EasyManua.ls Logo

BCS Line User Manual

BCS Line
329 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Copyright © NSS Sp. z o.o. Copyright © NSS Sp. z o.o. V4.5.1
NETWORK VIDEO RECORDER BCS LINE
User‘s Manual
EN
www.bcs.pl
NSS Sp. z o.o. ul. Modularna 11 (Hala IV), 02-238 Warszawa
tel. +48 22 846 25 31, fax. +48 22 846 23 31 wew.140
e-mail: info@bcscctv.pl, NIP: 521-312-46-74

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the BCS Line and is the answer not in the manual?

BCS Line Specifications

General IconGeneral
BrandBCS
ModelLine
CategoryDVR
LanguageEnglish

Summary

Safety and Important Warnings

Operating Requirement

Specifies the necessary conditions for installing and operating the device, including environmental and placement guidelines.

Power Requirement

Details requirements for power supply, battery usage, and electrical connections to ensure safe operation and prevent damage.

1 Local Basic Operation

1.1 Getting Started

Introduces device initial settings like boot up, initialization, password reset, and quick settings.

1.2 Camera

Covers camera connection, IP address changes, H.265 auto-switching, IP export/import, and remote initialization.

1.6 Playback and Search

Explains how to search and play back recorded files using various search types and playback controls.

1.7 AI

Details Artificial Intelligence features including AI Search, Face Detection, Face Recognition, IVS, and various analytics.

1.8 Event Manager

1.8.1 Alarm Info

Allows searching, viewing, and backing up alarm information by event type, time, and search criteria.

1.8.5 Video Detection

Covers video analysis techniques like motion detection, video loss, tampering, scene change, and PIR alarms.

1.10 Operation and Maintenance

1.10.1 Log

Enables viewing, searching, and backing up system logs for troubleshooting and audit purposes.

1.10.4 Maintenance and Management

Covers device maintenance tasks like auto-reboot, exporting/importing settings, and system updates.

1.11 Network

1.11.1 TCP/IP

Configuration of network parameters like IP address, subnet mask, default gateway, and DNS settings.

1.11.9 UPnP

Enables automatic port mapping between LAN and WAN for device access via IP address.

1.14 Security

1.14.1 Security Status

Provides a comprehensive view of device security status, scanning user, service, and module status.

1.14.3 Attack Defense

Includes firewall, account lockout, and anti-DoS attack features to strengthen device security against threats.

1.15 Account

1.15.1 User

Manages user accounts, including adding, modifying passwords, and setting permissions for system access.

1.15.3 Reset Password

Allows resetting the admin account password using security questions and answers for account recovery.

1.16 Output and Display

1.16.1 Display

Configures display settings like time title, channel title, image transparency, and resolution for the output.

1.16.2 Tour

Allows configuring a tour of selected channels to repeat playing videos in sequence with customizable display intervals.

1.17 Audio

1.17.1 File Management

Enables adding, listening, renaming, and deleting audio files, and configuring audio volume settings.

1.17.2 Audio Play

Configures settings to play audio files during defined time periods, with options for interval and loop settings.

2 Web Operation

2.1 Network Connection

Details how to connect the device to the network and configure PC/device IP settings.

2.2 Web Login

Guides users through accessing the device's web interface using its IP address and default credentials.

3 Glossary

DHCP

Network protocol for assigning temporary IP addresses to computers on a network.

Wi-Fi

Wireless networking technology using radio waves for high-speed internet and network connections.

4 FAQ

NVR cannot boot up properly.

Lists common issues and solutions for NVR boot-up problems, including power, connection, and hardware errors.

I cannot search local records.

Addresses problems with searching local records, such as HDD issues, software compatibility, or overwritten files.

Appendix 1 Cybersecurity Recommendations

1. Use Strong Passwords

Provides suggestions for creating strong, secure passwords to protect device access and data.

2. Update Firmware and Client Software in Time

Recommends keeping equipment firmware and client software up-to-date for the latest security patches and fixes.