ANPR - Dahua
ANPR - Dahua
User's Manual
V1.0.3
Foreword
General
The manual introduces the structure, installation, functions, and operations of the access ANPR
camera (hereinafter referred to as "the Camera").
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Revision History
Revision Content Release Time Revision Content
V1.0.3 Updated manual format. October 2021
Updated the focal length of 437 and 415
V1.0.2 July 2021
models of camera.
V1.0.1 Added more models. March 2021
V1.0.0 First release. November 2019
I
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, comply with the guidelines
when using it, and keep the manual safe for future reference.
Transportation Requirements
Storage Requirements
Installation Requirements
● Do not connect the power adapter to the device while the adapter is powered on.
● Strictly comply with the local electrical safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the device.
● Do not connect the device to two or more kinds of power supplies, to avoid damage to the
device.
● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the device in a place exposed to sunlight or near heat sources.
● Keep the device away from dampness, dust, and soot.
● Put the device in a well-ventilated place, and do not block its ventilation.
● Use an adapter or cabinet power supply provided by the manufacturer.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the device label.
● The device is a class I electrical appliance. Make sure that the power supply of the device is
connected to a power socket with protective earthing.
● An emergency disconnect device must be installed during installation and wiring at a readily
accessible location for emergency power cut-off.
● Disconnect the device when installing and connecting the lens.
Operation Requirements
III
● Do not drop or splash liquid onto the device, and make sure that there is no object filled with
liquid on the device to prevent liquid from flowing into it.
● Do not disassemble the device.
● Do not aim the device at strong light sources (such as lamplight, and sunlight) when focusing it.
● Do not vibrate, squeeze or immerse the device in liquid during transportation, storage or
installation.
● Do not block the ventilation near the device.
● We recommend you use the device with a lightning protection device for stronger protection
against lightning. For outdoor scenarios, strictly comply with the lightning protection
regulations.
● Ground the function earthing portion of the device (grounding cable or lightning surge protector)
to improve its reliability. The device is a class I electrical appliance. Make sure that the power
supply of the device is connected to a power socket with protective earthing.
● The device must be used with the protective cover for outdoor scenarios to avoid the risk of
water damage to the device.
● Protect the line cord and wires from being walked on or squeezed particularly at plugs, power
sockets, and the point where they exit from the device.
● Modify the default password of the device after first-time login to prevent the device from being
stolen.
Maintenance Requirements
● Pack the device with packaging provided by its manufacturer or packaging of the same quality
before sending it back for repair.
● Please do not touch the photosensitive device with your hands. Use an air blower to clean off the
dust and filth on the lens.
● Clean the surface of the device with a soft dry cloth or a clean soft cloth dipped in neutral
detergent.
● Use the accessories suggested by the manufacturer. Installation and maintenance must be
performed by qualified professionals.
IV
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings............................................................................................................................................ III
1 Introduction ............................................................................................................................................................................................ 1
1.1 Overview ........................................................................................................................................................................................ 1
1.2 Features .......................................................................................................................................................................................... 1
2 Structure ................................................................................................................................................................................................... 3
2.1 Long Range ANPR Camera Dimensions.......................................................................................................................... 3
2.2 Short Range ANPR Camera Dimensions......................................................................................................................... 3
2.3 Structure ........................................................................................................................................................................................ 4
2.3.1 Entire Device ..................................................................................................................................................................... 4
2.3.2 Rear Panel ........................................................................................................................................................................... 5
2.4 Cable Connection....................................................................................................................................................................... 5
3 Installation ............................................................................................................................................................................................... 9
3.1 Universal Joint Installation ................................................................................................................................................... 9
3.2 Spherical Bracket Installation ............................................................................................................................................. 9
4 Web Configuration ............................................................................................................................................................................11
4.1 Web Login....................................................................................................................................................................................11
4.1.1 Recommended Configuration ................................................................................................................................11
4.1.2 Device Initialization.....................................................................................................................................................11
4.1.3 Login ...................................................................................................................................................................................14
4.1.4 Resetting Password .....................................................................................................................................................15
4.1.5 Web Functions ................................................................................................................................................................17
4.2 Guide ..............................................................................................................................................................................................18
4.3 Live.................................................................................................................................................................................................. 20
4.3.1 Video Stream................................................................................................................................................................... 21
4.3.2 Live View ...........................................................................................................................................................................21
4.3.3 Logged Plate Number.................................................................................................................................................22
4.3.4 Plate Snapshot ...............................................................................................................................................................22
4.3.5 System Functions..........................................................................................................................................................22
4.3.6 Functions of the Live Page ....................................................................................................................................... 22
4.3.7 Vehicle Snapshot ..........................................................................................................................................................24
4.3.8 Event List...........................................................................................................................................................................25
4.4 Query .............................................................................................................................................................................................25
4.4.1 Image Search................................................................................................................................................................... 25
4.4.1.1 SD Picture...............................................................................................................................................................25
V
4.4.1.2 Image Downloading Attribute ....................................................................................................................26
4.4.1.3 PC Picture ...............................................................................................................................................................27
4.4.2 Recording Search ..........................................................................................................................................................27
4.4.2.1 Record...................................................................................................................................................................... 27
4.4.2.2 Watermark.............................................................................................................................................................28
4.4.3 Capture Record Search...............................................................................................................................................28
4.4.4 Alarm Output Search ..................................................................................................................................................29
4.5 Setting ...........................................................................................................................................................................................29
4.5.1 ITC .........................................................................................................................................................................................30
4.5.1.1 Detection................................................................................................................................................................30
4.5.1.1.1 Snapshot......................................................................................................................................................30
4.5.1.1.2 IO ..................................................................................................................................................................... 31
4.5.1.2 Intelligence ...........................................................................................................................................................32
4.5.1.2.1 Recognition ................................................................................................................................................32
4.5.1.2.2 Scene .............................................................................................................................................................33
4.5.1.2.3 Advance Configuration ........................................................................................................................34
4.5.1.3 OSD Configuration ............................................................................................................................................34
4.5.1.3.1 Video OSD ...................................................................................................................................................34
4.5.1.3.2 Snap OSD.....................................................................................................................................................36
4.5.1.4 Cutout Configuration....................................................................................................................................... 37
4.5.1.4.1 Snapshot Cutout...................................................................................................................................... 37
4.5.1.4.2 Face Overlap ..............................................................................................................................................38
4.5.1.5 Blocklist and Allowlist ..................................................................................................................................... 38
4.5.1.5.1 Fuzzy Matching ........................................................................................................................................38
4.5.1.5.2 Allowlist .......................................................................................................................................................39
4.5.1.5.3 Blocklist Search ........................................................................................................................................41
4.5.1.5.4 Barrier Control ..........................................................................................................................................41
4.5.1.6 RS-485 ...................................................................................................................................................................... 42
4.5.1.7 RS-485 LED Display ...........................................................................................................................................44
4.5.1.8 Voice Broadcast ..................................................................................................................................................45
4.5.1.8.1 Broadcast Content .................................................................................................................................. 45
4.5.1.8.2 Volume/Encoding ................................................................................................................................... 46
4.5.1.9 Device Test ............................................................................................................................................................46
4.5.1.9.1 Device Test .................................................................................................................................................46
4.5.1.9.2 Capturing Commissioning..................................................................................................................47
4.5.2 Camera ...............................................................................................................................................................................48
4.5.2.1 Attribute ................................................................................................................................................................. 48
4.5.2.1.1 General .........................................................................................................................................................48
VI
4.5.2.1.2 Shutter..........................................................................................................................................................49
4.5.2.1.3 Metering Zone ..........................................................................................................................................51
4.5.2.2 Video ........................................................................................................................................................................51
4.5.2.2.1 Video .............................................................................................................................................................51
4.5.2.2.2 Snapshot......................................................................................................................................................53
4.5.2.2.3 Interest Area ..............................................................................................................................................53
4.5.3 Network .............................................................................................................................................................................54
4.5.3.1 TCP/IP....................................................................................................................................................................... 54
4.5.3.2 Connection ............................................................................................................................................................55
4.5.3.2.1 Port................................................................................................................................................................. 55
4.5.3.2.2 ONVIF ............................................................................................................................................................56
4.5.3.3 Auto Register .......................................................................................................................................................57
4.5.3.4 SMTP (Email).........................................................................................................................................................58
4.5.3.5 IEEE802.................................................................................................................................................................... 59
4.5.3.6 ITC Push .................................................................................................................................................................. 60
4.5.4 Event ...................................................................................................................................................................................61
4.5.4.1 Alarm ........................................................................................................................................................................61
4.5.4.1.1 Relay Activation....................................................................................................................................... 61
4.5.4.1.2 Relay-out .....................................................................................................................................................63
4.5.4.2 Abnormality..........................................................................................................................................................63
4.5.5 Storage ...............................................................................................................................................................................64
4.5.5.1 Point .........................................................................................................................................................................65
4.5.5.2 Local..........................................................................................................................................................................65
4.5.5.3 FTP .............................................................................................................................................................................65
4.5.5.4 Client ........................................................................................................................................................................67
4.5.5.5 Save Path................................................................................................................................................................67
4.5.6 System ................................................................................................................................................................................68
4.5.6.1 General .................................................................................................................................................................... 68
4.5.6.1.1 General Setup ...........................................................................................................................................68
4.5.6.1.2 Date & Time................................................................................................................................................69
4.5.6.2 Account ................................................................................................................................................................... 70
4.5.6.2.1 Account ........................................................................................................................................................70
4.5.6.2.2 ONVIF User .................................................................................................................................................72
4.5.6.3 Safety ....................................................................................................................................................................... 74
4.5.6.3.1 System Service..........................................................................................................................................74
4.5.6.3.2 HTTPS ............................................................................................................................................................75
4.5.6.3.3 Firewall .........................................................................................................................................................78
4.5.6.4 Default Settings ..................................................................................................................................................79
VII
4.5.6.5 Import/Export ......................................................................................................................................................79
4.5.6.6 Automatic Maintenance ................................................................................................................................. 79
4.5.6.7 System Upgrade .................................................................................................................................................80
4.5.7 Information ...................................................................................................................................................................... 80
4.5.7.1 Version .................................................................................................................................................................... 80
4.5.7.2 Log .............................................................................................................................................................................81
4.5.7.2.1 System Log .................................................................................................................................................81
4.5.7.2.2 Remote log .................................................................................................................................................82
4.5.7.2.3 Operation Log Collection ....................................................................................................................82
4.5.7.3 Online User............................................................................................................................................................83
4.5.7.4 Running Status ....................................................................................................................................................83
4.6 Alarm..............................................................................................................................................................................................83
4.7 Logout ...........................................................................................................................................................................................84
5 FAQ ............................................................................................................................................................................................................85
Appendix 1 Cybersecurity Recommendations ........................................................................................................................86
VIII
1 Introduction
1.1 Overview
The access ANPR camera adopts intelligent deep learning algorithm. It supports vehicle detection,
license plate recognition, logo recognition, model recognition, and color recognition, and encoding
mode such as H.265.
The Camera consists of protective housing, illuminator, and intelligent HD camera. The intelligent
HD camera adopts progressive scanning CMOS, which owns several features such as high definition,
low illuminance, high frame rate, and excellent color rendition.
The Camera is extensively applied to vehicle capture, and recognition of community road, parking
lot, and other entrance, and exit surveillance.
1.2 Features
The features are available on select modes, and might differ from the actual camera.
Permission Management
● Each user group owns permissions. Permissions of a user cannot exceed the permissions of its
group.
● 2 user levels.
● Permission of opening barrier, and blocklist alarm function.
● Device configuration, and permission management through Ethernet.
Storage
● Stores corresponding video data onto the central server according to the configuration (such as
alarm, and timing settings).
● Users can record through web according to their requirements. The recorded video file will be
stored on the computer where client is located.
● Supports local hot swapping of storage card, and storage when network disconnected. It
overwrites stored pictures, and videos automatically when memory becomes insufficient.
● Stores 1024 log records, and user permission control.
● Supports FTP storage, and automatic network replenishment (ANR).
Alarm
● It can trigger alarm upon camera operation exceptions through network, such as memory card
damage.
● Some devices can connect to various alarm peripherals to respond to external alarm input in real
time (within 200 ms). It can correctly deal with various alarms according to the linkage
predefined by users, and generate corresponding voice prompt (users are allowed to record
voice in advance).
1
Network Monitoring
● Transmits video data of single channel compressed by device to network terminal, and make it
reappear after decompression through network. Keep delay within 500ms when bandwidth is
allowed.
● Supports maximum 10 users online at the same time.
● Supports system access, and device management through web.
● Video data transmission adopts HTTP, TCP, UDP, MULTICAST, and RTP/RTCP.
Peripheral Control
● Peripheral control: Supports setting various peripheral control protocols, and connection pages.
● Connects to external devices such as vehicle detector, signal detector, and more.
Auto Adjustment
● Auto iris: Automatically adjusts the iris opening to the changing light throughout the day.
● Auto white balance: Accurately displays the object color when light condition changes.
● Auto exposure: Automatically adjusts shutter speed according to the exposure value of the
image measured by the metering system, and according to shutter, and iris exposure set by
factory defaults.
● Auto gain: Automatically increases camera sensitivity when illuminance is very low, enhancing
image signal output so that the Camera can acquire clear, and bright image.
2
2 Structure
3
Figure 2-4 Dimensions of camera with bracket (mm [inch])
2.3 Structure
4
Table 2-1 Camera structure description
No. Description No. Description
1 Protective cover 3 Lens
2 Illuminator —
5
Table 2-3 Cable connection description
No. Port Function Description
Connects to standard Ethernet, supports
1 LAN Ethernet port
PoE power supply.
The Camera sends out audio signal through
2 AUDIO OUT Audio output port
this port.
The Camera gets audio signal through this
3 AUDIO IN Audio input port
port.
The Camera sends out video signal through
4 BNC Video output port
this port.
Inputs 12 VDC power. Please be sure to
supply power as instructed.
5 12 VDC Power input port
Device damage will occur if power is not
supplied correctly.
● Yellow: RS-485_A1
6 RS-485 RS-485 port
● Orange: RS-485_B1
● Alarm output, connecting to barrier,
and alarm output devices such as alarm
light.
◇ Brown: ALARM_OUT1
◇ Green: ALARM_OUT_GND1
◇ Red: ALARM_OUT2
◇ Black: ALARM_OUT_GND2
7 ALARM Alarm port
● Alarm input, connecting to vehicle
detector, IR detector, induction loop,
and more.
◇ Blue: ALARM_IN1
◇ White: ALARM_IN2
◇ Yellow: ALARM_IN3
◇ Gray: ALARM_IN_GND
Inputs 24 VAC power. Please be sure to
supply power as instructed.
8 24 VAC Power input port
Device damage will occur if power is not
supplied correctly.
6
Figure 2-9 Cable connection
7
No. Port Function Description
● Alarm output, connecting to barrier, and
alarm output devices such as alarm light.
◇ Brown: ALARM_NO1
◇ Green: ALARM_COM1
◇ White & Purple: ALARM_NO2
◇ Light Green: ALARM_COM2
◇ Red: ALARM_NO3
4 ALARM Alarm port ◇ Black: ALARM_COM3
● Alarm input, connecting to vehicle
detector, IR detector, induction loop, and
more.
◇ Blue: ALARM_IN1
◇ White: ALARM_IN2
◇ Yellow: ALARM_IN3
◇ Gray: ALARM_IN_GND
Inputs 24 VAC power. Be sure to supply
power as instructed.
5 24 VAC Power input port
Device damage will occur if power is not
supplied correctly.
8
3 Installation
The following installation figures are for reference only, and might differ from the actual product.
9
Figure 3-2 Prepare bracket housing
10
4 Web Configuration
It supports logging in to device web page through browser on PC, and realizes device configuration,
operation, and management.
The pages, and Settings are for reference only, and might differ from the actual page.
11
Figure 4-1 Device Initialization
● The new password must consist of 8 to 32 characters, and contain at least two types
from upper case, lower case, number, and special characters (excluding ' " ; :, and &).
● If you want to change your password again, go to Setting > System > Account >
Account.
Step 5 Select the Email Address check box, and then enter your email address (recommended to
set for resetting your password).
Step 6 Click Confirm.
Step 7 On the Online Upgrade page, click Confirm.
Step 8 Change the default IP address, subnet mask, and default gateway, and then click Finish.
12
Figure 4-3 Login
Step 9 Enter the username, and password, and then click Login.
Prompt box will pop out when username or password is incorrect, see Figure 4-4, and it
will remind you of remaining attempts. The account will be locked for 300 s if user enters
incorrect username or password for 5 times consecutively. See Figure 4-5.
Step 10 Click Please click here to download, and install the plug-in in the video window.
The system automatically downloads webplugin.exe, and installs it according to prompt.
Before installing plug-in, make sure that the associated plug-in option of active has been
modified as Enable or Prompt in Internet Option > Security Settings.
13
Figure 4-6 Web page
It will pop out the prompt box of authorization failed when there is no operation on the
web page for a long time. In this case, you need to log in again.
4.1.3 Login
Step 1 You can log in to the web page by following the steps below. For first-time login or
logging in after restoring factory default Settings, see "4.1.2 Device Initialization".
Step 2 Enter the IP address of the Camera in the browser address bar, and press Enter.
Step 3 Enter your login username, and password, and then click Login.
14
● A box pops up when the username or password is incorrect.
● If you enter invalid user name or password for five times, the account will be locked for
300 s.
● When scanning QR code to acquire security code, one QR code supports security code
acquisition up to twice.
● After receiving security code by email, you need to reset password within 24 hours, otherwise,
the security code will be invalid.
● One device can generate security code up to 10 times in one day, so the Camera can be reset up
to 10 times in one day.
● Email address must be filled in during device initialization; otherwise it will fail to send you the
security code, and you will not be able to reset your password. Email address of admin can be
modified from Setting > System > Account > Account.
Step 1 Open the browser, enter the IP address of the Camera in the browser address bar, and then
press Enter.
15
Figure 4-10 Information
If you use IE browser, the system might prompt Stop running the script, click No, and
continue to run the script.
Step 4 Scan the QR code according to the page prompt, and send the scanning result to
designated email, and acquire security code.
Scan the actual QR code. Do not scan the QR code in this manual.
Step 5 Enter received security code in the text box of Security code.
Step 6 Click Next.
16
Figure 4-12 Reset password (2)
Step 7 Set Password, and enter your new password again in Confirm Password.
● The new password must consist of 8 to 32 characters, and contain at least two types
from upper cases, lower cases, numbers, and special characters (excluding ' " ; :, and &).
● The new password must be the same as the Confirm Password. Follow the password
security notice to set a high security level password.
Step 8 Click OK.
17
Button Description
Recover the parameters to the value last saved.
Save the settings.
4.2 Guide
On the Guide page, you can configure capture scenarios, and get assistance with setting installation
scenario.
Step 3 You can check whether the video image is properly zoomed, and focused by checking the
plate pixel.
1) Drag zoom, and focus bar to adjust the video image properly.
18
2) When the vehicle plate comes into the green line area, click Snapshot to take a
snapshot of the plate.
Snapshot becomes Resume.
3) Drag the yellow plate pixel box to the position of the plate.
4) Click Zoom.
Zoom in the picture selected by the plate pixel box. It can realize 2x or 4x zoom rate.
5) Adjust the position of plate pixel box, and make it the optimal plate size.
If the plate within the yellow box is larger than the optimal plate size in the example,
zoom out the video image; if smaller, zoom in the video image.
19
Figure 4-18 Recognition
4.3 Live
Click the Live tab.
On this page, it can realize several functions such as live video, live picture, real-time capture, record,
and config (LPR), and more.
20
4.3.1 Video Stream
● Main Stream: Make sure that the Camera can record video, and carry out network surveillance
when the network is normal. You can configure main stream resolution within the supported
range of the Camera.
● Sub Stream: Replaces main stream to make network surveillance, and reduce the network
bandwidth possession when network bandwidth is insufficient.
● Protocol: Video surveillance protocol, currently it only supports TCP.
● Fluency: Fluency of viewing the live video. The fluency can be set to High, Middle, Low, and
Default (recommended).
● : Click it to enable smart track detection. Number plate, vehicle bounding box, and other smart
tracking information will be displayed in the video image.
● : Click it, and the window is displayed in full screen; double-click or right-click to exit full
screen.
21
Icon Name Description
Change the value when the image brightness is proper but
Contrast contrast is not enough. The range is from 0 to 128 (64 by
default).
Adjust the image hue. For example, change red into blue. The
default value is made by the light sensor, and normally it does
Hue
not have to be adjusted. The range is from 0 to 128 (64 by
default).
Adjust the color vividness, and will not influence the image
Saturation
overall brightness. The range is from 0 to 128 (64 by default).
Restore brightness, contrast, saturation, and hue to default
—
values.
In this image adjustment window, you can only adjust image brightness, contrast, hue, and
saturation of local web. To adjust system brightness, contrast, hue, and saturation, go to Setting >
Camera > Attribute > General.
22
Table 4-6 General function description
Icons Name Description
Select the check box, and the Camera automatically receives
vehicle snapshots, and detects event information triggered
by sources such as radar or video detection, and displays such
ANPR Receive snapshots, and information at the lower part of the page.
The snapshots are saved in the storage path defined by
Setting > Storage > Destination > Save Path.
Record Type Select the format of video recordings (dav by default).
Click Talk, and you can communicate with people on site
Talk
through the camera.
Click to take a snapshot when a vehicle passes. The snapshot
is saved in the storage path.
Manual
Snapshot ● Enable ANPR Receive first.
● To change the storage path of snapshots, go to Setting >
Storage > Destination > Save Path.
Drag to select any area in the video window, and then the
Digital Zoom area will be zoomed in. In any area of the video window, click
or right-click to exit.
Click it to start recording. Click again to stop recording.
Video
You can set the storage path of video recordings from
Recording
Setting > Storage > Destination > Save Path.
You can draw the area of plate detection, adjust camera’s
Config (LPR)
focal length, and set applicable region.
Click .
23
The steps of config (LPR) are shown as follows.
Step 1 Set focus, and zoom mode, which is used to recognize vehicle.
The configured area line, and detection line in Guide are displayed in the video page.
24
4.3.8 Event List
Select ANPR Receive, and the event information will be displayed, including No., event types,
capture time, lanes, plates, vehicle color, speed, vehicle signs, and vehicle types.
4.4 Query
Click the Query tab, and the system displays query page where you can search for pictures, and
video recordings.
4.4.1.1 SD Picture
Search conditions can be set in this section. You can search for event, and plate information of the
SD card within the period.
Step 1 Select Query > Image Search > SD Card Image.
25
Step 3 Click Search, and it displays all the picture file lists which conform to query condition in
the file list.
Click some line in the list, and the plate picture information will be displayed in Real Plate
Info.
Step 4 Download picture.
Click to select pictures, and then click Download.
Step 5 Set the storage path of picture in the prompted window. The system starts to download
the pictures to local PC.
26
Step 3 Click Confirm.
4.4.1.3 PC Picture
The section introduces the way of checking whether the watermark of PC picture is tampered.
Step 1 Select Query > Image Search > PC Picture.
Step 2 Click Browse, and select the folder where the verified picture is located.
Step 3 Select the picture which needs to be verified.
Step 4 Click Watermark, and view result in the picture list.
Click Open or double-click the picture if you need to preview the picture.
4.4.2.1 Record
You can set video play of local PC on this page.
Step 1 Select Query > Recording Search > Recording.
Step 2 Click Browse, select record path, click Open, and view the video.
27
Table 4-11 Play function description
Icon Description
● : Play video.
● : Pause.
Stop playing video.
Slow down video playing.
Speed up video playing.
Skip to the next frame.
4.4.2.2 Watermark
You can verify whether the watermark of local record is tampered.
Go to Setting > Camera > Video > Video, and select Watermark Settings to enable the function,
and set the corresponding Watermark Character. The default character is DigitalCCTV.
Step 1 Select Query > Recording Search > Water Mark.
Step 2 Click Browse, and select a file that you want to verify.
Step 3 Click Watermark,and the system displays verify progress, normal watermark, and some
other information.
The page of Watermark Verification Completed appears after verification.
● It supports max 10,000 records or 1,024 records respectively when the Camera is installed with or
without TF card.
● If the passing vehicle records are unreadable in Excel after being imported, change them into
UTF-8 encoding document in txt, and then they can be opened normally.
Step 1 Select Query > Capture Record Search.
Step 2 Set Begin Time, and End Time, and then set the Direction (vehicle movement direction,
28
including Approaching, Departing, and Unknown).
Step 3 Click Search to search for the plates that meet the search conditions.
Step 4 Click Export, and then select storage path to export the results to PC.
Make sure that all the external devices are connected with the Camera through RS-485 port.
Step 1 Select Query > Alarm Output Search.
Step 2 Set the start time and end Time.
Step 3 Click Search.
4.5 Setting
You can configure several parameters such as ITC, camera, network, event, storage, system, and
system information.
29
4.5.1 ITC
You can set intelligent parameters of the Camera.
4.5.1.1 Detection
4.5.1.1.1 Snapshot
30
Step 2 Configure the parameters.
4.5.1.1.2 IO
Figure 4-31 IO
31
Table 4-13 Loop I/O parameters
Parameter Description
IO Only Loop I/O can be selected.
Loop 1 Set the loop trigger mode.
● Not triggered: No capture is triggered.
● Rise Edge: Capture is triggered when the vehicle
enters loop.
Trigger Mode Config
● Fall Edge: Capture is triggered when the vehicle
Loop 2 exits loop.
4.5.1.2 Intelligence
4.5.1.2.1 Recognition
You can set vehicle recognition parameter, recognition mode, and some other functions.
Step 1 Select Setting > ITC > Intelligence > Intelligent Analysis > Recognition.
32
Figure 4-32 Recognition
4.5.1.2.2 Scene
You can configure the advanced functions of plate recognition, and customize special functions.
Step 1 Select Setting > ITC > Intelligence > Intelligent Analysis > Scene.
33
Step 2 Select detection scene as needed.
● Head first: Higher recognition sensitivity towards plate on head.
● Tail first: Higher recognition sensitivity towards plate on tail.
● Bicycle (electric bicycle or motorcycle): Higher recognition sensitivity towards electric
bicycle or motorcycle plate.
● Mounting height: Higher recognition sensitivity when the Camera is installed on higher
place.
Step 3 Click Confirm.
34
Figure 4-35 Video OSD
35
Figure 4-37 Custom
Step 2 Move the title box to displayed location, or manually enter coordinate value into the X/Y
box in the lower-right corner of the page.
Step 3 Select Black Edge Location, and then you can set the position of the OSD black strip. You
can select from Top, Bottom, and None.
Step 4 Set font size of OSD information. You can set font color of picture OSD information in
.
Step 5 Click More.
36
Figure 4-39 New line, and OSD separator
Step 6 Select the NewLine check box as needed, and then set separator types of OSD
information.
You can manually enter other separators when selecting Custom from Osd Separator.
Step 7 Set OSD options.
Enable plate cutout function, and the system will cut out the recognized plate picture, and save it to
the storage path.
Step 1 Select Setting > ITC > Cutout.
Step 2 Select On, and select Plate or Whole Vehicle, and then the function of plate cutout or
whole vehicle cutout is enabled.
Step 3 Click Confirm.
37
4.5.1.4.2 Face Overlap
In this section, you can select whether to overlap the face image of the driver and assistant driver
onto the snapshot, and the overlap position and size.
Step 1 Select Setting > ITC > Cutout > Face Overlap.
Step 2 Configure the parameters as needed.
Enable fuzzy match, and set the fuzzy match conditions. The vehicle with plate meeting the
matching conditions will be considered as allowlist vehicle, and the Camera will automatically open
the barrier.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Fuzzy Matching.
Step 2 Select the Enable check box to enable fuzzy match, and then configure the parameters as
needed.
38
Table 4-17 Allowlist parameters description
Parameter Description
Plate number will be matched when the first or last character of
Lost 1 Character at The Ends
the detected plate is missing.
Plate number will be matched when one more character is
Redundant 1 Character at
detected before the first character or after the last character of
the Ends
the plate.
Set the tolerant matching value (0, 1, or 2), and plate number
Tolerant Matching
will be matched successfully when 0, 1, or 2 characters different
(Character)
from the recorded plate number are detected.
Click to add the fuzzy match condition. For example, if o is
Equivalent matching
detected by the Camera, the character will be automatically
Characters
recognized as 0, as shown in the figure above.
Step 3 Click Confirm.
4.5.1.5.2 Allowlist
You can search, and check whether a plate number is included in the allowlist, or you can import or
export plate number in the allowlist.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Allowlist.
39
Figure 4-44 Add
You need to enable barrier control from Setting > ITC > Blocklist and Allowlist >
Barrier Control.
5) Select Continue Adding, click Save, and the system will save allowlist plate number
information, and directly enter the adding page of next allowlist plate.
You can also cancel selecting Continue Adding, and then click Save to stop adding
further vehicles.
● Exporting vehicles to allowlist in batches:
1) Click Export, and it pops up the Encrypt Config dialog box.
2) Check Open (encrypt) or Off (do not encrypt) as needed, and then click Confirm.
3) Select the path of storing files. Click Save, and export allowlist to local in .csv format,
which can be opened in Excel.
● Importing vehicles to allowlist in batches:
1) Click Template to download the template, or open the .csv file you exported, fill in the
40
allowlist data which needs to be imported according to template format, and then save
the file.
2) Click Browse…, and select the path where template file exists.
3) Click Import, and you can import the allowlist data into the system in batches.
Make sure that the time format in list is in accordance with that of the Camera when
importing allowlist.
You can search, and check whether some plate exist in the blocklist, import, and export Blocklist
plate number, and vehicle information.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Blocklist Search.
Step 2 The query, import, and export of blocklist is similar to those of allowlist. For details, see
"4.5.1.5.2 Allowlist".
You can set the barrier control mode, and configure information of opening, and closing barrier.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Barrier Control.
41
Table 4-18 Barrier control parameter description
Parameter Description
Select it, and enable the function of barrier always open. Configure
Barrier Always Open the period of barrier always open. The barrier will not close during the
defined period.
On Select it to enable barrier control, and configuration.
Triggers alarm through different modes, and remotely controls the
barrier opening and close.
● Every Trigger (Camera): Capture any vehicle, and output open
barrier signal.
● Every Plate (Camera): Capture any plated vehicle, and output
open barrier signal.
● Allowlist Open (Camera): Capture the vehicle which conforms to
Barrier Opening Control allowlist or fuzzy matching, and then output open barrier signal.
● Order (Server): Platform sends command, and output open
barrier signal.
4.5.1.6 RS-485
You can configure the RS-485 serial protocol of the external device. After configuration, you can set
related parameters of the device on Web.
Step 1 Select Setting > ITC > RS-485 > Trigger Mode.
Step 2 Configure parameters.
1) DHRS.
42
Table 4-19 DHRS parameters description
Parameter Description
Data Bit 8 by default, and cannot change.
Stop Bit 1 by default, and cannot change.
The transmission speed of the code element. Options are 4800,
Baud Rate
9600, 19200, 38400, 115200.
Check None by default, and cannot change.
2) RS-485 transparent transmission.
The third party platform can control the RS-485 output of the Camera through RS-485
transparent transmission, and then you can connect external devices.
Trigger capture through transmitting capture command. To test the RS-485 transparent
transmission sending, and receiving conditions, select Hexadecimal Sending, and
then click Open on the right side of Receiving Area.
Field Name Hover over the fields, you can see the explanations.
Quick Select the check box next to Field Name to select all the
configuration fields.
Format Format of the fields.
Common
Click to restore to commonly selected fields (default).
Config
43
Parameter Description
Up/Down Click to move the field position up or down.
Tag Head The tag head of data package. It is aabb by default.
Tag Tail The tag tail of data package. It is aa55 by default.
44
Parameter Description
● Rolling Speed: The rolling speed of the information on LED, including
Slow, Slightly Slow, Medium, Slightly Fast (default), and Fast.
Full Screen ● Passing Vehicle Info Retained: The display duration of the passing
vehicle information on LED, including 10 s, 20 s, 30 s (default), 40 s, 50
s, and 60 s.
● Display Color: Select information display color on LED.
● Display Action: Select information display action on LED from Fixed,
Single Screen
and Roll.
● Display Field: Right-click on a screen to select display field.
Step 3 (Optional) Click Redraw to change the LED display. You can select the drawing type,
display field, and other parameters referring to above parameter description.
Step 4 Click Confirm.
Configure the broadcast content, and the Camera will broadcast the content when vehicles passing.
If the Barrier Control is selected as Order (Server), Parking Fee, Parking Duration,
Expire At, and Entry/Exit Time will be available after the voice broadcast is controlled by
the platform.
45
Step 3 Configure parameters.
4.5.1.8.2 Volume/Encoding
You can test the barrier opening, and closing, capture, display content, voice broadcast, and
abnormal configuration modules to see if they work as configured. You can also export related
device information.
46
Step 1 Select Setting > ITC > Device Test > Device Test.
You can overlay recognition area box, snap line, filtering area box, vehicle box, and license plate box
on the snapshots to help check the effect of the capturing commissioning.
Step 1 Select Setting > ITC > Device Test > Capturing Commissioning.
Step 2 Select Overlay lines, and tracking info check box, and then select types as needed.
47
Figure 4-55 Capturing commissioning
4.5.2 Camera
You can configure image, video, and stream parameters.
4.5.2.1 Attribute
You can adjust the brightness, contrast, saturation of the video image, and set shutter parameters to
get clear videos, and recordings that you want.
4.5.2.1.1 General
This section provides guidance on configuring parameters such as image brightness, contrast,
saturation, and hue.
Step 1 Select Setting > Camera > Attribute > General.
48
Parameter Description
Change the value when the image brightness is proper but contrast is not
enough.
● If the value is too big, the dark area is likely to become darker, and the bright
area is likely to be overexposed.
Contrast
● The picture might be blurry if the value is set too small. The recommended
value is from 40 to 60, and the range is from 0 to 100.
It is 50 by default. The bigger the value is, the more obvious the contrast
between the bright area, and dark area will become.
Adjust the color vividness, and will not influence the image overall brightness.
● The image becomes too flamboyant if the value is too big.
● The image is not flamboyant enough if the value is too small. The
Saturation
recommended value is from 40 to 60, and the range is from 0 to 100.
It is 50 by default. The bigger the value is, the more flamboyant the image
becomes.
Adjust the image brightness level. The higher the value, the brighter, and blurry
Gamma
the image.
Illumination
Only supports IR illumination.
Mode
● Color: Applicable in the day, image shows in colors.
● B/W: Applicable at night, the image is black, and white.
Day&Night
Mode ● Auto Switch by Brightness: Set the brightness prevalue. When the
brightness is higher or lower than the prevalue, the image shows in colors or
black, and white respectively.
Brightness Prevalue of brightness. You can drag the slider to adjust the value. The higher the
Prevalue value, the brighter the video image.
● Always Off: Set the IR light to always on.
● Always On: Set the IR light to always off.
● Day/Night Mode: Automatically turn on or off the IR light according to the
IR Light
configured Day/Night mode.
4.5.2.1.2 Shutter
This section provides guidance on configuring camera shutter, including shutter mode, exposure
mode, gain mode, and scene mode.
Step 1 Select Setting > Camera > Attribute > Shutter.
49
Figure 4-57 Shutter
Shutter
You need to set shutter when set Mode to Manual.
WB
Mode Set scene mode to adjust the image to its best status.
50
Step 3 Click Save.
This section provides guidance on setting the measure mode of metering zone.
Step 1 Select Setting > Camera > Attribute > Metering Zone.
4.5.2.2 Video
4.5.2.2.1 Video
51
Figure 4-59 Video
Resolution
The resolution of sub stream cannot be greater than
main stream.
52
4.5.2.2.2 Snapshot
You can set the picture stream, including resolution, quality or picture size.
Step 1 Select Setting > Camera > Video > Snapshot.
Set interest area in the image, and then the selected image will display with configured quality.
53
Figure 4-61 Interest area
4.5.3 Network
You can set IP address, port, and other parameters.
4.5.3.1 TCP/IP
Configure the IP address of the Camera, and DNS server so that the Camera can connect with other
devices in the network.
Some models support dual network port. Do not set them in the same network segment; otherwise
it might cause network error.
Step 1 Select Setting > Network > TCP/IP.
54
Figure 4-62 TCP/IP
4.5.3.2 Connection
4.5.3.2.1 Port
You can set the maximum number, and value of the ports.
Step 1 Select Setting > Network > Connection > Port.
55
Figure 4-63 Port
4.5.3.2.2 ONVIF
You can enable the Open Network Video page Forum (ONVIF) function to make network video
products of different manufacturers interworking.
56
Figure 4-64 ONVIF
57
4.5.3.4 SMTP (Email)
Configure the email, and when alarms or abnormal events are triggered, an email will be sent to the
recipient server through SMTP server. The recipient can log in to the incoming mail server to receive
emails.
After enabling this function, system will send the device data to the given server. There is data
leakage risk.
Step 1 Select Setting > Network > SMTP (Email).
58
Parameter Description
Encryption Type Select encryption type from None, SSL, and TLS.
You can enter no more than 63 characters in English letters, and
Title
numbers.
Mail Receiver Email address of the receiver. Supports 3 addresses at most.
Attachment Select the check box to support attachment in the email.
Interval The interval of sending emails.
The system sends test mail to check whether the connection succeeds.
Health Mail Select the Health Mail check box, and configure the Update Period, and
then the system sends test mails according to the defined period.
Test whether the email function is normal. If the configuration is correct,
Test the email address of the receiver will receive the test email. Save the
email configuration before running rest.
Step 3 Click Save.
4.5.3.5 IEEE802
Step 1 Select Setting > Network > IEEE802.
Step 2 Select On check box to enable IEEE802, and then configure parameters.
59
Parameter Description
Password password-based credentials (username, and password).
EAP-TLS
Client Certificate Click Browse to import the client certificate, and private key files for
Private Key authentication.
Step 3 Click Confirm.
60
Parameter Description
Upload List Type Select the type of list that you want to upload.
Select the pushed picture type, including Original Image, Plate Picture,
Push Picture Config
and Vehicle Body Picture.
Upload Info Config Select the information that you want to upload.
Step 3 Click Save.
4.5.4 Event
This section provides guidance on configuring alarm, and abnormality.
4.5.4.1 Alarm
You can set several parameters of relay activation such as relay-in, period, anti-dither, and sensor
type. When triggering alarm, the system sends the alarm signal to external devices to trigger, for
example, buzz.
Step 1 Select Setting > Event > Alarm > Relay Activation.
Step 2 Select On checkbox to enable alarm input for the current channel.
Step 3 Select alarm input channel.
Step 4 Set the period of alarm input.
1) Click Setting.
61
Figure 4-70 Period
62
2) Click Setup corresponding to the day you need to configure time period.
3) Select the period you need to enable, and enter start time, and end time of
corresponding period.
4) If you need to apply this period setting to any other day, select the check box of
corresponding days.
5) Click Confirm.
You can repeat these steps to apply the settings to other days.
Step 5 Set other parameters.
4.5.4.1.2 Relay-out
4.5.4.2 Abnormality
Set relay-out mode of different events. When abnormality happens, system triggers alarm.
63
Step 1 Select Setting > Event > Abnormality.
Step 2 Select events from SD card, network error, illegal access, security exception and blocklist
car as needed.
Step 3 (Optional) Select event type. You only need to select this for SD card and network error.
Step 4 Click On to enable various abnormalities.
Step 5 Configure parameters of each event.
Capacity Limit
Only need to configure when setting Event Type to Scarcity of Storage
Space in SD Card.
Configure the number of login error allowed. The range is 3–10 times.
Login Error
Only need to configure when setting Illegal Access.
The system sends an email to the defined email address when an alarm is
triggered. To set the email address, go to Setting > Network >
SMTP(Email).
Send Email
Only need to configure when setting Illegal Access and Blocklist Car.
Step 6 Click Confirm.
4.5.5 Storage
This section provides guidance on setting associated information of storage, and record control.
64
4.5.5.1 Point
Set the storage path of snapshot.
Step 1 Select Setting > Storage > Destination > Point.
4.5.5.2 Local
Display the information of local SD card. You can set hot swap, and format SD card.
4.5.5.3 FTP
FTP function can be enabled only when it is selected as destination path. When the network does
65
not work, you can save all the files to the internal SD card for emergency.
You can set picture name, and storage path. Click Help... to view naming rule.
Step 1 Select Setting > Storage > Destination > FTP.
66
Parameter Description
Password
Upload Type Select event(s), and picture type(s) to be uploaded to the FTP server.
Step 3 Click Confirm.
4.5.5.4 Client
You can set the parameters of storing to client.
Step 1 Select Setting > Storage > Destination > Client.
67
Figure 4-77 Storage path
Step 2 According to your actual requirement, set the name of picture, and storage path. See
Help... for more details.
Step 3 Set the root path for recordings and snapshots.
Step 4 Click Confirm.
4.5.6 System
You can configure general information, adding user, restoring default settings, and configuring
import & export file.
4.5.6.1 General
This section provides guidance on configuring device SN, language, and video standard.
Step 1 Select Setting > System > General Setting > General Setup.
68
Table 4-40 General parameters description
Parameter Description
Device SN The ID number of the Camera. Supports English letters, and numbers.
Device Code Device Code Failed to support OSD information overlay.
The language displayed on web. The language will be automatically
Language
switched after logging in web again. Currently it only supports English.
● PAL: Phase Alternating Line. Currently most countries around the
world (including most countries in Europe, Africa, Australia, and China)
Video Standard adopt this standard.
● NTSC: National Television System Committee. The main countries
which adopt this standard include America, Canada, and Japan.
Machine Group The company group information of the Camera.
Machine Address Set the location information of device capture.
Step 3 Click Confirm.
You can set date, and time format, system time, DST (Daylight Saving Time) or NTP server, and more.
Step 1 Select Setting > System > General > Date&Time.
69
Parameter Description
Set current system time of the Camera. It becomes valid immediately
System Time
after setting.
Sync PC Sync the time of the Camera with the time on PC.
Enable the function, and then set begin time, and end time of DST
DST
according to date or week.
NTP Setting Select to enable the function of network time synchronization.
NTP Server Time server address.
Port Port number of time server.
Time Zone The time zone where the Camera is located.
Interval The sync interval between device, and time server.
Step 3 Click Confirm.
4.5.6.2 Account
4.5.6.2.1 Account
The system supports configuring operation user of web. You need to configure user group before
configuring user account.
● The user with Account control authority can also change the password of other users.
● It is recommended to give fewer authorities to normal users than premium users to make user
management convenient.
● Cannot delete the user in login status.
You can add, delete or modify user.
Procedure
Step 1 Select Setting > System > Account > Account > Username.
70
Figure 4-81 Add user
71
● The system supports max 8 user groups, and the default initialization user groups are
admin, and user.
● You can modify, and delete the added user group, but not the initialization user group.
Step 6 Click Add Group, and then enter the name of user group, and configure group authority.
● Group Name can only consist of number, letter, underline, and hyphen, the maximum
length contains 15 characters.
● Group cannot be repeated.
Related Operations
After adding user/group, click to change user/group information; click to delete the added
user/group.
You can add, delete, modify Onvif (Open Network Video page Forum) on the user management
page.
72
Step 1 Select Setting > System > Account > Onvif User.
73
4.5.6.3 Safety
74
4.5.6.3.2 HTTPS
Prerequisites
● For first-time use of HTTPS or after changing device IP address, you need to create server
certificate, and install root certificate.
● After creating server certificate, and installing root certificate, if it replaces the PC, which logs in
to the web page, then it needs to download, and install the root certificate again on the new PC
or copy the downloaded root certificate on the new PC, and install.
On the HTTPS page, users can make PC log in normally through HTTPS by creating certificate or
uploading authenticated certificate. It can ensure security of communication data, and provide
guarantee for user information, and device safety through reliable, and stable technical approach.
Procedure
Step 1 Create certificate or upload the authenticated certificate.
● If you select Create Certificate, follow the steps below.
1. Select Setting > System > Safety > HTTPS.
2. Click Create.
75
3. Enter the required information such as region, IP or domain name, and then click
Create.
The entered IP or Domain name must be the same as the IP or domain name of the
Camera.
4. Click Install under Request Created, and then click Download to download root
certificate.
The system pops up Save As dialog box, select storage path, and then click Save.
5. Double-click the RootCert.cer icon.
6. Click Install Certificate…
7. Click Next.
The Certificate Store page is displayed. You can select automatically select the
certificate store based on the type of certificate or place all certificates in custom
certificate store.
76
Figure 4-90 Certificate store
8. Click Next.
9. Click Finish.
77
10. Click Yes, and then click OK on the pop-up window.
● If you select install signed certificate, follow the steps below.
1. Select Setting Safety > System > Safety > HTTPS.
2. Select Enable HTTPS, and Compatible with TLSv1.1, and earlier versions.
3. Click Browse to upload the signed certificate, and certificate key, and then click
Upload.
4. To install the root certificate, see operation steps from 1.d to 1.j in Create
Certificate.
Step 2 Select Enable HTTPS, and click Confirm.
The configuration takes effect until the Camera restarts.
Step 3 Use HTTPS to log in to the Camera.
1. Enter https://xx.xx.xx.xx in the browser.
4.5.6.3.3 Firewall
Set the security rules to protect the safety of your camera system.
Step 1 Select Setting > System > Safety > Firewall.
78
4.5.6.4 Default Settings
You can restore the device to default settings or factory defaults.
Select Setting > System > Default, and then select Default or Factory Default as needed.
● Default: Restore your settings to default value. In this case, network IP address information of the
Camera will not restore to default settings.
● Factory Default: Restore the system to factory default settings. In this case, the Camera will
restart, and you need to initialize the Camera before any further operation.
4.5.6.5 Import/Export
Export the system configuration file to back up the system configuration; import system
configuration file to make quick configuration or recover system configuration.
Step 1 Select Setting > System > Import/Export.
79
Table 4-45 Auto maintain parameter description
Parameter Description
● Select, and set restart period, and time.
Auto Reboot ● The system will automatically restart within the defined period, and
time.
Auto Delete Old Files Customize time, and delete all the old files before the time.
Manual Reboot Manually restart the Camera.
Step 3 Click Confirm.
4.5.7 Information
The system supports viewing version, user, and log, and more.
4.5.7.1 Version
You can view the version information of the Camera.
Select Setting > Information > Version .
80
● Versions of different devices might vary, depending on the actual web page.
● Algorithm recognition is available when algorithm is authorized (when the icon is displayed in
green). If algorithm is not authorized, the Camera will not be able to recognize vehicle series,
model, and logo. License plate recognition is always supported.
4.5.7.2 Log
You can view log information such as system, configuration, data, event, record, user management,
and also clear log records.
The earliest log records will be overwritten when the number of log records reaches 1024.
Step 1 Select Setting > Information > Log > Log.
Step 2 Enter Start Time, and End Time, and then select log type.
Step 3 Click Search, and it can start searching according to requirement.
Step 4 View, back up, and clear the searching results.
81
Backup: Backup the searched system log information to local. The backup file is in .txt
format.
You can save your important logs to log server. This helps provide important clues to the source of
security incidents. Log server needs to be deployed in advance by a professional or system
administrator.
Step 1 Select Setting > Information > Log > Remote Log.
Enable this function can collect operation log in real time, which can be used to troubleshoot in the
future.
Step 1 Select Setting > Information > Log > Operation Log Collection.
Step 2 Check On to enable the log collection.
82
Step 5 Click Confirm.
4.6 Alarm
Click the Alarm tab, and then you can select alarm type, operation, and alarm tone.
83
Figure 4-105 Alarm
4.7 Logout
Click Logout to exit the system. You need to log in again for access.
84
5 FAQ
Question Solution
Device error, unable to start or Press, and hold Reset button for 5 seconds to restore the
operate normally Camera to factory default Settings.
Stop recording, and image capturing, and then wait for at least
TF card hot swapping 15 seconds before removing the TF card. This helps ensure data
integrity, and avoid losing all the data of the card.
Do not set the TF card as the storage media of pre-set
TF card read/write limit
recording. It may damage the TF card duration.
TF card cannot be used as When the TF card hibernates or its capacity is null, format the
storage media card through web first.
Check whether the right upgrade program (such as version,
Network upgrade failed
compatibility) is used.
It is recommended to use TF card of 16 GB or above. This helps
Recommended TF card avoid data loss arising from insufficient capacity.
You can use card of 16 GB, 32 GB, 64 GB, and 128 GB.
Failed to pop up the
Set the security level of IE browser as Low, and Active Plug-in,
installation dialog box of web
and Control is set to Enable.
control webrec.cab
85
Appendix 1 Cybersecurity Recommendations
86
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save
the log for a long time, it is recommended that you enable the network log function to ensure
that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to
use VLAN, network GAP and other technologies to partition the network, so as to achieve
the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
87
Access ANPR Camera
Web Operation Manual
V1.1.0
Foreword
General
This manual introduces the functions and operations of the access ANPR camera (hereinafter
referred to as "the Camera").
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Revision History
Revision Content Revision Content Release Time
V1.1.0 Updated functions under ITC. November 2021
Updated the focal length of 437 and 415
V1.0.2 July 2021
models of camera.
V1.0.1 Added camera models. March 2021
V1.0.0 First release. November 2019
I
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, comply with the guidelines
when using it, and keep the manual safe for future reference.
Transportation Requirements
Storage Requirements
Installation Requirements
● Do not connect the power adapter to the device while the adapter is powered on.
● Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the device.
● Do not connect the device to two or more kinds of power supplies, to avoid damage to the
device.
● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the device in a place exposed to sunlight or near heat sources.
● Keep the device away from dampness, dust, and soot.
● Put the device in a well-ventilated place, and do not block its ventilation.
● Use an adapter or cabinet power supply provided by the manufacturer.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the device label.
● The device is a class I electrical appliance. Make sure that the power supply of the device is
connected to a power socket with protective earthing.
Operation Requirements
III
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings............................................................................................................................................ III
1 Introduction ............................................................................................................................................................................................ 1
1.1 Overview ........................................................................................................................................................................................ 1
1.2 Features .......................................................................................................................................................................................... 1
2 Web Configuration .............................................................................................................................................................................. 3
2.1 Web Login...................................................................................................................................................................................... 3
2.1.1 Recommended System Requirements ................................................................................................................. 3
2.1.2 Device Initialization....................................................................................................................................................... 4
2.1.3 Login ..................................................................................................................................................................................... 6
2.1.4 Resetting Password ....................................................................................................................................................... 6
2.1.5 Web Functions .................................................................................................................................................................. 8
2.2 Guide ................................................................................................................................................................................................ 8
2.3 Live.................................................................................................................................................................................................... 9
2.3.1 Video Stream................................................................................................................................................................... 10
2.3.2 Live View ...........................................................................................................................................................................10
2.3.3 Recognized Plate Number ........................................................................................................................................11
2.3.4 Plate Snapshot ...............................................................................................................................................................11
2.3.5 System Functions..........................................................................................................................................................11
2.3.6 Functions of the Live Page ....................................................................................................................................... 11
2.3.7 Vehicle Snapshot ..........................................................................................................................................................13
2.3.8 Event List...........................................................................................................................................................................13
2.4 Query .............................................................................................................................................................................................13
2.4.1 Image Search................................................................................................................................................................... 13
2.4.1.1 SD Picture...............................................................................................................................................................13
2.4.1.2 PC Picture ...............................................................................................................................................................14
2.4.2 Recording Search ..........................................................................................................................................................15
2.4.2.1 Recording...............................................................................................................................................................15
2.4.2.2 Watermark.............................................................................................................................................................15
2.4.3 Capture Record Search...............................................................................................................................................16
2.4.4 Alarm Output Search ..................................................................................................................................................17
2.5 Setting ...........................................................................................................................................................................................17
2.5.1 ITC .........................................................................................................................................................................................18
2.5.1.1 Setting Snapshot................................................................................................................................................18
2.5.1.2 Intelligence ...........................................................................................................................................................20
IV
2.5.1.2.1 Configuring Intelligent Analysis ..................................................................................................... 20
2.5.1.2.2 Selecting Recognition Scene .............................................................................................................21
2.5.1.3 Configuring OSD ................................................................................................................................................21
2.5.1.3.1 Video OSD ...................................................................................................................................................21
2.5.1.3.2 Snapshot OSD ...........................................................................................................................................23
2.5.1.4 Configuring Cutout ...........................................................................................................................................24
2.5.1.4.1 Snapshot Cutout...................................................................................................................................... 24
2.5.1.4.2 Plate Overlay .............................................................................................................................................25
2.5.1.5 Setting Blocklist and Allowlist ....................................................................................................................25
2.5.1.5.1 Allowlist .......................................................................................................................................................25
2.5.1.5.2 Blocklist........................................................................................................................................................27
2.5.1.6 Configuring Barrier Control..........................................................................................................................27
2.5.1.7 Configuring RS-485...........................................................................................................................................28
2.5.1.8 Configuring RS-485 External........................................................................................................................30
2.5.1.9 Setting Time Schedule..................................................................................................................................... 31
2.5.1.10 Setting RS-485 LED Display........................................................................................................................32
2.5.1.11 Configuring Voice Broadcast ....................................................................................................................33
2.5.1.11.1 Broadcast Content ...............................................................................................................................33
2.5.1.11.2 Volume/Encoding................................................................................................................................. 34
2.5.1.12 Setting Device Test.........................................................................................................................................35
2.5.1.12.1 Device Test...............................................................................................................................................35
2.5.1.12.2 Capturing Commissioning ...............................................................................................................36
2.5.1.12.3 Operation Log Collection .................................................................................................................36
2.5.2 Camera ...............................................................................................................................................................................36
2.5.2.1 Configuring Camera Attributes ..................................................................................................................37
2.5.2.1.1 General .........................................................................................................................................................37
2.5.2.1.2 Shutter..........................................................................................................................................................38
2.5.2.1.3 Metering Zone ..........................................................................................................................................39
2.5.2.2 Configuring Video Parameters ...................................................................................................................40
2.5.2.2.1 Video .............................................................................................................................................................40
2.5.2.2.2 Snapshot......................................................................................................................................................41
2.5.2.2.3 Interest Area ..............................................................................................................................................42
2.5.3 Network .............................................................................................................................................................................42
2.5.3.1 Configuring TCP/IP............................................................................................................................................43
2.5.3.2 Configuring Port.................................................................................................................................................43
2.5.3.3 Configuring DDNS .............................................................................................................................................44
2.5.3.4 Configuring Auto Register ............................................................................................................................44
2.5.3.5 Configuring Multicast ...................................................................................................................................... 45
V
2.5.3.6 Configuring SMTP (Email)..............................................................................................................................45
2.5.3.7 Configuring SNMP .............................................................................................................................................47
2.5.3.8 Configuring IEEE802.........................................................................................................................................47
2.5.3.9 Configuring PPPoE ............................................................................................................................................48
2.5.3.10 Configuring Platform .................................................................................................................................... 49
2.5.3.10.1 ONVIF .........................................................................................................................................................49
2.5.3.10.2 Info Push Platform ...............................................................................................................................49
2.5.4 Event ...................................................................................................................................................................................50
2.5.4.1 Alarm ........................................................................................................................................................................50
2.5.4.1.1 Relay Activation....................................................................................................................................... 50
2.5.4.1.2 Relay-out .....................................................................................................................................................51
2.5.4.2 Abnormality..........................................................................................................................................................52
2.5.5 Storage ...............................................................................................................................................................................53
2.5.5.1 Point .........................................................................................................................................................................53
2.5.5.2 Local..........................................................................................................................................................................53
2.5.5.3 FTP .............................................................................................................................................................................54
2.5.5.4 Client ........................................................................................................................................................................55
2.5.5.5 Save Path................................................................................................................................................................56
2.5.6 System ................................................................................................................................................................................56
2.5.6.1 General .................................................................................................................................................................... 56
2.5.6.1.1 General Setup ...........................................................................................................................................56
2.5.6.1.2 Date & Time................................................................................................................................................57
2.5.6.2 Account ................................................................................................................................................................... 58
2.5.6.2.1 Account ........................................................................................................................................................58
2.5.6.2.2 ONVIF User .................................................................................................................................................61
2.5.6.3 Safety ....................................................................................................................................................................... 62
2.5.6.3.1 System Service..........................................................................................................................................62
2.5.6.3.2 HTTPS ............................................................................................................................................................63
2.5.6.3.3 Firewall .........................................................................................................................................................66
2.5.6.4 Default Settings ..................................................................................................................................................66
2.5.6.5 Import/Export ......................................................................................................................................................67
2.5.6.6 System Maintenance ........................................................................................................................................67
2.5.6.7 System Upgrade .................................................................................................................................................67
2.5.7 Information ...................................................................................................................................................................... 68
2.5.7.1 Version .................................................................................................................................................................... 68
2.5.7.2 Log .............................................................................................................................................................................69
2.5.7.2.1 System Log .................................................................................................................................................69
2.5.7.2.2 Remote log .................................................................................................................................................69
VI
2.5.7.3 Online User............................................................................................................................................................70
2.5.7.4 Running Status ....................................................................................................................................................70
2.6 Alarm..............................................................................................................................................................................................70
2.7 Logout ...........................................................................................................................................................................................71
3 FAQ ............................................................................................................................................................................................................72
Appendix 1 Cybersecurity Recommendations ........................................................................................................................73
VII
1 Introduction
1.1 Overview
The access ANPR camera adopts intelligent deep learning algorithm. It supports vehicle detection,
license plate recognition, logo recognition, model recognition, and color recognition, and encoding
mode such as H.265.
The Camera consists of protective housing, illuminator, and intelligent HD camera. The intelligent
HD camera adopts progressive scanning CMOS, which owns several features such as high definition,
low illuminance, high frame rate, and excellent color rendition.
The Camera is extensively applied to vehicle capture, and recognition of community road, parking
lot, and other entrance, and exit surveillance.
1.2 Features
The features are available on select modes, and might differ from the actual camera.
Permission Management
● Each user group owns permissions. Permissions of a user cannot exceed the permissions of its
group.
● 2 user levels.
● Permission of opening barrier, and blocklist alarm function.
● Device configuration, and permission management through Ethernet.
Storage
● Stores corresponding video data onto the central server according to the configuration (such as
alarm, and timing settings).
● Users can record through web according to their requirements. The recorded video file will be
stored on the computer where client is located.
● Supports local hot swapping of storage card, and storage when network disconnected. It
overwrites stored pictures, and videos automatically when memory becomes insufficient.
● Stores 1024 log records, and user permission control.
● Supports FTP storage, and automatic network replenishment (ANR).
Alarm
● It can trigger alarm upon camera operation exceptions through network, such as memory card
damage.
● Some devices can connect to various alarm peripherals to respond to external alarm input in real
time (within 200 ms). It can correctly deal with various alarms according to the linkage
predefined by users, and generate corresponding voice prompt (users are allowed to record
voice in advance).
1
Network Monitoring
● Transmits video data of single channel compressed by device to network terminal, and make it
reappear after decompression through network. Keep delay within 500ms when bandwidth is
allowed.
● Supports maximum 10 users online at the same time.
● Supports system access, and device management through web.
● Video data transmission adopts HTTP, TCP, UDP, MULTICAST, and RTP/RTCP.
Peripheral Control
● Peripheral control: Supports setting various peripheral control protocols, and connection pages.
● Connects to external devices such as vehicle detector, signal detector, and more.
Auto Adjustment
● Auto iris: Automatically adjusts the iris opening to the changing light throughout the day.
● Auto white balance: Accurately displays the object color when light condition changes.
● Auto exposure: Automatically adjusts shutter speed according to the exposure value of the
image measured by the metering system, and according to shutter, and iris exposure set by
factory defaults.
● Auto gain: Automatically increases camera sensitivity when illuminance is very low, enhancing
image signal output so that the Camera can acquire clear, and bright image.
2
2 Web Configuration
It supports logging in to device web page through browser on PC, and realizes device configuration,
operation, and management.
The pages, and settings are for reference only, and might differ from the actual page.
◇ If you are using a system which is at a lower performance, we recommend you use substream
to eliminate video lags.
◇ When using a 4 MP camera, adjust the video frame rate to 15 fps.
3
PC Component Recommended System Requirements
Graphics Intel HD Graphics, and later
RAM 16 GB, and larger
Monitor 1024 × 768, and higher
Browser Chrome 92 and newer
Browsers that do not support plug-in might have trouble displaying certain videos and images, or
downloading data in batches. The Camera reminds you when that happens.
4
● If you want to change your password again, go to Setting > System > Account >
Account.
Step 5 Select the Email Address checkbox, and then enter your email address (recommended to
set for resetting your password).
Step 6 Click Confirm.
Step 7 Enter the username, and password, and then click Login.
● The Camera prompts when the username or password is incorrect to reminds you of
remaining attempts.
● The account will be locked for 300 s if you enter incorrect username or password for 5
times consecutively.
Step 8 Click Please click here to download, and install the plug-in in the video window.
The system automatically downloads webplugin.exe, and installs it according to prompt.
5
Before installing plug-in, make sure that the associated plug-in option of active has been
modified as Enable or Prompt in Internet Option > Security > Settings .
The Camera prompts authorization failed when there is no operation on the web page for
a long time. In this case, you need to log in again.
2.1.3 Login
You can log in to the web page by following the steps below. For first-time login or login after
restoring factory default settings, see "2.1.2 Device Initialization".
Step 1 Enter the IP address of the Camera in the browser address bar, and then press Enter.
Step 2 Enter your login username, and password, and then click Login.
● When scanning QR code to acquire the security code, one QR code supports up to 2 acquisition.
● the security code received through email is only valid for 24 hours.
● One device can generate up to 10 security codes in one day, so you can change the password 10
times at most in one day.
● Email address must be filled in during device initialization; otherwise you will not receive the
security code. The email address of admin can be modified under Setting > System > Account >
Account.
Step 1 Open the browser, enter the IP address of the Camera in the browser address bar, and then
press Enter.
Step 2 Click Forgot password?
6
Figure 2-5 Information
If you use IE browser, the system might prompt Stop running the script, click No, and
continue to run the script.
Step 4 Scan the QR code according to the page prompt, and send the scanning result to
designated email to get the security code.
Step 7 Set Password, and enter your new password again in Confirm Password.
Step 8 Click Yes.
7
2.1.5 Web Functions
This section mainly introduces the following 6 functions on the web page.
2.2 Guide
On the Guide page, you can configure capture scenarios, and get assistance with setting installation
scenario.
You can click at the upper-right corner of the Guide page to exit.
Step 1 Click the Guide tab.
Step 2 Select the basic date and time format and system time of the Camera, and then click
Confirm.
● You can manually enter the time, or click Sync PC to synchronize time from the server.
● Select Plate Algorithm based on the actual region to get better recognition effect.
8
Figure 2-9 Basic parameter
Step 3 Click Drawing to see whether the video image is properly zoomed, and focused by
checking the plate pixel.
1) Drag zoom, and focus bar to adjust the video image until the image is clear.
2) Follow the tips on the figure on the right side, draw the capture area of entering
vehicles.
3) Click Add next to Shield Area to draw areas where the Camera does not recognize.
Click Delete to delete the area.
4) Realtime Display window in the middle displays the plate recognition result cutout at
the upper-left corner and vehicle image in real-time.
5) Click Save.
Step 4 Click Finish, and then click Finish in the middle to exit the Guide page.
You can always click Back to go back to the last step during the guide.
2.3 Live
Click the Live tab.
9
On this page, it can realize several functions such as live video, live picture, real-time capture, record,
and config (LPR), and more.
10
Figure 2-12 Big window
● : Click to enable smart track detection. Plate number, vehicle bounding box, and other smart
tracking information will be displayed on the video image.
● : Click to display the window in full screen; double-click or right-click to exit full screen.
11
Icons Name Description
Record Type Select the format of video recordings (dav by default).
Click Talk, and you can communicate with people on site
Talk
through the camera.
Click to take a snapshot when a vehicle passes. The snapshot is
saved in the storage path.
Manual
Snapshot ● Enable ANPR Receive first.
● To change the storage path of snapshots, go to Setting >
Storage > Destination > Save Path.
Drag to select any area in the video window, and then the area
Digital Zoom will be zoomed in. In any area of the video window, click
or right-click to exit.
Click it to start recording. Click again to stop recording.
Video
You can set the storage path of video recordings in Setting >
Recording
Storage > Destination > Save Path.
You can draw the area of plate detection, adjust camera’s focal
Config (LPR)
length, and set applicable region.
Step 1 Click to configure LPR.
Step 2 Set the focus and zoom mode, which is used to recognize vehicle.
12
Parameter Description
● Zoom: Click to zoom in, click to zoom out. You can also directly
drag the adjustment bar.
● Focus: Click to focus on far places, click to focus on near places.
Manual Focus
You can also directly drag the adjustment bar to set focal length.
● Speed: There are 3 levels to be selected. The higher the speed, the more
obvious the adjustment.
Restore All Restore all configurations to default settings.
Click Add to draw a shield area on the video image where the Camera does
Shield Area
not detect.
Click Illumination, and the page is directed to the Camera attribute. You
Illumination
can set the illumination there.
Select the algorithm to recognize the plate. The recognized result is
Plate Algorithm
displayed below.
Step 3 Click Confirm to save the configuration.
2.4 Query
Click the Query tab, and the system displays query page where you can search for pictures, and
video recordings.
2.4.1.1 SD Picture
Search conditions can be set in this section. You can search for event, and plate information of the
SD card within the set period.
Step 1 Select Query > Image Search > SD Card Image.
13
Figure 2-15 SD Picture
2.4.1.2 PC Picture
The section introduces the way of checking whether the watermark of PC picture is tampered.
Step 1 Select Query > Image Search > PC Picture.
Step 2 Click Browse, and select the folder where the verified picture is located.
Step 3 Select the picture which needs to be verified, and then click Open.
Step 4 Click Watermark. The Camera starts verifying whether the picture has watermark and
displays the results on the picture list under Watermark Verification.
14
Select pictures and click Open or double-click the picture if you need to preview the
picture.
2.4.2.1 Recording
You can set video play of local PC on this page.
Step 1 Select Query > Recording Search > Recording.
Step 2 Click Browse, select record path, click Open, and view the video.
2.4.2.2 Watermark
You can verify whether the watermark of local recordings is tampered.
15
Go to Setting > Camera > Video > Video, and select Watermark Settings to enable the function,
and set the corresponding Watermark Character. The default character is DigitalCCTV.
Step 1 Select Query > Recording Search > Water Mark.
Step 2 Click Browse, and select a file that you want to verify.
Step 3 Click Watermark, and the system displays verifying progress and normal watermark.
The page of Watermark Verification Completed appears after verification, and the
results show under Tampered Watermark.
● It supports max 10,000 records or 1,024 records respectively when the Camera is installed with or
without TF card.
● If the passing vehicle records are unreadable in Excel after being imported, change them into
UTF-8 encoding document in txt, and then they can be opened normally.
Step 1 Select Query > Capture Record Search.
Step 2 Set Begin Time, and End Time, and then set the Direction (vehicle movement direction,
including Approaching, Departing, and Unknown).
Step 3 Click Search to search for the plates that meet the search conditions.
16
Figure 2-19 Capture records
Step 4 Click Export All or Export by Time to export all results or the searched results based on
the conditions to PC.
Make sure that all the external devices are connected with the Camera through RS-485 port.
Step 1 Select Query > Alarm Output Search.
Step 2 Set the start time and end Time.
Step 3 Click Search.
Click Export All or Export by Time to export all results or the searched results.
2.5 Setting
You can configure several parameters such as ITC, camera, network, event, storage, system, and
system information.
17
2.5.1 ITC
You can set intelligent parameters of the Camera.
18
Table 2-9 Description of capture parameters
Type Parameter Description
● Loop: Use loop to take snapshots.
● Video: Use video to take snapshots.
Snap Mode
● Mix Mode: Use both loop and video to take
snapshots.
Number of
It can take 1–2 snapshot(s).
Snapshots
General
Parameters ● Approaching: Only captures vehicles that
approach.
Capture Direction ● Departing: Only captures vehicles that depart.
● Two-way: Captures vehicles that approach or
depart.
Same Plate Set the time interval during which one plate can
Filtering Time only be captured once.
Scene Select Small Vehicle or Large Vehicle as needed.
UnlicensedMotor Click to enable the capture towards unlicensed
Video Mode Category motor vehicles.
Parameters
Configure the frame number of capturing licensed
Licensed Vehicle vehicle. 1 (default) means to capture when
Only available Frame Threshold detecting one frame of licensed vehicle passing
when the Snap detection area.
Mode is set to Configure the frame number of capturing
Video. Unlicensed Vehicle unlicensed vehicle. 10 (default) means to capture
Frame Threshold when detecting 10 frames of unlicensed vehicle
passing detection area.
Set the scheme of snapshots triggered by the loop.
● Single_in_1: Lay single loop, and it will take a
snapshot when the vehicle enters a loop.
● Double_in_1: Lay double loops, and it will take
Scheme a snapshot when the vehicle enters the first
loop.
Loop Mode
Parameters ● Double_in_2: Lay double loops, and it will take
a snapshot when the vehicle enters the second
loop.
Only available
when the Snap Select the corresponding relationship between
Mode is set to logical loop and physical loop.
Loop.
Loop Mapping ● When the scheme is single_in_1, only need to
select the physical loop corresponds to logical
loop 1.
● You need to configure this in mix mode.
Loop1 Set the loop trigger mode.
19
Type Parameter Description
● Not triggered: No capture is triggered.
● Rise Edge: Capture is triggered when the
vehicle enters loop.
● Fall Edge: Capture is triggered when the
Loop2 vehicle exits the loop.
2.5.1.2 Intelligence
You can set vehicle recognition parameter, recognition mode, and some other functions.
Step 1 Select Setting > ITC > Intelligence > Intelligent Analysis.
20
Parameter Description
Configure advanced vehicle recognition function through algorithm.
Advanced Parameter
Click to view the advanced algorithm formula.
Step 3 Click Confirm.
You can configure the advanced functions of plate recognition, and customize special functions.
Step 1 Select Setting > ITC > Intelligence > Scene.
21
Figure 2-25 Video OSD
22
Figure 2-27 Custom
Click to add more custom OSD information. The system supports up to 6 customized
regions.
Step 6 Click Confirm.
Step 2 Move the title box to displayed location, or manually enter coordinate value into the X/Y
box at the lower-right corner of the page.
Step 3 Select Black Edge Location, and then you can set the position of the OSD black strip. You
can select from Top, Bottom, and None.
Step 4 Set the font size and color of OSD information in .
Step 5 Click More.
Step 6 Select NewLine, and then select separator types of OSD information.
23
Figure 2-29 Add a new line
You can manually enter other separators when selecting Custom from Osd Separator.
Step 7 Set OSD options.
Enable plate cutout function, and the system will cut out the recognized plate picture, and save it to
the storage path.
Step 1 Select Setting > ITC > Cutout > Cutout.
24
2.5.1.4.2 Plate Overlay
You can select whether to overlap the plate image onto the snapshot, and set the overlap position
and size.
Step 1 Select Setting > ITC > Cutout > Plate Overlay.
Step 2 Configure parameters.
2.5.1.5.1 Allowlist
Add vehicles into the allowlist and if the barrier control is set to Allowlist Open (Camera), only
vehicles on the allowlist can pass.
Procedure
Step 1 Select Setting > ITC > Allowlist > Blocklist and Allowlist.
Step 2 Enter a plate number and then click Search.
If the plate is on the allowlist, its detailed information will be displayed.
25
Step 3 Click Add, and enter details of a plate to add it into the allowlist.
Select Continue Adding, and click Save to continue adding another plate.
Step 10 Select Plate Fuzzy Match, and then based on the actual situation, select options below
26
which clarify the rules of fuzzy matching.
● You can select the number of allowed misread characters (1–2).
● Click Add Pairs to add more pairs of allowed misread characters, such as the pair of S-5.
Allow the system to misread some of the characters on the plate is enabled by default.
Related Operations
● Edit plate information: Click of the corresponding plate number searched, and edit the plate
number. Click Save.
● Delete single plate number: Click of the corresponding plate number searched, and delete it
from the allowlist.
● Delete plate number in batches: click Clear All, and then click Confirm in the pop-up window to
delete all the allowlist information.
● Click Clear Invalid Data to delete vehicles whose allowlist permissions have expired.
2.5.1.5.2 Blocklist
When a vehicle is on the blocklist, and the Camera recognizes it, an alarm will be triggered.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Blocklist.
Step 2 The search, import, and export of blocklist is similar to those of allowlist. For details, see
"2.5.1.5.1 Allowlist".
27
Figure 2-37 Barrier control
You can set barrier opening control to Allowlist Open (Camera), and
Order (Server) at the same time. Allowlist Open (Camera) takes
priority.
Barrier Opening ● Relay-out: Alarm linkage output port. You can select any one of the
Config 3 ports.
Barrier Closing ● Signal Duration: The duration that the barrier opening or closing
Config signal lasts.
Step 3 Click Confirm.
28
Step 1 Select Setting > ITC > RS-485 > Trigger Mode.
Step 2 Configure parameters.
The Camera supports multiple protocols.
● DHRS
You can select external devices on the right side which support DHRS protocol.
29
When there are two ports, serial port push protocol is unavailable for port 1.
30
Figure 2-41 External light
1. Select Yes next to Check Status to enable the status checking of the connected
continuous lights.
2. Set the Work Mode of the continuous light, which can be Always On, Always Off,
Auto by Time and Auto by Ambient Brightness.
● When setting Work Mode to Auto by Time, you need to set the time schedule for
the continuous light to follow. Refer to "2.5.1.9 Setting Time Schedule" for details.
● When setting Work Mode to Auto by Ambient Brightness, you need to set the
brightness prevalue of for the continuous light to follow.
Step 4 Set the Illumination Intensity of the continuous light.
Step 5 Click Confirm.
Step 2 Double-click each green line to clear the schedule for each day based on the actual
situation, and then you can set the schedule as needed.
31
1. Draw the period on the time bar, and then click Setting.
2. The drawn periods are synced to the table below, which shows all periods on one day.
3. You can manually change the time for each period.
Step 3 Click Confirm.
32
Section Parameter Description
Set the color and action of display information when vehicles
Display Status pass under normal state. The LED screen will display
information as configured during the period of either status.
Rolling
The rolling speed of the information on LED.
Speed
Passing
Vehicle Info The display duration of the passing vehicle information on LED.
Retained
● Ambient Adaptive: The LED adjusts its brightness
Full Screen according to the ambient brightness. Set the Augment
Brightness Brightness, the higher the value, the bigger the brightness
Adjustment change.
● Manual: Manually adjust the LED brightness by setting the
Intensity.
● Auto: Set the time interval for the LED to do self-check.
Self Check
● Never: The LED does no self-check.
Step 3 Click Confirm.
Configure the broadcast content, and the Camera will broadcast the content when vehicles pass.
33
If the Barrier Control is set as Order (Server) and the voice broadcast is controlled by the
platform, Parking Fee, Parking Duration, Expires at, Entry Time and Exit Time will be
available.
2.5.1.11.2 Volume/Encoding
34
Figure 2-45 Volume/Encoding
You can test the barrier opening and closing, capture, display content, voice broadcast, and
abnormal configuration modules to see if they work as configured. You can also export related
device information.
Step 1 Select Setting > ITC > Device Test > Device Test.
35
Parameter Description
Abnormal Config Click Check, and system checks abnormality automatically.
Export Device Info Select device information as needed, and export in batches.
You can overlay recognition area box, snap line, filtering area box, vehicle box, and license plate box
on the snapshots to help check the effect of the capturing commissioning.
Step 1 Select Setting > ITC > Device Test > Capturing Commissioning.
Step 2 Select Overlay lines and tracking info checkbox, and then select types as needed.
The Camera supports collecting operation logs to track back when error happens.
Step 1 Select Setting > ITC > Device Test > Operation Log Collection.
Step 2 Select On to enable collecting operation logs.
2.5.2 Camera
You can configure image, video, and stream parameters.
36
2.5.2.1 Configuring Camera Attributes
You can adjust the brightness, contrast, saturation of the video image, and set shutter parameters to
get clear videos and recordings that you want.
2.5.2.1.1 General
This section provides guidance on configuring parameters such as image brightness, contrast,
saturation, and hue.
Step 1 Select Setting > Camera > Attribute > General.
37
Parameter Description
Adjust the image brightness level. The higher the value, the brighter, and blurry
Gamma
the image.
Illumination
Only supports IR illumination.
Mode
● Color: Applicable in the day, image shows in colors.
● B/W: Applicable at night, the image is black and white.
Day&Night
Mode ● Auto Switch by Brightness: Set the brightness prevalue. When the
brightness is higher or lower than the prevalue, the image shows in colors
or black and white respectively.
Brightness Prevalue of brightness. You can drag the slider to adjust the value. The higher
Prevalue the value, the brighter the video image.
● Always Off: Set the IR light to always on.
● Always On: Set the IR light to always off.
● Day/Night Mode: Automatically turn on or off the IR light according to the
IR Light
configured Day/Night mode.
2.5.2.1.2 Shutter
This section provides guidance on configuring camera shutter, including shutter mode, exposure
mode, gain mode, and scene mode.
Step 1 Select Setting > Camera > Attribute > Shutter.
38
Step 2 Configure parameters.
Shutter Scope You need to set shutter when Customized Range is set as Shutter.
Set the time range of shutter.
Gain Scope You need to set gain scope when set Mode to Manual.
Set the value range of gain.
WB
Mode Set scene mode to adjust the image to its best status.
Step 3 Click Save.
This section provides guidance on setting the measure mode of metering zone.
Step 1 Select Setting > Camera > Attribute > Metering Zone.
39
Figure 2-51 Metering Zone
Only need to draw measuring areas when setting Measure Mode to Partial Measure.
Step 4 Click Confirm.
2.5.2.2.1 Video
40
Figure 2-52 Video
Resolution
The resolution of sub stream cannot be greater than that of the main
stream.
Frame or time interval between two I frames. The bigger the interval, the
I Frame Interval smaller space taken by the decompressed video. The system default is set
twice as big as frame rate.
Set the watermarks, which will be added into videos of the Camera.
● Select Watermark Settings to enable the watermark adding.
Watermark
Settings ● Watermark Character is DigitalCCTV by default.
● The watermark character can only consist of number, letter, underline,
and maximum length contains 85 characters.
Step 3 Click Confirm.
2.5.2.2.2 Snapshot
You can set the picture stream, including resolution, quality or picture size.
Step 1 Select Setting > Camera > Video > Snapshot.
41
Figure 2-53 Snapshot
Set interest area in the image, and then the selected image will display with configured quality.
2.5.3 Network
You can set IP address, port, and other parameters.
42
2.5.3.1 Configuring TCP/IP
Configure the IP address of the Camera, and DNS server so that the Camera can connect with other
devices in the same network.
Some models support dual network port. Do not set them in the same network segment; otherwise
it might cause network error.
Step 1 Select Setting > Network > TCP/IP.
Step 2 Configure parameters based on the actual situation.
43
2.5.3.3 Configuring DDNS
Prerequisites
Confirm the server type which supports domain name analysis.
● After enabling DDNS, your device information might be collected by the third party servers.
● When a user registers and logs in to the DDNS website, you can view all the connected device
information.
Procedure
Step 1 Select Setting > Network > DDNS.
Step 2 Select Server Type to enable DDNS, and then enter the server information.
Keep Alive Time (s) means the update interval of the connection between the server and
the device.
44
Table 2-22 Auto register parameter description
Parameter Description
Address The IP address of the server on which the device registers.
Port The port of the server for auto registration.
The device ID distributed by the server for auto registration. Make sure that
Sub-Device ID
the ID is unique during auto registration.
Step 4 Click Confirm.
Procedure
Step 1 Select Setting > Network > Multicast.
Step 2 Check On to enable the function.
Step 3 Enable main stream or sub stream based on the actual situation and set IP and port.
Step 4 Click Confirm.
After enabling this function, system will send the device data to the given server. There is data
leakage risk.
Step 1 Select Setting > Network > SMTP (Email).
45
Figure 2-59 SMTP (email)
46
2.5.3.7 Configuring SNMP
Prerequisites
● Install the toll software for monitoring and managing SNMP (Simple Network Management
Protocol) device.
● Get the corresponding version of MIB file from technical support.
Set SNMP and connect to the Camera through tool such as MIB Builder and MG-SOFT MIB Browser,
and then you can manage and monitor the Camera on the tool.
Procedure
Step 1 Select Setting > Network > SNMP.
Step 2 Select the version of SNMP to enable it.
● V1: The device can only process the information of version 1.
● V2: The device can only process the information of version 2.
● V3: Set the username, password and authentication type to enable safety verification
when the server accesses the device.
Step 3 Enter the IP address of the PC on which the MIB software is installed as Trap Address, and
leave other parameters as default.
Step 4 Click Confirm, and then you can view the device configurations through MIB software.
47
Figure 2-61 IEEE802
EAP-TLS
Client Certificate Click Browse to import the client certificate, and private key files for
Private Key authentication.
Step 3 Click Confirm.
48
Figure 2-62 PPPoE
Step 2 Select On to enable PPPoE, and then enter username and password.
Step 3 Click Confirm.
2.5.3.10.1 ONVIF
You can enable the Open Network Video Interface Forum (ONVIF) function to make network video
products of different manufacturers interworking.
You can configure this parameter to push the captured vehicle violations information to the server.
● All communications must be based on HTTP protocol, conform to RFC2616 standards, and
support Digest authentication.
49
Figure 2-64 Info push platform
2.5.4 Event
This section provides guidance on configuring alarm, and abnormality.
2.5.4.1 Alarm
You can set several parameters of relay activation such as relay-in, period, anti-dither, and sensor
type. When an alarm is triggered, the system sends the alarm signal to external devices to trigger, for
example, buzz.
Step 1 Select Setting > Event > Alarm > Relay Activation.
50
Figure 2-65 Relay activation
2.5.4.1.2 Relay-out
51
2.5.4.2 Abnormality
Set relay-out mode of different events. When abnormality happens, system triggers alarm.
Step 1 Select Setting > Event > Abnormality.
Step 2 Select an event from SD card, network error, illegal access, security exception, blocklist car
and backing and leaving as needed.
Backing and Leaving refers to captured vehicles back away and leave.
Step 3 (Optional) Select an event type. You only need to select this for SD card and network error.
The alarm linkage keeps running for the defined time after alarm ends.
Signal Duration
Backing and Leaving does not need to set the parameter.
Original Image
Only need to configure when setting Event Type to Scarcity of Storage
Space in SD Card.
Original Image
Plate Cutout Only need to configure when selecting Blocklist Car.
Configure the number of login error allowed. The range is 3–10 times.
Login Error
Only need to configure when setting Illegal Access.
52
Parameter Description
The system sends an email to the defined email address when an alarm is
triggered. To set the email address, go to Setting > Network >
SMTP(Email).
Send Email
Only need to configure when setting Illegal Access and Blocklist Car.
Step 6 Click Confirm.
2.5.5 Storage
This section provides guidance on setting associated information of storage, and record control.
2.5.5.1 Point
Set the storage path of snapshots.
Step 1 Select Setting > Storage > Destination > Point.
2.5.5.2 Local
Display the information on the local SD card. You can set hot swap, and format SD card.
53
Figure 2-69 Local configuration parameter description
2.5.5.3 FTP
FTP function can be enabled only when it is selected as destination path. When the network does
not work, you can save all the files to the internal SD card for emergency.
You can set picture name, and storage path. Click Help… to view naming rule.
Step 1 Select Setting > Storage > Destination > FTP.
54
Parameter Description
Set the naming rule of snapshots to be saved in FTP server. You can click
FTP Named Help… to view the Picture Naming Help, or click Restore to restore the
default naming rule.
On Enable FTP server storage.
● SFTP (Recommended): Secure File Transfer Protocol, a network protocol
allows file access, and transfer over a secure data stream.
Protocol ● FTP: File Transfer Protocol, a network protocol implemented to exchange
files over a TCP/IP network. Anonymous user access is also available
through an FTP server.
Server IP The IP address of FTP server.
Refers to the encode mode of Chinese characters when naming pictures. Two
Encode Type modes are available: UTF-8, and GB2312. After configuring Server IP, and
Port, click test to check whether the FTP server works.
Port The port number of FTP server.
Username
The username, and password of FTP server.
Password
Upload Type Select event(s), and picture type(s) to be uploaded to the FTP server.
Step 3 Click Confirm.
2.5.5.4 Client
You can set the parameters of storing to client.
Step 1 Select Setting > Storage > Destination > Client.
55
Parameter Description
Server Select server, which includes Server1, and Server2.
● When the type is set to IP, you need to fill in IP address of the server.
Server IP ● When the type is set to MAC, you need to fill in MAC address of the
server.
Step 3 Click Confirm.
Step 2 According to your actual requirements, set the name of picture, and storage path. Click
Help… for more details.
Step 3 Set the root path of record, and snapshot as needed.
Step 4 Click Confirm.
2.5.6 System
You can configure general information, add user, restore to default settings, and configure import &
export file.
2.5.6.1 General
This section provides guidance on configuring device SN, language, and video standard.
Step 1 Select Setting > System > General Setting > General Setup.
56
Figure 2-73 General
You can set date, and time format, system time, DST (Daylight Saving Time) or NTP server, and more.
Step 1 Select Setting > System > General > Date&Time.
57
Step 2 Configure parameters.
2.5.6.2 Account
2.5.6.2.1 Account
The system supports configuring operation user of web. You need to configure user group before
configuring user account.
● The user with Account control authority can also change the password of other users.
● We recommend you give fewer authorities to normal users than premium users to make user
management convenient.
● You cannot delete the user in login status.
You can add, delete or modify user.
Procedure
Step 1 Select Setting > System > Account > Account > Username.
58
Figure 2-76 Add user
59
Parameter Description
Select the group to which new users belong. Each group has different
Group Name
permissions.
Memo Remarks of the user.
Operation
Select the permissions that you want assign to the user.
Permission
Restricted Login Set the IP address that is restricted to log in, and the restriction time.
Step 4 Click Save.
Step 5 Select Setting > System > Account > Account > Group Name.
You can add new group, delete added group or modify group permission, and memo.
● The system supports up to 8 user groups, and the default user groups are admin and
user.
● You can modify, and delete the added user group, but not the default user group.
Step 6 Click Add Group, and then enter the name of user group, and configure group authority.
● Group Name contains up to 15 characters, consisting of number, letter, underline,
and hyphen.
● Group must be unique.
60
Related Operations
After adding user or user group, click to change the user or user group information; click to
delete the added user or user group.
You can add, delete, and modify ONVIF on the user management page.
Procedure
Step 1 Select Setting > System > Account > Onvif User.
Step 3 Configure parameters. For details of the parameters, see Table 2-32.
Step 4 Click Save.
Related Operations
After adding user, click to change user information; click to delete the added user.
61
Admin user cannot be deleted.
2.5.6.3 Safety
62
2.5.6.3.2 HTTPS
Prerequisites
● For first-time use of HTTPS or after changing device IP address, you need to create server
certificate, and install root certificate.
● After creating server certificate, and installing root certificate, if you replace the PC for logging in
to the web page, you need to download, and install the root certificate again on the new PC or
copy the downloaded root certificate on the new PC, and install.
On the HTTPS page, you can make PC log in normally through HTTPS by creating certificate or
uploading authenticated certificate. It can ensure security of communication data, and provide
guarantee for user information, and device safety through reliable, and stable technical approach.
Procedure
Step 1 Create certificate or upload the authenticated certificate.
● If you select Create Certificate, follow the steps below.
1. Select Setting > System > Safety > HTTPS.
2. Click Create.
3. Enter the required information such as region, IP or domain name, and then click
Create.
63
The entered IP or Domain name must be the same as the IP or domain name of the
Camera.
4. Click Install under Request Created, and then click Download to download root
certificate.
The system pops up Save As dialog box, select storage path, and then click Save.
5. Double-click the RootCert.cer icon.
6. Click Install Certificate….
7. Click Next.
The Certificate Store page is displayed. You can select Automatically select the
certificate store based on the type of certificate or Place all certificates in
custom certificate store.
64
8. Click Next.
9. Click Finish.
65
Figure 2-88 Restart device
2.5.6.3.3 Firewall
Set the security rules to protect the safety of your camera system.
Step 1 Select Setting > System > Safety > Firewall.
66
2.5.6.5 Import/Export
Export the system configuration file to back up the system configuration; import system
configuration file to make quick configuration or recover system configuration.
Step 1 Select Setting > System > Import/Export.
Step 2 Click Import or Export.
● Import: Import the local system configuration file to the system.
● Export: Export associated configuration to local, and save as file whose suffix
is .backup.
Step 3 Select the imported file path or exported folder.
Step 4 Click Open or Save, and view import and export result on the web page.
67
● Upgrading the wrong program might result in the Camera not working properly.
● During upgrading, do not disconnect the Camera from power and network, or restart or shut
down the web.
Step 1 Select Setting > System > Upgrade.
Step 2 Click Import, and import upgrade file (.bin).
Step 3 Click Upgrade.
The system starts to upgrade firmware.
2.5.7 Information
You can view system information such as version, user, and log, and more.
2.5.7.1 Version
You can view the version information of the Camera.
Select Setting > Information > Version.
● Versions of different devices might vary depending on the actual web page.
● Algorithm recognition is available when algorithm is authorized (when the icon is displayed in
green). If algorithm is not authorized, the Camera will not be able to recognize vehicle series,
model, and logo. License plate recognition is always supported.
68
2.5.7.2 Log
You can view log information such as system, configuration, data, event, record and user
management.
The earliest log records will be overwritten when the number of log records reaches 1024.
Step 1 Select Setting > Information > Log > Log.
Step 2 Enter Start Time, and End Time, and then select log type.
Step 3 Click Search.
You can save your important logs to log server. This helps provide important clues to the source of
security incidents. Log server needs to be deployed in advance by a professional or system
administrator.
Step 1 Select Setting > Information > Log > Remote Log.
69
2.5.7.3 Online User
Select Setting > Information > Online User to view the information of all the online users.
Click Refresh to view the latest status.
2.6 Alarm
Click the Alarm tab, and then you can select alarm type, operation, and alarm tone.
70
Table 2-35 Alarm parameters description
Type Parameter Description
Storage Full It triggers alarm when storage card is full.
Storage Error It triggers alarm when storage card fault occurs.
It generates alarm through peripheral device when
External Alarm
alarm is triggered.
Alarm Type No Storage It triggers alarm when there is no storage card.
Blocklist It triggers alarm when the blocklist vehicle appears.
It triggers alarm when the times of login password
Illegal Access
error reach the max value.
Security Exception It triggers alarm when there is security exception.
The web will prompt user when device alarm
Operation Listen Alarm
occurs.
It generates alarm prompt tone when alarm occurs.
Play Alarm Tone
Alarm Tone Alarm tone supports customized settings.
Tone Path The path of customized alarm tone.
2.7 Logout
Click Logout to exit the system. You need to log in again for access.
71
3 FAQ
Question Solution
Device error, unable to Press and hold the Reset button for 5 seconds to restore the
start or operate normally Camera to factory default settings.
Stop recording, and image capturing, and then wait for at least 15
TF card hot swapping seconds before removing the TF card. This helps ensure data
integrity, and avoid losing all the data of the card.
Do not set the TF card as the storage media of pre-set recording. It
TF card read/write limit
might reduce the TF card duration.
TF card cannot be used as When the TF card hibernates or its capacity is null, format the card
storage media through web first.
Check whether the right upgrade program (such as version,
Network upgrade failed
compatibility) is used.
We recommend you use TF card of 16 GB or larger. This helps
Recommended TF card avoid data loss arising from insufficient capacity.
You can use card of 16 GB, 32 GB, 64 GB, and 128 GB.
Failed to pop up the
Set the security level of IE browser as Low, and Active Plug-in,
installation dialog box of
and Control is set as Enable.
web control webrec.cab
72
Appendix 1 Cybersecurity Recommendations
73
reducing the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
● AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
● Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
● Check equipment log: By viewing the logs, you can know the IP addresses that were used to
log in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need to
save the log for a long time, it is recommended that you enable the network log function to
ensure that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
● The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
● Establish the 802.1x access authentication system to reduce the risk of unauthorized access to
private networks.
● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
74