DW DWC-VSDG04Bi User manual

User’s Manual Ver. 04/23
Before installing and using the camera, please read this manual carefully.
Be sure to keep it handy for future reference.
MEGApix® 4MP Vandal Dome IP Camera
DWC-VSDG04Bi - Vandal Dome with Fixed Lens

Safety Notes
This product is intended to be supplied by a Listed Power Unit, marked with 'Limited Power Source', 'LPS' on the
unit, output rated minimum 12V/2 A or POE 48V/ 350mA or AC24V (depending on models), no more than 2000m
altitude of operation and 60 degrees C.
As for the modes with PoE function, the function of the ITE being investigated to IEC 60950-1 standard is considered
not likely to require connection to an Ethernet network with outside plant routing, including campus environment
and the ITE is to be connected only to PoE networks without routing to the outside plant.
Do not try to disassemble the camera; to prevent electric shock, do not remove screws or covers.
There are no user-serviceable parts inside. Please contact the nearest service center as soon as possible if there is
any failure.
Avoid incorrect operation, shock vibration, heavy pressing which can cause damage to the product.
Do not use a corrosive detergent to clean the main body of the camera. If necessary, please use a soft dry cloth to
wipe dirt; for hard contamination, use neutral detergent. Any cleanser for high-grade furniture is applicable.
Avoid aiming the camera directly towards extremely bright objects, such as the sun, as this may damage the image
sensor.
Please follow the instructions to install the camera. Do not reverse the camera, or the reversing image will be
received.
Do not work the camera in case temperature, humidity and power supply are beyond the limited stipulations.
Keep away from heat sources such as radiators, heat registers, stoves, etc.
Do not expose the product to the direct airflow from an air conditioner.
This manual is for using and managing the product. We may reserve the right of amending the typographical errors,
inconsistencies with the latest version, software upgrades and product improvements, interpretation and
modification. These changes will be published in the latest version without special notification.
All pictures, charts, images in this manual are only for description and explanation of our products. In this manual, the
trademarks, product names, service names, company names, products that are not owned by our company are the
properties of their respective owners.
•
Disclaimer
Concerning the product with internet access, the use of the product shall be wholly at your own risk. Our company
shall be irresponsible for abnormal operation, privacy leakage, or other damages resulting from cyber-attack, hacker
attacks, virus inspection, or other internet security risks; however, our company will supply timely technical support if
necessary.
Surveillance laws vary from country to country. Check all laws in your local region before using this product for
surveillance purposes. We shall not take the responsibility for any consequences resulting from illegal operations.
Cybersecurity Recommendations
Use a strong password. At least 8 characters or a combination of characters, numbers and upper- and lower-case
letters should be used in your password.
Change the passwords periodically to ensure that only authorized users can access the system (recommended time
is 90 days).
It is recommended to change the service default ports (like HTTP-80, HTTPS-443, etc.) to reduce the risk of
outsiders being able to access.
It is recommended to set a security system for your router. Important ports such as HTTP, HTTPS and dual ports
cannot be closed.
It is not recommended to expose the device to the public network. When it is necessary to be exposed to the public
network, please set the external hardware security system and the corresponding security system policy.
It is not recommended to use the v1 and v2 functions of SNMP.
To enhance the security of WEB client access, please create a TLS certificate to enable HTTPS.
Use black- and white- lists to filter the IP address. This will prevent everyone, except those specified IP addresses
from accessing the system.
If you add multiple users, limit the functions of guest accounts.
If you enable UPnP, it will automatically try to forward ports in your router or modem. It is very convenient for users,
but this will increase the risk of data leakage when the system automatically forwards ports. Disabling UPnP is

recommended when the function is not used in real applications.
Check the log. If you want to know whether your device has been accessed by unauthorized users or not, you can
check the log. The system log will show you which IP addresses were used to log in to your system and what was
accessed.
Regulatory Information
FCC Information
1. FCC compliance
The products have been tested and found in compliance with the council FCC rules and regulation’s part 15 subpart B. These
limits are designed to provide reasonable protection against harmful interference. This equipment generates uses and can
radiate radio frequency energy and, if not installed and used following the instruction manual, may cause harmful
interference to radio communication. However, there is no guarantee that interference will not occur in a particular
installation. The user will be required to correct the interface at his own expense in case harmful interference occurs.
2. FCC conditions:
The operation of this product is subject to the following two conditions: (1) this device may not cause a harmful interface and
(2) this device must accept any interference received, including interference that may cause undesired operation.
CE Information
The products have been manufactured to comply with the following directives.
EMC Directive 2014/30/EU
RoHS
The products have been designed and manufactured following Directive EU RoHS Directive 2011/65/EU and its amendment
Directive EU 2015/863 on the restriction of the use of certain hazardous substances in electrical and electronic equipment.
2012/19/EU (WEEE directive): The Directive on waste electrical and electronic equipment (WEEE Directive).
To improve the environmental management of WEEE, the improvement of collection, treatment and recycling
of electronics at the end of their life is essential. Therefore, the product marked with this symbol must be
disposed of responsibly.
Directive 94/62/EC: The Directive aims at the management of packaging and packaging waste and
environmental protection. The packaging and packaging waste of the product in this manual refers to must be disposed of
at designated collection points for proper recycling and environmental protection.
REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization and Restriction of Chemicals, which
aims to ensure a high level of protection of human health and the environment through better and earlier identification of
the intrinsic properties of chemical substances. The product in this manual refers to conforms to the rules and regulations of
REACH. For more information on REACH, please refer to DG GROWTH or ECHA websites.

Table of Contents
1Introduction .......................................................................................................... 1
1.1 Product and Accessories....................................................................................... 1
1.2 Parts Identification ................................................................................................. 1
2Installation.............................................................................................................2
2.1 Powering the Camera........................................................................................... 2
2.2 Installation........................................................................................................... 2
2.3 Cabling................................................................................................................. 4
2.4 Managing the SD Card.................................................................................... 4
2.5 Resetting the Camera ..................................................................................... 4
3Network Setup.....................................................................................................5
3.1 IP Finder.................................................................................................................... 5
4Live View ...............................................................................................................7
5Network Camera Configuration..................................................................... 9
5.1 Camera Configuration.......................................................................................... 9
5.1.1 Camera Parameters ............................................................................... 9
5.1.2 Video Configuration ..............................................................................11
5.1.3 Audio Configuration .............................................................................13
5.1.4 OSD Configuration................................................................................14
5.1.5 Privacy Mask ...........................................................................................15
5.1.6 ROI Configuration .................................................................................16
5.1.7 Zoom/Focus ...........................................................................................17
5.2 Network Configuration ..................................................................................19
5.2.1 IPv4 and IPv6..........................................................................................19
5.2.2 Port ............................................................................................................19
5.2.3 ONVIF ..................................................................................................... 20
5.2.4 DDNS.........................................................................................................21
5.2.5 SNMP........................................................................................................22
5.2.6 802.1x........................................................................................................23
5.2.7 RTSP .........................................................................................................24
5.2.8 UPNP ........................................................................................................25
5.2.9 SMTP ........................................................................................................26
5.2.10 FTP.......................................................................................................27
5.2.11 HTTPS ......................................................................................................29
5.2.12 QoS ...........................................................................................................32
5.3 Event Configuration.......................................................................................33
5.3.1 Tampering Detection...........................................................................33

5.3.2 Line Crossing .........................................................................................35
5.3.3 Perimeter Intrusion ..............................................................................37
5.4 Alarm Configuration ......................................................................................39
5.4.1 Motion Detection..................................................................................39
5.4.2 Other Alarms ........................................................................................ 40
5.5 Security Configuration..................................................................................42
5.5.1 User Configuration...............................................................................42
5.5.2 Online User............................................................................................ 44
5.5.3 Block and Allow Lists..........................................................................45
5.5.4 Security Service ................................................................................... 46
5.5.5 Password Security............................................................................... 46
5.5.6 Authentication.......................................................................................47
5.6 System Configuration................................................................................... 48
5.6.1 Basic Information ................................................................................ 48
5.6.2 Time Zone & DST................................................................................. 49
5.6.3 Date and Time ...................................................................................... 49
5.6.4 Micro SD Management ...................................................................... 50
5.6.5 Record.......................................................................................................51
5.6.6 Snapshot .................................................................................................53
5.7 Maintenance Configuration .........................................................................54
5.7.1 Backup and Restore ............................................................................54
5.7.2 Reboot .....................................................................................................55
5.7.3 Upgrade...................................................................................................56
5.7.4 Operation Log .......................................................................................56
6Playback.............................................................................................................. 58
6.1 Image Playback....................................................................................................58
6.2 Video Playback................................................................................................59
6.3 Specifications.................................................................................................. 60
Warranty Information ................................................................................................ 65
Limits and exclusions.................................................................................................66

1
1Introduction
1.1 Product and Accessories
Make sure that you have the following items supplied with your camera. If any of
these items are missing or damaged, notify your vendor immediately. Keep the
packing utilities for moving or storage purposes afterward.
1.2 Parts Identification
Number
Description
Number
Description
1 Network Cable 4 SD Card Slot
2 Audio Input (3.5mm) 5 Reset Button
3 Power Cable 6 Built-in Microphone

2
2Installation
2.1 Powering the Camera
Pass the wires through and make all necessary connections.
Use a PoE Switch or PoE Injector to
connect data and power to the camera
using a single Ethernet cable.
Use a non-PoE Switch to connect data
using an Ethernet cable and use a
power adapter to power the camera.
Power requirements
Power
consumption
DC12V, PoE (IEEE 802.3af class 2).
Adapter not Included. <4.5W
2.2 Installation
1. The mounting surface must bear at least five times the weight of your camera.
2. For the installation process, remove the dome cover from the camera base using
the included wrench.
3. Using the mounting sheet or the camera itself, mark and drill the necessary holes
in the wall or ceiling.
4. Pass wires through and make all necessary connections. See 2.2
Cabling for more information.
5. To use the camera’s waterproof wiring:
In extreme environments, use an outdoor-rated sealer.

3
6. Mount the camera using the included screws and anchors.
7. Adjust the camera’s tilt and angle by
loosening the tilt screw at the base of
the camera module. Tighten the screw
once the adjustment is complete.
8. Assemble the dome cover over the camera
body. Align the dome and bottom case to match the
case outline. Be careful not to alter the direction of the camera module when
placing the dome over the camera.
9. Remove the protective film from the dome. Softly wipe the dome with lens tissue
or a microfiber cloth with ethanol to remove any dust or smudges left from the
installation process.
Rubber Plug

4
2.3 Cabling
Use the diagram below to connect power, network and audio to the camera.
2.4 Managing the SD Card
1. Remove the cover dome to access the SD card slot.
2. Insert class 10 SD/SDHC/SDXC card into the SD card slot (max 256GB).
3. Press the card inward until it clicks to release from the card slot.
2.5 Resetting the Camera

5
3Network Setup
3.1 IP Finder
Use the DW® IP Finder™ software to scan the network and detect all MEGApix® cameras,
set the camera’s network settings or access the camera’s web client.
1. To install DW IP Finder, use a web browser and go to:
http://www.digital-watchdog.com.
2. Enter “DW IP Finder” on the search box at the top of the page.
3. Go to the “Software” tab on the DW IP Finder page to download
and install the installation file.
4. Open DW IP Finder and click ‘Scan Devices’. It will scan the selected
network for all supported devices and list the results in the table.
During the scan, the DW® logo will turn gray.
5. When connecting to the camera for the first time, a password must
be set. To use DW IP Finder for
Bulk Password Assignment
:

6
a. Check the box next to the camera in the IP Finder’s search
results. You can select multiple
cameras.
b. Click “Bulk Password Assign” on
the left.
c. Enter admin/admin for the
current username and password.
Enter a new username and
password to the right.
Passwords must have a
minimum of eight (8) characters
and at least four (4)
combinations of uppercase and
lowercase letters, numbers and
special characters. Passwords
should not contain the User ID.
d. Click “change” to apply all changes.
6. Select a camera from the list by double-clicking on the camera’s
name or clicking on the ‘Click’ button. The pop-up window will
show the camera’s current network settings. Admin users can adjust
the settings as needed. The camera’s network settings are set to
DHCP by default.
7. To access the camera’s web page, click on the ‘Website’ button.
8. To save changes made to the camera’s settings, enter the username
and password of the camera’s admin account and click ‘Apply’.
•

7
4Live View
Once the camera’s network settings have been set up properly, you can access
the camera’s web viewer.
To open the camera using DW IP Finder:
1. Find the camera using DW IP Finder.
2. Double-click on the camera’s view in the results table.
3. Press the ‘Website’ button. The camera’s web viewer will open up in
your default web browser.
4. Enter the camera’s username and password that was set up in DW IP
Finder. If you did not set up a new username and password via DW IP
Finder, a message will direct you to set up a new password for the
camera before gaining access.
To open the camera using the web browser:
1. Open a web browser.
2. Enter the camera’s IP address and port in the address bar. Example:
http://<ipaddress>:<port>. Port forwarding may be necessary to access
the camera from a different network. Contact your network
administrator for more information.
3. Enter the camera’s username and password you set up in DW IP Finder.

8
NOTE: The GUI display may differ by camera models.
Icon
Description
Icon
Description
AUDIO
ON/OFF
Enable/disable audio (on
supported models) SD card recording indicator
SNAPSHOT Snapshot
Motion alarm (on supported
models)
START
RECORD
Start/stop local recording
(on supported models) Color abnormal
D-ZOOM IN
Digital zoom in the live
image
Abnormal clarity
D-ZOOM OUT Digital zoom out the live
image
Scene change
ZOOM/FOCUS
AZ control (only available
for the model with
motorized zoom lens)
Line crossing
IVA EVENT
INFO
Event rule information
display Perimeter Intrusion
NOTE: Line Crossing and Perimeter Intrusion cannot be enabled at the
same time.
Smart alarm indicators will flash only when the camera supports the functions
and if events are enabled.
*Plug-in free live view: local recording is not supported.
Click the ZOOM/FOCUS button to show the AZ control panel. This is available
on supported models.

9
Icon
Description
Icon
Description
Zoom - Zoom +
Focus -
Focus +
One key focus (use after manual lens adjustment and the image is
out of focus)
5Network Camera Configuration
In the camera’s web client, click on the “Setup” button to go to the setup menu.
NOTE: Where applicable, click the “Save” button to apply changes to the
settings.
5.1 Camera Configuration
Camera Configuration includes the
Camera Parameters, Video, Audio,
OSD,
Privacy Mask
and
ROI Configuration
menus.
5.1.1 Camera Parameters
Go to Setup>Camera>Camera Parameters interface as shown below. The
settings for image
Brightness, Contrast, Hue
and
Saturation
and other
parameters for Common, Day and Night configurations can be set up
separately. The image effect can be quickly seen by switching the configuration
file using the
Config File
drop-down at the top of the menu.

10
•Brightness: Set the brightness level of the camera’s image.
•Contrast: Set the color difference between the brightest and darkest
parts.
•Hue: Set the total color degree of the image.
•Saturation: Set the degree of color purity. The purer the color, the
brighter the image is.
•Sharpness: Set the resolution level of the image plane and the
sharpness level of the image edge.
•Noise Reduction: Decrease the noise and make the image more
thorough. Increasing the value will make the noise reduction effect
better but it will reduce the image resolution.
•Backlight Compensation (BLC):
oOff: Disables the backlight compensation function. It is the default
mode.
oHWDR: WDR can adjust the camera to provide a better image
when there are both very bright and very dark areas
simultaneously in the field of the view by lowering the brightness
of the bright area and increasing the brightness of the dark area.
The recording will be stopped for a few seconds while the mode
is changing from non-WDR to WDR mode.
oHLC: Lowers the brightness of the entire image by suppressing
the brightness of the image’s bright area and reducing the size of
the halo area.

11
oBLC: If enabled, the auto exposure will activate according to the
scene so that the object of the image in the darkest area will be
seen clearly.
•Antiflicker:
oOff: Disables the anti-flicker function. This is used mostly in
outdoor installations.
o50Hz: Reduces flicker in 50Hz lighting conditions.
o60Hz: Reduces flicker in 60Hz lighting conditions.
•Smart IR: Choose “ON” or “OFF”. This function can effectively avoid
image overexposure and underexposure by controlling the brightness
of the IR lights according to the actual conditions to make the image
more realistic. Please enable it as needed.
•White Balance: Adjust the color temperature according to the
environment automatically.
•Day/Night Mode: Choose “Auto”, “Day”, “Night”, or “Timing”.
oSensitivity: Set the general amount of environmental light that is
required to trigger switching Day/Night modes.
oDelay Time (Seconds): Set the amount of time that the camera
will delay switching between Day/Night modes when triggered.
•Exposure Mode: Choose “Auto” or “Manual”. If “Manual” is chosen,
the digital shutter speed can be adjusted.
•Gain Mode: Choose “Auto” or “Manual”. If “Auto” is selected, the
gain value will be automatically adjusted according to the actual
situation. If “Manual” is selected, the gain value shall be set
manually. The higher the value is, the brighter the image is.
•Gain Limit: Set the maximum digital gain level for the camera
image. There are two separate configurations for Auto or Manual
Gain Modes.
•Frequency: 50Hz and 60Hz can be optional.
•Infra-red Mode: Choose “Auto”, “ON” or “OFF”.
•Corridor Pattern: Corridor viewing modes can be used for
situations such as long hallways. 0, 90, 180 and 270 are available.
The default value is 0. The video resolution should be 1080P or
below if this function is used.
•Image Mirror: Turn the current video image horizontally.
•Image Flip: Turn the current video image vertically.
5.1.2 Video Configuration
Go to Setup>Camera >Video interface as shown below. In this interface, set the

12
Resolution, Frame rate, Bitrate type, video quality, etc. Three video streams are
available for configuration in this menu. Viewing experience is subject to the
actual network conditions.
•Resolution: Adjust the stream resolution from the available options
in the drop-down menu.
•Frame rate: The higher the frame rate, the more individual frames
will be shown per second. A higher FPS results in smoother video
but will increase the bitrate of the video stream.
•Bitrate type: Select between CBR and VBR bitrate types. Bitrate is
related to image quality.
oCBR: Compression bitrate will remain constant, of
change in the video scene.
oVBR: Compression bitrate will be adjusted according
to scene changes. For example, for scenes that do
not have much movement, the bitrate will remain at
a lower value. This can help optimize the network
bandwidth usage of the camera.
•Bitrate (Kbps): Bitrate type must be set to CBR to manually adjust
this setting. A higher bitrate will result in better image quality.
•Video Quality: Bitrate type must be set to VBR to manually adjust
this setting. The higher the image quality, the more bitrate will be
required.
•I-Frame interval: Determines how many frames are allowed
between a “group of pictures” when a new scene begins in a video,
until that scene ends, and if an entire group of frames (or pictures)
can be considered as a “group of pictures”. If there is not much
motion in the scene, setting the value higher than the frame rate
can potentially resulting in less bandwidth usage. However, if the

13
value is set too high and there is a lot of movement in the video,
there is a risk of frame-skipping.
•Video Compression: Select between MJPEG, H264, and H265
compression options. MJPEG is not available for the mainstream.
Compared to H.264, H.265 reduces the transmission bitrate under
the same resolution, frame rate and image quality.
•Profile: Video Compression must be set to H.264 to adjust this
setting. Choose between Base Line, Main Profile and High Profile.
oBase Line: Simple profile used for low-power
devices. Color information is sampled at half the
vertical and half the horizontal resolution of b/w
information.
oMain Profile: Includes all functionality of Base Line
but with improvements to frame prediction.
oHigh Profile: Highest quality H.264 profile with
highest amount of compression. Increased data rate
and need of decoder performance.
•Send Snapshot: Select which video stream to use when creating a
snapshot from the camera.
•Video Encode Slice Split: Enable this function for an improved
image when using a low-performance PC.
•Watermark: When playing back the locally recorded video in the
search interface, the watermark can be displayed. To enable it,
check the watermark box and enter the watermark text.
5.1.3 Audio Configuration
Click the “Audio” tab to go to the audio interface as shown below.
•Enable: Enable audio settings to use a microphone. The audio can

14
be enabled or disabled as needed.
•Audio Encoding: Select between G711A and G711U audio codecs.
oG711A: Provides more quantization levels at lower
signal levels.
oG711U: Provides more resolution to higher range
signals.
•Audio Type: Select between LINE-IN and MIC-IN for audio. Use
MIC-IN for models using a built-in microphone.
oMIC: An audio socket for connecting a wired
microphone.
oLIN: An audio socket for connecting external audio
devices that use strong voltage currents.
5.1.4 OSD Configuration
Go to Setup>Camera>OSD interface as shown below.
Set on-screen display (OSD) settings for time stamp, device name, OSD content
and picture overlap. Click-and-drag to reposition OSD objects.
Click the “Save” button to apply the settings.
•Date Format: Enable Show Timestamp to overlay the live display
with the current date and time. Select your preferred date/time
format.
•Device Name: Enable Show Device Name to overlay the live
display with the camera name. Edit the name as needed.
•OSD Content: Enable to overlay customized text. Maximum of 15-
characters.

15
5.1.5 Privacy Mask
Go to Setup>Camera>Privacy Mask interface as shown below.
Create a virtual mask to overlay and obscure selected areas of the camera
display. A maximum of four (4) privacy mask zones can be set at a time.
To set up a privacy mask:
1. Check the ‘Enable’ box to allow the mask to allow the mask to overlay
the live display.
2. Click the “Draw Area” button and use the mouse to draw the privacy
mask area.
3. Click the “Save” button to apply the settings.
4. Verify that the masked area appears in live view.
Click the “Clear” button to delete the privacy mask areas.
Table of contents
Other DW Security Camera manuals

DW
DW STAR-LIGHT HDCOAX DWC-PTZ220X User manual

DW
DW DWC-MB72I4V User manual

DW
DW DWC-PVF5M1TIRC6 User manual

DW
DW DWC-B6763WTIR User manual

DW
DW MEGApix CaaS DWC-MB44WiAWC5 User manual

DW
DW DWC-PPVF9Di2TW User manual

DW
DW DWC-MV95WiATW User manual

DW
DW DWC-BL2651TIR User manual

DW
DW DWC-MB74Wi4 User manual

DW
DW MEGApix DWC-MV95Wi28TW User manual

DW
DW DWC-HF21M4TIR User manual

DW
DW MEGApix CaaS DWC-MF4Wi4C6 User manual

DW
DW Megapix DWC-MF21M4TIR User manual

DW
DW DWC-C261T User manual

DW
DW DWC-MB95Wi28T User manual

DW
DW DWC-MT95Wi28TW User manual

DW
DW DWC-PTZ20X User manual

DW
DW DWC-V6563D User manual

DW
DW DWC-MPTZ30X User manual

DW
DW Snapit DWC-V4363D User manual