Access ANPR Camera - User's Manual - V1.0.3
Access ANPR Camera - User's Manual - V1.0.3
User's Manual
V1.0.3
Foreword
General
The manual introduces the structure, installation, functions, and operations of the access ANPR
camera (hereinafter referred to as "the Camera").
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Revision History
Revision Content Release Time Revision Content
V1.0.3 Updated manual format. October 2021
Updated the focal length of 437 and 415
V1.0.2 July 2021
models of camera.
V1.0.1 Added more models. March 2021
V1.0.0 First release. November 2019
I
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
Important Safeguards and Warnings
This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, comply with the guidelines
when using it, and keep the manual safe for future reference.
Transportation Requirements
Storage Requirements
Installation Requirements
● Do not connect the power adapter to the device while the adapter is powered on.
● Strictly comply with the local electrical safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the device.
● Do not connect the device to two or more kinds of power supplies, to avoid damage to the
device.
● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the device in a place exposed to sunlight or near heat sources.
● Keep the device away from dampness, dust, and soot.
● Put the device in a well-ventilated place, and do not block its ventilation.
● Use an adapter or cabinet power supply provided by the manufacturer.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the device label.
● The device is a class I electrical appliance. Make sure that the power supply of the device is
connected to a power socket with protective earthing.
● An emergency disconnect device must be installed during installation and wiring at a readily
accessible location for emergency power cut-off.
● Disconnect the device when installing and connecting the lens.
Operation Requirements
III
● Do not drop or splash liquid onto the device, and make sure that there is no object filled with
liquid on the device to prevent liquid from flowing into it.
● Do not disassemble the device.
● Do not aim the device at strong light sources (such as lamplight, and sunlight) when focusing it.
● Do not vibrate, squeeze or immerse the device in liquid during transportation, storage or
installation.
● Do not block the ventilation near the device.
● We recommend you use the device with a lightning protection device for stronger protection
against lightning. For outdoor scenarios, strictly comply with the lightning protection
regulations.
● Ground the function earthing portion of the device (grounding cable or lightning surge protector)
to improve its reliability. The device is a class I electrical appliance. Make sure that the power
supply of the device is connected to a power socket with protective earthing.
● The device must be used with the protective cover for outdoor scenarios to avoid the risk of
water damage to the device.
● Protect the line cord and wires from being walked on or squeezed particularly at plugs, power
sockets, and the point where they exit from the device.
● Modify the default password of the device after first-time login to prevent the device from being
stolen.
Maintenance Requirements
● Pack the device with packaging provided by its manufacturer or packaging of the same quality
before sending it back for repair.
● Please do not touch the photosensitive device with your hands. Use an air blower to clean off the
dust and filth on the lens.
● Clean the surface of the device with a soft dry cloth or a clean soft cloth dipped in neutral
detergent.
● Use the accessories suggested by the manufacturer. Installation and maintenance must be
performed by qualified professionals.
IV
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings............................................................................................................................................ III
1 Introduction ............................................................................................................................................................................................ 1
1.1 Overview ........................................................................................................................................................................................ 1
1.2 Features .......................................................................................................................................................................................... 1
2 Structure ................................................................................................................................................................................................... 3
2.1 Long Range ANPR Camera Dimensions.......................................................................................................................... 3
2.2 Short Range ANPR Camera Dimensions......................................................................................................................... 3
2.3 Structure ........................................................................................................................................................................................ 4
2.3.1 Entire Device ..................................................................................................................................................................... 4
2.3.2 Rear Panel ........................................................................................................................................................................... 5
2.4 Cable Connection....................................................................................................................................................................... 5
3 Installation ............................................................................................................................................................................................... 9
3.1 Universal Joint Installation ................................................................................................................................................... 9
3.2 Spherical Bracket Installation ............................................................................................................................................. 9
4 Web Configuration ............................................................................................................................................................................11
4.1 Web Login....................................................................................................................................................................................11
4.1.1 Recommended Configuration ................................................................................................................................11
4.1.2 Device Initialization.....................................................................................................................................................11
4.1.3 Login ...................................................................................................................................................................................14
4.1.4 Resetting Password .....................................................................................................................................................15
4.1.5 Web Functions ................................................................................................................................................................17
4.2 Guide ..............................................................................................................................................................................................18
4.3 Live.................................................................................................................................................................................................. 20
4.3.1 Video Stream................................................................................................................................................................... 21
4.3.2 Live View ...........................................................................................................................................................................21
4.3.3 Logged Plate Number.................................................................................................................................................22
4.3.4 Plate Snapshot ...............................................................................................................................................................22
4.3.5 System Functions..........................................................................................................................................................22
4.3.6 Functions of the Live Page ....................................................................................................................................... 22
4.3.7 Vehicle Snapshot ..........................................................................................................................................................24
4.3.8 Event List...........................................................................................................................................................................25
4.4 Query .............................................................................................................................................................................................25
4.4.1 Image Search................................................................................................................................................................... 25
4.4.1.1 SD Picture...............................................................................................................................................................25
V
4.4.1.2 Image Downloading Attribute ....................................................................................................................26
4.4.1.3 PC Picture ...............................................................................................................................................................27
4.4.2 Recording Search ..........................................................................................................................................................27
4.4.2.1 Record...................................................................................................................................................................... 27
4.4.2.2 Watermark.............................................................................................................................................................28
4.4.3 Capture Record Search...............................................................................................................................................28
4.4.4 Alarm Output Search ..................................................................................................................................................29
4.5 Setting ...........................................................................................................................................................................................29
4.5.1 ITC .........................................................................................................................................................................................30
4.5.1.1 Detection................................................................................................................................................................30
4.5.1.1.1 Snapshot......................................................................................................................................................30
4.5.1.1.2 IO ..................................................................................................................................................................... 31
4.5.1.2 Intelligence ...........................................................................................................................................................32
4.5.1.2.1 Recognition ................................................................................................................................................32
4.5.1.2.2 Scene .............................................................................................................................................................33
4.5.1.2.3 Advance Configuration ........................................................................................................................34
4.5.1.3 OSD Configuration ............................................................................................................................................34
4.5.1.3.1 Video OSD ...................................................................................................................................................34
4.5.1.3.2 Snap OSD.....................................................................................................................................................36
4.5.1.4 Cutout Configuration....................................................................................................................................... 37
4.5.1.4.1 Snapshot Cutout...................................................................................................................................... 37
4.5.1.4.2 Face Overlap ..............................................................................................................................................38
4.5.1.5 Blocklist and Allowlist ..................................................................................................................................... 38
4.5.1.5.1 Fuzzy Matching ........................................................................................................................................38
4.5.1.5.2 Allowlist .......................................................................................................................................................39
4.5.1.5.3 Blocklist Search ........................................................................................................................................41
4.5.1.5.4 Barrier Control ..........................................................................................................................................41
4.5.1.6 RS-485 ...................................................................................................................................................................... 42
4.5.1.7 RS-485 LED Display ...........................................................................................................................................44
4.5.1.8 Voice Broadcast ..................................................................................................................................................45
4.5.1.8.1 Broadcast Content .................................................................................................................................. 45
4.5.1.8.2 Volume/Encoding ................................................................................................................................... 46
4.5.1.9 Device Test ............................................................................................................................................................46
4.5.1.9.1 Device Test .................................................................................................................................................46
4.5.1.9.2 Capturing Commissioning..................................................................................................................47
4.5.2 Camera ...............................................................................................................................................................................48
4.5.2.1 Attribute ................................................................................................................................................................. 48
4.5.2.1.1 General .........................................................................................................................................................48
VI
4.5.2.1.2 Shutter..........................................................................................................................................................49
4.5.2.1.3 Metering Zone ..........................................................................................................................................51
4.5.2.2 Video ........................................................................................................................................................................51
4.5.2.2.1 Video .............................................................................................................................................................51
4.5.2.2.2 Snapshot......................................................................................................................................................53
4.5.2.2.3 Interest Area ..............................................................................................................................................53
4.5.3 Network .............................................................................................................................................................................54
4.5.3.1 TCP/IP....................................................................................................................................................................... 54
4.5.3.2 Connection ............................................................................................................................................................55
4.5.3.2.1 Port................................................................................................................................................................. 55
4.5.3.2.2 ONVIF ............................................................................................................................................................56
4.5.3.3 Auto Register .......................................................................................................................................................57
4.5.3.4 SMTP (Email).........................................................................................................................................................58
4.5.3.5 IEEE802.................................................................................................................................................................... 59
4.5.3.6 ITC Push .................................................................................................................................................................. 60
4.5.4 Event ...................................................................................................................................................................................61
4.5.4.1 Alarm ........................................................................................................................................................................61
4.5.4.1.1 Relay Activation....................................................................................................................................... 61
4.5.4.1.2 Relay-out .....................................................................................................................................................63
4.5.4.2 Abnormality..........................................................................................................................................................63
4.5.5 Storage ...............................................................................................................................................................................64
4.5.5.1 Point .........................................................................................................................................................................65
4.5.5.2 Local..........................................................................................................................................................................65
4.5.5.3 FTP .............................................................................................................................................................................65
4.5.5.4 Client ........................................................................................................................................................................67
4.5.5.5 Save Path................................................................................................................................................................67
4.5.6 System ................................................................................................................................................................................68
4.5.6.1 General .................................................................................................................................................................... 68
4.5.6.1.1 General Setup ...........................................................................................................................................68
4.5.6.1.2 Date & Time................................................................................................................................................69
4.5.6.2 Account ................................................................................................................................................................... 70
4.5.6.2.1 Account ........................................................................................................................................................70
4.5.6.2.2 ONVIF User .................................................................................................................................................72
4.5.6.3 Safety ....................................................................................................................................................................... 74
4.5.6.3.1 System Service..........................................................................................................................................74
4.5.6.3.2 HTTPS ............................................................................................................................................................75
4.5.6.3.3 Firewall .........................................................................................................................................................78
4.5.6.4 Default Settings ..................................................................................................................................................79
VII
4.5.6.5 Import/Export ......................................................................................................................................................79
4.5.6.6 Automatic Maintenance ................................................................................................................................. 79
4.5.6.7 System Upgrade .................................................................................................................................................80
4.5.7 Information ...................................................................................................................................................................... 80
4.5.7.1 Version .................................................................................................................................................................... 80
4.5.7.2 Log .............................................................................................................................................................................81
4.5.7.2.1 System Log .................................................................................................................................................81
4.5.7.2.2 Remote log .................................................................................................................................................82
4.5.7.2.3 Operation Log Collection ....................................................................................................................82
4.5.7.3 Online User............................................................................................................................................................83
4.5.7.4 Running Status ....................................................................................................................................................83
4.6 Alarm..............................................................................................................................................................................................83
4.7 Logout ...........................................................................................................................................................................................84
5 FAQ ............................................................................................................................................................................................................85
Appendix 1 Cybersecurity Recommendations ........................................................................................................................86
VIII
1 Introduction
1.1 Overview
The access ANPR camera adopts intelligent deep learning algorithm. It supports vehicle detection,
license plate recognition, logo recognition, model recognition, and color recognition, and encoding
mode such as H.265.
The Camera consists of protective housing, illuminator, and intelligent HD camera. The intelligent
HD camera adopts progressive scanning CMOS, which owns several features such as high definition,
low illuminance, high frame rate, and excellent color rendition.
The Camera is extensively applied to vehicle capture, and recognition of community road, parking
lot, and other entrance, and exit surveillance.
1.2 Features
The features are available on select modes, and might differ from the actual camera.
Permission Management
● Each user group owns permissions. Permissions of a user cannot exceed the permissions of its
group.
● 2 user levels.
● Permission of opening barrier, and blocklist alarm function.
● Device configuration, and permission management through Ethernet.
Storage
● Stores corresponding video data onto the central server according to the configuration (such as
alarm, and timing settings).
● Users can record through web according to their requirements. The recorded video file will be
stored on the computer where client is located.
● Supports local hot swapping of storage card, and storage when network disconnected. It
overwrites stored pictures, and videos automatically when memory becomes insufficient.
● Stores 1024 log records, and user permission control.
● Supports FTP storage, and automatic network replenishment (ANR).
Alarm
● It can trigger alarm upon camera operation exceptions through network, such as memory card
damage.
● Some devices can connect to various alarm peripherals to respond to external alarm input in real
time (within 200 ms). It can correctly deal with various alarms according to the linkage
predefined by users, and generate corresponding voice prompt (users are allowed to record
voice in advance).
1
Network Monitoring
● Transmits video data of single channel compressed by device to network terminal, and make it
reappear after decompression through network. Keep delay within 500ms when bandwidth is
allowed.
● Supports maximum 10 users online at the same time.
● Supports system access, and device management through web.
● Video data transmission adopts HTTP, TCP, UDP, MULTICAST, and RTP/RTCP.
Peripheral Control
● Peripheral control: Supports setting various peripheral control protocols, and connection pages.
● Connects to external devices such as vehicle detector, signal detector, and more.
Auto Adjustment
● Auto iris: Automatically adjusts the iris opening to the changing light throughout the day.
● Auto white balance: Accurately displays the object color when light condition changes.
● Auto exposure: Automatically adjusts shutter speed according to the exposure value of the
image measured by the metering system, and according to shutter, and iris exposure set by
factory defaults.
● Auto gain: Automatically increases camera sensitivity when illuminance is very low, enhancing
image signal output so that the Camera can acquire clear, and bright image.
2
2 Structure
3
Figure 2-4 Dimensions of camera with bracket (mm [inch])
2.3 Structure
4
Table 2-1 Camera structure description
No. Description No. Description
1 Protective cover 3 Lens
2 Illuminator —
5
Table 2-3 Cable connection description
No. Port Function Description
Connects to standard Ethernet, supports
1 LAN Ethernet port
PoE power supply.
The Camera sends out audio signal through
2 AUDIO OUT Audio output port
this port.
The Camera gets audio signal through this
3 AUDIO IN Audio input port
port.
The Camera sends out video signal through
4 BNC Video output port
this port.
Inputs 12 VDC power. Please be sure to
supply power as instructed.
5 12 VDC Power input port
Device damage will occur if power is not
supplied correctly.
● Yellow: RS-485_A1
6 RS-485 RS-485 port
● Orange: RS-485_B1
● Alarm output, connecting to barrier,
and alarm output devices such as alarm
light.
◇ Brown: ALARM_OUT1
◇ Green: ALARM_OUT_GND1
◇ Red: ALARM_OUT2
◇ Black: ALARM_OUT_GND2
7 ALARM Alarm port
● Alarm input, connecting to vehicle
detector, IR detector, induction loop,
and more.
◇ Blue: ALARM_IN1
◇ White: ALARM_IN2
◇ Yellow: ALARM_IN3
◇ Gray: ALARM_IN_GND
Inputs 24 VAC power. Please be sure to
supply power as instructed.
8 24 VAC Power input port
Device damage will occur if power is not
supplied correctly.
6
Figure 2-9 Cable connection
7
No. Port Function Description
● Alarm output, connecting to barrier, and
alarm output devices such as alarm light.
◇ Brown: ALARM_NO1
◇ Green: ALARM_COM1
◇ White & Purple: ALARM_NO2
◇ Light Green: ALARM_COM2
◇ Red: ALARM_NO3
4 ALARM Alarm port ◇ Black: ALARM_COM3
● Alarm input, connecting to vehicle
detector, IR detector, induction loop, and
more.
◇ Blue: ALARM_IN1
◇ White: ALARM_IN2
◇ Yellow: ALARM_IN3
◇ Gray: ALARM_IN_GND
Inputs 24 VAC power. Be sure to supply
power as instructed.
5 24 VAC Power input port
Device damage will occur if power is not
supplied correctly.
8
3 Installation
The following installation figures are for reference only, and might differ from the actual product.
9
Figure 3-2 Prepare bracket housing
10
4 Web Configuration
It supports logging in to device web page through browser on PC, and realizes device configuration,
operation, and management.
The pages, and Settings are for reference only, and might differ from the actual page.
11
Figure 4-1 Device Initialization
● The new password must consist of 8 to 32 characters, and contain at least two types
from upper case, lower case, number, and special characters (excluding ' " ; :, and &).
● If you want to change your password again, go to Setting > System > Account >
Account.
Step 5 Select the Email Address check box, and then enter your email address (recommended to
set for resetting your password).
Step 6 Click Confirm.
Step 7 On the Online Upgrade page, click Confirm.
Step 8 Change the default IP address, subnet mask, and default gateway, and then click Finish.
12
Figure 4-3 Login
Step 9 Enter the username, and password, and then click Login.
Prompt box will pop out when username or password is incorrect, see Figure 4-4, and it
will remind you of remaining attempts. The account will be locked for 300 s if user enters
incorrect username or password for 5 times consecutively. See Figure 4-5.
Step 10 Click Please click here to download, and install the plug-in in the video window.
The system automatically downloads webplugin.exe, and installs it according to prompt.
Before installing plug-in, make sure that the associated plug-in option of active has been
modified as Enable or Prompt in Internet Option > Security Settings.
13
Figure 4-6 Web page
It will pop out the prompt box of authorization failed when there is no operation on the
web page for a long time. In this case, you need to log in again.
4.1.3 Login
Step 1 You can log in to the web page by following the steps below. For first-time login or
logging in after restoring factory default Settings, see "4.1.2 Device Initialization".
Step 2 Enter the IP address of the Camera in the browser address bar, and press Enter.
Step 3 Enter your login username, and password, and then click Login.
14
● A box pops up when the username or password is incorrect.
● If you enter invalid user name or password for five times, the account will be locked for
300 s.
● When scanning QR code to acquire security code, one QR code supports security code
acquisition up to twice.
● After receiving security code by email, you need to reset password within 24 hours, otherwise,
the security code will be invalid.
● One device can generate security code up to 10 times in one day, so the Camera can be reset up
to 10 times in one day.
● Email address must be filled in during device initialization; otherwise it will fail to send you the
security code, and you will not be able to reset your password. Email address of admin can be
modified from Setting > System > Account > Account.
Step 1 Open the browser, enter the IP address of the Camera in the browser address bar, and then
press Enter.
15
Figure 4-10 Information
If you use IE browser, the system might prompt Stop running the script, click No, and
continue to run the script.
Step 4 Scan the QR code according to the page prompt, and send the scanning result to
designated email, and acquire security code.
Scan the actual QR code. Do not scan the QR code in this manual.
Step 5 Enter received security code in the text box of Security code.
Step 6 Click Next.
16
Figure 4-12 Reset password (2)
Step 7 Set Password, and enter your new password again in Confirm Password.
● The new password must consist of 8 to 32 characters, and contain at least two types
from upper cases, lower cases, numbers, and special characters (excluding ' " ; :, and &).
● The new password must be the same as the Confirm Password. Follow the password
security notice to set a high security level password.
Step 8 Click OK.
17
Button Description
Recover the parameters to the value last saved.
Save the settings.
4.2 Guide
On the Guide page, you can configure capture scenarios, and get assistance with setting installation
scenario.
Step 3 You can check whether the video image is properly zoomed, and focused by checking the
plate pixel.
1) Drag zoom, and focus bar to adjust the video image properly.
18
2) When the vehicle plate comes into the green line area, click Snapshot to take a
snapshot of the plate.
Snapshot becomes Resume.
3) Drag the yellow plate pixel box to the position of the plate.
4) Click Zoom.
Zoom in the picture selected by the plate pixel box. It can realize 2x or 4x zoom rate.
5) Adjust the position of plate pixel box, and make it the optimal plate size.
If the plate within the yellow box is larger than the optimal plate size in the example,
zoom out the video image; if smaller, zoom in the video image.
19
Figure 4-18 Recognition
4.3 Live
Click the Live tab.
On this page, it can realize several functions such as live video, live picture, real-time capture, record,
and config (LPR), and more.
20
4.3.1 Video Stream
● Main Stream: Make sure that the Camera can record video, and carry out network surveillance
when the network is normal. You can configure main stream resolution within the supported
range of the Camera.
● Sub Stream: Replaces main stream to make network surveillance, and reduce the network
bandwidth possession when network bandwidth is insufficient.
● Protocol: Video surveillance protocol, currently it only supports TCP.
● Fluency: Fluency of viewing the live video. The fluency can be set to High, Middle, Low, and
Default (recommended).
● : Click it to enable smart track detection. Number plate, vehicle bounding box, and other smart
tracking information will be displayed in the video image.
● : Click it, and the window is displayed in full screen; double-click or right-click to exit full
screen.
21
Icon Name Description
Change the value when the image brightness is proper but
Contrast contrast is not enough. The range is from 0 to 128 (64 by
default).
Adjust the image hue. For example, change red into blue. The
default value is made by the light sensor, and normally it does
Hue
not have to be adjusted. The range is from 0 to 128 (64 by
default).
Adjust the color vividness, and will not influence the image
Saturation
overall brightness. The range is from 0 to 128 (64 by default).
Restore brightness, contrast, saturation, and hue to default
—
values.
In this image adjustment window, you can only adjust image brightness, contrast, hue, and
saturation of local web. To adjust system brightness, contrast, hue, and saturation, go to Setting >
Camera > Attribute > General.
22
Table 4-6 General function description
Icons Name Description
Select the check box, and the Camera automatically receives
vehicle snapshots, and detects event information triggered
by sources such as radar or video detection, and displays such
ANPR Receive snapshots, and information at the lower part of the page.
The snapshots are saved in the storage path defined by
Setting > Storage > Destination > Save Path.
Record Type Select the format of video recordings (dav by default).
Click Talk, and you can communicate with people on site
Talk
through the camera.
Click to take a snapshot when a vehicle passes. The snapshot
is saved in the storage path.
Manual
Snapshot ● Enable ANPR Receive first.
● To change the storage path of snapshots, go to Setting >
Storage > Destination > Save Path.
Drag to select any area in the video window, and then the
Digital Zoom area will be zoomed in. In any area of the video window, click
or right-click to exit.
Click it to start recording. Click again to stop recording.
Video
You can set the storage path of video recordings from
Recording
Setting > Storage > Destination > Save Path.
You can draw the area of plate detection, adjust camera’s
Config (LPR)
focal length, and set applicable region.
Click .
23
The steps of config (LPR) are shown as follows.
Step 1 Set focus, and zoom mode, which is used to recognize vehicle.
The configured area line, and detection line in Guide are displayed in the video page.
24
4.3.8 Event List
Select ANPR Receive, and the event information will be displayed, including No., event types,
capture time, lanes, plates, vehicle color, speed, vehicle signs, and vehicle types.
4.4 Query
Click the Query tab, and the system displays query page where you can search for pictures, and
video recordings.
4.4.1.1 SD Picture
Search conditions can be set in this section. You can search for event, and plate information of the
SD card within the period.
Step 1 Select Query > Image Search > SD Card Image.
25
Step 3 Click Search, and it displays all the picture file lists which conform to query condition in
the file list.
Click some line in the list, and the plate picture information will be displayed in Real Plate
Info.
Step 4 Download picture.
Click to select pictures, and then click Download.
Step 5 Set the storage path of picture in the prompted window. The system starts to download
the pictures to local PC.
26
Step 3 Click Confirm.
4.4.1.3 PC Picture
The section introduces the way of checking whether the watermark of PC picture is tampered.
Step 1 Select Query > Image Search > PC Picture.
Step 2 Click Browse, and select the folder where the verified picture is located.
Step 3 Select the picture which needs to be verified.
Step 4 Click Watermark, and view result in the picture list.
Click Open or double-click the picture if you need to preview the picture.
4.4.2.1 Record
You can set video play of local PC on this page.
Step 1 Select Query > Recording Search > Recording.
Step 2 Click Browse, select record path, click Open, and view the video.
27
Table 4-11 Play function description
Icon Description
● : Play video.
● : Pause.
Stop playing video.
Slow down video playing.
Speed up video playing.
Skip to the next frame.
4.4.2.2 Watermark
You can verify whether the watermark of local record is tampered.
Go to Setting > Camera > Video > Video, and select Watermark Settings to enable the function,
and set the corresponding Watermark Character. The default character is DigitalCCTV.
Step 1 Select Query > Recording Search > Water Mark.
Step 2 Click Browse, and select a file that you want to verify.
Step 3 Click Watermark,and the system displays verify progress, normal watermark, and some
other information.
The page of Watermark Verification Completed appears after verification.
● It supports max 10,000 records or 1,024 records respectively when the Camera is installed with or
without TF card.
● If the passing vehicle records are unreadable in Excel after being imported, change them into
UTF-8 encoding document in txt, and then they can be opened normally.
Step 1 Select Query > Capture Record Search.
Step 2 Set Begin Time, and End Time, and then set the Direction (vehicle movement direction,
28
including Approaching, Departing, and Unknown).
Step 3 Click Search to search for the plates that meet the search conditions.
Step 4 Click Export, and then select storage path to export the results to PC.
Make sure that all the external devices are connected with the Camera through RS-485 port.
Step 1 Select Query > Alarm Output Search.
Step 2 Set the start time and end Time.
Step 3 Click Search.
4.5 Setting
You can configure several parameters such as ITC, camera, network, event, storage, system, and
system information.
29
4.5.1 ITC
You can set intelligent parameters of the Camera.
4.5.1.1 Detection
4.5.1.1.1 Snapshot
30
Step 2 Configure the parameters.
4.5.1.1.2 IO
Figure 4-31 IO
31
Table 4-13 Loop I/O parameters
Parameter Description
IO Only Loop I/O can be selected.
Loop 1 Set the loop trigger mode.
● Not triggered: No capture is triggered.
● Rise Edge: Capture is triggered when the vehicle
enters loop.
Trigger Mode Config
● Fall Edge: Capture is triggered when the vehicle
Loop 2 exits loop.
4.5.1.2 Intelligence
4.5.1.2.1 Recognition
You can set vehicle recognition parameter, recognition mode, and some other functions.
Step 1 Select Setting > ITC > Intelligence > Intelligent Analysis > Recognition.
32
Figure 4-32 Recognition
4.5.1.2.2 Scene
You can configure the advanced functions of plate recognition, and customize special functions.
Step 1 Select Setting > ITC > Intelligence > Intelligent Analysis > Scene.
33
Step 2 Select detection scene as needed.
● Head first: Higher recognition sensitivity towards plate on head.
● Tail first: Higher recognition sensitivity towards plate on tail.
● Bicycle (electric bicycle or motorcycle): Higher recognition sensitivity towards electric
bicycle or motorcycle plate.
● Mounting height: Higher recognition sensitivity when the Camera is installed on higher
place.
Step 3 Click Confirm.
34
Figure 4-35 Video OSD
35
Figure 4-37 Custom
Step 2 Move the title box to displayed location, or manually enter coordinate value into the X/Y
box in the lower-right corner of the page.
Step 3 Select Black Edge Location, and then you can set the position of the OSD black strip. You
can select from Top, Bottom, and None.
Step 4 Set font size of OSD information. You can set font color of picture OSD information in
.
Step 5 Click More.
36
Figure 4-39 New line, and OSD separator
Step 6 Select the NewLine check box as needed, and then set separator types of OSD
information.
You can manually enter other separators when selecting Custom from Osd Separator.
Step 7 Set OSD options.
Enable plate cutout function, and the system will cut out the recognized plate picture, and save it to
the storage path.
Step 1 Select Setting > ITC > Cutout.
Step 2 Select On, and select Plate or Whole Vehicle, and then the function of plate cutout or
whole vehicle cutout is enabled.
Step 3 Click Confirm.
37
4.5.1.4.2 Face Overlap
In this section, you can select whether to overlap the face image of the driver and assistant driver
onto the snapshot, and the overlap position and size.
Step 1 Select Setting > ITC > Cutout > Face Overlap.
Step 2 Configure the parameters as needed.
Enable fuzzy match, and set the fuzzy match conditions. The vehicle with plate meeting the
matching conditions will be considered as allowlist vehicle, and the Camera will automatically open
the barrier.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Fuzzy Matching.
Step 2 Select the Enable check box to enable fuzzy match, and then configure the parameters as
needed.
38
Table 4-17 Allowlist parameters description
Parameter Description
Plate number will be matched when the first or last character of
Lost 1 Character at The Ends
the detected plate is missing.
Plate number will be matched when one more character is
Redundant 1 Character at
detected before the first character or after the last character of
the Ends
the plate.
Set the tolerant matching value (0, 1, or 2), and plate number
Tolerant Matching
will be matched successfully when 0, 1, or 2 characters different
(Character)
from the recorded plate number are detected.
Click to add the fuzzy match condition. For example, if o is
Equivalent matching
detected by the Camera, the character will be automatically
Characters
recognized as 0, as shown in the figure above.
Step 3 Click Confirm.
4.5.1.5.2 Allowlist
You can search, and check whether a plate number is included in the allowlist, or you can import or
export plate number in the allowlist.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Allowlist.
39
Figure 4-44 Add
You need to enable barrier control from Setting > ITC > Blocklist and Allowlist >
Barrier Control.
5) Select Continue Adding, click Save, and the system will save allowlist plate number
information, and directly enter the adding page of next allowlist plate.
You can also cancel selecting Continue Adding, and then click Save to stop adding
further vehicles.
● Exporting vehicles to allowlist in batches:
1) Click Export, and it pops up the Encrypt Config dialog box.
2) Check Open (encrypt) or Off (do not encrypt) as needed, and then click Confirm.
3) Select the path of storing files. Click Save, and export allowlist to local in .csv format,
which can be opened in Excel.
● Importing vehicles to allowlist in batches:
1) Click Template to download the template, or open the .csv file you exported, fill in the
40
allowlist data which needs to be imported according to template format, and then save
the file.
2) Click Browse…, and select the path where template file exists.
3) Click Import, and you can import the allowlist data into the system in batches.
Make sure that the time format in list is in accordance with that of the Camera when
importing allowlist.
You can search, and check whether some plate exist in the blocklist, import, and export Blocklist
plate number, and vehicle information.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Blocklist Search.
Step 2 The query, import, and export of blocklist is similar to those of allowlist. For details, see
"4.5.1.5.2 Allowlist".
You can set the barrier control mode, and configure information of opening, and closing barrier.
Step 1 Select Setting > ITC > Blocklist and Allowlist > Barrier Control.
41
Table 4-18 Barrier control parameter description
Parameter Description
Select it, and enable the function of barrier always open. Configure
Barrier Always Open the period of barrier always open. The barrier will not close during the
defined period.
On Select it to enable barrier control, and configuration.
Triggers alarm through different modes, and remotely controls the
barrier opening and close.
● Every Trigger (Camera): Capture any vehicle, and output open
barrier signal.
● Every Plate (Camera): Capture any plated vehicle, and output
open barrier signal.
● Allowlist Open (Camera): Capture the vehicle which conforms to
Barrier Opening Control allowlist or fuzzy matching, and then output open barrier signal.
● Order (Server): Platform sends command, and output open
barrier signal.
4.5.1.6 RS-485
You can configure the RS-485 serial protocol of the external device. After configuration, you can set
related parameters of the device on Web.
Step 1 Select Setting > ITC > RS-485 > Trigger Mode.
Step 2 Configure parameters.
1) DHRS.
42
Table 4-19 DHRS parameters description
Parameter Description
Data Bit 8 by default, and cannot change.
Stop Bit 1 by default, and cannot change.
The transmission speed of the code element. Options are 4800,
Baud Rate
9600, 19200, 38400, 115200.
Check None by default, and cannot change.
2) RS-485 transparent transmission.
The third party platform can control the RS-485 output of the Camera through RS-485
transparent transmission, and then you can connect external devices.
Trigger capture through transmitting capture command. To test the RS-485 transparent
transmission sending, and receiving conditions, select Hexadecimal Sending, and
then click Open on the right side of Receiving Area.
Field Name Hover over the fields, you can see the explanations.
Quick Select the check box next to Field Name to select all the
configuration fields.
Format Format of the fields.
Common
Click to restore to commonly selected fields (default).
Config
43
Parameter Description
Up/Down Click to move the field position up or down.
Tag Head The tag head of data package. It is aabb by default.
Tag Tail The tag tail of data package. It is aa55 by default.
44
Parameter Description
● Rolling Speed: The rolling speed of the information on LED, including
Slow, Slightly Slow, Medium, Slightly Fast (default), and Fast.
Full Screen ● Passing Vehicle Info Retained: The display duration of the passing
vehicle information on LED, including 10 s, 20 s, 30 s (default), 40 s, 50
s, and 60 s.
● Display Color: Select information display color on LED.
● Display Action: Select information display action on LED from Fixed,
Single Screen
and Roll.
● Display Field: Right-click on a screen to select display field.
Step 3 (Optional) Click Redraw to change the LED display. You can select the drawing type,
display field, and other parameters referring to above parameter description.
Step 4 Click Confirm.
Configure the broadcast content, and the Camera will broadcast the content when vehicles passing.
If the Barrier Control is selected as Order (Server), Parking Fee, Parking Duration,
Expire At, and Entry/Exit Time will be available after the voice broadcast is controlled by
the platform.
45
Step 3 Configure parameters.
4.5.1.8.2 Volume/Encoding
You can test the barrier opening, and closing, capture, display content, voice broadcast, and
abnormal configuration modules to see if they work as configured. You can also export related
device information.
46
Step 1 Select Setting > ITC > Device Test > Device Test.
You can overlay recognition area box, snap line, filtering area box, vehicle box, and license plate box
on the snapshots to help check the effect of the capturing commissioning.
Step 1 Select Setting > ITC > Device Test > Capturing Commissioning.
Step 2 Select Overlay lines, and tracking info check box, and then select types as needed.
47
Figure 4-55 Capturing commissioning
4.5.2 Camera
You can configure image, video, and stream parameters.
4.5.2.1 Attribute
You can adjust the brightness, contrast, saturation of the video image, and set shutter parameters to
get clear videos, and recordings that you want.
4.5.2.1.1 General
This section provides guidance on configuring parameters such as image brightness, contrast,
saturation, and hue.
Step 1 Select Setting > Camera > Attribute > General.
48
Parameter Description
Change the value when the image brightness is proper but contrast is not
enough.
● If the value is too big, the dark area is likely to become darker, and the bright
area is likely to be overexposed.
Contrast
● The picture might be blurry if the value is set too small. The recommended
value is from 40 to 60, and the range is from 0 to 100.
It is 50 by default. The bigger the value is, the more obvious the contrast
between the bright area, and dark area will become.
Adjust the color vividness, and will not influence the image overall brightness.
● The image becomes too flamboyant if the value is too big.
● The image is not flamboyant enough if the value is too small. The
Saturation
recommended value is from 40 to 60, and the range is from 0 to 100.
It is 50 by default. The bigger the value is, the more flamboyant the image
becomes.
Adjust the image brightness level. The higher the value, the brighter, and blurry
Gamma
the image.
Illumination
Only supports IR illumination.
Mode
● Color: Applicable in the day, image shows in colors.
● B/W: Applicable at night, the image is black, and white.
Day&Night
Mode ● Auto Switch by Brightness: Set the brightness prevalue. When the
brightness is higher or lower than the prevalue, the image shows in colors or
black, and white respectively.
Brightness Prevalue of brightness. You can drag the slider to adjust the value. The higher the
Prevalue value, the brighter the video image.
● Always Off: Set the IR light to always on.
● Always On: Set the IR light to always off.
● Day/Night Mode: Automatically turn on or off the IR light according to the
IR Light
configured Day/Night mode.
4.5.2.1.2 Shutter
This section provides guidance on configuring camera shutter, including shutter mode, exposure
mode, gain mode, and scene mode.
Step 1 Select Setting > Camera > Attribute > Shutter.
49
Figure 4-57 Shutter
Shutter
You need to set shutter when set Mode to Manual.
WB
Mode Set scene mode to adjust the image to its best status.
50
Step 3 Click Save.
This section provides guidance on setting the measure mode of metering zone.
Step 1 Select Setting > Camera > Attribute > Metering Zone.
4.5.2.2 Video
4.5.2.2.1 Video
51
Figure 4-59 Video
Resolution
The resolution of sub stream cannot be greater than
main stream.
52
4.5.2.2.2 Snapshot
You can set the picture stream, including resolution, quality or picture size.
Step 1 Select Setting > Camera > Video > Snapshot.
Set interest area in the image, and then the selected image will display with configured quality.
53
Figure 4-61 Interest area
4.5.3 Network
You can set IP address, port, and other parameters.
4.5.3.1 TCP/IP
Configure the IP address of the Camera, and DNS server so that the Camera can connect with other
devices in the network.
Some models support dual network port. Do not set them in the same network segment; otherwise
it might cause network error.
Step 1 Select Setting > Network > TCP/IP.
54
Figure 4-62 TCP/IP
4.5.3.2 Connection
4.5.3.2.1 Port
You can set the maximum number, and value of the ports.
Step 1 Select Setting > Network > Connection > Port.
55
Figure 4-63 Port
4.5.3.2.2 ONVIF
You can enable the Open Network Video page Forum (ONVIF) function to make network video
products of different manufacturers interworking.
56
Figure 4-64 ONVIF
57
4.5.3.4 SMTP (Email)
Configure the email, and when alarms or abnormal events are triggered, an email will be sent to the
recipient server through SMTP server. The recipient can log in to the incoming mail server to receive
emails.
After enabling this function, system will send the device data to the given server. There is data
leakage risk.
Step 1 Select Setting > Network > SMTP (Email).
58
Parameter Description
Encryption Type Select encryption type from None, SSL, and TLS.
You can enter no more than 63 characters in English letters, and
Title
numbers.
Mail Receiver Email address of the receiver. Supports 3 addresses at most.
Attachment Select the check box to support attachment in the email.
Interval The interval of sending emails.
The system sends test mail to check whether the connection succeeds.
Health Mail Select the Health Mail check box, and configure the Update Period, and
then the system sends test mails according to the defined period.
Test whether the email function is normal. If the configuration is correct,
Test the email address of the receiver will receive the test email. Save the
email configuration before running rest.
Step 3 Click Save.
4.5.3.5 IEEE802
Step 1 Select Setting > Network > IEEE802.
Step 2 Select On check box to enable IEEE802, and then configure parameters.
59
Parameter Description
Password password-based credentials (username, and password).
EAP-TLS
Client Certificate Click Browse to import the client certificate, and private key files for
Private Key authentication.
Step 3 Click Confirm.
60
Parameter Description
Upload List Type Select the type of list that you want to upload.
Select the pushed picture type, including Original Image, Plate Picture,
Push Picture Config
and Vehicle Body Picture.
Upload Info Config Select the information that you want to upload.
Step 3 Click Save.
4.5.4 Event
This section provides guidance on configuring alarm, and abnormality.
4.5.4.1 Alarm
You can set several parameters of relay activation such as relay-in, period, anti-dither, and sensor
type. When triggering alarm, the system sends the alarm signal to external devices to trigger, for
example, buzz.
Step 1 Select Setting > Event > Alarm > Relay Activation.
Step 2 Select On checkbox to enable alarm input for the current channel.
Step 3 Select alarm input channel.
Step 4 Set the period of alarm input.
1) Click Setting.
61
Figure 4-70 Period
62
2) Click Setup corresponding to the day you need to configure time period.
3) Select the period you need to enable, and enter start time, and end time of
corresponding period.
4) If you need to apply this period setting to any other day, select the check box of
corresponding days.
5) Click Confirm.
You can repeat these steps to apply the settings to other days.
Step 5 Set other parameters.
4.5.4.1.2 Relay-out
4.5.4.2 Abnormality
Set relay-out mode of different events. When abnormality happens, system triggers alarm.
63
Step 1 Select Setting > Event > Abnormality.
Step 2 Select events from SD card, network error, illegal access, security exception and blocklist
car as needed.
Step 3 (Optional) Select event type. You only need to select this for SD card and network error.
Step 4 Click On to enable various abnormalities.
Step 5 Configure parameters of each event.
Capacity Limit
Only need to configure when setting Event Type to Scarcity of Storage
Space in SD Card.
Configure the number of login error allowed. The range is 3–10 times.
Login Error
Only need to configure when setting Illegal Access.
The system sends an email to the defined email address when an alarm is
triggered. To set the email address, go to Setting > Network >
SMTP(Email).
Send Email
Only need to configure when setting Illegal Access and Blocklist Car.
Step 6 Click Confirm.
4.5.5 Storage
This section provides guidance on setting associated information of storage, and record control.
64
4.5.5.1 Point
Set the storage path of snapshot.
Step 1 Select Setting > Storage > Destination > Point.
4.5.5.2 Local
Display the information of local SD card. You can set hot swap, and format SD card.
4.5.5.3 FTP
FTP function can be enabled only when it is selected as destination path. When the network does
65
not work, you can save all the files to the internal SD card for emergency.
You can set picture name, and storage path. Click Help... to view naming rule.
Step 1 Select Setting > Storage > Destination > FTP.
66
Parameter Description
Password
Upload Type Select event(s), and picture type(s) to be uploaded to the FTP server.
Step 3 Click Confirm.
4.5.5.4 Client
You can set the parameters of storing to client.
Step 1 Select Setting > Storage > Destination > Client.
67
Figure 4-77 Storage path
Step 2 According to your actual requirement, set the name of picture, and storage path. See
Help... for more details.
Step 3 Set the root path for recordings and snapshots.
Step 4 Click Confirm.
4.5.6 System
You can configure general information, adding user, restoring default settings, and configuring
import & export file.
4.5.6.1 General
This section provides guidance on configuring device SN, language, and video standard.
Step 1 Select Setting > System > General Setting > General Setup.
68
Table 4-40 General parameters description
Parameter Description
Device SN The ID number of the Camera. Supports English letters, and numbers.
Device Code Device Code Failed to support OSD information overlay.
The language displayed on web. The language will be automatically
Language
switched after logging in web again. Currently it only supports English.
● PAL: Phase Alternating Line. Currently most countries around the
world (including most countries in Europe, Africa, Australia, and China)
Video Standard adopt this standard.
● NTSC: National Television System Committee. The main countries
which adopt this standard include America, Canada, and Japan.
Machine Group The company group information of the Camera.
Machine Address Set the location information of device capture.
Step 3 Click Confirm.
You can set date, and time format, system time, DST (Daylight Saving Time) or NTP server, and more.
Step 1 Select Setting > System > General > Date&Time.
69
Parameter Description
Set current system time of the Camera. It becomes valid immediately
System Time
after setting.
Sync PC Sync the time of the Camera with the time on PC.
Enable the function, and then set begin time, and end time of DST
DST
according to date or week.
NTP Setting Select to enable the function of network time synchronization.
NTP Server Time server address.
Port Port number of time server.
Time Zone The time zone where the Camera is located.
Interval The sync interval between device, and time server.
Step 3 Click Confirm.
4.5.6.2 Account
4.5.6.2.1 Account
The system supports configuring operation user of web. You need to configure user group before
configuring user account.
● The user with Account control authority can also change the password of other users.
● It is recommended to give fewer authorities to normal users than premium users to make user
management convenient.
● Cannot delete the user in login status.
You can add, delete or modify user.
Procedure
Step 1 Select Setting > System > Account > Account > Username.
70
Figure 4-81 Add user
71
● The system supports max 8 user groups, and the default initialization user groups are
admin, and user.
● You can modify, and delete the added user group, but not the initialization user group.
Step 6 Click Add Group, and then enter the name of user group, and configure group authority.
● Group Name can only consist of number, letter, underline, and hyphen, the maximum
length contains 15 characters.
● Group cannot be repeated.
Related Operations
After adding user/group, click to change user/group information; click to delete the added
user/group.
You can add, delete, modify Onvif (Open Network Video page Forum) on the user management
page.
72
Step 1 Select Setting > System > Account > Onvif User.
73
4.5.6.3 Safety
74
4.5.6.3.2 HTTPS
Prerequisites
● For first-time use of HTTPS or after changing device IP address, you need to create server
certificate, and install root certificate.
● After creating server certificate, and installing root certificate, if it replaces the PC, which logs in
to the web page, then it needs to download, and install the root certificate again on the new PC
or copy the downloaded root certificate on the new PC, and install.
On the HTTPS page, users can make PC log in normally through HTTPS by creating certificate or
uploading authenticated certificate. It can ensure security of communication data, and provide
guarantee for user information, and device safety through reliable, and stable technical approach.
Procedure
Step 1 Create certificate or upload the authenticated certificate.
● If you select Create Certificate, follow the steps below.
1. Select Setting > System > Safety > HTTPS.
2. Click Create.
75
3. Enter the required information such as region, IP or domain name, and then click
Create.
The entered IP or Domain name must be the same as the IP or domain name of the
Camera.
4. Click Install under Request Created, and then click Download to download root
certificate.
The system pops up Save As dialog box, select storage path, and then click Save.
5. Double-click the RootCert.cer icon.
6. Click Install Certificate…
7. Click Next.
The Certificate Store page is displayed. You can select automatically select the
certificate store based on the type of certificate or place all certificates in custom
certificate store.
76
Figure 4-90 Certificate store
8. Click Next.
9. Click Finish.
77
10. Click Yes, and then click OK on the pop-up window.
● If you select install signed certificate, follow the steps below.
1. Select Setting Safety > System > Safety > HTTPS.
2. Select Enable HTTPS, and Compatible with TLSv1.1, and earlier versions.
3. Click Browse to upload the signed certificate, and certificate key, and then click
Upload.
4. To install the root certificate, see operation steps from 1.d to 1.j in Create
Certificate.
Step 2 Select Enable HTTPS, and click Confirm.
The configuration takes effect until the Camera restarts.
Step 3 Use HTTPS to log in to the Camera.
1. Enter https://xx.xx.xx.xx in the browser.
4.5.6.3.3 Firewall
Set the security rules to protect the safety of your camera system.
Step 1 Select Setting > System > Safety > Firewall.
78
4.5.6.4 Default Settings
You can restore the device to default settings or factory defaults.
Select Setting > System > Default, and then select Default or Factory Default as needed.
● Default: Restore your settings to default value. In this case, network IP address information of the
Camera will not restore to default settings.
● Factory Default: Restore the system to factory default settings. In this case, the Camera will
restart, and you need to initialize the Camera before any further operation.
4.5.6.5 Import/Export
Export the system configuration file to back up the system configuration; import system
configuration file to make quick configuration or recover system configuration.
Step 1 Select Setting > System > Import/Export.
79
Table 4-45 Auto maintain parameter description
Parameter Description
● Select, and set restart period, and time.
Auto Reboot ● The system will automatically restart within the defined period, and
time.
Auto Delete Old Files Customize time, and delete all the old files before the time.
Manual Reboot Manually restart the Camera.
Step 3 Click Confirm.
4.5.7 Information
The system supports viewing version, user, and log, and more.
4.5.7.1 Version
You can view the version information of the Camera.
Select Setting > Information > Version .
80
● Versions of different devices might vary, depending on the actual web page.
● Algorithm recognition is available when algorithm is authorized (when the icon is displayed in
green). If algorithm is not authorized, the Camera will not be able to recognize vehicle series,
model, and logo. License plate recognition is always supported.
4.5.7.2 Log
You can view log information such as system, configuration, data, event, record, user management,
and also clear log records.
The earliest log records will be overwritten when the number of log records reaches 1024.
Step 1 Select Setting > Information > Log > Log.
Step 2 Enter Start Time, and End Time, and then select log type.
Step 3 Click Search, and it can start searching according to requirement.
Step 4 View, back up, and clear the searching results.
81
Backup: Backup the searched system log information to local. The backup file is in .txt
format.
You can save your important logs to log server. This helps provide important clues to the source of
security incidents. Log server needs to be deployed in advance by a professional or system
administrator.
Step 1 Select Setting > Information > Log > Remote Log.
Enable this function can collect operation log in real time, which can be used to troubleshoot in the
future.
Step 1 Select Setting > Information > Log > Operation Log Collection.
Step 2 Check On to enable the log collection.
82
Step 5 Click Confirm.
4.6 Alarm
Click the Alarm tab, and then you can select alarm type, operation, and alarm tone.
83
Figure 4-105 Alarm
4.7 Logout
Click Logout to exit the system. You need to log in again for access.
84
5 FAQ
Question Solution
Device error, unable to start or Press, and hold Reset button for 5 seconds to restore the
operate normally Camera to factory default Settings.
Stop recording, and image capturing, and then wait for at least
TF card hot swapping 15 seconds before removing the TF card. This helps ensure data
integrity, and avoid losing all the data of the card.
Do not set the TF card as the storage media of pre-set
TF card read/write limit
recording. It may damage the TF card duration.
TF card cannot be used as When the TF card hibernates or its capacity is null, format the
storage media card through web first.
Check whether the right upgrade program (such as version,
Network upgrade failed
compatibility) is used.
It is recommended to use TF card of 16 GB or above. This helps
Recommended TF card avoid data loss arising from insufficient capacity.
You can use card of 16 GB, 32 GB, 64 GB, and 128 GB.
Failed to pop up the
Set the security level of IE browser as Low, and Active Plug-in,
installation dialog box of web
and Control is set to Enable.
control webrec.cab
85
Appendix 1 Cybersecurity Recommendations
86
SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
SMTP: Choose TLS to access mailbox server.
FTP: Choose SFTP, and set up strong passwords.
AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save
the log for a long time, it is recommended that you enable the network log function to ensure
that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to
use VLAN, network GAP and other technologies to partition the network, so as to achieve
the network isolation effect.
Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.
87