GD-CI-BT4637T
4 MP Bullet IP-Camera 8~32mm motorized
- H.265/H.265+, H.264/H.264+ & MJPEG compression modes
- Built in analytics function: Detection of line crossing, intrusion, region entrance, region exit, object removal, unattended baggage, face and scene change included
- Various streams from one camera can be used for recording and display. The benefits here enable, for example, keeping the data rate significantly lower with multiple-image displays
Iris F-Number | F1.2 |
---|---|
Focus Adjustment | Motorized VF lens |
Col/B&W | On, Off, Auto, IR-cut filter removable (ICR) |
Image Sensor | 1/1.8" progressive Scan CMOS |
Video Resolution | 2560 x 1440 |
Sensitivity Colour | 0.002 Lux @ F1.2 (AGC ON) |
Sensitivity B/W | 0 Lux LED IR on |
Shutter Speed | 1 ~ 1/100,000 s |
Slow Shutter | Support |
Lens Focal Length | 8 ~ 32 mm motorized, autofocus |
Horizontal Viewing Angle | 37,7° (Wide) ~ 15,2° (Tele) |
Lens Drive Type | P-Iris |
Max. IR Distance | Up to 100 m |
Surge Protection | TVS 2000V Lightning Protection, Surge Protection and Voltage Transient Protection |
Wide Dynamic Range | 140 dB |
Image Enhancement | BLC, 3D DNR, Defog, EIS, HLC |
Image Settings | Rotate mode, Saturation, Brightness, Contrast, Sharpness and white balance adjustable by client software or web browser |
Day/Night Switch | Support auto, scheduled, day, night, triggered by alarm in |
Functions | One-key reset, anti-flicker, five plus five streams, heartbeat, mirror, password protection, privacy mask, watermark, IP-address filter |
Video Compression | Main Stream: H.264, H.264+, H.265, H.265+ Sub-Stream: H.264, H.265, MJPEG Third Stream: H.264, H.265, MJPEG |
Region of Interest | Support four fixed region for each stream, and dynamic face tracking |
H.264 code profile | Baseline Profile / Main Profile / High Profile |
Bit Rate | 32Kbps ~ 16Mbps |
SD memory | Micro SD/SDHC/SDXC card slot with ANR (up to 256G), NAS (Support NFS, SMB/CIFS) |
Network Protocol | TCP/IP, ICMP, HTTP, HTTPS, FTP, DHCP, DNS, DDNS, RTP, RTSP, RTCP, NTP, UPnP, SMTP, IGMP, 802.1X, QoS, IPv6, Bonjour, UDP, PPPoE, SNMP |
Cyber Security | 3 levels of user management: admin, operator, user, AES Encryption for Password Protection, Complicated Password, HTTPS (SSL) Login Authentication, Basic and digest authentication for HTTP/HTTPS, 802.1X authentication , (EAP-LEAP), 802.1X authentication (EAP-TLS), 802.1X authentication (EAP-MD5), Watermark, IP Adress Filter, WSSE and digest authentication for ONVIF, RTP/RTSP over HTTPS, Control timeout settings, Security audit log, SNMP V2 , SNMP V3, TLS 1.1, TLS 1.2, TLS 1.2 with updated cipher suites including AES 256 encryption., Centralized Certificate Management, Brute Force Delay Protection, Signed Firmware, Secure Boot by software check, Secure Boot by hardware check |
Streaming | Five streams plus five custom streams |
Frame Rate | Main Stream 50Hz: 25fps (2560 × 1440, 1920 × 1080, 1280 × 720) 60Hz: 30fps (2560 × 1440, 1920 × 1080, 1280 × 720) Sub Stream 50Hz: 25fps (704 × 576, 640 × 480) 60Hz: 30fps (704 × 480, 640 × 480) Third Stream 50Hz: 25fps (1920 × 1080, 1280 × 720, 704 × 576, 640 × 480) 60Hz: 30fps (1920 × 1080, 1280 × 720, 704 × 480, 640 × 480) Fourth Stream 50Hz: 25fps (1920 × 1080, 1280 × 720, 704 × 576, 640 × 480) 60Hz: 30fps (1920 × 1080, 1280 × 720, 704 × 480, 640 × 480) Fifth Stream 50Hz: 25fps (704 × 576, 640 × 480) 60Hz: 30fps (704 × 480, 640 × 480) Custom Stream 50Hz: 25fps (1920 × 1080, 1280 × 720, 704 × 576, 640 × 480) 60Hz: 30fps (1920 × 1080, 1280 × 720, 704 × 480, 640 × 480) |
Network Interface | 1x 10, 100, 1000 Base T, TX (RJ-45) |
Video Outputs | 1 Test Monitor output (CVBS, 1 Vpp). Adapter cable with female BNC connector included. |
Alarm Input/Output | 2 inputs, 2 outputs (up to 24 VDC 1 A or 110 VAC 500mA ) |
Line Crossing Detection | Cross a pre-defined virtual line, up to 4 pre-defined virtual lines supported |
Intrusion Detection | Enter and loiter in a pre-defined virtual region, up to 4 pre-defined virtual regions supported |
Region Entrance | Enter a pre-defined virtual region from the outside place |
Region Exiting | Exit from a pre-defined virtual region |
Unattended Baggage | Objects left over in the pre-defined region such as the baggage, purse, dangerous materials |
Object Removal | Objects removed from the pre-defined region, such as the exhibits on display |
Object Counting | Entrance and Exit object number is accounted and showed on screen in real time |
Face Detection | Human face appears in the image can be detected and trigger linkage method |
Event Source | Video tampering, network disconnected, IP address conflicted, HDD full, HDD error, illegal login, motion detection |
Intelligent Video Analytics | Detection of intrusion, line crossing, region entrance, region extit, objects left over, objects removed and human faces. Video tampering detection such as defocus and change of the scene. |
Tamper protection | Scene change and defocus |
Regulation | CE, EAC, FCC, RoHS Compliant |
Protection Rating | IP67, IK10 |
Standard | ONVIF (Profile S, Profile G, Profile T), PSIA, ISAPI |
Operating Temperature | -30 °C ~ +65 °C (-22 °F ~ 149 °F) |
Humidity | Less than 95%, non condensing |
Supply Voltage | 12 VDC, PoE+ (IEEE 802.3at) |
Power Consumption | Max. 13 W |
Mount | Pan: 0° to 355°, tilt: 0° to 90°, rotation: 0° to 360° |
Dimensions | Ø 144 x 347 mm (Ø 5.7 × 13.7 inch) |
Weight | 2450 g (5.40lb) |
Data sheets |
DSH-GD-CI-BT4637T-V1-EN.pdf |
---|---|
User Guide |
UG-GD-CI-IPC-2020-10-26-V4-EN.pdf |
Certifications |
CE-GD-CI-AT2637T-2019-09-30 V1.0-EN.pdf |
Quick Start Guide |
QG-GD-CI-AT2637TH-2020-02-27-V4-EN.pdf |
ACCESSORIES
Limitation of Liability / Legal Disclaimer
English
_________________________________________________________________________________
Abetechs GmbH (Grundig Security) undertakes all reasonable efforts to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Abetechs GmbH (Grundig Security) reserves the right to change the contents of this document without prior notice. Design and specifications are subject to change without prior notice.
The product described herein, with its hardware, software and documentation is provided “as is”, without any warranty, expressed or implies, including without limitation, merchantability, satisfactory quality, fitness for a particular purpose, and non-infringement of a third party.
In no event will our company and its employees or agents be liable to you for any special, consequential, incidental, or indirect damages, including among others, damages for loss of business profits, business interruption, or loss of data or documentation, in connection with the use of this product, even if our company has been advised of the possibility of such damages.
Regarding to products with internet access, the use of the product shall be wholly at your own risks. Our company shall not take any responsibilities for abnormal operation, privacy leakage or other damages resulting from cyberattack, hacker attack, virus inspection, or other internet security risks; however, our company will provide timely technical support if required. Surveillance laws vary by jurisdiction before using this product in order to ensure that your use conforms to the applicable law. Our company shall not be liable in the event that this product is used with illegitimate purposes.
In the event of any conflicts between this manual and the applicable law, the later prevails.
Trademark:
Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of their respective company.
Copyright of this document is reserved. This document shall not be reproduced, distributed or changed, partially or wholly, without formal authorization.
OPEN SOURCE SOFTWARE LICENSE INFORMATION
The software components provided with Grundig products may contain copyrighted software that is licensed under various open source software licenses. For detailed information about the contained open source software
2018-10-18-V2-EN © Abetechs GmbH
packages, the used package versions, license information and complete license terms, please refer to the product detail pages on our website. The complete open source software license information is also included in firmware files of affected products. Please also check your product’s CD-ROM and manuals for additional information.
You may obtain the complete corresponding open source part of a specific product from us for a period of three years after our last shipment of this product by sending an email to: info@grundig-security.com
English
_________________________________________________________________________________
Abetechs GmbH (Grundig Security) undertakes all reasonable efforts to verify the integrity and correctness of the contents in this document, but no formal guarantee shall be provided. Use of this document and the subsequent results shall be entirely on the user’s own responsibility. Abetechs GmbH (Grundig Security) reserves the right to change the contents of this document without prior notice. Design and specifications are subject to change without prior notice.
The product described herein, with its hardware, software and documentation is provided “as is”, without any warranty, expressed or implies, including without limitation, merchantability, satisfactory quality, fitness for a particular purpose, and non-infringement of a third party.
In no event will our company and its employees or agents be liable to you for any special, consequential, incidental, or indirect damages, including among others, damages for loss of business profits, business interruption, or loss of data or documentation, in connection with the use of this product, even if our company has been advised of the possibility of such damages.
Regarding to products with internet access, the use of the product shall be wholly at your own risks. Our company shall not take any responsibilities for abnormal operation, privacy leakage or other damages resulting from cyberattack, hacker attack, virus inspection, or other internet security risks; however, our company will provide timely technical support if required. Surveillance laws vary by jurisdiction before using this product in order to ensure that your use conforms to the applicable law. Our company shall not be liable in the event that this product is used with illegitimate purposes.
In the event of any conflicts between this manual and the applicable law, the later prevails.
Trademark:
Each of trademarks herein is registered. The name of this product and other trademarks mentioned in this manual are the registered trademark of their respective company.
Copyright of this document is reserved. This document shall not be reproduced, distributed or changed, partially or wholly, without formal authorization.
OPEN SOURCE SOFTWARE LICENSE INFORMATION
The software components provided with Grundig products may contain copyrighted software that is licensed under various open source software licenses. For detailed information about the contained open source software
2018-10-18-V2-EN © Abetechs GmbH
packages, the used package versions, license information and complete license terms, please refer to the product detail pages on our website. The complete open source software license information is also included in firmware files of affected products. Please also check your product’s CD-ROM and manuals for additional information.
You may obtain the complete corresponding open source part of a specific product from us for a period of three years after our last shipment of this product by sending an email to: info@grundig-security.com
Agree
Disagree