This website requires cookies to provide all of its features. For more information on what data is contained in the cookies, please see our Privacy Policy page. To accept cookies from this site, please click the Allow button below.

GD-CI-BT2505B

2 MP Box- IP-Camera

  • H.265/H.265+, H.264/H.264+ & MJPEG compression modes
  • Built in analytics function: Detection of line crossing, intrusion, region entrance, region exit, object removal, unattended baggage, face and scene change included
  • Various streams from one camera can be used for recording and display. The benefits here enable, for example, keeping the data rate significantly lower with multiple-image displays
  • Automatic Back-Focus adjustment: simplifies the lens setup
  • Audio Communication & Alarm Input / Output
  • 2 Megapixel IP Camera with Full HD 1080P real time video streaming
  • Built-in microphone
Measuring range empty
Image Sensor 1/1.8" progressive Scan CMOS
Video Resolution 1920 x 1080
Sensitivity Colour 0.002 Lux @ F1.2 (AGC ON)
Sensitivity B/W 0.0002 Lux @ F1.2 (AGC ON)
Shutter Speed 1 ~ 1/100,000 s
Slow Shutter Support
Lens Mount C, CS mount with adaptor
Lens Drive Type Auto Iris (DC) , Manual iris, P-Iris
Focus Adjustment Auto back focus
Col/B&W On, Off, Auto, IR-cut filter removable (ICR)
Wide Dynamic Range 120 dB
Image Enhancement BLC, 3D DNR, Defog, EIS, HLC
Image settings Rotate mode, Saturation, Brightness, Contrast, Sharpness and white balance adjustable by client software or web browser
Day/Night Switch Support auto, scheduled, day, night, triggered by alarm in
Audio Compression G.726, G.711 a, u, MP2L2, PCM, G.722.1
Audio bit rate 64Kbps(G.711)/16Kbps(G.722.1)/16Kbps(G.726)/32-160Kbps(MP2L2)
Environment Noise Filtering yes
Functions One-key reset, anti-flicker, heartbeat, mirror, password protection, privacy mask, watermark, Ip-address filter
Video Compression Main Stream: H.264, H.264+, H.265, H.265+ Sub-Stream: H.264, H.265, MJPEG Third Stream: H.264, H.265, MJPEG
Region of Interest Support four fixed region for each stream, and dynamic face tracking
H.264 code profile Baseline Profile / Main Profile / High Profile
Bit Rate 32Kbps ~ 16Mbps
SD memory Micro SD/SDHC/SDXC card slot with ANR (up to 128G), NAS (Support NFS, SMB/CIFS)
Network Protocol TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, NTP, UPnP, SMTP, IGMP, 802.1X, QoS, IPv6, UDP, Bonjour, SSH
Cyber Security Password protection, complicated password, HTTPS encryption, 802.1X authentication (EAP-TLS, EAP-LEAP, EAP-MD5), watermark, IP address filter, basic and digest authentication for HTTP/HTTPS, WSSE and digest authentication for ONVIF, SNMP V2 and V3
Reset Button yes
Frame Rate Main Stream 50Hz: 25fps (1920 × 1080, 1280 × 960, 1280 × 720) 60Hz: 30fps (1920 × 1080, 1280 × 960, 1280 × 720) Sub Stream 50Hz: 25fps (640 × 480, 640x360, 320x240) 60Hz: 30fps (640 × 480, 640 × 360, 320x240) Third Stream 50Hz: 25fps (1920 × 1080, 1280x960, 1280 × 720, 704x576,640x480,640x360, 352 × 288, 320x240) 60Hz: 30fps (1920 × 1080,1280x960, 1280 × 720,704x480, 640x480, 640x360, 352x240, 320x240)
Network Interface 1x 10, 100, 1000 Base T, TX (RJ-45)
Video Outputs 1 Vpp, BNC
Alarm Input/Output 1 input, 1 output (up to 24 VDC 1 A or 110 VAC 500mA )
Audio Input/Output 1 Inputs: line in, or mic in (built-in microphone), 1 Output: line out, mono sound
Serial Interface(s) 1x RS485 half duplex
Line Crossing Detection Cross a pre-defined virtual line, up to 4 pre-defined virtual lines supported
Intrusion Detection Enter and loiter in a pre-defined virtual region, up to 4 pre-defined virtual regions supported
Region Entrance Enter a pre-defined virtual region from the outside place
Region Exiting Exit from a pre-defined virtual region
Unattended Baggage Objects left over in the pre-defined region such as the baggage, purse, dangerous materials
Object Removal Objects removed from the pre-defined region, such as the exhibits on display
Face Detection Human face appears in the image can be detected and trigger linkage method
Event Action Send E-mail, trigger alarm output, notify surveillance C-WERK, upload to FTP/NAS, trigger SD-card recording and/or image capture.
Event Source Video tampering, network disconnected, IP address conflicted, HDD full, HDD error, illegal login, motion detection
Intelligent Video Analytics Detection of intrusion, line crossing, region entrance, region extit, objects left over, objects removed, human faces and audio alarm. Video tampering detection such as defocus and change of the scene.
Tamper protection Detection of scene change, defocus, sudden audio increase/decrease or audio loss.
Regulation CE, EAC, FCC, RoHS Compliant
Standard ONVIF (Profile S, Profile G), PSIA, CGI, ISAPI
Operating Temperature -30 °C ~ 60 °C (-22 °F ~ 140 °F)
Humidity less than 95%, non condensing
Supply Voltage 12 VDC, 24 VAC, PoE (IEEE 802.3af)
Power Consumption Max. 6 W
Dimensions 69.2 × 57.3 × 148.7 mm (2.7 × 2.3 × 5.85 inch)
Weight 870 g (1.92 lb)
Limitation of Liability / Legal Disclaimer       

English                         
 
_________________________________________________________________________________ 

 
Abetechs GmbH (Grundig Security) undertakes all reasonable efforts to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Abetechs GmbH (Grundig Security) reserves the right to change the contents of this document without prior notice. Design and specifications are subject to change without prior notice. 
The product described herein, with its hardware, software and documentation is provided “as is”, without any warranty, expressed or implies, including without limitation, merchantability, satisfactory quality, fitness for a particular purpose, and non-infringement of a third party.  
In no event will our company and its employees or agents be liable to you for any special, consequential, incidental, or indirect damages, including among others, damages for loss of business profits, business interruption, or loss of data or documentation, in connection with the use of this product, even if our company has been advised of the possibility of such damages.  

Regarding to products with internet access, the use of the product shall be wholly at your own risks. Our company shall not take any responsibilities for abnormal operation, privacy leakage or other damages resulting from cyberattack, hacker attack, virus inspection, or other internet security risks; however, our company will provide timely technical support if required. Surveillance laws vary by jurisdiction before using this product in order to ensure that your use conforms to the applicable law. Our company shall not be liable in the event that this product is used with illegitimate purposes. 
In the event of any conflicts between this manual and the applicable law, the later prevails. 
 
Trademark: 

Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of their respective company. 
Copyright of this document is reserved. This document shall not be reproduced, distributed or changed, partially or wholly, without formal authorization. 
 
OPEN SOURCE SOFTWARE LICENSE INFORMATION 

The software components provided with Grundig products may contain copyrighted software that is licensed under various open source software licenses. For detailed information about the contained open source software 
2018-10-18-V2-EN  © Abetechs GmbH 
packages, the used package versions, license information and complete license terms, please refer to the product detail pages on our website. The complete open source software license information is also included in firmware files of affected products. Please also check your product’s CD-ROM and manuals for additional information. 
You may obtain the complete corresponding open source part of a specific product from us for a period of three years after our last shipment of this product by sending an email to: info@grundig-security.com 
Agree
Disagree