Manual VC9101 EN
Manual VC9101 EN
User Manual
Introduction 2
Revision History
Doc. Ver. Rel. date F/W Ver. Comment
r1.11_250509 2025/05/09 2.2402.34.01j_101 and above Release for new Camera WebUI.
Revision History 3
Read Before Use
The use of surveillance devices may be restricted by law in your country or region. The Network Camera
is not only a high-performance web-ready camera but also a part of a flexible surveillance system. Before
installing this device for its intended use, it is the user’s responsibility to ensure that its operation complies
with local laws and regulations.
Before installing the Network Camera, ensure that all contents are complete by referring to the Package
Contents list in the Quick Installation Guide (QIG) included in the packaging. It is also essential to read the
warnings provided in the guide and follow the instructions regarding installation details to avoid damage
caused by improper assembly or installation. Doing so ensures that the device operates as intended.
The network camera features an intuitive design, making it simple and easy to operate for users with ba-
sic networking knowledge. Its settings interface is categorized by functions such as Image, Video & Audio,
Detection, Recording, and System. The camera supports various applications, including security surveil-
lance and video monitoring. Through the available configuration options, users can customize the camera’s
performance, optimize its features, and ensure proper operation. For advanced users and developers, the
structured menu system and App settings provide flexibility for integrating the camera into existing systems
or enhancing specific functionalities.
CAUTION:
Risk of fire or explosion if the battery is replaced by an incorrect type.
6
Topic of Content
Get started
• Using Device Manager to Locate and Identify Cameras on the LAN
Installation
• Using the Video Stream Toolbar
Image
• Enhancing Image Quality with VIVOTEK Camera Settings
Image
Exposure
Topic of Content 7
Topic of Content
Video & Audio
• Optimizing Surveillance Efficiency with Flexible Video Settings
Mode
Stream
PTZ Settings
• Effortlessly Manage and Customize PTZ Settings for Precise Camera Control
Home
Preference
App
• Expand Camera Functionality with Powerful Applications
Event action through HTTP/HTTPS
Trend Micro IoT Security
Face Check
Detection
• Motion Detection: Motion-Based Event Triggering and Face Presence Detection
• Audio Detection: Enhancing Security with Real-Time Audio Anomaly Detection for
Prompt Response
Topic of Content 8
Topic of Content
Event
• Event: Enhancing Security with Automated and Customizable Event
• Camera link: Enhance Multi-Camera Coordination and Eliminate Blind Spots with
Camera Link
• Event server & media: Effortless Event Management and Enhanced Security with Event
Server & Media
Recording
• Recording: Maximize Surveillance and Storage with Tailored Recording Settings
System
• Device: Centralized Management for System Monitoring and Camera Configuration
• Configure and Secure Your Camera’s Network Connection for Seamless Communication
Network Settings
Protocol
Service
Security
• Manage User Access and Permissions for Enhanced Security and Control
User
Privilege
Account block
• Storage: Optimized Storage Solutions for Reliable Video Recording and Data Retention
• Theme settings: Customizing Interface Appearance and Branding with Theme Settings
Step 1.
Download and install the Device Manager application from VIVOTEK’s official website.
(https://www.vivotek.com/products/software/device_manager)
Step 2.
Run and log in to the Device Manager application.
Step 3.
On the Camera tab, click Add Device to let Device Manager detect cameras on the LAN.
Step 4.
Select the camera to operate based on its MAC address, then click Add.
Note:
Here, users can also note the camera’s IP address and directly enter it in a browser to access the Camera web UI.
Get started 10
Get started
Step 5.
Double-click the camera item you wish to operate, and the Camera web UI will open in the browser.
Get started 11
Get started
Using Shepherd to Locate and Identify Cameras on the LAN
The Shepherd utility is an installation and management tool that helps facilitate the configuration of multiple
cameras. The tool can be used to automatically search the network for cameras, assign IP addresses, display
connectivity, manage firmware/software upgrades, and collectively configure multiple cameras.
Here, users can use Device Manager to locate the IP address of the camera they wish to operate within their
local network.
Step 1. Download and extract the Shepherd application from VIVOTEK’s official website.
(https://www.vivotek.com/products/software/shepherd)
Step 4. Select and double-click the camera to operate based on its MAC address, and the Camera web UI
will open in the browser.
Note:
Here, users can also note the camera’s IP address and directly enter it in a browser to access the Camera web UI.
Get started 12
Get started
Using the Camera Web UI for First-Time Access
Step 1. Enter the new password for the root account in the “Password” field to be used as the root login
password from now on.
Note:
At this point, users can click the edit icon to configure the password policy for all users when setting passwords in the Camera web
UI.
Step 2. Re-enter the new password in the “Confirm Password” field for confirmation.
Step 3. Confirm whether the “Block account when consecutive login failures are detected” mechanism is
enabled.
Note:
By default, if the password is entered incorrectly five consecutive times within 20 seconds, the account will be blocked for 300 sec-
onds. User can customize the detailed settings from System > User Accounts > Account block later.
Get started 13
Get started
Step 5. Please carefully read the Trend Micro End User License Agreement and click Agree button.
Step 1. Use root account and password to log in when accessing the Camera web UI for the first time.
Get started 14
Get started
Step 2. After accessing the Camera web UI, please carefully read the System Use Notification message
and agree to its content before proceeding with the configuration and operation of the camera through
the Camera web UI.
The notification appears when a user logs into the VIVOTEK Camera WebUI with active Video Streaming,
specifically to prevent unintended audio playback without consent.
Get started 15
Get started
If the user takes no action, the notification will automatically disappear after 20 seconds; however, if the
user clicks the Volume button (icon) to enable audio, the notification will disappear immediately.
Note:
If multiple notifications appear simultaneously (e.g., success or failure messages), these additional notifications will be displayed
below the primary message without overriding or covering this security notification.
Logo
By clicking the VIVOTEK logo, users can quickly access the VIVOTEK official website for more product infor-
mation. Users can also customize the logo and link displayed in System > Theme > Logo.
Host name
The Camera web UI displays the model name as the default host name. Users can go to System > Device >
Information to modify the name to something more identifiable.
Account information
Users can view the current login account information and the associated role permissions here. They can
also adjust the system language to their preference at any time.
Get started 16
Get started
The navigation bar
Functions and settings within the Camera web UI are centrally categorized to help users quickly locate the
desired configuration items.
Installation
The Installation section helps users set up and fine-tune the camera by providing options for positioning,
focus, and initial configuration to ensure proper alignment and operation.
Image
The Image section allows users to adjust image quality and appearance, including settings for brightness,
contrast, saturation, sharpness, exposure, white balance, and orientation to ensure optimal video output.
PTZ Settings
The PTZ Settings section allows users to manage pan, tilt, and zoom functions by configuring movement
speed, preset positions, and patrol patterns for precise and smooth camera control.
App
The App section allows users to manage VIVOTEK-specific applications or plugins, using these applications
to expand the camera’s functionality.
Detection
The Detection section leverages AI-powered algorithms provide comprehensive monitoring capabilities,
including Smart VCA features like line crossing, intrusion, as well as Motion Detection, Audio Detection,
Shock Detection, and Tampering Detection. Users can configure detection zones, sensitivity, and event
triggers to ensure accurate, intelligent monitoring and enhanced security for various scenarios.
Get started 17
Get started
Event
The Event section allows users to define event triggers and conditions, configuring actions such as send-
ing notifications, recording video, or activating alarms to respond effectively to specific events.
Recording
The Recording section allows users to configure recording modes, such as continuous, event-based, or
scheduled recording, and set storage locations like SD cards or network storage to manage video footage
efficiently.
System
The System section provides tools for managing device settings, network configurations, user accounts,
maintenance tasks, storage options, logs, and interface customization to ensure optimal performance,
security, and usability of the camera.
Get started 18
Installation
This category serves as the first screen upon entering the Camera Web UI. Its primary purpose is to assist
users in quickly and conveniently setting up the desired monitoring view under the Installation category
after installing the camera.
Installation 19
Installation
• Client Fisheye
Displays the full 360° fisheye image in its original circular format, useful for recording raw footage.
• Client Panoramic
Converts the image into a 180° wide-angle view, ideal for wall-mounted installations, covering hallways,
storefronts, and open spaces.
• Client Regional
Extracts specific regions from the fisheye image and presents them in a standard viewing format, useful
for focused monitoring areas like entrances or cashier desks.
Volume adjustment
Users can adjust the volume of the video streaming according to their needs.
Snapshot button
Users can capture images from video streaming at any time.
Installation 20
Installation
Efficiently Adjust Camera Settings via the Installation Panel
The Installation panel provides commonly used and essential information, along with quickly adjustable
settings, to help users complete the camera installation and setup more efficiently and conveniently. Addi-
tionally, the adjusted settings are instantly reflected on the video streaming display.
Control panel
Essential settings and functions required during the camera installation process are integrated into the Con-
trol Panel to ensure that users can view the desired display effects while installing the camera.
Device:
Installation 21
Installation
The Device card serves as a quick reference for critical device information, helping users ensure the cam-
era’s identity, time zone, and system time are correctly configured for seamless operation and event
tracking. Additionally, clicking “View More” will navigate to System > Device > Information for further ad-
justments.
Video orientation
The camera may be installed on a vertical, side-facing, or tilted surface to accommodate the interior or
exterior design of a building. The interior of a building may be shaped as a narrow rectangular space, such
as a corridor. A conventional HD image, such as one with a 16:9 aspect ratio, may be incongruous due to
its wide horizontal view. With video rotation, the camera can more effectively cover the field of view in a
tall and narrow scene.
Installation 22
Installation
Mount type
Defines the physical installation position of the camera to ensure that the image correction and dewarping
(distortion correction) align with the actual mounting environment.
Best for 360° panoramic views, with the camera capturing the scene
Ceiling
from above.
Video mode
Refers to the image processing modes used by IP cameras during video recording and transmission. These
modes are adjusted based on monitoring environments, network bandwidth, storage requirements, and
application scenarios to enhance image clarity and smoothness, achieving optimal performance and effi-
ciency under various network conditions.
Enable mute
Provides the option to enable or disable audio recording, where toggling it on mutes the camera audio to
prevent any audio capture.
The Power line frequency setting ensures stable video quality by allowing users to align the camera’s
frequency with the local power grid, effectively preventing flicker in areas with fluorescent or artificial
lighting; selecting the correct frequency, such as 60 Hz for North America or 50 Hz for many European and
Asian countries, helps eliminate video flicker caused by power line interference.
Installation 23
Installation
Manual trigger:
Allows users to manually enable event triggers by clicking the on/off button on the Installation panel. Be-
fore using this function, please add events associated with Manual Trigger 01 to 03 in the Event category.
Installation 24
Installation
Pixel calculator:
Click the “Add” button to create a pixel calculator window. Move your cursor over the window to position it
in the area of interest, and adjust the window size to fit the area. Once the window is configured, the pixel
count on its edges will be displayed, assisting you in assessing whether the current configuration meets
the requirements.
Using this visual tool, you can estimate the coverage area, the distance to the target, and place a ruler or
an object of known size. Then, you can draw a calculator frame to cover the subject of interest. The calcu-
lated values will be listed at the bottom of the screen, helping you determine whether the current settings
meet the pixel count requirements.
Installation 25
Installation
PTZ panel
The PTZ panel provides users with a convenient way to adjust the monitored image position by operating
the pan, tilt, and zoom functions, and quickly switch between preset positions to monitor key areas; how-
ever, the PTZ function is only supported on the 2nd and 3rd media profiles, and users need to select a sup-
ported stream for it to work.
PTZ control:
Joystick
Users can move the monitored area’s image by operating the joystick, adjusting the view to the desired
monitoring area. Additionally, pressing the Home button will restore the view to the preset Home posi-
tion. Users can set the position represented by Home in PTZ Settings > Home & Preset.
Zoom
Users can use the Zoom button to freely zoom in or out on the current monitoring screen to an appropri-
ate size.
Installation 26
Image
Optimizing Image Quality with VIVOTEK Camera Settings
The General Settings for images are typically used to adjust and optimize the parameters of cameras or im-
aging systems to ensure that the generated images meet the required specifications. These settings can be
divided into four main categories: General, Illuminators, Image, and Exposure. Below is a brief introduction
to each category.
Image
The IPv4 card plays a vital role in setting up the camera’s network configuration and ensuring effective com-
munication. It facilitates dependable connectivity, enables both local and remote access, and allows the
camera to integrate effortlessly into IPv4-based networks. This configuration is crucial for maintaining stable
and efficient performance across diverse networking environments.
White balance
The White Balance setting is crucial for ensuring that colors in the captured video appear natural under
different lighting conditions.
In this mode, the camera automatically adjusts the white balance based
on the lighting conditions.
It is suitable for environments with changing light sources, such as out-
Default
door areas where sunlight and shade vary throughout the day.
The camera continuously evaluates the scene and dynamically adapts to
ensure accurate color representation.
This mode locks the white balance to the current automatic setting at the
moment it is activated.
It is useful in environments with consistent lighting, where maintaining a
Fixed current
stable white balance is more important than adapting to changes.
For example, this mode is ideal for spaces with fixed artificial lighting,
such as offices or warehouses.
Image 27
Image
This mode allows users to manually set the white balance by adjusting
specific parameters like RGain(red) and BGain(blue) levels.
It offers the most control and is ideal for scenarios with specialized light-
Manual ing, such as theatrical productions, where precise color adjustments are
required.
Users can customize the settings to suit their specific needs and ensure
color accuracy in unique lighting conditions.
By selecting the appropriate white balance mode, users can optimize the performance of their VIVOTEK
cameras for a variety of environments and use cases.
Image adjustment
Image 28
Image
Image Adjustment are essential for fine-tuning the visual quality of the captured images. These adjustments
allow users to customize the appearance of the footage to meet their specific needs or adapt to different
environmental conditions.
Sharpness determines how clearly the details and edges of objects are
defined in the image. Higher sharpness enhances the clarity of edges, but
excessive sharpness can cause unnatural outlines or noise.
Sharpness
Modify sharpness to emphasize details without introducing artifacts,
particularly in scenes requiring precise identification, like license plates
or facial features.
The gamma curve defines the tonal response of the camera, affecting
how brightness levels are distributed. Adjusting gamma alters the mid-
tones of the image without significantly affecting the darkest or brightest
areas.
Gamma Curve
Use gamma correction to optimize image brightness and contrast for
better visual representation under challenging lighting conditions.
*This option is disabled when the WDR feature is enabled.
Image 29
Image
Defog
Defog is designed to enhance image clarity in foggy, hazy, or smoggy conditions. It works by adjusting the
image’s contrast and visibility to reduce the effects of atmospheric conditions that obscure details. This
feature is particularly useful in outdoor surveillance environments, ensuring better object recognition and
scene visibility despite challenging weather conditions.
Highlight mask
Highlight Mask in VIVOTEK cameras is a feature that detects and marks overexposed areas in the image.
It helps users identify regions where excessive brightness may cause detail loss, ensuring better image
clarity. By visually highlighting these areas, users can adjust exposure settings such as shutter speed, gain,
or iris control to optimize image quality. This feature is especially useful in high-contrast environments like
outdoor surveillance, parking lots, or entrances, preventing overexposure and preserving critical details in
the monitored scene.
3D noise reduction
3D noise reduction is primarily used in low-light environments to reduce noise and flicker in the image.
You can use the slider to adjust the noise reduction strength. Please note that enabling this feature on the
video channel will consume system computing resources. However, when this feature is enabled under
low-light conditions with fast-moving objects, afterimage trails may occur. In such cases, you may choose
to lower the strength.
Image 30
Image
Integrate image-related settings into a profile
The normal mode in VIVOTEK cameras provides a baseline image configuration ideal for standard moni-
toring. Through profile mode, specifically Night and Schedule, users can customize and automate image
settings based on specific requirements and time periods. This is not limited to day-night transitions,
offering greater flexibility and control.
Optimizes image settings for low- Enhances clarity and detail, ideal for
Night (Profile)
light or nighttime conditions night surveillance
Image 31
Image
Exposure
The Image page in the Camera web UI control how much light the camera’s sensor receives to create a
well-balanced image. Proper exposure ensures that the image is neither too bright (overexposed) nor too
dark (underexposed), allowing for clear visibility of objects in various lighting conditions.
Exposure window
Exposure Window is a feature that allows users to define a specific area within the camera’s field of view
to optimize exposure settings. By focusing on this designated area, the camera can adjust its exposure pa-
rameters to ensure that the area is properly illuminated, even in challenging lighting conditions. This fea-
ture is particularly useful in scenarios where different areas of the scene have uneven light levels, enabling
the camera to prioritize exposure for critical regions and enhance overall image quality.
Measurement window
This function allows users to set measurement window(s) for low-light compensation. For example, when
low-light objects are positioned against an extremely bright background, user may want to exclude the
bright sunlight shining through a building’s corridor. The types of measurement windows are as follows:
This option calculates the exposure based on the entire field of view, en-
Full view suring that the camera considers all areas within the frame for exposure
adjustments.
This option allows users to manually define specific regions within the
frame for exposure measurement. By selecting this setting, users can
Custom draw one or more measurement windows on the image, enabling precise
control over which areas the camera should prioritize for exposure ad-
justments.
When selected, the camera focuses on the central portion of the image
to determine exposure settings. This is beneficial when the main subject
Center
is located in the center of the frame, allowing for optimal exposure in
that area.
Image 32
Image
When users select the Custom mode to use the measurement window, they can define the inclusive win-
dow and exclusive window by themselves.
When an exclusive window overlaps with a larger inclusive window, the exclusive portion is deducted from
the inclusive window. This ensures that only the remaining portion of the inclusive window contributes
to the calculation. After adjusting for the overlaps between inclusive and exclusive windows, the system
calculates the exposure value based on the remaining portion of the inclusive window using the weighted
averages method.
Metering Mode
Metering Mode determine how the camera adjusts its exposure settings in response to different lighting
conditions:
Image 33
Image
These settings help optimize the camera’s performance for various lighting conditions, ensuring that criti-
cal details are captured effectively.
Image 34
Image
Exposure control
Exposure Control is designed to manage how light interacts with the camera sensor to produce clear,
well-balanced images under varying lighting conditions. The primary purpose of exposure control is to
adjust the camera’s settings to ensure optimal image brightness, clarity, and detail, regardless of the envi-
ronment.
Exposure level
The adjustment range of the Exposure Level is typically from -2.0 to +2.0, used to fine-tune the brightness
of an image. This setting is designed to enhance or reduce the exposure of the image based on ambient
lighting conditions, ensuring the image remains clear and retains complete details.
Flickerless
When the Flickerless is enabled, the camera automatically adjusts its shutter speed to synchronize with
the flicker frequency of ambient light sources, such as fluorescent or LED lights. This effectively eliminates
flickering stripes or flicker effects in the image, ensuring its stability and clarity.
Exposure mode
Exposure mode is used to control how the camera adjusts image exposure parameters (such as Expo-
sure time and Gain Control) to adapt to different ambient lighting conditions. Once the Exposure mode is
enabled and configured, it helps the camera automatically or manually adjust the exposure according to
scene requirements, ensuring that the image brightness and details meet the desired standards.
Exposure time
Exposure Time refers to the duration for which the camera’s sensor is exposed to light, typically expressed
in seconds or fractions of a second (e.g., 1/120 second to 1/5 second). The primary purpose of this feature
is to control the brightness and clarity of the image, especially under varying lighting conditions.
Gain control
Gain Control is used to adjust the sensitivity of the camera’s sensor to light. Gain settings are primarily
used to enhance image brightness in low-light environments, though they may increase image noise. This
feature helps the camera produce clear and visible images in low-light or high-contrast scenes.
Image 35
Image
Image unblur
Image Unblur is a feature designed specifically for dynamic scenes, effectively reducing motion-induced
image blur to ensure clear images of fast-moving objects. By adjusting shutter speed and other exposure
parameters, this feature is ideal for scenarios requiring high-resolution dynamic recording, such as traffic
monitoring or crowd surveillance. However, reasonable adjustments between brightness and image quali-
ty are necessary to achieve optimal results.
AE speed adjustment
AE Speed Adjustment controls the response speed of auto exposure to changes in lighting, balancing the
immediacy and stability of the image. Its purpose is to provide optimal image quality in different scenari-
os, avoiding exposure instability or image flickering caused by lighting variations. By flexibly adjusting the
AE Speed, diverse surveillance needs can be met, ensuring clear and stable images.
Image 36
Image
Speed level
The speed level of AE Speed Adjustment should be configured based on the frequency of lighting changes
in the surveillance scene. A slower speed is recommended for stable scenes, while a faster speed is suit-
able for dynamic scenes, ensuring that brightness adjustments are both smooth and responsive. Through
testing and fine-tuning, an optimal balance between image stability and clarity can be achieved.
Sensitivity
Adjusting the sensitivity in AE Speed Adjustment controls the camera’s ability to perceive changes in light-
ing. Low sensitivity is suitable for stable scenes, ensuring a steady image, while high sensitivity is ideal for
rapidly changing scenes, providing real-time response. By testing and tailoring the sensitivity to the specif-
ic scene requirements, the optimal balance between light adaptability and image stability can be achieved.
WDR
The WDR (Wide Dynamic Range) feature is primarily used to enhance image quality in high-contrast light-
ing scenarios, balancing the brightness of light and dark areas, preserving details, and ensuring clear vis-
ibility. This feature is crucial for scenarios requiring precise monitoring under diverse lighting conditions,
such as entrances, tunnels, banks, or nighttime surveillance.
WDR Pro
WDR Pro is an advanced wide dynamic range feature provided by VIVOTEK cameras, offering exceptional
image processing capabilities for high-contrast lighting scenarios. It effectively balances details and colors
in both bright and dark areas, ensuring overall image quality, making it an ideal choice for scenarios de-
manding high standards in image detail and lighting management.
Image 37
Image
WDR enhanced
WDR enhanced is VIVOTEK’s most advanced dynamic range technology for high-contrast scenes, offering
superior detail restoration in bright and dark areas compared to standard WDR and WDR Pro. It is suitable
for scenarios with extreme light contrasts and rapid changes, significantly enhancing image clarity and
stability, making it particularly ideal for surveillance applications requiring high detail fidelity.
The Exposure settings in VIVOTEK cameras can be finely tuned using the Profile function, allowing auto-
mated adjustments based on time (Schedule) or lighting conditions (Night/Normal). This ensures the cam-
era consistently delivers optimal image quality across varying lighting environments.
Image 38
Image
Using Privacy Masking to Safeguard Confidential Information in
Images
The primary purpose of setting up a Privacy Mask is to protect privacy, comply with regulatory require-
ments, and enhance surveillance efficiency. By flexibly applying the privacy masking feature in various sce-
narios, it not only prevents unnecessary privacy violations but also allows a focus on key surveillance areas,
improving overall monitoring effectiveness and compliance.
Image 39
Image
Privacy mask settings
Image 40
Image
Step to edit the privacy mask:
Step 1. Click edit icon on the mask item.
Step 2. Drag the mask to the desired Area.
Step 3. Click and drag the corners to adjust the shape (rectangular, trapezoidal, etc.) and size to precisely
cover the target area
Step 4. Click Save button.
Mask type
Privacy mask offers two types, Color (color masking) and Mosaic (mosaic masking), to meet privacy pro-
tection needs in various scenarios. Color Mask is suitable for cases requiring a high level of privacy and
complete concealment, while Mosaic Mask is better for scenarios that need to hide details while maintain-
ing the overall natural appearance of the image. Choosing the appropriate mask type based on specific
situations ensures efficient and flexible privacy protection.
Image 41
Image
Customizing Image Overlays to Add Additional Information
The Overlays feature is a powerful tool that enhances the usability and clarity of video streams or recordings
by allowing key information to be superimposed on the video feed.
Image 42
Image
Overlay
The Overlay allows users to add information to images, such as camera names and timestamps. This infor-
mation is directly displayed on recorded or live-streamed footage, facilitating future review and manage-
ment. For instance, by enabling the overlay function, you can display the camera’s name and the recording
time on the footage, which is highly beneficial for surveillance system management and event tracing.
Font settings
The Font Settings in the Overlay settings allow users to customize the appearance of text overlays on video
feeds. This feature ensures that the displayed information is clear, visible, and matches the specific require-
ments of different monitoring environments.
Overlays
Image 43
Image
Step to set a overlay:
Step 1. Select the stream (e.g., Stream 1, Stream 2, or Stream 3) you wish to configure for overlay.
Step 2. Click the Add button to create a new overlay.
Image 44
Image
Step 3. Choose the type of overlay:
Step 4. Click the Position dropdown menu to place the overlay (e.g., Upper Left, Bottom Right). Adjust posi-
tioning manually if advanced controls are available.
Step 5. If you select Text, Click the Font size dropdown menu to adjust the text size.
Step 6. If you select Text, please click and configure the Font and Background dropdown menus to choose
the appropriate color and transparency.
Step 7. If you select Image, please click and configure the Image transparency dropdown menus to choose
the appropriate transparency.
Note:
For image overlays, ensure the size and resolution fit the video stream properly.
Advanced
The Advanced page in the Overlay settings primarily offers advanced features, enabling users to customize
overlay content on surveillance footage according to specific requirements. Particularly useful for displaying
real-time dynamic data or in professional scenarios, this settings page provides the necessary flexibility and
functional support.
Image 45
Image
Dynamic Text Overlay
Dynamic Text Overlay is an advanced feature of VIVOTEK cameras that allows users to display real-time
dynamic information from external data sources on surveillance footage. This feature enhances the prac-
ticality and informational value of the footage, making it suitable for various surveillance scenarios.
Image 46
Video & Audio
The main purpose of Video & Audio settings is to ensure high-quality video and audio by adjusting resolu-
tion, frame rate, and compression formats, while optimizing bandwidth and storage usage with multi-stream
options. These settings enhance monitoring capabilities with high resolution, smooth frame rates, and two-
way audio, and provide adaptability for various scenarios such as night mode or outdoor environments.
Additionally, they improve system flexibility and compatibility by supporting multiple media formats and
protocols for seamless integration across devices.
Video mode
General surveillance,
Fisheye (MAX 30fps) 30fps Full 360° raw fisheye image post-processing, external
dewarping
4-Megapixel (16:9) (MAX Wide Dynamic Range for Environments with lighting
24fps
24fps)(WDR Pro) balanced lighting contrast
Video stream
Video Stream is designed to offer flexible video output options to meet diverse surveillance needs while
optimizing bandwidth and storage resource usage. Through multi-stream configuration, intelligent com-
pression technology, and regional optimization, Video Stream serves as a key tool for enhancing surveil-
lance efficiency and adaptability across various applications.
Resolution
Resolution is a key parameter of image quality, directly affecting the clarity of surveillance footage, storage
requirements, and bandwidth usage. Choosing the appropriate resolution requires considering the moni-
toring purpose, scenario needs, and resource constraints.
High-Dynamic Sce-
Quickly generates complete frames, suitable
narios (e.g., Traffic 1 second
for capturing fast-moving targets.
Monitoring)
Remote or
Prevents image degradation and ensures
Low-Bandwidth 1–2 seconds
smoothness and quality in remote viewing.
Monitoring
Quality priority
Quality Priority is a parameter used to define the priority of image quality, providing higher or lower image
quality for specific ROI areas to balance resource usage and image clarity.
Fixed Quality
When the surveillance scenario demands high image quality and network and storage resources are
relatively sufficient, it is recommended to use Fixed Quality to ensure that no image details are lost.
Constrained Bit Rate
If the surveillance environment has limited bandwidth or storage resources, it is recommended to
choose Constrained Bit Rate to precisely control resource usage by limiting the bit rate.
Low-priority streams
Lower requirements Lower quality, re-
Medium or low-bandwidth
for target quality duced bitrate
networks
High-security mon-
Maximizes stream Highest image clarity
Excellent itoring, critical evi-
quality and bitrate usage
dence recording
Policy
The function and purpose of the policy are to achieve flexibility and specificity in video transmission, bal-
ancing frame rate and image quality according to scenario requirements, thereby enhancing the effective-
ness, stability, and resource utilization efficiency of the monitoring system.
Smart Q
Smart Q is an intelligent image management feature designed to dynamically balance image quality and
resource utilization efficiency. It not only enhances the effectiveness of surveillance footage but also im-
proves the utilization of bandwidth and storage resources. This is particularly suitable for scenarios re-
quiring long-term recording, attention to detail, or resource-constrained monitoring systems.
• Enhancing overall surveillance effectiveness by leveraging audio to support video for more efficient
security monitoring.
• Providing flexible control and management tools, enabling easy configuration for both real-time
audio processing and pre-recorded audio playback.
These features make the application of audio in surveillance environments more flexible and efficient.
Audio settings
The purpose of this setting is to provide detailed configurations for audio input and output, optimizing the
audio functionality of surveillance cameras and allowing users to adjust audio quality, volume, and source
based on their specific needs.
Enable mute
Enable mute allows users to disable audio input, ensuring privacy or preventing unwanted sound record-
ing.
Microphone source
Microphone source lets users select between Internal or External microphones to adapt to different audio
capture needs and hardware setups.
Audio type
The audio type setting determines the encoding format for audio, balancing quality, bandwidth usage, and
compatibility:
AAC
Offers high-quality audio with efficient compression, ideal for environments requiring clear sound with
minimal distortion.
AAC Bit Rate
AAC Bit Rate is a sub-setting under Audio Type, which only appears when AAC is selected. It is used to
fine-tune the quality and resource usage of AAC audio format, enabling users to optimize the config-
uration based on practical scenarios, such as bandwidth or storage requirements.
G.726
Provides moderate compression, balancing quality and bandwidth usage, suitable for environments
with bandwidth constraints.
G.726 Bit Rate
G.726 Bit Rate is a specific configuration option that appears based on the selection of Audio Type
and is only active when G.726 is chosen. This option allows users to further adjust the encoding bit
rate to optimize settings according to practical needs, such as network bandwidth or storage space
limitations.
Output settings
Users can manually adjust the audio output volume to suit different application environments.
Output gain
Users can manually adjust the audio output volume to suit different application environments:
In scenarios requiring high volume (such as alarms or wide-area broadcasts), gain can be increased to en-
hance the volume.
In scenarios requiring lower volume (such as privacy mode or silent operation), gain can be reduced to
minimize audio interference.
Step 1. Select the one of the two options under “Select 1 type” for the audio source.
Record from camera
Use the camera’s built-in microphone to record audio, with a maximum file size of 2MB.
Upload a pre-recorded sound file
Upload a pre-existing audio file, which must be in .wav format and not exceed 2MB.
Step 2. Enter a name for the audio clip in the “Clip name” field (e.g., “Clips 01”) to identify it later.
Step 3. In the “Waiting before recording” field, input the number of seconds to delay the start of the re-
cording (e.g., 5 seconds) to allow time for preparation before recording begins.
Step 4. Click the red “Start recording” button to initiate a countdown for the specified time, after which the
system starts recording audio and automatically saves the recording upon completion for review.
Step 4. To enable the “Video” option and select a stream in the Video stream settings.
Step 5. To enable the “Audio” option.
Step 6. To enable the “Metadata” option.
Home
The purpose of the Home & Preset tab in PTZ Settings is to assist users in configuring and managing the
primary viewpoints and preset positions of the camera, enhancing operational efficiency and enabling quick
transitions.
PTZ Settings 62
PTZ Settings
Achieve Flexibility and Precision
Enables users to precisely configure and adjust the camera’s viewpoints and focal lengths to meet the
demands of various scenarios.
Joystick
The Joystick provides users with precise control over the camera’s direction and focus, suitable for re-
al-time operation, ensuring flexibility and accuracy in the monitoring range.
Direction Control
Provides a virtual joystick with directional buttons for up, down, left, and right, enabling users to operate
the camera’s pan and tilt in real time.
Clicking the directional arrows moves the camera in the corresponding direction.
Center Positioning
The central button can be used to quickly reset or reposition the camera to its current center point or ini-
tial position.
Zoom Control
Zoom Out: Reduces the zoom level, expanding the camera’s field of view.
Zoom In: Increases the zoom level, focusing on details or specific targets.
PTZ Settings 63
PTZ Settings
Preference
The Preference offers features such as speed adjustment and zoom display, enabling users to flexibly adjust
camera operation parameters according to their needs, achieving more efficient and precise surveillance
management.
PTZ Settings 64
PTZ Settings
Speed
The Speed provides comprehensive control over the camera’s movement speed, including pan, tilt, zoom,
and automated patrol, allowing users to flexibly adjust the speed based on surveillance needs for precise
and efficient camera operation.
PTZ Settings 65
App
Expand Camera Functionality with Powerful Applications
The App feature provides users with a centralized platform for managing, installing, and updating appli-
cations on the camera, aiming to enhance the device’s flexibility, security, and functionality, enabling it to
adapt to diverse surveillance scenarios and requirements.
App 66
App
Face Check
VIVOTEK’s Face Check Package is an AI-based application module designed to detect the presence of hu-
man faces in the camera’s field of view. Powered by deep learning technology, this package enables re-
al-time face detection and can be used as a trigger condition for various automated surveillance actions.
While it does not support facial recognition or identity matching, it serves as a foundational tool for intelli-
gent event detection and monitoring automation.
- Real-Time Face Detection
The system detects one or more human faces in the video stream, even if the faces are angled, partially
visible, or not directly facing the camera.
- Event Trigger Integration
• Digital Output (DO) control (e.g., triggering a light or buzzer)
• Start recording
• Snapshot upload or push notification
- Region and Schedule-Based Detection
Users can define detection zones and schedule timeframes for when face detection should be active,
allowing for precise deployment.
App 67
App
Step to Upload App
Step 1. Click the “Upload” button in the upper-right corner of the page. Two options will appear:
Upload App: For uploading application files.
Upload License: For uploading application license files.
Step 2. Click Upload App, and a file upload window will pop up. The accepted file format is .tar.gz.
Step 3. Click Upload file, and select the application file stored on your local device.
Step 4. After verifying the file, click Upload to upload the application.
Step 5. Wait for the Upload to Complete.
Step 6. The system will display the upload progress. Once completed, the application or license file will
appear in the App list.
Each application’s More icon (click the three-dot icon on the right) provides the following features and pur-
poses:
Information
Monitor Application Status helps users quickly understand application details, ensuring the version and
license are accurate, while also assisting in troubleshooting by providing essential information like version
and license to diagnose issues effectively.
App 68
App
Schedule
Configure the application’s runtime schedule to specify when it should be enabled or disabled, and set
specific time periods to conserve resources or meet different scenario requirements. This feature optimiz-
es resources by preventing unnecessary long-term application operation, conserving processing power,
and adapts to various scenarios by automating application start and stop, enhancing flexibility.
Delete
Free up storage by removing unneeded applications, especially when storage is limited, and adjust func-
tionality by deleting unused or expired applications to make room for new installations.
App 69
Detection
The purpose of the Detection is to enhance the automated monitoring capabilities of the camera, reduce
manual intervention, and promptly notify relevant personnel in the event of anomalies, thereby improving
security and efficiency. Users can enable and configure the corresponding detection options in the manage-
ment interface based on specific needs.
Motion detection
VIVOTEK’s VC9101 supports Smart Motion Detection, allowing users to define specific detection zones within
the live view and set flexible trigger conditions. Within each motion window, Face Detection (Face Check) can
also be enabled to detect the presence of human faces and trigger related actions.
The following steps outline how to configure this feature through the camera’s web interface.
Detection 70
Detection
Note:
This function detects the presence of faces but does not perform identity recognition. For facial identification, VIVOTEK’s Face Rec-
ognition solutions are required.
Audio detection
The audio detection feature in VIVOTEK cameras is a powerful tool for augmenting security and safety. By
detecting sound anomalies in real-time, it enhances the camera’s ability to monitor and respond to incidents
effectively. Its primary purposes include:
Enhancing Security
Detects abnormal sounds (e.g., glass breaking, shouting, or explosions), enabling early identification of
potential threats.
Real-Time Alerts
Notifies security personnel immediately when unusual sounds are detected, allowing for faster responses.
Event Recording
Helps ensure that audio-related incidents are documented for review and investigation.
Detection 71
Detection
Detection 72
Detection
Integrate audio detection-related settings into a profile
The Profile Settings for Audio Detection allow users to configure detection settings tailored to specific op-
erational modes, such as Night Mode and Schedule Mode. These settings provide flexibility and precision
for various monitoring needs.
Night Mode
Designed for quieter nighttime environments with lower ambient noise levels, it ensures heightened
sensitivity to detect unusual sounds, such as breaking glass or loud footsteps, that might indicate security
breaches. Lower thresholds for audio level detection can be applied to ensure even minor disturbances
trigger an alert, and the system can be activated automatically during preset nighttime hours.
Schedule Mode
It allows users to apply specific settings during predefined time periods, such as working hours, week-
ends, or off-peak times, ensuring customized detection settings based on predictable noise patterns. It
enables precise scheduling for when audio detection thresholds or profiles should be active, tailoring the
sensitivity to the expected noise environment during the scheduled time.
Detection 73
Detection
Protecting the Surveillance System from Visual Obstruction
To ensure optimal performance and clear monitoring, protecting your surveillance system from visual ob-
struction is crucial. Regularly inspect and maintain cameras to prevent blockages caused by dirt, debris, or
weather conditions. Strategically position cameras to avoid obstructions from vegetation, building struc-
tures, or temporary barriers. Advanced features such as obstruction detection alerts can further enhance
reliability, ensuring uninterrupted surveillance coverage for critical areas.
Tampering detection
Tamper detection is an advanced camera feature designed to identify incidents such as blocking, defocusing,
or spray paint interference. This functionality enhances the integrity and reliability of surveillance systems
by ensuring clear and accurate monitoring while providing timely alerts. Its primary purposes include:
Preventing Sabotage
Detects and alerts users about attempts to disrupt the camera’s operation, such as covering, defocusing,
or physically tampering with the device.
Enhancing Security
Adds an additional layer of protection by identifying visual impairments or malicious actions that compro-
mise the surveillance system.
Timely Response
Delivers real-time alerts to enable security personnel to respond immediately to tampering incidents or
visual issues.
Operational Reliability
Ensures continuous, high-quality monitoring, even in challenging or high-risk environments.
Detection 74
Detection
Below are the detailed functionalities and corresponding settings for each feature:
Tampering detection
Detects physical tampering, including actions like blocking, covering, or moving the camera, ensuring im-
mediate alerts to maintain surveillance integrity.
Trigger Duration (seconds):
Defines the amount of time tampering must persist before triggering an alert.
Trigger Threshold:
Adjusts the sensitivity to tampering attempts. Lower thresholds are more sensitive but may result in
false alarms, while higher thresholds are less sensitive.
Detection 75
Event
Event is a powerful tool designed to enhance security through automation and intelligent monitoring. It
allows users to define specific conditions, known as trigger sources, that activate pre-configured actions
such as recording, sending alerts, or controlling external devices. By customizing these events with detailed
schedules and conditions, users can ensure the system responds proactively to potential threats or anoma-
lies. This feature not only streamlines surveillance operations but also reduces the need for constant manu-
al monitoring, providing a reliable and efficient way to protect property and assets.
Event
Event is a smart automation tool designed to enhance the efficiency and effectiveness of security monitor-
ing. Its primary purpose is to detect specific conditions or triggers and automatically execute predefined ac-
tions to respond to those events. This reduces the need for constant manual monitoring and ensures timely
reactions to critical incidents.
Event 76
Event
Increase Efficiency
Automating responses eliminates the need for constant manual monitoring, saving time and resources.
Provide Evidence
Automatic recording and snapshot capture ensure crucial moments are documented for investigations.
Event 77
Event
Network
These triggers are based on the network status or conditions.
Configure any additional settings for the selected trigger source.
Click Next to continue.
Event 78
Event
Event 79
Event
Note:
The types of Event triggers:
Device
System Boot The event is triggered when the camera starts up.
Detection
The event is triggered when the camera detects a moving object in its
Motion Detection
field of view.
The event is triggered when the camera detects tampering, such as being
Tampering Detection
covered, moved, or obstructed.
The event is triggered when the camera detects abnormal sounds, such
Audio Detection
as sudden loud noises.
The event is triggered when the camera detects physical shocks or vibra-
Shock Detection
tions.
Recording
Event 80
Event
VADP
The event is triggered when repeated failed login attempts are detected,
BruteForceAttack
indicating a potential brute force attack on the camera system.
ObjectsInside The event is triggered when objects enter a user-defined monitored area.
The event is triggered when human faces are recognized for identifica-
Face
tion or tracking purposes.
Event 81
Event
VADP
Network
Certificate Expiration
The event is triggered when the security certificate is about to expire.
Notify
Camera link
The Camera Link operates by enabling one camera to trigger actions on other linked cameras when an event
occurs. For example, the Camera Link feature enables a general form factor camera to pair with a PTZ cam-
era. When motion is detected in Motion Window #1, the paired PTZ camera will automatically move to the
designated preset position and initiate object tracking. This coordinated response ensures comprehensive
event coverage, effectively eliminating blind spots by capturing multiple perspectives in real time, even in
complex or large surveillance areas.
Event 82
Event
Enhanced Security
The Camera Link feature allows for multi-angle coverage of critical areas by enabling other cameras to
automatically capture footage from different viewpoints when an event is triggered in one zone, effec-
tively reducing blind spots and improving situational awareness.
Event 83
Event
Trigger Automated HTTP/HTTPS Requests for Event-Based Inte-
gration
The VIVOTEK cameras can send HTTP/HTTPS requests to a specified server or API when a specific event oc-
curs. This enables integration with external systems for notifications, logging, or automation.
Event 84
Event
- Delay:
Specifies the delay (in seconds) before executing the request after an event is triggered.
Step 3. Click the Test button to ensure the connection details are correct and the HTTP/HTTPS event action
is successfully established.
Step 4. Once the connection is successfully tested, click the Save button to store the HTTP/HTTPS event
action configuration.
Event 85
Event
Effortless Event Management and Enhanced Security with
Event Server & Media
The Event Server & Media offers robust functionality that simplifies event management, improves security,
and enhances user convenience. It ensures that event data is handled efficiently, reliably, and in a manner
tailored to each user’s unique requirements, making it an invaluable tool for modern surveillance systems.
Event server
By offering various types of event servers, VIVOTEK cameras provide a flexible and robust event manage-
ment solution that can be customized to meet diverse security and monitoring requirements. The main
functions and purposes of these servers are as follows:
E-mail
This solution sends email notifications to predefined recipients whenever an event occurs, instantly alert-
ing users with detailed event information. It also supports attaching snapshots or event-related data,
making it an ideal choice for small-scale setups or individual monitoring needs.
FTP
This solution uploads event-related files, such as snapshots, videos, or logs, to an FTP server, providing
centralized storage for event media. It is ideal for managing event data in environments with consistent
network connectivity and is particularly suited for large-scale deployments that require organized and
efficient storage solutions.
Event 86
Event
SFTP
This solution securely uploads event-related files to an SFTP server using encryption protocols, enhancing
data protection during transfer. It is ideal for environments requiring the safeguarding of sensitive infor-
mation from interception or tampering and ensures compliance with strict security policies and regulatory
requirements.
HTTP
This solution sends event notifications or data to an HTTP server via HTTP requests, enabling seamless
integration with third-party systems or applications for efficient event handling. It can trigger workflows in
advanced security systems, home automation setups, or analytics platforms, and simplifies integration in
environments that rely on custom APIs or HTTP-based solutions.
HTTPS
This solution uses the secure HTTPS protocol for encrypted communication, ensuring secure data transfer
to prevent unauthorized access or data breaches. It is ideal for sensitive applications requiring confidenti-
ality and is commonly implemented in modern, secure network environments.
Event 87
Event
Steps to configure an Event server
Step 1. Click the + Add button to add a new server.
Step 2. In the popup window, choose the type of server you want to configure:
Email: For sending event notifications via email.
FTP: For uploading event-related files (e.g., snapshots or videos) to an FTP server.
SFTP: Similar to FTP but uses encrypted file transfer for added security.
HTTP: For sending HTTP requests to a third-party system with event information.
HTTPS: Similar to HTTP but uses a secure communication protocol.
Step 4. Depending on the server type selected, fill in the required fields:
Email Server:
SMTP Server: Enter the SMTP server address (e.g., smtp.example.com).
Port: Specify the port (e.g., 25, 465, or 587 depending on the SMTP configuration).
Authentication: Enable and enter the username and password for the email account.
Sender Email Address: Enter the “From” address for email notifications.
Recipient Email Address: Enter the recipient’s email address for receiving notifications.
FTP Server:
FTP Server Address: Enter the IP address or domain name of the FTP server.
Port: Default is 21 (adjust if needed).
Username and Password: Enter credentials to authenticate with the FTP server.
Folder Path: Specify the folder where files should be uploaded.
SFTP Server:
Similar to FTP, but ensure the SFTP protocol is supported, and credentials are entered securely.
HTTP Server:
Server URL: Enter the full URL of the HTTP server (e.g., http://example.com/api/event).
HTTPS Server:
Same as HTTP but ensure the server URL starts with “https://”.
Note:
Upload and configure certificates if required for secure communication.
Step 5. Click the Test button to verify that the camera can successfully connect to the server.
Step 6. After a successful test, click “Save” to store the server configuration, and the new server will ap-
pear in the Event Server list.
Event 88
Event
Step 7. Link the Server to an Event
Navigate back to the Event tab.
Create a new event or edit an existing one.
Select the configured server under the Event Server section.
Define the actions and media to be sent to the server when the event is triggered.
Note:
Use strong and unique passwords for server authentication to enhance security.
For HTTPS and SFTP, ensure certificates and encryption settings are correctly configured.
Regularly monitor and test the server connection to ensure reliable event handling.
Event media
The Event Media settings offer a powerful and flexible media management solution, enabling users to
quickly generate, store, and transmit media files during events. This meets the needs for real-time mon-
itoring, event recording, and evidence preservation, further enhancing the efficiency and reliability of
surveillance systems. The main functions and purposes of these servers are as follows:
Snapshot
Captures a still image at the moment the event is triggered, providing a quick visual representation of the
event that is useful for reviewing specific moments or identifying key elements such as faces or objects.
Video clip
Records a short video segment before, during, and after the event is triggered, offering detailed context
and a dynamic view of the event to help users thoroughly analyze incidents such as the movement of indi-
viduals or objects.
Event 89
Event
System log
Records textual data about the event, including the type of event, time, and related system activity, pro-
viding a chronological record for audits and troubleshooting while being useful for monitoring system
performance and identifying anomalies.
Step 2. Enter a descriptive name for the media in the Media Name field
Event 90
Event
Video clip:
Source: Select the video stream to record from.
Pre-Event Recording (seconds): Define how many seconds before the event the recording should start.
Maximum Duration (seconds): Set the maximum length of the video clip (e.g., 5 seconds).
Maximum File Size (KB): Specify the maximum file size for the video clip.
File Name Prefix: Enter a custom prefix for video filenames for easy identification.
System Log:
This media type will record event-related data such as event type, time, and associated system activity.
Step 5. After configuring the settings, click “Save” to finalize the media configuration, which will then ap-
pear in the Event Media list.
Event 91
Recording
Maximize Surveillance and Storage with Tailored Recording
Settings
The Recording settings empower users to customize their surveillance experience with precision and effi-
ciency. By offering flexible scheduling, event-based triggers, and multiple storage options, these settings
ensure that critical footage is captured while optimizing storage usage. Whether you need 24/7 monitoring
or recordings triggered by specific events like motion or sound, the system adapts seamlessly to your needs.
With the ability to store recordings locally on an SD card or on a network drive, users can ensure data secu-
rity and accessibility. This customizable approach simplifies management, enhances security, and provides
peace of mind, making it a vital feature for any surveillance setup.
Event Investigation
Allows users to review recordings to investigate incidents or analyze activities.
Recording 92
Recording
Steps to configure Recording
Step 1. Click the +Add button to open the Recording Settings panel.
Step 2. In the Recording name field, type a descriptive name for this recording schedule.
Step 3. Check the With adaptive recording box if needed.
Step 4. Under Source, choose the appropriate media profile from the dropdown menu. Media profiles are
predefined configurations in the Video & Audio settings of the camera.
Step 5. Under Trigger, select one of the following options:
- Schedule recording
Records based on a predefined time schedule. This is the most commonly used option for continuous
or time-based recording. After selecting Schedule recording, configure the time interval:
• Always: Records continuously, 24/7.
Recording 93
Recording
• Custom Schedule: Set specific time frames (e.g., weekdays from 9:00 AM to 6:00 PM).
- Network fail
Triggers recording only when the camera detects a network failure. This ensures footage is recorded
locally on the SD card when network connectivity is interrupted, providing a fail-safe mechanism.
Step 6. Under Destination, select where the recordings will be stored:
SD
Save recordings locally on the SD card inserted in the camera. This option is ideal for standalone setups
or when local storage is sufficient.
NAS
Save recordings to a Network Attached Storage device. This is useful for centralized storage and easier
management of video data, especially in larger surveillance systems.
Note:
If an SD card is not detected or improperly installed, a warning message will appear. Ensure an SD card is inserted or configure the
NAS settings before proceeding.
Step 7. Once all fields are configured, click Save to apply the settings.
Resource Efficiency:
The system optimizes frame rate usage based on actual needs, ensuring efficient use of network and stor-
age resources without compromising performance.
Recording 94
Recording
2. Frame Rate Control:
No Alarm Trigger:
JPEG mode: 1 Intra frame (I-frame) per second.
H.264 mode: Records Intra frame (I-frame) only.
Alarm Trigger:
Automatically increases to the configured full frame rate.
Recording 95
System
The System acts as a comprehensive management hub designed for configuring and monitoring the device.
It offers essential tools to manage the camera’s system information, network configurations, user accounts,
storage solutions, and maintenance tasks. Its core aim is to ensure secure and efficient device operation by
enabling features like firmware updates, log analysis, and system diagnostics. Additionally, it improves user
experience through customizable themes and streamlines data management by organizing storage and file
handling. This category plays a vital role in maintaining optimal camera performance and ensuring its seam-
less integration into a networked environment.
Real-time Monitoring
Helps users track resource usage and storage capacity of the camera.
Time Synchronization
Ensures the accuracy of recording files and event logs.
System 96
System
These functions are designed to enhance the camera’s usability, operational flexibility, and integration capa-
bility with other devices.
System 97
System
Status
The Status card serves as a real-time dashboard for monitoring the camera’s operational performance. By
providing detailed insights into CPU, memory, and storage usage, it helps users maintain optimal device per-
formance, ensure system stability, and proactively address resource management needs.
CPU Load
Displays the real-time CPU usage of the camera as a line graph, showing fluctuations over time.
Helps users monitor processor load trends and identify potential performance issues.
Memory
A circular graph visualizes the memory usage, including: Total memory capacity, Used memory and Avail-
able memory.
Detailed figures for used and free memory are shown for precise monitoring.
Storage Status
Displays the status of internal storage, including: Total storage capacity, Used storage space and Available
storage, represented by a progress bar for clear visualization.
Includes options for further storage management via the gear icon.
System 98
System
Information
The Information card provides essential details for identifying, configuring, and maintaining the camera. It
simplifies network management, ensures the camera is up to date, and provides quick access to critical de-
vice information, aiding in efficient management and troubleshooting.
Host Name
Displays the camera’s unique name.
Can be edited by the user to customize and identify the camera more easily within a network.
Model
Shows the camera’s model number.
Helps in identifying the specific device for maintenance or troubleshooting.
MAC Address
Displays the camera’s unique MAC address.
Useful for network diagnostics, device identification, or IP reservation purposes.
IP Settings
Shows the camera’s current IP address.
Allows users to confirm the network connectivity and configuration.
Firmware Version
Displays the current firmware version installed on the camera.
Includes an Upgrade option for users to update the firmware, ensuring access to the latest features, bug
fixes, and security improvements.
System 99
System
System Time
The System Time card is essential for ensuring that the camera’s time is accurate and synchronized with its
operating environment. By offering flexible configuration options, it supports reliable event tracking, seam-
less system integration, and precise log management, enabling efficient and consistent monitoring in vari-
ous setups.
Time Zone
Allows users to select the time zone based on the camera’s location (e.g., GMT+08:00 Beijing, Chongqing,
Hong Kong).
Ensures the camera’s time aligns with the local time for accurate recording and event logging.
100
System
LED & DIDO
The LED & DIDO card serves as a bridge for the camera’s interaction with its environment. By controlling the
LED indicator and managing the digital input/output interfaces, it allows the camera to integrate seamlessly
with external devices, enhancing its functionality and supporting a wide range of automation and monitor-
ing applications.
LED Indicator
A toggle switch to enable or disable the camera’s LED indicator.
When enabled, the LED provides visual feedback for the camera’s operational status (e.g., power on, re-
cording, or activity detection).
Digital input
DI-1 Current status
Displays the real-time status of the digital input (e.g., High or Low).
DI-1 Normal status
Allows the user to configure the expected normal state for the digital input (either High or Low). Used for
integrating external sensors (e.g., motion detectors or alarms).
101
System
Digital output
DO-1 Current status
Shows the current state of the digital output (e.g., Open or Grounded).
DO-1 Normal status
Lets the user define the normal state for the digital output (either Open or Grounded). Used for triggering
external devices (e.g., alarms, lights, or actuators).
Note:
High/Low in DI
Reflects the input signal received from external devices, used for monitoring the status of sensors or triggers.
Open/Grounded in DO
Controls the output signal sent to external devices, used to activate or deactivate connected equipment such as alarms or actua-
tors.
102
System
Configure and Secure Your Camera’s Network Connection for
Seamless Communication
The Network item provides comprehensive tools for configuring the camera’s network connectivity, ensur-
ing reliable communication, remote access, and secure integration with other devices and systems. This
configuration is critical for enabling real-time monitoring, remote management, and data transmission over
various network infrastructures.
Customized Configuration
Provides flexible network parameter settings (e.g., static or dynamic IP) to ensure compatibility with vari-
ous network environments.
Reliable Communication
Ensures seamless communication with external systems (e.g., NVRs or cloud platforms) through proper
configuration of gateways, DNS, and protocols.
Security
Supports secure connections and access controls to protect the camera and its data from unauthorized
access or threats.
System 103
System
Network Settings
By providing detailed configuration options for both IPv4 and IPv6, the Network Settings tab ensures the
camera can seamlessly connect to and operate within diverse and complex network environments.
IPv4
The IPv4 card plays a vital role in setting up the camera’s network configuration and ensuring effective com-
munication. It facilitates dependable connectivity, enables both local and remote access, and allows the
camera to integrate effortlessly into IPv4-based networks. This configuration is crucial for maintaining stable
and efficient performance across diverse networking environments.
System 104
System
IPv4
Network Type
Allows the user to select the type of network connection:
IP Configuration
Provides two configuration options:
Assigns a static IP address to the camera for consistent and reliable iden-
Fixed IP
tification on the network.
IP Address
Displays or sets the IPv4 address of the camera, which serves as the unique identifier for the camera with-
in the network.
Network Mask
Defines the subnet mask, which determines the range of devices that can directly communicate with the
camera.
Default Router
Specifies the default gateway for directing network traffic beyond the local subnet, such as accessing the
internet or external servers.
System 105
System
IPv6
The IPv6 card in the Network Settings tab equips the camera with the ability to operate in next-generation
networks, supporting automatic or manual IP address assignment, subnet configuration, and domain name
resolution. This ensures the camera is ready for modern and future network environments, providing en-
hanced connectivity and adaptability.
IP Configuration
Allows the user to select how the IPv6 address is assigned:
Prefix Length
Specifies the subnet prefix length, which determines the size of the subnet and the range of addresses
that can communicate directly with the camera. A prefix length of 64 is common in IPv6 configurations.
Default Router
Configures the default gateway for the camera’s outgoing traffic to external networks, ensuring communi-
cation beyond the local IPv6 subnet.
Primary DNS
Allows the user to specify the primary DNS server to resolve domain names into IP addresses in IPv6 net-
works.
System 106
System
Protocols
The Protocols tab is designed to configure various communication protocols that enable the camera to inter-
act with other devices, systems, and networks. It includes five key protocol cards: HTTP & HTTPS, RTSP, SIP,
SNMP, and Bonjour, each serving specific purposes for communication, streaming, and network discovery.
System 107
System
Allow Access Through
Allows users to choose the protocols for accessing the camera:
HTTP & HTTPS Supports both protocols simultaneously for flexible access options.
HTTP Authentication
Configures the authentication method for HTTP access:
Basic A simpler method that sends plain text credentials (less secure).
HTTP Port
Defines the primary port used for HTTP communication (default: 80).
HTTPS Port
Sets the port for HTTPS communication (default: 443), ensuring encrypted and secure access.
TLS Version
Offers options to select the encryption protocol for HTTPS:
TLS v1.3 only For maximum security using the latest protocol.
System 108
System
HTTPS Certificate
Manages the digital certificate used for HTTPS communication:
• Default Certificate
Uses the camera’s built-in certificate.
Access Name
Provides options to customize or manage the camera’s hostname or access URL, simplifying identification
and connection.
RTSP
The RTSP card is designed to configure real-time video and audio streaming settings for the camera. It en-
ables seamless integration with external systems, secure access to live feeds, and optimized network per-
formance through multicast and quality monitoring. This makes it a critical component for deploying the
camera in professional surveillance and media environments.
System 109
System
Authentication
Configures the authentication method for RTSP access:
RTSP Port
Specifies the port number for RTSP communication (default: 554). Used for initializing RTSP sessions be-
tween the camera and the client.
Access Name
Provides options to configure or customize the access name (URL path) for RTSP streams, simplifying ac-
cess for third-party systems or users.
Multicast Settings
Divided into three sections: Video, Audio, and Metadata, each with specific settings.
IP Version
Allows the selection of IPv4 or IPv6 for multicast traffic.
Multicast Address
Assigns a unique multicast IP address for each stream (e.g., 239.x.x.x for IPv4 or FF00::/8 for IPv6).
System 110
System
Multicast Port
Configures the port number for multicast streaming (e.g., 5556 for video, 5558 for audio).
SIP
The SIP card is essential for configuring the camera’s two-way audio communication capabilities via the SIP
protocol. It enables integration with SIP-based systems, supports real-time audio interaction, and ensures
flexibility with customizable port settings, making it a critical feature for applications requiring interactive
communication.
SNMP
This section explains how to use the SNMP on the network camera. The Simple Network Management Proto-
col is an application layer protocol that facilitates the exchange of management information between net-
work devices. It helps network administrators to remotely manage network devices and find, solve network
problems with ease. The SNMP consists of the following three key components:
Manager
Network-management station(NMS), a server which executes applications that monitor and control man-
aged devices.
Agent
A network-management station software module on a managed device which transfers the status of man-
aged devices to the NMS.
Managed device
A network node on a managed network. For example: routers, switches, bridges, hubs, computer hosts,
printers, IP telephones, network cameras, web server, and database.
Note:
Before configuring SNMP settings on this card, please enable your NMS first.
System 111
System
Enable SNMPv1, SNMPv2c
Select the option and enter the names of Read/Write community and Read Only community according to
your NMS settings.
Enable SNMPv3
This option contains cryptographic security, a higher security level, which allows you to set the Authentica-
tion password and the Encryption password.
Authentication type
Select MD5 or SHA as the authentication method.
Authentication password
Enter the password for authentication (at least 8 characters).
System 112
System
Encryption password
Enter a password for encryption (at least 8 characters).
Bonjour
To access the camera from a MAC computer, go to Safari, click on Bonjour and select the camera from a
drop-down list.
You can go to Safari > Preferences to enter your user name and password, provide the root password the
first time you access the camera. The camera main page will open in your browser.
System 113
System
System 114
System
Service
The Service tab provides essential options for managing network services. These include enabling Dynam-
ic Domain Name System (DDNS) for seamless remote access even with dynamic IP addresses, configuring
Quality of Service (QoS) settings to prioritize camera data traffic on the network, and activating FTP or SFTP
servers for secure and efficient file transfer. These features ensure reliable connectivity, enhanced data se-
curity, and improved performance, catering to diverse surveillance requirements.
System 115
System
DDNS
The card integrates with third-party DDNS services to dynamically update the domain name associated
with the camera whenever its IP address changes. Users need to provide valid credentials and a registered
hostname with their DDNS provider to use this feature effectively. The difference between “Dynamic” and
“Custom” provider modes allows flexibility based on the user’s DDNS service plan or provider require-
ments.
Enable DDNS:
Allows the user to activate or deactivate the DDNS functionality.
Provider:
A dropdown menu allows users to select the DDNS service provider, with options such as “Dyndns.org
(Dynamic)” or “Dyndns.org (Custom).” The selected provider determines how the hostname and creden-
tials are configured for the DDNS connection.
Host Name:
An input field is provided to specify the unique hostname registered with the selected DDNS provider (e.g.,
yourcamera.dyndns.org), which will be used for remote access to the camera.
User Name:
Input field for the account username required by the DDNS provider.
Password:
Input field for the password associated with the DDNS account. A hidden field ensures privacy during in-
put.
System 116
System
QoS
The QoS card allows users to flexibly configure the priority of different types of data streams based on
network environment requirements. When CoS is enabled, it can integrate with VLANs, making it suitable
for Ethernet networks. Enabling QoS/DSCP, on the other hand, is more appropriate for IP networks. These
settings help enhance the reliability and efficiency of camera data transmission, which is particularly cru-
cial when multiple devices share the same network.
VLAN ID:
Specifies the VLAN tag for identifying the virtual LAN the camera is part of.
System 117
System
Priority settings for each data type (Live Video, Live Audio, Event/Alarm, Management):
Each data type (Live Video, Live Audio, Event/Alarm, Management) can be assigned a priority level via a 0-7
dropdown menu, where higher numbers indicate higher transmission priority. This allows for fine-grained
control of traffic within an Ethernet network.
DSCP values for each data type (Live Video, Live Audio, Event/Alarm, Management):
Allows users to configure a DSCP value for each data type (Live Video, Live Audio, Event/Alarm, Manage-
ment). These values determine the priority of the data in IP networks, ensuring proper traffic classification
and efficient routing.
System 118
System
FTP
The FTP card provides the flexibility to use FTP for simple and efficient file transfers or SFTP for secure,
encrypted transfers, depending on the user’s operational and security needs. The ability to configure the
ports ensures compatibility with various network configurations. Host keys in SFTP further enhance trust
and security during client-server communication. This functionality is particularly useful for automated
storage or backup of surveillance data to remote locations.
FTP Port:
Specifies the port used for the FTP service (default is 21). Users can adjust this to align with their network
or security requirements.
SFTP Port:
Specifies the port used for the SFTP service (default is 22). Users can modify this port if needed to avoid
conflicts or meet specific security policies.
Host Key:
Displays the server’s host key information, including hash values (e.g., RSA and ED25519 keys). These keys
are used to authenticate the server and ensure secure connections between the client and the server.
System 119
System
Security
The Security tab provides a comprehensive set of options to enhance network security. It allows users to
manage certificates for encrypted communications, implement access control through IP filtering and IEEE
802.1x authentication, and restrict administrative access to specific IP addresses. By utilizing these features,
users can ensure secure data transmission, prevent unauthorized access, and protect the camera in both
simple and complex network environments. This tab is designed to address the security needs of modern
surveillance systems and offer robust protection against potential threats.
Certificate
The Certificate card focuses on providing a robust and centralized solution for managing certificates. By
supporting HTTPS encryption, it ensures secure communication between the camera and external sys-
tems, safeguarding data against potential eavesdropping or tampering. The notification feature alerts
users to expired certificates, helping to mitigate associated risks, while the ability to manage multiple
certificates offers flexibility to accommodate various network configurations and requirements.
System 120
System
Certificate
Notify:
Configures notification settings for certificate expiration.
• Notification in advance for certificate expiration (days):
Sets how many days before expiration the system will send a notification.
• Notification frequency (days):
Specifies the frequency of repeated notifications.
Certificate List:
Supports managing up to 16 certificates and displays detailed information about each certificate, in-
cluding:
• Name:
The name of the certificate.
• Assign to:
The application or protocol the certificate is associated with (e.g., HTTPS).
• Type:
The purpose of the certificate (e.g., Client-Server).
• Indicates the current status of each certificate, such as “Certificate expired.”
System 121
System
Steps to add a Certificate:
System 122
System
Steps to add a Certificate:
Option 1. Create a self-signed certificate for the Client certificate.
• Step 1. Click “+Add” button and then pop up the “Add Certificate” window.
• Step 2. Select Create self-signed certificate.
• Step 3. Fill in the required fields, including:
Name: Enter a name for the certificate (e.g., “Cert 01”).
Certificate country: Provide the country code (e.g., “TW”).
State or province and Locality: Specify the location (e.g., “Asia”).
Organization and Organization unit: Enter the organization details.
Common name: Provide the domain name (e.g., “www.vivotek.com”).
Validity: Specify the validity period in days (e.g., “397”).
• Step 4. Click Create to start certificate generate procedure.
• Step 5. A message indicating “Generated successfully” means the process is complete.
System 123
System
Steps to add a Certificate:
Option 2. Create a Certificate Request and Install for the Client certificate.
• Step 1. Click “+Add” button and then pop up the “Add Certificate” window.
• Step 2. Select Create a certificate request and install.
• Step 3. Fill in the required fields similar to the self-signed certificate (Name, Location, Organization,
Common Name).
• Step 4. Click Create to start certificate generate procedure.
• Step 5. A message indicating “Uploaded successfully” means the certificate request is generated
successfully.
• Step 6. Click “Copy certificate request” button to copy the details of the certificate request (CSR).
• Step 7. Use the copied CSR to apply for a certificate from a trusted CA, which will then provide a
signed certificate file (e.g., a.crt file).
• Step 8. After receiving the signed certificate from the CA, return to the same window, click Upload
file, and select the .crt file provided by the CA.
• Step 9. Click Create to complete the installation of the certificate.
• Step 10. A message indicating “Uploaded successfully” means the process is complete.
System 124
System
Steps to add a Certificate:
Option 3: Upload a Certificate and Private Key for the Client certificate.
• Step 1. Click “+Add” button and then pop up the “Add Certificate” window.
• Step 2. Select Upload a certificate and private key.
• Step 3. Fill in the certificate name (e.g., “Cert 03”).
• Step 4. Use the Upload certificate file (*.crt) and Upload private key file (*.key) options to upload the
respective files.
• Step 5. Click Create to add the certificate.
System 125
System
Steps to add a Certificate:
Option 4: Upload a CA Certificate for the CA certification
• Step 1. Click “+Add” button and then pop up the “Add Certificate” window.
• Step 2. Select Upload a CA certificate.
• Step 3. Fill in the certificate name (e.g., “Cert 04”).
• Step 4. Use the Upload certificate file (*.pem) option to upload the CA certificate.
• Step 5. Click Create to finalize the process.
System 126
System
Note:
How to use the copied CSR to apply for a certificate from a trusted CA, which will then provide a signed
certificate file:
• Step 1. Look for a trusted certificate authority, such as Symantec’s VeriSign Authentication Services,
that issues digital certificates. Sign in and purchase the SSL certification service. Copy the certificate
request from your request prompt and paste it in the CA’s signing request window. Proceed with the
rest of the process as CA’s instructions on their webpage.
• Step 2. Once completed, your SSL certificate should be delivered to you via an email or other means.
Copy the contents of the certificate in the email and paste it in a text/HTML/hex editor/converter,
such as IDM Computer Solutions’ UltraEdit.
System 127
System
• Step 3. Open a new edit, paste the certificate contents, and press ENTER at the end of the contents
to add an empty line.
• Step 4. Convert file format from DOS to UNIX. Open File menu > Conversions > DOS to Unix.
System 128
System
• Step 5. Save the edit using the “.crt” extension, using a file name like “CAcert.crt.”
• Step 6. Return to the original firmware session, use the “More” icon > “Copy & Upload” button to
locate the crt certificate file, and click Create to enable the certification.
System 129
System
IEEE 802.1x
Enable this function if your network environment uses IEEE 802.1x, which is a port-based network access
control. The network devices, intermediary switch/access point/hub, and RADIUS server must support and
enable 802.1x settings.
The 802.1x standard is designed to enhance the security of local area networks, which provides authenti-
cation to network devices (clients) attached to a network port (wired or wireless). If all certificates between
client and server are verified, a point-to-point connection will be enabled; if authentication fails, access on
that port will be prohibited. 802.1x utilizes an existing protocol, the Extensible Authentication Protocol (EAP),
to facilitate communication.
The components of a protected network with 802.1x authentication:
Supplicant:
A client end user (camera), which requests authentication.
VIVOTEK Network Cameras support two types of EAP methods to perform authentication: EAP-PEAP and
EAP-TLS. Please follow the steps below to enable 802.1x settings:
• Step 1. Before connecting the Network Camera to the protected network with 802.1x, please apply a
digital certificate from a Certificate Authority (i.e., your network administrator) which can be vali-
dated by a RADIUS server.
System 130
System
• Step 2. Connect the Network Camera to a PC or notebook outside of the protected LAN. Open the
configuration page of the Network Camera as shown below. Select EAP-PEAP or EAP-TLS as the EAP
method. In the following blanks, enter your ID and password issued by the CA, then upload related
certificate(s).
• Step 3. When all settings are complete, move the Network Camera to the protected LAN by connect-
ing it to an 802.1x enabled switch. The devices will then start the authentication automatically.
Note:
The authentication process for 802.1x:
• Step 1. The Certificate Authority (CA) provides the required signed certificates to the Network Cam-
era (the supplicant) and the RADIUS Server (the authentication server).
• Step 2. A Network Camera requests access to the protected LAN using 802.1X via a switch (the
authenticator). The client offers its identity and client certificate, which is then forwarded by the
switch to the RADIUS Server, which uses an algorithm to authenticate the Network Camera and re-
turns an acceptance or rejection back to the switch.
• Step 3. The switch also forwards the RADIUS Server’s certificate to the Network Camera.
System 131
System
• Step 4. Assuming all certificates are validated, the switch then changes the Network Camera’s state
to authorized and is allowed access to the protected network via a pre-configured port.
Access List
This feature is particularly useful in environments where the camera is exposed to a larger network or the
internet, ensuring only trusted devices or networks have access.
System 132
System
Enable IP Filter
A toggle switch to activate or deactivate the IP filtering feature.
Policy
Allow:
Permits only the specified IP addresses to access the camera. All other IPs are denied.
Deny:
Blocks the specified IP addresses from accessing the camera. All other IPs are allowed.
IP Address
A section to define up to 10 IP addresses or ranges that are either allowed or denied access based on the
selected policy.
IPv4 List
Displays the list of configured IP addresses or ranges, and the entries can be removed using the trash
bin icon next to each address. Each entry can represent:
A single IP address (e.g., 192.168.0.1).
A network IP address (e.g., 192.168.0.1/24).
A specific IP range (e.g., 255.168.0.1-255.168.0.255).
Steps to add an IP address into Access List:
Step 1. Click “+Add” button to open the “Add IP Address” window
Step 2. From the IP Type dropdown menu, choose the desired type:
IPv4: For standard IPv4 addresses or ranges.
Step 3. From the Rule dropdown menu, select one of the following options:
Single: To allow or deny a single IP address.
Network: To allow or deny access for an entire subnet.
IP Range: To define a specific range of IP addresses.
Step 4. Enter the IP Address:
Based on the selected rule, input the relevant details in the IP Address field:
For Single: Enter one IP address (e.g., 192.168.0.10).
For Network: Enter an IP address and its subnet mask.
For IP Range: Enter the starting and ending IP addresses.
Step 5. Click Save to add the IP address or range to the Access List.
System 133
System
Step 6. The new entry will now appear in the IPv4 section of the Access List.
Administrator IP address
The Administrator IP address provides a simple yet effective way to secure administrative access while en-
suring that authorized personnel can always manage the device, even in complex or restricted network envi-
ronments.
System 134
System
Miscellaneous
The Miscellaneous card in the VIVOTEK camera’s settings provides additional security-related options to en-
hance the safety and usability of the device. It focuses on protecting against cross-site request forgery (CSRF)
attacks and managing session timeouts for user accounts.
System 135
System
Manage User Access and Permissions for Enhanced Security and
Control
The User Accounts is critical for managing access to the VIVOTEK camera. It allows the system administra-
tors to create and control user accounts, define permissions, and enforce security measures such as account
blocking, ensuring that the camera is secure, manageable, and accessible only by authorized users.
User
The User card provides essential tools for managing user accounts, ensuring secure access, and assigning
appropriate privileges. It helps maintain a controlled environment by enabling administrators to define
roles, monitor user activity, and enhance security for the camera system.
System 136
System
Step to add an User account:
System 137
System
Step 5. Assign a Privilege Level
Select the desired privilege level for the new user from the Privilege dropdown menu:
Control DO, white-light illuminator, view, listen, PTZ, and talk through the
Viewer
camera interface.
Privilege
The Privilege card in the User Accounts section allows administrators to manage the specific privileges as-
signed to different user roles. This ensures fine-grained control over what actions users can perform, partic-
ularly for users with restricted access levels such as Operator or Viewer.
System 138
System
Account block
The Account Block is a crucial security feature that helps administrators automatically block suspicious login
attempts, effectively preventing brute force attacks and enhancing system security. Through flexible condi-
tion settings and blocklist management, this feature ensures the camera system remains stable and secure
in multi-user environments.
Condition Setting
Enable Account Block
Activates or deactivates the account block feature. When enabled, the system automatically blocks suspi-
cious login attempts based on the defined conditions.
Block Source IP
Blocks the IP address responsible for excessive failed login attempts, restricting further access attempts
from that source.
Consecutive Login Fails
Specifies the number of consecutive failed login attempts that trigger the block. For example, if set to 5,
an IP address will be blocked after 5 consecutive failed login attempts.
Interval of Consecutive Fails
Defines the time frame (in seconds) within which consecutive failed attempts are counted as a trigger for
blocking.
Block Time
Sets the duration (in seconds) for which the offending IP address will remain blocked. For example, if set
to 300 seconds, the IP address will be unable to attempt further logins for 5 minutes.
System 139
System
Block List
Displays a list of currently blocked IP addresses or user accounts:
Name: Shows the username affected by the block.
Source IP: Indicates the IP address that triggered the block.
Ending Time: Displays the exact time when the block will expire.
Unblock:
Allows administrators to manually remove a blocked IP or account from the list.
System 140
System
Firmware Updates and Configuration Management for System
Maintenance
The Maintenance offers a centralized hub for managing firmware updates, backing up and restoring con-
figurations, and resetting the system to factory defaults. These tools ensure the VIVOTEK camera operates
efficiently, stays updated, and is easy to manage for administrators overseeing surveillance systems.
Maintenance
The Maintenance page under the System category provides tools for managing the device’s firmware, con-
figuration, and operational stability. This section enables administrators to perform essential maintenance
tasks to ensure the camera functions optimally. Below is a breakdown of its functionality and purpose:
Device
The Device card provides tools for firmware updates, system reboots, and factory resets. These functions
ensure the camera remains updated, functional, and ready for new configurations or troubleshooting when
necessary.
System 141
System
Upgrade Firmware
Keeps the camera up to date with the latest features, performance improvements, and security patches.
Ensures compatibility with new technologies and enhanced system functionality.
Displayed Information:
Current firmware version (e.g., 1.2402.43.01g) is shown for reference.
Action:
Clicking the Upgrade button allows users to upload a new firmware file and update the device.
Reboot
Restarts the camera to refresh its system processes without altering configurations. Useful for applying
changes or resolving temporary issues.
Action:
Clicking the Reboot button triggers a restart of the camera.
Export files
The Export Files card is designed to provide administrators with tools to export important data from the
camera, such as configuration settings and status reports. These features help in creating backups, diag-
nosing issues, or replicating settings across multiple devices.
System 142
System
Export Server Status Report
Generates and exports a report containing the camera’s operational status, including diagnostics and
logs. This is useful for:
Analyzing performance and identifying potential issues.
Sharing status information with support teams or system administrators for troubleshooting.
Action:
Clicking the Export button downloads the server status report for further analysis.
Upload files
The Upload Files card allows administrators to restore or apply preconfigured settings to the camera by
uploading a configuration file. This feature is particularly useful for system recovery or deploying stan-
dardized configurations across multiple devices.
System 143
System
Optimized Storage Solutions for Reliable Video Recording and
Data Retention
The Storage section offers a comprehensive suite of tools to manage and optimize the camera’s storage re-
sources. Whether utilizing internal memory, SD cards, or external NAS devices, this section ensures reliable
video recording and efficient data retention. With features like cyclic storage, reserved space settings, and
automatic cleanup, administrators can ensure continuous operation and maximize storage capacity effort-
lessly.
Storage settings
The Storage settings is designed to manage storage devices and optimize the storage space used for video
recording, file saving, and system operations. This section provides administrators with tools to monitor,
clean, and configure storage options, ensuring the camera operates efficiently and retains critical data.
Internal storage
The Internal storage card is designed to manage and monitor the camera’s internal memory usage. It pro-
vides an overview of the storage capacity, current usage, and tools for maintaining storage efficiency by
removing unnecessary files.
System 144
System
Storage Overview
Displayed Information:
Total Capacity: Displays the total storage capacity of the internal memory (e.g., 1.92 GB).
Used Size: Indicates the amount of storage currently being used (e.g., 0.27 GB).
Usage Bar: Visually represents the proportion of used and available storage.
Clean Up
Frees up internal storage by deleting unnecessary files, such as:
System temporary files.
Files uploaded via FTP.
Action:
Clicking the Clean Up button initiates the cleanup process, clearing the designated files and making more
space available for important data.
SD card
The SD card allows administrators to manage and monitor the SD card’s usage, status, and settings. This
functionality is crucial for ensuring reliable data storage and maintaining continuous video recording or
file saving.
Status
Displays the current status of the SD card (e.g., “Detached” if no card is inserted or recognized).
Actions:
Use the Format button to erase all files and initialize the SD card for use.
System 145
System
Enable Cyclic Storage
Enables automatic overwriting of the oldest data on the SD card when it is full, ensuring continuous re-
cording.
Action:
Toggle this feature on or off to control storage behavior.
System 146
System
NAS
The NAS card allows administrators to integrate a Network Attached Storage (NAS) device for extended
and scalable storage. This feature ensures that the camera’s storage capacity can be expanded and data
can be securely stored in a centralized location.
NAS Status
Displays the connection status of the NAS device (e.g., “Detached” if no connection is established).
Actions:
Click + Add to configure and connect a NAS device.
System 147
System
NAS Configuration Steps
Step 1. Open NAS Storage Settings:
Click + Add in the NAS card to open the configuration window.
Step 2. Set Network Storage Location:
Enter the path to the NAS storage folder (e.g., \\NASDevice\SharedFolder).
Step 3. Enter Workgroup (Optional):
If required, specify the workgroup to which the NAS device belongs.
Step 4. Provide User Credentials:
Input the Username and Password needed to authenticate and access the NAS device.
Step 5. Test the Connection:
Click Test to ensure the camera can successfully connect to the specified NAS location.
Step 6. Save Configuration:
Click Save to apply the settings and establish the connection.
System 148
System
Effortless Management and Retrieval of Recorded Media
The File section offers a user-friendly interface for managing recorded media files. With search and filtering
tools, users can locate specific recordings based on storage type, trigger events, media format, and time
frame. It also allows locking files, exporting recordings, and converting media for efficient handling and pres-
ervation. This ensures organized storage and quick access to important data.
File
The File section enables users to efficiently search, filter, and manage recorded media files. Key features
include advanced search criteria, file locking for data retention, and options to export or convert recordings.
Its primary purpose is to streamline media organization, ensure secure storage, and support quick access
for detailed analysis.
Search criteria
Allows users to refine their search for recorded files based on specific parameters, making it easier to
locate relevant recordings.
Search Filters:
• Storage: Filter by storage type (e.g., SD card, NAS, or all storage devices).
• Trigger Type: Search for files triggered by specific events (e.g., motion detection, manual recording).
• Media Type: Filter by the type of media (e.g., video clips, snapshots).
• Time Frame: Specify a time range (e.g., last 24 hours, custom time range) to narrow the search.
System 149
System
Search Results
File Name:
Name of the recorded file.
Storage:
Indicates the storage location of the file (e.g., SD card).
Trigger Type:
Shows the event that triggered the recording (e.g., motion detection).
Start and End Time:
Provides the time range for each recording.
Media Type:
Specifies the type of media file (e.g., video clips).
System 150
System
Note:
File Lock/Unlock button:
Locked files, identified by a lock icon, are protected from automatic deletion, and their retention can be
managed using the lock/unlock button.
Play button:
Only files with recorded data and playback permission will display the Play button.
JPEGs to AVI
The JPEGs to AVI functionality allows users to convert sequential JPEG image snapshots into a playable
AVI video format. This feature is particularly useful for scenarios where users need to review footage as a
continuous video instead of analyzing individual images.
Steps to Use JPEGs to AVI:
Step 1. Click “JPEGs to AVI” button.
Step 2. Selection Feature Activation:
A checkbox is displayed next to each snapshot file, allowing users to manually select which files to in-
clude in the AVI conversion.
System 151
System
Step 3. Two new buttons appear:
Combine
This button allows the user to confirm and initiate the conversion process. It is enabled only after at
least one file is selected.
Cancel
Clicking this button exits the conversion mode, clearing all selections and restoring the original file view.
Step 4. Start combining into a single AVI file.
System 152
System
Monitoring and Managing System Logs and Parameters
Effective system management relies on the ability to monitor and analyze detailed logs and parameters.
This section provides tools to view and manage system, access, and configuration logs, enabling users to
diagnose issues, track activity, and maintain optimal performance. With features like remote log server
integration and parameter management, this chapter equips administrators with the necessary controls to
ensure security and operational efficiency in both standalone and multi-camera setups.
Logs
The Logs provides users with comprehensive tools to monitor and manage system activities, user access,
and configuration changes on the camera. By offering both real-time local log viewing and the ability to inte-
grate with a remote log server, this tab helps users troubleshoot issues, track security events, and maintain
compliance with operational policies. It is an essential resource for ensuring system reliability, enhancing
security, and supporting centralized log management in multi-device setups.
System 153
System
Steps to set up the Remote log server:
Step 1. Click “+Add” button.
Step 2. In the IP address text box, enter the IP address of the remote server.
Step 3. In the port text box, enter the port number of the remote server.
Step 4. When completed, click Save to enable the setting.
Logs
The Logs provides users with detailed records of system activities, access attempts, configuration chang-
es, and application performance. It simplifies troubleshooting by helping users identify issues, enhances
security by monitoring access, and ensures transparency in configuration management. This feature is es-
pecially useful for maintaining system stability, tracking unauthorized access, and diagnosing application
or configuration-related problems. The Logs consists of the following categories, each designed to record
specific types of information:
System:
Records key system activities, including device startup, reboot, error messages, and mode switching, to
help determine system stability and identify potential issues.
System 154
System
Access:
Logs all access attempts to the camera, including login and logout operations, making it useful for moni-
toring unauthorized access attempts and ensuring system security.
System 155
System
Set Parameter:
Tracks all configuration changes made to the system, assisting users in reviewing and managing adjust-
ments while facilitating troubleshooting of configuration-related issues.
System 156
System
VADP:
Logs related to the VIVOTEK Application Development Platform, documenting the execution of applica-
tions on the camera (if applicable) and helping to diagnose application development and runtime issues.
System 157
System
Audit log
The Audit log focuses on recording all administrative operations and activities performed on the camera. Its
purpose is to track user behavior, enhance system security, ensure management transparency, and meet
compliance requirements. By logging detailed user actions, it helps administrators analyze issues, trouble-
shoot errors, and provide reliable historical data for audits.
Audit log
Provides detailed records of each administrative action, including the following fields:
Time:
The specific time the action occurred.
Event:
The type of action performed (e.g., “User_Login” for logins, “Set_Parameters” for parameter adjustments).
User Name:
The username of the person performing the action (e.g., “root”).
IP:
The IP address of the device initiating the action.
Detail:
Detailed descriptions of the actions, such as “Allow access HTTP” or “User set parameters.”
System 158
System
Export Functionality:
The Export to CSV button allows users to export audit logs as CSV files for archiving, sharing, or further
analysis.
System 159
System
Parameter
The Parameter is designed to display the system parameters and configuration details of the camera, pro-
viding administrators with a centralized view of the device’s operational status, settings, and technical infor-
mation. Its main purpose is to serve as a diagnostic tool, facilitate technical support, and assist in configura-
tion backup and recovery.
System 160
System
Customizing Interface Appearance and Branding with Theme Set-
tings
The Theme settings section allows users to personalize the camera’s interface to suit their preferences and
enhance the user experience. By providing options to toggle between light and dark modes, users can adapt
the interface for different lighting conditions. Additionally, the ability to upload a custom logo and config-
ure a hyperlink enables businesses and projects to showcase their brand identity directly within the system
interface. This feature combines functionality and customization, ensuring both usability and a professional
presentation.
Theme settings
The Theme settings consists of two sections: Theme and Logo, each providing specific customization options
to enhance usability and branding.
Theme
Allows users to switch between Light and Dark interface display modes to adapt to different working envi-
ronments, enhancing user comfort and reducing eye strain in varying light conditions.
Light Mode:
Designed with a light background, ideal for bright environments.
System 161
System
Dark Mode:
Uses a dark background, reducing glare and improving visibility in low-light conditions.
How to Operate:
Step 1. Select the desired mode (Light or Dark) by clicking the corresponding option.
Step 2. The interface preview changes dynamically to reflect the selected theme.
Step 3. Click the Save button to apply the changes.
Logo
Enables businesses or users to personalize the interface with their custom logo, enhancing brand recog-
nition and professionalism, while also providing the option to configure a clickable hyperlink for the logo
that redirects users to a specific webpage, such as a company website or support page.
Allows users to upload a custom logo file in JPG format for personaliza-
Upload a file (*.JPG)
tion.
System 162
System
Logo link:
Enables users to assign a hyperlink to the logo, redirecting to a specific webpage (e.g., company website).
Note:
Display
The selected or uploaded logo will appear on the title bar of the interface, making it visible to all users, and clicking it will redirect
them to the configured URL.
System 163
Appendix A:
DI/DO Configuration Guide
The DI/DO (Digital Input/Digital Output) interface in VIVOTEK cameras allows seamless integration with
external devices such as relays and alarms, enabling enhanced automation and monitoring capabilities. This
guide illustrates three configurations: Dry Contact and Wet Contact, each tailored to specific application
needs.
• Key features
The camera’s DO+ pin controls the relay via a photocoupler, providing electrical isolation.
The relay can control an external AC power source, which must include a Protected Earth (PE) connec-
tion for safety.
Ideal for environments where the relay requires a dedicated DC power source.
Appendix A 164
Appendix A:
DI/DO Configuration Guide
2. Wet Contact with External DC Power Source
Wet contact simplifies the connection by allowing the camera’s DO+ pin to directly power the relay with-
out requiring an additional external DC power source.
• Key features
The camera’s DO+ output directly powers the relay, reducing wiring complexity.
A transient voltage suppression diode is recommended to protect against voltage or current spikes.
The relay can control the ON/OFF state of external AC-powered devices.
Appendix A 165
Appendix A:
DI/DO Configuration Guide
3. Dry Contact Using the Camera’s DO+ Pin
This configuration also employs a dry contact setup but relies entirely on the camera’s DO+ output to sup-
ply the relay, making it ideal for applications without an external DC power source.
• Key features
The camera’s DO+ pin provides 12V output with a maximum load of 50mA to power the relay.
The relay controls external AC-powered devices, with grounding ensured through a Protected Earth (PE)
connection.
Simplifies wiring while requiring compatibility with the relay’s specifications.
Appendix A 166
Appendix A:
DI/DO Configuration Guide
General Considerations:
1. DO+ and DO- Specifications:
DO+: Provides 12V output voltage with a maximum load of 50mA.
DO-: Supports up to 30V DC when powered by an external source.
2. Relay Compatibility:
Ensure the relay used matches the camera’s output specifications.
Use a transient voltage suppression diode to protect against electrical spikes when using individual
relays.
3. Application Flexibility:
These configurations support various applications, including triggering alarms, controlling devices.
Use a transient voltage suppression diode to protect against electrical spikes when using individual
relays.
This guide provides a detailed overview of DI/DO configurations, enabling safe, reliable, and flexible in-
tegration with external devices. For further details or troubleshooting, consult the device’s user manu-
al or contact technical support.
Appendix A 167
www.vivotek.com
DESIGN AND SPECIFICATIONS ARE SUBJECT TO CHANGE WITHOUT NOTICE
Copyright © 2025 VIVOTEK INC. All rights reserved.