User Manual of iVMS-4200 Client Software iVMS-4200 Client Software User Manual User Manual of iVMS-4200 Client Software User Manual COPYRIGHT © 2017 Hangzhou Hikvision Digital Technology Co., Ltd. ALL RIGHTS RESERVED. Any and all information, including, among others, wordings, pictures, graphs are the properties of Hangzhou Hikvision Digital Technology Co., Ltd. or its subsidiaries (hereinafter referred to be “Hikvision”). This user manual (hereinafter referred to be “the Manual”) cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision. Unless otherwise stipulated, Hikvision does not make any warranties, guarantees or representations, express or implied, regarding to the Manual. About this Manual This Manual is applicable to iVMS-4200 Client Software. The Manual includes instructions for using and managing the product. Pictures, charts, images and all other information hereinafter are for description and explanation only. The information contained in the Manual is subject to change, without notice, due to firmware updates or other reasons. Please find the latest version in the company website (http://overseas.hikvision.com/en/). Please use this user manual under the guidance of professionals. Trademarks Acknowledgement and other Hikvision’s trademarks and logos are the properties of Hikvision in various jurisdictions. Other trademarks and logos mentioned below are the properties of their respective owners. Legal Disclaimer TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, IS PROVIDED “AS IS”, WITH ALL FAULTS AND ERRORS, AND HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, i User Manual of iVMS-4200 Client Software BUSINESS INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES. IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS. ii User Manual of iVMS-4200 Client Software Contents Chapter 1 Overview.......................................................................................................................... 8 1.1 Description ...................................................................................................................... 8 1.2 Running Environment ...................................................................................................... 8 1.3 Function Modules ............................................................................................................ 8 1.4 Update Instructions ....................................................................................................... 10 Chapter 2 User Registration and Login ........................................................................................... 11 Chapter 3 Device Management...................................................................................................... 12 3.1 Adding Device ................................................................................................................ 12 3.1.1 Activating Device ................................................................................................... 12 3.1.2 Adding Online Devices .......................................................................................... 14 3.1.3 Adding Devices by IP or Domain Name ................................................................. 20 3.1.4 Adding Devices by IP Segment .............................................................................. 21 3.1.5 Adding Devices by Hik-Connect Domain ............................................................... 22 3.1.6 Adding Devices by EHome Account....................................................................... 23 3.1.7 Adding Devices by Serial Port ................................................................................ 24 3.1.8 Adding Devices by IP Server .................................................................................. 25 3.1.9 Adding Devices by HiDDNS .................................................................................... 26 3.1.10 Importing Devices in Batch ................................................................................... 27 3.1.11 QR Code of Encoding Devices ............................................................................... 29 3.1.12 Checking Device’s Online Users ............................................................................. 30 3.2 Managing Group ............................................................................................................ 30 3.2.1 Adding Group ........................................................................................................ 31 3.2.2 Importing Channels to Group ................................................................................ 32 3.2.3 Modifying Channel Parameters ............................................................................. 32 3.2.4 Removing Channel from Group ............................................................................. 34 3.2.5 Deleting Group ...................................................................................................... 34 Chapter 4 Live View ........................................................................................................................ 35 4.1 Starting and Stopping Live View .................................................................................... 38 4.2 Auto-switch in Live View................................................................................................ 40 4.3 PTZ Control in Live View ................................................................................................ 41 4.3.1 Configuring Preset ................................................................................................. 42 4.3.2 Configuring Pattern ............................................................................................... 43 4.3.3 Configuring Patrol.................................................................................................. 43 4.4 Manual Recording and Capture ..................................................................................... 44 4.5 Instant Playback ............................................................................................................. 47 4.6 Custom Window Division............................................................................................... 49 4.7 Live View in Fisheye Mode ............................................................................................ 50 4.8 Starting Master-Slave Tracking ...................................................................................... 53 4.8.1 Configure Master-Slave Tracking Rule ................................................................... 53 4.8.2 Perform Master-Slave Tracking in Live View ......................................................... 55 4.9 Thermal Camera Live View ............................................................................................ 55 4.9.1 Viewing Fire Source Information During Live View ............................................... 55 1 User Manual of iVMS-4200 Client Software 4.9.2 Showing Temperature Information on Live View Image ....................................... 56 4.9.3 Measuring Temperature Manually ........................................................................ 56 4.9.4 Acknowledge Fire Source Detection Alarm ........................................................... 58 4.10 Other Functions in Live View ......................................................................................... 59 Chapter 5 Remote Storage Schedule Settings and Playback .......................................................... 60 5.1 Remote Storage ............................................................................................................. 60 5.1.1 5.1.2 5.2 Storing on DVR, NVR, or Network Camera ............................................................ 60 Storing on Storage Device ..................................................................................... 63 Remote Playback ........................................................................................................... 67 5.2.1 Normal Playback.................................................................................................... 68 5.2.2 Alarm Input Playback ............................................................................................ 72 5.2.3 Event Playback ....................................................................................................... 73 5.2.4 ATM Playback ........................................................................................................ 75 5.2.5 POS Playback ......................................................................................................... 76 5.2.6 Synchronous Playback ........................................................................................... 77 5.2.7 VCA Playback ......................................................................................................... 77 5.2.8 Fisheye Playback ................................................................................................... 79 5.2.9 Downloading Video Files ....................................................................................... 80 Chapter 6 Alarm Management ....................................................................................................... 85 6.1 Configuring Motion Detection Alarm ............................................................................ 85 6.2 Configuring Video Tampering Alarm.............................................................................. 88 6.3 Configuring Video Loss Alarm ........................................................................................ 89 6.4 Configuring Audio Exception Alarm ............................................................................... 90 6.5 Configuring Face Detection Alarm ................................................................................. 92 6.6 Configuring Line Crossing Detection Alarm ................................................................... 93 6.7 Configuring Alarm Input Linkage ................................................................................... 95 6.8 Configuring Device Exception Linkage ........................................................................... 96 Chapter 7 Alarm and Event Center ................................................................................................. 97 7.1 Viewing Alarms Information .......................................................................................... 98 7.2 Viewing Events Information ........................................................................................... 99 7.3 Viewing Pop-up Alarm Information ............................................................................. 100 Chapter 8 E-map Management .................................................................................................... 102 8.1 Adding an E-map ......................................................................................................... 102 8.2 Hot Spot Function ........................................................................................................ 103 8.2.1 Adding Hot Spots................................................................................................. 104 8.2.2 Modifying Hot Spots............................................................................................ 105 8.2.3 Previewing Hot Spots .......................................................................................... 105 8.3 Chapter 9 Hot Region Function .................................................................................................... 106 8.3.1 Adding Hot Regions ............................................................................................. 106 8.3.2 Modifying Hot Regions ........................................................................................ 107 8.3.3 Previewing Hot Regions....................................................................................... 108 Hik-Connect ................................................................................................................. 109 9.1 Registering a Hik-Connect Account ............................................................................. 109 9.2 Logging into Hik-Connect Account .............................................................................. 110 2 User Manual of iVMS-4200 Client Software 9.3 Device Management.................................................................................................... 110 9.3.1 Adding Device to Hik-Connect Account .............................................................. 111 9.3.2 Modifying Camera ............................................................................................... 112 9.4 Live View and Playback ................................................................................................ 113 Chapter 10 Forwarding Video Stream through Stream Media Server ........................................... 114 10.1 Importing Certificate to Stream Media Server ............................................................ 114 10.2 Adding Stream Media Server ....................................................................................... 115 10.2.1 Adding One Stream Media Server to Client ........................................................ 115 10.2.2 Batch Adding Stream Media Servers to Client .................................................... 116 10.3 Adding Cameras to Stream Media Server to Forward Video Stream .......................... 117 Chapter 11 Decoding and Displaying Video on Video Wall ............................................................ 119 11.1 Adding Encoding Device .............................................................................................. 119 11.2 Adding Decoding Device .............................................................................................. 121 11.3 Configuring Video Wall Settings .................................................................................. 122 11.3.1 Linking Decoding Output with Video Wall .......................................................... 122 11.3.2 Multi-Screen Display ........................................................................................... 124 11.3.3 Configuring Background ...................................................................................... 125 11.3.4 Configuring Virtual LED ....................................................................................... 126 11.4 Displaying Video on Video Wall ................................................................................... 127 11.4.1 Decoding and Displaying ..................................................................................... 127 11.4.2 Windowing and Roaming Settings ...................................................................... 129 11.4.3 Configuring Playback ........................................................................................... 130 11.4.4 Configuring Cycle Decoding ................................................................................. 131 Chapter 12 Security Control Panel ................................................................................................. 132 12.1 Configuring Zone Event................................................................................................ 132 12.2 Remote Control ........................................................................................................... 133 12.2.1 Partition Remote Control .................................................................................... 133 12.2.2 Zone Remote Control .......................................................................................... 134 12.3 Displaying Zone on E-map ........................................................................................... 135 12.3.1 Adding Zones as Hot Spots .................................................................................. 135 12.3.2 Modifying Hot Spots............................................................................................ 136 12.3.3 Previewing Hot Spots .......................................................................................... 137 12.4 Handling Alarms .......................................................................................................... 137 12.4.1 Real-time Alarm .................................................................................................. 138 12.4.2 Searching History Alarms .................................................................................... 139 12.4.3 Handling Panic Alarm .......................................................................................... 140 Chapter 13 13.1 Pyronix Control Panel .................................................................................................. 142 Device Management.................................................................................................... 142 13.1.1 Adding Pyronix Control Panel .............................................................................. 142 13.1.2 Authorizing iVMS-4200 via PyronixCloud ............................................................ 144 13.2 Configuring Event ........................................................................................................ 145 13.3 Remote Control ........................................................................................................... 146 13.3.1 Partition Remote Control .................................................................................... 147 13.3.2 Control Zone Remotely........................................................................................ 147 3 User Manual of iVMS-4200 Client Software 13.3.3 Chapter 14 14.1 14.2 14.3 14.4 Control Alarm Output Remotely ......................................................................... 148 Access Control ............................................................................................................. 150 Access Control Device Management ........................................................................... 151 14.1.1 Viewing Device Status ......................................................................................... 151 14.1.2 Network Settings ................................................................................................. 152 14.1.3 Capture Settings .................................................................................................. 154 14.1.4 RS-485 Settings .................................................................................................... 156 14.1.5 Wiegand Settings................................................................................................. 156 14.1.6 Authenticating M1 Card Encryption .................................................................... 157 Organization Management .......................................................................................... 158 14.2.1 Adding Organization ............................................................................................ 158 14.2.2 Modifying and Deleting Organization ................................................................. 158 Person Management ................................................................................................... 158 14.3.1 Adding Person ..................................................................................................... 159 14.3.2 Managing Person ................................................................................................. 169 14.3.3 Issuing Cards in Batch .......................................................................................... 169 Schedule and Template ............................................................................................... 171 14.4.1 Week Schedule .................................................................................................... 171 14.4.2 Holiday Group ..................................................................................................... 172 14.4.3 Template .............................................................................................................. 173 14.5 Permission Configuration ............................................................................................ 175 14.6 Advanced Functions .................................................................................................... 176 14.7 14.8 14.9 14.6.1 Access Control Parameters .................................................................................. 176 14.6.2 Card Reader Authentication ................................................................................ 179 14.6.3 Multiple Authentication ...................................................................................... 180 14.6.4 Open Door with First Card ................................................................................... 182 14.6.5 Anti-Passing Back ................................................................................................ 184 14.6.6 Cross-Controller Anti-passing Back ..................................................................... 184 14.6.7 Multi-door Interlocking ....................................................................................... 187 14.6.8 Authentication Password .................................................................................... 188 14.6.9 Relay Settings ...................................................................................................... 188 14.6.10 Custom Wiegand ................................................................................................. 190 14.6.11 Person in Blacklist ................................................................................................ 192 Configure Access Control Event Linkage ...................................................................... 193 14.7.1 Configuring Client Linkage for Access Control Alarm .......................................... 193 14.7.2 Configure Device Linkage for Access Control Alarm Input .................................. 194 14.7.3 Event or Card Linkage .......................................................................................... 194 14.7.4 Cross-Device Linkage ........................................................................................... 196 Searching Access Control Event ................................................................................... 197 14.8.1 Searching Local Access Control Event ................................................................. 197 14.8.2 Searching Remote Access Control Event ............................................................. 198 Door Status Management ........................................................................................... 198 14.9.1 Access Control Group Management ................................................................... 198 14.9.2 Controlling Door Status ....................................................................................... 199 4 User Manual of iVMS-4200 Client Software 14.9.3 Controlling Elevator Status .................................................................................. 200 14.9.4 Configuring Status Duration for Door .................................................................. 201 14.9.5 Configuring Status Duration for Floor ................................................................. 202 14.9.6 Real-time Card Swiping Record ........................................................................... 203 14.9.7 Real-time Access Control Alarm .......................................................................... 203 14.10 Controlling Door during Live View ............................................................................... 205 14.11 Displaying Access Control Point on E-map .................................................................. 205 14.11.1 Adding Access Control Point as Hot Spots........................................................... 206 14.11.2 Modifying Hot Spots............................................................................................ 206 14.11.3 Previewing Hot Spots .......................................................................................... 207 Chapter 15 15.1 Time and Attendance .................................................................................................. 208 Shift Schedule Management ....................................................................................... 208 15.1.1 Shift Settings ....................................................................................................... 208 15.1.2 Shift Schedule Settings ........................................................................................ 210 15.2 Attendance Handling ................................................................................................... 214 15.2.1 Check-in/out Correction ...................................................................................... 214 15.2.2 Leave and Business Trip....................................................................................... 215 15.2.3 Manual Calculation of Attendance ...................................................................... 217 15.3 Advanced Settings ....................................................................................................... 217 15.3.1 Basic Settings....................................................................................................... 217 15.3.2 Attendance Rule Settings .................................................................................... 218 15.3.3 Attendance Check Point Settings ........................................................................ 218 15.3.4 Holiday Settings ................................................................................................... 219 15.3.5 Leave Type Settings ............................................................................................. 220 15.4 Attendance Statistics ................................................................................................... 220 15.4.1 Attendance Summary .......................................................................................... 221 15.4.2 Attendance Details .............................................................................................. 221 15.4.3 Abnormal Attendance ......................................................................................... 221 15.4.4 Overtime Search .................................................................................................. 222 15.4.5 Card Swiping Log ................................................................................................. 222 15.4.6 Report.................................................................................................................. 222 Chapter 16 16.1 Video Intercom ............................................................................................................ 223 Video Intercom ............................................................................................................ 223 16.1.1 Calling Indoor Station via iVMS-4200 .................................................................. 223 16.1.2 Calling iVMS-4200 via Indoor Station/Door Station ............................................ 224 16.1.3 Viewing Live Video of Door Station and Outer Door Station .............................. 226 16.2 Real-Time Call Logs ...................................................................................................... 226 16.3 Releasing Notice .......................................................................................................... 227 16.4 Searching Video Intercom Information ....................................................................... 228 16.4.1 Searching Call Logs .............................................................................................. 228 16.4.2 Searching Unlocking Logs .................................................................................... 228 16.4.3 Searching Notice ................................................................................................. 228 Chapter 17 17.1 Face Picture Comparison Alarm .................................................................................. 230 Viewing Captured Face Picture .................................................................................... 230 5 User Manual of iVMS-4200 Client Software 17.2 Viewing Matched Face Pictures ................................................................................... 231 17.3 Viewing Alarm Logs ..................................................................................................... 232 17.3.1 Searching Alarm Logs .......................................................................................... 232 17.3.2 Open Alarm Logs ................................................................................................. 233 Chapter 18 Target Capture Alarm................................................................................................... 234 Chapter 19 Log Management ......................................................................................................... 235 19.1 Searching Log Files....................................................................................................... 235 19.2 Filtering Log Files ......................................................................................................... 235 19.3 Backing Up Log Files .................................................................................................... 236 19.4 Exporting Picture ......................................................................................................... 236 Chapter 20 Account Management ................................................................................................. 237 20.1 Adding User ................................................................................................................. 237 20.2 Managing User ............................................................................................................ 238 Chapter 21 Statistics ....................................................................................................................... 239 21.1 Heat Map ..................................................................................................................... 239 21.2 People Counting .......................................................................................................... 240 21.3 Counting ...................................................................................................................... 241 21.4 Road Traffic .................................................................................................................. 242 21.5 Face Picture Retrieval .................................................................................................. 244 21.5.1 Searching Face Picture by Uploaded Picture ....................................................... 244 21.5.2 Searching Face Picture by Event Type ................................................................. 246 21.6 License Plate Retrieval ................................................................................................. 247 21.7 Behavior Analysis ......................................................................................................... 248 21.8 Captured Face Analysis ................................................................................................ 249 21.9 Human Body Retrieval ................................................................................................. 249 21.9.1 Searching Human Body Picture by Uploaded Picture ......................................... 249 21.9.2 Searching Human Body Picture by Personnel Features....................................... 251 21.10 Vehicle Retrieval .......................................................................................................... 252 Chapter 22 System Configuration................................................................................................... 254 22.1 General Settings .......................................................................................................... 254 22.2 Live View and Playback Settings .................................................................................. 255 22.3 Image Settings ............................................................................................................. 256 22.4 File Saving Path Settings .............................................................................................. 257 22.5 Toolbar Settings ........................................................................................................... 258 22.6 Keyboard and Joystick Shortcuts Settings ................................................................... 259 22.7 Alarm Sound Settings .................................................................................................. 260 22.8 Email Settings .............................................................................................................. 260 22.9 Video Intercom Settings .............................................................................................. 261 22.10 Access Control Settings................................................................................................ 262 22.11 Security Certificate ...................................................................................................... 262 22.11.1 Exporting Certificate from Client ......................................................................... 263 22.11.2 Import Certificate to Client ................................................................................. 263 Appendix: Custom Wiegand Rule Descriptions .................................................................................... 264 Troubleshooting .................................................................................................................................... 266 6 User Manual of iVMS-4200 Client Software FAQ ....................................................................................................................................................... 267 Error Code............................................................................................................................................. 268 7 User Manual of iVMS-4200 Client Software Chapter 1 Overview 1.1 Description iVMS-4200 is a versatile security management software for the DVRs, NVRs, IP cameras, encoders, decoders, security control panel, video intercom device, access control device, etc. It provides multiple functionalities, including real-time live view, video recording, remote search and playback, file backup, alarm receiving, etc., for the connected devices to meet the needs of monitoring task. With the flexible distributed structure and easy-to-use operations, the client software is widely applied to the surveillance projects of medium or small scale. This user manual describes the function, configuration and operation steps of iVMS-4200 software. To ensure the properness of usage and stability of the software, refer to the contents below and read the manual carefully before installation and operation. 1.2 Running Environment Operating System: Microsoft Windows 7/Windows 8.1/Windows 10 (32-bit or 64-bit), Microsoft Windows XP SP3 (32-bit), Microsoft Windows 2008 R2/Windows Server 2012 (64-bit). CPU: Intel Pentium IV 3.0 GHz or above Memory: 2G or above Video Card: RADEON X700 Series or above GPU: 256 MB or above Notes: For high stability and good performance, these above system requirements must be met. The software does not support 64-bit operating system; the above mentioned 64-bit operating system refers to the system which supports 32-bit applications as well. Hardware decoding function is only supported by operating systems the version of which is after Windows XP. 1.3 Function Modules Control Panel of iVMS-4200: 8 User Manual of iVMS-4200 Client Software For the first time running the software, you can click Modules Customization on the control panel to select the modules to display on the Operation and Control area of the control pane. Steps: 1. Click to pop up the following window. 2. Check the module checkboxes to display them on the control panel according to the actual needs. 3. Click OK to save the settings. Notes: 9 User Manual of iVMS-4200 Client Software After adding the access control device in Device Management module, the Access Control, Status, and Time and Attendance module will be displayed on the control panel automatically. After adding the security control panel in Device Management module, the Security Control Panel and Real-time Alarm modules will be displayed on the control panel automatically. You can check the information, including current user, network usage, CPU usage, memory usage and time, in the upper-right corner of the main page. 1.4 Update Instructions Encrypt Database For data security, encrypt the database and encrypt the sensitive information with random secret key. RTSP Streaming Protocol Add RTSP streaming protocol for getting stream when live view when editing channel parameters. Divide Remote Configuration to General and Advanced Configuration Divide remote configuration to general or advanced parameters configuration if the device supports. Resource Overview Add resource overview in Help > Resource Overview. Open Source Software License Provide open source software License in Help > Open Source Software License. Face Picture Comparison Alarm Add Face Picture Comparison module to view the captured face pictures and the matched face picture in face picture library Target Capture Alarm Add Target Capture Alarm module to view the captured target pictures, such as face, human body, vehicle, etc. Face Retrieval, Human Body Retrieval, Vehicle Retrieval Add statistics modules: Face Retrieval, Human Body Retrieval, Vehicle Retrieval to analyze and search the face information, human body information, and vehicles information. Manual Temperature Measurement and Fire Source Detection Alarm Acknowledgement For thermal cameras, add manually measuring temperature function and fire source detection alarm acknowledgement function. New UI Design for Security Control Panel and Pyronix Control Panel Module Smart Card for Person Add smart card to person and store fingerprints and ID card infomration in the smart card. Person in Blacklist Management Configure the person information in the blacklist and apply to the device. 10 User Manual of iVMS-4200 Client Software Chapter 2 User Registration and Login For the first time to use iVMS-4200 client software, you need to register a super user for login. Steps: 1. Input the super user name and password. The software will judge password strength automatically, and we highly recommend you to use a strong password to ensure your data security. 2. Confirm the password. 3. Optionally, check the checkbox Enable Auto-login to log into the software automatically. 4. Click Register. Then, you can log into the software as the super user. A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length of the password cannot be less than 6 characters. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. When opening iVMS-4200 after registration, you can log into the client software with the registered user name and password. Steps: 1. Input the user name and password you registered. 2. Optionally, check the checkbox Enable Auto-login to log into the software automatically. 3. Click Login. After running the client software, you can open the wizards (including video wizard, video wall wizard, security control panel wizard, access control and video intercom wizard, and attendance wizard), to guide you to add the device and do other settings and operations. 11 User Manual of iVMS-4200 Client Software Chapter 3 Device Management 3.1 Adding Device Purpose: After running the iVMS-4200, devices including network cameras, video encoders, DVRs, NVRs, decoders, security control panels, video intercom devices, access control devices, etc., should be added to the client for the remote configuration and management, such as live view, playback, alarm settings, etc. Perform the following steps to enter the Device Adding interface. Steps: 1. Click on the control panel to open the Device Management page. 2. Click Device tab to enter the device management page. 3. On the Device Type panel on the right, select Hikvision Device to add the Hikvision devices, including network cameras, video encoders, DVRs, NVRs, decoders, security control panels, video intercom devices, access control devices, etc. 4. (Optional) Click Add New Device Type to add other types of devices, including stream media server, Hik-Connect device (device which supports Hik-Connect service), Pyronix control panel, and third-party encoding device. The devices will be displayed on the device list for management after added successfully. You can check the resource usage, HDD status, recording status, and other information of the added devices on the list. 5. (Optional) Select a device and click Remote Configuration to configure further parameters of the selected device if needed. Notes: For some models of devices, you can open its general or advanced parameters configuration window. To open the original remote configuration window, press CTRL and click Remote Configuration. 6. For detailed settings about the settings, refer to the User Manual of the devices. (Optional) Select access control device and CVR from the list and click Device Status to view the device status including recording status, signal status, hardware status, etc. Note: For CVR, You can click Device Status to view the recording status and ANR (Automatic Network Replenishment) recording status. 3.1.1 Activating Device Purpose: For some devices, you are required to create the password to activate them before they can be added to the software and work properly. Note: This function should be supported by the device. 12 User Manual of iVMS-4200 Client Software Steps: 1. Enter the Device Management page. 2. On the Device for Management or Online Device area, check the device status (shown on Security column) and select an inactive device. 3. Click Activate to pop up the Activation interface. 4. Create a password in the password field, and confirm the password. STRONG PASSWORD RECOMMENDED– We highly recommend you create a strong password of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 5. (Optional) Enable Hik-Connect service when activating the device if the device supports. 1) Check Enable Hik-Connect checkbox to pop up the Note window. 2) Create a verification code. 3) Confirm the verification code. 4) Click Terms of Service and Privacy Policy to read the requirements. 13 User Manual of iVMS-4200 Client Software 5) Click OK to enable the Hik-Connect service. 6. Click OK to activate the device. A “The device is activated.” window pops up when the password is set successfully. 7. Click Modify Netinfo to pop up the Modify Network Parameter interface. Note: This function is only available on the Online Device area. You can change the device IP address to the same subnet with your computer if you need to add the device to the software. 8. Change the device IP address to the same subnet with your computer by either modifying the IP address manually or checking the checkbox of DHCP. 9. Input the password set in step 4 and click OK to complete the network settings. 3.1.2 Adding Online Devices Purpose: The active online devices in the same local subnet with the client software will be displayed on the Online Device area. You can click the Refresh Every 60s button to refresh the information of the online devices. Note: You can click to hide the Online Device area. Steps: 1. Select the devices to be added from the list. Note: For the inactive device, you need to create the password for it before you can add the device properly. For detailed steps, refer to Chapter 3.1.1 Activating Device. 2. Click Add to Client to open the device adding window box. 3. Input the required information. Address: Input the device’s IP address. The IP address of the device is obtained 14 User Manual of iVMS-4200 Client Software automatically in this adding mode. Port: Input the device port number. The default value is 8000. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password. The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default. Note: iVMS-4200 also provides a method to add the offline devices. 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5. Click Add to add the device. Add Multiple Online Devices If you want to add multiple online devices to the client software, click and hold Ctrl key to select multiple devices, and click Add to Client to open the device adding window box. In the pop-up message box, enter the user name and password for the devices to be added. Add All Online Devices If you want to add all the online devices to the client software, click Add All and click OK in the 15 User Manual of iVMS-4200 Client Software pop-up message box. Then enter the user name and password for the devices to be added. Modify Network Information Select the device from the list, click Modify Netinfo, and then you can modify the network information of the selected device. Note: You should enter the admin password the device in the Password field of the pop-up window to modify the parameters. Reset Password According to the different devices, the software provides five different methods for restoring the default password or resetting the password. Select the device from the list, click Reset Password. Option 1: If the window with Export button, password and confirm password field pops up, follow the steps below to reset the password: Steps: 16 User Manual of iVMS-4200 Client Software 1. Click Export to save the device file on your PC. 2. Send the file to our technical support. For the following operations for resetting the password, contact our technical support. The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly. Especially in the high security system, resetting the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. Option 2: If the window with Export and Generate buttons, password and confirm password field pops up as follows, follow the steps below to reset the password: Steps: 1. Click Generate to pop up the QR Code window. 2. Click Download and select a saving path to save the QR code to your PC. You can also take a photo of the QR code to save it to your phone. 3. Send the picture to our technical support. For the following operations for resetting the password, contact our technical support. The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a 17 User Manual of iVMS-4200 Client Software minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly. Especially in the high security system, resetting the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. Option 3: If the window with safe mode selectable pops up as follows, you can perform the following steps to reset the device password. Steps: 1. Select the Safe Mode for resetting the device password. If you select Key as the safe mode, refer to Option 2 above for detailed operations. If you select Security Question as the safe mode, go to step 2. If you select GUID File as the safe mode, go to step 3. 2. (Optional) If you select Security Question as the safe mode, input the answers of the three security questions. Note: You can set the security question when activating the device or in the remote configuration. For details, refer to the User Manual of the device. 3. (Optional) If you select GUID File as the safe mode, in the Import File field, click the GUID file. to import Note: You can save the GUID file when activating the device. For details, refer to the User Manual of the device. 4. Input new password in text fields of Password and Confirm Password. 5. Click OK to reset the password. The password strength of the device can be checked by the software. For your privacy, we 18 User Manual of iVMS-4200 Client Software strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly. Especially in the high security system, resetting the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. Option 4: For some old version device, if the window with security code field pops up, input the security code, and then you can restore the default password of the selected device. Note: For getting the security code, contact our technical support. The default password (12345) for the Admin account is for first-time log-in purposes only. You must change this default password to better protect against security risks, such as the unauthorized access by others to the product that may prevent the product from functioning properly and/or lead to other undesirable consequences. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly. Especially in the high security system, resetting the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. Option 5: For some old version device, if the window with Import and Export buttons pops up, perform the following steps to restore the default password: 1. Click Export to save the device file on your PC. 2. Send the file to our technical support. 3. For the following operations for resetting the password, contact our technical support. The default password (12345) for the Admin account is for first-time log-in purposes only. You must change this default password to better protect against security risks, such as the unauthorized access by others to the product that may prevent the product from functioning properly and/or lead to other undesirable consequences. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly. Especially in the high security 19 User Manual of iVMS-4200 Client Software system, resetting the password monthly or weekly can better protect your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. Synchronizing Password Purpose: You can reset the password for the NVR or HDVR and use the new password as the password of the connected network cameras and encoders. Note: This function should be supported by the device. Steps: 1. Select a device on the Online Device panel and click Reset Password. 2. Perform the password reset steps and check Use New Password as Camera Password checkbox. 3. Click OK to save the settings. 3.1.3 Adding Devices by IP or Domain Name Steps: 1. Click Add to open the device adding window box. 2. Select IP/Domain as the adding mode. 3. Input the required information. Nickname: Edit a name for the device as you want. Address: Input the device’s IP address or domain name. Port: Input the device port No. The default value is 8000. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password. The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default. Note: iVMS-4200 also provides a method to add the offline devices. 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5. Click Add to add the device. 20 User Manual of iVMS-4200 Client Software 3.1.4 Adding Devices by IP Segment Steps: 1. Click Add to open the device adding window box. 2. Select IP Segment as the adding mode. 3. Input the required information. Start IP: Input a start IP address. End IP: Input an end IP address in the same network segment with the start IP. Port: Input the device port No.. The default value is 8000. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password. The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default. Note: iVMS-4200 also provides a method to add the offline devices. 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5. Click Add. 21 User Manual of iVMS-4200 Client Software You can add the device which the IP address is between the start IP and end IP to the device list. 3.1.5 Adding Devices by Hik-Connect Domain Purpose: You can add the devices to the client via Hik-Connect by inputting the device username and device password. Before you start: Add the devices to Hik-Connect account via iVMS-4200, iVMS-4500 Mobile Client, or Hik-Connect first. For details about adding the devices to Hik-Connect account via iVMS-4200, refer to Chapter 9.3 Device Management. Steps: 1. Log into the Hik-Connect account. For details, refer to Chapter 9.2 Logging into Hik-Connect Account. 2. Click Hikvision Device -> Add to open the device adding window. 3. Select Hik-Connect Domain as the adding mode. The device(s) under the Hik-Connect account will display. 4. (Optional) Click Refresh to refresh the device list. 5. (Optional) Input keyword of the device name in the Search field to search the device(s). 6. Check the checkbox(es) to select the device(s). 7. Input the device user name and the device password in the User Name field and Password field respectively. 22 User Manual of iVMS-4200 Client Software Notes: The device user name is admin by default. The device password is created when you activate the device. For details, refer to Chapter 3.1.1 Activating Device. 8. (Optional) Check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default. 9. Click Add to add the device to the local client. 3.1.6 Adding Devices by EHome Account Purpose: You can add access control device connected via EHome protocol by inputting the EHome account. Before you start: Set the network center parameter first. For details, refer to Network Center Settings. Steps: 1. Click Add to open the device adding window box. 2. Select EHome as the adding mode. 23 User Manual of iVMS-4200 Client Software 3. Input the required information. Nickname: Edit a name for the device as you want. Account: Input the account name registered on EHome protocol. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default. Note: iVMS-4200 also provides a method to add the offline devices. 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5. Click Add to add the device. 3.1.7 Adding Devices by Serial Port Purpose: You can add access control device connected via serial port. Steps: 1. Click Add to open the device adding window box. 2. Select Serial Port as the adding mode. 24 User Manual of iVMS-4200 Client Software 3. Input the required information. Nickname: Edit a name for the device as you want. Serial Port No.: Select the device’s connected serial port No. Baud Rate: Input the baud rate of the access control device. DIP: Input the DIP address of the device. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default. Note: iVMS-4200 also provides a method to add the offline devices. 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5. Click Add to add the device. 3.1.8 Adding Devices by IP Server Steps: 1. Click Add to open the device adding window box. 2. Select IP Server as the adding mode. 25 User Manual of iVMS-4200 Client Software 3. Input the required information. Nickname: Edit a name for the device as you want. Server Address: Input the IP address of the PC that installs the IP Server. Device ID: Input the device ID registered on the IP Server. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password. The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default. Note: iVMS-4200 also provides a method to add the offline devices. 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5. Click Add to add the device. 3.1.9 Adding Devices by HiDDNS Steps: 1. Click Add to open the device adding window box. 2. Select HiDDNS as the adding mode. 26 User Manual of iVMS-4200 Client Software 3. Input the required information. Nickname: Edit a name for the device as you want. Server Address: www.hik-online.com. Device Domain Name: Input the device domain name registered on HiDDNS server. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password. The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. 4. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the channels of the device to the corresponding group by default. Note: iVMS-4200 also provides a method to add the offline devices. 1) Check the Add Offline Device checkbox. 2) Input the required information, including the device channel number and alarm input number. 3) Click Add. When the offline device comes online, the software will connect it automatically. 5. Click Add to add the device. 3.1.10 Importing Devices in Batch Purpose: The devices can be added to the software in batch by inputting the device information in the pre-defined CSV file. 27 User Manual of iVMS-4200 Client Software Steps: 1. Click Add to open the device adding window box. 2. Select Batch Import as the adding mode. 3. Click Export Template and save the pre-defined template (CSV file) on your PC. 4. Open the exported template file and input the required information of the devices to be added on the corresponding column. Adding Mode: You can input 0, 2, 3, 4, 5, or 6 which indicated different adding modes. 0 indicates that the device is added by IP address or domain name; 2 indicates that the device is added via IP server; 3 indicates that the device is added via HiDDNS; 4 indicates that the device is added via EHome protocol; 5 indicates that the device is added by serial port; 6 indicates that the device is added via Hik-Connect Domain. Address: Edit the address of the device. If you set 0 as the adding mode, you should input the IP address or domain name of the device; if you set 2 as the adding mode, you should input the IP address of the PC that installs the IP Server; if you set 3 as the adding mode, you should input www.hik-online.com. Port: Input the device port No.. The default value is 8000. Device Information: If you set 0 as the adding mode, this field is not required; if you set 2 as the adding mode, input the device ID registered on the IP Server; if you set 3 as the adding mode, input the device domain name registered on HiDDNS server; if you set 4 as the adding mode, input the EHome account; if you set 6 as the adding mode, input the device serial No. User Name: Input the device user name. By default, the user name is admin. Password: Input the device password. The password strength of the device can be checked by the software. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. And we recommend 28 User Manual of iVMS-4200 Client Software you reset your password regularly, especially in the high security system, resetting the password monthly or weekly can better protect your product. Add Offline Device: You can input 1 to enable adding the offline device, and then the software will automatically connect it when the offline device comes online. 0 indicates disabling this function. Export to Group: You can input 1 to create a group by the device name (nickname). All the channels of the device will be imported to the corresponding group by default. 0 indicates disabling this function. Channel Number: If you set 1 for Add Offline Device, input the channel number of the device. If you set 0 for Add Offline Device, this field is not required. Alarm Input Number: If you set 1 for Add Offline Device, input the alarm input number of the device. If you set 0 for Add Offline Device, this field is not required. Serial Port No.: If you set 5 as the adding mode, input the serial port No. for the access control device. Baud Rate: If you set 5 as the adding mode, input the baud rate of the access control device. 5. 6. DIP: If you set 5 as the adding mode, input the DIP address of the access control device. Hik-Connect Account: If you set 6 as the adding mode, input the Hik-Connect account. Hik-Connect Password: If you set 6 as the adding mode, input the Hik-Connect password. Click and select the template file. Click Add to import the devices. 3.1.11 QR Code of Encoding Devices Purpose: For encoding devices, the QR code of the devices can be generated. You can add the device to your mobile client software by using the mobile client software to scan the QR code. For adding the devices to your mobile client software, refer to the User Manual of the mobile client software. Check QR Code On the device list, double-click a device, the information and QR code of the device will be displayed. Or you can click to select a device and click QR Code to pop up the QR code window of the device. You can also click and hold the Ctrl key to select multiple devices, and click QR Code to pop up the QR code window of the devices. In this way, you can add multiple devices at the same time by scanning the QR code. 29 User Manual of iVMS-4200 Client Software 3.1.12 Checking Device’s Online Users Purpose: When any user accesses the device, the client can record and show the connection information, including user name, user type, user’s IP address, and login time. Note: This function should be supported by the device. Steps: 1. Click to select an added and online device. 2. Click Online Users to pop up the Online User window. 3. Check the information of the users that log into the device. 4. Click OK to close the window. 3.2 Managing Group Purpose: The devices added should be organized into groups for a convenient management. You can get the live view, play back the video files, and do some other operations of the device through the group. Before you start: 30 User Manual of iVMS-4200 Client Software Devices need to be added to the client software for group management. Perform the following steps to enter the Group Management interface: 1. Open the Device Management page. 2. Click the Group tab to enter the Group Management interface. 3.2.1 Adding Group Steps: 1. Click to open the Add Group window box. 2. Input a group name as you want. 3. Click OK to add the new group to the group list. You can also check the checkbox Create Group by Device Name to create the new group by the name of the selected device. 31 User Manual of iVMS-4200 Client Software 3.2.2 Importing Channels to Group Steps: 1. Click Import on Group Management interface, and then click the Encoding Channel tab to open the Import Encoding Channel page. Note: You can also select Alarm Input tab and import the alarm inputs to group. 2. Select the thumbnails/names of the cameras in the thumbnail/list view. 3. Select a group from the group list. 4. Click Import to import the selected cameras to the group. You can also click Import All to import all the cameras to a selected group. Notes: You can also click the icon on the Import Encoding Channel page to add a new group. Up to 256 cameras can be added to one group. The following buttons are available on the Import Encoding Channel page: List View View the camera in list view. Thumbnail View View the camera in thumbnail view. Refresh Refresh the latest information of added cameras. Import Create a group named as device name-Encoding Channel (Alarm Input) and import the device to group. Collapse/Expand Collapse/Expand the thumbnails of cameras. 3.2.3 Modifying Channel Parameters Purpose: After importing the channels to the group, you can edit the channel’s parameters. For encoding channel, you can edit the channel name, stream type, protocol type, etc. For alarm input, zone, and other types of channels, you can edit the channel name. Here we take modifying the encoding channel’s parameters as an example. 32 User Manual of iVMS-4200 Client Software Note: For modifying the camera(s) of Hik-Connect device, refer to Chapter 9.3.2 Modifying Camera. Steps: 1. Enter Device Management > Group. 2. Select the group/camera from the group list on the Resource panel. 3. Click Modify or double click the channel to open the modifying channel information window. 4. Edit the camera information, including camera name, stream type, etc. Video Stream: Select the stream for the live view of the camera as desired. Playback Stream Type: Select the stream for the playback of the camera as desired. Note: The Playback Stream Type field will display if the device supports dual-stream. Rotation Type: Select the rotate type for the live view or playback of the camera as desired. Protocol Type: Select the transmission protocol for the camera. Streaming Protocol: Select the protocol as RTSP or private for getting stream when live view. Note: You should get stream again to take effect. Stream Media Server: Configure to get stream of the camera via stream media server. You can select and manage the available stream media server. Copy to…: Copy the configured parameters to other camera(s). Refresh: Get a new captured picture for the live view of the camera. Note: For video stream and protocol type, the new settings will take effect after you reopen the live view of the camera. 5. Click OK to save the new settings. You can also double click the encoding channel on the Resource list in the Group Management interface after encoding channels encoded, or select the encoding channel and click Modify to open the Modify Camera window box. Notes: For the IP channel of NVR which supports decoding function: After decoding and displaying on video wall, there will be a new channel in the Encoding Channel Resources list whose protocol type is decoding on video wall. 33 User Manual of iVMS-4200 Client Software After closing the corresponding roaming window, the new channel will be removed from the Encoding Channel Resources list. 3.2.4 Removing Channel from Group Steps: 1. Select the camera from the group list on the Import Encoding Channel page. 2. Move the mouse to the camera and click to remove the camera from the group. You can also select the camera on the Group Management interface, and then click Delete to remove the camera from the group. 3. Select the group from the group list on the Import Encoding Channel page, move the mouse to the group and click and you can remove all the cameras from the group. 3.2.5 Deleting Group Steps: 1. Select the group on the Group Management interface 2. Click Delete Group, or move the mouse to the group and click the icon and the resource under it will be deleted. 34 , the selected group User Manual of iVMS-4200 Client Software Chapter 4 Live View Purpose: For the surveillance task, you can view the live video of the added network cameras, video encoders and video intercom device on the Main View page. And some basic operations are supported, including picture capturing, manual recording, PTZ control, etc. Before you start: A camera group is required to be defined for live view. You can set the rotate type if necessary in the Group Management. For details, refer to Chapter 3.2.3 Modifying . Click the icon on the control panel, or click View->Main View to open the Main View page. Main View Page 1 View List 2 Camera List 3 PTZ Control Panel 4 Display Window of Live View 5 Live View Toolbar Camera Status: The camera is online and works properly. The camera is in live view. The camera is in recording status. The camera is offline. Notes: If event (e.g., motion detection) is detected for the camera, the camera icon will display as and the group icon will show as . 35 User Manual of iVMS-4200 Client Software If the camera is offline, the client can still get the live video via the stream media server if the stream media server is configured. The camera icon will display as . For configuring the stream media server of the camera, refer to Chapter 10 Forwarding Video Stream through Stream Media Server. Live View Toolbar: On the Main View page, the following toolbar buttons are available: Save View Save the new settings for the current view. Save View as Save the current view as another new view. Stop Live View Stop the live view of all cameras. Mute/Audio On Turn off/on the audio in live view Resume/Pause Auto-switch Show/Hide the Menu Click to resume/pause the auto-switch in live view. Show/Hide the configuration menu of auto-switch. Click again to hide. Previous Go for live view of the previous page. Next Go for live view of the next page. Window Division Set the window division. Display the live view in full-screen mode. Press Esc, or you can move the mouse to the top of the screen and click Quit Full Screen button to exit. Full Screen You can click Lock button to lock the screen, and you can click Unlock and input the client admin password to unlock it. For full screen auto-switch, you can click Previous or Next button to view the previous or next camera. Right-click on the display window in live view to open the Live View Management Menu: The following buttons are available on the right-click Live View Management Menu: 36 User Manual of iVMS-4200 Client Software Stop Live View Stop the live view in the display window. Capture Capture the picture in the live view process. Print Captured Picture: Capture a picture and print it. Send Email: Capture the current picture and then send an Other Capture Modes Email notification to one or more receivers. The captured picture can be attached. Custom Capture: Capture the current picture. You can edit its name and then save it. Start/Stop Recording Open PTZ Control Open Digital Zoom Start/Stop the manual recording. The video file is stored in the PC. Enable PTZ control function on the display window. Click again to disable the function. Enable the digital zoom function. Click again to disable the function. Enable the auto-tracking function of the speed dome. Then Enable Auto-tracking the speed dome will track the object appearing on the video automatically. This button is only available for the speed dome that supports the auto-tracking function. Switch to Instant Playback Switch to instant playback mode. For thermal camera, display the fire source region, locate the Fire Source Information maximum temperature region, or display the fire source target. Start/Stop Two-way Audio Start/Stop IP Two-way Audio Enable/Disable Audio Camera Status Start/stop the two-way audio with the device in live view. Click to start/stop the two-way audio with the camera in live view. This button is only available for the camera that supports the IP two-way audio function. Click to enable/disable the audio in live view. Display the status of the camera in live view, including the recording status, signal status, connection number, etc. Open the remote configuration page of the camera in live Remote Configuration view. You can select to open the general or advanced parameters configuration window if the device supports. VCA Configuration Synchronization Enter the VCA configuration interface of the device if it is VCA device. Sync the camera in live view with the PC running the client software. Show/Hide Temperature For thermal camera, click to show or hide the temperature on Information the live view image. Enter the fisheye expansion mode. Only available when the Fisheye Expansion device is fisheye camera. For details, refer to Chapter 4.7 Live View in Fisheye Mode. Start/Stop Master-Slave Click to start/stop locating or tracking the target according to Tracking your demand. Only available when the device is box or bullet 37 User Manual of iVMS-4200 Client Software camera. For details, refer to Chapter 4.8 Starting Master-Slave Tracking. Link to Access Control Point Set the camera’s linked access control point (door) and you can control the door status during live view. For details, refer to Chapter 14.10 Controlling Door during Live View. Click to remote unlock the door if the device is door station, Unlock outer door station or door station (V series). Display the live view in full screen mode. Click the icon again Full Screen to exit. 4.1 Starting and Stopping Live View Note: For Hik-Connect device, if the live view or video file(s) of its camera(s) is encrypted, you should input the verification code. For details, refer to Chapter 9.3.2 Modifying Camera. Starting Live View for One Camera Steps: 1. Open the Main View page. 2. Optionally, click the view. 3. Click-and-drag the camera to the display window, icon in live view toolbar to select the window division mode for live or double-click the camera name after selecting the display window to start the live view. Note: You can click-and-drag the video of the camera in live view to another display window if needed. Starting Live View for Camera Group Steps: 1. Open the Main View page. 2. Click-and-drag the group to the display window, or double-click the group name to start the live view. Note: The display window number is self-adaptive to the camera number of the group. Starting Live View in Default View Mode Purpose: The video of the added cameras can be displayed in different view modes. 4 frequently-used default view modes are selectable: 1-Screen, 4-Screen, 9-Screen and 16-Screen. Steps: 1. Open the Main View page. 2. In the View panel, click the icon 3. Click to select the default view mode and the video of the added cameras will be displayed in a to expand the default view list. sequence in the selected view. Note: Click , and you can save the default view as a custom view. Move the mouse to the view and the following icons are available: 38 User Manual of iVMS-4200 Client Software Start Instant Playback Start the instant playback of the view. Start switching automatically of the view. For details, refer Start Auto-switch to Chapter 4.2 Auto-switch in Live View. Starting Live View in Custom View Mode Purpose: The view mode can also be customized for the video live view. Steps: 1. Open the Main View page. 2. In the View panel, click the icon to expand the custom view list. If there is custom view available, you can click to start live view of the custom view. 3. 4. Click to create a new view. Input the view name and click Add. The new view is of 4-Screen mode by default. 5. Optionally, click the view. 6. Click-and-drag the camera/group to the display window, icon in live view toolbar and select the screen layout mode for the new or double-click the camera/group name in custom view mode to start the live view. 7. Click the icon custom view. to save the new view. You can also click to save the view as another Move the mouse to the custom view and the following icons are available: Edit View Name Edit the name of the custom view. Delete View Delete the custom view. Start Instant Playback Start the instant playback of the view. 39 User Manual of iVMS-4200 Client Software Stopping the Live View Steps: 1. Select the display window. 2. Click the icon display window, that appears in the upper-right corner when the mouse pointer is over the or click Stop Live View on the right-click menu to stop the live view of the display window. You can also click the button in live view toolbar to stop all the live view. 4.2 Auto-switch in Live View Camera Auto-switch Purpose: The video stream of the cameras from the same group will switch automatically in a selected display window in camera auto-switch. Steps: 1. Open the Main View page. 2. Select a display window for camera auto-switch. 3. Click the icon 4. Select a group and click the icon 5. You can click the icon / 6. You can click to view the live video of previous or next camera. in the toolbar and select or customize the switching interval. or on the group node. to pause/resume the camera auto-switch. Single View Auto-switch Purpose: The video of all the cameras on the camera list will switch automatically in a selected default view in single view auto-switch. Steps: 1. Open the Main View page. 2. Click the icon 3. Select a default view and click the icon in the toolbar and select or customize the switching interval. on the selected view node. 40 User Manual of iVMS-4200 Client Software 4. You can click the icon / 5. You can click to view the live video of previous or next camera. or to pause/resume the single view auto-switch. Multi-view Auto-switch Purpose: The custom views will switch automatically in multi-view auto-switch. The custom views need to be added before proceeding. Steps: 1. Open the Main View page. 2. Click the icon 3. Click the icon 4. You can click the icon / 5. You can click to view the live video of previous or next camera. in the toolbar and select the switching interval. on the custom view node. or to pause/resume the multi-view auto-switch. 4.3 PTZ Control in Live View The software provides PTZ control for cameras with pan/tilt/zoom functionality. You can set the preset, patrol and pattern for the cameras on the PTZ Control panel. And you can also open window PTZ control for the operations of PTZ cameras. Click the icon to expand the PTZ Control panel. The following buttons are available on the PTZ Control panel: Zoom Focus Iris 3D Positioning Auxiliary Focus Lens Initialization Light Wiper Manual Tracking Menu One-touch Patrol 41 User Manual of iVMS-4200 Client Software One-touch Park Notes: For the analog speed dome, you can click to display its local menu. For detailed operation of the menu, refer to the User Manual of the speed dome. For the speed dome with auto-tracking function, you can enable the auto-tracking (via right-click menu) for it and then click to manually track the target by clicking on the video. For the one-touch patrol function, you can click and the speed dome will start patrol from the predefined preset No.1 to preset No.32 in order after a period of inactivity (park time). For setting the park time, refer to the User Manual of the speed dome. For the speed dome with one-touch park function, you can enable the one-touch park by clicking and the speed dome will save the current view to the preset No.32. The device starts to park at preset No. 32 automatically after a period of inactivity (park time). For setting the parking time, refer to the User Manual of the speed dome. Hik-Connect device only supports the PTZ movement to the direction of upside, downside, left, and right. 4.3.1 Configuring Preset A preset is a predefined image position which contains information of pan, tilt, focus and other parameters. Perform the following steps to add a preset: 1. Click the Preset button to enter the PTZ preset configuration panel. 2. Click the direction buttons and other buttons on the PTZ control panel to steer the camera to the desired view. 3. 4. Select a PTZ preset number from the preset list and click Input the name of the preset in the pop-up window box. 5. Click OK to save the settings. . To call a configured preset, double-click the preset, or select the preset and click the icon You also perform the following steps to call the preset. Steps: 1. Click to select a live view window. 2. For preset 1 to 9, click the corresponding number key (e.g., 4) to call the preset. For other presets, click “[”, number keys (e.g., 124), and “]” to call the preset. To modify a configured preset, select the preset from the list and click the icon To delete a configured preset, select the preset from the list and click the icon 42 . . . User Manual of iVMS-4200 Client Software 4.3.2 Configuring Pattern A pattern is a memorized, repeating series of pan, tilt, zoom, and preset functions. Perform the following steps to add a pattern: 1. Click the Pattern button to enter the PTZ pattern configuration panel. 2. 3. Click to start recording of this pattern path. Use the direction buttons to control the PTZ movement. 4. 5. Click to stop and save the pattern recording. Click the icon to call the pattern. To stop calling the pattern, click 6. (Optional) You can click Click . to delete the selected pattern. to delete all the patterns. 4.3.3 Configuring Patrol A patrol is a scanning track specified by a group of user-defined presets, with the scanning speed between two presets and the dwell time at the preset separately programmable. Before you start: Two or more presets for one PTZ camera need to be added. Perform the following steps to add and call a patrol: 1. Click the Patrol button to enter the PTZ patrol configuration panel. 43 User Manual of iVMS-4200 Client Software 2. Select a track number from the drop-down list. 3. Click 4. Repeat the above operation to add other presets to the patrol. 5. 6. Optionally, you can click or to edit or delete a preset in the patrol path. Click the icon to call the patrol. To stop calling the patrol, click . to add a preset, and set the dwell time and patrol speed for the preset. Note: The preset dwell time can be set to 1 to 30 sec, and the patrol speed can be set to level 1 to 40. 4.4 Manual Recording and Capture Toolbar in Each Live View Display Window: In each live view display window, the following toolbar buttons are available: Stop Live View Capture Start/Stop Recording Open/Close PTZ Control Start/Stop Two-way Audio Stop the live view in the display window. Capture the picture in the live view process. The capture picture is stored in the PC. Start/Stop manual recording. The video file is stored in the PC. Start/Stop PTZ mode for speed dome. Click and drag in the view to perform the PTZ control. Click to start/stop the two-way audio with the device in live view. Open/Close Digital Enable the digital zoom function. Click again to disable the Zoom function. Switch to Instant Playback Remote Configuration Switch to the instant playback mode. Open the remote configuration page of the camera in live view. Note: You can customize the icons and the icons’ order as desired in System Configuration. For details, refer to Chapter 22.5 Toolbar Settings. Manual Recording in Live View Purpose: Manual Recording function allows you to record the live video on the Main View page manually and 44 User Manual of iVMS-4200 Client Software the video files are stored in the local PC. Steps: 1. Move the mouse pointer to the display window in live view to show the toolbar. 2. Click in the toolbar of the display window or on the right-click Live View Management Menu to start the manual recording. The icon 3. turns to . Click the icon to stop the manual recording. A prompt box with the saving path of the video files you just recorded will pop up if all the operations succeed. Notes: During the manual recording, an indicator window. The saving path of video files can be set on the System Configuration interface. For details, refer appears in the upper-right corner of the display to Chapter 22.4 File Saving Path Settings. For Hik-Connect device, the manual recording is not supported during live view. Viewing Local Video Files Steps: 1. Click File->Open Video File to open the Video Files page. 2. Select the camera to be searched from the Camera Group list. 3. 4. Click the icon to specify the start time and end time for the search. Click Search. The video files recorded between the start time and end time will be displayed. Select the video file, and click Delete. You can delete the video file. Select the video file, and click Send Email. You can send an Email notification with the selected video file attached. Select the video file, and click Save as. You can save a new copy of the video file. Note: To send an Email notification, the Email settings need to be configured before proceeding. For details, refer to Chapter 22.8 Email Settings. Double-click the video file and the video file can be played back locally. 45 User Manual of iVMS-4200 Client Software The following buttons are available on the local playback page: CIF/4CIF Display the video in cif/4cif resolution. Full Screen Display the local playback page in full screen mode. Close Close the local playback page of the video files. Pause/Play Pause/Start the playback of the video files. Stop Stop the playback of the video files. Speed Set the playback speed. Single Frame Play back the video files frame by frame. Digital Zoom Enable the digital zoom function. Click again to disable. Enable/Disable Audio Click to enable/disable the audio in the local playback. Capture Capture the picture in the playback process. Capturing Picture in Live View Steps: 1. Move the mouse pointer to the display window in live view to show the toolbar. 2. Click the icon in the toolbar of the display window or on the right-click Live View Management Menu. A small window of the captured picture will be displayed to notify whether the capturing operation is done or not. Note: The saving path of the captured pictures can be set on the System Configuration interface. For details, refer to Chapter 22.4 File Saving Path Settings. Viewing Captured Pictures The pictures captured in live view are stored in the PC running the software. You can view the captured pictures if needed. Steps: 1. Click File->Open Image File to open the Captured Images page. 2. Select the camera to be searched from the Camera Group list. 46 User Manual of iVMS-4200 Client Software 3. 4. Click the icon to specify the start time and end time for the search. Click Search. The pictures captured between the start time and end time will be displayed. 5. Double-click the captured picture to enlarge it for a better view. Select the captured picture, and click Print. You can print the selected picture. Select the captured picture, and click Delete. You can delete the selected picture. Select the captured picture, and click Send Email. You can send an Email notification with the selected picture attached. Select the captured picture, and click Save as. You can save a new copy of the selected picture. 4.5 Instant Playback Purpose: The video files can be played back instantly on the Main View page. Instant playback shows a piece of the video which was remarkable, or which was unclear on the first sight. Thus, you can get an immediate review if needed. Before you start: The video files need to be recorded on the storage devices, such as the SD/SDHC cards and HDDs on the DVRs, NVRs, Network Cameras, etc., or on the Storage Servers. Steps: 1. Start the live view and move the mouse to the display window to show the toolbar. You can also move the mouse to default view or custom view and click the selected view. to enable the instant playback of 2. Click the icon in the toolbar and a list of time periods pops up. 30s, 1 min, 3 min, 5 min, 8 min, and 10 min are selectable. 3. Select a time period to start the instant playback. Example: If the current time of the live view is 09:30:00, and you select 3 min, then the instant playback will start from 09:27:00. 4. Click the icon again to stop the instant playback and go back for the live view. Note: During the instant playback, an indicator window. appears in the upper-right corner of the display 47 User Manual of iVMS-4200 Client Software On the instant playback page, the following toolbar buttons are available: Reverse Playback Play back the video file reversely. Pause/Start Playback Pause/Start the playback of the video files. Stop Playback Stop the playback of all cameras. Slow Forward/Fast Forward Decrease/Increase the play speed of the playback. Single Frame (Reverse) Play back the video files frame by frame (reversely). Right-click on the display window to open the Instant Playback Management Menu: The following buttons are available on the right-click Instant Playback Management Menu: Reverse Playback Play back the video file reversely. Pause/Play Pause/Start the instant playback in the display window. Stop Stop the instant playback and return to the live view mode. Fast Forward/Slow Forward Single Frame (Reverse) Open Digital Zoom Capture Increase/Decrease the play speed of the instant playback. Play back the video file frame by frame (reversely). Enable the digital zoom function. Click again to disable the function. Capture the picture in the instant playback process. Print Captured Picture: Capture a picture and print it. Send Email: Capture the current picture and then send an Email Other Capture Modes notification to one or more receivers. The captured picture can be attached. Custom Capture: Capture the current picture. You can edit its 48 User Manual of iVMS-4200 Client Software name and then save it. Start/Stop Recording Start/Stop clipping the video files. Enable/Disable Audio Click to turn on/off the audio in instant playback. Switch to Live View Switch to live view mode. Full Screen Display the instant playback in full screen mode. Click again to exit. 4.6 Custom Window Division Purpose: The client software provides multiple kinds of pre-defined window division. You can also set custom window division as desired. Steps: 1. Click on the live view toolbar and select to pop up the custom window division window box. 2. Click Add to open the custom window division adding window box. Note: Up to 5 custom window divisions can be added. 3. Set a name for the new window division as desired and click OK to save the settings. 4. You can edit the name, window division (3x3, 4x4, 5x5) for it. 5. Click-and-drag you mouse to select the adjacent windows, and click Joint to joint them as a whole window. You can also click Cancel to cancel the jointing. 49 User Manual of iVMS-4200 Client Software 6. Click Save to confirm the settings. Click to back to the Main View page. Then you can click and select the custom window division for playing live video. Notes: You can also enter the Remote Playback page and perform the steps above to configure the custom window division. For remote playback, up to 16 windows can be played back at the same time. The custom window division with more than 16 windows is invalid for playback. 4.7 Live View in Fisheye Mode Purpose: The live video of the camera can be played in fisheye expansion mode. Steps: 1. Start the live view (refer to Chapter 4.1 Starting and Stopping Live View). 2. Right-click on the video and select Fisheye Expansion to enter the Fisheye Expansion window. 3. Select the mounting type of the fisheye camera according to the actual mounting position. 4. You can select the expanding mode for live view as desired. Note: For some devices, you can select the mounting type of the device and the related expanding mode will be listed. 50 User Manual of iVMS-4200 Client Software Fisheye: In the Fisheye view mode, the whole wide-angle view of the camera is displayed. This view mode is called Fisheye because it approximates the vision of a fish’s convex eye. The lens produces curvilinear images of a large area, while distorting the perspective and angles of objects in the image. o o Panorama/Dual-180 Panorama/360 Panorama: In the Panorama view mode, the distorted fisheye image is transformed to normal perspective image by some calibration methods. PTZ: The PTZ view is the close-up view of some defined area in the Fisheye view or Panorama view, and it supports the electronic PTZ function, which is also called e-PTZ. Note: Each PTZ view is marked on the Fisheye view and Panorama view with a specific navigation box. You can drag the navigation box on the Fisheye view or Panorama view to adjust the PTZ view, or drag the PTZ view to adjust the view to the desired angle. 5. You can right click on the window and select Capture to capture the picture in the live view process. The capture picture is stored in the PC. 6. Right-click on a playing window and you can switch the selected window to full-screen mode Press ESC key on the keyboard or right-click on the window and select Quit Full Screen to exit the full-screen mode. PTZ Control In PTZ mode, you can use the PTZ control to adjust the PTZ window. Note: The PTZ panel varies according to different devices. Select a PTZ window, and click one of the direction buttons to adjust the view angle. Note: Click-and-drag the No. label in the fisheye or panorama window will change the view angle of the PTZ window as well. Select a PTZ window, and click to start auto-scan, and click it again to stop auto-scan. : Drag the slider to adjust the speed for PTZ movement. : Zoom in or zoom out the selected PTZ window by clicking scroll the mouse wheel to zoom in or zoom out. or . Or you can Preset Note: The preset is only supported by specific fisheye camera. A preset is a user-defined monitor position/point. You can simply call the preset No. to change the 51 User Manual of iVMS-4200 Client Software monitor scene to the defined position. Please follow the steps below to configure the preset. Steps: 1. Click Preset tab to enter the preset configuration interface. 2. Select a PTZ window, and adjust the scene to the place you want to mark as a preset. 3. Click 4. (Optional) Click to call the configured preset. 5. (Optional) Click to delete the configured preset. , input the preset name, and click OK to save a preset. Patrol Note: The preset is only supported by specific fisheye camera. A patrol is a scanning track specified by a group of user-defined presets, with the scanning speed between two presets and the dwell time at the preset separately programmable. Please follow the steps below to configure the patrol. Note: At least 2 presets have to be configured before you configure the patrol. Steps: 1. Click patrol tab to enter the patrol configuration interface. 2. Select a path No. from the drop-down list. 3. Click 4. Repeat the above operation to add other presets to the patrol. 5. Click to add the configured presets, and set the dwell time and patrol speed for the preset. to start the patrol, and click 6. Optionally, you can click Notes: or to stop patrol. to edit or delete a preset in the patrol path. Up to 256 presets can be configured. Up to 32 patrols can be set. The dwell time ranges from 1 to 120s. The patrol speed ranges from 1 to 40. 52 User Manual of iVMS-4200 Client Software 4.8 Starting Master-Slave Tracking Purpose: The box or bullet camera which supports master-slave tracking function can locate or track the target according to your demand. Notes: This function in only supported by the specific box or bullet camera. A speed dome with the auto-tracking function is required to be installed near the camera. 4.8.1 Configure Master-Slave Tracking Rule Before performing master-slave tracking during live view, you should configure the master-slave tracking rules for the box or bullet camera. Steps: 1. In the device management interface, select the box or bullet camera and click Remote Configuration and enter VCA Config -> Rule -> Rule Settings. 2. Configure the intrusion rule. 1) Select the camera in the channel list 2) Click Add in Rule List panel to add a rule. 3) Select Intrusion as Event Type. 4) Click to draw the zone of intrusion rule. 5) Click Save to save the settings. 3. Login the speed dome. 1) In the Remote Configuration interface, select Advanced Configuration->Master-Slave Tracking to show the login interface. 53 User Manual of iVMS-4200 Client Software 2) Click Login button to pop up the speed dome login window box. 3) Input the required information. 4) Click Login to login the speed dome. 4. Click PTZ, and use the direction arrows to adjust the speed dome to a horizontal position. 5. Set the camera calibration mode. For Auto Calibrating: 1) Select Auto Calibrating from the calibration list. 2) Perform the calibration operation. Move and zoom in/out the speed dome to make sure the live views of dome and camera is mostly the same. 3) Click Save to save the calibration settings. For Manual Calibrating: 1) Select Manual Calibrating from the calibration list. 2) Select No. 1 from the list and click , a blue cross appears in the center of the live view page, and the digital zoom view of the selected site appears on the right. 3) Select No. 2 to No. 4, and repeat the step above to add the manual calibration sites. 4) Perform the calibration operation. 54 User Manual of iVMS-4200 Client Software Adjust the distances between the four calibration sites evenly in the live view page. Select calibration site No. 1 and the digital zoom view of site No. 1 appears on the right. Move and zoom in/out the speed dome to make sure the live views of dome and the digital zoom view of selected site is mostly the same. Click to save the current site position information. Select No. 2 to No. 4, and repeat the steps above to save the site position information. 5) Click Save to save the calibration settings. 4.8.2 Perform Master-Slave Tracking in Live View Steps: 1. Start live view for box or bullet camera. 2. Right-click on the live view window and click Enable Master-slave Tracking. 3. When configured VCA rule is triggered by target, the speed dome performs the automatic master-slave tracking and the target frame turns from green into red. 4.9 Thermal Camera Live View Purpose: For thermal camera, during live view, you can view the fire source information and temperature. You can measure the temperature manually to get temperature information in the live view image. 4.9.1 Viewing Fire Source Information During Live View Purpose: During live view, you can view the fire source information detected. Before you start: You need to configure the alarm rules on the thermal device. For details, refer to the User Manual of the device. Steps: 1. Enter Main View module. 2. Start live view for the thermal camera. For details, refer to Chapter 4.1 Starting and Stopping Live View. 3. Right click on the live view image and select Fire Source Information in the right-click menu. You can select to display the fire source region, locate the maximum temperature region, or display the fire source target. Fire Source Region: The region in which the temperature is higher than the configured alarm threshold. Maximum Temperature Region: Mark the region in which the temperature is highest in the fire source region. It is marked in green. Fire Source Target: Display the target location information. 55 User Manual of iVMS-4200 Client Software 4.9.2 Showing Temperature Information on Live View Image Purpose: You can show or hide the real-time temperature information of the monitoring scene when viewing the live video. Before you start: Switch the device VCA source type as Temperature Measurement + Behavior Analysis. Enable the device temperature measurement function and set the temperature measurement rules. For details, refer to the User Manual of the device. Steps: 1. Enter Main View module. 2. Start live view for the thermal camera. For details, refer to Chapter 4.1 Starting and Stopping Live View. 3. Adjust the scene to the area which has configured with temperature measurement rule. 4. Right click on the live view image and select Show Temperature Information in the right-click menu to show the temperature on the live view image. 5. Click on the image to view the temperature information 6. To hide the temperature on the live view image, right click on the live view image and select Hide Temperature Information. 4.9.3 Measuring Temperature Manually Purpose: You can get the temperature of point or region on the live view image of thermal camera by drawing points or frames on the live view image. Notes: 56 User Manual of iVMS-4200 Client Software Up to 10 measurement rules (points and frames) can be drawn for one camera. When multiple clients are viewing the live video of one camera, if one client add or delete the measurement rules (points and frames), other clients’ live view will be affected as well. The measurement rules will be cleared after all the users stopping live view of the camera. Measuring Temperature on Points Manually Purpose: You can measure the temperature on different points in the live view image by drawing points. Steps: 1. Enter Main View module. 2. Start live view for the thermal camera. For details, refer to Chapter 4.1 Starting and Stopping Live View. 3. Right click on the live view image and select Manual Temperature Measurement > By Point. 4. Or click on the live view toolbar and select By Point. Click on the live view image to set the points to get the temperature. The temperature of the point will show as follows: 5. (Optional) To delete the drawn point, click Cancel and click the drawn cross on the live view image. 6. (Optional) To hide the measured temperature, right click the live view window and select Disable Manual Temperature Display. Measuring Temperature in Area Manually Purpose: You can measure the temperature in different area in the live view image by drawing frames. Steps: 1. Enter Main View module. 2. Start live view for the thermal camera. For details, refer to Chapter 4.1 Starting and Stopping Live View. 3. Right click on the live view image and select Manual Temperature Measurement > By Frame. 4. Or click on the live view toolbar and select By Frame. Drag on the live view image to draw the frames to get the temperature. The average temperature in the frame will show as follows: 57 User Manual of iVMS-4200 Client Software 5. (Optional) To delete the drawn frame, click Cancel and click the drawn frame on the live view image. 6. (Optional) To hide the measured temperature, right click the live view window and select Disable Manual Temperature Display. 4.9.4 Acknowledge Fire Source Detection Alarm Purpose: During scanning, when the thermal device detects fire source, the fire source detection alarm will be triggered and the device will stop moving. You can view the alarm details including alarm video and alarm picture. When the alarm is handled, you can acknowledge the alarm and the device will continue moving according to the configured path. Before you start: You should configure the fire source acknowledgement mode on the device. For details, refer to the User Manual of the device. Steps: 1. Trigger a fire source detection alarm. 2. In Alarm Event module, open the fire source detection alarm details window. Or the window will pop up when the alarm is triggered if you configured alarm pop-up image. For setting the alarm pop-up image linkage, refer to Chapter 6 Alarm Management. 3. Click Acknowledge to acknowledge the alarm. 58 User Manual of iVMS-4200 Client Software Notes: If you set the fire source acknowledgement mode as Manual, after you click Acknowledge, the device will continue scanning according to the configured path. If you set the fire source acknowledgement mode as Auto, when it exceeds the configured acknowledgment duration, the device will continue scanning automatically. For setting the acknowledgment duration, refer to the User Manual of the device. 4.10 Other Functions in Live View There are some other functions supported in the live view, including digital zoom, two-way audio, camera status and synchronization. Auxiliary Screen Preview The live video can be displayed on different auxiliary screens for the convenient preview of multiple monitoring scenes. Up to 3 auxiliary screens are supported. Digital Zoom Use the left key of mouse to drag a rectangle area in the lower-right/upper-left direction, and then the rectangle area will zoom in/out. You can also use the mouse wheel for zooming in or restoring of the video in digital zoom mode. Channel-zero For the channel-zero of the device, you can hold the Ctrl key and double-click to display the specific channel. Hold the Ctrl key and double-click again to restore. Two-way Audio Two-way audio function enables the voice talk of the camera. You can get not only the live video but also the real-time audio from the camera. If the device has multiple two-way audio channels, you can select the channel to start two-way audio. The two-way audio can be used for only one camera at one time. Note: Hik-Connect device doesn’t support selecting channel during two-way audio. Camera Status The camera status, such as recording status, signal status, connection number, etc., can be detected and displayed for check. The status information refreshes every 10 seconds. Synchronization The synchronization function provides a way to synchronize the device clock with the PC which runs the client software. 59 User Manual of iVMS-4200 Client Software Chapter 5 Remote Storage Schedule Settings and Playback When the video storage devices are the HDDs, Net HDDs, SD/SDHC cards on the local device, or the remote Storage Server connected, you can set the recording schedule or capture schedule for the cameras for the continuous, alarm triggered or command triggered recording or capture. And the video files can be searched for the remote playback. 5.1 Remote Storage Purpose: The video files and captured pictures can be stored on the HDDs, Net HDDs, SD/SDHC cards on the local device, or the Storage Server connected. Click the icon on the control panel, or click Tool->Storage Schedule to open the Storage Schedule page. 5.1.1 Storing on DVR, NVR, or Network Camera Purpose: Some local devices, including the DVRs, NVRs, and Network Cameras, provide storage devices such as the HDDs, Net HDDs and SD/SDHC cards for video files. You can set a recording schedule or capture schedule for the channels of the local devices. Note: The pictures captured through the capture schedule are stored on the local device and can be searched on the remote configuration page of the device. Before you start: The newly installed storage devices need to be formatted. Go to the remote configuration page of the device, click Storage->General, select the HDD or SD/SDHC card, and click Format to initialize the selected storage device. Steps: 1. Open the Recording Schedule page. 2. Select the camera in the Camera Group list. 3. Check the checkbox Recording Schedule/Capture Schedule under Storage of Encoding Server to enable device local recording or capture. 4. Select the record or capture schedule template from the drop-down list. All-day Template: for all-day continuous recording. Weekday Template: for working-hours continuous recording from 8:00 AM to 8:00 PM. 60 User Manual of iVMS-4200 Client Software Event Template: for the event triggered recording. Template 01 to 08: fixed templates for specific schedules. You can edit the templates if needed. Custom: can be customized as desired. If you need to edit or customize the template, refer to Configuring Recording Schedule Template. 5. Click Advanced Settings to set the recording parameters. Note: The displayed items vary with the devices. Parameters Pre-record Post-record Keep Record Files for Redundant Record Record Audio Descriptions Normally used for the event triggered record, when you want to record before the event happens After the event finished, the video can also be recorded for a certain time. The time for keeping the video files in the storage device, once exceeded, the files will be deleted. The files will be saved permanently if the value is set as 0. Save the video files not only in the R/W HDD but also in the redundant HDD. Record the video files with audio or not. Select the stream type for the recording. Note: For specific type of devices, you can select Dual-Stream for recording Video Stream both main stream and sub-stream of the camera. In this mode, you can switch the stream type during remote playback. Refer to Chapter 5.2.1 Normal Playback for stream switch during playback. Parameters Resolution Picture Quality Interval Captured Picture Number Descriptions Select the resolution for the continuous or event captured pictures. Set the quality for the continuous or event captured pictures. Select the interval which refers to the time period between two capturing actions. Set the picture number for event capture. 6. Optionally, click Copy to… to copy the recording schedule settings to other channels. 7. Click Save to save the settings. 61 User Manual of iVMS-4200 Client Software Configuring Recording Schedule Template Perform the following steps to configure the recording schedule template: If Template 01 to 08 is selected from the drop-down list, start from step 1; If Custom is selected from the drop-down list, start from step 2. 1. Click Edit to enter the Templates Management interface. Select the template to be set and you can edit the template name. 2. Set the time schedule for the selected template. refers to normal recording. The schedule time bar is marked with . refers to the recording for the event. The schedule time bar is marked with refers to the recording triggered by command. The schedule time bar is marked with . Note: Record triggered by command is only available for the ATM transactions when the ATM DVR is added to iVMS-4200. When the cursor turns to , you can set the time period. When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period. When the cursor turns to 3. Optionally, you can select the schedule time bar, and then click the icon or click the icon or click the icon 4. , you can lengthen or shorten the selected time bar. to delete the selected time bar, to delete all the time bars, to copy the time bar settings to the other dates. Click OK to save the settings. You can click Save as Schedule Template on the Custom Schedule interface, and then the custom template can be saved as template 01 to 08. Note: Up to 8 time periods can be set for each day in the recording schedule. 62 . User Manual of iVMS-4200 Client Software 5.1.2 Storing on Storage Device Purpose: You can add storage device to the client for storing the video files and pictures of the added encoding devices and you can search the files for remote playback. The storage device can be Storage Server, CVR (Center Video Recorder) or other NVR. Here we take the settings of Storage Server as an example. Before you start: The Storage Server application software needs to be installed and it is packed in the iVMS-4200 software package. After running the installation package, check Storage Server to enable the installation of Storage Server. Resetting Password for Storage Server If it is the first running the iVMS-4200 Storage Server, you are required to set a password for the Storage Server. 63 User Manual of iVMS-4200 Client Software Steps: 1. Click the shortcut icon on the desktop of the PC installed with Storage Server to run it. Notes: You can also record the video files on the Storage Server installed on other PC. If the Storage Server port (value: 8000) is occupied by other service, a window box will pop up. You should change the port No. to other value to ensure the proper running of the Storage Server. 2. The following window pops up. 3. Input the new password and confirm password. A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length of the password cannot be less than 6 characters. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 4. Click OK to change the password. After changing the password, the Storage Server will run automatically. Adding Storage Server Steps: 1. Open the Device Management page of iVMS-4200 Client and click Device tab. 64 User Manual of iVMS-4200 Client Software 2. Click Hikvision Device to display the Hikvision Device list. For adding Storage Server, refer to Chapter 3.1 Adding Device. Formatting HDDs The HDDs of the Storage Server need to be formatted for the video file and picture storage. Steps: 1. Select the added Storage Server from the list and click Remote Configuration. 2. Click Storage->General, to enter the HDD Formatting interface. 3. Select the HDD from the list and click Format. You can check the formatting process from the process bar and the status of the formatted HDD changes from Unformatted to Normal Status. Note: Formatting the HDDs is to pre-allocate the disk space for storage and the original data of the formatted HDDs will not be deleted. 65 User Manual of iVMS-4200 Client Software Configuring CVR on Web Client Purpose: Client provides entry to the CVR configuration web client for convenient usage. You can configure the CVR parameters on the web client. Note: This function should be supported by the device. Select the added CVR from the list and click Configuration on Device to go to the CVR configuration web client. Note: For details about configuring CVR parameters on the web client, refer to the User Manual of the device. Configuring Storage Schedule Before you start: The Storage Server needs to be added to the client software and the HDDs need to be formatted for the video file storage. Steps: 1. Open the Storage Schedule page. 2. Select the camera from the Camera Group list. 3. Select the Storage Server from the Storage Server drop-down list. Note: You can click Storage Server Management to add, edit or delete the Storage Server. 4. Check the checkbox Recording Schedule to enable storing the video files. You can also check the checkbox Picture Storage to store the alarm pictures of the camera when event occurs. For the network cameras with the function of heat map or people counting, the Additional Information Storage checkbox is available. You can click VCA Config to set the VCA rule for the camera, and check the Additional Information Storage checkbox and the heat map, people counting data and road traffic data will be uploaded to the Storage Server. Please refer to Chapter 21.1 Heat Map, Chapter 21.2 People Counting and Chapter 21.4 Road Traffic for checking the data. Note: For detailed configuration about setting the VCA rule, refer to the User Manual of the camera. 66 User Manual of iVMS-4200 Client Software 5. Select the schedule template for recording from the drop-down list. If you need to edit or customize the template, refer to Configuring Recording Schedule Template. 6. Click Advanced Settings to set the pre-record time, post-record time, video stream, and other parameters for recording. Note: The iVMS-4200 Storage Server only supports main-stream. 7. Click Set Quota to enter the HDD management interface of the Storage Server. You can set the corresponding quota ratio for record, picture and additional information. Example: If you set the record quota as 60%, then the 60% of the storage space can be used for storing the video files. 8. Click Save to save the settings. Note: The Storage Server supports storage of line crossing detection alarm, intrusion detection alarm, region entrance detection alarm, region exiting detection alarm, fast moving detection alarm, people gathering detection alarm, loitering detection alarm, parking detection alarm, object removal detection alarm, and unattended baggage detection alarm recording. For details, refer to Chapter 6 Alarm Management. 5.2 Remote Playback Purpose: The video files stored on the local device or the Storage Server can be searched by camera or triggering event, and then can be played back remotely. Before you start: You can set to play back the video files stored in the local device, in the Storage Server, or both in the Storage Server and local device. For details, refer to Chapter 22.2 Live View and Playback Settings. Optionally, you can set the cameras rotate direction for playback in Group Management. Refer to Chapter 3.2.3 Modifying . Click the icon on the control panel, or click View->Remote Playback to open the Remote Playback page. 67 User Manual of iVMS-4200 Client Software Remote Playback Page 1 Camera List 2 Display Window of Playback 3 Playback Control Buttons 4 Timeline 5 Calendars 6 Search Condition 5.2.1 Normal Playback Purpose: The video files can be searched by camera or group name for the Normal Playback. Note: For Hik-Connect device, it only supports normal playback. Switching Video Stream for Playback Purpose: Optionally, you can switch between main stream and sub-stream for playback. Before you start: Set the video stream for recording as Dual-Stream, refer to step 5 of Chapter 5.1.1 Storing on DVR, NVR, or Network Camera for details. Note: This function should be support by the device. Steps: 1. Enter Group Management interface and open the Modify Camera window (refer to Chapter 3.2.3 Modifying ). 2. Set the video stream of the camera to main stream or sub-stream. Searching Video Files for Normal Playback Steps: 1. Open the Remote Playback page. 2. Click the calendars icon to activate the calendars window. 68 User Manual of iVMS-4200 Client Software Select the start and end date and set the accurate time. Click OK to save the searching period. 3. Click-and-drag the camera or group to the display window, or double-click the camera or group to start the playback. 4. The found video files of the selected group or camera will be displayed on the right of the interface in chronological order. You can filter the results through the Filter text field. The first video file will be played back automatically by default. Notes: Up to 16 cameras can be searched simultaneously. In the calendar, the date which has scheduled records will be marked with with event records will be marked with and the date . Playing Back Video Files After searching the video files for the normal playback, you can play back the video files in the following two ways: Playback by File List Select the video file from the search result list, and then click the icon on the video file, or double-click the video file to play the video on the display window of playback. Playback by Timeline The timeline indicates the time duration for the video file, and the video files of different types are color coded. Click on the timeline to play back the video of the specific time. You can click or to scale up or scale down the timeline bar. You can drag the timeline bar to go to the previous or the next time period. You can use the mouse wheel to zoom in or zoom out on the timeline. 69 User Manual of iVMS-4200 Client Software Normal Playback Toolbar: On the Normal Playback page, the following toolbar buttons are available: Reverse Playback Pause/Start Playback Stop Playback Single Frame (Reverse) Single Frame Play back the video file reversely. Note: The Hik-Connect device doesn’t support this function. Pause/Start the playback of the video files. Stop the playback of all cameras. Play back the video files frame by frame reversely. You can also scroll down the mouse wheel to play the video file frame by frame reversely. Play back the video files frame by frame. You can also scroll down the mouse wheel to play the video file frame by frame. Slow Forward/Fast Decrease/Increase the play speed of the playback. Forward Note: The Hik-Connect device doesn’t support this function. Volume Click to turn on/off the audio and adjust the audio volume. Event Playback Search the recordings triggered by event, such as motion detection, video loss or video tampering. ATM Playback Search the recordings of ATM devices. POS Playback Search the recordings which contain POS information. VCA Playback Download for Multiple Cameras Window Division Set the VCA rule to the searched video files that VCA event occurs, including motion detection, Intrusion and Line Crossing. Download video files of multiple cameras at the same time. Set the window division. 70 User Manual of iVMS-4200 Client Software Full Screen Async/Sync Playback Display the video playback in full-screen mode. Press ESC to exit. Click to play back the video files synchronously/asynchronously. Download the video files of the camera and the video files are Download stored in the PC. You can select to download by file, by date, or by tag. Add default tag for the video file to mark the important video Tag point. You can edit the tag or go to the tag position via the right-click menu. Note: The Hik-Connect device doesn’t support this function. Filter Display the record types as desired. E.g., you can select to display only the event recording. Accurate Positioning Set the accurate time point to play back the video file. Date The day that has video files will be marked with . Right-click on the display window in playback to open the Playback Management Menu: The following items are available on the right-click Playback Management Menu: / / Reverse Playback Play back the video file reversely. Pause/Start Pause/Start the playback. Stop Stop the playback. Fast Forward Play back the video file at a faster speed. Slow Forward Play back the video file at a slower speed. Single Frame (Reverse) Play back the video file frame by frame (reversely). Open Digital Zoom Enable the digital zoom function. Click again to disable the function. Show/Hide Temperature For thermal camera, click to show or hide the temperature on Information the live view image. Tag Control Add default (default tag name TAG) or custom tag (customized 71 User Manual of iVMS-4200 Client Software tag name) for the video file to mark the important video point. You can also edit the tag or go to the tag position conveniently. Accurate Positioning Set the accurate time point to play back the video file. Capture Capture the picture in the playback process. Print Captured Picture: Capture a picture and print it. Send Email: Capture the current picture and then send an Email Other Capture Modes notification to one or more receivers. The captured picture can be attached. Custom Capture: Capture the current picture. You can edit its name and then save it. Start/Stop Recording / Download Enable/Disable Audio Fisheye Expansion Full Screen Start/Stop the manual recording. The video file is stored in the PC. Download the video files of the camera and the video files are stored in the PC. You can select to download by file or by date. Click to enable/disable the audio in playback. Enter the fisheye playback mode. For details, refer to Chapter 5.2.8 Fisheye Playback. Display the playback in full-screen mode. Click the icon again or press Esc key to exit. 5.2.2 Alarm Input Playback Purpose: When the alarm input is triggered and the linked video can be searched for Alarm Input Playback and this function requires the support of the connected device. Searching Video Files for Alarm Input Playback Steps: 1. Open the Remote Playback page. 2. Click 3. (Optional) Click the calendars icon to show the Alarm Input panel on the left. to activate the calendars window. Select the start and end date and set the accurate time, and click OK. 4. Click-and-drag the alarm input to the display window, or double-click the alarm input to start the playback. 5. The found video files of the selected alarm input will be displayed on the right of the interface. You can filter the results through the Filter text field. Playing Back Video Files After searching the video files triggered by alarm input, you can play back the video files in the following two ways: Playback by File List Select the video file from the search result list, and then click the icon on the video file, or double-click the video file to play the video on the display window of playback. 72 User Manual of iVMS-4200 Client Software Playback by Timeline The timeline indicates the time duration for the video file, and the video files of different types are color coded. Click on the timeline to play back the video of the specific time. You can click or to scale up or scale down the timeline bar. You can drag the timeline bar to go to the previous or the next time period. You can use the mouse wheel to zoom in or zoom out on the timeline. Please refer to Chapter 5.2.1 Normal Playback for the description of the playback control toolbar and right-click menu. Some icons may not available for Alarm Input playback. 5.2.3 Event Playback Purpose: The recordings triggered by event, such as motion detection, VCA detection, behavior analysis, or access control event (for video access control terminal), can be searched for Event Playback and this function requires the support of the connected device. Searching Video Files for Event Playback Steps: 1. Open the Remote Playback page. 2. Select the camera and start the normal playback. Refer to Chapter 5.2.1 Normal Playback. 3. Click 4. Click the calendars icon and the motion detection triggered recording will be searched by default. to activate the calendars window box. Select the start and end date and set the accurate time. Click OK to save the searching period. Note: In the calendar, the date which has scheduled records will be marked with date with event records will be marked with 5. and the . Select the event type from the drop-down list and the found video files will be displayed. You can filter the results by inputting the keyword in the Filter text field. Or you can click to go back to the normal playback. 6. Select the video file from the search result list, and then click the icon on the video file, or double-click the video file to play the video on the corresponding display window of playback. 73 User Manual of iVMS-4200 Client Software Playing Back Video Files After searching the recordings triggered by the event, you can play back the video files in the following two ways: Playback by File List Select the video file from the search result list, and then click the icon in the toolbar, or click the icon on the video file, or double-click the video file to play the video on the corresponding display window of playback. Playback by Timeline The timeline indicates the time duration for the video file. Click on the timeline to play back the video of the specific time. You can click or to scale up or scale down the timeline bar. You can drag the timeline bar to go to the previous or the next time period. You can use the mouse wheel to zoom in or zoom out on the timeline. Event Playback Toolbar: On the Remote Playback page, the following toolbar buttons are available: Reverse Playback Play back the video file reversely. Pause/Start Playback Pause/Start the playback of the video files. Stop Playback Stop the playback of all cameras. Single Frame (Reverse) Play back the video files frame by frame reversely. Single Frame Play back the video files frame by frame. Previous Event Go to the playback of the previous event. Next Event Go to the playback of the next event. Slow Forward/Fast Forward Decrease/Increase the play speed of the playback. Volume Click to turn on/off the audio and adjust the audio volume. 74 User Manual of iVMS-4200 Client Software Display the video playback in full screen mode. Press Full Screen ESC to exit. Download the video files of the camera and the video Download files are stored in the PC. Accurate Positioning Set the accurate time point to play back the video file. Date The day that has video files will be marked with . Please refer to Chapter 5.2.1 Normal Playback for the description of the right-click menu. Some icons may not available for event playback. Note: You can set the pre-play time for event playback in System Configuration. By default, it is 30s. For configuring the pre-play time, refer to Chapter 22.2 Live View and Playback Settings. 5.2.4 ATM Playback Purpose: Search the video files for ATM DVR. Note: This function should be supported by the device and the device should be configured with transaction rules. For details, refer to the User Manual of the device. Searching Video Files for ATM Playback Steps: 1. Open the Remote Playback page. 2. Select the camera of the ATM DVR and start the normal playback. Refer to Chapter 5.2.1 Normal Playback. 3. 4. Click to enter the ATM playback interface. Enter the search conditions. : Input the card number that is contained in the ATM information. : Check the checkbox and select the transaction type for query, and input the related transaction amount. File Type: Select the type of the video file to be searched. 5. Click the calendars icon to activate the calendars window. Select the start and end date and set the accurate time. Click OK to save the searching period. 6. Click Search and the matched files will be displayed. You can filter the results through the Filter text field. 7. Double-click a file for playback. Or you can click to go back to the normal playback. Playing Back Video Files After searching the recordings, you can play back the video files in the following two ways: Playback by File List Select the video file from the search result list, and then click the icon in the toolbar, or click the icon on the video file, or double-click the video file to play the video on the corresponding display window of playback. 75 User Manual of iVMS-4200 Client Software Playback by Timeline The timeline indicates the time duration for the video file. Click on the timeline to play back the video of the specific time. You can click or to zoom in or zoom out the timeline bar. You can drag the timeline bar to go to the previous or the next time period. You can use the mouse wheel to zoom in or zoom out on the timeline. Please refer to Chapter 5.2.1 Normal Playback for the description of the playback control toolbar and right-click menu. Some icons may not available for ATM playback. 5.2.5 POS Playback Purpose: Search the video files which contain POS information. Note: This function should be supported by the device and the device should be configured with POS text overlay. For details, refer to the User Manual of the device. Searching Video Files for POS Playback Steps: 1. Open the Remote Playback page. 2. Select the camera and start the normal playback. Refer to Chapter 5.2.1 Normal Playback. 3. Click 4. Enter the search conditions. to enter the POS playback interface. Keywords: Input the keywords that are contained in the POS information. You can input up to 3 keywords by separating each one with a comma. Filter: If you input more than one keyword for query, you can select “or(|)” to search the POS information containing any of the keywords, or select “and(&)” to search the POS information containing all of the keywords. Case Sensitive: Check the checkbox to search the POS information with case-sensitivity. 7. Click the calendars icon to activate the calendars window box. Select the start and end date and set the accurate time. Click OK to save the searching period. 5. Click Search and the matched files will be displayed. You can filter the results through the Filter text field. 6. Double-click a file for playback. Or you can click to go back to the normal playback. Playing Back Video Files After searching the recordings, you can play back the video files in the following two ways: Playback by File List Select the video file from the search result list, and then click the icon in the toolbar, or click the icon on the video file, or double-click the video file to play the video on the corresponding display window of playback. Playback by Timeline The timeline indicates the time duration for the video file. Click on the timeline to play back the 76 User Manual of iVMS-4200 Client Software video of the specific time. You can click or to zoom in or zoom out the timeline bar. You can also use the mouse wheel to zoom in or zoom out on the timeline. You can drag the timeline bar to go to the previous or the next time period. Please refer to Chapter 5.2.1 Normal Playback for the description of the playback control toolbar, right-click menu and downloading record files. Some icons may not be available for POS playback. 5.2.6 Synchronous Playback Purpose: In synchronous playback, the video files can be played back in synchronization. Note: Video files from up to 16 cameras can be played back simultaneously. Steps: 1. Search the video files for the normal playback (Chapter 5.2.1 Normal Playback). At least two cameras are during playback. 2. Click in the toolbar to enable the synchronous playback. The camera under playback will start synchronous playback. 3. To disable the synchronous playback, click the icon . 5.2.7 VCA Playback Purpose: You can set VCA rule to the searched video files and find the video that VCA event occurs, including Motion, Intrusion and Line Crossing. This function helps to search out the video that you may be more concerned and mark it with red color. Motion Detection: Get all the related motion detection events that occurred in the pre-defined region. Intrusion Detection: Detect whether there are people, vehicles and other moving objects intruding into the pre-defined region. Line Crossing Detection: Bi-directionally detect people, vehicles and other moving objects that 77 User Manual of iVMS-4200 Client Software cross a virtual line. Note: For some devices, you can filter the searched video files by setting the advanced attributes, such as the gender and age of the human and whether he/she wears glasses. Steps: 1. Open the Remote Playback page. 2. Select the camera and start the normal playback. Refer to Chapter 5.2.1 Normal Playback. 3. 4. Click to enter the VCA playback interface. Select the VCA Type, draw the detection region and set the sensitivity. Notes: For Motion, click , and then click and move on the playback window to set the grid rectangle as the detection region. Or you can click camera as the detection region. For Intrusion, click detection region. For Line Crossing, click detection line. to set all the area shot by the and then click on the playback window to set the vertex for the and then click-and-drag on the playback window to set the Note: For Intrusion and Line Crossing, you can click Advanced Attributes and check the checkbox to filter the searched video files by setting the target characters, such as the gender and age of the human and whether he/she wears glasses. This function should be supported by the device. 5. To delete the drawn region or line, click to remove it. Click the calendars icon to activate the calendars window box. Select the start and end date and set the accurate time. Click OK to save the searching period. 6. Click Search and the VCA events occurred in the defined area will be red marked on the timeline. By default, the playback speed of concerned video will be 1X, and the playback speed of unconcerned video will be 8X. Note: You can set to skip the unconcerned video during VCA playback in System Configuration and the unconcerned video won’t be played during VCA playback. Refer to Chapter 22.2 Live View and Playback Settings. Playing Back Video Files 78 User Manual of iVMS-4200 Client Software After searching the recordings, you can play back the video files in the following two ways: Playback by File List Select the video file from the search result list, and then click the icon in the toolbar, or click the icon on the video file, or double-click the video file to play the video on the corresponding display window of playback. Playback by Timeline The timeline indicates the time duration for the video file. Click on the timeline to play back the video of the specific time. You can click or to zoom in or zoom out the timeline bar. You can drag the timeline bar to go to the previous or the next time period. You can use the mouse wheel to zoom in or zoom out on the timeline. Please refer to Chapter 5.2.1 Normal Playback for the description of the playback control toolbar and right-click menu. Some icons may not available for VCA playback. 5.2.8 Fisheye Playback Purpose: The video files can be played back in fisheye expansion mode. Steps: 1. Open the Remote Playback page. 2. Select the camera and start the normal playback. Refer to Chapter 5.2.1 Normal Playback. 3. Right-click on the playback video and select Fisheye Expansion to enter the Fisheye Expansion Mode. Note: The mounting type of fisheye expansion in playback is set according to the mounting type in live view. For details, refer to Chapter 4.7 Live View in Fisheye Mode. 4. You can select the expanding mode for playback as desired. Fisheye: In the Fisheye view mode, the whole wide-angle view of the camera is displayed. This view mode is called Fisheye because it approximates the vision of a fish’s convex eye. The lens produces curvilinear images of a large area, while distorting the perspective and angles of objects in the image. o o Panorama/Dual-180 Panorama/360 Panorama: In the Panorama view mode, the distorted fisheye image is transformed to normal perspective image by some calibration methods. PTZ: The PTZ view is the close-up view of some defined area in the Fisheye view or Panorama view, and it supports the electronic PTZ function, which is also called e-PTZ. Note: Each PTZ view is marked on the Fisheye view and Panorama view with a specific navigation box. You can drag the navigation box on the Fisheye view or Panorama view to adjust the PTZ view, or drag the PTZ view to adjust the view to the desired angle. 79 User Manual of iVMS-4200 Client Software Right-click on a playing window and you can switch the selected window to full-screen mode. Press ESC key on the keyboard or right-click on the window and select Quit Full Screen to exit the full-screen mode. On the Normal Playback page, the following toolbar buttons are available: Reverse Playback Play back the video file reversely. Pause/Start Playback Pause/Start the playback of the video files. Single Frame (Reverse) Play back the video files frame by frame reversely. Single Frame Play back the video files frame by frame. Slow Forward/Fast Forward Decrease/Increase the play speed of the playback. Volume Click to turn on/off the audio and adjust the audio volume. Full Screen Display the video playback in full-screen mode. Press ESC to exit. 5.2.9 Downloading Video Files During playback, you can click on the toolbar to download the video files of the camera to the local PC. You can select to download by file, by date, or by tag. You can also download the video files of multiple cameras at the same time. Note: You cannot download the video files of Hik-Connect device. Download by Files Steps: 1. Click Download by Files tab in the File Download interface. You can view the video files information of selected camera. 2. Check the checkbox of the video file and the total size of the selected files will be shown below. 3. Click Download to start downloading the file to the local PC. You can input the flow (0 to 32768 kbps) and click Set to control the downloading speed. 80 User Manual of iVMS-4200 Client Software 4. Optionally, you can click Stop to stop downloading manually. Download by Date Steps: 1. Click Download by Date tab in the File Download interface. 2. 3. Check the checkbox of the time duration to enable it, and click to set the start and end time. Click Download to start downloading the file to the local PC. The progress bar shows the downloading process. You can input the flow (0 to 32768 kbps) and click Set to control the downloading speed. 4. Optionally, you can click Stop to stop downloading manually. 81 User Manual of iVMS-4200 Client Software Note: When downloading video file of one time duration, you can set to merge the video files. The video files in the set time duration can be merged for downloading. For configuring merging downloaded video files, refer to Chapter 22.2 Live View and Playback Settings. Download by Tag Steps: 1. Click Download by Tag tab in the File Download interface. The added tags will be displayed. 2. Check the checkbox of the tag and the total size of the selected files will be shown below. 3. Click Download to start downloading the selected file (30 seconds before the selected tag to 30 seconds after the tag) to the local PC. You can input the flow (0 to 32768 kbps) and click Set to control the downloading speed. 4. Optionally, you can click Stop to stop downloading manually. 82 User Manual of iVMS-4200 Client Software Download for Multiple Cameras Purpose: You can download the video files of the multiple cameras simultaneously. Before You Start: Play the video files of multiple cameras. Steps: 1. Start playback for multiple cameras. 2. Click 3. Check the checkbox(es) to select cameras. 4. Set the start time and end time. 5. (Optional) Check the Download Player checkbox to download the player. to open the Download for Multiple Cameras window. 83 User Manual of iVMS-4200 Client Software 6. Click Download to start downloading the file to the local PC. The progress bar shows the downloading process. You can input the flow (0 to 32768 kbps) and click Set to control the downloading speed. 7. Optionally, you can click Stop to stop downloading manually. Note: The client support downloading video files of up to 16 cameras. 84 User Manual of iVMS-4200 Client Software Chapter 6 Alarm Management Purpose: In iVMS-4200 client software, rules can be set up for triggers and linkage actions. You can assign linkage actions to the trigger by setting up a rule. For example, when motion is detected, an audible warning appears or other linkage actions happen. You can set different linkage actions for the following triggers: Note: The event detection should be supported by the device before you can configure it. Camera Event Alarm Input Exception Zone Event (For details, refer to Chapter 12.1 Configuring Zone Event.) Access Control Event (For details, refer to Chapter 14.7.1 Configuring Client Linkage for Access Control Alarm.) Access Control Alarm Input (For details, refer to Chapter 14.7.2 Configure Device Linkage for Access Control Alarm Input.) Event Card Linkage (For details, refer to Chapter 14.7.3 Event or Card Linkage.) Cross-Device Linkage (For details, refer to Chapter 14.7.4 Cross-Device Linkage.) Pyronix Control Panel Event (For details, refer to Chapter 13.2 Configuring Event. Note: The event types of Camera Event vary according to different devices. Here we take the configuration of some event types as examples. For other types, refer to the User Manual of the device. 6.1 Configuring Motion Detection Alarm Purpose: A motion detection alarm is triggered when the client software detects motion within its defined area. The linkage actions, including alarm output, channel record and client action can be set. Note: The configuration varies according to different devices. For details, refer to the User Manual of the devices. Steps: 1. Open the Event Management page and click Camera Event tab. 2. Select the camera to be configured and select Motion Detection as the event type. 3. Check the checkbox Enable to enable the function of motion detection. Check the checkbox Enable Dynamic Analysis to mark the detected objects with green rectangles in live view and playback. 4. Select the arming schedule template from the drop-down list. All-day Template: For all-day continuous arming. Weekday Template: For working-hours continuous arming from 8:00 AM to 8:00 PM. Template 01 to 09: Fixed templates for special schedules. You can edit the templates if needed. Custom: Can be customized as desired. If you need to edit or customize the template, refer to Configuring Arming Schedule Template. 5. Select the Configuration as desired. 85 User Manual of iVMS-4200 Client Software Note: For some camera, you can select Normal or Expert as the configuration type. Expert mode is mainly used to configure the sensitivity and proportion of object on area of each area for different day/night switch. For details, refer to the User Manual of the device. 6. Select the triggered camera. The image or video from the triggered camera will pop up or be displayed on the Video Wall when motion detection alarm occurs. To capture the picture of the triggered camera when the selected event occurs, you can also set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. 7. Click-and-drag the mouse to draw a defined area for the arming region. You can click the icon to set the whole video area as detection area, or click the icon clear all the detection area. 8. to Drag the slider on the sensitivity bar to adjust the motion detection sensitivity. The larger the value is, the more sensitive the detection is. 9. Check the checkboxes to activate the linkage actions. Linkage Actions Alarm Output Channel Record Descriptions Enable the alarm output function. Select the alarm output port and the external device connected to the port can be controlled. Start the recording of the selected cameras when alarm is triggered. The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Send an email notification of the alarm information to one or more receivers. Alarm on E-map Display the alarm information on the E-map. Alarm Triggered The image with alarm information pops up when alarm is triggered. Pop-up Image Alarm Triggered Video Wall Display Note: You should set the triggered camera first. Display the video of the trigged camera on the Video Wall when alarm is triggered. Note: You should set the triggered camera first. 10. Optionally, click Copy to… to copy the event parameters to other channels. 11. Click Save to save the settings. 86 User Manual of iVMS-4200 Client Software Configuring Arming Schedule Template Perform the following steps to configure the arming schedule template: If Template 01 to 09 is selected in the drop-down list, start from step 1; If Custom is selected in the drop-down list, start from step 2. Steps: 1. Click Edit to enter the Templates Management interface. Select the template to be set and you can edit the template name. 2. Set the time schedule for the selected template. When the cursor turns to When the cursor turns to , you can set the time period. , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period. When the cursor turns to 3. Optionally, you can select the schedule time bar, and then click the icon or click the icon 4. , you can lengthen or shorten the selected time bar. to delete the selected time bar, to delete all the time bars, or click the icon to copy the time bar settings to the other dates. Click OK to save the settings. You can click Save as Schedule Template on the Custom Schedule interface, and then the custom template can be saved as template 01 to 09. Note: Up to 8 time periods can be set for each day in the arming schedule template. 87 User Manual of iVMS-4200 Client Software 6.2 Configuring Video Tampering Alarm Purpose: A video tampering alarm is triggered when the camera is covered and the monitoring area cannot be viewed. The linkage actions, including alarm output and client action can be set. Steps: 1. Open the Event Management page and click the Camera Event tab. 2. Select the camera to be configured and select Video Tampering Detection as the event type. 3. Check the checkbox Enable to enable the function of video tampering. 4. Select the arming schedule template from the drop-down list. If you need to edit or customize the template, refer to Configuring Arming Schedule Template. 5. Select the triggered camera. The image or video from the triggered camera will pop up or be displayed on the Video Wall when video tampering alarm occurs. To capture the picture of the triggered camera when the selected event occurs, you can also set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. 6. Click-and-drag the mouse to draw a defined area for the arming region. You can click the icon to set the whole video area as detection area, or click the icon clear the detection area. 7. Drag the slider on the sensitivity bar to adjust the tampering alarm sensitivity. 8. Check the checkboxes to activate the linkage actions. Linkage Actions Alarm Output to Descriptions Enable the alarm output function. Select the alarm output port and the external device connected to the port can be controlled. The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Alarm on E-map Send an email notification of the alarm information to one or more receivers. Display the alarm information on the E-map. 88 User Manual of iVMS-4200 Client Software Alarm Triggered Pop-up Image Alarm Triggered Video Wall Display 9. The image of the triggered camera pops up when alarm is triggered. Note: You should set the triggered camera first. Display the video of the trigged camera on the Video Wall when alarm is triggered. Note: You should set the triggered camera first. Optionally, click Copy to… to copy the event parameters to other cameras. 10. Click Save to save the settings. 6.3 Configuring Video Loss Alarm Purpose: When the client software cannot receive video signal from the front-end devices, the video loss alarm will be triggered. The linkage actions, including alarm output and client action can be set. Steps: 1. Open the Event Management page and click Camera Event tab. 2. Select the camera to be configured and select Video Loss as the event type. 3. Check the checkbox Enable to enable the function of video loss alarm. 4. Select the arming schedule template from the drop-down list. If you need to edit or customize the template, refer to Configuring Arming Schedule Template. 5. Select the triggered camera. The image or video from the triggered camera will pop up or be displayed on the Video Wall when video loss alarm occurs. To capture the picture of the triggered camera when the selected event occurs, you can also set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. 6. Check the checkboxes to activate the linkage actions. Linkage Actions Alarm Output Audible Warning Descriptions Enable the alarm output function. Select the alarm output port and the external device connected to the port can be controlled. The client software gives an audible warning when alarm is triggered. You can select the alarm sound for audible warning. For setting the alarm sound, refer 89 User Manual of iVMS-4200 Client Software to Chapter 22.7 Alarm Sound Settings. Email Linkage Send an email notification of the alarm information to one or more receivers. Alarm on E-map Display the alarm information on the E-map. Alarm Triggered The image of the triggered camera pops up when alarm is triggered. Pop-up Image Alarm Triggered Video Wall Display Note: You should set the triggered camera first. Display the video of the trigged camera on the Video Wall when alarm is triggered. Note: You should set the triggered camera first. 7. Optionally, click Copy to… to copy the event parameters to other cameras. 8. Click Save to save the new settings. 6.4 Configuring Audio Exception Alarm Purpose: The abnormal sounds, such as the silence detection, environment noise detection, and current noise detection, can be detected. Enabling the Audio Input Detection can detects the exceptions of audio input condition. Enabling the Sudden Increase of Sound Intensity can detects the sudden increase of the sound intensity, and it consists of the following two settings. Sensitivity: Range [1 to 100], the smaller the value the more severe the change should be to trigger the detection. Sound Intensity Threshold: Range [1 to 100], it can filter the sound in the environment, the louder the environment sound, the higher the value should be. You can adjust it according to the real environment. Enabling the Sudden Decrease of Sound Intensity can detects the sudden decrease of the sound intensity, by which you can find the abnormal silent. E.g.: The electric generator makes loud noise when it’s working, while it should be paid attention if the loud noise drops suddenly. You can set the sensitivity level [0 to 100] according to the actual environment. Note: The Audio Exception function requires the support of connected device. Steps: 90 User Manual of iVMS-4200 Client Software 1. Open the Event Management page and click Camera Event tab. 2. Select the camera to be configured and select Audio Exception Detection as the event type. 3. Check the related checkbox to enable the related function of audio detection alarm. 4. Set the sensitivity and sound intensity threshold. 5. Select the arming schedule template from the drop-down list. If you need to edit or customize the template, refer to Configuring Arming Schedule Template. 6. Select the triggered camera. The image or video from the triggered camera will pop up or be displayed on the Video Wall when audio exception alarm occurs. To capture the picture of the triggered camera when the selected event occurs, you can also set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. 7. Check the checkboxes to activate the linkage actions. Linkage Actions Alarm Output Channel Record Descriptions Enable the alarm output function. Select the alarm output port and the external device connected to the port can be controlled. Start the recording of the selected cameras when alarm is triggered. The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Send an email notification of the alarm information to one or more receivers. Alarm on E-map Display the alarm information on the E-map. Alarm Triggered The image of the triggered camera pops up when alarm is triggered. Pop-up Image Alarm Triggered Video Wall Display Note: You should set the triggered camera first. Display the video of the trigged camera on the Video Wall when alarm is triggered. Note: You should set the triggered camera first. 8. Optionally, click Copy to… to copy the event parameters to other cameras. 9. Click Save to save the new settings. 91 User Manual of iVMS-4200 Client Software 6.5 Configuring Face Detection Alarm Purpose: The camera will detect human faces within the monitoring area automatically if the function is enabled. A series of alarm action will be triggered if the alarm is triggered. Note: The Face Detection function requires the support of connected device. Steps: 1. Open the Event Management page and click Camera Event tab. 2. Select the camera to be configured and select Face Detection as the event type. 3. Check the checkbox Enable to enable the function of face detection alarm. 4. Select the arming schedule template from the drop-down list. If you need to edit or customize the template, refer to Configuring Arming Schedule Template. 5. Select the triggered camera. The image or video from the triggered camera will pop up or be displayed on the Video Wall when face detection alarm occurs. To capture the picture of the triggered camera when the selected event occurs, you can also set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. 6. Set the sensitivity for face detection. 7. Check the checkbox Enable Dynamic Analysis for Face Detection if you want the detected face get marked with rectangle in the live view. 8. Check the checkboxes to activate the linkage actions. Linkage Actions Alarm Output Channel Record Descriptions Enable the alarm output function. Select the alarm output port and the external device connected to the port can be controlled. Start the recording of the selected cameras when alarm is triggered. The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Alarm on E-map Display the alarm information on the E-map. Alarm Triggered The image of the triggered camera pops up when alarm is triggered. Pop-up Image Alarm Triggered Video Wall Display 9. Send an email notification of the alarm information to one or more receivers. Note: You should set the triggered camera first. Display the video of the trigged camera on the Video Wall when alarm is triggered. Note: You should set the triggered camera first. Optionally, click Copy to… to copy the event parameters to other cameras. 10. Click Save to save the new settings. 92 User Manual of iVMS-4200 Client Software Table 6. 1 Linkage Actions for Face Detection Alarm 6.6 Configuring Line Crossing Detection Alarm Purpose: This function can be used for detecting people, vehicles and objects crossing a pre-defined virtual line. The crossing direction can be set as bidirectional, from left to right or from right to left. And a series of linkage method will be triggered if any object is detected. Note: This line crossing detection function requires the support of connected device. Steps: 1. Open the Event Management page and click Camera Event tab. 2. Select the camera to be configured and select Line Crossing Detection as the event type. 3. Check the checkbox Enable to enable the function. Note: For the specific speed dome, you can click Lock to prevent the speed dome from moving automatically during the configuration. 4. Select the arming schedule template from the drop-down list. If you need to edit or customize the template, refer to Configuring Arming Schedule Template. 5. Select the triggered camera. The image or video from the triggered camera will pop up or be displayed on the Video Wall when line crossing detection alarm occurs. To capture the picture of the triggered camera when the selected event occurs, you can also set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. 6. Configure the arming region. Virtual Line ID: Click the drop-down list to choose an ID for the virtual line. Note: For some specific speed dome, you can click PTZ to move the speed dome to the desired scene which corresponds to a virtual line ID. In this way, you can configure the different line crossing detection alarms for multiple views. Virtual Line Direction: You can select the directions as A<->B, A ->B, and B->A. 93 User Manual of iVMS-4200 Client Software A<->B: When an object going across the line with both directions, it can be detected and alarms are triggered. A->B: Only the object crossing the virtual line from the A side to the B side can be detected. B->A: Only the object crossing the virtual line from the B side to the A side can be detected. 7. Set the sensitivity [1 to 100]. 8. Click and draw a virtual line on the preview window. Optionally, you can click the virtual line to adjust its position, click and drag to delete the selected line. Note: Select another virtual line ID and draw another one. Up to 4 lines can be drawn. 9. Check the checkboxes to activate the linkage actions. Linkage Actions Alarm Output Channel Record Descriptions Enable the alarm output function. Select the alarm output port and the external device connected to the port can be controlled. Start the recording of the selected cameras when alarm is triggered. The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Send an email notification of the alarm information to one or more receivers. Alarm on E-map Display the alarm information on the E-map. Alarm Triggered The image of the triggered camera pops up when alarm is triggered. Pop-up Image Alarm Triggered Video Wall Display Note: You should set the triggered camera first. Display the video of the trigged camera on the Video Wall when alarm is triggered. Note: You should set the triggered camera first. 10. Optionally, click Copy to… to copy the event parameters to other cameras. 11. Click Save to save the settings. 94 User Manual of iVMS-4200 Client Software 6.7 Configuring Alarm Input Linkage Purpose: When a device's alarm input port receives a signal from an external alarm device, such as smoke detector, doorbell, etc., the alarm input linkage actions are triggered for notification. Before you start: Add the alarm inputs to the client, click Import on the Group Management interface, click the Alarm Input tab and import alarm inputs into groups for management. Steps: 1. Open the Event Management page and click the Alarm Input tab. 2. Select the alarm input channel to be configured. 3. Check the checkbox Enable. 4. Input a descriptive name of the alarm. 5. Set the alarm status according to the alarm input device. 6. Select the arming schedule template from the drop-down list. If you need to edit or customize the template, refer to Configuring Arming Schedule Template. 7. Select the triggered camera. The image or video from the triggered camera will pop up or be displayed on the Video Wall when alarm input occurs. To capture the picture of the triggered camera when the selected event occurs, you can also set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. 8. Check the checkboxes to activate the linkage actions. Linkage Actions Alarm Output Channel Record Descriptions Enable the alarm output function. Select the alarm output port and the external device connected to the port can be controlled. Start the recording of the selected cameras when alarm is triggered. The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Alarm on E-map Display the alarm information on the E-map. Alarm Triggered The image with alarm information pops up when alarm is triggered. Pop-up Image Alarm Triggered Video Wall Display 9. Send an email notification of the alarm information to one or more receivers. Note: You should set the triggered camera first. Display the video of the trigged camera on the Video Wall when alarm is triggered. Note: You should set the triggered camera first. Optionally, click Copy to… to copy the event parameters to other alarm inputs. 10. Click Save to save the settings. 95 User Manual of iVMS-4200 Client Software 6.8 Configuring Device Exception Linkage Steps: 1. Open the Event Management page and click the Exception tab. 2. Select the device to be configured. 3. Select the device exception type, including HDD full, HDD exception, illegal login, device offline, etc. 4. Check the checkbox Enable. 5. Check the checkboxes to activate the linkage actions. Linkage Actions Descriptions Enable the alarm output function. Select the alarm output port and the Alarm Output external device connected to the port can be controlled. Note: Alarm Output is not available for Device Offline exception. The client software gives an audible warning when alarm is triggered. You can Audible Warning select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Send an email notification of the alarm information to one or more receivers. 6. Optionally, click Copy to… to copy the event parameters to other devices. 7. Click Save to save the settings. 96 User Manual of iVMS-4200 Client Software Chapter 7 Alarm and Event Center Purpose: The received recent alarms and events of all added devices can be displayed. Before you start: Before you can receive the alarm information from the device, you need to click Tool->Device Arming Control and arm the device by checking the corresponding checkbox. Then the alarm information will be auto uploaded to the client software when alarm occurs. Steps: 1. Click the icon 2. You can click Or click in Alarms and Events Toolbar to show the Alarms and Events panel. to display the Alarm Event interface. icon on the control panel to enter the Alarm Event interface. 97 User Manual of iVMS-4200 Client Software On the Alarms and Events panel, the following toolbar buttons are available: Clear Info Enable/Disable Alarm Triggered Pop-up Image Clear the information of alarms and events displayed on the list. Click to enable/disable image pop-up when alarms occur. Enable/Disable Audio Click to enable/disable the audio warning for the alarm. Auto Hide/Lock Click to hide automatically/lock the Alarms and Events panel. Maximize Maximize the Alarms and Events panel in a new tab page. Show/Hide Click to show/hide the Alarms and Events panel. 7.1 Viewing Alarms Information Purpose: Different alarm types can be displayed on the panel: Motion Detection, Video/Audio Exception, Alarm Input, Device Exception, VCA Alarm, CID Alarm, Access Control Alarm, and Other Alarm. You can check the checkbox to enable the displaying of that type alarm. Before you start: To display the alarms, the event parameters need to be configured. Steps: 1. Click the Alarm tab. 2. Check the checkboxes of different alarm types. 3. When an alarm occurs, the icon twinkles to call attention. The alarm information, including the time, source, details and content will be displayed. 4. Click or double click the alarm to get a live view of the alarm triggered camera. 98 User Manual of iVMS-4200 Client Software Note: The Prioritize Display of Latest Alarm is unchecked by default. You can check this checkbox to switch to view the latest triggered alarm. The alarm window is in 4-window division. The latest alarm will replace the earliest alarm window of the displayed four windows. 5. In the alarm picture panel, view the alarm pictures captured when alarm is triggered. Notes: The Picture Storage should be checked for storing the alarm pictures of the camera on the Storage Server. You can click Configure to set the parameters. For details, refer to Chapter 5.1.2 Storing on Storage Device. For thermal camera and target capture camera, the live view of the two channels will display at the same time. 6. Click to send an email notification of the alarm to one or more receivers if the email settings are properly configured (Chapter 22.8 Email Settings). 7. Click to display the video of alarm triggered camera on the Video Wall. You can enter the Video Wall interface to check the alarm triggered video playing on the screen which set as the alarm window. The physical video wall also displays the video. Note: You should add decoding device and configure the video wall. For details, refer to Chapter 11 Decoding and Displaying Video on Video Wall. Click under the Note column to input the description for the alarm. 8. To clear the alarm information, click the icon Clear. , or right-click on an alarm log and then click 7.2 Viewing Events Information Purpose: The abnormal events of the client software, such as the live view failure, can also be displayed. Steps: 1. Click the Event tab. The event information, including the time and detailed description will be displayed. 2. To clear the event information, click the icon Clear. , or right-click on the event log and then click 99 User Manual of iVMS-4200 Client Software 7.3 Viewing Pop-up Alarm Information Purpose: After enabling the event linkage of Alarm Triggered Pop-up Image, and enabling the Enable Alarm Triggered Pop-up Image function on the client, the alarm image will pop up when the corresponding event/alarm is triggered. The Prioritize Display of Latest Alarm is checked by default and the alarm window is in 4-window division. The latest alarm will replace the earliest alarm window of the displayed four windows. You can uncheck this checkbox to switch to view the current triggered alarm. You can click Prev Page or Next Page button to view the previous or next alarm information. 100 User Manual of iVMS-4200 Client Software You can view the live video of the triggered camera. Note: For thermal camera and target capture camera, the live view of the two channels will display at the same time. You can also view the alarm picture capture when the alarm is triggered. Note: The Picture Storage should be checked for storing the alarm pictures of the camera on the Storage Server. You can click Configure to set the parameters. For details, refer to Chapter 5.1.2 Storing on Storage Device. 101 User Manual of iVMS-4200 Client Software Chapter 8 E-map Management Purpose: The E-map function gives a visual overview of the locations and distributions of the installed cameras, alarm input devices, zones, and access control points. You can get the live view of the cameras on the map, and you will get a notification message from the map when alarm is triggered. You can also control the access control points on the E-map such as opening and closing door. Click the icon on the control panel, or click View->E-map to open the E-map page. 8.1 Adding an E-map Purpose: An E-map needs to be added as the parent map for the hot spots and hot regions. Steps: 1. Open the E-map page. 2. Select a group for which you want to add a map. 3. 4. Click the icon in the Map Display Area to open the map adding window box. Input a descriptive name of the added map as desired. 5. 6. Click the icon and select a map file from the local path. Click OK to save the settings. Notes: The picture format of the map can only be *.png, *.jpg or *.bmp. Only one map can be added to a group. The map added is displayed in the Map Display Area. Use the mouse wheel or click or , to zoom in or zoom out on the map. You can click-and-drag the yellow window in the lower-right corner or use the direction buttons and zoom bar to adjust the map area for view. 102 User Manual of iVMS-4200 Client Software Click the button Edit Map or Map Preview in the E-map toolbar to enter the map editing mode or map preview mode. E-map Toolbar in Map Editing Mode: E-map Toolbar in Map Preview Mode: On the E-map page, the following toolbar buttons are available: Modify Map Modify the map information, including the map name and file path. Delete Map Delete the current map. Add Camera Add a camera as the hot spot on the map. Add Alarm Input Add an alarm input sensor as the hot spot on the map. Add Access Control Point Add an access control point as the hot spot on the map. Add Zone Add a zone as the hot spot on the map. Add Hot Region Add a map as the hot region on the current map. Modify Modify the information of the selected hot spot or hot region. Delete Delete the selected hot spot or hot region. Clear Alarm Info Clear the alarm information displayed on the map. Back to Parent Map Go back to the parent map. 8.2 Hot Spot Function Purpose: The cameras and alarm inputs can be added on the map and are called the hot spots. The hot spots show the locations of the cameras and alarm inputs, and you can also get the live view and alarm information of the surveillance scenarios through the hot spots. Notes: 103 User Manual of iVMS-4200 Client Software For managing and previewing the zone hot spot, refer to Chapter 12.3 Displaying Zone on E-map. For managing and previewing the access control point hot spot, refer to Chapter 14.11 Displaying Access Control Point on E-map. 8.2.1 Adding Hot Spots Adding Cameras as Hot Spots Steps: 1. Click the Edit Map button in the E-map toolbar to enter the map editing mode. 2. 3. Click the icon in the toolbar to open the Add Hot Spot window box. Check the checkboxes to select the cameras to be added. 4. Optionally, you can edit hot spot name, select the name color and select the hot spot icon by double-clicking the corresponding field. 5. Click OK to save the settings. The camera icons are added on the map as hot spots and the icons of added cameras changes from to in the group list. You can click-and-drag the camera icons to move the hot spots to the desired locations. You can also click-and-drag the camera icons from the group list to the map directly to add the hot spots. Adding Alarm Inputs as Hot Spots Steps: 1. Click the Edit Map button in the E-map toolbar to enter the map editing mode. 2. 3. Click the icon in the toolbar to open the Add Hot Spot window box. Check the checkboxes to select the alarm inputs to be added. 4. Optionally, you can edit hot spot name, select the name color and select the hot spot icon by double-clicking the corresponding field. 5. Click OK to save the settings. The alarm input icons are added on the map as hot spots and the icons of added alarm inputs changes from to in the group list. You can click-and-drag the alarm input icons to move the hot spots to the desired locations. You can also click-and-drag the alarm input icons from the alarm input list to the map directly to 104 User Manual of iVMS-4200 Client Software add the hot spot. 8.2.2 Modifying Hot Spots Purpose: You can modify the information of the added hot spots on the map, including the name, the color, the icon, etc. Steps: 1. Click the Edit Map button in the E-map toolbar to enter the map editing mode. 2. Select the hot spot icon on the map and then click in the toolbar, right-click the hot spot icon and select Modify, or double-click the hot spot icon on the map to open the Modify Hot Spot window box. 3. You can edit the hot spot name in the text field and select the color, the icon and the linked camera or alarm input. 4. Click OK to save the new settings. To delete the hot spot, select the hot spot icon and click spot icon and select Delete. 8.2.3 Previewing Hot Spots Steps: 105 in the toolbar, or right-click the hot User Manual of iVMS-4200 Client Software 1. Click the Map Preview button in the E-map toolbar to enter the map preview mode. 2. Double-click the camera hot spots or right-click it and select Live View, and you can get the live view of the cameras. 3. If there is any alarm triggered, an icon will appear and twinkle near the hot spot (it will twinkle for 10s). Click the alarm icon, and then you can check the alarm information, including alarm type and triggering time. Note: To display the alarm information on the map, the Alarm on E-map functionality needs to be set as the alarm linkage action. For details, refer to Chapter 6 Alarm Management. 8.3 Hot Region Function Purpose: The hot region function links a map to another map. When you add a map to another map as a hot region, an icon of the link to the added map is shown on the main map. The added map is called child map while the map to which you add the hot region is the parent map. Note: A map can only be added as the hot region for one time. 8.3.1 Adding Hot Regions Before you start: Add a map to another group. Steps: 1. Click the Edit Map button in the E-map toolbar to enter the map editing mode. 2. Select an added map as the parent map. 3. 4. Click the icon in the toolbar to open the Add Hot Region window box. Check the checkbox to select the child map to be linked. 5. Optionally, you can edit the hot region name, and select the hot region color and icon by double-clicking the corresponding field. 106 User Manual of iVMS-4200 Client Software 6. Click OK to save the settings. The child map icons are added on the parent map as the hot regions. You can click-and-drag the child map icons to move the hot regions to desired locations. 8.3.2 Modifying Hot Regions Purpose: You can modify the information of the hot regions on the parent map, including the name, the color, the icon, etc. Steps: 1. Click the Edit Map button in the E-map toolbar to enter the map editing mode. 2. Select the hot region icon on the parent map and then click in the toolbar, right-click the hot spot icon and select Modify, or double-click the hot region icon to open the Modify Hot Region window box. 3. You can edit the hot region name in the text field and select the color, the icon and the linked child map. 4. Click OK to save the new settings. To delete the hot region, select the hot region icon and click hot spot icon and select Delete. 107 in the toolbar, or right-click the User Manual of iVMS-4200 Client Software 8.3.3 Previewing Hot Regions Steps: 1. Click the Map Preview button in the E-map toolbar to enter the map preview mode. 2. Click the hot region icon to go to the linked child map. 3. The hot spots can also be added on the hot regions. 4. You can click the icon You can also click the icon in the toolbar to go back to the parent map. in the toolbar to clear the alarm information. 108 User Manual of iVMS-4200 Client Software Chapter 9 Hik-Connect Purpose: The client software also supports to register a Hik-Connect account, log into your Hik-Connect and manage the devices which support the Hik-Connect service. 9.1 Registering a Hik-Connect Account Purpose: If you do not have a Hik-Connect account, you can register one. Steps: 1. Open the Device Management page and click the Device tab. 2. Click Add New Device Type, select Hik-Connect Device and click OK. 3. Click Hik-Connect Device on the list to enter the following page. 4. Select the region of your Hik-Connect account. 5. Click Login to pop up the following window. Note: The web browser should be Internet Explorer version 9 and later. 6. Click Register to pop up the Register Account window. 109 User Manual of iVMS-4200 Client Software 7. Enter the required information to register an account. User Name: Edit a user name for your account as desired. Password and Confirm Password: Enter the password for your account and confirm it. Phone Number/Email Address: Enter your phone number or email account to register the account. Verification Code: Click Send Message and system will send verification code to your phone or email. Input the received verification code in the Verification Code field. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. 8. Click Register to finish registeration. 9.2 Logging into Hik-Connect Account Note: The login will expire in 7 days. You should login the account again when expired. Steps: 1. Click Login. Note: The web browser should be Internet Explorer version 9 and later. 2. Enter the user name/phone number and password. 3. Click Login to log into your account. 4. (Optional) Click Logout to log out of your Hik-Connect account. Note: You cannot receive alarm information of the devices of the account if you log out. 9.3 Device Management Purpose: You can add the Hik-Connect device to the Hik-Connect account, and delete the added device(s) from the account. You can also do remote configuration and group management to the devices of 110 User Manual of iVMS-4200 Client Software the Hik-Connect account. 9.3.1 Adding Device to Hik-Connect Account Purpose: You can add the Hik-Connect device to the Hik-Connect Account via two ways on the client, i.e., adding manually or adding via Online Device. Note: You can add 256 devices (1024 cameras) to one Hik-Connect account at most. Adding Device Manually Purpose: You can add Hik-Connect device to the Hik-Connect account manually. Steps: 1. Click Add Device to pop up the Add device window. 2. Input the serial No. and verification code of the device. Notes: Only the device that supports the Hik-Connect service can be added. The serial No. is marked on the label of you device. The verification code is created when you enabling the Hik-Connect service. For details, refer to Chapter 3.1.1 Activating Device. 3. The device can only be added to one Hik-Connect account. Click OK to add the device. The successfully added device will list on the device management interface. Note: After adding the device to the Hik-Connect account, you should add the device by Hik-Connect domain if you want to add the device to the local client. For details, refer to Chapter 3.1.5 Adding Devices by Hik-Connect Domain. Adding Device via Online Device Purpose: You can add Hik-Connect device via the online device list. Steps: 1. Select the device(s) which support Hik-Connect service on the online device list. You can also input the keyword in the Filter field to filter the required device. 111 User Manual of iVMS-4200 Client Software 2. (Optional) Activate the device if it is inactivated. For details, refer to Chapter 3.1.1 Activating Device. 3. (Optional) Enable the Hik-Connect service. For details, refer to Chapter 3.1.1 Activating Device. 4. Click Add to Account to pop up the Add Device window. 5. Input the verification code. Note: The verification code is created when you enabling the Hik-Connect service. For details, refer to Chapter 3.1.1 Activating Device. 6. Click OK to add the device. Note: After adding the device to the Hik-Connect account, you should add the device by Hik-Connect domain if you want to add the device to the local client. For details, refer to Chapter 3.1.5 Adding Devices by Hik-Connect Domain. 7. (Optional) You can select device from the device management interface and click Delete to remove the device from the Hik-Connect account. 9.3.2 Modifying Camera Purpose: After adding the Hik-Connect device to the client, you can edit the camera parameters and set stream key. Before you start: You should import the cameras of the added devices to groups. For details, refer to Chapter 3.2 Managing Group. Steps: 1. Click Group tab to enter the group management page. 2. Select camera from the resource list. 112 User Manual of iVMS-4200 Client Software 3. Click Modify to pop up the Modify Camera window. 4. Edit the camera information, including name, rotate, protocol type, etc. Stream Key: For Hik-Connect device, the stream key is the same with the verification code, which is created when you enable the Hik-Connect service. For details, refer to Chapter 3.1.1 Activating Device. Notes: If the live view or video file(s) of the Hik-Connect device is encrypted, you should input the stream key on the Modify Camera window before you can view the live view or video file(s) of the device. You can set whether to encrypt the live view or video file(s) of the Hik-Connect device on the Hik-Connect mobile client software. For details, refer to the User Manual of the Hik-Connect Mobile Client Software. 9.4 Live View and Playback Purpose: You can view the live view of the device, and play the video files stored on the local device or the Storage Server. For details, refer to Chapter 4 Live View and Chapter 5 Remote Storage Schedule Settings and Playback. Before you start: Input the stream key on the Modify Camera window if the live view of the Hik-Connect device is encrypted. For details, refer to 9.3.2 Modifying Camera. Notes: You can perform two-way audio for Hik-Connect device during live view. The Hik-Connect device only supports normal playback. The Hik-Connect device doesn’t support reverse playback, adding tags, fast forward, and slow forward during playback. You cannot download the video files for Hik-Connect device. For PTZ control during live view, the Hik-Connect device only supports the PTZ movements to the upside, downside, left, and right. 113 User Manual of iVMS-4200 Client Software Chapter 10 Forwarding Video Stream through Stream Media Server Purpose: There is always a limit of the device remote access number. When there are many users wanting to get remote access to the device to get the live view, you can add the stream media server and get the video data stream from the stream media server, thus to lower the load of the device. Before you start: The stream media server application software needs to be installed and it is packed in the iVMS-4200 software package. After running the installation package, check Stream Media Server to enable the installation of stream media server. 10.1 Importing Certificate to Stream Media Server Purpose: Before adding the stream media server to the client, you should import the client’s security certificate to the stream media server first to perform security authentication and ensure data security. Note: If the client’s security certificate is updated, you should export the new certificate from the client and import it to the stream media server again to update. Perform the following steps to import the security certificate to the stream media server. Steps: 1. Export the certificate from the client. 1) Enter System Configuration -> Service Certificate. 2) Click Export to export the certificate. 2. Copy the certificate to the PC which has installed with stream media server. 3. Click the shortcut icon on the desktop of the PC installed with stream media server to 114 User Manual of iVMS-4200 Client Software run it. 4. Import the certificate to the stream media server. 1) Right click on the task bar and click Display. 2) Click Configuration to enter the following interface. 3) In the security certificate field, click Import and select the certificate file you export from client in Step 1. 4) Click OK to save the settings. 5) Restart the stream media server to take effect. 10.2 Adding Stream Media Server 10.2.1 Adding One Stream Media Server to Client Purpose: You can add stream media server to the client one by one for further operations. Note: For one client, up to 16 stream media servers can be added. Steps: 1. Click the shortcut icon on the desktop of PC that installed with stream media server to run it. Note: If the stream media server port (value: 554) is occupied by other service, you should change the port number to other value to ensure the proper running of the stream media server. 2. Run iVMS-4200 and click Device Management > Device to enter the device management page. 3. Click Add New Device Type, select Stream Media Server and click OK. 4. Click Stream Media Server on the list and then click Add. 115 User Manual of iVMS-4200 Client Software 5. Select IP Address as the adding mode. 6. Input the nickname and IP address of the stream media server. The default port value is 554. 7. Click Add to add the stream media server to the client software. The added server will display in the server list, showing the server details and status. Note: If the added Stream Media Server’s security certificate doesn’t match with the client’s, it will prompt you with after the server nickname. Move to the icon to view exception message and follow the provided steps to keep certificates consistent. 10.2.2 Batch Adding Stream Media Servers to Client Purpose: You can add stream media servers to the client in a batch for further operations. Note: For one client, up to 16 stream media servers can be added. Steps: 1. Click the shortcut icon on the desktop of PC that installed with stream media server to run it. Note: If the stream media server port (value: 554) is occupied by other service, a window box will pop up. You should change the port No. to other value to ensure the proper running of the stream media server. 2. Run iVMS-4200 and click Device Management > Device to enter the device management page. 3. Click Add New Device Type, select Stream Media Server and click OK. 4. Click Stream Media Server on the list and then click Add. 5. Select IP Segment as the adding mode. 6. Input the start IP and end IP. The default port value is 554. 7. Click Add to add the stream media server to the client software. The steam media server of which the IP address is between the start IP and end IP will be added to the client, showing the servers’ details and status. Note: If the added Stream Media Server’s security certificate doesn’t match with the client’s, it will prompt you with after the server nickname. Move to the icon to view exception message and follow the provided steps to keep certificates consistent. 116 User Manual of iVMS-4200 Client Software 10.3 Adding Cameras to Stream Media Server to Forward Video Stream Purpose: To get the video stream of a camera via stream media server, you need to connect the camera to the stream media server. Steps: 1. Enter the Device Management interface and click Device tab. 2. Select Stream Media Server on the Device Type panel. 3. Select the stream media server from the Device for Management list. 4. Click Configure to enter the Stream Media Server Settings interface. 5. Select the cameras of which the video stream is to be forwarded via the stream media server. 6. Click OK to save the new settings. 7. Go the Main View page and start the live view of the cameras again. You can check the channel number of the video stream forwarded through or sent from the stream media server. Notes: For one stream media server, up to 64 channels of video stream can be forwarded through it and up to 200 channels of video stream can be sent to clients from it. 117 User Manual of iVMS-4200 Client Software If the camera is offline, the client can still get the live video via the stream media server. 118 User Manual of iVMS-4200 Client Software Chapter 11 Decoding and Displaying Video on Video Wall Purpose: The Video Wall module provides the video decoding functionality, and the decoded video can be displayed on the Video Wall for an attention-grabbing performance. Click the icon on the control panel, or click View->Video Wall to open the Video Wall page. 11.1 Adding Encoding Device Purpose: You should add the encoding device for decoding and displaying on the video wall. If you do not add the encoding devices in the Device Management page, you can add them in Video Wall page. Steps: 1. In the Camera area, click to activate the adding device window. 119 User Manual of iVMS-4200 Client Software 2. Select the adding mode and configure the corresponding settings for the device. For the detailed configuration about the 4 adding modes, refer to the following chapters: By specifying the device IP address, refer to Chapter 3.1.3 Adding Devices by IP or Domain Name. By specifying an IP segment, refer to Chapter 3.1.4 Adding Devices by IP Segment. By IP Server, refer to Chapter 3.1.8 Adding Devices by IP Server. By HiDDNS, refer to Chapter 3.1.9 Adding Devices by HiDDNS. (Optional) If you want to add the third-party encoding device, perform the following steps: Steps: 1. Go to the Device Management page and click the Device tab. 2. Click Add New Device Type, select Third-party Encoding Device and click OK. 3. Select Third-party Encoding Device in the device type panel and click Add to activate the Add Device window. For IP/Domain: Edit the nickname, IP address/domain name, port No., user name, password, channel number, start from and protocol for the device. For IP Segment: Edit the start IP, end IP, port No., user name, password, channel number, start from and protocol for the device. Example: If you input 4 in Start From field, it means that the starting channel No. is 4. 120 User Manual of iVMS-4200 Client Software 11.2 Adding Decoding Device Purpose: To decode the video of the encoding device and display the decoded video on the Video Wall, the decoding device needs to be added to the client. Steps: 1. Click Enter Video Wall Config to enter the decoding device and video wall configuration interface. 2. In the Decoding Output area, click to activate the Quick Adding of Decoding Device window. 3. There are two adding modes available. Select the adding mode and configure the corresponding settings for the device. For the detailed configuration about the two adding modes, refer to the following chapters: By specifying the device IP address or domain, refer to Chapter 3.1.3 Adding Devices by IP or Domain Name. By specifying an IP segment, refer to Chapter 3.1.4 Adding Devices by IP Segment. Edit the Output of the Decoding Device Steps: 1. In the Decoding Output area, click before the decoding device to list the outputs of it. 2. Double-click an output and you can edit the parameters for it. Or you can right-click a decoding output in the video wall area and select Decoding Output Configuration to edit its parameters. Note: For HDMI and VGA outputs, the resolution can be configured; for BNC output, the video standard can be configured. 3. (Optional) you can check the checkbox of Batch Configuration and select other outputs to copy the settings to. 4. Click OK to save the settings. 121 User Manual of iVMS-4200 Client Software Notes: It can link with the video inputs and display them on the video wall without through decoding device. It can realize the video wall display, windowing and roaming of images of the cameras directly via the HDMI outputs. You can also edit the parameters of the decoding output. For details, refer to the User Manual of the NVR. 11.3 Configuring Video Wall Settings Purpose: After the encoding device and decoding device have been added, the parameters of Video Wall need to be configured for video display. 11.3.1 Linking Decoding Output with Video Wall Steps: 1. Click Enter Video Wall Config to enter the decoding device and video wall configuration interface. 2. A default video wall view with the window division of 4*4 is provided. You can edit the default video wall or add a new video wall as desired. Task 1: Add a Video Wall 1) Right-click the video wall and select Add Video Wall, or click Wall window. to activate the Add Video 2) Enter the name, row number, column number and proportion of the video wall. 122 User Manual of iVMS-4200 Client Software 3) Click Add. Task 2: Edit a Video Wall 1) Right-click the video wall and select Modify Video Wall to edit it. 2) In the pop-up window, you can edit the name, row number, column number and proportion of the video wall. Note: You can also drag your mouse to set the needed video wall. 3) Click Modify to save the settings. Task 3: Delete a Video Wall To delete the video wall, right-click the video wall and select Delete Video Wall, or click of the video wall. 3. Click-and-drag the decoding output on the left-side list to the display window of video wall, to configure the one-to-one correspondence. You can also click and hold the Ctrl or Shift key to select multiple outputs and then drag them to the video wall for configuring linkage in batch. You can click in the upper-right corner of the display window to release the linkage. Notes: Up to 4 video walls can be added to the client software. The total number of the display windows of the video wall should be no more than 100. The ranges of the row number and column number are both between 1 and 10. 123 User Manual of iVMS-4200 Client Software 11.3.2 Multi-Screen Display Purpose: For DS-6400HDI-T series and DS-6900UDI series decoder, you can span multiple screens as a whole window. In this way, the decoded video of one camera can be shown on the spanned window. Before you start: You should add DS-6400HDI-T series and DS-6900UDI series decoding device to the client. Refer to Chapter 11.2 Adding Decoding Device for detailed configuration about adding decoding device. Steps: 1. Perform the step 3 of Chapter 11.3.1 Linking Decoding Output with Video Wall to configure the linkage between the decoder and video wall. 2. Click-and-drag you mouse to select the adjacent display windows for jointing. Notes: You can only joint the same output interfaces as a whole window. E.g., you can only joint 4 VGA interfaces or HDMI interfaces. 3. Click BNC interface does not support jointing. to confirm jointing the screens. 124 User Manual of iVMS-4200 Client Software 4. (Optional) You can set the resolution for the jointed window by right-clicking on it and select Decoding Output Configuration. To cancel the multi-screen display, click in the upper-right corner of the display window. 11.3.3 Configuring Background Purpose: You can upload pictures for showing as the background of the video window. Note: The function should be supported by the decoding device. Steps: 1. 2. Click to expand the Background Picture panel. Select a background picture and double-click (or right-click and select Background Configuration) it to activate the background uploading window. 3. 4. Set a user-defined name for the background picture and click Click Upload to upload the picture. 5. Click and drag the configured background picture to the desired position of the video wall. 6. You can move the window when the cursor becomes and adjust its size when the cursor becomes directional arrow. Right-click on the background picture and select Show or Hide to 125 to select a picture file. User Manual of iVMS-4200 Client Software show or hide the background picture. Note: The picture will be displayed on the physical video wall after you upload the background. 11.3.4 Configuring Virtual LED Purpose: You can display the required contents on the video wall by using virtual LED. Note: The function should be supported by the decoding device. Steps: 1. Click Enter Video Wall Config to enter the configuration interface. 2. 3. Click to display the Virtual LED panel, click Click-and-drag the virtual LED to the video wall. 4. You can move the window when the cursor becomes becomes directional arrow. 5. Right-click the virtual LED in the panel and select Virtual LED Settings to set the parameters for to expand the added decoding device. and adjust its size when the cursor it. Content: Set the content that you want to display on the video wall. Show Mode: Select the mode of the virtual LED as desired. Moving Mode: Set the scrolling effect for the displayed text. Moving Direction: Set the scrolling direction for the displayed text. Moving Speed: Set the moving speed for the displayed text. Font Size: Set the size of the displayed text. Font Color: Set the color of the displayed text by clicking Color. Background Color: Set the color of the background by clicking Color 126 User Manual of iVMS-4200 Client Software 11.4 Displaying Video on Video Wall Purpose: After the settings of the encoding device, decoding device and video wall, the video stream from the encoding devices can be decoded and displayed on the Video Wall. Notes: After enable decoding and displaying, the captured picture of the video from the encoding device displays on the Video Wall interface. And the real-time live view is shown on the physical video wall. For some kinds of decoder, the video stream from the signal source (which refers to the video signal (e.g., PC) connected to the decoder via the local interfaces) can also be displayed on the video wall. For detailed configuration, refer to the User Manual of the device. 11.4.1 Decoding and Displaying Steps: 1. Click Back to Operation Page to go back to the Video Wall Operation interface. 2. Click to save the linkage settings for the current scene. Or click scene to save the settings. (beside ) and select a Notes: 8 scenes can be set for a video wall. Each scene can be configured with different linkage settings and window divisions. For editing the name of a scene, select a scene and click can also click to define a new name for it. You to clear all the settings for the scene. 3. Select a scene which is configured with linkage settings and click to enable the scene. 4. Click-and-drag the camera on the left-side list to the display window of video wall. The video stream from the camera will be decoded and displayed on the Video Wall. You can also select a decoding window and then double-click a camera to decode and display the video. You can also click and hold the Ctrl or Shift key to select multiple cameras and then drag them to the video wall. Note: For DS-6400HDI-T and DS-6900UDI decoder, you can select the signal source on the Signal Source panel for video wall display. 5. Select a playing window and click the icon to get a preview of the video in the lower-right corner of the screen. Or you can directly drag a camera to the preview window for live view. You can also double-click the preview window to get a full-screen view. Note: You can move the mouse to the window and click in the lower-right corner to stop decoding. 6. (Optional) Select a decoding window and click to save the settings for the current scene. Or click settings for. 7. to set the window division for it. Click (beside If the decoded camera supports PTZ control, you can click ) and select a scene to save the beside PTZ to activate the PTZ control panel. For detailed configuration, refer to Chapter 4.3 PTZ Control in Live View. 8. Right-click on a playing window to activate the decoding management menu, as shown below: 127 User Manual of iVMS-4200 Client Software Note: The menu differs depending on the devices. Stop/Start Decoding: Stop/Start the decoding. Start/Pause Successive Decoding: Start/Pause the cycle decoding. This function is only supported by decoder. Refresh: Refresh the decoding. Open/Close Digital Zoom: Enable/Disable digital zoom. Enable Audio: Turn on/off the audio of the decoding video. Enlarge Window: Display the window in full-screen mode. Decoding Channel Status: View the status of the decoding channel, such as decoding status, stream type. Upload Logo: Upload a picture as the logo to the video window and set the display parameters for it. After setting, the logo shows in the defined position of the window on physical video wall. Show/Hide Logo: Show/Hide the logo. Stick on Top: Always stick the window on the top layer. Stick at Bottom: Always stick the window at the bottom layer. Lock: Lock the window to disable the roaming function. Set Alarm Window: Display the video triggered by event or alarm input on Video Wall. Decoding Delay: Set the delay degree of the decoding according to the actual needs. Go to Playback: Enter the playback mode. This function is only supported by decoder. 128 User Manual of iVMS-4200 Client Software Icon Description Start all the decoding Stop all the decoding Stop all the roaming windows Refresh all the decoding windows Set cycle decoding and switching interval 11.4.2 Windowing and Roaming Settings Purpose: Windowing is to open a new window on the screen(s). The window can be within a screen or span multiple screens. You can move the playing window within the video wall as desired and this function is called roaming. Note: The windowing and roaming function should be supported by the decoding device. Steps: 1. Click-and-drag on a screen which links to a decoding output to open a window. The window can be within a screen or span multiple screens. If you want to open a window on the opened window, click-and-drag and hold the Ctrl key to create one. And for the locked window (refer to step 6), you can click-and-drag to create a new window on it. Note: At least one camera should be selected before opening window. 2. You can move the window when the cursor becomes and adjust its size when the cursor becomes directional arrow. You can also hold the Shift key to scale the window in proportion. 3. During moving the window, the dotted borders will display. The window will be adjusted to align with the borders if it is moved to the location near the dotted borders. 4. Double-click the window and it will enlarge to fill the spanning screens and display on the top layer. You can double-click again to restore. 129 User Manual of iVMS-4200 Client Software 5. (Optional) Select a window and click settings for it. 6. Right-click on a window and select Lock in the right-click menu to disable the roaming function, and the to set the window division for it. Click to save the icon shows on the top-right corner of the window. In this way, the window cannot be moved and resized. You can right-click on the window and select Unlock in the right-click menu to recover the roaming function. 7. Right-click on a window and select Stop Decoding in the right-click menu, or move the mouse to the window and click 8. in the upper-right corner to stop the decoding of the window and it will be closed. You can also click to close all the roaming windows. The window only shows a captured picture of the decoded video. You can right-click on a window and select Refresh in the right-click menu, or move the mouse to the window and click in the lower-right corner to capture a latest picture of the decoded video and display on the window. 9. If you want to view the specific area of the video in details, you can right-click on a window and select Open Digital Zoom (if available) in the right-click menu and the cursor becomes . Use the mouse to drag on the video to realize digital zoom. You can check the effect on the physical video wall 10. Select a playing window and click the icon to get a preview of the video in the lower-right corner of the screen. Or you can directly drag a camera to the preview window for live view. You can also double-click the preview window to get a full-screen view. 11. Right-click on a playing window and you can control decoding management via the right-click menu. 11.4.3 Configuring Playback Purpose: The video file is supported to be played back on the video wall. Note: Playback function is only supported by decoder. Steps: 1. Click-and-drag the camera on the left-side list to the display window of video wall, or you can open a window if supported. 2. Move the mouse to the window and click in the upper-right corner. Or you can right-click on the window and select Go to Playback in the right-click menu. 3. If there is video file of current day, the video file will be played back automatically. If not, you can set the search condition on the search panel which shows in the left area of the interface (click to show more search options, and then click the icon end time for the search), and click Search to find the video file. 130 to specify the start time and User Manual of iVMS-4200 Client Software 4. Right-click on the playback window and you can control the playback through the right-click menu, such as pause, stop, fast forward, slow forward, capture, start recording and full-screen playback. Note: The saving path for the captured pictures and recorded files can be configured on System Configuration page. Please refer to Chapter 22.4 File Saving Path Settings for detailed settings. When you move the mouse to the screen, the icons will display as shown below. Icon Description Pause the playback Stop the playback Capture the playback video Record the playback video Back to live view mode Playback speed. 11.4.4 Configuring Cycle Decoding Purpose: The cycle decoding refers that you can configure multiple video streams of encoding devices to one decoding output and you can set the switching interval for the decoding. Note: The cycle decoding is only supported by decoder. Steps: 1. Click beside and set the switching interval for the cycle decoding. 2. Click-and-drag the camera on the left-side list to the display window of video wall, or you can open a window if supported. Note: The cycle decoding is not supported by the signal source of DS-6400HDI-T and DS-6900UDI. 3. Move the mouse to the group node and click under cycle decoding will be marked with to start cycle decoding (the decoding output ). Right-click on the window and you can control decoding management via the right-click menu. 131 User Manual of iVMS-4200 Client Software Chapter 12 Security Control Panel Purpose: The Security Control Panel module provides remote control and configuration of the partitions and zones via the iVMS-4200 client software. Note: For the users with security control panel permissions, they can enter the Security Control Panel module to manage the security control panel and real-time alarm. For setting the user permission of Security Control Panel module, refer to Chapter 20 Account Management. Before you start: Before you can remotely configure and control the security control panel, you should add device to the software. For details about adding security control panel, refer to Chapter 3.1 Adding Device. 12.1 Configuring Zone Event Purpose: You can configure the event linkages, including siren, relay, client linkage and triggered cameras, for the zones of the security control panel. Note: The zone should be disarmed before configuring the zone event linkages. Steps: 1. Click on the Control Panel, or click Tool -> Event Management to open the Event Management page. 2. Click Zone Event tab. 3. 4. Click the icon to unfold the zone list of a security control panel on the left panel. Click a zone name on the list to activate the configuration of the zone event. 5. Configure the name, type and event linkages for the zone. 132 User Manual of iVMS-4200 Client Software 1) Edit the zone name in the Zone Name field. 2) Unfold the drop-down list of the Zone Type field and select a type. 3) Check the checkbox(es) to select the linked relay(s) on the Linked Relay panel. 4) Check the checkbox(es) to select the linked siren(s) on the Linked Siren panel. 5) Check the checkbox(es) to activate the linkage action(s) on the Trigger Client Action panel. See the detailed actions below: Linkage Actions Descriptions The client software gives an audible warning when alarm is triggered. Audible Warning You can select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Send an email notification of the alarm information to one or more receivers. Alarm on E-map Display the alarm information on the E-map. Alarm Triggered The image with alarm information pops up when alarm is triggered. Pop-up Image Alarm Triggered Video Wall Display Note: You should set the triggered camera first. Display the video on the Video Wall when alarm is triggered. Note: You should set the triggered camera first. 6) Select the camera(s) on the Trigger Camera panel to be triggered for popping up image or displaying on the video wall when the alarm is triggered. To capture the picture of the triggered camera when the selected event occurs, you should set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. Note: Up to 4 cameras can be set as the triggered cameras. 6. Optionally, click Copy to… to copy the event settings to other zones. 7. Click Save to save the settings. 12.2 Remote Control Purpose: In this section, you can control the security control panel remotely to perform operations such as arming, disarming, bypass, group bypass, and so on for both the partitions and zones. Click on the Control Panel to open the Security Control Panel page. All the added security control panels will display. You can click the dropdown list on the upper-left corner to filter the security control panel by device types. Click the icon or at the upper right corner of the page to switch the display mode between the tile or list mode. 12.2.1 Partition Remote Control Purpose: You can remotely perform operations of away arming, stay arming, instant arming, disarming, 133 User Manual of iVMS-4200 Client Software clearing alarm, group bypass, and recovering group bypass for the configured partitions. Steps: 1. (Optional) Click Modify to edit the partition name as you want and change the partition display status as show or hide. 2. (Optional) In tile mode, click Operation to open the Partition Operation window. You can control the partitions in batch. 3. Select the partition(s) to operate. 4. Click the operation button (e.g., Away Arming, Stay Arming, Instant Arming, Disarm, Clear Alarm, Group Bypass or Group Bypass Recovery) to control the selected partition(s). 5. If the partition is in alarm status: Tile mode: A icon will display and twinkle near the partition name. You can hover over the mouse to the icon to device the partition’s zones status. For the details about the triggered zone alarm, refer to Chapter 12.4 Handling Alarms. List mode: The partition name will turn red and a icon will display near the partition name. You can hover over the mouse to the icon to device the partition’s zones status. For the details about the triggered zone alarm, refer to Chapter 12.4 Handling Alarms. 12.2.2 Zone Remote Control Purpose: You can remotely perform bypass, or recover bypass for the zones. Steps: 1. Click to open Zone Operation window. You can view the all linked zones of the partition in this window and check the zone status. 134 User Manual of iVMS-4200 Client Software 2. Select the zone(s) for operation. 3. Click Arm, Disarm, Bypass or Bypass Recovery to control the selected zones. 4. Click in the Live View column to view the live view of the triggered camera in the zone. Note: You can set the triggered camera of the zone in the Event Management module. For details, refer to Chapter 12.1 Configuring Zone Event. 12.3 Displaying Zone on E-map Purpose: You can add the zones on the E-map, and when the alarm in the zone is triggered, you can view the alarm notification on the E-map and check the alarm details. Note: For detailed operations of E-map, refer to Chapter 8 E-map Management. 12.3.1 Adding Zones as Hot Spots Steps: 1. In the E-map module, click Edit Map tab at the lower left corner to enter the map editing mode. 2. Click the icon on the E-map Toolbar to open the Add Hot Spot window. Or you can directly drag the zone icons from the group list on the left panel of E-map page to the map to add the hot spots. 135 User Manual of iVMS-4200 Client Software 3. Check the checkbox(es) to select the zone(s) to be added. 4. Click OK to save the settings. The zone icon(s) will be added to the map as hot spot(s) and the icon(s) of added zone(s) in the group list of the left panel will change from to . You can drag the zone icon to move the hot spot to the desired location. 12.3.2 Modifying Hot Spots Purpose: You can modify the information of the added hot spots on the map, including the name, the color, the icon, etc. Steps: 1. In the E-map module, click the Edit Map tab at the lower left corner to enter the map editing mode. 2. Select the hot spot icon on the map and then click Hot Spot window. in the E-map Toolbar to open the Modify Or right-click the hot spot icon on the map and select Modify in the right-click menu to open the Modify Hot Spot window. Or double-click the hot spot icon on the map to pop up the Modify Hot Spot window. 136 User Manual of iVMS-4200 Client Software You can edit the hot spot name in the text field and select the color, the icon and the linked zone. 3. Click OK to save the settings. To delete the hot spot, select the hot spot icon and click spot icon and select Delete. in the toolbar, or right-click the hot 12.3.3 Previewing Hot Spots In the E-map module, click the Map Preview tab at the lower left corner to enter the map preview mode. If there is any alarm triggered in the zone, an icon will appear and twinkle near the hot spot (it will twinkle for 10s). Click the alarm icon, or right-click the hot spot icon and select Display Alarm Information, to check the alarm information, including alarm type and triggered time. Notes: To display the alarm information on the map, the Alarm on E-map functionality needs to be set as the alarm linkage action. For details, refer to Chapter 12.1 Configuring Zone Event. You can also check the zone alarm information in the Real-time Alarm module. For details, refer to Chapter 12.4 Handling Alarms. To clear the alarm information displayed on the map, you can click on the toolbar, or right-click the zone icon and select Clear Alarm Information to clear the alarms of the selected zone. 12.4 Handling Alarms Purpose: In this section, you can view the real-time triggered CID alarm information of the security control panel and handle alarms. And you can also search the history alarms by time or by alarm type. 137 User Manual of iVMS-4200 Client Software 12.4.1 Real-time Alarm Purpose: You can check the real-time triggered alarm information, including alarm type, alarm time, device name, CID code, zone, partition, alarm description, etc. You can also subscribe and acknowledge the alarms, or check the triggered cameras’ live view and view the linked hot spots on the E-map. Steps: 1. Click on the Control Panel, or click View->Real-time Alarm to open the Real-time Alarm page. All the real-time triggered alarms will display on this page and you can check the alarm type, alarm time, device name, user, CID code, zone, partition, alarm description and so on. You can check the Alarm, Exception, Restore, or Operation checkbox(es) to show the alarms in corresponding type(s). Notes: The Alarm type is marked with is marked with 2. ; the Exception type is marked with ; and the Operation type is marked with ; the Restore type . The number after the alarm type indicates the alarm quantity of this type. Click the icon in the Operation column to acknowledge the selected alarm. Or you can click the Acknowledge in Batch button to acknowledge all the real-time triggered alarms. The acknowledged alarm will disappear from the list. 3. (Optional) Click the icon in the Operation column to view the live view of the triggered cameras. Note: Before you can get the linked live view, you should configure triggered cameras for the zone. For details about setting triggered cameras, refer to Chapter 12.1 Configuring Zone Event. 138 User Manual of iVMS-4200 Client Software 4. (Optional) Click the icon map. in the Operation column to check the zone as hot spot on the Note: Before you can check the zone on the map, you should add the zone as hot spot to the map. For details about adding zone as hot spot, refer to Chapter 12.3 Displaying Zone on E-map. 5. (Optional) You can also subscribe the alarm types to receive desired alarms. 1) Click the Subscribe button to pop up the Subscribe window. 2) Click Alarm, Exception, Restore or Operation tab to select the major alarm type(s). 3) Check the checkbox(es) under the tab to select the minor alarm type(s). 4) Click OK to save the selections. 12.4.2 Searching History Alarms Purpose: In this section, you can search the history alarms by time and filter the searching results by alarm type. You can also handle the matched alarms. In the Real-time Alarm module, click History Alarm tab to enter the History Alarm page. Steps: 1. In the Real-time Alarm module, click History Alarm tab to enter the History Alarm page. 139 User Manual of iVMS-4200 Client Software 2. 3. Click to set the start time and end time of a time period. Click Search button and the matched alarms will display on this page. 4. (Optional) Filter the searching results by alarm type. 1) Click Filter button to pop up the Filter window. 2) Click Alarm, Exception, Restore, or Operation tab to select the major alarm type(s). Note: The Alarm type is marked with Restore type is marked with 5. ; the Exception type is marked with ; and the Operation type is marked with 3) Check the checkbox(es) under the tab to select the minor alarm type(s). 4) Click OK to start filtering history alarms by alarm types ; the . (Optional) For the searched alarms, click or click Acknowledge in Batch button to acknowledge the unacknowledged alarms, and the acknowledged alarm items will turn to gray. You can also click and to check the linked live view of the alarms and view the linked hot spots on the e-map. For details about operating the alarms, refer to Chapter 12.4.1 Real-time Alarm. 12.4.3 Handling Panic Alarm Purpose: For the pole panic alarm station, when the panic alarm is triggered, you can handle the alarm via the client. Steps: 1. When the user calls the center via panic alarm station, the panic alarm is triggered. The following window will pop up. 140 User Manual of iVMS-4200 Client Software You can view the live video. The following icons are available on the toolbar. Icon Name Answer Refuse Waiting Unlock Turn On Alarm Lamp Turn On Alarm Lamp (Remote) Volume In Volume Out 2. 3. You can click to answer the call. Right-click on the live view window to open the right-click menu. The following buttons are available Icon Name Capture Start/Stop Recording Capture the picture in the live view process. Start/Stop the manual recording. The video file is stored in the PC. If the zone is linked to the speed dome, you can enable PTZ control function on the display window. Open PTZ Control Click again to disable the function. Note: For setting the triggered camera, refer to Chapter 12.1 Configuring Zone Event. 141 User Manual of iVMS-4200 Client Software Chapter 13 Pyronix Control Panel Purpose: Pyronix cntrol panel can be added to the client for management and control. You can control the partitions, zones, and alarm outputs of the added Pyronix control panel. After setting the zone event for the Pyronix control panel, the client can receive the alarms triggered by Pyronix control panel when the device is in alarm mode. You can also add the zone of Pyronix control panel to the E-map, and when the alarm in the zone is triggered, you can view the alarm notification on the E-map and check the alarm details. For detailed operations for adding zone to E-map, refer to Chapter 12.3 Displaying Zone on E-map. You can also search the operation logs stored in Pyronix control panel. For details, refer to Chapter 19 Log Management. Note: For the users with Pyronix control panel permissions, they can enter the Pyronix Control Panel module to manage the Pyronix control panel and real-time alarm. For setting the user permission of Pyronix Control Panel module, refer to Chapter 20 Account Management. 13.1 Device Management Purpose: You can add the Pyronix control panel to the client in Device Management module. The device can be managed and controlled via the client once it is authorized by the device administrator on the PyronixCloud service. 13.1.1 Adding Pyronix Control Panel Perform the following steps to add the Pyronix control panel. Steps: 1. Click icon on the control panel, or click Tools->Device Management to open the Device Management page. 2. Click Device tab. 3. Click Add New Device Type to pop up the following window box. 4. Check Pyronix Control Panel checkbox and click OK. 142 User Manual of iVMS-4200 Client Software The Pyronix control panel will display in the device type panel. 5. Click Pyronix Control Panel to enter the Pyronix control panel management interface. 6. Click Add. 7. In the pop up window box, input the required information for adding a Pyronix control panel. Nickname: Set a nickname for the device as you want. Client User Name: Set the user name which is used for applying the permission from PyronixCloud. Note: See Chapter 13.1.2 Authorizing iVMS-4200 via PyronixCloud for details. System ID: The system ID of the Pyronix control panel. It is a unique serial number for each control panel. Note: You can get the control panel ID via the device. For details, refer to the specified device user manual. App Password: The password used to identify the control panel together with the ID on the user cloud account. Note: The App password should be set via the device. For details, refer to the specified device user manual. User Code: The code for every user with different priorities to arm/disarm the control panel and perform allowed operations. Note: You should set the user code via the device. For details about setting the user code, refer to the specified device user manual. 8. Optionally, check the Export to Group checkbox to create a group by the device name. You can import all the zones of the Pynonix control panel to the corresponding group by default. 9. Click Add to add the Pyronix control panel. 10. (Optional) To edit the device parameters, you can select the device and click Modify. 11. (Optional) To delete the added device, select the device and click Delete. 143 User Manual of iVMS-4200 Client Software If it is the first time you add the Pyronix control panel to your client, after adding the Pyronix control panel, its network status is offline. You cannot manage and operate it via the control client until the administrator authorizes the client via the PyronixCloud. What to do next: You should contact the administrator to authorize the client via the PyronixCloud. For details, refer to Chapter 13.1.2 Authorizing iVMS-4200 via PyronixCloud. 13.1.2 Authorizing iVMS-4200 via PyronixCloud Purpose: For the administrator, you need to login the PyronixCloud website to authorize the client so that the user can operate and control the Pyronix control panel via iVMS-4200. Note: For one computer, you should ask for authorization if it is the same time adding the Pyronix control panel. Creating PyronixCloud Account Purpose: Before you can authorize the phone, you need to register a PyronixCloud account and connect the Pyronix control panel to PyronixCloud. Steps: 1. Go to www.pyronixcloud.com via PC to register an account. 2. Click Create an account and complete the form. Note: Once the form is completed, you will receive an email from [email protected] with a confirmation link. Click this link and you can continue on to PyronixCloud and connect your device. 3. Return to PyronixClound home page and login. Connecting Device to PyronixCloud Steps: 1. Input the Pyronix control panel’s system ID in the System ID field. 144 User Manual of iVMS-4200 Client Software 2. Input the cloud password that you entered in the Pyronix device. 3. Click Submit. 4. Input a system reference to set a different name for the device. 5. Click Submit to compete the operation. Notes: The system ID is the device unique ID. You can get the system ID via the device. For details, refer to the specified device user manual. The cloud password should be set via the device. For details, refer to the specified device user manual. After clicking the Submit button, you will receive an email. Click the confirmation link in the email to continue. The control panel will be appeared on View Systems interface. You can click the tick at the upper-right corner of the interface to make sure the device is connected successfully. Authorizing iVMS-4200 Steps: 1. In the View Systems interface, click a user in the User column and make sure the user is from the client that you want to authorize. Note: The user name in the User column is the client user name you input when adding the Pyronix control panel. See Chapter 13.1.1 Adding Pyronix Control Panel for details. 2. 3. Click the permission icon next to the selected user Click Save Now to save the settings. The icon will turn to . Then you can access the device via the client successfully. 13.2 Configuring Event Purpose: You can configure the client linkage and triggered cameras for the triggered events of Pyronix control panel’s zones, or for the device event of Pyronix control panel. Steps: 1. Click on the Control Panel, or click Tool -> Event Management to open the Event 145 User Manual of iVMS-4200 Client Software Management page. 2. Click Pyronix Control Panel Event tab. The added Pyronix control panel is displayed in the list on the left. 3. Click to unfold the zone list and select the zone icon to configure its zone event linkage. You can also click the Pyronix Control Panel’s icon to configure its device event linkage. 4. In the Trigger Camera field, select the camera to be triggered for popping up image when the alarm is triggered. To capture the picture of the triggered camera when the selected event occurs, you should set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. Note: Up to one camera can be set as the triggered camera. 5. Check Trigger Client Action checkbox to activate the client linkage actions. You can check the detailed actions as the client linkage. See the detailed actions below for details: Linkage Actions Descriptions The client software gives an audible warning when alarm is triggered. Audible Warning You can select the alarm sound for audible warning. For setting the alarm sound, refer to Chapter 22.7 Alarm Sound Settings. Email Linkage Alarm Triggered Pop-up Image Alarm on E-map Send an email notification of the alarm information to one or more receivers. The image with alarm information pops up when alarm is triggered. Note: You should set the triggered camera first. Display the zone’s alarm information on the E-map. Note: This linkage is only available for device event. 6. Optionally, click Copy to… to copy the event settings to other zones. 7. Click Save to save the settings. 13.3 Remote Control Purpose: In this section, you can control the Pyronix control panel remotely to perform operations such as arming, disarming, bypass, bypass recovery, and so on for partitions and zones. You can also control the alarm output connected to the Pyronix control panel. Note: You can control the Pyronix control panel remotely after you switch the device to operation 146 User Manual of iVMS-4200 Client Software mode. 13.3.1 Partition Remote Control Purpose: You can arm and disarm the partition of the added Pyronix control panel. The status of the partitions will be displayed in real-time. Steps: 1. Click on the Control Panel, or click View->Pyronix Control Panel to open the Pyronix Control Panel page as follows. All the added Pyronix control panels and partitions will be displayed. Note: The device name will turn grey if it is offline. 2. (Optional) If the partition is in fault status, an icon will display near the partition name. 3. You can hover the icon to view the fault details. (Optional) Click Modify to edit the partition name as you want and change the partition display status as show or hide. 4. Click on the switch of each partition to arm or disarm the partition. 5. (Optional) Hover over the to view the last operation. 13.3.2 Control Zone Remotely Purpose: 147 User Manual of iVMS-4200 Client Software You can view the zone real-time status of the added Pyronix control panel and perform bypass and bypass recovery operations to control the zone. Steps: 1. Click Zone to enter the zone control interface as follows. The zones will be displayed. You can view the zone details including name, linked partitions, and its location. The zone’s bypass status and running status are displayed in real-time. 2. To bypass the zone, select the zone and click Bypass. To recover the bypass, select the zone and click Bypass Recovery. 13.3.3 Control Alarm Output Remotely Purpose: When the Pyronix control panel is connected with alarm outputs, such as siren, alarm lamp, etc., you can also control the alarm output status. Steps: 1. Click Output to enter the alarm output control interface as follows. Its connected alarm outputs will be displayed. You can view the alarm output details including No., name, type, and pulse duration. The alarm output’s running status is displayed in real-time. 148 User Manual of iVMS-4200 Client Software 2. To turn on the alarm output, select the alarm output and click Open. The countdown will start in pulse time. When the countdown finishes, the output status will turn to Off automatically. 3. To turn off the alarm output, select the alarm output and click Close. 149 User Manual of iVMS-4200 Client Software Chapter 14 Access Control Purpose: The Access Control module is applicable to access control devices and video intercom. It provides multiple functionalities, including person and card management, permission configuration, access control status management, video intercom, and other advanced functions. You can also set the event configuration for access control and display access control points and zones on E-map. Note: For the user with access control module permissions, the user can enter the Access Control module and configure the access control settings. For setting the user permission of Access Control module, refer to Chapter 20 Account Management. Click to enter the Access Control Module. Before you start: For the first time opening the Access Control module, the following window will pop up and you are required to select the scene according to the actual needs. You can select the scene as Non-residence and Residence. Notes: Once the scene is configured, you cannot change it later. When you select Non-Residence mode, you cannot configure the Attendance Rule when adding person. The Access Control module is composed of the following sub modules. Person and Card Schedule and Template Permission Managing the organizations, persons, and assigning cards to persons. Configuring the week schedule, holiday group, and setting the template. Assigning access control permissions to persons and applying to the devices. Providing Advanced Function advanced functions including access control parameters settings, card reader authentication, opening door with first card, anti-passing back, multi-door interlocking, and authentication password. 150 User Manual of iVMS-4200 Client Software Video Intercom Search Device Management Video intercom between client and resident, searching the dial log, and releasing notice. Searching history events of access control; Searching call logs, unlocking logs, and released notices. Managing the access control devices and video intercom devices. Note: In this chapter, we only introduce the operations about access control. For detailed operations about video intercom, refer to Chapter 16 Video Intercom. 14.1 Access Control Device Management Before you start: You can add and manage the access control devices in Device Management, or in Access Control -> Device Management module. For details about adding device, refer to Chapter 3.1 Adding Device. 14.1.1 Viewing Device Status In the device list, you can select the device and then click Device Status button to view its status. Door (Floor) Status: The status of the connected door (floor). Distributed Elevator Controller Status: The distributed elevator controller status and its tamper-proof status. Host Status: The status of the host, including Storage Battery Power Voltage, Device Power Supply Status, Multi-door Interlocking Status, Anti-passing Back Status, and Host Anti-Tamper Status. Card Reader Status: The status of card reader. Alarm Input Status: The alarm input status of each port. 151 User Manual of iVMS-4200 Client Software Alarm Output Status: The alarm output status of each port. Event Sensor Status: The event sensor status of each port. Secure Door Control Unit Status: The online status and tamper status of the Secure Door Control Unit. Arming Status: The arming status of the device. You can click Refresh to get the latest device status. 14.1.2 Network Settings Purpose: After adding the access control device, you can set the uploading mode, and set the network center and wireless communication center. Select the device in the device list, and click Modify to pop up the modifying device information window. Click Network Settings tab to enter the network settings interface. Log Uploading Mode Settings Purpose: You can set the mode for uploading logs via EHome protocol. Steps: 1. Click the Uploading Mode tab. 2. Select the center group in the dropdown list. 3. Check the Enable checkbox to enable the selected center group. 4. Select the uploading mode in the dropdown list. You can enable N1/G1 for the main channel and the backup channel, or select Close to disable the main channel or the backup channel. Note: The main channel and the backup channel cannot enable N1 or G1 at the same time. 5. Click Save button to save parameters. 152 User Manual of iVMS-4200 Client Software Network Center Settings You can set the account for EHome protocol in Network Settings page. Then you can add devices via EHome protocol. Steps: 1. Click the Network Center tab. 2. Select the center group in the dropdown list. 3. Select the Address Type as IP Address or Domain Name. 4. Input IP address or domain name according to the address type. 5. Input the port No. for the protocol. 6. Select the protocol type as EHome. 7. Set an account name for the network center. Note: The account should contain 1 to 32 characters and only letters and numbers are allowed. 8. Click Save button to save parameters. Note: The port No. of the wireless network and wired network should be consistent with the port No. of EHome. Wireless Communication Center Settings Steps: 1. Click the Wireless Communication Center tab. 153 User Manual of iVMS-4200 Client Software 2. Select the APN name as CMNET or UNINET. 3. Input the SIM Card No. 4. Select the center group in the dropdown list. 5. Input the IP address and port No. 6. Select the protocol type as EHome. By default, the port No. for EHome is 7660. 7. Set an account name for the network center. A consistent account should be used in one platform. 8. Click Save button to save parameters. Note: The port No. of the wireless network and wired network should be consistent with the port No. of EHome. 14.1.3 Capture Settings You can set the parameters of capture linkage and manual capture. Select the device in the device list, and click Modify to pop up the modifying device information window. Click Capture Settings tab to enter the capture settings interface. Notes: The Capture Settings should be supported by the device. Before setting the capture setting, you should configure the Storage Server for picture storage. For details, refer to Chapter 5.1 Remote Storage. Linked Capture Steps: 1. Select the Linked Capture tab. 154 User Manual of iVMS-4200 Client Software 2. Set the picture size and quality. 3. Set the linked capture times once triggered. 4. Set the capture interval according to the capture times. 5. Click Save to save the settings. Manual Capture Steps: 1. Select the Manual Capture tab. 2. Select the resolution of the captured pictures from the dropdown list. Note: The supported resolution types are CIF, QCIF, 4CIF/D1, SVGA, HD720P, VGA, WD1, and AUTO. 3. Select the picture quality as High, Medium, or Low. 4. Click Save to save the settings. 5. You can click Restore Default Value to restore the parameters to default settings. 155 User Manual of iVMS-4200 Client Software 14.1.4 RS-485 Settings Purpose: You can set the RS-485 parameters including the baud rate, data bit, the stop bit, parity type, flow control type, communication mode, work mode, and connection mode. Select the device in the device list, and click Modify to pop up the modifying device information window. Click RS-485 Settings tab to enter the RS-485 settings interface. Note: The RS-485 Settings should be supported by the device. Steps: 1. Click RS-485 Settings tab to enter the RS-485 settings interface. 1. Select the serial No. of the port from the dropdown list to set the RS-485 parameters. 2. Set the baud rate, data bit, the stop bit, parity type, communication mode, work mode, and connection mode in the dropdown list. 3. Click Save to save the settings and the configured parameters will be applied to the device automatically. Note: After changing the working mode, the device will be rebooted. A prompt will be popped up after changing the working mode. 14.1.5 Wiegand Settings Purpose: You can set the Wiegand channel and the communication mode. Select the device in the device list, and click Modify to pop up the modifying device information window. Click Wiegand-485 Settings tab to enter the Wiegand settings interface. Note: The Wiegand Settings should be supported by the device. Steps: 1. Click the Wiegand Settings tab to enter the Wiegand Settings interface. 156 User Manual of iVMS-4200 Client Software 2. Select the Wiegand channel No. and the communication mode in the dropdown list. If you set the Communication Direction as Send, you are required to set the Wiegand Mode as Wiegand 26 or Wiegand 34. 3. Click Save to save the settings and the configured parameters will be applied to the device automatically. Note: After changing the communication direction, the device will be rebooted. A prompt will be popped up after changing the communication direction. 14.1.6 Authenticating M1 Card Encryption Before you start: You should use the specified Hikvision card enrollment station to issue card. For details, refer to Adding Person (General Card). Purpose: M1 card encryption can improve the authentication security level. After issuing the card, you can enable the M1 card encryption function in the client software. Note: The function should be supported by the access control device and the card reader. Steps: 1. Select the device in the device list, and click Modify to pop up the modifying device information window. 2. Click M1 Card Encryption tab to enter the M1 Card Encryption interface. 3. In the M1 Card Encryption interface, check Enable checkbox to enable the M1 card encryption function. 4. Set the sector ID. 5. Click Save to save the settings. Note: The Sector ID ranges from 1 to 100. 157 User Manual of iVMS-4200 Client Software 14.2 Organization Management Purpose: You can add, edit, or delete the organization as desired. 14.2.1 Adding Organization Steps: 1. In the organization list on the left, you should add a top organization as the parent organization of all organizations. Click Add button to pop up the adding organization interface. 2. Input the Organization Name as desired. 3. Click OK to save the adding. 4. You can add multiple levels of organizations according to the actual needs. To add sub organizations, select the parent organization and click Add. Repeat Step 2 and 3 to add the sub organization. Then the added organization will be the sub-organization of the upper-level organization. Note: Up to 10 levels of organizations can be created. 14.2.2 Modifying and Deleting Organization You can select the added organization and click Modify to modify its name. You can select an organization, and click Delete button to delete it. Notes: The lower-level organizations will be deleted as well if you delete an organization. Make sure there is no person added under the organization, or the organization cannot be deleted. 14.3 Person Management After adding the organization, you can add person to the organization and manage the added person such as issuing cards in batch, importing and exporting person information in batch, etc. Note: Up to 10,000 persons or cards can be added. 158 User Manual of iVMS-4200 Client Software 14.3.1 Adding Person Adding Person (Basic Information) Steps: 1. Select an organization in the organization list and click Add button on the Person panel to pop up the adding person window. 2. The Person No. will be generated automatically and is not editable. 3. Input the basic information including person name, gender, phone No., birthday details, and email address. 4. Click Upload Picture to select the person picture from the local PC to upload it to the client. Note: The picture should be in *.jpg format. 5. (Optional) You can also click Take Phone to take the person’s photo with the PC camera. 6. Click OK to finish adding. Adding Person (Detailed Information) Steps: 1. In the Add Person interface, click Details tab. 159 User Manual of iVMS-4200 Client Software 2. Input the detailed information of the person, including person’s ID type, ID No., country, etc., according to actual needs. Linked Device: You can bind the indoor station to the person. Note: If you select Analog Indoor Station in the Linked Device, the Door Station field will display and you are required to select the door station to communicate with the analog indoor station. 3. Room No.: You can input the room No. of the person. Click OK to save the settings. Adding Person (Permission) You can assign the permissions (including operation permissions of access control device and access control permissions) to the person when adding person. Note: For setting the access control permission, refer to Chapter 14.5 Permission Configuration. Steps: 1. In the Add Person interface, click Permission tab. In the Permission(s) to Select list, all the configured permissions display. 2. Check the permission(s) checkbox(es) and click > to add to the Selected Permission(s) list. 3. Click OK to save the settings. Adding Person (General Card) You can add card and issue the card to the person. Steps: 1. In the Add Person interface, click Card tab. 160 User Manual of iVMS-4200 Client Software 2. Click Add to pop up the Add Card window. 3. Click Card to enter the Card tab. 4. Select the card type according to actual needs. Card for Disabled Person: The door will remain open for the configured time period for the card holder. Card in Blacklist: The card swiping action will be uploaded and the door cannot be opened. Patrol Card: The card swiping action can used for checking the working status of the inspection staff. The access permission of the inspection staff is configurable. Duress Card: The door can open by swiping the duress card when there is duress. At the same time, the client can report the duress event. Super Card: The card is valid for all the doors of the controller during the configured schedule. Visitor Card: The card is assigned for visitors. For the Visitor Card, you can set the Max. Swipe Times. Note: The Max. Swipe Times should be between 0 and 255. When setting as 0, it means the card swiping is unlimited. 5. Dismiss Card: The card can stop the buzzer of the card reader. Input the password of the card itself in the Card Password field. The card password should 161 User Manual of iVMS-4200 Client Software contain 4 to 8 digits. Note: The password will be required when the card holder swiping the card to get enter to or exit from the door if you enable the card reader authentication mode as Card and Password, Password and Fingerprint, and Card, Password, and Fingerprint. For details, Chapter 14.6.2 Card Reader Authentication. 6. 7. Click to set the effective time and expiry time of the card. Select the Card Reader Mode for reading the card No. Access Controller Reader: Place the card on the reader of the Access Controller and click Read to get the card No. Card Enrollment Station: Place the card on the Card Enrollment Station and click Read to get the card No. Note: The Card Enrollment Station should connect with the PC running the client. You can click Set Card Enrollment Station to enter the following window. 1) Select the Card Enrollment Station type. Note: Currently, the supported card reader types include DS-K1F100-D8, DS-K1F100-M, DS-K1F100-D8E, and DS-K1F180-D8E. 2) Set the serial port No., the baud rate, the timeout value, the buzzing, or the card No. type. 3) (Optional) If the card is M1 card, and if you need to enable the M1 Card Encryption function, you should check Enable checkbox of M1 Card Encryption and click Modify to select the sector. Note: The M1 Card Encryption function is supported by DS-K1F100-D8, DS-K1F100-D8E, and DS-K1F180-D8E. 4) Click Save button to save the settings. 8. 9. Manually Input: Input the card No. and click Enter to input the card No. Click OK and the card(s) will be issued to the person. (Optional) You can generate and save the card QR code for QR code authentication. 1) Select an added card and click QR Code to generate the card QR code. 2) In the QR code pop-up window, click Download to save the QR code to the local PC. You can print the QR code for authentication on the specified device. Note: The device should support the QR code authentication function. For details about setting the QR code authentication function, see the specified device user manual. 162 User Manual of iVMS-4200 Client Software 10. (Optional) Click Link Fingerprint to link the card with the person’s fingerprint, so that the person can place the finger on the scanner instead of swiping card when passing the door. 11. (Optional) Click Link Face Picture to link the card with the face picture, so that the person can pass the door by scanning the face via the device instead of swiping card when passing the door. 12. Click OK to save the settings. Adding Person (Smart Card) Purpose: You can store fingerprints and ID card infomration in the smart card. When authenticating, after swiping the smart card on the device, you can scan your fingerprint or swipe your ID card on the device. The device will compare the fingerperint or ID card information in the smart card with the ones collected. If you use the smart card for authentication, there is no need to store the fingerprints or ID card information in the device in advance. Steps: 1. In the Add Person interface, click Card tab. 2. Click Add to pop up the Add Card window. 3. Click Smart Card to enter the Smart Card tab. 163 User Manual of iVMS-4200 Client Software 4. Select an issuing card mode from the dropdown list. 5. Set the external device. 1) Click Set Peripheral to enter the Set Peripheral page. 2) (Optional) Select the issuing card mode again. 3) Set a card enrollment station. 4) If you select “Fingerprint + Card No.” as the issuing mode, set the fingerprint recorder model. If you select “ID Card No. + Card No.” as the issuing mode, set the ID card reader model. If you select “Fingerprint + ID Card No. + Card No.” as the issuing mode, set the fingerprint recorder model and the ID card reader model. 5) Click OK save the settings. 6. Select a card type for the smart card. Card for Disabled Person: The door will remain open for the configured time period for the card holder. Card in Blacklist: The card swiping action will be uploaded and the door cannot be opened. Patrol Card: The card swiping action can used for checking the working status of the inspection staff. The access permission of the inspection staff is configurable. Duress Card: The door can open by swiping the duress card when there is duress. At the same time, the client can report the duress event. Super Card: The card is valid for all the doors of the controller during the configured schedule. Visitor Card: The card is assigned for visitors. For the Visitor Card, you can set the Max. Swipe Times. Note: The Max. Swipe Times should be between 0 and 255. When setting as 0, it means the card swiping is unlimited. 7. Dismiss Card: The card can stop the buzzer of the card reader. Set other parameters of the card. 1) Set the card password. 2) Set the card effective date. 3) Scan your fingerprint and swipe your ID card according to the promt. 4) Swipe the smart card. The added card information will display in the list below. 8. Click OK and the card(s) will be issued to the person. 9. (Optional) Generate and save the card QR code for QR code authentication. 1) Select an added card and click QR Code to generate the card QR code. 2) In the QR code pop-up window, click Download to save the QR code to the local PC. You can print the QR code for authentication on the specified device. Note: The device should support the QR code authentication function. For details about setting the QR code authentication function, see the specified device user manual. 10. (Optional) Click Link Fingerprint to link the card with the person’s fingerprint, so that the person can place the finger on the scanner instead of swiping card when passing the door. 11. (Optional) Click Link Face Picture to link the card with the face picture, so that the person can pass the door by scanning the face via the device instead of swiping card when passing the door. 164 User Manual of iVMS-4200 Client Software 12. Click OK to save the settings. Adding Person (Face Picture) You can collect the face picture in two ways: Local Collection and Remote Collection. Local Collection: Collect the face picture via face picture scanner. Remote Collection: Collect the face picture via the access control terminal. Note: The access control terminal should support face recognition function. Steps: 1. In the Add Person interface, click Face Picture tab 2. To get the face picture via face picture scanner: 1) Select Local Collection. 2) Connect the face picture scanner to the PC running the client. 3) (Optional) You can click Initialize to initialize the face picture scanner. 3. To get the face picture via access control terminal: 1) Select Remote Collection. 2) Click Select Device to select the access control terminal which supports face recognition function. 4. Click Collect to capture the face picture. You can click Re-Collect the captured picture again. You can click Delete to delete the captured picture. 5. Click OK to save the settings. Adding Person (Fingerprint) Steps: 1. In the Add Person interface, click Fingerprint tab. 165 User Manual of iVMS-4200 Client Software 2. Select Local Collection as desired. 3. Before inputting the fingerprint, you should connect the fingerprint machine to the PC and set its parameters first. Click Set Fingerprint Machine to enter the following window box. 1) Select the device type. Currently, the supported fingerprint machine types include DS-K1F800-F, DS-K1F300-F, DS-K1F810-F, and DS-K1F820-F. 2) For fingerprint machine type DS-K1F800-F, you can set the serial port number, baud rate, and overtime parameters of the fingerprint machine. Notes: The serial port number should correspond to the serial port number of PC. The baud rate should be set according to the external fingerprint card reader. The default value is 19200. Timeout after field refers to the valid fingerprint collecting time. If the user does not input a fingerprint or inputs a fingerprint unsuccessfully, the device will indicate that the fingerprint collecting is over. 3) Click Save button to save the settings. 4. Click Start button and select the fingerprint to start collecting. 5. Lift and rest the corresponding fingerprint on the fingerprint scanner twice to collect the fingerprint to the client. 6. (Optional) You can also click Remote Collection to collect fingerprint from the device. Note: The function should be supported by the device. 7. Click OK to save the fingerprints. 166 User Manual of iVMS-4200 Client Software Adding Person (Attendance Rule) You can set the attendance rule for the person. Note: This tab page will display when you select Non-Residence mode in the application scene when running the software for the first time. Steps: 1. In the Add Person interface, click Attendance Rule tab. 2. If the person joins in the time and attendance, check the Time and Attendance checkbox to enable this function for the person. Then the person’s card swiping records will be recorded and analyzed for time and attendance. For details about Time and Attendance, click More to go to the Time and Attendance module. 3. Click OK to save the settings. Importing and Exporting Person Information The person information can be imported and exported in batch. Steps: 1. Exporting Person: You can export the added persons’ information in Excel format to the local PC. 1) After adding the person, you can click Export Person button to pop up the following window. 2) Click to select the path of saving the exported Excel file. 3) Check the checkboxes to select the person information to export. 4) Click OK to start exporting. 2. Importing Person: You can import the Excel file with persons information in batch from the local 167 User Manual of iVMS-4200 Client Software PC. 1) click Import Person button. 2) You can click Download Template for Importing Person to download the template first. 3) Input the person information in the downloaded template. Note: If the person has multiple cards, separate the card No. with semicolon. 4) Click to select the Excel file with person information. 5) Click OK to start importing. Getting Person Information from Access Control Device If the added access control device has been configured with person information (including person details, fingerprint, issued card information), you can get the person information from the device and import to the client for further operation. Note: This function is only supported by the device the connection mothod of which is TCP/IP when adding the device. Steps: 1. In the organization list on the left, select an organization to import the persons. 2. Click Get Person button to pop up the following window box. 3. The added access control device will be displayed. 4. Select the device and then click OK to start getting the person information from the device. You can also double click the device name to start getting the person information. Notes: The person information, including person details, person’s fingerprint information (if configured), and the linked card (if configured), will be imported to the selected organization. If the person name stored in the device is empty, the person name will be filled with the issued 168 User Manual of iVMS-4200 Client Software card No. after importing to the client. The gender of the persons will be Male by default. 14.3.2 Managing Person Modifying and Deleting Person To modify the person information and attendance rule, click or in the Operation column, or select the person and click Modify to open the editing person window. You can click to view the person’s card swiping records. To delete the person, select a person and click Delete to delete it. Note: If a card is issued to the current person, the linkage will be invalid after the person is deleted. Changing Person to Other Organization You can move the person to another organization if needed. Steps: 1. Select the person in the list and click Change Organization button. 2. Select the organization to move the person to. 3. Click OK to save the settings. Searching Person You can input the keyword of card No. or person name in the search field, and click Search to search the person. You can input the card No. by clicking Read to get the card No. via the connected card enrollment station. You can click Set Card Enrollment Station in the dropdown list to set the parameters. 14.3.3 Issuing Cards in Batch You can issue multiple cards to one person in batch. Steps: 1. Click Issue Card in Batch button to enter the following window. All the added person with no card issued will display in the Person(s) with No Card Issued list. 169 User Manual of iVMS-4200 Client Software 2. Select the card type according to actual needs. Note: For details about the card type, refer to Adding Person (General Card). 3. Input the password of the card itself in the Card Password field. The card password should contain 4 to 8 digits. Note: The password will be required when the card holder swiping the card to get enter to or exit from the door if you enable the card reader authentication mode as Card and Password, Password and Fingerprint, and Card, Password, and Fingerprint. For details, refer to Chapter 14.6.2 Card Reader Authentication. 4. Input the card quantity issued for each person. For example, if the card quantity is 3, you can read or enter three card numbers for each person. 5. 6. Click to set the effective time and expiry time of the card. In the Person(s) with No Card Issued list on the left, select the person to issue card. 7. Select the Card Reader Mode for reading the card No. Access Controller Reader: Place the card on the reader of the Access Controller and click Read to get the card No. Card Enrollment Station: Place the card on the Card Enrollment Station and click Read to get the card No. Note: The Card Enrollment Station should connect with the PC running the client. You can click Set Card Enrollment Station to enter the following window. 170 User Manual of iVMS-4200 Client Software 1) Select the Card Enrollment Station type. Note: Currently, the supported card reader types include DS-K1F100-D8, DS-K1F100-M, DS-K1F100-D8E, and DS-K1F180-D8E. 2) Set the parameters about the connected card enrollment station. 3) Click Save button to save the settings. 8. Manually Input: Input the card No. and click Enter to input the card No. After issuing the card to the person, the person and card information will display in the Person(s) with Card Issued list. 9. Click OK to save the settings. 14.4 Schedule and Template Purpose: You can configure the template including week schedule and holiday schedule. After setting the templates, you can adopt the configured templates to access control permissions when setting the permission, so that the access control permission will take effect in the time durations of the template. Click to enter the schedule and template interface. You can manage the schedule of access control permission including Week Schedule, Holiday Schedule, and Template. For permission settings, refer to Chapter 14.5 Permission Configuration. 14.4.1 Week Schedule Click Week Schedule tab to enter the Week Schedule Management interface. The client defines two kinds of week plan by default: Whole Week Schedule and Blank Schedule, which cannot be deleted and edited. Whole Week Schedule: Card swiping is valid on each day of the week. Blank Schedule: Card swiping is invalid on each day of the week. You can perform the following steps to define custom schedules on your demand. Steps: 1. Click Add Week Schedule button to pop up the adding schedule interface. 171 User Manual of iVMS-4200 Client Software 2. Input the name of week schedule and click OK button to add the week schedule. 3. Select the added week schedule in the schedule list and you can view its property on the right. You can edit the week schedule name and input the remark information. 4. On the week schedule, click and drag on a day to draw on the schedule, which means in that period of time, the configured permission is activated. Note: Up to 8 time periods can be set for each day in the schedule. 5. When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period. When the cursor turns to 6. , you can lengthen or shorten the selected time bar. Optionally, you can select the schedule time bar, and then click Delete Duration to delete the selected time bar, or click Clear to delete all the time bars, or click Copy to Week to copy the time bar settings to the whole week. 7. Click Save to save the settings. 14.4.2 Holiday Group Click Holiday Group tab to enter the Holiday Group Management interface. Steps: 1. Click Add Holiday Group button on the left to open the adding holiday group window. 2. Input the name of holiday group in the text filed and click OK button to add the holiday group. 3. Click Add Holiday icon on the right to add a holiday period to the holiday group and configure the duration of the holiday. Note: Up to 16 holiday periods can be added to one holiday group. 172 User Manual of iVMS-4200 Client Software 1) On the period schedule, click and drag to draw the period, which means in that period of time, the configured permission is activated. Note: Up to 8 time durations can be set for each holiday period in the schedule. 2) When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period. 3) When the cursor turns to , you can lengthen or shorten the selected time bar. 4) Optionally, you can select the schedule time bar, and then click or click 4. to delete the selected time bar, to delete all the time bars of the holiday, or click to delete the holiday directly. Click Save to save the settings. Note: The holidays cannot be overlapped with each other. 14.4.3 Template After setting the week schedule and holiday group, you can configure the template which contains week schedule and holiday group schedule. Note: The priority of holiday group schedule is higher than the week schedule. Click Template tab to enter the Template Management interface. There are two pre-defined templates by default: Whole Week Template and Blank Template, which cannot be deleted and edited. Whole Week Template: The card swiping is valid on each day of the week and it has no holiday group schedule. Blank Template: The card swiping is invalid on each day of the week and it has no holiday group schedule. You can define custom templates on your demand. Steps: 1. Click Add Template to pop up the adding template interface. 173 User Manual of iVMS-4200 Client Software 2. Input the template name in the text filed and click OK button to add the template. 3. Select the added template and you can edit its property on the right. You can edit the template name and input the remark information. 4. Select a week schedule to apply to the schedule. Click Week Schedule tab and select a schedule in the dropdown list. You can also click Add Week Schedule to add a new week schedule. For details, refer to Chapter 14.4.1 Week Schedule. 5. Select holiday groups to apply to the schedule. Note: Up to 4 holiday groups can be added. Click to select a holiday group in the list and click Add to add it to the template. You can also 174 User Manual of iVMS-4200 Client Software click Add Holiday Group to add a new one. For details, refer to Chapter 14.4.2 Holiday Group. You can click to select an added holiday group in the right-side list and click Delete to delete it. You can click Clear to delete all the added holiday groups. 6. Click Save button to save the settings. 14.5 Permission Configuration Purpose: You can assign permission for persons to enter/exist the access control points (doors) in this section. Notes: You can add up to 4 permissions to one access control point of one device. You can add up to 128 permissions in total. Steps: 1. Click icon to enter the Access Control Permission interface. 2. Click Add icon to enter following interface. 3. In the Permission Name field, create a name for the permission as you want. 4. Click on the dropdown menu to select a template for the permission. Note: You should configure the template before permission settings. You can click Add Template button to add the template. Refer to Chapter 14.4 Schedule and Template for details. 5. Select person(s) in the Person list and click > to add to the Selected Person list. 6. Select door(s) or door station(s) in the Access Control Point/Device list and click > to add to the selected list. 7. Click OK. The selected person will have the permission to enter/exit the selected door/door station with their linked card(s) or fingerprints. 8. (Optional) after adding the permission, you can click Details to modify it. Or you can select the permission and click Modify to modify. 175 User Manual of iVMS-4200 Client Software You can select the added permission in the list and click Delete to delete it. 9. After configuring the permissions, you should apply the added permission parameters (including relevant person details, related access control points, etc.) to the access control device to take effect. 1) Select the permission(s) to apply to the access control device. To select multiple permissions, you can hold the Ctrl or Shift key and select permissions. 2) Click Apply All to start applying all the selected permission(s) to the access control device or door station. You can also click Apply Changes to apply the changed part of the selected permission(s) to the device(s). Notes: When the permission settings are changed, the following hint box will pop up. You can click Apply Now to apply the changed permissions to the device. Or you can click Apply Later to apply the changes later in the Permission interface. The permission changes include changes of schedule and template, permission settings, person’s permission settings, and related person settings (including card number., fingerprint, face picture, linkage between card No. and fingerprint, linkage between card number and fingerprint, card password, card effective period, etc.). 14.6 Advanced Functions Purpose: After configuring the person, template, and access control permission, you can configure the advanced functions of access control application, such as access control parameters, authentication password, and opening door with first card, anti-passing back, etc. Note: The advanced functions should be supported by the device. Click icon. 14.6.1 Access Control Parameters Purpose: After adding the access control device, you can configure its access control point (door or floor)’s parameters, and its card readers’ parameters. Click Access Control > Advanced Function > Access Control Parameters tab to enter the parameters settings interface. 176 User Manual of iVMS-4200 Client Software Configuring Door (Floor) Parameters Steps: 1. In the controller list on the left, click to expand the access control device, select the door or floor (access control point) and you can edit the information of the selected door on the right. 2. You can edit the following parameters: Door Magnetic: The Door Magnetic is in the status of Remain Closed (excluding special conditions). Exit Button Type: The Exit Button Type is in the status of Remain Open (excluding special conditions). Door Locked Time: After swiping the normal card and relay action, the timer for locking the door starts working. Door Open Duration by Card for Disabled Person: The door magnetic can be enabled with appropriate delay after disabled person swipes the card. Door Open Timeout Alarm: The alarm can be triggered if the door has not been close Enable Locking Door when Door Closed: The door can be locked once it is closed even if the Door Locked Time is not reached. Duress Code: The door can open by inputting the duress code when there is duress. At the same time, the client can report the duress event. Super Password: The specific person can open the door by inputting the super password. Dismiss Code: Input the dismiss code to stop the buzzer of the card reader. Notes: The duress code, Super password, and dismiss code should be different. The duress code, super password, and the dismiss code should be different from the authentication password. The duress code, super password, and the dismiss code should contain 4 to 8 numerics.Elevator Control Delay Time (available for elevator controller): The time duration of the visitor using the elevator. 3. Click Save button to save parameters. 177 User Manual of iVMS-4200 Client Software Configuring Card Reader Parameters Steps: 1. In the device list on the left, click to expand the door, select the card reader name and you can edit the card reader parameters on the right. 2. You can edit the following parameters: Nickname: Edit the card reader name as desired. Enable Card Reader: Select Yes to enable the card reader. OK LED Polarity: Select the OK LED Polarity of the card reader mainboard. Error LED Polarity: Select the Error LED Polarity of the card reader mainboard. Buzzer Polarity: Select the Buzzer LED Polarity of the card reader mainboard. Minimum Card Swiping Interval: If the interval between card swiping of the same card is less than the set value, the card swiping is invalid. You can set it as 0 to 255. Max. Interval When Inputting Password: When you inputting the password on the card reader, if the interval between pressing two digits is larger than the set value, the digits you pressed before will be cleared automatically. Enable Failed Attempts Limit of Card Reading: Enable to report alarm when the card reading attempts reach the set value. Max. Times of Card Swiping Failure: Set the max. failure attempts of reading card. Enable Tampering Detection: Enable the anti-tamper detection for the card reader. Detect When Card Reader is Offline for: When the access control device cannot connect with the card reader for longer than the set time, the card reader will turn offline automatically. Buzzing Time: Set the card reader buzzing time. The available time ranges from 0 to 5999s. 0 represents continuous buzzing. Card Reader Type: Get the card reader’s type. Card Reader Description: Get the card reader description. Fingerprint Recognition Level: Select the fingerprint recognition level in the dropdown list. By default, the level is Low. Face Recognition Interval: The time interval between two continuous face recognitions 178 User Manual of iVMS-4200 Client Software when authenticating. By default, it is 2s. Live Face Detection: Enable or disable the live face detection function. If enabling the function, the device can recognize whether the person is a live one or not. 1:1 Security Level: Set the matching security level when authenticating via 1:1 matching mode. 1:N Security Level: Set the matching security level when authenticating via 1:N matching mode. 3. Click Save to save parameters. 14.6.2 Card Reader Authentication Purpose: You can set the passing rules for the card reader of the access control device. Steps: 1. Click Access Control > Advanced Function > Card Reader Authentication tab and select a card reader on the left. 2. Click Configuration button to select the card reader authentication modes for setting the schedule. Notes: The available authentication modes depend on the device type. Password refers to the card password set when issuing the card to the person. Chapter 14.3 Person Management. Authentication password refers to the password set to open the door. Refer to Chapter 14.6.8 Authentication Password 1) Select the modes and click You can click or to add to the selected modes list. to adjust the display order. 2) Click OK to confirm the selection. 3. After selecting the modes, the selected modes will display as icons. Click the icon to select a card reader authentication mode. 4. Drag on a day to draw a color bar on the schedule, which means in that period of time, the card reader authentication is valid. 179 User Manual of iVMS-4200 Client Software 5. Repeat the above step to set other time periods. Or you can select a configured day and click Copy to Week button to copy the same settings to the whole week. 6. (Optional) Click Copy to button to copy the settings to other card readers. 7. Click Save button to save parameters. 14.6.3 Multiple Authentication Purpose: You can manage the cards by group and set the authentication for multiple cards for one access control point (door). Note: Please set the card permission and apply the permission setting to the access control device first. For details, refer to Chapter 14.5 Permission Configuration. Steps: 1. Click Access Control > Advanced Function > Multiple Authentication tab. 2. Select access control device from the list on the left. 3. Add a card group for multiple authentication. 1) In the Set Card Group panel, click Add button to pop up the following window: 180 User Manual of iVMS-4200 Client Software 2) Create a name for the group as desired. 3) Click to set the effective time and expiry time of the card group. 4) Check the checkbox(es) to select the card(s) to add the card group. 5) Click OK to save the card group. 4. In the Set Authentication Group panel, select the access control point (door) of the device for multiple authentication. 5. Input the time interval for card swiping. 6. Add an authentication group. 1) In the Set Authentication Group panel, click Add to pop up the following window. 181 User Manual of iVMS-4200 Client Software 2) Select the template of the authentication group from the dropdown list. For details about setting the template, refer to Chapter 14.4 Schedule and Template. 3) Select the authentication type of the authentication group from the dropdown list. Local Authentication: Authentication by the access control device. Local Authentication and Remotely Open Door: Authentication by the access control device and by the client. You can enable the super password authentication when the access control device is disconnected with the client. Note: If you set the authentication type as Local Authentication and Remotely Open Door, when the person swipes the card on the device, a window will pop up. You can unlock the door via the client. Local Authentication and Super Password: Authentication by the access control device and by the super password. 4) In the list on the left, the added card group will display. You can click the card group and click to add the group to the authentication group. You can click the added card group and click group. to remove it from the authentication You can also click or to set the card swiping order. 5) Input the Card Swiping Times for the selected card group. Notes: The Card Swiping Times should be larger than 0 and smaller than the added card quantity in the card group. The upper limit of Card Swiping Times is 16. 6) Click OK to save the settings. 7. Click Save to save and take effect of the new settings. Notes: For each access control point (door), up to four authentication groups can be added. For the authentication group which certificate type is Local Authentication, up to 8 card groups can be added to the authentication group. For the authentication group which certificate type is Local Authentication and Super Password or Local Authentication and Remotely Open Door, up to 7 card groups can be added to the authentication group. 14.6.4 Open Door with First Card Purpose: 182 User Manual of iVMS-4200 Client Software You can set multiple first cards for one access control point. After the first card swiping, it allows multiple persons access the door or other authentication actions. The first card mode contains Remain Open with First Card, Disable Remain Open with First Card, and First Card Authorization. Remain Open with First Card: The door remains open for the configured time duration after the first card swiping until the remain open duration ends. Disable Remaining Open with First Card: Disable the function. First Card Authorization: All authentications (except for the authentications of super card, super password, duress card, and duress code) are allowed only after the first card authorization. Notes: The first card authorization is effective only on the current day. The authorization will be expired after 24:00 on the current day. You can swipe the first card again to disable the first card mode. Steps: 1. Click Access Control > Advanced Function > Open Door with First Card tab. 2. Select an access control device from the list on the left. 3. Select the first card mode in the drop-down list for the access control point. 4. (Optional) If you select Remain Open with First Card, you should set remaining open duration. Note: The Remaining Open Duration should be between 0 and 1440 minutes. By default, it is 10 minutes. 5. In the First Card list, Click Add button to pop up the following window box. 1) Select the cards to add as first card for the door Note: Please set the card permission and apply the permission setting to the access control device first. For details, refer to Chapter 14.5 Permission Configuration. 2) Click OK button to save adding the card. 6. You can click Delete button to remove the card from the first card list. 7. Click Save to save and take effect of the new settings. 183 User Manual of iVMS-4200 Client Software 14.6.5 Anti-Passing Back Purpose: You can set to only pass the access control point according to the specified path and only one person could pass the access control point after swiping the card. Notes: Either the anti-passing back or multi-door interlocking function can be configured for an access control device at the same time. You should enable the anti-passing back function on the access control device first. Steps: 1. Click Access Control > Advanced Function > Anti-passing Back tab. 2. Select an access control device from the device list on the left. 3. In the First Card Reader field, select the card reader as the beginning of the path. 4. In the list, click the text filed of Card Reader Afterward and select the linked card readers. Example: If you select Reader In_01 as the beginning, and select Reader In_02, Reader Out_04 as the linked card readers. Then you can only get through the access control point by swiping the card in the order as Reader In_01, Reader In_02 and Reader Out_04. Note: Up to four afterward card readers can be added for one card reader. 5. (Optional) You can enter the Select Card Reader window box again to edit its afterward card readers. 6. Click Save to save and take effect of the new settings. 14.6.6 Cross-Controller Anti-passing Back Purpose: You can set anti-passing back for card readers in multiple access control devices. You should swipe the card according to the configured swiping card route. And only one person could pass the access control point after swiping the card. 184 User Manual of iVMS-4200 Client Software Setting Route Anti-passing Back Purpose: The route anti-passing back depends on the card swiping route. You should set the first card reader and the card readers afterwards. Steps: 1. Click Access Control > Advanced Function > Cross-Controller Anti-passing Back to enter the Cross-Controller Anti-passing Back tab. 2. Check the Enable Cross-Controller Anti-passing Back checkbox to enable the function. 3. Set the anti-passing back parameters. Based on Card Note: The system will judge the anti-passing back according to the entrance and exit records on the card. 1) Select Based on Card as the anti-passing back mode in the drop-down list. 2) Select Route Anti-passing Back as the rule. 3) Set the sector ID. 4) Click Select Access Controller to select a device in the pop-up window. 5) In the Card Reader area, click the icon on the left of the card reader column to select the first card reader. The icon will turn to . 6) Click the card reader afterward input field to select the card readers afterward in the pop-up window. 7) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing back function. Notes: The displayed card readers in the card reader afterward input field should be in authentication order. Up to 64 devices with anti-passing back function can be added. Up to 16 card readers afterward can be added for each card reader. It supports M1 card at present and the sector cannot be encrypted. For details about sector encryption, refers to 14.1.6 Authenticating M1 Card Encryption. Based on Network Note: Authenticate the anti-passing back according to the entrance and exit information on the card reader. 1) Select Based on Network as the anti-passing back mode in the drop-down list. 2) Select Route Anti-passing Back as the rule. 3) Select a server in the drop-down list for judging the anti-passing back. 4) (Optional) You can click Delete Record and select the card in the pop-up window to delete the card swiping information in all devices. The user should be start swiping card again from the first card reader. 5) Click Select Access Controller to select a device in the pop-up window. 6) In the Card Reader area, click the icon on the left of the card reader column to select the first card reader. The icon will turn to . 7) Click the card reader afterward input field to select the card readers afterward in the 185 User Manual of iVMS-4200 Client Software pop-up window. 8) Check the checkbox in the Enable Anti-passing Back column to enable the anti-passing back function. Notes: The displayed card readers in the card reader afterward input field should be in authentication order. Up to 64 devices with anti-passing back function can be added. Up to 16 card readers afterward can be added for each card reader. Up to 5000 cards’ swiping records can be stored in the selected server. Setting Entrance/Exit Anti-passing Back Purpose: You can set the entrance card reader and the exit card reader only for entering and exiting, without setting the first card reader and the card readers afterwards. Steps: 1. Click Access Control > Advanced Function > Cross-Controller Anti-passing Back to enter the Cross-Controller Anti-passing Back tab. 2. Check the Enable Cross-Controller Anti-passing Back checkbox to enable the function. 3. Set the anti-passing back parameters. Based on Card Note: The system will judge the anti-passing back according to the entrance and exit records on the card. 1) Select Based on Card as the anti-passing back mode in the drop-down list. 2) Select Entrance/Exit Anti-passing Back as the rule. 3) Set the sector ID. 4) Click Select Access Controller to select a device in the pop-up window. 5) In the Card Reader area, check the checkboxes in the Enable Anti-passing Back column to select the entrance card reader and the exit card reader. 6) Click Save to save the settings. Notes: Up to one entrance carder and one exit card reader should be checked. Up to 64 devices with anti-passing back function can be added. It supports M1 card at present and the sector cannot be encrypted. For details about sector encryption, refers to 14.1.6 Authenticating M1 Card Encryption. Based on Network Note: Authenticate the anti-passing back according to the entrance and exit information on the card reader. 1) Select Based on Network as the anti-passing back mode in the drop-down list. 2) Select Entrance/Exit Anti-passing Back as the rule. 3) Select the server in the dropdown list for judging the anti-passing back. 4) (Optional) You can click Delete Record and select the card in the pop-up window to delete the card swiping information in all devices. 5) Click Select Access Controller to select a device in the pop-up window. 186 User Manual of iVMS-4200 Client Software 6) In the Card Reader area, check the checkboxes in the Enable Anti-passing Back column to select the entrance card reader and the exit card reader. 7) Click Save to save the settings. Notes: Up to one entrance carder and one exit card reader should be checked. Up to 64 devices with anti-passing back function can be added. Up to 5000 cards’ swiping records can be stored in the selected server. 14.6.7 Multi-door Interlocking Purpose: You can set the multi-door interlocking between multiple doors of the same access control device. To open one of the doors, other doors must keep closed. That means in the interlocking combined door group, up to one door can be opened at the same time. Notes: The Multi-door Interlocking function is only supported by the access control device which has more than one access control points (doors). Either the anti-passing back or multi-door interlocking function can be configured for an access control device at the same time. Steps: 1. Click Access Control > Advanced Function > Multi-door Interlocking tab to enter the multi-door interlock settings page. 2. Select an access controller from the Controller List. 3. Click Add to pop up the Add Access Control Point to Interlock interface. 4. Select the access control point (door) from the list. Note: Up to four doors can be added in one multi-door interlocking combination. 5. Click OK to save the adding. 6. (Optional) After adding the multi-door interlocking combination, you can select it from the list and click Delete to delete the combination. 7. Click Save button to save and take effect. 187 User Manual of iVMS-4200 Client Software 14.6.8 Authentication Password Purpose: You can open the door by inputting the authentication password on the card reader keypad after finishing the operation of setting authentication password. Notes: This authentication password function is only valid during the schedules when the card reader authentication mode for the access control device is set as Card or Authentication Password. For details, refer to Chapter 14.6.2 Card Reader Authentication. This function should be supported by the access control device. Steps: 1. Click Access Control > Advanced Function > Authentication Password tab and select an access control device from the list. All the cards and persons which have been applied to the device will be displayed. Note: For setting and applying the permissions to the device, refer to Chapter 14.5 Permission Configuration. 2. Click the Password field of the card and input the authentication password for the card. Note: The authentication password should contain 4 to 8 digits. 3. After setting the authentication password, the authentication password function of the card will be enabled by default. 4. (Optional) You can input the keywords of card No., person name, or authentication password to search. Note: Up to 500 cards with authentication password can be added to one access control device. The password should be unique and cannot be same with each other. 14.6.9 Relay Settings Purpose: For elevator controller, you can manage the relationship between the floor and the relay in this chapter. Configuring Relay and Floor Steps: 1. Click Access Control > Advanced Function > Relay Settings tab to enter the Relay Settings interface. 2. Select an elevator controller in the Controller List on the left of the interface. 3. Select an unconfigured relay in the Unconfigured Relay panel on the right of the interface. There are three types of unconfigured relays: Button Relay, Call Elevator Relay and Auto Button Relay. Button Relay: Control the validity for buttons of each floor. Call Elevator Relay: Control to call the elevator to go to the specified floor. 188 User Manual of iVMS-4200 Client Software Auto Button Relay: Control to press the button when the user swipes card inside the elevator. The button of the floor will be pressed automatically according to the user’s permission. 4. Click and drag the unconfigured relay from the Unconfigured Relay panel to the coressponding floor in the Floor List panel. Or click and drag the relay from the Floor List panel to the Unconfigured Relay panel. Or click and drag the relay from one floor to another floor in the Floor List panel. When clicking and dragging, if two relays are of the same relay type in the two different floors, the relays will change the place. 5. Click Save to apply the settings to the selected device. Notes: An elevator controller can link to up to 24 distributed elevator controllers. A distributed elevator controller can link up to 16 relays. Three types of relay are available: Button Relay, Call Elevator Relay and Auto Button Relay. represents the button relay, represents the call elevator relay, and represents the auto button relay. Take the fiugre as an example. In the number 1-2, 1 represents the distributed elevator controller number, 2 represents the ralay, and the icon represents the relay type. You can click Relay Type to configure the relay type. For details about configuring the relay type, see Configuring Relay Type. By default, the relay total amount is the added floor number *3 (three types of relay). Each floor contains up to 3 types of relay. You can click and drag one relay once. 189 User Manual of iVMS-4200 Client Software If you change the floor number in the door group management, all relays in the Relay Settings interface will restore to the default settings. Configuring Relay Type Purpose: You can change the relay type by following the steps in this section. Steps: 1. Click Access Control > Advanced Function > Relay Settings tab to enter the Relay Settings interface. 2. In the Relay Settings interface, click Relay Type to pop up the Relay Type Settings window. Note: All relays in the Relay Type Settings window are unconfigured relays. 3. Click and drag the relay from one relay type panel to the other one. 4. Click OK to save the settings. Note: Three types of relay are available: Button Relay, Call Elevator Relay and Auto Button Relay. represents the button relay, represents the call elevator relay, and represents the auto button relay. 14.6.10 Custom Wiegand Purpose: Based on the knowledge of uploading rule for the third party Wiegand, you can set multiple customized Wiegand protocols to communicate between the device and the third party card readers. Before you start: Wire the third party card readers to the device. Steps: 1. Click Access Control > Advanced Function > Custom Wiegand to enter the Custom Wiegand tab. 190 User Manual of iVMS-4200 Client Software 2. Select a custom wiegand on the left. 3. Check Enable checkbox to enable the custom wiegand. 4. Set the wiegand name. 5. Select device. 1) Click Select Device. 2) Select the device to use custom wiegand. 3) Click OK to save the settings. 6. Input the total length and select the parity mode in the drop-down list. If you select Odd-Even Parity, you should set the odd parity start bit, the odd parity length, the even parity start bit and the even parity length. If you select XOR Parity, you should set the XOR parity start bit, length per group and total length. If you select None, you are no need to set the parity mode. 7. Set output transformation rule. 1) Click Set Rule to pop up the Set Output Transformation Rules window. 2) Select rules on the left list. Note: Press the Shift key to select multiple rules. 3) Click to move the selected rules to the right list. 4) (Optional) Click or to change the rule order. 5) (Optional) Select the rules in the Selected Rule list and click the list on the right. to remove the rule from 6) Click OK to save the settings. 7) In the Custom Wiegand tab, set the rule start bit, length, and the decimal digit. 8. Click Save at the upper right corner of the interface to save the settings. Notes: By default, the device disables the custom wiegand function. If the device enables the custom wiegand function, all wiegand interfaces in the device will use the customized wiegand protocol. Up to 5 custom wiegands can be set. Up to 32 characters are allowed in the custom wiegand name. Up to 80 bits are available in the total length. The odd parity start bit, the odd parity length, the even parity start bit and the even parity length range from 1 to 80 bit. 191 User Manual of iVMS-4200 Client Software The start bit of the card ID, the manufacturer code, the site code, and the OEM should range from 1 to 80 bit. 14.6.11 Person in Blacklist Purpose: You can configure the person information in the blacklist and apply to the device. Adding Person to Blacklist Purpose: You can add persons to the blacklist, and configure the person’s face pictures, gender, and ID number. Steps: 1. Click Access Control > Advanced Function > Blacklist to enter the person in blacklist management page. 2. Click Person to enter the person management page. 3. Click Add. 4. Click Select Picture to select a face picture for the person from local PC. Note: The picture should be in JPG format and it should be smaller than 1 MB. 5. Set the person details including name, gender, and ID number. 6. Click Save to add the device to the blacklist. 7. (Optional) Select the added person and click Delete to remove it from the blacklist. 8. Apply the person in blacklist to the device to take effect. 1) Select the person(s) to apply to the device. 2) Click Apply. 3) Click Apply All to start applying all the selected permission(s) to the access control device or door station. You can also click Apply Changes to apply the changed part of the selected permission(s) to the device(s). 4) Click OK to start applying. Managing Blacklist Application Result Purpose: After applying the configured person information in blacklist, you can view the application results and manage the applied person. Steps: 1. Click Access Control > Advanced Function > Blacklist to enter the person in blacklist management page. 2. Click Application Result to enter the application result management page. You can check the person in blacklist applying record and view the application results. 192 User Manual of iVMS-4200 Client Software 3. (Optional) Remove the applied person in blacklist from device. 1) Click Delete Person. All the devices which support person in blacklist will display. 2) Select the device that you want to remove person(s) from. 3) Click Next. All the persons in blacklist applied to the device will display. 4) Select the person(s) you want to remove from the device. 5) Click OK to remove the selected person from the blacklist of the device. 4. (Optional) Click Clear Persons and select the device to clear all the persons in the blacklist of the device. 14.7 Configure Access Control Event Linkage Purpose: For the added access control device, you can configure its access control linkage including access control event linkage, access control alarm input linkage, event card linkage, and cross-device linkage. Click the icon on the control panel, or click Tool->Event Management to open the Event Management page. 14.7.1 Configuring Client Linkage for Access Control Alarm Purpose: You can assign client linkage actions to the access control event by setting up a rule. For example, when the access control event is detected, an audible warning appears or other linkage actions happen. Note: The linkage here refers to the linkage of the client software’s own actions. Steps: 1. Click Access Control Event tab. 2. The added access control devices will display in the Access Control Device panel on the left. Select the access control device, or alarm input, or access control point (door), or card reader to configure the event linkage. 3. Select the event type to set the linkage. 4. Select the triggered camera. The image or video from the triggered camera will pop up when the selected event occurs. To capture the picture of the triggered camera when the selected event occurs, you can also set the capture schedule and the storage in Storage Schedule. For details, refer to Chapter 5.1 Remote Storage. 5. Check the checkboxes to activate the linkage actions. Linkage Actions Audible Warning Descriptions The client software gives an audible warning when alarm is triggered. You can select the alarm sound for audible warning. For setting the alarm sound, refer 193 User Manual of iVMS-4200 Client Software to Chapter 22.7 Alarm Sound Settings. Email Linkage Alarm on E-map Alarm Triggered Pop-up Image Send an email notification of the alarm information to one or more receivers. Display the alarm information on the E-map. Note: This linkage is only available to access control point and alarm input. The image with alarm information pops up when alarm is triggered. Note: You should set the triggered camera first. 6. Click Save to save the settings. 7. You can click Copy to button to copy the access control event to other access control device, alarm input, access control point, or card reader. Select the parameters for copy, select the target to copy to, and click OK to confirm. 14.7.2 Configure Device Linkage for Access Control Alarm Input Purpose: The access control alarm inputs can be linked to some actions (e.g., alarm output, host buzzer) when it is triggered. Steps: 1. Click Access Control Alarm Input tab. 2. In the alarm input list on the left, select an alarm input. 3. Switch the property from to to enable this action. Host Buzzer: The audible warning of controller will be triggered. Card Reader Buzzer: The audible warning of card reader will be triggered. Alarm Output: The alarm output will be triggered for notification. Access Control Point (Open/Close): The door will be open or closed when the case is triggered. Note: The door cannot be configured as open or closed at the same time. 4. Click Save button to save the settings. 14.7.3 Event or Card Linkage Click Event Card Linkage tab. Note: The Event Card Linkage should be supported by the device. Select the access control device from the list on the left. Click Add button to add a new linkage. Configuring Device Linked Actions for Access Control Event For the event linkage, the alarm event can be divided into four types: device event, alarm input, door event, and card reader event. Steps: 1. Select the linkage type as Event Linkage, and select the event type from the dropdown list. 194 User Manual of iVMS-4200 Client Software For Device Event, select the detailed event type from the dropdown list. For Alarm Input, select the type as alarm or alarm recovery and select the alarm input name from the table. For Door Event, select the detailed event type and select the source door from the table. For Card Reader Event, select the detailed event type and select the card reader from the table. 2. Set the linkage target, and switch the property from to to enable this function. Host Buzzer: The audible warning of controller will be triggered. Capture: The real-time capture will be triggered. Recording: The recording will be triggered. Note: The device should support recording. Card Reader Buzzing: The audible warning of card reader will be triggered. Alarm Output: The alarm output will be triggered for notification. Zone: Arm or disarm the zone. Note: The device should support zone function. Access Control Point: The door status of open, close, remain open, and remain close will be triggered. Notes: The door status of open, close, remain open, and remain close cannot be triggered at the same time. 3. The target door and the source door cannot be the same one. Click Save. The configured device linkage will display in the device list on the left. You can click its name to edit its detailed settings or delete it. Configuring Device Linked Actions for Card Swiping Steps: 1. Select the linkage type as Card Linkage. 2. Input the card No. or select the card from the dropdown list. 3. Select the card reader from the table for triggering. 4. Set the linkage target, and switch the property from to to enable this function. Host Buzzer: The audible warning of controller will be triggered. Capture: The real-time capture will be triggered. Recording: The recording will be triggered. Note: The device should support recording. Card Reader Buzzing: The audible warning of card reader will be triggered. Alarm Output: The alarm output will be triggered for notification. Zone: Arm or disarm the zone. Note: The device should support zone function. Access Control Point: The door status of open, close, remain open, and remain closed will be enabled. 5. Click Save. The configured device linkage will display in the device list on the left. 195 User Manual of iVMS-4200 Client Software You can click its name to edit its detailed settings or delete it. Configuring Device Linkage for Mobile Terminal’s MAC Address Steps: 1. Select the linkage type as MAC Linkage. 2. Input the MAC address of the event source. MAC Address Format: AA:BB:CC:DD:EE:FF. 3. Set the linkage target, and switch the property from to to enable this function. Host Buzzer: The audible warning of controller will be triggered. Capture: The real-time capture will be triggered. Recording: The recording will be triggered. Note: The device should support recording. Card Reader Buzzing: The audible warning of card reader will be triggered. Alarm Output: The alarm output will be triggered for notification. Zone: Arm or disarm the zone. Note: The device should support zone function. Access Control Point: The door status of open, close, remain open, and remain closed will be enabled. 4. Click Save. The configured device linkage will display in the device list on the left. You can click its name to edit its detailed settings or delete it. 14.7.4 Cross-Device Linkage Purpose: You can assign to trigger other access control device’s action by setting up a rule when the access control event is triggered. Click Cross-Device Linkage tab. Click Add button to add a new client linkage. You can select the event source as Event Linkage or Card Linkage. Configuring Cross-Device Linkage for Event For the event linkage, the alarm event can be divided into four types: device event, alarm input, door event, and card reader event. Steps: 1. Click to select the linkage type as Event Linkage, select the access control device as event source, and select the event type from the dropdown list. For Device Event, select the detailed event type from the dropdown list. For Alarm Input, select the type as alarm or alarm recovery and select the alarm input name from the table. 196 User Manual of iVMS-4200 Client Software For Door Event, select the detailed event type and select the door from the table. For Card Reader Event, select the detailed event type and select the card reader from the table. 2. Set the linkage target, select the access control device from the dropdown list as the linkage target, and switch the property from to to enable this function. Alarm Output: The alarm output will be triggered for notification. Access Control Point: The door status of open, close, remain open, and remain close will be triggered. Note: The door status of open, close, remain open, and remain close cannot be triggered at the same time. 3. Click Save button to save parameters. Configuring Cross-Device Linkage for Card Swiping Steps: 1. Select the linkage type as Card Linkage. 2. Select the card from the dropdown list and select the access control device as event source. 3. Select the card reader from the table for triggering. 4. Set the linkage target, select the access control device from the dropdown list as the linkage target, and switch the property from to to enable this function. Alarm Output: The alarm output will be triggered for notification. 5. Click Save button to save parameters. 14.8 Searching Access Control Event Purpose: You can search the access control history events including remote event and local event via the client. Local Event: Search the access control event from the database of the control client. Remote Event: Search the access control event from the device. Click icon and click Access Control Event tab. 14.8.1 Searching Local Access Control Event Steps: 1. Select the Event Source as Local Event. 2. Input the search condition according to actual needs. 3. Click Search. The results will be listed below. 4. For the access control event which is triggered by the card holder, you can click the event to view the card holder details, including person No., person name, organization, phone number, contact address and photo. 5. (Optional) If the event contains linked pictures, you can click in the Capture column to view the captured picture of the triggered camera when the alarm is trigged. 197 User Manual of iVMS-4200 Client Software 6. (Optional) If the event contains linked video, you can click in the Playback column to view the recorded video file of the triggered camera when the alarm is trigged. Note: For setting the triggered camera, refer to Chapter 14.7.1 Configuring Client Linkage for Access Control Alarm. 7. You can click Export to export the search result to the local PC in *.csv file. 14.8.2 Searching Remote Access Control Event Steps: 1. Select the Event Source as Remote Event. 2. Input the search condition according to actual needs. 3. (Optional) You can check With Alarm Picture checkbox to search the events with alarm pictures. 4. Click Search. The results will be listed below. 5. You can click Export to export the search result to the local PC in *.csv file. 14.9 Door Status Management Purpose: The door status of the added access control device will be displayed in real time. You can check the door status and the linked event(s) of the selected door. You can control the status of the door and set the status duration of the doors as well. 14.9.1 Access Control Group Management Purpose: Before controlling the door status and setting the status duration, you are required to organize it into group for convenient management. Perform the following steps to create the group for the access control device: Steps: 1. Click 2. Click Group tab to enter the Group Management interface. 3. Perform the following steps to add a group. 1) Click on the control panel to open the Device Management page. to open the Add Group window box. 2) Input a group name as you want. 3) Click OK to add the new group to the group list. You can also check the checkbox Create Group by Device Name to create the new group by the name of the selected device. 198 User Manual of iVMS-4200 Client Software 4. Perform the following steps to import the access control points to the group: 1) Click Import on Group Management interface, and then click the Access Control tab to open the Import Access Control page. Notes: You can also select Alarm Input tab and import the alarm inputs to group. For the Video Access Control Terminal, you can add the cameras as encoding channel to the group. 2) Select the names of the access control points in the list. 3) Select a group from the group list. 4) Click Import to import the selected access control points to the group. 5. After importing the access control points to the group, you can click , or double-click the group/access control point name to modify it. For other detailed operations, refer to Chapter 3.2 Managing Group. 14.9.2 Controlling Door Status Purpose: You can control the status for a single access control point (door), including opening door, closing door, remaining open, and remaining closed. Click Steps: 1. icon on the control panel to enter the Status Monitor interface. Select an access control group on the left. For managing the access control group, refer to 199 User Manual of iVMS-4200 Client Software Chapter 14.9.1 Access Control Group Management. 2. The access control points of the selected access control group will be displayed on the right. 3. Click icon on the Status Information panel to select a door. Click the following button listed on the Status Information panel to control the door. Open Door: Click to open the door once. Close Door: Click to close the door once. Remain Open: Click to keep the door open. Remain Closed: Click to keep the door closed. Capture: Click to capture the picture manually. Note: The Capture button is available when the device supports capture function. And it cannot be realized until the Storage Server is configured. Refer to Chapter 5.1 Remote Storage. 14.9.3 Controlling Elevator Status Purpose: You can control the elevator status for elevator controller, including opening elevator’s door, controlled, free, calling elevator, etc. Click icon on the control panel to enter the Status Monitor interface. 1. Select an access control group on the left. For managing the access control group, refer to Chapter 14.9.1 Access Control Group Management. The floors of the selected access control group will be displayed on the right of the interface. 2. Click 3. Click the following button listed on the Status Information panel to control the elevator. on the Status Information panel to select a floor. Open Door: The floor’s button in the elevator will be valid for a period of time and the elevator’s door is open. Controlled: You should swipe the card to press the selected floor button. And the elevator can go to the selected floor. Free: The selected floor's button in the elevator will be valid all the time. Disable: The selected floor's button in the elevator will be invalid and you cannot go to the selected floor. Call Elevator (Visitor): The elevator will go down to the first floor. The visitor can only press the selected floor button. 4. Call Elevator (Resident): Call the elevator to the selected floor. You can view the anti-control operation result in the Operation Record panel. Notes: You can control the elevator via the current client if it is not armed by other client. The elevator cannot be controlled by other client software if the elevator status changes. Only one client software can control the elevator at one time. The client which has controlled the elevator can receive the alarm information and view the 200 User Manual of iVMS-4200 Client Software elevator real-time status. 14.9.4 Configuring Status Duration for Door Purpose: You can schedule weekly time periods for an access control point (door) to remain open or remain closed. In the Door Status module, click Status Duration button to enter the Status Duration interface. Steps: 1. Select a door from the access control device list on the left. 2. On the Door Status Configuration panel on the right, draw a schedule for the selected door. 1) Select a door status brush as Remain Open or Remain Closed. Remain Open: The door will keep open during the configured time period. The brush is marked as Remain Closed: The door will keep closed during the configured duration. The brush is marked as 2) . . Drag on the timeline to draw a color bar on the schedule to set the duration. 201 User Manual of iVMS-4200 Client Software 3) When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period. When the cursor turns to 3. , you can lengthen or shorten the selected time bar. Optionally, you can select the schedule time bar and click Copy to Whole Week to copy the time bar settings to the other days in the week. 4. You can select the time bar and click Delete Duration to delete the time period. Or you can click Clear to clear all configured durations on the schedule. 5. Click Save to save the settings. 6. You can click Copy to button to copy the schedule to other doors. 14.9.5 Configuring Status Duration for Floor Purpose: You can schedule weekly time periods for an access control point (floor) to be free or disabled. In the Door Status module, click Status Duration button to enter the Status Duration interface. Steps: 202 User Manual of iVMS-4200 Client Software 1. Click to select a floor from the elevator controller list on the left. 2. On the Door Status Configuration panel on the right, draw a schedule for the selected floor. 1) Select a status brush as Free or Disabled. Free: The floor button will be free during the configured time period. The brush is marked as . Disabled: You cannot press the floor button during the configured duration. The brush is marked as . 2) Drag on the timeline to draw a color bar on the schedule to set the duration. 3) When the cursor turns to , you can move the selected time bar you just edited. You can also edit the displayed time point to set the accurate time period. When the cursor turns to 3. , you can lengthen or shorten the selected time bar. Optionally, you can select the schedule time bar and click Copy to Whole Week to copy the time bar settings to the other days in the week. 4. You can select the time bar and click Delete Duration to delete the time period. Or you can click Clear to clear all configured durations on the schedule. 5. Click Save to save the settings. 6. You can click Copy to button to copy the schedule to other floors. 14.9.6 Real-time Card Swiping Record Click Card Swiping Record tab. The logs of card swiping records of all access control devices will display in real time. You can view the details of the card swiping event, including card No., person name, organization, event time, etc. You can also click the event to view the card holder details, including person No., person name, organization, phone, contact address, etc. Note: Authentication result refers to the card swiping result, such as card No. not registered, succeeded, etc. 14.9.7 Real-time Access Control Alarm Purpose: 203 User Manual of iVMS-4200 Client Software The logs of access control events will be displayed in real time, including device exception, door event, card reader event, and alarm input. Click Access Control Alarm tab to enter the following interface. Steps: 1. All access control alarms will display in the list in real time. You can view the alarm type, alarm time, location, etc. 2. Click to view the alarm on E-map. For configuring the access control point on E-map, refer to Chapter 14.11 Displaying Access Control Point on E-map. 3. You can click or to view the live view or the captured picture of the triggered camera when the alarm is trigged. Note: For setting the triggered camera, refer to Chapter 14.7.1 Configuring Client Linkage for Access Control Alarm. 4. Click Subscribe to select the alarm that the client can receive when the alarm is triggered. 1) Check the checkbox(es) to select the alarm(s), including device exception alarm, door event alarm, card reader alarm, and alarm input. 2) Click OK to save the settings. 204 User Manual of iVMS-4200 Client Software 14.10 Controlling Door during Live View Purpose: You can control the door during live view. Steps: 1. Right click on the live view window to pop up the right-click menu. 2. Click Link to Access Control Point to pop up the Set Linked Access Control Point window. 3. Check the Enable checkbox to enable the linkage function. 4. Select access control point from the dropdown list. 5. Click OK to save the settings. 6. Get the stream again (double-click the camera) to make the settings effective. Four door control buttons will appear on the toolbar during live view. The following table shows the descriptions of the four buttons. Button Description Open the door. Close the door. Remain open. Remain closed. 7. Click / to open or close the door. Or click / to set the door status as remain open or remain closed. Note: One camera can be linked to only one access control point; Different cameras can be linked to the same access control point. 14.11 Displaying Access Control Point on E-map Purpose: You can add the access control point on the E-map, and when the alarm of the access control point is triggered, you can view the alarm notification on the E-map, check the alarm details, and control the door. Note: For detailed operations of E-map, refer to Chapter 8 E-map Management. 205 User Manual of iVMS-4200 Client Software 14.11.1 Adding Access Control Point as Hot Spots Steps: 1. Click the Edit Map button in the E-map toolbar to enter the map editing mode. 2. 3. Click the icon in the toolbar to open the Add Hot Spot window box. Check the checkboxes to select the access control point to be added. 4. Optionally, you can edit hot spot name, select the name color and select the hot spot icon by double-clicking the corresponding field. 5. Click OK to save the settings. The door icons are added on the map as hot spots and the icons of added access control points change from to in the group list. You can click-and-drag the access control point icons to move the hot spots to the desired locations. You can also click-and-drag the access control point icons from the group list to the map directly to add the hot spots. Note: For Video Access Control Terminal, you can also add its camera to the E-map to view the live view of the camera. 14.11.2 Modifying Hot Spots Purpose: You can modify the information of the added hot spots on the map, including the name, the color, the icon, etc. Steps: 1. Click the Edit Map button in the E-map toolbar to enter the map editing mode. 2. Select the hot spot icon on the map and then click in the toolbar, right-click the hot spot icon and select Modify, or double-click the hot spot icon on the map to open the Modify Hot Spot window box. 3. You can edit the hot spot name in the text field and select the color, the icon and the linked access control point. 4. Click OK to save the new settings. To delete the hot spot, select the hot spot icon and click spot icon and select Delete. 206 in the toolbar, or right-click the hot User Manual of iVMS-4200 Client Software 14.11.3 Previewing Hot Spots Steps: 1. Click the Map Preview button in the E-map toolbar to enter the map preview mode. 2. To control the access control point, you can right click the access control point icon on the map, and click Open Door, Close Door, Remain Open, and Remain Closed to control the door. 3. If there is any alarm triggered, an icon will appear and twinkle near the hot spot (it will twinkle for 10s). Click the alarm icon, or you can right click the door icnon and select Display Alarm Information, to check the alarm information, including alarm type and triggering time. Note: To display the alarm information on the map, the Alarm on E-map functionality needs to be set as the alarm linkage action. For details, refer to Chapter 14.7 Configure Access Control Event . 4. To clear the alarm information displayed on the map, click on the toobar, or right click the access control point icnon and select Clear Alarm Information to clear the alarms of the selected zone. 207 User Manual of iVMS-4200 Client Software Chapter 15 Time and Attendance Purpose: The Time and Attendance module provides multiple functionalities to track and monitor when employees start and stop work, and full control of employees working hours such as late arrivals, early departures, time taken on breaks and absenteeism. Before you start: You should add organization and person in Access Control module. For details, refer to Chapter 14.2 Organization Management and Chapter 14.3 Person Management. Click to enter the Time and Attendance module. 15.1 Shift Schedule Management Open Time and Attendance module and click Shift Schedule Management to enter the Shift Schedule Management interface. 15.1.1 Shift Settings Purpose: You can add time period and shift for the shift schedule. Click Shift Settings to pop up Shift Settings window. Adding Time Period Steps: 1. Click Time Period tab. 2. Click Add. 208 User Manual of iVMS-4200 Client Software 3. Set the related parameters. Name: Set the name for time period. Start-Work / End-Work Time: Set the start-work time and end-work time. Attend at Least: Set the minimum attendance time. Check-in / Check-out Required: Check the checkboxes and set the valid period for check-in or check-out. Mark as Late/Mark as Early Leave: Set the time period for late or early leave. Exclude Break Period from Work Duration: Check the checkbox and set the break period excluded. Note: Up to 3 break periods can be set. Set as Pay-per-Time Period: Check the checkbox and set the pay rate and minimum time unit. 4. Click Save to save the settings. The added time period will display on the left panel of the window. You can also click Delete to delete the time period. Adding Shift Steps: 1. Click Shift Tab. 2. Click Add. 3. Set the name for shift. 4. Select the shift period from the drop-down list. 5. Configure the shift period with the added time period. 1) Select the time period. 2) Click the time bar to apply the time period for the select day. You can click the time period on the bar and click or Delete to delete the period. You can also click Clear to delete all days’ time period. 6. Click Save to save the settings. The added shift will display on the left panel of the window. 209 User Manual of iVMS-4200 Client Software You can also click Delete on the left panel to delete the shift. 15.1.2 Shift Schedule Settings Purpose: After setting the shift, you can set department schedule, person schedule and temporary schedule. Note: The temporary schedule has higher priority than department schedule and person schedule. Department Schedule You can set the shift schedule for one department, and all the persons in the department will be assigned with the shift schedule. Note: In Time and Attendance module, the department list is the same with the organization in Access Control. For setting the organization in Access Control, refer to Chapter 14.2 Organization Management. Steps: 1. Open the Shift Schedule Management interface and select the department on the left panel. 2. Click Department Schedule to pop up Department Schedule window. 3. Check Time and Attendance checkbox. All persons in the department expect those excluded from attendance will apply the attendance schedule. 4. Select the shift from the drop-down list. 5. Set the start date and end date. 6. (Optional) Set other parameters for the schedule. You can select Check-in Not Required, Check-out Not Required, Effective for Holiday, Effective for Overtime, Effective for Multiple Shift Schedules. Notes: Multiple Shift Schedules contains more than one time periods. The person can check in/out in any of the time periods and the attendance will be effective. Example: If the multiple shift schedules contains three time periods: 00:00 to 07:00, 08:00 to 15:00 and 16:00 to 23:00. The attendance of the person adopting this multiple shift schedules will be effective in any of the three time periods. If the person checks in at 07:50, it will apply the nearest time period 08:00 to 15:00 to the person’s attendance. 210 User Manual of iVMS-4200 Client Software After checking the Effective for Multiple Shift Schedules checkbox, you can select the effective time period(s) from the added time periods for the persons in the department. 1) In the Selectable Time Period list on the left, click the added time period and click to add it to the right. 7. 2) (Optional) To remove the selected time period, select it and click (Optional) Check Set as Default for All Persons in Department checkbox. . All persons in the department will use this shift schedule by default. 8. (Optional) If the selected department contains sub department(s), the Set as Shift Schedule for All Sub Departments checkbox will display. You can check it to apply the department schedule to its sub departments. 9. Click Save to save the settings. Person Schedule Steps: 1. Open the Shift Schedule Management interface and select the department on the left panel. 2. Select the person(s) on the right panel. 3. Click Person Schedule to pop up Person Schedule window. 4. Check Time and Attendance checkbox. The configured person will apply the attendance schedule. 5. Select the shift from the drop-down list. 6. Set the start date and end date. 7. (Optional) Set other parameters for the schedule. You can select Check-in Not Required, Check-out Not Required, Effective for Holiday, Effective for Overtime, Effective for Multiple Shift Schedules. 8. Click Save to save the settings. 211 User Manual of iVMS-4200 Client Software Temporary Schedule Steps: 1. Open the Shift Schedule Management interface and select the department on the left panel. 2. Select the person(s) on the right panel. 3. Click Temporary Schedule to pop up Temporary Schedule window. 4. 5. Click to set the shift date. Configure the shift date with the added time period. 1) Select the time period. 2) Click the time bar to apply the time period for the select date. You can click the time period on the bar and click to delete the period. You can also click Clear to delete all days’ time period. 6. You can click Advanced Settings to advanced attendance rules for the temporary schedule. 7. Click Add to save the settings. Checking Shift Schedule Details Steps: 1. On the Shift Schedule Management interface, select the department on the left panel. 2. Select the person(s) on the right panel. 3. Click View to pop up Shift Schedule Details window. You can check the shift schedule details. 212 User Manual of iVMS-4200 Client Software 4. Click Normal Schedule tab. You can check and edit the normal schedule details. 1) Select the shift from the drop-down list. 2) Click Attendance Rule Settings to pop up Attendance Rule Settings window. You can check the attendance rules as desired and click OK to save the settings. 3) Click to set the effective date. 4) Click Save to save the settings. 5. (Optional) Click Temporary Schedule tab. 213 User Manual of iVMS-4200 Client Software You can check and edit the temporary schedule details. (Optional) Click Add to add temporary schedule for the selected person. (Optional) Click to edit the time period. (Optional) Click to delete the temporary schedule. Exporting Shift Schedule Details On the Shift Schedule Management interface, select the department on the left panel and click Export to export all persons’ shift schedule details to local PC. Note: The exported details are saved in *.csv format. 15.2 Attendance Handling Purpose: You can handle the attendance, including check-in correction, check-out correction, leave and business trip, and calculating attendance data manually. Open Time and Attendance module and click Attendance Handling to enter the Attendance Handling interface. 15.2.1 Check-in/out Correction Purpose: You can add, edit, delete, search the check-in/out correction and generate the related report. You can also export the check-in/out correction details to local PC. Add Check-in/out Correction Steps: 1. Click Check-in/out Correction tab. 2. Click Add to pop up Add Check-in/out Correction window. 3. Set the check-in/out correction parameters. For Check-in Correction: Check Check-in checkbox and set the actual start-work time. For Check-out Correction: Check Check-out checkbox and set the actual end-work time. 214 User Manual of iVMS-4200 Client Software 4. Click Employee Name field and select the person. 5. You can also input the keyword and click to search the person you want. (Optional) Input the remark information as desired. 6. Click Add to add the check-in/out correction. The added check-in/out correction will display on the Attendance Handling interface. (Optional) Select the check-in/out correction and click Modify to edit the correction. (Optional) Select the check-in/out correction and click Delete to delete the correction. (Optional) Click Report to generate the check-in/out correction report. (Optional) Click Export to export the check-in/out correction details to local PC. Note: The exported details are saved in *.csv format. Search Check-in/out Correction Steps: 1. Click Check-in/out Correction tab. 2. Set the searching conditions. Department: Select the department from the drop-down list. Name: Input the person name. 3. Time: Click to set the specified time as time range. Click Search to search the check-in/out corrections. The check-in/out correction details will display on the list. You can also click Reset to reset the searching conditions. 15.2.2 Leave and Business Trip Purpose: You can add, edit, delete, search the leave and business trip and generate the related report. You can also export the leave and business trip details to local PC. Add Leave and Business Trip Steps: 1. Click Leave and Business Trip tab. 2. Click Add to pop up Add Leave and Business Trip Application window. 215 User Manual of iVMS-4200 Client Software 3. Select the leave and business trip type from the Type drop-down list. You can configure the leave type in Advanced Settings. For details, refer to Chapter 15.3.5 Leave Type Settings. 4. 5. Click to set the specified time as time range. Click Employee Name field and select the person for this application. 6. You can also input the keyword and click to search the person you want. (Optional) Input the remark information as desired. 7. Click Add to add the leave and business trip. The added leave and business trip will display on the Attendance Handling interface. (Optional) Select the leave and business trip and click Modify to edit the leave or business trip. (Optional) Select the leave and business trip and click Delete to delete the leave or business trip. (Optional) Click Report to generate the leave or business trip report. (Optional) Click Export to export the leave or business trip details to local PC. Note: The exported details are saved in *.csv format. Search Leave and Business Trip Steps: 1. Click Leave and Business Trip tab. 2. Set the searching conditions. Department: Select the department from the drop-down list. Name: Input the person name. 3. Time: Click to set the specified time as time range. Click Search to search the leave and business trips. The leave and business trip details will display on the list. You can also click Reset to reset the searching conditions. 216 User Manual of iVMS-4200 Client Software 15.2.3 Manual Calculation of Attendance Purpose: You can calculate the attendance result manually if needed by specifying the start time and end time. Steps: 5. Click Manual Calculation of Attendance tab. 6. Set the start time and end time for calculation. 7. Click Calculate to start. Note: It can only calculate the attendance data within three months. 15.3 Advanced Settings Purpose: You can configure the basic settings, attendance rule, attendance check point, holiday settings and leave type for attendance. Open Time and Attendance module and click Advanced Settings to enter the Advanced Settings interface. 15.3.1 Basic Settings Steps: 1. Click Basic Settings tab to enter the Basic Settings interface. 2. Set the basic settings. Start Day of Each Week: You can select one day as the start day of each week. Start Date of Each Month: You can select one day as the start date of each month. 3. Set the non-work day settings. Set as Non-Work Day: Check the checkbox(es) to set the selected day(s) as non-work day. Set Non-Work Day’s Color in Report: Click the color filed and select the color to mark the non-work day in report. Set Non-Work Day’s Mark in Report: Input the mark as non-work day in report. 4. Set the authentication type, which means the client will calculate the attendance data recorded based on the selected authentication type. 217 User Manual of iVMS-4200 Client Software 5. Click Save to save the settings. 15.3.2 Attendance Rule Settings Steps: 1. Click Attendance Rule Settings tab to enter the Attendance Rule Settings interface. 2. Set the attendance or absence settings. If employee does not check in when starting work, you can mark as Absent or Late and set the late time. If employee does not check out when ending work, you can mark as Absent or Early Leave and set the early leave duration. 3. Set the Check-in/out Settings. You can check the checkbox of Check-in Required or Check-out Required and set the valid period. You can also set the late rule or early leave rule. Note: The parameters here will be set as default for the newly added time period. It will not affect the existed one(s). 4. Set the overtime settings. You can set the overtime rule and set the maximum overtime for each day. (Optional) You can check Non-scheduled Work Day checkbox and set the overtime rule for non-work day. 5. Click Save to save the settings. 15.3.3 Attendance Check Point Settings You can set the card reader(s) of the access control point as the attendance check point, so that the card swiping on the card reader(s) will be valid for attendance. Steps: 1. Click Attendance Check Point Settings tab to enter the Attendance Check Point Settings 218 User Manual of iVMS-4200 Client Software interface. 2. Click to pop up Add Attendance Check Point window. 3. Set the related information. Check Point Name: Input a name for check point. Card Reader: Select the card reader from the drop-down list. Check Point Function: Select the function for check point. Door Location: Input the door location. Check Point Description: Set the description information for check point. 4. Click Add to add the attendance check point. The added attendance check point will display on the list. 5. (Optional) Check Set All Card Readers as Check Points checkbox. You can use all the card readers as check points. Note: If this checkbox is unchecked, only the card readers in the list will be added as attendance check points. You can also edit or delete the card readers. Click Click to edit the card reader. to delete the card reader. 15.3.4 Holiday Settings Steps: 1. Click Holiday Settings tab to enter the Holiday Settings interface. 2. Click 3. Set the related parameters. to pop up Add Holiday window. Holiday Name: Input the name for the holiday. 4. Start Date / End Date: Click Click Add to add the holiday. to specify the holiday date. 219 User Manual of iVMS-4200 Client Software The added holiday will display on the list. You can also edit or delete the holiday. Click Click to edit the holiday. to delete the holiday. 15.3.5 Leave Type Settings Purpose Steps: 1. Click Leave Type Settings tab to enter the Leave Type Settings interface. 2. Add the major leave type. 1) Click on the left panel to pop up the Add Major Leave Type window. 2) Input the name for major leave type. 3) Click Add to add the major leave type. You can also edit or delete the major leave type. Click Click 3. to edit the major leave type. to delete the major leave type. Add the minor leave type. 1) Select the major leave type. The minor leave type belonging to this major leave type will display on the right panel. 2) Click on the right panel to pop up the Add Minor Leave Type window. 3) Input the name for minor leave type. 4) Click Add to add the minor leave type. You can also edit or delete the major leave type. Click Click to edit the minor leave type. to delete the minor leave type. 15.4 Attendance Statistics Purpose: After calculating attendance data, you can check the attendance summary, attendance details, 220 User Manual of iVMS-4200 Client Software abnormal attendance, overtime, card swiping logs and reports based on the calculated attendance data. Notes: The client automatically calculates the previous day’s attendance data at 1:00 am on the next day. Keep the client running at 1:00 am or it cannot calculate the previous day’s attendance data automatically. If not calculated automatically, you can calculate the attendance data manually. For details, refer to Chapter 15.2.3 Manual Calculation of Attendance. 15.4.1 Attendance Summary Purpose: You can get all the attendance information statistics of the employees in the specified time period. Steps: 1. In the Time and Attendance module, click Attendance Statistics tab to enter the Attendance Statistics page. 2. Click Attendance Summary item on the left panel to enter the Attendance Summary interface. 3. Set the search conditions, including department, employee name and attendance date. (Optional) You can click Reset to reset all the configured search conditions. 4. Click Search to start searching and the matched results will list on this page. (Optional) Click Report to generate the attendance report. (Optional) Click Export to export the results to the local PC. 15.4.2 Attendance Details Steps: 1. In the Attendance Statistics page, click Attendance Details item on the left panel to enter the Attendance Details interface. 2. Set the search conditions, including department, employee name, attendance date and status. (Optional) You can click Reset to reset all the configured search conditions. 3. Click Search to start searching and the matched results will list on this page. (Optional) You can select a result item in the list and click Correct Check-in/out to correct the check-in or check-out status. (Optional) Click Report to generate the attendance report. (Optional) Click Export to export the results to the local PC. 15.4.3 Abnormal Attendance You can search and get the statistics of the abnormal attendance data, including No., name and department of the employees, abnormal type, start/end time and date of attendance. For detailed operations, refer to Chapter 15.4.1 Attendance Summary. 221 User Manual of iVMS-4200 Client Software 15.4.4 Overtime Search You can search and get the overtime status statistics of the selected employee in the specified time period. And you can check the detailed overtime information, including No., name and department of the employees, attendance date, overtime duration and overtime type. For detailed operations, refer to Chapter 15.4.1 Attendance Summary. 15.4.5 Card Swiping Log You can search the card swiping logs used for the attendance statistics. After searching the logs, you can check the card swiping details, including name and department of the employees, card swiping time, card reader authentication mode and card No.. For detailed operations, refer to Chapter 15.4.1 Attendance Summary. 15.4.6 Report In the Attendance Statistics page, click Report item on the left panel to enter the Report interface. It supports to generate 12 kinds of attendance report: Total Overtime Monthly Report, Overtime Details Monthly Report, Attendance Monthly Report, Start/End-Work Time Report, Department Attendance Report, Valid Card Swiping Record Report, Attendance Daily Report, First Check-in and Last Check-out Report, Continuous Absence Report, Continuous Early Leave Report, and Continuous Early late Report. 222 User Manual of iVMS-4200 Client Software Chapter 16 Video Intercom Purpose: The Video Intercom Management module provides the function of video intercom, checking call logs and managing notice via the iVMS-4200 client software. Note: For the user with access control module permissions, the user can enter the Access Control module and manage video intercom and search information. For setting the user permission of Access Control module, refer to Chapter 20 Account Management. Before you start: Before you can remote control the video intercom, you should add the device to the software and configure the person to link the device in the Access Control module. Notes: Up to 16 door stations can be added, and up to 512 indoor stations or master stations can be added. For details about adding the video intercom, refer to Chapter 3.1 Adding Device. For details about configuring person in the Access Control module, refer to Chapter 14.3 Person Management. Click on the Control Panel, or click View-> Access Control to open the Access Control page. Click tab on the left icon bar to enter the Video Intercom interface. 16.1 Video Intercom Purpose: In this section, you can call the residents via the iVMS-4200 client software and the residents can also call the client software via the indoor station. In addition, calling the client software via door station is also available. 16.1.1 Calling Indoor Station via iVMS-4200 Steps: 1. Click tab on the left icon bar to enter the Video Intercom interface. 2. Unfold the organization list on the left panel and click to select a resident group. The information, including resident name, linked device name and device IP address, of all the residents in the selected group will display on the right panel. 3. Select a resident, or input the keyword in the Filter field to find the desired resident. 4. Click the icon in the Call Household column to start calling the selected resident. 223 User Manual of iVMS-4200 Client Software After answered, you will enter the In Call window. Click to adjust the volume of the loudspeaker. Click to hang up. Click to adjust the volume of the microphone. Notes: One indoor station can only connect with one client software. You can set the maximum ring duration ranging from 15s to 60s, and the maximum speaking duration ranging from 120s to 600s via the Remote Configuration of indoor station. 16.1.2 Calling iVMS-4200 via Indoor Station/Door Station Steps: 1. Select the client software in the indoor station or door station interface to start calling the iVMS-4200 and an incoming call window will pop up in the client software. 224 User Manual of iVMS-4200 Client Software Here we take the indoor station as an example. 2. Click Answer to answer the call. Or click Hang Up to decline the call. 3. After you answer the call, you will enter the In Call window. Click to adjust the volume of the loudspeaker. Click to hang up. Click to adjust the volume of the microphone. For door station, you can click to open the door remotely. Notes: One video intercom device can only connect with one client software. The maximum ring duration can be set from 15s to 60s via the Remote Configuration of the video intercom device. The maximum speaking duration between indoor station and iVMS-4200 can be set from 120s to 600s via the Remote Configuration of indoor station. 225 User Manual of iVMS-4200 Client Software The maximum speaking duration between door station and iVMS-4200 can be set from 90s to 120s via the Remote Configuration of door station. 16.1.3 Viewing Live Video of Door Station and Outer Door Station Purpose: You can get the live view of the door station and outer door station in the Main View module and control the door station and outer door station remotely. In the Main View module, double-click a door station or outer door station device or drag the device to a display window to start the live view. Note: For detailed operations of live view, refer to Chapter 4 Live View. Right-click the live view window to open the right-click menu. You can click Unlock on the menu to open the door remotely. 16.2 Real-Time Call Logs Purpose: You can view all the real-time call logs, including dialed call logs, received call logs and missed call logs. You can also directly dial via the log list and clear the logs. Steps: 1. In the Video Intercom page, click Call Log tab to enter the Call Log page. All the call logs will display on this page and you can check the log information, e.g., call status, start time, resident’s organization and name, device name and ring or speaking duration. 2. (Optional) Click in the Operation column to re-dial the resident. 3. (Optional) Click in the Operation column to delete the call log. 226 User Manual of iVMS-4200 Client Software Or you can click Clear button at the upper right corner to clear all the logs. Note: If you delete or clear the call log in real-time call log interface, you can still find the deleted logs in Search – Call Log interface. For details, refer to Chapter 16.4.1 Searching Call Logs. 16.3 Releasing Notice Purpose: You can create different types of notices and send them to the residents. Four notice types are available, including Advertising, Property, Alarm and Notice Information. Steps: 1. In the Video Intercom page, click Release Notice tab to enter the Release Notice page. 2. Click New Notice button on the left panel to create a new notice. 3. Edit the notice on the right panel. Steps: 1) Click icon on the Send To field to pop up the Select Resident window. 2) Check the checkbox(es) to select the resident(s). 3) Click OK. 4) Input the subject on the Subject field. Note: Up to 63 characters are allowed in the Subject field. 5) Click in the Type field to unfold the drop-down list and select the notice type. 6) (Optional) Click Add Picture to add a local picture to the notice. Note: Up to 6 pictures in the JPGE format can be added to one notice. And the maximum size of one picture is 512KB. 7) Input the notice content in the Content field. Note: Up to 1023 characters are allowed in the Content field. 4. Click Send to send the edited notice to the selected resident(s). The sent notice information will display on the left panel. You can click a notice to view the details on 227 User Manual of iVMS-4200 Client Software the right panel. 16.4 Searching Video Intercom Information Purpose: You can search the call logs between the iVMS-4200 client software and video intercom devices, device unlocking logs, and the sent notice information. In the Access Control module, click icon tab to open the Search page. 16.4.1 Searching Call Logs Purpose: You can search the call logs of the video intercom devices in the specified time period. Steps: 1. In the Search page, click Call Log tab to enter the searching call log interface. 2. Set the search conditions, including call status, device type, start time and end time. 3. Click Search and all the matched call logs will display. 4. (Optional) Click Export to export the call logs to your PC. 16.4.2 Searching Unlocking Logs Purpose: You can search the unlocking logs of the video intercom devices (Door Station or Door Station (V Series)) in the specified time period. Steps: 1. In the Search page, click Unlocking Log tab to enter the searching unlocking log interface. 2. Set the search conditions, including unlocking type, device type, start time and end time. Unlocking Type: Select who or how to unlock the door. 3. Click Search and all the matched unlocking logs will display. 4. (Optional) Click in the Capture column to view the captured pictures. Note: It should be supported by device. 5. (Optional) Click Export to export the unlocking logs to your PC. 16.4.3 Searching Notice Purpose: You can search the notice sent to the residents in the specified time period. Steps: 1. In the Search page, click Notice tab to enter the searching notice interface. 228 User Manual of iVMS-4200 Client Software 2. Set the search conditions, including notice type, subject, recipient, start time and end time. Notice Type: Select the notice type as Advertising Information, Property Information, Alarm Information or Notice Information. 3. Click Search and all the matched notices will display. 4. You can click in the Operation column to view the notice details. You can view and edit the notice details, check the sending failed/sent succeeded/unread users, and resend the notice to sending failed/unread users. 5. (Optional) Click Export to export the notices to your PC. 229 User Manual of iVMS-4200 Client Software Chapter 17 Face Picture Comparison Alarm Purpose: For the device which supports face picture comparison, you can view the captured face pictures and the matched face picture in face picture library. You can also view the face capture alarm logs and face picture comparison alarm logs. 17.1 Viewing Captured Face Picture Purpose: You can view the real-time or historical captured face pictures. You can add the face picture to the face picture library if no result matched in the library when necessary. Before you start: You should configure the capture rule first for the device. For details, refer to the User Manual of the device. Steps: 1. Click Face Picture Comparison Alarm on the control panel to enter this module. 2. Double click a camera in the camera list to start live view. The captured face pictures and capture time will display in the Real-Time Capture list in real time. 3. (Optional) Click History Capture to view the historical captured face pictures. Notes: Up to five pictures will be displayed in the real-time captured face pictures list. Up to 100 pictures will be displayed in the historical captured face pictures list. 230 User Manual of iVMS-4200 Client Software 4. (Optional) Add the captured face picture to the face picture library. 1) Click on the upper-left corner of the captured face picture to open the following window. 2) Select a face picture library from the drop-down list. 3) Input the person details. 4) Click OK. 5. If the captured face picture is matched with the face picture in the library, the captured picture and picture in library will display in the Real-Time Comparison list on the right. You can view the matched person details, such as similarity, name, gender, age, etc. 6. (Optional) Click History Comparison to view the historical matched face pictures. Notes: Up to three real-time matched records (captured face and face in library) will be displayed in the linked face/human body pictures list. Up to 100 historical matched records (captured face and face in library) will be displayed in the history list. 17.2 Viewing Matched Face Pictures Purpose: If the captured face picture matches with the face picture in the face picture library, you can view the matched person details. You can view the real-time or historical face picture comparison records. Before you start: You should configure the face picture library first for the device. For details, refer to the User Manual of the device. Steps: 1. Click Face Picture Comparison Alarm on the control panel to enter this module. 2. Double click a camera in the camera list to start live view. If the captured face picture is matched with the face picture in the library, the captured picture and picture in library will display in the Real-Time Comparison list on the right. 3. View the matched person details, such as similarity, name, gender, age, etc. 4. (Optional) Click History Comparison to view the historical matched face pictures. Notes: Up to three real-time matched records (captured face and face in library) will be displayed in the linked face/human body pictures list. 231 User Manual of iVMS-4200 Client Software Up to 100 historical matched records (captured face and face in library) will be displayed in the history list. 17.3 Viewing Alarm Logs Purpose: You can view the face capture alarm logs and face picture comparison alarm logs and export them to the local PC. 17.3.1 Searching Alarm Logs Purpose: You can search the client logs including face capture alarm or face picture comparison alarm on the current client. You can also export the logs to the local PC. Steps: 1. On the client menu bar, click Tool > Search Alarm Log. 2. 3. Click to display other search conditions. Set the search condition, such as time period for search, alarm type, device IP address, device name, etc. 4. Click Search to start searching the alarm logs. The matched alarm logs will display. Note: You can view the alarm logs if the camera has been configured with Storage Server to save the alarm pictures. For setting the picture storage on Storage Server, refer to Chapter 5.1.2 Storing on Storage Device. 5. (Optional) Export the all the searched alarm logs, including alarm picture, device IP address, device name, alarm time, alarm details, etc. 232 User Manual of iVMS-4200 Client Software 1) Click Export All. 2) Click to select a saving path on local PC and create a name for the exported file. 3) Click OK to start exporting the alarm logs. Note: The file exported is in XML file. 6. (Optional) Export the selected alarm logs, including alarm picture, device IP address, device name, alarm time, alarm details, etc. 1) Click Export Selected. 2) Click to select a saving path on local PC and create a name for the exported file. 3) Click OK to start exporting the alarm logs. Note: The file exported is in XML file. 17.3.2 Open Alarm Logs Purpose: You can open the alarm log files exported from other client and search the alarm logs by setting search conditions to view the alarm details. Steps: 1. On the client menu bar, click Tool > Open Alarm Log. 2. Open the exported alarm log file. 1) Click Open. 2) Click to select an exported log file. Note: The log file is in XML format. 3) Click OK to import the logs. The alarm logs in the log file will display. 3. 4. Click to display other search conditions. Set the search condition, such as time period for search, alarm type, device IP address, device name, etc. 5. Click Search to start searching the alarm logs. The matched alarm logs will display. 233 User Manual of iVMS-4200 Client Software Chapter 18 Target Capture Alarm Purpose: For the target capture camera which supports target capture alarm, you can view the captured target pictures, such as face, human body, vehicle, etc. Before you start: You should configure the target capture alarm rule of the device first. For details, refer to the User Manual of the device. Steps: 1. Enter the Target Capture Alarm module. 2. Start live view for the cameras. 1) Select a window for live view. 2) In the Camera tab, double-click the camera to start live view in the selected window. The captured target pictures will be displayed below. 3) (Optional) Move to the live view window and click 3. on the toolbar to capture a picture. 4) (Optional) Move to the live view window and click on the toolbar to start recording. Click Real-Time or History tab below to view the real-time captured or historical pictures. Notes: 4. Up to five pictures will be displayed in the real-time captured target pictures list. Up to 100 pictures will be displayed in the historical captured target pictures list. (Optional) If the captured target is human body or face, you can click Linked Face/Human Body or History tab on the right to view the target’s captured face and human body pictures. Notes: Up to three real-time records (human body and face) will be displayed in the linked face/human body pictures list. Up to 100 historical records (human body and face) will be displayed in the history list. 234 User Manual of iVMS-4200 Client Software Chapter 19 Log Management Purpose: The log files of the client software are stored on the local PC and can be searched for checking. Two types of log files are provided: client logs and remote logs. The client logs refer to the log files of the client and are stored on the local PC; the remote logs refer to the log files of the connected devices and are stored on the local device. Click icon on the control panel to open the Log Search page. 19.1 Searching Log Files Steps: 1. Open the Log Search page. 2. Select the log type. If Remote Logs is selected, then click to specify the device for search. 3. Click the icon to specify the start time and end time. Note: You can search the logs within one month. 4. Click Search. The log files between the start time and end time will be displayed on the list. You can check the operation time, type and other information of the logs. Note: Please narrow the time range or filter the log type for search if there are too many log files. 19.2 Filtering Log Files Purpose: After searched out successfully, the log files can be filtered by the keyword or condition, and thus you can find the logs as you want. Steps: 1. Click Log Filter or the icon on the Log Search page to expand the Log Filter panel. 235 User Manual of iVMS-4200 Client Software 2. Select Filter by Keyword, and then input keyword for filtering in the text field. Or select Filter by Condition, and then specify log type in the drop-down list. 3. Optionally, you can click More… to filter the log files more accurately. 4. Click Filter to start filtering. You can click Clear Filter the cancel the filtering. 19.3 Backing Up Log Files Purpose: The log files, including the client logs and server logs, can be exported for backup. Steps: 1. Set the condition and search the log file. 2. Click Backup Log to open the Backup Log window box. 3. 4. Click the icon , select a local saving path and set a name for the file. Click Backup to export the selected log file for backup. You can click FileOpen Log File to check the information of the backup log files on local PC. 19.4 Exporting Picture Purpose: The alarm pictures, which are stored in the Storage Server, can be exported to the local PC. Steps: 1. Select the alarm pictures. 2. Click Export Picture to open the Export Picture window box. 3. 4. Click the icon , select a local saving path and set a name for the file. Click Export to export the selected pictures. 236 User Manual of iVMS-4200 Client Software Chapter 20 Account Management Purpose: Multiple user accounts can be added to the client software, and you are allowed to assign different permissions for different users if needed. Click the icon on the control panel, or click Tool->Account Management to open the Account Management page. Note: The user account you registered to log into the software is set as the super user. 20.1 Adding User Steps: 1. Open the Account Management page. 2. Click Add User to open the Add User window box. 3. Select the user type from the drop-down list. Two types of user accounts are selectable: Administrator: The administrator account has all permissions by default, and can modify the passwords and permissions of all operators and its own account. Operator: The operator account has no permission by default and you can assign the permissions manually. An operator can only modify the password of its own account. 4. Input the user name, password and confirm password as desired. The software will judge password strength automatically, and we highly recommend you to use a strong password to ensure your data security. 5. Check the checkboxes to assign the permissions for the created user. 6. Optionally, you can select a user in the Copy from drop-down list, to copy the permissions of the selected user. 7. Optionally, you can click Default Permission to restore the default permissions of this user. 8. Click Save to save the settings. A user name cannot contain any of the following characters: / \ : * ? “ < > |. And the length of the password cannot be less than 6 characters. For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product. Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user. Note: Up to 50 user accounts can be added for the client software. 237 User Manual of iVMS-4200 Client Software 20.2 Managing User Purpose: After created successfully, the user account is added to the user list on the Account Management page. You can edit or delete the information of the user accounts. To edit the information of the user, select the user from the list, and click Edit User. To delete the information of the user, select the user from the list, and click Delete User. For super and administrator user, you can click Copy to to copy the permissions to other user(s). Note: The super user cannot be deleted and only the password of the super user can be edited. 238 User Manual of iVMS-4200 Client Software Chapter 21 Statistics Purpose: In Statistics, it provides eight modules for data statistics via the software: Heat Map, People Counting, Counting, Road Traffic, Face Retrieval, License Plate Retrieval, Behavior Analysis, and Face Capture. 21.1 Heat Map Purpose: Heat map is a graphical representation of data represented by colors or the heat map data can be displayed in line chart. The heat map function of the camera usually be used to analyze the visit times and dwell time of customers in a configured area. Before you start: Please add a heat map network camera to the software and properly configure the corresponding area. The added camera should have been configured with heat map rule. Note: The heat map network camera should be added to the software as Encoding Device, refer to Chapter 3.1 Adding Device for detailed configuration. For configuring heat map rule, refer to the User Manual of the heat map network camera. Steps: 1. Open the Heat Map page. 2. Select a heat map camera in the area panel. 3. Select the report type as needed and set the start time. 4. Click Generate Heat Map and the heat map of the camera displays. You can click display the statistics in line chart or picture mode. or to In picture mode, the red color block (255, 0, 0) indicates the most welcome area, and blue color block (0, 0, 255) indicates the less-popular area. 5. (Optional) Click to save the detailed data of heat map to your PC. 239 User Manual of iVMS-4200 Client Software 21.2 People Counting Purpose: You can check the people counting statistics of the added people counting device and the statistics can be displayed in line chart or histogram. The detailed data can be exported for local storage. Before you start: Please add a people counting device to the software and properly configure the corresponding area. The added device should have been configured with people counting rule. Note: The people counting device should be added to the software as Encoding Device, refer to Chapter 3.1 Adding Device for detailed configuration. For configuring people counting rule, refer to the User Manual of the people counting device. Steps: 1. Open the People Counting page. 2. Select the report type as needed and set the time. 1) Select daily report, weekly report, monthly report or annual report as the time type for the report. 2) Select One Camera in Multi-period or One Camera in One Period as the statistics type. One Camera in Multi-period: One camera can be selected for generating the statistics for it of the two time periods. One Camera in One Period: One camera can be selected for generating the statistics for it of one time period. 3) 4) Select Enter, Exit, or Enter and Exit as the data type. Enter: The people entered will be counted. Exit: The people exited will be counted. Enter and Exit: Both people entered and exited will be counted. Set the time period(s). 3. Select the camera for generating the report. 4. Click Search and the statistics displays on the right panel. The detailed data for each hour, day or month will be also displayed. By default, the statistics are shown in histogram form. You can switch it to line chart by clicking the 5. . (Optional) Click to save the detailed data of people counting to your PC. 240 User Manual of iVMS-4200 Client Software 21.3 Counting Purpose: You can check the counting statistics of the added counting device and the statistics can be displayed in line chart or histogram. The detailed data can be exported for local storage. Before you start: Please add a counting device to the software and properly configure the corresponding area. The added device should have been configured with counting settings. Note: The counting device should be added to the software as Encoding Device, refer to Chapter 3.1 Adding Device for detailed configuration. For configuring counting settings, refer to the User Manual of the counting device. Steps: 1. Open the Counting page. 2. Select the report type as needed and set the time. 1) Select daily report, weekly report, monthly report or annual report as the time type for the report. 2) Select One Camera in Multi-period or One Camera in One Period as the statistics type. One Camera in Multi-period: One camera can be selected for generating the statistics for it of the two time periods. One Camera in One Period: One camera can be selected for generating the statistics for it of one time period. 3) Select Enter, Exit, or Enter and Exit as the data type. Enter: The people entered will be counted. Exit: The people exited will be counted. Enter and Exit: Both people entered and exited will be counted. 241 User Manual of iVMS-4200 Client Software 4) Set the time period(s). 3. Select the camera for generating the report. 4. Click Search and the statistics displays on the right panel. The detailed data for each hour, day or month will be also displayed. By default, the statistics are shown in histogram form. You can switch it to line chart by clicking the 5. . (Optional) Click to save the detailed data of counting to your PC. 21.4 Road Traffic Purpose: If you add road traffic monitoring device, the captured pictures of the detected vehicle or license plate can be searched and checked. Three types are available for searching the corresponding pictures. Vehicle Detection: The passed vehicle can be detected and the picture of its license plate can be captured; besides, the vehicle color, vehicle logo and other information can be recognized automatically. Mixed-traffic Detection: The pedestrian, motor vehicle and non-motor vehicle can be detected, and the picture of the object (for pedestrian/non-motor vehicle/motor vehicle without license plate) or license plate (for motor vehicle with license plate) can be searched. Traffic Violations: The captured pictures of the vehicle that violates the traffic rules (such as illegal parking and congestion) can be checked. Before you start: 1. Please add a road traffic monitoring device to the software and properly configure the corresponding area. The added device should have been configured with corresponding settings for capturing pictures. 242 User Manual of iVMS-4200 Client Software 2. For Traffic Violations, the Storage Server should be added to software and you must configure the Storage Server for the device and check the checkbox of Picture Storage and Additional Information Storage. For details, refer to Chapter 5.1.2 Storing on Storage Device. 3. For Vehicle Detection and Mixed-traffic Detection, if no Storage Server is configured, the software will search the related pictures from the storage device of the local device. Note: The road traffic monitoring device should be added to the software as Encoding Device, refer to Chapter 3.1 Adding Device for detailed configuration. For configuring capture settings, refer to the User Manual of the device. Steps: 1. Open the Road Traffic page. 2. Click to select a road traffic monitoring camera in the camera panel. 3. Set the search condition for finding the related pictures. Type: Select the query type and the pictures triggered by the event type can be found. Plate No.: Input the license plate number for searching the pictures. 4. Start Time/End Time: Click to set the start time and end time. Click Search and the found picture items will list. 5. Click to view the captured pictures and the related information. You can check the checkbox of Select Current Picture or Select All and click Download to save the pictures to your PC. 243 User Manual of iVMS-4200 Client Software 6. (Optional) Check the checkbox(es) to select the picture items and click Export Picture to save the pictures to your PC. 21.5 Face Picture Retrieval Purpose: When the connected device (NVR, HDVR, or DeepinMind device) supports face search, you can search the related picture and play the picture related video file. 21.5.1 Searching Face Picture by Uploaded Picture Purpose: You can upload a face picture from local PC and compare the uploaded picture with the device’s captured face pictures. Before you start: Add the device to the software and properly configure the corresponding settings. For detailed settings, refer to the User Manual of the device. Steps: 1. Open the Face Picture Retrieval page. 2. Select a device in the camera panel. Note: This function should be supported by the connected device. 3. Check By Picture and click Select Picture to select a picture for comparison from local PC. Notes: The picture should be smaller than 4 MB. The resolution of the picture should be smaller than 4096*4080. 244 User Manual of iVMS-4200 Client Software Only JPG and JPEG formats are supported. 4. Select a face you want to search by. 5. Set the similarity level. Example: If you set the similarity as 40, the captured pictures have no less than 40% similarity with the uploaded face picture will list. 6. Click files. to set the start time and end time for searching the captured face pictures or video 7. Click Search to start searching. The search results of the pictures are displayed in list by similarity. 8. (Optional) Perform secondary search based on the search result. 1) Move to the searched picture and click . All the faces in this picture will be analyzed and displayed. 2) Select a face you want to do secondary search. 3) Set the similarity and time period. 4) Click Search. The client will search and compare the faces in the captured pictures based on the face picture you selected. 9. You can click on a picture from the list to check the detailed information. You can click to show the large picture, and click to restore. 10. To save the pictures to your PC: 1) Click Export Picture and check the checkboxes to select the pictures to export. You can also click Select All to choose all the searched pictures. 2) Click Export, and select a local saving path for the pictures. 3) Click Back to leave the picture export mode. 11. Click to play the picture’s related video file in the view window on the bottom right. You can click You can click to show the large video, and click to restore. to adjust the play speed of the playback, click 245 to play back the video files User Manual of iVMS-4200 Client Software frame by frame, click to enable the audio, double-click the playback window to maximize the window. 21.5.2 Searching Face Picture by Event Type Purpose: You can search the device’s captured face pictures by filtering different event types. Before you start: Add the device to the software and properly configure the corresponding settings. For detailed settings, refer to the User Manual of the device. Steps: 1. Open the Face Retrieval page. 2. Select a device in the camera panel. Note: This function should be supported by the connected device. 3. Select the event type of the face pictures you want to search. 4. Click files. 5. Click Search to start searching. to set the start time and end time for searching the captured face pictures or video The search results of the pictures are displayed in list. 6. (Optional) Perform secondary search based on the search result. 1) Move to the searched picture and click . All the faces in this picture will be analyzed and displayed. 2) Select a face you want to do secondary search. 3) Set the similarity and time period. 4) Click Search. The client will search and compare the faces in the captured pictures based on the face picture you selected. 246 User Manual of iVMS-4200 Client Software 7. Click on a picture from the list to check the detailed information. You can click 8. to show the large picture, and click to restore. To save the pictures to your PC: 1) Click Export Picture and check the checkboxes to select the pictures to export. You can also click Select All to choose all the searched pictures. 9. 2) Click Export, and select a local saving path for the pictures. 3) Click Back to leave the picture export mode. Click to play the picture’s related video file in the view window on the bottom right. You can click You can click to show the large video, and click to restore. to adjust the play speed of the playback, click frame by frame, click to play back the video files to enable the audio, double-click the playback window to maximize the window. 21.6 License Plate Retrieval Purpose: When the connected device supports license plate search, you can search the related picture and play the picture related video file. Before you start: Please add the device to the software and properly configure the corresponding settings. For detailed settings, refer to the User Manual of the device. Note: The device should be added to the software as Encoding Device, refer to Chapter 3.1 Adding Device for detailed configuration. Steps: 1. Open the License Plate Retrieval page. 2. Click to select a device in the camera panel. Note: This function should be supported by the connected device (NVR or HDVR). 3. Set the corresponding search condition. (Optional) Input the license plate number in the field for search. Click to set the start time and end time for searching the matched license plate pictures. 4. Click Search to start searching. The search results of the pictures are displayed in list. 5. You can click on a picture from the list to check the detailed information. You can click 6. to show the large picture, and click to restore. To save the pictures to your PC: 1) Click Export Picture and check the checkboxes to select the pictures to export. You can also click Select All to choose all the searched pictures. 7. 2) Click Export, and select a local saving path for the pictures. 3) Click Back to leave the picture export mode. You can click to play the picture’s related video file in the view window on the bottom right. You can click to show the large video, and click You can click to restore. to adjust the play speed of the playback, click frame by frame, click to play back the video files to enable the audio, double-click the playback window to maximize the window. 247 User Manual of iVMS-4200 Client Software 21.7 Behavior Analysis Purpose: When the connected device (NVR or HDVR) supports behavior search, you can search the related picture and play the picture related video file. Before you start: Please add the device to the software and properly configure the corresponding settings. For detailed settings, refer to the User Manual of the device. Note: The device should be added to the software as Encoding Device, refer to Chapter 3.1 Adding Device for detailed configuration. Steps: 1. Open the Behavior Analysis page. 2. Select a device in the camera panel. Note: This function should be supported by the connected device (NVR or HDVR). 3. 4. Click to set the start time and end time for searching the matched pictures. Click Search to start searching. The search results of the pictures are displayed in list. 5. You can click on a picture from the list to check the detailed information. You can click 6. to show the large picture, and click to restore. To save the pictures to your PC: 1) Click Export Picture and check the checkboxes to select the pictures to export. You can also click Select All to choose all the searched pictures. 7. 2) Click Export, and select a local saving path for the pictures. 3) Click Back to leave the picture export mode. Click to play the picture’s related video file in the view window on the bottom right. You can click You can click to show the large video, and click to restore. to adjust the play speed of the playback, click frame by frame, click to play back the video files to enable the audio, double-click the playback window to maximize the window. 248 User Manual of iVMS-4200 Client Software 21.8 Captured Face Analysis Purpose: You can check the captured faces statistics of the added face capture device and the statistics can be displayed in table, line chart, pie chart or histogram. The detailed data can be exported for local storage. Before you start: Please add the face capture device to the software and properly configure the corresponding settings. For detailed settings, refer to the User Manual of the device. Note: The face capture device should be added to the software as Encoding Device, refer to Chapter 3.1 Adding Device for detailed configuration. Steps: 1. Open the Face Capture page. 2. Select the report type as needed and set the time. 1) Select daily report, weekly report, monthly report or annual report as the time type for the report. 2) Select Multi-camera in One Period as the statistics type. Multi-camera in One Period: Multiple cameras can be selected for generating the statistics for them of one time period. 3) Select Age, Gender or Number of People as the data type. 4) Set the time period. 3. Select the cameras for generating the report. 4. Click Search and the statistics displays on the right panel. The detailed data for each hour, day or month will be also displayed. For Age and Gender statistics, the statistics are shown in pie chart. For Number of People statistics, the statistics are shown in histogram form by default. You can switch it to line chart by clicking the 5. (Optional) Click . to save the detailed data of captured face pictures to your PC. 21.9 Human Body Retrieval Purpose: For the DeepinMind device, you can search the captured human body pictures by setting search conditions including uploading a picture from local PC and setting personnel features. 21.9.1 Searching Human Body Picture by Uploaded Picture Purpose: You can upload a human body picture from local PC and compare the uploaded picture with the device’s captured human body pictures. Before you start: Add the device to the software and properly configure the corresponding settings. For detailed 249 User Manual of iVMS-4200 Client Software settings, refer to the User Manual of the device. Steps: 1. Open the Human Body Retrieval page. 2. Select a device in the camera panel. Note: This function should be supported by the connected device. 3. Check By Picture and click Select Picture to select a picture for comparison from local PC. All the human bodies in this picture will be analyzed and displayed. Notes: The picture should be smaller than 4 MB. The resolution of the picture should be smaller than 4096*4080. Only JPG and JPEG formats are supported. 4. Select a human body you want to search for. 5. Set the similarity level. Example: If you set the similarity as 40, the captured pictures have no less than 40% similarity with the uploaded face picture will list. 6. Click to set the start time and end time for searching the captured human body pictures or video files. 7. Click Search to start searching. The search results are displayed in list. 8. (Optional) Perform secondary search based on the search result. 1) Move to the searched picture and click . All the human bodies in this picture will be analyzed and displayed. 2) Select a human body you want to do secondary search. 3) Set the similarity and time period. 4) Click Search. The client will search and compare the human bodies in the captured pictures based on the human body picture you selected. 250 User Manual of iVMS-4200 Client Software 9. You can click on a picture from the list to check the detailed information. You can click to show the large picture, and click to restore. 10. To save the pictures to your PC: 1) Click Export Picture and check the checkboxes to select the pictures to export. You can also click Select All to choose all the searched pictures. 2) Click Export, and select a local saving path for the pictures. 3) Click Back to leave the picture export mode. 11. Click to play the picture’s related video file in the view window on the bottom right. You can click You can click to show the large video, and click to restore. to adjust the play speed of the playback, click frame by frame, click to play back the video files to enable the audio, double-click the playback window to maximize the window. 21.9.2 Searching Human Body Picture by Personnel Features Purpose: You can search the device’s captured human body pictures by setting the personnel features as the search conditions, such as age group, gender, clothes, etc. Before you start: Add the device to the software and properly configure the corresponding settings. For detailed settings, refer to the User Manual of the device. Steps: 1. Open the Human Body Retrieval page. 2. Select a device in the camera panel. Note: This function should be supported by the connected device. 3. Check Personnel Features. 4. Set the personnel features such as age group, gender, top’s color, wearing glasses or not, etc. 5. Select the event type of the human body pictures you want to search. 6. Click to set the start time and end time for searching the captured human body pictures or video files. 7. Click Search to start searching. The search results are displayed in list. 251 User Manual of iVMS-4200 Client Software 8. (Optional) Perform secondary search based on the search result. 1) Move to the searched picture and click . All the human bodies in this picture will be analyzed and displayed. 2) Select a human body you want to do secondary search. 3) Set the similarity and time period. 4) Click Search. The client will search and compare the human bodies in the captured pictures based on the human body picture you selected. 9. Click on a picture from the list to check the detailed information. You can click to show the large picture, and click to restore. 10. To save the pictures to your PC: 1) Click Export Picture and check the checkboxes to select the pictures to export. You can also click Select All to choose all the searched pictures. 2) Click Export, and select a local saving path for the pictures. 3) Click Back to leave the picture export mode. 11. Click to play the picture’s related video file in the view window on the bottom right. You can click You can click to show the large video, and click to restore. to adjust the play speed of the playback, click frame by frame, click to play back the video files to enable the audio, double-click the playback window to maximize the window. 21.10 Vehicle Retrieval Purpose: You can search the device’s captured vehicle pictures by setting the vehicle features as the search conditions, such as vehicle brand, color, type, plate number, etc. Before you start: 252 User Manual of iVMS-4200 Client Software Add the device to the software and properly configure the corresponding settings. For detailed settings, refer to the User Manual of the device. Steps: 1. Open the Vehicle Retrieval page. 2. Select a device in the camera panel. Note: This function should be supported by the connected device. 3. Check Vehicle Features. 4. Set the vehicle features such as vehicle brand, color, type, and plate number. 5. Click files. 6. Click Search to start searching. to set the start time and end time for searching the captured vehicle pictures or video The search results are displayed in list. 7. To save the pictures to your PC: 1) Click Export Picture and check the checkboxes to select the pictures to export. You can also click Select All to choose all the searched pictures. 8. 2) Click Export, and select a local saving path for the pictures. 3) Click Back to leave the picture export mode. Click on a picture from the list to check the detailed information. You can click 9. Click to show the large picture, and click to restore. to play the picture’s related video file in the view window on the bottom right. You can click You can click to show the large video, and click to restore. to adjust the play speed of the playback, click frame by frame, click to play back the video files to enable the audio, double-click the playback window to maximize the window. 253 User Manual of iVMS-4200 Client Software Chapter 22 System Configuration Purpose: The general parameters, live view and playback parameters, image parameters, file saving paths, icon of live view and playback toolbar settings, keyboard and joystick shortcuts, alarm sounds, email settings and video intercom parameters can be configured. Click the icon on the control panel, or click Tool->System Configuration to open the System Configuration page. Note: You can click Default Value to restore the defaults of all the system configurations. 22.1 General Settings Purpose: The frequently-used parameters, including the log expired time, network performance, etc., can be set. Steps: 1. Open the System Configuration page and click General tab to enter the General Settings interface. 2. Configure the general parameters. Parameters Descriptions Log Expiry Date The time for keeping the log files, once exceeded, the files will be deleted. Network Performance The current network conditions. It can be set as Normal, Better or Best. Select Maximize or Full Screen as the maximum mode. For selecting Maximum Mode Maximize, the software will be maximized and the taskbar will display. For selecting Full Screen, the software will be displayed in full-screen mode. Enable Auto-login Pop Up Security Prompt When Using Default Password Enable Alarm Triggered Log into the client software automatically. If the default password of the added device has not been changed, the prompt will pop up for notification. Enable the image pop-up when alarms occur. You can also click 254 or User Manual of iVMS-4200 Client Software Pop-up Image to enable/disable the image pop-up in Alarm Event interface. Pop Up Alarm Image for Enable the alarm image popping up when the client is minimized if the Minimized Client When Alarm Triggered Pop-up Image function is enabled. Alarm Triggered Pop-up For enabling the Alarm Triggered Pop-up Image, refer to Chapter 6 Alarm Image Enabled Pop Up Error Message When Email Settings are Empty Management. Set whether the client prompts the error message if the email is not configured. For setting the email, refer to Chapter 22.8 Email Settings. Automatic Time Automatically synchronize the time of the added devices with the time of Synchronization the PC running the client at a specified time point. Enable Keyboard and Joystick Registration Management Server Port Set to enable the keyboard or joystick. After enabled, you can set the shortcuts for the keyboard and joystick. For details, refer to Chapter 22.6 Keyboard and Joystick Shortcuts Settings. EHome port for registration management server. The port No. should be between 2000 to 65535. The default port No. is 7660. Note: Please restart the client to take effect. EHome port for alarm management server. Alarm Management Server Port The port number should be between 2000 to 65535. The default port number is 7300. Note: Restart the client to take effect. The port for device remote configuration via web server. Web Server Port The port number should be between 1 to 65535. The default port number is 80. Note: Restart the client to take effect. 3. Click Save. 22.2 Live View and Playback Settings Purpose: The parameters for live view and playback, including picture format, pre-play duration, etc., can be set. Steps: 1. Open the System Configuration page and click Live View and Playback tab to enter the Live View and Playback Parameter Settings interface. 255 User Manual of iVMS-4200 Client Software 2. Configure the live view and playback parameters. Parameters Picture Format Merge Downloaded Video Files Search Video Files Stored in Pre-play for Enable Screen Toolbar Display Prioritize Playback of Video Files on Storage Server Resume Latest Live View Status After Restart Descriptions Set the file format for the captured pictures during live view or playback. San set the maximum size of merged video file for downloading the video file by date. Set to search the video files stored in the local device, in the Storage Server, or both in the Storage Server and local device for playback. Set the pre-play time for event playback. By default, it is 30s. Show the toolbar on each display window in live view or playback. Play back the video files recorded on the Storage Server preferentially. Otherwise, play back the video files recorded on the local device. Resume the latest live view status after you log into the client again. Disconnect Background In multiple-window division mode, double-click a live video to display it in Videos in Single Live 1-window division mode, and the other live videos will be stopped for View saving the resource. Enable to use the mouse wheel for zoom in or out of the video in PTZ Enable Wheel for Zoom mode, or for zoom in or restoring of the video in digital zoom mode. In this way, you can directly zoom in or out (or restore) the live video by scrolling the mouse. Skip Unconcerned Video during VCA Playback 3. Enable to skip the unconcerned video during VCA playback and the unconcerned video won’t be played during VCA playback. Click Save. 22.3 Image Settings Purpose: The image parameters of the software can be configured, such as view scale, play performance, etc. 256 User Manual of iVMS-4200 Client Software Steps: 1. Open the System Configuration page and click Image tab to enter the Image Settings interface. 2. Configure the image parameters. Parameters View Scale Play Performance Descriptions The view scale of the video in live view or playback. It can be set as Full Screen, 4:3, 16:9 or Original Resolution. The play performance of the live video. It can be set as Shortest Delay, Balanced, or Fluency. Change the video stream (main stream or sub-stream) automatically in live Auto-change Stream Type view according to the window division. When the window division is larger than 9, it will switch to sub-stream automatically. Or it remains main stream. Hardware Decoding Preferred Enable Highlight Display Transaction Information VCA Rule Enable Frame Extracting for High-speed Playback Display Temperature on Captured Picture 3. Set to enable decoding by hardware for live view and playback. Hardware Decoding can provide better decoding performance and lower CPU usage when playing the HD videos during live view or playback. Mark the detected objects with green rectangles in live view and playback. Display the transaction information in the live view. Display the VCA rule in the live view. When play back the video in high-speed (8x speed and above), you can disable this function to make the image of playback more fluent to view the details. For the thermal device, set to display the temperature information on the captured pictures. Click Save. 22.4 File Saving Path Settings Purpose: The video files from manual recording, the captured pictures and the system configuration files are stored on the local PC. The saving paths of these files can be set. Steps: 1. Open the System Configuration page and click File tab to enter the File Saving Path Settings interface. 257 User Manual of iVMS-4200 Client Software 2. 3. Click the icon Click Save. and select a local path for the files. 22.5 Toolbar Settings Purpose: The icons and the order on the toolbar in the live view and playback window can be customized. You can set to display what icons and set the icon order. Steps: 1. Open the System Configuration page and click Toolbar tab to enter the Toolbar Settings interface. 2. Click to select the icon to display on the toolbar. You can drag the icon to set the icon order when displaying on the toolbar. Icons on Live View Toolbar Stop Live View Capture Record PTZ Control Two-way Audio Stop the live view in the display window. Capture the picture in the live view process. The capture picture is stored in the PC. Start manual recording. The video file is stored in the PC. Start PTZ mode for speed dome. Click and drag in the view to perform the PTZ control. Start the two-way audio with the device in live view. 258 User Manual of iVMS-4200 Client Software Digital Zoom Enable the digital zoom function. Click again to disable the function. Instant Playback Switch to the instant playback mode. Remote Configuration Open the remote configuration page of the camera in live view. Icons on Playback Toolbar Capture Record Digital Zoom Download 3. Capture the picture in the live view process. The capture picture is stored in the PC. Start manual recording. The video file is stored in the PC. Enable the digital zoom function. Click again to disable the function. Download the video files of the camera and the video files are stored in the PC. You can select to download by file or by date. Click Save. 22.6 Keyboard and Joystick Shortcuts Settings Purpose: The keyboard can be connected to the client and be used to control the PTZ cameras. You can set the shortcuts for keyboard and joystick to get quick and convenient access to the commonly used actions. Note: This configuration page will display after enabling keyboard and joystick in General Settings. For details, refer to Chapter 22.1 General Settings. Steps: 1. Open the System Configuration page and click Keyboard and Joystick tab to enter the Keyboard and Joystick Shortcut Settings interface. 2. For keyboard: Select the COM port from the drop-down list if the keyboard is connected to the 259 User Manual of iVMS-4200 Client Software PC installed with the client. 3. For keyboard and joystick: 1) Select a certain function from the list. 2) Double-click the item field under the PC Keyboard, USB Joystick or USB Keyboard column. 3) Select the compound keys operation or number from the drop-down list to set it as the shortcuts for the function of the keyboard or USB joystick. 4. Click Save. 22.7 Alarm Sound Settings Purpose: When the alarm, such as motion detection alarm, video exception alarm, etc., is triggered, the client can be set to give an audible warning and the sound of the audible warning can be configured. Steps: 1. Open the System Configuration page and click Alarm Sound tab to enter the Alarm Sound Settings interface. 2. There are six pre-defined alarm sound type in the list. You can click the icon audio files from the local path for different alarms. 3. You can also click Add button to add customized alarm sound. and select the Double click the Type field to customize the alarm sound name as desired. Click the icon and select the audio files from the local path for different alarms. 4. 5. Optionally, you can click the icon for a testing of the audio file. You can select the added custom alarm sound and click Delete to delete it. 6. Click Save. Note: The format of the audio file can only be *wav. 22.8 Email Settings Purpose: An email notification can be sent when a system alarm occurs. To send the email to some specified receivers, the settings of the email need to be configured before proceeding. 260 User Manual of iVMS-4200 Client Software Steps: 1. Open the System Configuration page and click Email tab to enter the Email Settings interface. 2. Input the required information. Server Authentication (Optional): If your email server requires authentication, check this checkbox to use authentication to log into the server and enter the login user name and password of your email account. SMTP Server: Input the SMTP Server address. Encryption Type: You can check the radio to select Non-Encrypted, SSL, or STARTTLS. Port: Input the communication port of email service. The port is 25 by default. User Name: Input the user name of the sender email address if Server Authentication is checked. Password: Input the password of the sender Email address if Server Authentication is checked. Sender Address: Input the email address of the sender. Receiver 1 to 3: Input the email address of the receiver. Up to 3 receivers can be set. 3. Optionally, you can check the checkbox Enable SSL to increase the security of email sending. 4. Optionally, you can click Send Test Email to send an email to the receiver for test. 5. Click Save. 22.9 Video Intercom Settings Purpose: You can configure the video intercom parameters accordingly. Steps: 1. Open the System Configuration page and click the Video Intercom tab to enter the Video Intercom Settings interface. 261 User Manual of iVMS-4200 Client Software 2. Input the required information. Ringtone: Click the icon and select the audio file from the local path for the ringtone of indoor station. Optionally, you can click the icon for a testing of the audio file. Max. Ring Duration: Input the maximum duration of the ringtone. Max. Speaking Duration with Indoor Station: Input the maximum duration of speaking with the indoor station. Max. Speaking Duration with Door Station: Input the maximum duration of speaking with the door station. 3. Click Save. 22.10 Access Control Settings Purpose: You can set the time so that the system will get the access control events which are not uploaded to the client from the access control device and save them to the client’s database. For Example: If the device is armed by another client B, the triggered events cannot be uploaded to the current client A during the arming period. When the client A arms the device again, you can synchronize these events from device to client A via this function. Steps: 1. Open the System Configuration page and click Access Control tab to enter the Access Control Settings interface. 2. Check the Auto-synchronize Access Control Event checkbox to enable this function and set the time for synchronization. 3. Click Save. 22.11 Security Certificate Purpose: For the data security purpose, the security certificate of clients and added servers (stream media server) should be same. 262 User Manual of iVMS-4200 Client Software As a result, before adding the stream media server to the client, you should export the service certificate stored in the client, and import it to the stream media server. If multiple clients use the same server, you should make the security certificates of the clients and the server same with each other. 22.11.1 Exporting Certificate from Client Purpose: You can export the security certificate from the current client and import the exported certificate file to the server or other clients. Steps: 1. Open the System Configuration page and click Security Certificate tab to enter the security certificate interface. 2. Click Export. 3. Save the certificate file in the local PC. Note: The certificate file is in XML format. 4. Click Save. After exporting the certificate, you can copy the certificate to the PC installed with the service and import it to the stream media server, or to other clients. For importing to the stream media server Chapter 10.1 Importing Certificate to Stream Media Server. 22.11.2 Import Certificate to Client Purpose: If there are multiple clients accessing the same server, you are required to import the same certificate to the clients and server. Before you start: You should export the security certificate from one of the client. For details, refer to Chapter 22.11.1 Exporting Certificate from Client. Steps: 1. Copy the certificate file exported from other client to the local PC. 2. Open the System Configuration page and click Security Certificate tab to enter the security certificate interface. 3. Click Import. 4. Select the certificate file from your local PC. 5. Click Save. Note: You should restart the system to take effect. 263 User Manual of iVMS-4200 Client Software Appendix: Custom Wiegand Rule Descriptions Take Wiegand 44 as an example, the setting values in the Custom Wiegand tab are as follows: Custom Wiegand Name: Wiegand 44 Total Length 44 Transformation Rule (Decimal Digit) byFormatRule[4]=[1][4][0][0] Parity Mode XOR Parity Odd Parity Start Bit Length Even Parity Start Bit Length XOR Parity Start Bit 0 Length per Group 4 Card ID Start Bit 0 Length 32 Total Length Decimal Digit Site Code Start Bit Length Decimal Digit OEM Start Bit Length Decimal Digit Manufacturer Code Start Bit 32 Length 8 40 Decimal Digit 10 3 Wiegand Data = Valid Data + Parity Data Total Length: Wiegand data length. Transportation Rule: 4 bytes. Display the combination types of valid data. The example displays the combination of Card ID and Manufacturer Code. The valid data can be single rule, or combination of multiple rules. Parity Mode: Valid parity for wiegand data. You can select either odd parity or even parity. Odd Parity Start Bit, and Length: If you select Odd Parity, these items are available. If the odd parity start bit is 1, and the length is 12, then the system will start odd parity calculation from bit 1. It will calculate 12 bits. The result will be in bit 0. (Bit 0 is the first bit.) Even Parity Start Bit, and Length: If you select Even Parity, these items are available. If the even parity start bit is 12, and the length is 12, then the system will start even parity calculation from bit 12. It will calculate 12 bits. The result will be in the last bit. XOR Parity Start Bit, Length per Group, and Total Length: If you select XOR Parity, these items are available. Depending on the table displayed above, the start bit is 0, the length per group is 4, and the total length is 40. It means that the system will calculate from bit 0, calculate every 4 bit, and calculate 40 bits in total (10 groups in total). The result will be in the last 4 bits. (The result length is the same as the length per group.) Card ID Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are available. Depending on the table displayed above, the card ID start bit is 0, the length is 32, and the decimal digit is 10. It represents that from bit 0, there are 32 bits represent the card ID. (The length here is calculated by bit.) And the decimal digit length is 10 bits. Site Code Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are available. For detailed information, see the explanation of the card ID. 264 User Manual of iVMS-4200 Client Software OEM Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are available. For detailed information, see the explanation of the card ID. Manufacturer Code Start Bit, Length, and Decimal Digit: If you use the transformation rule, these items are available. Depending on the table displayed above, the manufacturer code start bit is 32, length is 8, and decimal digit is 3. It represents that from bit 32, there are 8 bits are manufacturer code. (The length here is calculated by bit.) And the decimal length is 3. 265 User Manual of iVMS-4200 Client Software Troubleshooting Live View Problem: Failed to get the live view of a certain device. Possible Reasons: Unstable network or the network performance is not good enough. The device is offline. Too many accesses to the remote device cause the load of the device too high. The current user has no permission for live view. The version of the client software is below the needed version. Solutions: Check network status and disable other not in use process on your PC. Check the device network status. Restart the device or disable other remote access to the device. Log in with the admin user and try again. Download the client software of the latest version. Recording Problem: Local recording and remote recording are confused. Solutions: The local recording in this manual refers to the recording which stores the video files on the HDDs, SD/SDHC cards of the local device. The remote recording refers to the recording action commanded by the client on the remote device side. Playback Problem: Failed to download the video files or the downloading speed is too slow. Possible Reasons: Unstable network or the network performance is not good enough. The NIC type is not compatible. Too many accesses to the remote device The current user has no permission for playback. The version of the client software is below the needed version. Solutions: Check network status and disable other not in use process on your PC. Directly connect the PC running the client to device to check the compatibility of the NIC card. Restart the device or disable other remote access to the device. Log in with the admin user and try again. Download the client software of the latest version. 266 User Manual of iVMS-4200 Client Software FAQ Q: During live view, an error message prompts and the error code is 91. A: For live of multiple window, the channel may not support sub stream. Please disable the function of Auto-change Stream Type in System Configuration -> Image, and select the appropriate steam type for live view. Q: During live view, the image is blurred or influent. A: Please check the driver of video card. We highly recommend you update the driver of video card to the latest version. Q: Memory leak and the client crashed after running for a while. A: In the installation directory of the client software, open the Setup.xml file with Notepad and modify the value of EnableNetandJoystickCheck to false. Restart the client, and if the problem is still not solved, contact our technique support. Q: During live view, when getting stream via the Stream Media Server, an error message prompts and the error code is 17. A: Please check the port mapping of Stream Media Server, especially RTSP port. 267 User Manual of iVMS-4200 Client Software Error Code Code Error Name Description iVMS-4200 317 It will be prompted when the user has no permission No videos. to play back. HCNetSDK.dll 1 Invalid user name or password 2 No permission. 4 Invalid channel number. 5 No more devices can be connected. 7 Failed to connect the device. 23 Do not support. 29 Operating failed. 43 No buffer. 55 Invalid IP address. 56 Invalid MAC address. 91 96 It will be prompted when adding a device and the device port is occupied by a web server. operation. stream. The device is not registered on the DDNS. 250 The device is not activated. 800 control. It will be prompted when failed to get the sub The user is locked. 424 It will be prompted in the live view of remote screen The channel does not support the 153 404 The user in the device has no enough permission. Channel No. error or the device does It will be prompted when failed to get the sub not support the sub stream. stream or the sub stream does not exist. Failed to receive the data for RTSP It will be prompted when adding the live view for the SETUP. software DVS via external network. No more bandwidth can be used. Playctrl.dll 2 6 The stream is not a Video & Audio stream. The playback window turns black when adopting H.265 in the 64-bit operating system. SMS 3 17 The connection problem between the software and the stream media server. The streaming problem between the stream media server and the device. 0207001071125 268 UD08250B
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
advertisement