background image

© ALLNET GmbH Computersysteme 2015 - Alle Rechte vorbehalten 

Irrtum und Änderungen vorbehalten 

130

 

files in the Library will not necessarily be able to recompile the application to use the modified 

definitions.)   

b)

 

Use a suitable shared library mechanism for linking with the Library.    A suitable mechanism is 

one that (1) uses at run time a copy of the library already present on the user's computer system, 

rather than copying library functions into the executable, and (2) will operate properly with a 

modified version of the library, if the user installs one, as long as the modified version is 

interface-compatible with the version that the work was made with.     

c)

 

Accompany the work with a written offer, valid for at least three years, to give the same user the 

materials specified in Subsection 6a, above, for a charge no more than the cost of performing this 

distribution.   

d)

 

If distribution of the work is made by offering access to copy from a designated place, offer 

equivalent access to copy the above specified materials from the same place.     

e)

 

Verify that the user has already received a copy of these materials or that you have already sent 

this user a copy.     

For an executable, the required form of the "work that uses the Library" must include any data and 

utility programs needed for reproducing the executable from it.    However, as a special exception, the 

materials to be distributed need not include anything that is normally distributed (in either source or 

binary form) with the major components (compiler, kernel, and so on) of the operating system on 

which the executable runs, unless that component itself accompanies the executable.     

It may happen that this requirement contradicts the license restrictions of other proprietary libraries 

that do not normally accompany the operating system.    Such a contradiction means you cannot use 

both them and the Library together in an executable that you distribute.     

7.

 

You may place library facilities that are a work based on the Library side-by-side in a single library 

together with other library facilities not covered by this License, and distribute such a combined 

library, provided that the separate distribution of the work based on the Library and of the other 

library facilities is otherwise permitted, and provided that you do these two things:     

a)

 

Accompany the combined library with a copy of the same work based on the Library, 

uncombined with any other library facilities.    This must be distributed under the terms of the 

Sections above.   

b)

 

Give prominent notice with the combined library of the fact that part of it is a work based on the 

Library, and explaining where to find the accompanying uncombined form of the same work.     

8.

 

You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided 

under this License.    Any attempt otherwise to copy, modify, sublicense, link with, or distribute the 

Library is void, and will automatically terminate your rights under this License.  However, parties who 

have received copies, or rights, from you under this License will not have their licenses terminated so 

long as such parties remain in full compliance.     

9.

 

You are not required to accept this License, since you have not signed it.    However, nothing else 

grants you permission to modify or distribute the Library or its derivative works.    These actions are 

prohibited by law if you do not accept this License.    Therefore, by modifying or distributing the 

Library (or any work based on the Library), you indicate your acceptance of this License to do so, and 

all its terms and conditions for copying, distributing or modifying the Library or works based on it.     

10.

 

Each time you redistribute the Library (or any work based on the Library), the recipient automatically 

receives a license from the original licensor to copy, distribute, link with or modify the Library subject 

to these terms and conditions.    You may not impose any further restrictions on the recipients' 

Summary of Contents for ALL-CAM2305-LW

Page 1: ...1 User Manual ALL CAM2305 LW ALL CAM2388 LVE W ALL CAM2395 LVEF ALL CAM2396 LEF ALL CAM2397 LE W ...

Page 2: ... ALLNET GmbH Computersysteme 2015 Alle Rechte vorbehalten Irrtum und Änderungen vorbehalten 2 Default IP via DHCP Username Password admin ...

Page 3: ...vice must accept any interference received including interference that may cause undesired operation EU Conformity Statement This product and if applicable the supplied accessories too are marked with CE and comply therefore with the applicable harmonized European standards listed under the Low Voltage Directive 2006 95 EC the EMC Directive 2004 108 EC the RoHS Directive 2011 65 EU 2012 19 EU WEEE...

Page 4: ...C according to the IEC60950 1 and Limited Power Source standard If the product does not work properly please contact your dealer or the nearest service center Never attempt to disassemble the camera yourself We shall not assume any responsibility for problems caused by unauthorized repair or maintenance To reduce the risk of fire or electrical shock do not expose this product to rain or moisture T...

Page 5: ... ALLNET GmbH Computersysteme 2015 Alle Rechte vorbehalten Irrtum und Änderungen vorbehalten 5 repair or maintenance ...

Page 6: ...ent and do not expose it to high electromagnetic radiation To avoid heat accumulation good ventilation is required for a proper operating environment Keep the camera away from water and any liquid While shipping the camera should be packed in its original packing Notes For the camera supports IR you are required to pay attention to the following precautions to prevent IR reflection Dust or grease ...

Page 7: ...g Wi Fi Connection in Manage and Ad hoc Modes 22 4 2 Easy Wi Fi Connection with WPS function 26 4 3 IP Property Settings for Wireless Network Connection 29 Chapter 5 Live View 31 5 1 Live View Page 31 5 2 Starting Live View 32 5 3 Recording and Capturing Pictures Manually 33 5 4 Operating PTZ Control 33 5 4 1 PTZ Control Panel 34 5 4 2 Setting Calling a Preset 35 5 4 3 Setting Calling a Patrol 36 ...

Page 8: ...ng OSD Settings 69 6 5 3 Configuring Text Overlay Settings 70 6 5 4 Configuring Privacy Mask 71 6 6 Configuring and Handling Alarms 72 6 6 1 Configuring Motion Detection 73 6 6 2 Configuring Video Tampering Alarm 79 6 6 3 Configuring Alarm Input 80 6 6 4 Configuring Alarm Output 82 6 6 5 Handling Exception 83 6 6 6 Configuring Line Crossing Detection 83 6 6 7 Configuring Intrusion Detection 85 6 6...

Page 9: ...d Änderungen vorbehalten 9 9 7 Maintenance 109 9 7 1 Rebooting the Camera 109 9 7 2 Restoring Default Settings 109 9 7 3 Exporting Importing Configuration File 110 9 7 4 Upgrading the System 111 9 8 RS 232 Settings 111 9 9 RS 485 Settings 112 9 10 Service Settings 113 ...

Page 10: ...08 32bits CPU Intel Pentium IV 3 0 GHz to Core i7 4000 series or higher depending on different video resolutions RAM 1G or higher Display 1024 768 resolution or higher Web Browser Internet Explorer 7 0 and above version Safari 5 02 and above version Mozilla Firefox 3 5 and above version and Google Chrome8 and above versions ...

Page 11: ... the Network Camera over the WAN 2 1 Setting the Network Camera over the LAN Purpose To view and configure the camera via a LAN you need to connect the network camera in the same subnet with your computer and install the SADP or ALL VMS software to search and change the IP of the network camera Note For the detailed introduction of SADP please refer to Appendix 1 2 1 1 Wiring over the LAN The foll...

Page 12: ... via a Switch or a Router 2 1 2 Detecting and Changing the IP Address You need the IP address to visit the network camera Steps 1 To get the IP address you can choose either of the following methods Use SADP a software tool which can automatically detect the online network cameras in the LAN and list the device information including IP address subnet mask port number device serial number device ve...

Page 13: ...t IP address is set to DHCP and if no DHCP Server is active you have to configure the ip address via SADP tool The port number is 8000 The default user name is admin and password is admin And you are highly recommended change the initial password after your first login For accessing the network camera from different subnets please set the gateway for the network camera after you logged in For deta...

Page 14: ...the WAN directly Connecting the network camera via a router Steps 1 Connect the network camera to the router 2 Assign a LAN IP address the subnet mask and the gateway Refer to Section 2 1 2 Detecting and Changing the IP Address for detailed IP address configuration of the camera 3 Save the static IP in the router 4 Set port mapping e g 80 8000 and 554 ports The steps for port mapping vary accordin...

Page 15: ...ress you can connect the network camera to a modem or a router Connecting the network camera via a router Steps 1 Connect the network camera to the router 2 In the camera assign a LAN IP address the subnet mask and the gateway Refer to Section 2 1 2 Detecting and Changing the IP Address for detailed LAN configuration 3 In the router set the PPPoE user name password and confirm the password 4 Set p...

Page 16: ...led configuration Figure 2 6 Accessing the Camera with Dynamic IP Note The obtained IP address is dynamically assigned via PPPoE so the IP address always changes after rebooting the camera To solve the inconvenience of the dynamic IP you need to get a domain name from the DDNS provider E g DynDns com Please follow the steps below for normal domain name resolution and private domain name resolution...

Page 17: ...mera via the applied domain name Private Domain Name Resolution Figure 2 8 Private Domain Name Resolution Steps 1 Install and run the IP Server software in a computer with a static IP 2 Access the network camera through the LAN with a web browser or the client software 3 Enable DDNS and select IP Server as the protocol type Refer to Section 6 3 4 Configuring DDNS Settings for detailed configuratio...

Page 18: ...he Enter key to enter the login interface 3 Input the user name and password and click Login Figure 3 1 Login Interface Notes The default user name is admin and the default password is admin Multi language is supported English Simplified Chinese Traditional Chinese Russian Turkish Japanese Korean Thai Vietnamese Estonian Bulgarian Hungarian Czech Slovak French Italian German ...

Page 19: ...tuguese Polish Greek Dutch Romanian Finnish Norwegian Danish Swedish Croatian Serbian Slovenian etc 4 Install the plug in before viewing the live video and operating the camera Please follow the installation prompts to install the plug in Figure 3 2 Download and Install Plug in Figure 3 3 Install Plug in 1 ...

Page 20: ...reopen the web browser and log in again after installing the plug in 3 2 Accessing by Client Software The product CD contains the ALL VMS client software You can view the live video and manage the camera with the software Follow the installation prompts to install the software The control panel and live view interface of ALL VMS client software are shown as bellow Figure 3 5 ALL VMS Control Panel ...

Page 21: ...omputersysteme 2015 Alle Rechte vorbehalten Irrtum und Änderungen vorbehalten 21 Figure 3 6 ALL VMS Configuration Panel Note For detailed information about the software please refer to the user manual of the ALL VMS ...

Page 22: ...e for the cameras with the built in Wi Fi module 4 1 Configuring Wi Fi Connection in Manage and Ad hoc Modes Before you start A wireless network must be configured Wireless Connection in Manage Mode Steps 1 Enter the Wi Fi configuration interface Configuration Advanced Configuration Network Wi Fi Figure 4 1 Wireless Network List 2 Click Search to search the online wireless connections 3 Click to c...

Page 23: ...ter 5 Enter the key to connect the wireless network The key should be that of the wireless network connection you set on the router Wireless Connection in Ad hoc Mode If you choose the Ad hoc mode you don t need to connect the wireless camera via a router The scenario is the same as you connect the camera and the PC directly with a network cable Steps 1 Choose Ad hoc mode Figure 4 3 Wi Fi Setting ...

Page 24: ...ide search the network and you can see the SSID of the camera listed Figure 4 5 Ad hoc Connection Point 6 Choose the SSID and connect Security Mode Description Figure 4 6 Security Mode You can choose the Security Mode as not encrypted WEP WPA personal WPA enterprise WPA2 personal and WPA2 enterprise WEP mode ...

Page 25: ... encryption key length can sometimes be shown as 40 64 and 104 128 Key type The key types available depend on the access point being used The following options are available HEX Allows you to manually enter the hex key ASCII In this method the string must be exactly 5 characters for 64 bit WEP and 13 characters for 128 bit WEP WPA personal and WPA2 personal Mode Enter the required Pre shared Key f...

Page 26: ...load a CA certificate to present to the access point for authentication EAP PEAP User Name Enter the user name to present to the network Password Enter the password of the network PEAP Version Select the PEAP version used at the access point Label Select the label used by the access point EAPOL version Select version 1 or 2 depending on the version used at the access point CA Certificates Upload a...

Page 27: ...ring long passphrases There are two modes of the WPS connection the PBC mode and the PIN mode Note If you enable the WPS function you do not need to configure the parameters such as the encryption type and you don t need to know the key of the wireless connection Steps Figure 4 10 Wi Fi Settings WPS PBC Mode PBC refers to the Push Button Configuration in which the user simply has to push a button ...

Page 28: ...ter 4 Push the WPS button to enable the function on the camera If there is not a WPS button on the camera you can also click the virtual button to enable the PBC function on the web interface 5 Click Connect button When the PBC mode is both enabled in the router and the camera the camera and the wireless network is connected automatically PIN Mode The PIN mode requires a Personal Identification Nu...

Page 29: ...get from the router side in the Router PIN code field 3 Click Connect Or You can generate the PIN code on the camera side And the expired time for the PIN code is 120 seconds 1 Click Generate 2 Enter the code to the router in the example enter 48167581 to the router 4 3 IP Property Settings for Wireless Network Connection The wireless network interface controller is set to DHCP When you connect th...

Page 30: ...n Advanced Configuration Network TCP IP or Configuration Basic Configuration Network TCP IP Figure 4 12 TCP IP Settings 2 Select the NIC as wlan 3 Customize the IPv4 address the IPv4 Subnet Mask and the Default Gateway The setting procedure is the same with that of LAN If you want to be assigned the IP address you can check the checkbox to enable the DHCP ...

Page 31: ...nfigure video parameters Log in the network camera to enter the live view page or you can click Live View on the menu bar of the main page to enter the live view page Descriptions of the live view page Figure 5 1 Live View Page Camera Model It lists the camera model you are connecting to Online Help Click to get the online help which will guide you through the basic ...

Page 32: ... selectable if they are supported by the web browser Live View Window Display the live video Toolbar Operations on the live view page e g live view capture record audio on off two way audio etc PTZ Control Panning tilting and zooming actions of the camera and the lighter and wiper control if it supports PTZ function or an external pan tilt unit has been installed Preset Setting Calling Set and cal...

Page 33: ...cording Audio on and adjust volume Mute Turn on off microphone Turn on off 3D zooming function 5 3 Recording and Capturing Pictures Manually In the live view interface click on the toolbar to capture the live pictures or click to record the live view The saving paths of the captured pictures and clips can be set on the Configuration Local Configuration page To configure remote scheduled recording ...

Page 34: ...ngs 5 4 1 PTZ Control Panel On the live view page click to show the PTZ control panel or click to hide it Click the direction buttons to control the pan tilt movements Figure 5 3 PTZ Control Panel Click the zoom iris focus buttons to realize lens control Notes There are 8 direction arrows in the live view window when you click and drag the mouse in the relative positions For the cameras which supp...

Page 35: ... to the right or left Tilt the camera up or down Zoom in or out Refocus the lens 3 Click to finish the setting of the current preset 4 You can click to delete the preset Note You can configure up to 128 presets Calling a Preset This feature enables the camera to point to a specified preset scene manually or when an event takes place For the defined preset you can call it at any time to the desired...

Page 36: ... Patrol Note No less than 2 presets have to be configured before you set a patrol Steps 1 Click to enter the patrol configuration interface 2 Select a path No and click to add the configured presets 3 Select the preset and input the patrol duration and patrol speed 4 Click OK to save the first preset 5 Follow the steps above to add the other presets Figure 5 6 Add Patrol Path 6 Click to save a pat...

Page 37: ... ALLNET GmbH Computersysteme 2015 Alle Rechte vorbehalten Irrtum und Änderungen vorbehalten 37 7 Click to start the patrol and click to stop it 8 Optional Click to delete a patrol ...

Page 38: ... The record files and captured pictures are the ones you record and captured using the web browser and thus the saving paths of them are on the PC running the browser Steps 1 Enter the Local Configuration interface Configuration Local Configuration Figure 6 1 Local Configuration Interface 2 Configure the following settings Live View Parameters Set the protocol type and live view ...

Page 39: ...e rules on your local browser select enable or disable to display or not display the colored marks when the motion detection face detection or intrusion detection is triggered E g enabled as the rules are and the face detection is enabled as well when a face is detected it will be marked with a green rectangle on the live view Image Format Choose the image format for picture capture Record File Se...

Page 40: ...th of the captured pictures in playback mode Save clips to Set the saving path of the clipped video files in playback mode Note You can click Browse to change the directory for saving the clips and pictures 3 Click Save to save the settings 6 2 Configuring Time Settings Purpose You can follow the instructions in this section to configure the time synchronization and DST settings Steps 1 Enter the ...

Page 41: ...ress IP address of NTP server NTP Port Port of NTP server Interval The time interval between the two synchronizing actions with NTP server Figure 6 3 Time Sync by NTP Server Note If the camera is connected to a public network you should use a NTP server that has a time synchronization function such as the server at the National Time Center IP Address 210 72 145 44 If the camera is set in a customi...

Page 42: ...he DST tab page to enable the DST function and Set the date of the DST period Figure 6 5 DST Settings 2 Click Save to save the settings 6 3 Configuring Network Settings 6 3 1 Configuring TCP IP Settings Purpose TCP IP settings must be properly configured before you operate the camera over network The camera supports both the IPv4 and IPv6 Both versions may be configured simultaneously without conf...

Page 43: ...Mask IPv4 or IPv6 Default Gateway MTU settings and Multicast Address Notes The valid value range of MTU is 500 1500 The Multicast sends a stream to the multicast group address and allows multiple clients to acquire the stream at the same time by requesting a copy from the multicast group address Before utilizing this function you have to enable the Multicast function of your router 3 Click Save to...

Page 44: ...2 Set the HTTP port RTSP port HTTPS port and server port of the camera HTTP Port The default port number is 80 and it can be changed to any port No which is not occupied RTSP Port The default port number is 554 and it can be changed to any port No ranges from 1024 to 65535 HTTPS Port The default port number is 443 and it can be changed to any port No which is not occupied Server Port The default s...

Page 45: ...ord for PPPoE access Note The User Name and Password should be assigned by your ISP 4 Click Save to save and exit the interface Note A reboot is required for the settings to take effect 6 3 4 Configuring DDNS Settings Purpose If your camera is set to use PPPoE as its default network connection you can use the Dynamic DNS DDNS for network access Before you start Registration on the DDNS server is r...

Page 46: ...ype Four DDNS types are selectable HiDDNS IPServer NO IP and DynDNS DynDNS Steps 1 Enter Server Address of DynDNS e g members dyndns org 2 In the Domain text field enter the domain name obtained from the DynDNS website 3 Enter the Port of DynDNS server 4 Enter the User Name and Password registered on the DynDNS website 5 Click Save to save the settings Figure 6 10 DynDNS Settings IP Server ...

Page 47: ...d DNS from the ISP The Server Address should be entered with the static IP address of the computer that runs the IP Server software Figure 6 11 IPServer Settings Note For the US and Canada area you can enter 173 200 91 74 as the server address NO IP Steps 1 Choose the DDNS Type as NO IP Figure 6 12 NO IP Settings 2 Enter the Server Address as www noip com 3 Enter the Domain name you registered 4 E...

Page 48: ... the device alias in the HiDDNS server 4 Click Save to save the new settings Note A reboot is required for the settings to take effect 6 3 5 Configuring SNMP Settings Purpose You can set the SNMP function to get camera status parameters and alarm related information and manage the camera remotely when it is connected to the network Before you start Before setting the SNMP please download the SNMP ...

Page 49: ...d you also need to use the different version according to the security level you required SNMP v1 provides no security and SNMP v2 requires password for access And SNMP v3 provides encryption and if you use the third version HTTPS protocol must be enabled Steps 1 Enter the SNMP Settings interface Configuration Advanced Configuration Network SNMP Figure 6 14 SNMP Settings 2 Check the corresponding ...

Page 50: ...X Settings Purpose The IEEE 802 1X standard is supported by the network cameras and when the feature is enabled the camera data is secured and user authentication is needed when connecting the camera to the network protected by the IEEE 802 1X Before you start The authentication server must be configured Please apply and register a user name and password for 802 1X in the server Steps 1 Enter the ...

Page 51: ...ity of Service can help solve the network delay and network congestion by configuring the priority of data sending Steps 1 Enter the QoS Settings interface Configuration Advanced Configuration Network QoS Figure 6 16 QoS Settings 2 Configure the QoS settings including video audio DSCP event alarm DSCP and Management DSCP The valid value range of the DSCP is 0 63 The bigger the DSCP value is the hi...

Page 52: ...ort and the camera is connected to the Wide Area Network via the router Steps 1 Enter the UPnP settings interface Configuration Advanced Configuration Network UPnP 2 Check the checkbox to enable the UPnP function The name of the device when detected online can be edited Figure 6 17 Configure UPnP Settings 6 3 9 Email Sending Triggered by Alarm Purpose The system can be configured to send an Email ...

Page 53: ...v4 Subnet Mask IPv4 Default Gateway and the Preferred DNS Server Note Please refer to Section 6 3 1 Configuring TCP IP Settings for detailed information 2 Enter the Email Settings interface Configuration Advanced Configuration Network Email Figure 6 18 Email Settings 3 Configure the following settings Sender The name of the email sender Sender s Address The email address of the sender SMTP Server ...

Page 54: ...his checkbox to use authentication to log in to this server and enter the login user Name and password Choose Receiver Select the receiver to which the email is sent Up to 2 receivers can be configured Receiver The name of the user to be notified Receiver s Address The email address of user to be notified 4 Click Save to save the settings 6 3 10 Configuring NAT Network Address Translation Settings...

Page 55: ... Purpose You can configure the FTP server related information to enable the uploading of the captured pictures to the FTP server The captured pictures can be triggered by events or a timing snapshot task Steps 1 Enter the FTP Settings interface Configuration Advanced Configuration Network FTP Figure 6 20 FTP Settings 2 Configure the FTP settings and the user name and password are required for logi...

Page 56: ...on t be required Check the Anonymous checkbox to enable the anonymous access to the FTP server Note The anonymous access function must be supported by the FTP server 3 Click Save to save the settings Note If you want to upload the captured pictures to FTP server you have to enable the continuous snapshot or event triggered snapshot on Snapshot page For detailed information please refer to the Sect...

Page 57: ...gen vorbehalten 57 Figure 6 21 HTTPS Settings Create the self signed certificate 1 Click Create button to enter the creation interface Figure 6 22 Create Self signed Certificate 2 Enter the country host name IP validity and other information 3 Click OK to save the settings Note ...

Page 58: ...trusted certificate authority for signature 3 After receiving the signed valid certificate import the certificate to the device 3 There will be the certificate information after you successfully create and install the certificate Figure 6 23 Installed Certificate 4 Click the Save button to save the settings 6 4 Configuring Video and Audio Settings 6 4 1 Configuring Video Settings Steps 1 Enter the...

Page 59: ...tream can be used for live viewing when the bandwidth is limited 3 You can customize the following parameters for the selected main stream or sub stream Video Type Select the stream type to video stream or video audio composite stream The audio signal will be recorded only when the Video Type is Video Audio Resolution Select the resolution of the video output Bitrate Type Select the bitrate type t...

Page 60: ...ain stream H 264 and MPEG4 are selectable and if the stream type is set to sub stream or third stream H 264 MJPEG and MPEG4 are selectable Note The supported video encoding may differ according to the different platform Profile Basic profile Main Profile and High Profile for coding are selectable I Frame Interval Set the I Frame interval to 1 400 SVC Scalable Video Coding is an extension of the H ...

Page 61: ...s 64kbps and 128kbps are supported if MP2L2 is selected Audio Input MicIn and LineIn are selectable for the connected microphone and pickup respectively Input Volume 0 100 Environmental Noise Filter Set it as OFF or ON When you set the function on the noise detected can be filtered 3 Click Save to save the settings 6 4 3 Configuring ROI Encoding ROI stands for the region of interest And the ROI en...

Page 62: ...tion is less focused Steps 1 Enter the ROI settings interface Configuration Advanced Configuration Video Audio ROI Figure 6 26 Region of Interest Settings 2 Draw the region of interest on the image There are four regions can be drawn 3 Choose the stream type to set the ROI encoding 4 Choose the ROI type ...

Page 63: ...h as human face detection You can choose the Image Quality Enhancing level for the ROI encoding 5 Click Save to save the settings 6 4 4 Display Info on Stream Check the checkbox to enable the function of Dual VCA which can be used cooperatively with NVR to implement dual VCA retrieval during playback Figure 6 27 Display Info on Stream 6 5 Configuring Image Parameters 6 5 1 Configuring Display Sett...

Page 64: ... to guarantee the image quality in the different illumination it provides two sets of parameters for user to configure Day night Auto switch Figure 6 28 Display Settings of Day night Auto switch Image Adjustment Brightness describes bright of the image which ranges from 1 100 and the default value is 50 Contrast describes the contrast of the image which ranges from 1 100 and the default value is 5...

Page 65: ... or if DC lens is adopted then manual and auto are selectable The exposure time refers to the electronic shutter time which ranges from 1 1 100 000s Adjust it according to the actual luminance condition Focus Settings For the camera supports electronic lens you can set the focus mode as Manual or Auto If auto is selected the focus is adjusted automatically and if manual is selected you can control...

Page 66: ...nd Manual are selectable for IR mode Select AUTO and the IR LED changes according to the actual luminance E g if the current scene is bright enough then the IR LED adjusts itself to lower power and if the scene is not bright enough the IR LED adjusts itself to higher power Select Manual and you can adjust the IR LED by adjusting the distance E g If the object is near the camera the device adjusts ...

Page 67: ... You can enable the defog function when the environment is foggy and the image is misty It enhances the subtle details so that the image appears clearer Electrical Image Stabilizer EIS reduces the effects of vibration in a video Grey Scale You can choose the range of the grey scale as 0 255 or 16 235 Video Adjustment Mirror It mirrors the image so you can see it inversed Left Right Up Down Center ...

Page 68: ... 60 Hz for NTSC standard Capture Mode It s the selectable video input mode to meet the different demands of field of view and resolution Other Some of the camera supports CVBS SDI or HDMI output Please refer to the actual camera model for details Day Night Scheduled Switch Day Night scheduled switch configuration interface enables you to set the separate camera parameters for day and night to guar...

Page 69: ...ab to configure the parameters applicable for day mode 4 Click Night tab to configure the parameters applicable for night mode Note The settings saved automatically if any parameter is changed 6 5 2 Configuring OSD Settings Purpose You can customize the camera name and time on the screen Steps 1 Enter the OSD Settings interface Configuration Advanced Configuration Image OSD Settings Figure 6 32 OS...

Page 70: ...mat display mode and the OSD font size 5 Define the font color of the OSD by clicking the drop down and black white self adaptive and custom are selectable Figure 6 33 Font Color Custom 6 You can use the mouse to click and drag the text frame in the live view window to adjust the OSD position Figure 6 34 Adjust OSD Location 7 Click Save to activate the above settings 6 5 3 Configuring Text Overlay...

Page 71: ...checkbox in front of textbox to enable the on screen display 3 Input the characters in the textbox 4 Optional Use the mouse to click and drag the red text frame in the live view window to adjust the text overlay position 5 Click Save Note Up to 8 text overlays are configurable 6 5 4 Configuring Privacy Mask Purpose Privacy mask enables you to cover certain areas on the live video to prevent certai...

Page 72: ... to draw up to 4 areas on the same image 5 Click Stop Drawing to finish drawing or click Clear All to clear all of the areas you set without saving them 6 Click Save to save the settings 6 6 Configuring and Handling Alarms This section explains how to configure the network camera to respond to alarm events including motion detection video tampering alarm input alarm output exception face detection...

Page 73: ... in the configured surveillance area and triggers the certain action as a respond to detection In order to detect the moving objects accurately and reduce the false alarm rate normal configuration and expert configuration are selectable for different motion detection environment Normal Configuration Normal configuration adopts one set of parameter for motion detection during the day and at night T...

Page 74: ...ration Live View Parameters rules Figure 6 37 Enable Motion Detection 4 Click Draw Area Click and drag the mouse on the live video to draw a motion detection area 5 Click Stop Drawing to finish drawing one area 6 Optional Click Clear All to clear all of the areas 7 Optional Move the slider to set the sensitivity of the detection 2 Set the Arming Schedule for Motion Detection Steps ...

Page 75: ... arming schedule 4 Optional After you set the arming schedule you can copy the schedule to other days 5 Click OK to save the settings Note The time of each period can t be overlapped Up to 8 periods can be configured for each day Figure 6 39 Arming Time Schedule 3 Set the Alarm Actions for Motion Detection Check the checkbox to select the linkage method Notify surveillance center send email upload...

Page 76: ...rs when an event occurs Note To send the Email when an event occurs you need to refer to Section 6 6 6 to set the related parameters Upload to FTP Capture the image when an alarm is triggered and upload the picture to a FTP server Note Set the FTP address and the remote FTP server first Refer to Section 6 3 10 for detailed information Trigger Channel The video will be recorded when the motion is d...

Page 77: ... area for different day night switch Figure 6 41 Expert Mode of Motion Detection Day Night Switch OFF Steps 1 Draw the detection area as in the normal configuration mode Up to 8 areas are supported 2 Select OFF for Switch Day and Night Settings 3 Select the area by clicking the area No 4 Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area 5 Set the...

Page 78: ...4 Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area in the daytime 5 Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area at night 6 Set the arming schedule and linkage method as in the normal configuration mode 7 Click Save to save the settings Day Night Scheduled Switch 1 Draw the detection area ...

Page 79: ...the selected area in the daytime 6 Slide the cursor to adjust the sensitivity and proportion of object on the area for the selected area at night 7 Set the arming schedule and linkage method as in the normal configuration mode 8 Click Save to save the settings 6 6 2 Configuring Video Tampering Alarm Purpose You can configure the camera to trigger the alarm when the lens is covered and take alarm r...

Page 80: ...pering The arming schedule configuration is the same as the setting of the arming schedule for motion detection Refer to Task 2 Set the Arming Schedule for Motion Detection in Section 6 6 1 5 Check the checkbox to select the linkage method taken for the video tampering Audible warning notify surveillance center send email and trigger alarm output are selectable Please refer to Task 3 Set the Alarm...

Page 81: ...et the arming schedule for the alarm input Refer to Task 2 Set the Arming Schedule for Motion Detection in Section 6 6 1 4 Check the checkbox to select the linkage method taken for the alarm input Refer to Task 3 Set the Alarm Actions for Motion Detection in Section 6 6 1 5 You can also choose the PTZ linking for the alarm input if your camera is installed with a pan tilt unit Check the relative c...

Page 82: ...r the alarm output optional 3 The Delay time can be set to 5sec 10sec 30sec 1min 2min 5min 10min or Manual The delay time refers to the time duration that the alarm output remains in effect after alarm occurs 4 Click Edit to enter the Edit Schedule Time interface The time schedule configuration is the same as the settings of the arming schedule for motion detection Refer to Task 2 Set the Arming S...

Page 83: ...ons taken for the Exception alarm Refer to Task 3 Set the Alarm Actions Taken for Motion Detection in Section 6 6 1 Figure 6 47 Exception Settings 3 Click Save to save the settings 6 6 6 Configuring Line Crossing Detection This function can be used for detecting people vehicles and objects crossing a pre defined area The line crossing direction can be set as bidirectional from left to right or fro...

Page 84: ...A B Only the arrow on the B side shows when an object going across the plane with both direction can be detected and alarms are triggered A B Only the object crossing the configured line from the A side to the B side can be detected B A Only the object crossing the configured line from the B side to the A side can be detected 4 Set the sensitivity 1 100 5 Choose another line crossing on the dropdo...

Page 85: ...n Note when you draw the rectangle all lines should connect end to end to each other Up to four areas are supported Figure 6 49 Configuring Intrusion Area You can click Clear to clear the areas you drawn The defense region parameters can be set separately 3 Choose the region to be configured Threshold Range 0 10s the threshold for the time of the object loitering in the region If you set the value...

Page 86: ...can trigger the alarm For example when you set the percentage as 50 half of the object entering the region will trigger the alarm Arming Schedule is configured to set the time you want the function to be enabled 1 Click Edit to set the arming schedule 2 Choose to trigger alarm actions as Notify Surveillance Center Send Email Upload to FTP and Trigger Channel or trigger the Alarm Output 3 Click Sav...

Page 87: ... Änderungen vorbehalten 87 1 Enable PIR Alarm 2 Set an Alarm Name 3 Set the Linkage Method Storage Settings Before you start To configure record settings please make sure that you have the network storage device within the network or the SD card inserted in your camera ...

Page 88: ... Configuration Advanced Configuration Storage NAS Figure 6 50 Add Network Disk 2 Enter the IP address of the network disk and enter the file path 3 Select the mounting type NFS and SMB CIFS are selectable And you can set the user name and password to guarantee the security if SMB CIFS is selected Note Please refer to the User Manual of NAS for creating the file path 4 Click Save to add the network...

Page 89: ... status of the disk is Uninitialized check the corresponding checkbox to select the disk and click Format to start initializing the disk When the initialization completed the status of disk will become Normal Figure 6 52 View Disk Status 3 Define the quota for record and pictures 1 Input the quota percentage for picture and for record 2 Click Save and refresh the browser page to activate the setti...

Page 90: ...cording Schedule Purpose There are two kinds of recording for the cameras manual recording and scheduled recording For the manual recording refer to Section 5 3 Recording and Capturing Pictures Manually In this section you can follow the instructions to configure the scheduled recording By default the record files of scheduled recording are stored in the SD card if supported or in the network disk...

Page 91: ...eters of the camera Figure 6 55 Record Parameters Pre record The time you set to start recording before the scheduled time or the event For example if an alarm triggers recording at 10 00 and the pre record time is set as 5 seconds the camera starts to record at 9 59 55 The Pre record time can be configured as No Pre record 5 s 10 s 15 s 20 s 25 s 30 s or not limited Post record The time you set t...

Page 92: ...5 min or 10 min Note The record parameter configurations vary depending on the camera model 4 Click Edit to edit the record schedule Figure 6 56 Record Schedule 5 Choose the day to set the record schedule 1 Set all day record or segment record If you want to configure the all day recording please check the All Day checkbox If you want to record in different time sections check the Customize checkb...

Page 93: ...Method of Motion Detection Settings interface For detailed information please refer to the Step 1 Set the Motion Detection Area in the Section 6 6 1 Record Triggered by Alarm If you select Alarm the video will be recorded when the alarm is triggered via the external alarm input channels Besides configuring the recording schedule you have to set the Alarm Type and check the checkbox of Trigger Chan...

Page 94: ...igure the settings on the Motion Detection and Alarm Input Settings interfaces Please refer to Section 6 6 1 and Section 6 6 4 for detailed information Figure 6 57 Edit Record Schedule 3 Check the checkbox of Select All and click Copy to copy settings of this day to the whole week You can also check any of the checkboxes before the date and click Copy 4 Click OK to save the settings and exit the E...

Page 95: ...ble Event triggered Snapshot checkbox to check event triggered snapshot 3 Select the quality of the snapshot 4 Set the time interval between two snapshots 5 Click Save to save the settings Uploading to FTP You can follow below configuration instructions to upload the snapshots to FTP Upload continuous snapshots to FTP Steps 1 Configure the FTP settings and check Upload Picture checkbox in FTP Sett...

Page 96: ...load Picture checkbox in Motion Detection Settings or Alarm Input interface Please refer to Step 3 Set the Alarm Actions Taken for Motion Detection in Section 6 6 1 or Step 4 Configuring External Alarm Input in Section 6 6 4 3 Check the Enable Event triggered Snapshot checkbox Figure 6 58 Snapshot Settings ...

Page 97: ... section explains how to view the remotely recorded video files stored in the network disks or SD cards Steps 1 Click Playback on the menu bar to enter playback interface Figure 7 1 Playback Interface 2 Select the date and click Search ...

Page 98: ...ion Button Operation Play Capture a picture Pause Start Stop clipping video files Stop Audio on and adjust volume Mute Speed down Download video files Speed up Download captured pictures Playback by frame Enable Disable digital zoom Note You can choose the file paths locally for downloaded playback video files and pictures in Local Configuration interface Please refer to Section 6 1 for details Dr...

Page 99: ...nderungen vorbehalten 99 in the Set playback time field You can also click to zoom out in the progress bar Figure 7 4 Set Playback Time Figure 7 5 Progress Bar The different colors of the video on the progress bar stand for the different video types Figure 7 6 Video Types ...

Page 100: ...lease configure network storage for the camera or insert a SD card in the camera Steps 1 Click Log on the menu bar to enter log searching interface Figure 8 1 Log Searching Interface 2 Set the log search conditions to specify the search including the Major Type Minor Type Start Time and End Time 3 Click Search to search log files The matched log files will be displayed on the Log interface ...

Page 101: ... ALLNET GmbH Computersysteme 2015 Alle Rechte vorbehalten Irrtum und Änderungen vorbehalten 101 Figure 8 2 Log Searching 4 To export the log files click Save log to save the log files in your computer ...

Page 102: ... be created Figure 9 1 User Information Add a User Steps 1 Click Add to add a user 2 Input the User Name select Level and input Password Notes Different level user owns different permissions Operator and user are selectable The system will judge the password strength automatically it is highly recommended to set a password with high security level to ensure the security A good password should be n...

Page 103: ... can check or uncheck the permissions for the new user 4 Click OK to finish the user addition Figure 9 2 Add a User Modify a User Steps 1 Left click to select the user from the list and click Modify 2 Modify the User Name Level or Password 3 In the Basic Permission field and Camera Configuration field you can check or uncheck the permissions 4 Click OK to finish the user modification ...

Page 104: ...ete 2 Click OK on the pop up dialogue box to delete the user 9 2 Authentication Purpose You can specifically secure the stream data of live view Steps 1 Enter the Authentication interface Configuration Advanced Configuration Security Authentication Figure 9 4 RTSP Authentication 2 Select the RTSP Authentication type basic or disable in the drop down list to enable or disable the RTSP authenticatio...

Page 105: ...method which is securer is adopted 4 Click Save to save the settings 9 3 Anonymous Visit Purpose Enabling this function allows visit for whom doesn t have the user name and password of the device Steps 1 Enter the Anonymous Visit interface Configuration Advanced Configuration Security Anonymous Visit Figure 9 5 Anonymous Visit 2 Set the Anonymous Visit permission Enable or Disable in the drop down...

Page 106: ...anonymous user 9 4 IP Address Filter Purpose This function makes it possible for access control Steps 1 Enter the IP Address Filter interface Configuration Advanced Configuration Security IP Address Filter Figure 9 7 IP Address Filter Interface 2 Check the checkbox of Enable IP Address Filter 3 Select the type of IP Address Filter in the drop down list Forbidden and Allowed are selectable 4 Set th...

Page 107: ...ilter list and click Modify 2 Modify the IP address in the text filed Figure 9 9 Modify an IP 3 Click the OK to finish modifying Delete an IP Address Left click an IP address from filter list and click Delete Delete all IP Addresses Click Clear to delete all the IP addrsses 5 Click Save to save the settings 9 5 Security Service To enable the remote login and improve the data communication security...

Page 108: ...ta communication security and uncheck the checkbox to disable the SSH 9 6 Viewing Device Information Enter the Device Information interface Configuration Basic Configuration System Device Information or Configuration Advanced Configuration System Device Information In the Device Information interface you can edit the Device Name Other information of the network camera such as Model Serial No Firmw...

Page 109: ... the Maintenance interface Configuration Basic Configuration System Maintenance Or Configuration Advanced Configuration System Maintenance 2 Click Reboot to reboot the network camera Figure 9 12 Reboot the Device 9 7 2 Restoring Default Settings Steps 1 Enter the Maintenance interface Configuration Basic Configuration System Maintenance Or Configuration Advanced Configuration System ...

Page 110: ...configuration of the camera which can simplify the configuration steps when there are a lot of cameras needing configuring Steps 1 Enter the Maintenance interface Configuration Basic Configuration System Maintenance or Configuration Advanced Configuration System Maintenance 2 Click Export to export the current configuration file and save it to the certain place 3 Click Browse to select the saved c...

Page 111: ...irmware or firmware directory to locate the upgrade file Firmware Locate the exact path of the upgrade file Firmware Directory Only the directory the upgrade file belongs to is required 3 Click Browse to select the local upgrade file and then click Upgrade to start remote upgrade Figure 9 15 Remote Upgrade Note The upgrading process will take 1 10 minutes Please don t disconnect power of the camer...

Page 112: ...he serial device will be controlled remotely by the computer through the network Steps 1 Enter RS 232 Port Setting interface Configuration Advanced Configuration System RS232 Figure 9 16 RS 232 Settings Note If you want to connect the camera by the RS 232 port the parameters of the RS 232 should be exactly the same with the parameters you configured here 2 Click Save to save the settings 9 9 RS 48...

Page 113: ...one Note The Baud Rate PTZ Protocol and PTZ Address parameters should be exactly the same as the PTZ camera parameters 9 10 Service Settings Go to Configuration Advanced Configuration System Service to enter the service settings interface Service settings refer to the hardware service the camera supports and it varies according to the different cameras For the cameras support IR LED ABF Auto Back ...

Page 114: ...the information of the devices You can also modify the basic network information of the devices using this software Search active devices online Search online devices automatically After launch the SADP software it automatically searches the online devices every 15 seconds from the subnet where your computer locates It displays the total number and information of the searched devices in the Online...

Page 115: ...the list Note You can click or on each column heading to order the information you can click to expand the device table and hide the network parameter panel on the right side or click to show the network parameter panel Modify network parameters Steps 1 Select the device to be modified in the device list and the network parameters of the device will be displayed in the Modify Network Parameters pa...

Page 116: ...Modify Network Parameters Restore default password Steps 1 Contact our technical engineers to get the serial code Note Serial code is a series of characters combined by the start time and the serial number of the device 2 Input the code in the Serial code field and click Confirm to restore the default password ...

Page 117: ...2 1 Select the WAN Connection Type 2 Set the LAN parameters of the router as in the following figure including IP address and subnet mask settings Figure A 2 2 Set the LAN parameters 3 Set the port mapping in the virtual severs of Forwarding By default camera uses port 80 8000 and 554 You can change these ports value with web browser or client software Example When the cameras are connected to the...

Page 118: ... map the port 80 8000 554 and 8200 for the network camera at 192 168 1 23 2 Map the port 81 8001 555 and 8201 for the network camera at 192 168 1 24 3 Enable ALL or TCP protocols 4 Check the Enable checkbox and click Save Figure A 2 3 Port Mapping Note The port of the network camera cannot conflict with other ports For example some web management port of the router is 80 Change the camera port if ...

Page 119: ...de downloads html ALLNET GmbH Computersysteme declares that the device ALL CAM2395 LVEF is in compliance with the essential requirements and other relevant provisions of Directive 2004 108 EC The Declaration of conformity can be found under this link www allnet de downloads html ALLNET GmbH Computersysteme declares that the device ALL CAM2396 LEF is in compliance with the essential requirements an...

Page 120: ...CTION IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERE...

Page 121: ...her gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each auth...

Page 122: ...gram normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view...

Page 123: ...hough third parties are not compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you...

Page 124: ...ed and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and ...

Page 125: ...nse or at your option any later version This program is distributed in the hope that it will be useful but WITHOUT ANY WARRANTY without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE See the GNU General Public License for more details You should have received a copy of the GNU General Public License along with this program if not write to the Free Software Foundat...

Page 126: ...stribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these righ...

Page 127: ...rary in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library The ...

Page 128: ...ed then you must make a good faith effort to ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any applicatio...

Page 129: ...work may be a derivative work of the Library even though the source code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros and small inline f...

Page 130: ...gether in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided ...

Page 131: ... thoroughly clear what is believed to be a consequence of the rest of this License 12 If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitt...

Page 132: ...To apply these terms attach the following notices to the library It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found one line to give the library s name and a brief idea of what it does Copyright C year name of author This library is fr...

Reviews: