Hikvision IPC-T229HA Bedienungsanleitung


Lesen Sie kostenlos die 📖 deutsche Bedienungsanleitung für Hikvision IPC-T229HA (48 Seiten) in der Kategorie Überwachungskamera. Dieser Bedienungsanleitung war für 24 Personen hilfreich und wurde von 2 Benutzern mit durchschnittlich 4.5 Sternen bewertet

Seite 1/48
Network Camera
User Manual
Network Camera User Manual
v
Update Firmware
For beer user experience, we recommend you to update your device to the latest rmware asap.
Please get the latest rmware package from the ocial website or the local technical expert. For
more informaon, please visit the ocial website:
hps://www.hikvision.com/en/support/download/rmware/.
For the upgrading sengs, refer to . Upgrade
Network Camera User Manual
vi
Symbol Convenons
The symbols that may be found in this document are dened as follows.
Symbol
Descripon
Danger
Indicates a hazardous situaon which, if not avoided, will or could
result in death or serious injury.
Cauon
Indicates a potenally hazardous situaon which, if not avoided,
could result in equipment damage, data loss, performance
degradaon, or unexpected results.
Note
Provides addional informaon to emphasize or supplement
important points of the main text.
Network Camera User Manual
viii
Emergency
If smoke, odor, or noise arises from the device, immediately turn o the power, unplug the
power cable, and contact the service center.
Time Synchronization
Set up camera me manually for the rst me access if the local me is not synchronized with
that of the network. Visit the camera via Web browse/client soware and go to me sengs
interface.
Network Camera User Manual
ix
Contents
Chapter 1 System Requirement .................................................................................................. 1
Chapter 2 Device Acvaon and Accessing ................................................................................. 2
2.1 Acvate the Device via SADP ................................................................................................ 2
2.2 Acvate the Device via Browser ........................................................................................... 2
2.3 Login ....................................................................................................................................... 3
2.3.1 Plug-in Installaon ..................................................................................................... 3
2.3.2 Admin Password Recovery 4........................................................................................
2.3.3 Illegal Login Lock......................................................................................................... 5
Chapter 3 Live View .................................................................................................................... 6
3.1 Live View Parameters ............................................................................................................ 6
3.1.1 Enable and Disable Live View .................................................................................... 6
3.1.2 Adjust Aspect Rao .................................................................................................... 6
3.1.3 Live View Stream Type ............................................................................................... 6
3.1.4 Select the Third-Party Plug-in .................................................................................... 6
3.1.5 Light 7............................................................................................................................
3.1.6 Count Pixel .................................................................................................................. 7
3.1.7 Start Digital Zoom 7......................................................................................................
3.1.8 Auxiliary Focus ............................................................................................................ 7
3.1.9 Lens Inializaon 7.......................................................................................................
3.1.10 Quick Set Live View .................................................................................................. 8
3.1.11 Lens Parameters Adjustment................................................................................... 8
3.1.12 Conduct 3D Posioning ............................................................................................ 9
3.2 Set Transmission Parameters 9...............................................................................................
3.3 Set Smooth Streaming ......................................................................................................... 10
Chapter 4 Video and Audio ....................................................................................................... 12
4.1 Video Sengs ...................................................................................................................... 12
4.1.1 Stream Type .............................................................................................................. 12
4.1.2 Video Type ................................................................................................................ 13
4.1.3 Resoluon ................................................................................................................. 13
Network Camera User Manual
x
4.1.4 Bitrate Type and Max. Bitrate .................................................................................13
4.1.5 Video Quality ............................................................................................................ 13
4.1.6 Frame Rate ...............................................................................................................13
4.1.7 Video Encoding ......................................................................................................... 14
4.1.8 Smoothing................................................................................................................. 15
4.2 ROI ........................................................................................................................................ 16
4.2.1 Set ROI ...................................................................................................................... 16
4.3 Display Info. on Stream ....................................................................................................... 17
4.4 Audio Sengs ...................................................................................................................... 17
4.4.1 Audio Encoding ......................................................................................................... 17
4.4.2 Audio Input ............................................................................................................... 17
4.4.3 Audio Output ............................................................................................................ 17
4.4.4 Environmental Noise Filter ...................................................................................... 18
4.5 Two-way Audio .................................................................................................................... 18
4.6 Display Sengs ................................................................................................................... 18
4.6.1 Scene Mode .............................................................................................................. 18
4.6.2 Image Parameters Switch ........................................................................................ 22
4.6.3 Video Standard ......................................................................................................... 22
4.6.4 Local Video Output ................................................................................................... 22
4.7 OSD ......................................................................................................................................22
4.8 Set Privacy Mask .................................................................................................................. 23
4.9 Overlay Picture .................................................................................................................... 23
4.10 Set Target Cropping ........................................................................................................... 24
Chapter 5 Video Recording and Picture Capture ........................................................................ 25
5.1 Storage Sengs ................................................................................................................... 25
5.1.1 Set New or Unencrypted Memory Card .................................................................. 25
5.1.2 Set FTP ......................................................................................................................27
5.1.3 Set NAS .....................................................................................................................28
5.1.4 eMMC Protecon ..................................................................................................... 28
5.1.5 Set Cloud Storage ..................................................................................................... 29
5.2 Video Recording ..................................................................................................................29
Network Camera User Manual
xi
5.2.1 Record Automacally ............................................................................................... 29
5.2.2 Record Manually ......................................................................................................31
5.2.3 Set Lite Storage ......................................................................................................... 31
5.2.4 Playback and Download Video ................................................................................ 31
5.3 Capture Conguraon ......................................................................................................... 32
5.3.1 Capture Automacally ............................................................................................. 32
5.3.2 Capture Manually ..................................................................................................... 33
5.3.3 Set Timing Wake ....................................................................................................... 33
5.3.4 View and Download Picture ....................................................................................33
Chapter 6 Event and Alarm ....................................................................................................... 35
6.1 Basic Event ........................................................................................................................... 35
6.1.1 Set Moon Detecon ............................................................................................... 35
6.1.2 Set Video Tampering Alarm ..................................................................................... 37
6.1.3 Set PIR Alarm ............................................................................................................ 38
6.1.4 Set Excepon Alarm ................................................................................................. 39
6.1.5 Set Alarm Input ........................................................................................................39
6.1.6 Set Video Quality Diagnosis ..................................................................................... 39
6.1.7 Set Vibraon Detecon ............................................................................................ 40
6.2 Smart Event .........................................................................................................................41
6.2.1 Detect Audio Excepon ............................................................................................ 41
6.2.2 Set Defocus Detecon .............................................................................................. 42
6.2.3 Detect Scene Change ................................................................................................ 42
6.2.4 Set Face Detecon .................................................................................................... 42
6.2.5 Set Video Loss ........................................................................................................... 43
6.2.6 Set Intrusion Detecon ............................................................................................ 43
6.2.7 Set Line Crossing Detecon .....................................................................................44
6.2.8 Set Region Entrance Detecon ................................................................................ 45
6.2.9 Set Region Exing Detecon .................................................................................... 46
6.2.10 Set Unaended Baggage Detecon ......................................................................47
6.2.11 Set Object Removal Detecon ............................................................................... 48
6.2.12 Draw Area ............................................................................................................... 49
Network Camera User Manual
xii
6.2.13 Set Size Filter .......................................................................................................... 50
Chapter 7 Network Sengs ...................................................................................................... 51
7.1 TCP/IP ..................................................................................................................................51
7.1.1 Mulcast ................................................................................................................... 52
7.1.2 Mulcast Discovery .................................................................................................. 53
7.2 SNMP ...................................................................................................................................53
7.3 Set SRTP ............................................................................................................................... 53
7.4 Port Mapping ....................................................................................................................... 54
7.4.1 Set Auto Port Mapping............................................................................................. 54
7.4.2 Set Manual Port Mapping ........................................................................................ 54
7.4.3 Set Port Mapping on Router .................................................................................... 55
7.5 Port....................................................................................................................................... 56
7.6 Access to Device via Domain Name .................................................................................... 57
7.7 Access to Device via PPPoE Dial Up Connecon ................................................................ 57
7.8 Wireless Dial ........................................................................................................................ 58
7.8.1 Set Wireless Dial ....................................................................................................... 58
7.8.2 Set Allowlist .............................................................................................................. 59
7.9 Wi-Fi ..................................................................................................................................... 59
7.9.1 Connect Device to Wi-Fi ........................................................................................... 60
7.10 Set Network Service .......................................................................................................... 60
7.11 Set Open Network Video Interface................................................................................... 61
7.12 Set ISUP .............................................................................................................................. 62
7.13 Set Alarm Server ................................................................................................................ 62
7.14 Access Camera via HiLookVision ....................................................................................... 62
7.14.1 Enable HiLookVision Service on Camera ............................................................... 63
7.14.2 Set Up HiLookVision ............................................................................................... 64
7.14.3 Add Camera to HiLookVision ................................................................................. 65
Chapter 8 Arming Schedule and Alarm Linkage ......................................................................... 67
8.1 Set Arming Schedule ...........................................................................................................67
8.2 Linkage Method Sengs..................................................................................................... 67
8.2.1 Trigger Alarm Output ............................................................................................... 67
Network Camera User Manual
xiii
8.2.2 FTP/NAS/Memory Card Uploading .........................................................................68
8.2.3 Send Email ................................................................................................................ 69
8.2.4 Nofy Surveillance Center ....................................................................................... 70
8.2.5 Trigger Recording ..................................................................................................... 70
8.2.6 Flashing Light ............................................................................................................ 70
8.2.7 Audible Warning ....................................................................................................... 70
Chapter 9 System and Security ................................................................................................. 72
9.1 View Device Informaon ....................................................................................................72
9.2 Search and Manage Log ...................................................................................................... 72
9.3 Simultaneous Login ............................................................................................................. 72
9.4 Import and Export Conguraon File ................................................................................. 72
9.5 Export Diagnose Informaon .............................................................................................. 72
9.6 Reboot.................................................................................................................................. 73
9.7 Restore and Default ............................................................................................................73
9.8 Upgrade ...............................................................................................................................73
9.9 View Open Source Soware License .................................................................................. 74
9.10 Wiegand ............................................................................................................................. 74
9.11 Metadata ........................................................................................................................... 74
9.12 Time and Date ...................................................................................................................74
9.12.1 Synchronize Time Manually ................................................................................... 74
9.12.2 Set NTP Server ........................................................................................................ 75
9.12.3 Synchronize Time by Satellite ................................................................................ 75
9.12.4 Set DST .................................................................................................................... 75
9.13 Set -RS 485 .......................................................................................................................... 76
9.14 Set RS-232 .......................................................................................................................... 76
9.15 Power Consumpon Mode ............................................................................................... 76
9.16 External Device .................................................................................................................. 77
9.16.1 Supplement Light Sengs ..................................................................................... 77
9.16.2 Heater ..................................................................................................................... 78
9.17 Security .............................................................................................................................. 78
9.17.1 Authencaon........................................................................................................ 78
Network Camera User Manual
xiv
9.17.2 Set IP Address Filter ............................................................................................... 79
9.17.3 Set HTTPS ................................................................................................................ 79
9.17.4 Set QoS.................................................................................................................... 80
9.17.5 Set IEEE 802.1X ....................................................................................................... 80
9.17.6 Control Timeout Sengs ....................................................................................... 81
9.17.7 Search Security Audit Logs ..................................................................................... 81
9.17.8 Security Reinforcement .........................................................................................81
9.17.9 SSH .......................................................................................................................... 82
9.18 Cercate Management ................................................................................................... 82
9.18.1 Create Self-signed Cercate ................................................................................82
9.18.2 Create Cercate Request ..................................................................................... 82
9.18.3 Import Cercate ................................................................................................... 83
9.18.4 Install Server/Client Cercate ............................................................................. 83
9.18.5 Install CA Cercate ............................................................................................... 83
9.18.6 Enable Cercate Expiraon Alarm ...................................................................... 84
9.19 User and Account .............................................................................................................. 84
9.19.1 Set User Account and Permission .......................................................................... 84
9.19.2 Simultaneous Login ................................................................................................ 85
9.19.3 Online Users ...........................................................................................................85
Chapter 10 Allocate VCA Resource ............................................................................................ 86
10.1 Switch Smart Mode ........................................................................................................... 86
10.2 Face Capture ...................................................................................................................... 87
10.2.1 Set Face Capture ..................................................................................................... 88
10.2.2 Overlay and Capture .............................................................................................. 88
10.2.3 Face Capture Algorithms Parameters .................................................................... 89
10.2.4 Set Shield Region .................................................................................................... 91
10.3 Road Trac ........................................................................................................................ 91
10.3.1 Set Vehicle Detecon ............................................................................................. 91
10.3.2 Set Mixed-Trac Detecon Rule ........................................................................... 92
10.3.3 Uploading Pictures Sengs ................................................................................... 93
10.3.4 Camera Sengs...................................................................................................... 93
Network Camera User Manual
xv
10.3.5 Import or Export Blocklist & Allowlist ................................................................... 93
10.4 Mul-Target-Type Detecon ............................................................................................ 94
10.4.1 Set Mul-Target-Type Detecon Rule ................................................................... 94
10.4.2 Overlay and Capture .............................................................................................. 95
10.4.3 Mul-Target-Type Detecon Algorithm Parameters ............................................ 95
10.4.4 Set Shield Region .................................................................................................... 97
10.5 Face Counng .................................................................................................................... 97
10.5.1 Set Face Counng Detecon Rule .........................................................................97
10.5.2 Overlay and Capture .............................................................................................. 98
10.5.3 Face Counng Algorithm Parameters ...................................................................99
10.5.4 View Face Counng Result ................................................................................... 100
10.6 Queue Management ....................................................................................................... 100
10.6.1 Set Regional People Queuing-Up ......................................................................... 100
10.6.2 Set Waing Time Detecon ................................................................................. 101
10.6.3 Queue Management Stascs ............................................................................102
10.7 Counng ........................................................................................................................... 103
10.7.1 Set Counng ......................................................................................................... 103
10.7.2 View Counng Stascs....................................................................................... 104
10.8 Hard Hat Detecon .......................................................................................................... 104
10.8.1 Set Hard Hat Detecon ........................................................................................ 105
10.9 Face Comparison and Modeling .....................................................................................105
10.9.1 Face Comparison .................................................................................................. 105
10.9.2 Face Modeling ...................................................................................................... 108
Chapter 11 Open Plaorm ...................................................................................................... 110
11.1 Set Open Plaorm ........................................................................................................... 110
Chapter 12 Smart Display ....................................................................................................... 111
Chapter 13 Set EPTZ ............................................................................................................... 112
13.1 Patrol................................................................................................................................ 112
13.2 Auto-Tracking .................................................................................................................. 112
Chapter 14 Paern Linkage .................................................................................................... 114
14.1 Set Paern Linkage .........................................................................................................114
Network Camera User Manual
1
Chapter 1 System Requirement
Your computer should meet the requirements for proper vising and operang the product.
Operang System
Microso Windows XP SP1 and above version
CPU
2.0 GHz or higher
RAM
1G or higher
Display
1024×768 resoluon or higher
Web Browser
For the details, see Plug-in Installaon
Network Camera User Manual
3
Note
The default IP address of the device is 192.168.1.64. You can set the IP address of the PC from
192.168.1.2 to 192.168.1.253 (except 192.168.1.64). For example, you can set the IP address of
the PC to 192.168.1.100.
3. Input in the browser. 192.168.1.64
4. Set device acvaon password.
Cauon
We highly recommend you create a strong password of your own choosing (using a minimum of
8 characters, including at least three of the following categories: upper case leers, lower case
leers, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can beer protect your product.
5. Click . OK
6. Input the acvaon password to log in to the device.
7. Oponal: Go to to change the IP address of the Conguraon Network Basic TCP/IP
device to the same segment of your network.
2.3 Login
Log in to the device via Web browser.
2.3.1 Plug-in Installaon
Certain operaon systems and web browser may restrict the display and operaon of the camera
funcon. You should install plug-in or complete certain sengs to ensure normal display and
operaon. For detailed restricted funcon, refer to the actual device.
Operang System
Web Browser
Operaon
Windows
Internet Explorer 8+
Google Chrome 57 and
earlier version
Mozilla Firefox 52 and
earlier version
Follow pop-up prompts to
complete plug-in installaon.
Google Chrome 57+
Mozilla Firefox 52+
Click to
download and install plug-in.
Network Camera User Manual
4
Operang System
Web Browser
Operaon
Mac OS
Google Chrome 57+
Mozilla Firefox 52+
Mac Safari 16+
Plug-in installaon is not
required.
Go to Conguraon
Network Advanced
Sengs Network Service
to enable WebSocket or
Websockets for normal view.
Display and operaon of
certain funcons are
restricted. For example,
Playback and Picture are not
available. For detailed
restricted funcon, refer to
the actual device.
Note
The camera only supports Windows and Mac OS system and do not support Linux system.
2.3.2 Admin Password Recovery
If you forget the admin password, you can reset the password by clicking on the Forget Password
login page aer compleng the account security sengs.
You can reset the password by seng the security queson or email.
Note
When you need to reset the password, make sure that the device and the PC are on the same
network segment.
Security Queson
You can set the account security during the acvaon. Or you can go to Conguraon System
User Management Account Security Sengs, click , select the security queson and input your
answer.
You can click and answer the security queson to reset the admin password Forget Password
when access the device via browser.
Email
You can set the account security during the acvaon. Or you can go to Conguraon System
User Management Account Security Sengs, click , input your email address to receive the
vericaon code during the recovering operaon process.
Network Camera User Manual
5
2.3.3 Illegal Login Lock
It helps to improve the security when accessing the device via Internet.
Go to , and enable Conguraon System Security Security Service Enable Illegal Login
Lock Illegal Login Aempt Locking Duraon. and are congurable.
Illegal Login Aempt
When your login aempts with the wrong password reach the set mes, the device is locked.
Locking Duraon
The device releases the lock aer the seng duraon.
Network Camera User Manual
12
Chapter 4 Video and Audio
This part introduces the conguraon of video and audio related parameters.
4.1 Video Sengs
This part introduces the sengs of video parameters, such as, stream type, video encoding, and
resoluon.
Go to seng page: . Conguraon Video/Audio Video
4.1.1 Stream Type
For device supports more than one stream, you can specify parameters for each stream type.
Main Stream
The stream stands for the best stream performance the device supports. It usually oers the
best resoluon and frame rate the device can do. But high resoluon and frame rate usually
means larger storage space and higher bandwidth requirements in transmission.
Sub Stream
The stream usually oers comparavely low resoluon opons, which consumes less bandwidth
and storage space.
Other Streams
Steams other than the main stream and sub stream may also be oered for customized usage.
Set Custom Video
You can set up addional video streams if required. For custom video streams, you can preview
them, but cannot record or play back them.
Steps
Note
The funcon is only supported by certain camera models.
Aer restoring the device (not restore to default sengs), quanty of custom video streams
and their names are kept, but the related parameters are restored.
1. Click to add a stream.
2. Change the stream name as needed.
Network Camera User Manual
13
Note
Up to 32 leers and symbols (except &, <, >, ', or ") are allowed for the stream name.
3. Customize the stream parameters (resoluon, frame rate, max. bitrate, video encoding).
4. Oponal: Add stream descripon as needed.
5. Oponal: If a custom stream is not needed, click to delete it.
6. Click . Save
4.1.2 Video Type
Select the content (video and audio) that should be contained in the stream.
Video
Only video content is contained in the stream.
Video & Audio
Video content and audio content are contained in the composite stream.
4.1.3 Resoluon
Select video resoluon according to actual needs. Higher resoluon requires higher bandwidth
and storage.
4.1.4 Bitrate Type and Max. Bitrate
Constant Bitrate
It means that the stream is compressed and transmied at a comparavely xed bitrate. The
compression speed is fast, but mosaic may occur on the image.
Variable Bitrate
It means that the device automacally adjust the bitrate under the set . The Max. Bitrate
compression speed is slower than that of the constant bitrate. But it guarantees the image
quality of complex scenes.
4.1.5 Video Quality
When is set as Variable, video quality is congurable. Select a video quality according Bitrate Type
to actual needs. Note that higher video quality requires higher bandwidth.
4.1.6 Frame Rate
The frame rate is to describe the frequency at which the video stream is updated and it is
Network Camera User Manual
15
is less sasfactory. Max. average bitrate should not be higher than max. bitrate.
Note
When H.265+ is enabled, , , and are not congurable. Video Quality I Frame Interval Prole SVC
I-Frame Interval
I-frame interval denes the number of frames between 2 I-frames.
In H.264 and H.265, an I-frame, or intra frame, is a self-contained frame that can be independently
decoded without any reference to other images. An I-frame consumes more bits than other
frames. Thus, video with more I-frames, in other words, smaller I-frame interval, generates more
steady and reliable data bits while requiring more storage space.
SVC
Scalable Video Coding (SVC) is the name for the Annex G extension of the H.264 or H.265 video
compression standard.
The objecve of the SVC standardizaon has been to enable the encoding of a high-quality video
bitstream that contains one or more subset bitstreams that can themselves be decoded with a
complexity and reconstrucon quality similar to that achieved using the exisng H.264 or H.265
design with the same quanty of data as in the subset bitstream. The subset bitstream is derived
by dropping packets from the larger bitstream.
SVC enables forward compability for older hardware: the same bitstream can be consumed by
basic hardware which can only decode a low-resoluon subset, while more advanced hardware
will be able decode high quality video stream.
MPEG4
MPEG4, referring to MPEG-4 Part 2, is a video compression format developed by Moving Picture
Experts Group (MPEG).
MJPEG
Moon JPEG (M-JPEG or MJPEG) is a video compression format in which intraframe coding
technology is used. Images in a MJPEG format is compressed as individual JPEG images.
Prole
This funcon means that under the same bitrate, the more complex the prole is, the higher the
quality of the image is, and the requirement for network bandwidth is also higher.
4.1.8 Smoothing
It refers to the smoothness of the stream. The higher value of the smoothing is, the beer uency
Network Camera User Manual
20
Two trigger modes are available: and . For example, if the trigger mode is , the Day Night Night
image turns black and white when the device receives alarm input signal.
Note
Day/Night Switch funcon varies according to models.
Grey Scale
You can choose the range of the as [0-255] or [16-235]. Grey Scale
Rotate
When enabled, the live view will rotate 90 ° counterclockwise. For example, 1280 × 720 is rotated
to 720 × 1280.
Enabling this funcon can change the eecve range of monitoring in the vercal direcon.
Lens Distoron Correcon
For device equipped with motorized lens, image may appear distorted to some extent. Enable this
funcon to correct the distoron.
Note
This funcon is only supported by certain device equipped with motorized lens.
The edge of image will be lost if this funcon is enabled.
BLC
If you focus on an object against strong backlight, the object will be too dark to be seen clearly.
BLC (backlight compensaon) compensates light to the object in the front to make it clear. If BLC
mode is set as , you can draw a red rectangle on the live view image as the BLC area. Custom
WDR
The WDR (Wide Dynamic Range) funcon helps the camera provide clear images in environment
with strong illuminaon dierences.
When there are both very bright and very dark areas simultaneously in the eld of view, you can
enable the WDR funcon and set the level. WDR automacally balances the brightness level of the
whole image and provides clear images with more details.
Note
When WDR is enabled, some other funcons may be not supported. Refer to the actual interface
for details.
Network Camera User Manual
23
Displayed Informaon
Set camera name, date, week, and their related display format.
Text Overlay
Set customized overlay text on image.
OSD Parameters
Set OSD parameters, such as , , , and . Display Mode OSD Size Font Color Alignment
4.8 Set Privacy Mask
The funcon blocks certain areas in the live view to protect privacy. No maer how the device
moves, the blocked scene will never be seen.
Steps
1. Go to privacy mask seng page: Conguraon Image Privacy Mask.
2. Check . Enable Privacy Mask
3. Click . Drag the mouse in the live view to draw a closed area. Draw Area
Adjust the size of the area.
Adjust the posion of the area.
Clear all the areas you set.
4. Click . Stop Drawing
5. Click . Save
Note
Up to 4 areas are supported for seng.
4.9 Overlay Picture
Overlay a customized picture on live view.
Before You Start
The picture to overlay has to be in BMP format with 24-bit, and the maximum picture size is 128 ×
128 pixel.
Steps
1. Go to picture overlay seng page: . Conguraon Image Picture Overlay
2. Click to select a picture, and click . Browse Upload
Network Camera User Manual
25
Chapter 5 Video Recording and Picture Capture
This part introduces the operaons of capturing video clips and snapshots, playback, and
downloading captured les.
5.1 Storage Sengs
This part introduces the conguraon of several common storage paths.
5.1.1 Set New or Unencrypted Memory Card
Before You Start
Insert a new or unencrypted memory card to the device. For detailed installaon, refer to Quick
Start Guide of the device.
Steps
1. Go to Conguraon Storage Storage Management HDD Management .
2. Select the memory card.
Note
If an buon appears, you need to unlock the memory card rst. See Unlock Detect Memory
Card Status for details.
3. Click to inialize the memory card. Format
When the of memory card turns from to , the memory card is ready Status Uninialized Normal
for use.
4. Oponal: Encrypt the memory card.
1) Click . Encrypted Format
2) Set the encrypon password.
3) Click . OK
When the turns to , the memory card is ready for use. Encrypon Status Encrypted
Note
Keep your encrypon password properly. Encrypon password cannot be found if forgoen.
5. Oponal: Dene the of the memory card. Input the percentage for storing dierent Quota
contents according to your needs.
6. Click . Save
Network Camera User Manual
28
Note
Upload to FTP/Memory Card/NAS Linkage Method Enable Automac Network in and
Replenishment should be both enabled simultaneously.
5. Click to verify the FTP server. Test
6. Click . Save
5.1.3 Set NAS
Take network server as network disk to store the record les, captured images, etc.
Before You Start
Get the IP address of the network disk rst.
Steps
1. Go to NAS seng page: . Conguraon Storage Storage Management Net HDD
2. Click . Enter the server address and le path for the disk. HDD No.
Server Address
The IP address of the network disk.
File Path
The saving path of network disk les.
Mounng Type
Select le system protocol according to the operaon system.
Enter user name and password of the net HDD to guarantee the security if is SMB/CIFS
selected.
3. Click to check whether the network disk is available. Test
4. Click . Save
5.1.4 eMMC Protecon
It is to automacally stop the use of eMMC as a storage media when its health status is poor.
Note
The eMMC protecon is only supported by certain device models with an eMMC hardware.
Go to for the sengs. Conguraon System Maintenance System Service
eMMC, short for embedded mulmedia card, is an embedded non-volale memory system. It is
able to store the captured images or videos of the device.
The device monitors the eMMC health status and turns o the eMMC when its status is poor.
Otherwise, using a worn-out eMMC may lead to device boot failure.
Network Camera User Manual
29
5.1.5 Set Cloud Storage
It helps to upload the captured pictures and data to the cloud. The plaorm requests picture
directly from the cloud for picture and analysis. The funcon is only supported by certain models.
Steps
Cauon
If cloud storage is enabled, the pictures are stored in the cloud storage server preferenally.
1. Go to Conguraon Storage Storage Management Cloud Storage .
2. Check . Enable Cloud Storage
3. Set basic parameters.
The protocol version of the cloud storage server.
The IP address of the cloud storage server. It supports IPv4 address.
The port of the cloud storage server. 6001 is the default port and you
are not recommended to edit it.
The user name and password of the cloud storage server.
The ID of the picture storage region in the cloud storage server. Make
sure storage pool ID and the storage region ID are the same.
4. Click to test the congured sengs. Test
5. Click . Save
5.2 Video Recording
This part introduces the operaons of manual and scheduled recording, playback, and
downloading recorded les.
5.2.1 Record Automacally
This funcon can record video automacally during congured me periods.
Before You Start
Select in event sengs for each record type except . See Trigger Recording Connuous Event and
Alarm for details.
Steps
1. Go to . Conguraon Storage Schedule Sengs Record Schedule
2. Check . Enable
Network Camera User Manual
34
Note
Go to , click to change the saving path of Conguraon Local Save snapshots when playback
pictures.
Network Camera User Manual
35
Chapter 6 Event and Alarm
This part introduces the conguraon of events. The device takes certain response to triggered
alarm.
6.1 Basic Event
6.1.1 Set Moon Detecon
It helps to detect the moving objects in the detecon region and trigger the linkage acons.
Steps
1. Go to Conguraon Event Basic Event Moon Detecon.
2. Check . Enable Moon Detecon
3. Oponal: Highlight to display the moving object in the image in green.
1) Check . Enable Dynamic Analysis for Moon
2) Go to . Conguraon Local
3) Set to . Rules Enable
4. Select , and set rule region and rule parameters. Conguraon Mode
For the informaon about normal mode, see Normal Mode.
For the informaon about expert mode, see Expert Mode.
5. Set the arming schedule and linkage methods. For the informaon about arming schedule
sengs, see . For the informaon about linkage methods, see Set Arming Schedule Linkage
Method Sengs.
6. Click . Save
Expert Mode
You can congure dierent moon detecon parameters for day and night according to the actual
needs.
Steps
1. Select in . Expert Mode Conguraon
2. Set parameters of expert mode.
Scheduled Image Sengs
OFF
Image switch is disabled.
Auto-Switch
The system switches day/night mode automacally according to environment. It displays
Network Camera User Manual
43
1) Check . Enable Dynamic Analysis For Face Detecon
2) Go to , set to . Conguraon Local Rules Enable
4. Set . The lower the sensivity is, the prole of the face or unclear face is more Sensivity
dicult to detect.
5. Set the arming schedule and linkage methods. For the informaon about arming schedule
sengs, see . For the informaon about linkage methods, see Set Arming Schedule Linkage
Method Sengs.
6. Click . Save
6.2.5 Set Video Loss
This funcon can detect the video signal loss in me and trigger the linkage acon.
Steps
1. Go to Conguraon Event Basic Event Video Loss.
2. Check . Enable
3. Refer to for seng scheduled me. Refer to for Set Arming Schedule Linkage Method Sengs
seng linkage method.
4. Click . Save
6.2.6 Set Intrusion Detecon
It is used to detect objects entering and loitering in a pre-dened virtual region. If it occurs, the
device can take linkage acons.
Steps
1. Go to Conguraon Event Smart Event Intrusion Detection.
2. Check . Enable
3. Select a . For the detecon region sengs, refer to . Region Draw Area
4. Set rules.
Sensivity stands for the percentage of the body part of an
acceptable target that enters the pre-dened region. Sensivity = 100
- S1/ST × 100. S1 stands for the target body part that goes across the
pre-dened region. ST stands for the complete target body. The
higher the value of sensivity is, the more easily the alarm can be
triggered.
Threshold stands for the threshold for the me of the object loitering
in the region. If the me that one object stays exceeds the threshold,
the alarm is triggered. The larger the value of the threshold is, the
longer the alarm triggering me is.
Human and vehicle are available. If the detecon target is not
selected, all the detected targets will be reported, including the
Network Camera User Manual
44
human and vehicle.
If you set a higher validity, the required target features should be
more obvious, and the alarm accuracy would be higher. The target
with less obvious features would be missing.
Figure 6-4 Set Rule
5. Oponal: You can set the parameters of mulple areas by repeang the above steps.
6. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
7. Click . Save
6.2.7 Set Line Crossing Detecon
It is used to detect objects crossing a pre-dened virtual line. If it occurs, the device can take
linkage acons.
Steps
1. Go to Conguraon Event Smart Event Line Crossing Detecon.
2. Check . Enable
3. Select one and set the size lter. For the size lter sengs, refer to . Line Set Size Filter
4. Click and a line with an arrow appears in the live video. Drag the line to the locaon Draw Area
on the live video as desired.
5. Set rules.
It stands for the direcon from which the object goes across the line.
A<->B: The object going across the line from both direcons can be
detected and alarms are triggered.
A->B: Only the object crossing the congured line from the A side to
the B side can be detected.
Network Camera User Manual
45
B->A: Only the object crossing the congured line from the B side to
the A side can be detected.
It stands for the percentage of the body part of an acceptable target
that goes across the pre-dened line. Sensivity = 100 - S1/ST × 100.
S1 stands for the target body part that goes across the pre-dened
line. ST stands for the complete target body. The higher the value of
sensivity is, the more easily the alarm can be triggered.
Human and vehicle are available. If the detecon target is not
selected, all the detected targets will be reported, including the
human and vehicle.
If you set a higher validity, the required target features should be
more obvious, and the alarm accuracy would be higher. The target
with less obvious features would be missing.
Figure 6-5 Set Rule
6. Oponal: You can set the parameters of mulple areas by repeang the above steps.
7. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
8. Click . Save
6.2.8 Set Region Entrance Detecon
It is used to detect objects entering a pre-dened virtual region from the outside place. If it occurs,
the device can take linkage acons.
Steps
1. Go to Conguraon Event Smart Event Region Entrance Detecon.
2. Check . Enable
Network Camera User Manual
46
3. Select one . For the region sengs, refer to . Region Draw Area
4. Set the detecon target, sensivity and the target validity.
It stands for the percentage of the body part of an acceptable target
that goes across the pre-dened region. Sensivity = 100 - S1/ST ×
100. S1 stands for the target body part that goes across the pre-
dened region. ST stands for the complete target body. The higher
the value of sensivity is, the more easily the alarm can be triggered.
Human and vehicle are available. If the detecon target is not
selected, all the detected targets will be reported, including the
human and vehicle.
If you set a higher validity, the required target features should be
more obvious, and the alarm accuracy would be higher. The target
with less obvious features would be missing.
Figure 6-6 Set Rule
5. Oponal: You can set the parameters of mulple areas by repeang the above steps.
6. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
7. Click . Save
6.2.9 Set Region Exing Detecon
It is used to detect objects exing from a pre-dened virtual region. If it occurs, the device can
take linkage acons.
Steps
1. Go to Conguraon Event Smart Event Region Exing Detecon
2. Check . Enable
Network Camera User Manual
47
3. Select one . For the detecon region sengs, refer to . Region Draw Area
4. Set the detecon target, sensivity and the target validity.
It stands for the percentage of the body part of an acceptable target
that goes across the pre-dened region. Sensivity = 100 - S1/ST ×
100. S1 stands for the target body part that goes across the pre-
dened region. ST stands for the complete target body. The higher
the value of sensivity is, the more easily the alarm can be triggered.
Human and vehicle are available. If the detecon target is not
selected, all the detected targets will be reported, including the
human and vehicle.
If you set a higher validity, the required target features should be
more obvious, and the alarm accuracy would be higher. The target
with less obvious features would be missing.
Figure 6-7 Set Rule
5. Oponal: You can set the parameters of mulple areas by repeang the above steps.
6. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
7. Click . Save
6.2.10 Set Unaended Baggage Detecon
It is used to detect the objects le over in the pre-dened region. Linkage methods can be
triggered aer the object is le and stays in the region for a set me period.
Steps
1. Go to Conguraon Event Smart Event Unaended Baggage Detecon.
2. Check . Enable
Network Camera User Manual
48
3. Select one . For the detecon region sengs, refer to . Region Draw Area
4. Set rules.
Sensivity stands for the percentage of the body part of an
acceptable target that enters the pre-dened region. Sensivity = 100
- S1/ST × 100. S1 stands for the target body part that goes across the
pre-dened region. ST stands for the complete target body. The
higher the value of sensivity is, the more easily the alarm can be
triggered.
It stands for the me of the objects le in the region. Alarm is
triggered aer the object is le and stays in the region for the set
me period.
Figure 6-8 Set Rule
5. Oponal: You can set the parameters of mulple areas by repeang the above steps.
6. For the arming schedule sengs, refer to . For the linkage method sengs, Set Arming Schedule
refer to . Linkage Method Sengs
7. Click . Save
6.2.11 Set Object Removal Detecon
It detects whether the objects are removed from the pre-dened detecon region, such as the
exhibits on display. If it occurs, the device can take linkage acons and the sta can take measures
to reduce property loss.
Steps
1. Go to Conguraon Event Smart Event Object Removal Detecon.
2. Check . Enable
3. Select a . For the region sengs, see . Region Draw Area
4. Set the rule.


Produktspezifikationen

Marke: Hikvision
Kategorie: Überwachungskamera
Modell: IPC-T229HA

Brauchst du Hilfe?

Wenn Sie Hilfe mit Hikvision IPC-T229HA benötigen, stellen Sie unten eine Frage und andere Benutzer werden Ihnen antworten




Bedienungsanleitung Überwachungskamera Hikvision

Bedienungsanleitung Überwachungskamera

Neueste Bedienungsanleitung für -Kategorien-