UD31437B-B Network-Camera User-Manual G5-Web5.0 20240201
UD31437B-B Network-Camera User-Manual G5-Web5.0 20240201
User Manual
Network Camera User Manual
Legal Information
LEGAL DISCLAIMER
● TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS DOCUMENT AND THE
PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED "AS
IS" AND "WITH ALL FAULTS AND ERRORS". HIKVISION MAKES NO WARRANTIES, EXPRESS OR
i
Network Camera User Manual
ii
Network Camera User Manual
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicates a hazardous situation which, if not avoided, will or could
Danger result in death or serious injury.
iii
Network Camera User Manual
Safety Instruction
Please scan the following QR code to obtain the " Safety Instruction " of the product, and read it
carefully. These instructions are intended to ensure that user can use the product correctly to avoid
danger or property loss.
iv
Network Camera User Manual
Contents
Chapter 1 System Requirement .................................................................................................. 1
Chapter 2 Device Activation and Accessing ................................................................................. 2
2.1 Activate the Device via SADP ................................................................................................. 2
2.2 Activate the Device via Browser ............................................................................................. 2
2.3 Login ...................................................................................................................................... 3
2.3.1 Plug-in Installation ........................................................................................................ 3
2.3.2 Admin Password Recovery ............................................................................................ 4
2.3.3 Illegal Login Lock ........................................................................................................... 5
Chapter 3 Live View .................................................................................................................... 6
3.1 Live View Parameters ............................................................................................................. 6
3.1.1 Start and Stop Live View ............................................................................................... 6
3.1.2 Aspect Ratio .................................................................................................................. 6
3.1.3 Live View Stream Type .................................................................................................. 6
3.1.4 Select the Third-Party Plug-in ....................................................................................... 6
3.1.5 Light .............................................................................................................................. 7
3.1.6 Count Pixel .................................................................................................................... 7
3.1.7 Start Digital Zoom ......................................................................................................... 7
3.1.8 Auxiliary Focus .............................................................................................................. 7
3.1.9 Lens Initialization .......................................................................................................... 8
3.1.10 Lens Parameters Adjustment ...................................................................................... 8
3.1.11 Conduct 3D Positioning ............................................................................................... 9
3.2 Set Transmission Parameters ................................................................................................. 9
Chapter 4 Video and Audio ....................................................................................................... 11
4.1 Video Settings ...................................................................................................................... 11
4.1.1 Stream Type ................................................................................................................ 11
4.1.2 Video Type .................................................................................................................. 11
v
Network Camera User Manual
vi
Network Camera User Manual
vii
Network Camera User Manual
viii
Network Camera User Manual
ix
Network Camera User Manual
x
Network Camera User Manual
1
Network Camera User Manual
Note
Refer to the user manual of the software client for the detailed information about the client
software activation.
Caution
We highly recommend you create a strong password of your own choosing (using a minimum of
8 characters, including upper case letters, lower case letters, numbers, and special characters) in
order to increase the security of your product. And we recommend you reset your password
regularly, especially in the high security system, resetting the password monthly or weekly can
better protect your product.
5. Click OK.
Device Status changes into Active.
6. Optional: Change the network parameters of the device in Modify Network Parameters.
2
Network Camera User Manual
Note
The default IP address of the device is 192.168.1.64. You can set the IP address of the PC from
192.168.1.2 to 192.168.1.253 (except 192.168.1.64). For example, you can set the IP address of
the PC to 192.168.1.100.
3. Input 192.168.1.64 in the browser.
4. Set device activation password.
Caution
We highly recommend you create a strong password of your own choosing (using a minimum of
8 characters, including at least three of the following categories: upper case letters, lower case
letters, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your product.
5. Click OK.
6. Input the activation password to log in to the device.
7. Optional: Go to Configuration → Network → Network Settings → TCP/IP to change the IP
address of the device to the same segment of your network.
2.3 Login
Log in to the device via Web browser.
3
Network Camera User Manual
Note
The camera only supports Windows and Mac OS system and do not support Linux system.
Note
When you need to reset the password, make sure that the device and the PC are on the same
network segment.
Security Question
You can set the account security during the activation. Or you can go to Configuration → System →
User Management , click Account Security Settings, select the security question and input your
answer.
You can click Forget Password and answer the security question to reset the admin password when
access the device via browser.
Email
You can set the account security during the activation. Or you can go to Configuration → System →
User Management , click Account Security Settings, input your email address to receive the
verification code during the recovering operation process.
4
Network Camera User Manual
5
Network Camera User Manual
6
Network Camera User Manual
3.1.5 Light
Click to turn on or turn off the illuminator.
Caution
For the device with laser:
● DO NOT stare at operating light source. May be harmful to the eyes.
● If appropriate shielding or eye protection is not available, turn on the light only at a safe distance
protection.
7
Network Camera User Manual
Note
● If the device cannot focus with auxiliary focus, you can use Lens Initialization , then use auxiliary
focus again to make the image clear.
● If auxiliary focus cannot help the device focus clearly, you can use manual focus.
Note
● Supported PTZ functions may vary according to different camera models.
● For the devices which support lens movements only, the direction buttons are invalid.
Direction Control
Focus
● Click , then the lens focuses near and the nearby object gets clear.
● Click , then the lens focuses far and the distant object gets clear.
8
Network Camera User Manual
Iris
● When the image is too dark, click to enlarge the iris.
● When the image is too bright, click to stop down the iris.
PTZ Speed
● Slide to adjust the speed of the pan/tilt movement.
9
Network Camera User Manual
MULTICAST is suitable for the situation that there are multiple clients. You should set the
multicast address for them before selection.
Note
For detailed information about multicast, refer to Multicast .
HTTP
HTTP is suitable for the situation that the third-party needs to get the stream from the
device.
Playing Performance
Shortest Delay
The device takes the real-time video image as the priority over the video fluency.
Balanced
The device ensures both the real-time video image and the fluency.
Fluent
The device takes the video fluency as the priority over teal-time. In poor network
environment, the device cannot ensures video fluency even the fluency is enabled.
Custom
You can set the frame rate manually. In poor network environment, you can reduce the
frame rate to get a fluent live view. But the rule information may cannot display.
3. Click Save.
10
Network Camera User Manual
4.1.3 Resolution
Select video resolution according to actual needs. Higher resolution requires higher bandwidth and
storage.
11
Network Camera User Manual
Note
Available compression standards vary according to device models.
H.264
H.264, also known as MPEG-4 Part 10, Advanced Video Coding, is a compression standard. Without
compressing image quality, it increases compression ratio and reduces the size of video file than
MJPEG or MPEG-4 Part 2.
12
Network Camera User Manual
H.264+
H.264+ is an improved compression coding technology based on H.264. By enabling H.264+, you
can estimate the HDD consumption by its maximum average bitrate. Compared to H.264, H.264+
reduces storage by up to 50% with the same maximum bitrate in most scenes.
When H.264+ is enabled, Max. Average Bitrate is configurable. The device gives a recommended
max. average bitrate by default. You can adjust the parameter to a higher value if the video quality
is less satisfactory. Max. average bitrate should not be higher than max. bitrate.
Note
When H.264+ is enabled, I Frame Interval is not configurable.
H.265
H.265, also known as High Efficiency Video Coding (HEVC) and MPEG-H Part 2, is a compression
standard. In comparison to H.264, it offers better video compression at the same resolution, frame
rate and image quality.
H.265+
H.265+ is an improved compression coding technology based on H.265. By enabling H.265+, you
can estimate the HDD consumption by its maximum average bitrate. Compared to H.265, H.265+
reduces storage by up to 50% with the same maximum bitrate in most scenes.
When H.265+ is enabled, Max. Average Bitrate is configurable. The device gives a recommended
max. average bitrate by default. You can adjust the parameter to a higher value if the video quality
is less satisfactory. Max. average bitrate should not be higher than max. bitrate.
Note
When H.265+ is enabled, I Frame Interval is not configurable.
I-Frame Interval
I-frame interval defines the number of frames between 2 I-frames.
In H.264 and H.265, an I-frame, or intra frame, is a self-contained frame that can be independently
decoded without any reference to other images. An I-frame consumes more bits than other
frames. Thus, video with more I-frames, in other words, smaller I-frame interval, generates more
steady and reliable data bits while requiring more storage space.
13
Network Camera User Manual
SVC
Scalable Video Coding (SVC) is the name for the Annex G extension of the H.264 or H.265 video
compression standard.
The objective of the SVC standardization has been to enable the encoding of a high-quality video
bitstream that contains one or more subset bitstreams that can themselves be decoded with a
complexity and reconstruction quality similar to that achieved using the existing H.264 or H.265
design with the same quantity of data as in the subset bitstream. The subset bitstream is derived
by dropping packets from the larger bitstream.
SVC enables forward compatibility for older hardware: the same bitstream can be consumed by
basic hardware which can only decode a low-resolution subset, while more advanced hardware
will be able decode high quality video stream.
MPEG4
MPEG4, referring to MPEG-4 Part 2, is a video compression format developed by Moving Picture
Experts Group (MPEG).
MJPEG
Motion JPEG (M-JPEG or MJPEG) is a video compression format in which intraframe coding
technology is used. Images in a MJPEG format is compressed as individual JPEG images.
Profile
This function means that under the same bitrate, the more complex the profile is, the higher the
quality of the image is, and the requirement for network bandwidth is also higher.
4.1.8 Smoothing
It refers to the smoothness of the stream. The higher value of the smoothing is, the better fluency
of the stream will be, though, the video quality may not be so satisfactory. The lower value of the
smoothing is, the higher quality of the stream will be, though it may appear not fluent.
14
Network Camera User Manual
Note
Only certain camera models support the function.
Note
● Connect the audio input device as required.
● The audio input display varies with the device models.
LineIn Set Audio Input to LineIn when the device connects to the audio
input device with the high output power, such as MP3,
synthesizer or active pickup.
MicIn Set Audio Input to MicIn when the device connects to the audio
input device with the low output power, such as microphone or
passive pickup.
Note
Connect the audio output device as required.
It is a switch of the device audio output. When it is disabled, all the device audio cannot output.
The audio output display varies with the device modes.
15
Network Camera User Manual
connected to the device is working properly. Refer to specifications of audio input and output
devices for device connection.
● If the device has built-in microphone and speaker, two-way audio function can be enabled
directly.
Steps
1. Click Live View.
2. Click on the toolbar to enable two-way audio function of the camera.
3. Click , disable the two-way audio function.
4.4 ROI
ROI (Region of Interest) encoding helps to discriminate the ROI and background information in
video compression. The technology assigns more encoding resource to the region of interest, thus
to increase the quality of the ROI whereas the background information is less focused.
Note
Select the fixed region that needs to be adjusted and drag the mouse to adjust its position.
5. Input the Area Name and ROI Level.
6. Click Save.
Note
The higher the ROI level is, the clearer the image of the detected region is.
7. Optional: Select other region No. and repeat the above steps if you need to draw multiple fixed
regions.
16
Network Camera User Manual
Note
After enabling target cropping, the third stream resolution cannot be configured.
3. Select a Cropping Resolution.
A red frame appears in the live view.
4. Drag the frame to the target area.
5. Click Save.
Note
● Only certain models support target cropping and the function varies according to different
camera models.
● Some functions may be disabled after enabling target cropping.
17
Network Camera User Manual
Image Adjustment
By adjusting the Brightness, Saturation, Contrast and Sharpness, the image can be best displayed.
Exposure Settings
Exposure is controlled by the combination of iris, shutter, and photo sensibility. You can adjust
image effect by setting exposure parameters.
In manual mode, you need to set Exposure Time, Gain and Slow Shutter.
Focus
It offers options to adjust the focus mode.
Focus Mode
Auto
The device focuses automatically as the scene changes. If you cannot get a well-focused
image under auto mode, reduce light sources in the image and avoid flashing lights.
Semi-auto
The device focuses once after the PTZ and lens zooming. If the image is clear, the focus does
not change when the scene changes.
Manual
You can adjust the focus manually on the live view page.
Day/Night Switch
Day/Night Switch function can provide color images and black/white images in day and night
mode. Switch mode is configurable.
Day
The image is always in color.
Night
The image is black/white or colorful and the supplement light will be enabled to ensure clear
live view image at night.
18
Network Camera User Manual
Note
Only certain device models support the supplement light and colorful image.
Auto
The camera switches between the day mode and the night mode according to the light
condition of environment.
Scheduled-Switch
Set the Start Time and the End Time to define the duration for day mode.
Triggered by alarm input
You can set Triggering Status as Day or Night. For example, if the Triggering Status is Night, the
mode turns into Night when the device receives alarm input signal.
Triggered by video
The camera switches between the day mode and the night mode according to the light
condition of environment. This mode is applicable when the device supports road traffic and
vehicle detection.
Note
● Day/Night Switch function varies according to models.
● You can turn on the smart supplement light for better image effect. For supplement light
settings, refer to Supplement Light Settings .
19
Network Camera User Manual
When you select this mode after enabling certain smart events or motion detection, in the
night state, the default supplement light mode is IR supplement light mode. When the alarm
is triggered, the white light is enabled and the device captures the target. After the alarm
ends, the supplement light mode will switch to IR supplement light mode.
Only device models with IR and white light or hybrid supplement light with IR and white light
support this function.
Off
Supplement light is disabled.
Note
The supplement light mode may vary according to different device models.
Brightness Adjustment Mode
Auto
The brightness adjusts according to the actual environment automatically.
Manual
You can drag the slider or set value to adjust the brightness.
BLC
If you focus on an object against strong backlight, the object will be too dark to be seen clearly. BLC
(backlight compensation) compensates light to the object in the front to make it clear. If BLC mode
is set as Custom, you can draw a red rectangle on the live view image as the BLC area.
WDR
The WDR (Wide Dynamic Range) function helps the camera provide clear images in environment
with strong illumination differences.
When there are both very bright and very dark areas simultaneously in the field of view, you can
enable the WDR function and set the level. WDR automatically balances the brightness level of the
whole image and provides clear images with more details.
Note
When WDR is enabled, some other functions may be not supported. Refer to the actual interface
for details.
20
Network Camera User Manual
HLC
When the bright area of the image is over-exposed and the dark area is under-exposed, the HLC
(High Light Compression) function can be enabled to weaken the bright area and brighten the dark
area, so as to achieve the light balance of the overall picture.
White Balance
White balance is the white rendition function of the camera. It is used to adjust the color
temperature according to the environment.
DNR
Digital Noise Reduction is used to reduce the image noise and improve the image quality. Normal
and Expert modes are selectable.
Normal
Set the DNR level to control the noise reduction degree. The higher level means stronger
reduction degree.
21
Network Camera User Manual
Expert
Set the DNR level for both space DNR and time DNR to control the noise reduction degree. The
higher level means stronger reduction degree.
Defog
You can enable the defog function when the environment is foggy and the image is misty. It
enhances the subtle details so that the image appears clearer.
EIS
Increase the stability of video image by using jitter compensation technology.
22
Network Camera User Manual
Gray Scale
You can choose the range of the Gray Scale as [0-255] or [16-235].
Mirror
When the live view image is the reverse of the actual scene, this function helps to display the
image normally.
Select the mirror mode as needed.
Note
The video recording will be shortly interrupted when the function is enabled.
Rotate
When this function is enabled, the live view will rotate 90° counterclockwise. For example, 1280 ×
720 is rotated to 720 × 1280.
Enabling this function can change the effective range of monitoring in the vertical direction.
Note
This function is supported under certain settings.
Note
● This function is only supported by certain device equipped with motorized lens.
● The edge of image will be lost if this function is enabled.
23
Network Camera User Manual
Set Scheduled-switch
Switch the image to the linked scene mode automatically in certain time periods.
Steps
1. Check Scheduled-switch.
2. Select and configure the corresponding time period and linked scene mode.
Note
For Linked Scene configuration, refer to Scene Mode .
3. Click Save.
4.8 OSD
You can customize OSD (On-screen Display) information such as device name, time/date, font,
color, and text overlay displayed on video stream.
Go to OSD setting page: Configuration → Image → OSD Settings . Set the corresponding
parameters, and click Save to take effect.
Character Set
Select character set for displayed information. If Korean is required to be displayed on screen,
select EUC-KR. Otherwise, select GBK.
Display
Set camera name, date, week, and their related display formats.
24
Network Camera User Manual
Format Settings
Set OSD parameters, such as Display Mode, OSD Size, Font Color, and Alignment.
Text Overlay
Set customized overlay text on image.
25
Network Camera User Manual
Note
If an Unlock button appears, you need to unlock the memory card first. See Detect Memory
Card Status for details.
3. Click Format to initialize the memory card.
When the Status of memory card turns from Uninitialized to Normal, the memory card is ready
for use.
4. Optional: Encrypt the memory card.
1) Click Encrypted Format.
2) Set the encryption password.
3) Click OK.
When the Encryption Status turns to Encrypted, the memory card is ready for use.
Note
Keep your encryption password properly. Encryption password cannot be found if forgotten.
5. Optional: Define the Quota of the memory card. Input the percentage for storing different
contents according to your needs.
26
Network Camera User Manual
6. Click Save.
Steps
1. Go to Configuration → Storage → Storage Management → HDD Management .
2. Select the memory card.
Note
If an Unlock button appears, you need to unlock the memory card first. See Detect Memory
Card Status for details.
3. Verify the encryption password.
1) Click Parity.
2) Enter the encryption password.
3) Click OK.
When the Encryption Status turns to Encrypted, the memory card is ready for use.
Note
If the encryption password is forgotten and you still want to use this memory card, see Set New
or Unencrypted Memory Card to format and set the memory card. All existing contents will be
removed.
4. Optional: Define the Quota of the memory card. Input the percentage for storing different
contents according to your needs.
5. Click Save.
27
Network Camera User Manual
It shows the percentage of the remaining lifespan. The lifespan of a memory card may be
influenced by factors such as its capacity and the bitrate. You need to change the memory
card if the remaining lifespan is not enough.
Health Status
It shows the condition of your memory card. You will receive a notification if the health status
is anything other than good when the Arming Schedule and Linkage Method are set.
Note
It is recommended that you change the memory card when the health status is not "good".
3. Click R/W Lock to set the permission of reading and writing to the memory card.
- Add a Lock
a. Select the Lock Switch as ON.
b. Enter the password.
c. Click Save
- Unlock
● If you use the memory card on the device that locks it, unlocking will be done automatically
Management to unlock the memory card manually. Select the memory card, and click
Unlock. Enter the correct password to unlock it.
- Remove the Lock
a. Select the Lock Switch as OFF.
b. Enter the password in Password Settings.
c. Click Save.
Note
● Only admin user can set the R/W Lock.
● The memory card can only be read and written when it is unlocked.
● If the device, which adds a lock to a memory card, is restored to the factory settings, you can
28
Network Camera User Manual
Steps
1. Go to Configuration → Event → Alarm Setting → FTP .
2. Configure FTP settings.
Server Address and Port
The FTP server address and corresponding port.
User Name and Password
The FTP user should have the permission to upload pictures.
If the FTP server supports picture uploading by anonymous users, you can check Anonymous
to hide your device information during uploading.
Directory Structure
The saving path of snapshots in the FTP server.
3. Optional: Check Upload Picture to enable uploading snapshots to the FTP server.
Picture Filing Interval
For better picture management, you can set the picture filing interval from 1 day to 30 days.
Pictures captured in the same time interval will be saved in one folder named after the
beginning date and ending date of the time interval.
Picture Name
Set the naming rule for captured pictures. You can choose Default in the drop-down list to
use the default rule, that is, IP address_channel number_capture time_event type.jpg (e.g.,
10.11.37.189_01_20150917094425492_FACE_DETECTION.jpg). Or you can customize it by
adding a Custom Prefix to the default naming rule.
4. Optional: Check Enable Automatic Network Replenishment.
Note
Upload to FTP/Memory Card/NAS in Linkage Method and Enable Automatic Network
Replenishment should be both enabled simultaneously.
5. Click Test to verify the FTP server.
6. Click Save.
29
Network Camera User Manual
Mounting Type
Select file system protocol according to the operation system.
Enter user name and password of the net HDD to guarantee the security if SMB/CIFS is
selected.
4. Set the Server Address and File Path for the disk.
Server Address
The IP address of the network disk.
File Path
The saving path of network disk files.
5. Click Test to check whether the network disk is available.
6. Click OK to finish the steps to add a Net HDD.
7. Optional: Configure the Net HDD.
Edit Click to edit the parameter setting.
Delete Delete the Net HDD.
● Click .
● Select the Net HDD, click Delete.
8. Click Save.
Note
The eMMC protection is only supported by certain device models with an eMMC hardware.
30
Network Camera User Manual
Steps
Caution
If the cloud storage is enabled, the pictures are stored in the cloud video manager firstly.
1. Go to Configuration → Storage → Storage Management → Cloud Storage .
2. Check Enable.
3. Set basic parameters.
Protocol Version The protocol version of the cloud video manager.
Server IP The IP address of the cloud video manager. It supports IPv4 address.
Serve Port The port of the cloud video manager. You are recommended to use the
default port.
AccessKey The key to log in to the cloud video manager.
SecretKey The key to encrypt the data stored in the cloud video manager.
User Name and The user name and password of the cloud video manager.
Password
Picture Storage The ID of the picture storage region in the cloud video manager. Make
Pool ID sure storage pool ID and the storage region ID are the same.
4. Click Test to test the configured settings.
5. Click Save.
31
Network Camera User Manual
Note
The record type is vary according to different models.
Continuous
The video will be recorded continuously according to the schedule.
Motion
When motion detection is enabled and trigger recording is selected as linkage method, object
movement is recorded.
Alarm
When alarm input is enabled and trigger recording is selected as linkage method, the video is
recorded after receiving alarm signal from external alarm input device.
Motion | Alarm
Video is recorded when motion is detected or alarm signal is received from the external
alarm input device.
Motion & Alarm
Video is recorded only when motion is detected and alarm signal is received from the
external alarm input device.
Event
The video is recorded when configured event is detected.
4. Set schedule for the selected record type. Refer to Set Arming Schedule for the setting
operation.
5. Set the advanced recording parameters.
Overwrite
Enable Overwrite to overwrite the video records when the storage space is full. Otherwise
the camera cannot record new videos.
Pre-record
The time period you set to record before the scheduled time.
Post-record
The time period you set to stop recording after the scheduled time.
Stream Type
Select the stream type for recording.
Note
When you select the stream type with higher bitrate, the actual time of the pre-record and
post-record may be less than the set value.
Recording Expiration
32
Network Camera User Manual
The recordings are deleted when they exceed the expired time. The expired time is
configurable. Note that once the recordings are deleted, they can not be recovered.
6. Click Save.
Note
Go to Configuration → Local → Clip Saving Path , view and change the saving path of clipped
video files.
5. Optional: Click on the playback interface to download files.
Note
Go to Configuration → Local → Downloaded File Saving Path , view and change the saving path
of downloaded video files.
33
Network Camera User Manual
Note
The resolution of the captured picture is the same as the resolution of the captured picture
stream. You can select Stream Type in Advanced.
5. Click Save.
34
Network Camera User Manual
Note
Go to Configuration → Local → Save snapshots when playback to , view and change the saving
path of captured pictures when playback.
35
Network Camera User Manual
36
Network Camera User Manual
The system switches day/night mode according to the schedule. It switches to day mode
during the set periods and switches to night mode during the other periods.
Sensitivity
The higher the value of sensitivity is, the more sensitive the motion detection is. If scheduled
image settings is enabled, the sensitivity of day and night can be set separately.
3. Select an Area and click . Click and drag the mouse on the live image and then release the
mouse to finish drawing one area.
37
Network Camera User Manual
Note
This function is only available for certain device models under certain settings. Please refer to
the actual settings.
4. Click . Click and drag the mouse on the live image, and then right click the mouse to finish
drawing one area.
5. Optional: Click to clear all the areas.
6. Optional: You can set the parameters of multiple areas by repeating the above steps.
38
Network Camera User Manual
Note
This function is only supported by certain models.
Make sure the external alarm device is connected. See Quick Start Guide for cable connection.
39
Network Camera User Manual
Steps
1. Go to Configuration → Event → Event and Detection → Alarm Input .
2. Select an Alarm Input NO. and click to set alarm input.
3. Select Alarm Type from the dropdown list. Edit the Alarm Name.
4. Check Enable Alarm Input Handling.
5. Refer to Set Arming Schedule for setting scheduled time. Refer to Linkage Method Settings for
setting linkage method.
6. Click Copy to... to copy the settings to other alarm input channels.
7. Click Save.
40
Network Camera User Manual
Note
The function is only supported by certain models. The actual display varies with models.
Note
● The lower the sensitivity is, the more significant the change should be to trigger the
detection.
● The sound intensity threshold refers to the sound intensity reference for the detection. It is
recommended to set as the average sound intensity in the environment. The louder the
environment sound, the higher the value should be. You can adjust it according to the real
environment.
41
Network Camera User Manual
Note
The function is only supported by certain models. The actual function varies according to
different models.
Note
The function is only supported by certain models. The actual display varies with models.
Note
The function is only supported by certain models. The actual display varies with models.
42
Network Camera User Manual
Note
● Each cell represents 30 minutes.
● Move the mouse over the drawn time period to see specific time periods and fine-tune the
4. Click Erase, and drag the time bar to clear selected valid time.
5. Click OK to save the settings.
43
Network Camera User Manual
Manual Alarm
You can trigger an alarm output manually.
Before You Start
Make sure the alarm output device is connected to the device.
Steps
1. Select the Alarm Output No. according to the alarm interface connected to the external alarm
device. Click to set alarm parameters.
Alarm Name
Custom a name for the alarm output.
2. Click Manual Alarm to enable manual alarm output.
3. Optional: Click Clear Alarm to disable manual alarm output.
Automatic Alarm
Set the automatic alarm parameters, then the device triggers an alarm output automatically in the
set arming schedule.
Before You Start
Make sure the alarm output device is connected to the device.
Steps
1. Select the Alarm Output No. according to the alarm interface connected to the external alarm
device. Click to set alarm parameters.
Alarm Name
Custom a name for the alarm output.
Delay
It refers to the time duration that the alarm output remains after an alarm occurs.
44
Network Camera User Manual
2. Set the alarming schedule. For the information about the settings, see Set Arming Schedule .
3. Optional: Click Copy to… to copy the parameters to other alarm output channels.
4. Click Save.
Set Email
When the email is configured and Send Email is enabled as a linkage method, the device sends an
email notification to all designated recipients if an alarm event is detected.
Before You Start
Set the DNS server before using the Email function. Go to Configuration → Network → Network
Settings → TCP/IP for DNS settings.
Steps
1. Go to email settings page: Configuration → Event → Alarm Setting → Email .
2. Set email parameters.
1) Input the sender's email information, including the Sender's Address, SMTP Server, and
SMTP Port.
2) Optional: If your email server requires authentication, check Authentication and input your
user name and password to log in to the server.
3) Set the E-mail Encryption.
● When you select TLS, and disable STARTTLS, emails are sent after encrypted by TLS. The
45
Network Camera User Manual
Note
If you want to use STARTTLS, make sure that the protocol is supported by your email server.
If you check the Enable STARTTLS while the protocol is not supported by your email sever,
your email is sent with no encryption.
4) Optional: If you want to receive notification with alarm pictures, check Attached Picture. The
notification email has a certain number of attached alarm pictures about the event with
configurable image capturing interval.
Note
The number of alarm pictures may vary according to different device models and different
events.
5) Input the recipient's information, including the recipient's name and address.
6) Click Test to see if the function is well configured.
3. Click Save.
Note
The function is only supported by certain camera models.
46
Network Camera User Manual
Note
The function is only supported by certain device models.
Note
HTTP, HTTPS, and ISUP are selectable. It is recommended to use HTTPS, as it encrypts the data
transmission during communication.
4. Click Test to check if the IP or host is available.
5. Click Save.
47
Network Camera User Manual
8.1 TCP/IP
TCP/IP settings must be properly configured before you operate the device over network. IPv4 and
IPv6 are both supported. Both versions can be configured simultaneously without conflicting to
each other.
Go to Configuration → Network → Network Settings → TCP/IP for parameter settings.
NIC Type
Select a NIC (Network Interface Card) type according to your network condition.
IPv4
Two IPv4 modes are available.
DHCP
The device automatically gets the IPv4 parameters from the network if you check DHCP. The
device IP address is changed after enabling the function. You can use SADP to get the device IP
address.
Note
The network that the device is connected to should support DHCP (Dynamic Host
Configuration Protocol).
Manual
You can set the device IPv4 parameters manually. Input IPv4 Address, IPv4 Subnet Mask, and
IPv4 Default Gateway, and click Test to see if the IP address is available.
IPv6
Three IPv6 modes are available.
Route Advertisement
The IPv6 address is generated by combining the route advertisement and the device Mac
address.
Note
Route advertisement mode requires the support from the router that the device is connected
to.
DHCP
The IPv6 address is assigned by the server, router, or gateway.
Manual
48
Network Camera User Manual
Input IPv6 Address, IPv6 Subnet, IPv6 Default Gateway. Consult the network administrator for
required information.
MTU
It stands for maximum transmission unit. It is the size of the largest protocol data unit that can
be communicated in a single network layer transaction.
The valid value range of MTU is 1280 to 1500.
DNS
It stands for domain name server. It is required if you need to visit the device with domain
name. And it is also required for some applications (e.g., sending email). Set Preferred DNS
Server and Alternate DNS server properly if needed.
Domain Name Settings
Check Enable Dynamic Domain Name and input Register Domain Name. The device is
registered under the register domain name for easier management within the local area
network.
Note
DHCP should be enabled for the dynamic domain name to take effect.
49
Network Camera User Manual
By Client Software Add domain name to the client software. Refer to the client manual for
specific adding methods.
Note
The obtained IP address is dynamically assigned via PPPoE, so the IP address always changes
after rebooting the camera. To solve the inconvenience of the dynamic IP, you need to get a
domain name from the DDNS provider (e.g. DynDns.com). Refer to Access to Device via Domain
Name for detail information.
8.4 SNMP
You can set the SNMP (Simple Network Management Protocol) to get device information in
network management.
50
Network Camera User Manual
Note
The SNMP version you select should be the same as that of the SNMP software.
And you also need to use the different version according to the security level required. SNMP v1
is not secure and SNMP v2 requires password for access. And SNMP v3 provides encryption and
if you use the third version, HTTPS protocol must be enabled.
3. Configure the SNMP settings.
4. Click Save.
Note
● If you set the Protocol to EAP-TLS, select the Client Certificate and CA Certificate.
● If the function is abnormal, check if the selected certificate is abnormal in Certificate
Management.
Note
QoS needs support from network device such as router and switch.
Steps
1. Go to Configuration → Network → Network Settings → QoS .
2. Set Video/Audio DSCP, Event/Alarm DSCP and Management DSCP.
51
Network Camera User Manual
Note
Network can identify the priority of data transmission. The bigger the DSCP value is, the higher
the priority is. You need to set the same value in router while configuration.
3. Click Save.
8.7 HTTP(S)
HTTP is an application-layer protocol for transmitting hypermedia documents. HTTPS is a network
protocol that enables encrypted transmission and identity authentication, which improves the
security of remote access.
Steps
1. Go to Configuration → Network → Network Service → HTTP(S) .
2. Enter HTTP Port.
Note
It refers to the port through which the browser accesses the device. For example, when the
HTTP Port is modified to 81, you need to enter http://192.168.1.64:81 in the browser for login.
3. Check Enable in HTTPS.
Note
You can click TLS Settings to set the TLS version that the device supports. Refer to for details.
4. Enter HTTPS Port.
5. Optional: Check HTTPS Browsing to access the device only via HTTPS protocol.
6. Select Server Certificate.
7. Set Web Authentication.
Authentication
Digest and digest/basic are supported, which means authentication information is needed
when WEB request is sent to the device. If you select digest/basic, it means the device
supports digest or basic authentication. If you select digest, the device only supports digest
authentication.
Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in WEB authentication. If you enable
the digest algorithm except for MD5, the third-party platform might not be able to log in to
the device or enable live view because of compatibility. The encrypted algorithm with high
strength is recommended.
8. Click Save.
52
Network Camera User Manual
8.8 Multicast
Multicast is group communication where data transmission is addressed to a group of destination
devices simultaneously.
Go to Configuration → Network → Network Service → Multicast for the multicast settings.
IP Address
It stands for the address of multicast host.
8.9 RTSP
RTSP (Real Time Streaming Protocol) is an application-layer controlling protocol for streaming
media.
Steps
1. Go to Configuration → Network → Network Service → RTSP .
2. Enter Port.
3. Set Multicast parameters.
Stream Type
The stream type as the multicast source.
Video Port
The video port of the selected stream.
Audio Port
The audio port of the selected stream.
4. Set RTSP Authentication.
Authentication
Digest and digest/basic are supported, which means authentication information is needed
when RTSP request is sent to the device. If you select digest/basic, it means the device
supports digest or basic authentication. If you select digest, the device only supports digest
authentication.
Digest Algorithm
MD5, SHA256 and MD5/SHA256 encrypted algorithm in RTSP authentication. If you enable
the digest algorithm except for MD5, the third-party platform might not be able to log in to
53
Network Camera User Manual
the device or enable live view because of compatibility. The encrypted algorithm with high
strength is recommended.
5. Click Save.
Note
● Only certain device models support this function.
● If the function is abnormal, check if the selected certificate is abnormal in Certificate
Management .
8.11 Bonjour
It is an implementation of zero-configuration networking (zeroconf), a group of technologies that
includes service discovery, address assignment, and hostname resolution. Bonjour locates devices
such as printers, other computers, and the services that those devices offer on a local network
using multicast Domain Name System (mDNS) service records.
Go to Configuration → Network → Network Service → Bonjour to enable the function, and click
Save.
After enabling the function, the device spread and receive service information in local area
network.
54
Network Camera User Manual
8.12 WebSocket(s)
WebSocket or WebSockets protocol should be enabled if you use Google Chrome 57 and its above
version or Mozilla Firefox 52 and its above version to visit the device. Otherwise, live view, image
capture, digital zoom, etc. cannot be used.
Go to Configuration → Network → Network Service → WebSocket(s) to set parameters, and click
Save.
WebSocket
TCP-based full-duplex communication protocol port for plug-in free preview via HTTP protocol.
WebSockets
TCP-based full-duplex communication protocol port for plug-in free preview via HTTPS protocol.
Note
UPnP™ function on the router should be enabled at the same time.
55
Network Camera User Manual
2. Select the port mapping mode to Manual, and set the external port to be the same as the
internal port.
3. Click Save.
What to do next
Go to the router port mapping settings interface and set the port number and IP address to be the
same as those on the device. For more information, refer to the router user manual.
56
Network Camera User Manual
Note
The port of the network camera cannot conflict with other ports. For example, some web
management port of the router is 80. Change the camera port if it is the same as the management
port.
Note
If errors like "Unknown app" occur during the installation, solve the problem in two ways.
57
Network Camera User Manual
Note
The verification code is required when you add the camera to Hik-Connect service.
6. Save the settings.
Steps
1. Run SADP software.
58
Network Camera User Manual
Note
The verification code is required when you add the camera to Hik-Connect service.
5. Click and read "Terms of Service" and "Privacy Policy".
6. Confirm the settings.
Note
If errors like "Unknown app" occur during the installation, solve the problem in two ways.
● Visit https://appstore.hikvision.com/static/help/index.html to refer to the troubleshooting.
● Visit https://appstore.hikvision.com/ , and click Installation Help at the upper right corner of
59
Network Camera User Manual
Note
If the QR code is missing or too blur to be recognized, you can also add the camera by inputting
the camera's serial number.
5. Input the verification code of your camera.
Note
● The required verification code is the code you create or change when you enable Hik-Connect
Note
The router should be the same one which your mobile phone has connected to.
8. Tap Add in the next interface to finish adding.
For detailed information, refer to the user manual of the Hik-Connect app.
60
Network Camera User Manual
61
Network Camera User Manual
62
Network Camera User Manual
3. Click NTP.
4. Set Server Address, NTP Port and Interval.
Note
Server Address is NTP server IP address.
5. Click Test to test server connection.
6. Click Save.
Note
This function varies depending on different devices.
Steps
1. Enter Configuration → System → System Settings → Time Settings .
2. Select Satellite Time Sync..
3. Set Interval.
4. Click Save.
Set DST
If the region where the device is located adopts Daylight Saving Time (DST), you can set this
function.
Steps
1. Go to Configuration → System → System Settings → Time Settings .
2. Check Enable.
3. Select Start Time, End Time and DST Bias.
4. Click Save.
63
Network Camera User Manual
Note
You should keep the parameters of the device and the computer or terminal all the same.
3. Click Save.
Note
This function may vary according to different device models.
64
Network Camera User Manual
Caution
To increase security of using the device on the network, please change the password of your
account regularly. Changing the password every 3 months is recommended. If the device is used in
high-risk environment, it is recommended that the password should be changed every month or
week.
Steps
1. Go to Configuration → System → User Management → User Management .
2. Click Add. Enter User Name, select Level, and enter Password. Assign remote permission to
users based on needs.
Administrator
The administrator has the authority to all operations and can add users and operators and
assign permission.
User
Users can be assigned permission of viewing live video, setting PTZ parameters, and changing
their own passwords, but no permission for other operations.
Operator
Operators can be assigned all permission except for operations on the administrator and
creating accounts.
Modify Select a user and click to change the password and permission.
Delete Select a user and click .
Note
The administrator can add up to 31 user accounts.
3. Click OK.
65
Network Camera User Manual
9.3 Maintenance
9.3.1 Restart
You can restart the device via browser.
Go to Maintenance and Security → Maintenance → Restart , and click Restart.
9.3.2 Upgrade
Before You Start
You need to obtain the correct upgrade package.
Caution
DO NOT disconnect power during the process, and the device restarts automatically after upgrade.
Steps
1. Go to Maintenance and Security → Maintenance → Upgrade .
2. Choose one method to upgrade.
Firmware Locate the exact path of the upgrade file.
Firmware Directory Locate the directory which the upgrade file belongs to.
3. Click to select the upgrade file.
4. Click Upgrade.
66
Network Camera User Manual
Note
Be careful when using this function. After resetting to the factory default, all the
parameters are reset to the default settings.
67
Network Camera User Manual
Note
This function is only supported by certain camera models.
1. Go to Maintenance and Security → Maintenance → Security Audit Log .
2. Select log types, Start Time, and End Time.
3. Click Search.
The log files that match the search conditions will be displayed on the Log List.
4. Optional: Click Export to save the log files to your computer.
9.3.7 SSH
Secure Shell (SSH) is a cryptographic network protocol for operating network services over an
unsecured network.
Go to Maintenance and Security → Maintenance → Device Debugging , and click Settings of SSH.
You can edit the number of the port. Click Save.
Caution
Use the function with caution. The security risk of device internal information leakage exists when
the function is enabled.
9.4 Security
You can improve system security by setting security parameters.
68
Network Camera User Manual
69
Network Camera User Manual
Note
The function is only supported by certain device models.
Note
The device has default self-signed server/client certificate installed. The certificate ID is default.
Note
The input certificate ID cannot be the same as the existing ones.
4. Click Save to save and install the certificate.
The created certificate is displayed in the Server/Client Certificate list.
If the certificate is used by certain functions, the function name is shown in the column
Functions.
5. Optional: Click Property to see the certificate details.
70
Network Camera User Manual
Note
The input certificate ID cannot be the same as the existed ones.
3) Click to select the certificate file.
4) Select Self-signed Request Certificate.
5) Click Save.
The imported certificate is displayed in the Server/Client Certificate list.
If the certificate is used by certain function, the function name is shown in the column
Functions.
9. Optional: Click Property see the certificate details.
71
Network Camera User Manual
Note
The input certificate ID cannot be the same as the existed ones.
4. Click to select the certificate file.
5. Select Certificate and Key and select a Key Type according to your certificate.
Independent Key If your certificate has an independent key, select this option.
Browse to select the private key and input the private-key password.
PKCS#12 If your certificate has the key in the same certificate file, select this option
and input the password.
6. Click Save.
The imported certificate is displayed in the Server/Client Certificate list.
If the certificate is used by certain function, the function name is shown in the column
Functions.
Install CA Certificate
Before You Start
Prepare a CA certificate in advance.
Steps
1. Go to Maintenance and Security → Security → Certificate Management .
2. Click Import in the CA Certificate list.
3. Input Certificate ID.
Note
The input certificate ID cannot be the same as the existing ones.
4. Click to select the certificate file.
5. Click Save.
The imported certificate is displayed in the CA Certificate list.
If the certificate is used by certain functions, the function name is shown in the Functions
column.
72
Network Camera User Manual
Note
● If you set the reminding day before expiration to 1, then the camera will remind you the day
before the expiration day. 1 to 30 days are available. Seven days is the default reminding days.
● If you set the reminding day before expiration to 1, and the detection time to 10:00, and the
certificate will expire in 9:00 the next day, the camera will remind you in 10:00 the first day.
3. Click Save.
9.4.5 TLS
The Transport Layer Security (TLS) protocol aims primarily to provide privacy and data integrity
between two or more communicating computer applications. TLS settings are effective for HTTP(S)
and enhanced SDK service.
Go to Maintenance and Security → Security → TLS , and enable the desired TLS protocol. Click
Save.
Caution
Use the function with caution. The security risk of device internal information leakage exists when
the function is enabled.
73
Network Camera User Manual
Note
Before installing the application, make sure that the application you want to install fits the
following conditions.
● Each application has its own exclusive name.
● The FLASH memory space that the application takes up is less than the available FLASH
74
Network Camera User Manual
Camera Info.
For camera information settings, refer to Set Camera Info .
FTP
For FTP settings, refer to Set FTP .
Email
For Email settings, refer to Set Email .
Alarm Output
For alarm output settings, refer to Automatic Alarm .
Audible Alarm Output
For audible alarm output settings, refer to Set Audible Alarm Output .
Alarm Server
For alarm server settings, refer to Alarm Server .
Metadata
For metadata settings, refer to Metadata .
10.2.2 Metadata
Metadata is the raw data that the device collects before algorithm processing. It is often used for
the third party integration.
Go to VCA → Set Application → General Settings → metadata Settings to enable metadata
uploading of the desired function.
Note
This function may vary according to different camera models.
Smart Event
The metadata of the smart event includes the target ID, target coordinate, time, etc.
Face Capture
75
Network Camera User Manual
The metadata of face capture includes the rule information, target ID, target coordinate, time
information, etc. The camera detects the whole image by default. If the area is configured in the
face capture settings, the camera detects the configured area.
Note
● For certain device models, you need to enable the smart event function on VCA page first to
show the function configuration page.
● The function varies according to different models.
● For the device supporting HEOP, go to VCA to import and enable Smart Event.
Steps
1. Go to VCA → Set Application → Smart Event → Intrusion Detection .
2. Check Enable.
3. Click Add to add a rule and set a detection area.
1) Draw a detection area. Click , click on the live view to specify the vertexes and draw the
boundaries of the detection area, and right click to complete drawing.
2) Set the minimum size and the maximum size for the target to improve detection accuracy.
Only targets whose size are between the maximum size and the minimum size trigger the
detection. Click and , then drag the mouse in the live view to draw the minimum and
maximum target size.
3) Optional: Click to delete all the setting areas.
4. Set parameters.
Detection Target
This function allows alarm triggering by specified selected target types. If the detection target
is not selected, all the detected targets will be reported.
Note
This function is only available for certain device models under certain settings. Please refer to
the actual settings.
Threshold
76
Network Camera User Manual
Threshold stands for the threshold for the time of the object loitering in the region. If the
time that one object stays exceeds the threshold, the alarm is triggered. The larger the value
of the threshold is, the longer the alarm triggering time is.
Sensitivity
Sensitivity stands for the percentage of the body part of an acceptable target that enters the
predefined region. Sensitivity = 100 - S1/ST × 100. S1 stands for the target body part that goes
across the predefined region. ST stands for the complete target body. The higher the value of
sensitivity is, the more easily the alarm can be triggered.
Target Validity
If you set a higher validity, the required target features should be more obvious, and the
alarm accuracy would be higher. The target with less obvious features would be missed.
● For the device supporting HEOP, go to VCA to import and enable Smart Event.
Steps
1. Go to VCA → Set Application → Smart Event → Line Crossing Detection .
2. Check Enable.
3. Click Add to add a rule and set a detection area.
77
Network Camera User Manual
1) Draw a detection line. Click and a line with an arrow appears in the live view. Drag the line
to the location on the live view as desired.
2) Set the minimum size and the maximum size for the target to improve detection accuracy.
Only targets whose size are between the maximum size and the minimum size trigger the
detection. Click and , then drag the mouse in the live view to draw the minimum and
maximum target size.
3) Optional: Click to delete all the setting areas.
4. Set parameters.
Detection Target
This function allows alarm triggering by specified selected target types. If the detection target
is not selected, all the detected targets will be reported.
Note
This function is only available for certain device models under certain settings. Please refer to
the actual settings.
Direction
It stands for the direction from which the object goes across the line.
A<->B: The object going across the line from both directions can be detected and alarms are
triggered.
A->B: Only the object crossing the configured line from the A side to the B side can be
detected.
B->A: Only the object crossing the configured line from the B side to the A side can be
detected.
Sensitivity
It stands for the percentage of the body part of an acceptable target that goes across the pre-
defined line. Sensitivity = 100 - S1/ST × 100. S1 stands for the target body part that goes
across the pre-defined line. ST stands for the complete target body. The higher the value of
sensitivity is, the more easily the alarm can be triggered.
Target Validity
If you set a higher validity, the required target features should be more obvious, and the
alarm accuracy would be higher. The target with less obvious features would be missing.
78
Network Camera User Manual
● For the device supporting HEOP, go to VCA to import and enable Smart Event.
Steps
1. Go to VCA → Set Application → Smart Event → Region Entrance Detection .
2. Check Enable.
3. Click Add to add a rule and set a detection area.
1) Draw a detection area. Click , click on the live view to specify the vertexes and draw the
boundaries of the detection area, and right click to complete drawing.
2) Set the minimum size and the maximum size for the target to improve detection accuracy.
Only targets whose size are between the maximum size and the minimum size trigger the
detection. Click and , then drag the mouse in the live view to draw the minimum and
maximum target size.
3) Optional: Click to delete all the setting areas.
4. Set parameters.
Detection Target
This function allows alarm triggering by specified selected target types. If the detection target
is not selected, all the detected targets will be reported.
79
Network Camera User Manual
Note
This function is only available for certain device models under certain settings. Please refer to
the actual settings.
Sensitivity
It stands for the percentage of the body part of an acceptable target that goes across the
predefined region. Sensitivity = 100 - S1/ST × 100. S1 stands for the target body part that goes
across the predefined region. ST stands for the complete target body. The higher the value of
sensitivity is, the more easily the alarm can be triggered.
Target Validity
If you set a higher validity, the required target features should be more obvious, and the
alarm accuracy would be higher. The target with less obvious features would be missing.
80
Network Camera User Manual
● For the device supporting HEOP, go to VCA to import and enable Smart Event.
Steps
1. Go to VCA → Set Application → Smart Event → Region Exiting Detection .
2. Check Enable.
3. Click Add to add a rule and set a detection area.
1) Draw a detection area. Click , click on the live view to specify the vertexes and draw the
boundaries of the detection area, and right click to complete drawing.
2) Set the minimum size and the maximum size for the target to improve detection accuracy.
Only targets whose size are between the maximum size and the minimum size trigger the
detection. Click and , then drag the mouse in the live view to draw the minimum and
maximum target size.
3) Optional: Click to delete all the setting areas.
4. Set parameters.
Detection Target
This function allows alarm triggering by specified selected target types. If the detection target
is not selected, all the detected targets will be reported.
Note
This function is only available for certain device models under certain settings. Please refer to
the actual settings.
Sensitivity
It stands for the percentage of the body part of an acceptable target that goes across the
predefined region. Sensitivity = 100 - S1/ST × 100. S1 stands for the target body part that goes
across the predefined region. ST stands for the complete target body. The higher the value of
sensitivity is, the more easily the alarm can be triggered.
Target Validity
If you set a higher validity, the required target features should be more obvious, and the
alarm accuracy would be higher. The target with less obvious features would be missing.
81
Network Camera User Manual
● For the device supporting HEOP, go to VCA to import and enable Smart Event.
Steps
1. Go to VCA → Set Application → Smart Event → Unattended Baggage Detection .
2. Check Enable.
3. Click Add to add a rule and set a detection area.
1) Draw a detection area. Click , click on the live view to specify the vertexes and draw the
boundaries of the detection area, and right click to complete drawing.
2) Set the minimum size and the maximum size for the target to improve detection accuracy.
Only targets whose size are between the maximum size and the minimum size trigger the
detection. Click and , then drag the mouse in the live view to draw the minimum and
maximum target size.
82
Network Camera User Manual
Note
The function is only supported by certain models. The actual display varies with the models.
83
Network Camera User Manual
● For the device supporting HEOP, go to VCA to import and enable Smart Event.
Steps
1. Go to VCA → Set Application → Smart Event → Object Removal Detection .
2. Check Enable.
3. Click Add to add a rule and set a detection area.
1) Draw a detection area. Click , click on the live view to specify the vertexes and draw the
boundaries of the detection area, and right click to complete drawing.
2) Set the minimum size and the maximum size for the target to improve detection accuracy.
Only targets whose size are between the maximum size and the minimum size trigger the
detection. Click and , then drag the mouse in the live view to draw the minimum and
maximum target size.
3) Optional: Click to delete all the setting areas.
4. Set parameters.
Sensitivity
Sensitivity stands for the percentage of the body part of an acceptable target that enters the
predefined region. Sensitivity = 100 - S1/ST × 100. S1 stands for the target body part that goes
across the predefined region. ST stands for the complete target body. The higher the value of
sensitivity is, the more easily the alarm can be triggered.
Threshold
The threshold for the time of the objects removed from the region. If you set the value as 10,
alarm is triggered after the object disappears from the region for 10s.
84
Network Camera User Manual
Note
The function is only supported by certain models. The actual display varies with the models.
Note
● For certain device models, you need to enable this function on VCA page first.
● The function is only supported by certain device models.
85
Network Camera User Manual
● For the device supporting HEOP, go to VCA to import and enable Face Capture.
Steps
1. Go to VCA → Set Application → Face Capture → Rule .
2. Check Enable to enable the rule settings.
3. Click to draw the detection area you want the face capture to take effect. Draw area by left-
clicking end-points in the live view window, and right-clicking to finish the area drawing. It is
recommended that the drawn area occupies 1/2 to 2/3 of the live view image.
4. Draw pupil distance.
Min. Pupil Distance
Click to draw the minimum pupil distance. If the pupil distance of the face in the video
image is smaller than the minimum pupil distance, the face will not be detected.
Max. Pupil Distance
Click to draw the maximum pupil distance. If the pupil distance of the face in the video
image is larger than the maximum pupil distance, the face will not be detected.
You can also input the value of distance in the text field.
5. Optional: For shield region settings, refer to Set Shield Region .
6. For the arming schedule settings, refer to Set Arming Schedule . For the linkage method settings,
refer to Linkage Method Settings .
7. Click Save.
8. For overlay and capture settings, refer to Overlay and Capture . For advanced parameters
settings, refer to Face Capture Algorithms Parameters .
Result
You can view and download captured pictures in Playback → Picture . Refer to View and
Download Picture for details.
86
Network Camera User Manual
Comparing to target picture, background picture is the scene image which offers extra
environmental information. You can set the background picture quality and resolution. If the
background image need to be uploaded to the surveillance center, check Background Upload.
For some devices, you can also check Face Picture to upload the captured face picture.
Target Picture Settings
Custom, Head Shot, Half-Body Shot and Full-Body Shot are selectable.
Note
If you select Custom, you can customize width, head height and body height as required.
You can check Fixed Picture Height to set the picture height.
Face Beautification
Check Face Beautification and adjust the beautification level as needed.
Note
Face Beautification slightly adjusts the captured face pictures and reduces facial noise.
Face Enhancement
Check Face Enhancement and the device is able to capture better and clearer face pictures
when it is dark.
Text Overlay
You can check desired items and adjust their order to display on captured pictures.
See Set Camera Info to set Device No. and Camera Info.
Version
It stands for the current algorithm version.
Capture Parameters
Best Shot
The best shot after target leaves the detection area.
Capture Threshold
It stands for the quality of face to trigger capture and alarm. Higher value means better
quality should be met to trigger capture and alarm.
Capture Times
87
Network Camera User Manual
It refers to the capture times a face will be captured during its stay in the configured area.
The default value is 1.
Quick Shot
When the face picture grading value is higher than the quick shot threshold, the face picture
will be captured and uploaded. Otherwise, the picture with the highest grading value that
reaches the max. capture interval will be selected for upload.
Quick Shot Threshold
It stands for the quality of face to trigger quick shot.
Max. Capture Interval
It refers to the max. time occupation for one quick shot.
Capture Times
It refers to the capture times a face will be captured during its stay in the configured area.
Remove Duplicated Faces
This function can filter out repeated captures of certain face.
Similarity Threshold for Duplicates Removing
It is the similarity between the newly captured face and the picture in the duplicates removing
library. When the similarity is higher than the value you set, the captured picture is regarded
as a duplicated face and will be dropped.
Duplicates Removing Library Grading Threshold
It is the face grading threshold that triggers duplicates checking. When the face grading is
higher than the set value, the captured face is compared with the face pictures that are
already in the duplicates removing library.
Duplicates Removing Library Update Time
Every face picture is kept in the duplicates removing library for the set update time.
Face Exposure
Check the checkbox to enable the face exposure.
Reference Brightness
The reference brightness of a face in the face exposure mode. If a face is detected, the
camera adjusts the face brightness according to the value you set. The higher the value, the
brighter the face is.
Min. Duration
The minimum duration of the camera exposures the face.
Note
If the face exposure is enabled, please make sure the WDR function is disabled, and the
manual iris is selected.
88
Network Camera User Manual
Note
The face filtering time (longer than 0s) may increase the possibility of the actual capture
times less than the set value above.
Facial Posture Filter
Facial posture filter can filter out face of certain postures. The figure on the right of the slider
stands for the posture angle which is acceptable in the face capture action. Click to display
the diagram illustrating the face turning direction when setting up this filter.
Upload Feature
Feature stands for the feature information the algorithm can tell from face pictures. Check the
function to upload the information.
Restore Parameters
Restore Defaults
Click Restore to restore all the settings in advanced configuration to the factory default.
89
Network Camera User Manual
Note
● For certain device models, you need to enable People Management on VCA page first.
● The function is only supported by certain device models.
function.
● For the device supporting HEOP, go to VCA to import and enable People Management.
Steps
1. Go to VCA → Set Application → People Management → Regional People Counting → Rule .
2. Click Add to add a rule and set its name.
3. Set a rule.
People Number OSD
It displays the real-time people number in the live view window. You can drag the mouse to
adjust the OSD window location.
Note
People density detection (people density alarm) does not support Alarm Times Per Exception,
Alarm Interval and First Alarm Delay settings.
4. Click to draw a region in the live view window, left click the end-points in the live view
window to define the boundary of the set rule region, and right click to finish drawing.
Note
● Up to 8 regions can be set at the same time.
90
Network Camera User Manual
Scheduled Uploading
The device uploads people density information within the set statistics cycle.
Number of People Change Upload
The device uploads the people change information if there is any change in the set rule
region.
Congestion Level Upload
The device uploads the congestion information when there is any change of congestion level
in the set rule region.
Density Level
Number of People
The range for each level by inputting the lower limit of the number of people in the set
rule region.
Custom Name
The name of the level.
Note
● Set the Number of People before the Custom Name.
● Up to three levels can be configured. The density increases from level 1 to level 3.
function.
● For the device supporting HEOP, go to VCA to import and enable People Management.
Steps
1. Go to VCA → Set Application → People Management → Regional People Counting → Rule .
2. Click Add to add a rule and set its name.
3. Set a rule.
People Number OSD
91
Network Camera User Manual
It displays the real-time people number in the live view window. You can drag the mouse to
adjust the OSD window location.
Alarm Times Per Exception
It refers to the alarm times after an alarm is triggered. If you do not check it and set the
times, the device will keep sending alarms.
Alarm Interval
Within the set Alarm Interval, the same alarm will not be uploaded.
First Alarm Delay
When the first alarm is triggered, the alarm will be uploaded after a set time period.
4. Click to draw a region in the live view window, left click the end-points in the live view
window to define the boundary of the set rule region, and right click to finish drawing.
Note
● Up to 8 regions can be set at the same time.
5. Check Regional People Exception Alarm, and set Alarm Trigger Condition and Alarm Threshold.
Note
● After enabling Ignore Situation of No People, the device will not trigger an alarm when there
function.
● For the device supporting HEOP, go to VCA to import and enable People Management.
Steps
1. Go to VCA → Set Application → People Management → Regional People Counting → Rule .
92
Network Camera User Manual
Note
Waiting time exception detection (dwell time exception alarm) supports Alarm Times Per
Exception, Alarm Interval and First Alarm Delay settings only on the condition that the Alarm
Trigger Condition is Greater Than Threshold A.
4. Click to draw a region in the live view window, left click the end-points in the live view
window to define the boundary of the set rule region, and right click to finish drawing.
Note
● Up to 8 regions can be set at the same time.
5. Check Dwell Time Exception Alarm, and set Alarm Trigger Condition and Alarm Threshold.
6. Set arming schedule. See Set Arming Schedule .
7. Set linkage method. See Linkage Method Settings .
8. Click Save.
9. Optional: Set text overlay. For detailed settings, refer to Overlay and Capture .
10. Optional: View version and set filtering condition. For detailed settings, refer to Advanced
Settings .
93
Network Camera User Manual
Version
It stands for the current algorithm version.
Algorithm Mode
Select a mode according to the installation scene.
Filter
Target Size
It stands for the size of the target detection window. A target larger than this pixel can be
counted as a real target. It can remove the false alarm of a certain fixed target.
Displacement
It stands for target displacement or the target width. A target will not be counted if its
displacement is less than the set percentage.
Min. Waiting Duration
Waiting time shorter than the set value will be filtered.
Confidence
The higher the threshold is, the more difficult a target will be detected, but the higher the
accuracy is.
Note
The filtering settings should be operated by the professionals. The filter settings can adjust the
algorithm for detection to change the detection range, sensitivity, etc.
Note
● For certain device models, you need to enable People Counting on VCA page first.
● The function is only supported by certain device models.
function.
● For the device supporting HEOP, go to VCA to import and enable People Counting.
94
Network Camera User Manual
Steps
1. Go to VCA → Set Application → People Counting → Rule .
2. Check Enable to enable the function.
3. Click Add to add a detection area.
4. Click to draw the polygon detection area (count area). Left-click end-points in the live view
window, and right-click to finish the drawing.
5. Click to draw the detection line. The arrow shows entering direction, you can click to
change the direction.
Note
In order to improve the counting accuracy, please draw the detection area according to the
following rules.
● The detection area needs to cover the people entering and exiting access.
● The detection line must be completely contained within the red detection area and
Note
OSD overlay only counts the number of the person on the current day. The data will be
cleared automatically when the device restarts or at the daily reset time.
Daily Reset Time
The device clears the data in 00:00 each day by default. You can select a time point through
the drop-down list. After selecting, the counting data will be automatically cleared at this
time point every day.
You can click Manual Reset to manually trigger a data reset and clear the current people
counting data.
9. Click Save.
10. Set arming schedule. See Set Arming Schedule .
11. Set linkage method. See Linkage Method Settings .
12. Click Save.
13. Optional: Set people counting data uploading parameters.
Click Data Upload to enter the interface. Click Save after finishing the settings.
95
Network Camera User Manual
96
Network Camera User Manual
Chapter 11 EPTZ
EPTZ (Electronic PTZ) is a high-resolution function that digitally zooms and pans into portions of the
image, with no physical camera movement. If you want to use the EPTZ function, make sure your
device supports the Third Stream. Third stream and EPTZ should be both enabled simultaneously.
Note
The function is only supported by certain device models.
11.1 Patrol
Steps
1. Go to Configuration → EPTZ .
2. Check Enable.
3. The default Stream Type is Third Stream and cannot be configured.
4. Select Patrol in Application Mode.
5. Click Save.
What to do next
For the detailed information about the patrol settings, see the PTZ operations on live view page.
11.2 Auto-Tracking
Steps
1. Go to Configuration → EPTZ .
2. Check Enable.
3. The default Stream Type is Third Stream and cannot be configured.
4. Select Auto-tracking in Application Mode.
5. Click to start drawing. Click on the live view video to specify the four vertexes of the detection
area, and right click to complete drawing.
6. Set rules.
Detection Target
Human and vehicle are available. If the detection target is not selected, all the detected
targets will be tracked, including the human and vehicle.
Note
Only certain camera models support this function.
Sensitivity
97
Network Camera User Manual
It stands for the percentage of the body part of an acceptable target that is tracked.
Sensitivity = 100 - S1/ST × 100. S1 stands for the target body part that enters the pre-defined
area. ST stands for the complete target body. The higher the value of sensitivity is, the more
easily the target can be tracked.
7. Click Save.
98
Network Camera User Manual
Appendix A. FAQ
Scan the following QR code to find the frequently asked questions of the device.
Note that some frequently asked questions only apply to certain models.
99
UD31437B-B