Help texts for AXIS Device Assistant (ADA) EN

The device interface

You reach the device interface by entering the IP address of the device in a web browser.

Note

Support for the features and settings described in this section varies between devices.

Show or hide the main menu.

Access the product help.

Change the language.

Set light theme or dark theme.

The user menu contains:

  • Information about the user who is logged in.

  • Change user : Log out the current user and log in a new user.

  • Log out : Log out the current user.

The context menu contains:

  • Analytics data: Accept to share non-personal browser data.

  • Feedback: Share any feedback to help us improve your user experience.

  • Legal: View information about cookies and licenses.

  • About: View device information, including firmware version and serial number.

  • Legacy device interface: Change the device interface to the legacy device interface.

Status

NTP sync

Shows NTP synchronization information, including if the device is in sync with an NTP server and the time remaining until the next sync.

NTP settings: Click to go to the Date and time page where you can change the NTP settings.

Video input

Shows video input information, including if video input is configured and detailed information for each channel.

Video input settings: Click to go to the Video input page where you can change the video input settings.

Device info

Shows device information, including firmware version and serial number.

Upgrade firmware: Click to go to the Maintenance page where you can do a firmware upgrade.

RAM use: Percentage of RAM that’s used.

CPU use: Percentage of CPU that’s used.

GPU use: Percentage of GPU that’s used.

GPU bus use: Percentage of GPU bus that’s used.

Decoding process: Current status of the decoding process, Running or Stopped.

IP address: The device’s IP address.

Date and time: The device’s date and time.

Recorder status

Status

Allocated PoE: Number of watts (W) that are currently allocated.

Total PoE consumption: Number of watts (W) that are consumed.

Keep PoE active during recorder restart: Turn on to supply power to connected devices during a restart of the recorder.

Used space: Percentage of space used.

Free space: Percentage of space available for recordings.

Free space: Available disk space displayed in megabytes (MB), gigabytes (GB), or terabytes (TB).

Disk status: Current status of the disk.

Disk temperature: Current running temperature.

Ports

Each port has an individual number and individual settings.

PoE: Turn on or off PoE for each port. When a device is connected, you’ll see the following information:

  • Allocated power: Number of watts (W) that are currently allocated.

  • Mac: The media access control address (MAC address) of the connected device.

Access control

Alarms

Device motion: It is enabled by default to trigger an alarm in your system when device motion of the door controller is detected.

Casing open: It is enabled by default to trigger an alarm in your system when casing open of the door controller is detected.

External tamper: It is connected to I/O 13. Turn on to trigger an alarm in your system when external tamper is detected. For example, when the external cabinet is opened or closed.

Supervised input: Turn on monitor the input state and configure the end-of-line resistors.

  • To use parallel first connection, select Parallel first connection with a 22 KΩ parallel resistor and a 4.7 KΩ serial resistor.

  • To use serial first connection, select Serial first connection and select a resistor value from the Resistor values drop-down list.

Peripherals

Upgrade readers: Click to upgrade readers to a new firmware version. Only AXIS A4020-E Reader can be upgraded when it is online.

Light

Overview

Light status

Shows the different light activities running on the device. You can have ten activities in the status list running at the same time. When two or more activities run at the same time, the one with the highest priority is played. That row is highlighted in green in the status list.

Siren status

Shows the different siren activities running on the device. You can have ten activities in the status list running at the same time. When two or more activities run at the same time, the one with the highest priority is played. That row is highlighted in green in the status list.

Maintenance

Maintenance mode: Turn on to pause the ordinary light and siren activities during maintenance of the device. When maintenance mode is turned on, a pulsating light pattern is played and the siren is silent. To protect the installer from hearing damage and from dazzling by bright light, the siren makes no sound and the light gives white pulsating light in a triangle.

Maintenance has priority 11. Only system specific activities with higher priority can disrupt the maintenance mode.

Maintenance mode survives a reboot. For example, if you set the time to 2 hours, turn off the device and restart it one hour later, the device will be in maintenance mode for another hour.

When you do a default reset, the device returns to maintenance mode.

Duration

  • Continuous: Select to let the device stay in maintenance mode until you turn it off.

  • Time: Select to set a time when the maintenance mode will be turned off.

Health check

Check: Click to do a health check of the device to make sure the light and siren are working. Each light section is turned on in turn and a test tone is played to test the functionality of the device. If the health check doesn’t pass, go to the system logs for more information.

Profiles

Profiles

A profile is a collection of set configurations. You can have up to 30 profiles with different priorities and patterns.

Create: Click to create a profile.

  • Name: Enter a name of the profile.

  • Description: Enter a description of the profile.

  • Light: Select from the drop-down menu what kind of pattern, speed, intensity and color of the light you want.

  • Siren: Select from the drop-down menu what kind of pattern and intensity of the siren you want.

  • Duration: Set the duration of the activities.

    • Continuous: Once started, it runs until it’s stopped.

    • Time: Set a specified time for how long the activity will last.

    • Repetitions: Set the activity to repeat the pattern X times.

  • Priority: Set the priority of an activity from 1 to 10. Activities with priority numbers higher than 10 cannot be removed from the status list. There are three activities with higher priority than 10, Maintenance (11), Identify (12) and Health check (13).

Import: Click to add one or more profiles with predefined configurations.

  • Add: Add new profiles.

  • Note

    You can’t have two profiles with the same name.

  • Delete and add: The old profiles are deleted, and you can upload new profiles.

  • Overwrite: Updated profiles overwrite the existing profiles.

To copy a profile and save it to other devices, select the profile and click Export. A .json file is exported.

: Click to start a profile. The profile and its activities appear in the status list.

Video sources

Name: The video source’s name.

Type: The video source’s type, Axis or Generic.

Add video sources: Create a new video source. You can use two different methods:

  • Step-by-step: Add an Axis device with help from a wizard.

  • Manual: Add any device manually.

The context menu contains:

Edit video source: Edit the properties of the video source.

Delete video source: Delete the video source.

Display

[Action menu]: Click to configure the sequence order. With the sequence you can decide in which order you want to see the different views.

: Click to add a new view. You can add as many views as you like.

Start sequence: Click to turn on the sequence.

View settings:

  • Name: Enter a nice name of the view.

  • Duration: Decide how long the view will be displayed in a sequence.

  • Layout: Select a screen layout, then decide where each device should be displayed.

Resolution: Select which resolution you want to use for the view.

Jobs

Add job: Click to add a new job.

Name: Enter a unique name for the job.

Type: Select a type.

  • Restart decoding: Restarts the decoding at a certain time.

  • Reboot system: Reboots the system at a certain time.

  • NTP sync: Re-synchronize the NTP server at a certain time. [Correct description?]

Recurrence: Select when the system runs the job.

[What do you configure, a certain interval (15th minute) or at a certain time (every hour at 15 min passed)?]
  • Minutely: The system runs the job at a certain interval, for example every 15th min.

  • Hourly: The system runs the job at a certain interval, for example every second hour and 15th min.

  • Daily: The system runs the job everyday at a certain interval.

  • Weekdays: The system runs the job a certain day at a certain interval.

The context menu contains:

Delete: Delete the job.

Video

Click to play the live video stream.

Click to freeze the live video stream.

Click to take a snapshot of the live video stream. The file is saved in the ‘Downloads’ folder on your computer. The image file name is [snapshot_YYYY_MM_DD_HH_MM_SS.jpg]. The size of the snapshot depends on the compression that is applied from the specific web-browser engine where the snapshot is received, therefore, the snapshot size may vary from the actual compression setting that is configured in the device.

Click to show I/O output ports. Use the switch to open or close the circuit of a port, for example to test external devices.

Click to manually turn on or turn off the IR illumination.

Click to access onscreen controls:

  • Predefined controls: Turn on to use the available onscreen controls.

  • Custom controls: Click Add custom control to add an onscreen control.

Click to manually turn on the heater for a selected period of time.

Click to start a continuous recording of the live video stream. Click again to stop the recording. If a recording is ongoing, it will resume automatically after a reboot.

Click to show the storage that is configured for the device. To configure the storage you need to be logged in as an administrator.

Click to access more settings:

  • Video format: Select the encoding format to use in the live view. If you select a format with video compression, it results in a higher CPU and memory usage.

  • Client stream information: Turn on to show dynamic information about the video stream used by the browser that shows the live video stream. The bitrate information differs from the information shown in a text overlay, because of different information sources. The bitrate in the client stream information is the bitrate of the last second, and it comes from the encoding driver of the device. The bitrate in the overlay is the average bitrate of the last 5 seconds, and it comes from the browser. Both values cover only the raw video stream and not the additional bandwidth generated when it’s transported over the network through UDP/TCP/HTTP.

  • Adaptive stream: Turn on to adapt the image resolution to the viewing client’s actual display resolution, to increase the user experience and help prevent a possible overload of the client’s hardware. The adaptive stream is only applied when you view the live video stream in the web interface in a browser. When adaptive stream is turned on, the maximum frame rate is 30 fps. If you take a snapshot while adaptive stream is turned on, it will use the image resolution selected by the adaptive stream.

  • Level grid: Click to show the level grid. The grid helps you decide if the image is horizontally aligned. Click to hide it.

  • Pixel counter: Click to show the pixel counter. Drag and resize the box to contain your area of interest. You can also define the pixel size of the box in the Width and Height fields.

  • Refresh: Click to refresh the still image in the live view.

Click to show the live view at full resolution. If the full resolution is larger than your screen size, use the smaller image to navigate in the image.

Click to show the live video stream in full screen. Press Esc to exit full screen mode.

Installation

Capture mode: A capture mode is a preset configuration that defines how the camera captures images. When you change the capture mode, it can affect many other settings, such as view areas and privacy masks.

Mounting position: The orientation of the image can change depending on how the camera is mounted.

Power line frequency: Select the frequency that is used in your region to minimize image flicker. The American regions usually use 60 Hz. The rest of the world mostly uses 50 Hz. If you're not sure of your region's power line frequency, check with the local authorities.

Reset PTR: Reset PTR if for some reason the Pan, Tilt, or Roll settings aren’t working as expected. The PTR motors are always calibrated in a new camera. But calibration can be lost for example if the camera loses power or if the motors are moved by hand. When you reset PTR the camera is re-calibrated and returns to its factory default position.

Pan: Turn the camera horizontally.

Tilt: Turn the camera vertically.

Roll: Straighten the image.

Rotate: Select the preferred image orientation.

P-Iris lens: Select the installed and supported lens. Restart the camera for the changes to take effect.

Zoom: Use the slider to adjust the zoom level.

Autofocus area: Click to show the autofocus area. This area should include the area of interest.

Autofocus: Click to make the camera focus on the selected area. If you don’t select an autofocus area, the camera focuses on the entire scene.

Reset focus: Click to make the focus return to its original position.

Focus: Use the slider to set the focus manually.

Image correction

Important

We recommend you not to use multiple image correction features at the same time, since it can lead to performance issues.

Barrel distortion correction (BDC): Turn on to get a straighter image if it suffers from barrel distortion. Barrel distortion is a lens effect that makes the image appear curved and bent outwards. The condition is seen more clearly when the image is zoomed out.

Crop: Use the slider to adjust the correction level. A lower level means that the image width is kept at the expense of image height and resolution. A higher level means that image height and resolution are kept at the expense of image width.

Remove distortion: Use the slider to adjust the correction level. Pucker means that the image width is kept at the expense of image height and resolution. Bloat means that image height and resolution are kept at the expense of image width.

Electronic image stabilization (EIS): Turn on to get a smoother and steadier image with less blur. We recommend you to use EIS in environments where the device is mounted in an exposed location and subject to vibrations due to, for example, wind or passing traffic.

Focal length: Use the slider to adjust the focal length. A higher value leads to higher magnification and a narrower angle of view, while a lower value leads to a lower magnification and a wider angle of view.

Stabilizer margin: Use the slider to adjust the size of the stabilizer margin, which determines the level of vibration to stabilize. If the product is mounted in an environment with a lot of vibration, move the slider towards Max. As a result, a smaller scene is captured. If the environment has less vibration, move the slider towards Min.

Straighten image: Turn on and use the slider to straighten the image horizontally by rotating and cropping it digitally. The functionality is useful when it’s not possible to mount the camera exactly level. Ideally, straighten the image during installation.

: Click to show a supporting grid in the image.

: Click to hide the grid.

The image before and after it has been straightened.

Image

Appearance

Scene profile: Select a scene profile that suits your surveillance scenario. A scene profile optimizes image settings, including color level, brightness, sharpness, contrast, and local contrast, for a specific environment or purpose.

  • Forensic: Suitable for surveillance purposes.

  • Indoor: Suitable for indoor environments.

  • Outdoor: Suitable for outdoor environments.

  • Vivid: Useful for demonstration purposes.

  • Traffic overview: Suitable for vehicle traffic monitoring.

Saturation: Use the slider to adjust the color intensity. You can for example get a grayscale image.

Contrast: Use the slider to adjust the difference between light and dark.

Brightness: Use the slider to adjust the light intensity. This can make objects easier to see. Brightness is applied after image capture, and doesn’t affect the information in the image. To get more details from a dark area, it’s usually better to increase gain or exposure time.

Sharpness: Use the slider to make objects in the image appear sharper by adjusting the edge contrast. If you increase the sharpness, it may increase the bitrate and the amount of storage space needed as well.

Wide dynamic range

WDR: Turn on to make both bright and dark areas of the image visible.

Local contrast: Use the slider to adjust the contrast of the image. A higher value makes the contrast higher between dark and light areas.

Tone mapping: Use the slider to adjust the amount of tone mapping that is applied to the image. If the value is set to zero only the standard gamma correction is applied, while a higher value increases the visibility in the image.

White balance

When the camera detects the color temperature of the incoming light, it can adjust the image to make the colors look more natural. If this is not sufficient, you can select a suitable light source from the list.

The automatic white balance setting reduces the risk of color flicker by adapting to changes gradually. If the lighting changes, or when the camera is first started, it can take up to 30 seconds to adapt to the new light source. If there is more than one type of light source in a scene, that is they differ in color temperature, the dominating light source acts as a reference for the automatic white balance algorithm. This behavior can be overridden by choosing a fixed white balance setting that matches the light source you want to use as a reference.

Light environment:

  • Automatic: Automatic identification and compensation for the light source color. This is the recommended setting which can be used in most situations.

  • Automatic – outdoors: Automatic identification and compensation for the light source color. This is the recommended setting which can be used in most outdoor situations.

  • Custom – indoors: Fixed color adjustment for a room with some artificial light other than fluorescent lighting and good for a normal color temperature around 2800 K.

  • Custom – outdoors: Fixed color adjustment for sunny weather conditions with a color temperature around 5500 K.

  • Fixed – fluorescent 1: Fixed color adjustment for fluorescent lighting with a color temperature around 4000 K.

  • Fixed – fluorescent 2: Fixed color adjustment for fluorescent lighting with a color temperature around 3000 K.

  • Fixed – indoors: Fixed color adjustment for a room with some artificial light other than fluorescent lighting and good for a normal color temperature around 2800 K.

  • Fixed – outdoors 1: Fixed color adjustment for sunny weather conditions with a color temperature around 5500 K.

  • Fixed – outdoors 2: Fixed color adjustment for cloudy weather condition with a color temperature around 6500 K.

  • Street light – mercury: Fixed color adjustment for ultraviolet emission in mercury vapor lights common in street lighting.

  • Street light – sodium: Fixed color adjustment that compensates for the yellow orange color of sodium vapor lights common in street lighting.

  • Hold current: Keep the current settings and do not compensate for light changes.

  • Manual: Fix the white balance with the help of a white object. Drag the circle to an object that you want the camera to interpret as white in the live view image. Use the Red balance and Blue balance sliders to adjust the white balance manually.

Day-night mode

IR-cut filter:

  • Auto: Select to automatically turn on and off the IR-cut filter. When the camera is in day mode, the IR-cut filter is turned on and blocks incoming infrared light, and when in night mode, the IR-cut filter is turned off and the camera’s light sensitivity increases.

  • On: Select to turn on the IR-cut filter. The image is in color, but with reduced light sensitivity.

  • Off: Select to turn off the IR-cut filter. The image is in black and white for increased light sensitivity.

Threshold: Use the slider to adjust the light threshold where the camera changes from day mode to night mode.

  • Move the slider towards Bright to decrease the threshold for the IR-cut filter. The camera changes to night mode earlier.

  • Move the slider towards Dark to increase the threshold for the IR-cut filter. The camera changes to night mode later.

IR light

If your device doesn’t have built-in illumination, these controls are only available when you have connected a supporting Axis accessory.

Allow illumination: Turn on to let the camera use the built-in light in night mode.

Synchronize illumination: Turn on to automatically synchronize the illumination with the surrounding light. The synchronization between day and night only works if the IR-cut filter is set to Auto or Off.

Automatic illumination angle: Turn on to use the automatic illumination angle.

Illumination angle: Use the slider to manually set the illumination angle, for example if the angle needs to be different from the camera’s angle of view. If the camera has a wide angle of view, you can set the illumination angle to a narrower angle, which equals a greater tele position. This will result in dark corners in the image.

IR wavelength: Select the desired wavelength for the IR light.

White light

Allow illumination: Turn on to let the camera use white light in night mode.

Synchronize illumination: Turn on to automatically synchronize the white light with the surrounding light.

Exposure

Exposure mode: Select an exposure mode to reduce rapidly changing irregular effects in the image, for example flicker produced by different types of light sources. We recommend you to use the automatic exposure mode, or the same frequency as your power network.

  • Automatic: The camera adjusts the aperture, gain and shutter automatically.

  • Automatic aperture: The camera adjusts the aperture and gain automatically. The shutter is fixed.

  • Automatic shutter: The camera adjusts the shutter and gain automatically. The aperture is fixed.

  • Hold current: Locks the current exposure settings.

  • Flicker-free: The camera adjusts the aperture and gain automatically, and uses only the following shutter speeds: 1/50 s (50 Hz) and 1/60 s (60 Hz).

  • Flicker-free 50 Hz: The camera adjusts the aperture and gain automatically, and uses the shutter speed 1/50 s.

  • Flicker-free 60 Hz: The camera adjusts the aperture and gain automatically, and uses the shutter speed 1/60 s.

  • Flicker-reduced: This is the same as flicker-free, but the camera might use shutter speeds faster than 1/100 s (50 Hz) and 1/120 s (60 Hz) for brighter scenes.

  • Flicker-reduced 50 Hz: This is the same as flicker-free, but the camera might use shutter speeds faster than 1/100 s for brighter scenes.

  • Flicker-reduced 60 Hz: This is the same as flicker-free, but the camera might use shutter speeds faster than 1/120 s for brighter scenes.

  • Manual: The aperture, gain and shutter are fixed.

Exposure zone: The exposure zone tells the camera to prioritize image quality in the most important part of the scene. Select the part of the scene of greatest interest to calculate the automatic exposure levels, for example the area in front of an entrance door.

Note

The exposure zones are related to the original image (un-rotated), and the names of the zones apply to the original image. This means, for example, that if the video stream is rotated 90°, then the Upper zone becomes the Right zone in the stream, and Left becomes Lower.

  • Automatic: Suitable for most situations.

  • Center: Uses a fixed area in the center of the image to calculate the exposure. The area has a fixed size and position in the live view.

  • Full: Uses the entire live view to calculate the exposure.

  • Upper: Uses an area with a fixed size and position in the upper part of the image to calculate the exposure.

  • Lower: Uses an area with a fixed size and position in the lower part of the image to calculate the exposure.

  • Left: Uses an area with a fixed size and position in the left part of the image to calculate the exposure.

  • Right: Uses an area with a fixed size and position in the right part of the image to calculate the exposure.

  • Spot: Uses an area with a fixed size and position in the live view to calculate the exposure.

  • Custom: Uses an area in the live view to calculate the exposure. You can adjust the size and position of the area.

Max shutter: Select the shutter speed to provide the best image. Low shutter speeds (longer exposure) might cause motion blur when there is movement, and a too high shutter speed might affect the image quality. Max shutter works with max gain to improve the image.

Max gain: Select the suitable max gain. If you increase the max gain, it improves the visible level of detail in dark images, but also increases the noise level. More noise can also result in increased use of bandwidth and storage. If you set the max gain to a high value, images can differ a lot if the light conditions are very different from day to night. Max gain works with max shutter to improve the image.

Motion-adaptive exposure: Select to reduce motion blur in low-light conditions.

Blur-noise trade-off: Use the slider to adjust the priority between motion blur and noise. If you want to prioritize low bandwidth and have less noise at the expense of details in moving objects, move the slider towards Low noise. If you want to prioritize the preservation of details in moving objects at the expense of noise and bandwidth, move the slider towards Low motion blur.

Note

You can change the exposure either by adjusting the exposure or by adjusting the gain. If you increase the exposure time, it results in more motion blur, and if you increase the gain it results in more noise. If you adjust the Blur-noise trade-off towards Low noise, the exposure will prefer longer exposure times over sensor gain when the exposure is increased, and the opposite if you adjust the trade-off towards Low motion blur. Both the gain and exposure time will eventually reach their maximum values in low-light conditions, regardless of the priority set.

Lock aperture: Turn on to keep the aperture size set by the Aperture slider. Turn off to allow the camera to automatically adjust the aperture size. You can, for example, lock the aperture for scenes with permanent light conditions.

Aperture: Use the slider to adjust the aperture size, that is, how much light passes through the lens. To allow more light to enter the sensor and thereby produce a brighter image in low-light conditions, move the slider towards Open. An open aperture also reduces the depth of field, which means that objects close to or far from the camera can appear unfocused. To allow more of the image to be in focus, move the slider towards Closed.

Exposure level: Use the slider to adjust the image exposure.

Defog: Turn on to detect the effects of foggy weather and automatically remove them for a clearer image.

Note

We recommend you not to turn on Defog in scenes with low contrast, large light level variations, or when the autofocus is slightly off. This can affect the image quality, for example, by increasing the contrast. Furthermore, too much light can negatively impact the image quality when defog is active.

Optics

Temperature compensation: Turn on if you want the focus position to be corrected based on the temperature in the optics.

IR compensation: Turn on if you want the focus position to be corrected when IR-cut filter is off and when there is IR light.

Calibrate zoom and focus: Click to reset the optics and the zoom and focus settings to the factory default position. You need to do this if the optics have lost calibration during transport, or if the device has been exposed to extreme vibrations.

General

Name: Enter a name for the selected camera.

Stitching

The different sensor images are stitched together to appear as one complete image.

Blending:  Use the slider to soften the line between the different sensor images.

Distance: Use the slider to set the distance (in meters) between the camera and the objects of interest in the scene. At the set distance, you get the optimal stitching of the images.

Stream

General

Resolution: Select the image resolution suitable for the surveillance scene. A higher resolution increases bandwidth and storage.

Palette: Select a palette to color the image with different colors depending on temperature. The palette can improve visibility of fine details.

Frame rate: To avoid bandwidth problems on the network or reduce storage size, you can limit the frame rate to a fixed amount. If you leave the frame rate at zero, the frame rate is kept at the highest possible rate under the current conditions. A higher frame rate requires more bandwidth and storage capacity.

Compression: Use the slider to adjust the image compression. High compression results in a lower bitrate and lower image quality. Low compression improves the image quality, but uses more bandwidth and storage when you record.

Signed video: Turn on to add the signed video feature to the video. Signed video protects the video from tampering by adding cryptographic signatures to the video.

H.26x encoding

Zipstream: A bitrate reduction technology, optimized for video surveillance, that reduces the average bitrate in an H.264 or H.265 stream in real time. Axis Zipstream applies a high bitrate in scenes where there are multiple regions of interest, for example in scenes with moving objects. When the scene is more static, Zipstream applies a lower bitrate, and thereby reduces the required storage. To learn more, see Reducing the bit rate with Axis Zipstream

  • Select the desired level of bitrate reduction:
  • Off: No bitrate reduction.

  • Low: No visible quality degradation in most scenes. This is the default option and it can be used in all types of scenes to reduce the bitrate.

  • Medium: Visible effects in some scenes through less noise and a slightly lower level of detail in regions of lower interest, for example where there’s no movement.

  • High: Visible effects in some scenes through less noise and a lower level of detail in regions of lower interest, for example where there’s no movement. We recommend this level for cloud-connected devices and devices that use local storage.

  • Higher: Visible effects in some scenes through less noise and a lower level of detail in regions of lower interest, for example where there’s no movement.

  • Extreme: Visible effects in most scenes. The bitrate is optimized for smallest possible storage.

Dynamic FPS (frames per second): Turn on to allow the bandwidth to vary based on the level of activity in the scene. More activity requires more bandwidth.

Lower limit: Enter a value to adjust the frame rate between minimal fps and the stream default fps based on scene motion. We recommend you to use lower limit in scenes with very little motion, where the fps could drop to 1 or lower.

Dynamic GOP (Group of Pictures): Turn on to dynamically adjust the interval between I-frames based on the level of activity in the scene.

Upper limit: Enter a maximum GOP length, that is, the maximum number of P-frames between two I-frames.

P-frames: Enter the desired number of P-frames. The higher the number, the less bandwidth is required. However, if there are network congestion, there could be a noticeable deterioration in the video quality.

H.264 profile:

  • Baseline: Use if the video management client doesn’t support CABAC entropy coding.

  • Main: Use if the video management client supports CABAC entropy coding, to achieve higher compression with maintained video quality. It requires more processing power to decode compared to the baseline profile.

  • High: Use if the video management client supports CABAC entropy coding, to achieve even higher compression than with the main profile. It requires more processing power to decode compared to the main profile.

Bitrate control:

  • Average: Select to automatically adjust the bitrate over a longer time period and provide the best possible image quality based on the available storage.

    • Click to calculate the target bitrate based on available storage, retention time, and bitrate limit.

    • Target bitrate: Enter desired target bitrate.

    • Retention time: Enter the number of days to keep the recordings.

    • Storage: Shows the estimated storage that can be used for the stream.

    • Maximum bitrate: Turn on to set a bitrate limit.

    • Bitrate limit: Enter a bitrate limit that is higher than the target bitrate.

  • Maximum: Select to set a maximum instant bitrate of the stream based on your network bandwidth.

    • Maximum: Enter the maximum bitrate.

  • Variable: Select to allow the bitrate to vary based on the level of activity in the scene. More activity requires more bandwidth. We recommend this option for most situations.

Orientation

Rotate: Rotate the image to match your requirements.

Mirror: Turn on to mirror the image.

Audio

Include: Turn on to use audio in the video stream.

Source: Select what audio source to use.

Stereo: Turn on to include built-in audio as well as audio from an external microphone.

Overlays

: Click to add an overlay. Select the type of overlay from the dropdown list:

  • Text: Select to show a text that is integrated in the live view image and visible in all views, recordings and snapshots. You can enter your own text, and you can also include pre-configured modifiers to automatically show for example time, date, frame rate.

    • : Click to add the date modifier %F to show yyyy-mm-dd.

    • : Click to add the time modifier %X to show hh:mm:ss (24-hour clock).

    • : Click to select any of the modifiers shown in the list to add them to the text box. For example, %a shows the day of the week.

    • Size: Select the desired font size.

    • Appearance: Select the text color and background color, for example, white text on a black background (default).

    • : Select the position of the overlay in the image.

  • Image: Select to show a static image superimposed over the video stream. You can use .bmp, .png, .jpeg, or .svg files.

    To upload an image, click Images. Before you upload an image, you can choose to:

    • Scale with resolution: Select to automatically scale the overlay image to fit the video resolution.

    • Use transparency: Select and enter the RGB hexadecimal value for that color. Use the format RRGGBB. Examples of hexadecimal values: FFFFFF for white, 000000 for black, FF00000 for red, 6633FF for blue, and 669900 for green. Only for .bmp images.

  • Streaming indicator: Select to show an animation superimposed over the video stream. The animation indicates that the video stream is live, even if the scene doesn’t contain any motion.

    • Appearance: Select the animation color and background color, for example, red animation on a transparent background (default).

    • Size: Select the desired font size.

    • : Select the position of the overlay in the image.

View areas

: Click to create a view area.

Click the view area to access settings.

Name: Enter a name for the view area. The maximum length is 64 characters.

Aspect ratio: Select desired aspect ratio. The resolution adjusts automatically.

PTZ: Turn on to use pan, tilt, and zoom functionality in the view area.

Privacy masks

: Click to create a new privacy mask. The maximum number of masks depend on the complexity of all masks combined. Each mask can have maximum 10 anchor points.

Privacy masks: Click to change the color of all privacy masks, or to delete all privacy masks permanently.

Mask x: Click to rename, disable, or permanently delete the mask.

Audio

Overview

Locate device: Click to play a sound that helps you identify the speaker. For some products, a LED will flash on the device.

Calibrate: Click to calibrate the speaker.

Launch AXIS Audio Manager Edge: Click to launch the application.

Device settings

Input: Turn on or off audio input. Shows the type of input.

Allow stream extraction: Turn on to allow stream extraction.

Input type: Select the type of input, for instance if it’s a microphone or line-in.

Power type: Select power type for your input.

Activate changes: Click to activate your selection.

Separate gain controls: Turn on to adjust the gain separately for the different input types.

Automatic gain control: Turn on to dynamically adapt the gain to changes in the sound.

Gain: Use the slider to change the gain. Click the microphone icon to mute or unmute.

Output: Shows the type of output.

Gain: Use the slider to change the gain. Click the speaker icon to mute or unmute.

Stream

Encoding: Select the encoding to use for the input source streaming. You can only choose encoding if audio input is turned on. If audio input is tuned off, click Enable audio input to turn it on.

Echo cancellation: Turn on to remove echoes during two-way communication.

Audio clips

Add clip: Click to add a new audio clip.

Click to play the audio clip.

Click to stop playing the audio clip.

The context menu contains:

  • Rename: Change the name of the audio clip.

  • Create link: Create a URL which, when used, plays the audio clip on the device. Specify the volume and number of times to play the clip.

  • Download: Download the audio clip to your computer.

  • Delete: Delete the audio clip from the device.

Listen and record

Click to listen.

Click to start a continuous recording of the live audio stream. Click again to stop the recording. If a recording is ongoing, it will resume automatically after a reboot.

Note

You can only listen and record if input is turned on for the device. Go to Audio > Device settings to make sure that input is turned on.

Click to show the storage that is configured for the device. To configure the storage you need to be logged in as an administrator.

Audio mixer

Input

Ten Band Graphic Audio Equalizer: Turn on to adjust the level of different frequency bands within an audio signal.

Voice enhancement: Turn on to adjust the voice content in relation to other sounds.

Audio site security

CA certificate: Select the certificate to use when you add devices to the audio site when TLS authentication is enabled in AXIS Audio Manager Edge.

Save: Click to activate and save your selection.

Speaker test

You can use the speaker test to verify from a remote location that the speaker works as intended.

Calibrate: Click to calibrate the speaker before you test it for the first time. During calibration, the speaker plays a series of test tones that are registered by the built-in microphone. When you calibrate the speaker, it must be installed in it’s final position. If you move the speaker later on, or if it’s surroundings change, for example if a wall is built or removed, you need to recalibrate the speaker.

Run the test: Click to play the same series of test tones that were played during calibration, and compare them with the registered values from the calibration.

Recordings

Click to filter the recordings.

From: Show recordings done after a certain point in time.

To: Show recordings up until a certain point in time.

Source: Show recordings based on source.

Event: Show recordings based on events.

Storage: Show recordings based on storage type.

Click to play the recording.

Click to stop the recording.

Click to show more information and options about the recording.

Set export range: If you only want to export part of the recording, enter from when to when.

Click to delete the recording.

Export: Click to export (part of) the recording.

Apps

Add app: Click to install a new app.

Find more apps: Click to go to an overview page of Axis apps.

The context menu contains:

  • App log: Click to view a log of the app events. The log is helpful when you contact support.

  • Activate license with a key: If the app requires a license, you need to activate it. Use this option if your device doesn’t have internet access.

    If you don’t have a license key, go to axis.com/applications. You need a license code and the Axis product serial number to generate a license key.

  • Activate license automatically: If the app requires a license, you need to activate it. Use this option if your device has internet access. You need a license code to activate the license.

  • Deactivate the license: Deactivate the license to use it in another device. If you deactivate the license, you also remove it from the device. To deactivate the license requires internet access.

  • Settings: Configure the parameters.

  • Delete: Delete the app permanently from the device. If you don’t deactivate the license first, it remains active.

Note

The device’s performance might be affected if you run several apps at the same time.

Start: Start or stop the app.

Open: Click to access the app’s settings. The available settings depend on the application. Some applications don’t have any settings.

System

Date and time

The time format depends on the web browser’s language settings.

Note

We recommend you to synchronize the device’s date and time with an NTP server.

Synchronization: Select an option for synchronizing the device’s date and time.

  • Automatic date and time (NTP server using DHCP): Synchronize with the NTP server connected to the DHCP server.

  • Automatic date and time (manual NTP server): Synchronize with NTP servers of your choice.

    • Primary NTP server and Secondary NTP server: Enter the IP address of one or two NTP servers. When you use two NTP servers, the device synchronizes and adapts its time based on input from both.

  • Custom date and time: Manually set the date and time. Click Get from system to fetch the date and time settings once from your computer or mobile device.

  • Time zone: Select which time zone to use. Time will be automatically adjusted for daylight saving time and standard time.
Note

The system uses the date and time settings in all recordings, logs and system settings.

Network

IPv4 and IPv6

IPv4

  • Automatic IP (DHCP) and DNS (DHCP): The recommended setting for most networks. The current settings are updated automatically.

  • Automatic IP (DHCP) and manual DNS: Contact your network administrator to configure the manual settings. The current automatic settings are updated automatically.

  • Manual IP and DNS: Contact your network administrator to configure the settings.

IP address: Enter a unique IP address for the device. Static IP addresses can be assigned at random within isolated networks, provided that each address is unique. To avoid conflicts, we recommend you to contact your network administrator before you assign a static IP address.

Subnet mask: Enter the subnet mask.

Router: Enter the IP address of the default router (gateway) used to connect devices that are attached to different networks and network segments.

Hostname: Enter the hostname.

Search domains: When you use a hostname that is not fully qualified, click Add search domain and enter a domain in which to search for the hostname used by the device.

DNS servers: Click Add DNS server and enter the IP address of the primary DNS server. This provides the translation of hostnames to IP addresses on your network.

IPv6

Assign IPv6 automatically: Select to let the network router assign an IP address to the device automatically.

HTTP and HTTPS

Allow access through: Select if a user is allowed to connect to the device through the HTTP, HTTPS, or both HTTP and HTTPS protocols.

HTTPS is a protocol that provides encryption for page requests from users and for the pages returned by the web server. The encrypted exchange of information is governed by the use of an HTTPS certificate, which guarantees the authenticity of the server.

To use HTTPS on the device, you must install an HTTPS certificate. Go to System > Security to create and install certificates.

Note

If you view encrypted web pages through HTTPS, you might experience a drop in performance, especially when you request a page for the first time.

HTTP port: Enter the HTTP port to use. Port 80 or any port in the range 1024-65535 are allowed. If you are logged in as an administrator, you can also enter any port in the range 1-1023. If you use a port in this range, you get a warning.

HTTPS port: Enter the HTTPS port to use. Port 443 or any port in the range 1024-65535 are allowed. If you are logged in as an administrator, you can also enter any port in the range 1-1023. If you use a port in this range, you get a warning.

Certificate: Select a certificate to enable HTTPS for the device.

Friendly name

Bonjour®: Turn on to allow automatic discovery on the network.

Bonjour name: Enter a friendly name to be visible on the network. The default name is the device name and MAC address.

Use UPnP®: Turn on to allow automatic discovery on the network.

UPnP name: Enter a friendly name to be visible on the network. The default name is the device name and MAC address.

One-click cloud connection

One-click cloud connection (O3C) together with an O3C service provides easy and secure internet access to live and recorded video from any location. For more information, see axis.com/end-to-end-solutions/hosted-services.

Allow O3C:

  • One-click: The default setting. Press and hold the control button on the device to connect to an O3C service over the internet. You need to register the device with the O3C service within 24 hours after you press the control button. Otherwise, the device disconnects from the O3C service. Once you have registered the device, Always is enabled and the device stays connected to the O3C service.

  • Always: The device constantly attempts to connect to an O3C service over the internet. Once you have registered the device, it stays connected to the O3C service. Use this option if the control button on the device is out of reach.

  • No: Disables the O3C service.

Proxy settings: If needed, enter the proxy settings to connect to the HTTP server.

Host: Enter the proxy server’s address.

Port: Enter the port number used for access.

Login and Password: If needed, enter username and password for the proxy server.

Authentication method:

  • Basic: This method is the most compatible authentication scheme for HTTP. It’s less secure than the Digest method because it sends the username and password unencrypted to the server.

  • Digest: This method is more secure because it always transfers the password encrypted across the network.

  • Auto: This option lets the device select the authentication method depending on the supported methods. It prioritizes the Digest method over the Basic method.

Owner authentication key (OAK): Click Get key to fetch the owner authentication key. This is only possible if the device is connected to the internet without a firewall or proxy.

SNMP

The Simple Network Management Protocol (SNMP) allows remote management of network devices.

SNMP: Select the version of SNMP to use.

  • v1 and v2c:

    • Read community: Enter the community name that has read-only access to all supported SNMP objects. The default value is public.

    • Write community: Enter the community name that has read/write access to all supported SNMP objects (except read-only objects). The default value is write.

    • Activate traps: Turn on to activate trap reporting. The device uses traps to send messages for important events or status changes to a management system. In the device interface, you can set up traps for SNMP v1 and v2c. Traps are automatically turned off if you change to SNMP v3 or turn off SNMP. If you use SNMP v3, you can set up traps through the SNMP v3 management application.

    • Trap address: Enter the IP address or host name of the management server.

    • Trap community: Enter the community to use when the device sends a trap message to the management system.

    • Traps:

      • Cold start: Sends a trap message when the device starts.

      • Warm start: Sends a trap message when you change an SNMP setting.

      • Link up: Sends a trap message when a link changes from down to up.

      • Authentication failed: Sends a trap message when an authentication attempt fails.

Note

All Axis Video MIB traps are enabled when you turn on SNMP v1 and v2c traps. For more information, see AXIS OS Portal > SNMP.

  • v3: SNMP v3 is a more secure version, which provides encryption and secure passwords. To use SNMP v3, we recommend you to activate HTTPS, as the password is then sent through HTTPS. This also prevents unauthorized parties to access unencrypted SNMP v1 and v2c traps. If you use SNMP v3, you can set up traps through the SNMP v3 management application.

    • Password for the account “initial”: Enter the SNMP password for the account named “initial”. Although the password can be sent without activating HTTPS, we don’t recommend it. The SNMP v3 password can only be set once, and preferably only when HTTPS is enabled. Once the password is set, the password field is no longer displayed. To set the password again, you must reset the device to factory default settings.

Connected clients

The list shows all clients that are connected to the device.

Update: Click to refresh the list.

Security

Certificates

Certificates are used to authenticate devices on a network. The device supports two types of certificates:

  • Client/server certificates

    A client/server certificate validates the device’s identity, and can be self-signed or issued by a Certificate Authority (CA). A self-signed certificate offers limited protection and can be used before a CA-issued certificate has been obtained.

  • CA certificates

    You can use a CA certificate to authenticate a peer certificate, for example to validate the identity of an authentication server when the device connects to a network protected by IEEE 802.1X. The device has several pre-installed CA certificates.

These formats are supported:

  • Certificate formats: .PEM, .CER, and .PFX

  • Private key formats: PKCS#1 and PKCS#12

Important

If you reset the device to factory default, all certificates are deleted. Any pre-installed CA certificates are reinstalled.

Filter the certificates in the list.

Add certificate : Click to add a certificate.

The context menu contains:

  • Certificate information: View an installed certificate’s properties.

  • Delete certificate: Delete the certificate.

  • Create certificate signing request: Create a certificate signing request to send to a registration authority to apply for a digital identity certificate.

IEEE 802.1x

IEEE 802.1x is an IEEE standard for port-based network admission control providing secure authentication of wired and wireless network devices. IEEE 802.1x is based on EAP (Extensible Authentication Protocol).

To access a network protected by IEEE 802.1x, network devices must authenticate themselves. The authentication is performed by an authentication server, typically a RADIUS server (for example FreeRADIUS and Microsoft Internet Authentication Server).

Certificates

When configured without a CA certificate, server certificate validation is disabled and the device tries to authenticate itself regardless of what network it is connected to.

When using a certificate, in Axis' implementation, the device and the authentication server authenticate themselves with digital certificates using EAP-TLS (Extensible Authentication Protocol - Transport Layer Security).

To allow the device to access a network protected through certificates, a signed client certificate must be installed on the device.

Client certificate: Select a client certificate to use IEEE 802.1x. The authentication server uses the certificate to validate the client’s identity.

CA certificate: Select a CA certificate to validate the authentication server’s identity. When no certificate is selected, the device tries to authenticate itself regardless of what network it is connected to.

EAP identity: Enter the user identity associated with the client certificate.

EAPOL version: Select the EAPOL version that is used in the network switch.

Use IEEE 802.1x: Select to use the IEEE 802.1x protocol.

Prevent brute-force attacks

Blocking: Turn on to block brute-force attacks. A brute-force attack uses trial-and-error to guess login info or encryption keys.

Blocking period: Enter the number of seconds to block a brute-force attack.

Blocking conditions: Enter the number of authentication failures allowed per second before the block starts. You can set the number of failures allowed both on page level and device level.

IP address filter

Use filter: Select to filter which IP addresses that are allowed to access the device.

Policy: Choose whether to Allow access or Deny access for certain IP addresses.

Addresses: Enter the IP numbers that are either allowed or denied access to the device. You can also use the CIDR format.

Custom-signed firmware certificate

To install test firmware or other custom firmware from Axis on the device, you need a custom-signed firmware certificate. The certificate verifies that the firmware is approved by both the device owner and Axis. The firmware can only run on a specific device which is identified by its unique serial number and chip ID. Custom-signed firmware certificates can only be created by Axis, since Axis holds the key to sign them.

Click Install to install the certificate. You need to install the certificate before you install the firmware.

Users

Add user: Click to add a new user. You can add up to 100 users.

Username: Enter a unique username.

New password: Enter a password for the user. Passwords must be 1 to 64 characters long. Only ASCII printable characters (code 32 to 126) are allowed in the password, for example letters, numbers, punctuation, and some symbols.

Repeat password: Enter the same password again.

Role:

  • Administrator: Has full access to all settings. Administrators can also add, update, and remove other users.

  • Operator: Has access to all settings except:

    • All System settings.

    • Adding apps.

  • Viewer: Doesn’t have access to change any settings.

  • Viewer: Has access to:

    • Watch and take snapshots of a video stream.

    • Watch and export recordings.

    • With PTZ user access: pan, tilt, and zoom.

The context menu contains:

Update user: Edit the user’s properties.

Delete user: Delete the user. You can’t delete the root user.

Anonymous users

Allow anonymous viewers: Turn on to allow anyone to access the device as a viewer without having to log in with a user account.

Allow anonymous PTZ operators: Turn on to allow anonymous users to pan, tilt, and zoom the image.

Events

Rules

A rule defines the conditions that must be met for the product to perform an action. The list shows all the currently configured rules in the product.

Note

You can create up to 256 action rules.

Add a rule: Click to create a rule.

Name: Enter a name for the rule.

Wait between actions: Enter the minimum time (hh:mm:ss) that must pass between rule activations. It is useful if the rule is activated by for example day-night mode conditions, to avoid that small light changes during sunrise and sunset activate the rule repeatedly.

Condition: Select a condition from the list. A condition must be met for the device to perform an action. If multiple conditions are defined, all of them must be met to trigger the action. For information about specific conditions, see Get started with rules for events.

Use this condition as a trigger: Select to make this first condition function only as a starting trigger. It means that once the rule is activated it remains active for as long as all the other conditions are met, no matter the state of the first condition. If you don’t select this option, the rule will simply be active whenever all the conditions are met.

Invert this condition: Select if you want the condition to be the opposite of your selection.

Add a condition: Click to add an additional condition.

Action: Select an action from the list and enter its required information. For information about specific actions, see Get started with rules for events.

Your product may have some of the following pre-configured rules:

Front-facing LED Activation: LiveStream: When the microphone is turned on and a live stream is received, then the front-facing LED on the audio device will turn green.

Front-facing LED Activation: Recording : When the microphone is turned on and a recording is ongoing, then the front-facing LED on the audio device will turn green.

Front-facing LED Activation: SIP : When the microphone is turned on and a SIP call is active, then the front-facing LED on the audio device will turn green. SIP must be enabled on the audio device before this event can be triggered.

Pre-announcement tone: Play tone on incoming call: When a SIP call is made to the audio device, then a pre-defined audio clip is played. SIP must be enabled for the audio device. For the SIP caller to hear a ring tone while the audio clip is played, the SIP account for the audio device must be configured to not answer the call automatically.

Pre-announcement tone: Answer call after incoming call-tone: When the audio clip has ended, the incoming SIP-call is answered. SIP must be enabled for the audio device.

Loud ringer : When a SIP call is made to the audio device, a pre-defined audio clip is played as long as the rule is active. SIP must be enabled for the audio device.

Recipients

You can set up your device to notify recipients about events or send files. The list shows all the recipients currently configured in the product, along with information about their configuration.

Note

You can create up to 20 recipients.

Add a recipient: Click to add a recipient.

Name: Enter a name for the recipient.

Type: Select from the list:

  • FTP

    • Host: Enter the server's IP address or hostname. If you enter a hostname, make sure that a DNS server is specified under System > Network > IPv4 and IPv6.

    • Port: Enter the port number used by the FTP server. The default is 21.

    • Folder: Enter the path to the directory where you want to store files. If this directory doesn’t already exist on the FTP server, you will get an error message when uploading files.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

    • Use temporary file name: Select to upload files with temporary, automatically generated filenames. The files get renamed to the desired names when the upload completes. If the upload is aborted/interrupted, you don’t get any corrupt files. However, you probably still get the temporary files. This way you know that all files that have the desired name, are correct.

    • Use passive FTP: Under normal circumstances the product simply requests the target FTP server to open the data connection. The device actively initiates both the FTP control and data connections to the target server. This is normally needed if there is a firewall between the device and the target FTP server.

  • HTTP

    • URL: Enter the network address to the HTTP server and the script that will handle the request. For example: http://192.168.254.10/cgi-bin/notify.cgi.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

    • Proxy: Turn on and enter the required information if a proxy server must be passed to connect to the HTTP server.

  • HTTPS

    • URL: Enter the network address to the HTTPS server and the script that will handle the request. For example: https://192.168.254.10/cgi-bin/notify.cgi.

    • Validate server certificate: Select to validate the certificate that was created by HTTPS server.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

    • Proxy: Turn on and enter the required information if a proxy server must be passed to connect to the HTTPS server.

  • Network storage

    You can add network storage such as a NAS (Network Attached Storage) and use it as a recipient to store files. The files are stored in the Matroska (MKV) file format.

    • Host: Enter the IP address or hostname for the network storage.

    • Share: Enter the name of the share on the host.

    • Folder: Enter the path to the directory where you want to store files.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

  • SFTP

    • Host: Enter the server's IP address or hostname. If you enter a hostname, make sure that a DNS server is specified under System > Network > IPv4 and IPv6.

    • Port: Enter the port number used by the SFTP server. The default is 22.

    • Folder: Enter the path to the directory where you want to store files. If this directory doesn’t already exist on the SFTP server, you will get an error message when uploading files.

    • Username: Enter the username for the login.

    • Password: Enter the password for the login.

    • SSH host public key (MD5): Enter the fingerprint of the remote host’s public key (a 32 hexadecimal digits string). The SFTP client supports SFTP servers using SSH-2 with RSA, DSA, ECDSA, and ED25519 host key types. RSA is the preferred method during negotiation, followed by ECDSA, ED25519, and DSA. Make sure to enter the right MD5 host key that is used by your SFTP server.

    • Use temporary file name: Select to upload files with temporary, automatically generated filenames. The files get renamed to the desired names when the upload completes. If the upload is aborted/interrupted, you don’t get any corrupt files. However, you probably still get the temporary files. This way you know that all files that have the desired name, are correct.

  • Email

    • Send email to: Enter the email address to send emails to. To enter multiple addresses, use commas to separate them.

    • Send email from: Enter the email address of the sending server.

    • Username: Enter the username for the mail server. Leave this field empty if the mail server does not require authentication.

    • Password: Enter the password for the mail server. Leave this field empty if the mail server does not require authentication.

    • Email server (SMTP): Enter the name of the SMTP server, for example smtp.gmail.com, smtp.mail.yahoo.com.

    • Port: Enter the port number for the SMTP server, using values in the range 0-65535. The default value is 587.

    • Encryption: To use encryption, select either SSL or TLS.

    • Validate server certificate: If you use encryption, select to validate the identity of the device. The certificate can be self-signed or issued by a Certificate Authority (CA).

    • POP authentication: Turn on to enter the name of the POP server, for example pop.gmail.com.

    • Note

      Some email providers have security filters that prevent users from receiving or viewing large amount of attachments, from receiving scheduled emails and similar. Check the email provider's security policy to avoid your email account being locked or missing out on your expected emails.

  • TCP

    • Host: Enter the server's IP address or hostname. If you enter a hostname, make sure that a DNS server is specified under System > Network > IPv4 and IPv6.

    • Port: Enter the port number used to access the server.

Test: Click to test the setup.

The context menu contains:

View recipient: Click to view all the recipient details.

Copy recipient: Click to copy a recipient. When you copy, you can make changes to the new recipient.

Delete recipient: Click to delete the recipient permanently.

Schedules

Schedules and pulses can be used as conditions in rules. The list shows all the schedules and pulses currently configured in the product, along with information about their configuration.

Add schedule: Click to create a schedule or pulse.

Manual trigger

The manual trigger is used to manually trigger a rule. The manual trigger can for example be used to validate actions during product installation and configuration.

MQTT

MQTT (Message Queuing Telemetry Transport) is a standard messaging protocol for the Internet of Things (IoT). It was designed for simplified IoT integration and is used in a wide variety of industries to connect remote devices with a small code footprint and minimal network bandwidth. The MQTT client in Axis device firmware can simplify integration of data and events produced in the device to systems which are not video management systems (VMS).

Set up the device as an MQTT client. MQTT communication is based on two entities, the clients and the broker. The clients can send and receive messages. The broker is responsible for routing messages between clients.

You can learn more about MQTT in AXIS OS Portal.

MQTT client

Connect: Turn on or off the MQTT client.

Status: Shows the current status of the MQTT client.

Broker

Host: Enter the hostname or IP address of the MQTT server.

Protocol: Select which protocol to use.

Port: Enter the port number.

  • 1883 is the default value for MQTT over TCP

  • 8883 is the default value for MQTT over SSL

  • 80 is the default value for MQTT over WebSocket

  • 443 is the default value for MQTT over WebSocket Secure

Username: Enter the username that the client will use to access the server.

Password: Enter a password for the username.

Client ID: Enter a client ID. The client identifier is sent to the server when the client connects to it.

Clean session: Controls the behavior at connection and disconnection time. When selected, the state information is discarded at connect and disconnect.

Keep alive interval: The keep alive interval enables the client to detect when the server is no longer available without having to wait for the long TCP/IP timeout.

Timeout: The time interval in seconds to allow a connect to complete. Default value: 60

Device topic prefix: Used in the default values for the topic in the connect message and LWT message on the MQTT client tab, and in the publication conditions on the MQTT publication tab.

Reconnect automatically: Specifies whether the client should reconnect automatically after a disconnect.

Connect message

Specifies if a message should be sent out when a connection is established.

Send message: Turn on to send messages.

Use default: Turn off to enter your own default message.

Topic: Enter the topic for the default message.

Payload: Enter the content for the default message.

Retain: Select to keep the state of client on this Topic

QoS: Change the QoS layer for the packet flow.

Last Will and Testament message

The Last Will Testament (LWT) lets a client provide a testament along with its credentials when connecting to the broker. If the client disconnects ungracefully at some point later (maybe because his power source died), it can let the broker deliver a message to other clients. This LWT message has the same form as an ordinary message and gets routed via the same mechanics.

Send message: Turn on to send messages.

Use default: Turn off to enter your own default message.

Topic: Enter the topic for the default message.

Payload: Enter the content for the default message.

Retain: Select to keep the state of client on this Topic

QoS: Change the QoS layer for the packet flow.

MQTT publication

Use default condition prefix: Select to use the default condition prefix, that is defined using the device topic prefix in the MQTT client tab.

Include condition name: Select to include the topics that describe the condition in the MQTT topic.

Include condition namespaces: Select to include ONVIF topic namespaces in the MQTT topic.

Include serial number: Select to include the device’s serial number in the MQTT payload.

Add condition: Click to add a condition.

Retain: Defines which MQTT messages are sent as retained.

  • None: Send all messages as non-retained.

  • Property: Send only stateful messages as retained.

  • All: Send both stateful and stateless messages as retained.

QoS: Select the desired level for the MQTT publication.

MQTT subscriptions

Add subscription: Click to add a new MQTT subscription.

Subscription filter: Enter the MQTT topic that you want to subscribe to.

Use device topic prefix: Add the subscription filter as prefix to the MQTT topic.

Subscription type:

  • Stateless: Select to convert MQTT messages into a stateless message.

  • Stateful: Select to convert MQTT messages into a condition. The payload is used as the state.

QoS: Select the desired level for the MQTT subscription.

Storage

Network storage

Add network storage: Click to add a network share where you can save recordings.

  • Address: Enter the IP address or host name of the host server, typically a NAS (Network Attached Storage). We recommend you to configure the host to use a fixed IP address (not DHCP since a dynamic IP address can change) or that you use DNS. Windows SMB/CIFS names are not supported.

  • Network share: Enter the name of the shared location on the host server. Several Axis devices can use the same network share, since each device gets its own folder.

  • User: If the server requires a login, enter the username. To log in to a specific domain server, type DOMAIN\username.

  • Password: If the server requires a login, enter the password.

  • SMB version: Select the SMB storage protocol version to connect to the NAS. If you select Auto, the device tries to negotiate one of the secure versions SMB: 3.02, 3.0, or 2.1. Select 1.0 or 2.0 to connect to older NAS that don’t support higher versions. You can read more about SMB support in Axis devices here.

  • Add share even if connection test fails: Select to add the network share even if an error is discovered during the connection test. The error can be, for example, that you didn’t enter a password even though the server requires one.

Remove network storage: Click to remove the connection to the network share. This removes all settings for the network share.

Write protect: Turn on to stop writing to the network share and protect recordings from being removed. You can’t format a write-protected network share.

Ignore: Turn on to stop storing recordings on the network share.

Retention time: Select how long to keep recordings, to limit the amount of old recordings or to comply with regulations regarding data storage. If the network storage becomes full, old recordings are removed before the selected time period has passed.

Tools

  • Test connection: Test the connection to the network share.

  • Format: Format the network share, for example when you need to quickly erase all data. cifs is the available file system option.

  • Click Use tool to activate the selected tool.

Onboard storage

Important

Risk of data loss and corrupted recordings. Do not remove the SD card while the device is running. Unmount the SD card before you remove it.

Unmount: Click to safely remove the SD card.

Write protect: Turn on to stop writing to the SD card and protect recordings from being removed. You can’t format a write-protected SD card.

Autoformat: Turn on to automatically format a newly inserted SD card. It formats the file system into ext4.

Ignore: Turn on to stop storing recordings on the SD card. When you ignore the SD card, the device no longer recognizes that the card exists. The setting is only available for administrators.

Retention time: Select how long to keep recordings, to limit the amount of old recordings or to comply with regulations regarding data storage. If the SD card becomes full, old recordings are removed before the selected time period has passed.

Tools

  • Check: Check for errors on the SD card. This only works for the ext4 file system.

  • Repair: Repair errors in the ext4 file system. To repair an SD card with the VFAT file system, eject the SD card, insert it in a computer and perform a disk repair.

  • Format: Format the SD card, for example when you need to change the file system or quickly erase all data. VFAT and ext4 are the two available file system options. The recommended format is ext4, due to its resilience against data loss if the card is ejected or if there is an abrupt power loss. However, you need a third-party ext4 driver or application to access the file system from Windows®.

  • Encrypt: Encrypt data that is stored.

  • Decrypt: Decrypt data that is stored.

  • Change password: Change the password required to encrypt the SD card.

  • Click Use tool to activate the selected tool.

Onboard storage

  • Hard drive
  • Free: The amount of free disk space.

  • Status: If the disk is mounted or not.

  • File system: The file system that is used by the disk.

  • Encrypted: If the disk is encrypted or not.

  • Temperature: The current temperature of the hardware.

  • Overall heath test: The result after checking the health of the disk.

  • Tools
  • Check: Check the storage device for errors and tries to repair it automatically.

  • Repair: Repair the storage device. Active recordings will pause during the repair. Repairing a storage device may result in lost data.

  • Format: Erase all recordings and format the storage device. Choose a file system.

  • Encrypt: Encrypt data that is stored.

  • Decrypt: Decrypt data that is stored. All files on the storage device will be erased.

  • Change password: Change the password for the disk encryption. Changing the password doesn't disrupt ongoing recordings.

  • Use tool: Click to run the selected tool

Unmount: Click before you disconnect the device from the system. All ongoing recordings will be stopped.

Write protect: Turn on write protection to protect the storage device from being overwritten.

Autoformat: The disk will be automatically formatted using the ext4 file system.

SIP

SIP settings

Session Initiation Protocol (SIP) is used for interactive communication sessions between users. The sessions can include audio and video.

Enable SIP: Check this option to make it possible to initiate and receive SIP calls.

Allow incoming calls: Check this option to allow incoming calls from other SIP devices.

  • Call handling
  • Call timeout: Set the maximum time a call can last before it ends if there is no answer (max 10 min).

  • Incoming call duration: Set the maximum time an incoming call can last (max 10 min).

  • End calls after: Set the maximum time that a call can last (max 60 min). Select Infinite call duration if you don’t want to limit the length of a call.

  • Ports
  • A port number must be between 1024 and 65535.
  • SIP port: The network port used for SIP communication. The signaling traffic through this port is non-encrypted. The default port number is 5060. Enter a different port number if required.

  • TLS port: The network port used for encrypted SIP communication. The signaling traffic through this port is encrypted with Transport Layer Security (TLS). The default port number is 5061. Enter a different port number if required.

  • RTP start port: The network port used for the first RTP media stream in a SIP call. The default start port number is 4000. Some firewalls block RTP traffic on certain port numbers.

  • NAT traversal
  • Use NAT (Network Address Translation) traversal when the device is located on an private network (LAN) and you want to make it available from outside of that network.
  • Note

    For NAT traversal to work, the router must support it. The router must also support UPnP®.

  • Each NAT traversal protocol can be used separately or in different combinations depending on the network environment.
  • ICE: The ICE (Interactive Connectivity Establishment) protocol increases the chances of finding the most efficient path to successful communication between peer devices. If you also enable STUN and TURN, you improve the ICE protocol’s chances.

  • STUN: STUN (Session Traversal Utilities for NAT) is a client-server network protocol that lets the device determine if it is located behind a NAT or firewall, and if so obtain the mapped public IP address and port number allocated for connections to remote hosts. Enter the STUN server address, for example, an IP address.

  • TURN: TURN (Traversal Using Relays around NAT) is a protocol that lets a device behind a NAT router or firewall receive incoming data from other hosts over TCP or UDP. Enter the TURN server address and the login information.

  • Audio and video
  • Audio
  • Audio codec priority: Select at least one audio codec with the desired audio quality for SIP calls. Drag-and-drop to change the priority.

  • Note

    The selected codecs must match the call recipient codec, since the recipient codec is decisive when a call is made.

  • Audio direction: Select allowed audio directions.

  • Video direction: Select allowed video directions.

  • Additional
  • UDP-to-TCP switching: Select to allow calls to switch transport protocols from UDP (User Datagram Protocol) to TCP (Transmission Control Protocol) temporarily. The reason for switching is to avoid fragmentation, and the switch can take place if a request is within 200 bytes of the maximum transmission unit (MTU) or larger than 1300 bytes.

  • Allow via rewrite: Select to send the local IP address instead of the router's public IP address.

  • Allow contact rewrite: Select to send the local IP address instead of the router's public IP address.

  • Register with server every: Set how often you want the device to register with the SIP server for the existing SIP accounts.

  • DTMF payload type: Changes the default payload type for DTMF.

SIP accounts

All current SIP accounts are listed under SIP accounts. For registered accounts, the colored circle lets you know the status.

  • The account is successfully registered with the SIP server.
  • There is a problem with the account. Possible reasons can be authorization failure, that the account credentials are wrong, or that the SIP server can’t find the account.

The peer to peer (default) account is an automatically created account. You can delete it if you create at least one other account and set that account as default. The default account is always used when a VAPIX® Application Programming Interface (API) call is made without specifying which SIP account to call from.

  • Account: Click to create a new SIP account.
  • Active: Select to be able to use the account.

  • Make default: Select to make this the default account. There must be a default account, and there can only be one default account.

  • Name: Enter a descriptive name. This can, for example, be a first and last name, a role, or a location. The name is not unique.

  • User ID: Enter the unique extension or phone number assigned to the device.

  • Peer-to-peer: Use for direct calls to another SIP device on the local network.

  • Registered: Use for calls to SIP devices outside the local network, through a SIP server.

  • Domain: If available, enter the public domain name. It will be shown as part of the SIP address when calling other accounts.

  • Password: Enter the password associated with the SIP account for authenticating against the SIP server.

  • Authentication ID: Enter the authentication ID used for authenticating against the SIP server. If it is the same as the user ID, you don’t need to enter the authentication ID.

  • Caller ID: The name which is presented to the recipient of calls from the device.

  • Registrar: Enter the IP address for the registrar.

  • Transport mode: Select the SIP transport mode for the account: UPD, TCP, or TLS. When you select TLS, you get the option to use media encryption.

  • Media encryption (only with transport mode TLS): Select the type of encryption for media (audio and video) in SIP calls.

  • Certificate (only with transport mode TLS): Select a certificate.

  • Verify server certificate (only with transport mode TLS): Check to verify the server certificate.

  • Secondary SIP server: Turn on if you want the device to try to register on a secondary SIP server if registration on the primary SIP server fails.

  • Answer automatically: Select to automatically answer an incoming call.

  • SIP secure: Select to use Secure Session Initiation Protocol (SIPS). SIPS uses the TLS transport mode to encrypt traffic.

  • Proxies

    • Proxy: Click to add a proxy.

    • Prioritize: If you have added two or more proxies, click to prioritize them.

    • Server address: Enter the IP address of the SIP proxy server.

    • Username: If required, enter the username for the SIP proxy server.

    • Password: If required, enter the password for the SIP proxy server.

  • Video

    • View area: Select the view area to use for video calls. If you select none, the native view is used.

    • Resolution: Select the resolution to use for video calls. The resolution affects the required bandwidth.

    • Frame rate: Select the number of frames per second for video calls. The frame rate affects the required bandwidth.

  • DTMF

    • Use RTP (RFC2833): Select to allow dual-tone multifrequency (DTMF) signaling, other tone signals and telephony events in RTP packets.

    • Use SIP INFO (RFC2976): Select to include the INFO method to the SIP protocol. The INFO method adds optional application layer information, generally related to the session.

    • DTMF sequence: Click to add an action rule triggered by touch-tone. You must activate the action rule in the Events tab.

    • Sequence: Enter the characters to trigger the action rule. Allowed characters: 0–9, A-D, #, and *.

    • Description: Enter a description of the action to be triggered.

SIP test call

SIP account: Select which account to make the test call from.

SIP address: Enter a SIP address and click to make a test call and verify that the account works.

Stream profiles

Click to create and save groups of video stream settings. You can use the settings in different situations, for example in continuous recording or when you use action rules to record.

ONVIF

ONVIF users

ONVIF (Open Network Video Interface Forum) is a global interface standard that makes it easier for end-users, integrators, consultants, and manufacturers to take advantage of the possibilities offered by network video technology. ONVIF enables interoperability between different vendor products, increased flexibility, reduced cost and future-proof systems.

Add user: Click to add a new ONVIF user.

Username: Enter a unique username.

New password: Enter a password for the user. Passwords must be 1 to 64 characters long. Only ASCII printable characters (code 32 to 126) are allowed in the password, for example letters, numbers, punctuation, and some symbols.

Repeat password: Enter the same password again

Role:

  • Administrator: Has full access to all settings. Administrators can also add, update, and remove other users.

  • Operator: Has access to all settings except:

    • All System settings.

    • Adding apps.

  • Media user: Allows access to the video stream only.

The context menu contains:

Update user: Edit the user’s properties.

Delete user: Delete the user. You can’t delete the root user.

By creating an ONVIF user, you automatically enable ONVIF communication. Use the username and password for all ONVIF communication with the device. For more information see the Axis Developer Community at axis.com.

ONVIF media profiles

An ONVIF media profile consists of a set of configurations that you can use to change media stream settings.

Add media profile: Click to add a new ONVIF media profile.

profile_x: Click a profile to edit.

Analytics metadata

Metadata producers

Metadata producers lists the channels used by apps and the metadata they are streaming from the device.

Producer: The app producing the metadata.

Channel: The channel used by the app. Check to enable the metadata stream. Uncheck to disable the stream for compatibility or resources management reasons.

Detectors

Camera tampering

The camera tampering detector generates an alarm when the scene changes, for example because the lens is covered, sprayed or severely put out of focus, and the time in Trigger after has passed. The tampering detector only activates when the camera has not moved for at least 10 seconds. During this period the detector sets up a scene model to use as a comparison to detect tampering in current images. For the scene model to be set up properly, make sure that the camera is in focus, the lighting conditions are correct, and the camera doesn’t point at a scene that lacks contours, for example a blank wall. Camera tampering can be used as a condition to trigger actions.

Trigger after: Enter the minimum time that the tampering conditions must be active before the alarm triggers. This can help prevent false alarms for known conditions that affect the image.

Trigger on dark images: It is very difficult to generate alarms when the camera lens is sprayed, since it is impossible to distinguish that event from other situations where the image turns dark in a similar way, for example when the lighting conditions change. Turn on this parameter to generate alarms for all cases where the image turns dark. When it’s turned off, the device doesn’t generate any alarm when the image turns dark.

Audio detection

These settings are available for each audio input.

Sound level: Adjust the sound level to a value from 0–100, where 0 is the most sensitive and 100 the least sensitive. Use the activity indicator as a guide when you set the sound level. When you create events, you can use the sound level as a condition. You can choose to trigger an action if the sound level rises above, falls below or passes the set value.

Shock detection

Shock detector: Turn on to generate an alarm if the device is hit by an object or if it is tampered with.

Sensitivity level: Move the slider to adjust the sensitivity level at which the device should generate an alarm. A low value means that the device only generates an alarm if the hit is powerful. A high value means that the device generates an alarm even with mild tampering.

Video input

Each video input is terminated using a coax/BNC connector and displayed as a numbered channel.

Connect a 75 Ohm coaxial video cable; the recommended maximum length is 250 m (800 ft).

Automatic: The default setting. The encoder detects the video standard and resolution automatically.

Manual: Lock the channel to the selected video standard and resolution.

Reload: Click to restore to the current encoder settings.

Mark as configured: Click to acknowledge the video input settings. The video input is shown as configured in the Status page.

Save changes & restart: Click to apply the changes and restart the device. Restarting the device will affect ongoing recordings.

Video out

HDMI

You can connect an external monitor to the device through an HDMI cable.

Single source

A stream from a single camera is displayed on the external monitor.

  • Source: Select only one camera.

  • Rotate image 180°: Click to rotate the image.

  • Mirror image: Click to flip the image.

  • Dynamic overlays: Click to overlay.

Quad view

View streams from four separate cameras at the same time on the external monitor.

  • Sources: Select a different camera from each of the four drop-down lists. The image beside the source shows where the video from that camera will be displayed on the screen.

  • Rotate image 180°: Click to rotate all images.

Playlist

Single streams from multiple cameras alternate on the external monitor.

  • Rotate image 180°: Click to rotate the image from all sources.

  • : Click to add a camera to the playlist.

  • Source: Select the desired camera.

  • Duration: Set how long (in mm:ss) the playlist will stream from this camera in each rotation.

  • Mirror image: Click to flip the image.

  • Create: Click to save.

Picture-in-picture

Two streams are displayed on the external monitor at the same time. One stream fills the display and the other is a smaller picture. Position, picture size and borders are customizable.

  • Picture-in-picture

    • Source: Select the camera that will stream as the smaller picture.

    • Rotate image 180°: Click to rotate the image.

    • Mirror image: Click to flip the image.

    • Position: Select where on the screen the picture should appear.

    • Picture size: Drag the slider to set the size (% of screen) of the picture.

    • Border: Click to toggle borders for the picture on or off.

    • : Drag the slider to set the thickness for the entire border.

    • : Drag the slider to set the thickness for the top border.

    • : Drag the slider to set the thickness for the right border.

    • : Drag the slider to set the thickness for the bottom border.

    • : Drag the slider to set the thickness for the left border.

    • Border color: Select a border color.

  • Main view

    • Source: Select the camera that will stream on the full display.

    • Rotate image 180°: Click to rotate the image.

    • Mirror image: Click to flip the image.

Power settings

Power settings

Delayed shutdown: Turn on if you want to set a delay time before the power is turned off.

Delay time: Set a delay time between 1 and 60 minutes.

Indicators

Indicators

Tally LED: Use the tally LED to indicate when someone looks at the video stream.

On: The LED is always on, even if no one streams video from the device.

Off: The LED is always off, even if someone streams video from the device.

Auto: The LED is on when someone streams video from the device.

Accessories

Network speaker pairing

Network speaker pairing allows you to use a compatible Axis network speaker as if it is connected directly to the camera. Once paired, the speaker acts as an audio out device where you can play audio clips and transmit sound through the camera.

Important

For this feature to work with a video management software (VMS), you must first pair the camera with the network speaker, then add the camera to your VMS.

Address: Enter host name or IP address to the network speaker.

Username: Enter username.

Password: Enter password for the user.

Clear fields: Click to clear all fields.

Connect: Click to establish connection to the network speaker.

I/O ports

Use digital input to connect external devices that can toggle between an open and closed circuit, for example PIR sensors, door or window contacts, and glass break detectors.

Use digital output to connect external devices such as relays and LEDs. You can activate connected devices through the VAPIX® Application Programming Interface or in the device interface.

Port

Name: Edit the text to rename the port.

Direction: indicates that the port is an input port. indicates that it’s an output port. If the port is configurable, you can click the icons to change between input and output.

Normal state: Click open circuit, and for closed circuit.

Current state: Shows the current state of the port. The input or output is activated when the current state is different from the normal state. An input on the device has an open circuit when it’s disconnected or when there is a voltage above 1 V DC.

Note

During restart the output circuit is open. When the restart is complete, the circuit goes back to the normal position. If you change any settings on this page, the output circuits go back to their normal positions regardless of any active triggers.

Supervised: Turn on to make it possible to detect and trigger actions if someone tampers with the connection to digital I/O devices. In addition to detecting if an input is open or closed, you can also detect if someone has tampered with it (that is, cut or shorted). To supervise the connection requires additional hardware (end-of-line resistors) in the external I/O loop.

Logs

Reports and logs

Reports

  • View the device server report: Click to show information about the product status in a pop-up window. The Access Log is automatically included in the Server Report.

  • Download the device server report: Click to download the server report. It creates a .zip file that contains a complete server report text file in UTF–8 format, as well as a snapshot of the current live view image. Always include the server report .zip file when you contact support.

  • Download the crash report: Click to download an archive with detailed information about the server's status. The crash report contains information that is in the server report as well as detailed debug information. This report might contain sensitive information such as network traces. It can take several minutes to generate the report.

Logs

  • View the system log: Click to show information about system events such as device startup, warnings and critical messages.

  • View the access log: Click to show all failed attempts to access the device, for example when a wrong login password is used.

Network trace

Important

A network trace file might contain sensitive information, for example certificates or passwords.

A network trace file can help you troubleshoot problems by recording activity on the network. Select the duration of the trace in seconds or minutes, and click Download.

Remote system log

Syslog is a standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, which indicates the software type generating the message, and assigned a severity level.

Server: Click to add a new server.

Host: Enter the hostname or IP address of the server.

Format: Select which syslog message format to use.

    • RFC 3164

    • RFC 5424

    Protocol: Select the protocol and port to use:

    • UDP (Default port is 514)

    • TCP (Default port is 601)

    • TLS (Default port is 6514)

    Severity: Select which messages to send when triggered.

    CA certificate set: See the current settings or add a certificate.

    Plain config

    Plain config is for advanced users with experience of Axis device configuration. Most parameters can be set and edited from this page.

    SSH server

    Secure Shell (SSH): Turn on to allow a user to securely log on and perform shell and network services over the network.

    Maintenance

    Restart: Restart the device. This does not affect any of the current settings. Running applications restart automatically.

    Restore: Return most settings to the factory default values. Afterwards you must reconfigure the device and apps, reinstall any apps that didn’t come preinstalled, and recreate any events and PTZ presets.

    Important

    The only settings saved after restore are:

    • Boot protocol (DHCP or static)
    • Static IP address
    • Default router
    • Subnet mask
    • 802.1X settings
    • O3C settings

    Factory default: Return all settings to the factory default values. Afterwards you must reset the IP address to make the device accessible.

    Note

    All Axis device firmware is digitally signed to ensure that you only install verified firmware on your device. This further increases the overall minimum cybersecurity level of Axis devices. For more information, see the white paper “Signed firmware, secure boot, and security of private keys” at axis.com.

    Firmware upgrade: Upgrade to a new firmware version. New firmware releases can contain improved functionality, bug fixes, and completely new features. We recommend you to always use the latest release. To download the latest release, go to axis.com/support.

    • When you upgrade, you can choose between three options:
    • Standard upgrade: Upgrade to the new firmware version.

    • Factory default: Upgrade and return all settings to the factory default values. When you choose this option, you can’t revert to the previous firmware version after the upgrade.

    • Autorollback: Upgrade and confirm the upgrade within the set time. If you don’t confirm, the device reverts to the previous firmware version.

    Firmware rollback: Revert to the previously installed firmware version.