................................................................................................................................. Local Config 13
1.2.4 Storage.......................................................................................................................................... 13
1.3 Image Configuration ................................................................................................. 14
1.3.1 Display Configuration .................................................................................................................... 14
1.3.2 Video / Audio Configuration........................................................................................................... 15
1.3.3 OSD Configuration ........................................................................................................................ 17
1.3.4 Video Mask.................................................................................................................................... 17
1.3.5 ROI Configuration.......................................................................................................................... 18
1.4 Alarm Configuration.................................................................................................. 19
1.4.1 ........................................................................................................................... Motion Detection 19
1.4.2 ................................................................................................................................ Alarm Server . 21
1.5 Event Configuration.................................................................................................. 21
1.5.1 Object Removal ............................................................................................................................. 21
1.5.2 Exception....................................................................................................................................... 23
1.5.3 ................................................................................................................................ Line Crossing 25
1.5.4 Intrusion ......................................................................................................................................... 26
1.6 Network Configuration.............................................................................................. 28
1.6.1 TCP/IP ........................................................................................................................................... 28
1.6.2 Port ................................................................................................................................................ 29
1.6.3 ..................................................................................................................... Server Configuration 30
1.6.4 DDNS ............................................................................................................................................ 30
1.6.5 SNMP ............................................................................................................................................ 31
1.6.6 RTSP............................................................................................................................................. 32
1.6.7 ............................................................................................................................................ UPNP 33
1.6.8 ............................................................................................................................................. Email 33
1.6.9 FTP................................................................................................................................................ 34
4.1Security onfigurationC ....................................................................................... 35
1.6.10 onfiguration 35 CUser ......................................................................................................................
1.6.11 37 Online User .................................................................................................................................
1.6.12 Block and Allow Lists ................................................................................................................... 37
Transcendent IP Cameras v4: Operation Manual
3
4.2Maintenance Configuration ............................................................................... 37
1.6.13 Backup and Restore.................................................................................................................... 37
1.6.14 Reboot......................................................................................................................................... 38
1.6.15 Upgrade....................................................................................................................................... 38
1.6.16 Operation Log .............................................................................................................................. 39
5 Record Search................................................................................................................ 40
5.1Photo Search ...................................................................................................... 40
5.2Photo Search ...................................................................................................... 40
5.3Video Search ....................................................................................................... 41
1.6.17 Local Video Search ..................................................................................................................... 41
1.6.18 SD Card Video Search ................................................................................................................ 42
1.6.19 This feature is camera dependent; some cameras do not have an SD card slot. ....................... 42
6 Specifications................................................................................................................. 43
Transcendent IP Cameras v4: Operation Manual
4
1 Introduction
This IP camera is designed for high performance CCTV solutions. It adopts state of the art video
processing chips. It utilizes most advanced technologies, such as video encoding and decoding
technology, complies with the TCP/IP protocol, SoC, etc to ensure this system is more stable and
reliable.
Main Features
l ICR auto switch, true day/night
l 3D DNR, digital WDR
l ROI coding
l BLC, Defog, Anti- flicker
l Supports smart phones & tablets for remote monitoring
Surveillance Application
Transcendent IP Cameras v4: Operation Manual
5
2 IE Remote Access
2.1 LAN
In LAN, there are two ways to access - -the IP Cam: 1. access through IP Tool; 2. directly access through
IE browser.
1.1.1 Access through IP- Tool
Network connection:
- -Make sure the PC and IP Cam are connected to the LAN and the IP Tool is installed in the PC from
the CD.
D - ouble click the IP Tool icon on the desktop to run this software as shown below:
Modify the IP address. The default IP address of this camera is 192.168.226.201. Click the
information of the camera listed in the above table to show the network information on the right side.
Modify the IP address and gateway of the camera and make sure its network address is in the same
local network segment as that of the computer. Please modify the IP address of your device according
to the practical situation.
Transcendent IP Cameras v4: Operation Manual
6
For example, the IP address of your computer is 192.168.1.4. So the IP address of the camera shall be
changed to 192.168.1.X. After modification, please input the password of the administrator ADMIN
and click “Modify” button to modify the setting.
F
Double click the IP address and then the system will pop up IE browser to connect IP-CAM. IE
browser will ask to download the Active X control. After downloading, a login window will pop up as
shown below.
Input the username and password to log in.
F
1.1.2 Directly Access through IE
The default network s as shown below:ett ings are
IP address: 192.168.226.201
Subnet Mask: 255.255.255.0
Gateway: 192.168.226.1
HTTP: 80
Data port: 9008
The default password of the administrator is123456”.
The default username is “admin”; the default password is “123456”.
Transcendent IP Cameras v4: Operation Manual
7
You may use the above default settings when you log in the camera for the first time. You may directly
connect the camera to the computer through network cable.
Manually set the IP address of the PC as the network segment should be as the same as the default
settings of the IP camera. Open the network and share center. Click “Local Area Connectionto pop
up the following window.
Select Properties” and then select internet protocol according to the actual situation (for example:
IPv4). Next, click “Properties” button to set the network of the PC.
Transcendent IP Cameras v4: Operation Manual
8
Open IE browser and input the default address of IP-CAM and confirm. IE browser will ask to
download the Active X control.
After downloading the Active X control, the login dialog box will pop up.
Input the default username and password and then enter to view.
2.2 WAN
Ø Access through the router or virtual server
Make sure the camera is connected via LAN and then log into the camera via LAN and go to
ConfigàNetworkàPort to set the port number.
Port Setup
Go to ConfigàNetworkàTCP/IP menu to modify the IP address.
Transcendent IP Cameras v4: Operation Manual
9
IP S etup
Go to the router’s management interface through IE browser to forward the IP address and port of
the camera. Please check your router manual for instructions on port forwarding.
Router Setup
Open IE browser and input its WAN IP and http port to access.
Ø Access through PPPoE dial- up
Network connection
You may access the camera through PPPoE auto dial up. The setting steps are as follow:-
Go to ConfigàNetworkàPort to set the port number.
Transcendent IP Cameras v4: Operation Manual
10
Go to ConfigàNetworkàTCP/IPà PPPoE Config menu. Enable PPPoE and then input the user
name and password which you can get from your internet service provider.
Go to ConfigàNetworkàDDNS menu. Before you configure the DDNS, please apply for a
domain name first. Please refer to cDDNS onfiguration for detail information.
Open IE browser and input the domain name and http port to access.
Ø Access through static IP
Network connection
The setting steps are as follow:
Go to ConfigàNetworkàPort to set the port number.
Go to ConfigàNetworkàTCP/IP menu to set the IP address. Check “Use the following IP address”
and then input the static IP address and other parameters.
Open IE browser and input its WAN IP and http port to access.
Transcendent IP Cameras v4: Operation Manual
11
3 Remote Preview
After you log in, you will see the following window.
The following table is the instructions of the icons on the remote live interface.
Icon Description Icon Description
Original size Scene change indicator icon
Appropriate size Abnormal clarity indicator icon
Auto Color abnormal indicator icon
Full screen Motion alarm indicator icon
Start/stop live view Start/stop recording
Enable/disable audio Zoom in
Snap Zoom out
l When motion detection alarm is triggered, the people icon will turn red.
l In full screen mode, double click to exit.
l icons may not be displayed for some versions without intelligent analysis function.
Transcendent IP Cameras v4: Operation Manual
12
4 Remote Live Surveillance
1.2 System Configuration
The “System” submenus: Basic Information configuration includes four , Date and Time, Local Config
and storage.
1.2.1 Basic Information
In the “Basic Information” interface, you can check the relative information of the device.
1.2.2 Date and Time
Go to ConfigàSystemàDate and Time. Please refer to the following interface.
You can select the time zone and DST as required.
Click “Date and Time” tab to set the time mode.
Transcendent IP Cameras v4: Operation Manual
13
1.2.3 Local Config
Go to Config Local Config. You can set the storage path of the captured pictures and video àSystemà
records. You can also enable or disable the video audio.
1.2.4 Storage
Go to ConfigàSystemàStorage to go to the interface as shown below .
The first time you use the SD card, you should click “Format” button to format the SD card.
Click “Pop Up” button to stop writing data to SD card. Then the SD card can be ejected safely.
F
Go to ConfigàSystemàStorageàRecord to go to the interface as shown below. You can set the SD
Note: Using the SD card function should be coordinated with m otion alarm.
When alarm is triggered, the system will automatically snap picture and save
the picture or record into SD card.
Transcendent IP Cameras v4: Operation Manual
14
card record stream. Set the pre record time if you enable pre record. Click Save” button to save the
settings.
Pre Record Time: S et the time to record before the actual recording begins.
1.3 Image Configuration
Image , Configuration includes Display Video/Audio, OSD, Video Mask, ROI Config and
Zoom/Focus.
1.3.1 Display Configuration
Go to ImageàDisplay rightness, interface as shown below. You can set and adjust the picture’s b
c h ontrast, ue and saturation, etc.
Brightness: Set the brightness level of the camera’s image.
Contrast: Set the color difference between the brightest and darkest parts.
Hue: Set the total color degree of the image.
Saturation: Set the degree of color purity. The purer the color is, the brighter the image is.
Sharpness: Set the resolution level of the image plane and the sharpness level of the image edge.
Transcendent IP Cameras v4: Operation Manual
15
Noise Reduction: Decrease the noise and make the image more thorough. Increasing the value will
make the noise reduction effect better but it will reduce the image resolution.
Backlight Compensation:
l Off: Close the backlight compensation function. It is the default mode.
l WDR
u As to the WDR scene, WDR will help the camera provide clear images when there are both very
bright and very dark areas simultaneously in the field of view by lowering the brightness of the bright
area and increasing the brightness of the lowlight area. High, middle and low can be selected.
u There will be some record a few secondsing lost for -during mode changing from non WDR to
WDR mode.
l HLC: Lower the brightness of the whole image by suppressing the brightness of the image’s
highlight area and reducing the size of the halo area.
l BLC: The exposure will begin automatically according to the scene for the goal of seeing the
darkest area of the image.
HFRHigh frame rate mode. You may enable or disable it as needed.
Antiflicker:
l Off: C -f lose the anti licker function.
l 50Hz: M s ake sure the horizontal stripes will not appear in the image while the device is adjusting
the exposure automatically according to the brightness of the scene when the electric supply is 50Hz.
l 60Hz: M s ake sure the horizontal stripes will not appear in the image while the device is adjusting
the exposure automatically according to the brightness of the scene when the electric supply is 60Hz.
White Balance: Adjust the color temperature according to the environment automatically.
Frequency: 50H and 60H (50Hz= PAL(Europe) 60Hz= NTSC (North America))z z .
Day/night Mode : Please choose the mode as needed.
Auto= will change to Black & White in low light
Day= Camera will be in color all the time
Night= Camera will be in Black & White all the time
Schedule= set a particular time the camera switches to Night mode or Day mode
Sensitivity: High, middle and low can be selected.
Infrared Mode: You may choose “ON”, “OFF” and “Auto” as required.
Exposure Mode: You may choose “ Auto or Manual as required.
Corridor Pattern: You can change the direction of the video image by using this function. 0, 90, 180
and 270 are available. The default value is 0. The video resolution should be 1080P or under 1080P if
you use this function.
Image Mirror: Reverse the current video image right and left.
Image Flip: Turn the current video image upside down.
1.3.2 Video / Audio Configuration
Go to / Audio ImageàVideo interface as shown below. In this interface, you can set the resolution,
frame rate, bitrate type, video quality and so on subject to the actual network condition.
Transcendent IP Cameras v4: Operation Manual
16
Click “Audio” tab to go to the interface as shown below.
Three video streams can be adjustable.
Resolution: The higher the resolution is, the clearer the image is.
Frame rate: The higher the frame rate is, the more fluid the video is. However, more storage room
will be taken up.
Bitrate type: Including CBR and VBR. CBR means that no matter how the video changes , the
compression bitrate keeps constant. This will not only facilitate the image quality better in a constant
bitrate but also help to calculate the capacity of the recording. VBR means that the compression bitrate
can be adjustable according to the change of the video resources. This will help to optimize the
network bandwidth.
Bitrate: Please choose it according to the actual network situation.
Video Quality : When VBR is selected, you need to choose image quality. The higher the image
quality you choose, the more bitrate will be required.
I Frame interval: It is recommended to use the default value. If the value is read speed of to high, the
the group of pictures will be slow resulting in the quality loss of the video.
Video Compression: H264 and H265 are optional. Higher quality of image can be transferred under
limited network bandwidth by using H265 video however, higher quality of the hardware is encoding;
required.
Profile: Baseline, main profile/high s d are optional. Baseline profile is mainly use in interactive
application with low complexity and delay profile is mainly used for higher coding . Main/high
requirement.
Send Snapshot: Please select according to the actual situation.
Video encode slice split: If enabled, you may get image even though using a more fluid a
low- performance PC.
Watermark: If enabled, input the watermark . You may check the watermark when playing content
back the local record in the search interface, the record has beening unless ing file tampered . with
Audio Encoding : G G 711A and 711U are selectable.
Audio Type: MIC and LIN are selectable.
Transcendent IP Cameras v4: Operation Manual
17
1.3.3 OSD Configuration
Go to ImageàOSD interface as shown below.
You can set the time stamp, device name and OSD content here. After enabling the corresponding display
and entering the content, drag them to change their position. Then click “Save” button to save the settings.
1.3.4 Video Mask
Go to as shown belowImageàVideo Mask interface . s You can set 4 mask area at most.
To set up video mask:
1. Enable video mask.
2. Click “Draw Area” button and then drag the mouse to draw the video mask area.
3. Click “Save” button to save the settings.
4. Return to live view to see the following picture.
Transcendent IP Cameras v4: Operation Manual
18
Clear the video mask:
Go to video mask interface and then click “Clear” button to delete the current video mask area.
1.3.5 ROI Configuration
Go to ImageàROI Config interface as shown below.
1. Check “Enable” and then click “Draw Area” button.
2. Drag the mouse to set the ROI area.
3. Set the level.
4. Click “Save” button to save the settings.
Now, you will see the selected ROI area is clearer than other areas especially in a low bitrate condition.
Transcendent IP Cameras v4: Operation Manual
19
1.4 Alarm C onfiguration
Alarm configuration includes two submenus: Motion Detection and Alarm Server.
1.4.1 Motion etectionD
Go to AlarmàMotion Detection to set motion detection alarm.
1. Check “Enable Alarm” check box to activate motion based alarm, choose alarm holding time and set
alarm trigger options.
Trigger Snap: If selected, the system will snap images on an alarm and save the images to the SD
card.
Trigger SD Recording: If selected, the recording will be triggered and saved to the SD card on an
alarm.
Trigger Email: If “Trigger Email ttach icture” and “A P echeckbox is checked ( mail address shall be
set first in the Email to configuration interface), the captured pictures and triggered event will be sent
those addresses.
Trigger FTP: If “Trigger FTP” and “Attach ictureP capturedcheckbox is checked, the pictures will
be sent FTP server address. Please refer to FTP configuration chapter for more details.to the
2. Set motion detection area and sensitivity. Click “Area and Sensitivity” tab to go to the interface as
shown below.
Transcendent IP Cameras v4: Operation Manual
20
Move the “Sensitivity” scroll bar to set the sensitivity.
Select “Add” and click “Draw” button and drag mouse to select the motion detection area; Select
“Erase” and drag the mouse to clear motion detection area.
Select “Select All” to select the whole image for motion
Select “Clear All” to undo the whole picture
Select “Invert” to reverse the motion area
After that, click “Save” to save the settings.
3. Set the schedule of the motion detection. Click “Schedule” tab to go to the interface as shown below.
Week schedule
Transcendent IP Cameras v4: Operation Manual
21
Set the alarm time from Sunday to Saturday for alarm everyday in one week. The lengthwise means
one day of a week; the rank means 24 hours of a day. Green means selected area. Blank means
unselected area.
“Add”: Add the schedule.
“Erase”: Delete schedule.
Holiday Schedule
Set time for alarm in Holiday time line.
Set a date the “Date” in box, click “Add” button to add that date to the list box on the right side and
then drag the scroll bar to set the schedule of that day.
Select a date in the list box on the right side, and click “Delete” to remove the schedule on that day.
Click “Save” button to save the settings.
1.4.2 Alarm Server
Go to AlarmàAlarm Server interface as shown below.
Input the alarm server address and port. When an alarm happens, the camera will automatically transfer
the alarm event to the alarm server. If the alarm server is not used, there is no need for you to configure
here.
1.5 Event Configuration
Event configuration includes four submenus: Object Removal, Exception, Line Crossing and Intrusion.
Note: Some software versions of this series of cameras may not support the following functions.
Please take actual displayed interface as final.
1.5.1 Object Removal
To set object removal:
Go to ConfigàEventàObject Removal interface as shown below.
Transcendent IP Cameras v4: Operation Manual
22
1. Enable object removal detection and then select the detection type.
Enable Left Detection: The relevant alarms will be triggered if there are items left in the pre-defined
alarm area.
Enable Item Missing Detection: The relevant alarms will be triggered if there are items missing in the
pre- defined alarm area.
2. Set the alarm holding time that of motion and alarm trigger options. The setting steps are the same as
detection. Please refer to motion detection chapter for details.
3. Click “Save” button to save the settings.
4. Set the alarm area of the object removal detection. Click “Area” tab to go to the interface as shown
below.
Set the alarm area number and then input the alarm area name on the right side. You can add 4 alarm
areas at most.
Click “Draw Area” button and then click around the area where you want to set as the alarm area in the
image on the left (the alarm area should be a closed area) side . Click “Stop Draw” button to stop
Transcendent IP Cameras v4: Operation Manual
23
drawing. Click “Clear” button to delete the alarm area. Click “Save” button to save the settings.
5. Set the schedule of the . The setting steps of the schedule are the same with object removal detection
that of motion detection. Please refer to motion detection chapter for details.
A S I pplication cenario llustration
1. Object removal detection cannot determine the objects ownership. For instance, there is an
unattended package in the station. Object removal detection can detect the package itself but it cannot
determine ownership of the package.
2. Try not to enable object removal detection when light changes dramatically s in the cene.
3. Try not to enable object removal detection if there are complex and dynamic environments in the
s cene.
4. Adequate light and clear scenery are very important to object removal detection.
Here we take some application scenarios for instance.improper
1.5.2 Exception
To set exception detection:
Go to ConfigàEventàException interface as shown below.
There are so many trees
near the road and cars
running on the road,
which make the scene too
complex to detect the
objects removal.
Transcendent IP Cameras v4: Operation Manual
24
1. Enable the relevant detection as required.
Scene Change Detection: The relevant alarms will be triggered if the scene of the monitor video has
changed.
Video Blur Detection: The relevant alarms will be triggered if the monitor video is blurry .
Video Cast Detection: The relevant alarms will be triggered if color cast happens to the monitor
video.
2. Set the alarm holding time and alarm trigger options. The setting steps are the same with that of
motion detection. Please refer to motion detection chapter for details.
3. Click “Save” button to save the settings.
4. Set the sensitivity Sensitivityof the exception detection. Click “ ” tab to go to the interface as shown
below.
Drag the slider to set the sensitivity value or directly input the sensitivity value in the textbox. Click
“Save” button to save the settings.
The sensitivity value of Scene Change Detection: T he higher the value is, the more sensitive the
system responds to the amplitude of the scene change.
The sensitivity value of Video Blur Detection: T he higher the value is, the more sensitive the system
responds to the defocus of the device image. You should adjust the value according to the real
situation.
The sensitivity value of Video Cast Detection: The higher the value is, the more sensitive the system
responds to the color cast of the device image. You should also consider other factors.
A S I pplication cenario llustration
Transcendent IP Cameras v4: Operation Manual
25
1. Auto-focusing function should not been enabled for exception detection.
2. Try not to enable object removal detection when light changes dramatically s in the cene.
1.5.3 Line Crossing
Line Crossing: The relevant alarms will be triggered if someone or something crosses the pre-defined
alarm lines.
Go to ConfigàEventàLine Crossing interface as shown below.
1. Enable line crossing alarm and set the alarm holding time.
2. Set alarm trigger options. The setting steps are the same with that of motion detection. Please refer
to motion detection chapter for details.
3. Click “Save” button to save the settings.
4. Set line crossing alarmarea and sensitivity of the . Click “Area and Sensitivity” tab to go to the
interface as shown below.
Transcendent IP Cameras v4: Operation Manual
26
Set the cordon number and direction. You can add 4 cordons at most.
DirectionA<- A- ->B, >B and A< B optional. It is the crossing direction of the intruder who crosses
over the alarm line.
A<->B: T he alarm will be triggered when the intruder crosses over the alarm line from B to A or from
A to B.
A- >B: T he alarm will be triggered when the intruder crosses over the alarm line from A to B.
A<-B : T he alarm will be triggered when the intruder crosses over the alarm line from B to A.
Click “Draw” button and then drag the mouse to draw a cordon in the image on the left side. Click
“Stop” button to stop drawing. Click “Clear” button to delete the cordons. Click “Save” button to save
the settings.
5. Set the schedule of the line crossing alarm. The setting steps of the schedule are the same with that
of motion detection. Please refer to motion detection chapter for details.
A S I pplication cenario llustration
1. Auto-focusing function should not been enabled for line crossing detection. If enabled, the video
image will change so greatly that the algorithm will stop working temporarily.
2. Try not to enable line crossing detection when light changes dramatically s in the cene.
3 . Adequate light and clear scenery are very important to line crossing detection.
4. Adjust the camera to make the detection area in the center of the video image. Make sure no
obstructions are in the main crossing area. It is strongly recommended to make the obstructions (like
trees, bushes, flags, etc.) outside the detection area.
Here we take some application scenarios for instance.improper
1.5.4 Intrusion
Intrusion: The relevant alarms will be triggered if someone or something intrudes into the alarm areas
or moves -in the pre defined alarm areas.
Go to Configà àEvent Intrusion interface as shown below.
There are so many trees
near the road and cars
running on the road,
which make the scene
too complex to detect the
crossing objects.
Transcendent IP Cameras v4: Operation Manual
27
1. Enable region intrusion detection alarm and set the alarm holding time.
2. Set alarm trigger options. The setting steps are the same with that of motion detection. Please refer
to motion detection chapter for details.
3. Click “Save” button to save the settings.
4. Set the alarm area of the intrusion detection. Click “Area” tab to go to the interface as shown below.
Set the alarm area number You can add 4 alarm areas at most. on the right side.
Click “Draw Area” button and then click around the area where you want to set as the alarm area in the
image on the left side (the alarm area should be a closed area). Click “Stop Draw” button to stop
drawing. Click “Clear” button to delete the alarm area. Click “Save” button to save the settings.
5. Set the schedule of the intrusion detection. The setting steps of the schedule are the same with that of
motion detection. Please refer to motion detection chapter for details.
A S I pplication cenario llustration
1. Auto-focusing function should not been enabled for intrusion detection. If enabled, the video image
Transcendent IP Cameras v4: Operation Manual
28
will change so greatly that the algorithm will stop working temporarily.
2. Try not to enable intrusion detection when light changes dramatically s e. in the cen
3 . Adequate light and clear scenery are very important to intrusion detection.
4 . Adjust the camera to make the detection area in the center of the video image. The detected object
should be in the detection area for about two seconds at least. Make sure no s are in the obstruction
main crossing area. It is strongly recommended to make the obstructions (like trees, bushes, flags, etc.)
outside the detection area.
Here we take some application scenarios for instance.improper
1.6 Network onfigurationC
1.6.1 TCP/IP
Go to ConfigàNetworkàTCP/IP interface as shown below. There are two ways for network
connection.
Use IP address -(take IPv4 for example) There are two options for IP setup: obtain an IP address
automatically by DHCP protocol and use the following IP address. Please choose one of options for the
The camera’ s angle of view
is not wide enough; there are
so many trees in the scene.
T he above mentioned
environment is too complex
to detect the intrusion.
Transcendent IP Cameras v4: Operation Manual
29
your requirements.
Use PPPoE-Click PPPoE Configtab to go to the interface as shown below Enable PPPoE and then .
e nter the user name and password from your ISP.
You can choose either way for the network connection. If you use PPPoE to connect internet, you will
get a dynamic WAN IP address. This IP address will change frequently. You may use the function of
IP change notification.
Click “IP Change Notification Config” to go to the interface as shown below.
Trigger Email: when the IP address of the device is changed, a new IP address will be sent to the
appointed mailbox automatically
Trigger FTP: when the IP address of the device is changed, a new IP address will be sent to FTP
server.
1.6.2 Port
Go to ConfigàNetworkàPort interface as shown below. HTTP port, Data port and RTSP port can be
set.
HTTP Port: The default HTTP port is 80. It be changed to any port which is not occupied.should
Data Port: The default data port is 9008. Please change it as required.
RTSP Port: The default port is 554. Please change it as required.
Transcendent IP Cameras v4: Operation Manual
30
1.6.3 Server Configuration
This function is mainly used for connecting network video management system.
1. Check “Enable”.
2. Check the IP address and port of the transfer media server in the Transcendent VMS. Then enable
the auto report in the when adding a new device. Next, input the remaining Transcendent VMS
information of the device in the Transcendent VMS. After that, the system will auto allot a device ID.
Please check it in the Transcendent VMS.
3. Input the above-mentioned server address, server port and device ID in the responding boxes. Click
“Save” button to save the settings.
1.6.4 DDNS
If your camera is set to use PPPoE as its default network connection, DDNS should be set for network
access. Before you set the DDNS, please make sure you have registered a domain name on the DDNS
server.
1. Go to ConfigàNetwork DDNS.à
2. Apply for a domain name. Take www.dvrdyndns.com for example.
Input www.dvrdydns.com in the IE address bar to visit its website. Then click “Registration” button.
Transcendent IP Cameras v4: Operation Manual
31
Create domain name.
After you successfully request your domain name, you will see your domain in the list.
3. Input the username, password, domain you apply for in the DDNS configuration interface.
4. Click “Save” button to save the settings.
1.6.5 SNMP
To get camera status, parameters and alarm information and remotely manage the camera, you can set
the SNMP function. Before using the SNMP, please download the SNMP software and set the
parameters of the SNMP, such as SNMP port, trap address.
1. Go to ConfigàNetworkàSNMP.
Transcendent IP Cameras v4: Operation Manual
32
2. Check the corresponding version checkbox (Enable SNMPv1, Enable SNMPv2, Enable SNMPv3)
according to the version of the SNMP software you download.
3. Set the Read SNMP Community”, Write SNMP Community”, “Trap Address”, “Trap Portand
so on. Please make sure the settings are the same as that of your SNMP software.
Note: Please use the different version in accordance with the security level you required. The higher
the version is, the higher the level of the security is.
1.6.6 RTSP
Go to ConfigàNetworkàRTSP.
Transcendent IP Cameras v4: Operation Manual
33
1. Select “Enable”.
2. RTSP Port: Access port of the streaming media. The default number is 554.
3. RTSP Address: The RTSP address you need to input in the media player.
4. Check “ anonymous login…”.Allow
1.6.7 UPNP
If you enable this function, you can quickly access the camera via LAN and you don’t need to
configure the port mapping when the camera is connected to the WAN via the router.
Go to ConfigàNetworkàUPnP. Enable UPNP and then input UPnP name.
After you enable it and set the UPnP name, you will see the UPnP name by clicking “Network” on the
desktop of your computer which is in the same local area network. Then double click this name to
access the camera quickly.
1.6.8 Email
If you need to trigger Email when an alarm happens or IP address is changed, please set the Email here
first.
Go to ConfigàNetwork àEmail.
Transcendent IP Cameras v4: Operation Manual
34
Sender Address: Senders e-mail address.
User name and password: Senders user name and password.
Server Address : The SMTP IP address or host name.
Select the secure connection type at the Secure Connection -pull down list according to a . ctual needs
SMTP Port: The SMTP port.
Send Interval(S): Set it as needed.
Click “Test” button to test the effectiveness of the account.
Recipient ddress A : R - . eceivers e mail address
1.6.9 FTP
After you set the FTP server, the captured pictures on an alarm will be uploaded to the FTP server.
Go to ConfigàNetwork àFTP.


Specyfikacje produktu

Marka: Vitek
Kategoria: Niesklasyfikowane
Model: VTC-TNT4RFS

Potrzebujesz pomocy?

Jeśli potrzebujesz pomocy z Vitek VTC-TNT4RFS, zadaj pytanie poniżej, a inni użytkownicy Ci odpowiedzą




Instrukcje Niesklasyfikowane Vitek

Instrukcje Niesklasyfikowane

Najnowsze instrukcje dla Niesklasyfikowane

SmallRig

SmallRig VB99 SE Instrukcja

29 Stycznia 2025
QSC

QSC TSC-8 Instrukcja

29 Stycznia 2025
XTRARM

XTRARM XTR-FS5130 Instrukcja

29 Stycznia 2025
Sunding

Sunding SD-581G Instrukcja

29 Stycznia 2025
XTRARM

XTRARM XTR-FS5070 Instrukcja

29 Stycznia 2025
XTRARM

XTRARM XTR-FS2010 Instrukcja

29 Stycznia 2025
OSEE

OSEE TX402 Instrukcja

29 Stycznia 2025