background image

63

User Manual

Visit the ViewZ USA website at https://www.viewzusa.com

CONFIG. /INTELLIGENT ANALYSIS

7. Object Removed

Deployment Area Settings 

Move the cursor to the drawing interface and click to generate a point, move the cursor to draw a line, and 

then click to generate another point. This is how a line is generated. In this way, continue to draw lines to form 

any shape, and right-click to finish line drawing as shown in Figure 6-21

Figure 6-21 Deployment Area Setting Interface 

Note 

• 

A drawn line cannot cross another one, or the line drawing fails.

• 

Any shape with 32 sides at most can be drawn.

• 

The quantity of deployment areas is not limited yet and will be described in future when a limit is applied.

Summary of Contents for IP-PVM-N Series

Page 1: ...WEB BASED IP PVM N USER MANUAL V 1 9 Please read this manual thoroughly before use and keep it handy for future reference 23 27 32 IP PUBLIC VIEW MONITOR VZ IP PVM N SERIES ...

Page 2: ...iguration of Date and Time 4 Setup Channel Name Video Source Resolution 5 Setup OSD Parameters 6 Configuration of Analog Output CVBS 7 Configuration of System Language Webmode 1 Setup Video and Audio Parameters 2 Signal Virtual Fence 3 Double Virtual Fence 4 Loiter 5 Multiple Loiter 6 Object Left 2 Setup ROI Parameters 2 Main Page 3 Change Password 1 Configuration of IP PVM s Information 1 Perimet...

Page 3: ...g 7 Setup IP Filter Parameters 3 Setup PPPoE Parameters 6 Setup FTP Parameters 9 Converse 11 Single Bad 12 Advanced 8 Setup CGI Alarm Service Center Parameters 9 Setup SNMP Parameters 3 Setup Motion Detection Alarm Parameters 2 Setup Network Alarm Parameters 1 Setup 802 1x Parameters 1 Configuration of Permission for User 1 Protocol Info 2 Setup Security Authentification 3 Setup Multicast Paramete...

Page 4: ...ViewZ USA website at https www viewzusa com Configuration Device Logs Maintenance 1 Operation Logs 1 Restart a Device 3 Collect All Logs 2 Alarm Logs 2 Restore a Device to Factory Settings 113 118 113 118 117 115 119 CONTENTS ...

Page 5: ...t avoided could result in death or serious injury WARNING Indicates a potentially hazardous situation which if not avoided may result in minor or moderate injury CAUTION Indicates a potentially hazardous situation which if not avoided could result in equipment damage data loss performance deterioration or unanticipated results NOTICE is used to address practices not related to personal injury NOTI...

Page 6: ... Factory Default Subnet Mask 255 255 255 0 Factory Default Gateway 192 168 0 1 Factory Default DNS 1 192 168 0 1 Factory Default DNS 2 192 168 0 2 Caution IP address and gateway address should be set with the same IP parameters For example if IP address is A B C 0 255 then gateway address should be set as A B C 0 255 however IP and gateway address cannot be the same Note The default user name is a...

Page 7: ...is displayed in this area You can also set sensor parameters When the device encounters an exception the fault icon is displayed You can click to view the fault information You can select options to set device configuration including the device information audio and video streams alarm setting and privacy mask function When the device generates an alarm the alarm icon is displayed You can click to...

Page 8: ... Figure 1 3 and Figure 1 3 1 Step 2 Enter the old password new password and confirm the new password Step 4 Enter the old password new password and confirm the new password Step 3 Click OK If the message Change own password success is displayed the password has been successfully changed If the password change fails the cause will be displayed For example the new password length couldn t be less th...

Page 9: ...agement system Step 1 To ensure that real time video can be played properly you must perform the following operations when you log in to the web management system for the first time Open Internet Explorer Choose Tools Internet Options Security Trusted sites Sites In the displayed dialog box click Add as shown in Figure 2 1 Preparation Figure 2 1 Add a trusted site ...

Page 10: ...veX controls and Initialize and script ActiveX controls not marked as safe for scripting under ActiveX controls and plug ins to Enable as shown in Figure 2 2 Step 3 Download and install the player control as prompted Figure 2 2 Configure ActiveX controls and plug ins Note If the repair tips is prompted while installing the control ignore the prompt and continue the installation The login page is d...

Page 11: ...area to enter the full screen mode and double click again to exit Switch among preset streams 1 2 and 3 For details about how to configure streams See 3 2 Setting Video and Audio Stream Parameters Configure the sensor You can right click in the video area A shortcut menu is displayed and allows you to enter the full screen mode set sensor parameters zoom in or out and return to the default view To...

Page 12: ...ions Number of video channels number of alarm input channels number of alarm output channels and number of serial ports Step 1 Click Configuration Device Info The Configuration Device Info page is displayed as shown in Figure 3 1 Description Procedure Note You can modify the device name All other parameters can only be viewed When the device is upgraded the device information will be updated autom...

Page 13: ...ails see 10 1 Configuration of Permission for Group Procedure Device ID Device Name MAC Address Camera Type Manufacturer ID Manufacturer Name Hardware Version Software Version Video Channel s Alarm Input s Alarm Output s Serial Port s Network Card Setting method The parameter cannot be modified Enter a value manually Setting method Setting method These parameters cannot be modified Unique device i...

Page 14: ...ttps www viewzusa com Figure 4 1 Stream Configuration page CONFIGURATION STREAM 1 Setup Video and Audio Parameters Step 1 Click Stream Configuration Stream Base Stream The Base Stream Configuration page is displayed as shown in Figure 4 1 Procedure ...

Page 15: ...odec The maximum resolution can be set for streams 1 Only a low resolution can be set for stream 2 ID of the video output channel Stream name NOTE NOTE An IP camera has only one video output channel MJPEG is a standard intra frame compression No mosaic is displayed on motion images The stream name is combined with character Therefore only the default value 1 is available codec The compressed image...

Page 16: ...Profile If a hardware decoding device is used select the appropriate codec based on the decoding performance of the device H 264 High Profile has the highest requirements on the hardware performance and H 264 Base Profile has the lowest requirements on the hardware H 265 is the new video encoding standard it s the the streams encoding quality and algorithm performance improvement standard from H 2...

Page 17: ...ect a value from the drop down Select a value from the drop down list box list box Setting method Setting method Setting method Select a value from the drop down list box 50 Hz 1 25 f s 60 Hz 1 30 f s Frame rates for different frequencies are as follows I frames do not require other frames to decode A smaller I frame interval means better video quality but higher bandwidth NOTE The compression spe...

Page 18: ...of the bit rate The video quality on the camera output Setting Parameter DESCRIPTION Table 4 1 Stream configuration parameters Step 3 Click Apply If the message Apply success is displayed click Confirm The system saves the settings If the message Apply failed is displayed you must apply for the Parameter Configure permission from an administrator For details see 10 1 Configuration of Permission fo...

Page 19: ...at https www viewzusa com CONFIGURATION STREAM 2 Setup ROI Parameters Procedure Step 1 Click Stream Configuration Stream ROI The ROI Stream page is displayed as shown in Figure 4 2 ROI Region of Interest Figure 4 2 ROI Stream Configuration page ...

Page 20: ... value OFF Default value Stream 1 Default value 1 Default value 5 should be less than 32 Bytes Setting method Click to ON OFF Setting method Pull down and select Setting method Pull down and select Setting method Pull down and select Setting method Name length Enable ROI function clearer the image within the ROI area and blurrier the image outside the ROI area Stream name ROI Area ID number Refers...

Page 21: ...edure Local network parameters include IP protocol IP address Subnet mask Default gateway Dynamic Host Configuration Protocol DHCP Preferred Domain Name System DNS server Alternate DNS server MTU Step 1 Choose Device Configuration Device Local Network The Local Network page is displayed as shown in Figure 5 1 Figure 5 1 Local Network page ...

Page 22: ...etting method Enter a value manually Setting method Enter a value manually Setting method Enter a value manually The device automatically obtains the IP address from the DHCP server Set the maximum value of network transmission data packets IPv4 is the IP protocol that uses an address length of 32 bits IP address that the DHCP server assigns to the device Device IP address that can be set as requi...

Page 23: ...ly success is displayed click Confirm The system saves the settings The message Set network parameter success Please login system again is displayed Use the new IP address to log in to the web management system If the message Invalid IP Address Invalid Subnet Mask Invalid Default Gateway Invalid Primary DNS or Invalid Space DNS is displayed set the parameters correctly ...

Page 24: ... port Real Time Streaming Protocol RTSP port and RTMP port for device route mapping in a LAN Step 2 Set the parameters according to Table 5 2 Step 3 Click Apply If the This operation will lead to the device to restart continue dialog box is displayed click Confirm The system automatically restarts and saves the settings If the message Invalid Control Port Please input an integer between 1025 and 6...

Page 25: ...f the Date and Time CONFIGURATION Device Description Procedure Step 1 Choose Device Configuration Device Date and Time The Date page is displayed as shown in Figure 5 3 Table5 3 describes the parameters On the Date Time page you can modify the date and time Figure 5 3 Time and Date page ...

Page 26: ...rent PC automatically goes forward one hour When the DST end time arrives the device time automatically goes backward one hour from the drop down list box Click the button on to enable Adjust Synchronize the time from the PC and set the date and time in the on to enable NTP and enter a value manually format YYYY MM DD HH MM SS clock for daylight saving changes Enter a value manually Greenwich mean...

Page 27: ...s and specify the DST start time and end time Step 5 Configure the NTP 1 Click the button on to enable NTP 2 Enter the IP address or domain name of the NTP server and the port number Step 6 Click the icon The message Apply success is displayed Step 7 Click Confirm The system saves the settings Step 4 Modify the device time Synchronizing time from the PC Click Current PC Time Manually setting the d...

Page 28: ...ope and China mainland 50 Hz corresponds to the PAL system NTSC Used in USA and Japan 60 Hz corresponds to NTSC system Channel name within the length of 0 to 32 bytes Step 1 Choose Device Configuration Device Camera The Camera page is displayed as shown in Figure 5 4 Table 5 4 describes the parameters from the drop down list box from the drop down list box the video system Enter a value manually S...

Page 29: ...tep 3 Click the icon The message Apply success is displayed Note The channel name must be within the length of 0 to 32 bytes it is combined with digital and character except for some special character Note If the video system and source resolution are modified the message The device will restart are you sure to modify is displayed and the system automatically saves the settings The settings take e...

Page 30: ...r column varies according to the resolution When the OSD font is auto If the resolution is 1920 x 1080 and the size of each character is 48 x 48 then the maximum row of OSD is 22 1080 48 and the maximum column is 40 1920 48 If the resolution is 704 x 576 and the size of each character is 32 x 32 then the maximum row of OSD is 18 576 32 and the maximum column is 22 704 32 If the resolution is 640 x...

Page 31: ...n videos Set the font color Set the font transparency on lighted back Enable the font on lighted back Format in which the time is displayed to display the time from the drop down list box blank boxes and write a value within the lengh of 0 to 32 characters in custom OSD Click the icon to apply custom OSD value to display the device name from the drop down list box from the drop down list box to en...

Page 32: ...Visit the ViewZ USA website at https www viewzusa com CONFIGURATION DEVICE 5 Setup OSD Parameters Procedure Step 4 Click Confirm The system saves the settings Step 3 Click Apply The message Apply success is displayed ...

Page 33: ...output function is enabled the IP camera can send analog signals to a video server or display device through the VIDEO OUT port Step 1 Choose Device Configuration Device CVBS The BNC Video Output page is displayed as shown in Figure 5 6 Step 2 Click the button on to enable BNC Video Output Step 3 Click Apply The message Apply success is displayed Step 4 Click Confirm The system saves the settings ...

Page 34: ...e settings Step 7 Click Confirm The message Apply success is displayed the system restart Step 2 Select a language from the language drop down list box The default language is English Step 5 Select a web mode from the web mode drop down list box Step 1 Choose Device Configuration Device System The System page is displayed as shown in Figure 5 7 Figure 5 7 System configuration page Step 3 Click the...

Page 35: ...Try to install the device in a place where the light reflection from ground is weak in case of indoor installation Try to keep the sky out of the field of view because false alarms may be generated due to illumination changes or cloud movement Other Precautions Try to disable automatic white balance the switch of which tends to cause alarm missing Set the camera to be fixed focus Do not switch fro...

Page 36: ... the alarm that is generated when the targets of specified types such as human vehicle and both enter the deployment area Step 1 Select Configuration Intelligent Analysis Perimeter to access the Perimeter interface as shown in Figure 6 1 Step 2 Set all parameters for perimeter Table 6 1 describes the specific parameters Figure 6 1 Perimeter Setting Interface ...

Page 37: ...ading to false alarms It is recommended to set the target type to human for indoor use Setting range 1 1 800 seconds An alarm is generated when objects enter the Effective alarms are set based on target type with The target size for triggering an effective alarm is set is 0 1000000 square centimeters When setting the may be generated based on the actual target size The default value is target size...

Page 38: ...ployment Time Settings Setting deployment time Click to select any time point within 0 00 24 00 from Monday to Sunday or hold down the left mouse button drag and release the mouse to select the deployment time within 0 00 24 00 from Monday to Sunday and then click Apply to successfully set the time Note When you select time by dragging the cursor the cursor cannot be moved out of the time area Oth...

Page 39: ...e mouse to generate a green rectangle which forms a deployment area You can also click the square grid in the interface to set the deployment area Click clear to delete the deployment area as shown in Figure 6 3 Deployment Area Settings Note A drawn line cannot cross another one or the line drawing fails Any shape with 32 sides at most can be drawn The quantity of deployment areas is not limited y...

Page 40: ...alysis Single Virtual Fence to access the Single Virtual Fence setting interface as shown in Figure 6 4 A single virtual fence is a line that is set at a concerned position within the monitored field of view and specifies the forbidden travel direction An alarm is generated when the specified types of targets such as human or vehicle cross this line Step 2 Set all parameters for the single virtual...

Page 41: ...tting the generated based on the actual target size The default value is target size you need to well set Real size in scene 1000 100000 square centimeters and the setting range in advanced parameters otherwise no alarms may be Enable the function of uploading target information by clicking below the Live video in a flash browser to turn into When an alarm is triggered the target movement trace ca...

Page 42: ...cription Deployment Time Settings Setting deployment time Click to select any time point within 0 00 24 00 from Monday to Sunday or hold down the left mouse button drag and release the mouse to select the deployment time within 0 00 24 00 from Monday to Sunday and then click Apply to successfully set the time Note When you select time by dragging the cursor the cursor cannot be moved out of the ti...

Page 43: ...irtual fence and move the mouse to modify the position and length of this single virtual fence You can right click to delete the single virtual fence as shown in Figure 6 6 Figure 6 6 Deployment Area Setting Interface Note A single virtual fence is not within any deployment area therefore when an alarm is generated the trace always exists Only when the target object moves out of the field of view ...

Page 44: ...ual Fence setting interface as shown in Figure 6 7 Double virtual fence refers to two lines that are set at a concerned special position within the field of view and specify the forbidden travel diretion When the targets of specified types such as human or vehicle move along the set travel direction and cross these lines in a certain order line 1 folled by line 2 in pass max time an alarm is gener...

Page 45: ...iggering an effective alarm is set An alarm is generated only when the time taken to is 0 1000000 square centimeters When setting the generated based on the actual target size The default value is cross the double virtual fences is less than the value The default value is 10 seconds and the setting range is 1 60 seconds target size you need to well set Real size in scene 1000 100000 square centime...

Page 46: ...yed The trace can be seen only within the deployment area and disappears after the target leaves the deployment area Setting Parameter DESCRIPTION Table 6 3 Double Virtual Fence Parameter Description Deployment Time Settings Setting deployment time Click to select any time point within 0 00 24 00 from Monday to Sunday or hold down the left mouse button drag and release the mouse to select the depl...

Page 47: ...ength of the virtual fence You can do right click to delete the double virtual fences as shown in Figure 6 9 Figure 6 9 Deployment Area Setting Interface Note The two virtual fences are in sequential order An alarm is generated only when a target crosses virtual fence 1 and then virtual fence 2 within the set maximum passing time The double virtual fences are not within any deployment area therefo...

Page 48: ... to access the Loiter setting interface as shown in Figure 6 10 Loiter allows setting the shortest loitering time for a single target of specified type such as human or vehicle within the deployment area in the field of view When the loitering time of a single target within this area meets the set shortest loitering time an alarm is generated Step 2 Set all parameters for the Loiter Table 6 4 desc...

Page 49: ...larm is set The time that a targeted object spends in loitering The enabling of path analysis makes loitering judgment is 0 1000000 square centimeters When setting the may be generated based on the actual target size The default value is cannot be less than the shortest loitering time accurate by using the software algorithm for example no alarm is generated when a person walks along a straight li...

Page 50: ...yed The trace can be seen only within the deployment area and disappears after the target leaves the deployment area Setting Parameter DESCRIPTION Table 6 4 Loiter Parameter Description Deployment Time Settings Setting deployment time Click to select any time point within 0 00 24 00 from Monday to Sunday or hold down the left mouse button drag and release the mouse to select the deployment time wi...

Page 51: ...ick to generate another point This is how a line is generated In this way continue to draw lines to form any shape and right click to finish line drawing as shown in Figure 6 12 Figure 6 12 Deployment Area Setting Interface Note A drawn line cannot cross another one or the line drawing fails Any shape with 32 sides at most can be drawn The quantity of deployment areas is not limited yet and will b...

Page 52: ...ss the Multiple Loiter setting interface as shown in Figure 6 13 Multiple loiter allows setting the shortest loitering time for multiple targets of specified type such as human or vehicle within the deployment area in the field of view When the loitering time of the multiple targets within this area meets the set shortest loitering time an alarm is generated Step 2 Set all parameters for the Multi...

Page 53: ...t Numbers is set to ON if the minimum number is set to 2 and the maximum number is set to 3 an alarm is generated for 2 3 people loitering Other settings are the same as loitering The time that a target object spends in loitering is 0 1000000 square centimeters When setting the may be generated based on the actual target size The default value is cannot be less than the shortest loitering time Set...

Page 54: ... time within 0 00 24 00 from Monday to Sunday and then click Apply to successfully set the time Note When you select time by dragging the cursor the cursor cannot be moved out of the time area Otherwise no time can be selected Deleting deployment time Select the week on the left of set time which becomes red after selection as shown in Figure 6 14 and then click Delete to erase the deployment time...

Page 55: ...n click to generate another point This is how a line is generated In this way continue to draw lines to form any shape and right click to finish line drawing as shown in Figure 6 15 Figure 6 15 Deployment Area Setting Interface Note A drawn line cannot cross another one or the line drawing fails Any shape with 32 sides at most can be drawn The quantity of deployment areas is not limited yet and wi...

Page 56: ...ace Step 1 Select Configuration Intelligent Analysis Object Left to access the Object Left setting interface as shown in Figure 6 16 The object left function refers to that an alarm is generated when the dwelling time of an object within the deployment area meets the set shortest dwelling time Step 2 Set all parameters for the Loiter Table 6 6 describes the specific parameters ...

Page 57: ...s generated when the dwelling time of an The target size for triggering an effective alarm is set An alarm is generated when the object left time is is 0 1000000 square centimeters When setting the may be generated based on the actual target size The default value is longer than the shortest dwelling time target size you need to accurately set Real size in 1000 100000 square centimeters and the se...

Page 58: ...ime within 0 00 24 00 from Monday to Sunday and then click Apply to successfully set the time Note When you select time by dragging the cursor the cursor cannot be moved out of the time area Otherwise no time can be selected Deleting deployment time Select the week on the left of set time which becomes red after selection as shown in Figure 6 17 and then click Delete to erase the deployment time Y...

Page 59: ...click to generate another point This is how a line is generated In this way continue to draw lines to form any shape and right click to finish line drawing as shown in Figure 6 18 Figure 6 18 Deployment Area Setting Interface Note A drawn line cannot cross another one or the line drawing fails Any shape with 32 sides at most can be drawn The quantity of deployment areas is not limited yet and will...

Page 60: ...ved to access the Object Removed setting interface as shown in Figure 6 19 Move the cursor to the drawing interface and click to generate a point move the cursor to draw a line and then click to generate another point This is how a line is generated In this way continue to draw lines to form any shape and right click to finish line drawing as shown in Figure 6 19 Step 2 Set all parameters for the ...

Page 61: ...nerated when the removing time of an The target size for triggering an effective alarm is set An alarm is generated when the object removed time is 0 1000000 square centimeters When setting the may be generated based on the actual target size The default value is is longer than the shortest removing time Setting range 5 60 seconds target size you need to accurately set Real size in 1000 100000 squ...

Page 62: ... time within 0 00 24 00 from Monday to Sunday and then click Apply to successfully set the time Note When you select time by dragging the cursor the cursor cannot be moved out of the time area Otherwise no time can be selected Deleting deployment time Select the week on the left of set time which becomes red after selection as shown in Figure 6 20 and then click Delete to erase the deployment time...

Page 63: ...n click to generate another point This is how a line is generated In this way continue to draw lines to form any shape and right click to finish line drawing as shown in Figure 6 21 Figure 6 21 Deployment Area Setting Interface Note A drawn line cannot cross another one or the line drawing fails Any shape with 32 sides at most can be drawn The quantity of deployment areas is not limited yet and wi...

Page 64: ...ysis Abnormal Speed to access the Abnormal Speed setting interface as shown in Figure 6 22 Abnormal speed allows setting the travel speed criteria for a target within the deployment area on the video screen When the travel speed of a target of specified type such as human or vehicle within this area meets the alarm condition an alarm is generated Step 2 Set all parameters for the Loiter Table 6 8 ...

Page 65: ...r triggering an effective alarm is set Set prohibited speeds When a target object crosses is 0 1000000 square centimeters When setting the may be generated based on the actual target size The default value is an area at a speed between the minimum and maximum speeds an alarm is generated Setting range 5 60 seconds target size you need to accurately set Real size in 1000 100000 square centimeters a...

Page 66: ...yed The trace can be seen only within the deployment area and disappears after the target leaves the deployment area Setting Parameter DESCRIPTION Table 6 8 Abnormal Speed Parameter Description Deployment Time Settings Setting deployment time Click to select any time point within 0 00 24 00 from Monday to Sunday or hold down the left mouse button drag and release the mouse to select the deployment...

Page 67: ...n click to generate another point This is how a line is generated In this way continue to draw lines to form any shape and right click to finish line drawing as shown in Figure 6 24 Figure 6 24 Deployment Area Setting Interface Note A drawn line cannot cross another one or the line drawing fails Any shape with 32 sides at most can be drawn The quantity of deployment areas is not limited yet and wi...

Page 68: ...elligent Analysis Converse to access the Converse setting interface as shown in Figure 6 25 Converse allows setting the travel direction criteria for a target within an area on the video screen When a target of specified type such as human or vehicle within this area moves in the set travel direction an alarm is generated Step 2 Set all parameters for the Loiter Table 6 9 describes the specific pa...

Page 69: ...eters When setting the may be generated based on the actual target size The default value is target size you need to accurately set Real size in 1000 100000 square centimeters and the setting range scene in advanced parameters otherwise no alarms Enable the function of uploading target information by clicking below the Live video in a flash browser to turn into When an alarm is triggered the targe...

Page 70: ...oyment Time Settings Setting deployment time Click to select any time point within 0 00 24 00 from Monday to Sunday or hold down the left mouse button drag and release the mouse to select the deployment time within 0 00 24 00 from Monday to Sunday and then click Apply to successfully set the time Note When you select time by dragging the cursor the cursor cannot be moved out of the time area Other...

Page 71: ...lick to generate another point This is how a line is generated In this way continue to draw lines to form any shape and right click to finish line drawing as shown in Figure 6 27 Figure 6 27 Deployment Area Setting Interface Note A drawn line cannot cross another one or the line drawing fails Any shape with 32 sides at most can be drawn The quantity of deployment areas is not limited yet and will ...

Page 72: ...nalysis Illegal Parking to access the Illegal Parking setting interface as shown in Figure 6 28 Illegal parking allows setting the dwelling time criteria for a target within the deployment area on the video screen When the dwelling time of a target of specified type vehicle within this area meets the set allowed parking time an alarm is generated Step 2 Set all parameters for the Loiter Table 6 10...

Page 73: ...ling time of a The target size for triggering an effective alarm is set An alarm is generated when the object left time is longer than the shortest dwelling time Setting range 5 60 seconds is 0 1000000 square centimeters When setting the may be generated based on the actual target size The default value is target size you need to accurately set Real size in 1000 100000 square centimeters and the s...

Page 74: ...lect the deployment time within 0 00 24 00 from Monday to Sunday and then click Apply to successfully set the time Note When you select time by dragging the cursor the cursor cannot be moved out of the time area Otherwise no time can be selected Deleting deployment time Select the week on the left of set time which becomes red after selection as shown in Figure 6 29 and then click Delete to erase ...

Page 75: ...en click to generate another point This is how a line is generated In this way continue to draw lines to form any shape and right click to finish line drawing as shown in Figure 6 30 Figure 6 30 Deployment Area Setting Interface Note A drawn line cannot cross another one or the line drawing fails Any shape with 32 sides at most can be drawn The quantity of deployment areas is not limited yet and w...

Page 76: ...l Bad is generated 11 Single Bad CONFIG INTELLIGENTANALYSIS Function Definition Function Settings Figure 6 31 Single Bad Interface Step 1 Select Configuration Intelligent Analysis Single Bad to access the Single Bad setting interface as shown in Figure 6 31 Signal bad refers to that an alarm is generated if an event such as tampered or shifted occurs Step 2 Set all parameters for the Loiter Table ...

Page 77: ... the Output Channel and the device If you turn on system will send a notice email You can set the email on Network Service SMTP Deployment Time Settings Setting deployment time Click to select any time point within 0 00 24 00 from Monday to Sunday or hold down the left mouse button drag and release the mouse to select the deployment time within 0 00 24 00 from Monday to Sunday and then click Apply...

Page 78: ...ep 1 Select Configuration Intelligent Analysis Advanced to access the Illegal Parking setting interface as shown in Figure 6 33 Step 2 You can enable disable Camera Shake High Noise Low Contrast and Period Motion based on Scene settings Table 6 12 describes the specific parameters Caution This function is only applicable to camera with intelligent analysis function ...

Page 79: ...lation with the image object The method and rules for drawing line as below 2 4 vertical lines or 2 vertical lines and 2 ground lines need to be entered In the case of low marking requirement two vertical lines can meet most scene requirements Normally the vertical line is marked based on human height The lines are distributed near and far Two vertical lines are in the scene one near and the other...

Page 80: ...wzusa com CONFIGURATION ALARM 1 Setup Alarm Output Parameters Procedure Step 1 Choose Alarm Configuration Alarm Alarm Output The Alarm Output page is displayed as shown in Figure 7 1 Step 2 Set the parameters according to Table 7 1 Figure 6 1 Alarm Output page ...

Page 81: ... generated when an external Open An alarm is generated when no external alarm signal is received alarm signal is received ID of the alarm output channel Alarm output channel name The options are as follows When the device receives I O alarm signals the device Alarm output duration The value 0 indicates that the Control the alarm output alarm remains valid sends the alarm information to an external...

Page 82: ...t Channel number Step 5 Click Apply The message Apply success is displayed Step 3 Configure the alarm interval Step 6 Click Confirm The system saves the settings Step 2 Click the button on to enable exceptional alarm Step 1 Choose Configuration Alarm Network Alarm The Network Alarm page is displayed as shown in Figure 7 2 Figure 7 2 Network Alarm page ...

Page 83: ... output channel Step 1 Choose Configuration Alarm Motion Alarm The Motion Alarm page is displayed as shown in Figure 7 3 Figure 7 3 Motion Alarm page On the Motion Alarm page you can perform the following operations Enable the motion detection function Set the motion detection arming time Set the motion detection area Configure the motion alarm output channel When the alarm output function is enab...

Page 84: ...rm Step 8 Configure the detection area Press and hold the left mouse button and drag in the video area to draw a detection area Step 9 Click Apply The message Apply success is displayed Step 10 Click Confirm The system saves the settings Figure 7 4 Motion Area Setting page Setup motion detection area Note Click Clear to delete a detection area Click Reverse to select the area out of specified fram...

Page 85: ...he preview image to cover the part to be masked Choose Configuration Privacy Masking The Privacy Masking page is displayed as shown in Figure 8 1 Note The maximum percentage of an image that can be masked depends on the device model Read the tip displayed on the page A maximum of five areas can be masked You can click Refresh to configure the masked areas again Delete button is to delete Masking a...

Page 86: ...ify it 3 Click Modify the privacy masking is N A Setting method Click the name and Setting method Select a value from Setting method Select a value from Default Value Blank Default Value Color Block Setting method Select a value from Setting method ID of Privacy Masking Name of privacy Masking Type of privacy masking Color of privacy masking Indicates whether to enable the privacy masking Delete a...

Page 87: ...p 3 Enter the account name Step 4 Enter the password and confirm password Step 2 Click Apply The message Apply success is displayed Step 1 Choose Network Service 802 1x The 802 1 page is displayed as shown in Figure 9 1 Figure 9 1 802 1x page 802 1x authentication must be configured on the access port which controls to access network resources for the connected user devices on the port ...

Page 88: ...reparation Procedure Step 2 Set the parameters according to Table 9 1 Step 1 Choose Network Service DDNS The DDNS page is displayed as shown in Figure 9 2 Figure 9 2 DDNS page Connect the specified camera to the Internet and obtain the user name and password for logging into the Dynamic Domain Name System DDNS server ...

Page 89: ...wn list box Enter a value manually Enter a value manually Enter a value manually Setting method Setting method Select a value from Setting method Default Value OFF Default Value 3322 Setting method Setting method Indicates whether to enable the DDNS service DDNS service provider Currently only 3322 and Installed network card name Host name customized by a user DynDns are supported User name to log...

Page 90: ... Click the button on to enable PPPoE Step 1 Choose Network Service PPPoE The PPPoE page is displayed as shown in Figure 9 3 Figure 9 3 PPPoE page Obtain the PPPoE user name and password from the network carrier If a PPPoE connection is used you need to enter the user name and password on the PPPoE page After you restart the device the PPPoE settings take effect and the device obtains a public IP a...

Page 91: ...the parameters correctly Table 9 2 PPPoE parameters PPPoE Account Password IP Address Click the button ON Enter a value manually Enter a value manually Setting method Default Value OFF Setting method Setting method Indicates whether to enable the PPPoE service PPPoE user name provided by the network carrier Password provided by the network carrier The parameter is automatically filled by network S...

Page 92: ...o enable Port Mapping Step 3 Set the parameters according to Table 9 3 Step 1 Choose Network Service Port Mapping The Port Mapping page is displayed as shown in Figure 9 4 Figure 9 4 Port Mapping page With port forwarding can setup the connection between privacy network and public network Enable the port forwarding to access the privacy network devices from public network ...

Page 93: ...ide Port Outside IP Address State Click the button ON the drop down list box Enter a value manually in map mode Setting method Setting method Select a value from N A Setting method Default Value OFF Default Value Auto N A N A Indicates whether to enable the Port Mapping service Mode of port mapping includes auto and manual Port Type includes HTTP RTSP and Control Port of outside network IP address...

Page 94: ... Step 2 Set the parameters according to Table 9 4 Step 1 Choose Network Service SMTP The SMTP page is displayed as shown in Figure 9 5 Figure 9 5 SMTP page If the Simple Mail Transfer Protocol SMTP function is enabled the device automatically sends JPG images and alarm information to specified email addresses when an alarm is generated ...

Page 95: ...wn list box Setting method Default Value Blank Setting method Setting method Setting method Enter a value manually Setting method Enter a value manually Setting method Setting method Setting method Select a value from Setting method Select a value from Email SMTP address Required to type Required to type Required to type Required to type Required to type Required to type This one can be same as Us...

Page 96: ...dure Step 1 Choose Network Service FTP The FTP page is displayed as shown in Figure 9 6 Figure 7 6 FTP page If the File Transfer Protocol FTP button is enabled the device automatically sends the snapped alarm JPG images to specified FTP server Step 2 Click the button on to enable FTP Step 3 Set the parameters according to Table 9 5 ...

Page 97: ... manually Default Value Blank Enter a value manually the drop down list box Setting method Default Value OFF Setting method Setting method Setting method Enter a value manually Setting method Enter a value manually Setting method Setting method Select a value from Indicates whether to enable the FTP service Set this parameter based on the site requirement IP address of FTP server Port of FTP serve...

Page 98: ...Step 1 Choose Network Service IP Filter The FTP page is displayed as shown in Figure 9 7 Figure 9 7 IP Filter page Figure 9 8 IP Filter page add white black IP list Set the IP address in specified network segment to allow access or prohibit access Step 2 Click the button on to enable IP Filter Step 3 Set the parameters according to Table 9 6 ...

Page 99: ...End IP Address 1 Click to enter the add black 3 Enter End IP Address Setting method Default Value OFF Setting method Select a value from Setting method 2 Enter Begin IP Address 4 Enter Descrtption Setting method 2 Enter Begin IP Address Indicates whether to enable the IP Filter IP filter type includes black list and white list Specified network segment to allow access Specified network segment to ...

Page 100: ...GI Alarm Service Center page Device will push the alarm message by CGI with Start URL and End URL and send to data to CGI Server by HTTP protocol CGI alarm message is the head of User Agent of HTTP Use HTTP protocol get and send to CGI Server When need to integrate the CGI alarm message need to resolve the HTTP Head User Agent to get the data of CGI alarm message Step 2 Click the button on to enab...

Page 101: ...Time Description AlarmTime Description the drop down list box Enter a value manually Enter a value manually Enter a value manually Setting method Default Value OFF Setting method Setting method Enter a value manually Setting method Enter a value manually Setting method Select a value from Indicates whether to enable the IP Filter Name of CGI Alarm Push the alarm message by CGI with start URL Push ...

Page 102: ... Port platform Password Test the connection to the specified HTTP server platform User Name Enter a value manually Enter a value manually Enter a value manually Enter a value manually Click Test if the device connects to the proxy successfully the message Test CGI alarm success is displayed Setting method Setting method Setting method Setting method Setting method IP address of Forwarder server Po...

Page 103: ... 9 10 Figure 9 10 SNMP page Simple Network Management Protocol SNMP is an Internet Standard protocol supports SNMP v1 SNMP v2c and SNMP v3 network protocol Choose the proper SNMP protocol version and set the SNMP protocol parameter to collect and organize information about managed devices on IP networks Step 2 Click the button on to enable SNMP v1 SNMP v2C and SNMP v3 Step 3 Set the parameters acc...

Page 104: ...h Authentication but no encryption Priv Authentication and encryption Name of write security Name of read community Community string of trap The trap community string allows the manager to receive asynchronous information from the agent IP address of the trap Management port of accepting message from trap The write community only can modify data The write community only can read data SNMPv1 and SN...

Page 105: ...nter a value manually Setting method Default Value 16 Setting method Setting method Authentication password Encryption Algorithm includes DES and AES Encryption password Port of SNMP Setting Parameter DESCRIPTION Step 4 Click Apply The message Apply success is displayed Click Confirm The system saves the settings If other information is displayed set the parameters correctly the drop down list box...

Page 106: ...ame After creating a Group edit a parameter on Figure 8 1 Figure 8 1 and then type the User Name login ID and Password like Password user need to assign a role Figure 8 2 After typing User Name like Figure 8 3 NOTE User can setup or create an User under the Group Role The Group permission is based on 3 categories which are Administrators Operator and Media user where the Administrators default gro...

Page 107: ...er page Figure 10 2 User page Add User Figure 10 3 User page Add User by Role Figure 10 4 User page Modify User You can add modify and delete a user and unlock a user that is locked after entering an incorrect password for specified number of times The Privilege Manage permission is required to unlock a user Note Only the users with the Privilege Manage permission can access the Group and User pag...

Page 108: ... logging in to the camera User ID Description Function Procedure NOTE Super Admin account cannot be selected on new user registration Setting method Select a value from Setting method Click Add button Setting method Click Add button Setting method Click the icon to the drop down list box then select a value from the drop then enter a value manually edit new user delete user and view SuperAdmin dow...

Page 109: ... Modify the user name password group or privilege 3 Click OK The user is modified successfully The User 2 Enter a user name password confirm password 3 Select a group from the drop down list box 4 Enter the notes Optional 5 Check the privilege 6 Click OK The user is added successfully in Figure 8 2 page is displayed Description Function Procedure user as shown in Figure 8 2 the drop down list box ...

Page 110: ...n the Protocol Protocol Info page as shown in Figure 11 1 Table 11 1 describes the protocol related parameters Table 11 1 Protocol related parameters Protocol Name Protocol Version Protocol SW Version RTSP Rule RTSP Example Type of access protocol Version number of the access protocol Software version number of the access protocol URL rule of Real Time Streaming Protocol URL example of Real Time S...

Page 111: ...p 2 Click Apply A dialog box is displayed indicating the parameter configuration success To make the configuration take effect click Confirm to restart the device Table 11 2 Security parameter User Verification When you select the User Verification check box as those for logging in to the device web page the user name and password must be the same Description Function Procedure Setting method Clic...

Page 112: ...eo Port Source Port ID of stream IP address that receive multicast data Port that receive video data Port that receive source data Description Function Procedure CONFIGURATION PROTOCOL 3 Setup Multicast Parameter Description Figure 11 3 Multicast page You can set multicast IP video port audio port and source port in multicast parameter page Table 11 3 Mutlticast parameters Setting method Select a ...

Page 113: ...tion logs record user operations and scheduled task commands during the running of the device Operation logs can be classified into the following types permission management system maintenance device configuration recording operation video control and real time video Step 1 Choose Configuration Device Log Operation Log The Operation Log page is displayed as shown in Figure 12 1 ...

Page 114: ...ce from the User Name drop down list box Step 4 Download the operation logs 1 Set the start time end time and log type 2 Click Download on the right of the page The log link and the message Please download log by save as in the right key are displayed 3 Right click the link and save the logs Step 3 Click Query The operation logs related to the specified user are displayed NOTE An operation log is ...

Page 115: ... 2 Querying Alarm Logs Description Procedure Figure 12 2 Alarm Log page An alarm log records information about an alarm generated on a device including the security disk and recording alarms Step 1 Choose Configuration Device Log Alarm Log The Alarm Log page is displayed as shown in Figure 12 2 ...

Page 116: ... logs 1 Set the start time and end time 2 Select a log type 3 Click Download on the right of the page 4 The log link and the message Please download log by save as in the right key are displayed 5 Right click the link and save the logs Step 3 Click Query The alarm logs of the specified type are displayed NOTE An alarm log is named as Alarm Info by default and in the following format Alarm start ti...

Page 117: ...to save the log file Description You can collect logs about a device which help you analyze and solve possible problems occurring on the device The logs include overview information key parameters operation logs alarm logs upgrade logs and debugging logs Procedure Step 1 Choose Configuration Device Log Collect all Log The Collect all Log page is displayed as shown in Figure 12 3 Figure 12 3 Collec...

Page 118: ...device parameters are set incorrectly and the device cannot work properly A user needs to reset device parameters and make the settings to take effect A device needs to be restarted remotely Step 1 Choose Configuration Maintenance The Device Maintenance page is displayed as shown in Figure 13 1 Step 3 Click OK The device is restarted successfully five minutes later Step 2 Click icon The message Ar...

Page 119: ...s must be restored to the factory settings 2 Restore a Device to Factory Settings MAINTENANCE RESET RESTORE Procedure Step 1 Click Maintenance The Device Maintenance page is displayed Step 2 Click icon The message Are you sure to restore default settings is displayed Step 3 Click OK The device will be restored to the factory settings CAUTION After you click icon all parameters you can choose wheth...

Page 120: ...120 User Manual Visit the ViewZ USA website at https www viewzusa com NOTE ...

Reviews: