For areas in need of intrusion detection, you can set up perimeter protection using thermal cameras with analytics. The main objective for perimeter protection is to detect a threat or an actual intrusion at the earliest possible stage.
To set up perimeter protection, you need to install an analytics application for perimeter surveillance and protection on your thermal camera. Axis provides the AXIS Perimeter Defender application for this purpose. You can read more about AXIS Perimeter Defender at axis.com/products/axis-perimeter-defender
To warn and deter, connect a horn speaker (2) that plays a pre-recorded warning message. See Deter intruders with audio.
Installation
Installation video for the device.
Preview mode
Preview mode is ideal for installers when fine tuning the camera view during the installation. No login is required to access the camera view in preview mode. It is available only in factory defaulted state for a limited time from powering up the device.
This video demonstrates how to use preview mode.
Get started
Find the device on the network
To find Axis devices on the network and assign them IP addresses in Windows®, use AXIS IP Utility or AXIS Device Manager. Both applications are free and can be downloaded from axis.com/support.
You can use the device with the following browsers:
ChromeTM
EdgeTM
Firefox®
Safari®
Windows®
✓
✓
*
*
macOS®
✓
✓
*
*
Linux®
✓
✓
*
*
Other operating systems
*
*
*
*
✓: Recommended *: Supported with limitations
Open the device's web interface
Open a browser and type the IP address or host name of the Axis device.
If you don’t know the IP address, use AXIS IP Utility or AXIS Device Manager to find the device on the network.
Type the username and password. If you access the device for the first time, you must create an administrator account. See Create an administrator account.
For descriptions of all features and settings in the web interface of devices with AXIS OS, see AXIS OS web interface help.
Create an administrator account
The first time you log in to your device, you must create an administrator account.
The device has no default account. If you lose the password for your administrator account, you must reset the device. See Reset to factory default settings.
Secure passwords
Important
Use HTTPS (which is enabled by default) to set your password or other sensitive configurations over the network. HTTPS enables secure and encrypted network connections, thereby protecting sensitive data, such as passwords.
The device password is the primary protection for your data and services. Axis devices do not impose a password policy as they may be used in various types of installations.
To protect your data we strongly recommend that you:
Use a password with at least 8 characters, preferably created by a password generator.
Don’t expose the password.
Change the password at a recurring interval, at least once a year.
Make sure that no one has tampered with the device software
To make sure that the device has its original AXIS OS, or to take full control of the device after a security attack:
After the reset, secure boot guarantees the state of the device.
Configure and install the device.
Configure your device
This section covers all the important configurations that an installer needs to do to get the product up and running after the hardware installation has been completed.
Basic settings
Set the power line frequency
Go to Video > Installation > Power line frequency.
Select a power line frequency and click Save and restart.
This section includes instructions about configuring your device. If you want to learn more about how certain features work, go to Learn more.
Stabilize a shaky image with image stabilization
Image stabilization is suitable in environments where the product is mounted in an exposed location where vibrations can occur, for example, due to wind or passing traffic.
The feature makes the image smoother, steadier, and less blurry. It also reduces the file size of the compressed image and lowers the bitrate of the video stream.
Note
When you turn on image stabilization, the image is slightly cropped, which lowers the maximum resolution.
Go to Video > Installation > Image correction.
Turn on Image stabilization.
Monitor long and narrow areas
Use corridor format to better utilize the full field of view in a long and narrow area, for example a staircase, hallway, road, or tunnel.
Depending on your device, turn the camera or the 3-axis lens in the camera 90° or 270°.
If the device doesn’t have automatic rotation of the view, go to Video > Installation.
Rotate the view 90° or 270°.
Show an image overlay
You can add an image as an overlay in the video stream.
Go to Video > Overlays.
Click Manage images.
Upload or drag and drop an image.
Click Upload.
Select Image from the drop-down list and click .
Select the image and a position. You can also drag the overlay image in the live view to change the position.
Show a text overlay
You can add a text field as an overlay in the video stream. This is useful for example when you want to display the date, time or a company name in the video stream.
Go to Video > Overlays.
Select Text and click .
Type the text you want to display, or select modifiers to show for example the current date.
Select a position. You can also click-and-drag the overlay in the live view to change the position.
View and record video
This section includes instructions about configuring your device. To learn more about how streaming and storage works, go to Streaming and storage.
Reduce bandwidth and storage
Important
Reducing the bandwidth can lead to loss of detail in the image.
Go to Video > Stream.
Click in the live view.
Select Video format AV1 if your device supports it. Otherwise select H.264.
Go to Video > Stream > General and increase Compression.
Go to Video > Stream > Zipstream and do one or more of the following:
Note
The Zipstream settings are used for all video encodings except MJPEG.
Select the Zipstream Strength that you want to use.
Turn on Optimize for storage. This can only be used if the video management software supports B-frames.
Turn on Dynamic FPS.
Turn on Dynamic GOP and set a high Upper limit GOP length value.
Note
Most web browsers don’t support H.265 decoding and because of this the device doesn’t support it in its web interface. Instead you can use a video management system or application that supports H.265 decoding.
Set up network storage
To store recordings on the network, you need to set up your network storage.
Go to System > Storage.
Click Add network storage under Network storage.
Type the IP address of the host server.
Type the name of the shared location on the host server under Network share.
Type the username and password.
Select the SMB version or leave it on Auto.
Select Add share without testing if you experience temporary connection issues, or if the share is not yet configured.
Click Add.
Record and watch video
Record video directly from the camera
Go to Video > Stream.
To start a recording, click .
If you haven’t set up any storage, click and . For instructions on how to set up network storage, see Set up network storage
To stop recording, click again.
Watch video
Go to Recordings.
Click for your recording in the list.
Verify that no one has tampered with the video
With signed video, you can make sure that no one has tampered with the video recorded by the camera.
Go to Video > Stream > General and turn on Signed video.
Use AXIS Camera Station (5.46 or later) or another compatible video management software to record video. For instructions, see the AXIS Camera Station user manual.
indicates that no one has tampered with the video.
Note
To get more information about the video, right-click the video and select Show digital signature.
Set up rules for events
You can create rules to make your device perform an action when certain events occur. A rule consists of conditions and actions. The conditions can be used to trigger the actions. For example, the device can start a recording or send an email when it detects motion, or show an overlay text while the device is recording.
Use a flashing beacon light to let possible intruders know that your perimeter is protected.
This example explains how to connect a beacon light and set it up to flash whenever the thermal camera detects an intrusion. In this example, the beacon light can only be activated to flash outside office hours, between 18.00 and 08.00 Monday–Friday, and it flashes for 30 seconds each time it’s activated.
Required hardware
Connecting wires (one blue and one red, min area: 0.25 mm2, max area: 0.5 mm2)
Flashing beacon (12 V DC, max 25 mA)
Note
The maximum length of the connecting wires depends on the wire area and the power consumption of the flashing beacon.
Connect the devices physically
Connect the red wire to pin 2 (DC output, 12 V DC) of the camera’s I/O connector.
Connect the other end of the red wire to the connector marked with + on the flashing beacon.
Connect the blue wire to pin 4 (digital output) of the camera’s I/O connector.
Connect the other end of the blue wire to the connector marked with - on the flashing beacon.
Configure I/O ports
Connect the flashing beacon to the camera in the camera’s web interface:
Go to System > Accessories > I/O ports.
For Port 2, name it Flashing beacon.
Under Normal state, click to set the normal state of the port to Open circuit (NO). This makes the beacon start to flash when an event occurs.
Create a rule
For the camera to send a notification to the beacon to start flashing when something is detected, you need to create a rule in the camera.
Go to System > Events > Rules and add a rule.
In Name, type Flashing beacon.
Set the Wait between actions (in the format hh:mm:ss) to 30 seconds.
In the list of conditions, under Application, select the perimeter defender application.
Select Use this condition as a trigger.
Click to add another condition.
In the list of conditions, under Scheduled and recurring, select Schedule.
In the list of schedules, select After hours.
In the list of actions, under I/O, select Toggle I/O while the rule is active.
Select the Flashing beacon port from the list of ports.
Set the State to Active.
Click Save.
Deter intruders with audio
Use a network horn speaker to warn and deter possible intruders.
This example explains how to connect an Axis network horn speaker and set it up to play an audio clip whenever the thermal camera detects an intrusion. In this example, the horn speaker can only be activated outside office hours, between 18.00 and 08.00 Monday-Friday.
Connect the devices
Go to System > Edge-to-edge > Pairing.
Enter the IP address, username, and password for the speaker. You need to use an administrator or operator account.
Click Connect.
Upload audio clip to the camera
Go to Audio > Audio clips and click .
Click + Add clip.
Locate and upload the audio clip.
Click Close.
Create a rule
For the camera to make the speaker play the audio clip when something is detected, you need to create a rule in the camera.
Go to System > Events > Rules and add a rule.
In Name, type Deter with audio.
In the list of conditions, under Application, select the perimeter defender application.
Select Use this condition as a trigger.
Click to add another condition.
In the list of conditions, under Scheduled and recurring, select Schedule.
In the list of schedules, select After hours.
In the list of actions, under Audio clips, select Play audio clip.
Under Clip, select your uploaded audio clip.
Under Audio output, select 1 for the paired network speaker.
Click Save.
Activate a strobe siren through virtual input when a camera detects motion
Use an Axis strobe siren to let possible intruders know that your perimeter is protected.
This example explains how to activate a profile in the strobe siren whenever AXIS Motion Guard detects motion.
Before you start:
Create a new account with Operator or Administrator privileges in the strobe siren.
Create a profile in the strobe siren.
Set up AXIS Motion Guard in the camera and create a profile called “Camera profile”.
Create two recipients in the camera:
In the camera’s device interface, go to System > Events > Recipients and add a recipient.
Replace <IPaddress> with the address of the strobe siren.
The account and password of the newly created strobe siren account.
Click Test to make sure all data is valid.
Click Save.
Create two rules in the camera:
Go to Rules and add a rule.
Enter the following information:
Name: Activate virtual IO1
Condition: Applications > Motion Guard: Camera profile
Action: Notifications > Send notification through HTTP
Recipient: Activate virtual port
Query string suffix: schemaversion=1&port=1
Click Save.
Add another rule with the following information:
Name: Deactivate virtual IO1
Condition: Applications > Motion Guard: Camera profile
Select Invert this condition.
Action: Notifications > Send notification through HTTP
Recipient: Deactivate virtual port
Query string suffix: schemaversion=1&port=1
Click Save.
Create a rule in the strobe siren:
In the strobe siren’s web interface, go to System > Events and add a rule.
Enter the following information:
Name: Trigger on virtual input 1
Condition: I/O > Virtual input
Port: 1
Action: Light and siren > Run light and siren profile while the rule is active
Profile: select the newly created profile
Click Save.
Detect tampering with input signal
This example explains how to send an email when the input signal is cut or short-circuited. For more information about the I/O connector, see I/O connector.
Go to System > Accessories > I/O ports and turn on Supervised for the relevant port.
Add an email recipient:
Go to System > Events > Recipients and add a recipient.
Type a name for the recipient.
Select Email as the notification type.
Type the recipient’s email address.
Type the email address that you want the camera to send notifications from.
Provide the login details for the sending email account, along with the SMTP hostname and port number.
To test your email setup, click Test.
Click Save.
Create a rule:
Go to System > Events > Rules and add a rule.
Type a name for the rule.
In the list of conditions, under I/O, select Supervised input tampering is active.
Select the relevant port.
In the list of actions, under Notifications, select Send notification to email and then select the recipient from the list.
Type a subject line and message for the email.
Click Save.
Trigger a notification when the enclosure is opened
This example explains how to set up an email notification when the housing or casing of the device is opened.
Add an email recipient:
Go to System > Events > Recipients and click Add recipient.
Type a name for the recipient.
Select Email as the notification type.
Type the recipient’s email address.
Type the email address that you want the camera to send notifications from.
Provide the login details for the sending email account, along with the SMTP hostname and port number.
To test your email setup, click Test.
Click Save.
Create a rule:
Go to System > Events > Rules and click Add a rule.
Type a name for the rule.
In the list of conditions, select Casing open.
In the list of actions, select Send notification to email.
Select a recipient from the list.
Type a subject line and message for the email.
Click Save.
Send an email automatically if someone spray paints the lens
Activate the tampering detection:
Go to System > Detectors > Camera tampering.
Set a value for Trigger delay. The value indicates the time that must pass before an email is sent.
Add an email recipient:
Go to System > Events > Recipients and add a recipient.
Type a name for the recipient.
Select Email.
Type an email address to send the email to.
The camera doesn’t have it’s own email server, so it has to log into another email server to send mails. Fill in the rest of the information according to your email provider.
To send a test email, click Test.
Click Save.
Create a rule:
Go to System > Events > Rules and add a rule.
Type a name for the rule.
In the list of conditions, under Video, select Tampering.
In the list of actions, under Notifications, select Send notification to email and then select the recipient from the list.
Type a subject and a message for the email.
Click Save.
Audio
Add audio to your recording
Turn on audio:
Go to Video > Stream > Audio and include audio.
If the device has more than one input source, select the correct one in Source.
Go to Audio > Device settings and turn on the correct input source.
If you make any changes to the input source, click Apply changes.
Edit the stream profile that is used for the recording:
Go to System > Stream profiles and select the stream profile.
Select Include audio and turn it on.
Click Save.
The web interface
To read about all the features and settings available in the web interface of devices with AXIS OS, go to AXIS OS web interface help.
Learn more
Color palettes
To help the human eye distinguish details in a thermal image, you can apply a color palette to the image. The colors in the palette are artificially created pseudocolors that emphasize temperature differences.
The product has several color palettes to choose from. If an operator watches the video stream, you can choose any of the palettes. If the video stream is only used by applications, select the white-hot palette.
Overlays
Overlays are superimposed over the video stream. They are used to provide extra information during recordings, such as a timestamp, or during product installation and configuration. You can add either text or an image.
The video streaming indicator is another type of overlay. It shows you that the live view video stream is live.
Streaming and storage
Video compression formats
Decide which compression method to use based on your viewing requirements, and on the properties of your network. The available options are:
Motion JPEG
Note
To ensure support for the Opus audio codec, the Motion JPEG stream is always sent over RTP.
Motion JPEG, or MJPEG, is a digital video sequence that is made up of a series of individual JPEG images. These images are then displayed and updated at a rate sufficient to create a stream that shows constantly updated motion. For the viewer to perceive motion video the rate must be at least 16 image frames per second. Full motion video is perceived at 30 (NTSC) or 25 (PAL) frames per second.
The Motion JPEG stream uses considerable amounts of bandwidth, but provides excellent image quality and access to every image contained in the stream.
H.264 or MPEG-4 Part 10/AVC
Note
H.264 is a licensed technology. The Axis product includes one H.264 viewing client license. To install additional unlicensed copies of the client is prohibited. To purchase additional licenses, contact your Axis reseller.
H.264 can, without compromising image quality, reduce the size of a digital video file by more than 80% compared to the Motion JPEG format and by as much as 50% compared to older MPEG formats. This means that less network bandwidth and storage space are required for a video file. Or seen another way, higher video quality can be achieved for a given bitrate.
H.265 or MPEG-H Part 2/HEVC
H.265 can, without compromising image quality, reduce the size of a digital video file by more than 25% compared to H.264.
Note
H.265 is licensed technology. The Axis product includes one H.265 viewing client license. Installing additional unlicensed copies of the client is prohibited. To purchase additional licenses, contact your Axis reseller.
Most web browsers don’t support H.265 decoding and because of this the camera doesn’t support it in its web interface. Instead you can use a video management system or application supporting H.265 decoding.
How do Image, Stream, and Stream profile settings relate to each other?
The Image tab contains camera settings that affect all video streams from the product. If you change something in this tab, it immediately affects all video streams and recordings.
The Stream tab contains settings for video streams. You get these settings if you request a video stream from the product and don’t specify for example resolution, or frame rate. When you change the settings in the Stream tab, it doesn’t affect ongoing streams, but it will take effect when you start a new stream.
The Stream profiles settings override the settings from the Stream tab. If you request a stream with a specific stream profile, the stream contains the settings of that profile. If you request a stream without specifying a stream profile, or request a stream profile that doesn't exist in the product, the stream contains the settings from the Stream tab.
Bitrate control
Bitrate control helps you to manage the bandwidth consumption of your video stream.
Variable bitrate (VBR) Variable bitrate allows the bandwidth consumption to vary depending on the level of activity in the scene. The more activity, the more bandwidth you need. With variable bitrate you are guaranteed constant image quality, but you need to make sure you have storage margins.
Maximum bitrate (MBR) Maximum bitrate lets you set a target bitrate to handle bitrate limitations in your system. You might see a decline in image quality or frame rate as the instantaneous bitrate is kept below the specified target bitrate. You can choose to prioritize either image quality or frame rate. We recommend that you configure the target bitrate to a higher value than the expected bitrate. This gives you a margin in case there is a high level of activity in the scene.
Target bitrate
Average bitrate (ABR) With average bitrate, the bitrate is automatically adjusted over a longer period of time. This is so you can meet the specified target and provide the best video quality based on your available storage. Bitrate is higher in scenes with a lot of activity, compared to static scenes. You are more likely to get better image quality when in scenes with a lot of activity if you use the average bitrate option. You can define the total storage required to store the video stream for a specified amount of time (retention time) when image quality is adjusted to meet the specified target bitrate. Specify the average bitrate settings in one of the following ways:
To calculate the estimated storage need, set the target bitrate and the retention time.
To calculate the average bitrate, based on available storage and required retention time, use the target bitrate calculator.
Target bitrate
Actual average bitrate
You can also turn on maximum bitrate and specify a target bitrate within the average bitrate option.
Target bitrate
Actual average bitrate
Analytics and apps
With analytics and apps you can get more out of your Axis device. AXIS Camera Application Platform (ACAP) is an open platform that makes it possible for third parties to develop analytics and other apps for Axis devices. Apps can be preinstalled on the device, available for download for free, or for a license fee.
To find the user manuals for Axis analytics and apps, go to help.axis.com.
Note
Several apps can run at the same time but some apps might not be compatible with each other. Certain combinations of apps might require too much processing power or memory resources when run in parallel. Verify that the apps work together before deployment.
AXIS Perimeter Defender
AXIS Perimeter Defender is an application for perimeter surveillance and protection. It is ideal for high-security perimeter protection where there is a need to strengthen the physical access control system with reliable intrusion detection.
AXIS Perimeter Defender is primarily designed for so-called sterile zone protection, for example along a fence marking a boundary. The term sterile zone refers to an area where people are not supposed to be.
Use AXIS Perimeter Defender in an outdoor environment to:
Detect moving persons.
Detect moving vehicles, without discriminating between vehicle types.
This camera can run the application in calibration mode, AI mode, or both modes in combination. If you choose to run it in AI mode only, camera mounting is more flexible and you don’t need to calibrate the cameras.
AXIS Perimeter Defender consists of a desktop interface (B), from where you install and set up the application on the cameras (A). You can then configure the system to send alarms to the Video Management Software (C).
AXIS Perimeter Defender PTZ Autotracking is a plugin to the AXIS Perimeter Defender application, using the same desktop interface. With the plugin, you pair a fixed visual or thermal camera with an Axis Q-line PTZ camera. You can then maintain continuous detection coverage of a scene with the fixed camera while the PTZ camera automatically tracks and gives you closer views of detected objects.
Important
AXIS Perimeter Defender PTZ Autotracking requires calibration of both fixed and PTZ cameras.
AXIS Perimeter Defender offers the following types of detection scenarios:
Intrusion: triggers an alarm when a person or a vehicle enters a zone defined on the ground (from any direction and with any trajectory).
Loitering: triggers an alarm when a person or a vehicle remains in a zone defined on the ground for more than a predefined number of seconds.
Zone-crossing: triggers an alarm when a person or a vehicle passes through two or more zones defined on the ground in a given sequence.
Conditional: triggers an alarm when a person or a vehicle enters a zone defined on the ground without first passing through another zone or zones defined on the ground.
Cybersecurity
For product-specific information about cybersecurity, see the product's datasheet at axis.com.
Axis Edge Vault provides a hardware-based cybersecurity platform that safeguards the Axis device. It offers features to guarantee the device’s identity and integrity and to protect your sensitive information from unauthorized access. It builds on a strong foundation of cryptographic computing modules (secure element and TPM) and SoC security (TEE and secure boot), combined with expertise in edge device security.
Signed OS
Signed OS is implemented by the software vendor signing the AXIS OS image with a private key. When the signature is attached to the operating system, the device will validate the software before installing it. If the device detects that the integrity of the software is compromised, the AXIS OS upgrade will be rejected.
Secure boot
Secure boot is a boot process that consists of an unbroken chain of cryptographically validated software, starting in immutable memory (boot ROM). Being based on the use of signed OS, secure boot ensures that a device can boot only with authorized software.
Secure keystore
A tamper-protected environment for the protection of private keys and secure execution of cryptographic operations. It prevents unauthorized access and malicious extraction in the event of a security breach. Depending on security requirements, an Axis device can have either one or multiple hardware-based cryptographic computing modules, which provide a hardware-protected secure keystore. Depending on security requirements, an Axis device can have either one or multiple hardware-based cryptographic computing modules, like a TPM 2.0 (Trusted Platform Module) or a secure element, and/or a TEE (Trusted Execution Environment), which provide a hardware-protected secure keystore. Furthermore, selected Axis products feature a FIPS 140-2 Level 2-certified secure keystore.
Axis device ID
Being able to verify the origin of the device is key to establishing trust in the device identity. During production, devices with Axis Edge Vault are assigned a unique, factory-provisioned, and IEEE 802.1AR-compliant Axis device ID certificate. This works like a passport to prove the origin of the device. The device ID is securely and permanently stored in the secure keystore as a certificate signed by Axis root certificate. The device ID can be leveraged by the customer’s IT infrastructure for automated secure device onboarding and secure device identification
Signed video
Signed video ensures that video evidence can be verified as untampered without proving the chain of custody of the video file. Each camera uses its unique video signing key, which is securely stored in the secure keystore, to add a signature into the video stream. When the video is played, the file player shows whether the video is intact. Signed video makes it possible to trace the video back to the camera origin and verifies that the video has not been tampered with after it left the camera.
Encrypted file system
The secure keystore prevents the malicious exfiltration of information and prevents configuration tampering by enforcing strong encryption upon the file system. This ensures no data stored in the file system can be extracted or tampered with when the device is not in use, unauthenticated access to the device is achieved and/or the Axis device is stolen. During the secure boot process, the read-write filesystem is decrypted and can be mounted and used by the Axis device.
To learn more about the cybersecurity features in Axis devices, go to axis.com/learning/white-papers and search for cybersecurity.
Axis security notification service
Axis provides a notification service with information about vulnerability and other security related matters for Axis devices. To receive notifications, you can subscribe at axis.com/security-notification-service.
Vulnerability management
To minimize customers' risk of exposure, Axis, as a Common Vulnerability and Exposures (CVE) numbering authority (CNA), follows industry standards to manage and respond to discovered vulnerabilities in our devices, software, and services. For more information about Axis vulnerability management policy, how to report vulnerabilities, already disclosed vulnerabilities, and corresponding security advisories, see axis.com/vulnerability-management.
Secure operation of Axis devices
Axis devices with factory default settings are pre-configured with secure default protection mechanisms. We recommend using more security configuration when installing the device. To learn more about Axis' approach to cybersecurity, including best practices, resources, and guidelines for securing your devices, go to axis.com/about-axis/cybersecurity.
Specifications
Product overview
Intrusion alarm magnet
Safety wire
Power connector
RS485/422 connector
I/O connector
Cable gasket M20 (2x)
Optical unit*
Front window
Weathershield
*The optical unit’s appearance can vary depending on your chosen lens alternative.
Cable cover
Network connector (PoE)
microSD card slot
Audio out
Audio in
Intrusion alarm sensor
Status LED
Control button
LED indicators
Note
The Status LED can be configured to flash while an event is active.
The LEDs turn off when you close the casing.
Status LED
Indication
Unlit
Connection and normal operation.
Green
Connection and normal operation.
Amber
Steady during startup. Flashes during device software upgrade or reset to factory default.
Amber/Red
Flashes amber/red if network connection is unavailable or lost.
Red
Device software upgrade failure.
Buzzer
Buzzer signal for leveling assistant
For information about the control button used for leveling the image, see Control button.
Buzzer
Camera position
Continuous beep
Level
Fast beep
Almost level
Medium beeps
Not level
Slow beeps
Far from level
SD card slot
NOTICE
Risk of damage to SD card. Don’t use sharp tools, metal objects, or excessive force when inserting or removing the SD card. Use your fingers to insert and remove the card.
Risk of data loss and corrupted recordings. Unmount the SD card from the device’s web interface before removing it. Don’t remove the SD card while the product is running.
This device supports microSD/microSDHC/microSDXC cards.
microSD, microSDHC, and microSDXC Logos are trademarks of SD-3C LLC. microSD, microSDHC, microSDXC are trademarks or registered trademarks of SD-3C, LLC in the United States, other countries or both.
Ensuring the camera is level. Press the button for not more than two seconds to start the leveling assistant and press again to stop. The buzzer signal (see Buzzer signal for leveling assistant) assist leveling of the camera. The camera is level when the buzzer beeps continuously.
Connectors
Network connector
RJ45 Ethernet connector with Power over Ethernet (PoE).
Audio connector
Audio in – 3.5 mm input for a digital microphone, an analog mono microphone, or a line-in mono signal (left channel is used from a stereo signal).
Audio out – 3.5 mm output for audio (line level) that can be connected to a public address (PA) system or an active speaker with a built-in amplifier. A stereo connector must be used for audio out.
Audio input
1 Tip
2 Ring
3 Sleeve
Unbalanced microphone (with or without electret power) or line-in
Electret power if selected
Ground
Digital signal
Ring power if selected
Ground
Audio output
1 Tip
2 Ring
3 Sleeve
Channel 1, unbalanced line, mono
Channel 1, unbalanced line, mono
Ground
I/O connector
Use the I/O connector with external devices in combination with, for example, motion detection, event triggering, and alarm notifications. In addition to the 0 VDC reference point and power (12 V DC output), the I/O connector provides the interface to:
Digital input
For connecting devices that can toggle between an open and closed circuit, for example PIR sensors, door/window contacts, and glass break detectors.
Supervised input
Enables possibility to detect tampering on a digital input.
Digital output
For connecting external devices such as relays and LEDs. Connected devices can be activated by the VAPIX® Application Programming Interface, through an event or from the device’s web interface.
6-pin terminal block
Function
Pin
Notes
Specifications
DC ground
1
0 VDC
DC output
2
Can be used to power auxiliary equipment. Note: This pin can only be used as power out.
12 VDC Max load = 50 mA
Configurable (Input or Output)
3–6
Digital input or Supervised input – Connect to pin 1 to activate, or leave floating (unconnected) to deactivate. To use supervised input, install end-of-line resistors. See connection diagram for information about how to connect the resistors.
0 to max 30 VDC
Digital output – Internally connected to pin 1 (DC ground) when active, and floating (unconnected) when inactive. If used with an inductive load, e.g., a relay, connect a diode in parallel with the load, to protect against voltage transients.
0 to max 30 VDC, open drain, 100 mA
Example
DC ground
DC output 12 V, max 50 mA
I/O configured as supervised input
I/O configured as output
Configurable I/O
Configurable I/O
Power connector
2-pin terminal block for DC power input. Use a Safety Extra Low Voltage (SELV) compliant limited power source (LPS) with either a rated output power limited to ≤100 W or a rated output current limited to ≤5 A.
RS485/RS422 connector
Two 2-pin terminal blocks for RS485/RS422 serial interface.
The serial port can be configured to support:
Two-wire RS485 half duplex
Four-wire RS485 full duplex
Two-wire RS422 simplex
Four-wire RS422 full duplex point to point communication
Function
Notes
RS485/RS422 TX(A)
TX pair for RS422 and 4-wire RS485
RS485/RS422 TX(B)
RS485A alt RS485/422 RX(A)
RX pair for all modes (combined RX/TX for 2-wire RS485)
RS485B alt RS485/422 RX(B)
Note
To use the camera with an AXIS T99 Positioning Unit, connect it to RS485A and RS485B (RX/TX).
PTZ drivers
APTP
This is a list of models supported by this driver. The physical installation depends on your Axis product and the PTZ unit.
Important
Check what serial communication your Axis product and the PTZ unit will support.
Supported models with RS485 2-wire interface:
AXIS T99A Positioning Unit Series.
For information about compatible Axis products, see axis.com.
Other models may be supported but this has not been verified by Axis.
Technical information
DEFAULT capabilities for PTZ driver:
Driver
APTP
Version
1.1.0
DEFAULT serial configuration:
PortMode
RS485
BaudRate
115,200
DataBits
8
StopBits
1
Parity
None
DEFAULT supported capabilities in this PTZ driver:
Note
Different PTZ units may have other capabilities (both less and more).
Movement
Absolute
Relative
Continuous
Pan
yes
yes
yes
Tilt
yes
yes
yes
Pelco
This is a list of models supported by this driver. The physical installation depends on your Axis product and the PTZ unit.
Important
Check what serial communication your Axis product and the PTZ unit will support.
Supported models:
Pelco DD5-C
Pelco Esprit ES30C/ES31C
Pelco LRD41C21
Pelco LRD41C22
Pelco Spectra III
Pelco Spectra IV
Pelco Spectra Mini
Videotec DTRX3/PTH310P
Videotec ULISSE
PTK AMB
YP3040
Other models may be supported but this has not been verified by Axis.
Technical information
DEFAULT capabilities for PTZ driver:
Driver
Pelco
Version
4.17
DEFAULT serial configuration:
PortMode
RS485
BaudRate
2,400
DataBits
8
StopBits
1
Parity
None
DEFAULT supported capabilities in this PTZ driver:
Note
Different PTZ units may have other capabilities (both less and more).
Movement
Absolute
Relative
Continuous
Pan
no
yes
yes
Tilt
no
yes
yes
Zoom
no
yes
yes
Focus
no
yes
yes
Iris
no
yes
yes
AutoIris
yes
AutoFocus
yes
IrCutFilter
no
BackLight
yes
OSDMenu
yes
Visca
This is a list of models supported by this driver. The physical installation depends on your Axis product and the PTZ unit.
Important
Check what serial communication your Axis product and the PTZ unit will support.
Supported models with RS422 4-wire interface:
Sony EVI-D70/D70P
WISKA DCP-27 (PT-head)
Supported models with RS232 interface (may require external RS422-4-wire/RS232 converter):
Axis EVI-D30/D31
Sony EVI-G20/G21
Sony EVI-D30/D31
Sony EVI-D100/D100P
Sony EVI-D70/D70P
Other models may be supported but this has not been verified by Axis.
Technical information
DEFAULT capabilities for PTZ driver:
Driver
Visca/EVI
Version
4.11
DEFAULT serial configuration:
PortMode
RS422
BaudRate
9,600
DataBits
8
StopBits
1
Parity
None
DEFAULT supported capabilities in this PTZ driver:
Note
Different PTZ units may have other capabilities (both less and more).
Movement
Absolute
Relative
Continuous
Pan
yes
yes
yes
Tilt
yes
yes
yes
Zoom
yes
yes
yes
Focus
yes
yes
yes
Iris
yes
yes
no
AutoIris
yes
AutoFocus
yes
IrCutFilter
yes
BackLight
yes
OSDMenu
no
Clean your device
You can clean your device with lukewarm water and mild, nonabrasive soap.
NOTICE
Harsh chemicals can damage the device. Don’t use chemicals such as window cleaner or acetone to clean your device.
Don’t spray detergent directly on the device. Instead, spray detergent on a nonabrasive cloth and use that to clean the device.
Avoid cleaning in direct sunlight or elevated temperatures, since this can cause stains.
Use a can of compressed air to remove dust and loose dirt from the device.
If necessary, clean the device with a soft microfiber cloth dampened with lukewarm water and mild, nonabrasive soap.
To avoid stains, dry the device with a clean, nonabrasive cloth.
Troubleshooting
Reset to factory default settings
Important
Reset to factory default should be used with caution. A reset to factory default resets all settings, including the IP address, to the factory default values.
To reset the product to the factory default settings:
Disconnect power from the product.
Press and hold the control button while reconnecting power. See Product overview.
Keep the control button pressed for 15–30 seconds until the status LED indicator flashes amber.
Release the control button. The process is complete when the status LED indicator turns green. If no DHCP server is available on the network, the device IP address will default to one of the following:
Devices with AXIS OS 12.0 and later: Obtained from the link-local address subnet (169.254.0.0/16)
Devices with AXIS OS 11.11 and earlier: 192.168.0.90/24
Use the installation and management software tools to assign an IP address, set the password, and access the device.
The installation and management software tools are available from the support pages on axis.com/support.
You can also reset parameters to factory default through the device’s web interface. Go to Maintenance > Factory default and click Default.
AXIS OS options
Axis offers device software management according to either the active track or the long-term support (LTS) tracks. Being on the active track means continuously getting access to all the latest product features, while the LTS tracks provide a fixed platform with periodic releases focused mainly on bug fixes and security updates.
Using AXIS OS from the active track is recommended if you want to access the newest features, or if you use Axis end-to-end system offerings. The LTS tracks are recommended if you use third-party integrations, which are not continuously validated against the latest active track. With LTS, the products can maintain cybersecurity without introducing any significant functional changes or affecting any existing integrations. For more detailed information about Axis device software strategy, go to axis.com/support/device-software.
Check the current AXIS OS version
AXIS OS determines the functionality of our devices. When you troubleshoot a problem, we recommend that you to start by checking the current AXIS OS version. The latest version might contain a correction that fixes your particular problem.
To check the current AXIS OS version:
Go to the device’s web interface > Status.
Under Device info, see the AXIS OS version.
Upgrade AXIS OS
Important
When you upgrade the device software, your preconfigured and customized settings are saved. Axis Communications AB can't guarantee that the settings are saved, even if the features are available in the new AXIS OS version.
Starting from AXIS OS 12.6, you must install every LTS version between your device’s current version and the target version. For example, if the currently installed device software version is AXIS OS 11.2, you have to install the LTS version AXIS OS 11.11 before you can upgrade the device to AXIS OS 12.6. For more information, see AXIS OS Portal: Upgrade path.
Make sure the device remains connected to the power source throughout the upgrade process.
Note
When you upgrade the device with the latest AXIS OS version in the active track, the product receives the latest functionality available. Always read the upgrade instructions and release notes available with each new release before you upgrade. To find the latest AXIS OS version and the release notes, go to axis.com/support/device-software.
If the upgrade fails, the device reloads the previous version. The most common reason is that the wrong AXIS OS file has been uploaded. Check that the name of the AXIS OS file corresponds to your device and try again.
Problems after AXIS OS upgrade
If you experience problems after the upgrade, roll back to the previously installed version from the Maintenance page.
Problems setting the IP address
Can’t set the IP address
If the IP address intended for the device and the IP address of the computer used to access the device are located on different subnets, you can’t set the IP address. Contact your network administrator to obtain an IP address.
The IP address could be in use by another device. To check:
Disconnect the Axis device from the network.
In a Command/DOS window, type ping and the IP address of the device.
If you receive: Reply from <IP address>: bytes=32; time=10... this means that the IP address might already be in use by another device on the network. Obtain a new IP address from the network administrator and reinstall the device.
If you receive: Request timed out, this means that the IP address is available for use with the Axis device. Check all cabling and reinstall the device.
There could be a possible IP address conflict with another device on the same subnet. The static IP address in the Axis device is used before the DHCP server sets a dynamic address. This means that if the same default static IP address is also used by another device, there could be problems accessing the device.
Problems accessing the device
Can’t log in when accessing the device from a browser
When HTTPS is enabled, make sure that you use the correct protocol (HTTP or HTTPS) when you try to log in. You might need to manually type http or https in the browser’s address field.
If you’ve lost the password for the root account, you must reset the device to the factory default settings. For instructions, see Reset to factory default settings.
The IP address has been changed by DHCP
IP addresses obtained from a DHCP server are dynamic and could change. If the IP address has been changed, use AXIS IP Utility or AXIS Device Manager to locate the device on the network. Identify the device using its model or serial number, or by the DNS name (if the name has been configured).
If required, you can assign a static IP address manually. For instructions, go to axis.com/support.
Certificate error when using IEEE 802.1X
For authentication to work properly, the date and time settings in the Axis device must be synchronized with an NTP server. Go to System > Date and time.
To access the device externally, we recommend you to use one of the following applications for Windows®:
AXIS Camera Station Edge: free of charge, ideal for small systems with basic surveillance needs.
AXIS Camera Station Pro: 90-day trial version free of charge, ideal for small to mid-size systems.
For instructions and download, go to axis.com/vms.
Problems with streaming
Multicast H.264 only accessible by local clients
Check if your router supports multicasting, or if you need to configure the router settings between the client and the device. You might need to increase the TTL (Time To Live) value.
No multicast H.264 displayed in the client
Check with your network administrator that the multicast addresses used by the Axis device are valid for your network.
Check with your network administrator to see if there is a firewall that prevents viewing.
Poor rendering of H.264 images
Ensure that your graphics card uses the latest driver. You can usually download the latest drivers from the manufacturer’s website.
Problems with MQTT
Can’t connect over port 8883 with MQTT over SSL
The firewall blocks traffic that uses port 8883 since it’s regarded insecure.
In some cases the server/broker might not provide a specific port for MQTT communication. It might still be possible to use MQTT over a port normally used for HTTP/HTTPS traffic.
If the server/broker supports WebSocket/WebSocket Secure (WS/WSS), typically on port 443, use this protocol instead. Check with the server/broker provider to see if WS/WSS is supported and which port and basepath to use.
If the server/broker supports ALPN, the use of MQTT can be negotiated over an open port, such as 443. Check with your server/broker provider to see if ALPN is supported and which ALPN protocol and port to use.
Problems with operating the device
Front heater and wiper aren’t working
If the front heater or wiper are not turning on, confirm that the top cover is properly fastened to the bottom of the housing unit.
If you can’t find what you’re looking for here, try the troubleshooting section at axis.com/support.
Performance considerations
When you set up your system, it’s important to consider how different settings and situations affect performance. Some factors affect bandwidth (bitrate), others affect frame rate, and some affect both.
The most important factors to consider:
High image resolution or lower compression levels result in images containing more data which in turn affects the bandwidth.
Rotating the image in the GUI can increase the product's CPU load.
Access by large numbers of Motion JPEG clients or unicast H.264/H.265/AV1 clients affects the bandwidth.
Simultaneous viewing of different streams (resolution, compression) by different clients affects both frame rate and bandwidth.
Use identical streams wherever possible to maintain a high frame rate. Stream profiles can be used to ensure that streams are identical.
Accessing video streams with different codecs simultaneously affects both frame rate and bandwidth. For optimal performance, use streams with the same codec.
Heavy usage of event settings affects the product’s CPU load which in turn affects the frame rate.
Using HTTPS may reduce frame rate, in particular if streaming Motion JPEG.
Heavy network utilization due to poor infrastructure affects the bandwidth.
Viewing on poorly performing client computers lowers perceived performance and affects frame rate.
Running multiple AXIS Camera Application Platform (ACAP) applications simultaneously may affect the frame rate and the general performance.
Using palettes affects the product’s CPU load which in turn affects the frame rate.