Security Radar Web User’s Manual User’s Manual V1.0.
Foreword General This manual introduces the functions and operations of the security radar. The manual is applicable to multiple radar models. The figures are for reference only, and might differ from the actual products. Safety Instructions The following categorized signal words with defined meaning might appear in the manual. Signal Words Meaning WARNING Indicates a medium or low potential hazard which, if not avoided, could result in slight or moderate injury.
There still might be deviation in technical data, functions and operations description, or errors in print. If there is any doubt or dispute, please refer to our final explanation. Upgrade the reader software or try other mainstream reader software if the manual (in PDF format) cannot be opened. All trademarks, registered trademarks and the company names in the manual are the properties of their respective owners.
Important Safeguards and Warnings The following contents are about the proper ways of using the radar, preventing dangers and property damage when it is in use. Read the manual carefully before using the radar, strictly abide by the manual and properly keep it for future reference. Operation Requirements Do not place or install the radar in a place exposed to sunlight or near the heat source. Keep the radar away from dampness, dust or soot.
Table of Contents Foreword .......................................................................................................................................... I Important Safeguards and Warnings .................................................................................................. III 1 Network Configuration.................................................................................................................... 1 1.1 Network Connection ..........................................
4.2.7 SNMP.........................................................................................................................................46 4.2.8 Bonjour ......................................................................................................................................48 4.2.9 Multicast....................................................................................................................................49 4.2.10 802.1x ...............................................
1 Network Configuration 1.1 Network Connection There are mainly two connection methods between the radar and PC. See Figure 1-1 and Figure 1-2. Figure 1-1 Connected by network cable Figure 1-2 Connected through router or switch The IP address of the radar is 192.168.1.108 by default. You need to use IP segment reasonably according to actual network environment so that the radar can connect to network. 1.2 Logging in to Web Client 1.2.
Figure 1-3 Device initialization Step 2 Set the password. See Figure 1-4. The password should consist of 8 to 32 non-blank characters and contain at least two types of characters among upper case, lower case, number, and special characters (excluding ' " ; : &). Make sure that the password and the confirmed password are the same. Follow the password strength prompt to set a password with high security. Figure 1-4 Set admin password Step 3 (Optional) Set the email address which is used to reset password.
Figure 1-5 P2P Step 5 Read on-screen notifications, select P2P check box as needed, and then click Next. The Online Upgrade interface is displayed. See Figure 1-6. Figure 1-6 Online upgrade Step 6 Read on-screen notifications, select Auto-check for updates check box as needed, and then click Next. The Country/Region Setting interface is displayed. See Figure 1-7.
Figure 1-7 Country or region setting Step 7 Select region, language, and video standard as needed, and then click Save. The login interface is displayed. See Figure 1-8. Figure 1-8 Login 1.2.2 First-time Login You need to download and install the plug-in for the first-time login. Step 1 Enter username and password, and then click Login. The Live interface is displayed. See Figure 1-9.
Figure 1-9 Install the plug-in If you enter the wrong password for continuously 5 times, the account will be locked for 5 minutes. After the locked time ends, you can log in to the radar again. You can set the allowed wrong password times in Setting > Event > Abnormality > Illegal Access. For details, see "4.3.2.3 Illegal Access." Step 2 Download and install the plug-in according to the on-screen instructions. Step 3 After the plug-in is installed, the login interface is displayed automatically.
1.2.3 Forgetting Password You can reset the admin password through the reserved email address when you forget it. Step 1 Open IE browser, enter the IP address of the radar in the address bar, and then press Enter. The login interface is displayed. See Figure 1-11. Figure 1-11 Login Step 2 Click Forget password? The Prompt interface is displayed. See Figure 1-12. Figure 1-12 Prompt Step 3 Click OK. The QR code scanning interface is displayed. See Figure 1-13.
Figure 1-13 QR code Step 4 Read notes and scan the QR code. Enter security code acquired from the reserved email and then click Next. The password resetting interface is displayed. See Figure 1-14. Reset the password within 24 hours after you get the security code; otherwise it will be invalid. If the security code is not used twice continuously, for the third time, the system will prompt that you fail to acquire the security code.
Step 6 Click Save. The login interface is displayed.
2 Live View You can do the operations such as watching live video, taking snapshots and records, and setting video stream. Click Live tab. The Live interface is displayed. See Figure 2-1. For live view parameter descriptions, see Table 2-1. Figure 2-1 Live view Table 2-1 Live view parameter descriptions No. Description No. Name 1 Set encoding mode. 2 Video tool. 3 Adjust video window. 4 Function tabs. 5 Function options. 6 Device list. 2.
Figure 2-3 Video tool Table 2-2 Video tool parameter descriptions No. Name Description 1 Bit Rate Display the current video bit rate. 2 Resolution Display the current video resolution. 3 Digital Zoom Click the icon, and then draw a box at any area to zoom in the selected part. Scroll on the selected part to zoom in or zoom out the image; point anywhere, and then scroll to zoom in or zoom out the image. Right-click or click the icon again to restore to the original status.
No. Name Description Single live image: . It is set by default. Double live images: Four live images: 7 Picture in picture mode Click the icon, click the small window at the lower-right corner of the main live image, and then double-click the linked camera from the Device List. The live view of the selected camera will be displayed in the small window. 2.4 System Menu You can click each tab to enter its corresponding interface. See Figure 2-5. Figure 2-5 System menu 2.
2.6 Device List You can view IP addresses of radar and the linked cameras, and set video stream. See Figure 2-7. Figure 2-7 Device list Click to select video streams. For details, see Figure 2-8 and Table 2-5. Figure 2-8 Select video stream Table 2-5 Video stream icon descriptions No. Name Description 1 Main Stream Under the selected stream media protocol, use main stream to monitor and store video. Main stream is applied in live view and record storage by default.
Figure 2-9 PTZ Control Table 2-6 PTZ control descriptions Name Description Direction Support eight directions: Up, down, left, right, upper-left, upper-right, lower-left, and lower-right. Quick position Click the icon, draw a box on radar's live interface, and then the PTZ camera will rotate, focus and quickly locate that area. Speed PTZ rotation speed. The larger the value is, the higher the speed will be. Click to increase the value and click to decrease the value.
3 Playback You can play back snapshots and videos saved in SD card. Snapshot and video playback configurations are only for radar on this web. Before playback, you need to configure parameters such as record and snapshot schedule, storage method, and record mode. For details, see "4.4 Storage." Click Playback tab. The Playback interface is displayed. See Figure 3-1. Figure 3-1 Playback 3.1 Video Playback Select file type as dav. The video playback interface is displayed. See Figure 3-2.
Figure 3-2 Video playback Table 3-1 Video playback function descriptions No. Description 1 Video playing bar. For details, see "3.1.1 Playing Video." 2 Time bar. 3 Record type. For details, see "3.1.2 Record Types." 4 Auxiliary functions. For details, see "3.1.3 Auxiliary Functions." 5 Record files. For details, see "3.1.4 Record Files." 6 Clip. For details, see "3.1.5 Clipping Records." 7 Time format of the time bar. For details, see "3.1.6 Time Format of the Time Bar." 3.1.
No. Name Description 5 Fast play Click the icon to play fast. 3.1.2 Record Types Select the record type, and only selected files will be displayed in the time bar and file list. See Figure 3-4. Figure 3-4 Record type 3.1.3 Auxiliary Functions You can zoom in or zoom out the image, and take a snapshot. For details, see Figure 3-5 and Table 3-3. Figure 3-5 Auxiliary functions Table 3-3 Auxiliary function icon descriptions No. Name Description 1 Digital Zoom For details, see "2.2 Video Tool.
Figure 3-6 Select records Table 3-4 Record parameter descriptions Parameter Description File Type Select dav for video playback. Data Src Data source. It is from SD card by default. File list. Click the icon, and then the video files of the selected date will be displayed in the list. 3.1.5 Clipping Records You can clip the selected record as needed. The function column is displayed as Figure 3-7.
3.1.6 Time Format of the Time Bar You can set time format of the time bar as 24 h, 2 h, 1 h, and 30 min. For details, see Figure 3-8 and Table 3-5. Figure 3-8 Time format Table 3-5 Time format descriptions Icon Description Click the icon to display the time bar in 24-hour mode. Click the icon to display the time bar in 2-hour mode. Click the icon to display the time bar in 1-hour mode. Click the icon to display the time bar in 30-min mode. 3.2 Snapshot Playback Select file type as jpg.
3.2.1 Playing Snapshots You can play and pause playing snapshots. See Figure 3-10. Figure 3-10 Picture playing bar 3.2.2 Snapshot Files Select file type, data source, and date, and then you can play back snapshots. On the calendar, the date with blue background means the current date has snapshots. See Figure 3-11. For parameter descriptions, see Table 3-7. Figure 3-11 Select snapshots Table 3-7 Snapshot parameter descriptions Parameter Description File Type Select jpg for picture playback.
Figure 3-12 Device list On device list interface, you can double-click the file to play back pictures. For more icon descriptions, see Table 3-8. Table 3-8 Device list icon descriptions Icon Description Click the icon to search all snapshot files within the start time and end time of selected date. Click icon to download snapshot file to local storage. Click icon to return to calendar interface and re-select time to operate. 3.2.
4 Setting This chapter introduces how to configure and view the radar information, including settings about radar, network, event, storage, and system. 4.1 Radar You can make configurations about radar such as setting video and snapshot parameters, adding PTZ cameras, doing radar and camera linkage, managing protection zone, and setting IVS. 4.1.1 Video You can set video stream, snapshots, overlay, and storage path. 4.1.1.1 Video Stream You can set the main stream and sub stream of live videos.
Table 4-1 Video stream parameter descriptions Parameter Description Enable By selecting Enable check box or not, you can enable or disable the sub stream. It is enabled by default. Encode Mode Select the encode mode from H.264, H.264H, H.264B, and H.265. Enable smart codec to improve video compressibility and save storage space. Smart Codec After smart codec is enabled, the third bit stream, ROI, and smart event detection will be disabled. The actual interface shall prevail.
Figure 4-2 Set snapshot Step 2 Configure parameters as needed. For details, see Table 4-2. Table 4-2 Snapshot parameter descriptions Parameter Description Snapshot Type General: The system takes snapshots as scheduled. For details of schedule setting, see "4.4.1 Schedule." Event: The system takes snapshots when the external alarm is triggered. For detailed configuration, see "4.3 Event Management." Image Size It is the same as the resolution of snapshot under main stream by default.
Figure 4-3 Channel title Figure 4-4 Time title 24
Figure 4-5 OSD information Figure 4-6 Font 25
Figure 4-7 Picture overlay Figure 4-8 Abnormal Name Table 4-3 Overlay configuration parameter descriptions Description Channel Title Enable or disable Channel Title to be overlaid on the video image. Drag the Channel Title box to adjust the display position. Time Title Enable or disable Time Title to be overlaid on the video image. By selecting Week Display check box, the day will be displayed. Drag the Time Title box to adjust the display position.
Name Description Picture Overlay Enable or disable picture to be overlaid on the video image. Click Upload Picture to overlay the local picture on the video image. Drag the yellow box to adjust the picture display position. OSD info and picture overlay cannot be disabled at the same time. Abnormal Step 3 Enable or disable abnormal information to be overlaid on the video image. Click Save. 4.1.1.
Figure 4-10 Add PTZ camera Step 2 Click Add PTZ Camera. Figure 4-11 Add PTZ camera Step 3 Enter IP address, port, camera name, type, username, and password. Port is set to 80 by default. Keep the port consistent with the PTZ camera. Step 4 Click Save. Switch to to enable alarm track linkage between the radar and the selected camera. 4.1.3 Linkage You can import a map, and set linkage between the radar and the added cameras after finishing radar positioning and calibration.
Figure 4-12 Linkage Step 2 Click Choose to import a map. .png, .jpg, and .bmp format are supported. Figure 4-13 Import a map Step 3 Crop the map according to the detection range of the radar. Drag the box to select the range, and then click Cut Map. Step 4 Click Confirm Screen to get the map with the range you need. Click Cancel Screenshot to cancel the cropping. Step 5 Calculate the map size. 1) Measure a distance in the actual detection area.
3) Click and hold the left mouse button to start drawing, and then release the button to complete drawing. 4) 5) Double-click the map to enter full screen display to draw the line more accurately. Click Clear to clear the line you drew. Enter the actual measured length of the line you drew in the Line Length input box and then click Calculate Map Size. The system will automatically get the map width and height. Click Next.
You must log in to the PTZ camera before calibration. For details, see "4.1.2 PTZ Camera". If you need to link multiple cameras, click PTZ Camera List at the upper-left corner above the live image to switch to another camera, and then repeat the following steps. Figure 4-15 Log in to the camera Step 2 Enter the installation height of the camera. Enter the height of the lens; otherwise the camera-radar linkage effect will be reduced.
5) 6) Select a target point (More than 10 m away from the camera is recommended) with the same height as the lens. Adjust monitoring image of the camera by using PTZ control icons to move the crosshair to the target point, and then click Acquire calibration value. Enable Alarm Track on the interface, and then click Save. 4.1.4 Region Management You can add different types of regions, draw alarm, pre-warning, or shield areas, set arming periods, filter objects in regions, and more.
Figure 4-17 Draw an area Step 6 Click Setup to configure arming periods. Figure 4-18 Set arming periods 1) Set arming periods, and the alarm can only be triggered when it occurs during the defined period. The time period in green on the timeline is armed. Method one: Click Setting of the day you want to set. Directly press and drag the left mouse button on the timeline. Method two: Click Setting of the day you want to set. Select the check box in front of the time period to enable it.
Step 7 Select All or the check box of any other day, and the set time period will apply to the selected days. You can set 6 time periods per day. 2) Click Save. Configure other parameters as needed. For details, see Table 4-4. For alarm rules of different regions, see Table 4-5. Table 4-4 Region management parameter descriptions Name Description Effective Object Select monitoring target to be monitored from Human and Vehicle. Direction Set the alarm direction for tripwire.
Name Description Snapshot By selecting Snapshot, the system automatically captures images when the alarm is triggered. You can configure the snapshot taking period in Setting > Storage > Schedule > Snapshot. For details, see "4.4.1.2 Snapshot Schedule." Table 4-5 Region alarm rule descriptions Region Description Alarm area Pre-warning area Lowest priority. The target will be tracked when it enters the pre-warning area. Shield area Secondary priority.
Figure 4-20 240 m protection zone management Figure 4-21 300 m/450 m protection zone management Step 2 Configure parameters as needed. Table 4-6 Parameter descriptions of protection zone management Name Description Trajectory Duration Trajectory duration of targets, ranging from 3 s to 30 s. You can select different channels for radar to avoid co-channel interference. Select Channel Applicable to 50 m/120 m radar.
Name Description Select the detection region according to actual application. Detection Region Hide Protection Zone Applicable to 240 m/300 m/450 m radar. The device will restart if the value is changed. Select the check box to hide protection area. Tour: The camera tracks all targets in the detection region in turn. Distance Priority: The camera tracks the target nearest to the radar in the detection region. Time Priority: The camera tracks the target appearing earliest in the detection region.
4.2 Network This chapter introduces network configuration. 4.2.1 TCP/IP You can configure IP address, DNS (Domain Name System) server of the radar to make sure that it can be mutually connected to other devices in the networking. Confirm the radar has connected to network correctly before setting network parameters. Allocate IP address of the same network segment if there is no router in the network. Set corresponding gateway and subnet mask if there is a router in the network.
Parameter Description Mode DHCP: The system acquires IP address automatically. You cannot set the IP address, subnet mask and default gateway. Static: You need to configure IP address, subnet mask and default gateway manually. MAC Address Display the MAC address of radar. IP Version Select IP version from IPV4 and IPV6 and both versions can be accessed. IP Address Enter the IP address, subnet mask, and default gateway as needed when selecting Static mode.
Table 4-9 Command list Parameter Description 480 -t < IP Address > Windows syntax Arp -s Ping -l Example: Arp -s Ping -l UNIX/Linux/Mac syntax Arp -s Ping -s Example: Arp -s Ping -s 480 < IP Address > Win7 syntax netsh i i show in netsh -c “i i” add neighbors ldx ping -l 480 -t < IP Address > Example: netsh i i show in netsh -c “i i” add neighbors 12 192.168.0.125 11-40-8c-18-10-11 ping -l 480 -t 192.168.0.125 192.168.0.
The configuration of Max Connection takes effect immediately and others after the radar is restarted. 0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, 42323 are occupied for specific uses. It is not recommended to use the default value of other ports during port configuration. Table 4-10 Port parameter description Parameter Description Max Connection The maximum number of users that can log in to the web interface simultaneously of the same radar.
4.2.3 PPPoE Point-to-Point Protocol over Ethernet, it is one of the protocols that device uses to connect to the Internet. Get the PPPoE username and password from the Internet service provider, set network connection through PPPoE, and then the device will acquire a WAN dynamic IP address. Step 1 Select Setting > Network > PPPoE. The PPPoE interface is displayed. See Figure 4-25. Figure 4-25 PPPoE Step 2 Select Enable, and then enter username and password. Step 3 Click Save. 4.2.
Figure 4-26 DDNS (1) Step 2 Select DDNS Type, and then configure the parameters as needed. See Table 4-11. Table 4-11 DDNS parameter descriptions Parameter Type Address Description The name and web address of the DDNS service provider, see the matching relationship below: CN99 DDNS web address: www.3322.org NO-IP DDNS web address: dynupdate.no-ip.com Dyndns DDNS web address: members.dyndns.org Domain Name The domain name you registered on the DDNS website.
Figure 4-27 SMTP (Email) Step 2 Configure parameters. See Table 4-12. Table 4-12 SMTP (Email) parameter descriptions Parameter Description SMTP Server IP address of SMTP server that sends emails. Port Port number of the SMTP server that sends emails. The default value is 25. Username Sender's email username. Password Sender's email password. Anonymity By enabling this function, the sender's information is not displayed in the email.
Table 4-13 Major mailbox configuration Mailbox SMTP Server Authentication Port Description SSL 465 QQ smtp.qq.com TLS 587 The authentication type cannot be None. You need to enable SMTP service in your mailbox. The authentication code is required as password; either the QQ password or email password is not applicable. Authentication code, the code you receive when enabling SMTP service. 465/9 94 SSL 163 smtp.163.com Sina smtp.sina.com 126 smtp.126.
Figure 4-28 UPnP Step 2 Select Enable to enable UPnP function, and there are two mapping modes: Custom and Default. Select Custom, and then you can modify external port as needed. Select Default, and then the system finishes mapping with available port automatically. You cannot modify mapping relation. Step 3 Select Start Device Discover as needed. Step 4 Click Save to make the configurations valid. 4.2.
Figure 4-30 SNMP (2) Step 2 Select SNMP version to enable SNMP. In the Trap Address, enter the IP address of the PC that has MIB Builder and MG-SOFT MIB Browser installed, and leave other parameters as the default. Table 4-14 SNMP parameter descriptions Parameter Version Description Select the check box of the version you need, and the system can process information of corresponding version. Select V1, and the system can only process information of V1 version.
Parameter Description The name is public by default. Read-only Username You can enter number, letter, and underline to form the name. The name is private by default. Read & write Username You can enter number, letter, and underline to form the name. Authentication Type You can select from MD5 and SHA. The default type is MD5. Authentication Password It should be no less than 8 digits. Encryption Type The default is CBC-DES. Encryption Password It should be no less than 8 digits. Step 3 Click Save.
In the operating system and clients that support Bonjour, follow steps below to visit the radar web interface with Safari browser. Step 1 Click Show all bookmarks in Safari. Step 2 Enable Bonjour, and then, in your LAN, all the radars which enable Bonjour are displayed. Step 3 Click the radar to visit the corresponding web interface. 4.2.9 Multicast When multiple users are watching the live video simultaneously through network, it might fail due to limited bandwidth.
Figure 4-33 802.1x Step 2 Select Enable to enable 802.1x. Step 3 Configure parameters. See Table 4-16. Table 4-16 802.1x parameter descriptions Parameter Description Authentication PEAP (protected EAP protocol). Username The username that was authenticated on the server. Password Corresponding password. Step 4 Click Save. 4.2.11 QoS You can solve problems such as network delay and congestion with this QoS (Quality of Service).
Step 3 Click Save. 4.2.12 Access Platform 4.2.12.1 P2P P2P (peer-to-peer) is a private network traversal technology which enables user to manage devices easily without requiring DDNS, port mapping or transit server. Scan the QR code with your smartphone, and then you can add and manage devices on your mobile client. Step 1 Select Setting > Network >Access Platform > P2P. The P2P interface is displayed. See Figure 4-35. Figure 4-35 P2P P2P is enabled by default.
Figure 4-36 ONVIF Step 2 Select On. Step 3 Click Save. 4.3 Event Management You can enable external and abnormality alarms, and configure linked actions such as recording, capturing, and sending email, and so on. 4.3.1 Alarm You can set the linkage actions when alarm events are triggered. Step 1 Select Setting > Event > Alarm. The Alarm interface is displayed. See Figure 4-37. Figure 4-37 Alarm linkage Step 2 Select Enable check box to enable the alarm linkage, and configure parameters as needed.
Figure 4-38 Set arm period 2) Set arming periods, and the alarm can only be triggered when it occurs during the defined period. The time period in green on the timeline is armed. Method one: Click Setting of the day you want to set. Directly press and drag the left mouse button on the timeline. Method two: Click Setting of the day you want to set. Select the check box in front of the time period to enable it. Enter start time and end time of that time period.
Parameter Description By selecting Record, the system will record automatically when the alarm is triggered. Record Before enabling this function, you need to configure record period in Setting > Storage > Schedule > Record. For details, see "4.4.1.1 Record Schedule." In Setting > Storage > Record Control, select Auto for the Record Mode. Record Delay The alarm record keeps running for the defined time (from 10 s to 300 s) after the alarm is ended.
For other parameter descriptions, see Table 4-18. Parameter Table 4-19 SD card parameter descriptions Description Event Type Select SD card abnormality from no SD card, SD card error, and capacity warning. Enable Select Enable check box to enable SD card abnormality detection. Capacity Limit This parameter is available when Capacity Warning is selected in Event Type.
The Illegal Access interface is displayed. See Figure 4-41. Figure 4-41 Illegal access Step 2 Configure parameters as needed. For details, see Table 4-21. For other parameter descriptions, see Table 4-18. Table 4-21 Illegal access parameter descriptions Parameter Description Enable Select Enable check box to enable to network card abnormality detection. Login Error The number of times that the login password is allowed to be incorrectly entered.
4.3.2.5 Scene Changing When scene changing happens, the alarm will be triggered. See conditions below. The vertical detection range of the radar is covered for more than 50%. The radar is rotated for more than 30. But in open areas, 30 rotation of the radar might not trigger the alarm. Step 1 Select Setting > Event > Abnormality > Scene Changing. The Scene Changing interface is displayed. See Figure 4-43.
Figure 4-44 Record schedule Step 2 Set a record plan. Method one: Select a record type, such as Alarm, and then press and drag the left mouse button to draw the time period for alarm record on the timeline. Method two: Enter an actual time period. 1) Click Setting of the day you want to set. The Setting interface is displayed. See Figure 4-45. Figure 4-45 Set schedule 2) Enter start time and end time of the time period, and select record type from General and Alarm.
Step 3 Green: General video record. The system records continuously within the set period. Red: Alarm video record. The system records when the alarm event happens within the set period. Click Save. 4.4.1.2 Snapshot Schedule The system starts or stops taking snapshot as scheduled. Step 1 Select Setting > Storage > Schedule > Snapshot. The snapshot schedule interface is displayed. See Figure 4-46. Figure 4-46 Snapshot schedule Step 2 Configure time periods.
Figure 4-47 Holiday schedule Step 2 Select the days to be set as holiday as needed. The selected days has yellow background. Step 3 Select from Record and Snapshot, and then click Save. Step 4 On Record or Snapshot interface, click Setting behind Holiday, and then you can set detection type and detection period. For details, see "4.4.1.1 Record Schedule." Step 5 Click Save. Record and snapshot will be taken according to the set holiday schedule for the selected days. 4.4.
Step 2 Select the storage path for the records and snapshots of different event types as needed. For detailed parameter descriptions, see Table 4-22. Table 4-22 Path parameter descriptions Parameter Description Event Type Select from Scheduled and Alarm. It matches with the record types on the schedule interface. Local Save in the internal SD card. FTP Save in the FTP server. NAS Save in the NAS (network Attached Storage). Step 3 Click Save. 4.4.2.
Figure 4-50 FTP Step 2 Select Enable check box to enable the FTP function. Step 3 SFTP is recommended to enhance network security. Configure FTP parameters. See Table 4-23. Table 4-23 FTP parameter descriptions Parameter Description Server Address The IP address of the FTP server. Port The port number of the FTP server. Username The username to log in to the FTP server. Password The password to log in to the FTP server. Remote Directory The destination path in the FTP server.
Figure 4-51 NAS Step 2 Configure NAS parameters. See Table 4-24. Table 4-24 NAS parameter descriptions Parameter Description Enable Select Enable check box to enable NFS or SMB function. NFS (Network File System): A file system which enables computers in the same network share files through TCP/IP. SMB (Server Message Block): Provide shared access for clients and the server. Server Address The IP address of the NAS server. Remote Directory The destination path in the NAS server.
Table 4-25 Record control parameter descriptions Parameter Description Pack Duration Set the pack duration of each record; it is 30 min by default. Pre-event Record Disk Full The time period for which the system records video before alarm starts. If the value is 5, then the system records video for 5 s before alarm starts and then save it to the record.
Table 4-26 General parameter descriptions Parameter Description The name of the radar. Name Each device has a different name. Language Select system language. Video Standard Select video standard from PAL and NTSC. Step 3 Click Save. 4.5.2 Date & Time You can configure date and time format, time zone, current time, DST (Daylight Saving Time), and NTP (Network Time Protocol) server. Step 1 Select Setting > System > General > Date & Time. The Date & Time interface is displayed. See Figure 4-54.
Parameter Description DST Enable DST as needed. Select the check box, and then configure start time and end time of DST with Date or Week. NTP Select NTP check box to enable NTP function and the system will sync time to the Internet server. Server Set the address of time server. Port Set the port of time server. Interval Set the sync interval between the radar and the time server. Step 3 Click Save. 4.5.3 Account You can add, delete, or modify users and groups.
Figure 4-55 Username Anonymous Login By selecting Anonymous Login check box, you can log in with only entering IP address instead of username and password. Anonymous users only have live view authority. Under Anonymous Login, you can log in with other account after clicking Logout. Adding a User You can add users to the group, and configure user authority. As a default user with the highest authority, admin cannot be deleted. Step 1 Click Add User. The Add User interface is displayed. See Figure 4-56.
Figure 4-56 Add user Step 2 Enter username and password, and then select group and operation permission. A user can be in only one group at a time, and the group users can own authorities within group authority range. It is recommended to give fewer authorities to normal users than premium users. (Optional) Click Restricted Login to set IP address, validity period, and time range of the added user. See Figure 4-57.
Figure 4-57 Restricted login Step 4 Click Save. Modifying a User Step 1 Click of the selected user. The Modify User interface is displayed. See Figure 4-58.
Figure 4-58 Modify user Step 2 Modify user information as needed. Step 3 Click Save. Modifying the Password Step 1 Click of the selected user. The Modify User interface is displayed. Step 2 Select Modify Password check box. Step 3 Enter the old password, new password, and then confirm the password. Step 4 Click Save. Deleting a User Click to delete the added user. 4.5.3.
Figure 4-59 Group name Adding a Group For details, see "4.5.3.1 User." Modifying a Group For details, see "4.5.3.1 User." Deleting a Group For details, see "4.5.3.1 User." 4.5.4 Onvif User You can add, delete, and modify Onvif users. Step 1 Select Setting > System > Account > Onvif User. The Onvif User interface is displayed. See Figure 4-60. Figure 4-60 Onvif user Step 2 Click Add User. The Add User interface is displayed. See Figure 4-61.
Figure 4-61 Add user Step 3 Set username, password, and select group. Step 4 Click Save. Click to modify user information. 4.5.5 Safety You can set RTSP authentication, system service, HTTPS, and firewall to ensure the safety of data transmission. 4.5.5.1 RTSP Authentication Real Time Streaming Protocol (RTSP) ensures the safety of the streaming media during transmission. Step 1 Select Setting > System > Safety > RTSP Authentication. The RTSP Authentication interface is displayed. See Figure 4-62.
4.5.5.2 System Service You can configure system services and ensure system security. Step 1 Select Setting > System > Safety > System Service. The System Service interface is displayed. See Figure 4-63. Figure 4-63 System service Step 2 Configure system service parameters. See Table 4-28. Table 4-28 System service parameter descriptions Function Description SSH Disabled by default. You can enable SSH authentication to perform safety management. Multicast/Broadcast Search Enabled by default.
Function Description Mobile Push Enabled by default. The system will send the snapshot that was taken when alarm is triggered to your phone. Step 3 Click Save. 4.5.5.3 HTTPS Create certificate or upload the authenticated certificate, and then you can connect through HTTPS with your PC. The HTTPS can ensure safety of data communication, user information, and radar with reliable technology. Step 1 Create a certificate or upload the authenticated certificate.
Figure 4-65 Install certificate 5) Click Download to download root certificate. The Save As dialog box is displayed. See Figure 4-66. Figure 4-66 Download certificate 6) 7) Select storage path, and then click Save. Double-click the RootCert.cer icon. The Certificate interface is displayed. See Figure 4-67.
Figure 4-67 Certificate 8) Click Install Certificate…. The Certificate Import Wizard interface is displayed. See Figure 4-68.
Figure 4-68 Certificate import wizard 9) Click Next. Select Trusted Root Certification Authorities. See Figure 4-69. Figure 4-69 Store certificate 10) Click Next. The Completing the Certificate Import Wizard interface is displayed. See Figure 4-70.
Figure 4-70 Complete certificate import wizard 11) Click Finish. The Security Warning dialog box is displayed. See Figure 4-71. Figure 4-71 Security warning 12) Click Yes. The The import was successful dialog box is displayed. Click OK to finish download. See Figure 4-72.
Figure 4-72 Import successfully If you select Install Signed Certificate, follow the steps below. 1) Select Setting > System > Security > HTTPS. The HTTPS interface is displayed. 2) Click Browse to select signed certificate path and certificate key path, and then click Upload. 3) Install root certificate. See the previous steps in creating certificate. Step 2 Select Enable HTTPs, and then click Save. The Reboot interface is displayed. See Figure 4-73.
Step 1 Select Setting > System > Safety > Firewall. The Firewall interface is displayed. See Figure 4-74. Figure 4-74 Firewall Step 2 Select Network Access from Rule Type list, and then select Enable check box. Enable PING Prohibited or Prevent Semijoin, and click Save to complete the configuration. You do not need to configure parameters. Enable Network Access, and configure trust list and banned list. 1) Select the mode: TrustList and BannedList. 2) Click Add IP/MAC.
Parameter Description end address of the segment to be added. MAC address: Enter MAC address of the host to be added. All IP addresses: Set all IP addresses in trust list or banned list. IPv4: Enter IP address in IPv4 format, such as 192.108.1.125. IPv6: Enter IP address in IPv6 format, such as aa:aa:aa:aa:aa:aa:aa:aa. IP Version Device All Ports Set access ports. You can select all ports or the ports in defined range. Device All Ports: Set all IP port in trust list or banned list.
Figure 4-77 Import/Export Click Export to export the configuration file (.backup file) to local. Click Import to import the configuration file into the system. 4.5.9 Auto Maintain You can restart the system manually, or set the time of auto restarting and auto deleting old files. The system will execute the corresponding actions at the defined time. Step 1 Select Setting > System > Auto Maintain. The Auto Maintain interface is displayed.
Figure 4-79 Upgrade Step 2 Select upgrade method. File Upgrade 1) Click Browse…, and then upload upgrade file. The upgrade file should be a .bin file. 2) Click Upgrade. The upgrade starts. Online Upgrade 1) Select the Auto-check for updates check box. It will enable the system to check for upgrade once a day automatically and there will be system notice if any upgrade is available.
Figure 4-80 Version 4.6.2 Log You can view and backup operation and system logs. Step 1 Select Setting > Information > Log. The Log interface is displayed. See Figure 4-81. Figure 4-81 Log Step 2 Configure Start time and End time, and then select log type. The start time should be later than January 1st, 2000, and the end time should be earlier than December 31, 2037. The log type includes All, System, Setting, Data, Event, Record, Account, and Safety.
System: Include program launching, force exit, exit, program restarting, device turn off/restarting, system restarting, and system upgrade. Setting: Include save configuration and delete configuration files. Data: Include configuring disk type, erasing data, hot swap, FTP status, and record mode. Event (Record events such as video detection, smart plan, alarm, and abnormality): Include event start and event end. Record: Include file access, file access error, and file search.
The Online User interface is displayed. See Figure 4-83.
5 Alarm You can subscribe alarm messages and view the triggered alarm event information on the right column of Alarm interface. Alarm prompt and alarm tone can also be selected as a reminder. Click Alarm tab, and then the Alarm interface is displayed. See Figure 5-1. For more parameter descriptions, see Table 5-1. Figure 5-1 Alarm Table 5-1 Alarm parameter descriptions Parameter Alarm Type Name Description Disk Full Select to record the alarm when disk is full.
Parameter Name Description Tone Path Select Browse… to choose alarm audio file.
6 Logging out Click Logout tab, and then the system goes back to login interface. See Figure 6-1.
Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks. Below are some tips and recommendations on how to create a more secured security system. Mandatory actions to be taken for basic device network security: 1.
6. 7. 8. 9. 10. 11. 12. 13. We suggest you to change default HTTP and other service ports into any set of numbers between 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing the risk of ARP spoofing.
Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device.