background image

components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. 

If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source 

code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object 

code.

4.

  You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, 

sublicense or distribute the Program is void, and will automatically terminate your rights under this License.

However, parties who have received copies, or rights, from you under this License will not have their licenses terminatedso long as such parties remain in full 

compliance.

5.

  You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or 

its derivative works.

These actions are prohibited by law if you do not accept this License.Therefore, by modifying or distributing the Program (or any work based on the Program), you 

indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

6.

  Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, 

distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients’ exercise of the rights 

granted herein. You are not responsible for enforcing compliance by third parties to this License.

7.

  If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on 

you (whether by court order, agreement or otherwise)that contradict the conditions of this License, they do not excuse you from the conditions of this License. 

If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you 

may not distribute the Program at all.

For example, if a patent license would not permit royaltyfree redistribution of the Program by all those who receive copies directly or indirectly through you, then 

the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as 

a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to 

contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by 

public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent 

application of that system ; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot 

impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

8.

  If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who 

places the Program under this License may add an explicit geographical distribution limitation excluding those countries,so that distribution is permitted only 

in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

9.

  The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar 

in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the 

Program specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either 

of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may 

choose any version ever published by the Free Software Foundation.

10.

  If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. 

For software which is copyrighted by the Free Software Foundation,write to the Free Software Foundation ; we sometimes make exceptions for this. Our 

decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software 

generally.

no warranty 

11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY 

APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM 

“ASIS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 

MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS 

WITH YOU. SHOULD THE PROGRAMPROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY 

WHO MAY MODIFY AND/OR REDISTRIBUTE DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING 

OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE 

OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH 

HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way 

to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. 

It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty ; and each file should have at least the “copyright” 

line and a pointer to where the full notice is found.one line to give the program’s name and an idea of what it does.
Copyright (C)yyyy name of author
This program is free software ; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software 

Foundation ; either version 2 of the License, or (at your option)any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY ; without even the implied warranty of MERCHANTABILITY or 

FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program ; if not, write to the Free Software Foundation, Inc.,51 Franklin 

Street, Fifth Floor, Boston, MA 02110-1301, USA. 

Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an 

interactive mode : 
Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY ; for details type ‘show w’. This is free software, 

and you are welcome to redistribute it under certain conditions ; type ‘show c’ for details.
The hypothetical commands ‘show w’ and ‘show c’ should show the appropriate parts of the General Public License. Of course, the commands you use may 

be called something other than ‘show w’ and ‘show c’ ; they could even be mouse-clicks or menu items-- whatever suits your program.

You should also get your employer (if you work as a programmer)or your school, if any, to sign a “copyright disclaimer” for the program,if necessary. Here is a 

sample ; alter the names:

Yoyodyne, Inc.,hereby disclaims all copyright interest in the program ‘Gnomovision’ (which makes passes at compilers) written by James Hacker. signature of 

Ty Coon, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs. If your 

program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is Lwihcaetn ysoeu want to do, 

use the GNU Lesser General Public instead of this License.

Gnu GeneraL puBLic LicenSe

Version 3, 29 June 2007

Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are 

designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to 

share and change all versions of a program-- to make sure it remains free software for all its users.

We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its 

authors.

You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to 

make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you 

want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.

To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities 

if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a 

program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive 

or can get the source code. And you must show them these terms so they know their rights. Developers that use the GNU GPL protect your rights with two 

steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it. For the developers’ and 

authors’ protection, the GPL clearly explains that there is no arranty for this free software. For both users’ and authors’ sake, the GPL requires that modified 

versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions. Some devices are designed to deny 

users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the 

aim of protecting users’ freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is 

precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise 

substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of 

users.
Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-

purpose omputers, but in those that do, we wish to avoid the special anger that patents applied to a free program could make it ffectively proprietary. To prevent 

this, the GPL assures that atents cannot be used to render the program non-free. he precise terms and conditions for copying, distribution and modification 

follow.

termS anD conDitionS

0. Definitions.

“This License” refers to version 3 of the GNU General Public License. 

Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. “The Program” refers to any copyrightable work 

licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.
To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The 

resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work.
A “covered work” means either the unmodified Program or a work based on the Program.
To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable 

copyright law, except executing it on a computer or modifying a private copy.
Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.
To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer 

network, with no transfer of a copy, is not conveying. An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient 

and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent 

that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of 

user commands or options, such as a menu, a prominent item in the list meets this criterion.

1. Source code.

The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.
A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a 

particular programming language, one that is widely used among developers working in that language.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major 

Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a 

Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential 

component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the 

work, or an object code interpreter used to run it. 
The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object 

code and to modify the work, including scripts to control those activities.
However, it does not include the work’s System Libraries, or generalpurpose tools or generally available free programs which are used unmodified in performing 

those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the 

work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data 

communication or control flow between those subprograms and other parts of the work.
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source. The Corresponding 

Source for a work in source code form is that same work.

Содержание QND-6010R

Страница 1: ...NETWORK CAMERA User Manual QND 6010R 6020R 6030R QNO 6020R 6030R QNV 6010R 6020R 6030R ...

Страница 2: ... correctness of the contents in this document but no formal guarantee shall be provided Use of this document and the subsequent results shall be entirely on the user s own responsibility Hanwha Techwin reserves the right to change the contents of this document without prior notice Designandspecificationsaresubjecttochangewithoutpriornotice TheinitialadministratorIDis admin andthepasswordshouldbese...

Страница 3: ...ring lighting storms or when unused for long periods of time 14 Refer all servicing to qualified service personnel Servicing is required when the apparatus has been damaged in any way such as power supply cord or plug is damaged liquid has been spilled or objects have fallen into the apparatus the apparatus has been exposed to rain or moisture does not operate normally or has been dropped 15 This ...

Страница 4: ... be connected The ITE is to be connected only to PoE networks without routing to the outside plant Please read the following recommended safety precautions carefully y y Do not place this apparatus on an uneven surface y y Do not install on a surface where it is exposed to direct sunlight near heating equipment or heavy cold area y y Do not place this apparatus near conductive material y y Do not ...

Страница 5: ...e Camera Directly to a PPPoE Modem 24 Connecting the Camera to a Broadband Router with the PPPoE Cable Modem 25 Buttons used in IP Installer 25 Static IP Setup 27 Dynamic IP Setup 27 Port Range Forward Port Mapping Setup 28 Connecting to the Camera from a Shared Local PC 28 Connecting to the Camera from a Remote PC via the Internet web viewer 29 29 Connecting to the Camera 30 Password setting 30 L...

Страница 6: ...rk disconnection before triggering an event ONVIF Compliance This product supports ONVIF Profile S G For more information refer to www onvif org Recommended PC Specifications CPU Intel R Core TM i7 3 4 GHz or higher Supported OS Windows 7 8 1 10 Mac OS X 10 9 10 10 10 11 Plug in free web viewer Supported web browsers Google Chrome 47 MS Edge 20 Plug in Webviewer Supported web browsers MS Explorer ...

Страница 7: ...6020R 6030R QNV 6010R 6020R 6030R Power Terminal Block 1 Plugged in the power plug QND 6010R 6020R 6030R QNV 6010R 6020R 6030R Appearance Item Name Quantity Description Model Name Machine Screws 2 Used for assembling the dome case when installing the product on the pipe wall mount etc or blocking a hole QND 6010R 6020R 6030R QNV 6010R 6020R 6030R L Wrench 1 Used to control the direction of the cam...

Страница 8: ...e Quantity Description Model Name CAUTION Be ware of the Rated Voltage and Polarity of the power connection Power Cable 1 Used to plug into the power port QNV 6010R 6020R 6030R Audio alarm cable 1 Used to connect with the audio and alarm port QNV 6010R 6020R 6030R Cable bush 1 Used to connect the LAN cable with a diameter of Ø7 8 5 QNV 6010R 6020R 6030R Plastic Anchor 2 For fixing a screw Inserted...

Страница 9: ... you must run the IP Installer program to change the basic network settings such as IP address Subnet mask Gateway etc before you can connect to the network f Alarm I O Port ARM IN Used to connect the alarm input sensor or external day night sensor ARM OUT Used to connect the alarm output signal GND These are common ports to connect alarm input output signals g Microphone hole Microphone is embedd...

Страница 10: ...a Glance QNO 6020R 6030R Appearance Item Description a Micro SD card slot Internal space of the product This is a slot in which you can insert a Micro SD card b Reset Button The button restores all camera settings to the factory default Press and hold for about 5 seconds to reboot the system J If you reset the camera the network settings will be adjusted so that DHCP can be enabled If there is no ...

Страница 11: ...ver used to protect the lens and the main unit b Camera Case Housing part that covers the camera body AC 24V DC 12V RE SE T VID EO F W AF T N 5 A U D IO IN 3 4 G N D 2 A L M O U T 1 A L M IN RE SE T D C 1 2 V a b RESET NETWORK ACT LINK g h D C 1 2 V 5 A U D IO IN 3 4 G N D 2 A LM O U T 1 A LM IN RE SE T f d e bc a ...

Страница 12: ...crophone f Reset Button The button restores all camera settings to the factory default Press and hold for about 5 seconds to reboot the system J If you reset the camera the network settings will be adjusted so that DHCP can be enabled If there is no DHCP server in the network you must run the IP Installer program to change the basic network settings such as IP address Subnet mask Gateway etc befor...

Страница 13: ...nitoring direction for the camera section page 17 J J We recommend you not to touch the lens as the camera lens has been properly focused in the final process of manufacturing If so the lens may be out of focus or stained by alien substances 5 Please connect the inner cover to the main body 6 While grabbing the bottom side of the camera with your hand please grab and push its cover with the other ...

Страница 14: ...Connect the appropriate cables with camera terminals 4 Adjust the camera direction using the L wrench provided J J When you adjust the camera position using a bracket please loosen the bracket screw adjust the camera and tighten it If you attempt to adjust it forcibly while the screw is tight it may result in a scratch or other problems How to connect the RJ45 waterproof cable to a LAN cable 1 Ins...

Страница 15: ...pe can be purchased in stores so that water does not leak from the gap of the cable connected to the outside 1 Connect the power I O AUDIO and LAN cables 2 Wrap the black cable jacket Area A and the cable connection area with waterproof butyl rubber tape so that more than half of the butyl rubber tape is overlapped J J If the cable jacket is not waterproofed properly then it can directly cause lea...

Страница 16: ... 1 Remove the dome cover from the case by referring to the Disassembling section page 15 2 Use the provided machine screw to fix the camera case to the unbundled adapter 3 Connect and arrange the necessary cables lest that they should be damaged or twisted while installing the camera 4 Install the camera body in the reverse order of Disassembling 5 Adjust the lens in a desired direction by referri...

Страница 17: ...D 6010R 6020R 6030R QNV 6010R 6020R 6030R Adjusting the monitoring direction You can adjust the camera direction only when the camera is fixed on the ceiling Where rotating the camera unit to the left or right is called Pan adjusting the tilt is called Tilt and turning the lens on its axis is called Rotation The effective range of pan is a total of 350 degrees The effective range of rotation is a ...

Страница 18: ...ithin 5 minutes or there will be the risk of internal dew condensation Inserting a Micro SD Memory Card QNO 6020R 6030R 1 Turn the front cover to the UNLOCK direction 2 Pull and separate the front cover 3 Insert a Micro SD card in the arrow direction shown in the figure RES ET RE SE T Inserting a Micro SD Memory Card QND 6010R 6020R 6030R QNV 6010R 6020R 6030R 1 Separate the Dome cover of the came...

Страница 19: ... turn off the camera or remove the Micro SD memory card that contains data from the product the data may be lost or damaged Memory Card Information Not Included What is a memory card The memory card is an external data storage device that has been developed to offer an entirely new way to record and share video audio and text data using digital devices Selecting a memory card that s suitable for y...

Страница 20: ... the power cable to the corresponding power port of the camera J J If both PoE and DC 12V are applied simultaneously the product will be supplied with power from PoE You can also use a router featuring PoE to supply power to the camera Use PoE that is compliant with the IEEE 802 3af protocols It is advisable to use only one power source from PoE and DC 12V Be careful not to reverse the polarity wh...

Страница 21: ...ate 16Kbps 24Kbps 32Kbps 40Kbps Sampling Frequency 8kHz Full duplex Audio Audio in QND 6010R 6020R 6030R Selectable Built in microphone Supported voltage 2 5VDC 4mA Input impedance 2K Ohm Audio in QNO 6020R 6030R QNV 6010R 6020R 6030R Selectable microphone Line in Supported voltage 2 5VDC 4mA Input impedance 2K Ohm Network Speaker Microphone Microphone Microphone Microphone Microphone Amp Amp PC C...

Страница 22: ...ternal sensor Connect one strand of each signal line 2 strand of the sensors to the ALARM IN port and connect the other strand to the GND port Alarm In Wiring Diagram To connect the alarm out If devices e g flashing light and siren that exceed the voltage and current specifications are connected by using the open collector method it may cause malfunction Refer to the alarm out connection diagram b...

Страница 23: ...he DHCP server automatically If there is no DHCP server available the IP address will be set to 192 168 1 100 To change the IP address use the IP Installer For further details on IP Installer use refer to Static IP Setup Page 25 Connecting the Camera Directly to a DHCP Based DSL Cable Modem 1 Connect the user PC directly with the network camera 2 Run the IP Installer and change the IP address of t...

Страница 24: ... a Broadband Router Configuring the network settings of the local PC connected to a Broadband Router follow the instructions below Select Network Properties Local Area Connection General Properties Internet Protocol TCP IP Properties Obtain an IP address automatically or Use the following IP address Follow the instructions below if you select Use the following IP address ex1 If the address LAN IP ...

Страница 25: ...eras that are currently connected to the network However this button will be grayed out if neither IPv4 nor IPv6 is checked k Auto Set The IP Installer automatically configures the network settings l Manual Set You should configure the network settings manually m Exit Exits the IP Installer program M M For the IP installer use only the installer version provided in the installation CD or use the l...

Страница 26: ...ge Forward Port Mapping Setup Page 27 If the Broadband Router has more than one camera connected Configure the IP related settings and the Port related settings distinctly with each other ex Category Camera 1 Camera 2 IP related settings IP Address Subnet Mask Gateway 192 168 1 100 255 255 255 0 192 168 1 1 192 168 1 101 255 255 255 0 192 168 1 1 Port related settings HTTP Port VNP Port 8080 4520 ...

Страница 27: ...he Broadband Router The number of each port to be configured to the IP router should be set according to the port number designated in Setup Basic IP Port on the camera web viewer 3 When done click Save Settings Your settings will be saved M M Above sample instructions are based on the CISCO s Broadband Router The settings may differ depending on the connected Broadband Router model For more infor...

Страница 28: ...mote PC via the Internet Since using the IP Installer on a remote computer that is not in the Broadband Router s network cluster is not allowed users can access cameras within a Broadband Router s network by using the camera s DDNS URL 1 Before you can access a camera in the Broadband Router network you should have set the port range forward for the Broadband Router 2 From the remote PC launch the...

Страница 29: ...stem in support of the UPnP protocol 2 Click the camera name for search In the Windows operating system click the camera name searched from the network menu The login window is displayed Connecting via Bonjour 1 Run the client or operating system in support of the Bonjour protocol 2 Click the camera name for search In the Mac operating system click the camera name searched from the Bonjour tab of ...

Страница 30: ...ug in web viewer and a new plug in free web view is embedded together Therefore it is possible to use the web viewer even in the latest browser environment that does not support plug ins such as Chrome and EDGE According to the browser environment the following differences may be observed Chrome EDGE browser Although they don t support plug ins you can use a web viewer as a plug in free web viewer...

Страница 31: ...ugin check whether webviewer_activexplugin_lib control in the Tool Additional Function Management menu is Activated If not and if there is a persisting problem then select Tools Internet Options General and delete all the search records Using a Plug in Free Webviewer If you access the camera from Google Chrome or MS Edge web browser you can check and control the camera image in real time without i...

Страница 32: ...To exit the full screen mode press Esc on the keyboard Using the Live Screen Plug in Webviewer Item Description a Monitoring Move to the monitoring screen b Playback Move to the screen where you can search for the video recording saved in your Micro SD memory card or NAS c Setup Move to the Setup screen d Profile access information You can read the profile information e Viewer Screen Displays the ...

Страница 33: ...to capture 2 When a captured video is saved a notification message appears The captured image is saved in the designated folder for each browser M M If the screen is not captured by IE browser in Windows 7 or higher run the IE Browser with the Admin privilege How to record videos manually 1 Press Manual recording 2 To end the recording press Manual recording again M M You can save the recorded fil...

Страница 34: ...a b c e d To play the content after searching by event 1 On the live screen click the Show button 2 If there is a video recorded on the date of search the applicable video is displayed on the time bar 3 To perform event specific search click the All button at the bottom of the time bar to select an event type 4 Click the OK button Event searched is displayed on the time bar 5 Click the Play button...

Страница 35: ...end time The event searched is displayed on the time bar 5 To perform an event specific search click the All button at the bottom of the time bar to select an event type 6 Click the Play button The video at the selected time will be played 7 When a video is played the recording time of the video currently being played is displayed 8 Search the video forward and backward and adjust the playback spe...

Страница 36: ...button 2 Specify the start time and end time of your search 3 Select an event type for your search within the specified period 4 Click the Event search button The search results will be displayed in the list M M If more than 800 events are recorded within the search period your search will be limited up to the date when the 800th event is recorded For instance if the search period is between 10th ...

Страница 37: ...e and click Play The video on the selected time will be played 4 While the video is being played the recording time for the current video will be shown 5 Search for the video forward or backward and control the play speed How to Control the Play Interval Select this button to move 1 frame forward Select this button to move 1 second back To control the play speed If selecting the button will switch...

Страница 38: ...ata saving 001_YYYYMMDD_HHMMSS smi file is a caption file and you can view it if it exists in the same directory as its related AVI file The max recording time per AVI file is 5 minutes Once corrupted the data in the Micro SD memory card cannot be replayed in the Web Viewer s Playback 2 NAS Network Attached Storage 1 In Windows browser use ip address to access ex 192 168 20 31 defaultfolder ch01 i...

Страница 39: ... according to the variance in the network bandwidth controlling the bit rate Adjusting the bit rate depends on the ATC mode Control framerate Reduce the frame rate if the network bandwidth drops down Control compression Control the compression rate if the network bandwidth drops down Compression adjustment can cause deterioration of the image quality Event MD Activated when the motion detection MD...

Страница 40: ...mes Profile You can select the H 264 H 265 profiling method Entropy coding Reduce the possible compression loss due to encoding Dynamic GOV When the bit rate control is VBR in H 264 H 265 codec it makes the GOV length automatically change to the set value of the maximum dynamic GOV Multicast SVNP Specify the use of the SVNP protocol IP address Enter an IPv4 address with which you can connect to th...

Страница 41: ...n the account may be locked for thirty seconds When the password is changed while multiple connections are active from a PC the browser may malfunction In that case reconnect to the server Guest setup If you select Enable guest access the guest account can access the Web viewer screen but can only view the live Viewer screen The ID password for the guest account is guest guest which cannot be chan...

Страница 42: ...to access the camera via the web browser The default is 80 TCP Setting the HTTP port for Safari and Google Chrome browsers to 65535 is not allowed by security policy HTTPS In this version the security of the web communication protocol HTTP is strengthened It can be used when you set HTTPS mode in SSL The initial value is set to 443 TCP The available setting range is 1024 65535 For security reasons...

Страница 43: ...dard audio codec applying ADPCM Adaptive Differential Pulse Code Modulation for variable bit rates of 40 32 24 16 Kbps to 64 Kbps PCM encoding Bitrate Set the bit rate to differentiate compression ratio if using G 726 codec Gain Specify the audio input amplification J J Sound quality deterioration or howling may occur if the loudness of the sound source or gain value were set excessively 4 When do...

Страница 44: ...n there are many moving objects such as on a road or in a crowded place like a museum or when you need to make a dark area in full video brighter Vivid video Makes the entire video displayed in vivid colors J J The contrast of the video reduces and the color reproducibility becomes low User preset Select it if you want to display video with settings chosen by you J J When selecting a mode other th...

Страница 45: ...e settings accordingly M M In AWC mode click the Set button if you want to keep the white balance level of the current image J J The white balancing may not work properly in the following conditions If this is the case switch to AWC mode If the surrounding condition of the object is out of the temperature correction range ex Clear sky sunset If the surrounding of the object is dark If the focus of...

Страница 46: ...Day Night 1 Select Day Night 2 Select each item and set it properly Mode Mode is used to adjust the color of Color or Black and White Color The video is always output in color B W The video is always output in black and white Auto Normally it is set to Color but to B W under low luminance at night If AGC of the Exposure menu is set to Off the day night mode cannot be set to Auto External It contro...

Страница 47: ...24bit bitmap file with a length of 128 pixel for the width and height and a file size of 52KB or less J J A position adjustable item Camera title Date Time may not be displayed normally if it overlaps with another fixed OSD item If you change the language the X Y coordinates are initialized It is recommended to set the X Y coordinates after setting the language To Set IR 1 Select IR 2 Select each ...

Страница 48: ...ding for your hub For more on how to set port forwarding for your hub refer to Port Range Forward Port Mapping Setup page 27 Public DDNS Select one of provided public DDNS servers when you use a public DDNS server Service Select desired public DDNS service server Host name Enter the name of the host that is registered with the DDNS server User name Enter the user name for the DDNS service Password...

Страница 49: ... Browse button select the public certificate file and key file to be installed and then click the Install button Deleting the certificate 1 Click Delete button 2 To delete a public certificate you should access the network video decoder in the mode of HTTP Do not use secure connection or HTTPS Secure connection mode using a unique certificate To connect to the Samsung DDNS in camera setup 1 From t...

Страница 50: ...cted item 3 Press the Install button to start installation with a message of Installed next to the item 4 Press the Delete button to remove the certificate QoS You can specify the priority to secure a stable transfer rate for a specific IP 1 From the Setup menu select the Network tab 2 Click QoS 3 Click the Add button The IP list will be created 4 Enter an IP address to which you will apply QoS M ...

Страница 51: ...nd important events and conditions to the Admin Community Enter the trap community name to receive messages IP address Enter the IP address to which messages will be sent Authentication failure It specifies whether an event shall be generated when the community information is invalid Network connection It specifies whether an event shall be generated when the network disconnection is restored 4 Wh...

Страница 52: ...in a full frame When a frame skip occurs images are saved at the rate of min one image per sec 4 Specify the storage action Record profile The name of profile to be recorded is displayed Normal Make recording at a certain frame rate Event Set the recording type for a certain event that occurs Pre event duration Specify the time point before the occurrence of the alarm starting from the time point ...

Страница 53: ...ended specifications 2 Enter the information registered in your NAS IP address Unique IP address assigned to the NAS ID An ID registered in the NAS Password Password registered in the NAS Default folder Designate the NAS user folder to save data in 3 Click the Test button to see if you can successfully connect to the NAS J J If the success message is displayed it means that you can successfully sa...

Страница 54: ... Click the Apply button Finish saving by using the NAS Alarm output 1 From the Setup menu select the Event tab 2 Click Alarm output 3 Configure the camera alarm output settings If you change the alarm output type the alarm out button on the monitoring page and alarm output type displayed on Event Setup page will be changed accordingly Type Normal open Considers Open circuit status of the sensor or...

Страница 55: ...pen It is normally open but if it is closed an alarm will be triggered Normal close It is normally closed but if it is open an alarm will be triggered 5 Specify the Activation time Always Always check if an alarm occurs It activates in operated mode when the alarm occurs If set to Always the activation time cannot be changed Only scheduled time Check if an alarm occurs at a specified day of the we...

Страница 56: ...is detected If you use a higher sensitivity alarms may be generated even from very small changes but false detection in response to changes in an object or brightness may occur Defocus detection You can configure settings to generate an alarm signal when a defocus of the camera lens is detected 1 From the Setup menu select the Event tab 2 Click Defocus detection 3 Set whether or not to Enable 4 Se...

Страница 57: ...ize tab You can limit the minimum maximum size of motion to be detected Minimum size pixel To set the minimum size of detected motions select Minimum size pixel and then point and drag to the desired size on the screen using the mouse Maximum size pixel To set the maximum size of detected motions select Maximum size pixel and then point and drag to the desired size on the screen with your mouse J ...

Страница 58: ...system will be defaulted to DHCP if you reset the camera If no DHCP server is found the previous settings will be restored automatically Configuration backup Restore Backs up the current system settings before performing the restoration process The system is automatically restarts after backup or restoration Restart Restarts the system To perform the upgrade 1 Click Browse and specify a file to up...

Страница 59: ... at the top Each log contains up to 1 000 records and after 1 000 records are saved the oldest log is deleted when a new record is generated Status You can check the profile information 1 From the Setup menu select the System tab 2 Click Status 3 The profile information screen is displayed Profile access Show the information of the newly added profile Profile Show the information of the newly adde...

Страница 60: ...mpensation Off BLC WDR Items Description QND 6010R 6020R 6030R QNO 6020R 6030R QNV 6010R 6020R 6030R Operational Wide Dynamic Range 120dB Digital Noise Reduction SSNR Off On Motion Detection Off On 4ea polygoon zones Privacy Masking Off On 6ea rectangler zones Gain Control Off Low Middle High White Balance ATW AWC Manual Indoor Outdoor LDC Lens distortion control On Off 5 levels with Min Max Elect...

Страница 61: ...API Webpage Language English French German Spanish Italian Chinese Korean Russian Japanese Swedish Portuguese Czech Polish Turkish Dutch Hungarian Greek Items Description QND 6010R 6020R 6030R QNO 6020R 6030R QNV 6010R 6020R 6030R Network Web Viewer Supported OS Windows 7 8 1 10 MAC OS X 10 9 10 10 10 11 Plug in free web viewer Supported web browsers Google Chrome 47 MS Edge 20 Plug in web viewer ...

Страница 62: ...appendix 62_ appendix Product Overview QND 6010R 6020R 6030R Unit mm inch QNO 6020R 6030R Unit mm inch QNV 6010R 6020R 6030R ...

Страница 63: ...ndow prompted when initially accessing https click View Authentication Certificate and select the Always trust when connecting to the designated webviewer IP check box y y If the webviewer continues failing to display a video after you select Next on the message window below press the command key Q to exit the Safari browser access again and follow the procedures stated above I can t access the ca...

Страница 64: ...d modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s so...

Страница 65: ...ical commands show w and show c should show the appropriate parts of the General Public License Of course the commands you use may be called something other than show w and show c they could even be mouse clicks or menu items whatever suits your program You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the program if necessary He...

Страница 66: ...or for the User Product in which it has been modified or installed Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network Corresponding Source conveyed and Installation Information provided in accord with this section must be in a format that is publicly do...

Страница 67: ... the distribution 3 All advertising materials mentioning features or use of this software must display the following acknowledgment This product includes software developed by the OpenSSL Projectfor use in the OpenSSL Toolkit http www openssl org 4 The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permissi...

Страница 68: ...THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Various copyrights apply to this package listed in various separate parts below Please make sure that you read all the parts Part 1 CMU UCD copyright notice BSD like Copyright 1989 1991 1992 by Carneg...

Страница 69: ...USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Part 9 ScienceLogic LLC copyright notice BSD Copyright c 2009 ScienceLogic LLC All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions aremet yy Redistributions of source code must retain the above copyright notice this list of condi...

Страница 70: ...able version related documentation or collateral in which You describe recipients rights relating to the Covered Code You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice which may contain terms different from this License provided that You are in compliance with the terms of this License and that the license for the Executable version does n...

Страница 71: ...g to this software or products derived from it This software may be referred to only as the Independent JPEG Group s software We specifically permit and encourage the use of this software as the basis of commercial products provided that all warranty or liability claims are assumed by the product vendor ansi2knr c is included in this distribution by permission of L Peter Deutsch sole proprietor of...

Страница 72: ...rious Execution of Patch Processing Article 6 Distribution and Registration of the Ported Source Code 1 The Source Code User and the System Developer may whether with or without charge distribute to any third party only the following parts of the Ported Source Code on the T Engine Hardware or the Similar Hardware to T Engine Hardware 1 The Hardware dependent Part and or Compiler dependent Part pro...

Страница 73: ...customary use in describing the origin of the Work and reproducing the content of the NOTICE file 7 Disclaimer of Warranty Unless required by applicable law or agreed to in writing Licensor provides the Work and eachContributor provides its Contributions on an AS IS BASIS WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND either express or implied including without limitation any warranties or condition...

Страница 74: ...ppreciated but is not required 2 Altered source versions must be plainly marked as such and must not be misrepresented as being the original software 3 This notice may not be removed or altered from any source distribution Jean loup Gailly Mark Adler jloup gzip org madler alumni caltech edu The data format used by the zlib library is described by RFCs Request for Comments 1950 to 1952 in the files...

Страница 75: ...489 www hanwha security com Hanwha Techwin America 100 Challenger Rd Suite 700 Ridgefield Park NJ 07660 Toll Free 1 877 213 1222 Direct 1 201 325 6920 Fax 1 201 373 0124 Hanwha Techwin Europe 2nd Floor No 5 The Heights Brooklands Weybridge Surrey KT13 0NY UK Tel 44 1932 82 6700 Fax 44 1932 82 6701 ...

Отзывы: