TruVision Panoramic Wi-Fi Wedge IP Camera Configuration Manual P/N 1073032-EN • REV A • ISS 29SEP15
Copyright © 2015 United Technologies Corporation. Interlogix is part of UTC Building & Industrial Systems, a unit of United Technologies Corporation. All rights reserved. Trademarks and patents Manufacturer Trade names used in this document may be trademarks or registered trademarks of the manufacturers or vendors of the respective products. Interlogix. 2955 Red Hill Avenue, Costa Mesa, CA 92626-5923, USA Authorized EU manufacturing representative: UTC Fire & Security B.V.
Content Introduction 3 Network access 4 Checking your web browser security level 4 Accessing the camera over the network 6 Overview of the camera web browser 6 Camera configuration 8 Configuration menu overview 8 Local configuration 9 System time 10 Network settings 12 Recording parameters 24 Video image 27 OSD (On Screen Display) 29 Overlay text 30 Privacy masks 31 Motion detection alarms 31 Tamper-proof alarms 35 Exception alarms 36 Alarm inputs and outputs 37 Cross line detection 38 Intrusion Detection 4
Index 61 2 TruVision Panoramic Wi-Fi Wedge IP Camera Configuration Manual
Introduction This is the configuration manual for TruVision Panoramic Wedge IP camera models: IP Wi-Fi panoramic wedge camera: TVW-1130 (3MPX Panoramic, 1.6 mm lens, Gray, Wi-Fi, PAL) TVW-3130 (3MPX Panoramic, 1.6 mm lens, Gray, Wi-Fi, NTSC) Note: The camera has a horizontal viewing angle range between 127 and 160 degrees, depending on the resolution ratio settings.
Network access This manual explains how to configure the camera over the network with a web browser. TruVision IP cameras can be configured and controlled using Microsoft Internet Explorer (IE) and other browsers. The procedures described use Microsoft Internet Explorer (IE) web browser. Checking your web browser security level When using the web browser interface, you can install ActiveX controls to connect and view video using Internet Explorer.
- Or Under Reset Custom Settings, click the security level for the whole zone in the Reset To box, and select Medium. Click Reset. Then click OK to the Internet Options Security tab window. 5. Click Apply in the Internet Options Security tab window. Windows 7 and 8 users Internet Explorer for Windows 7 and Windows 8 operating systems have increased security measures to protect your PC from any malicious software being installed.
Accessing the camera over the network Use the web browser to access and configure the camera over the network. It is recommended that you change the administrator password once the setup is complete. Only authorized users should be able to modify camera settings. See “User management” on page 48 for further information. To access the camera online: 1. In the web browser enter the camera’s IP address (default is 192.168.1.70).
Figure 1: Web browser interface Table 1: Description of the web browser interface Name Description 1. Live view Click to view live video. 2. Playback Click to play back video. 3. Log Click to search for event logs. There are three main types: Alarm, Exception and Operation. 4. Configuration Click to display the configuration window for setting up the camera. 5. Viewer View live video. Time, date and camera name are displayed here. 6. Current user Displays current user logged on. 7.
Camera configuration This chapter explains how to configure the cameras through a web browser. Once the camera hardware has been installed, configure the camera’s settings through the web browser. You must have administrator rights in order to configure the cameras over the internet. The camera web browser lets you configure the camera remotely using your PC. Web browser options may vary depending on camera model.
Configuration folders Description 3. Video/Audio Defines recording parameters. See “Recording parameters” on page 24 for more information. 4. Image Defines the image parameters, OSD settings, overlay text, and privacy mask. See “Video image” on page 27, “OSD (On Screen Display)” on page 29, “Overlay text” on page 30, and “Privacy masks” on page 31 for more information. 5.
Table 3: Description of the local configuration parameters Parameters Description Live View Parameters 1. Protocol Specifies the network protocol used. Options include: TCP, UDP, MULTICAST and HTTP. 2. Live View Performance Specifies the transmission speed. Options include: Shortest Delay or Auto. 3. Rules It refers to the rules on your local browser. Specify whether or not to display the colored marks when motion detection, face detection, and intrusion detection are triggered.
2. From the Time Zone drop-down menu, select the time zone that is the closest to the camera’s location. 3. Under Time Sync check one of the options for setting the time and date: Synchronize with an NTP server: Check the NTP enable box and enter the server NTP address. The time interval can be set from 1 to 10080 minutes. - Or Set manually: Enable the Manual Time Sync function and then click set the system time from the pop-up calendar.
Network settings Accessing the camera through a network requires that you define certain network settings. Use the Network panel to define the network settings. See Figure 4 and Table 4 below for further information. Figure 4: Network window (TCP/IP tab shown) Table 4: Network parameters Parameters Description 1. Select NIC: Specifies LAN or WLAN for different network. TCP/IP NIC Type: Specifies the NIC type. Default is Auto.
Parameters 2. Port Description HTTP Port: The HTTP port is used for remote internet browser access. Enter the port used for the Internet Explorer (IE) browser. The default value is 80. RTSP Port: RTSP (Real Time Streaming Protocol) is a network control protocol designed to control streaming media servers. Enter the RTSP port value. The default port number is 554. HTTPS Port: HTTPS (Hyper Text Transfer Protocol Secure) allows video to be securely viewed when using a browser. Enter the HTTPS port, value.
To define the TCP/IP parameters: 1. In the Network panel, click the TCP/IP tab to open its window. 2. Configure the NIC settings, including the NIC Type, IPv4 settings, IPv6 settings, MTU settings, and Multicast Address. 3. If the DHCP server is available, check DHCP. 4. If the DNS server settings are required for some applications (e.g., sending email), you should configure the Preferred DNS Server or Alternate DNS Server. 5. Click Save to save changes. To define the port parameters: 1.
To define the DDNS parameters: 1. In the Network panel, click the DDNS tab to open its window. 2. Check Enable DDNS to enable this feature. 3. Select DDNS Type. Three options are available: • DynDNS: Enter the user name and password registered to the DynDNS web site. The domain name is that of the DynDNS web site. • ezDDNS: Enter the host name. It will automatically register it online. • IPServer: Enter the address of the IP Server. 4. Enter the host name. 5. Enter the Effect Domain address.
To define the SNMP parameters: 1. In the Network panel, click the SNMP tab to open its window. 2. Select the corresponding version of SNMP: v1, v2c or v3. 3. Configure the SNMP settings. The configuration of the SNMP software should be the same as the settings you configure here. 4. Click Save to save changes. Note: Before setting the SNMP, please download the SNMP software and manage to receive the camera information via the SNMP port.
To define the QoS parameters: 1. In the Network panel, click the QoS tab to open its window. 2. Configure the QoS settings, including Video / Audio DSCP, Event / Alarm DSCP and Management DSCP. The valid value range of the DSCP is 0 to 63. The larger the DSCP value is the higher the priority. 3. Click Save to save changes. To define the FTP parameters: 1. In the Network panel, click the FTP tab to open its window. 2.
Test: Test whether the FTP address is accessible. 3. Click Save to save changes. To define the parameters: 1. In the Network panel, click the tab to open its window. Note: When configuring the settings for the first time please connect the camera to a router via a network cable and open the web browser to complete the settings. When the Status changes from “Disconnected” to “Connected” the Wi-Fi connection has been set up successfully. 2. Click Search to search the online Wi-Fi connections. 3.
5. You can choose the Security Mode as not-encrypted, WEP, WPA-personal, WPA-enterprise, WPA2-personal, or WPA2-enterprise. 6. For quick setup, check the WPS check box to enable the WPS function. PBC mode: Push the WPS button on the Wi-Fi router. The WPS indicator will flash (the WPS settings may differ per device. Please refer to the Wi-Fi router user manual for details). Check the PBC connection check box and click the Connect button. The camera and the Wi-Fi network router are connected automatically.
To define the IP address settings: 1. In the Network panel, click the TCP/IP tab to open its window. 2. Under Select the NIC, select WLAN. 3. Enter the IPv4 address, the IPv4 Subnet Mask, and the Default Gateway. If you want to be assigned the IP address, you can check the check box to enable the DHCP. To define the UPnP parameters: 1. In the Network panel, click the UPnP tab to open its window. 2. Check the check box to enable the UPnP function. The name of the device when detected online can be edited.
To set up the Email parameters: 1. In the Network panel, click the Email tab to open its window. 2. Configure the following settings: Sender: Enter the name of the email sender. Sender’s Address: Enter the email address of the sender. SMTP Server: Enter the SMTP Server IP address or host name. SMTP Port: Enter the SMTP port. The default is 25. Enable SSL: Check the check box to enable SSL if it is required by the SMTP server.
Receiver1: Enter the name of the first user to be notified. Receiver’s Address1: The email address of the user to be notified. Receiver2: Enter the name of the second user to be notified. Receiver’s Address2: Enter the email address of the second user to be notified. Receiver3: Enter the name of the third user to be notified. Receiver’s Address3: Enter the email address of the third user to be notified. 3. Click Test to test the email parameters set up. 4. Click Save to save changes.
2. To create a self-signed certificate: Click the Create button beside Create Self-signed Certificate. Enter the country, host name/IP, validity and the other information requested. Click OK to save the settings. -OrTo create a certificate request: Click the Create button beside Create Certificate Request. Enter the country, host name/IP and the other information requested.
Click OK to save the settings. Download the certificate request and submit it to the trusted certificate authority for signature, such as Symantec or RSA. After receiving the signed valid certificate, upload the certificate to the device. Recording parameters You can adjust the video and audio recording parameters to obtain the image quality and file size best suited to your needs. Figure 5 and Table 5 below list the video and audio recording options you can configure for the camera.
Parameter Description Frame Rate: Specifies the frame rate for the selected resolution. The frame rate is the number of video frames that are shown or sent per second. Note: The maximum frame rate depends on the camera model and selected resolution. Please check the camera specifications in its datasheet. Max bit rate: Specifies the maximum allowed bit rate. A high image resolution requires that a high bit rate must also be selected. Video Encoding: Specifies the video encoder used.
2. Draw the region of interest on the image. Only one region is supported. 3. Choose the stream type to set the ROI encoding. 4. Check the Fixed Region Enable box to manually configure the area. You can choose the image quality enhancing level for ROI encoding, and you can also name the ROI area. 5. Click Save to save changes. Dual-VCA (Video Content Analysis) When Dual-VCA mode is enabled, the camera sends video analytics results (metadata) to an NVR or other platforms to generate a VCA alarm.
Video image You may need to adjust the camera image depending on the camera model or location background in order to get the best image quality. You can adjust the brightness, contrast, saturation, hue, and sharpness of the video image. Use this menu to also adjust camera behavior parameters such as exposure time, iris mode, video standard, day/night switch, image flip, WDR, digital noise reduction, and white balance. See Figure 6 and Table 6 below for more information.
Parameter Description 3. Day/Night Switch Day/Night Switch Defines whether the camera is in day or night mode. The day (color) option could be used, for example, if the camera is located indoors where light levels are always good. Options: Day: The camera is always in day mode. Night: The camera is always in night mode. Auto: The camera automatically detects which mode to use. Schedule: The camera switches between the day mode and the night mode according to the configured time period.
Parameter Description 7. Video Adjustment Mirror Video Standard It mirrors the image so you can see it inversed. Left/Right, Up/Down, Center, and OFF are selectable. 50 Hz and 60 Hz are selectable. Choose according to the different video standards; normally 50 Hz for PAL standard and 60 Hz for NTSC standard. OSD (On Screen Display) In addition to the camera name, the camera also displays the system date and time on screen. You can also define how the text appears on screen.
• Not transparent & Flashing. The image is behind the text. The text flashes on and off. 8. Select the OSD size that you want. 9. Select the Font color that you want. 10. Click Save to save changes. Overlay text You can add up to four lines of text on screen. This option can be used, for example, to display emergency contact details. Each text line can be positioned anywhere on screen. See Figure 7 below. Figure 7: Text overlay menu To add on-screen text: 1.
Privacy masks Privacy masks let you conceal sensitive areas (such as neighboring windows) to protect them from view on the monitor screen and in the recorded video. The masking appears as a blank area on screen. You can create up to four privacy masks per camera. Note: There may be a small difference in size of the privacy mask area depending on whether local output or the web browser is used. Figure 8: Privacy mask menu To add privacy mask area: 1.
Select the level of sensitivity to motion as well as the target size so that only objects that could be of interest can trigger a motion recording. For example, the motion recording is triggered by the movement of a person but not that of a cat. You can define the area on screen where the motion is detected, the level of sensitivity to motion, the schedule when the camera is sensitive to detecting motion as well as which methods are used to alert you to a motion detection alarm.
To set up motion detection as normal mode: 1. In the Events panel, click the Motion Detection tab to open its window. 2. Check the Enable Motion Detection box. Check Enable Dynamic Analysis for Motion if you want to see where has motion real-time. Note: Select Disable for rules in local configuration menu if you don’t want the detected objected displayed with the rectangles. 3. Select Normal mode from the drop down menu. 4. Click Draw Area.
Upload Snapshot Capture the image when an alarm is triggered and upload the picture to NAS or FTP server. Note: If you want to upload the snapshot to NAS, you must configure NAS settings, If you want to upload the snapshot to FTP, you must configure the FTP settings, please make sure the Upload type option is enabled. Trigger Channel Triggers the recording to start in the camera. Trigger Alarm Output Trigger external alarm outputs when an event occurs. 11. Click Save to save changes.
9. Choose the day and click the schedule to other days. to set the detailed time period. You can copy 10. Click OK to save changes. 11. Specify the linkage method when an event occurs. Check one or more response methods for the system when a motion detection alarm is triggered. Notify Alarm Recipient Send an exception or alarm signal to remote management software when an event occurs. Send Email Sends an email to a specified address when there is a motion detection alarm.
4. Click Edit to edit the arming schedule for tamper-proof alarms. The arming schedule configuration is the same as that for motion detection. See “Motion detection alarms” on page 31 for more information to set up motion detection. 5. Check the check box to select the linkage method taken for the tamper-proof. 6. Click Save to save changes. Exception alarms You can set up the camera to notify you when irregular events occur and how you should be notified.
Alarm inputs and outputs To define the external alarm input: 1. In the Events panel, click the Alarm Input tab to open its window. 2. Choose the Alarm Input No. and the Alarm Type. The alarm type can be NO (Normally Open) and NC (Normally Closed). Enter a name for the alarm input. 3. Click Edit to set the arming schedule for the alarm input. See “Motion detection alarms” on page 31 for more information to set up motion detection. 4. Check the check box to select the linkage method. 5.
2. Select one alarm output channel from the Alarm Output drop-down list. You can also set a name for the alarm output. 3. The delay time can be set to 5 s, 10 s, 30 s, 1 min, 2 min, 5 min, 10 min or Manual. The delay time refers to the time duration that the alarm output remains in effect after alarm occurs. 4. Click Edit to set the arming schedule for the alarm input. See “To set up motion detection” for more information. 5. Click Save to save changes.
Figure 11: Cross line detection menu To define cross line detection: 1. In the Events panel, click the Cross Line tab to open its window. 2. Enable the Enable Cross Line Detection check box. 3. Click Draw Area. A crossing plane appears on the image. 4. Click on the line. You will see two red squares on each end. Drag one of the red squares to define the arming area. Select the direction as A<->B, A ->B, or B->A from the drop down menu. A<->B: Only the arrow on the B side is shown.
Intrusion Detection Intrusion detection allows you to set up an area in the surveillance scene. If someone enters the area a set of alarm action can be triggered. Figure 12: Intrusion detection menu To define intrusion detection: 1. In the Events panel, click the Intrusion Detection tab to open its window. 2. Enable the Enable Intrusion Detection check box. 3. Click Draw Area. Draw a rectangle on the image as a defense region. All lines of the rectangle drawn must connect end-to-end to each other.
Percentage: Range [1-100]. This is the percentage ratio of the in-region part of the object that can trigger an alarm. For example, when you set the percentage as 50%, half of the object entering the region will trigger the alarm. 5. Click Edit to set the arming schedule for the alarm input. See “Motion detection alarms” on page 31 for more information to set up motion detection. 6. Configure the linkage action. 7. Click Save to save changes.
Figure 13: Snapshot menu To set up scheduled snapshots: 1. In the Storage panel, click the Snapshot tab to open its window. 2. Enable Enable Timing Snapshot. 3. Select the desired format of the snapshot. Note: Only JPEG is available. 4. Select the desired resolution of the snapshot. Note: Only the resolution of the current main stream is available. 5. Select the desired quality of the snapshot: High, Medium or Low. 6. Enter the time interval between two snapshots.
8. Click Save to save changes. To set up event-triggered snapshots: 1. In the Storage panel, click the Snapshot tab to open its window. 2. Enable Enable Event-Triggered Snapshot. 3. Select the desired format, resolution and quality of the snapshot. 4. Enter the time interval between two snapshots. Select the unit of time from the dropdown list: milliseconds, seconds, minutes, hour, or day. 5. Under Capture Number enter the total number of snapshots that can be taken.
Figure 14: NAS menu To set up a NAS system: 1. In the Storage panel, click the NAS tab to open its window. 2. Enter the IP address of the network disk, and the NAS file path. 3. Configure the Mounting Type as NFS or SMB/CIFS. If you select SMB/CIFS, you can enter the user name and password. 4. Click Save to save changes. Storage devices Use the storage management window to display the capacity, free space available and the working status of the NAS HDD and SD card in the camera.
If Overwrite is enabled, the oldest files are overwritten when the storage becomes full. To format the storage devices: 1. In the Storage panel, click the Storage Management tab to open its window. 2. Enable the HDD Number column to select the storage. 3. Define the quota percentage for snapshots and recordings by modifying the values for each in Percentage of Snapshot and Percentage of Record. 4. Click Format. A window appears to confirm your formatting permission. 5. Click OK to start formatting.
To set up a recording schedule: 1. In the Storage panel, click the Record Schedule tab to open its window. 2. Enable the Enable Record Schedule box to permit recording. Note: To disable recording, deselect the option. 3. Click Edit to edit the recording schedule. The following window appears: 4. Select whether the recording will be for the whole week (All Day recording) or for specific days of the week.
• Normal: This is continuous recording. • Motion detection: The video is recorded when the motion is detected. • Alarm: The video is recorded when the alarm is triggered via the external alarm input. • Motion | Alarm: The video is recorded when the external alarm is triggered or the motion is detected. • Motion & Alarm: The video is recorded when motion and alarms are triggered at the same time. • Cross line: Video is recorded when the pre-defined line on-screen in crossed.
Camera management This chapter describes how to use the camera once it is installed and configured. The camera is accessed through a web browser. User management This section describes how to manage users. You can: Add or delete users Modify permission Modify passwords Only the administrator can manage users. The administrator can create up to 31 individual users for the cameras listed in this manual.
Admin: This is the system administrator. The administrator can configure all settings. Only the administrator can create and delete user accounts. Admin cannot be deleted. Operator: This user can only change the configuration of his/her own account. An operator cannot create or delete other users. Viewer: This user has the permission to live view, play back and search logs. However, they cannot change any configuration settings. Add and delete users The administrator can create up to 15 users.
To delete a user: 1. In the Security panel, click the User tab to open its window. 2. Select a user in the User tab. 3. Click the Delete button. A message box appears asking you to confirm that you want to delete this user. . Note: Only the administrator can delete a user. 4. Click OK to delete the user. Modify user information You can easily change the information about a user such as their name, password and permissions. To modify user information: 1.
3. Under Web Authentication select Digest or Basic from the drop-down list. 4. Click Save to save the changes. IP address filter This function makes it possible for access control. To define the IP address filter: 1. In the Security panel, click the IP Address Filter tab. 2. Enable Enable IP Address Filter. 3. Select the type of IP address filter from the drop-down list: Forbidden or Allowed. 4. Click Add to add an IP address. -Or Click Modify or Delete to modify or delete the selected IP address.
To define Telnet: 1. In the Security panel, click the Security Service tab to open its window. 2. Enable Enable Telnet. 3. Click Save to save the changes. Note: 1. The Telnet user name is root as default and cannot be changed. 2. The default Telnet password is “ab12!” 3. The password should have least four characters with at least one letter and one number. To define SSH: 1. In the Security panel, select the Security Service tab to open its window. 2. Check the check box of Enable SSH. 3.
To restore default settings: 1. In the System panel, click the Maintenance tab to open its window. 2. Click either Restore or Default. A window showing user authentication appears. 3. Enter the admin password and click OK. 4. Click OK in the pop-up message box to confirm restoring operation. Import/export a configuration file The administrator can export and import configuration settings from the camera.
Upgrade firmware The camera firmware is stored in the flash memory. Use the upgrade function to write the firmware file into the flash memory. You need to upgrade firmware when it has become outdated. When you upgrade the firmware, all existing settings are unchanged. Only the new features are added with their default settings. The camera will select the corresponding firmware file automatically. Cookies and data in the web browser are automatically deleted when the firmware is updated.
Camera operation This chapter describes how to use the camera once it is installed and configured. Logging on and off You can easily log out of the camera browser window by clicking the Logout button on the menu toolbar. You will be asked each time to enter your user name and password when logging in. Figure 16: Login dialog box If you do not change the default password of admin, a message will always pop up requesting that you to do so.
Take a snapshot: You can take a snapshot of a scene when in live view. Simply click the Capture button located at the bottom of the window to save an image. The image is in JPEG format. Snapshots are saved on the hard drive. Playing back recorded video You can easily search and play back recorded video in the playback interface. Note: You must configure NAS or insert the SD card in the dome camera to be able to use the playback functions.
Name Description 6. The timeline bar displays the 24-hour period of the day being played back. It moves left (oldest) to right (newest). The bar is color-coded to display the type of recording. Timeline bar Click a location on the timeline to move the cursor to where you want playback to start. The timeline can also be scrolled to earlier or later periods for play back. Click 7. Time moment 8. Download functions to zoom out/in the timeline bar.
To archive recorded snapshots: 1. Click to open the snapshots search window. 2. Select the snapshot type as well as the start and end time. 3. Click Search to search for the snapshots. 4. Select the desired snapshots, and click Download to download them. Searching event logs You must configure NAS or insert a SD card in the camera to be able to use the log functions. The number of event logs that can be stored on NAS or SD card depends on the capacity of the storage devices.
Figure 18: Log window 1. Major Type 4. Start search 2. Minor Type 5. Save searched logs 3. Start and end search time You can search for recorded logs by the following criteria: Major type: There are three types of logs: Alarm, Exception, and Operation. You can also search All Type. See Table 7 below for their descriptions. Minor type: Each major type has some minor types. See Table 7 below for their descriptions. Date and Time: Logs can be searched by start and end recording time.
Log type Description of events included Operation Power On, Unexpected Shutdown, Remote Reboot, Remote Login, Remote Logout, Remote Configure parameters, Remote Upgrade, Remote Start Record, Remote Stop Record, Remote Initialize HDD, Remote Playback by File, Remote Playback by Time, Remote Export Config file, Remote import config file, Remote Get Parameters, Remote Get Working Status, Start Bidirectional Audio, Stop Bidirectional Audio, Remote Alarm Arming, Remote Alarm Disarming To search logs: 1.
Index HDD full alarm, 36 A Alarm inputs set up, 37 Alarm outputs set up, 37 Alarm types motion detection, 31 Archived files play back, 57 Archiving files snapshots, 57 B Bit rate, 24 Brightness setup, 27 I I-frame interval, 24 Illegal login alarm, 36 IP address conflicted alarm, 36 L Live view parameters, 9 Local camera parameters, 9 Logging on and off, 55 Logs information type, 59 search logs, 58 view logs, 58 M C Camera image configuring, 27 Camera name display, 29 Configuration file import/export, 5
define recording schedule, 45 parameters, 24 Resolution, 24 RTSP authentification, 50 S Saturation setup, 27 SDHC card capacity, 44 card full, 44 formatting, 44 free space available, 44 Sharpness setup, 27 Snapshot and clip settings, 9 Snapshots archive, 57 set up, 41 SNMP parameters set up, 16 Stream type, 24 System time set up, 10 T Tamper-proof alarms set up, 35 TCP/IP settings set up, 14 Text add extra lines of text on screen, 30 Text display on screen appearance, 29 Time format set up, 29 TruVision D