AXIS D2110-VE Security Radar

Solution overview

  1. C1310-E horn speaker
  2. Door controller
  3. D2110–VE Security Radar
  4. Fixed dome camera
  5. PTZ camera
  6. Surveillance center

Radar profiles

Note

To use radar profiles your device must be running firmware version 10.11 or later. Go to axis.com to update your firmware.

The user manual is set up to help you use your radar depending on what you want it to do. AXIS D2110-VE Security Radar has two profiles:

  • Area monitoring profile to track both large and small objects moving at speeds lower than 55 km/h (34 mph)

  • Road monitoring profile to track vehicles moving at speeds up to 105 km/h (65 mph)

Any information in this user manual that does not fall under Area monitoring profile or Road monitoring profile is common to both profiles and can be referenced regardless of which one you use.

Where to install the product

  • The radar is intended for monitoring open areas. Any solid object (such as a wall, a fence, a tree, or a large bush) in the coverage area will create a blind spot (radar shadow) behind it.

  • Install the radar on a stable pole or a spot on a wall where there are no other objects or installations. Objects within 1 m (3 ft) to the left and right of the radar, that reflect radio waves, affect the performance of the radar.

  • Metal objects in the field of view causes reflections that affects the ability of the radar to perform classifications.

  • Avoid aiming more than three radars toward each other.

  • If more than three radars are mounted close together, they may interfere with each other. To avoid interference from other AXIS D2110-VE Security Radars, see Install multiple radars.

Install multiple radars

The radio waves continue beyond the detection area, and can interfere with other radars up to 350 m (380 yd) away.

  1. Radar
  2. Detection area
  3. Coexistence area
Note

To avoid interference when more than two radars are mounted in the same coexistence zone, go to Settings > Radar > General and set Number of neighboring radars under Coexistence to 2.

If the radar has more than two neighboring radars within its coexistence area the performance decreases. The detection range becomes shorter, the radar doesn’t classify objects correctly, and false alarms occur due to interference between the radars.

The probability and severity of these issues increases with the number of radars within the same coexistence area. It also depends on the environment and the radar’s direction towards fences, buildings, or neighboring radars.

If more than two radars are crucial in an installation, see Area installation examples.

Area of coverage

The AXIS D2110–VE has a horizontal area coverage of 180°. The detection range corresponds to 5600 m2 (61000 ft2) for humans and 11300 m2 (122000 ft2) for vehicles.

Note

Optimal area coverage applies when the radar is mounted at 3.5–4 m (11–13 ft). Mounting height will affect the size of the blind spot below the radar.

Area monitoring profile

Area monitoring profile is best used for objects moving at up to 55 km/h (34 mph). This profile allows you to detect whether an object is human, vehicle, or unknown. A rule can be set to trigger an event when any of these objects is detected. If you want to track only vehicles moving at speeds higher than 55 km/h (34 mph), you should use the Road monitoring profile.

Area installation examples

Cover a perimeter

To create a virtual fence you can place multiple radars side by side. We recommend placing them with 100 m (330 ft) spacing.

Cover a field around a building

To cover the area around a building, place the radars on the walls of the building facing outwards. The radars can be close to each other without interference.

If you place more than three radars aimed inwards, towards the building, the radars will transmit radio waves into each other which decreases performance.

Cover an area

To cover a large open area, use two pole mounts to place two radars back to back.

Note

When two radars are mounted this close together, they are in the same coexistence zone.

You can use the PoE output from one radar to power the second radar but it is not possible to connect a third radar this way.

Note

The PoE output on the radar is enabled when the radar is powered by a 60 W midspan.

Area detection range

Detection range is the distance within which an object can be tracked and can trigger an alarm. It is measured from near detection limit (how close to the device a detection can be made) to a far detection limit (how far from the device a detection can be made).

The Area monitoring profile is optimized for human detection, however, it will also allow you to track vehicles and other objects moving at up to 55 km/h (34 mph) with a velocity accuracy of +/- 2 km/h (1.24 mph).

When mounted at the optimal installation height, the detection ranges are:

  • 3–60 m (10–200 ft) when detecting a human

  • 3–85 m (10–280 ft) when detecting a vehicle

Note
  • If you install the radar at a different height, enter the actual mounting height in the product’s web pages when you calibrate the radar.
  • The detection range is affected by the scene.
  • The detection range is affected by neighboring radars.
  • The detection range is affected by the object type.
  • The detection range was measured under these conditions:
  • The range was measured along the ground.

  • The object was a 170 cm (5 ft 7 in) tall person.

  • The person was walking straight in front of the radar.

  • The values are measured when the person enters the detection zone.

  • The radar sensitivity was set to Medium.

Mounting height0° tilt10° tilt20° tilt

2.5 m
(8.2 ft)

3.0–60 m
(9.8–197 ft)

Not recommendedNot recommended

3.5 m
(11 ft)

3.0–60 m
(9.8–197 ft)

Not recommendedNot recommended

4.5 m
(15 ft)

4.0–60 m
(13–197 ft)

Not recommendedNot recommended

5.5 m
(18 ft)

7.5–60 m
(25–197 ft)

Not recommendedNot recommended

6.5 m
(21 ft)

7.5–60 m
(25–197 ft)

5.5–60 m
(18–197 ft)

Not recommended

8 m
(26 ft)

Not recommended

9–60 m
(30–197 ft)

7.5–30 m
(25–98 ft)

10 m
(33 ft)

Not recommended

15–60 m
(49–197 ft)

9–35 m
(30–115 ft)

12 m
(39 ft)

Not recommended

23–60 m
(75–197 ft)

13–38 m
(43–125 ft)

14 m
(36 ft)

Not recommended

27–60 m
(89–197 ft)

17–35 m
(56–115 ft)

16 m
(52 ft)

Not recommendedNot recommended

25–50 m
(82–164 ft)

Area monitoring use cases

Swimming pool area coverage

A public swimming pool has had a series of intrusions after hours. Due to the private nature of the business, the owners cannot install video surveillance. They have chosen to install a radar and set it up in the Area monitoring profile. The radar is mounted on the building and covers the whole swimming pool and most of the area around it. It triggers a warning from a speaker when a human is detected between closing at 20:00 and opening at 06:00.

Cover the field around a building

A chemical factory adds another layer of security to their system by using radars to cover the area around a sensitive building. The security system already includes cameras, thermal cameras and door controllers. Radars can trigger events that cause cameras to track the intruder, zoom in, and record activity. Flashing beacons, linked to thermal cameras, are triggered to flash so the intruder knows that the area is protected. And door controllers can restrict access. The radars help the defence system move into action long before the intruder has reached the sensitive building.

Cover a large open area

A parking lot outside a small shopping center has had increased vehicle break-ins after hours. They have one security guard on duty at a time but feel they need to bolster their security at night without the added cost of hiring more staff. They have decided to install two security radars, in the Area monitoring profile, mounted back-to-back so that they cover the entire parking area. The radars are configured to alert the on-duty security guard of suspicious behavior so that they can investigate the scene. They could also install a horn speaker that is triggered by the radars to play an alert that may deter thieves.

Road monitoring profile

The Road monitoring profile is best used to track vehicles moving at up to 105 km/h (65 mph) in urban zones, closed zones, and on sub-urban roads. This mode should not be used for detection of humans or other types of objects. To track objects other than vehicles, use your radar in the Area monitoring profile.

Road installation examples

Side mounted

To monitor vehicles travelling along a road you can mount the radar on to the side of the road. The radar will provide a lateral coverage distance of 10 m (32 ft).

Center mounted

This mount option will require a stable position that will allow the radar to be mounted above the road. The radar will provide a lateral coverage distance of 10 m (32 ft) to both sides of the radar. The radar covers a broader lateral distance when center mounted.

Note

We recommend that the radar is mounted at a height between 3 m (10 ft) and 8 m (26 ft) for the Road monitoring profile.

Road detection range

Detection range is the distance within which an object can be tracked and can trigger an alarm. It is measured from near detection limit (how close to the device a detection can be made) to a far detection limit (how far from the device a detection can be made).

This profile is optimized for detection of vehicles and will produce a velocity accuracy of +/- 2 km/h (1.24 mph) when monitoring vehicles moving at up to 105 km/h (65 mph).

Detection range when the radar is mounted at an optimal installation height:

  • 25–70 m (82–229 ft) for vehicles moving at 60 km/h (37 mph).

  • 30–60 m (98–196 ft) for vehicles moving at 105 km/h (65 mph).

Note

If the maximum number of radars in the same coexistence zone exceeds two then expect a range degradation of approximately 10% (near) and 20% (far).

Road monitoring use cases

Regulating vehicles in low speed zones

An industrial complex with a long road between two warehouses has installed a radar to help enforce a speed limit of 60 km/h (37 mph). In the Road monitoring profile, the radar can detect when a vehicle in its detection zone exceeds that speed. It then triggers an event which sends an email notifications to drivers and managers. The reminder helps increase compliance with the speed restrictions.

Unwanted vehicles on a closed road

A small road out to an old quarry has been closed, however, reports of vehicles driving on the road have resulted in authorities installing a security radar in the Road monitoring profile. The radar is mounted alongside the road and covers the entire width of the road. Whenever a vehicle enters the include zone, it triggers a flashing beacon that warns drivers to leave the road. It also sends a message to the security team so that they can dispatch a unit if needed.

Speed awareness on the road

A road that passes through a small town has had some incidents of speeding. To enforce the speed limit of 70 km/h (43 mph), the traffic control has installed a security radar, in the Road monitoring profile, on a bridge that crosses over the road. This has allowed them to detect the speed that vehicles are travelling at and monitor when they should have units stationed long the road to control the traffic.

Safety with humans and vehicles

Staff at a school have identified two safety issues that they would like to address. They have experienced unwanted visitors entering the premises during the school day as well as vehicles violating the low speed zone of 20 km/h (12 mph) outside the school. Because the Area monitoring profile makes the radar capable of tracking humans and vehicles moving at speeds lower than 55 km/h (34 mph), it was selected as a solution to address both issues. It is mounted on a wall at the entrance of the school and is operated in the Area monitoring profile. This helps the staff keep track of people coming and going during school hours while also being able to trigger a speaker to warn pedestrians when a passing vehicle is driving too fast.

Get started

Find the device on the network

To find Axis devices on the network and assign them IP addresses in Windows®, use AXIS IP Utility or AXIS Device Manager. Both applications are free and can be downloaded from axis.com/support.

For more information about how to find and assign IP addresses, go to How to assign an IP address and access your device.

Browser support

You can use the device with the following browsers:

ChromeTM

Firefox®

EdgeTM

Safari®

Windows®

recommended

recommended

macOS®

recommended

recommended

Linux®

recommended

recommended

Other operating systems

✓*

*To use AXIS OS web interface with iOS 15 or iPadOS 15, go to Settings > Safari > Advanced > Experimental Features and disable NSURLSession Websocket.

Open the device's webpage

  1. Open a browser and enter the IP address or host name of the Axis device.

    If you do not know the IP address, use AXIS IP Utility or AXIS Device Manager to find the device on the network.

  2. Enter the username and password. If you access the device for the first time, you must set the root password. See Set a new password for the root account.

Set a new password for the root account

The default administrator username is root. There’s no default password for the root account. You set a password the first time you log in to the device.

  1. Type a password. Follow the instructions about secure passwords. See Secure passwords.

  2. Retype the password to confirm the spelling.

  3. Click Add user.

Important

If you lose the password for the root account, go to Reset to factory default settings and follow the instructions.

Secure passwords

Important

Axis devices send the initially set password in clear text over the network. To protect your device after the first login, set up a secure and encrypted HTTPS connection and then change the password.

The device password is the primary protection for your data and services. Axis devices do not impose a password policy as they may be used in various types of installations.

To protect your data we strongly recommend that you:

  • Use a password with at least 8 characters, preferably created by a password generator.

  • Don’t expose the password.

  • Change the password at a recurring interval, at least once a year.

Webpage overview

This video gives you an overview of the device interface.

Axis device web interface

Configure your device

Calibrate the radar

The radar is ready to use as soon as it is installed. The default live view will show the radar coverage and any detected movement, and you can add detection zones and rules right away.

If the radar is mounted 3.5 m (11 ft) above ground, there is no need to do anything else. If the radar is mounted on a different height you need to calibrate the radar to compensate for the mounting height.

To make it easier to see where objects are moving, you can upload a reference map, for example a ground plan or an aerial photo, that shows the area covered by the radar.

  • Image requirements:
  • Supported file formats are jpeg and png.

  • The image can be cropped in the radar.

  • The image can be rotated ±35° in the radar.

  • The orientation is not important, since the radar coverage shape will move to adapt to the image during calibration.

After uploading the reference map you need to calibrate the reference map so that the actual radar coverage fits the position, direction and scale of the reference map.

  • There are two methods for calibrating the reference map:
  • Pins (easy): This calibration is performed in the web interface by clicking in the reference map. This is the easiest way to calibrate the reference map, and you can use it if you do not have physical access to the site.

  • Tracks (accurate): This calibration method requires a person to move in front of the radar. This is the most accurate way to calibrate the reference map, but you can’t use it if there is a lot of other movement in the scene.

    You can do this yourself while accessing the web interface from a mobile device, or have someone else move and follow your instructions.

    When moving around in the different steps, move to places that are easy to find in the reference map.

How to calibrate the radar

  1. To configure the radar, go to Settings > Radar > Calibration, click Start and follow the instructions.

About detection zones

To determine where to detect motion, you can add multiple zones. Different zones can be used to trigger different actions.

  • There are two types of zones:
  • An include zone is an area in which moving objects will trigger rules. The default include zone matches the entire area covered by the radar.

  • An exclude zone is an area in which moving objects will be ignored. Use exclude zones if there are areas inside an include zone that trigger a lot of unwanted alarms.

Remove unwanted reflections

Objects of radar-reflective materials, such as metal roofs, fences, vehicles, and even brick walls may disturb the radar’s performance. They may create reflections which cause apparent detections that can be difficult to separate from real detections.

  1. Actual detection
  2. Reflected detection
  1. To avoid unwanted detections, set up an exclude zone.

Add an include zone

  1. Go to Settings > RMD zones and click .

  2. Select Include zone.

  3. Select to modify the settings of the zone. For more information, see the product’s built in help.

  4. Modify the shape of the include zone, see Modify a detection zone.

Modify an include zone

Select to modify an include zone.

  • To set the speed range that you want an include zone to trigger on:

    • Under Trigger between drag both handles of the slider to set the speed range. Your device will trigger when an object is moving within the speed range.

      • Click Invert if you want to set your device to trigger when an object is moving below a certain speed and above a certain speed.

  • To see what result the modification has on the include zone:

    • Click Test alarm.

Add an exclude zone

  1. Go to Settings > RMD zones and click .

  2. Select Exclude zone.

  3. Modify the shape of the exclude zone, see Modify a detection zone.

Modify a detection zone

  • Use the mouse to move and shape the zone so that it covers the desired part of the reference map.
  • To add a new corner, click on the zone border. Drag the corner to the desired position.

  • To remove a corner, right-click on the corner.

  • To move a corner, click and drag the corner to the new position.

  • To move the zone, place the pointer inside the zone and drag the zone to the new position.

Add crossline detection

  1. Go to Settings > RMD zones and click .

  2. Select Crossline detection.

  3. Modify the line:

    • To move the line, click and drag it.

    • To move a point, click and drag it.

    • To add a point, click on the line.

    • To remove a point, right-click on the point.

  4. To change the detection direction and edit other settings, click .

For more information, see the product’s built in help.

View and record video

This section includes instructions about configuring your device. To learn more about how streaming and storage works, go to .

Reduce bandwidth and storage

Important

Reducing the bandwidth can result in loss of details in the image.

  1. Go to Video > Stream.

  2. Click in the live view.

  3. Select Video format H.264.

  4. Go to Video > Stream > General and increase Compression.

  5. Go to Video > Stream > H.264 and H.265 encoding and do one or more of the following:

    • Select the Zipstream level that you want to use.

    • Turn on Dynamic FPS.

    • Turn on Dynamic GOP and set a high Upper limit GOP length value.

Set up network storage

  1. To store recordings on the network, you need to set up your network storage.
  2. Go to System > Storage.

  3. Click Add network storage under Network storage.

  4. Type the IP address of the host server.

  5. Type the name of the shared location on the host server under Network share.

  6. Type the username and password.

  7. Select the SMB version or leave it on Auto.

  8. Select Add share even if connection fails if you experience temporary connection issues, or if the share is not yet configured.

  9. Click Add.

Record and watch video

  1. Record video directly from the camera
  2. Go to Video > Image.

  3. To start a recording, click .

    If you haven’t set up any storage, click and . For instructions on how to set up network storage, see Set up network storage

  4. To stop recording, click again.

  1. Watch video
  2. Go to Recordings.

  3. Click for your recording in the list.

Set up rules for events

To learn more, check out our guide Get started with rules for events.

Trigger an action

  1. Go to System > Events and add a rule. The rule defines when the device will perform certain actions. You can set up rules as scheduled, recurring, or manually triggered.

  2. Enter a Name.

  3. Select the Condition that must be met to trigger the action. If you specify more than one condition for the rule, all of the conditions must be met to trigger the action.

  4. Select which Action the device should perform when the conditions are met.

Note

If you make changes to an active rule, the rule must be turned on again for the changes to take effect.

Trigger an alarm if someone opens the housing

This example explains how to trigger an alarm if someone opens the housing.

  1. Add a recipient:
  2. Go to System > Events > Recipients and click Add recipient.

  3. Type a name for the recipient.

  4. Select Email.

  5. Type an email address to send the email to.

  6. The camera doesn’t have it’s own email server, so it will need to log into another email server to be able to send mails. Fill in the rest of the information according to your email provider.

  7. To send a test email, click Test.

  8. Click Save.

  9. Create a rule:
  10. Go to System > Events > Rules and add a rule.

  11. Type a name for the rule.

  12. In the list of conditions, select Casing open.

  13. In the list of actions, select Send notification to email.

  14. Select a recipient from the list.

  15. Type a subject and a message for the email.

  16. Click Save.

How to

How to record radar data when motion is detected

This example explains how to set up the radar to start recording to the SD card five seconds before it detects motion and to stop one minute after.

The recording will show the reference map with the trail of the moving object.

  1. Create a rule:
  2. Go to Settings > System > Events and add a rule.

  3. Type a name for the rule.

  4. From the list of conditions, select an include zone under Radar motion. To set up an include zone, see Add an include zone.

  5. From the list of actions, select Record video.

  6. Set the prebuffer to 5 seconds.

  7. Set the postbuffer to 60 seconds.

  8. Select SD card from the list of storage options.

  9. Click Save.

How to record video from a camera when motion is detected

This example explains how to set up the radar and a camera so that the camera starts recording to the SD card five seconds before the radar detects motion and to stop one minute after.

  1. Connect the devices:
  2. Connect a cable from an I/O output on the radar to an I/O input on the camera.

  3. Configure the I/O port of the radar:
  4. Go to Settings > System > I/O ports and configure the I/O port as an output and select the normal state.

  5. Create a rule in the radar:
  6. Go to Settings > System > Events and add a rule.

  7. Type a name for the rule.

  8. From the list of conditions, select an include zone under Radar motion. To set up an include zone, see Add an include zone.

  9. From the list of actions, select Toggle I/O while the rule is active and then select the port that is connected to the camera.

  10. Click Save.

  11. Configure the I/O port of the camera:
  12. Go to Settings > System > I/O ports and configure the I/O port as an input and select the normal state.

  13. Create a rule in the camera:
  14. Go to Settings > System > Events and add a rule.

  15. Type a name for the rule.

  16. From the list of conditions, select Digital Input and then select the port that should trigger the rule.

  17. From the list of actions, select Record video.

  18. Select an existing stream profile or create a new one.

  19. Set the prebuffer to 5 seconds.

  20. Set the postbuffer to 60 seconds.

  21. Select SD card from the list of storage options.

  22. Click Save.

How to turn on a light when motion is detected

Turning on a light when an intruder enters the detection zone can have a deterring effect, and will also improve the image quality of a visual camera recording the intrusion.

This example explains how to set up the radar and an illuminator so that the illuminator turns on when the radar detects motion and turns off after one minute.

  1. Connect the devices:
  2. Connect one of the illuminator cables to the power supply via the relay port on the radar. Connect the other cable directly between the power supply and the illuminator.

  3. Configure the relay port of the radar:
  4. Go to Settings > System > I/O ports and select Open circuit as the normal state.

  5. Create a rule in the radar:
  6. Go to Settings > System > Events and add a rule.

  7. Type a name for the rule.

  8. From the list of triggers, select an include zone under Radar motion. To set up an include zone, see Add an include zone.

  9. From the list of conditions, select Toggle I/O once and then select the relay port.

  10. Select Active.

  11. Set the Duration.

  12. Click Save.

How to control a PTZ camera with the radar

It is possible to use the information about objects’ positions from the radar to make a PTZ camera track objects.

  • There are two ways to do this:
  • Use the built-in Radar autotracking. Use this option when you have one PTZ camera and one radar mounted very close together. This option creates an edge to edge solution where the radar directly controls the camera.

    1. Go to Settings > System > Radar autotracking.

    2. Enter the IP address, username and password for the PTZ camera.

    3. Click Connect and follow the instructions.

  • Note

    The camera must be installed directly above or below the radar.

    The application does not use the include zones in the radar. It uses the entire radar coverage, except exclude zones, to detect motion.

  • Use the Windows® application AXIS Radar Autotracking for PTZ, to use multiple cameras with multiple radars. Download AXIS Radar Autotracking for PTZ from axis.com and follow the instructions in the application to install on your VMS server (or another computer with access to both the camera and the radar).

    This is a server-based solution that can handle different setups:

    • Control several PTZ cameras with one radar.

    • Control one PTZ camera with several radars.

    • Control several PTZ cameras with several radars.

    • Control one PTZ camera with one radar when they are mounted in different positions covering the same area.

How to minimize false alarms

If you notice that you get too many false alarms, you can filter out certain types of movement or objects, change the coverage, or adjust the detection sensitivity. Test which settings work best for your environment.

  • Adjust the detection sensitivity:

    Go to Settings > Radar > Detection and select a lower Detection sensitivity. This decreases the risk of false alarms, but it could also cause the radar to miss some movement. The sensitivity setting affects all zones.

    • Low: Use this sensitivity when there are a lot of metal objects or large vehicles in the area. It will take longer time for the radar to track and classify objects. This can reduce the detection range, especially for fast moving objects.

    • High: Use this sensitivity when you have an open field without metal objects in front of the radar. This will increase the detection range for humans.

  • Modify the include and exclude zones:

    If the include zone includes hard surfaces, such as a metal wall, there may be reflections that causes multiple detections for a single physical object. In this case, modify the include zone, see Modify a detection zone, or add an exclude zone that masks everything behind the surface, see Add an exclude zone.

  • Filter on movement:

    Go to Settings > Radar > Detection and select Ignore swaying objects. This setting will minimize false alarms from trees, bushes, and flagpoles in the coverage zone.

  • Filter on time:

    Go to Settings > RMD zones and select a zone to modify its settings.

    Enable Short-lived object and set a delay time from when the radar starts tracking an object until it can trigger and alarm. The timer starts when the radar first detects the object, not when the object enters the include zone.

  • Filter on object type:

    The radar will classify objects depending on the radar echo that they produce. If it can’t determine the object type, the object will be classified as Unknown.

    Go to Settings > RMD zones and select a zone to modify its settings.

    To avoid triggering on specific object types, enable the filter and deselect the object types that should not trigger events in this zone.

Validate your installation

Validate the installation of the radar

Note

This test helps you validate your installation under current conditions. The everyday performance of your installation can be affected by changes in the scene.

The radar is ready to use as soon as it is installed, however, we recommend that you perform a validation before you start to use it. This can increase the accuracy of the radar by helping you to identify any problems with the installation or manage objects (such as trees and reflective surfaces) in the scene.

First Calibrate the radar before attempting the validation.

It is a good idea to perform the validation whenever:

  • There are objects in the scene that you want to exclude so that the zones can contain certain objects such as vegetations or metal surfaces.

  • You pair the radar with a PTZ camera and want to configure Radar autotracking.

  • The radar mounting height is changed.

Validate the radar

Check there are no false detections

  1. Check that the include zone of the radar is clear from human activity.

  2. Wait for a few minutes to ensure the radar is not detecting any static objects in the included RMD (Radar Motion Detection) zones.

  3. If there are no unwanted detections you can skip step 4.

  4. If there are unwanted detections, learn how to filter out certain types of movement or objects, change the coverage, or adjust the detection sensitivity in How to minimize false alarms.

Check for the correct symbol and direction of travel when the radar is approached from the front

  1. Go into the radar’s web interface and choose to record the session. For help doing this go to Record and watch video.

  2. Begin 60 m (197 ft) in front of the radar and walk directly towards the radar.

  3. Check the session on the radar’s web interface. The symbol for a human classification should appear when you are detected.

  4. Check that the radar’s web interface shows the correct direction of travel.

Check for the correct symbol and direction of travel when the radar is crossed

  1. Go into the radar’s web interface and choose to record the session. For help doing this go to Record and watch video.

  2. Begin 60 m (197 ft) out from the radar and walk straight across the radar.

  3. Check that the radar’s web interface shows the symbol for a human classification.

  4. Check that the radar’s web interface shows the correct direction of travel.

Create a table similar to the one below to help you record the data from your validation.

TestPass/FailComment
1. Check there are no unwanted detections when the area is clear
2a. Check the object is detected with the correct symbol for ‘Human’ when the radar is approached from the front
2b. Check the direction of travel is correct when the radar is approached from the front
3a. Check the object is detected with the correct symbol for ‘Human’ when the radar is crossed
3b. Check the direction of travel is correct when the radar is crossed

Complete the validation

Once you have successfully completed the first part of the validation, you should perform the following tests to complete the validation process.

  1. Make sure you have configured your radar and followed the instructions.

  2. For further validation, Calibrate the radar.

  3. Set the radar include zone to trigger to when an appropriate object is detected. By default, the prebuffer is set to two seconds but you can you can change this in the web interface if needed.

  4. Set the radar to How to record radar data when motion is detected when an appropriate object is detected.

  5. Set the trial lifetime to one hour so that it will safely exceed the time it takes for you to leave your seat, walk around the area of surveillance, and return to your seat. The trial lifetime will keep the track in the radar's live view for the set time and, once you have finished the validation, it can be disabled.

  6. Walk along the border of the radar coverage area and make sure that the trailing on the system matches the route that you walked.

  7. If you are unsatisfied with the results of your validation, you should re-calibrate the reference map and repeat the validation.

The device interface

You reach the device interface by entering the IP address of the device in a web browser.

Note

Support for the features and settings described in this section varies between devices.

Show or hide the main menu.

Access the product help.

Change the language.

Set light theme or dark theme.

The user menu contains:

  • Information about the user who is logged in.

  • Change user : Log out the current user and log in a new user.

  • Log out : Log out the current user.

The context menu contains:

  • Analytics data: Accept to share non-personal browser data.

  • Feedback: Share any feedback to help us improve your user experience.

  • Legal: View information about cookies and licenses.

  • About: View device information, including firmware version and serial number.

  • Legacy device interface: Change the device interface to the legacy device interface.

Status

NTP sync

Shows NTP synchronization information, including if the device is in sync with an NTP server and the time remaining until the next sync.

NTP settings: Click to go to the Date and time page where you can change the NTP settings.

Device info

Shows device information, including firmware version and serial number.

Upgrade firmware: Click to go to the Maintenance page where you can do a firmware upgrade.

Video

Click to play the live video stream.

Click to freeze the live video stream.

Click to take a snapshot of the live video stream. The file is saved in the ‘Downloads’ folder on your computer. The image file name is [snapshot_YYYY_MM_DD_HH_MM_SS.jpg]. The size of the snapshot depends on the compression that is applied from the specific web-browser engine where the snapshot is received, therefore, the snapshot size may vary from the actual compression setting that is configured in the device.

Click to show I/O output ports. Use the switch to open or close the circuit of a port, for example to test external devices.

Click to manually turn on or turn off the IR illumination.

Click to access onscreen controls:

  • Predefined controls: Turn on to use the available onscreen controls.

  • Custom controls: Click Add custom control to add an onscreen control.

Click to manually turn on the heater for a selected period of time.

Click to start a continuous recording of the live video stream. Click again to stop the recording. If a recording is ongoing, it will resume automatically after a reboot.

Click to show the storage that is configured for the device. To configure the storage you need to be logged in as an administrator.

Click to access more settings:

  • Video format: Select the encoding format to use in the live view. If you select a format with video compression, it results in a higher CPU and memory usage.

  • Client stream information: Turn on to show dynamic information about the video stream used by the browser that shows the live video stream. The bitrate information differs from the information shown in a text overlay, because of different information sources. The bitrate in the client stream information is the bitrate of the last second, and it comes from the encoding driver of the device. The bitrate in the overlay is the average bitrate of the last 5 seconds, and it comes from the browser. Both values cover only the raw video stream and not the additional bandwidth generated when it’s transported over the network through UDP/TCP/HTTP.

  • Adaptive stream: Turn on to adapt the image resolution to the viewing client’s actual display resolution, to increase the user experience and help prevent a possible overload of the client’s hardware. The adaptive stream is only applied when you view the live video stream in the web interface in a browser. When adaptive stream is turned on, the maximum frame rate is 30 fps. If you take a snapshot while adaptive stream is turned on, it will use the image resolution selected by the adaptive stream.

  • Level grid: Click to show the level grid. The grid helps you decide if the image is horizontally aligned. Click to hide it.

  • Pixel counter: Click to show the pixel counter. Drag and resize the box to contain your area of interest. You can also define the pixel size of the box in the Width and Height fields.

  • Refresh: Click to refresh the still image in the live view.

Click to show the live view at full resolution. If the full resolution is larger than your screen size, use the smaller image to navigate in the image.

Click to show the live video stream in full screen. Press Esc to exit full screen mode.

Installation

Capture mode: A capture mode is a preset configuration that defines how the camera captures images. When you change the capture mode, it can affect many other settings, such as view areas and privacy masks.

Mounting position: The orientation of the image can change depending on how the camera is mounted.

Power line frequency: Select the frequency that is used in your region to minimize image flicker. The American regions usually use 60 Hz. The rest of the world mostly uses 50 Hz. If you're not sure of your region's power line frequency, check with the local authorities.

Overlays

: Click to add an overlay. Select the type of overlay from the dropdown list:

  • Text: Select to show a text that is integrated in the live view image and visible in all views, recordings and snapshots. You can enter your own text, and you can also include pre-configured modifiers to automatically show for example time, date, frame rate.

    • : Click to add the date modifier %F to show yyyy-mm-dd.

    • : Click to add the time modifier %X to show hh:mm:ss (24-hour clock).

    • : Click to select any of the modifiers shown in the list to add them to the text box. For example, %a shows the day of the week.

    • Size: Select the desired font size.

    • Appearance: Select the text color and background color, for example, white text on a black background (default).

    • : Select the position of the overlay in the image.

  • Image: Select to show a static image superimposed over the video stream. You can use .bmp, .png, .jpeg, or .svg files.

    To upload an image, click Images. Before you upload an image, you can choose to:

    • Scale with resolution: Select to automatically scale the overlay image to fit the video resolution.

    • Use transparency: Select and enter the RGB hexadecimal value for that color. Use the format RRGGBB. Examples of hexadecimal values: FFFFFF for white, 000000 for black, FF00000 for red, 6633FF for blue, and 669900 for green. Only for .bmp images.

  • Streaming indicator: Select to show an animation superimposed over the video stream. The animation indicates that the video stream is live, even if the scene doesn’t contain any motion.

    • Appearance: Select the animation color and background color, for example, red animation on a transparent background (default).

    • Size: Select the desired font size.

    • : Select the position of the overlay in the image.

Recordings

Click to filter the recordings.

From: Show recordings done after a certain point in time.

To: Show recordings up until a certain point in time.

Source: Show recordings based on source.

Event: Show recordings based on events.

Storage: Show recordings based on storage type.

Click to play the recording.

Click to stop the recording.

Click to show more information and options about the recording.

Set export range: If you only want to export part of the recording, enter from when to when.

Click to delete the recording.

Export: Click to export (part of) the recording.

Apps

Add app: Click to install a new app.

Find more apps: Click to go to an overview page of Axis apps.

The context menu contains:

  • App log: Click to view a log of the app events. The log is helpful when you contact support.

  • Activate license with a key: If the app requires a license, you need to activate it. Use this option if your device doesn’t have internet access.

    If you don’t have a license key, go to axis.com/applications. You need a license code and the Axis product serial number to generate a license key.

  • Activate license automatically: If the app requires a license, you need to activate it. Use this option if your device has internet access. You need a license code to activate the license.

  • Deactivate the license: Deactivate the license to use it in another device. If you deactivate the license, you also remove it from the device. To deactivate the license requires internet access.

  • Settings: Configure the parameters.

  • Delete: Delete the app permanently from the device. If you don’t deactivate the license first, it remains active.

Note

The device’s performance might be affected if you run several apps at the same time.

Start: Start or stop the app.

Open: Click to access the app’s settings. The available settings depend on the application. Some applications don’t have any settings.

System

Date and time

The time format depends on the web browser’s language settings.

Note

We recommend you to synchronize the device’s date and time with an NTP server.

Synchronization: Select an option for synchronizing the device’s date and time.

  • Automatic date and time (NTP server using DHCP): Synchronize with the NTP server connected to the DHCP server.

  • Automatic date and time (manual NTP server): Synchronize with NTP servers of your choice.

    • Primary NTP server and Secondary NTP server: Enter the IP address of one or two NTP servers. When you use two NTP servers, the device synchronizes and adapts its time based on input from both.

  • Custom date and time: Manually set the date and time. Click Get from system to fetch the date and time settings once from your computer or mobile device.

  • Time zone: Select which time zone to use. Time will be automatically adjusted for daylight saving time and standard time.
Note

The system uses the date and time settings in all recordings, logs and system settings.

Network

IPv4 and IPv6

IPv4

  • Automatic IP (DHCP) and DNS (DHCP): The recommended setting for most networks. The current settings are updated automatically.

  • Automatic IP (DHCP) and manual DNS: Contact your network administrator to configure the manual settings. The current automatic settings are updated automatically.

  • Manual IP and DNS: Contact your network administrator to configure the settings.

IP address: Enter a unique IP address for the device. Static IP addresses can be assigned at random within isolated networks, provided that each address is unique. To avoid conflicts, we recommend you to contact your network administrator before you assign a static IP address.

Subnet mask: Enter the subnet mask.

Router: Enter the IP address of the default router (gateway) used to connect devices that are attached to different networks and network segments.

Hostname: Enter the hostname.

Search domains: When you use a hostname that is not fully qualified, click Add search domain and enter a domain in which to search for the hostname used by the device.

DNS servers: Click Add DNS server and enter the IP address of the primary DNS server. This provides the translation of hostnames to IP addresses on your network.

IPv6

Assign IPv6 automatically: Select to let the network router assign an IP address to the device automatically.

HTTP and HTTPS

Allow access through: Select if a user is allowed to connect to the device through the HTTP, HTTPS, or both HTTP and HTTPS protocols.

HTTPS is a protocol that provides encryption for page requests from users and for the pages returned by the web server. The encrypted exchange of information is governed by the use of an HTTPS certificate, which guarantees the authenticity of the server.

To use HTTPS on the device, you must install an HTTPS certificate. Go to System > Security to create and install certificates.

Note

If you view encrypted web pages through HTTPS, you might experience a drop in performance, especially when you request a page for the first time.

HTTP port: Enter the HTTP port to use. Port 80 or any port in the range 1024-65535 are allowed. If you are logged in as an administrator, you can also enter any port in the range 1-1023. If you use a port in this range, you get a warning.

HTTPS port: Enter the HTTPS port to use. Port 443 or any port in the range 1024-65535 are allowed. If you are logged in as an administrator, you can also enter any port in the range 1-1023. If you use a port in this range, you get a warning.

Certificate: Select a certificate to enable HTTPS for the device.

Friendly name

Bonjour®: Turn on to allow automatic discovery on the network.

Bonjour name: Enter a friendly name to be visible on the network. The default name is the device name and MAC address.

Use UPnP®: Turn on to allow automatic discovery on the network.

UPnP name: Enter a friendly name to be visible on the network. The default name is the device name and MAC address.

One-click cloud connection

One-click cloud connection (O3C) together with an O3C service provides easy and secure internet access to live and recorded video from any location. For more information, see axis.com/end-to-end-solutions/hosted-services.

Allow O3C:

  • One-click: The default setting. Press and hold the control button on the device to connect to an O3C service over the internet. You need to register the device with the O3C service within 24 hours after you press the control button. Otherwise, the device disconnects from the O3C service. Once you have registered the device, Always is enabled and the device stays connected to the O3C service.

  • Always: The device constantly attempts to connect to an O3C service over the internet. Once you have registered the device, it stays connected to the O3C service. Use this option if the control button on the device is out of reach.

  • No: Disables the O3C service.

Proxy settings: If needed, enter the proxy settings to connect to the HTTP server.

Host: Enter the proxy server’s address.

Port: Enter the port number used for access.

Login and Password: If needed, enter username and password for the proxy server.

Authentication method:

  • Basic: This method is the most compatible authentication scheme for HTTP. It’s less secure than the Digest method because it sends the username and password unencrypted to the server.

  • Digest: This method is more secure because it always transfers the password encrypted across the network.

  • Auto: This option lets the device select the authentication method depending on the supported methods. It prioritizes the Digest method over the Basic method.

Owner authentication key (OAK): Click Get key to fetch the owner authentication key. This is only possible if the device is connected to the internet without a firewall or proxy.

SNMP

The Simple Network Management Protocol (SNMP) allows remote management of network devices.

SNMP: Select the version of SNMP to use.

  • v1 and v2c:

    • Read community: Enter the community name that has read-only access to all supported SNMP objects. The default value is public.

    • Write community: Enter the community name that has read/write access to all supported SNMP objects (except read-only objects). The default value is write.

    • Activate traps: Turn on to activate trap reporting. The device uses traps to send messages for important events or status changes to a management system. In the device interface, you can set up traps for SNMP v1 and v2c. Traps are automatically turned off if you change to SNMP v3 or turn off SNMP. If you use SNMP v3, you can set up traps through the SNMP v3 management application.

    • Trap address: Enter the IP address or host name of the management server.

    • Trap community: Enter the community to use when the device sends a trap message to the management system.

    • Traps:

      • Cold start: Sends a trap message when the device starts.

      • Warm start: Sends a trap message when you change an SNMP setting.

      • Link up: Sends a trap message when a link changes from down to up.

      • Authentication failed: Sends a trap message when an authentication attempt fails.

Note

All Axis Video MIB traps are enabled when you turn on SNMP v1 and v2c traps. For more information, see AXIS OS Portal > SNMP.

  • v3: SNMP v3 is a more secure version, which provides encryption and secure passwords. To use SNMP v3, we recommend you to activate HTTPS, as the password is then sent through HTTPS. This also prevents unauthorized parties to access unencrypted SNMP v1 and v2c traps. If you use SNMP v3, you can set up traps through the SNMP v3 management application.

    • Password for the account “initial”: Enter the SNMP password for the account named “initial”. Although the password can be sent without activating HTTPS, we don’t recommend it. The SNMP v3 password can only be set once, and preferably only when HTTPS is enabled. Once the password is set, the password field is no longer displayed. To set the password again, you must reset the device to factory default settings.

Connected clients

The list shows all clients that are connected to the device.

Update: Click to refresh the list.

Security

Certificates

Certificates are used to authenticate devices on a network. The device supports two types of certificates:

  • Client/server certificates

    A client/server certificate validates the device’s identity, and can be self-signed or issued by a Certificate Authority (CA). A self-signed certificate offers limited protection and can be used before a CA-issued certificate has been obtained.

  • CA certificates

    You can use a CA certificate to authenticate a peer certificate, for example to validate the identity of an authentication server when the device connects to a network protected by IEEE 802.1X. The device has several pre-installed CA certificates.

These formats are supported:

  • Certificate formats: .PEM, .CER, and .PFX

  • Private key formats: PKCS#1 and PKCS#12

Important

If you reset the device to factory default, all certificates are deleted. Any pre-installed CA certificates are reinstalled.

Filter the certificates in the list.

Add certificate : Click to add a certificate.

The context menu contains:

  • Certificate information: View an installed certificate’s properties.

  • Delete certificate: Delete the certificate.

  • Create certificate signing request: Create a certificate signing request to send to a registration authority to apply for a digital identity certificate.

IEEE 802.1x

IEEE 802.1x is an IEEE standard for port-based network admission control providing secure authentication of wired and wireless network devices. IEEE 802.1x is based on EAP (Extensible Authentication Protocol).

To access a network protected by IEEE 802.1x, network devices must authenticate themselves. The authentication is performed by an authentication server, typically a RADIUS server (for example FreeRADIUS and Microsoft Internet Authentication Server).

Certificates

When configured without a CA certificate, server certificate validation is disabled and the device tries to authenticate itself regardless of what network it is connected to.

When using a certificate, in Axis' implementation, the device and the authentication server authenticate themselves with digital certificates using EAP-TLS (Extensible Authentication Protocol - Transport Layer Security).

To allow the device to access a network protected through certificates, a signed client certificate must be installed on the device.

Client certificate: Select a client certificate to use IEEE 802.1x. The authentication server uses the certificate to validate the client’s identity.

CA certificate: Select a CA certificate to validate the authentication server’s identity. When no certificate is selected, the device tries to authenticate itself regardless of what network it is connected to.

EAP identity: Enter the user identity associated with the client certificate.

EAPOL version: Select the EAPOL version that is used in the network switch.

Use IEEE 802.1x: Select to use the IEEE 802.1x protocol.

Prevent brute-force attacks

Blocking: Turn on to block brute-force attacks. A brute-force attack uses trial-and-error to guess login info or encryption keys.

Blocking period: Enter the number of seconds to block a brute-force attack.

Blocking conditions: Enter the number of authentication failures allowed per second before the block starts. You can set the number of failures allowed both on page level and device level.

IP address filter

Use filter: Select to filter which IP addresses that are allowed to access the device.

Policy: Choose whether to Allow access or Deny access for certain IP addresses.

Addresses: Enter the IP numbers that are either allowed or denied access to the device. You can also use the CIDR format.

Custom-signed firmware certificate

To install test firmware or other custom firmware from Axis on the device, you need a custom-signed firmware certificate. The certificate verifies that the firmware is approved by both the device owner and Axis. The firmware can only run on a specific device which is identified by its unique serial number and chip ID. Custom-signed firmware certificates can only be created by Axis, since Axis holds the key to sign them.

Click Install to install the certificate. You need to install the certificate before you install the firmware.

Users

Add user: Click to add a new user. You can add up to 100 users.

Username: Enter a unique username.

New password: Enter a password for the user. Passwords must be 1 to 64 characters long. Only ASCII printable characters (code 32 to 126) are allowed in the password, for example letters, numbers, punctuation, and some symbols.

Repeat password: Enter the same password again.

Role:

  • Administrator: Has full access to all settings. Administrators can also add, update, and remove other users.

  • Operator: Has access to all settings except:

    • All System settings.

    • Adding apps.

  • Viewer: Doesn’t have access to change any settings.

The context menu contains:

Update user: Edit the user’s properties.

Delete user: Delete the user. You can’t delete the root user.

Anonymous users

Allow anonymous viewers: Turn on to allow anyone to access the device as a viewer without having to log in with a user account.

Allow anonymous PTZ operators: Turn on to allow anonymous users to pan, tilt, and zoom the image.

Events

Rules

A rule defines the conditions that must be met for the product to perform an action. The list shows all the currently configured rules in the product.

Note

You can create up to 256 action rules.

Add a rule: Click to create a rule.

Name: Enter a name for the rule.

Wait between actions: Enter the minimum time (hh:mm:ss) that must pass between rule activations. It is useful if the rule is activated by for example day-night mode conditions, to avoid that small light changes during sunrise and sunset activate the rule repeatedly.

Condition: Select a condition from the list. A condition must be met for the device to perform an action. If multiple conditions are defined, all of them must be met to trigger the action. For information about specific conditions, see Get started with rules for events.

Use this condition as a trigger: Select to make this first condition function only as a starting trigger. It means that once the rule is activated it remains active for as long as all the other conditions are met, no matter the state of the first condition. If you don’t select this option, the rule will simply be active whenever all the conditions are met.

Invert this condition: Select if you want the condition to be the opposite of your selection.

Add a condition: Click to add an additional condition.

Action: Select an action from the list and enter its required information. For information about specific actions, see Get started with rules for events.

Recipients

You can set up your device to notify recipients about events or send files. The list shows all the recipients currently configured in the product, along with information about their configuration.

Note

You can create up to 20 recipients.

Add a recipient: Click to add a recipient.

Name: Enter a name for the recipient.

Type: Select from the list:

  • FTP

    • Host: Enter the server's IP address or hostname. If you enter a hostname, make sure that a DNS server is specified under System > Network > IPv4 and IPv6.

    • Port: Enter the port number used by the FTP server. The default is 21.

    • Folder: Enter the path to the directory where you want to store files. If this directory doesn’t already exist on the FTP server, you will get an error message when uploading files.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

    • Use temporary file name: Select to upload files with temporary, automatically generated filenames. The files get renamed to the desired names when the upload completes. If the upload is aborted/interrupted, you don’t get any corrupt files. However, you probably still get the temporary files. This way you know that all files that have the desired name, are correct.

    • Use passive FTP: Under normal circumstances the product simply requests the target FTP server to open the data connection. The device actively initiates both the FTP control and data connections to the target server. This is normally needed if there is a firewall between the device and the target FTP server.

  • HTTP

    • URL: Enter the network address to the HTTP server and the script that will handle the request. For example: http://192.168.254.10/cgi-bin/notify.cgi.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

    • Proxy: Turn on and enter the required information if a proxy server must be passed to connect to the HTTP server.

  • HTTPS

    • URL: Enter the network address to the HTTPS server and the script that will handle the request. For example: https://192.168.254.10/cgi-bin/notify.cgi.

    • Validate server certificate: Select to validate the certificate that was created by HTTPS server.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

    • Proxy: Turn on and enter the required information if a proxy server must be passed to connect to the HTTPS server.

  • Network storage

    You can add network storage such as a NAS (Network Attached Storage) and use it as a recipient to store files. The files are stored in the Matroska (MKV) file format.

    • Host: Enter the IP address or hostname for the network storage.

    • Share: Enter the name of the share on the host.

    • Folder: Enter the path to the directory where you want to store files.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

  • SFTP

    • Host: Enter the server's IP address or hostname. If you enter a hostname, make sure that a DNS server is specified under System > Network > IPv4 and IPv6.

    • Port: Enter the port number used by the SFTP server. The default is 22.

    • Folder: Enter the path to the directory where you want to store files. If this directory doesn’t already exist on the SFTP server, you will get an error message when uploading files.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

    • SSH host public key (MD5): Enter the fingerprint of the remote host’s public key (a 32 hexadecimal digits string). The SFTP client supports SFTP servers using SSH-2 with RSA, DSA, ECDSA, and ED25519 host key types. RSA is the preferred method during negotiation, followed by ECDSA, ED25519, and DSA. Make sure to enter the right MD5 host key that is used by your SFTP server.

    • Use temporary file name: Select to upload files with temporary, automatically generated filenames. The files get renamed to the desired names when the upload completes. If the upload is aborted/interrupted, you don’t get any corrupt files. However, you probably still get the temporary files. This way you know that all files that have the desired name, are correct.

  • Email

    • Send email to: Enter the email address to send emails to. To enter multiple addresses, use commas to separate them.

    • Send email from: Enter the email address of the sending server.

    • Username: Enter the username for the mail server. Leave this field empty if the mail server does not require authentication.

    • Password: Enter the password for the mail server. Leave this field empty if the mail server does not require authentication.

    • Email server (SMTP): Enter the name of the SMTP server, for example smtp.gmail.com, smtp.mail.yahoo.com.

    • Port: Enter the port number for the SMTP server, using values in the range 0-65535. The default value is 587.

    • Encryption: To use encryption, select either SSL or TLS.

    • Validate server certificate: If you use encryption, select to validate the identity of the device. The certificate can be self-signed or issued by a Certificate Authority (CA).

    • POP authentication: Turn on to enter the name of the POP server, for example pop.gmail.com.

    • Note

      Some email providers have security filters that prevent users from receiving or viewing large amount of attachments, from receiving scheduled emails and similar. Check the email provider's security policy to avoid your email account being locked or missing out on your expected emails.

  • TCP

    • Host: Enter the server's IP address or hostname. If you enter a hostname, make sure that a DNS server is specified under System > Network > IPv4 and IPv6.

    • Port: Enter the port number used to access the server.

Test: Click to test the setup.

The context menu contains:

View recipient: Click to view all the recipient details.

Copy recipient: Click to copy a recipient. When you copy, you can make changes to the new recipient.

Delete recipient: Click to delete the recipient permanently.

Schedules

Schedules and pulses can be used as conditions in rules. The list shows all the schedules and pulses currently configured in the product, along with information about their configuration.

Add schedule: Click to create a schedule or pulse.

Manual trigger

The manual trigger is used to manually trigger a rule. The manual trigger can for example be used to validate actions during product installation and configuration.

MQTT

MQTT (Message Queuing Telemetry Transport) is a standard messaging protocol for the Internet of Things (IoT). It was designed for simplified IoT integration and is used in a wide variety of industries to connect remote devices with a small code footprint and minimal network bandwidth. The MQTT client in Axis device firmware can simplify integration of data and events produced in the device to systems which are not video management systems (VMS).

Set up the device as an MQTT client. MQTT communication is based on two entities, the clients and the broker. The clients can send and receive messages. The broker is responsible for routing messages between clients.

You can learn more about MQTT in AXIS OS Portal.

MQTT client

Connect: Turn on or off the MQTT client.

Status: Shows the current status of the MQTT client.

Broker

Host: Enter the hostname or IP address of the MQTT server.

Protocol: Select which protocol to use.

Port: Enter the port number.

  • 1883 is the default value for MQTT over TCP

  • 8883 is the default value for MQTT over SSL

  • 80 is the default value for MQTT over WebSocket

  • 443 is the default value for MQTT over WebSocket Secure

Username: Enter the username that the client will use to access the server.

Password: Enter a password for the username.

Client ID: Enter a client ID. The client identifier is sent to the server when the client connects to it.

Clean session: Controls the behavior at connection and disconnection time. When selected, the state information is discarded at connect and disconnect.

Keep alive interval: The keep alive interval enables the client to detect when the server is no longer available without having to wait for the long TCP/IP timeout.

Timeout: The time interval in seconds to allow a connect to complete. Default value: 60

Device topic prefix: Used in the default values for the topic in the connect message and LWT message on the MQTT client tab, and in the publication conditions on the MQTT publication tab.

Reconnect automatically: Specifies whether the client should reconnect automatically after a disconnect.

Connect message

Specifies if a message should be sent out when a connection is established.

Send message: Turn on to send messages.

Use default: Turn off to enter your own default message.

Topic: Enter the topic for the default message.

Payload: Enter the content for the default message.

Retain: Select to keep the state of client on this Topic

QoS: Change the QoS layer for the packet flow.

Last Will and Testament message

The Last Will Testament (LWT) lets a client provide a testament along with its credentials when connecting to the broker. If the client disconnects ungracefully at some point later (maybe because his power source died), it can let the broker deliver a message to other clients. This LWT message has the same form as an ordinary message and gets routed via the same mechanics.

Send message: Turn on to send messages.

Use default: Turn off to enter your own default message.

Topic: Enter the topic for the default message.

Payload: Enter the content for the default message.

Retain: Select to keep the state of client on this Topic

QoS: Change the QoS layer for the packet flow.

MQTT publication

Use default condition prefix: Select to use the default condition prefix, that is defined using the device topic prefix in the MQTT client tab.

Include condition name: Select to include the topics that describe the condition in the MQTT topic.

Include condition namespaces: Select to include ONVIF topic namespaces in the MQTT topic.

Include serial number: Select to include the device’s serial number in the MQTT payload.

Add condition: Click to add a condition.

Retain: Defines which MQTT messages are sent as retained.

  • None: Send all messages as non-retained.

  • Property: Send only stateful messages as retained.

  • All: Send both stateful and stateless messages as retained.

QoS: Select the desired level for the MQTT publication.

MQTT subscriptions

Add subscription: Click to add a new MQTT subscription.

Subscription filter: Enter the MQTT topic that you want to subscribe to.

Use device topic prefix: Add the subscription filter as prefix to the MQTT topic.

Subscription type:

  • Stateless: Select to convert MQTT messages into a stateless message.

  • Stateful: Select to convert MQTT messages into a condition. The payload is used as the state.

QoS: Select the desired level for the MQTT subscription.

Storage

Network storage

Add network storage: Click to add a network share where you can save recordings.

  • Address: Enter the IP address or host name of the host server, typically a NAS (Network Attached Storage). We recommend you to configure the host to use a fixed IP address (not DHCP since a dynamic IP address can change) or that you use DNS. Windows SMB/CIFS names are not supported.

  • Network share: Enter the name of the shared location on the host server. Several Axis devices can use the same network share, since each device gets its own folder.

  • User: If the server requires a login, enter the username. To log in to a specific domain server, type DOMAIN\username.

  • Password: If the server requires a login, enter the password.

  • SMB version: Select the SMB storage protocol version to connect to the NAS. If you select Auto, the device tries to negotiate one of the secure versions SMB: 3.02, 3.0, or 2.1. Select 1.0 or 2.0 to connect to older NAS that don’t support higher versions. You can read more about SMB support in Axis devices here.

  • Add share even if connection test fails: Select to add the network share even if an error is discovered during the connection test. The error can be, for example, that you didn’t enter a password even though the server requires one.

Remove network storage: Click to remove the connection to the network share. This removes all settings for the network share.

Write protect: Turn on to stop writing to the network share and protect recordings from being removed. You can’t format a write-protected network share.

Ignore: Turn on to stop storing recordings on the network share.

Retention time: Select how long to keep recordings, to limit the amount of old recordings or to comply with regulations regarding data storage. If the network storage becomes full, old recordings are removed before the selected time period has passed.

Tools

  • Test connection: Test the connection to the network share.

  • Format: Format the network share, for example when you need to quickly erase all data. cifs is the available file system option.

  • Click Use tool to activate the selected tool.

Onboard storage

Important

Risk of data loss and corrupted recordings. Do not remove the SD card while the device is running. Unmount the SD card before you remove it.

Unmount: Click to safely remove the SD card.

Write protect: Turn on to stop writing to the SD card and protect recordings from being removed. You can’t format a write-protected SD card.

Autoformat: Turn on to automatically format a newly inserted SD card. It formats the file system into ext4.

Ignore: Turn on to stop storing recordings on the SD card. When you ignore the SD card, the device no longer recognizes that the card exists. The setting is only available for administrators.

Retention time: Select how long to keep recordings, to limit the amount of old recordings or to comply with regulations regarding data storage. If the SD card becomes full, old recordings are removed before the selected time period has passed.

Tools

  • Check: Check for errors on the SD card. This only works for the ext4 file system.

  • Repair: Repair errors in the ext4 file system. To repair an SD card with the VFAT file system, eject the SD card, insert it in a computer and perform a disk repair.

  • Format: Format the SD card, for example when you need to change the file system or quickly erase all data. VFAT and ext4 are the two available file system options. The recommended format is ext4, due to its resilience against data loss if the card is ejected or if there is an abrupt power loss. However, you need a third-party ext4 driver or application to access the file system from Windows®.

  • Encrypt: Encrypt data that is stored.

  • Decrypt: Decrypt data that is stored.

  • Change password: Change the password required to encrypt the SD card.

  • Click Use tool to activate the selected tool.

Stream profiles

Click to create and save groups of video stream settings. You can use the settings in different situations, for example in continuous recording or when you use action rules to record.

ONVIF

ONVIF users

ONVIF (Open Network Video Interface Forum) is a global interface standard that makes it easier for end-users, integrators, consultants, and manufacturers to take advantage of the possibilities offered by network video technology. ONVIF enables interoperability between different vendor products, increased flexibility, reduced cost and future-proof systems.

Add user: Click to add a new ONVIF user.

Username: Enter a unique username.

New password: Enter a password for the user. Passwords must be 1 to 64 characters long. Only ASCII printable characters (code 32 to 126) are allowed in the password, for example letters, numbers, punctuation, and some symbols.

Repeat password: Enter the same password again

Role:

  • Administrator: Has full access to all settings. Administrators can also add, update, and remove other users.

  • Operator: Has access to all settings except:

    • All System settings.

    • Adding apps.

  • Media user: Allows access to the video stream only.

The context menu contains:

Update user: Edit the user’s properties.

Delete user: Delete the user. You can’t delete the root user.

By creating an ONVIF user, you automatically enable ONVIF communication. Use the username and password for all ONVIF communication with the device. For more information see the Axis Developer Community at axis.com.

ONVIF media profiles

An ONVIF media profile consists of a set of configurations that you can use to change media stream settings.

Add media profile: Click to add a new ONVIF media profile.

profile_x: Click a profile to edit.

Analytics metadata

Metadata producers

Metadata producers lists the channels used by apps and the metadata they are streaming from the device.

Producer: The app producing the metadata.

Channel: The channel used by the app. Check to enable the metadata stream. Uncheck to disable the stream for compatibility or resources management reasons.

Detectors

Shock detection

Shock detector: Turn on to generate an alarm if the device is hit by an object or if it is tampered with.

Sensitivity level: Move the slider to adjust the sensitivity level at which the device should generate an alarm. A low value means that the device only generates an alarm if the hit is powerful. A high value means that the device generates an alarm even with mild tampering.

Accessories

Network speaker pairing

Network speaker pairing allows you to use a compatible Axis network speaker as if it is connected directly to the camera. Once paired, the speaker acts as an audio out device where you can play audio clips and transmit sound through the camera.

Important

For this feature to work with a video management software (VMS), you must first pair the camera with the network speaker, then add the camera to your VMS.

Address: Enter host name or IP address to the network speaker.

Username: Enter username.

Password: Enter password for the user.

Clear fields: Click to clear all fields.

Connect: Click to establish connection to the network speaker.

I/O ports

Use digital input to connect external devices that can toggle between an open and closed circuit, for example PIR sensors, door or window contacts, and glass break detectors.

Use digital output to connect external devices such as relays and LEDs. You can activate connected devices through the VAPIX® Application Programming Interface or in the device interface.

Port

Name: Edit the text to rename the port.

Direction: indicates that the port is an input port. indicates that it’s an output port. If the port is configurable, you can click the icons to change between input and output.

Normal state: Click open circuit, and for closed circuit.

Current state: Shows the current state of the port. The input or output is activated when the current state is different from the normal state. An input on the device has an open circuit when it’s disconnected or when there is a voltage above 1 V DC.

Note

During restart the output circuit is open. When the restart is complete, the circuit goes back to the normal position. If you change any settings on this page, the output circuits go back to their normal positions regardless of any active triggers.

Supervised: Turn on to make it possible to detect and trigger actions if someone tampers with the connection to digital I/O devices. In addition to detecting if an input is open or closed, you can also detect if someone has tampered with it (that is, cut or shorted). To supervise the connection requires additional hardware (end-of-line resistors) in the external I/O loop.

Logs

Reports and logs

Reports

  • View the device server report: Click to show information about the product status in a pop-up window. The Access Log is automatically included in the Server Report.

  • Download the device server report: Click to download the server report. It creates a .zip file that contains a complete server report text file in UTF–8 format, as well as a snapshot of the current live view image. Always include the server report .zip file when you contact support.

  • Download the crash report: Click to download an archive with detailed information about the server's status. The crash report contains information that is in the server report as well as detailed debug information. This report might contain sensitive information such as network traces. It can take several minutes to generate the report.

Logs

  • View the system log: Click to show information about system events such as device startup, warnings and critical messages.

  • View the access log: Click to show all failed attempts to access the device, for example when a wrong login password is used.

Network trace

Important

A network trace file might contain sensitive information, for example certificates or passwords.

A network trace file can help you troubleshoot problems by recording activity on the network. Select the duration of the trace in seconds or minutes, and click Download.

Remote system log

Syslog is a standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, which indicates the software type generating the message, and assigned a severity level.

Server: Click to add a new server.

Host: Enter the hostname or IP address of the server.

Format: Select which syslog message format to use.

    • RFC 3164

    • RFC 5424

    Protocol: Select the protocol and port to use:

    • UDP (Default port is 514)

    • TCP (Default port is 601)

    • TLS (Default port is 6514)

    Severity: Select which messages to send when triggered.

    CA certificate set: See the current settings or add a certificate.

    Plain config

    Plain config is for advanced users with experience of Axis device configuration. Most parameters can be set and edited from this page.

    Maintenance

    Restart: Restart the device. This does not affect any of the current settings. Running applications restart automatically.

    Restore: Return most settings to the factory default values. Afterwards you must reconfigure the device and apps, reinstall any apps that didn’t come preinstalled, and recreate any events and PTZ presets.

    Important

    The only settings saved after restore are:

    • Boot protocol (DHCP or static)
    • Static IP address
    • Default router
    • Subnet mask
    • 802.1X settings
    • O3C settings

    Factory default: Return all settings to the factory default values. Afterwards you must reset the IP address to make the device accessible.

    Note

    All Axis device firmware is digitally signed to ensure that you only install verified firmware on your device. This further increases the overall minimum cybersecurity level of Axis devices. For more information, see the white paper “Signed firmware, secure boot, and security of private keys” at axis.com.

    Firmware upgrade: Upgrade to a new firmware version. New firmware releases can contain improved functionality, bug fixes, and completely new features. We recommend you to always use the latest release. To download the latest release, go to axis.com/support.

    • When you upgrade, you can choose between three options:
    • Standard upgrade: Upgrade to the new firmware version.

    • Factory default: Upgrade and return all settings to the factory default values. When you choose this option, you can’t revert to the previous firmware version after the upgrade.

    • Autorollback: Upgrade and confirm the upgrade within the set time. If you don’t confirm, the device reverts to the previous firmware version.

    Firmware rollback: Revert to the previously installed firmware version.

    Troubleshooting

    Reset to factory default settings

    Important

    Reset to factory default should be used with caution. A reset to factory default resets all settings, including the IP address, to the factory default values.

    To reset the product to the factory default settings:

    1. Disconnect power from the product.

    2. Press and hold the control button while reconnecting power. See Product overview.

    3. Keep the control button pressed for 15–30 seconds until the status LED indicator flashes amber.

    4. Release the control button. The process is complete when the status LED indicator turns green. The product has been reset to the factory default settings. If no DHCP server is available on the network, the default IP address is 192.168.0.90.

    5. Use the installation and management software tools to assign an IP address, set the password, and access the device.

      The installation and management software tools are available from the support pages on axis.com/support.

    You can also reset parameters to factory default through the device’s webpage. Go to Maintenance > Factory default and click Default.

    Check the current firmware version

    Firmware is the software that determines the functionality of network devices. When you troubleshoot a problem, we recommend you to start by checking the current firmware version. The latest firmware version might contain a correction that fixes your particular problem.

    To check the current firmware:

    1. Go to the device interface > Status.

    2. See the firmware version under Device info.

    Upgrade the firmware

    Important

    Preconfigured and customized settings are saved when you upgrade the firmware (provided that the features are available in the new firmware) although this is not guaranteed by Axis Communications AB.

    Important

    Make sure the device remains connected to the power source throughout the upgrade process.

    Note

    When you upgrade the device with the latest firmware in the active track, the product receives the latest functionality available. Always read the upgrade instructions and release notes available with each new release before you upgrade the firmware. To find the latest firmware and the release notes, go to axis.com/support/firmware.

    1. Download the firmware file to your computer, available free of charge at axis.com/support/firmware.

    2. Log in to the device as an administrator.

    3. Go to Maintenance > Firmware upgrade and click Upgrade.

    4. When the upgrade has finished, the product restarts automatically.

    Technical issues, clues, and solutions

    If you can’t find what you’re looking for here, try the troubleshooting section at axis.com/support.

    Problems upgrading the firmware

    Firmware upgrade failure

    If the firmware upgrade fails, the device reloads the previous firmware. The most common reason is that the wrong firmware file has been uploaded. Check that the name of the firmware file corresponds to your device and try again.

    Problems after firmware upgrade

    If you experience problems after a firmware upgrade, roll back to the previously installed version from the Maintenance page.

    Problems setting the IP address

    The device is located on a different subnet

    If the IP address intended for the device and the IP address of the computer used to access the device are located on different subnets, you cannot set the IP address. Contact your network administrator to obtain an IP address.

    The IP address is being used by another device

    Disconnect the Axis device from the network. Run the ping command (in a Command/DOS window, type ping and the IP address of the device):

    • If you receive: Reply from <IP address>: bytes=32; time=10... this means that the IP address may already be in use by another device on the network. Obtain a new IP address from the network administrator and reinstall the device.

    • If you receive: Request timed out, this means that the IP address is available for use with the Axis device. Check all cabling and reinstall the device.

    Possible IP address conflict with another device on the same subnet

    The static IP address in the Axis device is used before the DHCP server sets a dynamic address. This means that if the same default static IP address is also used by another device, there may be problems accessing the device.

    The device can’t be accessed from a browser

    Can’t log in

    When HTTPS is enabled, ensure that the correct protocol (HTTP or HTTPS) is used when attempting to log in. You may need to manually type http or https in the browser’s address field.

    If the password for the user root is lost, the device must be reset to the factory default settings. See Reset to factory default settings.

    The IP address has been changed by DHCP

    IP addresses obtained from a DHCP server are dynamic and may change. If the IP address has been changed, use AXIS IP Utility or AXIS Device Manager to locate the device on the network. Identify the device using its model or serial number, or by the DNS name (if the name has been configured).

    If required, a static IP address can be assigned manually. For instructions, go to axis.com/support.

    Certificate error when using IEEE 802.1X

    For authentication to work properly, the date and time settings in the Axis device must be synchronized with an NTP server. Go to System > Date and time.

    The device is accessible locally but not externally

    To access the device externally, we recommend you to use one of the following applications for Windows®:

    • AXIS Companion: free of charge, ideal for small systems with basic surveillance needs.

    • AXIS Camera Station: 30-day trial version free of charge, ideal for small to mid-size systems.

    For instructions and download, go to axis.com/vms.

    Performance considerations

    The following factors are the most important to consider:

    • Heavy network utilization due to poor infrastructure affects the bandwidth.

    Cleaning recommendations

    If the device gets grease stains or becomes heavily soiled, you can clean it with mild, solvent-free soap or detergent.

    NOTICE

    Never use harsh detergent, for example gasoline, benzene, or acetone.

    1. Use a can of compressed air to remove any dust or loose dirt from the device.

    2. Clean the device with a soft cloth dampened with mild detergent and lukewarm water.

    3. Wipe carefully with a dry cloth.

    Note

    Avoid cleaning in direct sunlight or at elevated temperatures, as this may cause stains when the water droplets dry.

    Specifications

    Product overview

    1. Control button
    2. Network LED
    3. Status LED
    4. Power LED
    5. PoE out LED
    6. microSD card slot
    7. Power connector (DC)
    8. I/O connector
    9. Relay connector
    10. Grounding screw
    11. Network connector (PoE in)
    12. Network connector (PoE out)
    13. Intrusion alarm sensor

    For technical specifications, see Specifications.

    LED Indicators

    Status LEDIndication
    Green

    Steady green for normal operation.

    Network LEDIndication
    Green

    Steady for connection to a 100 Mbit/s network. Flashes for network activity.

    Amber

    Steady for connection to a 10 Mbit/s network. Flashes for network activity.

    UnlitNo network connection.
    Power LEDIndication
    GreenNormal operation.
    PoE out LEDIndication
    UnlitPoE out turned off
    GreenPoE out turned on

    SD card slot

    For SD card recommendations, see axis.com.

    microSD, microSDHC, and microSDXC Logos are trademarks of SD-3C LLC. microSD, microSDHC, microSDXC are trademarks or registered trademarks of SD-3C, LLC in the United States, other countries or both.

    Buttons

    Control button

    • For location of the control button, see Product overview.
    • The control button is used for:
    • Resetting the product to factory default settings. See Reset to factory default settings.

    • Connecting to an AXIS Video Hosting System service. See . To connect, press and hold the button for about 3 seconds until the Status LED flashes green.

    Connectors

    Network connector

    RJ45 Ethernet connector with Power over Ethernet Plus (PoE+).

    CAUTION

    Risk of damage to the device. Do not power the device with both PoE and DC.

    Network connector (PoE out)

    Power over Ethernet IEEE 802.3at type 2, max 30W

    Use this connector to supply power to another PoE device, for example a camera, a horn speaker, or a second security radar.

    Note

    The PoE output is enabled when the radar is powered by a 60 W midspan (Power over Ethernet IEEE 802.3bt, type 3).

    Note

    If the radar is powered by a 30 W midspan or DC power, the PoE out is disabled.

    Note

    Maximum Ethernet cable length is 100 m in total for PoE out and PoE in combined. You can increase it with a PoE extender.

    I/O connector

    Use the I/O connector with external devices in combination with, for example, event triggering and alarm notifications. In addition to the 0 V DC reference point and power (DC output), the I/O connector provides the interface to:

    Digital input –
    For connecting devices that can toggle between an open and closed circuit, for example PIR sensors, door/window contacts, and glass break detectors.
    Digital output –
    For connecting external devices such as relays and LEDs. Connected devices can be activated by the VAPIX® Application Programming Interface, trough an event or from the product’s webpage.

    6-pin terminal block

    FunctionPinNotesSpecifications
    DC ground10 V DC
    DC output2Can be used to power auxiliary equipment.
    Note: This pin can only be used as power out.
    12 V DC
    Max load = 50 mA
    Configurable (Input or Output)3–6Digital input – Connect to pin 1 to activate, or leave floating (unconnected) to deactivate.0 to max 30 V DC
    Digital output – Internally connected to pin 1 (DC ground) when active, and floating (unconnected) when inactive. If used with an inductive load, e.g., a relay, connect a diode in parallel with the load, to protect against voltage transients.0 to max 30 V DC, open drain, 100 mA
    Example
    1. DC ground
    2. DC output 12 V, max 50 mA
    3. I/O configured as input
    4. I/O configured as output
    5. Configurable I/O
    6. Configurable I/O

    Power connector

    2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either a rated output power limited to ≤100 W or a rated output current limited to ≤5 A.

    CAUTION

    Risk of damage to the device. Do not power the device with both PoE and DC.

    Relay connector

    CAUTION

    Use single core wires for the relay connector.

    FunctionSpecifications
    TypeNormally open
    Rating

    24 V DC/5 A

    Isolation from other circuitry2.5 kV