Hikvision IPC-T229HA Bedienungsanleitung


Lesen Sie kostenlos die 📖 deutsche Bedienungsanleitung für Hikvision IPC-T229HA (48 Seiten) in der Kategorie Überwachungskamera. Dieser Bedienungsanleitung war für 23 Personen hilfreich und wurde von 2 Benutzern mit durchschnittlich 4.5 Sternen bewertet

Seite 1/48
Network Camera
User Manual
Network Camera User Manual
v
Update Firmware
For beer user experience, we recommend you to update your device to the latest rmware asap.
Please get the latest rmware package from the ocial website or the local technical expert. For
more informaon, please visit the ocial website:
hps://www.hikvision.com/en/support/download/rmware/.
For the upgrading sengs, refer to . Upgrade
Network Camera User Manual
vi
Symbol Convenons
The symbols that may be found in this document are dened as follows.
Symbol
Descripon
Danger
Indicates a hazardous situaon which, if not avoided, will or could
result in death or serious injury.
Cauon
Indicates a potenally hazardous situaon which, if not avoided,
could result in equipment damage, data loss, performance
degradaon, or unexpected results.
Note
Provides addional informaon to emphasize or supplement
important points of the main text.
Network Camera User Manual
viii
Emergency
If smoke, odor, or noise arises from the device, immediately turn o the power, unplug the
power cable, and contact the service center.
Time Synchronization
Set up camera me manually for the rst me access if the local me is not synchronized with
that of the network. Visit the camera via Web browse/client soware and go to me sengs
interface.
Network Camera User Manual
ix
Contents
Chapter 1 System Requirement .................................................................................................. 1
Chapter 2 Device Acvaon and Accessing ................................................................................. 2
2.1 Acvate the Device via SADP ................................................................................................ 2
2.2 Acvate the Device via Browser ........................................................................................... 2
2.3 Login ....................................................................................................................................... 3
2.3.1 Plug-in Installaon ..................................................................................................... 3
2.3.2 Admin Password Recovery 4........................................................................................
2.3.3 Illegal Login Lock......................................................................................................... 5
Chapter 3 Live View .................................................................................................................... 6
3.1 Live View Parameters ............................................................................................................ 6
3.1.1 Enable and Disable Live View .................................................................................... 6
3.1.2 Adjust Aspect Rao .................................................................................................... 6
3.1.3 Live View Stream Type ............................................................................................... 6
3.1.4 Select the Third-Party Plug-in .................................................................................... 6
3.1.5 Light 7............................................................................................................................
3.1.6 Count Pixel .................................................................................................................. 7
3.1.7 Start Digital Zoom 7......................................................................................................
3.1.8 Auxiliary Focus ............................................................................................................ 7
3.1.9 Lens Inializaon 7.......................................................................................................
3.1.10 Quick Set Live View .................................................................................................. 8
3.1.11 Lens Parameters Adjustment................................................................................... 8
3.1.12 Conduct 3D Posioning ............................................................................................ 9
3.2 Set Transmission Parameters 9...............................................................................................
3.3 Set Smooth Streaming ......................................................................................................... 10
Chapter 4 Video and Audio ....................................................................................................... 12
4.1 Video Sengs ...................................................................................................................... 12
4.1.1 Stream Type .............................................................................................................. 12
4.1.2 Video Type ................................................................................................................ 13
4.1.3 Resoluon ................................................................................................................. 13
Network Camera User Manual
x
4.1.4 Bitrate Type and Max. Bitrate .................................................................................13
4.1.5 Video Quality ............................................................................................................ 13
4.1.6 Frame Rate ...............................................................................................................13
4.1.7 Video Encoding ......................................................................................................... 14
4.1.8 Smoothing................................................................................................................. 15
4.2 ROI ........................................................................................................................................ 16
4.2.1 Set ROI ...................................................................................................................... 16
4.3 Display Info. on Stream ....................................................................................................... 17
4.4 Audio Sengs ...................................................................................................................... 17
4.4.1 Audio Encoding ......................................................................................................... 17
4.4.2 Audio Input ............................................................................................................... 17
4.4.3 Audio Output ............................................................................................................ 17
4.4.4 Environmental Noise Filter ...................................................................................... 18
4.5 Two-way Audio .................................................................................................................... 18
4.6 Display Sengs ................................................................................................................... 18
4.6.1 Scene Mode .............................................................................................................. 18
4.6.2 Image Parameters Switch ........................................................................................ 22
4.6.3 Video Standard ......................................................................................................... 22
4.6.4 Local Video Output ................................................................................................... 22
4.7 OSD ......................................................................................................................................22
4.8 Set Privacy Mask .................................................................................................................. 23
4.9 Overlay Picture .................................................................................................................... 23
4.10 Set Target Cropping ........................................................................................................... 24
Chapter 5 Video Recording and Picture Capture ........................................................................ 25
5.1 Storage Sengs ................................................................................................................... 25
5.1.1 Set New or Unencrypted Memory Card .................................................................. 25
5.1.2 Set FTP ......................................................................................................................27
5.1.3 Set NAS .....................................................................................................................28
5.1.4 eMMC Protecon ..................................................................................................... 28
5.1.5 Set Cloud Storage ..................................................................................................... 29
5.2 Video Recording ..................................................................................................................29
Network Camera User Manual
xi
5.2.1 Record Automacally ............................................................................................... 29
5.2.2 Record Manually ......................................................................................................31
5.2.3 Set Lite Storage ......................................................................................................... 31
5.2.4 Playback and Download Video ................................................................................ 31
5.3 Capture Conguraon ......................................................................................................... 32
5.3.1 Capture Automacally ............................................................................................. 32
5.3.2 Capture Manually ..................................................................................................... 33
5.3.3 Set Timing Wake ....................................................................................................... 33
5.3.4 View and Download Picture ....................................................................................33
Chapter 6 Event and Alarm ....................................................................................................... 35
6.1 Basic Event ........................................................................................................................... 35
6.1.1 Set Moon Detecon ............................................................................................... 35
6.1.2 Set Video Tampering Alarm ..................................................................................... 37
6.1.3 Set PIR Alarm ............................................................................................................ 38
6.1.4 Set Excepon Alarm ................................................................................................. 39
6.1.5 Set Alarm Input ........................................................................................................39
6.1.6 Set Video Quality Diagnosis ..................................................................................... 39
6.1.7 Set Vibraon Detecon ............................................................................................ 40
6.2 Smart Event .........................................................................................................................41
6.2.1 Detect Audio Excepon ............................................................................................ 41
6.2.2 Set Defocus Detecon .............................................................................................. 42
6.2.3 Detect Scene Change ................................................................................................ 42
6.2.4 Set Face Detecon .................................................................................................... 42
6.2.5 Set Video Loss ........................................................................................................... 43
6.2.6 Set Intrusion Detecon ............................................................................................ 43
6.2.7 Set Line Crossing Detecon .....................................................................................44
6.2.8 Set Region Entrance Detecon ................................................................................ 45
6.2.9 Set Region Exing Detecon .................................................................................... 46
6.2.10 Set Unaended Baggage Detecon ......................................................................47
6.2.11 Set Object Removal Detecon ............................................................................... 48
6.2.12 Draw Area ............................................................................................................... 49
Network Camera User Manual
xii
6.2.13 Set Size Filter .......................................................................................................... 50
Chapter 7 Network Sengs ...................................................................................................... 51
7.1 TCP/IP ..................................................................................................................................51
7.1.1 Mulcast ................................................................................................................... 52
7.1.2 Mulcast Discovery .................................................................................................. 53
7.2 SNMP ...................................................................................................................................53
7.3 Set SRTP ............................................................................................................................... 53
7.4 Port Mapping ....................................................................................................................... 54
7.4.1 Set Auto Port Mapping............................................................................................. 54
7.4.2 Set Manual Port Mapping ........................................................................................ 54
7.4.3 Set Port Mapping on Router .................................................................................... 55
7.5 Port....................................................................................................................................... 56
7.6 Access to Device via Domain Name .................................................................................... 57
7.7 Access to Device via PPPoE Dial Up Connecon ................................................................ 57
7.8 Wireless Dial ........................................................................................................................ 58
7.8.1 Set Wireless Dial ....................................................................................................... 58
7.8.2 Set Allowlist .............................................................................................................. 59
7.9 Wi-Fi ..................................................................................................................................... 59
7.9.1 Connect Device to Wi-Fi ........................................................................................... 60
7.10 Set Network Service .......................................................................................................... 60
7.11 Set Open Network Video Interface................................................................................... 61
7.12 Set ISUP .............................................................................................................................. 62
7.13 Set Alarm Server ................................................................................................................ 62
7.14 Access Camera via HiLookVision ....................................................................................... 62
7.14.1 Enable HiLookVision Service on Camera ............................................................... 63
7.14.2 Set Up HiLookVision ............................................................................................... 64
7.14.3 Add Camera to HiLookVision ................................................................................. 65
Chapter 8 Arming Schedule and Alarm Linkage ......................................................................... 67
8.1 Set Arming Schedule ...........................................................................................................67
8.2 Linkage Method Sengs..................................................................................................... 67
8.2.1 Trigger Alarm Output ............................................................................................... 67
Network Camera User Manual
xiii
8.2.2 FTP/NAS/Memory Card Uploading .........................................................................68
8.2.3 Send Email ................................................................................................................ 69
8.2.4 Nofy Surveillance Center ....................................................................................... 70
8.2.5 Trigger Recording ..................................................................................................... 70
8.2.6 Flashing Light ............................................................................................................ 70
8.2.7 Audible Warning ....................................................................................................... 70
Chapter 9 System and Security ................................................................................................. 72
9.1 View Device Informaon ....................................................................................................72
9.2 Search and Manage Log ...................................................................................................... 72
9.3 Simultaneous Login ............................................................................................................. 72
9.4 Import and Export Conguraon File ................................................................................. 72
9.5 Export Diagnose Informaon .............................................................................................. 72
9.6 Reboot.................................................................................................................................. 73
9.7 Restore and Default ............................................................................................................73
9.8 Upgrade ...............................................................................................................................73
9.9 View Open Source Soware License .................................................................................. 74
9.10 Wiegand ............................................................................................................................. 74
9.11 Metadata ........................................................................................................................... 74
9.12 Time and Date ...................................................................................................................74
9.12.1 Synchronize Time Manually ................................................................................... 74
9.12.2 Set NTP Server ........................................................................................................ 75
9.12.3 Synchronize Time by Satellite ................................................................................ 75
9.12.4 Set DST .................................................................................................................... 75
9.13 Set -RS 485 .......................................................................................................................... 76
9.14 Set RS-232 .......................................................................................................................... 76
9.15 Power Consumpon Mode ............................................................................................... 76
9.16 External Device .................................................................................................................. 77
9.16.1 Supplement Light Sengs ..................................................................................... 77
9.16.2 Heater ..................................................................................................................... 78
9.17 Security .............................................................................................................................. 78
9.17.1 Authencaon........................................................................................................ 78
Network Camera User Manual
xiv
9.17.2 Set IP Address Filter ............................................................................................... 79
9.17.3 Set HTTPS ................................................................................................................ 79
9.17.4 Set QoS.................................................................................................................... 80
9.17.5 Set IEEE 802.1X ....................................................................................................... 80
9.17.6 Control Timeout Sengs ....................................................................................... 81
9.17.7 Search Security Audit Logs ..................................................................................... 81
9.17.8 Security Reinforcement .........................................................................................81
9.17.9 SSH .......................................................................................................................... 82
9.18 Cercate Management ................................................................................................... 82
9.18.1 Create Self-signed Cercate ................................................................................82
9.18.2 Create Cercate Request ..................................................................................... 82
9.18.3 Import Cercate ................................................................................................... 83
9.18.4 Install Server/Client Cercate ............................................................................. 83
9.18.5 Install CA Cercate ............................................................................................... 83
9.18.6 Enable Cercate Expiraon Alarm ...................................................................... 84
9.19 User and Account .............................................................................................................. 84
9.19.1 Set User Account and Permission .......................................................................... 84
9.19.2 Simultaneous Login ................................................................................................ 85
9.19.3 Online Users ...........................................................................................................85
Chapter 10 Allocate VCA Resource ............................................................................................ 86
10.1 Switch Smart Mode ........................................................................................................... 86
10.2 Face Capture ...................................................................................................................... 87
10.2.1 Set Face Capture ..................................................................................................... 88
10.2.2 Overlay and Capture .............................................................................................. 88
10.2.3 Face Capture Algorithms Parameters .................................................................... 89
10.2.4 Set Shield Region .................................................................................................... 91
10.3 Road Trac ........................................................................................................................ 91
10.3.1 Set Vehicle Detecon ............................................................................................. 91
10.3.2 Set Mixed-Trac Detecon Rule ........................................................................... 92
10.3.3 Uploading Pictures Sengs ................................................................................... 93
10.3.4 Camera Sengs...................................................................................................... 93
Network Camera User Manual
xv
10.3.5 Import or Export Blocklist & Allowlist ................................................................... 93
10.4 Mul-Target-Type Detecon ............................................................................................ 94
10.4.1 Set Mul-Target-Type Detecon Rule ................................................................... 94
10.4.2 Overlay and Capture .............................................................................................. 95
10.4.3 Mul-Target-Type Detecon Algorithm Parameters ............................................ 95
10.4.4 Set Shield Region .................................................................................................... 97
10.5 Face Counng .................................................................................................................... 97
10.5.1 Set Face Counng Detecon Rule .........................................................................97
10.5.2 Overlay and Capture .............................................................................................. 98
10.5.3 Face Counng Algorithm Parameters ...................................................................99
10.5.4 View Face Counng Result ................................................................................... 100
10.6 Queue Management ....................................................................................................... 100
10.6.1 Set Regional People Queuing-Up ......................................................................... 100
10.6.2 Set Waing Time Detecon ................................................................................. 101
10.6.3 Queue Management Stascs ............................................................................102
10.7 Counng ........................................................................................................................... 103
10.7.1 Set Counng ......................................................................................................... 103
10.7.2 View Counng Stascs....................................................................................... 104
10.8 Hard Hat Detecon .......................................................................................................... 104
10.8.1 Set Hard Hat Detecon ........................................................................................ 105
10.9 Face Comparison and Modeling .....................................................................................105
10.9.1 Face Comparison .................................................................................................. 105
10.9.2 Face Modeling ...................................................................................................... 108
Chapter 11 Open Plaorm ...................................................................................................... 110
11.1 Set Open Plaorm ........................................................................................................... 110
Chapter 12 Smart Display ....................................................................................................... 111
Chapter 13 Set EPTZ ............................................................................................................... 112
13.1 Patrol................................................................................................................................ 112
13.2 Auto-Tracking .................................................................................................................. 112
Chapter 14 Paern Linkage .................................................................................................... 114
14.1 Set Paern Linkage .........................................................................................................114
Network Camera User Manual
1
Chapter 1 System Requirement
Your computer should meet the requirements for proper vising and operang the product.
Operang System
Microso Windows XP SP1 and above version
CPU
2.0 GHz or higher
RAM
1G or higher
Display
1024×768 resoluon or higher
Web Browser
For the details, see Plug-in Installaon
Network Camera User Manual
3
Note
The default IP address of the device is 192.168.1.64. You can set the IP address of the PC from
192.168.1.2 to 192.168.1.253 (except 192.168.1.64). For example, you can set the IP address of
the PC to 192.168.1.100.
3. Input in the browser. 192.168.1.64
4. Set device acvaon password.
Cauon
We highly recommend you create a strong password of your own choosing (using a minimum of
8 characters, including at least three of the following categories: upper case leers, lower case
leers, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can beer protect your product.
5. Click . OK
6. Input the acvaon password to log in to the device.
7. Oponal: Go to to change the IP address of the Conguraon Network Basic TCP/IP
device to the same segment of your network.
2.3 Login
Log in to the device via Web browser.
2.3.1 Plug-in Installaon
Certain operaon systems and web browser may restrict the display and operaon of the camera
funcon. You should install plug-in or complete certain sengs to ensure normal display and
operaon. For detailed restricted funcon, refer to the actual device.
Operang System
Web Browser
Operaon
Windows
Internet Explorer 8+
Google Chrome 57 and
earlier version
Mozilla Firefox 52 and
earlier version
Follow pop-up prompts to
complete plug-in installaon.
Google Chrome 57+
Mozilla Firefox 52+
Click to
download and install plug-in.
Network Camera User Manual
4
Operang System
Web Browser
Operaon
Mac OS
Google Chrome 57+
Mozilla Firefox 52+
Mac Safari 16+
Plug-in installaon is not
required.
Go to Conguraon
Network Advanced
Sengs Network Service
to enable WebSocket or
Websockets for normal view.
Display and operaon of
certain funcons are
restricted. For example,
Playback and Picture are not
available. For detailed
restricted funcon, refer to
the actual device.
Note
The camera only supports Windows and Mac OS system and do not support Linux system.
2.3.2 Admin Password Recovery
If you forget the admin password, you can reset the password by clicking on the Forget Password
login page aer compleng the account security sengs.
You can reset the password by seng the security queson or email.
Note
When you need to reset the password, make sure that the device and the PC are on the same
network segment.
Security Queson
You can set the account security during the acvaon. Or you can go to Conguraon System
User Management Account Security Sengs, click , select the security queson and input your
answer.
You can click and answer the security queson to reset the admin password Forget Password
when access the device via browser.
Email
You can set the account security during the acvaon. Or you can go to Conguraon System
User Management Account Security Sengs, click , input your email address to receive the
vericaon code during the recovering operaon process.
Network Camera User Manual
5
2.3.3 Illegal Login Lock
It helps to improve the security when accessing the device via Internet.
Go to , and enable Conguraon System Security Security Service Enable Illegal Login
Lock Illegal Login Aempt Locking Duraon. and are congurable.
Illegal Login Aempt
When your login aempts with the wrong password reach the set mes, the device is locked.
Locking Duraon
The device releases the lock aer the seng duraon.
Network Camera User Manual
12
Chapter 4 Video and Audio
This part introduces the conguraon of video and audio related parameters.
4.1 Video Sengs
This part introduces the sengs of video parameters, such as, stream type, video encoding, and
resoluon.
Go to seng page: . Conguraon Video/Audio Video
4.1.1 Stream Type
For device supports more than one stream, you can specify parameters for each stream type.
Main Stream
The stream stands for the best stream performance the device supports. It usually oers the
best resoluon and frame rate the device can do. But high resoluon and frame rate usually
means larger storage space and higher bandwidth requirements in transmission.
Sub Stream
The stream usually oers comparavely low resoluon opons, which consumes less bandwidth
and storage space.
Other Streams
Steams other than the main stream and sub stream may also be oered for customized usage.
Set Custom Video
You can set up addional video streams if required. For custom video streams, you can preview
them, but cannot record or play back them.
Steps
Note
The funcon is only supported by certain camera models.
Aer restoring the device (not restore to default sengs), quanty of custom video streams
and their names are kept, but the related parameters are restored.
1. Click to add a stream.
2. Change the stream name as needed.
Network Camera User Manual
13
Note
Up to 32 leers and symbols (except &, <, >, ', or ") are allowed for the stream name.
3. Customize the stream parameters (resoluon, frame rate, max. bitrate, video encoding).
4. Oponal: Add stream descripon as needed.
5. Oponal: If a custom stream is not needed, click to delete it.
6. Click . Save
4.1.2 Video Type
Select the content (video and audio) that should be contained in the stream.
Video
Only video content is contained in the stream.
Video & Audio
Video content and audio content are contained in the composite stream.
4.1.3 Resoluon
Select video resoluon according to actual needs. Higher resoluon requires higher bandwidth
and storage.
4.1.4 Bitrate Type and Max. Bitrate
Constant Bitrate
It means that the stream is compressed and transmied at a comparavely xed bitrate. The
compression speed is fast, but mosaic may occur on the image.
Variable Bitrate
It means that the device automacally adjust the bitrate under the set . The Max. Bitrate
compression speed is slower than that of the constant bitrate. But it guarantees the image
quality of complex scenes.
4.1.5 Video Quality
When is set as Variable, video quality is congurable. Select a video quality according Bitrate Type
to actual needs. Note that higher video quality requires higher bandwidth.
4.1.6 Frame Rate
The frame rate is to describe the frequency at which the video stream is updated and it is
Network Camera User Manual
15
is less sasfactory. Max. average bitrate should not be higher than max. bitrate.
Note
When H.265+ is enabled, , , and are not congurable. Video Quality I Frame Interval Prole SVC
I-Frame Interval
I-frame interval denes the number of frames between 2 I-frames.
In H.264 and H.265, an I-frame, or intra frame, is a self-contained frame that can be independently
decoded without any reference to other images. An I-frame consumes more bits than other
frames. Thus, video with more I-frames, in other words, smaller I-frame interval, generates more
steady and reliable data bits while requiring more storage space.
SVC
Scalable Video Coding (SVC) is the name for the Annex G extension of the H.264 or H.265 video
compression standard.
The objecve of the SVC standardizaon has been to enable the encoding of a high-quality video
bitstream that contains one or more subset bitstreams that can themselves be decoded with a
complexity and reconstrucon quality similar to that achieved using the exisng H.264 or H.265
design with the same quanty of data as in the subset bitstream. The subset bitstream is derived
by dropping packets from the larger bitstream.
SVC enables forward compability for older hardware: the same bitstream can be consumed by
basic hardware which can only decode a low-resoluon subset, while more advanced hardware
will be able decode high quality video stream.
MPEG4
MPEG4, referring to MPEG-4 Part 2, is a video compression format developed by Moving Picture
Experts Group (MPEG).
MJPEG
Moon JPEG (M-JPEG or MJPEG) is a video compression format in which intraframe coding
technology is used. Images in a MJPEG format is compressed as individual JPEG images.
Prole
This funcon means that under the same bitrate, the more complex the prole is, the higher the
quality of the image is, and the requirement for network bandwidth is also higher.
4.1.8 Smoothing
It refers to the smoothness of the stream. The higher value of the smoothing is, the beer uency
Network Camera User Manual
20
Two trigger modes are available: and . For example, if the trigger mode is , the Day Night Night
image turns black and white when the device receives alarm input signal.
Note
Day/Night Switch funcon varies according to models.
Grey Scale
You can choose the range of the as [0-255] or [16-235]. Grey Scale
Rotate
When enabled, the live view will rotate 90 ° counterclockwise. For example, 1280 × 720 is rotated
to 720 × 1280.
Enabling this funcon can change the eecve range of monitoring in the vercal direcon.
Lens Distoron Correcon
For device equipped with motorized lens, image may appear distorted to some extent. Enable this
funcon to correct the distoron.
Note
This funcon is only supported by certain device equipped with motorized lens.
The edge of image will be lost if this funcon is enabled.
BLC
If you focus on an object against strong backlight, the object will be too dark to be seen clearly.
BLC (backlight compensaon) compensates light to the object in the front to make it clear. If BLC
mode is set as , you can draw a red rectangle on the live view image as the BLC area. Custom
WDR
The WDR (Wide Dynamic Range) funcon helps the camera provide clear images in environment
with strong illuminaon dierences.
When there are both very bright and very dark areas simultaneously in the eld of view, you can
enable the WDR funcon and set the level. WDR automacally balances the brightness level of the
whole image and provides clear images with more details.
Note
When WDR is enabled, some other funcons may be not supported. Refer to the actual interface
for details.
Network Camera User Manual
23
Displayed Informaon
Set camera name, date, week, and their related display format.
Text Overlay
Set customized overlay text on image.
OSD Parameters
Set OSD parameters, such as , , , and . Display Mode OSD Size Font Color Alignment
4.8 Set Privacy Mask
The funcon blocks certain areas in the live view to protect privacy. No maer how the device
moves, the blocked scene will never be seen.
Steps
1. Go to privacy mask seng page: Conguraon Image Privacy Mask.
2. Check . Enable Privacy Mask
3. Click . Drag the mouse in the live view to draw a closed area. Draw Area
Adjust the size of the area.
Adjust the posion of the area.
Clear all the areas you set.
4. Click . Stop Drawing
5. Click . Save
Note
Up to 4 areas are supported for seng.
4.9 Overlay Picture
Overlay a customized picture on live view.
Before You Start
The picture to overlay has to be in BMP format with 24-bit, and the maximum picture size is 128 ×
128 pixel.
Steps
1. Go to picture overlay seng page: . Conguraon Image Picture Overlay
2. Click to select a picture, and click . Browse Upload
Network Camera User Manual
25
Chapter 5 Video Recording and Picture Capture
This part introduces the operaons of capturing video clips and snapshots, playback, and
downloading captured les.
5.1 Storage Sengs
This part introduces the conguraon of several common storage paths.
5.1.1 Set New or Unencrypted Memory Card
Before You Start
Insert a new or unencrypted memory card to the device. For detailed installaon, refer to Quick
Start Guide of the device.
Steps
1. Go to Conguraon Storage Storage Management HDD Management .
2. Select the memory card.
Note
If an buon appears, you need to unlock the memory card rst. See Unlock Detect Memory
Card Status for details.
3. Click to inialize the memory card. Format
When the of memory card turns from to , the memory card is ready Status Uninialized Normal
for use.
4. Oponal: Encrypt the memory card.
1) Click . Encrypted Format
2) Set the encrypon password.
3) Click . OK
When the turns to , the memory card is ready for use. Encrypon Status Encrypted
Note
Keep your encrypon password properly. Encrypon password cannot be found if forgoen.
5. Oponal: Dene the of the memory card. Input the percentage for storing dierent Quota
contents according to your needs.
6. Click . Save
Network Camera User Manual
28
Note
Upload to FTP/Memory Card/NAS Linkage Method Enable Automac Network in and
Replenishment should be both enabled simultaneously.
5. Click to verify the FTP server. Test
6. Click . Save
5.1.3 Set NAS
Take network server as network disk to store the record les, captured images, etc.
Before You Start
Get the IP address of the network disk rst.
Steps
1. Go to NAS seng page: . Conguraon Storage Storage Management Net HDD
2. Click . Enter the server address and le path for the disk. HDD No.
Server Address
The IP address of the network disk.
File Path
The saving path of network disk les.
Mounng Type
Select le system protocol according to the operaon system.
Enter user name and password of the net HDD to guarantee the security if is SMB/CIFS
selected.
3. Click to check whether the network disk is available. Test
4. Click . Save
5.1.4 eMMC Protecon
It is to automacally stop the use of eMMC as a storage media when its health status is poor.
Note
The eMMC protecon is only supported by certain device models with an eMMC hardware.
Go to for the sengs. Conguraon System Maintenance System Service
eMMC, short for embedded mulmedia card, is an embedded non-volale memory system. It is
able to store the captured images or videos of the device.
The device monitors the eMMC health status and turns o the eMMC when its status is poor.
Otherwise, using a worn-out eMMC may lead to device boot failure.
Network Camera User Manual
29
5.1.5 Set Cloud Storage
It helps to upload the captured pictures and data to the cloud. The plaorm requests picture
directly from the cloud for picture and analysis. The funcon is only supported by certain models.
Steps
Cauon
If cloud storage is enabled, the pictures are stored in the cloud storage server preferenally.
1. Go to Conguraon Storage Storage Management Cloud Storage .
2. Check . Enable Cloud Storage
3. Set basic parameters.
The protocol version of the cloud storage server.
The IP address of the cloud storage server. It supports IPv4 address.
The port of the cloud storage server. 6001 is the default port and you
are not recommended to edit it.
The user name and password of the cloud storage server.
The ID of the picture storage region in the cloud storage server. Make
sure storage pool ID and the storage region ID are the same.
4. Click to test the congured sengs. Test
5. Click . Save
5.2 Video Recording
This part introduces the operaons of manual and scheduled recording, playback, and
downloading recorded les.
5.2.1 Record Automacally
This funcon can record video automacally during congured me periods.
Before You Start
Select in event sengs for each record type except . See Trigger Recording Connuous Event and
Alarm for details.
Steps
1. Go to . Conguraon Storage Schedule Sengs Record Schedule
2. Check . Enable
Network Camera User Manual
34
Note
Go to , click to change the saving path of Conguraon Local Save snapshots when playback
pictures.
Network Camera User Manual
35
Chapter 6 Event and Alarm
This part introduces the conguraon of events. The device takes certain response to triggered
alarm.
6.1 Basic Event
6.1.1 Set Moon Detecon
It helps to detect the moving objects in the detecon region and trigger the linkage acons.
Steps
1. Go to Conguraon Event Basic Event Moon Detecon.
2. Check . Enable Moon Detecon
3. Oponal: Highlight to display the moving object in the image in green.
1) Check . Enable Dynamic Analysis for Moon
2) Go to . Conguraon Local
3) Set to . Rules Enable
4. Select , and set rule region and rule parameters. Conguraon Mode
For the informaon about normal mode, see Normal Mode.
For the informaon about expert mode, see Expert Mode.
5. Set the arming schedule and linkage methods. For the informaon about arming schedule
sengs, see . For the informaon about linkage methods, see Set Arming Schedule Linkage
Method Sengs.
6. Click . Save
Expert Mode
You can congure dierent moon detecon parameters for day and night according to the actual
needs.
Steps
1. Select in . Expert Mode Conguraon
2. Set parameters of expert mode.
Scheduled Image Sengs
OFF
Image switch is disabled.
Auto-Switch
The system switches day/night mode automacally according to environment. It displays
Network Camera User Manual
43
1) Check . Enable Dynamic Analysis For Face Detecon
2) Go to , set to . Conguraon Local Rules Enable
4. Set . The lower the sensivity is, the prole of the face or unclear face is more Sensivity
dicult to detect.
5. Set the arming schedule and linkage methods. For the informaon about arming schedule
sengs, see . For the informaon about linkage methods, see Set Arming Schedule Linkage
Method Sengs.
6. Click . Save
6.2.5 Set Video Loss
This funcon can detect the video signal loss in me and trigger the linkage acon.
Steps
1. Go to Conguraon Event Basic Event Video Loss.
2. Check . Enable
3. Refer to for seng scheduled me. Refer to for Set Arming Schedule Linkage Method Sengs
seng linkage method.
4. Click . Save
6.2.6 Set Intrusion Detecon
It is used to detect objects entering and loitering in a pre-dened virtual region. If it occurs, the
device can take linkage acons.
Steps
1. Go to Conguraon Event Smart Event Intrusion Detection.
2. Check . Enable
3. Select a . For the detecon region sengs, refer to . Region Draw Area
4. Set rules.
Sensivity stands for the percentage of the body part of an
acceptable target that enters the pre-dened region. Sensivity = 100
- S1/ST × 100. S1 stands for the target body part that goes across the
pre-dened region. ST stands for the complete target body. The
higher the value of sensivity is, the more easily the alarm can be
triggered.
Threshold stands for the threshold for the me of the object loitering
in the region. If the me that one object stays exceeds the threshold,
the alarm is triggered. The larger the value of the threshold is, the
longer the alarm triggering me is.
Human and vehicle are available. If the detecon target is not
selected, all the detected targets will be reported, including the
Network Camera User Manual
44
human and vehicle.
If you set a higher validity, the required target features should be
more obvious, and the alarm accuracy would be higher. The target
with less obvious features would be missing.
Figure 6-4 Set Rule
5. Oponal: You can set the parameters of mulple areas by repeang the above steps.
6. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
7. Click . Save
6.2.7 Set Line Crossing Detecon
It is used to detect objects crossing a pre-dened virtual line. If it occurs, the device can take
linkage acons.
Steps
1. Go to Conguraon Event Smart Event Line Crossing Detecon.
2. Check . Enable
3. Select one and set the size lter. For the size lter sengs, refer to . Line Set Size Filter
4. Click and a line with an arrow appears in the live video. Drag the line to the locaon Draw Area
on the live video as desired.
5. Set rules.
It stands for the direcon from which the object goes across the line.
A<->B: The object going across the line from both direcons can be
detected and alarms are triggered.
A->B: Only the object crossing the congured line from the A side to
the B side can be detected.
Network Camera User Manual
45
B->A: Only the object crossing the congured line from the B side to
the A side can be detected.
It stands for the percentage of the body part of an acceptable target
that goes across the pre-dened line. Sensivity = 100 - S1/ST × 100.
S1 stands for the target body part that goes across the pre-dened
line. ST stands for the complete target body. The higher the value of
sensivity is, the more easily the alarm can be triggered.
Human and vehicle are available. If the detecon target is not
selected, all the detected targets will be reported, including the
human and vehicle.
If you set a higher validity, the required target features should be
more obvious, and the alarm accuracy would be higher. The target
with less obvious features would be missing.
Figure 6-5 Set Rule
6. Oponal: You can set the parameters of mulple areas by repeang the above steps.
7. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
8. Click . Save
6.2.8 Set Region Entrance Detecon
It is used to detect objects entering a pre-dened virtual region from the outside place. If it occurs,
the device can take linkage acons.
Steps
1. Go to Conguraon Event Smart Event Region Entrance Detecon.
2. Check . Enable
Network Camera User Manual
46
3. Select one . For the region sengs, refer to . Region Draw Area
4. Set the detecon target, sensivity and the target validity.
It stands for the percentage of the body part of an acceptable target
that goes across the pre-dened region. Sensivity = 100 - S1/ST ×
100. S1 stands for the target body part that goes across the pre-
dened region. ST stands for the complete target body. The higher
the value of sensivity is, the more easily the alarm can be triggered.
Human and vehicle are available. If the detecon target is not
selected, all the detected targets will be reported, including the
human and vehicle.
If you set a higher validity, the required target features should be
more obvious, and the alarm accuracy would be higher. The target
with less obvious features would be missing.
Figure 6-6 Set Rule
5. Oponal: You can set the parameters of mulple areas by repeang the above steps.
6. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
7. Click . Save
6.2.9 Set Region Exing Detecon
It is used to detect objects exing from a pre-dened virtual region. If it occurs, the device can
take linkage acons.
Steps
1. Go to Conguraon Event Smart Event Region Exing Detecon
2. Check . Enable
Network Camera User Manual
47
3. Select one . For the detecon region sengs, refer to . Region Draw Area
4. Set the detecon target, sensivity and the target validity.
It stands for the percentage of the body part of an acceptable target
that goes across the pre-dened region. Sensivity = 100 - S1/ST ×
100. S1 stands for the target body part that goes across the pre-
dened region. ST stands for the complete target body. The higher
the value of sensivity is, the more easily the alarm can be triggered.
Human and vehicle are available. If the detecon target is not
selected, all the detected targets will be reported, including the
human and vehicle.
If you set a higher validity, the required target features should be
more obvious, and the alarm accuracy would be higher. The target
with less obvious features would be missing.
Figure 6-7 Set Rule
5. Oponal: You can set the parameters of mulple areas by repeang the above steps.
6. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
7. Click . Save
6.2.10 Set Unaended Baggage Detecon
It is used to detect the objects le over in the pre-dened region. Linkage methods can be
triggered aer the object is le and stays in the region for a set me period.
Steps
1. Go to Conguraon Event Smart Event Unaended Baggage Detecon.
2. Check . Enable
Network Camera User Manual
48
3. Select one . For the detecon region sengs, refer to . Region Draw Area
4. Set rules.
Sensivity stands for the percentage of the body part of an
acceptable target that enters the pre-dened region. Sensivity = 100
- S1/ST × 100. S1 stands for the target body part that goes across the
pre-dened region. ST stands for the complete target body. The
higher the value of sensivity is, the more easily the alarm can be
triggered.
It stands for the me of the objects le in the region. Alarm is
triggered aer the object is le and stays in the region for the set
me period.
Figure 6-8 Set Rule
5. Oponal: You can set the parameters of mulple areas by repeang the above steps.
6. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
7. Click . Save
6.2.11 Set Object Removal Detecon
It detects whether the objects are removed from the pre-dened detecon region, such as the
exhibits on display. If it occurs, the device can take linkage acons and the sta can take measures
to reduce property loss.
Steps
1. Go to Conguraon Event Smart Event Object Removal Detecon.
2. Check . Enable
3. Select a . For the region sengs, see . Region Draw Area
4. Set the rule.
Network Camera User Manual
49
Range [1-100]. It stands for the percentage of the body part of an
acceptable target that leaves the pre-dened region.
Sensivity = 100 S1/ST*100
S1 stands for the target body part that leaves the pre-dened region.
ST stands for the complete target body.
Example: If you set the value as 60, a target is possible to be counted
as a removed object only when 40 percent body part of the target
leaves the region.
Range [5-100s], the threshold for the me of the objects removed
from the region. If you set the value as 10, alarm is triggered aer the
object disappears from the region for 10s.
Figure 6-9 Set Rule
5. Oponal: Repeat the above steps to set more regions.
6. For the arming schedule sengs, see . For the linkage method sengs, see Set Arming Schedule
Linkage Method Sengs.
7. Click . Save
Note
The funcon is only supported by certain models. The actual display varies with the models.
6.2.12 Draw Area
This secon introduces the conguraon of area.
Steps
1. Click . Draw Area
Network Camera User Manual
51
Chapter 7 Network Sengs
7.1 TCP/IP
TCP/IP sengs must be properly congured before you operate the device over network. IPv4 and
IPv6 are both supported. Both versions can be congured simultaneously without conicng to
each other.
Go to for parameter sengs. Conguraon Network Basic Sengs TCP/IP
NIC Type
Select a NIC (Network Interface Card) type according to your network condion.
IPv4
Two IPv4 modes are available.
DHCP
The device automacally gets the IPv4 parameters from the network if you check . The DHCP
device IP address is changed aer enabling the funcon. You can use SADP to get the device
IP address.
Note
The network that the device is connected to should support DHCP (Dynamic Host
Conguraon Protocol).
Manual
You can set the device IPv4 parameters manually. Input , and IPv4 Address, IPv4 Subnet Mask
IPv4 Default Gateway Test, and click to see if the IP address is available.
IPv6
Three IPv6 modes are available.
Route Adversement
The IPv6 address is generated by combining the route adversement and the device Mac
address.
Note
Route adversement mode requires the support from the router that the device is connected
to.
DHCP
The IPv6 address is assigned by the server, router, or gateway.
Network Camera User Manual
56
7.5 Port
The device port can be modied when the device cannot access the network due to port conicts.
Cauon
Do not modify the default port parameters at will, otherwise the device may be inaccessible.
Go to for port sengs. Conguraon Network Basic Sengs Port
HTTP Port
It refers to the port through which the browser accesses the device. For example, when the
HTTP Port is modied to 81, you need to enter in the browser for login. hp://192.168.1.64:81
HTTPS Port
It refers to the port through which the browser accesses the device with cercate. Cercate
vericaon is required to ensure the secure access.
RTSP Port
It refers to the port of real-me streaming protocol.
SRTP Port
It refers to the port of secure real-me transport protocol.
Server Port
It refers to the port through which the client adds the device.
Enhanced SDK Service Port
It refers to the port through which the client adds the device. Cercate vericaon is required
to ensure the secure access.
WebSocket Port
TCP-based full-duplex communicaon protocol port for plug-in free preview.
WebSockets Port
TCP-based full-duplex communicaon protocol port for plug-in free preview. Cercate
vericaon is required to ensure the secure access.
Note
Enhanced SDK Service Port, WebSocket Port, and WebSockets Port are only supported by
certain models.
For device models that support that funcon, go to Conguraon Network Advanced
Sengs Network Service to enable it.
Network Camera User Manual
59
Refresh the dial status.
Disconnect the 3G/4G wireless network.
When the turns to , it means a successful dial. Dial Status Connected
7. Access the device via the of the computer in the network. IP Address
Input the IP address in the browser to access the device.
Add the device in client applicaon. Select , and input IP address and other IP/Domain
parameters to access the device.
7.8.2 Set Allowlist
Add the mobile phone number of administrator to the allowlist in order to receive alarm message
from the device.
Steps
1. Go to allowlist sengs page: Conguraon Advanced Conguraon Wireless Dial
Allowlist.
2. Check . Enable SMS Alarm
3. Click in the allowlist.
1) Input the mobile phone number to receive alarm message.
2) Check . Reboot via SMS
3) Select the certain events, and the mobile phone can receive the alarm message when the
event happens.
4) Click . Save
5) Oponal: Repeat the steps above to set mulple recipients.
Modify the allowlist parameters.
Delete the allowlist that already set.
Send a message to the mobile phone for test.
4. Click . Save
7.9 Wi- Fi
Connect the device to wireless network by seng Wi-Fi parameters.
Note
This funcon is only supported by certain device models.
Network Camera User Manual
61
Note
Complete cercate management before selecng server cercate. Refer to Cercate
Management for detailed informaon.
SDK Service & Enhanced SDK Service
Check to add the device to the client soware with SDK protocol. Enable SDK Service
Check to add the device to the client soware with SDK over Enable Enhanced SDK Service
TLS protocol.
When you use Enhanced SDK Service, select the . Server Cercate
Note
Complete cercate management before selecng server cercate. Refer to Cercate
Management for detailed informaon.
When set up connecon between the device and the client soware, it is recommended to
use Enhanced SDK Service and set the communicaon in Arming Mode to encrypt the data
transmission. See the user manual of the client soware for the arming mode sengs.
TLS (Transport Layer Security)
The device oers TLS1.1 and TLS1.2. Enable one or more protocol versions according to your
need.
Bonjour
Uncheck to disable the protocol.
3. Click . Save
7.11 Set Open Network Video Interface
If you need to access the device through Open Network Video Interface protocol, you can
congure the user sengs to enhance the network security.
Steps
1. Go to Conguraon Network Advanced Sengs Integraon Protocol.
2. Check . Enable Open Network Video Interface
3. Click to congure the Open Network Video Interface user. Add
Delete the selected Open Network Video Interface user.
Modify the selected Open Network Video Interface user.
4. Click . Save
5. Oponal: Repeat the steps above to add more Open Network Video Interface users.
Network Camera User Manual
63
Visit the ocial site of our company. Then go to . Support Tools Hikvision App Store
Scan the QR code below to download the applicaon.
Note
If errors like "Unknown app" occur during the installaon, solve the problem in two ways.
1) Visit to refer to the troubleshoong.hps://appstore.hikvision.com/stac/help/index.html
2) Visit , and click at the upper right corner of hps://appstore.hikvision.com/ Installaon Help
the interface to refer to the troubleshoong.
2. Start the applicaon and register for a HiLookVision user account.
3. Log in aer registraon.
4. In the app, tap "+" on the upper-right corner and then scan the QR code of the camera to add
the camera. You can nd the QR code on the camera or on the cover of the Quick Start Guide of
the camera in the package.
5. Follow the prompts to set the network connecon and add the camera to your HiLookVision
account.
6. For detailed informaon, refer to the user manual of the HiLookVision app.
7.14.1 Enable HiLookVision Service on Camera
HiLookVision service should be enabled on your camera before using the service.
You can enable the service through SADP soware or Web browser.
Enable HiLookVision Service via Web Browser
Follow the following steps to enable HiLookVision Service via Web Browser.
Before You Start
You need to acvate the camera before enabling the service.
Steps
1. Access the camera via web browser.
2. Enter plaorm access conguraon interface. Conguraon Network Advanced Sengs
Plaorm Access
3. Select HiLookVision as the . Plaorm Access Mode
4. Check . Enable
5. Click and read "Terms of Service" and "Privacy Policy" in pop-up window.
Network Camera User Manual
65
Note
If errors like "Unknown app" occur during the installaon, solve the problem in two ways.
1) Visit to refer to the troubleshoong.hps://appstore.hikvision.com/stac/help/index.html
2) Visit , and click at the upper right corner of hps://appstore.hikvision.com/ Installaon Help
the interface to refer to the troubleshoong.
2. Start the applicaon and register for a HiLookVision user account.
3. Log in aer registraon.
7.14.3 Add Camera to HiLookVision
Steps
1. Connect your mobile device to a Wi-Fi.
2. Log into the HiLookVision app.
3. In the home page, tap "+" on the upper-right corner to add a camera.
4. Scan the QR code on camera body or on the cover. Quick Start Guide
Note
If the QR code is missing or too blur to be recognized, you can also add the camera by inpung
the camera's serial number.
5. Input the vericaon code of your camera.
Note
The required vericaon code is the code you create or change when you enable
HiLookVision service on the camera.
If you forget the vericaon code, you can check the current vericaon code on Plaorm
Access conguraon page via web browser.
6. Tap buon in the popup interface. Connect to a Network
7. Choose or according to your camera funcon. Wired Connecon Wireless Connecon
Input the Wi-Fi password that your mobile phone has connected to,
and tap to start the Wi-Fi connecon process. (Locate the Next
camera within 3 meters from the router when seng up the Wi-Fi.)
Connect the camera to the router with a network cable and tap
Connected in the result interface.
Note
The router should be the same one which your mobile phone has connected to.
Network Camera User Manual
77
The device works with all the funcons enabled.
Low Consumpon Real-Time Mode
The device DSP works normally. It records the videos with the main stream at the half frame
rate, and supports the remote login, preview and the conguraon.
Low Power Sleep
When the device power is lower than , the device enters Threshold of Low Power Sleep Mode
sleep mode.
When the device power is recovered to 10% above the threshold, the device enters the user
conguraon mode.
Scheduled Sleep
If the device is during , it enters the sleep mode, otherwise it enters the Scheduled Sleep Time
user conguraon mode.
Note
For the scheduled sleep schedule sengs, see . Arming Schedule and Alarm Linkage
The device supports the ming wake. For the details, see . Set Timing Wake
9.16 External Device
For the device supporng external devices, including the supplement light, wiper on the housing
and the LED light, you can control them via the Web browser when it is used with the housing.
External devices vary with models.
Brightness
Adjust and according to the actual scene. Low Beam Brightness High Beam Brightness
Timing
The LED light will be turned on by the schedule you set. You should set Start Time End and
Time.
Auto
The LED light will be turned on according to the environment illuminaon.
9.16.1 Supplement Light Sengs
You can set supplement light and refer to the actual device for relevant parameters.
Smart Supplement Light
Smart supplement light avoids over exposure when the supplement light is on.
Supplement Light Mode
When the device supports supplement light, you can select supplement light mode.
Network Camera User Manual
84
5. Click . OK
Note
Up to 16 cercates are allowed.
9.18.6 Enable Cercate Expiraon Alarm
Steps
1. Check . If enabled, you will receive an email or the camera Enable Cercate Expiraon Alarm
links to the surveillance center that the cercate will expire soon, or is expired or abnormal.
2. Set the , and . Remind Me Before Expiraon (day) Alarm Frequency (day) Detecon Time (hour)
Note
If you set the reminding day before expiraon to 1, then the camera will remind you the day
before the expiraon day. 1 to 30 days are available. Seven days is the default reminding
days.
If you set the reminding day before expiraon to 1, and the detecon me to 10:00, and the
cercate will expire in 9:00 the next day, the camera will remind you in 10:00 the rst day.
3. Click . Save
9.19 User and Account
9.19.1 Set User Account and Permission
The administrator can add, modify, or delete other accounts, and grant dierent permission to
dierent user levels.
Cauon
To increase security of using the device on the network, please change the password of your
account regularly. Changing the password every 3 months is recommended. If the device is used in
high-risk environment, it is recommended that the password should be changed every month or
week.
Steps
1. Go to Conguraon System User Management User Management .
2. Click . Enter , select , and enter . Assign remote permission to Add User Name Level Password
users based on needs.
Network Camera User Manual
87
Face+Human Body
Mul-Target-Type Detecon
Face Comparison and
Modeling
Paern Mode
The devices link the captured faces, human bodies and vehicles informaon of the dierent
channels and display the targets paerns.
Channel 1: Face
Channel 2: Face+Human
Body+Motor Vehicles+Non-
Motor Vehicles
Paern Linkage
Face Capture
Mul-Target-Type Detecon
Face Comparison and
Modeling
Channel 1: Face+Human Body
Channel 2: Face+Human
Body+Motor Vehicles+Non-
Motor Vehicles
Paern LinkageMul-
Target-Type Detecon
Face Comparison and
Modeling
Monitoring
-
3. Click . Save
Note
In comparison mode, only channel 2 supports monitoring mode.
The paern mode is only supported by the 2-channel devices. Only channel 1 supports
human body detecon.
10.2 Face Capture
The device can capture the face that appears in the congured area, and the face informaon will
be uploaded with the captured picture as well.
Note
For device that supports face capture, you need to enable the funcon in . Refer VCA Resource
to for details. Allocate VCA Resource
Face capture is only supported by certain models.
Network Camera User Manual
90
The sensivity to idenfy a target. The higher the value is, the easier a face will be recognized,
and the higher possibility of misinformaon would be. The default value of 3 is recommended.
Capture Parameters
Best Shot
The best shot aer target leave the detecon area.
Capture Times
It refers to the capture mes a face will be captured during its stay in the congured area. The
default value is 1.
Capture Interval
The frame interval to capture a picture. If you set the value as 1, which is the default value, it
means the camera captures the face in every frame.
Capture Threshold
It stands for the quality of face to trigger capture and alarm. Higher value means beer quality
should be met to trigger capture and alarm.
Quick Shot
You can dene quick shot threshold and max. capture interval.
Quick Shot Threshold
It stands for the quality of face to trigger quick shot.
Face Exposure
Check the checkbox to enable the face exposure.
Reference Brightness
The reference brightness of a face in the face exposure mode. If a face is detected, the camera
adjusts the face brightness according to the value you set. The higher the value, the brighter the
face is.
Minimum Duraon
The minimum duraon of the camera exposures the face. The default value is 1 minute.
Note
If the face exposure is enabled, please make sure the WDR funcon is disabled, and the manual
iris is selected.
Face Filtering Time
It means the me interval between the camera detecng a face and taking a capture acon. If
the detected face stays in the scene for less than the set ltering me, capture will not be
triggered. For example, if the face ltering me is set as 5 seconds, the camera will capture the
detected face when the face keeps staying in the scene for 5 seconds.
Network Camera User Manual
92
5. Adjust the zoom rao of the camera so that the size of the vehicle in the image is close to that
of the red frame. Only the posion of red frame is adjustable.
Note
Only 1 license plate can be captured at one me for each lane.
6. Select and . Region Country/Region
7. Select the license plate informaon upload mode.
The license plate informaon of the detected vehicle will be uploaded
when the vehicle passes the detecon area and triggers the detecon
in entrance/exit.
The license plate informaon of the detected vehicle will be uploaded
when the vehicle passes the detecon area and triggers the detecon
in city streets.
It means the input alarm will trigger a license plate capture and
recognion acon.
Note
When Alarm Input is selected, the alarm input A<-1 will automacally be assigned to trigger
vehicle detecon and its alarm type is always NO.If the A<-1 alarm input is used to trigger vehicle
detecon, it can not be used for other basic events.When Alarm Input is selected and saved,
previously congured linkage method for A<-1 will be canceled.
8. Select the . Detecon mode
9. Check ans set the . The default me interval is Remove Duplicated License Plates Time Interval
4 minutes.
Note
Up to 8 license plates are supported.
10. Set arming schedule and linkage method. For the arming schedule setngs, refer to Set Arming
Schedule Linkage Method Sengs. For the linkage method sengs, refer to .
11. Click . Save
10.3.2 Set Mixed-Trac Detecon Rule
The motor vehicle, non-motor vehicle, and pedestrian that enter the set lane can be detected, and
the picture of targets can be captured and stored. Alarm will be triggered and capture can be
Network Camera User Manual
96
HMS Version
It refers to the current algorithm version, which cannot be edited.
Restore Defaults
Click to restore all the sengs in advanced conguraon to the factory default. Restore
Detecon Parameters
Generaon Speed
It is the speed of deciding whether an object in detecon area is a target or not. The higher the
value is, the faster the target will be detected. The default value is recommended.
Sensivity
It is the sensivity of recognizing a target. The higher the value is, the easier a target will be
recognized, and the higher possibility of misinformaon would be. The default value is
recommended.
Capture Parameters
Best Shot
Capture Threshold
It refers for the quality of face to trigger capture and alarm. Higher value means beer quality
should be met to trigger capture and alarm.
Face Exposure
Enable the funcon, and the device automacally adjusts exposure level when human faces
appear in the scene.
Reference Brightness
It refers to the reference brightness of a face in the face exposure mode. If a face in the
actual scene is brighter than the set reference brightness, the device lower the exposure
level. If a face in the actual scene is darker than the set reference, the device increases the
exposure level.
Minimum Duraon
The extra me the device keeps the face exposure level after the face disappears in the
scene.
Face Filtering Time
It means the me interval between the camera detecng a face and taking a capture acon. If
the detected face stays in the scene for less than the set ltering me, capture will not be
triggered. For example, if the face ltering me is set as 5 seconds, the camera will capture the
detected face when the face keeps staying in the scene for 5 seconds.
Network Camera User Manual
98
line, then it is counted as the entering number.
If the target crosses the counng area along the exing direcon and crosses the detecon
line, then it is counted as the exing number.
7. Click and to draw region A and B. Make sure the two areas don't overlap. You can click
to change the direcon.
If the target enters from A region to B region, then it is counted as the entering number.
If the target enters from B region to A region, then it is counted as the exing number.
8. Set arming schedule. See . Set Arming Schedule
9. Set linkage method. See . Linkage Method Sengs
10.5.2 Overlay and Capture
Choose to congure capture parameters and the informaon you want to display on stream and
picture.
Display VCA info. on Stream
Display smart informaon on stream, including the target and rules informaon.
Display Target info. on Alarm Picture
Overlay the alarm picture with target informaon.
Target Picture Sengs
Custom, Head Shot, Half-Body Shot and Full-Body Shot are selectable.
Note
If you select , you can customize , and as required. Custom width head height body height
You can check to set the picture height. Fixed Value
Background Picture Sengs
Comparing to target picture, background picture is the scene image oers extra environmental
informaon. You can set the background picture quality and resoluon. If the background image
need to be uploaded to surveillance center, check . Background Upload
People Counng Overlay
Select ow overlay type.
Select the daily reset me. Click if you want to reset right now. Manual Reset
Camera
You can set and for the camera, which can be overlaid on captured Device No. Camera Info.
picture.
Text Overlay
You can check desired items and adjust their order to display on captured pictures by .
The content of and should be on the same page. Device No. Camera Info
Network Camera User Manual
102
Figure 10-3 Set Waing Time Detecon
4. Set . An alarm is triggered when the alarm threshold condion is met. Alarm threshold
5. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
6. Click . Save
7. Oponal: Enable and in . Display POS Informaon Rule Conguraon Local
The detecon area and the me people staying in the detecon area can be viewed on the live
view.
10.6.3 Queue Management Stascs
Queue management supports data analysis and report output.
Before You Start
For queue management sengs, refer to and Set Regional People Queuing-Up Set Waing Time
Detecon.
Select and to compare queuing-up people Queuing-Up Time Analysis Regional Comparison
number of dierent regions.
Select and to compare queuing-up people Queuing-Up Time Analysis Mul-Level Comparison
number of dierent waing me levels.
Select and to compare the me and duraon that Queue Status Analysis Regional Comparison
a queue stays at a certain length in dierent regions.
Select and to compare the me and duraon of Queue Status Analysis Mul-Level Comparison
the queue at dierent queue length levels.
Steps
Note
With an on-board memory card installed, the device can save up to one mouth's data. With NO
memory card installed, the device can only save up to one week's data.


Produktspezifikationen

Marke: Hikvision
Kategorie: Überwachungskamera
Modell: IPC-T229HA

Brauchst du Hilfe?

Wenn Sie Hilfe mit Hikvision IPC-T229HA benötigen, stellen Sie unten eine Frage und andere Benutzer werden Ihnen antworten




Bedienungsanleitung Überwachungskamera Hikvision

Bedienungsanleitung Überwachungskamera

Neueste Bedienungsanleitung für -Kategorien-