Contents

Dahua ISC-M6550A Screening Machine User's Manual PDF

1 of 172
1 of 172

Summary of Content for Dahua ISC-M6550A Screening Machine User's Manual PDF

Users Manual

AI Single-energy Security Screening Machine Users Manual

V1.0.0

ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.

Users Manual

I

Foreword

General

This manual introduces the installation, functions, and operations of the AI Single-energy Security

Screening Machine (hereinafter referred to as the "Device"). Read carefully before using the device,

and keep the manual safe for future reference.

Application Scope

This manual is mainly applicable to the following persons:

Administrator and operator of ISC series AI single-energy X-ray security screening machine.

Models

ISC-M6550A

ISC-M5030A

Safety Instructions

The following categorized signal words with defined meaning might appear in the manual.

Signal Words Meaning

DANGER

Indicates a high potential hazard which, if not avoided, will result in death or

serious injury.

WARNING

Indicates a medium or low potential hazard which, if not avoided, could result

in slight or moderate injury.

CAUTION

Indicates a potential risk which, if not avoided, could result in property

damage, data loss, reductions in performance, or unpredictable results.

TIPS Provides methods to help you solve a problem or save you time.

NOTE Provides additional information as the emphasis and supplement to the text.

Users Manual

I

UI Icon/Button

Icon/Button Description

Add: Click it to unfold the hidden application interface. You

can view or activate the application.

Help: Point to it, and the interface shows guiding

information.

, Expand: Click it and the hidden menu items are displayed.

Check box that allows for selecting multiple menu items

simultaneously. means the item is selected.

Radio button that allows for selecting a menu item.

means the item is selected.

Drop-down list: Click it, and the drop-down menu items are

displayed.

indicates the corresponding function is disabled.

indicates the corresponding function is enabled.

Search bar: Enter the keyword, and then click .

Matching information is displayed.

Textbox: Allows for entering numbers, letters, Chinese

characters, symbols, and more.

Refresh: Click it to get the latest saved settings.

Cancel: Click it to cancel unsaved settings and return to the

previous menu interface.

Close: Click it to close the window.

Revision History

Version Revision Content Release Time

V1.0.0 First release. March 2022

Privacy Protection Notice

As the device user or data controller, you might collect the personal data of others such as their

face, fingerprints, and license plate number. You need to be in compliance with your local privacy

protection laws and regulations to protect the legitimate rights and interests of other people by

implementing measures which include but are not limited: Providing clear and visible

identification to inform people of the existence of the surveillance area and provide required

contact information.

Users Manual

II

About the Manual

The manual is for reference only. Slight differences might be found between the manual and

the product.

We are not liable for losses incurred due to operating the product in ways that are not in

compliance with the manual.

The manual will be updated according to the latest laws and regulations of related

jurisdictions. For detailed information, see the paper users manual, use our CD-ROM, scan the

QR code or visit our official website. The manual is for reference only. Slight differences might

be found between the electronic version and the paper version.

All designs and software are subject to change without prior written notice. Product updates

might result in some differences appearing between the actual product and the manual.

Please contact customer service for the latest program and supplementary documentation.

There might be errors in the print or deviations in the description of the functions, operations

and technical data. If there is any doubt or dispute, we reserve the right of final explanation.

Upgrade the reader software or try other mainstream reader software if the manual (in PDF

format) cannot be opened.

All trademarks, registered trademarks and company names in the manual are properties of

their respective owners.

Please visit our website, contact the supplier or customer service if any problems occur while

using the device.

If there is any uncertainty or controversy, we reserve the right of final explanation.

Users Manual

III

Important Safeguards and Warnings

This section introduces content covering the proper handling of the Device, hazard prevention,

and prevention of property damage. Read carefully before using the Device, and comply with the

guidelines when using it.

Operation Requirements

WARNING

Before operating the Security Screening Machine, receive relevant training in radiation

protection according to the requirements of local laws and regulations. If necessary, report

the installation and operation of the Device to the local authority and conduct a radiation

safety inspection. The dose rate of the Device outer surface needs to be checked regularly.

WARNING

Before operating the Security Screening Machine, know the relevant regulations and

requirements for radiation protection.

WARNING

Do not drop or splash liquid onto the Device, and make sure there is no object filled with

liquid on the Device to prevent liquid from flowing into the Device.

WARNING

Operate the Device within the rated range of power input and output.

WARNING

Do not use the Device and contact the local after-sales service department when the external

cables, conveyor, lead curtains or indicator of the Device are damaged.

WARNING

Do not open the enclosure to operate the internal components. If the components need to be

installed or changed, contact the local after-sales service department according to the

information on the front page of this manual.

WARNING

Do not make any part of the human body (or other living bodies) enter the tunnel when the

Device starts to work.

WARNING

Disconnect the power supply to ensure safety during daily cleaning and maintenance of the

Device,

CAUTION

Users Manual

IV

Only after receiving Device operation training can the user operates the Device.

CAUTION

Do not place or install the Device in a place exposed to sunlight or near the heat source.

CAUTION

Keep the Device away from dampness, dust or soot.

CAUTION

Use the Device Indoor use only.

CAUTION

Keep the Device installed horizontally in a stable place to prevent it from falling.

CAUTION

Do not place the Device at places difficult to operate the disconnection device.

CAUTION

Install the Device in a well-ventilated place, and do not block the ventilation of the Device.

CAUTION

Do not disassemble the Device.

CAUTION

Transport, use and store the Device under the allowed humidity and temperature conditions.

CAUTION

Arrange a person on duty when the Device starts to work.

CAUTION

Place the inspected items on the conveyor or the roller table according to the requirements of

the prompt signs at the entrance of the Device tunnel.

CAUTION

Watch the position of the inspected items after the conveyor starts to avoid blocking the

tunnel or falling of the inspected items.

Electrical Safety

WARNING

Use the power adapter provided with the Device; otherwise, it might result in people injury

and device damage.

WARNING

Connect the device (type-I structure) to the power socket with protective grounding.

Users Manual

V

WARNING

Connect the Device to the power socket with protective grounding: otherwise, the user is

responsible for all the results.

CAUTION

Use the battery according to the requirements; otherwise, there might result in explosion.

When replacing the battery, make sure the same type is used. Improper battery use might

result in fire, explosion, or inflammation.

CAUTION

Follow the instructions to dispose of the used battery.

CAUTION

Use the recommended power cables in the region and conform to the rated power

specification.

CAUTION

The power source shall conform to the requirement of the Safety Extra Low Voltage (SELV)

standard, and supply power with rated voltage which conforms to Limited power Source

requirement according to IEC60950-1. Please note that the power supply requirements are

subject to the device label.

CAUTION

The circuit breaker is a disconnection device. When using the circuit breaker, keep the angle

for easy operation.

Warning Labels on the Device

Description Label Label Position

Danger electric shock

External surface of the

Device

Danger warning

Caution exercise

External surface of the

X-ray generator and X-ray

controller

Danger radiation

Entrance&Exit of the

Device inspection tunnel

Users Manual

VI

Description Label Label Position

Film safety

Entrance&Exit of the

Device inspection tunnel

Requirements of package

placement.

Entrance&Exit of the

Device inspection tunnel

Forklift

Forklift entry point on the

Device enclosure.

Watch your hand. Surface of the conveyor

cover

This product and - if

applicable - the supplied

accessories too are marked

with "CE" and comply

therefore with the

applicable harmonized

European standards.

Outer box label and

nameplate.

2012/19/EU (WEEE

directive): Products marked

with this symbol cannot be

disposed of as unsorted

municipal waste in the

European Union. For proper

recycling, return this

product to your local

supplier upon the purchase

of equivalent new

equipment, or dispose of it

at designated collection

points. For more information

see:

Outer box label and

nameplate.

Users Manual

VII

Description Label Label Position

http://www.recyclethis.info.

Users Manual

VIII

Table of Contents

Foreword ............................................................................................................................................................ I Important Safeguards and Warnings ............................................................................................................. III Part1: Product Introduction ............................................................................................................................ 1 1 Overview ................................................................................................................................................... 1

Introduction ................................................................................................................................................................................. 1 Functions ....................................................................................................................................................................................... 1 Packing list .................................................................................................................................................................................... 2

2 Dimensions and Structure ............................................................................................................................ 3 Dimensions ................................................................................................................................................................................... 3 Cable Ports .................................................................................................................................................................................... 3 Indicators....................................................................................................................................................................................... 4

Part2: Operator ................................................................................................................................................. 6 3 Display and Control ....................................................................................................................................... 6

Emergency Stop Button and Indicator .............................................................................................................................. 6 3.1.1 Emergency Stop Button ............................................................................................................................................. 6 3.1.2 Power Indicators ............................................................................................................................................................ 6 3.1.3 X-Ray Generator Indicator ......................................................................................................................................... 6 3.1.4 Power Input ..................................................................................................................................................................... 7 3.1.5 Key Switch ....................................................................................................................................................................... 7 3.1.6 Power Switch .................................................................................................................................................................. 8

Operation Keyboard.................................................................................................................................................................. 8 3.2.1 Control Keys .................................................................................................................................................................... 9 3.2.2 Function Keys ................................................................................................................................................................. 9 3.2.3 Image Processing Keys.............................................................................................................................................. 11

4 Basic Operations .......................................................................................................................................... 13 Power on...................................................................................................................................................................................... 13 Login and Logout ..................................................................................................................................................................... 13

4.2.1 Logging in ...................................................................................................................................................................... 13 4.2.2 Logging out .................................................................................................................................................................. 15

Warming up ................................................................................................................................................................................ 15 Object Placement..................................................................................................................................................................... 16 Object Scanning ....................................................................................................................................................................... 17 Shut down .................................................................................................................................................................................. 18 Basic Information Search ....................................................................................................................................................... 18

4.7.1 Baggage Search ........................................................................................................................................................... 18 4.7.2 Report Search ............................................................................................................................................................... 21

5 Image Processing and Live View ................................................................................................................. 23 Live View ...................................................................................................................................................................................... 23 Security Screening Mode ...................................................................................................................................................... 23 Image Processing ..................................................................................................................................................................... 27

5.3.1 Image Enhancement ................................................................................................................................................. 27 5.3.2 Image Correction ........................................................................................................................................................ 34

Users Manual

IX

5.3.3 Force Scan ...................................................................................................................................................................... 35 Monitoring Mode ..................................................................................................................................................................... 35

6 Maintenance ................................................................................................................................................ 36 Cleaning External Surface of the Device ......................................................................................................................... 36 Cleaning IR Sensor on Conveyor Side............................................................................................................................... 36 Cleaning Display Screen ........................................................................................................................................................ 37 Inspecting Conveyor ............................................................................................................................................................... 37 Inspecting the Lead Curtain at Tunnel Entrance and Exit. ........................................................................................ 37 Inspecting X-ray and Power Indicator .............................................................................................................................. 37 Emergency Stop Button ........................................................................................................................................................ 37

7 FAQ1 ............................................................................................................................................................. 39 When the key switch is turned on and the power button is pressed, the indicator doesn't work and

the Device cannot be powered on ........................................................................................................................................... 39 No generated images on the display screen ................................................................................................................. 40 Conveyor doesnt work .......................................................................................................................................................... 40 Device automatically power off during running. ......................................................................................................... 41

Part3: Administrator ...................................................................................................................................... 41 8 Daily Operations .......................................................................................................................................... 41

Basic Settings ............................................................................................................................................................................. 41 8.1.1 Device Initialization .................................................................................................................................................... 41 8.1.2 Quick Configuration ................................................................................................................................................... 44

Login and Logout ..................................................................................................................................................................... 46 8.2.1 Logging in to Local Interface .................................................................................................................................. 46 8.2.2 Login in to Web Interface ......................................................................................................................................... 47 8.2.3 Logging out .................................................................................................................................................................. 48

Baggage Statistics .................................................................................................................................................................... 48 8.3.1 Baggage Search ........................................................................................................................................................... 48 8.3.2 Report Search ............................................................................................................................................................... 51 8.3.3 Voice Broadcast............................................................................................................................................................ 52 8.3.4 Configuring Detection Parameters ...................................................................................................................... 55 8.3.5 Configuring Suspect Item ........................................................................................................................................ 55 8.3.6 Security Screening ...................................................................................................................................................... 57

Video Playback .......................................................................................................................................................................... 60 8.4.1 Playback ......................................................................................................................................................................... 60 8.4.2 Clipping Recording .................................................................................................................................................... 64 8.4.3 Image Playback ............................................................................................................................................................ 64 8.4.4 Exporting Files ............................................................................................................................................................. 67

9 Settings ........................................................................................................................................................ 69 Device Management............................................................................................................................................................... 69

9.1.1 Managing Device ........................................................................................................................................................ 69 9.1.2 Managing Camera ...................................................................................................................................................... 70

Network Management ........................................................................................................................................................... 96 9.2.1 Modifying IP Address................................................................................................................................................. 96 9.2.2 Setting Port Number ................................................................................................................................................. 98 9.2.3 Configuring Email ....................................................................................................................................................... 99 9.2.4 Setting SWITCH ......................................................................................................................................................... 101

Users Manual

X

9.2.5 Configuring Auto Register .................................................................................................................................... 102 9.2.6 Configuring UPnP .................................................................................................................................................... 102

Storage Management .......................................................................................................................................................... 103 9.3.1 HDD ............................................................................................................................................................................... 103

Event .......................................................................................................................................................................................... 106 System ....................................................................................................................................................................................... 109

9.5.1 Setting System Parameters .................................................................................................................................. 109 9.5.2 Setting time ............................................................................................................................................................... 110 9.5.3 Display Output .......................................................................................................................................................... 111 9.5.4 Setting Schedule ...................................................................................................................................................... 113

Account Management ........................................................................................................................................................ 114 9.6.1 User Group ................................................................................................................................................................. 115 9.6.2 User Access ................................................................................................................................................................. 117 9.6.3 User ............................................................................................................................................................................... 118 9.6.4 ONVIF User ................................................................................................................................................................. 123

Security Management ......................................................................................................................................................... 125 9.7.1 Setting IP Access Authority .................................................................................................................................. 125 9.7.2 Setting Safety Protection ...................................................................................................................................... 127 9.7.3 Setting System Service .......................................................................................................................................... 127 9.7.4 Setting Firewall ......................................................................................................................................................... 128 9.7.5 HTTPS ........................................................................................................................................................................... 129

10 Operation and Maintenance Management ........................................................................................... 134 Log Search ............................................................................................................................................................................. 134 10.1.1 System log ................................................................................................................................................................ 134 10.1.2 User Operation Log............................................................................................................................................... 135 10.1.3 Event Log .................................................................................................................................................................. 135 10.1.4 Link Log ..................................................................................................................................................................... 136

Online User............................................................................................................................................................................ 137 Maintenance ......................................................................................................................................................................... 138 10.3.1 Upgrade .................................................................................................................................................................... 138 10.3.2 Factory Default ....................................................................................................................................................... 139 10.3.3 IMP/EXP ..................................................................................................................................................................... 140

Notification Center ............................................................................................................................................................. 140 Device Diagnosis................................................................................................................................................................. 141 10.5.1 X-ray System Diagnosis ....................................................................................................................................... 141 10.5.2 IR Sensor Diagnosis .............................................................................................................................................. 142 10.5.3 One-Click Diagnosis.............................................................................................................................................. 143

Logout/Rebooting/Shutting .......................................................................................................................................... 144 11 FAQ2 ......................................................................................................................................................... 146

The conveyor works normally, but the baggage image is not generated .................................................... 146 The conveyor suddenly stops during the working process. ............................................................................... 147 No AI overlay after scanning baggage. ...................................................................................................................... 148

Dimension Diagram of Applicable Models ............................................................................. 150 Terminologies and Abbreviations ........................................................................................... 152 RAID .......................................................................................................................................... 153 Total HDD Capacity Calculation............................................................................................... 155

Users Manual

XI

Cybersecurity Recommendations ........................................................................................... 156

Users Manual

1

Part1: Product Introduction

1 Overview

Introduction

The intelligent security screening system is a new security screening device that uses X-ray to

quickly inspect baggage and goods without opening the packages. The Device adopts advanced

X-ray image detection system, with efficient semiconductor detector, digital image processing

technology, and computer image display technology, to provide users with an efficient, reliable

and high-quality image processing system with service functions. The Device has a large HDD

capacity that can store no less than 1 million high-definition images, with reliable intelligent

recognition and alarm against prohibited goods, person-package linkage, image enhancement,

network expansion and interconnection, automatic detection and maintenance, and other

functions. In addition, its simple and user-friendly operation design makes the user operation

more convenient and efficient.

It is suitable for the security screening of handbags, briefcases, mailing bags, express mails and

small parcels. It is mainly used in the security screening of various scenes such as government

office buildings, court, procuratorates, convention and exhibition centers, and large-scale events.

Functions

Supports using X-ray to generate images of packaged passing the conveyor, and check the

shape and material composition of the items of the package.

Supports Image enhancement, such as high penetration, super enhancement, light, scanning.

Supports security screening mode, superimposed monitoring on the security screening

interface and monitoring mode.

Supports the analysis of the scanned image, Al recognize the prohibited objects such as knife,

liquid, spray-can, gun, lighter.

Supports setting danger level for prohibited objects and and can be linked with voice

prompts, sound and light alarms, conveyor stop, etc.

Supports AI overlay on suspect objects. The AI overlay square moves with the package.

Supports storage of all test results and statistics into reports, which can be queried and

exported through different categories and time periods.

2 Built-in cameras at the exit and entrance of the conveyor to monitor the entire security

screening process.

Supports system abnormal alarm (including no HDD, storage failure, IP conflict, MAC conflict,

etc.).

Supports HDD storage space management, etc.

Supports management of users and user groups.

Users Manual

2

Supports system operation and maintenance management, such as searching log and online

user search, and upgrading device.

Packing list

Refer to the following checklist to check the package. If you find device damage or component loss,

contact the after-sales service.

Table 1-1 Checking list

No. Item Description

1 Overall

packing

Appearance Obvious damage

Packaging Accidental impact

Accessories ( see packing list) Complete or not

2 Main

body

Appearance Obvious damage

Model Whether consistent with the order

contract

Labels on the Device

Whether the labels are torn off.

Do not tear off and discard the labels. Or

the warranty to this Device will be

compromised. You might be asked to

provide the serial number of this Device

when you call the after-sales service.

Users Manual

3

2 Dimensions and Structure

Dimensions

AI single-energy security screening machine (mm [inch])

This section takes ISC-M5030A as an example. For the details of other models, see Appendix 1.

Cable Ports

Cable ports

Users Manual

4

Table 2-1 Description of External Cable Connection

NO. Port Name Description Model

1 Fuse

The fuse switch is on when it is in up position.

The Device can be normally powered on only

when the switch is turned on.

The position of the fuse

varies from different

security screening

machines, the real

equipment shall prevail.

2 Power port Connect the power cable.

The position of the

power port varies from

different security

screening machines, the

real equipment shall

prevail.

3

Power cable of

the display

screen

The machine is equipped with power cable

for display screen.

ALL

3 Alarm indicator

cable Connect the alarm indicator device.

ALL(optional)

3 USB cable Connect to mouse, PC keyboard, operation

keyboard, USB flash,etc.

ALL, 2.

3 HDMI video

output cable

HDMI output port for connecting the output

display.

ALL

3 Network cable Connect the Device to the Internet ALL

In Figure 2-1, applicable models are as follows: ISC-M5030A/ISC-M6550A.

ALL means all models are applicable.

Indicators

Indicators on one side of the Device body are as follows. And the other side is the same.

Users Manual

5

Indicators (One side)

There are two X-ray indicators (red) on the upper part of the Device. In working status, the red

indicators are on when X-ray is triggered; the indicator lights are off when X-ray is turned off.

There are two power indicators (green) on the lower part of the Device. When the Device is

started, the green indicators are on; when the Device is upgraded or fails, the green indicators

flash.

Figure 2-3 takes Model ISC-M5030A as an example. As is shown in the figure, it is the baggage

entrance, and there are one power indicator and one X-ray generator indicator, which is the same

at the exit.

Users Manual

6

Part2: Operator

3 Display and Control

Emergency Stop Button and Indicator

3.1.1 Emergency Stop Button

Emergency stop button

3.1.2 Power Indicators

The power indicator shows whether the power of the Device is turned on. If the POWER green

indicator is on, it indicates the power of the Device is connected.

Power Indicator

3.1.3 X-Ray Generator Indicator

X-Ray Generator Indicator is used for warning and displaying the X-Ray emission. If the X-Ray red

indicator is on, it indicates X-Ray is emitting.

Users Manual

7

X-Ray indicator

3.1.4 Power Input

After the Device is connected to the power supply, dial the fuse upwards.

Power input

3.1.5 Key Switch

After finishing power connection, pull the fuse upward, turn the key switch clockwise from OFF to

ON.

Power input

Users Manual

8

3.1.6 Power Switch

After finishing power connection, pull the fuse upward, turn the key switch clockwise from OFF to

ON, press the power button, the button light is on, and the security screening machine is powered.

Power input

Operation Keyboard

Operation keyboard

Users Manual

9

3.2.1 Control Keys

Table 3-1 Special keyboard description

NO. Name Description

1 Function keys For details of function keys on the special keyboard,

see3.2.2Function keys.

2 Conveyor control keys

Rotate the rollers reverse. When the rollers are rotating

forward, press the reverse rotation key to stop the conveyor.

Stop rotating the rollers.

Rotate the rollers forward. When the rollers are

reversely rotating, press the forward rotation key to stop the

conveyor.

3 Custom function keys

Default function shortcuts

F1Light

F2Dark

F3High penetration

You can set different functions for F1, F2, and F3 as required.

In the live view pop-up window, F1 is OK, and F2 is Cancel.

4 Image processing

keys

For details of function keys on the special keyboard, see3.2.3Image

Processing Keys.

3.2.2 Function Keys

For details of function keys, see the following table.

Table 3-2 Description of function keys

Keys Function Description

Digital Zoom

If there are relatively thin or small objects that are not easy

to recognize in the scanned image, you can use this

function to zoom in a local region of the scanned image.

There is a fixed square area, move the square to the

image, the image inside the square will be enlarged for

operators to further confirm the details.

Press this key for the first time to enable digital zoom

with 2x zoom times.

Press this key for the second time to enable digital

zoom with 4x zoom times.

Press this key for the third time to disable digital

zoom.

Users Manual

10

Keys Function Description

Menu Press this key on any menu interface to switch to the main

menu interface.

Image

Management

Press this key on any menu interface to switch to the

baggage search interface.

Function

Switch

Numeric keyboard is for number by default. Press this key

to switch among numbers, lowercase letters, and

uppercase letters in sequence.

Shift does not affect the input state of the local virtual

keyboard of the server.

Exit

Press this key on any menu interface to switch to the live

view interface. Exit all image enhancement states and

effects of zooming in and zooming out (the default state

is a color image with 1x zoom multiple)

New Line

In the live view interface, press this key to jump to a new

line. (When in web logging in, after enter the username,

press Tab to jump to password line.)

Delete

In the input interface, press the key to delete the input

content.

Previous Bag

The previous image playback ends once the conveyor is

restarted.

Click the key to see the previous image with fixed

speed.

Click and hold for continuous playback.

Next Bag

The next image playback ends once the conveyor is

restarted.

Press this key to play back the next image.

Press and hold this key to quickly play back next

images.

Vertical Flip Press this key to flipped upside down the image on the

screen.

Image

Correction Press this key to correct the image.

Users Manual

11

Keys Function Description

/

Zoom in/out

Zoom in and out on the image with the default max zoom

times of 8x, which can be modified to 64x.

After zooming in, the zoom times are displayed in

the status bar, at the same time, the focus of the

current zoomed-in region (the red square circled

area) is displayed on the small map in the lower left

corner.

After zooming in, you can move the focus position by

pressing the direction keys on the keyboard,

dragging the red square circled area on the small

map, or dragging the image of real-time baggage

area. The image of real-time baggage area can only

be dragged when the conveyor stops.

You can drag the image border with the mouse or

scroll the wheel to zoom in or out on the image.

Normal

(Screen

Adaptation)

If the image display is not 1x, press this key to change the

image display scale to the original scale 1:1.

Direction

Keyboard

After zooming in, you can use these buttons to

adjust the position of the zoomed-in region,

including four directions: up, down, left, right.

Numeric

Keyboard

In text box, you can enter the corresponding

numbers, uppercase and lowercase English letters by

pressing 09 keys on the corresponding numeric

keyboard. As is shown in the left picture.

In text box, after enter shift, 0 key on the numeric

keyboard can be used as a space.

Enter: When F1 is used as the OK key, the function is

the same as F1.

3.2.3 Image Processing Keys

After an image processing key is triggered, the corresponding processing result of the current

image is displayed in the status bar. For details of image processing keys, see the following Table.

Table 3-3 Description of image processing keys

Keys Function Description

Color/Black &

White

Switch between color display and black & white display. Press

this key once to display the image in black & white; Press it

again to display the image in color.

Users Manual

12

Keys Function Description

Inverse Color Enable/disable image inverse color. Press this key once to

achieve inverse color; press it again to exit the inverse color.

Super

Enhancement

Enable/disable super image enhancement. Press this key once

to start super enhancement; press it again to exit super

enhancement.

Image Scan

It's used for displaying the result of scanned images under

different absorption rate.

Press this key for the first time, and the absorption rate

starts to decrease to the minimum value, and then starts

to increase to the maximum value, for cycle display.

Press this key for the second time to stop the image

transformation effect.

Press this key for the third time to exit the image scan

state.

High Penetration Enable/disable high penetration. Press this key to enable

high/low energy image processing.

High Density Alert Enable/disable high density alert. Press this key to enable high

density alert.

Pseudo Color

Enable/disable image pseudo color.

Press this key to enable pseudo color; press it again to exit the

function.

Edge Enhancement

Enable/disable the image function of edge enhancement.

Press this key to enable edge enhancement; press it again to

exit the function.

Light Enable/disable light.

Press this key to enable light; press it again to exit the function.

Dark Enable/disable dark.

Press this key to enable dark; press it again to exit the function.

AI Single-energy Security screening machine does not include the following functions: Low

penetration ; Organic Stripping ; Inorganic Stripping ; Mixture Stripping ;

Density Threat AlertZ7/Z8/Z9.

Users Manual

13

4 Basic Operations

You must initialize the Device for first-time use, and do some basic settings such as data collection,

display, and inspection.

Power on

Before powering on this Device, finish the connection of all cables. For details, see 2.2 Cable ports.

Insert the plug of the power cable of the Device into the power supply socket to ensure

that the power supply is normal.

After connecting the power cable, turn on the power switch (turn the fuse upwards) to

turn on the Device.

Insert the key into the key socket in the upper left corner of the Device, and turn the key

clockwise to the position "ON".

When the key switch is in the "ON" position, press this key to power on and start the

system, the green indicator will be on and the Device will be powered on. The login in

interface displays after the system startup animation ends.

Please make sure that the power cable has been connected to a power output socket with a

protective grounding connection.

Before starting the Device, make sure that the supply voltage input meets the power supply

requirements.

In order to ensure the stable operation of the equipment and prolong the service life of the

hard disk drive (HDD), it is recommended that you refer to international standards and

provide a power input with stable voltage value and low ripple interference; if the power

supply is unstable, it is recommended to add a UPS.

To ensure the safety of the Device, connect the other cables of the device before turning on

the power.

Login and Logout

This section introduces how to log in and log out in the case of one or two display monitors:

Logging in to local Interface: For first-time login or switching to a new user account, login in

on one monitor, and then the other monitor logs insimultaneously.

Log out: Log out on one monitor and the other monitor logs out simultaneously.

4.2.1 Logging in

Users Manual

14

By default, live view is only allowed after login in. If Live View Control is enabled in System

Settings > System Settings, the Live View interface can be displayed without login in.

This manual takes the live view after default login in as the example.

Power on the Device.

Local login

Enter the username and password.

The operator enters username and password.

Click Login.

Local security screening interface

Users Manual

15

4.2.2 Logging out

At the lower-left corner of the live view interface , select the username in the login

status, select Log Out, and then the system returns to the login interface.

Warming up

The device will perform self-test to automatically determine whether warm-up is required every

time when it is started. X-ray generator warm-up can gradually increase the operating voltage,

thus ensuring normal operation of the generator and extending its service life.

Log in to the system to perform self-test. If the Device is not used for a long time, the

warm-up of the X-ray generator will be started.

Clear the tunnel

Clear the tunnel

Click / or press / on the operation keyboard, and the conveyor

moves to the left or right to convey the items in the tunnel.

When all items are cleared from the tunnel, click or press on the operation

keyboard to stop the conveyor.

Click OK. Warm-up of the X-ray generator starts.

Warm-up time varies from the intervals between power off last time and power on this

time.

Warming up

Users Manual

16

Table 4-1 Description of warm-up time

Interval Warm-up time 0 Day < Y < 3 Days 0 minutes

3 Day < Y < 30 Days 5 minutes

30 Day < Y < 90 Days 10 minutes

Y 90 days 50 minutes

The Image Correction interface is displayed after the warm-up ends.

Image correction

Click Correction to finish image correction.

When the device is in normal use and the power-on interval does not exceed 3 days, the device is

turned on normally. After the clear tunnel is displayed, directly enter the device correction

interface. After the correction is completed, the live view interface is displayed (will not enter the

warm-up process).

Object Placement

Scanned objects should be put stably on the conveyor or the roller table according to the object

placement sign .

Users Manual

17

Object placement

WARNING

The inspected objects must be placed outside the lead curtain! It is strictly forbidden to reach into

the detection tunnel!

Avoid falling or accumulating the inspected objects at the exit of the equipment. Once it happens,

stop the conveyor immediately.

Light and thin objects, dirty objects, or objects with damaged packaging need to be placed in a

suitable plastic container for scanning.

Object Scanning

After logging in, operators finish system setting and warm-up. The system starts to scan

the objects when it displays READY in the system status bar.

After pressing or , conveyor starts to work. Place the inspected objects in the

center of the conveyor and it will pass through the tunnel along the conveyor.

According to the image of the inspected object, click the corresponding image function

button on the operation keyboard to recognize image.

After the inspected object is moved out of the tunnel along the conveyor, click on

the keyboard to stop the conveyor. When inspection is done, the scanned objects can be

taken out or further inspected.

Users Manual

18

Shut down

Before shutting, confirm that scanning is done and no objects on the tunnel.

Click on the operation keyboard to confirm the conveyor has been stopped.

When turning the key switch counterclockwise to the "OFF" state, the indicator on the

right side of the key hole turns off, and the Device starts to shut down.

After Step 1, you can use the lower-left corner of the live view interface to select the

logged-in username, and select Shut to perform a soft shutdown of the Device. After the

soft shutdown ends, you still need to go back to Step 2.

As the Device needs to save scanned data and exit the operating system, do not

immediately disconnect the external power supply of the Device.

Disconnect the external power supply only after the indicators on the machine are off and

the shutdown is complete.

Remove the key from the operation keyboard and keep it in a safe place.

Basic Information Search

4.7.1 Baggage Search

Search and count all scanned baggage, and view relevant videos.

Procedures

Click on the homepage.

Users Manual

19

Homepage

Select BAGGAGE MANAGEMENT > BAGGAGE SEARCH.

Baggage search

Set the query period, select the Category, enter Confidence, and then click Query.

The End Time must be later than the Start Time. The longest period for query is 30

days.

The default category is All. Types of item include guns, explosives, knives, lighter,

spray cans, liquid, electronic products, umbrellas, brass knuckles, handcuffs,

nightsticks and uncategorized items.

Users Manual

20

Baggage search results: single view

Single-view security screening machine: only single picture display

Related Operations

View recordings: See Figure 4-8 Baggage search, select queried pictures and click in the

square on the left side of the interface to play the recordings linked with the baggage 10s

before and after the baggage passes the screening machine.

The associated recording channel has been configured. For more details, see 8.3.6Security

Screening. The first installation administrator setup is completed by the admin.

View details: Click a queried picture and the system displays the baggage details.

Baggage details

Users Manual

21

Operators only have the access to Query and cannot Export. Click Export, and it will

display a prompt No access.

4.7.2 Report Search

Select BAGGAGE MANAGEMENT > REPORT SEARCH.

Report search

Set the query period, select the category of item, and then click Query.

Line chart

Click Data and the system displays data in the form of report.

Report

Users Manual

22

Operators only have the access to Query and cannot Export. Click Export, and it will display a

prompt No access.

Users Manual

23

5 Image Processing and Live View

Live View

The live view interface can be set as Security Screening Mode or Monitoring Mode as needed.

For more details, see Part3 Administration 9.5.3Display Output. The mode is set by the

administrator before the Device leaving the factory.

Security Screening Mode

After setting the prohibited items recognition strategy, you can view the detection images and

snapshots of suspect items on the live view interface. The software interface has the same image

and operation function icons as the operation keyboard, which achieves same functions. For more

details, see 3.2.2Function keys and 3.2.3Image Processing Keys.

Security screening mode

Table 5-1 Security screening mode interface description

NO. Name Description

1 Real-time baggage

area

Scroll display the live scanning image from the Device. For more details,

see Table 5-2.

2 Baggage

thumbnail

The baggage thumbnail displays the position of the current preview

screen in the overall screen.

After overall zoom, the tracking square is used to display the position of

the current screen in the overall area. The tracking square is red in the

playback state, and blue in the real-time package scanning state.

3 Login user Click this icon and you can modify user password, lock down user, log out,

reboot or turn off the Device.

Users Manual

24

NO. Name Description

4 Baggage statistics

Display the number of temporary baggages(the statistics starts from the

Device is powered on) or the number of cumulative baggages (the

statistics starts from the Device leaves the factory).

5 Zoom in times Display zoom in times. The default maximum zoom-in is 8 times, and the

maximum zoom-in is 64 times.

6

Custom

functions(F1/F2/F3

custom function

keys)

Click this icon to enhance the configured images. For details,

see9.5.3Display Output.

This icon corresponds to the functions of F1, F2, and F3 keys on the

keyboard.

7 Scan direction: Set scan direction on the screen. It supports single direction scan.

8 Conveyor status Display the current movement direction of the Device conveyor.

9 Device working

status

It displays the working status of the Device (normal/fault).

Preparation: Device powering on and warm up

Correction: Device correcting

Diagnosis: Device diagnosing

Ready: When the software is running and the conveyor is not started,

Ready is displayed. Meanwhile, if force scan is enabled, Ready [C] is

displayed.

Waiting for scanning: The rollers rotates, no baggage on the

conveyor.

Scanning: The rollers rotates and X-ray starts to scan the baggage.

Continuous scanning: Force scan starts and the roller rotates.

Stop: Stop the conveyor.

10

Image

enhancement

button

Up to 12 image enhancement buttons are displayed on the interface by

default. You can modify the display of buttons in the display output

configuration. Default configurations: energy enhancement, light,dark,

pseudo color, scanning, edge enhancement, super enhancement, color/

black & white, inverse color, organic stripping, vertical flip, image

correction. For details, see5.3Image Processing.

Place the mouse cursor over the icon to display the corresponding

function name. See 3.2.3 Image Processing Keys.

The display of image enhancement buttons is related to the screen

resolution.

1080P: 12 function icons are displayed in the same row on the

interface.

1280*1024: 12 function icons are displayed in two rows. The first six

functions are displayed in order on the interface. Click to pop up the

list of the other six functions.

11

Image

enhancement

status bar

Display image enhancement status. When there is an fault of the Device

function, the fault information prompt will be displayed.

Users Manual

25

NO. Name Description

12 Conveyor control

buttons

Conveyor rotates backward

Stop the conveyor

Conveyor rotates forward

13 System time Display the current time of the operating system.

14 Menu

Click this icon to enter the setting interface.

Enter the setting interface, network, alarm, storage, user and basic

system setting can be set.

Enter the setting interface, click LIVE in the upper left corner to

return to the the live view interface.

15 Notification bar

Display the number of the notification. Click to see all the notifications.

The button displays the total number of the current

notifications. If the number is 0, the window is hidden.

Click the notification bar to view all the notifications.You can also

view three types of messages by classification system error,

system warning), system notification).

After the notification bar is unfolded, it will retract if the cursor leaves

for 3s. Click the lock button to prevent the message bar from

automatically retracting. You can manually close it by clicking .

Click to delete an alarm message. Click to clear all the

notifications.

16 Previous and Next

You can view the last 30 baggage images after startup. Click the previous

icon to see the previous image with fixed speed; Click the next icon to see

the next image with fixed speed; Click and hold for continuous playback.

This function can also be used by clicking , keys on the

operation keyboard.

17 AI overlay switch

Click this icon to enable/disable the AI overlay square of the prohibited

objects, and configure whether to display item name, text background,

and similarity. Click this icon to turn on/ turn off this function.

Users Manual

26

Notification bar

Image enhancement button(1080P)

Image enhancement button (1280 1024

Table 5-2 Description of the real-time baggage area display

Type Description

Displayed

content

For every suspect item, its type and confidence level are displayed by default.

You can set whether to display the type and confidence level in AI Overlay. Click

to configure whether to display item name, text background and similarity,

disabled by default.

Danger level

If several prohibited items exist in the same bag, the danger level is judged

according to the item with the highest danger level. For example, if a bag has both

high risk items and safe items, the bag image is displayed on the high risk area on

the left of the scanned baggage records.

The background color of prohibited item images means the danger level:

Red: High risk

Orange: Warning

Dark gray: Safe

Light gray: Unclassified

Users Manual

27

Image Processing

5.3.1 Image Enhancement

Image processing function area interface Image processing functions can be operated not only on

the software interface, but also directly through the special keyboard of the Device.

Image enhancement

Click an icon for the first time, the image is highlighted; click the icon again, the image is not

highlighted. The image is colored by default.

Image enhancement takes effects on the whole baggage area. All image enhancement

functions take effects in the real-time baggage area whether the baggage normally passes or

not.

Image enhancement only takes effects for security security screening mode. If the security

screening mode is an auto mode, the image enhancement key takes effect. If it is custom

mode (such as black & white mode; custom mode can be set in the display output

configuration), the image enhancement key does not take effect.

Click to select image enhancement function, and click again to cancel the corresponding

image enhancement functions. Image enhancement functions can also be canceled by

on the operation keyboard.

5.3.1.1 Color/Black & white

The color images not only show the absorption of X-ray by substances, but also show the material

composition of the substances. To better identify dangerous items, scanned objects will be

categorized into organic substance, mixture and inorganic substance, and marked in orange,

green and blue respectively according to their composition for easier recognition to operators.

The brightness of each color corresponds to the thickness and density of the substances. The

thicker the substances and the greater the density, the darker the colors.

The image is displayed in color by default. Click Color/Black & White icon or press on the

special keyboard to switch between color image and gray image.

Users Manual

28

Comparison of color image and black & white image

5.3.1.2 Partial Enhancement

Partial enhancement can brighten darker areas in the image, so that the objects hidden behind

thick objects can be clearly displayed without affecting normal image areas.

In normal image display, click to switch the image to partial enhancement state; click the

icon again to return the image to normal display state.

Color image/image partial enhancement (partial enhancement)

5.3.1.3 Super Enhancement

Through super enhancement, the images of penetrable objects (such as clothing and silk threads)

and impenetrable objects (such as thick metal plates and frozen products) can be clearly displayed

on the screen at the same time. Even low-density materials (such as clothing) hidden between the

metal plates are clearly visible.

As a comprehensive image processing function, super enhancement obtains the best contrast of

each point in the image, the best image details and edge information through the calculation and

statistics of the contrast of each small image area.

During image display, click the Super Enhancement icon or press on the special keyboard to

enhance details of the image, so that the objects hidden behind thick objects can be clearly

displayed. Click the icon or press the key to display the image in super enhancement state. Click

the icon or press the key again (or press ESC) to end super enhancement.

Users Manual

29

Color image/image super enhancement (super enhancement)

5.3.1.4 Edge Enhancement

Compared with the default original image effect, the edge enhancement function enhances the

edges display in the image, especially the display of weak edges, making the structure and contour

information in the image more prominent and clear.

During image display, click to enable edge enhancement. Click the icon or press the key

again (or press ESC) to end edge enhancement.

Color image/Image edge enhancement

5.3.1.5 Image Scan

Image scan function separately displays the details of objects with different material thicknesses in

the image. After enabled, the function periodically changes the absorption rate of the object

image to observe details of each part of the image, with a certain contrast reserved outside the

range of absorption rate. You can observe the whole image of the scanned object at any level.

During image display, click the Image Scan icon or press on the special keyboard, the image

automatically changes among different absorption rates for you to observe details of each part of

the image. The set level is 50 (cycle change within the range of -2525).

Click the icon or press the key for the first time to start cycle change.

Click the icon or press the key for the second time to stop cycle change.

Click the icon or press the key for the third time to exit the image effect.

Users Manual

30

Figure 4-11 Color image/image scan

5.3.1.6 Inverse Color

Inverse color function is used to check thin high-density objects (such as metal wires) with an

effect similar to the negative film. The function displays objects with high absorption rate in bright

colors and objects with low absorption rate in dark colors without changing the current color tone.

During image display, click the Inverse color icon or press on the special keyboard, to display

objects with high X-ray absorption rate in bright white and objects with low X-ray absorption rate

in dark black, making small or thin high-density objects (such as metal wires) more clearly visible. It

is the opposite in white inverse display.

Color image /Image inverse color

5.3.1.7 Energy Enhancement

The function of high penetration is used to highlight details in the dark areas of the image. These

dark areas correspond to impenetrable substances with high X-ray absorption rate, which usually

have high density (such as lead and steel) or large thickness.

This function helps to analyze details in the dark areas of the image, so that hazardous goods

hidden inside impenetrable objects can be inspected, while penetrable objects are hidden or

faintly displayed.

During image display, click the High Penetration icon or press on the special keyboard to

enable this function.

Users Manual

31

Color image/high penetration

5.3.1.8 Light/Dark

During image display, click or to lighten or darken the entire image. Click the icon

again to restore normal image display.

Color image/Light

Color image/dark

5.3.1.9 High Density Alert

During image display, click the High Density Alert icon to display the impenetrable areas in the

images of inspected objects in red.

Color image/high density alert for suspect image

Users Manual

32

5.3.1.10 Zoom in/out

To display the image more clearly, you can use the global zoom function. This function can zoom in

on the scanned image as a whole, so that the operator can carefully recognize every detail of the

image.

During image display, click the Zoom in or Zoom out icon or press / on the special

keyboard to zoom in or zoom out. For zoom-in display, see Figure 5-16.

After zooming in by using the global zoom function, use the mouse or press the direction keys on

the special keyboard to drag the image for recognition. At the same time, there is a thumbnail of

the zoomed image at the lower right corner. When zooming in, there is a black square that marks

the image area currently displayed in full screen.

You can scroll the mouse wheel to zoom in or out on the image.

Smooth zoom in for each zoom-in, with up to 64x.

Smooth zoom in for each zoom-in, with at least 1x.

Press on the special keyboard for adapted screen display.

When zooming in, press the direction keys of up , down , left , right

on the special keyboard, and the image will automatically zoom in by 2x and move to

the corresponding direction.

Zoom in

5.3.1.11 Pseudo Color

During image display, click , and the image on the screen will change accordingly. The pseudo

color image displays rich details, thus helping the operator to recognize details of the image.

Users Manual

33

Color image/pseudo color processing

5.3.1.12 Vertical Flip

During image display, click , and the image on the screen is flipped upside down, thus helping

the operator to recognize objects of different shapes.

Vertical flip

5.3.1.13 AI Overlay

Click on the right side of the AI Overlay icon, and then select information to be displayed on

the live view interface, including object name, text background, similarity, and package box. After

selection, the corresponding information is displayed on the live view interface.

AI Overlay setting

During image display, click the AI Overlay icon to enable this function to close the package box,

object name, text background, and similarity on the live view interface. Click the icon again to

disable this function and open information display on the live view interface.

Users Manual

34

AI overlay

5.3.2 Image Correction

During long-term and continuous scanning of scanned objects, the interval of which is too small

(smaller than 20 cm), the image quality becomes poor due to minor changes in the parameters of

the X-ray generator. Enable image correction to improve image quality.

During image display, click to correct the image. Click the icon again, and then select

Continue Correction or Cancel in the prompt box.

The correction process cannot be canceled upon the first startup, but can be canceled during

normal use after startup.

During correction, click the conveyor control button or the corresponding control

key on the special keyboard to control the conveyor, ensuring that the tunnel is cleared.

During image correction, the system will automatically determine whether there are packages left

in the tunnel. If yes, check the tunnel and ensure it is cleared before connection.

Users Manual

35

5.3.3 Force Scan

Disabled by default.

The function of force scan is used to detect and recognize ultra-thin objects.

Click Force Scan icon or press on the special keyboard to enable this function, the X-ray

works continuously once the conveyor is started. Click the icon or press the key again to disable

force scan. After the function is disabled, the X-ray is triggered only when the conveyor is started

and an object passes the IR sensor.

Monitoring Mode

According to the settings of monitoring mode, live views of the linked channels are displayed.

Monitoring mode

Manual snapshot: Point to the video window, and click to capture pictures. Manual recording: Point to the video window, click and the system starts recording. The

length of the recording is displayed at the upper-left corner of the video window; click again

and the recording stops.

Users Manual

36

6 Maintenance

Routine maintenance must be carried out during system operation in a prevention-oriented

principle. It is one of the important links to use and operate the system in a reasonable manner.

Cleaning External Surface of the Device

During long-term operation of the Device, there will be dust and dirt on its external surface. To

ensure normal operation, the external surface of the Device shall be regularly cleaned.

Use a slightly damp towel to clean the external surface of the Device.

Clean the enclosure and pole of the Device.

Before cleaning the external surface of the Device, you need to turn off the power and disconnect

the Device from the external power supply.

Cleaning IR Sensor on Conveyor Side

The IR sensor is blocked or clogged. After the conveyor is started, the Device immediately

generates X-ray for scanning. Check the system settings, if Force Scan is not enabled, the IR sensor

might be blocked or clogged.

Turn off the Device, and then remove the special keyboard key and carry it with you. Check the IR

sensor status. The IR sensor is located on the inner wallof the tunnel inside the lead curtain.

Check whether the IR sensor is blocked, which affects its signal accuracy. You can gently clean the

IR sensor surface with slightly damp cotton balls.

Cleaning IR sensor on the conveyor side.

Users Manual

37

Cleaning Display Screen

During long-term operation of the Device, there will be dust or fingerprints on the display surface,

affecting the resolution of the object image to be judged by the operator. You can use special

detergent for display to clean the screen when the display is powered off and then adjust its

brightness.

Inspecting Conveyor

During long-term inspection, the conveyor might deviate from the tunnel center. If the motor side

is exposed due to the left or right deviation of the conveyor, the conveyor needs to be adjusted.

Contact professional maintenance personnel to adjust the operation status of the conveyor, or

carefully read the maintenance manual.

Inspecting the Lead Curtain at Tunnel Entrance and

Exit.

If the lead curtain has large gaps, falls off or is damaged, contact professional maintenance

personnel to replace or repair it.

Before inspecting the lead curtain, the Device should be powered off. And the operator must wear

gloves when adjusting the lead curtain.

Inspecting X-ray and Power Indicator

The system administrator and maintenance personnel can inspect the X-ray indicator status

through corresponding operations in the diagnosis and maintenance program.

Emergency Stop Button

The emergency stop buttons on the Device enclosure and console are key safety Devices. If the

switch is loose or the enclosure is damaged, immediately stop the Device, and contact professional

maintenance personnel to maintain or replace the corresponding emergency stop button. The

Device cannot be used until the button is repaired.

After maintenance, press the emergency stop button. At this point, if the motor inside the system

stops rotating and the X-ray generator stops generating X-ray, and a prompt will appear on the

Users Manual

38

screen that an emergency stop button is pressed is displayed, it means that the button works

normally.

Users Manual

39

7 FAQ1

When the key switch is turned on and the power button

is pressed, the indicator doesn't work and the Device

cannot be powered on

Possible cause

The power cable plug of the Device is loose.

The circuit breaker at the power input end is not closed or the fuse is open.

Troubleshooting:

1. Please first check whether the power cable plug of the Device has been inserted into the

power socket normally or not. If the plug is loose, please reinsert it.

2. Use tools to open the enclosure where the circuit breaker and fuse are installed on the

equipment, check whether the circuit breaker is off and whether the fuse is on. If the fuse is

burned out, replace the Device with components of the same specification.

3. Rotate the key switch on the Device again, if the indicator on the right is on, the Device can be

started, and the fault is eliminated.

Troubleshooting:

The position of the power supply and the circuit breaker vary from models. If the errors cannot be

eliminated according to the above steps, please contact professional maintenance personnel.

Users Manual

40

No generated images on the display screen

Possible cause:

Power switch of the display screen is off;

Power plug of the display screen is loose;

HDMI cable of the display screen is loose.

Troubleshooting:

1. Please check the power switch of the display screen to confirm the switch is on and the

indicator lights up at this time.

2. Please check whether the display screen cable plug is loose or not. If there is a problem,

please reinsert it and rotate the screws on both sides of the plug to make it firm.

3. Observe the display screen, if the image is generated, the fault is eliminated.

If the errors cannot be eliminated according to the above steps, please contact professional

maintenance personnel.

Conveyor doesnt work

Click or , but the conveyor doesnt work.

Possible cause:

The emergency stop button is pressed by mistake or the safety interlock is triggered by mistake.

Troubleshooting procudures:

1. Please check whether the system status bar displays the prompt Emergency stop button is triggered. If this prompt appears, follow the steps below to deal with it.

2. Check the emergency stop button of the equipment enclosure. If any switch is found to be

pressed down, please turn it clockwise to reset.

3. Observe whether the Emergency stop button is triggered prompt on the system status bar

disappears. If it disappeared, press the conveyor control button again, and the conveyor starts

to run. If the message Security inspection machine enclosure is open appears, please

follow the steps below again deal with.

4. Check whether the equipment enclosure is installed in place one by one. If any enclosure is

found to be loose, please fix and install it again.

5. Observe whether the message Security screening machine enclosure is open on the

system status bar disappears. If it disappeared, press the conveyor control button again, and

the conveyor starts running.

Users Manual

41

The positions and numbers of emergency stop switches vary from different types of security

screening machine.

If the errors cannot be eliminated according to the above steps, please contact professional

maintenance personnel.

Device automatically power off during running.

When the Device is running, the display suddenly goes black and the power indicator of the

Device goes out.

Possible cause:

The external power supply of the device is loose, and the circuit breaker or fuse is disconnected.

Troubleshooting:

1. Please check whether the external power cable plug and power socket of the equipment are

loose or not.

2. If there is no abnormality in the external power supply of the equipment, you need to check

whether the equipment circuit breaker or fuse is disconnected, use a tool to open the

enclosure where the circuit breaker and fuse are installed on the equipment, and check

whether the circuit breaker is off or whether the fuse is complete.

If the errors cannot be eliminated according to the above steps, please contact professional

maintenance personnel.

If the errors are not covered by this manual, please contact professional maintenance

personnel.

Part3: Administrator

8 Daily Operations

Basic Settings

8.1.1 Device Initialization

Users Manual

42

When starting the Device for the first time or restoring factory defaults, you shall set the login

password of the administrator account ("admin " by default), and the time zone and time. You can

set the password protection method as necessary.

Do not power off the Device during initialization.

Power on the Device.

Read and click I agree the agreement to agree, and then click Device initialization.

Time

Select the Time Zone and Date/Time, and then click Next.

Device initialization

Set the admin login password and configure the parameters.

Table 8-1 Descriptions of password setting parameters

Parameter Description User The default username is admin.

Users Manual

43

Parameter Description

Password

Confirm

password

The password should consist of 8 to 32 non-blank characters and contain at least

two types of characters among upper case, lower case, number, and special

charactersexcluding',",;,:,&. Please set a high-security password

according to the password strength prompt.

Enter the password, press and hold , and the password becomes visible.

Release the left mouse button or move the mouse pointer elsewhere, and the

password become invisible again.

Prompt

question

After setting the Prompt Question, move the mouse pointer over on the

login interface. The system displays the prompt question you have set to help

you recall the password.

Click Next. Password protection

Set password protection. For more details, see Table 8-2.

After setting password protection, you can reset the admin login password by using

reserved email or security question if the password is lost. For details, see 9.6.3.4Resetting

Admin Password.

Click to disable the setup of the Reserved Email and Security Questions if you do not

want to set password protection.

Table 8-2 Password protection description

Users Manual

44

Password Protection Method

Description

Reserved email

Set reserved email. To reset the admin login password, you need to scan the QR

code, then type the security code the reserved email received.

After the setup, you can modify the reserved email on the Attribute interface.

For details, see 9.6.3.2 Modifying User.

Security

questions

Set the security questions and answers. Provide correct answers to the security

questions and you can reset the admin password.

Click Finish.

Click Enter Quick Settings to set the basic information of the Device. For more details, see

8.1.2Quick Configuration.

Initialization completion interface

8.1.2 Quick Configuration

After the Device is initialized, you can quickly set the IP address on Quick Configuration interface.

On the Successfully initialized the device interface, click Enter Quick Settings

Users Manual

45

IP setting

Set IP address

Only 1 Ethernet Port of the equipment. Before setting IP address, confirm the ethernet

port has already connected to the Internet.

1) Click the icon corresponding to the network port.

2) Parameter

Table 8-3 Descriptions of NIC editing

Parameter Description

Speed Maximum network transmission speed of current NIC.

Use dynamic IP

address

When there is a DHCP server on the network, select the check box to use

dynamic IP address. System can distribute a dynamic IP address to the Device.

There is no need to set IP address manually.

Use static IP

address

Set static IP address, subnet mask and gateway. It is to set a static IP address for

the Device.

MTU

Set NIC MTU value. The default setup is 1500 Byte.

We recommend that you check the MTU value of the gateway first and then set

the device MTU value equal to or smaller than the gateway value. It is to reduce

the packets slightly and enhance network transmission efficiency.

Changing MTU value might result in NIC reboot, network offline and affect

current running operation. Be careful.

3) Click OK.

4) The system returns to the IP Set interface.

Set DNS Server parameters.

You can select to obtain the DNS server address automatically or manually enter.

Users Manual

46

When activating the domain name service, this step must not be skipped.

Obtain DNS server address automatically: Select Obtain DNS server address automatically, and then the system automatically gets the IP address of the DNS

server.

Use the following DNS server address: Select Use the following DNS server address,

and then you need to enter the IP address of the preferred DNS and the alternate

DNS.

Set the default NIC

Select Default Ethernet from the Default NIC drop-down list as needed.

Only NIC which has been connected to the network can be used as the Default NIC. Click Finish.

Login and Logout

This section introduces how to log in and log out in the case of one or two display monitors:

Logging in to Local Interface: For first-time login or switching to a new user account, login in

on one monitor, and then the other monitor logs in simultaneously.

Log out: Log out on one monitor and the other monitor logs out simultaneously.

8.2.1 Logging in to Local Interface

By default, live view is only allowed after login in. If Live View Control is enabled in System Settings > System Settings, the Live View interface can be displayed without login in.

This manual takes the live view after default login in as the example.

Power on the Device.

Local login

Users Manual

47

Enter the username and password.

The default username is admin and the password is the login password set during

device initialization. To keep the Device safe, we recommend you to modify the

admin password regularly and properly keep new passwords.

If the login password of the admin account is lost, click Forgot Password? And then

reset the admin password. For details, see 9.6.3.4Resetting Admin Password.

Click Login.

Local security screening interface

8.2.2 Login in to Web Interface

You can use Google Chrome, Firefox, or other browsers to log in to the web interface, and then you

can set up and operate the Device, and maintain the system.

When using a general browser to log in to the web interface, you can only set up the Device,

but cannot play live view. We recommend you to play the live view of the real-time security

screening video through the local interface.

We recommend you to operate in the local interface.

Open the browser, enter the IP address of the Device, and press Enter.

Users Manual

48

WEB logging in interface

Enter the username and password.

The default username is admin and the password is the login password set during

device initialization. To keep the Device safe, we recommend you to modify the

admin password regularly and properly keep new passwords.

If the login password of the admin account is lost, click Forgot Password? And then

reset the admin password. For details, see9.6.3.4Resetting Admin Password.

Click Login.

8.2.3 Logging out

At the lower-left corner of the live view interface , select the username in the login

status, select Log Out, and then the system returns to the login interface.

Baggage Statistics

8.3.1 Baggage Search

Search and count all scanned baggage, and view relevant videos.

Procedures

Click on the homepage.

Users Manual

49

Homepage

Select BAGGAGE MANAGEMENT > BAGGAGE SEARCH.

Baggage search

Set the query period, select the Category, enter Confidence, and then click Query.

The End Time must be later than the Start Time. The longest period for query is 30

days.

The default category is null. Query is possible only after selecting a specific category.

Types of item include guns, explosives, knives, lighter, spray cans, liquid, electronic

products, umbrellas, brass knuckles, handcuffs, nightsticks and uncategorized items.

Users Manual

50

Baggage search results

Single-view security screening machine: only single picture display

Related Operations

View recordings: Select queried pictures and click on the left to play the recordings linked

with the baggage 10s before and after the baggage passes the screening machine.

Prerequisite: The associated recording channel has been configured. For more details, see

8.3.6Security Screening.

View details: Click a queried picture and the system displays the baggage details.

Baggage details

Users Manual

51

Export Checked Items: Select the baggage information to be exported, and click

Export Checked Items to export selected information; enter the password of

the current account on the pop-up window to export checked items to local.

Export All: Click Export All to export all information of queried baggage. Enter

the password of the current account on the pop-up window to export checked

items to local.

If entering the wrong password 5 times continuously, the device will jump to the

login interface.

Only user groups configured with the File Backup permission can export

package files. For how to configure user group permissions, see 9.6.3.1 Adding

User.

8.3.2 Report Search

Support baggage data statistics and displaying data in the form of line chart or report.

Procedures

Select BAGGAGE MANAGEMENT > REPORT SEARCH.

Report search

Set the query period, select the category of item, and then click Query.

Line chart

Users Manual

52

Click Data and the system displays data in the form of report.

Report

Related Operations

Export data:

Click Export Picture to export the line chart.

Click Export Report to export data reports.

8.3.3 Voice Broadcast

Configure the port, voice file, and broadcast rules for voice broadcast. The settings come into effect

immediately.

8.3.3.1 Uploading Voice File

Select BAGGAGE MANAGEMENT > VOICE BROADCAST.

Voice broadcast

Click Upload Voice File and then select voice files to upload.

Users Manual

53

Uploaded voice files are displayed in the list. Click to make an audition of this voice

file.

Voice files are in MP3 format only. A single voice file shall not exceed 32 MB. Up to 50

voice files can be uploaded, provided that the total size does not exceed 200 M.

The Capacity at upper-right corner shows the total capacity of uploaded voice files.

A voice file cannot be deleted if a test voice file is being played.

8.3.3.2 Configuring Voice Broadcast

You can use different voice files to be broadcast in different periods.

Voice Broadcast Rules

Table 8-4 Voice broadcast rules

Use of Audio Ports Audio Broadcast Rules

Broadcast and alarm

share the same audio

port

The alarm has higher priority than the broadcast at the same

playing period.

When the current broadcast is being played and an alarm

comes in, the broadcast stops. After the alarm ends, the

broadcast does not resume playing, but waits until the next

play interval comes.

When an alarm is being played and a broadcast comes in, the

alarm continues, and the broadcast is not played.

When broadcasts and alarms are in queue, use the queue

strategy.

When a broadcast is being played and another comes in, the

latter waits in queue.

When an alarm is being played and another comes in, the

latter waits in queue.

Audition file is activated

when broadcast or alarm

is playing

If you activate audition file when a broadcast or alarm is being played,

the audition file prevails. After the audition file, the interrupted

broadcast or alarm does not resume playing.

Priority of play: Audition file > Alarm > Broadcast.

There is only one audio port in the single-energy security screening machine.

Procedures

Select BAGGAGE MANAGEMENT > VOICE BROADCAST.

Users Manual

54

Voice broadcast

Set the output ports corresponding to broadcast and alarm events.

Set the volume.

Volume 1 corresponds to Output Port 1.

Click Broadcast.

Voice broadcast

Set voice broadcast parameters

The periods between two voice broadcasts cannot be overlaid.

Table 8-5 Set voice broadcast parameters

Parameter Description

Enabled Enable the voice broadcast.

Start time, End time Set the broadcast period in 24-hour format.

Voice file Select uploaded voice files.

Users Manual

55

Parameter Description

Interval

In the preset period, the interval between repeated playback of the

corresponding voice file is in seconds.

The range is from 5 s to 600 s.

Cycle times The number of times for repeatedly playing a voice file in each period.

The upper limit is 5.

Click OK.

Related Operations

Edit: Click corresponding to the voice broadcast and you can edit this broadcast.

Delete: Click corresponding to the voice broadcast and you can delete this broadcast.

8.3.4 Configuring Detection Parameters

Configure the detection of multiple suspect items, and set the linkage alarm when the device

detects the corresponding item.

Select BAGGAGE MANAGEMENT > DETECTION CONFIG > Analysis.

AI Analysis

Set AI Analysis rules.

Table 8-6 AI Analysis Parameters Description

Parameter Description

Sensitivity The higher the sensitivity, the easier the suspect items are detected.

Smart Plan Select a smart plan as required.

Click Save.

8.3.5 Configuring Suspect Item

Default suspect items vary according to different algorithm models. You can modify the suspect

item as needed.

Users Manual

56

Select BAGGAGE MANAGEMENT > DETECTION CONFIG > SUSPECT ITEM.

Suspect Item

Enable the item detection as needed.

means enabled; means disabled.

In the list, click corresponding to the suspect items.

Modification

Configuring suspect iem.

Table 8-7 Descriptions of suspect item parameters

Parameter Description

Enabled The Device starts detecting these items when they are enabled.

Danger level The danger level of suspect items.

Alarm output

Connect an external alarm device (such as an alarm light or siren) to the alarm

output port. Select the checkbox, set the alarm output device, and activate the

alarm action output port. When an alarm event takes place, the system can

associate with corresponding alarm output devices.

Users Manual

57

Parameter Description

Alarm Delay

After the alarm event ends, the alarm will be extended for a period of time to

stop.

The range is from 0 s to 300 s.

Voice prompt

Enable voice prompt, and select the corresponding voice file in the drop-down

list of File Name. When an alarm event takes place, the system plays selected

voice file.

Make sure the corresponding voice file is added. For how to upload voice

files, see 8.3.3Voice Broadcast.

If multiple voice alarms are triggered simultaneously, the previously

triggered voice broadcast must finish playing before the next starts

playing. After the previous voice broadcast is played, if several broadcasts

are in queue, only play the newest.

Conveyor Set the working mode of linkage conveyor after configuring the detection of

such suspect items, normal linkage mode and stop mode are available.

Report to platform

When this function is enabled, information of suspect items is reported to

associated platforms.

Before using this function, make sure the Device is already added to the

platform.

Similarity When the confidence level of the scanned items is equal to or greater than the

preset value, the system reports this alarm information to the platform.

Click OK.

8.3.6 Security Screening

Select the camera channelof the baggage entrance and baggage exit based on the specific

installation of cameras.

The camera at the baggage entrance is pointed at the baggage entrance of the equipment to

monitor the flow of people and baggage; the camera at the baggage exit is pointed at the

baggage exit of the equipment to monitor the flow of people and baggage. When inquiring about

baggage, person-package linkage function can be used.

Select BAGGAGE MANAGEMENT > SECURITY SCREENING.

Users Manual

58

Security screening

Settings of security screening business parameters.

Table 8-8 Description of security screening parameters

Parameter Description

Power Saving Mode

Select to enable the power saving mode. When the mode is enabled, if no new

packages are placed on the conveyor within 15s, the conveyor will

automatically stop until packages are placed on it again.

High Density Alert After selection, when thick impenetrable objects are detected, the objects in

the image are displayed in red.

Vertical Flip After selection, the live view of packages is vertically flipped to help recognize

objects of different shapes.

Max Zoom Times Set the max zoom times of the detection image, which is 8x by default and up

to 64x is supported.

Users Manual

59

Parameter Description

Scan Direction

Set the scan direction of the Device. You can select dual-direction, forward scan

or reverse scan.

Dual direction: The scanned object enters the tunnel from the package

entrance/exit port of the Device, and the package will be displayed in

pictures.

Forward scan: When the scanned object enters the tunnel from the

baggage entrance of the Device, it will trigger the X-ray to scan the

package. When it enters the tunnel from the baggage exit, it will not

trigger the X-ray.

Reverse scan: When the scanned object enters the tunnel from the bag

exit of the Device, it will trigger the X-ray to scan package. When it enters

the tunnel from the bag entrance, it will not trigger the X-ray.

The baggage entrance is the tunnel entrance away from the nameplate label.

Camera for Bag

Entrance Set the cameras corresponding to the bag entrance and bag exit.

Click to review the live videos of corresponding camera channels. Camera for Bag Exit

Click Setting.

Baggage statistics:

Settings of package statistics parameters

Table 8-9 Description of package statistics parameters

Parameter Description

Setting Status Bar Select to display accumulated number of packages or number of temporary

packages.

Restoring the

number of

temporary package

when logging in

After enabled, the counter will be reset after logging in to the Device again.

(Optional) Click Counter Reset to clear the number of temporary packages.

Click OK to save the package statistics parameters.

Click Save.

Users Manual

60

Video Playback

You can search and play back recordings or pictures stored in the Device, and export recordings or

pictures to a specified location.

8.4.1 Playback

Search and play back recordings by camera, recording type, and recording time.

Click on the homepage.

Select PLAYBACK. The system displays the Video Playback interface,

Playback (1)

Select camera on the left, and click the Record below.

Select the recording type and stream type.

Types of recording include all record, manual record, video detection, and IO alarm.

All record: Search all recordings.

Manual record: Search manual recordings by the user.

Video detection: Search linked video detection recordings.

IO alarm: Search linked local alarm recordings.

Query time is set by the following methods:

Method A: Click the date or time in the time frame to modify date or time value.

Method B: Click the date or time in the time frame, rotate the mouse wheel to adjust

date or time values.

Method C: Click , set date and time on the displayed calendar, and then click OK.

On the calendar interface, if a date is underlined by dots (such as ), meaning this date

has recordings.

Users Manual

61

Calendar interface

Click Search.

The system displays the query results. The thumbnails of recordings are displayed at the

top of the interface, and the periods of recordings are displayed on the time bar (green

means recordings exist).

The list at the left side displays the selected cameras. Click a camera and the

corresponding thumbnail of recordings is displayed at the right side.

Click or to display the hidden thumbnails.

Point to the thumbnail to view information of the corresponding recording

including the name of the camera storing this file, start time and end time of the

recording.

Recording query results

Drag the thumbnail to the play window, or double-click the thumbnail.

The system starts playing back the recording. For more details about the description of

playback icons, see Figure 8-10

Users Manual

62

The number of playback windows depends on the number of dragged or selected

thumbnails. Up to 16 windows can be selected. The system automatically adjusts the size

of each playback window based on the original scale of played-back recordings.

Table 8-10 Description of playback control icons

Icon Description

Click the icon to switch to operation synchronization mode. Then you can

control multiple recordings simultaneously, such as fast play and stop at

the same time.

Click to stop operation synchronization.

When multiple recordings are played back at the same time, clicking this

icon to the time sync mode, and all windows play recordings at the same

time point as that of the currently selected window.

Click to stop time synchronization.

Click , and the system enables operation synchronization at the same

time. The only way to cancel operation synchronization is to click .

Click this icon to play back recordings slowly.

Slow playback can reduce the speed to1/2, 1/4, 1/8, and1/16 of the

normal speed.

Click this icon once to reduce the playback speed by one level.

Click this icon if you want to switch to frame-by-frame reverse playback.

This function enables only when playback pauses.

Click this icon to reverse playback, at this time the icon turns to . Click

to stop reverse play.

Click this icon and the recording starts playback, and the icon turns to .

Click to stop.

Click this icon if you want to switch to frame-by-frame playback.

This function enables only when playback pauses.

Click this icon to play back recordings quickly.

Fast playback can accelerate the speed of play to1, 2, 4, 8, 16

times the normal speed.Click this icon once to increase the playback speed

by one level.

Users Manual

63

Icon Description

Shows the playback speed. Drag left or right and the recording is

played in the fast reverse or fast forward mode.

Click this icon to take snapshots.

Click this icon to clip the recording, and save the clipped recording to a

specified location. For details, see 8.4.2Clipping Recording.

Control the volume.

Drag to adjust the volume.

Click to switch to the mute mode, and the icon turns to .

Click to unmute.

Click this icon to display the window in full screen.

Time bar

Display the type of recording and the period of recording.

The time bar shows two recording bars. The upper one displays the

recording time of the selected window, and the lower one displays the

recording time of all selected cameras.

On the time bar, recording types vary from colors. A blank time bar

means there are no recordings.

Time cursor displays the date and time of recording

playback. The time cursor automatically adjusts according to the

playback progress.

The following operations can be done on the time bar:

Click the time bar, rotate the mouse wheel, and adjust the

time accuracy of the time bar.

Press and hold the time bar, drag it left or right to check the

hidden recording time.

Drag the time cursor to adjust the start time of the recording

playback.

Click or drag the time cursor to a position on the time bar

where there is a recording. The system starts playing back

the recording from the located time point.

Click or drag the time cursor to a position where no

recordings exist to stop recording playback.

Users Manual

64

Icon Description

Right-click menu. Right-click the playback window and the system displays

the right-click menu.

Digital: Partially zoom in the recording image and view the details of

this part.

Original: Set the image scale of the playing window.

Enable: The system automatically adjusts the image scale of

the playing window based on the video resolution.

Disable: The system automatically adjusts the size of the

playing window based on the number of selected cameras

and the blank of the play region.

Audio: Set audio output.

Point to the playback window and the system displays the task bar. Click

this icon to close the recording playback window.

8.4.2 Clipping Recording

Clip the recording, and save the clipped recording to a specified location.

When you operate on local interface, connect the USB storage device to the Device.

Select PLAYBACK.

Play back the recording. For details, see 8.4.1Playback.

Click .

The time bar displays recording clip frame, see Figure 8-27.

Recording clip frame

Hold the recording clip frame (such as the blue frame in ), drag it left or right to select the

start time and end time for clipping.

Click Save immediately.

Click Browse to choose where to save the clipped recording.

Click OK.

Save the clipped recording to where you choose.

8.4.3 Image Playback

You can view manual snapshot and video detection snapshot.

Select PLAYBACK.

Select the camera, and then click the Image.

Only one camera can be selected.

Users Manual

65

Image playback1

Select the type of image, including manual snapshot and video detection snapshot.

Query time is set by the following methods:

Method A: Click the date or time in the time frame to modify date or time value.

Method B: Click the date or time in the time frame, rotate the mouse wheel to adjust

date or time values.

Method C: Click , set date and time on the displayed calendar, and then click OK,

see Figure 8-29.

On the calendar interface, if a date is underlined by dots (such as ), meaning this

date has images.

Calendar interface

Click Search.

Users Manual

66

The list at the left side displays the selected cameras. Click a camera and the

corresponding thumbnail of recordings is displayed at the right side.

Click or to display the hidden thumbnails.

Point to the thumbnail to view information of the corresponding recording

including the name of the camera storing this file, start time and end time of the

recording.

Point to the list of thumbnail and the interface displays . Click this icon to

hide the thumbnail list. After hiding the list of thumbnails, click to display

the thumbnail list.

Drag the thumbnail to the play window, or double-click the thumbnail.

The system starts image playback as shown in 8-30. For details, see Table 8-11.

Image Playback

Point to the playing window, and the following icons are displayed.

Table 8-11 Description of Image playback icons

Icon Description

/ Click this icon to switch to the previous or next image.

/

Switch images.

When playing back images one by one, click this icon to switch to the previous or

next image.

When playing back multiple images simultaneously, click this icon to switch to the

previous or next group of images.

Users Manual

67

Icon Description

Click this icon to display the window in full screen. Click again to exit full screen.

8.4.4 Exporting Files

Export recordings or images to a specified location to prevent their loss.

By default, the system exports recordings in the format of DAV, and images in JPG.

When you operate on local interface, connect the USB storage device to the Device.

Select PLAYBACK.

Search recordings or images.

1) Select a camera.

2) Click the Record or Image on the bottom on the interface.

3) Set the search conditions.

4) Click Search.

5) The system displays the thumbnails of searched recordings or images.

Select the thumbnails of recordings or images you want to export.

1) Point to the thumbnail and click to select the thumbnail. means the

thumbnail is selected.

2) Click Select Again and the thumbnails of all recordings or images are canceled.

Click . The system displays Save interface.

In this chapter we take exporting a recording as an example, and the actual interface shall

prevail.

Users Manual

68

Click Save.

Click Browse to choose where to save the clipped recording.

Click OK.

Users Manual

69

9 Settings

Device Management

You can manage the Device or a connected camera.

9.1.1 Managing Device

You can view and modify the information of the Device and storage plans.

9.1.1.1 Device Attributes

You can view the information of the Device such as MAC address, video input and output, and

modify Device name and descriptions.

Click on the homepage, and select Device.

Select the root node from the device list, and then click ATTRIBUTE.

Attribute

Modify the Name and Description, and click Save.

9.1.1.2 Storage Configuration

Set the global recording storage plan and image storage plan based on your needs.

By default, recording and image storage plans set on this interface applies to all added cameras.

You can select a remote device to set the corresponding storage plan. Fore details, see

9.1.2.4.5Storage Configuration.

Users Manual

70

Select DEVICE. Select the root node from the device list, and then click STORAGE.

Storage

Setting system parameters.

Table 9-1 Description of storage parameters

Parameter Description

Recording

Storage

Select the recording plan.

Continuous recording: Camera records 24 hours.

No recording: Camera does not record.

Event recording: Camera records only when an event alarm is

triggered.

Manual record

Settings Set the length of a manual recording.

On the live view interface, if you click to start recording and

do not click the icon again to end recording, the system

automatically ends the recording based on the Manual Record you

set.

Pre-record This parameter is set only when selecting Event Recording.

The range is from 10 s to 30 s.

Image

Manual

snapshot Set the number of images and speed of taking snapshots.

Event

snapshot

Set the interval for taking snapshots when an alarm-triggering

event takes place.

Select Self-defining to customize the interval for taking snapshots.

The longest interval is 3600s.

Click Save.

9.1.2 Managing Camera

Users Manual

71

You can connect cameras to the Device, modifying the IP address and configurations of cameras,

and exporting the information of cameras and more.

9.1.2.1 Initializing Camera

Set the initial login password and IP address of a camera by initializing it. Only an initialized camera

can be connected to the Device.

Click on the live view interface.

Homepage

Select DEVICE.

Device Management

Click Add. Click Start Search.

The system starts searching for cameras and displays the research results.

Users Manual

72

Cameras

Select an uninitialized camera and click Initialize.

By clicking Initialization State and then select Uninitialized, you can quickly screen out

uninitialized cameras.

Device initialization

Users Manual

73

Set the password and password protection method for the camera.

By enabling Using current device password and password protection, the camera

automatically uses Devices admin account information (login password and email). There

is no need to set password and email. You can go to Step 7.

1) Click if you want to cancel Using current device password and password

protection.

Setting password

2) Setting system parameters.

Table 9-2 Descriptions of password setting parameters

Parameter Description Username The default username is admin.

Password Set and confirm the password.

The password should consist of 8 to 32 non-blank characters and contain at

least two types of characters among upper case, lower case, number, and

special characters excluding'";:&. Please set a high-security

password according to the password strength prompt.

Confirm

password

3) Click Next.

Users Manual

74

Password protection

4) Set email.

If you forget the password of the remote device, you can retrieve the password

through the email.

Click Next. Modifying IP

Users Manual

75

Set camera IP address.

If there is aDHCP server in the network, after selecting DHCP, the camera will

automatically obtain a dynamic IP address without entering the IP address, subnet

mask, and default gateway.

If you select Static, you need to input IP address, subnet mask, default gateway.

When modifying multiple cameras at the same time, you need to set the

Incremental Value. The fourth digit of the IP Address is increased in turn

according to the incremental value you set.

If there is IP conflict when modifying static IP address, device pops up IP conflict

prompt. If IP addresses are modified in bulk, device automatically skips the

conflicted IP and begins the IP allocation according to the incremental value.

Click Next. The system starts initializing camera and displays the initialization results.

Click Confirm and add or click OK.

Click Confirm and add to complete the initialization and add the camera. The system

then returns to the Add Device interface.

Click OK to complete the initialization. The system then returns to the Add Device

interface.

9.1.2.2 Adding Camera

The system supports Smart Add, Manual Add, and Import CVS File.

Table 9-3 Methods of adding devices

Adding methods

Description

Smart add

Search for cameras in the same network to filter and add. For details,

see9.1.2.2.1Smart Add.

When you are not sure about the IP address of the camera, use Smart Add.

Manual add

Manually enter the IP address, username, and password of a camera to add the

Device. See9.1.2.2.2Manual add.

When adding a few cameras and their IP address, username, and password are

known, use Manual Add.

Import CVS

file

Fill information of the camera into a template and add the device by importing the

template. For details, see9.1.2.2.3Import CVS file.

When adding cameras in bulk and their IP addresses, usernames, and passwords are

different, use Import CVS File.

9.1.2.2.1 Smart Add

Select DEVICE. The system displays device management interface.

Click Add. The system displays Smart Add interface.

Users Manual

76

Smart Add

Click Start Search.

The system starts searching for cameras in the same network segment and displays the

research results.

Search results

Click and the system displays the live view of the camera.

Users Manual

77

The live view image of a camera can be reviewed only when the cameras user (admin)

password is admin or the same as the user (admin) password of the Device.

Live view

Adding a camera

Add a single-channel camera.

Select a camera, and then click Add. The system starts adding the selected device

and displays the Add confirm interface. See Figure 9-13.

When adding a camera click Cancel and the camera is not added; click Stop to

stop add this camera.

Double-click the address, username, password, manufacturer, and port of the

camera to modify the corresponding information.

When you failed to add a camera, modify the information of the device

according to onscreen instructions. Click Try again and you can add the camera

again.

Users Manual

78

Add confirm(1)

Add a multi-channel camera.

1. After selecting a camera, click Add. The system displays Add confirm interface.

2. Double-click Please select a channel. The system displays Video device

interface.

Video device

3. Select the channel you want to add.

Click and enter keywords into the search bar to quickly locate the channel

you want to add.

4. Click OK to add the selected channel.

Click Continue to add or Finish.

Click Continue to add and then the system adds the current camera. The Add Device interface is displayed, where you can add another camera.

Users Manual

79

Click Finish to complete adding. The Device interface is displayed, where you can

view the information of added camera.

9.1.2.2.2 Manual add

Select DEVICE. Select Add > Manual Add.

Manual add (1)

Click Manual Add.

Users Manual

80

Manual add (2)

Setting system parameters.

Table 9-4 Parameter descriptions

Parameter Description Device type Select the type of the camera. The default type is Devices.

Manufacturer

Select the communication protocol of the camera. The default is Private.

Double-click Private and you can select another protocol.

When adding a stream media device, select Rtsp as the communication protocol,

and enter the RTSP address of the device into the Address item.

Address

Enter the IP address or RTSP address of the camera.

For instance, the RTSP format of the Onvif device is

rtsp:// : @ : /cam/realmonitor?channel

=1&subtype=0.

For instance: rtsp://admin:admin@192.168.20.25:554/cam/realmonitor? channel

=1&subtype=0

Port: 554 by default

Channel: The channel number of the stream media device you need to add.

Subtype: Stream type: 0 means main stream; 1 means sub stream.

Username Enter the username and password of the camera.

When adding a stream media device, no need to set the Username, Password,

and Port. Password

Port Enter the port number of the camera.

Users Manual

81

Parameter Description

Operation

Delete or Add new rows.

Click to delete the camera information. After selecting multiple lines of

remote device information, click Delete to delete the camera information in

bulk.

Click to add a new row. After entering the camera information, you can

add multiple cameras at the same time.

Adding a camera

Add a single-channel camera.

After selecting a camera, click Add to add a camera.

When adding a camera click Cancel and the camera is not added; click Stop to

stop add this camera.

Double-click the address, username, password, manufacturer, and port of the

camera to modify the corresponding information.

When you failed to add a camera, modify the information of the device

according to onscreen instructions. Click Try again and you can add the camera

again.

Add confirm(1)

Add a multi-channel camera

1. After selecting a camera, click Add.

Users Manual

82

Add confirm(2)

2. Double-click Please select a channel. 3. Select the channel you want to add.

Click and enter keywords into the search bar to quickly locate the channel

you want to add.

4. Click OK to add the selected channel.

Click Continue to add or Finish.

Click Continue to add and then the system adds the current camera. The Add Device interface is displayed, where you can add another camera.

Click Finish to complete adding. The Device interface is displayed, where you can

view the information of added camera.

9.1.2.2.3 Import CVS file

Select DEVICE. Select Add > Import CSV File.

Users Manual

83

Import CSV file

Fill in the template.

1) Click Download Template to download template.

Saving path might vary according to interfaces you operate on, and the actual

interface shall prevail.

On local interface, you can select where to save files.

In local operations, connect the USB storage device to the Device.

On web interface, files are stored in the default path set up in the browser.

2) Fill in the template according to the real fact and click Save.

The system displays the information of camera you need to fill in. See Figure 9-20.

If the camera information is not complete, import the template, and then complete

the information.

Template

Import the template.

1) Click Browse and select the template.

2) Click Import.

The system displays the information of the imported information of the camera.

When the camera information is incomplete, complete the information.

Users Manual

84

Click if you want to delete this camera.

Adding a camera

Add a single-channel camera.

After selecting a camera, click Add.

When adding a camera click Cancel and the camera is not added; click Stop to

stop add this camera.

Double-click the address, username, password, manufacturer, and port of the

camera to modify the corresponding information.

When you failed to add a camera, modify the information of the device

according to onscreen instructions. Click Try again and you can add the camera

again.

Add confirm(1)

Add a multi-channel camera

1. After selecting a camera, click Add.

Users Manual

85

Add confirm(2)

2. Double-click Please select a channel. 3. Select the channel you want to add.

Click and enter keywords into the search bar to quickly locate the channel

you want to add.

4. Click OK to add the selected channel.

Click Continue to add or Finish.

Click Continue to add and then the system adds the current camera. The Add Device interface is displayed, where you can add another camera.

Click Finish to complete adding. The Device interface is displayed, where you can

view the information of added camera.

9.1.2.3 Modifying IP Address of Camera

You can modify the IP addresses of cameras that are not added.

You can only modify the IP address of an already initialized camera. For details, seeInitializing

Camera.

You can only modify the IP address of a camera connected by a private protocol.

For how to modify the IP address of an added camera. See9.1.2.4.2Setting Connections.

Click on the homepage, and select Device.

Click Add and select the Smart Add.

Click Start Search.

You can click to filter the search according to the settings of manufacture, IP address.

Users Manual

86

Cameras

Select the camera, and click Modify IP.

Modifying IP addresses of multiple devices in bulk is allowed. But in doing so, make sure

that the username and password of all cameras are the same.

Users Manual

87

Modifying IP address of camera (1)

Set camera IP address.

If you select DHCP, there is no need to input IP address, subnet mask, and default

gateway. Device automatically allocates the IP address to the camera.

If you select Static, you need to input IP address, subnet mask, default gateway and

incremental value.

When modifying multiple cameras at the same time, you need to set the incremental

value. The fourth digit of the IP Address is increased in turn according to the

incremental value you set.

If there is IP conflict when modifying static IP address, device pops up IP conflict

prompt. If IP addresses are modified in bulk, device automatically skips the

conflicted IP and begins the IP allocation according to the incremental value.

Enter the username and password of the camera.

Click Next. Click OK.

9.1.2.4 Configuring Camera

You can set the information such as attribute, connection, and video parameters of added

cameras.

The functions and interfaces might vary according to different cameras you add, and the actual

interface shall prevail.

Users Manual

88

9.1.2.4.1 Attribute Settings

You can set the camera name and view device information.

Select DEVICE. Select a camera/ media stream/ POE, and click the ATTRIBUTE.

Attribute

Setting attribute parameters.

Table 9-5 Descriptions of attribute parameter

Parameter Description

Name

Set the name of the camera.

Enable Sync to camera, and then save settings, the modified name will be

synchronized to the camera.

Description Enter descriptions of this camera.

Device

information

Displays information of the camera including its model, serial number, MAC address,

storage capacities of audio and video files, amount of alarm inputs and outputs, and

system version.

Click Save.

9.1.2.4.2 Setting Connections

You can modify the connection parameters of the camera such as IP address and port number.

Select DEVICE. Select a camera and click CONNECTION.

Users Manual

89

Connection

Change the IP address.

1) Click the icon corresponding to the Address. Modifying IP

2) Enter IP address, subnet mask, and gateway.

3) Click OK to save the modifications.

Modify the port number.

The port number corresponds to the connection protocol of the device. The protocols

vary from different port numbers.

1) Click the icon corresponding to the Port.

Users Manual

90

Modify the port.

2) Modify the port number.

3) Click OK.

Set the connection parameters.

Table 9-6 Descriptions of connection parameter

Parameter Description Manufacturer Select the communication protocol of the camera.

Username Enter the username and password of the camera.

The password should consist of 8 to 32 non-blank characters and contain at least

two types of characters among upper case, lower case, number, and special

charactersexcluding'";:& Please set a high-security

password according to the password strength prompt.

Password

Link type Displays the link type between the Device and camera. The default setting is

Self-adaptive.

Cache strategy

Set the caching strategy of video streams of camera.

Self-adaptive: The system auto adjusts the video stream cache based on the

bandwidth.

Real-time: Guarantees that videos are real-time, but small bandwidth can

result in lagged videos.

Smooth: Ensures that videos are smooth, but sometimes at the cost of low

definition.

Click Save.

9.1.2.4.3 Setting Video Parameters

Set video parameters of different stream types based on the actual bandwidth. The functions and

interfaces might vary from different front-end equipment, and the actual interface shall prevail.

Select DEVICE. After selecting a camera, click VIDEO.

Users Manual

91

Video

Click Main Stream, Sub Stream 1 or Sub Stream 2.

Different devices work with different stream modes and the actual interface shall prevail.

Configure normal video quality parameters.

Table 9-7 Descriptions of video parameters

Parameter Description

Smart

code

Enabling smart code helps improve image compression performance and reduce

storage space.

Enable smart code and the Device will not support the third stream, ROI, and other

functions. The actual interface shall prevail

Encode

mode

Used to set the video encode mode.

MJPEG: Motion JPEG encoding.

H.264Main Profile encoding

H.264HHigh Profile encoding

H.264BBaseline Profile encoding

Resolution

Set video resolution. The higher the resolution, the better the image quality.

Different devices support different resolutions and the actual interface shall prevail.

FPS Set frames per second. The higher the FPS, the more real and more smooth the

image is.

Stream

mode

Set thevideo stream mode.

CBR (Constant Bit Rate): The bit rate changes little and keeps close to the

defined bit rate value.

VBR (Variable Bit Rate): The bit rate changes along with environment.

Quality

Set the video image quality, including low, meddle, and high.

When the Stream Mode is set to VBR, this parameter can be set.

Users Manual

92

Parameter Description

Stream

Set the video stream value.

Main stream: Setting of the stream value changes the image quality; the higher

the value, the better the image quality.

Sub Stream: In the CBR stream mode, the bit rate changes little and keeps close

to the defined bit rate value; in the VBR stream mode, The bit rate changes

along with environment and the maximum value keeps close to the defined bit

rate value.

I frame

interval

Used to define the amount of P frames between two I frames. It is recommended to

set the I frame interval two times as the FPS.

Set Event Video Quality, and set FPS and Stream Mode.

Only the main stream mode allows for setting Event Video Quality.

Click Save.

9.1.2.4.4 Setting OSD

Overlay information such as time and channel on video image of camera.

Select DEVICE. Select a camera and click OSD.

OSD

Set the stack information based on actual needs.

Device Name

Click to overlay the name onto the video.

Click if you want to modify the device name and where it is displayed.

Users Manual

93

Time Stack

Click to overlay the time onto the video.

Click if you want to modify the device name and where it is displayed.

Geographical Position

1. When setting the position, click or to create a textbox, and then

enter the position information of the camera.

Geographical position

Click to adjust the alignment of texts.

Click or again to create a textbox over or under the previously

created textbox.

Click to delete the textbox.

2. Drag the textbox to a proper position.

3. Click .

Click Save.

9.1.2.4.5 Storage Configuration

Set the recording storage plan and image storage plan of cameras as needed.

Select DEVICE. Select a camera and click STORAGE.

Users Manual

94

Storage

Select Inherit local storage plan or Customize.

Inherit local storage plan: The camera inherits the global storage plan of the Device.

Customize: Customizes the storage plan of camera.

Setting storage parameters.

When selecting Inherit local storage plan, only Record Stream needs to be set up.

Table 9-8 Description of storage parameters

Parameter Description

Recording

Recording

plan.

Select the recording plan.

Continuous recording: Camera records 24 hours.

No recording: Camera does not record.

Event recording: Camera records only when an event alarm is

triggered.

Manual record

Settings Set the length of a manual recording.

On the live view interface, if you click to start recording and do

not click the icon again to end recording, the system automatically

ends the recording based on the Manual Record you set.

Record stream Select Record Stream mode, including main stream, sub stream1

and sub stream2.

Image Manual

snapshot Set the number of images and speed of taking snapshots.

Users Manual

95

Parameter Description

Event

snapshot

Set the interval for taking snapshots when an alarm-triggering

event takes place.

Select Self-defining to customize the interval for taking snapshots.

The longest interval is 3600s.

Click Save.

9.1.2.5 Exporting Camera Information

You can export the information of added cameras. In the case of information loss caused by

restoration of factory settings or system errors, import camera information to quickly restore

camera.

Select DEVICE.

Click at the lower-left corner.

Click Download Template to download template of the camera, and then you can add

cameras by using the template.

Export

Select Whether The Encryption.

If selecting Yes, the system exports encryptedbackup files which can only be viewed

in the Device.

If selecting No, the system exportscsv files which can be opened by using Excel and

other tools. An exportedcsv file includes the IP address, port number, channel

number, channel name, manufacturer, and username (without password) of the

camera.

When exporting non-encrypted files, properly save them to avoid data leakage.

Click OK.

Click Save File.

Saving path might vary according to interfaces you operate on, and the actual interface

shall prevail.

On local interface, you can select where to save files.

In local operations, connect the USB storage device to the Device.

On web interface, files are stored in the default path set up in the browser.

Users Manual

96

9.1.2.6 Viewing Device Connection Status

Go to the Device interface, and view the connection status of cameras in the device list.

Such status means the device is online, and means the device is

offline.

Right-click an offline device and select Connect if you want to connect to this device again.

Right-click an online device and select Disconnect if you want to disconnect with this device.

9.1.2.7 Deleting Camera

Go to the Device interface, where you can delete an added camera or delete them in bulk.

Single delete

Select a camera and click .

In the device list, right-click a camera, select Delete.

Delete in bulk

Click , and then the check box is displayed in the device list. Select multiple cameras

and click .

In the device list, select a camera, hold Ctrl or Shift. Then you can select cameras you

want to delete, and then click .

Network Management

Set the network parameters of the Device and make sure that this Device is interconnected with

other devices.

9.2.1 Modifying IP Address

Modify the IP address and DNS server of the Device based on network planning.

Click on the homepage, select NETWORK > TCP/IPv4.

To select the items to be displayed, you can click .

Users Manual

97

TCP/IPv4

Click the icon corresponding to the network port.

Editing ethernet network

Parameter

Table 9-9 Descriptions of NIC editing

Parameter Description

Speed Maximum network transmission speed of current NIC.

Use dynamic IP

address

When there is aDHserver on the network, select the check box to use dynamic IP

address. System can distribute a dynamic IP address to the Device. There is no

need to set IP address manually.

Use static IP

address

Set static IP address, subnet mask and gateway. It is to set a static IP address for

the Device.

Users Manual

98

Parameter Description

MTU

Set NIC MTU value. The default setup is 1500 Byte.

We recommend that you check the MTU value of the gateway first and then set

the device MTU value equal to or smaller than the gateway value. It is to reduce

the packets slightly and enhance network transmission efficiency.

Changing MTU value might result in NIC reboot, network offline and affect

current running operation. Be careful.

Click OK.

Set DNS Server parameters.

You can select to obtain the DNS server address automatically or manually enter.

When activating the domain name service, this step must not be skipped.

Obtain DNS server address automatically: Select Obtain DNS server address automatically, and then the system automatically gets the IP address of the DNS

server.

Use the following DNS server address: Select Use the following DNS server address,

and then you need to enter the IP address of the preferred DNS and the alternate

DNS.

Set the default NIC.

Select Default Ethernet from the Default NIC drop-down list as needed.

Only NIC which has been connected to the network can be used as the Default NIC. Click Save.

9.2.2 Setting Port Number

You can set device port number.

Select NETWORK > PORT.

Port

Users Manual

99

Set the parameters.

Table 9-10 Descriptions of port parameters

Parameter Description Max connection Select the number of connections from 1 to 128 as needed.

TCP port Select the number of connections from 1025 to 65535 as needed. The default

value is 37777.

RTSP port Select the number of connections from 1 to 65535 as needed. The default

value is 554.

HTTP port

Select the number of connections from 1 to 65535 as needed. The default

value is 80.

If the value you set is not 80, add the port number after the IP address when

you use browser to log in to the Device.

HTTPS port Select the number of connections from 1 to 65535 as needed. The default

value is 443.

UDP port Select the number of connections from 1025 to 65535 as needed. The default

value is 37778.

Click Save.

9.2.3 Configuring Email

Configure email information, and enable email alarm linkage. When the Device has alarm events,

the system automatically sends email to the user.

Select NETWORK > EMAIL.

Email

Click to enable the email function.

Setting email parameters.

Table 9-11 Descriptions of email parameter

Users Manual

100

Parameter Description Email server Select email server type, including Customize, 126Email, 163Email, and QQEmail.

Server

address Enter the email server address..

Encryption Select the encryption type of the email server from NONE, SSL, and TLS.

Port Enter the port number of the email server.

Username

and

password

Enter the username and password of the email server.

Table 9-12 Description of common email configuration parameters

Email Type

Email server Encryption Port Description

QQ smtp.qq.com SSL 465

The encryption method cannot select

NONE.

Email must subscribe SMTP service.

The password must use the

Authorization Code, and the QQ

password and email password are

invalid.

Authorization code is obtained when the

SMTP service is enabled in the mailbox.

163 smtp.163.com

SSL 465/

994

Email must subscribe SMTP service.

The password must use the

Authorization Password, and the

email password is invalid.

Authorization password is obtained when

the SMTP service is enabled in the mailbox.

TLS 25

NONE 25

126 smtp.126.com NONE 25 Email must subscribe SMTP service.

Add the information of email receiver

1) Click Add. 2) Enter the email address of the receiver.

Email address

Click Add or to add other receivers email addresses.

Click to delete an added receiver.

Select a receiver. The Delete button is displayed. Click Delete to delete the

selected receiver.

Users Manual

101

Click Save.

(Optional) Test whether the emails can be sent and received as intended.

1) In Test Mail, select or enter a receivers email address.

2) Click Send.

When the configuration is correct, the system pops up a message of success, and

the receiver will receive the test mail.

Otherwise, the system pops up a message of failure, and the receiver will not

receive the test mail.

9.2.4 Setting SWITCH

Set the SWITCH. When IPC is directly connected to the PoE port of the Device, the system auto

distributes an IP address to the IPC based on the preset IP segment. The Device auto connects to

this IPC.

Do not connect a SWITCH to the PoE; otherwise the connection might fail.

The Device enables SWITCH by default, and the IP segment is 10.1.1.1. Maintaining the default

setting is recommended.

Procedures

Select NETWORK > PORT.

SWITCH

Set IP parameters.

The IP address of the SWITCH cannot be in the same segment as the IP address of the

Device. Using the default IP is recommended.

Click Save.

Users Manual

102

9.2.5 Configuring Auto Register

Procedures

Select NETWORK > PORT.

Auto Register

Click to to enable auto register.

Set relevant parameters of auto register.

Click Save.

9.2.6 Configuring UPnP

Procedures

Select NETWORK > PORT.

UPnP

Click to to enable port mapping.

Set the Intranet IP and Internet IP.

Set the port mapping table.

Users Manual

103

Click in the function bar, and then select function types displayed in the port

mapping table, including service name, protocol, internal port, external port, and

operation, and more.

Port mapping table(1)

Click corresponding to the mapping port to modify port mapping (only the

external port number can be modified), and then click OK.

Port mapping table(2)

Port mapping modification

Click Save.

Storage Management

Storage management includes managing the stored resources (such as recordings) and storage

space, so you can use and improve utilization ratio of storage space.

9.3.1 HDD

The physical HDD refers to the HDD installed on the Device. On this interface you can view

information such as the capacity (free space, total space) of the disk, and disk information.

Click on the homepage, and select STORAGE > HDD.

There is a corresponding icon near the HDD name after you create the RAID and hotspare

HDD.

: RAID HDD.

: Global hotspare HDD.

: Invalid private hotspare HDD.

Users Manual

104

HDD

9.3.1.2 View S.M.A.R.T Information

S.M.A.R.T is so called Self-Monitoring Analysis and Reporting Technology It is a standard used to

detect HDD drive status and report potential issues. The system monitors and records the running

status of HDDs and compare parameters with preset safety range. When the monitored

parameters fall out of the safety range, the system prompts alarms to guarantee the safety of HDD

data.

You can view the S.M.A.R.T information of only one HDD at one time.S.M.A.R..

Enter the HDD interface, choose HDD, and click . Check whether the HDD is normal.

If any anomaly is found, timely repair the HDD.

Users Manual

105

ViewS.M.A.R.T Information

9.3.1.3 Set Storage Strategy

You can set the recording strategy when the HDD space is full.

Select STORAGE > HDD.

Click Storage Strategy.

Set storage strategy

Set Storage Strategy.

Overwrite: If the free space of HDD is below 50 GB or is less than 1% of the total space

(the system select the larger), the system continues recording and overwrites the

recording file stored the earliest.

Stop: If the free space of HDD is below 50 GB or is less than 1% of the total space (the

system select the larger), the system stops recording.

Click OK.

Users Manual

106

9.3.1.4 HDD Defragmentation

After the HDD works for a period time, since it is repeatedly written or files are deleted, the files are

saved on the discontinued physical position on the HDD. It might result in too much HDD

fragmentation and slow down the HDD access speed. The HDD optimization is to organize the

fragmentation files on the HDD and make the fragmentation files become the continuous files. It

can enhance HDD whole performance and running speed.

HDD optimization can result in the loss of some recordings. Be careful.

Select STORAGE > HDD.

Select one or several HDD(s) and click .

Set the HDD defragmentation strategy.

Select the HDD defragmentation strategy..

Speed first: HDD optimization at a high speed up to 100 M/s.

Business first: The system auto adjusts the HDD optimization speed based on the

business load on the Device.

Click OK.

Click OK.

The system starts HDD optimization, and the disk State shows HDD Optimizing. After

optimization, the State goes back to Running.

9.3.1.5 Formatting

Formatting clears all files from the disk. Be careful.

Go to the HDD interface, select one or several HDD(s), and click Format to format the selected

HDD.

Event

Set the alarm manner for system errors. The alarm is triggered if errors happen during the

operation of the Device.

Users Manual

107

Different devices support different event types, and the actual interface shall prevail.

Click on the homepage, and select EVENT.

Event

means the abnormal event alarm is enabled.

This chapter takes setting No-HDD as an example.

Select the specific device (or root directory) from the device list.

Select the specific event alarm. For example, No-HDD.

No-HDD

Click to to enable the No-HDD alarm.

Set alarm linkage events.

Click and select Buzzer, LOG, Device Alarm Output or Email to enable

corresponding alarm linkage, as shown in Figure 9-51. See Table 9-13 for descriptions of

alarm linkage.

Users Manual

108

For example, if you select IPC Alarm Output, you can set the output port and delay time.

Alarm linkage events

Table 9-13 Descriptions of alarm linkage events

Alarm linkage events

Description Preconditions

Recording When an alarm is triggered, the system links

with the selected camera to take recording.

Surveillance devices, such as IPC,

are added.

Snapshot When an alarm is triggered, the system links

with the camera to take snapshots.

Buzzer When an alarm is triggered, the system gives

the buzzer.

Log When an alarm is triggered, the system

records alarm information in the log.

Email When an alarm is triggered, the system sends

alarm emails to all added receivers. Emails configuration completed.

Local alarm

output

When an alarm is triggered, the system links

with the alarm output device to trigger the

alarm.

The Device is connected with an

alarm output device.

IPC alarm

output

When an alarm is triggered, the system links

with the alarm output device to trigger the

alarm.

IPC is added and connected to

the alarm output device.

Click Save.

Users Manual

109

System

You can make configurations of the system such as general parameters, schedule, time and more.

9.5.1 Setting System Parameters

You can make configurations such as setting the system language, user logout time, and mouse

moving speed.

Click on the homepage, and select SYSTEM > SYSTEM.

System

Set the parameters.

Table 9-14 Descriptions of system parameters

Parameter Description

Language Set the system language.

Video standard

Select the video standard.

PAL is mainly used in China, Middle East, and Europe.

NTSC is mainly used in Japan, USA, Canada, and Mexico.

Video standard is a technical standard used to process video and audio signals. PAL

and NTSC vary in encoding and decoding methods, and field scanning frequency.

User logout time

Set the user logout time. When you remains inactive for a specified period or the

device exceeds the set value. After auto logout, the user needs to login again to

operate.

If the User Log-out Time is set to Non cancellation, the system does not

automatically log out.

Live view control After selecting this function, you can enter local live view without entering the

username and password.

Mouse moving

speed Set the mouse moving speed ion the local interface.

Click Save.

Users Manual

110

9.5.2 Setting time

Set the system time for the Device and select whether to enable NTP as necessary. After enabling

NTP, the Device automatically synchronizes time with the NTP server.

Select SYSTEM > TIME.

Time

Parameter

Table 9-15 Descriptions of system parameters

Parameter Description

Time

Time and date Set the date and time of the system. You can manually set the

system time, or set the Device to automatically synchronizes time with the NTP

server.

Manual setting: Select Manual Setting and set the correct date and time.

Sync with the Internet time server: Select Sync with Internet Time

Server, enter the IP address or domain of the NTP server, and then set and

then set Auto Sync Time Interval.

Time and date

format Settings Time and date format.

Time zone Select the Device time zone.

Auto time

synchronization

After enabling this function, the Device checks the system time of the camera

after every preset time interval. If the local Device time and the camera time

are not the same, the time of the camera is automatically corrected.

(Optional) Setting DST.

DST is a system to manually regulate local time, which is designed to save energy

consumption. If the country or region where this Device is located adopts the DST, you

can enable DST to ensure that system time is correct.

1) Click to to enable DST.

Users Manual

111

2) Select the DST type, including Week and Date.

3) Set the start time and end time of the DST.

Click Save.

9.5.3 Display Output

Enable the monitor, monitor resolution, refresh rate of the connected device.

Select SYSTEM > Display Output.

Display output

Select the output port and the main and profile views.

It displays that output here corresponds to the video output interface on the rear panel of

the device, display output 1 corresponds to DVI1, and display output 2 corresponds to

DVI2.

Set output mode and resolution.

Table 9-16 Display output descriptions

Parameter Description

Output mode

Security screening mode and Monitor mode are selectable.

Security screening mode: Display the process of baggage security screening

and the AI analysis result of suspect items.

Monitor mode: Display the live view.

Resolution The default value is 1920 1080@60FPS.

Image Setting

Set the image enhancement effect for the current output screen.

In automatic mode, the screen is displayed according to the enhancement

effect of the actual operation.

Select image enhancement effects, including 13 image enhancement modes

such as black and white and partial enhancement. If you select the black and

white mode, the screen will display the black and white effect by default. In

live view status, the image enhancement operation on will not take effect.

Set display area

Users Manual

112

When connected to the single-view devices, security screening mode and monitoring

mode by default; when connected to the dual-view devices, both security screening

mode by default.

Table 9-17 Display area descriptions

Mode Parameter Description

Security

Screening

Mode

Scanned Baggage

Record

After enabling the function, the live view interface displays

scanned baggage images. Up to 100 baggage can be

displayed.

Click Setting to set the danger level of the display item.

Add Tunnels

Add a video channel to the baggage security screening

video to view real-time video at the same time.

Click , select the video channel, click OK.

Operation Bar

After selecting the function, the live view interface displays

operation bar. Click the corresponding Setting, and set the

operation bar.

Drag the frequently used functions from the function

list to the frequently used function area for daily use.

In the custom function area, click at the lower right

corner and select the image enhancement effect. Click

OK. The settings correspond to the functions of F1, F2,

and F3 keys on the keyboard.

Status Bar After enabling the function, the live view interface displays

the status bar.

Monitoring

Mode

Window Split Method Select to set the window split

method.

Add Tunnels Click in the window to select the

corresponding video channel displayed on the live view

interface.

Operation bar settings(1)

Users Manual

113

Operation bar settings(2)

Click Save.

9.5.4 Setting Schedule

Create a schedule of valid range of time. This schedule can be directly used when you configure

arm/disarm period of alarm and recording. The system only implements these settings during the

valid period of the calendar.

Select SYSTEM > SCHEDULE > SCHEDULE.

Schedule

Add schedule

1) Click .

Users Manual

114

Add Schedule

2) Set Schedule Name.

3) Click OK to save the settings.

Select the added schedule and click to delete the selected schedule.

Select the way of setting a valid range of time, from two options Always Effective and

Customize.

Set valid period of schedule.

Click the blue area and is displayed. Drag to adjust the start time and end

time of the valid period.

Hold any of the vacant point on the time bar and drag rightward to add a new valid

period.

Click Clear to clear all the valid periods in the current schedule.

Select a certain valid period and click Delete to delete the selected period.

This step is required only when Custom is selected.

Each schedule supports up to 50 effective time ranges.

The blue area on the time axis shows the effective time.

Click Save.

Account Management

User management of the Device includes the management of individual user and user group,

whose basic information can be managed. To conveniently manage the user, we recommend the

general user authorities shall be lower than high-level user authorities.

To guarantee the safety of the Device, operations (such as adding or deleting a user) on the

Account interface require entering the correct login password.

After a correct login password is entered on Account interface, if you do not close Account

interface, you can do other operations directly. If you close the interface and enter it again,

you shall enter the correct login password again. The actual interface shall prevail.

Users Manual

115

9.6.1 User Group

Different users might have different authorities to access the Device. You can divide the users to

different groups. It is easy for you to maintain and manage the user information.

The systemallows for creating up to 64 user groups. User group name supports maximum 64

characters.

In default settings, the system has these user accounts: maintainer, operator, and admin; the

admin user group cannot be deleted.

New user group can only be created under the root.

9.6.1.1 Adding User Group

Create user groups to facilitate user management as needed.

Click on the homepage, and select Account.

Select a root from the list on the left and click .

Input password

Enter the password of the admin user and click OK. The system creates a user group.

Attribute

Setting parameters.

Users Manual

116

Table 9-18 User management parameters

Parameter Description

Name

Set user group name.

A user group name can contain up to 64 characters consisting of letters, numbers,

and special characters (including "_", "@",).

Group name Shows the organization node of the user group. The system automatically

recognizes the group name.

Email Set the email address of the user group.

Description Enter the descriptions of the user group.

User list Displays the user information under the user group.

Setting user group authority.

1) Click the AUTHORITY.

Authority

2) Set user group authority based on your actual needs.

indicates the corresponding authority is enabled.

Click the check box at the top of the authority list (such as )

and all authorities in this list are selected.

Click Save.

9.6.1.2 Deleting User Group

A user group can be deleted only when it has no users.

The admin user group can never be deleted.

On the Account interface, select a user group and click to delete the selected user group.

Users Manual

117

9.6.2 User Access

9.6.2.1 Admin

All permissions are enabled by default.

9.6.2.2 Operator

Operator permission

9.6.2.3 Maintainer

Users Manual

118

Maintainer permission

9.6.3 User

The Device user can access and manage the Device. The admin account is the default

administration user of the system.

9.6.3.1 Adding User

You can add multiple users as needed and make sure that a user only has access to resources

within own authority.

User authorities adopt the user group authority settings. It is read-only.

Click on the homepage, and select Account.

Select the admin user group or a new user group, and click .

Users Manual

119

Attribute

Setting parameters.

Table 9-19 User management parameters

Parameter Description

Name

Set user name.

A user group name can contain up to 31 characters consisting of letters, numbers,

and special characters (including "_", "@,).

Group name Shows the organization node of the user. The system automatically recognizes the

group name.

Password Set and confirm the User password.

The password can consist of 8 to 32 non-blank characters and contain at least

two types of characters (excluding'";:&).. Set a strong password

according to the feedback on password strength.

Hold the mouse over and the password becomes visible. Release the left mouse button or move the mouse pointer elsewhere, and the password

become invisible again.

Confirm

password

Email Set the email address of the user.

Description Enter the descriptions of the user.

(Optional) Click the AUTHORITY and set user authority.

By default, the user inherits all authorities of its user group.

Users Manual

120

Authority

Click Save.

9.6.3.2 Modifying User

A user account with user management authority can modify its own information and information

of other users.

Select Account.

Select the target user for password modification.

Modify user password.

Another way to modify password is to click at the lower-left corner of the

interface and select Modify Password.

1) Click .

Input password

2) Enter the password of the admin user and click OK.

Users Manual

121

Changing password.

3) Set and confirm the password.

4) Click OK.

Setting other user parameters.

The username and user group of this user cannot be modified.

Click Save.

9.6.3.3 Deleting User

On the Account interface, select a user, and then click to delete the selected user.

9.6.3.4 Resetting Admin Password

A lost admin login password can be reset by using the reserved email or security questions.

Go to the login interface.

Login Interface

Click Forgot Password?.

Users Manual

122

Prompt interface

Click OK.

If you have reserved an email, use the email to retrieve the password.

If no email is reserved, set one and click Next.

Reset the login password.

Retrieving password with email Follow onscreen instructions to scan the QR code,

get the security code sent to the email you reserved, and then enter this security

code.

Scanning the same QR code can get two security codes at most. To get another

security code, refresh the QR code interface.

The security code is valid for 24 hours.

Click the Reset Type drop-down box, and select Security Questions. The Security Questions interface is displayed. Select a security question and enter the preset

corresponding answer correctly in the Answer text box.

Click Next. Setting parameters.

Table 9-20 Descriptions of password parameters

Parameter Description User The default username is admin.

Password The password should consist of 8 to 32 non-blank characters and contain at least

two types of characters among upper case, lower case, number, and special

charactersexcluding'";:& Please set a high-security

password according to the password strength prompt.

Confirm

password

Prompt

question

After setting the Prompt Question, move the mouse pointer over on the

login interface. The system displays the prompt question you have set to help

you recall the password.

Click OK.

Users Manual

123

Log in with the new password.

9.6.4 ONVIF User

When a camera is connected with the Device by the ONVIF protocol, you need to use the verified

ONVIF account.

By default, the system has three ONVIF user groups (admin, user, and operator) and does not

allow manually creating an ONVIF user group.

Directly adding users to the Onvif user group is not allowed.

9.6.4.1 Adding ONVIF User

Click on the homepage, and select Account.

Select user groups under Onvif.

Attribute of ONVIF user group

Click .

Input password

Users Manual

124

Enter the login password of the current user, and then click OK.

Attribute of ONVIF user

Set the parameters.

Table 9-21 Descriptions of ONVIF user parameters

Parameter Description

Name

Set user name of ONVIF.

ONVIF A user group name can contain up to 31 characters consisting of letters,

numbers, and special characters (including "_", "@,).

Group name Shows the organization node of the user. The system automatically recognizes the

group name.

Password Set the password of ONVIF user.

The password can consist of 8 to 32 non-blank characters and contain at least two

types of characters (excluding'";:&). Set a strong password

according to the feedback on password strength.

Confirm

password

Description Enter the descriptions of the ONVIF user.

Click Save.

9.6.4.2 Deleting ONVIF User

The admin user can never be deleted.

Click on the homepage, and select Account.

Click the ONVIF user and then click .

Users Manual

125

Input password

Enter the login password of the admin user and click OK.

Click OK.

Security Management

9.7.1 Setting IP Access Authority

Set the IP host allowed to access the Device to enhance security for the network and data.

Click on the homepage and then select SECURITY > IP ACESS AUTHORITY.

IP access authority

Select the method to control IP access authority.

Click Allow all access, and all IP hosts in the same LAN can access the current Device.

Click Reject access list and add an IP host list. The IP host in the list is not allowed to

access the current Device.

Click Allow access list and add an IP host list. Only the IP host in the list is allowed to

access the current Device.

Adding IP host.

Users Manual

126

The following steps are needed only when you clicked Reject access list or Allow access list.

1) Click Add. Adding IP host

2) Select Add Type and set the IP address or MAC address of the IP host.

If selecting Single IP, enter the IP address of the IP host.

If selecting IPV6 addr, enter the IP range and add multiple IP hosts within this

range to the list.

If selecting MAC, enter the MAC address of the IP host.

3) Click OK to add the IP host.

Click Add to add more IP hosts.

Click to edit IP host. Select an IP and click Delete to delete the IP host.

IP host list

Click Save.

Users Manual

127

9.7.2 Setting Safety Protection

You can set the login password lock strategy once the login password error has exceeded the

specified threshold. System can lock current IP host for a period of time.

Select SECURITY > SAFETY PROTECTION.

Safety protection(1)

Click to to enable safety protection.

Remote: When you log in to device on web interface, once the login password error

has exceeded the threshold, system locks the IP host for a period of time.

Local: When you log in to device on local interface, once the login password error has

exceeded the threshold, system locks the IP host for a period of time.

Set the most suitable lockup strategy based on actual needs.

Click Save to save the settings.

Once the IP host has been locked, you can view the locked IP host on the list. Select an IP

host, click Unlock or the corresponding to unlock this IP host.

9.7.3 Setting System Service

Select SECURITY> SYSTEM SERVICE.

Users Manual

128

System service

Enable or disable the system service based on the actual needs.

Table 9-22 System service

System service Description

SSH

After enabling this function, you can access the Device through the SSH

protocol to complete system adjustment and IP settings. SSH is disabled by

default.

Password reset

After this function is enabled, a lost admin login password can be reset by

using the reserved email or security questions. Password Reset is disabled by

default.

If this is not enabled, the password can only be reset on local interface.

CGI service When CGI is enabled, a third-party platform can connect to this Device

through the CGI protocol.

ONVIF service When ONVIF is enabled, other devices can connect to this Device through the

ONVIF protocol.

Private protocol

authentication mode

Set private protocol authentication mode, security mode and compatibility

mode are selectable.

Security mode: System uses safer private protocol.

Compatibility mode: System is compatible with various private

protocols.

Click Save.

9.7.4 Setting Firewall

Set different firewall types to guarantee the cyber security. Disable PING and half-open

connection.

Disable PING: No reply to PING request.

Disable half-open connection: Enable the function to prevent the device from from being

attacked by hackers and not working properly.

Users Manual

129

In the live view interface, click , select SECURITY>FIREWALL.

Click to disable PING and half-open connection as needed.

Firewall

Click Save.

9.7.5 HTTPS

HTTPS guarantees the security of user information, device security, and data communication with

reliable and stable technological means. After installing the certificate, you can use the HTTPS on

the PC to access the Device.

9.7.5.1 Certificate Installation

The system provides two certificate installation methods as follows. Select the most suitable

method based on your own needs.

Installing manually created certificate.

Installing signature certificate.

9.7.5.1.1 Installing Created Certificate

Install certificates by manually creating them, including creating certificates on the Device, and

downloading and installing root certificates from PC.

For first-time use of HTTPS or after changing the IP address of the Device, you need to create

server certificates and install root certificates.

After creating server certificate and installing root certificate, if you use another PC to log in to

the Device web, download and install root certificate on the new PC, or copy the downloaded

certificate to the new PC.

Users Manual

130

Select SECURITY > CREDENTIAL.

Credential(1)

Create certificate on the Device.

1) Click Create Certificate.

Creating certificate

2) Set Country, IP/Domain, Term of Validity, and other information as needed.

Country, IP/Domain, Term of Validity are required; others are optional.

In IP/Domain, fill the IP or domain name of the Device.

3) Click OK.

The system starts creating certificate and displays information of the created

certificates. See Figure 9-82.

Users Manual

131

Credential(2)

Download root certificate.

1) Click .

2) Click Save File and select the path to store files.

3) Click Save.

The system starts downloading certificate file.

Install the root certificate on the computer.

1) Double-click the certificate file.

2) Click Open.

3) Click Install Certificate.

4) Follow on-screen instructions to import certificate.

Click OK to complete certificate installation.

9.7.5.1.2 Installing signature certificate

Install signature certificates by uploading them.

Before installation, make sure you have obtained safe and valid signature certificate.

Procedures

Select SECURITY > CREDENTIAL.

Click Install Signature Certificate.

Users Manual

132

Installing signature certificate

Click Browse to select the certificate and certificate key files.

Click Install. Install the root certificate on the PC. For details, see Step 4 in Installing Created Certificate.

This root certificate is the one obtained with signed certificate.

9.7.5.2 Enabling HTTPS

After installing the certificate and enabling HTTPS, you can use the HTTPS on the PC to access the

Device.

Select SECURITY > CREDENTIAL.

Click to enable HTTPS.

Click Save to save the settings.

After saving the settings, you can use HTTPS to log in to the web interface.

Enter https:://IP address::port, and then press Enter.The login interface is displayed.\

IP address is Device IP or the domain name.

Port refers to device HTTPS port number. If the HTTPS port is the default value 443,

you can directly access Device by entering https://IP address.

9.7.5.3 Uninstalling Certificate

Uninstall the installed certificate.

After uninstallation, the HTTPS function becomes unusable.

Select SECURITY > CREDENTIAL.

Users Manual

133

Credential(1)

Click Uninstall.

Prompt interface

Click OK to uninstall the installed certificate.

Users Manual

134

10 Operation and Maintenance Management

You can operate and maintain the Device running environment to guarantee proper operation.

Log Search

Logs record all kinds of system running information. To ensure normal operation of the system,

regularly view the log and fix the problems in time.

Clear the logs may make it impossible to find out the cause of the system abnormality, please

operate carefully.

10.1.1 System log

You can search or export the system log, including the running status log, file management log,

hot spare HDD log, HDD detection log, and timed task log.

Click on the homepage, and select MAINTAIN > LOG > System.

Set the search conditions, including level, type, and date of the system log.

Click Reset if you want to restore the search conditions to default settings.

Click Search.

System log

Insert the USB storage device, and then click to export the log information

Click Clear all to clear all system logs.

Users Manual

135

10.1.2 User Operation Log

You can search or export user operation log, including user operations or settings.

Select MAINTAIN > LOG > User Operation.

Set the search conditions, including type, username, and date.

Click Reset if you want to restore the search conditions to default settings.

Click to set the devices you want to search.

Click Search.

User operation log

Insert the USB storage device, and then click to export the log information.

Click Clear all to clear all user operation logs

Clear the logs may make it impossible to find out the cause of the system

abnormality, please operate carefully.

10.1.3 Event Log

You can search or export the alarm event log.

Select MAINTAIN > LOG > Event.

Set the search conditions, including type, username, and date.

Click Reset if you want to restore the search conditions to default settings.

Click Search.

Users Manual

136

Event log

Choose the log and click to export the log information to the USB storage device.

Click Clear all to clear all event logs.

Clear the logs may make it impossible to find out the cause of the system

abnormality, please operate carefully.

10.1.4 Link Log

Query or export linkage log, including user log-out, session hijacking, session blasting, and more.

Select MAINTAIN > LOG > Link.

Set the search conditions, including type, username, and date.

Click Reset if you want to restore the search conditions to default settings.

Click Search.

Link Log

Users Manual

137

Choose the log and click Export to export the log information to the USB storage

device.

Click Clear all to clear all link logs.

Clear the logs may make it impossible to find out the cause of the system

abnormality, please operate carefully.

Online User

Search the information of the users who conducts remote access to the device. You can also block

a user for a period of time. The blocked user will not be allowed to access the device during the

block time.

Block own user or admin is not allowed.

Select MAINTAIN > ONLINE USER.

The user information is displayed in the list.

Online User

Select the user you want to block and click Block.

Block

Set block time, the default time is 30 minutes.

Users Manual

138

Click OK to save the settings.

Maintenance

Device maintenance refers to operations such as rebooting the Device, restoring default settings,

or system upgrades. These operations aim to clear failures or errors from the running system and

make the Device work more efficiently.

10.3.1 Upgrade

You can upgrade the system version by importing upgrade files. Upgrades files in .bin format.

During upgrading, do not disconnect from power and network, and reboot or shut down the

Device.

Make sure the update file is right. Improper upgrade file might result in device error.

10.3.1.1 Host upgrade

The USB device with upgrade files is connected to the Device.

Procedures

Select MAINTAIN > DEVICE MAINTAIN > Upgrade > Host.

Host upgrade

Click Browse and select the upgrade file.

Version upgrade, module upgrade and keyboard need to be done separately.

Click Upgrade Now.

The system starts upgrading. After the upgrade, the Device automatically reboots.

Users Manual

139

10.3.1.2 Upgrading Cameras

The USB device with upgrade files is connected to the Device.

Procedures

Select MAINTAIN > DEVICE MAINTAIN > Upgrade > Camera Upgrade.

Camera upgrade

Select the camera to be upgraded.

Click File upgrade.

Close recording before upgrade; otherwise the upgrade might fail.

Click Upgrade Now.

The system starts upgrading. The camera restarts automatically after the upgrade finishes.

10.3.2 Factory Default

If the Device runs slowly and has configuration errors, try restoring default settings.

All settings are lost if you restore default settings. Be careful.

Select MAINTAIN > DEVICE MAINTAIN > Reset Default.

Restoring default settings

Click Factory Default.

The system starts restoring default settings. After the restoration, the Device automatically

reboots.

Users Manual

140

10.3.3 IMP/EXP

You can export configuration files to a local PC or USB storage device for backup. When the

configuration is lost due to abnormal operation, import a configuration backup to quickly restore

system settings.

Importing Configurations

Select MAINTAIN > DEVICE MAINTAIN >IMP/EXP.

IMP/EXP

Click Browse and select the configuration files that you want to import.

Click Config Import.

Exporting Configurations

Click Configuration Export and you can export configuration files to a local PC or USB storage

device. Saving path might vary according to interfaces you operate on, and the actual interface

shall prevail.

On local interface, you can select where to save files.

On web interface, files are stored in the default path set up in the browser.

In local operations, connect the USB storage device to the Device.

Notification Center

Various unprocessed alarm massages are displayed in real time on the Notification Center

interface.

There is an icon in front of each failure alarm.

Select MAINTAIN > Notification Center.

Perform operations on notifications.

Click Refresh to update alarm notifications.

Restore notifications: Click Restore, and the Device automatically attempts to restore

from X-ray failure.

Restoring is only available for X-ray failure.

Users Manual

141

Device Diagnosis

10.5.1 X-ray System Diagnosis

Detector Diagnosis

The detector diagnosis module displays the grayscale curve of detection points. You can click Start emission and Stop emission in X-ray Source Control to observe the curve amplitude, and

determine whether the detector is in good quality and whether the position of each detection

board is adjusted properly.

Click Start emission, the X-ray is generated and the curve rises. Click Stop emission, the

X-ray emission is stopped and the curve falls.

Click Left, Stop, and Right, the conveyor rotates forward, stops, or rotates backward.

Curve judgment standards:

The number of detection boards and the number detection points vary with the devices.

The curve amplitude shall be between 20006000. The whole curve is a relatively stable line

chart.

The voltage and current of the X-ray generator emission are adjusted according to the factory

settings.

X-ray Generator Diagnosis

Diagnose whether the voltage and current are normally displayed when X-ray is triggered

normally for a preliminary judgment on the X-ray generator.

Click Start emission, the X-ray is generated, and the voltage and current start to be displayed.

Click Stop emission, the X-ray emission is stopped, and the voltage and current stop being

displayed. The specific voltage and current vary from the settings of different models of

devices.

Click Left, Stop, and Right, the conveyor rotates forward, stops, or rotates backward.

Users Manual

142

Profile view X-ray generator diagnosis

Take 6550A series security screening machine as an example, currently the number of

detector is 10, the interfaces might vary from different security screening machines according

to its different number of detectors.

Single-view server: Only displays one view.

10.5.2 IR Sensor Diagnosis

Diagnose the working status of the two pairs of IR sensors at the entrance and the other two pairs

at the exit.

Select MAINTAIN > Device Diagnosis > IR Sensor Diagnosis.

IR Sensor Diagnosis

Test IR sensors.

Users Manual

143

Test method 1: Block the IR sensors at the entrance with an opaque object, and there

will be a square wave at high level at A side. The longer the blocking, the wider the

square wave, which is normal. Use the same method to test B side.

Method 2: Place an object to be inspected flat on the conveyor, and then click Right.

It is normal when there is a square wave at high level at A side. Click Left. It is normal

when there is a square wave at high level at B side.

IR sensor diagnosis

A side represents the entrance direction, and B side represents the IR sensor position

(optional).

The green line indicates the power-saving IR sensor, and the red line indicates

package sensor inside the tunnel.

Horizontal axis: Time.

Vertical axis: Connection status.

Low level without blocking and high level with blocking.

There is a high level pulse when an object passes.

10.5.3 One-Click Diagnosis

Exit or cancel is not available during diagnosis.

Use one-click diagnosis to determine whether the key components of the Device work normally.

Select MAINTAIN > Device Diagnosis > One-Click Diagnosis.

When one-click diagnosis is triggered for the first time, the system doesnt display

corresponding report.

One-Click Diagnosis

Users Manual

144

Click Start Diagnosis.

Confirmation information before starting diagnosis.

Click OK to start diagnosis.

indicates diagnosing.

indicates to be diagnosed.

Diagnosis progress

After diagnosis is completed, click View Report to view the report details.

Related Operations

The list of one-click diagnosis reports is arranged in a reverse chronological order.

Each page can display 30 or 50 reports. When the maximum display number of the page is

exceeded, you need to turn pages for check.

Logout/Rebooting/Shutting

You can log out from the current user account, and reboot or shut the Device.

You can only use the local key to shut down the Device.

Users Manual

145

Logging out

On the homepage, click and select Log Out.

Rebooting

On the homepage, click , select Reboot, and the system prompts confirmation

window. Click OK and the Device reboots.

Shutting

Directly plug off the power supply can result in the loss of unsaved files (recordings, pictures).

Method A as follows is recommended.

One-key shutdown, turn the key switch counterclockwise to the "OFF" state, the software exits, and

the system power supply is disconnected.

Users Manual

146

11 FAQ2

The conveyor works normally, but the baggage image

is not generated

Possible cause Abnormal scanning configuration of the device.

Expired device license.

Troubleshooting: 1. Check whether the current scanning configuration is single direction scanning. If it is set as

single direction scanning and the package is reversed, the images of scanned image are not

generated;

2. Configuration: Select MENU> BAGGAGE MANAGEMENT > SECURITY SCREENING, set the

scanning mode, the default mode is double direction forward mode.

3. If the device license expires, select MENU>MAINTAIN > DEVICE MAINTAIN>UPDATE to

check the validity period of the license.

Users Manual

147

If the errors cannot be eliminated according to the above steps, please contact professional

maintenance personnel.

The conveyor suddenly stops during the working

process.

Possible cause: Power saving mode is on.

Abnormal damage of the motor.

Troubleshooting: If the power saving mode is on, the conveyor will automatically stop if no package passes

within 15 seconds; select MENU>BAGGAGE>MANAGEMENT>SECURITY SCREENING to

confirm whether the power saving mode is on. If it is on, turn it off.

Users Manual

148

Mode switch

If the errors cannot be eliminated according to the above steps, please contact professional

maintenance personnel.

No AI overlay after scanning baggage.

Possible cause: AI overlay is disabled.

Check the detection config, partial prohibited items recognition enables.

Expired device license.

Troubleshooting: 1. Go back to the live view interface to enable AI overlay.

Live view interface

2. Check the recognition switches of the prohibited items corresponded to the detection config

enable or not. Each prohibited item can be recognized only when its recognition switch is on.

Select Menu> BAGGAGE MANAGEMENT> DETECTION CONFIG.

Users Manual

149

Configuring Detection Parameters

3. Expired device license. Select MENU>MAINTAIN > DEVICE MAINTAIN>UPDATE to check the

validity period of the license.

Operation and Maintenance Management

If the faults can not be eliminated or not involved according to the above procedures, please

contact professional maintenance personnel.

Users Manual

150

Dimension Diagram of Applicable Models

Appendix Figure 1-1 ISC-M5030A

Users Manual

151

Appendix Figure 1-2 ISC-M6550A

Users Manual

152

Terminologies and Abbreviations

Appendix Table 2-1 Terminologies and Abbreviations

Name Description

DDNS

Dynamic Domain Name System, where the dynamic IP addresses of the user are mapped

to a fixed DNS server. Each time, when the user connects to the network, the client

transmits the dynamic addresses of the host to the server application on the carrier host.

This server application provides DNS service and realize dynamic domain name analysis.

In short, with DDNS, the user does not need to record the ever changing IP address. Just

access or login to the Device or URL by the domain name.

DHCP

Dynamic Host Configuration Protocol, a local area network protocol used to automatically

assign IP addresses within a network or a network service provider. DHCP is a unified

means for managing IP address of PC.

DNS Domain Name System, used to store the domain names and IP addresses of all hosts in a

network, and capable of transforming domain names to IP addresses.

HDMI High Definition Multimedia Interface, a proprietary digital interface for transmitting audio

signals and video signals simultaneously.

HTTPS

Hyper Text Transfer Protocol over Secure Socket Layer, a HTTP channel for security

purpose. HTTPS defines the rules for secure communication over browsers and Internet

servers. Its communication protocol with webpages is encrypted.

IP Internet Protocol.

NTP

Network Time Protocol (NTP) is a protocol to synchronize computer time. It adopts

wireless network protocol UDP, so that the computer time synchronizes with the server or

the time source. It is to provide time correction of high accuracy.

MTU Maximum Transmission Unit (MTU) refers to the maximum data packet amount (byte) on

one layer of the communication protocol.

S.M.A.R.T Self-Monitoring Analysis and Reporting Technology (S.M.A.R.T) is a technical standard to

detect HDD drive status and report potential problems.

VGA Video Graphics Array, a video transmission standard featuring high resolution, fast

display, and diversified colors.

Users Manual

153

RAID

RAID is an abbreviation for Redundant Array of Independent Disks. It is to combine several

independent HDDs (physical HDD) to form a HDD group (logic HDD).

Comparing with one HDD, RAID provides more storage capacity and data redundancy. The

different redundant arrays have different RAID level. Each RAID level has its own data protection,

data availability and performance level.

Appendix Table 3-1 RAID level

RAID Level Description Min. HDDs

RAID 0

RAID 0 is also known as Striping.

RAID 0 is to save the continued data fragmentation on several HDDs. It

can process the read and write at the same time, so its read/write speed

is N (N refers to the HDD amount of the RAID 0) times that of a single

HDD. RAID 0 does not have data redundant, so one HDD damage might

result in data loss that cannot be restored.

2

RAID 1

RAID 1 is also known as Mirror or Mirroring.

RAID 1 data is written to two HDDs equally, which guarantee the system

reliability and can be repaired. RAID 1 read speed is almost close to the

total volume of all HDDs. The write speed is limited by the slowest HDD.

At the same time, the RAID 1 has the lowest HDD usage rate. It is only

50%.

2

RAID 5

RAID 5 stores data and the corresponding parity check information to

each HDD of the RAID 5 group. The data and corresponding parity check

information are stored in different HDDs. If one HDD of the RAID 5 is

damaged, the system uses the residual data and corresponding parity

check information to restore damaged data. This guarantees data

intactness.

3

RAID 6

Based on the RAID 5, RAID 6 adds one parity check verification HDD. By

adopting different algorithms, the two mutually independent parity

systems guarantee high data reliability, to the point that even damages

to two HDDs at the same time would not result in data loss. Compared

to RAID 5, the RAID 6 needs to allocate larger HDD space for parity check

information, so its read/write is even worse.

4

RAID 10

As the combination of RAID 1 and RAID 0, RAID 10 is strong in reading

and writing data and guarantees data security. It uses the highly

efficient reading and writing performance of RAID 0 and the powerful

data protection and restoration capacity of RAID 1. However, RAID 10 is

equally low in usage efficiency as RAID1.

4

RAID Capacity

The calculation of RAID capacity is shown as follows.

capacityN refers to the HDD ( with Min capacity) used to create the corresponding RAID.

Users Manual

154

Appendix Figure 3-2 Calculation of RAID capacity

RAID Level Total Capacity of N HDD

RAID 0 Total capacity of current RAID group

RAID 1 Min (capacityN)

RAID 5 (N-1) min (capacityN)

RAID 6 (N-2) min (capacityN)

RAID 10 (N/2) min (capacityN)

RAID 50 (N-2) min (capacityN)

RAID 60 (N-4) min (capacityN)

Users Manual

155

Total HDD Capacity Calculation

HDD capacity calculation formula:

Total HDD capacity (M) = Number of channels recording time (h) Used HDD space each hour

(M/h)

The equation for calculating the recording time can be obtained through above equations.

Recording time (H) Total HDD capacity (M)

Number of channels Used HDD space each hour (M/H)

For example: The recording of a single channel uses 200 M HDD space per hour. Use 4-channel

device to make 24-hour continuous recording in every day of one month (30 days), the required

HDD space is: 4 channels 30 days 24 h 200 M/h = 576 GB. Typically five 120 GB HDDs, or four

160 GB HDDs are needed.

According to the above formula, at different stream values, recording file size of 1 channel in 1

hour is shown as follows (for your reference):

Appendix Table 4-1 Recording file size

Max. Bit Stream File Size Max. Bit Stream File Size

96 K 42 M 128 K 56 M

160 K 70 M 192 K 84 M

224 K 98 M 256 K 112 M

320 K 140 M 384 K 168 M

448 K 196 M 512 K 225 M

640 K 281 M 768 K 337 M

896 K 393 M 1024 K 450 M

1280 K 562 M 1536 K 675 M

1792 K 787 M 2048 K 900 M

Users Manual

156

Cybersecurity Recommendations

Cybersecurity is more than just a buzzword: its something that pertains to every device that is

connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps

toward protecting and strengthening networks and networked appliances will make them less

susceptible to attacks. Below are some tips and recommendations from Dahua on how to create a

more secured security system.

Mandatory actions to be taken for basic device network security: 1. Use Strong Passwords

Please refer to the following suggestions to set passwords.

The length should not be less than 8 characters.

Include at least two types of characters; character types include upper and lower case

letters, numbers and symbols.

Do not contain the account name or the account name in reverse order.

Do not use continuous characters, such as 123, abc, etc.

Do not use overlapped characters, such as 111, aaa, etc.

2. Update Firmware and Client Software in Time According to the standard procedure in Tech-industry, we recommend to keep your device

(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped

with the latest security patches and fixes. When the device is connected to the public

network, it is recommended to enable theauto-check for updates function to obtain

timely information of firmware updates released by the manufacturer.

We suggest that you download and use the latest version of client software.

"Nice to have" recommendations to improve your device network security: 1. Physical Protection

We suggest that you perform physical protection to device, especially storage devices. For

example, place the device in a special computer room and cabinet, and implement well-done

access control permission and key management to prevent unauthorized personnel from

carrying out physical contacts such as damaging hardware, unauthorized connection of

removable device (such as USB flash disk, serial port), etc.

2. Change Passwords Regularly We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.

3. Set and Update Passwords Reset Information Timely The device supports password reset function. Please set up related information for password

reset in time, including the end users mailbox and password protection questions. If the

information changes, please modify it in time. When setting password protection questions, it is

suggested not to use those that can be easily guessed.

4. Enable Account Lock The account lock feature is enabled by default, and we recommend you to keep it on to

guarantee the account security. If an attacker attempts to log in with the wrong password

several times, the corresponding account and the source IP address will be locked.

5. Change Default HTTP and Other Service Ports We suggest you to change default HTTP and other service ports into any set of numbers

between 102465535, reducing the risk of outsiders being able to guess which ports you are

Users Manual

157

using.

6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication

channel.

7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing

the risk of ARP spoofing.

8. Assign Accounts and Privileges Reasonably According to business and management requirements, reasonably add users and assign a

minimum set of permissions to them.

9. Disable Unnecessary Services and Choose Secure Modes If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to

reduce risks.

If necessary, it is highly recommended that you use safe modes, including but not limited to the

following services:

SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication

passwords.

SMTP: Choose TLS to access mailbox server.

FTP: Choose SFTP, and set up strong passwords.

AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.

10. Audio and Video Encrypted Transmission If your audio and video data contents are very important or sensitive, we recommend that you

use encrypted transmission function, to reduce the risk of audio and video data being stolen

during transmission.

Reminder: encrypted transmission will cause some loss in transmission efficiency.

11. Secure Auditing Check online users: we suggest that you check online users regularly to see if the device is

logged in without authorization.

Check device log: By viewing the logs, you can know the IP addresses that were used to log

in to your devices and their key operations.

12. Network Log Due to the limited storage capacity of the device, the stored log is limited. If you need to save

the log for a long time, it is recommended that you enable the network log function to ensure

that the critical logs are synchronized to the network log server for tracing.

13. Construct a Safe Network Environment In order to better ensure the safety of device and reduce potential cyber risks, we recommend:

Disable the port mapping function of the router to avoid direct access to the intranet

devices from external network.

The network should be partitioned and isolated according to the actual network needs. If

there are no communication requirements between two sub networks, it is suggested to

use VLAN, network GAP and other technologies to partition the network, so as to achieve

the network isolation effect.

Establish the 802.1x access authentication system to reduce the risk of unauthorized access

to private networks.

Enable IP/MAC address filtering function to limit the range of hosts allowed to access the

device.

Users Manual

158

More information

Please visit Dahua official website security emergency response center for security announcements

and the latest security recommendations.

Manualsnet FAQs

If you want to find out how the ISC-M6550A Dahua works, you can view and download the Dahua ISC-M6550A Screening Machine User's Manual on the Manualsnet website.

Yes, we have the User's Manual for Dahua ISC-M6550A as well as other Dahua manuals. All you need to do is to use our search bar and find the user manual that you are looking for.

The User's Manual should include all the details that are needed to use a Dahua ISC-M6550A. Full manuals and user guide PDFs can be downloaded from Manualsnet.com.

The best way to navigate the Dahua ISC-M6550A Screening Machine User's Manual is by checking the Table of Contents at the top of the page where available. This allows you to navigate a manual by jumping to the section you are looking for.

This Dahua ISC-M6550A Screening Machine User's Manual consists of sections like Table of Contents, to name a few. For easier navigation, use the Table of Contents in the upper left corner.

You can download Dahua ISC-M6550A Screening Machine User's Manual free of charge simply by clicking the “download” button in the upper right corner of any manuals page. This feature allows you to download any manual in a couple of seconds and is generally in PDF format. You can also save a manual for later by adding it to your saved documents in the user profile.

To be able to print Dahua ISC-M6550A Screening Machine User's Manual, simply download the document to your computer. Once downloaded, open the PDF file and print the Dahua ISC-M6550A Screening Machine User's Manual as you would any other document. This can usually be achieved by clicking on “File” and then “Print” from the menu bar.