GeoVision 84-TMEB58W-0010 User manual

Before attempting to connect or operate this product,
please read these instructions carefully and save this manual for future use.
User's Manual
GV-IP Thermal Camera
TMEB-UA-A

© 2022GeoVision, Inc. All rights reserved.
Under the copyright laws, this manual may not be copied, in whole or in part,
without the written consent of GeoVision.
Every effort has been made to ensure that the information in this manual is
accurate. GeoVision, Inc. makes no expressed or implied warranty of any kind
and assumes no responsibility for errors or omissions. No liability is assumed
for incidental or consequential damages arising from the use of the information
or products contained herein. Features and specifications are subject to
change without notice.
GeoVision, Inc.
9F, No. 246, Sec. 1, Neihu Rd.,
Neihu District, Taipei, Taiwan
Tel: +886-2-8797-8377
Fax: +886-2-8797-8335
http://www.geovision.com.tw
Trademarks used in this manual: GeoVision, the GeoVision logo and GV
series products are trademarks of GeoVision, Inc. Windows is the registered
trademark of Microsoft Corporation.
August 2022
Scan the following QR codes for product warranty and technical support
policy:
[Warranty] [Technical Support Policy]

i
Contents
Notes on Safety ....................................................................................................... iii
Installation Requirements for Video Content Analysis......................................... 1
Chapter 1 Introduction........................................................................................... 3
Chapter 2 Network Connection............................................................................. 4
2.1 LAN ........................................................................................................................4
2.1.1 Access through GV-IP Device Utility........................................................... 4
2.1.2 Directly Access through IE ......................................................................... 7
2.2 WAN.......................................................................................................................9
Chapter 3 Live View ........................................................................................... 12
Chapter 4 Fire Detection and Temp Measurement............................................ 14
4.1 Fire Detection .......................................................................................................14
4.2 Temperature Measurement...................................................................................15
Chapter 5 Other Configurations ......................................................................... 18
5.1 System Configuration............................................................................................18
5.1.1 Basic Information.......................................................................................18
5.1.2 Date and Time...........................................................................................18
5.1.3 Local Config..............................................................................................19
5.1.4 Storage .....................................................................................................20
5.2 Image Configuration..............................................................................................22
5.2.1 Display Configuration ................................................................................22
5.2.2 Video / Audio Configuration.......................................................................26
5.2.3 OSD Configuration....................................................................................27
5.2.4 Video Mask ...............................................................................................28
5.2.5 ROI Configuration......................................................................................29
5.3 Alarm Configuration..............................................................................................30
5.3.1 Motion Detection .......................................................................................30
5.3.2 Other Alarms......................................................................................................31
5.3.3 Alarm In.....................................................................................................33
5.3.4 Alarm Out..................................................................................................34
5.3.5 Alarm Server.............................................................................................35
5.3.6 Audio Alarm...............................................................................................35
5.3.7 Light Alarm................................................................................................37
5.4 Event Configuration ..............................................................................................37
5.4.1 Video Exception ........................................................................................37
5.4.2 Line Crossing............................................................................................40
5.4.3 Region Intrusion........................................................................................42

ii
5.4.4 Region Entrance........................................................................................44
5.4.5 Region Exiting...........................................................................................44
5.4.6 Target Counting ........................................................................................44
5.4.7 Face Detection..........................................................................................47
5.5 Network Configuration ..........................................................................................49
5.5.1 TCP/IP ......................................................................................................49
5.5.2 Port ...........................................................................................................50
5.5.3 Server Configuration .................................................................................51
5.5.4 Onivf..........................................................................................................52
5.5.5 DDNS........................................................................................................52
5.5.6 SNMP........................................................................................................54
5.5.7 802.1x.......................................................................................................55
5.5.8 RTSP ........................................................................................................55
5.5.9 UPNP........................................................................................................56
5.5.10 Email.......................................................................................................57
5.5.11 FTP.........................................................................................................58
5.5.12 HTTPS....................................................................................................60
5.5.13 QoS.........................................................................................................61
5.6 Security Configuration...........................................................................................62
5.6.1 User Configuration ....................................................................................62
5.6.2 Online User...............................................................................................64
5.6.3 Block and Allow Lists.................................................................................64
5.6.4 Security Management ...............................................................................65
5.7 Maintenance Configuration...................................................................................66
5.7.1 Backup and Restore..................................................................................66
5.7.2 Reboot ......................................................................................................67
5.7.3 Upgrade....................................................................................................67
5.7.4 Operation Log ...........................................................................................68
Chapter 6 Search ................................................................................................. 69
6.1 Image Search .......................................................................................................69
6.2 Video Search........................................................................................................71
6.2.1 Local Video Search...................................................................................71
6.2.2 SD Card Video Search..............................................................................72
Integration with GV-VMS........................................................................................ 74
Appendix................................................................................................................. 75
Appendix 1 Troubleshooting..........................................................................................75
Appendix 2 Common Material Emissivity.......................................................................76

iii
Notes on Safety
⚫This product is intended to be supplied by a Listed Power Unit, marked with 'Limited
Power Source', 'LPS' on unit, output rated minimum 12V/2 A or POE 48V/ 350mA or
AC24V (depending on models), no more than 2000m altitude of operation and Tma=60
Deg.C.
⚫As for the modes with PoE function, the function of the ITE being investigated to IEC
60950-1 standard is considered not likely to require connection to an Ethernet network
with outside plant routing, including campus environment and the ITE is to be connected
only to PoE networks without routing to the outside plant.
⚫Do not attempt to disassemble the camera; in order to prevent electric shock, do not
remove screws or covers.
⚫There are no user-serviceable parts inside. Please contact the nearest service center as
soon as possible if there is any failure.
⚫Avoid from incorrect operation, shock vibration, heavy pressing which can cause
damage to product.
⚫Do not use corrosive detergent to clean main body of the camera. If necessary, please
use soft dry cloth to wipe dirt; for hard contamination, use neutral detergent. Any
cleanser for high grade furniture is applicable.
⚫Avoid aiming the camera directly towards extremely bright objects, such as, sun, as this
may damage the image sensor.
⚫Please follow the instructions to install the camera. Do not reverse the camera, or the
reversing image will be received.
⚫Do not operate it incase temperature, humidity and power supply are beyond the limited
stipulations.
⚫Keep away from heat sources such as radiators, heat registers, stove, etc.
⚫Do not expose the product to the direct airflow from an air conditioner.
⚫This manual is for using and managing the product. We may reserve the rights of
amending the typographical errors, inconsistencies with the latest version, software
upgrades and product improvements, interpretation and modification. These changes
will be published in the latest version without special notification.
⚫All pictures, charts, images in this manual are only for description and explanation of our
products. The ownerships of trademarks, logos and other intellectual properties related
to Microsoft, Apple and Google belong to the above-mentioned companies.

iv
Disclaimer
⚫With regard to the product with internet access, the use of product shall be wholly at your
own risks. Our company shall be irresponsible for abnormal operation, privacy leakage
or other damages resulting from cyber attack, hacker attack, virus inspection, or other
internet security risks; however, Our company will provide timely technical support if
necessary.
⚫Surveillance laws vary from country to country. Check all laws in your local region before
using this product for surveillance purposes. We shall not take the responsibility for any
consequences resulting from illegal operations.
Cybersecurity Recommendations
⚫Use a strong password. At least 8 characters or a combination of characters, numbers,
and upper- and lower-case letters should be used in your password.
⚫Regularly change the passwords of your devices to ensure that only authorized users
can access the system (recommended time is 90 days).
⚫It is recommended to change the service default ports (like HTTP-80, HTTPS-443, etc.)
to reduce the risk of outsiders being able to access.
⚫It is recommended to set the firewall of your router. But note that some important ports
cannot be closed (like HTTP port, HTTPS port, Data Port).
⚫It is not recommended to expose the device to the public network. When it is necessary
to be exposed to the public network, please set the external hardware firewall and the
corresponding firewall policy.
⚫It is not recommended to use the v1 and v2 functions of SNMP.
⚫In order to enhance the security of WEB client access, please create a TLS certificate to
enable HTTPS.
⚫Use black and white list to filter the IP address. This will prevent everyone, except those
specified IP addresses from accessing the system.
⚫If you add multiple users, please limit functions of guest accounts.
⚫If you enable UPnP, it will automatically try to forward ports in your router or modem. It is
really very convenient for users, but this will increase the risk of data leakage when the
system automatically forwards ports. Disabling UPnP is recommended when the function
is not used in real applications.

v
⚫Check the log. If you want to know whether your device has been accessed by
unauthorized users or not, you can check the log. The system log will show you which IP
addresses were used to log in your system and what was accessed.

vi
Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party
responsible for compliance could void the user’s authority to operate the equipment.
1. FCC compliance
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This equipment
generates, uses, and can radiate radio frequency energy, and if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications.
However, there is no guarantee that interference will not occur in a particular installation. If
this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
⚫Reorient or relocate the receiving antenna.
⚫Increase the separation between the equipment and receiver.
⚫Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
⚫Consult the dealer or an experienced radio/TV technician for help.
2. FCC conditions:
⚫This device complies with part 15 of the FCC Rules. Operation of this product is subject the
following two conditions:
⚫This device may not cause harmful interface.
⚫This device must accept any interference received, including interference that may cause
undesired operation.
CE Information
The products have been manufactured to comply with the following directives.
EMC Directive 2014/30/EU

vii
RoHS
The products have been designed and manufactured in accordance with Directive EU RoHS
Directive 2011/65/EU and its amendment Directive EU 2015/863 on the restriction of the use
of certain hazardous substances in electrical and electronic equipment.
2012/19/EU (WEEE directive): The Directive on waste electrical and electronic
equipment (WEEE Directive). To improve the environmental management of WEEE,
the improvement of collection, treatment and recycling of electronics at the end of their life is
essential. Therefore, the product marked with this symbol must be disposed of in a
responsible manner.
Directive 94/62/EC: The Directive aims at the management of packaging and packaging
waste and environmental protection. The packaging and packaging waste of the product in
this manual refers to must be disposed of at designated collection points for proper recycling
and environmental protection.
REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization and
Restriction of Chemicals, which aims to ensure a high level of protection of human health and
the environment through better and earlier identification of the intrinsic properties of chemical
substances. The product in this manual refers to conforms to the rules and regulations of
REACH. For more information of REACH, please refer to DG GROWTH or ECHA websites.

1
Installation Requirements for Video Content Analysis
Thermal Detection
⚫Human
oInstallation Height: 3 ~ 6 m (9.8 ~ 19.7 ft)
oVideo Content Analysis Range: 24 m (78.7 ft) or less
oCamera View: no requirements
oAngle of Depression: 30°~ 45°recommended
⚫Vehicle
oInstallation Height: 3 ~ 6 m (9.8 ~ 19.7 ft)
oVideo Content Analysis Range: 35 m (114.8 ft) or less
oCamera View: The camera is facing the direction the traffic is coming from.
oAngle of Depression: 30°~ 45°recommended
Optical Detection
⚫Installation Height: 2.8 m (9.2 ft) or above
⚫Video Content Analysis Range:
oHuman: 10 m (32.8 ft) or less
oCar: 20 m (65.6 ft) or less
⚫Camera View: It is recommended to have a front or side view of the vehicle as illustrated
below. And no view requirements for human detection.
oRecommended camera views:
oNot recommended to use a camera with a large angle of depression

2
⚫Requirements
1. The best angle of depression for the camera is at about 45°.
2. Auto-focusing function should not be enabled for intrusion detection.
3. Avoid the scenes with many trees or the scenes with various light changes (like many
flashing headlights). The ambient brightness of the scenes shouldn’t be too low.
4. The detected objects should not be less than 1% of the entire image and the largest sizes
of the detected objects should not be more than 1/8 of the entire image.
5. Make sure cameras can view objects for at least 2 seconds in the detected area for
accurate detection.
6. Adequate light and clear scenery are crucial to optical AI detection.

3
Chapter 1 Introduction
Main Features
Thermal:
⚫Resolution: 256 × 192
⚫Temperature range: -20°C ~ 150 °C (-4 °F ~ 302 °F)
⚫Multi-palette: white hot, black hot, iron oxide red, etc.
⚫Sound and light warning, temperature exception alarm, fire detection
Optical:
⚫Resolution: 5 MP (2592 × 1944)
⚫ICR auto switch, true day/night vision
⚫3D DNR, true WDR (120dB), HLC, BLC, Smart IR, distortion image correction,
ROI etc.
⚫AI analytics: Line Crossing, Region Entrance, Region Exiting, Target Counting,
Region Intrusion, Face Detection

4
Chapter 2 Network Connection
Available web browser: IE (plug-in required)/ Firefox/Edge/Safari/Google Chrome
It is recommended to use the latest version of these web browsers.
The menu display and operation of the camera may be slightly different by using the browser
with plug-in or without plug-in. Installing plug-in will display more functions of the camera.
Connect the camera via LAN or WAN. Here only take IE browser for example. The details are
as follows:
2.1 LAN
In LAN, there are two ways to access the camera: 1. access through GV-IP Device Utility; 2.
directly access through IE browser.
2.1.1 Access through GV-IP Device Utility
Network connection:
By default, when the camera is connected to LAN a with DHCP server, it is automatically
assigned with a dynamic IP address. Follow the steps below to look up its IP address, and use
the found IP address to log in its Web interface.
1. Make sure the PC and the camera are connected to the LAN, and GV-IP Device Utility
(V8.9.8 or later) is installed in the PC from our website.
2. On the GV-IP Utility window, click the button to search for the IP devices connected in
the same LAN. Click the Name or Mac Address column to sort.

5
3. Find the camera with its Mac Address, and click on its IP address.
4. For the first-time users, you are requested to set up a password.
5. Type a new password and click OK.
6. Click on its IP address again and select Webpage to open its Web interface.
7. Type the set password on the login page and click Login.

6
IMPORTANT:
1. By default, the Administrator’s username is admin and cannot be modified.
2. The camera has two sets of passwords: one is for Web interface and the other is
for the third-party platform connection via ONVIF, e.g. GV-VMS. GV-IP Device Utility
is used to set the ONVIF password. When the first-time user uses GV-IP Device Utility to
set a password for the camera, the two sets of passwords are created simultaneously.
3. To change the password for Web interface, go to Config > Security > User ; see
“Modified User”in 5.6.1 User Configuration. To change the password for ONVIF
connection, go Config > Network > Advnaced; see 5.5.4 ONVIF.
4. If the first-time user accesses the camera’s Web interface on the browser directly by
using the IP address found in GV-IP Device Utility, the following dialog box will apear.
If “Activate Onvif User”is enabled, the ONVIF user can be activated simultanously for the
third-party platform connection via ONVIF, using the default username and set password set
above to connect.

7
2.1.2 Directly Access through IE
The default network settings are as shown below:
IP address: 192.168.0.10
Subnet Mask: 255.255.248.0
Gateway: 192.168.0.1
HTTP: 80
Data port: 9008
Use the above default settings when logging in the camera for the first time. Directly connect
the camera to the computer through network cable.

8
1. Manually set the IP address of the PC and the network segment should be as the same as
the default settings of the camera. Open the network and share center. Click “Local Area
Connection” to pop up the following window.
Select “Properties” and then select internet protocol according to the actual situation (for
example: IPv4). Next, click the “Properties” button to set the network of the PC.
2. Open the IE browser and enter the default address of the camera and confirm.
3. Follow directions to download and install the Active X control.
4. Enter the username and password in the login window and then enter to view.

9
2.2 WAN
➢Access through the router or virtual server
1. Make sure the camera is connected to the local network and then log in the camera via
LAN and go to Config→Network→Port menu to set the port number.
Port Setup
2. Go to Config →Network→TCP/IP menu to modify the IP address.
IP Setup

10
3. Go to the router’s management interface through IE browser to forward the IP address
and port of the camera in the “Virtual Server”.
Router Setup
4. Open the IE browser and enter its WAN IP and http port to access. (for example, if the http
port is changed to 81, please enter “192.198.1.201:81” in the address bar of web browser
to access).
➢Access through PPPoE dial-up
Network connection
Access the camera through PPPoE auto dial-up. The setup steps are as follow:
1. Go to Config→Network→Port menu to set the port number.
2. Go to Config →Network→TCP/IP→PPPoE Config menu. Enable PPPoE and then enter
the user name and password from your internet service provider.
3. Go to Config →Network→DDNS menu. Before configuring the DDNS, please apply for a
domain name first. Please refer toDDNS configuration for detail information.
4. Open the IE browser and enter the domain name and http port to access.

11
➢Access through static IP
Network connection
The setup steps are as follow:
1. Go to Config→Network→Port menu to set the port number.
2. Go to Config →Network→TCP/IP menu to set the IP address. Check “Use the following IP
address” and then enter the static IP address and other parameters.
3. Open the IE browser and enter its WAN IP and http port to access.
This manual suits for next models
2
Table of contents
Other GeoVision Thermal Camera manuals