TVT Digital TD-5422E1 User manual

Thermal Network Camera
User Manual
Please read this instruction carefully before operating the unit and keep it for further
reference

Notes on Safety
This product is intended to be supplied by a Listed Power Unit, marked with 'Limited
Power Source', 'LPS' on unit, output rated minimum 12V/2 A or POE 48V/ 350mA or
AC24V (depending on models), no more than 2000m altitude of operation and Tma=60
Deg.C.
As for the modes with PoE function, the function of the ITE being investigated to IEC
60950-1 standard is considered not likely to require connection to an Ethernet network
with outside plant routing, including campus environment and the ITE is to be
connected only to PoE networks without routing to the outside plant.
Do not attempt to disassemble the camera; in order to prevent electric shock, do not
remove screws or covers.
There are no user-serviceable parts inside. Please contact the nearest service center as
soon as possible if there is any failure.
Avoid from incorrect operation, shock vibration, heavy pressing which can cause
damage to product.
Do not use corrosive detergent to clean main body of the camera. If necessary, please
use soft dry cloth to wipe dirt; for hard contamination, use neutral detergent. Any
cleanser for high grade furniture is applicable.
Avoid aiming the camera directly towards extremely bright objects, such as, sun, as this
may damage the image sensor.
Please follow the instructions to install the camera. Do not reverse the camera, or the
reversing image will be received.
Do not operate it in case temperature, humidity and power supply are beyond the limited
stipulations.
Keep away from heat sources such as radiators, heat registers, stove, etc.
Do not expose the product to the direct airflow from an air conditioner.
This manual is for using and managing the product. We may reserve the rights of
amending the typographical errors, inconsistencies with the latest version, software
upgrades and product improvements, interpretation and modification. These changes
will be published in the latest version without special notification.
All pictures, charts, images in this manual are only for description and explanation of
our products. The ownerships of trademarks, logos and other intellectual properties
related to Microsoft, Apple and Google belong to the above-mentioned companies.

Disclaimer
With regard to the product with internet access, the use of product shall be wholly at your
own risks. Our company shall be irresponsible for abnormal operation, privacy leakage or
other damages resulting from cyber attack, hacker attack, virus inspection, or other internet
security risks; however, Our company will provide timely technical support if necessary.
Surveillance laws vary from country to country. Check all laws in your local region before
using this product for surveillance purposes. We shall not take the responsibility for any
consequences resulting from illegal operations.
Cybersecurity Recommendations
Use a strong password. At least 8 characters or a combination of characters, numbers, and
upper and lower case letters should be used in your password.
Regularly change the passwords of your devices to ensure that only authorized users can
access the system (recommended time is 90 days).
It is recommended to change the service default ports (like HTTP-80, HTTPS-443, etc.) to
reduce the risk of outsiders being able to access.
It is recommended to set the firewall of your router. But note that some important ports
cannot be closed (like HTTP port, HTTPS port, Data Port).
It is not recommended to expose the device to the public network. When it is necessary to
be exposed to the public network, please set the external hardware firewall and the
corresponding firewall policy.
It is not recommended to use the v1 and v2 functions of SNMP.
In order to enhance the security of WEB client access, please create a TLS certificate to
enable HTTPS.
Use black and white list to filter the IP address. This will prevent everyone, except those
specified IP addresses from accessing the system.
If you add multiple users, please limit functions of guest accounts.
If you enable UPnP, it will automatically try to forward ports in your router or modem. It
is really very convenient for users, but this will increase the risk of data leakage when the
system automatically forwards ports. Disabling UPnP is recommended when the function is
not used in real applications.
Check the log. If you want to know whether your device has been accessed by
unauthorized users or not, you can check the log. The system log will show you which IP
addresses were used to log in your system and what was accessed.

Regulatory Information
FCC Information
Please take attention that changes or modification not expressly approved by the party
responsible for compliance could void the user’s authority to operate the equipment.
1. FCC compliance
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses, and can radiate radio frequency energy, and if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the interference by
one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
Consult the dealer or an experienced radio/TV technician for help.
2. FCC conditions:
This device complies with part 15 of the FCC Rules. Operation of this product is subject
the following two conditions:
This device may not cause harmful interface.
This device must accept any interference received, including interference that may cause
undesired operation.
CE Information
The products have been manufactured to comply with the following directives.
EMC Directive 2014/30/EU
RoHS
The products have been designed and manufactured in accordance with Directive EU RoHS
Directive 2011/65/EU and its amendment Directive EU 2015/863 on the restriction of the use
of certain hazardous substances in electrical and electronic equipment.

2012/19/EU (WEEE directive): The Directive on waste electrical and electronic
equipment (WEEE Directive). To improve the environmental management of
WEEE, the improvement of collection, treatment and recycling of electronics at
the end of their life is essential. Therefore, the product marked with this symbol
must be disposed of in a responsible manner.
Directive 94/62/EC: The Directive aims at the management of packaging and packaging
waste and environmental protection. The packaging and packaging waste of the product in
this manual refers to must be disposed of at designated collection points for proper recycling
and environmental protection.
REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization and
Restriction of Chemicals, which aims to ensure a high level of protection of human health and
the environment through better and earlier identification of the intrinsic properties of chemical
substances. The product in this manual refers to conforms to the rules and regulations of
REACH. For more information of REACH, please refer to DG GROWTH or ECHA websites.

Table of Contents
1Introduction ................................................................................................................... 1
2Network Connection ......................................................................................................2
2.1 LAN ...................................................................................................................2
2.1.1 Access through IP-Tool ............................................................................2
2.1.2 Directly Access through IE ....................................................................... 4
2.2 WAN .................................................................................................................. 5
3Live View ........................................................................................................................ 9
4Fire Detection & Temp Measurement ........................................................................ 11
4.1Fire Detection .................................................................................................. 11
4.2 Temperature Measurement............................................................................... 12
5Other Configurations .................................................................................................. 15
5.1 System Configuration ...................................................................................... 15
5.1.1 Basic Information ................................................................................... 15
5.1.2 Date and Time ........................................................................................ 15
5.1.3 Local Config........................................................................................... 16
5.1.4 Storage.................................................................................................... 16
5.2 Image Configuration ........................................................................................ 19
5.2.1 Display Configuration ............................................................................ 19
5.2.2 Video / Audio Configuration .................................................................. 22
5.2.3 OSD Configuration................................................................................. 23
5.2.4 Video Mask ............................................................................................ 24
5.2.5 ROI Configuration.................................................................................. 25
5.3 Alarm Configuration........................................................................................ 26
5.3.1 Motion Detection.................................................................................... 26
5.3.2 Other Alarms .......................................................................................... 28
5.3.3 Alarm In ................................................................................................. 30
5.3.4 Alarm Out............................................................................................... 31
5.3.5 Alarm Server .......................................................................................... 32
5.3.6 Audio Alarm........................................................................................... 32
5.3.7 Light Alarm ............................................................................................ 33
5.4 Event Configuration......................................................................................... 34
5.4.1 Exception................................................................................................ 34
5.4.2 Line Crossing.......................................................................................... 35
5.4.3 Intrusion.................................................................................................. 37
5.4.4 Region Entrance ..................................................................................... 39
5.4.5 Region Exiting........................................................................................ 39
5.4.6 Target Counting ...................................................................................... 39
5.4.7 Face Detection ........................................................................................ 42
5.5 Network Configuration .................................................................................... 45
5.5.1 TCP/IP .................................................................................................... 45

Network Camera User Manual
5.5.2 Port ......................................................................................................... 46
5.5.3 Server Configuration .............................................................................. 47
5.5.4 Onivf....................................................................................................... 47
5.5.5 DDNS ..................................................................................................... 48
5.5.6 SNMP ..................................................................................................... 49
5.5.7 802.1x ..................................................................................................... 50
5.5.8 RTSP....................................................................................................... 51
5.5.9 UPNP...................................................................................................... 52
5.5.10 Email ...................................................................................................... 52
5.5.11 FTP ......................................................................................................... 53
5.5.12 HTTPS.................................................................................................... 56
5.5.13 QoS......................................................................................................... 57
5.6 Security Configuration..................................................................................... 57
5.6.1 User Configuration ................................................................................. 57
5.6.2 Online User............................................................................................. 59
5.6.3 Block and Allow Lists ............................................................................ 60
5.6.4 Security Management ............................................................................. 60
5.7 Maintenance Configuration.............................................................................. 61
5.7.1 Backup and Restore ................................................................................ 61
5.7.2 Reboot .................................................................................................... 62
5.7.3 Upgrade .................................................................................................. 63
5.7.4 Operation Log......................................................................................... 63
6Search ........................................................................................................................... 64
6.1 Image Search ................................................................................................... 64
6.2 Video Search.................................................................................................... 66
6.2.1 Local Video Search................................................................................. 66
6.2.2 SD Card Video Search ............................................................................ 67
Appendix................................................................................................................................ 70
Appendix 1 Troubleshooting ................................................................................................ 70
Appendix 2 Common Material Emissivity .......................................................................... 71

1
Network Camera User Manual
1Introduction
Main Features
Thermal:
Resolution: 256×192 / 384×288
Temperature range: -20°C~150°C
Multi-palette: white hot, black hot, iron oxide red, etc.
Sound and light warning, temperature exception alarm, fire detection
Optical:
Resolution: 5MP (2592×1944)
ICR auto switch, true day/night vision
3D DNR, true WDR(120dB), HLC, BLC, Smart IR, distortion image correction,
ROI etc.
Intelligent analytics: intrusion detection (human/vehicle classification), line crossing
detection (human/vehicle classification), scene change detection, video exception
detection, target counting(human/vehicle classification), face detection, face capture

2
Network Camera User Manual
2Network Connection
Available web browser: IE (plug-in required)/ Firefox/Edge/Safari/Google Chrome
It is recommended to use the latest version of these web browsers.
The menu display and operation of the camera may be slightly different by using the browser
with plug-in or without plug-in. Installing plug-in will display more functions of the camera.
Connect IP-Cam via LAN or WAN. Here only take IE browser for example. The details are as
follows:
2.1 LAN
In LAN, there are two ways to access IP-Cam: 1. access through IP-Tool; 2. directly access
through IE browser.
2.1.1 Access through IP-Tool
Network connection:
①Make sure the PC and IP-Cam are connected to the LAN and the IP-Tool is installed in the
PC from the CD.
②Double click the IP-Tool icon on the desktop to run this software as shown below:
The default IP address of the camera is 192.168.226.201.

3
Network Camera User Manual
③Double click the IP address and then the system will pop up the IE browser to connect
IP-CAM. After you read the privacy statement, check and click “Already Read”. Then
activate the device.
Please self-define the password of admin according to the tip.
If “Activate Onvif User”is enabled, the ONVIF user can be activated simultanously. When
you connect the camera through the ONVIF protocol in the third-party platform, you can use
the default username and the password set above to connect.
After that, follow directions to download, install and run the Active X control if prompted.
Re-connect your camera via IE browser and then a login box will appear.
Please enter the user name (admin) and password. Then select the stream type and language
as needed.
Stream Type: The plug-in free live view only supports1080P or lower resolution.
The safety questions should be set after you click “Login” button. It is very important for you
to reset your password. Please remember these answers.

4
Network Camera User Manual
If you forget the admin password, you can reset the password by clicking Forget Password on
the login page. Then you can reset the password by the safety questions and answers you set.
You can set the account safety question during the activation, or you can go to
ConfigSecurityUser, click Safety Question, select the safety questions and input your
answers.
2.1.2 Directly Access through IE
The default network settings are as shown below:
IP address: 192.168.226.201
Subnet Mask: 255.255.255.0
Gateway: 192.168.226.1
HTTP: 80
Data port: 9008
Use the above default settings when logging in the camera for the first time. Directly connect
the camera to the computer through network cable.
①Manually set the IP address of the PC and the network segment should be as the same as
the default settings of the IP camera. Open the network and share center. Click “Local Area
Connection” to pop up the following window.

5
Network Camera User Manual
Select “Properties” and then select internet protocol according to the actual situation (for
example: IPv4). Next, click the “Properties” button to set the network of the PC.
②Open the IE browser and enter the default address of IP-CAM and confirm.
③Follow directions to download and install the Active X control.
④Enter the username and password in the login window and then enter to view.
2.2 WAN
Access through the router or virtual server

6
Network Camera User Manual
①Make sure the camera is connected to the local network and then log in the camera via
LAN and go to ConfigNetworkPort menu to set the port number.
Port Setup
②Go to Config NetworkTCP/IP menu to modify the IP address.
IP Setup
③Go to the router’s management interface through IE browser to forward the IP address and
port of the camera in the “Virtual Server”.

7
Network Camera User Manual
Router Setup
④Open the IE browser and enter its WAN IP and http port to access. (for example, if the http
port is changed to 81, please enter “192.198.1.201:81” in the address bar of web browser to
access).
Access through PPPoE dial-up
Network connection
Access the camera through PPPoE auto dial-up. The setup steps are as follow:
①Go to ConfigNetworkPort menu to set the port number.
②Go to Config NetworkTCP/IPPPPoE Config menu. Enable PPPoE and then enter
the user name and password from your internet service provider.
③Go to Config NetworkDDNS menu. Before configuring the DDNS, please apply for a
domain name first. Please refer to DDNS configuration for detail information.
④Open the IE browser and enter the domain name and http port to access.

8
Network Camera User Manual
Access through static IP
Network connection
The setup steps are as follow:
①Go to ConfigNetworkPort menu to set the port number.
②Go to Config NetworkTCP/IP menu to set the IP address. Check “Use the following
IP address” and then enter the static IP address and other parameters.
③Open the IE browser and enter its WAN IP and http port to access.

9
Network Camera User Manual
3Live View
After logging in, the following window will be shown.
Plug-in free live view: when the main stream is set over 1080P, only the sub stream or third
stream tab can be displayed on the above interface by default.
The following table is the instructions of the icons on the live view interface.
Icon
Description
Icon
Description
Visible light image and
thermal image display
Fire detection indicator
Visible light image display
Temperature indicator
Thermal image display
SD card recording indicator
Start/stop live view
Color abnormal indicator
Start/stop two-way audio
Abnormal clarity indicator
Enable/disable audio
Scene change indicator
Snapshot
Sensor alarm indicator
Start/stop local recording
Motion alarm indicator
Zoom in
Line crossing indicator
Zoom out
Intrusion indicator
Face Detection
Region entrance indicator
Face detection indicator
Region exiting indicator

10
Network Camera User Manual
*Those smart alarm indicators will flash only when the camera supports those functions and
the corresponding events are enabled.
*Plug-in free live view:
Icon
Description
Icon
Description
Original size
Auto (fill the window)
Fit correct scale
Full screen
In full screen mode, double click on the mouse to exit or press the ESC key on the keyboard.
Note:Plug-in free view doesn’t support thermal image.

11
Network Camera User Manual
4Fire Detection & Temp Measurement
4.1 Fire Detection
Fire Detection: Alarms will be triggered when the camera detects the fire source.
Click ConfigFire Detection to enter the following interface.
1. Click “Enable” and set the alarm holding time.
2. Set alarm trigger options.
Alarm Out: If selected, this would trigger an external relay output that is connected to the
camera when the fire source is detected.
Trigger Audio Alarm: If selected, the warning voice will be uttered when the fire source is
detected. (Please set the warning voice first. See Audio Alarm for details).
Trigger Light Alarm: If selected, the light of the camera will flash when the fire source is
detected. (Please set the light flashing time and frequency first. See Light Alarm for details).
Trigger Snap: If selected, the system will capture images when the fire source is detected
and save the images on an SD card.
Trigger SD Recording: If selected, video will be recorded on an SD card when the fire
source is detected.
Trigger Email: If “Trigger Email”and “Attach Picture”are checked (email address must be
set first in the Email configuration interface), the captured pictures and triggered event will be

12
Network Camera User Manual
sent into those addresses.
Trigger FTP: If “Trigger FTP” and “Attach Picture” are checked, the captured pictures will
be sent into FTP server address. Please refer to FTP configuration chapter for more details.
3. Click “Save” button to save the settings.
4. Set the schedule of the fire detection. The setup steps of the schedule are the same as the
schedule recording setup. (See Schedule Recording).
4.2 Temperature Measurement
Temperature Measurement: When detecting the temperature of the pre-defined point/line/area
exceeds the temperature threshold value, alarms will be triggered.
Click ConfigTemperature measurement to enter the following interface.
1. Click “Enable” and set the alarm holding time.
2. Set alarm trigger options. The setup steps are the same as motion detection. Please refer to
Fire Detection chapter for details.
3. Set thermography rule. Click the “Area”tab to go to the following interface.
The thermography rule type includes Point, Line Area.
Point setting: After the type is set to “Point”, click “Draw Area”and then drag the mouse in
the image on the left side to move the point. Click the “Stop Draw”button to stop drawing.
Up to 10 points can be set in the above interface.
Line setting: After the type is set to “Line”, click “Draw Area”and then drag the mouse in the
image on the left side to draw a line. Click the “Stop Draw”button to stop drawing. To ensure
the accuracy of temperature measurement, it is recommended to set not more than two lines at
the same time.
Area setting: Click the “Draw Area” button and then click around the area where you want to
set as the alarm area in the image on the left side (the alarm area should be a closed area).
Click the “Stop Draw” button to stop drawing. Click the “Clear” button to delete the alarm
area. Click the “Save” button to save the settings. To ensure the accuracy of temperature
measurement, it is recommended to set not more than two areas at the same time.

13
Network Camera User Manual
Emissivity: Set the emissivity of the target. The emissivity of each object is different. Please
refer to Common Material Emissivity for details.
Distance: The distance between the target and the camera.
Reflective: If there is any object with high emissivity in the scene, set the reflective
temperature to correct the ambient temperature. The reflective temperature should be set the
same as the temperature of the high emissivity object.
4. Click “Setting”to set the alarm rule.
Set the alarm rule, alarm temperature and alarm output. For example, select Alarm Rule as
Above (Average Temperature), set the alarm temperature to 100°C and check alarm output.
Then alarms will be triggered when the average temperature of the target is higher than 100°C
5. Click “Live”to view the temperature and rule information.
Table of contents
Other TVT Digital Security Camera manuals