background image

If distribution of object code is made by offering access to copy 
from a designated place, then offering equivalent access to copy 
the source code from the same place satisfies the requirement 
to distribute the source code, even though third parties are not 
compelled to copy the source along with the object code. 

5. 

 A program that contains no derivative of any portion of 
the Library, but is designed to work with the Library by 
being compiled or linked with it, is called a “work that uses 
the Library”. Such a work, in isolation, is not a derivative 
work of the Library, and therefore falls outside the scope 
of this License. 

However, linking a “work that uses the Library” with the 
Library creates an executable that is a derivative of the 
Library (because it contains portions of the Library),  rather 
than a “work that uses the library”. 
The executable is therefore covered by this License. Section 
6 states terms for distribution of such executables. 

When a “work that uses the Library” uses material from a 
header file that is part of the Library, the object code for the 
work may be a derivative work of the Library even though 
the source code is not. Whether this is true is especially 
significant if the work can be linked without the Library, or if 
the work is itself a library. The threshold for this to be true is 
not precisely defined by law. 

If such an object file uses only numerical parameters, data 
structure layouts and accessors, and small macros and small 
inline functions (ten lines or less in length), then the use of the 
object file is unrestricted, regardless of whether it is legally 
a derivative work. (Executables containing this object code 
plus portions of the Library will still fall under Section 6.) 

Otherwise, if the work is a derivative of the Library, you may 
distribute the object code for the work under the terms of 
Section 6. Any executables containing that work also fall 
under Section 6, whether or not they are linked directly with 
the Library itself. 

6.

  As an exception to the Sections above, you may also 

combine or link a “work that uses the Library” with the 
Library to produce a work containing portions of the 
Library, and distribute that work under terms of your 
choice, provided that the terms permit modification of the 
work for the customer’s own use and reverse engineering 
for debugging such modifications. 

You must give prominent notice with each copy of the work 
that the Library is used in it and that the Library and its use 
are covered by this License. You must supply a copy of this 
License. If the work during execution displays copyright 
notices, you must include the copyright notice for the Library 
among them, as well as a reference directing the user to the 
copy of this License. Also, you must do one of these things: 

a)  Accompany the work with the complete corresponding 

machine-readable source code for the Library including 
whatever changes were used in the work (which must be 
distributed under Sections 1 and 2 above); and, if the work 
is an executable linked with the Library, with the complete 
machine readable “work that uses the Library”, as object 
code and/or source code, so that the user can modify the 
Library and then relink to produce a modified executable 
containing the modified Library. (It is understood that 
the user who changes the contents of definitions files in 
the Library will not necessarily be able to recompile the 
application to use the modified definitions.) 

b)  Use a suitable shared library mechanism for linking with 

the Library. A suitable mechanism is one that 

(1) uses at run time a copy of the library already present 
on the user’s computer system, rather than copying library 
functions into the executable, and (2) will operate properly 
with a modified version of the library, if the user installs one, 
as long as the modified version is interface-compatible with 
the version that the work was made with. 

c)  Accompany the work with a written offer, valid for at least 

three years, to give the same user the materials specified 
in Subsection 6a, above, for a charge no more than the 
cost of performing this distribution. 

d)  If distribution of the work is made by offering access to 

copy from a designated place, offer equivalent access to 
copy the above specified materials from the same place. 

e)  Verify that the user has already received a copy of these 

materials or that you have already sent this user a copy. 

For an executable, the required form of the “work that uses 
the Library” must include any data and utility programs 
needed for reproducing the executable from it. However, 
as a special exception, the materials to be distributed need 
not include anything that is normally distributed (in either 
source or binary form) with the major components (compiler, 
kernel, and so on) of the operating system on which the 
executable runs, unless that component itself accompanies 
the executable. 

It may happen that this requirement contradicts the license 
restrictions of other proprietary libraries that do not normally 
accompany the operating system. Such a contradiction 
means you cannot use both them and the Library together in 
an executable that you distribute. 

7.

  You may place library facilities that are a work based on 

the Library side-by-side in a single library together with 
other library facilities not covered by this License, and 
distribute such a combined library, provided that the 
separate distribution of the work based on the Library and 
of the other library facilities is otherwise permitted, and 
provided that you do these two things: 

a)  Accompany the combined library with a copy of the 

same work based on the Library, uncombined with any 
other library facilities. This must be distributed under the 
terms of the Sections above. 

b)  Give prominent notice with the combined library of the 

fact that part of it is a work based on the Library, and 
explaining where to find the accompanying uncombined 
form of the same work. 

8.  

You may not copy, modify, sublicense, link with, or 
distribute the Library except as expressly provided under 
this License. Any attempt otherwise to copy, modify, 
sublicense, link with, or distribute the Library is void, 
and will automatically terminate your rights under this 
License. However, parties who have received copies, 
or rights, from you under this License will not have their 
licenses terminated so long as such parties remain in full 
compliance. 

9. 

 You are not required to accept this License, since you 
have not signed it. However, nothing else grants you 
permission to modify or distribute the Library or its 
derivative works. These actions are prohibited by law if 
you do not accept this License. Therefore, by modifying or 
distributing the Library (or any work based on the Library), 
you indicate your acceptance of this License to do so, 
and all its terms and conditions for copying, distributing or 
modifying the Library or works based on it. 

10.  

Each time you redistribute the Library (or any work based 
on the Library), the recipient automatically receives a 
license from the original licensor to copy, distribute, link 
with or modify the Library subject to these terms and 
conditions. You may not impose any further restrictions 
on the recipients’ 
exercise of the rights granted herein. You are not 
responsible for enforcing compliance by third parties 
with this License. 

11.  

If, as a consequence of a court judgment or allegation of 
patent infringement or for any other reason (not limited to 
patent issues), conditions are imposed on you (whether 

Summary of Contents for SNB-7001

Page 1: ...NETWORK CAMERA User Manual SNB 5001 SNB 7001...

Page 2: ...Samsung Techwin Disclaimer Samsung Techwin makes the best to verify the integrity and correctness of the contents in this document but no formal guarantee shall be provided Use of this document and th...

Page 3: ...oes not fit into your outlet consult an electrician for replacement of the obsolete outlet 10 Protect the power cord from being walked on or pinched particularly at plugs convenience receptacles and t...

Page 4: ...CE THE RISK OF ELECTRIC SHOCK DO NOT REMOVE COVER OR BACK NO USER SERVICEABLE PARTS INSIDE REFER SERVICING TO QUALIFIED SERVICE PERSONNEL EXPLANATION OF GRAPHICAL SYMBOLS The lightning flash with arro...

Page 5: ...the U S it may be used HAR code with fittings of an approved agency is employed CAUTION These servicing instructions are for use by qualified service personnel only To reduce the risk of electric sho...

Page 6: ...not place a glass of water on the product Do not install near any magnetic sources Do not block any ventilation openings Do not place heavy items on the product User s Manual is a guidance book for ho...

Page 7: ...Connecting the Camera Directly to Local Area Networking 20 Connecting the Camera Directly to a DHCP Based DSL Cable Modem 21 Connecting the Camera Directly to a PPPoE Modem 22 Connecting the Camera to...

Page 8: ...55 Event Setup 62 System Setup APPENDIX 68 68 Specification 73 Product Overview 74 Troubleshooting 75 Open Source Announcement 76 License 79 GPL LGPL Software License WEB VIEWER 32 32 Connecting to th...

Page 9: ...s product supports ONVIF For more information refer to www onvif org RECOMENDED PC SPECIFICATIONS CPU Intel R Core TM 2 2 4 GHz or higher Operating System Windows XP VISTA 7 Mac OS Resolution 1280X102...

Page 10: ...ion Camera 1 Instruction book Installer S W CD CMS S W DVD 2 Quick Guide Optional 1 Cable for the testing monitor 1 Used to test the camera connection to a portable display device Alarm Cable 1 Used t...

Page 11: ...w Hole Used to fix the camera on a mounting bracket The screw size use this screw to fix the mounting bracket 1 4 20UNC 20THREAD 1 L 4 5mm 0 2mm ISO Standard or 0 197 ASA Standard b Auto Iris Lens Con...

Page 12: ...rding to the lens Auto Iris Lens Optional Installed on the lens adaptor M Wipe out a dirty surface of the lens softly with a lens tissue or cloth to which you have applied ethanol Mounting Bracket is...

Page 13: ...ignal Video Out Port Analog video output port for installation Reset Button Resets the camera settings to the default Press and hold for about 5 seconds to reboot the system J If you reset the camera...

Page 14: ...Fit the lens into the mounting screw hole and turn it clockwise Tighten the screw Then it rotates in SLIP mode 2 Turn it clockwise until it contacts on the stopper and stops 3 As you can turn it coun...

Page 15: ...he lens with the camera Using a lens with hood The round hood is mounted on the camera lens which is designed to prevent flare ghost light spreading If it is installed improperly it may cause shading...

Page 16: ...local network or to the Internet Power Supply Use the screwdriver to connect each line of the power cable to the corresponding power port of the camera J If both PoE and DC12V are applied simultaneous...

Page 17: ...ending on the wire length If you use an excessively long wire for camera connection the camera may not work properly Electrical Resistance of Copper Wire at 20 C 68 F Copper Wire Gauge AWG 24 0 22mm2...

Page 18: ...ear panel Port Description Port Description ALARM IN Alarm Input Sensor Port GND GND port for the sensor To connect the external sensor Connect one strand of each signal line 2 strand of the sensors t...

Page 19: ...e able to connect to the camera installed in the intranet if the port forwarding is not properly set or a firewall is set In this case to resolve the problem contact your network administrator By fact...

Page 20: ...the Internet browser to connect to the camera 4 Move to Setup page 5 Move to Network DDNS and configure the DDNS settings 6 Move to Network Interface and set the network type to DHCP 7 Connect the ca...

Page 21: ...owser to connect to the camera 4 Move to Setup page 5 Move to Network DDNS and configure the DDNS settings 6 Move to Network Interface and set the network type to PPPoE 7 Connect the camera which was...

Page 22: ...elow if you select Use the following IP address ex1 If the address LAN IP of the Broadband Router is 192 168 1 1 IP address 192 168 1 100 Subnet Mask 255 255 255 0 Default Gateway 192 168 1 1 ex2 If t...

Page 23: ...either Static Dynamic or PPPoE for the current network connection status MAC Ethernet Address Ethernet address for the connected camera Click the column to sort the list by Ethernet address However s...

Page 24: ...m Exit Exits the IP Installer program M For the IP installer use only the installer version provided in the installation CD or use the latest one if available You can download the latest version from...

Page 25: ...access the camera using the Internet browser defaulted to 80 Use the spin button to change the HTTP Port value VNP Port Used to control the video signal transfer defaulted to 4520 5 Enter the password...

Page 26: ...ser manual of the applicable router Refer to the Port Range Forward Port Mapping Setup section of the Broadband Router s documentation Page 29 If the Broadband Router has more than one camera connecte...

Page 27: ...tons will be activated 2 Click Auto Set The Auto Setting dialog appears The IP Address Subnet Mask and Gateway will be set automatically 3 Enter the password This is the login password for the admin u...

Page 28: ...he DHCP server If connecting the camera directly to modem using the DHCP protocols If IPs are assigned by the internal DHCP server via the LAN Checking the Dynamic IP 1 Run the IP Installer on the use...

Page 29: ...the port range forward for a third party Broadband Router refer to the user guide of that Broadband Router 2 Select TCP and UDP Port for each connected camera to the Broadband Router Each port number...

Page 30: ...ter device through its configuration web page You cannot change the Silverlight policy server port of a camera You can change the ports of the camera except the policy server port through its configur...

Page 31: ...A THE INTERNET Since using the IP Installer on a remote computer that is not in the Broadband Router s network cluster is not allowed users can access cameras within a Broadband Router s network by us...

Page 32: ...111 http 2001 230 abcd ffff 0000 0000 ffff 1111 the Login dialog should appear If the HTTP port is other than 80 1 Launch the Internet browser 2 Type the IP address and HTTP port number of the camera...

Page 33: ...assword is 4321 1 Enter admin in the User Name input box 2 Enter 4321 in the Password input box If the password is changed enter the changed password instead 3 Click OK If you have logged in successfu...

Page 34: ...the PC before you can install the Web viewer plug in If it is not installed yet you will see the error message of There is no VC 2010 runtime installed Please install the runtime library Run vcredist_...

Page 35: ...n the screen Profile type You can select a profile type in Video profile under the Video setup menu Capture Saves the snapshot as an image file in the bmp or jpg format Full Screen Switch the current...

Page 36: ...capture The Capture dialog should appear 2 Click Save button The screenshot will be saved in the specified path M If you encounter an interrupted video when capturing the image with IE8 on a Windows 7...

Page 37: ...tab 2 Click Video profile 3 Select a Video profile option 4 Click the input box of each item and enter select a desired value The context menu may differ depending on the selected codec type Default p...

Page 38: ...r rate will be adjusted to the fastest if the bandwidth is Very high and adjusted to the latest if the bandwidth is Very low ATC limit If the quality or frame rate is adjusted the property will be cha...

Page 39: ...constant bit rate and variable bit rate for compression Constant bit rate CBR varies the video quality and fixes network transfer bit rate while variable bit rate emphasizes the quality by varying ne...

Page 40: ...the data that has changed from the preceding I Frame You can specify a value between 1 and 15 for the H 264 CODEC Video setup 1 From the Setup menu select the Video tab 2 Click Video setup 3 Select a...

Page 41: ...e list select one and click Delete Camera setup You can change the camera settings according to the environment where the camera is located 1 From the Setup menu select the Video tab 2 Click Camera se...

Page 42: ...colors of the camera to be optimized to the outdoor environment It is available in the color temperature of between 1 800 K and 10 500 K including natrium lamp Indoor Automatically corrects the video...

Page 43: ...automatically Auto Depending on the settings such as brightness and shutter speed the iris will be adjusted Manual Fix to Full Open For a camera with the shutter type of AUTO the iris will operate pro...

Page 44: ...ach item and set it properly Day night You can switch the mode to adjust the black and white level as well as the colors Color Always displays the video in colors B W Always displays the video in blac...

Page 45: ...dinates where the camera title is displayed on the screen Time OSD Setup 1 Select Time OSD 2 Select each item and set it properly Time display Specify the use of time display on the screen Date format...

Page 46: ...ec setup 3 Set the image quality The ROI area will be displayed in the specified quality 4 Select a desired area with the mouse pointer and drag it as much as you want You can specify up to 5 distinct...

Page 47: ...manually MAC address Shows the MAC address IP address Displays the current IP address Subnet mask Displays the Subnet mask for the set IP Gateway Displays the Gateway for the set IP DNS1 DNS2 Display...

Page 48: ...the default is 943 M The port range of the Web Streaming is between 4502 and 4534 If the Device port is with this effective range the Web Streaming port should be specified the same as the Device port...

Page 49: ...h Dyndns Password Enter the password for the DDNS service i e password that is registered with Dyndns 5 When done click Apply Registering with DDNS To register your product with the Samsung DDNS 1 Vis...

Page 50: ...msung DDNS 2 Provide the Product ID that you registered product ID with the DDNS site 3 Click Apply When the connection is successfully made you will see the message of Success on the screen Configuri...

Page 51: ...s from only those IPs that are added to the filtering will be accepted 4 Click the Add button The IP list will be created 5 Provide the IP that you want to grant or deny access from When you enter an...

Page 52: ...l on the camera To install the certificate on the camera you need to provide a certificate name it can be arbitrarily assigned by the user certificate file issued from the certification authority and...

Page 53: ...t it 4 Install remove the certificate CA Certificates Select a public certificate that contains the public key Client Certificate Select a public certificate that contains the client certificate key C...

Page 54: ...e button 6 When done click Apply SNMP With the SNMP protocols the system or network admin can monitor the network devices on a remote site and configure the environment settings 1 From the Setup menu...

Page 55: ...ges taken with camera to your PC if an event occurs 1 From the Setup menu select the Event tab 2 Click FTP E mail 3 Select FTP configuration or E mail configuration and enter select a desired value FT...

Page 56: ...default port of the email server is 25 however you can use a different port number according to the email server settings Recipient Enter the address of the email recipient Sender Enter the address of...

Page 57: ...red 6 Specify the Activation time Always Always check if an alarm occurs It activates in operated mode when the alarm occurs If set to Always the activation time cannot be changed Only scheduled time...

Page 58: ...from Event action setup 4 Set whether or not to Enable 5 Specify the Transfer interval 6 Specify the Activation time Always Always activates in operated mode at the set interval Only scheduled time Pe...

Page 59: ...e and Action refer to Alarm input page 57 7 When done click Apply J The default change detection function may not work properly in the following cases A monotonous background or a night low contrast s...

Page 60: ...r sensitivity otherwise such as in a dark place 4 Use the drag and drop method to specify the detection area on the video Mask mode Display the set area Minimum object size Set the minimum area for a...

Page 61: ...n An object hides other objects behind Two or more objects overlap or one object divides in multiple portions Too fast object for a proper detection one object should be found overlapping between cont...

Page 62: ...Provide an explanation about the camera for better understanding Language Select a preferred language for the Web Viewer OSD M The default language is set to English 4 When done click Apply Date Time...

Page 63: ...sed to a hacking thread so it is recommended to change the password after installing the product Note that the security and other related issues caused by the unchanged password shall be responsible f...

Page 64: ...r is found the previous settings will be restored automatically Configuration backup Restore Backs up the current system settings before performing the restoration process The system is automatically...

Page 65: ...and click Save The backup file will be saved to the specified path in the format of bin To restore the backup settings 1 To restore the backup settings click Restore 2 Select a backup file and click O...

Page 66: ...ft dropdown list all logs for the applicable log type will be displayed 5 If one page can not display all the logs available use the bottom buttons to move to the previous next or the last item M If y...

Page 67: ...t rate Framerate fps Show both the actual frame rate and the set frame rate ATC Show the ATC status Concurrent users count Show the number of concurrent users who access the profile Current users Show...

Page 68: ...2 096 H X 1 561 V Scanning System Progressive Min Illumination Color B W 0 7 Lux F1 2 50IRE Color B W 0 4 Lux F1 2 50IRE S N Ratio Video Out CVBS 1 0 Vp p 75 composite 704x480 N 704x576 P for install...

Page 69: ...Mega 20fps 3Mega 15fps Privacy Masking Off On 12 Rectanggular zones Sens up Frame Integration Off Auto 2X 60X Sens up is limited to x30 in maximum if two or more users of different profiles are access...

Page 70: ...1280x720P HD 1024x768 800x600 800x450 640x480 640x360 320x240 320x180 Max Framerate H 264 30fps MJPEG 30fps 1280x1024 30fps 720P HD 3M Mode H 264 Max 20fps at all resolutions MJPEG 800x600 320x180 20...

Page 71: ...ntication IP Address Filtering User access Log 802 1x Authentication Streaming Method Unicast Multicast Max User Access 10 users at Unicast Mode ONVIF Conformance Yes Webpage Language English French G...

Page 72: ...ture Humidity 30 C 60 C 90 RH Ingress Protection Electrical Input Voltage Current 12V DC PoE IEEE802 3af Class2 Power Consumption Max 3 7W DC 12V Max 4 3W PoE Mechanical Color Material Black Silver Al...

Page 73: ...PRODUCT OVERVIEW Unit mm inch English _73 APPENDIX 55 3 2 18 NETWORK ACT LINK RESET VIDEO DC12V ALARM IN 114 3 4 50 74 3 2 93...

Page 74: ...to disconnect under poor network conditions I cannot connect to the system using a tab browser of Internet Explorer 7 0 y When you try to connect to the system using a tab browser the same cookie inf...

Page 75: ...ES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQ...

Page 76: ...ERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY...

Page 77: ...d the following disclaimer in the documentation and or other materials provided with the distribution Neither the name of Cisco Inc Beijing University of Posts and Telecommunications nor the names of...

Page 78: ...eserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions aremet Redistributions of source code must retain the above...

Page 79: ...nderstands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any...

Page 80: ...of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source...

Page 81: ...effectively convey the exclusion of warranty and each file should have at least the copyright line and a pointer to where the full notice is found one line to give the program s name and an idea of w...

Page 82: ...of an exact copy The resulting work is called a modified version of the earlier work or a work based on the earlier work A covered work means either the unmodified Program or a work based on the Prog...

Page 83: ...lidate such permission if you have separately received it d If the work has interactive user interfaces each must display Appropriate Legal Notices however if the Program has interactive interfaces th...

Page 84: ...ms of sections 15 and 16 of this License or b Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by work...

Page 85: ...ork in a country would infringe one or more identifiable patents in that country that you have reason to believe are valid If pursuant to or in connection with a single transaction or arrangement you...

Page 86: ...in any particular case based on the explanations below When we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have t...

Page 87: ...ay charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Library or any portio...

Page 88: ...ther than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compati...

Page 89: ...will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS...

Page 90: ...es SSL This library is free for commercial and non commercial use as long as the following conditions are aheared to The following conditions apply to all code found in this distribution be it the RC4...

Page 91: ...king life Where marked the chemical symbols Hg Cd or Pb indicate that the battery contains mercury cadmium or lead above the reference levels in EC Directive 2006 66 If batteries are not properly disp...

Page 92: ...AMERICA Inc 100 Challenger Rd Suite 700 Ridgefield Park NJ 07660 Toll Free 1 877 213 1222 Direct 1 201 325 6920 Fax 1 201 373 0124 www samsungcctvusa com SAMSUNG TECHWIN EUROPE LTD Samsung House 1000...

Reviews: