GD-CI-AP2747P
2 MP PTZ Dome IP-Camera 32x Zoom
- 32x motorized optical zoom with 16x digital zoom
- Day/Night feature with IR cut filter removable, for higher sensitivity and vibrant colors
- Privacy Zone Masking Function
- Intelligent Video Analytics Function
- Supports 24 VAC & HI Power over Ethernet (PoE)
- 0 Lux: Integrated LED IR Illuminator viewable distance up to 180m (Detection)
Image Sensor | 1/2.8" progressive Scan CMOS |
---|---|
Video Resolution | 1920 x 1080 |
Sensitivity Colour | 0.005 Lux @ F1.6 (AGC ON) |
Sensitivity B/W | 0.001 Lux @ (F1.6, AGC ON) |
Shutter Speed | 1/25 ~ 1/30,000 s |
White Balance | Auto, Manual, ATW, Indoor, Outdoor, Flourescent light, Sodium light |
Lens Focal Length | 4.8 ~ 153 mm motorized, autofocus |
Horizontal Viewing Angle | 55.6° (Wide) ~ 2.04° (Tele) |
Lens Drive Type | Auto Iris (DC) |
Focus Adjustment | Auto, Manual |
Iris F-Number | F1.2 ~ F4.4 |
Optical Zoom Ratio | 32x |
Digital Zoom | 16x |
Col/B&W | Auto, Color, Removable IR-Cut Filter (ICR) |
Max. IR Distance | Up to 180m |
Wavelength | 850nm |
IR angle | Adjustable by zoom |
Wide Dynamic Range | 120 dB |
Image Enhancement | BLC, 3D DNR, Defog, EIS, HLC, AGC, Regional Exposure, Regional Focus |
Day/Night Switch | Color, BW, Auto |
Audio Compression | G722.1/G711ulaw/G711alaw/G726/MP2L2/PCM |
Video Compression | Main Stream: H.264, H.264+, H.265, H.265+ Sub-Stream: H.264, H.265, MJPEG Third Stream: H.264, H.265, MJPEG |
H.264 code profile | Baseline Profile / Main Profile / High Profile |
Bit Rate | 256 Kbps to 16 Mbps |
SD memory | Micro SD/SDHC/SDXC card slot with ANR (up to 256G), NAS (Support NFS, SMB/CIFS) |
Network Protocol | TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, NTP, UPnP, SMTP, IGMP, 802.1X, QoS, IPv6, Bonjour, UDP, PPPoE, SNMP |
Cyber Security | 3 levels of user management: admin, operator, user, AES Encryption for Password Protection, Complicated Password, HTTPS (SSL) Login Authentication, Basic and digest authentication for HTTP/HTTPS, 802.1X authentication , (EAP-LEAP), 802.1X authentication (EAP-TLS), 802.1X authentication (EAP-MD5), Watermark, IP Adress Filter, WSSE and digest authentication for ONVIF, SNMP V2 , SNMP V3, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.2 with updated cipher suites including AES 256 encryption., Brute Force Delay Protection, Signed Firmware, Secure Boot by hardware check |
Number of Clients | Up to 20 simultaneously |
Frame Rate | Main Stream 50Hz: 25fps (1920 × 1080, 1280 × 960, 1280 × 720) 50fps (1280 × 960, 1280 × 720) 60Hz: 30fps (1920 × 1080, 1280 × 960, 1280 × 720) 60fps (1280 × 960, 1280 × 720) Sub Stream 50Hz: 25fps (704 × 576, 640 × 480, 352 × 288 60 Hz: 30fps (704 x 480, 640 x 480, 352 x 240) Third Stream 50Hz: 25fps (1920 x 1080, 1280 x 960, 1280 x 720, 704 x 576, 640 x 480, 352 x 288) 60Hz: 30fps (1920 x 1080, 1280 x 960, 1280 x 720, 704 x 480,640 x 480, 352 x 240) |
Network Storage | Micro SD, SDHC, SDXC card with ANR (up to 256G) , NAS (Support NFS, SMB, CIFS) |
Number of Privacy Zones | 24 programmable zones |
Number of Patrols | 8 patrols, up to 32 presets for each patrol |
Number of Pattern | 4 pattern scans, record time over 10 minutes for each scan |
Number of Preset | 300 |
Pan Speed | Configurable from 0.1°/sec to 120°/sec, Preset Speed: 120°/sec |
Range Panning | 360° endless |
Range Tilting | -15° ~ 90° (auto flip) |
Schedule | Preset, Pattern Scan, Patrol Scan, Auto Scan, Tilt Scan, Random Scan, Frame Scan, Panorama Scan, Dome Reboot, Dome Adjust |
Tilt Speed | Configurable from 0.1°/sec to 80°/sec, Preset Speed: 80°/sec |
Park Action | Preset , Patrol , Pattern , Auto scan , Tilt scan , Random scan , Frame scan , Panorama scan |
Preset Freezing | Support |
Proportional Zoom | Rotation speed can be adjusted automatically according to zoom multiples |
PTZ Status Display | ON, OFF |
Network Interface | 1x 10, 100 Base T, TX HiPoE (RJ-45) |
Alarm Input/Output | 2 inputs, 1 output (up to 12 VDC, 30 mA) , terminal block |
Audio Input/Output | 1-ch audio input and 1-ch audio output |
Motion Detection | On, Off |
Line Crossing Detection | Cross a pre-defined virtual line |
Intrusion Detection | Enter and loiter in a pre-defined virtual region |
Region Entrance | Enter a pre-defined virtual region from the outside place |
Region Exiting | Exit from a pre-defined virtual region |
Unattended Baggage | Objects left over in the pre-defined region such as the baggage, purse, dangerous materials |
Object Removal | Objects removed from the pre-defined region, such as the exhibits on display |
Access protection | User authentication (ID and PW) , Host authentication (MAC address) , HTTPS encryption, IEEE 802.1x port-based network access control, IP address filtering |
Intelligent Video Analytics | Detection of intrusion, line crossing, region entrance, region exit, objects left over and objects removed. Video tampering detection such as defocus and change of the scene. |
Tamper protection | Scene change and defocus |
Regulation | CE, EAC, FCC, RoHS Compliant |
Protection Rating | IP66 |
Standard | ONVIF (Profile S, Profile G), PSIA, CGI, ISAPI |
Operating Temperature | -40 °C ~ 65 °C (-40 °F ~ 149 °F) |
Humidity | Less than 95%, non condensing |
Surge Protection | TVS 4000V Lightning Protection, Surge Protection and Voltage Transient Protection |
Supply Voltage | 24 VAC, PoE+ (IEEE 802.3at) |
Power Consumption | Max. 30 W |
Dimensions | Ø 208 x 345 mm (Ø 8.19 x 13.58 inch) |
Weight | 3300 g (7.28 lb) |
Data sheets |
DSH-GD-CI-AP2747P-V1-EN.pdf |
---|---|
User Guide |
UG-GD-CI-IPC-2020-10-26-V4-EN.pdf |
Certifications |
CE-GD-CI-AP2747P-2019-02-15 V1.0-EN.pdf |
Quick Start Guide |
QG-GD-CI-AP2747P-2019-02-03-V3-EN.pdf |
ACCESSORIES
Limitation of Liability / Legal Disclaimer
English
_________________________________________________________________________________
Abetechs GmbH (Grundig Security) undertakes all reasonable efforts to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Abetechs GmbH (Grundig Security) reserves the right to change the contents of this document without prior notice. Design and specifications are subject to change without prior notice.
The product described herein, with its hardware, software and documentation is provided “as is”, without any warranty, expressed or implies, including without limitation, merchantability, satisfactory quality, fitness for a particular purpose, and non-infringement of a third party.
In no event will our company and its employees or agents be liable to you for any special, consequential, incidental, or indirect damages, including among others, damages for loss of business profits, business interruption, or loss of data or documentation, in connection with the use of this product, even if our company has been advised of the possibility of such damages.
Regarding to products with internet access, the use of the product shall be wholly at your own risks. Our company shall not take any responsibilities for abnormal operation, privacy leakage or other damages resulting from cyberattack, hacker attack, virus inspection, or other internet security risks; however, our company will provide timely technical support if required. Surveillance laws vary by jurisdiction before using this product in order to ensure that your use conforms to the applicable law. Our company shall not be liable in the event that this product is used with illegitimate purposes.
In the event of any conflicts between this manual and the applicable law, the later prevails.
Trademark:
Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of their respective company.
Copyright of this document is reserved. This document shall not be reproduced, distributed or changed, partially or wholly, without formal authorization.
OPEN SOURCE SOFTWARE LICENSE INFORMATION
The software components provided with Grundig products may contain copyrighted software that is licensed under various open source software licenses. For detailed information about the contained open source software
2018-10-18-V2-EN © Abetechs GmbH
packages, the used package versions, license information and complete license terms, please refer to the product detail pages on our website. The complete open source software license information is also included in firmware files of affected products. Please also check your product’s CD-ROM and manuals for additional information.
You may obtain the complete corresponding open source part of a specific product from us for a period of three years after our last shipment of this product by sending an email to: info@grundig-security.com
English
_________________________________________________________________________________
Abetechs GmbH (Grundig Security) undertakes all reasonable efforts to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Abetechs GmbH (Grundig Security) reserves the right to change the contents of this document without prior notice. Design and specifications are subject to change without prior notice.
The product described herein, with its hardware, software and documentation is provided “as is”, without any warranty, expressed or implies, including without limitation, merchantability, satisfactory quality, fitness for a particular purpose, and non-infringement of a third party.
In no event will our company and its employees or agents be liable to you for any special, consequential, incidental, or indirect damages, including among others, damages for loss of business profits, business interruption, or loss of data or documentation, in connection with the use of this product, even if our company has been advised of the possibility of such damages.
Regarding to products with internet access, the use of the product shall be wholly at your own risks. Our company shall not take any responsibilities for abnormal operation, privacy leakage or other damages resulting from cyberattack, hacker attack, virus inspection, or other internet security risks; however, our company will provide timely technical support if required. Surveillance laws vary by jurisdiction before using this product in order to ensure that your use conforms to the applicable law. Our company shall not be liable in the event that this product is used with illegitimate purposes.
In the event of any conflicts between this manual and the applicable law, the later prevails.
Trademark:
Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of their respective company.
Copyright of this document is reserved. This document shall not be reproduced, distributed or changed, partially or wholly, without formal authorization.
OPEN SOURCE SOFTWARE LICENSE INFORMATION
The software components provided with Grundig products may contain copyrighted software that is licensed under various open source software licenses. For detailed information about the contained open source software
2018-10-18-V2-EN © Abetechs GmbH
packages, the used package versions, license information and complete license terms, please refer to the product detail pages on our website. The complete open source software license information is also included in firmware files of affected products. Please also check your product’s CD-ROM and manuals for additional information.
You may obtain the complete corresponding open source part of a specific product from us for a period of three years after our last shipment of this product by sending an email to: info@grundig-security.com
Agree
Disagree