Feature Setup
The Feature Setup windows let you configure a variety of IP camera features and functions. The following sections describe the Feature Setup windows in detail:
Streaming Window
The Streaming window provides options for configuring audio and video streams from the IP camera. You can configure settings for the primary and an optional secondary video stream.
Configuring a secondary stream is useful for providing a video stream that is at a lower resolution than the primary stream to third-party devices or software.
Both streams support H.264 and MJPEG for video, and G.711 A-law and G.711 u-law for audio.
When configuring video streams, be aware of the following guidelines:
- The resolution of the primary stream must be higher than the resolution of the secondary stream.
- You cannot configure a maximum frame rate of 30 for the primary stream if the secondary stream is enabled.
- Multiple secondary frame rates are supported. Table 4-1 shows the frame rate combinations of primary and secondary streams with a 16:9 aspect ratio, and Table 4-2 shows the frame rate combinations of primary and secondary streams with a 4:3 aspect ratio. If a secondary frame rate that is not shown in this table is selected in Cisco Video Surveillance Manager, the IP camera uses the closest available frame rate.

Note If you configure the camera for 768 x 432, 704 x 400, and 352 x 208 resolutions and then downgrade the firmware, the camera might reboot. Before downgrading, change the resolution back to an older resolution.
|
|
|
(H264 or MJPEG) |
|
|
---|---|---|---|---|---|
|
|
|
(H264 or MJPEG) |
|
|
---|---|---|---|---|---|
To display the Streaming window, perform the following steps:
Step 1 From the IP camera user interface, click the Setup link.
Step 2 Click Feature Setup to expand the menu.
Step 3 From the Feature Setup menu, click Streaming.
The Streaming window appears. If you change any options in this window, you must click the Save button to save the changes. If you do not click this button, changes are not retained when you exit the window. The Save button appears at the bottom of the window. You might need to scroll down to it.
Table 4-3 describes the options in the Streaming window.
Camera Window
The Camera window provides options for selecting a microphone, making certain video adjustments, exposure control, and configuring the operation of the IP camera day and night filters.
A microphone captures audio at the camera location. This audio is sent to the PC that you use to view video from the IP camera. You can listen to the audio when viewing video in the Camera Video & Control window.
The IP camera day and night filters allow the IP camera to optimize its video image for various lighting conditions. When the IP camera uses its day filter, it is operating in day mode. In this mode, the camera displays video images in color. When the IP camera uses its night filter, it is in night mode. In this mode, the camera displays video images in black and white.
To display the Camera window, perform the following steps:
Step 1 From the IP camera user interface, click the Setup link.
Step 2 Click Feature Setup to expand the menu.
Step 3 From the Feature Setup menu, click Camera.
The Camera window appears. If you change any options in this window, you must click the Save button to save the changes. If you do not click this button, changes are not retained when you exit the window. The Save button appears at the bottom of the window. You might need to scroll down to it.
Table 4-4 describes the options in the Camera window.
|
|
---|---|
The Cisco IP camera supports only an external microphone. Audio is captured by an optional external microphone, available from third-parties. |
|
Choose the day/night mode for the IP camera:
When the IP camera is in Auto mode, it attempts to avoid frequent or unnecessary changes between day mode and night mode (such as can occur when an IP camera is set up on a street where car headlights could cause constant changes between these modes). When the IP camera detects that a switch from day to night mode might be necessary, it monitors the light level for 10 seconds. If the light level remains below or above the configured Day to Night Threshold for the entire 10 seconds, the IP camera switches modes. Otherwise, the IP camera remains in the current mode. If the IP camera goes through 3 day/night mode transitions within a 60 second period, the camera stops detecting and implementing day/night changes for a period of 5 minutes from the point of the third transition. During these 5 minutes, the IP camera remains in the current day or night mode.
Note If you configure a Night Schedule, make sure that the time on the IP camera is set correctly. |
|
The Day to Night Threshold option is available only when the Switch Mode is set to Auto. Choose a value that specifies the relative light threshold at which the IP camera switches from day to night mode. A lower value designates that the IP camera switches from day to night mode in brighter conditions. A higher value designated that the IP camera switches modes in darker conditions. |
|
The Night to Day Threshold option is available only when the Switch Mode is set to Auto. Choose a value that specifies the relative light threshold at which the IP camera switches from night to day mode. A lower value designates that the IP camera switches from night to day mode in darker conditions. A higher value designated that the IP camera switches modes in lighter conditions. |
|
The Input option is available only when the Switch Mode is set to Night External. Choose the Input port that is connected an external device that is to trigger the switch to night mode. |
|
Choose the Output port that is connected to an external device that is to be triggered. |
|
The Start Time option is available only when the Switch Mode is set to Night Schedule. Enter the time, in 24 hour format, when the camera enables its night filter. |
|
The Start Time option is available only when the Switch Mode is set to Night Schedule. Enter the time, in 24 hour format, when the camera disables its night filter. |
|
Check this check box to enable the camera tamper feature. When enabled, this feature causes the IP camera to generate alerts when any of the following events occur and persist for a designated period: |
|
Enter the minimum length of time that a tamper event persists before a tamper alert is generated. To prevent false alerts, the IP camera waits for this period after detecting a tamper event before it generates an alert. If the tamper event is resolved (the IP camera view is returned to its original setting, the IP camera view blockage is removed, or the IP camera is put back in focus), an alert is not generated. |
|
Check this option to cause the IP camera to clear a tamper alert automatically according to the value that is configured in the Auto Clear Tamper Duration field (see the next row in this table). |
|
If the Enable Auto Clear Tamper Alert option is enabled, enter the number of minutes after the time that a tamper alert is generated at which the IP camera clears the alert. For example, if you check the Enable Auto Clear Tamper Alert check box and set this Auto Clear Tamper Duration option to 90, the IP camera clears a tamper alert 90 minutes after the alert is generated. |
|
Check this check box to enable the profiling feature, which automatically applies a profile to the IP camera. A profile is the set of options that you configure in the Picture Adjustment, Exposure Controls, and Advanced Settings areas in the View Video window. You can create separate day and night profiles, which are applied when the camera is in day or night mode, respectively. For detailed information about configuring profiles, see the Camera Settings controls rows in Table 3-1 . |
Video Overlay Window
The Video Overlay window provides options for configuring overlay text, an overlay image, or both that appear on the video image in the Camera Video & Control window.
To display the Video Overlay window, perform the following steps:
Step 1 From the IP camera user interface, click the Setup link.
Step 2 Click Feature Setup to expand the menu.
Step 3 From the Feature Setup menu, click Video Overlay.
The Video Overlay window appears. If you change any options in this window, you must click the Save button to save the changes. If you do not click this button, changes are not retained when you exit the window. The Save button appears at the bottom of the window. You might need to scroll down to it.
Table 4-5 describes the options in the Video Overlay window.
IO Ports Window
The IO Ports window lets you configure various options for the two input and two output ports on the IP camera. A state change of an input ports triggers a camera to take configured actions. Output ports send signals that can control external devices, such as alarms or door switches.
The IP camera can trigger an action only when the input that is received on an input port comes from a contact that is in a normally closed condition. The camera triggers the action when the contact changes to an open condition.
To display the IO Ports window, perform the following steps:
Step 1 From the IP camera user interface, click the Setup link.
Step 2 Click Feature Setup to expand the menu.
Step 3 From the Feature Setup menu, click IO Ports.
The IO Ports window appears. If you change any options in this window, you must click the Save button to save the changes. If you do not click this button, changes are not retained when you exit the window. The Save button appears at the bottom of the window. You might need to scroll down to it.
Table 4-6 describes the options in the IO Ports window.
Alert Notification Window
Use the Alert Notification window to define the alert types that trigger actions, and to configure notification actions.
The following alert types can trigger actions:
Actions include the following:
- Email notification—Send an email message to designated recipients. This message provides information about the alert.
- Output port state change—Changes the state of an IP camera output port from low to high or from high to low.
- Syslog server message—Sends a notification message to the designated Syslog server.
- HTTP notification—Sends notification to a remote system via HTTP. This message provides information about the alert.
Step 1 From the IP camera user interface, click the Setup link.
Step 2 Click Feature Setup to expand the menu.
Step 3 From the Feature Setup menu, click Alert.
The Alert Notification window appears. If you change any options in this window, you must click the Save button to save the changes. If you do not click this button, changes are not retained when you exit the window. The Save button appears at the bottom of the window. You may need to scroll down to it.
Table 4-7 describes the options in the Alert Notification window.
|
|
---|---|
Check the Conditions check box and then check one of more of the following check boxes to designate the alert types that generate actions:
See the “Alert Types” section for a descriptions of these alerts. |
|
Check the desired check boxes to designate that actions that the IP camera takes when the corresponding trigger occurs.
|
|
Identify the server to which HTTP messages are sent by choosing IP Address or Hostname from the drop-down list and entering the IP address or host name in the corresponding field. |
|
Enter a string to be used as the prefix in the HTTP URL. The HTTP URL is sent in this format: http://< IP address >/< URL Base >?< system-provided-name-value-pairs > where IP address is the IP address of the destination server, URL Base is the string that you enter, and system-provided-name-value-pairs is information about the event. |
|
Enter the port number that receives messages on the primary server to which HTTP messages are sent. |
|
If authentication is required on the primary server to which HTTP messages are sent, enter the user name. |
|
If authentication is required on the primary server to which HTTP messages are sent, enter the password. Note Blank characters and the following special characters are not valid: []\&|:";<>?,/+=*'%# |
|
If authentication is required on the primary server to which HTTP messages are sent, choose the authentication method from the drop-down list. |
|
Identify the SMTP server that is used for sending email by choosing IP Address or Hostname from the drop-down list and entering the IP address or host name in the corresponding field. |
|
Enter the port number for the SMTP server. The default SMTP port number is 25. |
|
Identify the POP server that is used for sending email by choosing IP Address or Hostname from the drop-down list and entering the IP address or host name in the corresponding field. This field is dimmed if you do not choose Requires POP Before SMTP in the Authentication field that follows. |
|
If the SMTP server requires authentication to send email, choose the appropriate authentication type from the drop-down list. The authentication type typically is the same as that for the POP3 server that you use to receive email. |
|
If the SMTP server requires authentication, enter the account name for the server. |
|
If the primary SMTP server requires authentication, enter the account password for the server. Note Blank characters and the following special characters are not valid: []\&|:";<>?,/+=*'%# |
|
Enter an email address to which an email message is sent when an event occurs. |
|
Enter the email address to be shown in the From field for the email message that is sent when an event occurs. |
|
Enter the text to be shown in the Subject field for the email messages that the IP camera sends when events occur. The subject can contain up to 118 characters, including spaces. |
Alert Types
The following tables describe the types of alerts that can trigger actions:
- Health alerts— Table 4-8
- Audit alerts— Table 4-9
- Security alert— Table 4-10
|
|
|
|
---|---|---|---|
Any application changes its status, for example, restarted, stopped, and so forth. |
|
|
|
|
---|---|---|---|
Camera view is changed or blocked. This alert is generated only when the tamper detection is enabled on the IP camera as described the “Camera Tamper Area” rows in Table 4-4 . Camera Tamper alert is enabled automatically when security alert is enabled. [from release notes, but contradicts above. |