2 MP Box- IP-Camera
- H.265, H.264 & MJPEG compression modes
- Built in analytics function: Detection of line crossing, intrusion, region entrance, region exit, object removal, unattended baggage, face and scene change included
- Various streams from one camera can be used for recording and display. The benefits here enable, for example, keeping the data rate significantly lower with multiple-image displays
- Automatic Back-Focus adjustment: simplifies the lens setup
- Audio Communication & Alarm Input / Output
- 2 Megapixel IP Camera with Full HD 1080P real time video streaming
|1/4" Progressive Scan CMOS||1/1.8" Progressive Scan CMOS|
|Main Stream 50Hz: 25fps @ (1280 720) , 60Hz: 30fps @ (1280 720) Sub- Stream 50Hz: 25fps @ (640 480, 352 288, 320 240) , 60Hz: 30fps @ (640 480, 352 240, 320 240)||Main Stream: 50Hz: 50fps (1920 1080, 1280 960, 1280720) 60Hz: 60fps (1920 1080, 1280 960, 1280720) Sub Stream: 50Hz: 25fps (640 480, 640 360, 320 240) 60Hz: 30fps (640 480, 640 360, 320 240) Third Stream: 50Hz: 25fps (1920 1080, 1280720, 640 360, 352 288) 60Hz: 30fps (1920 1080, 1280720, 640 360, 352 240)|
|1280 x 720||1920 x 1080|
|0.01 Lux @ F1.2 (AGC ON)||0.002 Lux @ F1.2 (AGC ON) , 0.0027 Lux @ F1.4 (AGC ON)|
|0 Lux LED IR on||0.0002 Lux @ F1.2 (AGC ON)|
|1/25 (1/30) ~ 1/50, 000 sec||1 ~ 1/100, 000 sec|
|M12||C, CS mount with adaptor|
|Lens Drive Type||Auto Iris (DC) , Manual iris, P-Iris|
|Focus Adjustment||Auto back focus|
|On, Off, Auto, IR-cut filter removable (ICR)||On, Off, Auto, IR-cut filter removable (ICR)|
|72 db (Digital Wide Dynamic Range) Off, Low, Middle, High||120 dB|
|One-key reset, anti-flicker, heartbeat, mirror, password protection, privacy mask, watermark, Ip-address filter||One-key reset, anti-flicker, heartbeat, mirror, password protection, privacy mask, watermark, Ip-address filter|
|BLC, 3D DNR||BLC, 3D DNR, Defog, EIS, HLC|
|Saturation, brightness, contrast and sharpness adjustable through client software or web browser||Rotate mode, Saturation, Brightness, Contrast, Sharpness adjustable by client software or web browser|
|Support auto, scheduled||Support auto, scheduled, day, night, triggered by alarm in|
|Main stream: H.264+ , H.264Sub stream: H.264, MJPEG||Main Stream: H.265+, H.265, H.264+, H.264 Sub-Stream: H.265, H.264, MJPEG Third Stream: H.265, H.264, MJPEG|
|Support 1 fixed region||Support four fixed region for each stream, and dynamic face tracking|
|Baseline Profile / Main Profile||Baseline Profile / Main Profile / High Profile|
|32Kbps ~ 2Mbps||32Kbps ~ 16Mbps|
|Audio Compression||G.726, G.711 a, u, MP2L2, PCM, G.722.1|
|Audio bit rate||64Kbps(G.711)/16Kbps(G.722.1)/16Kbps(G.726)/32-160Kbps(MP2L2)|
|SD memory||supports up to 128 GB capacity of SD, SDHC, SDXC memory|
|1x 10, 100 Base T, TX PoE+ (RJ-45)||1x 10, 100, 1000 Base T, TX (RJ-45)|
|Video Outputs||1 Test Monitor output (CVBS, 1 Vpp). Adapter cable with female BNC connector included.|
|Alarm Input/Output||1 input, 1 output (up to 24 VDC 1 A or 110 VAC 500mA )|
|Environment Noise Filtering||yes|
|Audio Input/Output||1 Inputs: line in, or mic in (built-in microphone), 1 Output: line out, mono sound|
|Line Crossing Detection||Cross a pre-defined virtual line, up to 4 pre-defined virtual lines supported|
|Motion Detection||Enter and loiter in a pre-defined virtual region, up to 4 pre-defined virtual regions supported|
|Region Entrance||Enter a pre-defined virtual region from the outside place|
|Region Exiting||Exit from a pre-defined virtual region|
|Unattended Baggage||Objects left over in the pre-defined region such as the baggage, purse, dangerous materials|
|Object Removal||Objects removed from the pre-defined region, such as the exhibits on display|
|Face Detection||Human face appears in the image can be detected and trigger linkage method|
|CE, EAC, FCC, RoHS Compliant||CE, EAC, FCC, RoHS Compliant|
|ONVIF (Profile S, Profile G), CGI, ISAPI||ONVIF (Profile S, Profile G), CGI, ISAPI|
|Serial Interface(s)||1x RS485 half duplex|
|-40 °C ~ 60 °C (-40 °F ~ 140 °F)||-30 °C ~ +60 °C (-22 °F ~ 140 °F)|
|less than 95%, non condensing||less than 95%, non condensing|
|63 67 135.9 mm (2.48" 2.64" 5.35")||69.2 57.3 148.7 mm (2.7 2.3 5.85 inch)|
|12 VDC, PoE (IEEE 802.3af)||12 VDC, 24 VAC, PoE (IEEE 802.3af)|
|Max. 4 W||Max. 6 W|
|500 g (1.1 lb)||870 g (1.92 lb)|
|Video tampering, network disconnected, IP address conflicted||Video tampering, network disconnected, IP address conflicted, HDD full, HDD error, illegal login, motion detection|
|Intelligent Video Analytics||Detection of intrusion, line crossing, region entrance, region extit, objects left over, objects removed, human faces and audio alarm. Video tampering detection such as defocus and change of the scene.|
|TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, NTP, UPnP, SMTP, IGMP, 802.1X, QoS, IPv6, UDP, Bonjour||TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, NTP, UPnP, SMTP, IGMP, 802.1X, QoS, IPv6, Bonjour, UDP, PPPoE, SNMP|
|Tamper protection||Detection of scene change, defocus, sudden audio increase/decrease or audio loss.|
Abetechs GmbH (Grundig Security) undertakes all reasonable efforts to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Abetechs GmbH (Grundig Security) reserves the right to change the contents of this document without prior notice. Design and specifications are subject to change without prior notice.
The product described herein, with its hardware, software and documentation is provided “as is”, without any warranty, expressed or implies, including without limitation, merchantability, satisfactory quality, fitness for a particular purpose, and non-infringement of a third party.
In no event will our company and its employees or agents be liable to you for any special, consequential, incidental, or indirect damages, including among others, damages for loss of business profits, business interruption, or loss of data or documentation, in connection with the use of this product, even if our company has been advised of the possibility of such damages.
Regarding to products with internet access, the use of the product shall be wholly at your own risks. Our company shall not take any responsibilities for abnormal operation, privacy leakage or other damages resulting from cyberattack, hacker attack, virus inspection, or other internet security risks; however, our company will provide timely technical support if required. Surveillance laws vary by jurisdiction before using this product in order to ensure that your use conforms to the applicable law. Our company shall not be liable in the event that this product is used with illegitimate purposes.
In the event of any conflicts between this manual and the applicable law, the later prevails.
Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of their respective company.
Copyright of this document is reserved. This document shall not be reproduced, distributed or changed, partially or wholly, without formal authorization.
OPEN SOURCE SOFTWARE LICENSE INFORMATION
The software components provided with Grundig products may contain copyrighted software that is licensed under various open source software licenses. For detailed information about the contained open source software
2018-10-18-V2-EN © Abetechs GmbH
packages, the used package versions, license information and complete license terms, please refer to the product detail pages on our website. The complete open source software license information is also included in firmware files of affected products. Please also check your product’s CD-ROM and manuals for additional information.
You may obtain the complete corresponding open source part of a specific product from us for a period of three years after our last shipment of this product by sending an email to: firstname.lastname@example.org