This website requires cookies to provide all of its features. For more information on what data is contained in the cookies, please see our Privacy Policy page. To accept cookies from this site, please click the Allow button below.

GD-CI-AT2637VH

2 MP Fixed Dome IP-Camera 2.8~12mm Motorized

  • H.265/H.265+, H.264/H.264+ & MJPEG compression modes
  • Built in analytics function: Detection of line crossing, intrusion, region entrance, region exit, object removal, unattended baggage, face and scene change included
  • Various streams from one camera can be used for recording and display. The benefits here enable, for example, keeping the data rate significantly lower with multiple-image displays
  • Audio Communication & Alarm Input / Output
Focus Adjustment Motorized VF lens
Col/B&W On, Off, Auto, IR-cut filter removable (ICR)
Image Sensor 1/1.8" progressive Scan CMOS
Video Resolution 1920 x 1080
Sensitivity Colour 0.002 Lux @ F1.2 (AGC ON)
Sensitivity B/W 0 Lux LED IR on
Shutter Speed 1 ~ 1/100,000 s
Slow Shutter Support
Lens Focal Length 2.8 ~ 12 mm motorized vario focal lens
Horizontal Viewing Angle 103.3° (Wide) ~ 38.6° (Tele)
Lens Mount Ø14
Lens Drive Type P-Iris
Max. IR Distance Up to 30 m
Wide Dynamic Range 140 dB
Image Enhancement BLC, 3D DNR, Defog, EIS, HLC
Image settings Rotate mode, Saturation, Brightness, Contrast, Sharpness and white balance adjustable by client software or web browser
Day/Night Switch Support auto, scheduled, day, night, triggered by alarm in
Audio Compression G.726, G.711 a, u, MP2L2, PCM, G.722.1
Audio bit rate 64Kbps(G.711)/16Kbps(G.722.1)/16Kbps(G.726)/32-160Kbps(MP2L2)
Environment Noise Filtering yes
Functions One-key reset, anti-flicker, five plus five streams, heartbeat, mirror, password protection, privacy mask, watermark, Ip-addres filter
Video Compression Main Stream: H.265+, H.265, H.264+, H.264 Sub-Stream: H.265, H.264, MJPEG Third Stream: H.265, H.264, MJPEG
Region of Interest Support four fixed region for each stream, and dynamic face tracking
H.264 code profile Baseline Profile / Main Profile / High Profile
Bit Rate 32Kbps ~ 16Mbps
SD memory Built-in Micro SD, SDHC, SDXC slot, up to 256 GB
Network Protocol TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, NTP, UPnP, SMTP, IGMP, 802.1X, QoS, IPv6, Bonjour, UDP, PPPoE, SNMP
Streaming Five streams plus five custom streams
Frame Rate Main Stream 50Hz: 50fps (1920 × 1080, 1280 × 960, 1280 × 720) 60Hz: 60fps (1920 × 1080, 1280 × 960, 1280 × 720) Sub Stream 50Hz: 25fps (704 × 576, 640 × 480) 60Hz: 30fps (704 × 480, 640 × 480) Third Stream 50Hz: 25fps (1920 × 1080, 1280 × 960, 1280 × 720, 704 × 576, 640 × 480) 60Hz: 30fps (1920 × 1080, 1280 × 960, 1280 × 720, 704 × 480, 640 × 480) Fourth Stream 50Hz: 25fps (1920 × 1080, 1280 × 720, 704 × 576, 640 × 480) 60Hz: 30fps (1920 × 1080, 1280 × 720, 704 × 480, 640 × 480) Fifth Stream 50Hz: 25fps (704 × 576, 640 × 480) 60Hz: 30fps (704 × 480, 640 × 480) Custom Stream 50Hz: 25fps (1920 × 1080, 1280 × 720, 704 × 576, 640 × 480) 60Hz: 30fps (1920 × 1080, 1280 × 720, 704 × 480, 640 × 480) *) Listed resolutions are only selectable options. It does not mean that all streams can work at their maximum resolution at the same time.
Network Interface 1x 10, 100, 1000 Base T, TX (RJ-45)
Video Outputs 1 Test Monitor output (CVBS, 1 Vpp). Adapter cable with female BNC connector included.
Alarm Input/Output 1 input, 1 output (up to 24 VDC 1 A or 110 VAC 500mA )
Audio Input/Output 1-ch 3.5 mm audio in( Mic in/Line in)/out interface
Line Crossing Detection Cross a pre-defined virtual line, up to 4 pre-defined virtual lines supported
Intrusion Detection Enter and loiter in a pre-defined virtual region, up to 4 pre-defined virtual regions supported
Region Entrance Enter a pre-defined virtual region from the outside place
Region Exiting Exit from a pre-defined virtual region
Unattended Baggage Objects left over in the pre-defined region such as the baggage, purse, dangerous materials
Object Removal Objects removed from the pre-defined region, such as the exhibits on display
Object Counting Entrance and Exit object number is accounted and showed on screen in real time
Face Detection Human face appears in the image can be detected and trigger linkage method
Event Source Video tampering, network disconnected, IP address conflicted, HDD full, HDD error, illegal login, motion detection
Intelligent Video Analytics Detection of intrusion, line crossing, region entrance, region extit, objects left over, objects removed, human faces and audio alarm. Video tampering detection such as defocus and change of the scene.
Tamper protection Detection of scene change, defocus, sudden audio increase/decrease or audio loss.
Regulation CE, EAC, FCC, RoHS Compliant
Protection Rating IP67, IK10
Standard ONVIF (Profile S, Profile G), PSIA, CGI, ISAPI
Operating Temperature -40 °C ~ 65 °C (-40 °F ~ 149 °F)
Humidity less than 95%, non condensing
Surge Protection TVS 2000V Lightning Protection, Surge Protection and Voltage Transient Protection
Supply Voltage 12 VDC, PoE+ (802.3at)
Power Consumption Max. 17 W
Mount Pan: 0° to 355°, tilt: 0° to 75°, rotation: 0° to 355°, 3-Axis Adjustment
Dimensions Ø 162 x 140.3 mm (Ø6.4 × 5.5 inch)
Weight 1450 g (3.2 lb)
Limitation of Liability / Legal Disclaimer       

English                         
 
_________________________________________________________________________________ 

 
Abetechs GmbH (Grundig Security) undertakes all reasonable efforts to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Abetechs GmbH (Grundig Security) reserves the right to change the contents of this document without prior notice. Design and specifications are subject to change without prior notice. 
The product described herein, with its hardware, software and documentation is provided “as is”, without any warranty, expressed or implies, including without limitation, merchantability, satisfactory quality, fitness for a particular purpose, and non-infringement of a third party.  
In no event will our company and its employees or agents be liable to you for any special, consequential, incidental, or indirect damages, including among others, damages for loss of business profits, business interruption, or loss of data or documentation, in connection with the use of this product, even if our company has been advised of the possibility of such damages.  

Regarding to products with internet access, the use of the product shall be wholly at your own risks. Our company shall not take any responsibilities for abnormal operation, privacy leakage or other damages resulting from cyberattack, hacker attack, virus inspection, or other internet security risks; however, our company will provide timely technical support if required. Surveillance laws vary by jurisdiction before using this product in order to ensure that your use conforms to the applicable law. Our company shall not be liable in the event that this product is used with illegitimate purposes. 
In the event of any conflicts between this manual and the applicable law, the later prevails. 
 
Trademark: 

Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of their respective company. 
Copyright of this document is reserved. This document shall not be reproduced, distributed or changed, partially or wholly, without formal authorization. 
 
OPEN SOURCE SOFTWARE LICENSE INFORMATION 

The software components provided with Grundig products may contain copyrighted software that is licensed under various open source software licenses. For detailed information about the contained open source software 
2018-10-18-V2-EN  © Abetechs GmbH 
packages, the used package versions, license information and complete license terms, please refer to the product detail pages on our website. The complete open source software license information is also included in firmware files of affected products. Please also check your product’s CD-ROM and manuals for additional information. 
You may obtain the complete corresponding open source part of a specific product from us for a period of three years after our last shipment of this product by sending an email to: info@grundig-security.com 
Agree
Disagree