Vitek VTC-TNT4RFS Handleiding


Lees hieronder de πŸ“– handleiding in het Nederlandse voor Vitek VTC-TNT4RFS (52 pagina's) in de categorie Niet gecategoriseerd. Deze handleiding was nuttig voor 9 personen en werd door 2 gebruikers gemiddeld met 4.5 sterren beoordeeld

Pagina 1/52
VITEK
VITEK
OPERATION MANUAL
Transcendent IP
4MP Cameras
Transcendent Series 4 Megapixel
Indoor/Outdoor WDR IP Dome
Cameras with IR Illumination
FEATURES
β€’ 1/3” 4.0 Megapixel Progressive Scan CMOS image sensor
β€’ Up to 30fps live view @ 4 MegaPixel (2592x1520)
β€’ Motorized Varifocal & Fixed Lens Options
β€’ Infrared IR LED Illumination
β€’ 120dB Super Wide Dynamic Range (WDR)
β€’ True Mechanical Day/Night function by ICR
β€’ XD-DNR (2D-DNR & 3D-DNR) Noise Reduction
β€’ Fully Programmable Intelligent Analytics including Object Removal/
Museum Search, Line Crossing, and Area Intrusion Detection
β€’ H.265/H.264/MJPEG Triple Streaming
β€’ Secondary Video Output (CVBS)
β€’ Remote Viewing via CMS, Internet Explorer, and iOS & Android Apps
β€’ IP66 Weather Resistance & IK10 Impact Rating
β€’ ONVIF Compliant
β€’ Optional Mounts Available
β€’ 12VDC & PoE (Power over Ethernet) Operation
PLEASE NOTE:
Complete User Guide, Software, Tools,
and Updates are available online. Scan
the QR Code or visit:
http://www.vitekcctv.com/Downloads
Transcendent IP Cameras v4: Operation Manual
1
n Please use the specified power supply to connect.
n Do not attempt to disassemble the camera; in order to prevent electric shock, do not remove
screws or covers.
n There are no user-serviceable parts inside. Please contact the nearest service center as soon as
possible if there is any failure.
n Avoid from incorrect operation, shock vibration, heavy pressing which can cause damage to
product.
n Do not use corrosive detergent to clean main body of the camera. If necessary, please use soft dry
cloth to wipe dirt; for hard contamination, use neutral detergent. Any cleanser for high grade
furniture is applicable.
n Avoid aiming the camera directly towards extremely bright objects, such as, sun, as this may
damage the image sensor.
n Please follow the instructions to install the camera. Do not reverse the camera, or the reversing
image will be received.
n Do not operate it incase temperature, humidity and power supply are beyond the limited
stipulations.
n Keep away from heat sources such as radiators, heat registers, stove, etc.
n Do not expose the product to the direct airflow from an air conditioner.
n This is product instructions not quality warranty. We may reserve the rights of amending the
typographical errors, inconsistencies with the latest version, software upgrades and product
improvements, interpretation and modification. These changes will be published in the latest
version without special notification.
n When this product is in use, the relevant contents of Microsoft, Apple and Google will be
involved in. The pictures and screenshots in this manual are only used to explain the usage of our
product. The ownerships of trademarks, logos and other intellectual properties related to
Microsoft, Apple and Google belong to the above-mentioned companies.
n This manual is suitable for IR water-proof network camera. All pictures and examples used in the
manual are for reference only.
Transcendent IP Cameras v4: Operation Manual
2
Table of Contents
1Introduction ...................................................................................................................... 4
2 IE Remote Access............................................................................................................ 5
2.1LAN ........................................................................................................................ 5
1.1.1 - Access through IP Tool ................................................................................................................... 5
1.1.2 Directly A ccess through IE .............................................................................................................. 6
2.2WAN ....................................................................................................................... 8
3 Remote Preview ............................................................................................................. 11
4 Remote Live Surveillance.............................................................................................. 12
1.2 System Configuration............................................................................................... 12
1.2.1 Basic Information........................................................................................................................... 12
1.2.2 Time Date and ............................................................................................................................... 12
1.2.3 .................................................................................................................................. Local Config 13
1.2.4 Storage.......................................................................................................................................... 13
1.3 Image Configuration ................................................................................................. 14
1.3.1 Display Configuration .................................................................................................................... 14
1.3.2 Video / Audio Configuration........................................................................................................... 15
1.3.3 OSD Configuration ........................................................................................................................ 17
1.3.4 Video Mask.................................................................................................................................... 17
1.3.5 ROI Configuration.......................................................................................................................... 18
1.4 Alarm Configuration.................................................................................................. 19
1.4.1 ........................................................................................................................... Motion Detection 19
1.4.2 ................................................................................................................................ Alarm Server . 21
1.5 Event Configuration.................................................................................................. 21
1.5.1 Object Removal ............................................................................................................................. 21
1.5.2 Exception....................................................................................................................................... 23
1.5.3 ................................................................................................................................ Line Crossing 25
1.5.4 Intrusion ......................................................................................................................................... 26
1.6 Network Configuration.............................................................................................. 28
1.6.1 TCP/IP ........................................................................................................................................... 28
1.6.2 Port ................................................................................................................................................ 29
1.6.3 ..................................................................................................................... Server Configuration 30
1.6.4 DDNS ............................................................................................................................................ 30
1.6.5 SNMP ............................................................................................................................................ 31
1.6.6 RTSP............................................................................................................................................. 32
1.6.7 ............................................................................................................................................ UPNP 33
1.6.8 ............................................................................................................................................. Email 33
1.6.9 FTP................................................................................................................................................ 34
4.1Security onfigurationC ....................................................................................... 35
1.6.10 onfiguration 35 CUser ...................................................................................................................... 
1.6.11 37 Online User ................................................................................................................................. 
1.6.12 Block and Allow Lists ................................................................................................................... 37
Transcendent IP Cameras v4: Operation Manual
3
4.2Maintenance Configuration ............................................................................... 37
1.6.13 Backup and Restore.................................................................................................................... 37
1.6.14 Reboot......................................................................................................................................... 38
1.6.15 Upgrade....................................................................................................................................... 38
1.6.16 Operation Log .............................................................................................................................. 39
5 Record Search................................................................................................................ 40
5.1Photo Search ...................................................................................................... 40
5.2Photo Search ...................................................................................................... 40
5.3Video Search ....................................................................................................... 41
1.6.17 Local Video Search ..................................................................................................................... 41
1.6.18 SD Card Video Search ................................................................................................................ 42
1.6.19 This feature is camera dependent; some cameras do not have an SD card slot. ....................... 42
6 Specifications................................................................................................................. 43
Transcendent IP Cameras v4: Operation Manual
4
1 Introduction
This IP camera is designed for high performance CCTV solutions. It adopts state of the art video
processing chips. It utilizes most advanced technologies, such as video encoding and decoding
technology, complies with the TCP/IP protocol, SoC, etc to ensure this system is more stable and
reliable.
Main Features
l ICR auto switch, true day/night
l 3D DNR, digital WDR
l ROI coding
l BLC, Defog, Anti- flicker
l Supports smart phones & tablets for remote monitoring
Surveillance Application
Transcendent IP Cameras v4: Operation Manual
5
2 IE Remote Access
2.1 LAN
In LAN, there are two ways to access - -the IP Cam: 1. access through IP Tool; 2. directly access through
IE browser.
1.1.1 Access through IP- Tool
Network connection:
οΏ½ - -Make sure the PC and IP Cam are connected to the LAN and the IP Tool is installed in the PC from
the CD.
β‘‘
D - ouble click the IP Tool icon on the desktop to run this software as shown below:
β‘’
Modify the IP address. The default IP address of this camera is 192.168.226.201. Click the
information of the camera listed in the above table to show the network information on the right side.
Modify the IP address and gateway of the camera and make sure its network address is in the same
local network segment as that of the computer. Please modify the IP address of your device according
to the practical situation.
Transcendent IP Cameras v4: Operation Manual
6
For example, the IP address of your computer is 192.168.1.4. So the IP address of the camera shall be
changed to 192.168.1.X. After modification, please input the password of the administrator ADMIN
and click β€œModify” button to modify the setting.
F
β‘£
Double click the IP address and then the system will pop up IE browser to connect IP-CAM. IE
browser will ask to download the Active X control. After downloading, a login window will pop up as
shown below.
Input the username and password to log in.
F
1.1.2 Directly Access through IE
The default network s as shown below:ett ings are
IP address: 192.168.226.201
Subnet Mask: 255.255.255.0
Gateway: 192.168.226.1
HTTP: 80
Data port: 9008
The default password of the administrator is β€œ123456”.
The default username is β€œadmin”; the default password is β€œ123456”.
Transcendent IP Cameras v4: Operation Manual
7
You may use the above default settings when you log in the camera for the first time. You may directly
connect the camera to the computer through network cable.
οΏ½ Manually set the IP address of the PC as the network segment should be as the same as the default
settings of the IP camera. Open the network and share center. Click β€œLocal Area Connection” to pop
up the following window.
Select β€œProperties” and then select internet protocol according to the actual situation (for example:
IPv4). Next, click β€œProperties” button to set the network of the PC.
Transcendent IP Cameras v4: Operation Manual
8
β‘‘
Open IE browser and input the default address of IP-CAM and confirm. IE browser will ask to
download the Active X control.
β‘’
After downloading the Active X control, the login dialog box will pop up.
β‘£
Input the default username and password and then enter to view.
2.2 WAN
Ø Access through the router or virtual server
οΏ½ Make sure the camera is connected via LAN and then log into the camera via LAN and go to
ConfigΓ NetworkΓ Port to set the port number.
Port Setup
β‘‘
Go to ConfigΓ NetworkΓ TCP/IP menu to modify the IP address.
Transcendent IP Cameras v4: Operation Manual
9
IP S etup
β‘’
Go to the router’s management interface through IE browser to forward the IP address and port of
the camera. Please check your router manual for instructions on port forwarding.
Router Setup
β‘£
Open IE browser and input its WAN IP and http port to access.
Ø Access through PPPoE dial- up
Network connection
You may access the camera through PPPoE auto dial up. The setting steps are as follow:-
β‘ 
Go to ConfigΓ NetworkΓ Port to set the port number.
Transcendent IP Cameras v4: Operation Manual
11
3 Remote Preview
After you log in, you will see the following window.
The following table is the instructions of the icons on the remote live interface.
Icon Description Icon Description
Original size Scene change indicator icon
Appropriate size Abnormal clarity indicator icon
Auto Color abnormal indicator icon
Full screen Motion alarm indicator icon
Start/stop live view Start/stop recording
Enable/disable audio Zoom in
Snap Zoom out
l When motion detection alarm is triggered, the people icon will turn red.
l In full screen mode, double click to exit.
l icons may not be displayed for some versions without intelligent analysis function.
Transcendent IP Cameras v4: Operation Manual
12
4 Remote Live Surveillance
1.2 System Configuration
The β€œSystem” submenus: Basic Information configuration includes four , Date and Time, Local Config
and storage.
1.2.1 Basic Information
In the β€œBasic Information” interface, you can check the relative information of the device.
1.2.2 Date and Time
Go to ConfigΓ SystemΓ Date and Time. Please refer to the following interface.
You can select the time zone and DST as required.
Click β€œDate and Time” tab to set the time mode.
Transcendent IP Cameras v4: Operation Manual
14
card record stream. Set the pre record time if you enable pre record. Click β€œSave” button to save the
settings.
Pre Record Time: S et the time to record before the actual recording begins.
1.3 Image Configuration
Image , Configuration includes Display Video/Audio, OSD, Video Mask, ROI Config and
Zoom/Focus.
1.3.1 Display Configuration
Go to ImageΓ Display rightness, interface as shown below. You can set and adjust the picture’s b
c h ontrast, ue and saturation, etc.
Brightness: Set the brightness level of the camera’s image.
Contrast: Set the color difference between the brightest and darkest parts.
Hue: Set the total color degree of the image.
Saturation: Set the degree of color purity. The purer the color is, the brighter the image is.
Sharpness: Set the resolution level of the image plane and the sharpness level of the image edge.
Transcendent IP Cameras v4: Operation Manual
15
Noise Reduction: Decrease the noise and make the image more thorough. Increasing the value will
make the noise reduction effect better but it will reduce the image resolution.
Backlight Compensation:
l Off: Close the backlight compensation function. It is the default mode.
l WDR
u As to the WDR scene, WDR will help the camera provide clear images when there are both very
bright and very dark areas simultaneously in the field of view by lowering the brightness of the bright
area and increasing the brightness of the lowlight area. High, middle and low can be selected.
u There will be some record a few secondsing lost for -during mode changing from non WDR to
WDR mode.
l HLC: Lower the brightness of the whole image by suppressing the brightness of the image’s
highlight area and reducing the size of the halo area.
l BLC: The exposure will begin automatically according to the scene for the goal of seeing the
darkest area of the image.
HFR:High frame rate mode. You may enable or disable it as needed.
Antiflicker:
l Off: C -f lose the anti licker function.
l 50Hz: M s ake sure the horizontal stripes will not appear in the image while the device is adjusting
the exposure automatically according to the brightness of the scene when the electric supply is 50Hz.
l 60Hz: M s ake sure the horizontal stripes will not appear in the image while the device is adjusting
the exposure automatically according to the brightness of the scene when the electric supply is 60Hz.
White Balance: Adjust the color temperature according to the environment automatically.
Frequency: 50H and 60H (50Hz= PAL(Europe) 60Hz= NTSC (North America))z z .
Day/night Mode : Please choose the mode as needed.
Auto= will change to Black & White in low light
Day= Camera will be in color all the time
Night= Camera will be in Black & White all the time
Schedule= set a particular time the camera switches to Night mode or Day mode
Sensitivity: High, middle and low can be selected.
Infrared Mode: You may choose β€œON”, β€œOFF” and β€œAuto” as required.
Exposure Mode: You may choose β€œ ” β€œ ” Auto or Manual as required.
Corridor Pattern: You can change the direction of the video image by using this function. 0, 90, 180
and 270 are available. The default value is 0. The video resolution should be 1080P or under 1080P if
you use this function.
Image Mirror: Reverse the current video image right and left.
Image Flip: Turn the current video image upside down.
1.3.2 Video / Audio Configuration
Go to / Audio ImageΓ Video interface as shown below. In this interface, you can set the resolution,
frame rate, bitrate type, video quality and so on subject to the actual network condition.
Transcendent IP Cameras v4: Operation Manual
16
Click β€œAudio” tab to go to the interface as shown below.
Three video streams can be adjustable.
Resolution: The higher the resolution is, the clearer the image is.
Frame rate: The higher the frame rate is, the more fluid the video is. However, more storage room
will be taken up.
Bitrate type: Including CBR and VBR. CBR means that no matter how the video changes , the
compression bitrate keeps constant. This will not only facilitate the image quality better in a constant
bitrate but also help to calculate the capacity of the recording. VBR means that the compression bitrate
can be adjustable according to the change of the video resources. This will help to optimize the
network bandwidth.
Bitrate: Please choose it according to the actual network situation.
Video Quality : When VBR is selected, you need to choose image quality. The higher the image
quality you choose, the more bitrate will be required.
I Frame interval: It is recommended to use the default value. If the value is read speed of to high, the
the group of pictures will be slow resulting in the quality loss of the video.
Video Compression: H264 and H265 are optional. Higher quality of image can be transferred under
limited network bandwidth by using H265 video however, higher quality of the hardware is encoding;
required.
Profile: Baseline, main profile/high s d are optional. Baseline profile is mainly use in interactive
application with low complexity and delay profile is mainly used for higher coding . Main/high
requirement.
Send Snapshot: Please select according to the actual situation.
Video encode slice split: If enabled, you may get image even though using a more fluid a
low- performance PC.
Watermark: If enabled, input the watermark . You may check the watermark when playing content
back the local record in the search interface, the record has beening unless ing file tampered . with
Audio Encoding : G G 711A and 711U are selectable.
Audio Type: MIC and LIN are selectable.
Transcendent IP Cameras v4: Operation Manual
17
1.3.3 OSD Configuration
Go to ImageΓ OSD interface as shown below.
You can set the time stamp, device name and OSD content here. After enabling the corresponding display
and entering the content, drag them to change their position. Then click β€œSave” button to save the settings.
1.3.4 Video Mask
Go to as shown belowImageΓ Video Mask interface . s You can set 4 mask area at most.
To set up video mask:
1. Enable video mask.
2. Click β€œDraw Area” button and then drag the mouse to draw the video mask area.
3. Click β€œSave” button to save the settings.
4. Return to live view to see the following picture.
Transcendent IP Cameras v4: Operation Manual
18
Clear the video mask:
Go to video mask interface and then click β€œClear” button to delete the current video mask area.
1.3.5 ROI Configuration
Go to ImageΓ ROI Config interface as shown below.
1. Check β€œEnable” and then click β€œDraw Area” button.
2. Drag the mouse to set the ROI area.
3. Set the level.
4. Click β€œSave” button to save the settings.
Now, you will see the selected ROI area is clearer than other areas especially in a low bitrate condition.
Transcendent IP Cameras v4: Operation Manual
20
Move the β€œSensitivity” scroll bar to set the sensitivity.
Select β€œAdd” and click β€œDraw” button and drag mouse to select the motion detection area; Select
β€œErase” and drag the mouse to clear motion detection area.
Select β€œSelect All” to select the whole image for motion
Select β€œClear All” to undo the whole picture
Select β€œInvert” to reverse the motion area
After that, click β€œSave” to save the settings.
3. Set the schedule of the motion detection. Click β€œSchedule” tab to go to the interface as shown below.
Week schedule
Transcendent IP Cameras v4: Operation Manual
22
1. Enable object removal detection and then select the detection type.
Enable Left Detection: The relevant alarms will be triggered if there are items left in the pre-defined
alarm area.
Enable Item Missing Detection: The relevant alarms will be triggered if there are items missing in the
pre- defined alarm area.
2. Set the alarm holding time that of motion and alarm trigger options. The setting steps are the same as
detection. Please refer to motion detection chapter for details.
3. Click β€œSave” button to save the settings.
4. Set the alarm area of the object removal detection. Click β€œArea” tab to go to the interface as shown
below.
Set the alarm area number and then input the alarm area name on the right side. You can add 4 alarm
areas at most.
Click β€œDraw Area” button and then click around the area where you want to set as the alarm area in the
image on the left (the alarm area should be a closed area) side . Click β€œStop Draw” button to stop
Transcendent IP Cameras v4: Operation Manual
23
drawing. Click β€œClear” button to delete the alarm area. Click β€œSave” button to save the settings.
5. Set the schedule of the . The setting steps of the schedule are the same with object removal detection
that of motion detection. Please refer to motion detection chapter for details.
β€» A S I pplication cenario llustration
1. Object removal detection cannot determine the objects’ ownership. For instance, there is an
unattended package in the station. Object removal detection can detect the package itself but it cannot
determine ownership of the package.
2. Try not to enable object removal detection when light changes dramatically s in the cene.
3. Try not to enable object removal detection if there are complex and dynamic environments in the
s cene.
4. Adequate light and clear scenery are very important to object removal detection.
Here we take some application scenarios for instance.improper
1.5.2 Exception
To set exception detection:
Go to ConfigΓ EventΓ Exception interface as shown below.
There are so many trees
near the road and cars
running on the road,
which make the scene too
complex to detect the
objects removal.
Transcendent IP Cameras v4: Operation Manual
26
Set the cordon number and direction. You can add 4 cordons at most.
Direction:A<- A- ->B, >B and A< B optional. It is the crossing direction of the intruder who crosses
over the alarm line.
A<->B: T he alarm will be triggered when the intruder crosses over the alarm line from B to A or from
A to B.
A- >B: T he alarm will be triggered when the intruder crosses over the alarm line from A to B.
A<-B : T he alarm will be triggered when the intruder crosses over the alarm line from B to A.
Click β€œDraw” button and then drag the mouse to draw a cordon in the image on the left side. Click
β€œStop” button to stop drawing. Click β€œClear” button to delete the cordons. Click β€œSave” button to save
the settings.
5. Set the schedule of the line crossing alarm. The setting steps of the schedule are the same with that
of motion detection. Please refer to motion detection chapter for details.
β€» A S I pplication cenario llustration
1. Auto-focusing function should not been enabled for line crossing detection. If enabled, the video
image will change so greatly that the algorithm will stop working temporarily.
2. Try not to enable line crossing detection when light changes dramatically s in the cene.
3 . Adequate light and clear scenery are very important to line crossing detection.
4. Adjust the camera to make the detection area in the center of the video image. Make sure no
obstructions are in the main crossing area. It is strongly recommended to make the obstructions (like
trees, bushes, flags, etc.) outside the detection area.
Here we take some application scenarios for instance.improper
1.5.4 Intrusion
Intrusion: The relevant alarms will be triggered if someone or something intrudes into the alarm areas
or moves -in the pre defined alarm areas.
Go to ConfigΓ  Γ Event Intrusion interface as shown below.
There are so many trees
near the road and cars
running on the road,
which make the scene
too complex to detect the
crossing objects.
Transcendent IP Cameras v4: Operation Manual
27
1. Enable region intrusion detection alarm and set the alarm holding time.
2. Set alarm trigger options. The setting steps are the same with that of motion detection. Please refer
to motion detection chapter for details.
3. Click β€œSave” button to save the settings.
4. Set the alarm area of the intrusion detection. Click β€œArea” tab to go to the interface as shown below.
Set the alarm area number You can add 4 alarm areas at most. on the right side.
Click β€œDraw Area” button and then click around the area where you want to set as the alarm area in the
image on the left side (the alarm area should be a closed area). Click β€œStop Draw” button to stop
drawing. Click β€œClear” button to delete the alarm area. Click β€œSave” button to save the settings.
5. Set the schedule of the intrusion detection. The setting steps of the schedule are the same with that of
motion detection. Please refer to motion detection chapter for details.
β€» A S I pplication cenario llustration
1. Auto-focusing function should not been enabled for intrusion detection. If enabled, the video image
Transcendent IP Cameras v4: Operation Manual
28
will change so greatly that the algorithm will stop working temporarily.
2. Try not to enable intrusion detection when light changes dramatically s e. in the cen
3 . Adequate light and clear scenery are very important to intrusion detection.
4 . Adjust the camera to make the detection area in the center of the video image. The detected object
should be in the detection area for about two seconds at least. Make sure no s are in the obstruction
main crossing area. It is strongly recommended to make the obstructions (like trees, bushes, flags, etc.)
outside the detection area.
Here we take some application scenarios for instance.improper
1.6 Network onfigurationC
1.6.1 TCP/IP
Go to ConfigΓ NetworkΓ TCP/IP interface as shown below. There are two ways for network
connection.
Use IP address -(take IPv4 for example) There are two options for IP setup: obtain an IP address
automatically by DHCP protocol and use the following IP address. Please choose one of options for the
The camera’ s angle of view
is not wide enough; there are
so many trees in the scene.
T he above mentioned
environment is too complex
to detect the intrusion.
Transcendent IP Cameras v4: Operation Manual
29
your requirements.
Use PPPoE-Click β€œPPPoE Config” tab to go to the interface as shown below Enable PPPoE and then .
e nter the user name and password from your ISP.
You can choose either way for the network connection. If you use PPPoE to connect internet, you will
get a dynamic WAN IP address. This IP address will change frequently. You may use the function of
IP change notification.
Click β€œIP Change Notification Config” to go to the interface as shown below.
Trigger Email: when the IP address of the device is changed, a new IP address will be sent to the
appointed mailbox automatically
Trigger FTP: when the IP address of the device is changed, a new IP address will be sent to FTP
server.
1.6.2 Port
Go to ConfigΓ NetworkΓ Port interface as shown below. HTTP port, Data port and RTSP port can be
set.
HTTP Port: The default HTTP port is 80. It be changed to any port which is not occupied.should
Data Port: The default data port is 9008. Please change it as required.
RTSP Port: The default port is 554. Please change it as required.
Transcendent IP Cameras v4: Operation Manual
30
1.6.3 Server Configuration
This function is mainly used for connecting network video management system.
1. Check β€œEnable”.
2. Check the IP address and port of the transfer media server in the Transcendent VMS. Then enable
the auto report in the when adding a new device. Next, input the remaining Transcendent VMS
information of the device in the Transcendent VMS. After that, the system will auto allot a device ID.
Please check it in the Transcendent VMS.
3. Input the above-mentioned server address, server port and device ID in the responding boxes. Click
β€œSave” button to save the settings.
1.6.4 DDNS
If your camera is set to use PPPoE as its default network connection, DDNS should be set for network
access. Before you set the DDNS, please make sure you have registered a domain name on the DDNS
server.
1. Go to ConfigΓ Network DDNS.Γ 
2. Apply for a domain name. Take www.dvrdyndns.com for example.
Input www.dvrdydns.com in the IE address bar to visit its website. Then click β€œRegistration” button.
Transcendent IP Cameras v4: Operation Manual
31
Create domain name.
After you successfully request your domain name, you will see your domain in the list.
3. Input the username, password, domain you apply for in the DDNS configuration interface.
4. Click β€œSave” button to save the settings.
1.6.5 SNMP
To get camera status, parameters and alarm information and remotely manage the camera, you can set
the SNMP function. Before using the SNMP, please download the SNMP software and set the
parameters of the SNMP, such as SNMP port, trap address.
1. Go to ConfigΓ NetworkΓ SNMP.
Transcendent IP Cameras v4: Operation Manual
33
1. Select β€œEnable”.
2. RTSP Port: Access port of the streaming media. The default number is 554.
3. RTSP Address: The RTSP address you need to input in the media player.
4. Check β€œ anonymous login…”.Allow
1.6.7 UPNP
If you enable this function, you can quickly access the camera via LAN and you don’t need to
configure the port mapping when the camera is connected to the WAN via the router.
Go to ConfigΓ NetworkΓ UPnP. Enable UPNP and then input UPnP name.
After you enable it and set the UPnP name, you will see the UPnP name by clicking β€œNetwork” on the
desktop of your computer which is in the same local area network. Then double click this name to
access the camera quickly.
1.6.8 Email
If you need to trigger Email when an alarm happens or IP address is changed, please set the Email here
first.
Go to ConfigΓ Network Γ Email.
Transcendent IP Cameras v4: Operation Manual
34
Sender Address: Sender’s e-mail address.
User name and password: Sender’s user name and password.
Server Address : The SMTP IP address or host name.
Select the secure connection type at the Secure Connectionβ€œ ” -pull down list according to a . ctual needs
SMTP Port: The SMTP port.
Send Interval(S): Set it as needed.
Click β€œTest” button to test the effectiveness of the account.
Recipient ddress A : R - . eceiver’s e mail address
1.6.9 FTP
After you set the FTP server, the captured pictures on an alarm will be uploaded to the FTP server.
Go to ConfigΓ Network Γ FTP.
Transcendent IP Cameras v4: Operation Manual
35
To Add FTP:
Server Name: The name of the FTP.
Server Address: The IP address or domain name of the FTP.
Upload Path: The path of uploading the files.
Port: The port of the FTP.
Use Name and Password: The username and password are used to login the FTP.
4.1 Security Configuration
1.6.10 User onfigurationC
Go to ConfigΓ SecurityΓ User interface as shown below.
Add user:
1. Click β€œAdd” button to pop up the following textbox.
Transcendent IP Cameras v4: Operation Manual
36
2. Input user name in β€œUser Name” textbox.
3. Input letters or numbers in β€œPassword” and β€œConfirm Password” textbox.
4. Choose the use type.
5. Input the MAC address of the PC in β€œBind MAC” textbox.
After binding physical address to the IP-CAM, you can access the device on this PC only. If the MAC
address was β€œ00:00:00:00:00:00” which means it can be connected to any computers.
6. Click β€œOK” button and then the new added user will display in the user list.
Modify user:
1. Select the user you need to modify password and physical address in the user configuration list box.
2. The β€œEdit user” dialog box pops up by clicking β€œModify” button.
3. Input old password of this user in the Password” text box. β€œOld
4. Input new password in the β€œNew password” and β€œConfirm Password” text box.
5. Input computer’s MAC address as required.
6. Click β€œOK” button to . save the settings
Delete user:
1. Select the user you want to delete in the user configuration list box.
2. Click β€œDelete” button to delete the user.
Note: The default super administrator cannot be deleted.
Transcendent IP Cameras v4: Operation Manual
38
l Import & Export Settings
You can import or export the setting information from PC or to PC.
1. Click β€œBrowse” to select save path for import or export information on PC.
2. Click β€œImport Setting” or β€œExport Setting” button.
l Default Settings
Click β€œLoad Default” button to restore all system settings to default status.
1.6.14 Reboot
Go to ConfigΓ MaintenanceΓ Reboot.
Click β€œReboot” button to reboot the device.
Timed Reboot Setting:
Enable β€œTime Settings”, set the date and time and then click β€œSave” button to save the settings.
1.6.15 Upgrade
Go to Config Upgrade. In this interface, you can upgrade the system.Γ MaintenanceΓ 
1. Click β€œBrowse” button to select the save path of the upgrade file
2. Click β€œUpgrade” button to start upgrading the application program.
3. The device will restart automatically
4. After you successfully update the software, click β€œOK” button to close IE and then re-open IE to
connect IP- Cam.
Caution! - You can’t disconnect the PC or close the IP CAM during upgrade.


Product specificaties

Merk: Vitek
Categorie: Niet gecategoriseerd
Model: VTC-TNT4RFS

Heb je hulp nodig?

Als je hulp nodig hebt met Vitek VTC-TNT4RFS stel dan hieronder een vraag en andere gebruikers zullen je antwoorden




Handleiding Niet gecategoriseerd Vitek

Handleiding Niet gecategoriseerd

Nieuwste handleidingen voor Niet gecategoriseerd