background image

YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO 

OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER 

OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF 

SUCH DAMAGES.

17. interpretation of Sections 15 and 16.

If the disclaimer of warranty and limitation of liability provided above 

cannot be given local legal effect according to their terms, reviewing 

courts shall apply local law that most closely approximates an absolute 

waiver of all civil liability in connection with the Program, unless a 

warranty or assumption of liability accompanies a copy of the Program in 

return for a fee.

end OF terMS And cOnditiOnS
how to Apply these terms to Your new programs

If you develop a new program, and you want it to be of the greatest 

possible use to the public, the best way to achieve this is to make it free 

software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest to 

attach them to the start of each source file to most effectively state the 

exclusion of warranty; and each file should have at least the “copyright” 

line and a pointer to where the full notice is found.

<one line to give the program's name and a brief idea of what it 

does.>
Copyright (C) <year> <name of author>
This program is free software: you can redistribute it and/or modify it 

under the terms of the GNU General Public License as published by 

the Free Software Foundation, either version 3 of the License, or (at 

your option) any later version.
This program is distributed in the hope that it will be useful, but 

WITHOUT ANY WARRANTY; without even the implied warranty of 

MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 

See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License 

along with this program. If not, see <http://www.gnu.org/licenses/>.

Also add information on how to contact you by electronic and paper 

mail.
If the program does terminal interaction, make it output a short notice like 

this when it starts in an interactive mode:

<program> Copyright (C) <year> <name of author>
This program comes with ABSOLUTELY NO WARRANTY; for details 

type `show w'.
This is free software, and you are welcome to redistribute it under 

certain conditions; type `show c' for details.

The hypothetical commands `show w' and `show c' should show the 

appropriate parts of the General Public License. Of course, your 

program's commands might be different; for a GUI interface, you would 

use an “about box”.
You should also get your employer (if you work as a programmer) or 

school, if any, to sign a “copyright disclaimer” for the program, if 

necessary. For more information on this, and how to apply and follow the 

GNU GPL, see <http://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your 

program into proprietary programs. If your program is a subroutine 

library, you may consider it more useful to permit linking proprietary 

applications with the library. If this is what you want to do, use the GNU 

Lesser General Public License instead of this License. But first, please 

read <http://www.gnu.org/philosophy/why-not-lgpl.html>.

Gnu Lesser General public License

Version 2.1, February 1999

Copyright (C) 1991, 1999 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
[This is the first released version of the Lesser GPL. It also counts
as the successor of the GNU Library Public License, version 2, hence
the version number 2.1.]

preamble

The licenses for most software are designed to take away your freedom 

to share and change it. By contrast, the GNU General Public Licenses 

are intended to guarantee your freedom to share and change free 

software--to make sure the software is free for all its users. 
This license, the Lesser General Public License, applies to some specially 

designated software packages--typically libraries--of the Free Software 

Foundation and other authors who decide to use it. You can use it too, 

but we suggest you first think carefully about whether this license or the 

ordinary General Public License is the better strategy to use in any 

particular case, based on the explanations below. 
When we speak of free software, we are referring to freedom of use, not 

price. Our General Public Licenses are designed to make sure that you 

have the freedom to distribute copies of free software (and charge for 

this service if you wish); that you receive source code or can get it if you 

want it; that you can change the software and use pieces of it in new free 

programs; and that you are informed that you can do these things.
To protect your rights, we need to make restrictions that forbid 

distributors to deny you these rights or to ask you to surrender these 

rights. These restrictions translate to certain responsibilities for you if you 

distribute copies of the library or if you modify it. 
For example, if you distribute copies of the library, whether gratis or for a 

fee, you must give the recipients all the rights that we gave you. You 

must make sure that they, too, receive or can get the source code. If you 

link other code with the library, you must provide complete object files to 

the recipients, so that they can relink them with the library after making 

changes to the library and recompiling it. And you must show them these 

terms so they know their rights. 
We protect your rights with a two-step method: (1) we copyright the 

library, and (2) we offer you this license, which gives you legal permission 

to copy, distribute and/or modify the library. 
To protect each distributor, we want to make it very clear that there is no 

warranty for the free library. Also, if the library is modified by someone 

else and passed on, the recipients should know that what they have is 

not the original version, so that the original author's reputation will not be 

affected by problems that might be introduced by others. 
Finally, software patents pose a constant threat to the existence of any 

free program. We wish to make sure that a company cannot effectively 

restrict the users of a free program by obtaining a restrictive license from 

a patent holder. Therefore, we insist that any patent license obtained for 

a version of the library must be consistent with the full freedom of use 

specified in this license. 
Most GNU software, including some libraries, is covered by the ordinary 

GNU General Public License. This license, the GNU Lesser General 

Public License, applies to certain designated libraries, and is quite 

different from the ordinary General Public License. We use this license for 

certain libraries in order to permit linking those libraries into non-free 

programs. 
When a program is linked with a library, whether statically or using a 

shared library, the combination of the two is legally speaking a combined 

work, a derivative of the original library. The ordinary General Public 

License therefore permits such linking only if the entire combination fits 

its criteria of freedom. The Lesser General Public License permits more 

lax criteria for linking other code with the library. 
We call this license the "Lesser" General Public License because it does 

Less to protect the user's freedom than the ordinary General Public 

License. It also provides other free software developers Less of an 

advantage over competing non-free programs. These disadvantages are 

the reason we use the ordinary General Public License for many libraries. 

However, the Lesser license provides advantages in certain special 

circumstances. 
For example, on rare occasions, there may be a special need to 

encourage the widest possible use of a certain library, so that it becomes 

a de-facto standard. To achieve this, non-free programs must be allowed 

to use the library. A more frequent case is that a free library does the 

same job as widely used non-free libraries. In this case, there is little to 

gain by limiting the free library to free software only, so we use the Lesser 

General Public License. 

In other cases, permission to use a particular library in non-free programs 

enables a greater number of people to use a large body of free software. 

For example, permission to use the GNU C Library in non-free programs 

enables many more people to use the whole GNU operating system, as 

well as its variant, the GNU/Linux operating system. 

Although the Lesser General Public License is Less protective of the 

users' freedom, it does ensure that the user of a program that is linked 

with the Library has the freedom and the wherewithal to run that program 

using a modified version of the Library. 
The precise terms and conditions for copying, distribution and 

modification follow. Pay close attention to the difference between a "work 

based on the library" and a "work that uses the library". The former 

contains code derived from the library, whereas the latter must be 

combined with the library in order to run. 

terMS And cOnditiOnS FOr cOpYinG, 

diStriButiOn And MOdiFicAtiOn

0

. This License Agreement applies to any software library or other 

program which contains a notice placed by the copyright holder or other 

authorized party saying it may be distributed under the terms of this 

Lesser General Public License (also called "this License"). Each licensee 

is addressed as "you".
A "library" means a collection of software functions and/or data prepared 

so as to be conveniently linked with application programs (which use 

some of those functions and data) to form executables. 
The "Library", below, refers to any such software library or work which 

has been distributed under these terms. A "work based on the Library" 

means either the Library or any derivative work under copyright law: that 

is to say, a work containing the Library or a portion of it, either verbatim 

or with modifications and/or translated straightforwardly into another 

language. (Hereinafter, translation is included without limitation in the 

term "modification".) 
"Source code" for a work means the preferred form of the work for 

making modifications to it. For a library, complete source code means all 

the source code for all modules it contains, plus any associated interface 

definition files, plus the scripts used to control compilation and installation 

of the library.
Activities other than copying, distribution and modification are not 

covered by this License; they are outside its scope. The act of running a 

program using the Library is not restricted, and output from such a 

program is covered only if its contents constitute a work based on the 

Library (independent of the use of the Library in a tool for writing it). 

Whether that is true depends on what the Library does and what the 

program that uses the Library does. 

1

. You may copy and distribute verbatim copies of the Library's complete 

source code as you receive it, in any medium, provided that you 

conspicuously and appropriately publish on each copy an appropriate 

copyright notice and disclaimer of warranty; keep intact all the notices 

that refer to this License and to the absence of any warranty; and 

distribute a copy of this License along with the Library. 
You may charge a fee for the physical act of transferring a copy, and you 

may at your option offer warranty protection in exchange for a fee. 

2

. You may modify your copy or copies of the Library or any portion of it, 

thus forming a work based on the Library, and copy and distribute such 

modifications or work under the terms of Section 1 above, provided that 

you also meet all of these conditions: 

a) The modified work must itself be a software library. 
b) You must cause the files modified to carry prominent notices 

stating that you changed the files and the date of any change.
c) You must cause the whole of the work to be licensed at no charge 

to all third parties under the terms of this License. 
d) If a facility in the modified Library refers to a function or a table of 

data to be supplied by an application program that uses the facility, 

other than as an argument passed when the facility is invoked, then 

you must make a good faith effort to ensure that, in the event an 

application does not supply such function or table, the facility still 

operates, and performs whatever part of its purpose remains 

meaningful. 
(For example, a function in a library to compute square roots has a 

purpose that is entirely well-defined independent of the application. 

Therefore, Subsection 2d requires that any application-supplied 

function or table used by this function must be optional: if the 

application does not supply it, the square root function must still 

compute square roots.) 
These requirements apply to the modified work as a whole. If 

identifiable sections of that work are not derived from the Library, and 

can be reasonably considered independent and separate works in 

themselves, then this License, and its terms, do not apply to those 

sections when you distribute them as separate works. But when you 

distribute the same sections as part of a whole which is a work based 

on the Library, the distribution of the whole must be on the terms of 

this License, whose permissions for other licensees extend to the 

entire whole, and thus to each and every part regardless of who wrote 

it. 
Thus, it is not the intent of this section to claim rights or contest your 

rights to work written entirely by you; rather, the intent is to exercise 

the right to control the distribution of derivative or collective works 

based on the Library. 
In addition, mere aggregation of another work not based on the 

Library with the Library (or with a work based on the Library) on a 

volume of a storage or distribution medium does not bring the other 

work under the scope of this License. 

3

. You may opt to apply the terms of the ordinary GNU General Public 

License instead of this License to a given copy of the Library. To do this, 

you must alter all the notices that refer to this License, so that they refer 

to the ordinary GNU General Public License, version 2, instead of to this 

License. (If a newer version than version 2 of the ordinary GNU General 

Public License has appeared, then you can specify that version instead if 

you wish.) Do not make any other change in these notices. 
Once this change is made in a given copy, it is irreversible for that copy, 

so the ordinary GNU General Public License applies to all subsequent 

copies and derivative works made from that copy. 
This option is useful when you wish to copy part of the code of the 

Library into a program that is not a library. 

4

. You may copy and distribute the Library (or a portion or derivative of it, 

under Section 2) in object code or executable form under the terms of 

Sections 1 and 2 above provided that you accompany it with the 

complete corresponding machine-readable source code, which must be 

distributed under the terms of Sections 1 and 2 above on a medium 

customarily used for software interchange. 
If distribution of object code is made by offering access to copy from a 

designated place, then offering equivalent access to copy the source 

code from the same place satisfies the requirement to distribute the 

source code, even though third parties are not compelled to copy the 

source along with the object code.

5

. A program that contains no derivative of any portion of the Library, but 

is designed to work with the Library by being compiled or linked with it, is 

called a "work that uses the Library". Such a work, in isolation, is not a 

derivative work of the Library, and therefore falls outside the scope of this 

License. 
However, linking a "work that uses the Library" with the Library creates 

an executable that is a derivative of the Library (because it contains 

portions of the Library), rather than a "work that uses the library". The 

executable is therefore covered by this License. Section 6 states terms 

for distribution of such executables. 
When a "work that uses the Library" uses material from a header file that 

is part of the Library, the object code for the work may be a derivative 

work of the Library even though the source code is not. Whether this is 

true is especially significant if the work can be linked without the Library, 

or if the work is itself a library. The threshold for this to be true is not 

precisely defined by law. 
If such an object file uses only numerical parameters, data structure 

layouts and accessors, and small macros and small inline functions (ten 

lines or less in length), then the use of the object file is unrestricted, 

regardless of whether it is legally a derivative work. (Executables 

containing this object code plus portions of the Library will still fall under 

Section 6.) 
Otherwise, if the work is a derivative of the Library, you may distribute the 

object code for the work under the terms of Section 6. Any executables 

containing that work also fall under Section 6, whether or not they are 

linked directly with the Library itself. 

6

. As an exception to the Sections above, you may also combine or link 

a "work that uses the Library" with the Library to produce a work 

containing portions of the Library, and distribute that work under terms of 

your choice, provided that the terms permit modification of the work for 

the customer's own use and reverse engineering for debugging such 

modifications. 
You must give prominent notice with each copy of the work that the 

Library is used in it and that the Library and its use are covered by this 

License. You must supply a copy of this License. If the work during 

execution displays copyright notices, you must include the copyright 

notice for the Library among them, as well as a reference directing the 

user to the copy of this License. Also, you must do one of these things: 

Summary of Contents for QRN-410

Page 1: ...NETWORK VIDEO RECORDER User Manual QRN 410 810 ...

Page 2: ...rrectness of the contents in this document but no formal guarantee shall be provided Use of this document and the subsequent results shall be entirely on the user s own responsibility Hanwha Techwin reserves the right to change the contents of this document without prior notice Designandspecificationsaresubjecttochangewithoutpriornotice TheinitialadministratorIDis admin andthepasswordshouldbesetwh...

Page 3: ...Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference to radio communications Operation of this equipment in a residential area i...

Page 4: ...ct its guaranteed temperature range is 5 C 55 C 41 F 131 F Likewise the hard drive may not work at a temperature below the guaranteed one Ethernet Port This equipment is in door use and all the communication wirings are limited to inside of the building Security Precautions The initial administrator ID is admin and the password should be set when logging in for the first time Please change your pa...

Page 5: ...out 20 Audio ON OFF 20 Freeze 20 Event Monitoring 21 Capture 21 Maintain the Screen Ratio 22 Display Text 22 PTZ control 23 Backup MENU SETUP 24 24 System Setup 29 Setting the Device 38 Setting the Recording 40 Setting the Event 42 Network Configuration SEARCH PLAY 49 49 Search 52 Playback STARTING WEB VIEWER 53 53 What is Web Viewer 53 Connecting Web Viewer LIVE VIEWER 55 55 Live Viewer 56 Live S...

Page 6: ...o from network cameras to a hard disk and enables playback from the hard disk It also provides remote monitoring environment for video and audio over the network using a remote computer User friendly UI Supports a range of 4K camera resolutions 4096X2160 Outputs a 4K high definition image using HDMI Record and play video Record and play audio Supports ONVIF Profile S standard and RTP RTSP protocol...

Page 7: ...OUT Alarm output ports QRN 410 1 2 CH QRN 810 1 3 CH b AUDIO OUT Audio Signal Output Port RCA jack c Ground connection Terminal to connect a separate ground cable Add a ground cable to support the safe use of the device VIEWER Port recommended for connection with a network web viewer VGA OUT VGA Video Signal Output Port HDMI HDMI connector port USB Connects the USB devices USB 3 0 supported Power ...

Page 8: ... out PTZ Displays or ends PTZ SEARCH Displays the search menu PRESET Displays the Preset Setup FREEZE Freezes the screen temporarily Skip Backward by unit time Slow Rewind Slow Forward Skip Forward by unit time ALARM Cancels the Alarm Using the Numeric buttons 1 Select a number between 1 and 8 2 Move to the selected channel number Changing the Remote Control ID Remote control s ID and NVR s ID sho...

Page 9: ...g Mounting of the equipment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading D Circuit Overloading Consideration should be given to the connection of the equipment to the supply circuit and the effect that overloading of the circuits might have on overcurrent protection and supply wiring Appropriate consideration of equipment nameplate ratings ...

Page 10: ...push back and remove the cover 2 Connect the SATA power cables of the HDD to the connectors on the mainboard 3 Using the screws fix the HDD to the bottom of the set USB 5 1 32 5 6 USB 5 1 32 5 6 USB 5 1 32 5 6 4 Check for any problems in the connection terminal and the wiring in the product close the cover and fix it with screws 5 Close the cover and tighten a setscrew in the back AUDIO OUT VIEWE ...

Page 11: ...product supports hot plugging function that enables connecting disconnecting USB devices while in operating the system J If you use the USB device for Backup purposes format it with FAT32 on PC if it is not formatted on the NVR Some USB devices may fail to function properly due to compatibility issue please check the device before using Only USB storage devices that comply with the standards havin...

Page 12: ...2 3 4 NO NO COM 1 NO COM 2 G NO COM 3 Switch Windows Network Viewer USB DC 12V VGA OUT AUDIO OUT VIEWER HDMI ALARM OUT ALARM IN 1 2 3 4 NO NO COM 1 NO COM 2 G NO COM 3 Brodband router xDSL or Cable Modem Windows Network Viewer DDNS Server Data Center NETWORK xDSL or Cable Modem USB DC 12V VGA OUT AUDIO OUT VIEWER HDMI ALARM OUT ALARM IN 1 2 3 4 NO NO COM 1 NO COM 2 G NO COM 3 Windows Network Viewe...

Page 13: ...n the Language screen select the language and press the Next button 2 In the ID PW screen set the password and press Next Setting Camera Password You can change the password of the camera en bloc if the camera password is in a factory reset state If the camera password is not in a factory reset state please enter the password of the current camera to register the camera New Password Input a new pa...

Page 14: ... of the information theft Please take note that it s a user s responsibility for the security and any other problems caused by mismanaging a password M For the restricted permission refer to User Setting Permissions Page 26 LIVE SCREEN CONFIGURATION Icons on the Live Screen You can check the status or operation of the NVR with the icons on the live screen Name Description Current Date Time Display...

Page 15: ...a When the corresponding icon is clicked the simple focus command is sent to the camera Only available on the camera which has defocus detection function Error Information If the built in HDD is not connected the NO HDD icon will be displayed in the top left corner In this case make sure you contact the service center for assistance as this may cause a failure of recording playback or backup M If ...

Page 16: ...ng the video temporarily Refer to Freeze Page 20 Stop Alarm Stop the alarm output deactivate the event icon and release the auto sequencing Refer to Event Monitoring Page 20 Record Stop Starts stops the standard recording Play Refer to Search Play Play Page 52 Search Refer to Search Play Search Page 49 Backup Searches for a backup device and runs backup for each channel or schedule backup later at...

Page 17: ...Live screen temporarily Capture Captures the screen of the selected channel Text Text output is ON or OFF Play Enters Play mode if a file to play exist and if not enters Search mode m Record Start End recording the Live screen LIVE SCREEN MODE You can play up to 8 live video channels in single 6 type split or auto sequence mode M When you register a camera the Live4NVR profile is created to set H ...

Page 18: ...o be connected to each channel on the live screen Channel information Select the CH info in the live screen menu to check the status of camera connection to each channel Live Status If you select Live in the Status menu on the live screen you can check the transmisson information and state of the camera connected to each channel Model Displays the camera model name connected to each channel Status...

Page 19: ...gs not to display a message popup For further information on bitrate limit of recording data refer to Record Setting Page 39 Channel Setting You can display the channel in a desired area of a split screen 1 Place the cursor over the camera name of each channel to display the key to the right on the screen 2 Click a camera name to display a channel list where you can select a different channel 3 Se...

Page 20: ... for each user is saved separately AUDIO ON OFF You can turn the sound on off corresponding to the channel in Live mode AUDIO ON OFF in Single mode In the screen click on the audio icon or in the remote control press the AUDIO button to turn it on off M If you have configured the audio output settings properly but the audio or voice is not output check if the connected network camera supports the ...

Page 21: ...ied recording type pre event or post event J In case of continuous events such as motion detection switching to another split mode display may not immediate if concatenating events follow even when you stopped alarm of the event The video may be delayed depending on the network condition The event output can be delayed as the transfer of the alarm event from the network camera takes time CAPTURE Y...

Page 22: ...69 Cheese 0 69 Onions 1 58 Onions 1 58 Peppers red loose 0 59 Peppers red loose 0 59 2 x 0 79 1 18 2 x 0 79 1 18 TEXT 01 TEXT 01 Cheese 0 69 Cheese 0 69 Onions 1 58 Onions 1 58 Peppers red loose 0 59 Peppers red loose 0 59 2 x 0 79 1 18 2 x 0 79 1 18 TEXT 01 TEXT 01 OFF OFF OFF OFF OFF OFF Using the PTZ camera You can use a single PTZ camera to perform the Pan Tilt and Zoom operations to monitor m...

Page 23: ... for backup OK button is not activated J The application may slow down during the backup You can switch to the menu screen during the backup in operation but playback of data is not available The data can be played back on a Webviewer while the backup is in progress but audio does not function If backup has failed select Device Storage Device and check the free space of the HDD and check also if t...

Page 24: ...RL address of the time server Last Sync Time Displays the most recent synchronization time from the selected time server Activate as Server Set to Use to allow the NVR to act as a Time Server for other NVRs DST Set up Daylight Saving Time with its period to make the time earlier than the GMT of its time zone by 1 hour during the set period Language Select your language Sets the language for the in...

Page 25: ... For upper case letters use Caps Lock button For special characters use Shift button Using the virtual keyboard is the same to a normal keyboard use in your region ID allows alphanumeric characters only The password should at a minimum be an 8 digit combination of alphabetical letters and numbers User setting You can create a group or set permissions for each group You can add a user and edit the ...

Page 26: ...ll general users Items with restrictions will require logging in for use MENU Ö ENTER Ö Ö Menu Ö ENTER Ö System Ö Ö User Ö ENTER Ö Ö Permission Setup Ö ENTER Ö Ö ENTER Restricted Access All menu items allowed for a user can be set with restricted access Checked Restricted Not checked Accessible If it is not checked in Restricted Access any user can access the item no matter what the Permission set...

Page 27: ...ization Checking the System Information You can check the current software version and MAC address before proceeding with the upgrade MENU Ö ENTER Ö Ö Menu Ö ENTER Ö System Ö Ö System Management Ö ENTER Ö Ö System Information Ö Ö ENTER System Information Shows the current system s information The values can not be changed by a user S W Upgrade Updates the NVR s software up to date Press the button...

Page 28: ...of an item s that you want to reset Then only the other items than the selected one will return to the factory default If Initialization is selected a confirmation dialog for Load Factory Default prompts Press OK to initialize the system to the factory default Power off If the power is off the first alarm is generated After checking the checkbox if the Apply button is pressed all event alarms that...

Page 29: ...lendar icon to display the calendar window or use the direction buttons to specify the search period of the system log For using the calendar refer to To use the calendar Page 24 Search Specify the date and press this button to display the search result in the log list SETTING THE DEVICE You can configure settings related to camera storage media monitor and text Camera To register a camera You can...

Page 30: ...ded you register the Samsung protocol SNB 2000 SNB 3000 SNC B2315 SNC B2331 SNC B2335 SNC B5368 SNC B5395 SNC B5399 SNC 570 SNC 1300 SND 460V SND 560 SND 3080 SND 3080C SND 3080CF SND 3080F SND 3081 SNP 3301 SNP 3301H SNP 3350 SNP 3370 SNP 3370TH SNP 3750 SNV 3080 SNP 3430 To auto search for and register a network camera 1 In the Cam Registration field click on the Auto button 2 Search for a netwo...

Page 31: ...ction status Due to the camera account locking access has failed When you enter a wrong ID password 5 times to login to the camera account this message is displayed Try to log in again after 30 seconds If the same message appears you may need to check whether someone has tried to access your camera account from the outside Connected successfully This message appears if the camera is connected succ...

Page 32: ...n change the baud rate of the selected profile Bitrate Control You can change the bit rate for video transmission of the selected profile ONVIF Setup In the bottom of the camera addition screen click on the ONVIF Setup button to set additional settings for cameras with the ONVIF protocol You can change the information only if the user account camera account used for camera registration is used to ...

Page 33: ...de WDR level WDR black white levels can be set Exposure You can adjust the exposure of your camera Brightness control shutter SSNR Sens up shutter lens and gains can be set Day Night You can change the mode to adjust the color and contrast Mode switching time brightness change alarm time alarm input output negative color daytime nighttime switching and simple focus and activation time can be set S...

Page 34: ...D To enhance security it is not recommended to use repeated digits or letters or keyboard patterns as a password Special characters accepted for a password _ Live Setting You can change the live transfer settings of the network camera MENU Ö ENTER Ö Ö Menu Ö ENTER Ö Ö Device Ö Ö Camera Ö ENTER Ö Ö Live Setup Ö ENTER Ö Ö ENTER Live Replacement You can select the live profile setup mode If you selec...

Page 35: ...n storage devices Device Format You can check storage devices and their capacity usage as well as status HDD USB memory or HDD can be connected as a storage device MENU Ö ENTER Ö Ö Menu Ö ENTER Ö Ö Device Ö Ö Storage Device Ö ENTER Ö Ö Device Format Ö Ö ENTER Storage Status Displays the working status of a storage device Red Displays the situation of video loss Green Displays the normal situation ...

Page 36: ...function correctly both the camera and NVR should be time synchronized with the time server Page 24 ARB function is activated when NVR starts when the channel camera set is reconnected when an NVR recording missing section recurs at regular intervals after NVR starts NVR recording missing section that can be restored with the ARB function is for 24 hours backwards from the point when the ARB funct...

Page 37: ...ly checked items on the monitor screen Sequence switching time Set the automatic switching time for the segmented screen in live mode Video Output Set the resolution for the video output If you press the STOP ZOOM STOP ZOOM MENU button on your remote control the basic resolution pop up will appear You can adjust the desired resolution in it If the changed resolution is not supported by the monitor...

Page 38: ...ount condition to receive alarms Keyword If the Add button is clicked a screen to add keywords pops up If you select one of the added keywords to delete and click the Delete button the selected keyword will be deleted SETTING THE RECORDING You can setup scheduled recording event recording and other recording related settings Recording Schedule Make your reservation on a date and time to schedule t...

Page 39: ...dio Specify whether to record the sound received from the camera or not M If a channel s data transfer exceeds defined allowed limit then it may affect to other channels and may force switching to KEY recording even when the channel is configured to FULL recording mode For Key Frame recording channels the icon for limited recording appears on the live screen s top side But if the sum of the limits...

Page 40: ...ta if necessary for later use SETTING THE EVENT You can make the setup for record in case of sensor detection camera event or video loss detection Sensor Detection You can set the sensor s operating condition and connected camera as well as alarm output and its duration MENU Ö ENTER Ö Ö Menu Ö ENTER Ö Ö Event Ö Ö Sensor Detection Ö ENTER Ö Ö NVR Ö Ö ENTER Apply to other sensors If you select Apply...

Page 41: ...tting of motion detection for a network camera connected Mode Set the motion detection mode Area Click on Setup and when the detailed setup menu appears set the motion detection area Sensitivity Set the sensitivity for motion detection very low low medium high very high Size Click on Setup When the detailed setup menu appears set the max min size of the object to be detected Activation Time Select...

Page 42: ...ch functions Interface You can set the network connection route and protocol Setting a network connection Sets the protocol and environment of the network MENU Ö ENTER Ö Ö Menu Ö ENTER Ö Ö Network Ö Ö Interface Ö ENTER Ö Ö Network Ö Ö ENTER Network Port recommended for camera connection which receives a image from the camera Port recommended for connection with a network web viewer Network setup I...

Page 43: ...200 you should set the IP address out of the configured DHCP range 192 168 0 2 192 168 0 99 and 192 168 0 201 192 168 0 254 3 Check the Gateway address and subnet mask are equal to those set in the Broadband Router Setting the DHCP IP Address of the Broadband Router 1 To access the Broadband Router s configurations open a web browser on the local PC that is connected to the Broadband Router and en...

Page 44: ...ter should be restarted DDNS Setting DDNS is a short form of Dynamic Domain Naming System DNS Domain Name System is a service that routes a domain name consisting of user friendly characters ex www google com to an IP address consisting of numbers 64 233 189 104 DDNS Dynamic DNS is a service that registers a domain name and the floating IP address with the DDNS server so that the domain name can b...

Page 45: ...Version Select the EAPOL version to be used as protocol Some switch hubs will not operate if you set them to version 2 Select version 1 ID Enter the ID provided by the RADIUS server administrator If the entered ID does not match the ID of the client s certificate it won t be processed properly Password Enter the password provided by the RADIUS server administrator If the password you entered does ...

Page 46: ...er address to connect to Port Sets the communication port Use Authentication Check this if the SMTP server uses user authentication The account input box will be activated ID Enter a ID to use authentication when connecting to the SMTP server Password Enter the password of the SMTP server user Secure Transfer Select one from Never and TLS if available Sender Use the virtual keyboard to enter the s...

Page 47: ...the SNMP information By default it is set to public Write Community Enter the name of write only community to access the SNMP information By default it is set to private Enable SNMP v3 SNMP version 3 is used Password Set the initial user password for SNMP version 3 Enable SNMP Traps SNMP trap is used to send important events and conditions to the Admin System Trap Manager Enter the IP address to w...

Page 48: ...t can be remotely connected from the current NVR 2 When the connection is successful search for WiseNet Mobile from the smart phone and then install and run it When Add a device QR code is selected the NVR QR code can be scanned 3 When the QR code is scanned the device ID that can be seen in NVR is automatically converted to mobile viewer ID and the mobile viewer can be used right away when the ID...

Page 49: ...pe settings Depending on the menu selected it will search for all motion detection video analysis audio detection sensors reservation general recording events Date Time Preview If you select a data item in the list the still image of the selected data will be displayed in the left preview pane Event Displays the type of the event that occurred 3 Select a data item and click Play The screen switche...

Page 50: ...cific time period To perform smart search the Smart Search option in Camera Event should be turned ON and the camera motion event option must be set to the entire area page 41 1 In the Search menu select Smart Search 2 Configure the channel search date and time settings Go to First Moves to the oldest smart search result Go to Last Moves to the most recent smart search result Event Displays the ty...

Page 51: ...ton and you can check the free space remaining in the storage device 3 Select data to play and click Play The screen moves to the ARB backup data play screen Backup Search Searches for backup data in the connected backup device Only data in the format of NVR is included in the search 1 Select Backup Search in the Search menu 2 When storage media with data is connected the list of recordings stored...

Page 52: ... menu appears on the play screen 2 Select a menu to run For more information about each menu please refer to the Split Mode Menu Page 16 M Rotate mode only appears in single screen mode You can rotate the play screen by 90 degrees Using the Playback Button Name Description Play Timeline Indicates the current playback point and can be used to move b Skip Backward Moves backward by unit time c Backw...

Page 53: ...nabled only when the DDNS connection settings have been completed For more information refer to Network Configuration DDNS Page 44 2 A user with the admin permissions should provide the admin ID and password A registered user should provide the user ID and password J The initial ID and password for webviewer is admin and 4321 When an initial password is entered while partially resetting to access ...

Page 54: ...s not use plug ins e g Chrome Edge Browser J As the plug in free webviewer has lower performance than the plug in webviewer it has a limit on the monitoring of high quality profiles To monitor high quality profiles use either a plug in webviewer or network Viewer Chrome Edge Browser Internet Explorer Live viewer screen layout Menu Description System Status Display Displays icons that indicate the ...

Page 55: ...s Manual backup Manually backup the video of the camera connected Status Shows the camera live and recording status Help Move to the help window Logout Performs logout process Shutdown Turn off the NVR system LIVE VIEWER You can check the video from camera registered in the NVR connected from a remote PC Also you can adjust the camera and check the network transfer status Live Viewer Screen Menu D...

Page 56: ...he recording conditions Displayed if the HDD is full and the NVR has an insufficient space to record Displayed if no HDD is installed or the existing HDD should be replaced Displayed if the HDD needs a technical examination It is displayed when the max permitted amount of data for each channel is exceeded It is displayed when the network is overloaded It is displayed when the network is overloaded...

Page 57: ...t in the layout after registering a camera the live screen will not be displayed Click on the button to launch the layout setting screen If you want to add a layout Click on Set the layout name to add and click on the OK button to add it If you want to change the layout name Select the layout name to change and click on After changing the name click on the outside of the layout window to change th...

Page 58: ...atic switching of a single screen the layout setting menu will be deactivated during operation Setting screen switching If you don t register the layout the screen switching function will not operate You can view the layouts one by one Click on the button to launch the switching setting window 1 Select the layouts to be shown in turn by pressing 2 Enter the screen switching time 3 Click on the OK ...

Page 59: ... screen When selecting corresponding camera channel the PTZ tab is provided to allow you to control the PTZ Item Description Camera menu Displays the camera settings menu b Direction Adjustment Use this to adjust the direction of the camera or click the crosshair in the center to use it as an OK button c Digital zoom Adjust digital zooming to make an image larger or smaller Sound You can set the c...

Page 60: ...orrected screen 1 Click the icon on the distortion corrected screen 2 Mouse over the screen and drag to control To set a preset 1 Click button to display Preset window 2 Click on to select the preset order 3 Enter the name of preset 4 Use direction keys to adjust the direction which camera aims at 5 Click the button To activate the preset 1 Click button to display Preset window 2 Select a desired ...

Page 61: ... the selected channel Keep full scr ratio Changes screen ratio for all channels Magnify Shrink Magnify or shrink the current video for the selected channel OSD Displays the channel information Full screen Show the four way split screen in the full screen Sound control Adjust the audio for the video searched Fisheye Runs the fisheye settings for the selected channel Configures the mounting mode and...

Page 62: ... format which can be played on the PC immediately as it is saved with a dedicated viewer When you select the SEC format you can select or deselect Password and Text data included Path displays the location of the folder in which the section backup file is to be saved 3 After completing the backup settings click the Backup button If you press the Stop button during the backup process the backup wil...

Page 63: ...2 x64 x1 x2 speed Move forward Proceeds to the next event Text Search You can search data that was entered into POS systems connected to NVR If you want to search by a text 1 Select a date and time to search 2 Set event keywords and search conditions Search Condition Enter a text to search Event Keyword Searches based on the condition set in Device Text Event settings Page 38 Case Sensitive If che...

Page 64: ...Holiday A user can select specific dates as holidays according to their own preferences SETUP VIEWER You can configure the NVR settings remotely on the network To configure the NVR settings click Setup Settings Screen Item Description Menu Selection Click each menu to switch into corresponding menu screen b Parent Menu Configure the settings or select a parent item to change the existing settings ...

Page 65: ... System menu Page 27 System Information You can see information of the current system Check the model name software version MAC address You can search for a file from the storage device connected to the PC to perform an upgrade Settings Using a storage device you can apply the current configuration of NVR to another NVR Press the Initialize button to return the network settings to their factory de...

Page 66: ... button a new camera web browser window is opened It supports the version specified below or later for each Q P X series camera QND 7010R series 1 04 QND 7080R series 1 02 QND 6010R series 1 02 QND 6070R series 1 01 P series 1 01 It supports only when the camera is connected to IPv4 and is not set to HTTPS When you are connecting to the camera web page on a closed network a camera that does not su...

Page 67: ...ackup window is opened For more information about settings please refer to Device Format Page 35 HDD Alarm You can set the alarm output port and the duration in case an error occurs Monitor Monitor You can configure the monitoring screen settings and set the output system M If the video is not played properly refer to the troubleshooting section later in this manual Page 79 The Monitor Setup setti...

Page 68: ...d time the recording will start at that specific time Record Setup NVR Select a type of the normal event recording frame rate for each channel Camera You can set the recording profile for a network camera Record Option You can set the Disk End Mode You can set the recording duration separately for each channel 68_ setup viewer setup viewer ...

Page 69: ...alarm output type and alarm time Video Loss Detection You can set to trigger the alarm if a video loss occurs Alarm Out Schedule You can schedule the alarm output according to the day of the week and the time The default setting is Event Sync which activates the alarm only if an event occurs Network For more information refer to Network Configuration Page 42 Interface A remote user can access the ...

Page 70: ...setting values You need to change the URL to HTTP and reconnect or initialize the cookie setting of the browser 802 1x When connecting to a network you can select whether to use the 802 1x protocol and install corresponding certificate Live Streaming You can set the video profile transmitted to the network E mail You can specify the SMTP server that sends a mail if an event occurs and set the reci...

Page 71: ...ely monitoring the network devices and sets the environment DHCP Server Network You can set the internal DHCP server and assign an IP address to the network camera Check IP You can check the IP and MAC currently used through the DHCP server and the connected network port P2P You can check the Enable P2P check box if you want to use P2P service For using P2P service you have to scan QR Code on scre...

Page 72: ...utton is selected you can turn on off the function to query text devices and data that are located in a separate area Display the ID of user connected You can register a network camera for each channel and easily set the resolution and the number of shots in case of event occurrence or manaual recording For more on how to register a camera refer to To register a camera Page 29 If the failover mode...

Page 73: ... Only Item Description Split screen Selects screen ratio to display The screen is changed to a split screen b Fish eye view mode If is pushed it is possible to change to a fish eye installation type It is possible to select WALL GROUND CEILING mode according to the installation place The fish eye view mode on the current screen can be changed independently on each split c Digital Zoom Enlarge the ...

Page 74: ...ckup date day of the week time model name and channel number will be displayed on the screen Maintain aspect ratio Full screen Maintains the aspect ratio of the playback screen Plays the video on a full screen Enlarge Reduce Timeline Collapses the time range that is displayed on the range bar of the storage time You can collapse the range bar until the overall range is shortened to 24 hours Enlarg...

Page 75: ...x 3 Users Local 1 Remote 3 Item Details QRN 410 QRN 810 Search Play Mode Date Time Calendar Event Log list Text Search POS ANPR ARB Search Smart search Virtual Line w direction Enter Exit Simultaneous playback Max 4CH Local Network Max 8CH Local Network Resolution CIF 8MP Playback Control Fast Slow Forward Backward Move one step up down Storage Built In 0TB 6TB dependent on region Seagate 4TB Inte...

Page 76: ...orwegian Finnish Korean Chinese Japanese Thai OS Windows 7 8 10 Mac OS X 10 9 10 10 10 11 Web Browser Non plugin Webviewer Supported Browser Google Chrome 47 MS Edge 20 Plug in Webviewer Supported MS Explore 11 Mozilla Firefox 43 Apple Safari 9 Mac OS X only Viewer Software Type SSM Webviewer SmartViewer Wisenet Mobile CMS Support SDK CGI SUNAPI Functions Camera Setup Register 1 Auto mode 2 Manual...

Page 77: ...PRODUCT OVERVIEW unit mm inches Item Details QRN 410 QRN 810 Mechanical Color Material Black Metal Dimension WxHxD W300 x H47 x D208 7mm 11 81 X1 85 X8 22 1U Weight 1 655Kg 2T HDD English _77 APPENDIX ...

Page 78: ...ion System Log Type View all Event Log Type View all Backup Log OFF Device Camera Camera Register OFF Set Camera OFF Camera Password OFF Live Setup OFF Channel Setup Video ON Audio OFF Camera Name CAM 01 CAM 08 Storage Device Device Format Device HDD Usage Status Temperature Time Category Details Factory Default Device Storage Device HDD Alarm Check Alarm Output Port BEEP Duration Continuous Repla...

Page 79: ...rest service center for more information The Channel button does not work on the Live screen y The Channel button does not work if the current screen is in the event monitoring mode The cursor will not move to the Start button when I start the calendar search y Check if the channel and the date that you want to play are marked with the V symbol Both channel and date should be checked before you ca...

Page 80: ...anual y If you want to check the basics of the product for a quick start refer to the quick start guide backup search y If you use the router for network connection refer to the Connecting and Setting the Network section in this manual Problem Action I forgot the password y Contact the NVR administrator for help Backup data is just not played by the PC or NVR y When you are backing up data you hav...

Page 81: ...in the record setting menu page 39 Recording is not performed in accordance with the settings y If the recording status displays Exceeds the maximum hard disc performance set the recording size according to the recording performance specifications Refer to Record Settings in the menu settings Page 39 The recording screen will slow down y Check whether the recording performance specifications match...

Page 82: ...ribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licens...

Page 83: ...terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS 0 Definitions This License refers to version 3 of the GNU General Public License Copyright also means copyright like laws that apply to other kinds of works such as semiconductor masks The Program refers to any copyrightable work licensed under this License Each licensee is addressed as you Licensees and rec...

Page 84: ...fter your receipt of the notice Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License If your rights have been terminated and not permanently reinstated you do not qualify to receive new licenses for the same material under section 10 9 Acceptance Not Required for Having Copies You are not required to...

Page 85: ... close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement applies to any software library or other program which contains a notice placed by the co...

Page 86: ...R A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO ...

Page 87: ...Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License 7 DISCLAIMER OF WARRANTY COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN AS IS BASIS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING WITHOUT LIMITATION WARRANTIES THAT THE COVERED CODE IS FREE OF DEFECTS MERCHANTABLE FIT FOR A PARTICULAR PURPO...

Page 88: ... by name to the interfaces of the Work and Derivative Works thereof Contribution shall mean any work of authorship including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the...

Page 89: ...HOR GRANTS YOU THE RIGHTS CONTAINED HEREIN IN CONSIDERATION OF YOUR ACCEPTANCE OF SUCH TERMS AND CONDITIONS IF YOU DO NOT AGREE TO ACCEPT AND BE BOUND BY THE TERMS OF THIS LICENSE YOU CANNOT MAKE ANY USE OF THE WORK 1 Definitions a Articles means collectively all articles written by Author which describes how the Source Code and Executable Files for the Work may be used by a user b Author means th...

Page 90: ...erivative works provided that such works are identified as derived from the RSA Data Security Inc MD4 or MD5 Message Digest Algorithm in all material mentioning or referencing the derived work RSA Data Security Inc makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose It is provided as is without express or im...

Page 91: ...tgeo com 9 mailto Piete Brooks cl cam ac uk 10 mailto reg dwf com 11 mailto clift ml csiro au 12 mailto casey csc co za 13 mailto Sven_Dietrich trimble COM 14 mailto dundas salt jpl nasa gov 15 mailto duwe immd4 informatik uni erlangen de 16 mailto dennis mrbill canet ca 17 mailto glenn herald usask ca 18 mailto iglesias uci edu 19 mailto jagubox gsfc nasa gov 20 mailto jbj chatham usdesign com 21...

Page 92: ...els in EC Directive 2006 66 If batteries are not properly disposed of these substances can cause harm to human health or the environment To protect natural resources and to promote material reuse please separate batteries from other types of waste and recycle them through your local free battery return system Hanwha Techwin cares for the environment at all product manufacturing stages and is takin...

Page 93: ...www hanwha security com Hanwha Techwin America 500 Frank W Burr Blvd Suite 43 Teaneck NJ 07666 Toll Free 1 877 213 1222 Direct 1 201 325 6920 Fax 1 201 373 0124 www hanwha security com Hanwha Techwin Europe Heriot House Heriot Road Chertsey Surrey KT16 9DT United Kingdom Tel 44 1932 57 8100 Fax 44 1932 57 8101 www hanwha security eu ...

Reviews: