HIKVISION-logo

HIKVISION DS-7608NI-I2 Network Video Recorder

HIKVISION-DS-7608NI-I2-Network-Video-Recorder-product

Specifications

  • Product: Network Video Recorder
  • Manufacturer: Hangzhou Hikvision Digital Technology Co., Ltd.
  • After-sales Service: Available in the country or region of purchase
  • Intellectual Property Rights: Owned by Hikvision
  • Compliance: CE, FCC, EMC Directive, LVD Directive, RoHS Directive

Product Usage Instructions

  • About the Product
    • The Network Video Recorder is a device used for recording and managing video footage from connected cameras. It is manufactured by Hangzhou Hikvision Digital Technology Co., Ltd. and is designed to provide reliable video recording and playback functionality.
  • Legal Information
    • The user manual contains important instructions for using the product. It is subject to change without notice due to firmware updates. For the latest version, visit the Hikvision website. Use the document with the guidance of professionals trained in supporting the product.
  • Acknowledgment of Intellectual Property Rights
    • Hikvision owns copyrights and patents related to the technology in the product. No part of the document may be copied, translated, or modified without written permission. Trademarks and logos mentioned belong to Hikvision or their respective owners.
  • Regulatory Information
    • FCC Information: The device complies with FCC Rules and must not cause harmful interference. It must accept any received interference.
    • EU Conformity Statement: The product and supplied accessories comply with European standards listed under various directives. Proper recycling methods should be followed for disposal.

FAQs

  • Q: Where can I find the latest version of the user manual?
  • Q: How do I obtain after-sales service for the product?
    • A: After-sales service is available in the country or region where the purchase was made. Contact local authorized service centers for assistance.
  • Q: Can I copy or modify any part of the user manual?
    • A: No, you cannot copy, translate, or modify any part of the user manual without written permission from Hikvision.

“`

Network Video Recorder
User Manual

Network Video Recorder User Manual
Legal Information
About this Document
This Document includes instructions for using and managing the Product. Pictures, charts, images and all other information hereinafter are for description and explanation only.
The information contained in the Document is subject to change, without notice, due to firmware updates or other reasons. Please find the latest version of the Document at the Hikvision website ( https://www.hikvision.com). Unless otherwise agreed, Hangzhou Hikvision Digital Technology Co., Ltd. or its affiliates (hereinafter referred to as “Hikvision”) makes no warranties, express or implied.
Please use the Document with the guidance and assistance of professionals trained in supporting the Product.
About this Product
This product can only enjoy the after-sales service support in the country or region where the purchase is made.
If the product you choose is a video product, please scan the following QR code to obtain the “Initiatives on the Use of Video Products”, and read it carefully.

Acknowledgment of Intellectual Property Rights

Hikvision owns the copyrights and/or patents related to the technology embodied in the

Products described in this Document, which may include licenses obtained from third parties.

Any part of the Document, including text, pictures, graphics, etc., belongs to Hikvision. No part

of this Document may be excerpted, copied, translated, or modified in whole or in part by any

means without written permission.

and other Hikvision’s trademarks and logos are the properties of Hikvision in

various jurisdictions.

Other trademarks and logos mentioned are the properties of their respective owners.

The terms HDMI and HDMI High-Definition Multimedia Interface, and the HDMI Logo

are trademarks or registered trademarks of HDMI Licensing Administrator, Inc. in the United

States and other countries.

i

Network Video Recorder User Manual
LEGAL DISCLAIMER
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS DOCUMENT AND THE PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED “AS IS” AND “WITH ALL FAULTS AND ERRORS”. HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION, WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY, OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR INHERENT SECURITY RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW. ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS. YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN RIGHTS ABUSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS DOCUMENT AND THE APPLICABLE LAW, THE LATTER PREVAILS.
© Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
ii

Network Video Recorder User Manual
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. FCC compliance: This equipment has been tested and found to comply with the limits for pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected. Consult the dealer or an experienced radio/TV technician for help. FCC Conditions This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause
undesired operation.
EU Conformity Statement
This product and – if applicable – the supplied accessories too are marked with “CE” and comply therefore with the applicable harmonized European standards listed under the EMC Directive 2014/30/EU, LVD Directive 2014/ 35/EU, the RoHS Directive 2011/65/EU. 2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the
iii

Network Video Recorder User Manual
purchase of equivalent new equipment, or dispose of it at designated collection points. For more information see: http://www.recyclethis.info. 2006/66/EC (battery directive): This product contains a battery that cannot be disposed of as unsorted municipal waste in the European Union. See the product documentation for specific battery information. The battery is marked with this symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see: http://www.recyclethis.info .
iv

Network Video Recorder User Manual

Applicable Model

This manual is applicable to the following models. But not all the functions in this manual are supported for each model.

DS-7600NI-I2

Series

DS-7600NI-I2/P

DS-7700NI-I4

DS-7700NI-I4/P

DS-7600NI-M1/P DS-7608NI-M2
DS-7600NI-M2/P DS-7700NI-M4
DS-7700NI-M4/P

Table 1-1 Applicable Model Model
DS-7608NI-I2 DS-7616NI-I2 DS-7632NI-I2 DS-7608NI-I2/8P DS-7616NI-I2/16P DS-7632NI-I2/16P DS-7708NI-I4 DS-7716NI-I4 DS-7732NI-I4 DS-7708NI-I4/8P DS-7716NI-I4/16P DS-7732NI-I4/16P DS-7732NI-I4/24P DS-7604NI-M1/4P DS-7608NI-M2 DS-7616NI-M2 DS-7632NI-M2 DS-7608NI-M2/8P DS-7616NI-M2/16P DS-7716NI-M4 DS-7732NI-M4 DS-7764NI-M4 DS-7708NI-M4/8P

v

Network Video Recorder User Manual

Series
DS-9600NI-M8
DS-9600NI-M8/R
DS-9600NI-M16
DS-9600NI-M16/R
DS-7600NXI-M2/P/VPro DS-7600NXI-M2/VPro DS-7700NXI-M4/VPro DS-7700NXI-M4/16P/VPro DS-8600NI-M16

Model DS-7716NI-M4/16P DS-7732NI-M4/16P DS-7732NI-M4/24P DS-9616NI-M8 DS-9632NI-M8 DS-9664NI-M8 DS-96128NI-M8 DS-9616NI-M8/R DS-9632NI-M8/R DS-9664NI-M8/R DS-96128NI-M8/R DS-9616NI-M16 DS-9632NI-M16 DS-9664NI-M16 DS-96128NI-M16 DS-9616NI-M16/R DS-9632NI-M16/R DS-9664NI-M16/R DS-96128NI-M16/R DS-7608NXI-M2/8P/VPro DS-7616NXI-M2/16P/VPro DS-7608NXI-M2/VPro DS-7616NXI-M2/VPro DS-7716NXI-M4/VPro DS-7732NXI-M4/VPro DS-7716NXI-M4/16P/VPro DS-7732NXI-M4/16P/VPro DS-86128NI-M16

vi

Network Video Recorder User Manual

Series DS-9600NXI-M8/VPro
DS-9600NXI-M8R/VPro
DS-9600NXI-M16/VPro DS-9600NXI-M16R/VPro DS-7600NXI-I2/S DS-7600NXI-I2/P/S DS-7700NXI-I4/S DS-7700NXI-I4/P/S DS-8600NXI-I8/S DS-8600NXI-I8/24P/S

Model DS-9616NXI-M8/VPro DS-9632NXI-M8/VPro DS-9664NXI-M8/VPro DS-96128NXI-M8/VPro DS-9616NXI-M8R/VPro DS-9632NXI-M8R/VPro DS-9664NXI-M8R/VPro DS-96128NXI-M8R/VPro DS-9632NXI-M16/VPro DS-9664NXI-M16/VPro DS-96128NXI-M16/VPro DS-9632NXI-M16R/VPro DS-9664NXI-M16R/VPro DS-96128NXI-M16R/VPro DS-7608NXI-I2/S DS-7616NXI-I2/S DS-7632NXI-I2/S DS-7608NXI-I2/8P/S DS-7616NXI-I2/16P/S DS-7632NXI-I2/16P/S DS-7716NXI-I4/S DS-7732NXI-I4/S DS-7716NXI-I4/16P/S DS-7732NXI-I4/16P/S DS-8616NXI-I8/S DS-8632NXI-I8/S DS-8664NXI-I8/S DS-8632NXI-I8/24P/S

vii

Network Video Recorder User Manual

DS-9600NXI-I8/S

Series

DS-96000NI-H16R DS-96000NI-H20R

DS-96000NI-H30R

DS-9600NI-G8R iDS-6700NXI-M1/X
iDS-7600NXI-M1/X iDS-7600NXI-M2/X
iDS-7600NXI-M2/P/X iDS-7700NXI-M4/X iDS-7700NXI-M4/16P/X

Model DS-9616NXI-I8/S DS-9632NXI-I8/S DS-9664NXI-I8/S DS-96256NI-H16R DS-96256NI-H16R/LCD DS-96128NI-H20R DS-96128NI-H20R/LCD DS-96256NI-H20R DS-96256NI-H20R/LCD DS-96128NI-H30R DS-96128NI-H30R/LCD DS-96256NI-H30R DS-96256NI-H30R/LCD DS-9632NI-G8R iDS-6704NXI-M1/X iDS-6708NXI-M1/X iDS-6716NXI-M1/X iDS-7608NXI-M1/X iDS-7616NXI-M1/X iDS-7608NXI-M2/X iDS-7616NXI-M2/X iDS-7632NXI-M2/X iDS-7608NXI-M2/8P/X iDS-7616NXI-M2/16P/X iDS-7716NXI-M4/X iDS-7732NXI-M4/X iDS-7716NXI-M4/16P/X iDS-7732NXI-M4/16P/X

viii

Network Video Recorder User Manual

Series iDS-9632NXI-M8/X
iDS-9600NXI-M8R/X
iDS-9600NXI-M16/X iDS-9600NXI-M16R/X iDS-96000NXI-H16R
iDS-96000NXI-H24R

Model iDS-9632NXI-M8/X iDS-9664NXI-M8/X iDS-96128NXI-M8/X iDS-9632NXI-M8R/X iDS-9664NXI-M8R/X iDS-96128NXI-M8R/X iDS-9632NXI-M16/X iDS-9664NXI-M16/X iDS-9632NXI-M16R/X iDS-9664NXI-M16R/X iDS-96064NXI-H16R iDS-96128NXI-H16R iDS-96128NXI-H16R/LCD iDS-96128NXI-H24R iDS-96128NXI-H24R/LCD iDS-96256NXI-H24R iDS-96256NXI-H24R/LCD

ix

Network Video Recorder User Manual

Safety Instruction

Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user.
In the use of the product, you must be in strict compliance with the electrical safety regulations of the nation and region.
Firmly connect the plug to the power socket. Do not connect several devices to one power adapter. Power off the device before connecting and disconnecting accessories and peripherals.
Shock hazard! Disconnect all power sources before maintenance. The equipment must be connected to an earthed mains socket-outlet. The socket-outlet shall be installed near the device and shall be easily accessible. For the device with the sign indicating hazardous live, the external wiring connected to the
terminals requires installation by an instructed person. Never place the device in an unstable location. The device may fall, causing serious personal
injury or death. Input voltage should meet the SELV (Safety Extra Low Voltage) and the LPS (Limited Power
Source) according to the IEC62368. High touch current! Connect to earth before connecting to the power supply. If smoke, odor or noise rise from the device, turn off the power at once and unplug the power
cable, and then please contact the service center. Use the device in conjunction with an UPS, and use factory recommended HDD if possible. This equipment is not suitable for use in locations where children are likely to be present. CAUTION: Risk of explosion if the battery is replaced by an incorrect type. Do not ingest battery. Chemical Burn Hazard! This product contains a coin/button cell battery. If the coin/button cell battery is swallowed, it
can cause severe internal burns in just 2 hours and can lead to death. Improper replacement of the battery with an incorrect type may defeat a safeguard (for
example, in the case of some lithium battery types). Do not dispose of the battery into fire or a hot oven, or mechanically crush or cut the battery,
which may result in an explosion. Do not leave the battery in an extremely high temperature surrounding environment, which may
result in an explosion or the leakage of flammable liquid or gas. Do not subject the battery to extremely low air pressure, which may result in an explosion or the
leakage of flammable liquid or gas. Dispose of used batteries according to the instructions. Keep body parts away from fan blades and motors. Disconnect the power source during
servicing. Keep body parts away from motors. Disconnect the power source during servicing. Use only power supplies same with the original model, or LPS power supplies with the same
voltage and electric current.
x

Network Video Recorder User Manual

Preventive and Cautionary Tips

Before connecting and operating your device, please be advised of the following tips:

The device is designed for indoor use only. Install it in a well-ventilated, dust-free environment

without liquids.

Ensure recorder is properly secured to a rack or shelf. Major shocks or jolts to the recorder as a

result of dropping it may cause damage to the sensitive electronics within the recorder.

The device shall not be exposed to water dripping or splashing, and no objects filled with liquids,

such as vases, shall be placed on the device.

No naked flame sources, such as lighted candles, should be placed on the device.

The ventilation should not be impeded by covering the ventilation openings with items, such as

newspapers, table-cloths, curtains. The openings shall never be blocked by placing the device on

a bed, sofa, rug, or other similar surface.

For certain models, ensure correct wiring of the terminals for connection to an AC mains supply.

For certain models, the equipment has been designed, when required, modified for connection

to an IT power distribution system.

identifies the battery holder itself and identifies the positioning of the cell(s) inside the

battery holder.

+ identifies the positive terminal(s) of the device which is used with, or generates direct current,

and – identifies the negative terminal(s) of the device which is used with, or generates direct

current.

If the device has been powered off or placed for a long time, its coin/button cell battery may run

out power.

When the coin/button cell battery runs out power, the system time would be incorrect, please

contact the after-sales service to replace the battery.

Keep a minimum 200 mm (7.87 inch) distance around the equipment for sufficient ventilation.

For certain models, ensure correct wiring of the terminals for connection to an AC mains supply.

Do not touch the sharp edges or corners.

When the device is running above 45 °C (113 °F), or its HDD temperature in S.M.A.R.T. exceeds

the stated value, please ensure the device is running in a cool environment, or replace HDD(s) to

make the HDD temperature in S.M.A.R.T. below the stated value.

Provide a surge suppressor at the inlet opening of the device under special conditions such as

the mountain top, iron tower, and forest.

Do not touch the bare components (such as the metal contacts of the inlets) and wait for at least

5 minutes, since electricity may still exist after the device is powered off.

The USB port of the equipment is used for connecting to a mouse, keyboard, USB flash drive, or

Wi-Fi dongle only. The current for the connected device shall be not more than 0.1 A.

The serial port of the device is used for debugging only.

If the power output port of the device does not comply with Limited Power Source, the

connected device powered by this port shall be equipped with a fire enclosure.

If a power adapter is provided in the device package, use the provided adapter only.

xi

Network Video Recorder User Manual
For the device with sticker or , pay attention to the following cautions: CAUTION: Hot parts! Do not touch. Burned fingers when handling the parts. Wait one-half hour after switching off before handling the parts.
If the device needs to be installed on the wall or ceiling, 1. Install the device according to the instructions in this manual. 2. To prevent injury, this device must be securely attached to the installation surface in accordance with the installation instructions.
Under high working temperature (40 °C (104 °F) to 55 °C (131 °F)), the power of some power adapters may decrease.
Make sure that the power has been disconnected before you wire, install, or disassemble the device.
If the device needs to be wired by yourself, select the corresponding wire to supply power according to the electric parameters labeled on the device. Strip off wire with a standard wire stripper at corresponding position. To avoid serious consequences, the length of stripped wire shall be appropriate, and conductors shall not be exposed.
If smoke, odor, or noise arises from the device, immediately turn off the power, unplug the power cable, and contact the service center.
xii

Network Video Recorder User Manual
Content Convention
In order to simplify description, please read the following conventions. Recorder or device mainly refers to video recorder. IP device mainly refers to network camera (IP camera), IP dome (speed dome), DVS (Digital
Video Server), or NVS (Network Video Server). Channel mainly refers to the video channel in video recorder.
xiii

Network Video Recorder User Manual

Symbol Conventions

The symbols that may be found in this document are defined as follows.

Symbol Danger Caution Note

Description
Indicates a hazardous situation which, if not avoided, will or could result in death or serious injury.
Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance degradation, or unexpected results.
Provides additional information to emphasize or supplement important points of the main text.

xiv

Network Video Recorder User Manual

Indicator and Interface Description

Front Panel Indicator Description
The indicators at the front panel indicates different working status of your device.

Indicator

Table 1-1 Common Indicator Description Description
The indicator turns on when device is powered up. The indicator flashes when data is being read from or written to HDD. The indicator flashes when network connection is functioning properly.

Interface Description

The panel interfaces vary with different models. Refer to the following table for common interface description.

HIKVISION-DS-7608NI-I2-Network-Video-Recorder-fig- (1) HIKVISION-DS-7608NI-I2-Network-Video-Recorder-fig- (2)

Item VIDEO IN VIDEO OUT AUDIO IN AUDIO OUT LINE IN USB VGA HDMI RS-485 RS-232 LAN eSATA GND

Table 1-2 Common Indicator Description Description
BNC interface for Turbo HD and analog video input. BNC connector for video output. RCA connector for audio input. RCA connector for audio output. RCA connector for two-way audio input. Universal Serial Bus (USB) interface for additional device. DB15 connector for local video output and menu display. HDMI interface for video output. RS-485 serial interface for pan/tilt unit, speed dome, etc. RS-232 interface for parameter configuration, or transparent channel. RJ-45 self-adaptive Ethernet interface. Storage and expansion interface for record or backup. Ground.

xv

Network Video Recorder User Manual

Item Power Switch Power Supply USIM Card
ALARM IN

Description
Switch for turning on/off the device.
100 to 240 VAC, 48 VDC, or 12 VDC power supply.
UIM/SIM card slot.
SMA antenna interface.
The alarm input receives alarm input signal. The equipment positive terminal (+) should connect to a number, and the equipment negative terminal (-) should connect to “-” or “G”. Use the following diagram as a connection example for alarm input.

ALARM OUT

The alarm output sends out alarm signal.
When an equipment uses DC power supply, its positive terminal (+) should connect to a number with “A”, and its negative terminal (-) should both connect to the corresponding number with “B”, and then connect to “-” or “G”. Use the following diagram as an alarm output connection example for DC equipment.

xvi

Network Video Recorder User Manual

Item

Description

When an equipment uses AC power supply, its positive terminal (+) should connect to a number with “A”, and its negative terminal (-) should connect to the corresponding number with “B”.
Use the following diagram as an alarm output connection example for AC equipment.

Note
For the reason that the AC load voltage could be high, please use an external relay for safety. Use the following diagram for reference.

KB

KB represents keyboard. Connect “D+” and “D-” to “T+” and “T-” respectively.

Use the following diagram for reference.

xvii

Network Video Recorder User Manual

Item

Description

RS-485

RS-485 is an electrical specification of a two-wire, half-duplex, multipoint serial connection. Connect “T+” and “T-” to “A+” and “B-” respectively.
Use the following diagram for reference.

Ctrl 12V/

Controllable 12 VDC and 0.5/1 A power output for external alarm device. The power will be turned on when the corresponding alarm output is triggered.
Use the following diagram for reference.

xviii

Network Video Recorder User Manual

Item

Description

DC 12V/

It provides 12 VDC and 1 A power output. Use the following diagram for reference.

xix

Network Video Recorder User Manual

HDD Installation

If your device does not support HDD hot swapping, disconnect the power from the device before installing a hard disk drive (HDD). A factory recommended HDD should be used for this installation. Scan the QR code below to view HDD installation videos.

HIKVISION-DS-7608NI-I2-Network-Video-Recorder-fig- (3)
Figure 1-1 HDD Installation
Bracket Installation
Bracket installation is applicable when it requires to remove the device cover, and install HDD on the internal bracket. Steps 1. Unfasten screws on the back, and push the cover backwards to remove the cover.
xx

Network Video Recorder User Manual
Figure 1-2 Remove Cover 2. Fix the HDD on the bracket with screws.
Note Please uninstall the upper layer bracket first before installing HDD on the lower layer bracket.
Figure 1-3 Fix HDD 3. Connect the data cable and power cable.
Figure 1-4 Connect Cable Note You can repeat the steps above to install other HDDs. 4. Reinstall the device cover and fasten screws.
Front Panel Plug-Pull Installation
Front panel plug-pull installation is applicable when you need to open the device front panel with key and install the HDD.
xxi

Network Video Recorder User Manual
Steps 1. Fix mounting ears to HDD with screws.

HIKVISION-DS-7608NI-I2-Network-Video-Recorder-fig- (4)Figure 1-5 Fix Mounting Ears to HDD 2. Unlock the front panel with the attached key, and press the buttons on both sides of the front
panel to open it.

HIKVISION-DS-7608NI-I2-Network-Video-Recorder-fig- (5)
Figure 1-6 Open Front Panel 3. Insert the HDD until it is fixed firmly.HIKVISION-DS-7608NI-I2-Network-Video-Recorder-fig- (6)
xxii

Network Video Recorder User Manual
Figure 1-7 Insert HDD 4. Optional: Repeat the steps above to install other HDDs. 5. Close the front panel and lock it with key.
HDD Case Installation
HDD case installation refers to the method that you install the HDD in the case, and then plug the HDD case into the slot. Steps 1. Unlock the front panel with panel key. 2. Pull the front panel out of the device and make it a little above the left handle.
Note The angle between the front panel and the device must be within 10°. 3. Press the blue button to pop up the handle and hold the handle and pull the HDD case out of the slot. 4. Fix the hard disk in the HDD case. 1) Place a HDD in the case. The SATA interface must face the case bottom. 2) Adjust the HDD position. Ensure the hard disk rear aligns with HDD bottom. 3) Use a screwdriver to fasten the four screws into the screw holes in both sides.
xxiii

Network Video Recorder User Manual
Figure 1-8 Fix HDD 5. Push the HDD case back into the slot.
Figure 1-9 Push HDD Case into Slot 6. Press the handle until you hear a click. Thus to fix the HDD case. Repeat above steps to install
the rest hard disk boxes. 7. Close the front panel, and lock it with the panel key.
Fix-on-Bottom Installation
Fix-on-bottom installation is applicable when you need to install and fix the HDD on the device bottom.
xxiv

Network Video Recorder User Manual
Steps 1. Remove the cover from device by unfastening the screws on panels.
Figure 1-10 Remove Cover 2. Connect the data cable and power cable.
1) Connect one end of data cable to the device motherboard. 2) Connect the other end of data cable to HDD. 3) Connect one end of power cable to HDD. 4) Connect the other end of power cable to the device motherboard.
Figure 1-11 Connect Cables 3. Set the device up, match HDD screw threads with the reserved holes on the device bottom, and
fix HDD with screws.
xxv

Network Video Recorder User Manual
Figure 1-12 Fix HDD to Device Bottom 4. Optional: Repeat the steps above to install other HDDs. 5. Reinstall the device cover and fasten screws.
xxvi

Network Video Recorder User Manual
Coin/Button Cell Battery Replacement
The coin/button cell battery should be replaced when the device has been powered off or placed for a long time, and the system time is incorrect. Before You Start Power off your device. Steps 1. Remove the device chassis cover. 2. Find the coin/button cell battery on motherboard. 3. Use tweezers to push the metal latch at the middle from its inside, and the battery would
automatically pop up.
Figure 1-1 Remove Battery 4. Take out the old battery and press a new battery with the same model in to the battery slot.
Note The battery positive terminal (+ identifies the positive terminal) should be placed upward.
xxvii

Network Video Recorder User Manual
Figure 1-2 Replace Battery 5. Reinstall the device chassis cover. What to do next If the system time is incorrect, please go to configure the time.
xxviii

Network Video Recorder User Manual
Chapter 1 Activate via Local Menu
For the first-time access, you have to set an admin password to activate your device. No operation is allowed before activation. You can also activate the device via web browser, SADP or client software. Before You Start Ensure your device is connected with a monitor and mouse. Steps 1. Power on your device. 2. Set the region or DST (Daylight Saving Time) parameters. 3. Select a system language. 4. Enter the admin password twice.
Caution We highly recommend you to create a strong password of your own choosing (using a minimum of 8 characters, including at least three kinds of following categories: upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you change your password regularly, especially in the high security system, changing the password monthly or weekly can better protect your product.
1

Network Video Recorder User Manual
Figure 1-1 Activate via Local Menu 5. Optional: Enter a password hint. It will help you remember your password when you forget. 6. Click Activate.
Note After the device is activated, you should properly keep the password. 7. Optional: Draw an unlock pattern. 8. Configure at least one password recovery method. What to do next Follow the wizard to set basic parameters.
2

Network Video Recorder User Manual
Chapter 2 Log In to Your Device
You have to log in to your device before operating the menu and other functions. Before You Start Ensure your device is activated. Steps 1. Power on your device. 2. Right click to display the shortcut menu. 3. Select an item as needed. For example, select Exit Full Screen, and you would automatically
enter the login interface.
Figure 2-1 Login 4. Use the unlock pattern to log in, or click Password Login to log in via user name and password.
Note Unlock pattern is only available for admin user. If you forget your unlock pattern or login password, click Forget Password at the password
login interface to reset your password, or use the password hint to remember.
3

Network Video Recorder User Manual
Chapter 3 User Interface Introduce
The device will enter the live view interface after it is powered on. Right click your mouse and select Exit Full Screen through the shortcut menu.
Figure 3-1 Main Function Page
Figure 3-2 Menu Bar Example
4

Network Video Recorder User Manual

Figure 3-3 Human and Vehicle Detection Example of Application Center

Table 3-1 Interface Introduction

Interface Name

Introduction

Task Bar

The opened applications are listed in the task bar. You can move and close each application tab.
Icon introduction
: Main menu. : Event center. Event alarms can be searched and viewed. : The download progress of each download task can be viewed here. : Shut down, log out, or reboot your device.

Application List All applications are displayed here. You can click one to configure it.

Navigation Bar Click to configure each function of the system.

Menu Bar

Configurable items of each application are listed here.

Note
For applications in Application Center, you can click display the menu bar.

, or right click to

5

Network Video Recorder User Manual
Chapter 4 Network Settings
Network parameters, platform access settings, and network services are configurable.
4.1 Network Parameter Settings
You shall configure network parameters before using functions that require network access.
4.1.1 Configure TCP/IP
TCP/IP must be properly configured before you operate video recorder over network or access network devices. Steps 1. Go to System System Settings Network Network TCP/IP .
Figure 4-1 TCP/IP Settings 2. Set Working Mode and Select NIC.
Multi-address The parameters of the two NIC cards can be configured independently. You can select LAN1 or LAN2 in the NIC type field for parameter settings. You can select one NIC card as default route. And then the system is connecting with the extranet and the data will be forwarded through the default route.
Net-fault Tolerance
6

Network Video Recorder User Manual
The two NIC cards use the same IP address, and you can set Main NIC to LAN1 or LAN2. By this way, in case of one NIC card failure, the video recorder will automatically enable the other standby NIC card so as to ensure the normal running of the whole system.
Note Working mode is only available for certain models. 3. Configure network parameters. – IPv4
DHCP If the DHCP server is available, you can enable DHCP to automatically obtain an IP address and other network settings from that server.
MTU The maximum transmission unit (MTU) is the size of the largest network layer protocol data unit that can be communicated in a single network transaction.
Auto Obtain DNS Server If DHCP is enabled. You can check Auto Obtain DNS Server to obtain Preferred DNS Server and Alternate DNS Server.
– IPv6 Router Advertisement If the router in the network supports IPv6, it is recommended to use this mode as default. Auto If there is a DHCPv6 device in the network, it is recommended to use this mode Manual Configuration You shall use this mode if you are going to manually enter IPv6 parameters.
4. Click Save.
4.1.2 Configure DDNS
Dynamic domain name server (DDNS) maps dynamic user IP addresses to a fixed domain name server. Before You Start Ensure you have registered DynDNS, PeanutHull, and NO-IP services with your ISP. Steps 1. Go to System System Settings Network Network DDNS .
7

Network Video Recorder User Manual

Figure 4-2 DDNS 2. Turn on Enable. 3. Select a DDNS type. 4. Set parameters, including service address, domain name, etc. 5. Click Save.
4.1.3 Configure PPPoE
If the device is connected to Internet through PPPoE, you need to configure user name and password accordingly. Contact your Internet service provider for details about PPPoE service.
Steps 1. Go to System System Settings Network Network PPPoE .

2. Turn on Enable. 3. Enter user name and password. 4. Click Save.

Figure 4-3 PPPoE

What to do next Go to System System Maintenance Running Info Network Status to view PPPoE status.

8

Network Video Recorder User Manual
4.1.4 Configure Multicast
Multicast can be configured to enable live view for cameras that exceed the maximum number allowed through network. Steps 1. Go to System System Settings Network Network Other . 2. Set Multicast parameters.
Note When adding device through network video security client, multicast group IP address should
be the same as the device multicast IP address. For IPv4, it covers Class-D IP ranging from 224.0.0.0 to 239.255.255.255 and it is
recommended to use an IP address ranging from 239.252.0.0 to 239.255.255.255. When adding a device to the CMS software, the multicast address must be the same as that of the device. 3. Click Save.
4.2 Platform Access Settings
4.2.1 Configure Hik-Connect
Hik-Connect provides mobile phone application and platform service to access and manage your video recorder, which enables you to get a convenient remote access to the video security system. Steps 1. Go to System System Settings Network Hik-Connect.
9

Network Video Recorder User Manual
Figure 4-4 Hik-Connect 2. Turn on Enable, and the service terms will pop up. 3. Accept the service terms. 4. Download Hik-Connect app.
– Use a smart phone to scan the QR code, and download Hik-Connect app. – Download the app from https://appstore.hikvision.com .
Figure 4-5 Download Hik-Connect 5. Register an account at the app. 6. Optional: Click More Settings to enable Stream Encryption, Platform Time Sync, and Adaptive
Bitrate Streaming, or edit Server IP Address. Stream Encryption
10

Network Video Recorder User Manual
It requires to enter verification code in remote access and live view after this function is enabled. Platform Time Sync The device will sync time with Hik-Connect instead of NTP server. Adaptive Bitrate Streaming When the network environment is poor, the device would automatically adjust video bitrate to ensure playing fluency. Server IP Address The Hik-Connect server IP address. 7. Click to set verification code. 8. Use Hik-Connect app to scan the device QR, and bind the device with your Hik-Connect account.
Note If the device is already bound with an account, you can click Unbind to unbind with the current account. Result If your device is connected with Hik-Connect, Connection Status will be Online. If your device is bound with a Hik-Connect account, Account Status will be Linked. What to do next You can access your video recorder via Hik-Connect.
4.2.2 Configure OTAP
OTAP (Open Thing Access Protocol) is an unified integrated standard and push-pull mode of HikVision protocol in the public network and private network. After OTAP is enabled, other applications may be able to remotely view videos through this protocol. Before You Start Ensure your device network is accessible through OTAP. Steps 1. Go to System System Settings Network Platform Access OTAP .
11

Network Video Recorder User Manual

2. Turn on OTAP. 3. Set the parameters. 4. Click Save.

Figure 4-6 OTAP

4.2.3 Configure ISUP
ISUP (Intelligent Security Uplink Protocol) provides APIs, library files, and commands for the thirdparty platform to access devices such as NVRs, speed domes, DVRs, network cameras, mobile NVRs, mobile devices, decoding devices, etc. With this protocol, the third-party platform can realize functions like live view, playback, two-way audio, PTZ control, etc.
Steps 1. Go to System CX System Settings Network Platform Access ISUP .

2. Turn on Enable.

Figure 4-7 ISUP 12

Network Video Recorder User Manual
Note If ISUP is enabled, the Hik-Connect access will automatically be disabled. 3. Set the related parameters. Server Address
The platform server IP address. Access Server Port
The platform server port, ranges from 1024 to 65535. The actual port shall be provided by the platform. Device ID Device ID shall be provided by the platform. Protocol Version ISUP protocol version, only ISUP 5.0 is available. Encryption Key Encryption password is required when using ISUP V5.0 version, it provides more secure communication between the device and platform. Enter it for verification after the device is registered to the ISUP platform. It cannot be empty, or “ABCDEF”. 4. Click Save. You can see the registration status (online or offline) after the device is restarted.
4.2.4 Configure SDK Service
SDK (Software Development Kit) service is used for third-party partners to integrate different functions. The enhanced SDK service adopts TLS protocol over the SDK service that provides safer data transmission. Steps 1. Go to System System Settings Network Platform Access SDK.
13

Network Video Recorder User Manual
Figure 4-8 SDK Service 2. Configure SDK and Enhanced SDK Service according to your requirement.
Note The port for Enhanced SDK Service is 8443 by default. 3. Optional: Enable Stream Over TLS. The stream over TLS encryption technology provides more secure stream transmission service. 4. Click Save.
4.2.5 Enable ISAPI
ISAPI (Internet Server Application Programming Interface) is an open protocol based on HTTP, which can realize the communication between the system devices (e.g., network camera, NVR, etc.). Go to System System Settings Network Platform Access ISAPI to enable the function.
4.2.6 Configure ONVIF
ONVIF protocol allows the connection with third-party cameras. The added user accounts have the permission to connect other devices via ONVIF protocol. Steps 1. Go to System CX System Settings Network Platform Access ONVIF .
14

Network Video Recorder User Manual

2. Turn on Enable. 3. Select an authentication type. 4. Click Add to add a user. 5. Set the user name and password.

Figure 4-9 ONVIF

Caution
We highly recommend you create a strong password of your own choosing (Using a minimum of 8 characters, including at least three of the following categories: upper case letters, lower case letters, numbers, and special characters.) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product 6. Click Save.

4.2.7 Configure Log Server
Logs can be uploaded to the log server for backup. Steps 1. Go to System System Settings Network Platform Access Log Server.

15

Network Video Recorder User Manual
Figure 4-10 Log Server 2. Turn on Enable. 3. Set Upload Time Interval, Server IP Address, and Port. 4. Optional: Click Test to check if parameters are valid. 5. Click Save.
4.3 Network Service Settings
4.3.1 Configure HTTP(S)
HTTP ((Hyper Text Transfer Protocol) and HTTPS (Hypertext Transfer Protocol Secure) ports are used for remote access through web browser. HTTPS protocol enables encrypted transmission and identity authentication, which improves the security of remote access. Steps 1. Go to System System Settings Network Network Service HTTP(S).
16

Network Video Recorder User Manual
Figure 4-11 HTTP(S) 2. Optional: Turn on HTTP or HTTPS. 3. View or edit Port of HTTP or HTTPS. 4. Set HTTP/HTTPS Authentication.
Authentication Type Two authentication types are selectable, for security reasons, it is recommended to select Digest as the authentication type.
Digest Algorithm Digest algorithms are based on HTTP/HTTPS and are mainly used for the digest authentication of user authentication.
5. Click Save.
4.3.2 Configure RTSP
RTSP (Real Time Streaming Protocol) is a network control protocol designed to control streaming media servers. You can specifically secure the stream data of live view by setting the RTSP authentication. Steps 1. Go to System System Settings Network Network Service RTSP .
17

Network Video Recorder User Manual
Figure 4-12 RTSP 2. Set parameters.
Port The port is 554 by default.
Authentication Type Two authentication types are selectable, if you select Digest, only the request with digest authentication can access the video stream by RTSP via the IP address. For security reasons, it is recommended to select Digest as the authentication type.
RTSP Digest Algorithm RTSP digest algorithm is based on RTSP, it is an algorithm for digest authentication of the user authentication.
3. Click Save.
4.3.3 Configure WebSocket(s)
WebSocket protocol, based on TCP, aims to provide full-duplex communication between web browsers and servers. It allows to open a two-way interactive communication session. Steps 1. Go to System System Settings Network Network Service WebSocket(s) . 2. Turn on Enable. 3. Set Port. 4. Click Save.
4.3.4 Configure Port Mapping (NAT)
Two ways are provided for port mapping to realize the remote access via the cross-segment network, UPnPTM (Universal Plug and Play), and manual mapping. UPnPTM can permit the device seamlessly discover the presence of other network devices on the network and establish functional network services for data sharing, communications, etc. You can use the UPnPTM function to enable the fast connection of the device to the WAN via a router without port mapping.
18

Network Video Recorder User Manual
Before You Start If you want to enable the UPnPTM function of the device, you must enable the UPnPTM function of the router to which your device is connected. When the network working mode of the device is set as multi-address, the Default Route of the device should be in the same network segment as that of the LAN IP address of the router. Steps 1. Go to System System Settings Network Network Service NAT .
Figure 4-13 Port Mapping (NAT) 2. Turn on Enable. 3. Set Mapping Mode.
Auto The port mapping items are read-only, and the external ports are set by the router automatically.
Manual You can manually edit the external port.
4. If Mapping Mode is selected as Manual, click to edit corresponding ports. Note
The value of the RTSP port number should be 554 or between 1024 and 65535, while the value of the other ports should be between 1 and 65535 and the value must be different from each other. If multiple devices are configured for the UPnPTM settings under the same router, the value of the port No. for each device should be unique.
External Port indicates the internal port number for port mapping in the router. 5. Click Save.
19

Network Video Recorder User Manual
What to do next Enter the virtual server settings page of router, then fill in the blank of internal/external source port with the internal/external port value, and other required contents.
20

Network Video Recorder User Manual
Chapter 5 User Management
There is a default account for administrator. The administrator user name is admin. Administrator has the permission to add, delete, and edit user. Guest and operator users only have limited permissions. Go to System System Settings User Management .

Figure 5-1 User Management

Icon/Button Add

Table 5-1 Icon/Button Description Description
Set account security. Add a new guest or operator user. Delete the selected user.

Note Before operation, you have to confirm the admin password.

21

Network Video Recorder User Manual
Chapter 6 Device Access
The video recorder may be able to access multiple device types, such as network camera, access control device, and alarm device. Please refer to the actual device for the access capability of your video recorder.
6.1 Access Video Device
There are several ways to access a video device.
6.1.1 Add Automatically Searched Online Network Camera
Network cameras on the same network segment can be automatically searched and added to the device. Steps 1. Go to System Device Access Device Video Device Online Device List . 2. Select the device(s) from the list.
Figure 6-1 Add Automatically Searched Online Network Camera 3. Click Add to Device List.
Note The device will use a default password to add network cameras, ensure the camera password
is the same as the default password. The default password can be configured in More Default Password Settings. If the searched network cameras are not activated, the device will use a default password to activate and add inactive network cameras. The default password can be configured in More Default Password Settings. When a network camera is successfully added, its status would be Online. You can click the device name to add its parameters.
22

Network Video Recorder User Manual 6.1.2 Add Network Camera Manually
Manually add the network cameras to your video recorder. Before You Start Ensure your network camera is on the same network segment with that of your video recorder. Ensure the network connection is valid and correct. Ensure the network camera is activated. Steps 1. Go to System Device Access Device Video Device .
Figure 6-2 Add Network Camera Manually 2. Click Add. 3. Enter network camera parameters.
Use Channel Default Password If it is enabled, the video recorder will add the camera by the set channel default password.
More Settings
23

Network Video Recorder User Manual
You can enable Verify Certificate to verify the camera with certificate. The certificate is a form of identification for the camera that provides more secure camera authentication. It requires to import the network camera certificate to the device first when you use this function. 4. Optional: Click Continue to Add to add other network cameras. 5. Click Add.
6.1.3 Add Network Camera through PoE
A PoE (Power over Ethernet) network camera can be directly connected to your device through the PoE interface at the rear panel. After using a network cable to connect a PoE network camera with your device, you shall configure the corresponding PoE interface. Refer to Configure PoE (Power over Ethernet) Interface for details.
6.1.4 Add Solar-Powered Camera through OTAP Protocol
Solar-powered cameras can be added to your device through OTAP protocol.
Before You Start Ensure the network between your device and solar-powered camera is accessible through OTAP protocol. Enter the context of your task here (optional).
Steps 1. Go to System Device Access Device Configuration Access Service OTAP Service. 2. Turn on Enable. 3. Set OTAP Server Port and Encryption Key. 4. Optional: Enable Auto Add IP Camera. After the device OTAP parameters are configured, the
newly signed network cameras (through OTAP protocol) can be automatically added to your device. 5. Configure the solar-powered camera OTAP protocol parameters through web browser. Refer to the camera user manual for details.
Note The solar-powered camera OTAP protocol parameters shall be the same as the device. 6. Add solar-powered camera(s) to your device. – If you have enabled Auto Add IP Camera, the newly signed network cameras (through OTAP
protocol) would automatically be added to your device. – Select solar-powered camera(s) from Online Device List, and click Quick Add. 7. Click Add in System Device Access Device Video Device, select Protocol as OTAP, and click Add.
24

Network Video Recorder User Manual
What to do next After a solar-powered camera is add to your device, you can wake it up, view its battery power,
view its live video, configure its parameters through web browser, etc. Set ANR (Automatic Network Replenishment) for the camera. Refer to Configure Recording
Schedule .
6.1.5 Add Network Camera via Custom Protocol
For network cameras that are not using standard protocols, you can configure custom protocols to add them. The system provides 8 custom protocols. Before You Start Ensure the network camera supports RTSP streaming. Prepare the URL (Uniform Resource Locator) for getting the main stream or sub-stream of
network cameras. Steps 1. Go to System Device Access Device Video Device . 2. Click More Custom Protocol Management , or Add Protocol Management .
Figure 6-3 Add Network Camera via Customized Protocol 3. Select a protocol type at the left side. 4. Set protocol parameters.
25

Network Video Recorder User Manual
Type The network camera adopting custom protocol must support getting stream through standard RTSP.
Transfer Protocol 3 types are selectable, including Auto, UDP, and RTP Over RTSP.
Port The port for RTSP streaming, its default value is 554.
Path Contact the manufacturer of network camera for the URL of getting main stream and substream. The general format is [Type]://[IP Address]:[Port]/[Resource Path], for example, rtsp://192.168.0.1:554/ch1/main/av_stream.
Note Protocol Name and Path can be automatically generated if you click a brand name below
Protocol Name. You can disable sub-stream if the camera does not support sub-stream or does not have to
use the sub-stream. 5. Click OK. 6. Click Add in System Device Access Device Video Device to manually add a network
camera.
6.1.6 Add Network Camera through Camera Configuration File
The information of added network cameras can be exported, including the IP address, port, password of admin, etc. And the exported camera configuration file content can be edited on your computer. After editing, the file can also be imported to other devices to add the cameras in the file. Before You Start Connect your video recorder to a USB flash drive that contains camera configuration file in it. Steps 1. Go to System Device Access Device Video Device . 2. Click Import to import the configuration file in USB flash drive. 3. Set the folder path. 4. Click Confirm.
6.2 Add Access Control Device
Access control devices can be added to your video recorder. The adding process is similar with Access Video Device .
26

Network Video Recorder User Manual
6.3 Add Audio Device
Audio devices can be added to your video recorder, such as IP speakers, and microphones. The adding process is similar with Access Video Device . If you link video channels with an IP speaker, the IP speaker could be used for voice broadcast. If you link video channels with a microphone, the microphone would be used as the audio input of the linked video channels for video recording.
6.4 Add POS Device
POS machine/server can be connected for certain device models. The device can receive transaction messages from POS machine/server, overlay transaction messages on the video image, and trigger POS event alarms. Steps 1. Go to System Device Access Device POS . 2. Click Add to add a POS device.

3. Set the POS device parameters. POS Protocol Universal Protocol

Figure 6-4 Add POS Device

27

Network Video Recorder User Manual
You can set the start line identifier, line break tag, and end line tag for the POS overlay characters, and the case-sensitive property of the characters. You can also optionally check the filtering identifier and the XML protocol. EPSON The fixed start and end line tag are used for EPSON protocol. AVE The fixed start and end line tag are used for AVE protocol. Serial port and virtual serial port connection types are supported. NUCLEUS The fixed start and end line tag are used for AVE protocol. Serial port and virtual serial port connection types are supported. The NUCLEUS protocol must be used in the RS-232 connection communication. Connection Mode TCP Connection When using TCP connection, the port must be set from 1 to 65535, and the port for each POS machine must be unique. UDP Connection When using UDP connection, the port must be set from 1 to 65535, and the port for each POS machine must be unique. USB-to-RS-232 Connection Configure the USB-to-RS-232 convertor port parameters, including the port serial number, baud rate, data bit, stop bit, and parity. RS-232 Connection Connect the device and the POS machine via RS-232. Multicast Connection When connecting the device and the POS machine via Multicast protocol, set the multicast address and port. Sniff Connection Connect the device and the POS machine via Sniff. Configure the source address and destination address settings. 4. Click Add.
Note After a POS device is add, you can click in Operation to configure POS text overlay.
28

Network Video Recorder User Manual 6.5 Channel Management
After a video device is added, you can view its channel number and channel name, and manage its parameters. This function is mainly used for a video device that contains more than one channel. Go to System Device Access Channel to manage channels of video devices.
29

Network Video Recorder User Manual
Chapter 7 Device Grouping
The added devices can be classified into different customized groups. Steps 1. Go to System Device Access Device Grouping .

2. Click to add a group.

Figure 7-1 Device Grouping

Note After a group is added, you can click / to edit/delete it. 3. Click Import to add channel(s) to the selected group.

30

Network Video Recorder User Manual
Chapter 8 Video or Audio Device Settings
You can configure the added video or audio device, such as privacy mask, image parameters, etc.
8.1 Enable H.265 Stream Access
The device can automatically switch to the H.265 stream of IP camera (which supports H.265 video format) for the initial access. Steps 1. Go to System Device Access Device Video Device . 2. Click More Auto Switch to H.265 . 3. Enable this function. 4. Click Save.
8.2 Configure Display Settings
Configure the OSD (On-Screen Display), image settings, exposure settings, day/night switch settings, etc. Go to System Device Access Device Configuration Device Parameter Video Device Display Settings. Select a camera, and configure parameters as your desire. OSD Settings
Configure the OSD (On-screen Display) settings for the camera, including date/time, camera name, etc. Image Settings Customize the image parameters including the brightness, contrast, and saturation for the live view and recording effect. Exposure Time Set the camera exposure time (1/10000 to 1 sec). A larger exposure value results in a brighter image. Day/Night Switch The camera can be set to day, night, or auto switch mode according to the surrounding illumination conditions. Backlight Set the camera’s wide dynamic range (0 to 100). When the surrounding illumination and the object have large differences in brightness, you should set the WDR value. Image Enhancement
31

Network Video Recorder User Manual
For optimized image contrast enhancement.
8.3 Configure Video Parameters
Video parameters would affect the live view image and recording file. Go to System Device Access Device Configuration Device Parameter Video Device Video Parameters. Select a camera, and configure parameters as your desire. Main Stream
Main stream refers to the primary stream that affects data recorded to the hard disk drive and will directly determine your video quality and image size. Comparing with the sub-stream, the main stream provides a higher quality video with higher resolution and frame rate. Sub-Stream Sub-stream is a second codec that runs alongside the mainstream. It allows you to reduce the outgoing internet bandwidth without sacrificing your direct recording quality. Sub-stream is often exclusively used by smartphone applications to view live video. Users with limited internet speeds may benefit most from this setting. Resolution Image resolution is a measure of how much detail a digital image can hold. The greater the resolution, the greater the level of detail. Resolution can be specified as the number of pixelcolumns (width) by the number of pixel-rows (height), e.g., 1024 × 768. Bitrate Type The bit rate (in kbit/s or Mbit/s) is often referred to as speed, but actually defines the number of bits/time unit rather than distance/time unit. Two types including variable or constant are available. Frame Rate It refers to the number of frames captured each second. A higher frame rate is advantageous when there is movement in the video stream, as it maintains image quality throughout. I-Frame Interval I-Frame also referred as intra picture, I-Frame is the first frame of every GOP (a video compression technology of MPEG). It can be viewed as pictures after compression. I-Frame interval is the amount of frames between two continuous I-Frames.
8.4 Configure Privacy Mask
The privacy mask protects personal privacy by concealing parts of the image from live view or recording with a masked area.
32

Network Video Recorder User Manual
Steps 1. Go to System Device Access Device Configuration Device Parameter Video Device
Privacy Mask.
Figure 8-1 Privacy Mask 2. Select a camera. 3. Turn on Enable. 4. Draw mask areas on the preview window. The areas will be marked with different frame colors.
Note Up to 4 privacy mask areas can be configured and the size of each area can be adjusted. 5. Click Save.
8.5 Configure Audio Parameter
After an audio device is added, you can configure its parameters in System Device Access Device Configuration Device Parameter Audio Device. For example, if an IP speaker is added, its name, audio output volume and audio quality can be configured.
33

Network Video Recorder User Manual
8.6 Configure OTAP Service
OTAP (Open Thing Access Protocol) is an unified integrated standard and push-pull mode of HikVision protocol in the public network and private network. After OTAP is enabled, other applications may be able to remotely view videos through this protocol. Before You Start Ensure your device network is accessible through OTAP protocol. Steps 1. Go to System Device Access Device Configuration Access Service OTAP Service.

2. Turn on Enable. 3. Set the parameters. 4. Click Save.

Figure 8-2 Configure OTAP Service

8.7 Batch Configuration
Connected devices can be configured in a batch. Steps 1. Go to System Device Access Device Configuration Batch Configuration .

34

Network Video Recorder User Manual
Figure 8-3 Batch Configuration 2. Configure IP address, time sync, OSD, or upgrade firmware as your desire.
Manual Time Sync Click Sync Time Now to manually sync time of all connected devices. This operation is just for once.
Schedule Time Sync The recorder would sync time of the selected devices according a fixed schedule.
3. For IP address configuration and time sync, click Save.
8.8 Configure PoE (Power over Ethernet) Interface
The PoE interfaces enable the device to transfer electrical power and data to connected PoE devices. And the PoE interface supports the Plug-and-Play function. Connectable PoE device number varies with device models. If you disable a PoE interface, you can also use it to connect to an online device. Before You Start Ensure your NVR support PoE function. Steps 1. Go to System Device Access Device Configuration PoE. 2. Enable Plug-and-Play function of PoE interfaces according to your requirement.
35

Network Video Recorder User Manual
3. Select the device type as IP Speaker or Camera. 4. If a PoE interface is used to connect a PoE camera, select the connection distance of network
cable. Long Distance
Long-distance (100 to 300 meters) network transmissions via PoE interface. Short Distance
Short-distance (< 100 meters) network transmission via PoE interface. Note
The PoE interfaces are enabled with the short distance mode by default. The bandwidth of IP camera connected to the PoE via long network cable (100 to 300 meters)
cannot exceed 6 MP. The allowed max. long network cable may be less than 300 meters depending on different IP
camera models and cable materials. When the transmission distance reaches 100 to 250 meters, you must use the CAT5E or CAT6
network cable to connect with the PoE interface. When the transmission distance reaches 250 to 300 meters, you must use the CAT6 network
cable to connect with the PoE interface. 5. Click Save. What to do next When PoE devices are connected, you can view the status and power of each PoE interface.
36

Network Video Recorder User Manual
Chapter 9 Storage Management
9.1 Manage HDD
A newly installed hard disk drive (HDD) must be initialized before using. You can format HDD, repair database, and view HDD status through HDD management interface. Before You Start Ensure the HDD is properly installed to your device. Steps 1. Go to System Storage Management Storage HDD Storage HDD .

Figure 9-1 Manage HDD 2. Optional: Perform the following operations as your desire.

Add Network HDD

Add a NAS or IP SAN.

Format

Format the selected HDD.

Repair Database

Repairing database will rebuild all databases. It might help to improve your system speed after upgrade.

Note
Repairing database will rebuild all databases. Existing data will not be affected, but local search and playback functions will not be available during the process, you can still achieve search and playback functions remotely via web browser, client software, etc.
Do not pull out the drive, or shut down the device during the process.

/

Remove/load HDD.

9.2 RAID Configuration
A disk array is a data storage virtualization technology that combines multiple physical disk drives into a single logical unit. Also known as a “RAID”, an array stores data over multiple HDDs to provide enough redundancy so that data can be recovered if one disk fails. Data is distributed

37

Network Video Recorder User Manual

across the drives in one of several ways called “RAID levels”, based the redundancy and performance required.

Caution RAID requires enterprise-level HDDs.
The functions in this section are only available for certain models. It is recommended to use the same model and capacity HDDs. There are two ways to create RAID. For one-touch creation, the default RAID type is RAID5. For manual creation, RAID0, RAID1, RAID5, RAID6, and RAID10 can be configured.

RAID0 RAID1 RAID5 RAID6 RAID10

Table 9-1 HDD Requirement for Each RAID Type

RAID Type

Required Number of HDDs

2

2

3

4

4 or 8

Note
The function is only available for certain models. When array exception event occurs, the corresponding linkage actions can be configured in
System System Settings Exception .

9.2.1 Create Disk Array
A disk array can be created after enabling array mode.
Before You Start Storage Mode is set to Quota in System Storage Management Storage Mode . Enough HDDs are correctly installed to the device. And HDDs for array creation are AI or
enterprise level.
Steps 1. Go to System Storage Management Storage HDD Array Management . 2. Click Enable Array Mode, or enable Array Mode.

38

Network Video Recorder User Manual
Figure 9-2 Enable RAID 3. Wait for the device to restart. 4. Go to System Storage Management Storage HDD Array Management again.

5. Create an array. Creation Method One-touch Array Configuration
Manual Creation

Figure 9-3 Array Management
Description Click One-touch Array Configuration.
Note By default, the array type created by one-touch configuration is RAID 5.
Click Create to manually create a RAID 0, RAID 1, RAID 5, RAID 6, or RAID 10 array.

39

Network Video Recorder User Manual

9.2.2 Rebuild Array
The array status includes Functional, Degraded, and Offline. To ensure the high security and reliability of the data stored in an array, take immediate and proper maintenance of the arrays according its status.
Steps 1. Go to System Storage Management Storage HDD Array Management . 2. Rebuild an array.

Table 9-2 Rebuilding Method

Rebuilding Method

Description

Auto Rebuild

There should be a hot spare disk in the array, and the hot spare disk capacity is not less than the disk with the minimum capacity in the array. Click in Operation column under Physical Disk to set a hot spare disk.
When an HDD in the array in the array is not working, the hot spare disk would be activated, and the array would be automatically rebuilt.

Note
After auto rebuild finishes, it is recommended to install another HDD, and configure it as the hot spare disk.

Manual Rebuild

If there is no hot spare disks in the array, you have to manually rebuild the array.
Go to System Storage Management Storage HDD Array Management , and select the hot spare disk in the list to rebuild.

9.2.3 Delete Array
Go to System Storage Management Storage HDD to click to delete the selected array.
9.2.4 View Firmware Info
You can view array firmware information and set the background task speed.

40

Network Video Recorder User Manual
Before You Start Ensure disk array is enabled. Steps 1. Go to System Storage Management Storage HDD Array Management . 2. Click Firmware Info. 3. Optional: Set Back Ground Task Speed.
9.3 Configure Storage Mode
Steps 1. Go to System Storage Management Storage Mode .
Figure 9-4 Storage Mode 2. Select Quota or Group.
Quota Each camera or audio device can be configured with an allocated quota for storing videos, pictures, or audios.
Group Multiple HDDs can be managed in groups. Video from specified channels can be recorded onto a particular HDD group through HDD settings.
3. Set corresponding parameters. Quota: Allocate space for storage objects. Group: Link channels to HDD groups.
9.4 Configure Other Storage Parameters
Go to System Storage Management Advanced Settings .
41

Network Video Recorder User Manual

Parameter Name HDD Sleeping Overwriting Save Camera VCA Data Max. Length per Video Tag Video Post-Record
eSATA Usage

Table 9-3 Parameter Description
Description
Select a mode for HDDs. Performance Mode, Balanced Mode, and Energy Saving Mode are selectable.
When HDD is full, it will continue to write new files by deleting the oldest files.
After saving VCA data of camera to your device, you will be able to search it in Event Center.
It is the time length of each video file when you exporting videos from the device.
After adding a tag to a video, it is the time you set to record after the scheduled time.
Note You can click during live view or playback to add a tag. For searching tag videos, go to Backup By Tag.
For devices with eSATA interface at the rear panel.
Set the usage for eSATA.

9.5 Mange USB Flash Drive
After inserting a USB flash drive in to your device, you can view its remaining storage capacity, manage its content, or format it.
When a USB flash drive is connected to your device for the first time, short operations can be performed, such as device upgrade and backup. Meanwhile, there would be a new icon displayed at the upper-right corner.

42

Network Video Recorder User Manual
Chapter 10 Schedule Configuration
The device will follow the schedule to store files to the disk.
10.1 Configure Schedule Template
After a schedule template is configured, you can use the template as the recording schedule. Steps 1. Go to System System Settings Template Configuration Holiday Schedule . 2. Click Add.

3. Turn on Enable. 4. Configure the holiday.

Figure 10-1 Add Holiday

Note
After holidays are configured, you will be able to set the holiday schedule independently. Holiday schedule has higher priority than normal schedule (from Mon to Sun).
5. Set Storage Schedule. 1) Click Storage Schedule. 2) Select a template name.

43

Network Video Recorder User Manual

Figure 10-2 Edit Template 3) Select a recording type. For example, Event. 4) Drag the cursor on time bar to draw the schedule.
Note After moving the cursor on time bar, you can also click
schedule. You can click Eraser to clear schedule.

to set specified time

Note
You can also click Configure Template to configure template in System Storage Management Storage Schedule Video Recording / Picture Capture / Audio Recording . 6. Click OK.

44

Network Video Recorder User Manual
10.2 Configure Recording Schedule
The camera would automatically start/stop recording according to the configured recording schedule. Steps 1. Go to System Storage Management Storage Schedule Video Recording .

Figure 10-3 Video Recording Configuration
2. Turn on Enable for a camera. 3. Select a schedule type.

Note

If you set Record Schedule as Custom, you can drag the cursor on time bar to set customized

record schedule, or move the cursor on time bar and click

to set specified time

schedule.

4. Click View to view the schedule.

45

Network Video Recorder User Manual

Figure 10-4 View Schedule 5. Optional: Click under Advanced Settings to set other advanced parameters.

Parameter Record Audio
ANR Pre-Record

Table 10-1 Advanced Parameter Description
Description
Enable or disable audio recording.
Note The channel shall have audio function, or have connected an audio device.
ANR (Automatic Network Replenishment) can automatically enable SD card of network camera to save the video in the condition of network disconnection, and can synchronize data after the network is recovered.
The time you set to record before the scheduled time or event. For example, when an alarm triggers the recording at 10:00, and if you set the pre-record time as 5 seconds, the camera records at 9:59:55.

46

Network Video Recorder User Manual

Parameter

Description

Post-Record

The time you set to record after the event or the scheduled time. For example, when an alarm triggered recording ends at 11:00, and if you set the post-record time as 5 seconds, it records till 11:00:05.

Stream Type

For Main Stream, its resolution is usually higher. For Sub-Stream, you can record for a longer time with the same storage space, but its resolution would be low. For Dual Stream, the device will record both main stream and sub-stream.

Video/Picture Expired Time

The expired time is period for a file to be kept in the HDD. When the deadline is reached, the file will be deleted. If you set the expired time to 0, the file will not be deleted. The actual keeping time for the file should be determined by the capacity of the HDD.

6. Optional: Select channels in the list, and use Batch Schedule Configuration and Batch Advanced Settings to configure channels in a batch.
7. Click Save.

10.3 Configure Picture Capture Schedule
The device would automatically capture live pictures according to the schedule. Steps 1. Go to System Storage Management Storage Schedule Picture Capture .

Figure 10-5 Picture Capture Configuration
2. Turn on Enable for a camera. 3. Select a schedule type.

Note

If you set Record Schedule as Custom, you can drag the cursor on time bar to set customized

record schedule, or move the cursor on time bar and click

to set specified time

schedule.

4. Click View to view the schedule.

47

Network Video Recorder User Manual

Figure 10-6 View Schedule 5. Click under Advanced Settings to set advanced picture parameters.

Table 10-2 Advanced Parameter Description

Parameter

Description

Capture Delay

The duration for picture capture.

Resolution

Set the resolution of the picture to capture.

Picture Quality

Set the picture quality to low, medium or high. High picture quality requires more storage space.

Interval

The time interval of capturing each live picture.

6. Optional: Select channels in the list, and use Batch Schedule Configuration and Batch Advanced Settings to configure channels in a batch.
7. Click Save.

48

Network Video Recorder User Manual

10.4 Configure Audio Recording

The device would automatically record audios according to the configured recording schedule.
Steps 1. Go to System Storage Management Storage Schedule Audio Recording . 2. Turn on Enable for a channel. 3. Select a schedule type.

Note

If you set Record Schedule as Custom, you can drag the cursor on time bar to set customized

record schedule, or move the cursor on time bar and click

to set specified time

schedule.

4. Click View to view the schedule. 5. Optional: Click under Advanced Settings to set other advanced parameters.

Table 10-3 Advanced Parameter Description

Parameter

Description

Pre-Record

The time you set to record before the scheduled time or event. For example, when an alarm triggers the recording at 10:00, and if you set the pre-record time as 5 seconds, the channel records at 9:59:55.

Post-Record

The time you set to record after the event or the scheduled time. For example, when an alarm triggered recording ends at 11:00, and if you set the post-record time as 5 seconds, it records till 11:00:05.

6. Optional: Select channels in the list, and use Batch Schedule Configuration and Batch Advanced Settings to configure channels in a batch.
7. Click Save.

49

Network Video Recorder User Manual
Chapter 11 Live View
11.1 Configure Live View Layout
Live view displays the video image of each camera in real time. Steps 1. Go to Live View. 2. Click at the lower-right corner. 3. Select a window division type, or click Custom to customize a new type as your desire. 4. Move the cursor on Default View in View. 5. Click at the right side of View. 6. Follow the step descriptions to adjust the live view image output interface. Besides the two ways
that are mentioned on the user interface, you can drag a channel from one window to another. 7. Click .
11.2 GUI Introduction
You can view live image, play live audio, capture pictures, perform instant playback, etc.
Figure 11-1 Live View (Type 1)
50

Network Video Recorder User Manual

Figure 11-2 Live View (Type 2)

Table 11-1 Interface Description

No.

Description

1

Channel list, PTZ control panel, and target detection list. If

you select a channel from the channel list, the device will

redirect to the corresponding window. If you click Target,

you can view live target detection results in the list, and

click to configure the corresponding settings.

2

Right-click shortcut menu. It will appear after right

clicking the cursor on the image area.

3

Channel tool bar.

Click to add a tag go the channel. After adding, you

can go to Backup By Tag to search videos by tag. You can select Show VCA Info to display rule frames.

4

Live view tool bar. Functions like Voice Broadcast, Display

VCA Info and Switch Output can be performed here.

51

Network Video Recorder User Manual

Note
You can scroll up/down your mouse to turn to previous/next screen. If channel image display exception occurs, the corresponding window would show the error
message, and you can directly click the text (in blue color) to edit the device settings.

11.3 PTZ Control

PTZ is the acronym for Pan, Tilt, and Zoom. After a PTZ camera is add to your device, the device would be allowed to pan left and right, tilt up and down, and zoom in and out.
Select a PTZ camera, and expend the PTZ control menu at the lower-left corner.

Task Preset
Patrol
Pattern

Table 11-2 PTZ Operation

Description

Operation

Presets record the PTZ position and the status of zoom, focus, iris, etc. You can call a preset to quickly move the camera to the predefined position.

Set a preset:
1. Select a preset. 2. Use to direction buttons to adjust the
image. 3. Click .

Call a preset: Click .

Patrols can be set to move the Set a patrol: PTZ to key points and have it stay 1. Select a patrol. there for a set duration before 2. Click . moving on to the next key point. 3. Add presets for the patrol. The key points are correspond to 4. Click OK. the presets.
Call a patrol: Click .

Patterns can be set by recording the movement of the PTZ. You can call the pattern to make the PTZ move according to the predefined path.

Set a pattern:
1. Click . 2. Use to direction buttons to adjust the
image, the device will record the movement. 3. Stop recording.

Call a pattern: Click .

Note If the PTZ panel cannot be used, please click to check the settings.

52

Network Video Recorder User Manual
Chapter 12 Playback
12.1 GUI Introduction
You can play back video or audio files.

Figure 12-1 Playback

Table 12-1 Interface Description

No.

Description

1

Area for selecting playback type.

2

Channel list.

3

Calendar for time selection.

4

Channel tool bar.

Click to add a tag to the channel. After adding, you

can go to Backup By Tag to search videos by tag. Click to lock the video. After a video is locked, it will

not be overwritten. After locking, you can go to Backup By Tag to search videos by lock.

53

Network Video Recorder User Manual

No.
5 6

Description
Select Dual-VCA to search videos that can trigger the corresponding event rule. Refer to the event configuration steps for details of each event type.
Note
In order to use this function, go to Configuration Device Access Device Configuration Device Parameter Display Info. on Scream to turn on Enable Dual-VCA via web browser, and go to System Storage Management Advanced Settings to turn on Save Camera VCA Data via local GUI interface. You can select Show VCA Info to display rule frames.
Playback timeline.
Position the cursor on the timeline, drag the timeline to position to a certain time.
Period marked with blue bar contains video. Red bar indicates the video in the period is event video.
Scroll up/down to zoom out/in timeline.
Playback tool bar.
Click to set normal video and smart video (the video that contains smart data) playback strategy.
Click (Smart Search), then follow the pop-up tips to draw event rule and search videos that can trigger the corresponding event rule. The operations are similar with Dual-VCA function.
Click to perform AcuSearch function. Refer to AcuSearch for details.
Click / to show videos that contain human/ vehicle.
Note
In order to use this function, ensure you have configured Detection Target as Human or Vehicle for certain event types.

54

Network Video Recorder User Manual
12.2 Normal Playback
Play back videos for a channel. For certain devices, synchronous playback may be allowed for several channels. Steps 1. Go to Playback . 2. Select channel(s) in the list at the left side.
Note Group playback: Select a group in the list, and channels in the group can be played back. 3. Select a date in the calendar.
Note The blue triangle at the calendar date corner indicates there are available videos. 4. Optional: Play back videos that contain human or vehicle targets. : Videos that contain human would be marked in red. : Videos that contain vehicle would be marked in red.
12.3 Event Playback
When you select the event playback mode, the system will analyze and mark videos that contain the motion detection, line crossing detection, or intrusion detection information Before You Start Ensure the camera has enabled Dual-VCA. You can enable it via the camera web browser
interface in Configuration Video/Audio Display Info. on Stream . Ensure your video recorder has enabled Save Camera VCA Data in Storage management
Advanced Settings . Steps 1. Select Playback . 2. Select a date in the calendar.
Note The blue triangle at the calendar date corner indicates there are available videos. 3. Click Dual-VCA at the lower-right corner of playback image to select a event type. Refer to the event configuration steps for details of each event type. 4. Click Search. Videos meet the detection rule requirement will be marked in red. 5. Click to set normal video and smart video (the video that contains smart data) playback strategy.
55

Network Video Recorder User Manual
Note If Dual-VCA is not used, red segments in progress bar means the smart videos are generated by the original event.
12.4 Slice Playback
Divide the video into slices and play them back. Steps 1. Go to Playback . 2. Select a camera from the camera list. 3. Select a date on the calendar. 4. Click Search.
The retrieved video will be divided into one-hour slices for playback. 5. Optional: Select an one-hour slice and click to divide it into one-minute slices for playback.
12.5 Sub-Period Playback
The video files can be played in multiple sub-periods simultaneously on the screen. Steps 1. Go to Playback . 2. Select a camera. 3. Set the start time and end time. 4. Click Search.
56

Network Video Recorder User Manual
Figure 12-2 Sub-Period Playback 5. Select the period at the lower-right corner, e.g., 4.
Note According to the defined number of split-screens, the video files on the selected date can be divided into average segments for playback. E.g., if there are video files existing between 16:00 and 22:00, and the 6-screen display mode is selected, then it can play the video files for 1 hour on each screen simultaneously.
57

Network Video Recorder User Manual

Chapter 13 Event Center

13.1 Event Settings

13.1.1 Basic/Generic Event

Steps 1. Go to Event Center Event Configuration Basic Event / Generic Event . 2. Select a channel. 3. Select an event type. 4. Turn on Enable. 5. Click Rule Settings to set the rule.

Table 13-1 Normal Event

Event Name Event Description

Rule Configuration

Motion Detection

Motion detection detects the moving objects in the monitored area.

Use the tool bar at the Sensitivity allows you to

top of image to draw the calibrate how easily

detection area.

movement could trigger

AI by NVR

the alarm. A higher value

The motion detection event will be analyzed by NVR. The device can

results in the more readily to triggers motion detection.

analyze videos that

contain human and

vehicle. Only the target

of selected type

(human or vehicle) will

trigger alarms, which

can reduce false

alarms that are caused

by other objects.

AI by Camera

The motion detection event will be analyzed by camera.

Detection Target

58

Network Video Recorder User Manual

Event Name Event Description

Rule Configuration

Human and Vehicle are selectable, apart from false alarms, only the selected target(s) can triggered alarms.

Video Tampering Detection

Video tampering detection triggered an alarm when the camera lens is covered and takes alarm response action(s).

Use the tool bar at the top of image to draw the detection area.

Video Loss Video loss detection

Detection detects video loss of a

channel and takes alarm

response action(s).

Audio

Audio exception

Exception detection detects

Detection abnormal sounds in the

scene, such as a sudden

increase/decrease in

sound intensity.

Defocus Image blur caused by lens Detection defocus can be detected.

Sudden Scene Change Detection

Scene change detection detects the change of the video security environment affected by external factors, such as the intentional rotation of the camera.

6. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

7. Click Linkage Method to set linkage methods.

59

Network Video Recorder User Manual

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-2 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

8. Click Save.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System Storage Management Storage Schedule Video Recording to configure video recording schedule.

13.1.2 Perimeter Protection
Perimeter protection events include line crossing detection, intrusion detection, region entrance detection, and region exiting detection.

Configure Line Crossing Detection
Line crossing detection detects people, vehicles, and objects crossing a set virtual line. The detection direction can be set as bidirectional, from left to right or from right to left. Steps
Note A part of the following steps are only available for certain NVR or camera models. 1. Go to Event Center Event Configuration Perimeter Protection.

60

Network Video Recorder User Manual
2. Select a camera. 3. Optional: Turn on Secondary Analysis. The corresponding device engine will analyze this event
for a second time to reduce false alarms. Note
At least one device engine should run Secondary Analysis for Perimeter Protection algorithm. You can click Allocate Engine at the right side to quickly allocate engine, or go to System Smart Settings Algorithm Configuration Algorithm Management to enable Secondary Analysis for Perimeter Protection algorithm. 4. Optional: Turn on AI by NVR. The corresponding device engine will analyze the video, and cameras only transmit video stream.
Note At least one device engine should run Perimeter Protection algorithm. You can click Allocate Engine at the right side to quickly allocate engine, or go to System Smart Settings Algorithm Configuration Algorithm Management to enable Perimeter Protection algorithm. 5. Select Line Crossing. 6. Turn on Enable.
Figure 13-1 Line Crossing Detection
61

Network Video Recorder User Manual

7. Click Rule Settings to detection rules. 1) Select a rule number. For example, select 1. 2) Click , and click on the image twice respectively to draw the start point and end point of the detection line. 3) Set Direction, Sensitivity, and Detection Target.
A<->B
Only the arrow on the B side shows. When an object goes across the configured line with both directions can be detected and alarms are triggered.
A->B
Only the object crossing the configured line from the A side to the B side can be detected.
B->A
Only the object crossing the configured line from the B side to the A side can be detected.
Sensitivity
The higher the value is, the more easily the detection alarm can be triggered.
Detection Target
Select Detection Target as Human or Vehicle to discard alarms which are not triggered by human or vehicle. Detection Target is only available for certain models. 4) Optional: Click / to draw Max. Size or Min. Size. Only targets that meet the size requirement can trigger alarms. 5) Optional: Repeat above steps to draw more rules. Up to 4 rules are supports. 8. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

9. Click Linkage Method to set linkage methods.

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email

Table 13-3 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.

62

Network Video Recorder User Manual

Linkage Method Alarm Output
Record

Description
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System Storage Management Storage Schedule Video Recording to configure video recording schedule.
10. Optional: Set Shield Area when AI by NVR is enabled. After a shield area is set, the device will not analyze target behavior in the area, so that the perimeter protection events will not be triggered within the area.
11. Click Save.
What to do next You can go to Live View and click Target to view real-time alarms.

Configure Intrusion Detection
Intrusion detection function detects people, vehicles or other objects that enter and loiter in a predefined virtual region. Specific actions can be taken when an alarm is triggered.
Steps
Note A part of the following steps are only available for certain NVR or camera models.
1. Go to Event Center Event Configuration Perimeter Protection. 2. Select a camera. 3. Optional: Turn on Secondary Analysis. The corresponding device engine will analyze this event
for a second time to reduce false alarms.
Note At least one device engine should run Secondary Analysis for Perimeter Protection algorithm. You can click Allocate Engine at the right side to quickly allocate engine, or go to System Smart Settings Algorithm Configuration Algorithm Management to enable Secondary Analysis for Perimeter Protection algorithm. 4. Optional: Turn on AI by NVR. The corresponding device engine will analyze the video, and cameras only transmit video stream.

63

Network Video Recorder User Manual
Note At least one device engine should run Perimeter Protection algorithm. You can click Allocate Engine at the right side to quickly allocate engine, or go to System Smart Settings Algorithm Configuration Algorithm Management to enable Perimeter Protection algorithm. 5. Select Intrusion. 6. Turn on Enable.
Figure 13-2 Intrusion Detection 7. Click Rule Settings to detection rules.
1) Select a rule number. For example, select 1. 2) Click , and click on the image 4 times respectively to draw each point of a quadrilateral
area. 3) Set Time Threshold, Sensitivity, and Detection Target.
Time Threshold The time an object loiter in the region. When the duration of the object in the defined detection area exceeds the threshold, the device will trigger an alarm.
Sensitivity
64

Network Video Recorder User Manual

The higher the value is, the more easily the detection alarm can be triggered.
Detection Target
Select Detection Target as Human or Vehicle to discard alarms which are not triggered by human or vehicle. Detection Target is only available for certain models. 4) Optional: Click / to draw Max. Size or Min. Size. Only targets that meet the size requirement can trigger alarms. 5) Optional: Repeat above steps to draw more rules. Up to 4 rules are supports. 8. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

9. Click Linkage Method to set linkage methods.

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-4 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System Storage Management Storage Schedule Video Recording to configure video recording schedule.
10. Optional: Set Shield Area when AI by NVR is enabled. After a shield area is set, the device will not analyze target behavior in the area, so that the perimeter protection events will not be triggered within the area.

65

Network Video Recorder User Manual
11. Click Save. What to do next You can go to Live View and click Target to view real-time alarms.
Configure Region Entrance Detection
Region entrance detection detects objects that enter a predefined virtual region. Steps
Note A part of the following steps are only available for certain NVR or camera models. 1. Go to Event Center Event Configuration Perimeter Protection. 2. Select a camera. 3. Optional: Turn on Secondary Analysis. The corresponding device engine will analyze this event
for a second time to reduce false alarms. Note
At least one device engine should run Secondary Analysis for Perimeter Protection algorithm. You can click Allocate Engine at the right side to quickly allocate engine, or go to System Smart Settings Algorithm Configuration Algorithm Management to enable Secondary Analysis for Perimeter Protection algorithm. 4. Optional: Turn on AI by NVR. The corresponding device engine will analyze the video, and cameras only transmit video stream.
Note At least one device engine should run Perimeter Protection algorithm. You can click Allocate Engine at the right side to quickly allocate engine, or go to System Smart Settings Algorithm Configuration Algorithm Management to enable Perimeter Protection algorithm. 5. Select Region Entrance. 6. Turn on Enable.
66

Network Video Recorder User Manual

Figure 13-3 Region Entrance Detection
7. Click Rule Settings to detection rules. 1) Select a rule number. For example, select 1. 2) Click , and click on the image 4 times respectively to draw each point of a quadrilateral area. 3) Set Sensitivity and Detection Target.
Sensitivity
The higher the value is, the more easily the detection alarm can be triggered.
Detection Target
Select Detection Target as Human or Vehicle to discard alarms which are not triggered by human or vehicle. Detection Target is only available for certain models. 4) Optional: Repeat above steps to draw more rules. Up to 4 rules are supports. 8. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

9. Click Linkage Method to set linkage methods.

67

Network Video Recorder User Manual

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-5 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System Storage Management Storage Schedule Video Recording to configure video recording schedule.
10. Optional: Set Shield Area when AI by NVR is enabled. After a shield area is set, the device will not analyze target behavior in the area, so that the perimeter protection events will not be triggered within the area.
11. Click Save.
What to do next You can go to Live View and click Target to view real-time alarms.

Configure Region Exiting Detection
Region exiting detection detects objects that exit from a predefined virtual region. Steps
Note A part of the following steps are only available for certain NVR or camera models. 1. Go to Event Center Event Configuration Perimeter Protection. 2. Select a camera.

68

Network Video Recorder User Manual
3. Optional: Turn on Secondary Analysis. The corresponding device engine will analyze this event for a second time to reduce false alarms. Note At least one device engine should run Secondary Analysis for Perimeter Protection algorithm. You can click Allocate Engine at the right side to quickly allocate engine, or go to System Smart Settings Algorithm Configuration Algorithm Management to enable Secondary Analysis for Perimeter Protection algorithm.
4. Optional: Turn on AI by NVR. The corresponding device engine will analyze the video, and cameras only transmit video stream. Note At least one device engine should run Perimeter Protection algorithm. You can click Allocate Engine at the right side to quickly allocate engine, or go to System Smart Settings Algorithm Configuration Algorithm Management to enable Perimeter Protection algorithm.
5. Select Region Exiting. 6. Turn on Enable.
Figure 13-4 Region Exiting Detection 7. Click Rule Settings to detection rules.
69

Network Video Recorder User Manual

1) Select a rule number. For example, select 1. 2) Click , and click on the image 4 times respectively to draw each point of a quadrilateral
area. 3) Set Sensitivity and Detection Target.
Sensitivity
The higher the value is, the more easily the detection alarm can be triggered.
Detection Target
Select Detection Target as Human or Vehicle to discard alarms which are not triggered by human or vehicle. Detection Target is only available for certain models. 4) Optional: Repeat above steps to draw more rules. Up to 4 rules are supports. 8. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

9. Click Linkage Method to set linkage methods.

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-6 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System

70

Network Video Recorder User Manual

Linkage Method

Description

Storage Management Storage Schedule Video Recording to configure video recording schedule.

10. Optional: Set Shield Area when AI by NVR is enabled. After a shield area is set, the device will not analyze target behavior in the area, so that the perimeter protection events will not be triggered within the area.
11. Click Save.

What to do next You can go to Live View and click Target to view real-time alarms.

13.1.3 Abnormal Behavior Event
Before You Start Ensure the camera supports this function.
Steps 1. Go to Event Center Event Configuration Abnormal Behavior Event . 2. Select a camera 3. Select an event type. 4. Turn on Enable. 5. Click Rule Settings to set the rule.

Table 13-7 Abnormal Behavior Events

Event Name

Event Description

Rule Configuration

Loitering Detection
Parking Detection
Unattended Baggage Detection

Loitering detection is used to detect whether a target stays within a specified area longer than the set time and trigger alarm for linked actions.

a. Select a rule number. b. Use the tool bar at the top of image to draw
the detection line. c. Set Time Threshold and Sensitivity.
Time Threshold

Parking detection is used to detect parking violation in the area, applicable in expressway and one-way street.

The time of the target staying in the region. If the value is 10, an alarm is triggered after the target has stayed in the region for 10 s. Range: [1-10].

Unattended baggage detection detects the objects left over in a predefined region such as the baggage, purses, dangerous materials, etc., and a series of actions

Sensitivity
Similarity of the background image to the object. The higher the value is, more

71

Network Video Recorder User Manual

Event Name

Event Description

Rule Configuration

Object Removal Detection

can be taken when the alarm

easily the detection alarm will be

is triggered.

triggered.

The object removal detection function detects the objects

d. Optional: Repeat the above steps to set another one.

removed from a predefined

region, such as the exhibits on

display, and a series of actions

can be taken when the alarm

is triggered.

Fast Moving Detection

Fast moving detection is used to detect suspicious running and chasing, over-speed, and fast moving. It will trigger alarm when an object is moving fast and send notification to arming host so that necessary actions can be taken in advance.

People Gathering Detection

People gathering detection is used to detect whether the density of human bodies within a specified area exceeds the set value and trigger alarm for linked actions.

a. Select a rule number. b. Use the tool bar at the top of image to draw
the detection line. c. Set Percentage. Percentage is the density of
human bodies within the area. If it exceeds the threshold value, the device will trigger alarm. d. Optional: Repeat the above steps to set another one.

6. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

7. Click Linkage Method to set linkage methods.

72

Network Video Recorder User Manual

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-8 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

8. Click Save.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System Storage Management Storage Schedule Video Recording to configure video recording schedule.

13.1.4 Target Event

Before You Start Ensure the connected camera supports this function, or the device engine has enabled Target Recognition or Video Structuralization algorithm in System Smart Settings Algorithm Configuration Algorithm Management .

Steps 1. Go to Event Center 2. Select a camera. 3. Select an event. 4. Turn on Enable. 5. Set event rules.

Event Configuration Target Event .

73

Network Video Recorder User Manual

Event Name

Event Description

Face Capture

The face capture detects and captures faces appearing in the scene. Linkage actions can be triggered when a human face is detected.

Face Picture Comparison

The function compares detected face pictures with specified list library. Trigger alarm when comparison succeeded.

Rule Configuration

Figure 13-5 Flow Diagram of Face Picture Comparison
Target Grading
74

Network Video Recorder User Manual

Event Name

Event Description

Rule Configuration

Face grading is used for face picture selection. According to pupil distance, tilt angle and pan angle, it only uses face pictures which satisfy grading requirement for analysis. Larger pupil distance, smaller tilt and pan angle, better it would be for analysis.
Non-Real-Time Mode
For places with a high flow of people, the device processing speed may not be fast enough, Non-Real-Time Mode will save the real-time pictures as cache, and process them later when engine has free resource. After enabling this function, all channels will be able to support face picture comparison. Non-Real-Time Mode will not trigger real-time alarm, so Arming Schedule is unavailable.
Linkage Succeeded / Linkage Failed
When comparison succeeded or failed, the corresponding linkage actions would be triggered. You can view the real-time comparison result in Target of Live View.

Multi-Target- Multi-target-type detection –

Type

enables the device to detect

Detection

the faces, human bodies and

vehicles simultaneously in a

scene.

6. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

7. Click Linkage Method to set linkage methods.

75

Network Video Recorder User Manual

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-9 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

8. Click Save.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System Storage Management Storage Schedule Video Recording to configure video recording schedule.

13.1.5 Thermal Camera Detection
The NVR supports the event detection modes of the thermal network cameras: fire and smoke detection, temperature detection, temperature difference detection, etc.
Before You Start Add the thermal network camera to your device and make sure the camera is activated.
Steps 1. Go to Event Center Event Configuration Thermal Event . 2. Select a camera. 3. Select an event type. 4. Turn on Enable. 5. Click Rule Settings to set the rule.

76

Network Video Recorder User Manual

Table 13-10 Thermal Events

Event Name

Event Description

Fire Detection

An alarm would be triggered when fire is detected in the arming area.

Temperature Detection

An alarm would be triggered when the temperature exceeds the threshold value.

Perimeter Protection

Perimeter protection events include line crossing detection, intrusion detection, region entrance detection, and region exiting detection.

6. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

7. Click Linkage Method to set linkage methods.

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-11 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System

77

Network Video Recorder User Manual

Linkage Method 8. Click Save.

Description
Storage Management Storage Schedule Video Recording to configure video recording schedule.

13.1.6 Alarm Input Event
Set the handling action of an external sensor alarm.
Steps 1. Go to Event Center Event Configuration Alarm Input Event . 2. Select an alarm input name.

Figure 13-6 Configure Alarm Input Note For example, Local<-1 represents the alarm input number at the device rear panel is 1. 3. Edit Alarm Name. 4. Turn on Enable.
78

Network Video Recorder User Manual

5. Set Quick Disarming. Quick disarming can disable the selected alarm linkage methods in a batch. 6. Set Alarm Type.

Note Refer to the alarm source to correctly configure the alarm type.
N.O When contacts are in natural and off-power state, if two contacts are off, then they can be called normal open.
N.C When contacts are in natural and off-power state, if two contacts are conducted, then they can be called normal closed.
7. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

8. Click Linkage Method to set linkage methods.

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-12 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

79

Network Video Recorder User Manual

Linkage Method 9. Click Save.

Description
Note Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System Storage Management Storage Schedule Video Recording to configure video recording schedule.

13.1.7 Audio Analysis Event

Steps 1. Go to Event Center Event Configuration Audio Analysis . 2. Select a channel. 3. Select an event type. 4. Turn on Enable. 5. Click Rule Settings to set the rule.

Table 13-13 Audio Analysis Event

Event Name Event Description

Rule Configuration

Audio Exception Detection

Audio exception detection detects abnormal sounds in the scene, such as a sudden increase/ decrease in sound intensity.

Sudden Increase of Sound Intensity Detection Detects a steep sound increase in the scene.
Sudden Decrease of Sound Intensity Detection Detects a steep sound drop in the scene.
Sensitivity The higher the value is, the easier the detection alarm can be triggered.

Sound Intensity Threshold

It can filter the sound in the environment. The louder the environment sound is, the higher the value should be. Adjust it according to the environment.

6. Click Arming Schedule to select an arming schedule type.

Note

If you set Arming Schedule as Custom, you can drag the cursor on time bar to set customized

arming schedule, or move the cursor on time bar and click

to set specified time

schedule.

7. Click Linkage Method to set linkage methods.

80

Network Video Recorder User Manual

Linkage Method Notify Surveillance Center
Alarm Pop-Up Window
Buzzer Send Email
Alarm Output
Record

Table 13-14 Linkage Method Description
Description
The device can send an exception or alarm signal to the remote alarm host when an event occurs. The alarm host refers to the PC installed with client software (e.g., iVMS-4200, iVMS-5200).
When an alarm is triggered, the local monitor displays the alarm pop-up window.
When an alarm is detected, the buzzer will make an audible beep.
The system can send an email with alarm information to a user or users when an alarm is detected.
The alarm output can be triggered by the alarm input, motion detection, video tampering detection, face detection, line crossing detection, and any all other events.
When an alarm is detected, the selected channel would record videos.

8. Click Save.

Note
Video recording schedule shall be enabled for the channel, otherwise this linkage would be invalid. You can go to System Storage Management Storage Schedule Video Recording to configure vid

Documents / Resources

HIKVISION DS-7608NI-I2 Network Video Recorder [pdf] User Manual
DS-7764NI-M4, ud39811b, DS-7608NI-I2 Network Video Recorder, DS-7608NI-I2, Network Video Recorder, Video Recorder, Recorder

References

Leave a comment

Your email address will not be published. Required fields are marked *