This website requires cookies to provide all of its features. For more information on what data is contained in the cookies, please see our Privacy Policy page. To accept cookies from this site, please click the Allow button below.

GD-CI-BP4637V

5 MP Fixed Dome IP-Camera 2.8~12mm Motorized

  • 5 Megapixel IP Camera with real time video streaming
  • 0 Lux: Integrated LED IR Illuminator viewable distance up to 40m
  • H.265/H.265+, H.264/H.264+ & MJPEG compression modes
  • Motorized Varifocal Lens: f = 2.8 - 12 mm
  • Reduction of unwanted alarms (false alarms) by classifying target objects using deep learning algorithms. This significantly reduces false alarms generated by objects other than people or vehicles, thus greatly improving the efficiency and effectiveness of alarms
  • Ultra Low Light CMOS Sensor, Smart-IR Control
Image Sensor 1/2.7” progressive Scan CMOS
Video Resolution 2592 x 1944
Sensitivity Colour 0.003 Lux @F1.2 Shutter speed: 1/50s (AGC ON)
Sensitivity B/W 0 Lux LED IR on
Shutter Speed 1/3 ~ 1/100,000 s (Automated Electronic Shutter)
Slow Shutter Support
Lens Focal Length 2.8 ~ 12 mm motorized, autofocus
Horizontal Viewing Angle 108° (Wide) ~ 30° (Tele)
Lens Mount Ø14
Max. IR Distance Up to 40 m
Wavelength 850nm
Wide Dynamic Range 120 dB
Image Enhancement BLC, 3D DNR, HLC, AWB, AGC, AES
Image settings Rotate mode, Saturation, Brightness, Contrast, Sharpness and white balance adjustable by client software or web browser
Day/Night Switch Support auto, scheduled, day, night, triggered by alarm in
Audio Compression G722.1/G711ulaw/G711alaw/G726/MP2L2/PCM/MP3
Audio bit rate 64Kbps(G.711)/16Kbps(G.722.1)/16Kbps(G.726)/32-196Kbps(MP2L2)
Environment Noise Filtering yes
Functions One-key reset, anti-flicker, three streams, heartbeat, mirror, password protection, privacy mask, watermark, IP-address filter
Video Compression Main Stream: H.264, H.264+, H.265, H.265+ Sub-Stream: H.264, H.265, MJPEG Third Stream: H.264, H.265
Region of Interest 3 fixed region for each stream
H.264 code profile Baseline Profile / Main Profile / High Profile
Bit Rate 32Kbps ~ 8Mbps
SD memory Micro SD/SDHC/SDXC card slot with ANR (up to 256G), NAS (Support NFS, SMB/CIFS)
Network Protocol TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, NTP, UPnP, SMTP, IGMP, 802.1X, QoS, IPv6, Bonjour, UDP, PPPoE, SNMP
Cyber Security 3 levels of user management: admin, operator, user, AES Encryption for Password Protection, Complicated Password, HTTPS (SSL) Login Authentication, Basic and digest authentication for HTTP/HTTPS, 802.1X authentication , (EAP-LEAP), 802.1X authentication (EAP-TLS), 802.1X authentication (EAP-MD5), Watermark, IP Adress Filter, WSSE and digest authentication for ONVIF, Control timeout settings, Security audit log, SNMP V2 , SNMP V3, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.2 with updated cipher suites including AES 256 encryption., Brute Force Delay Protection, Signed Firmware, Secure Boot by hardware check
Number of Clients Up to 32 simultaneously
Users 3 Levels: Administrator, Operator and User
Frame Rate Main Stream 50Hz: 20 fps (2592 × 1944) , 25fps (2688 x 1520, 2304 × 1296, 1920 × 1080, 1280 × 720) 60Hz: 20 fps (2944 × 1656) , 30fps (2688 x 1520, 2304 × 1296, 1920 × 1080, 1280 × 720) Sub- Stream 50Hz: 25fps (640 x 480, 640 × 360, 320 × 240) 60Hz: 30fps (640 x 480, 640 × 360, 320 × 240) Third Stream 50Hz: 25 fps (1280 x 720, 640 x 480, 640 x 360, 360 x 240) 60Hz: 30fps (1280 x 720, 640 x 480, 640x360, 360x240)
Network Interface 1x 10, 100 Base T, TX PoE+ (RJ-45)
Motion Detection Off, ON (Normal), Expert mode: 8 user-defined rectangular zones, by schedule
Tamper protection Scene change and defocus
Intelligent Video Analytics Detection of intrusion, line crossing, region entrance, region exit, objects left over, objects removed, human body, face, and vehicle. Video tampering detection such as defocus, change of the scene and sudden audio increase or decrease.
Intrusion Detection Enter and loiter in a pre-defined virtual region
Line Crossing Detection Cross a pre-defined virtual line
Region Entrance Enter a pre-defined virtual region from the outside place
Region Exiting Exit from a pre-defined virtual region
Event Source Video tampering, network disconnected, IP address conflicted, HDD full, HDD error, illegal login, motion detection
Event Action Recording: Pre-event, post-event memory card and/or network storage. Picture upload: FTP, HTTP and NAS. Trigger E-mail notification: HTTP, ISAPI. Audio alarm, white light alarm, alarm output and notification to C-WERK VMS. Events are depending on schedule settings.
Audio detection Sudden audio increase, decrease
Alarm Input/Output 1 input, 1 output (up to 24 VDC 500 mA)
Audio Input/Output 1-ch audio input and 1-ch audio output
Regulation CE, EAC, FCC, RoHS Compliant
Protection Rating IP66, IK10
Standard ONVIF (Profile S, Profile G, Profile T), ISAPI, SDK
Operating Temperature -30 °C ~ 60 °C (-22 °F ~ 140 °F)
Humidity less than 95%, non condensing
Supply Voltage 12 VDC,  PoE  (802.3af)
Power Consumption Max. 11 W
Mount Pan: 0° to 355°, tilt: 0° to 75°, rotation: 0° to 355°
Dimensions Ø 153.5 × 133.1 mm (Ø 6.0 × 5.2 inch)
Weight 830 g (1.8 lb)
Limitation of Liability / Legal Disclaimer       

English                         
 
_________________________________________________________________________________ 

 
Abetechs GmbH (Grundig Security) undertakes all reasonable efforts to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Abetechs GmbH (Grundig Security) reserves the right to change the contents of this document without prior notice. Design and specifications are subject to change without prior notice. 
The product described herein, with its hardware, software and documentation is provided “as is”, without any warranty, expressed or implies, including without limitation, merchantability, satisfactory quality, fitness for a particular purpose, and non-infringement of a third party.  
In no event will our company and its employees or agents be liable to you for any special, consequential, incidental, or indirect damages, including among others, damages for loss of business profits, business interruption, or loss of data or documentation, in connection with the use of this product, even if our company has been advised of the possibility of such damages.  

Regarding to products with internet access, the use of the product shall be wholly at your own risks. Our company shall not take any responsibilities for abnormal operation, privacy leakage or other damages resulting from cyberattack, hacker attack, virus inspection, or other internet security risks; however, our company will provide timely technical support if required. Surveillance laws vary by jurisdiction before using this product in order to ensure that your use conforms to the applicable law. Our company shall not be liable in the event that this product is used with illegitimate purposes. 
In the event of any conflicts between this manual and the applicable law, the later prevails. 
 
Trademark: 

Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of their respective company. 
Copyright of this document is reserved. This document shall not be reproduced, distributed or changed, partially or wholly, without formal authorization. 
 
OPEN SOURCE SOFTWARE LICENSE INFORMATION 

The software components provided with Grundig products may contain copyrighted software that is licensed under various open source software licenses. For detailed information about the contained open source software 
2018-10-18-V2-EN  © Abetechs GmbH 
packages, the used package versions, license information and complete license terms, please refer to the product detail pages on our website. The complete open source software license information is also included in firmware files of affected products. Please also check your product’s CD-ROM and manuals for additional information. 
You may obtain the complete corresponding open source part of a specific product from us for a period of three years after our last shipment of this product by sending an email to: info@grundig-security.com 
Agree
Disagree