EasyManua.ls Logo

HIKVISION iDS-9664NXI-I8/16S User Manual

HIKVISION iDS-9664NXI-I8/16S
213 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Network Video Recorder
User Manual

Table of Contents

Other manuals for HIKVISION iDS-9664NXI-I8/16S

Question and Answer IconNeed help?

Do you have a question about the HIKVISION iDS-9664NXI-I8/16S and is the answer not in the manual?

HIKVISION iDS-9664NXI-I8/16S Specifications

General IconGeneral
ModeliDS-9664NXI-I8/16S
Video Input Channels64
Video CompressionH.265+/H.265/H.264+/H.264
Recording ResolutionUp to 12MP
Alarm In/Out16/4
Operating Humidity10% to 90% (non-condensing)
TypeNetwork Video Recorder
Max Resolution12MP
Decoding Capability64-ch@1080p (30 fps)
Audio Output1-ch (RCA)
Video OutputHDMI, VGA
HDMI Output Resolution4K (3840 × 2160)/30Hz
VGA Output Resolution1920x1080
HDD Slots8
HDD CapacityUp to 16TB for each HDD
Network Interface2x 10/100/1000 Mbps Ethernet
USB Interface2 × USB 3.0
Power Supply100-240 VAC, 50/60 Hz
Power Consumption (without HDD)≤ 45 W
Operating Temperature-10°C to +55°C
Dimensions (W × D × H)440 × 440 × 88 mm
Weight (without HDD)≤ 8 kg (17.6 lb)

Summary

Safety Instruction

General Safety Guidelines

Provides essential safety guidelines for device operation and maintenance.

Preventive and Cautionary Tips

Chapter 1 Basic Operation

1.1 Activate Your Device

Guides on activating the device using different methods.

1.2 Configure TCP/IP

Explains how to configure network settings for TCP/IP.

1.3 Configure HDD

Details the process of configuring Hard Disk Drives (HDDs).

1.4 Add Network Camera

Instructions for adding network cameras to the system.

Chapter 2 Camera Settings

Chapter 3 Live View

3.1 Start Live View

How to begin viewing live camera feeds.

3.2 Configure Live View Settings

Customizing live view parameters like output interface and dwell time.

3.4 Configure Live View Layout

Arranging camera feeds in custom layouts for live view.

3.11 Facial Recognition

Accessing real-time facial recognition and stranger recognition results.

3.12 PTZ Control

Controlling Pan, Tilt, and Zoom (PTZ) functions of cameras.

Chapter 4 Recording and Playback

4.1 Recording

Configuring video recording parameters and schedules.

4.2 Playback

Methods for playing back recorded video files.

4.3 Playback Operations

Performing various operations during video playback.

Chapter 5 Picture Capture

Chapter 6 Event

6.1 Normal Event Alarm

Configuring standard event alarms like motion and video loss.

6.2 VCA Event Alarm

Handling Video Content Analysis (VCA) events from cameras.

6.2.1 Temperature Screening

Processing temperature measurement results from thermography cameras.

6.2.5 People Gathering Detection

Detecting density of human bodies exceeding a set value.

6.2.8 Unattended Baggage Detection

Detecting objects left unattended in a region.

6.2.9 Object Removal Detection

Detecting objects removed from a predefined region.

6.2.14 Thermal Camera Detection

Detecting events like fire, smoke, or temperature from thermal cameras.

6.3 Configure Arming Schedule

Setting time periods for event detection to be active.

6.4 Configure Linkage Actions

Configuring actions to be taken when an alarm or exception occurs.

Chapter 7 Smart Analysis

7.1 Engine Configuration

Configuring VCA (Video Content Analysis) engines for working modes.

7.2 Task Configuration

Managing and enabling smart analysis tasks for cameras.

7.3 Face Picture Comparison

Configuring face comparison alarms and capture based on recognition.

7.3.1 Face Grading Configuration

Selecting face pictures based on pupil distance, tilt, and pan angles.

7.3.2 Face Capture

Capturing faces appearing in the surveillance scene.

7.3.3 Face Picture Library Management

Storing and managing face pictures for comparison.

7.3.4 Face Picture Comparison Alarm

Triggering alarms when detected faces match library entries.

7.3.5 People Frequency Alarm

Triggering alarms for individuals appearing at high or low frequencies.

7.4 Perimeter Protection

Setting up perimeter protection features like line crossing detection.

7.4.1 Line Crossing Detection

Detecting objects crossing a set virtual line.

7.4.2 Intrusion Detection

Detecting objects entering and loitering in a predefined virtual region.

7.4.3 Region Entrance Detection

Detecting objects entering a predefined virtual region.

7.4.4 Region Exiting Detection

Detecting objects exiting a predefined virtual region.

7.5 Human Body Detection

Detecting and capturing human bodies in the monitoring scene.

7.5.1 Human Body Detection

Detecting human bodies and capturing their pictures.

7.5.2 Human Body Search

Searching for human body pictures by detection alarms or appearance.

7.6 Multi-Target-Type Detection

Detecting faces, human bodies, and vehicles simultaneously.

7.7 Vehicle Detection

Detecting vehicles for road traffic monitoring.

7.7.1 Configure Vehicle Detection

Setting up vehicle detection rules and lane configurations.

7.8 Throwing Objects from Building

Identifying events of objects being thrown from buildings.

7.9 Target Detection

Achieving smart, facial, vehicle, and human body detection.

7.10 People Counting

Counting people entering or leaving configured areas.

7.3.6 Face Picture Search

Searching for face pictures by comparison events or uploaded images.

Chapter 8 IoT

8.1 Add an IoT Device

Adding Internet of Things (IoT) devices like access control and alarms.

Chapter 9 File Management

9.1 Search Files

Specifying conditions to search for videos and pictures.

9.4 Smart Search

Searching human body, face, and vehicle files.

Chapter 10 Storage

10.1 Storage Device Management

Managing storage devices like SSDs and HDDs.

10.1.1 SSD Management

Initializing and managing Solid State Drives (SSDs).

10.1.2 Manage Local HDD

Configuring HDD groups and properties.

10.2 Disk Array

Creating and managing disk arrays (RAID).

10.2.1 Create a Disk Array

Creating disk arrays using one-touch or manual configuration.

Chapter 11 Hot Spare Device Backup

Chapter 12 Network Settings

12.1 Configure DDNS

Setting up Dynamic DNS service for network access.

12.3 Configure Port Mapping (NAT)

Setting up port mapping (NAT) for remote access.

Chapter 14 User Management and Security

14.1 Manage User Accounts

Managing user accounts, permissions, and MAC addresses.

14.2 Manage User Permissions

Assigning local and remote operating permissions to users.

14.1.1 Add a User

Steps to add new user accounts with specified levels and permissions.

14.2.1 Set User Permissions

Assigning specific operating permissions to user accounts.

14.3 Configure Password Security

Setting up security questions and GUID files for password recovery.

14.4 Reset Password

Procedures for resetting forgotten passwords.

14.4.1 Reset Password by GUID

Resetting the password using a GUID file.

14.4.2 Reset Password by Security Questions

Resetting the password by answering security questions.

14.4.3 Reset Password by Reserved Email

Resetting the password using a reserved email address.

14.4.4 Reset Password by Hik-Connect

Resetting the password using the Hik-Connect app.

Chapter 15 System Management

15.6 Storage Device Maintenance

Performing maintenance on storage devices.

Related product manuals