AXIS I8116-E Network Video Intercom User Manual
- June 17, 2024
- AXIS
Table of Contents
AXIS I8116-E Network Video Intercom
Product Information
Specifications
- Intercom types: Intercom, Intercom combined with AXIS A9801, Intercom combined with AXIS A9161, Intercom combined with Axis reader and door controller
- Preview mode availability: Factory defaulted state for a limited time from powering up the device
- Browser support: Chrome (recommended), Edge
Installation
To install the device, watch the installation video available at this link.
Preview Mode
Preview mode is ideal for installers to fine-tune the camera view during installation. No login is required to access the camera view in preview mode. Watch the video demonstration here.
Get Started
- Find the device on the network using AXIS IP Utility or AXIS Device Manager.
- Open a browser and enter the IP address or host name of the Axis device.
- Enter the username and password. If accessing the device for the first time, set the root password following instructions on page 5.
Set a New Password for the Root Account
- Type a new password following secure password guidelines.
- Retype the password to confirm spelling.
- Click Add user.
Secure Passwords: After initial login, set up a secure HTTPS connection and change the password to protect your device from unauthorized access.
FAQs
- Q: What should I do if I forget the root account password?
- A: In case you lose the root account password, refer to page 58 for instructions on how to reset to factory default settings.
“`
AXIS I8116-E Network Video Intercom
AXIS I8116-E Network Video Intercom
Setup overview Setup overview
1 Intercom 2 Intercom combined with AXIS A9801 3 Intercom combined with AXIS
A9161 4 Intercom combined with Axis reader and door controller
3
AXIS I8116-E Network Video Intercom
Installation
To watch this video, go to the web version of this document.
help.axis.com/?&piaId=76687§ion=setup-overview This video shows how to
install the device
Preview mode
Preview mode is ideal for installers when fine tuning the camera view during
the installation. No login is required to access the camera view in preview
mode. It is available only in factory defaulted state for a limited time from
powering up the device.
To watch this video, go to the web version of this document.
help.axis.com/?&piaId=76687§ion=preview-mode This video demonstrate how to
use preview mode.
4
AXIS I8116-E Network Video Intercom
Get started
Get started
Find the device on the network
To find Axis devices on the network and assign them IP addresses in Windows®,
use AXIS IP Utility or AXIS Device Manager. Both applications are free and can
be downloaded from axis.com/support.
For more information about how to find and assign IP addresses, go to How to
assign an IP address and access your device.
Browser support
You can use the device with the following browsers:
ChromeTM
Windows®
recommended
macOS®
recommended
Linux®
recommended
Other operating systems
Firefox® recommended recommended recommended
EdgeTM
Safari® *
*To use AXIS OS web interface with iOS 15 or iPadOS 15, go to Settings > Safari > Advanced > Experimental Features and disable NSURLSession Websocket.
If you need more information about recommended browsers, go to AXIS OS Portal.
Open the device’s web interface
1. Open a browser and type the IP address or host name of the Axis device.
If you do not know the IP address, use AXIS IP Utility or AXIS Device Manager
to find the device on the network.
2. Type the username and password. If you access the device for the first
time, you must set the root password. See Set a new password for the root
account on page 5 .
Set a new password for the root account
The default administrator username is root. There’s no default password for
the root account. You set a password the first time you log in to the device.
1. Type a password. Follow the instructions about secure passwords. See
Secure passwords on page 5 .
2. Retype the password to confirm the spelling.
3. Click Add user.
Important If you lose the password for the root account, go to Reset to
factory default settings on page 58 and follow the instructions.
Secure passwords
Important Axis devices send the initially set password in clear text over the
network. To protect your device after the first login, set up a secure and
encrypted HTTPS connection and then change the password.
5
AXIS I8116-E Network Video Intercom
Get started
The device password is the primary protection for your data and services. Axis
devices do not impose a password policy as they may be used in various types
of installations. To protect your data we strongly recommend that you:
· Use a password with at least 8 characters, preferably created by a password
generator. · Don’t expose the password. · Change the password at a recurring
interval, at least once a year.
Verify that no one has tampered with the firmware
To make sure that the device has its original Axis firmware, or to take full
control of the device after a security attack: 1. Reset to factory default
settings. See Reset to factory default settings on page 58. After the reset,
secure boot guarantees the state of the device. 2. Configure and install the
device.
Web interface overview
This video gives you an overview of the device’s web interface.
To watch this video, go to the web version of this document.
help.axis.com/?&piaId=76687§ion=web-interface-overview
Axis device web interface
6
AXIS I8116-E Network Video Intercom
Configure your device
Configure your device
This section covers all the important configurations that an installer needs
to do to get the product up and running after the hardware installation has
been completed.
Basic settings
Set the power line frequency 1. Go to Video > Installation > Power line
frequency. 2. Click Change. 3. Select a power line frequency and click Save
and restart.
Change the root password
1. Log in to the device interface and go to System > Users.
2. For the root user, click
Update user.
3. Enter a new password and save.
Set up direct SIP (P2P)
VoIP (Voice over IP) is a group of technologies that enables voice and
multimedia communication over IP networks. For more, see Voice over IP (VoIP)
on page 47.
In this product VoIP is enabled through the SIP protocol. For more information
about SIP, see Session Initiation Protocol (SIP) on page 47
There are two types of setups for SIP. Peer-to-peer is one of them. Use peer-
to-peer when the communication is between a few user agents within the same IP
network and there is no need for extra features that a PBX-server could
provide. For information on how to set it up, see Peer-to-peer SIP (P2PSIP) on
page 47.
1. Go to Communication > SIP > Settings and select Enable SIP.
2. To allow the device to receive incoming calls, select Allow incoming
calls.
NOTICE When you allow incoming calls, the device accepts calls from any device
connected to the network. If the device is accessible from a public network or
the internet, we recommend you not to allow incoming calls.
3. Click Call handling.
4. In Calling timeout, set the number of seconds that a call will last before
it ends if there is no answer.
5. If you have allowed incoming calls, set the number of seconds before
timeout for incoming calls in Incoming call timeout.
6. Click Ports.
7. Enter the SIP port number and TLS port number.
7
AXIS I8116-E Network Video Intercom
Configure your device
Note · SIP port for SIP sessions. Signalling traffic through this port is
non-encrypted. The default port number is 5060. · TLS port for SIPS and TLS
secured SIP sessions. Signalling traffic through this port is encrypted with
Transport Layer Security (TLS). The default port number is 5061. · RTP start
port Enter the port used for the first RTP media stream in a SIP call. The
default start port for media transport is 4000. Some firewalls might block RTP
traffic on certain port numbers. A port number must be between 1024 and 65535.
8. Click NAT traversal. 9. Select the protocols you want to enable for NAT
traversal. Note
Use NAT traversal when the device is connected to the network from behind a
NAT router or a firewall. For more information see NAT traversal on page 48.
10. Click Save.
Set up SIP through a server (PBX)
VoIP (Voice over IP) is a group of technologies that enables voice and
multimedia communication over IP networks. For more information, see Voice
over IP (VoIP) on page 47. In this device, VoIP is enabled through the SIP
protocol. For more information about SIP, see Session Initiation Protocol
(SIP) on page 47 There are two types of setups for SIP. A PBX server is one of
them. Use a PBX server when the communication should be between an infinite
number of user agents within and outside the IP network. Additional features
could be added to the setup depending on the PBX provider. For more
information, see Private Branch Exchange (PBX) on page 48.
1. Request the following information from your PBX provider: – User ID –
Domain – Password – Authentication ID – Caller ID – Registrar – RTP start port
2. Go to Communication > SIP > Accounts and click + Account. 3. Enter a Name
for the account. 4. Select Registered. 5. Select a transport mode. 6. Add the
account information from the PBX provider. 7. Click Save. 8. Set up the SIP
settings in the same way as for peer-to-peer, see Set up direct SIP (P2P) on
page 7 . Use the RTP start
port from the PBX provider.
8
AXIS I8116-E Network Video Intercom
Configure your device
Create a contact
This example explains how to create a new contact in the contact list. Before
you start, enable SIP in Communication > SIP. To create a new contact:
1. Go to Communication > Contact list. 2. Click + Add contact. 3. Enter the
first and last name of the contact. 4. Enter the contact’s SIP address. Note
For information about SIP addresses, see Session Initiation Protocol (SIP) on
page 47.
5. Select the SIP account to call from. Note
Availability options are defined in System > Events > Schedules.
6. Choose the contact’s Availability. If there’s a call when the contact
isn’t available, the call gets canceled unless a there’s a fallback contact.
Note A fallback is a contact, to whom the call gets forwarded if the original
contact doesn’t reply or isn’t available.
7. In Fallback, select None. 8. Click Save.
Configure the call button
By default, the call button is configured to make VMS (video management
software) calls. If you want to keep this configuration, you just need to add
the Axis intercom to the VMS. This example explains how to set up the system
to call a contact in the contact list when a visitor presses the call button.
1. Go to Communication > Calls > Call button. 2. Turn off Make calls in the
video management software (VMS). 3. Under Recipients, select a contact. To
disable the call button, turn off Enable call button.
Use DTMF to unlock the door for a visitor
When a visitor makes a call from the intercom, the person who answers can use
the Dual-Tone Multi-Frequency signaling (DTMF) of his SIP device to unlock the
door. The door controller unlocks and locks the door. This example explains
how to:
· define the DTMF signal in the intercom · set up the intercom to:
– request the door controller to unlock the door, or – unlock the door using
the internal relay.
9
AXIS I8116-E Network Video Intercom
Configure your device
You make all settings in the intercom’s webpage. Before you start
· Allow SIP calls from the device and set up a SIP account. See Set up direct
SIP (P2P) on page 7 and Set up SIP through a server (PBX) on page 8 .
Define the DTMF signal in the intercom 1. Go to Communication > SIP > Accounts
and locate the SIP account.
2. Click
Edit.
3. Click DTMF.
4. Click + DTMF sequence.
5. In the Sequence field, enter “1”.
6. In the Description field, enter “Unlock door”.
7. Click Save.
Set up the intercom to unlock the door using the internal relay
8. Go to System > Events > Rules and add a rule.
9. In the Name field, enter “DTMF unlock door”.
10. From the list of conditions, under Call, select DTMF and Unlock door.
11. From the list of actions, under I/O, select Toggle I/O once.
12. From the list of ports, select Relay 1.
13. Change Duration to 00:00:07, which means that the door is open for 7 seconds.
14. Click Save.
Adjust the image
This section includes instructions about configuring your device. If you want
to learn more about how certain features work, go to Learn more on page 47.
Select exposure mode
To improve image quality for specific surveillance scenes, use exposure modes.
Exposure modes lets you control aperture, shutter speed, and gain. Go to Video
Image > Exposure and select between the following exposure modes:
· For most use cases, select Automatic exposure. · For environments with certain artificial lighting, for example fluorescent lighting, select Flicker- free.
Select the same frequency as the power line frequency. · For environments with certain artificial light and bright light, for example outdoors with fluorescent lighting at night and
sun during daytime, select Flicker-reduced. Select the same frequency as the power line frequency. · To lock the current exposure settings, select Hold current.
10
AXIS I8116-E Network Video Intercom
Configure your device
Reduce noise in low-light conditions
To reduce noise in low-light conditions, you can adjust one or more of the
following settings: · Adjust the trade-off between noise and motion blur. Go
to Video > Image > Exposure and move the Blur-noise trade-off slider toward
Low noise. · Set the exposure mode to automatic.
Note A high max shutter value can result in motion blur.
· To slow down the shutter speed, set max shutter to the highest possible
value. Note
When you reduce the max gain, the image can become darker.
· Set the max gain to a lower value. · If possible, open the aperture. ·
Reduce sharpness in the image, under Video > Image > Appearance.
Show a text overlay
You can add a text field as an overlay in the video stream. This is useful for
example when you want to display the date, time or a company name in the video
stream.
1. Go to Video > Overlays.
2. Select Text and click
.
3. Type the text you want to display in the video stream.
4. Select a position. You can also drag the overlay text field in the live view to change the position.
Set up rules for events
You can create rules to make your device perform an action when certain events
occur. A rule consists of conditions and actions. The conditions can be used
to trigger the actions. For example, the device can start a recording or send
an email when it detects motion, or show an overlay text while the device is
recording. To learn more, check out our guide Get started with rules for
events.
Show a text overlay in the video stream when the device detects an object
This example explains how to display the text “Motion detected” when the
device detects an object. Make sure that AXIS Object Analytics is running:
1. Go to Apps > AXIS Object Analytics. 2. Start the application if it is not
already running. 3. Make sure you have set up the application according to
your needs. Add the overlay text: 1. Go to Video > Overlays.
11
AXIS I8116-E Network Video Intercom
Configure your device
2. Under Overlays, select Text and click
.
3. Enter #D in the text field.
4. Choose text size and appearance.
5. To position the text overlay, click
and select an option.
Create a rule:
1. Go to System > Events and add a rule.
2. Type a name for the rule.
3. In the list of conditions, under Application, select Object Analytics.
4. In the list of actions, under Overlay text, select Use overlay text.
5. Select a video channel.
6. In Text, type “Motion detected”.
7. Set the duration.
8. Click Save.
12
AXIS I8116-E Network Video Intercom
The web interface
The web interface
To reach the device’s web interface, type the device’s IP address in a web
browser. Note
Support for the features and settings described in this section varies between
devices. This icon the feature or setting is only available in some devices.
indicates that
Show or hide the main menu. Access the product help.
Change the language.
Set light theme or dark theme.
The user menu contains:
· Information about the user who is logged in.
·
Change user : Log out the current user and log in a new user.
·
Log out : Log out the current user.
The context menu contains:
· Analytics data: Accept to share non-personal browser data. · Feedback: Share
any feedback to help us improve your user experience. · Legal: View
information about cookies and licenses. · About: View device information,
including firmware version and serial number. · Legacy device interface:
Change the device’s web interface to the legacy version.
Status
Device info Shows the device information, including firmware version and
serial number.
Upgrade firmware: Upgrade the firmware on your device. Takes you to the
Maintenance page where you can do a firmware upgrade.
Time sync status Shows NTP synchronization information, including if the
device is in sync with an NTP server and the time remaining until the next
sync.
NTP settings: View and update the NTP settings. Takes you to the Date and time
page where you can change the NTP settings.
Security Shows what kind of access to the device that is active, and what
encryption protocols are in use. Recommendations to the settings are based on
the AXIS OS Hardening Guide.
13
AXIS I8116-E Network Video Intercom
The web interface
Hardening guide: Link to AXIS OS Hardening guide where you can learn more
about cybersecurity on Axis devices and best practices. Connected clients View
details: Click to show all clients that are connected to the device. Ongoing
recordings Shows ongoing recordings and their designated storage space.
Recordings: View ongoing and filtered recordings and their source. For more
information, see Recordings on page 28
Shows the storage space where the recording is saved.
Communication
Contact list
Contacts
Click to download the contact list as a json file.
Click to import a contact list (json).
Add contact: Click to add a new contact to the contact list. First name: Enter the contact’s first name. Last name: Enter the contact’s last name.
Speed dial
: Enter an available speed dial number for the contact. This number is used to call the contact from the device.
SIP address: Enter the contact’s IP address or extension.
: Click to make a test call. The call will automatically end when answered.
SIP account: Select the SIP account to use for the call from the device to the
contact.
Availability: Select the contact’s availability schedule. If a call is
attempted when the contact isn’t available, the call is canceled unless
there’s a fallback contact.
Fallback: If applicable, select a fallback contact from the list.
The context menu contains: Edit contact: Edit the contact’s properties. Delete contact: Delete the contact.
14
AXIS I8116-E Network Video Intercom
The web interface
SIP
Settings
Session Initiation Protocol (SIP) is used for interactive communication sessions between users. The sessions can include audio and video.
Enable SIP: Check this option to make it possible to initiate and receive SIP calls.
Allow incoming calls: Check this option to allow incoming calls from other SIP devices.
Call handling
Ports
· Calling timeout: Set the maximum duration of an attempted call if no one
answers. · Incoming call duration: Set the maximum time an incoming call can
last (max 10 min). · End calls after: Set the maximum time that a call can
last (max 60 minutes). Select Infinite call duration if you don’t
want to limit the length of a call.
A port number must be between 1024 and 65535.
· SIP port: The network port used for SIP communication. The signaling traffic
through this port is non-encrypted. The default port number is 5060. Enter a
different port number if required.
· TLS port: The network port used for encrypted SIP communication. The
signaling traffic through this port is encrypted with Transport Layer Security
(TLS). The default port number is 5061. Enter a different port number if
required.
· RTP start port: The network port used for the first RTP media stream in a
SIP call. The default start port number is 4000. Some firewalls block RTP
traffic on certain port numbers.
NAT traversal
Use NAT (Network Address Translation) traversal when the device is located on an private network (LAN) and you want to make it available from outside of that network.
Note For NAT traversal to work, the router must support it. The router must also support UPnP®.
Each NAT traversal protocol can be used separately or in different
combinations depending on the network environment.
· ICE: The ICE (Interactive Connectivity Establishment) protocol increases the
chances of finding the most efficient path to successful communication between
peer devices. If you also enable STUN and TURN, you improve the ICE protocol’s
chances.
· STUN: STUN (Session Traversal Utilities for NAT) is a client-server network
protocol that lets the device determine if it is located behind a NAT or
firewall, and if so obtain the mapped public IP address and port number
allocated for connections to remote hosts. Enter the STUN server address, for
example, an IP address.
· TURN: TURN (Traversal Using Relays around NAT) is a protocol that lets a
device behind a NAT router or firewall receive incoming data from other hosts
over TCP or UDP. Enter the TURN server address and the login information.
Audio and video
· Audio codec priority: Select at least one audio codec with the desired audio
quality for SIP calls. Drag-and-drop to change the priority.
Note
The selected codecs must match the call recipient codec, since the recipient
codec is decisive when a call is made.
· Audio direction: Select allowed audio directions. · H.264 packetization
mode: Select which packetization mode to use.
– Auto: (Recommended) The device decides which packetization mode to use. –
None: No packetization mode is set. This mode is often interpreted as mode 0.
– 0: Non-interleaved mode. – 1: Single NAL unit mode. · Video direction:
Select allowed video directions. Additional
15
AXIS I8116-E Network Video Intercom
The web interface
· UDP-to-TCP switching: Select to allow calls to switch transport protocols
from UDP (User Datagram Protocol) to TCP (Transmission Control Protocol)
temporarily. The reason for switching is to avoid fragmentation, and the
switch can take place if a request is within 200 bytes of the maximum
transmission unit (MTU) or larger than 1300 bytes.
· Allow via rewrite: Select to send the local IP address instead of the
router’s public IP address. · Allow contact rewrite: Select to send the local
IP address instead of the router’s public IP address. · Register with server
every: Set how often you want the device to register with the SIP server for
the existing
SIP accounts. · DTMF payload type: Changes the default payload type for DTMF.
Accounts
All current SIP accounts are listed under SIP accounts. For registered
accounts, the colored circle lets you know the status.
The account is successfully registered with the SIP server.
There is a problem with the account. Possible reasons can be authorization
failure, that the account credentials are wrong, or that the SIP server can’t
find the account.
The peer to peer (default) account is an automatically created account. You
can delete it if you create at least one other account and set that account as
default. The default account is always used when a VAPIX® Application
Programming Interface (API) call is made without specifying which SIP account
to call from.
Account: Click to create a new SIP account.
· Active: Select to be able to use the account. · Make default: Select to make
this the default account. There must be a default account, and there can only
be one default account. · Answer automatically: Select to automatically answer
an incoming call.
· Prioritize IPv6 over IPv4
: Select to prioritize IPv6 addresses over IPv4 addresses. This is useful when you
connect to peer-to-peer accounts or domain names that resolve in both IPv4 and IPv6 addresses. You can only
prioritize IPv6 for domain names that are mapped to IPv6 addresses.
· Name: Enter a descriptive name. This can, for example, be a first and last name, a role, or a location. The name is
not unique.
· User ID: Enter the unique extension or phone number assigned to the device.
· Peer-to-peer: Use for direct calls to another SIP device on the local network.
· Registered: Use for calls to SIP devices outside the local network, through a SIP server.
· Domain: If available, enter the public domain name. It will be shown as part of the SIP address when calling other
accounts.
· Password: Enter the password associated with the SIP account for authenticating against the SIP server.
· Authentication ID: Enter the authentication ID used for authenticating against the SIP server. If it is the same as the
user ID, you don’t need to enter the authentication ID.
· Caller ID: The name which is presented to the recipient of calls from the device.
· Registrar: Enter the IP address for the registrar.
· Transport mode: Select the SIP transport mode for the account: UPD, TCP, or TLS. When you select TLS, you get the
option to use media encryption.
· Media encryption (only with transport mode TLS): Select the type of encryption for media (audio and video) in SIP calls.
· Certificate (only with transport mode TLS): Select a certificate.
· Verify server certificate (only with transport mode TLS): Check to verify the server certificate.
· Secondary SIP server: Turn on if you want the device to try to register on a secondary SIP server if registration
on the primary SIP server fails.
· SIP secure: Select to use Secure Session Initiation Protocol (SIPS). SIPS uses the TLS transport mode to encrypt traffic.
· Proxies
–
· Video
Proxy: Click to add a proxy. Prioritize: If you have added two or more proxies, click to prioritize them. Server address: Enter the IP address of the SIP proxy server. Username: If required, enter the username for the SIP proxy server. Password: If required, enter the password for the SIP proxy server.
16
AXIS I8116-E Network Video Intercom
The web interface
–
· DTMF
–
–
View area: Select the view area to use for video calls. If you select none,
the native view is used. Resolution: Select the resolution to use for video
calls. The resolution affects the required bandwidth. Frame rate: Select the
number of frames per second for video calls. The frame rate affects the
required bandwidth. H.264 profile: Select the profile to use for video calls.
Use RTP (RFC2833): Select to allow dual-tone multifrequency (DTMF) signaling,
other tone signals and telephony events in RTP packets. Use SIP INFO
(RFC2976): Select to include the INFO method to the SIP protocol. The INFO
method adds optional application layer information, generally related to the
session.
–
DTMF sequence: Click to add an action rule triggered by touch-tone. You must activate the action
rule in the Events tab.
– Sequence: Enter the characters to trigger the action rule. Allowed characters: 09, A-D, #, and *.
– Description: Enter a description of the action to be triggered.
Test call
SIP account: Select which account to make the test call from.
SIP address: Enter a SIP address and click to make a test call and verify that the account works.
Calls
Call button
Enable call button: Turn on to make it possible to use the call button.
Make calls in the video management software (VMS): Turn on to make VMS calls
when someone presses the call button. Turn off to only make calls to contacts
from the contact list when someone presses the call button. A VMS call is a
simulated call from the device to a VMS, through the event system in the
device. VMS calls can be made even if SIP is turned off.
Standby light: Select an option for the built-in light around the call button.
· Auto
: The device turns the built-in light on and off based on the surrounding light.
· On: The built-in light is always turned on when the device is in standby mode.
· Off: The built-in light is always turned off when the device is in standby mode.
Recipients: Select or create one or more contacts to call when someone presses the call button. If you add more than one
recipient, the call will be placed to all of them at the same time. The maximum number of recipients is six.
Fallback: Add a fallback contact from the list in case none of the recipients replies.
General
Audio
Note · The selected audio clip is only played when a call is made. · If you
change the audio clip or gain during an ongoing call, it doesn’t take effect
until the next call.
Ringtone: Select the audio clip to play when someone makes a call to the device. Use the slider to adjust the gain. Ringback tone: Select the audio clip to play when someone makes a call from the device. Use the slider to adjust the gain.
17
AXIS I8116-E Network Video Intercom
The web interface
Video
Click to play the live video stream.
Click to freeze the live video stream.
Click to take a snapshot of the live video stream. The file is saved in the
`Downloads’ folder on your computer. The image file name is
[snapshot_YYYY_MM_DD_HH_MM_SS.jpg]. The size of the snapshot depends on the
compression that the specific web-browser engine where the snapshot is
received applies, therefore, the snapshot size may vary from the actual
compression setting that is configured in the device.
devices.
Click to show I/O output ports. Use the switch to open or close the circuit of a port, for example, to test external
Click to manually turn on or turn off the IR illumination.
Click to manually turn on or turn off the white light.
Click to access onscreen controls: · Predefined controls: Turn on to use the available onscreen controls.
· Custom controls: Click
Add custom control to add an onscreen control.
Starts the washer. When the sequence starts, the camera moves to the configured position to receive the wash spray. When the whole wash sequence is completed, the camera returns to its previous position. This icon is only visible when the washer is connected and configured.
Starts the wiper.
Click and select a preset position to go to that preset position in the live view. Or, click Setup to go to the preset position page.
Adds or removes a focus recall area. When you add a focus recall area, the camera saves the focus settings at that specific pan/tilt range. When you have set a focus recall area and the camera enters that area in the live view, the camera recalls the previously saved focus. It’s enough to cover half of the area for the camera to recall the focus.
Click to select a guard tour, then click Start to play the guard tour. Or, click Setup to go to the guard tours page.
Click to manually turn on the heater for a selected period of time.
Click to start a continuous recording of the live video stream. Click again to stop the recording. If a recording is ongoing, it will resume automatically after a reboot.
Click to show the storage that is configured for the device. To configure the storage, you need to be logged in as an administrator.
18
AXIS I8116-E Network Video Intercom
The web interface
Click to access more settings:
· Video format: Select the encoding format to use in the live view. · Client
stream information: Turn on to show dynamic information about the video stream
used by the browser that
shows the live video stream. The bitrate information differs from the
information shown in a text overlay, because of different information sources.
The bitrate in the client stream information is the bitrate of the last
second, and it comes from the encoding driver of the device. The bitrate in
the overlay is the average bitrate of the last 5 seconds, and it comes from
the browser. Both values cover only the raw video stream and not the
additional bandwidth generated when it’s transported over the network through
UDP/TCP/HTTP. · Adaptive stream: Turn on to adapt the image resolution to the
viewing client’s actual display resolution, to improve the user experience and
help prevent a possible overload of the client’s hardware. The adaptive stream
is only applied when you view the live video stream in the web interface in a
browser. When adaptive stream is turned on, the maximum frame rate is 30 fps.
If you take a snapshot while adaptive stream is turned on, it will use the
image resolution selected by the adaptive stream.
· Level grid: Click
to show the level grid. The grid helps you decide if the image is horizontally aligned. Click
to hide it.
· Pixel counter: Click
to show the pixel counter. Drag and resize the box to contain your area of interest. You can
also define the pixel size of the box in the Width and Height fields.
· Refresh: Click
to refresh the still image in the live view.
· PTZ controls
: Turn on to display PTZ controls in the live view.
Click to show the live view at full resolution. If the full resolution is larger than your screen size, use the smaller image to navigate in the image.
Click to show the live video stream in full screen. Press ESC to exit full
screen mode.
Installation
Capture mode
: A capture mode is a preset configuration that defines how the camera captures images. When you change
the capture mode, it can affect many other settings, such as view areas and privacy masks.
Mounting position
: The orientation of the image can change depending on how you mount the camera.
Power line frequency: To minimize image flicker, select the frequency your region uses. The American regions usually use 60 Hz. The rest of the world mostly uses 50 Hz. If you’re not sure of your region’s power line frequency, check with the local authorities.
Rotate: Select the preferred image orientation.
Image
Appearance
19
AXIS I8116-E Network Video Intercom
The web interface
Scene profile
: Select a scene profile that suits your surveillance scenario. A scene profile optimizes image settings,
including color level, brightness, sharpness, contrast, and local contrast, for a specific environment or purpose.
· Forensic: Suitable for surveillance purposes.
· Indoor
: Suitable for indoor environments.
· Outdoor
: Suitable for outdoor environments.
· Vivid: Useful for demonstration purposes.
· Traffic overview: Suitable for vehicle traffic monitoring.
Saturation: Use the slider to adjust the color intensity. You can, for example, get a grayscale image.
Contrast: Use the slider to adjust the difference between light and dark.
Brightness: Use the slider to adjust the light intensity. This can make objects easier to see. Brightness is applied after image capture, and doesn’t affect the information in the image. To get more details from a dark area, it’s usually better to increase gain or exposure time.
Sharpness: Use the slider to make objects in the image appear sharper by adjusting the edge contrast. If you increase the sharpness, it may increase the bitrate and the amount of storage space needed as well.
Wide dynamic range
20
AXIS I8116-E Network Video Intercom
The web interface
WDR
: Turn on to make both bright and dark areas of the image visible.
Local contrast
: Use the slider to adjust the contrast of the image. A higher value makes the contrast higher between
dark and light areas.
Tone mapping
: Use the slider to adjust the amount of tone mapping that is applied to the image. If the value is set to
zero, only the standard gamma correction is applied, while a higher value increases the visibility of the darkest and brightest
parts in the image.
White balance
When the camera detects the color temperature of the incoming light, it can
adjust the image to make the colors look more natural. If this is not
sufficient, you can select a suitable light source from the list.
The automatic white balance setting reduces the risk of color flicker by
adapting to changes gradually. If the lighting changes, or when the camera is
first started, it can take up to 30 seconds to adapt to the new light source.
If there is more than one type of light source in a scene, that is, they
differ in color temperature, the dominating light source acts as a reference
for the automatic white balance algorithm. This behavior can be overridden by
choosing a fixed white balance setting that matches the light source you want
to use as a reference.
Light environment:
· Automatic: Automatic identification and compensation for the light source color. This is the recommended setting which can be used in most situations.
· Automatic outdoors
: Automatic identification and compensation for the light source color. This is the
recommended setting which can be used in most outdoor situations.
· Custom indoors
: Fixed color adjustment for a room with some artificial light other than fluorescent lighting
and good for a normal color temperature around 2800 K.
· Custom outdoors
: Fixed color adjustment for sunny weather conditions with a color temperature around
5500 K.
· Fixed fluorescent 1: Fixed color adjustment for fluorescent lighting with a color temperature around 4000 K.
· Fixed fluorescent 2: Fixed color adjustment for fluorescent lighting with a color temperature around 3000 K.
· Fixed indoors: Fixed color adjustment for a room with some artificial light other than fluorescent lighting and
good for a normal color temperature around 2800 K.
· Fixed outdoors 1: Fixed color adjustment for sunny weather conditions with a color temperature around 5500 K.
· Fixed outdoors 2: Fixed color adjustment for cloudy weather condition with a color temperature around 6500 K.
· Street light mercury in street lighting.
: Fixed color adjustment for ultraviolet emission in mercury vapor lights common
· Street light sodium
: Fixed color adjustment that compensates for the yellow orange color of sodium vapor
lights common in street lighting.
· Hold current: Keep the current settings and do not compensate for light changes.
· Manual
: Fix the white balance with the help of a white object. Drag the circle to an object that you want
the camera to interpret as white in the live view image. Use the Red balance and Blue balance sliders to adjust the
white balance manually.
Exposure
Select an exposure mode to reduce rapidly changing irregular effects in the
image, for example, flicker produced by different types of light sources. We
recommend you to use the automatic exposure mode, or the same frequency as
your power network.
21
AXIS I8116-E Network Video Intercom
The web interface
Exposure mode: · Automatic: The camera adjusts the aperture, gain, and shutter automatically.
· Automatic aperture
: The camera adjusts the aperture and gain automatically. The shutter is fixed.
· Automatic shutter
: The camera adjusts the shutter and gain automatically. The aperture is fixed.
· Hold current: Locks the current exposure settings.
· Flicker-free
: The camera adjusts the aperture and gain automatically, and uses only the following shutter
speeds: 1/50 s (50 Hz) and 1/60 s (60 Hz).
· Flicker-free 50 Hz
: The camera adjusts the aperture and gain automatically, and uses the shutter speed 1/50 s.
· Flicker-free 60 Hz
: The camera adjusts the aperture and gain automatically, and uses the shutter speed 1/60 s.
· Flicker-reduced
: This is the same as flicker-free, but the camera might use shutter speeds faster than
1/100 s (50 Hz) and 1/120 s (60 Hz) for brighter scenes.
· Flicker-reduced 50 Hz
: This is the same as flicker-free, but the camera might use shutter speeds faster
than 1/100 s for brighter scenes.
· Flicker-reduced 60 Hz
: This is the same as flicker-free, but the camera might use shutter speeds faster
than 1/120 s for brighter scenes.
· Manual
: The aperture, gain, and shutter are fixed.
Exposure zone
: Use exposure zones to optimize the exposure in a selected part of the scene, for example, the area in
front of an entrance door.
Note
The exposure zones are related to the original image (unrotated), and the
names of the zones apply to the original image. This means, for example, that
if the video stream is rotated 90°, then the Upper zone becomes the Right zone
in the stream, and Left becomes Lower.
· Automatic: Suitable for most situations. · Center: Uses a fixed area in the
center of the image to calculate the exposure. The area has a fixed size and
position in the live view.
· Full
: Uses the entire live view to calculate the exposure.
· Upper
: Uses an area with a fixed size and position in the upper part of the image to calculate the exposure.
· Lower
: Uses an area with a fixed size and position in the lower part of the image to calculate the exposure.
· Left
: Uses an area with a fixed size and position in the left part of the image to calculate the exposure.
· Right
: Uses an area with a fixed size and position in the right part of the image to calculate the exposure.
· Spot: Uses an area with a fixed size and position in the live view to calculate the exposure.
· Custom: Uses an area in the live view to calculate the exposure. You can adjust the size and position of the area.
Max shutter: Select the shutter speed to provide the best image. Low shutter speeds (longer exposure) might cause motion blur
when there is movement, and a too high shutter speed might affect the image quality. Max shutter works with max gain to
improve the image.
Max gain: Select the suitable max gain. If you increase the max gain, it improves the visible level of detail in dark images, but also increases the noise level. More noise can also result in increased use of bandwidth and storage. If you set the max gain to a high value, images can differ a lot if the light conditions are very different from day to night. Max gain works with max shutter to improve the image.
22
AXIS I8116-E Network Video Intercom
The web interface
Motion-adaptive exposure
: Select to reduce motion blur in low-light conditions.
Blur-noise trade-off: Use the slider to adjust the priority between motion blur and noise. If you want to prioritize low bandwidth and have less noise at the expense of details in moving objects, move the slider towards Low noise. If you want to prioritize the preservation of details in moving objects at the expense of noise and bandwidth, move the slider towards Low motion blur.
Note
You can change the exposure either by adjusting the exposure time or by
adjusting the gain. If you increase the exposure time, it results in more
motion blur, and if you increase the gain, it results in more noise. If you
adjust the Blur-noise trade-off towards Low noise, the automatic exposure will
prioritize longer exposure times over increasing gain, and the opposite if you
adjust the trade-off towards Low motion blur. Both the gain and exposure time
will eventually reach their maximum values in low-light conditions, regardless
of the priority set.
Lock aperture
: Turn on to keep the aperture size set by the Aperture slider. Turn off to allow the camera to automatically
adjust the aperture size. You can, for example, lock the aperture for scenes with permanent light conditions.
Aperture
: Use the slider to adjust the aperture size, that is, how much light passes through the lens. To allow more light
to enter the sensor and thereby produce a brighter image in low-light conditions, move the slider towards Open. An open aperture
also reduces the depth of field, which means that objects close to or far from the camera can appear unfocused. To allow more of
the image to be in focus, move the slider towards Closed.
Exposure level: Use the slider to adjust the image exposure.
Defog
: Turn on to detect the effects of foggy weather and automatically remove them for a clearer image.
Note
We recommend you not to turn on Defog in scenes with low contrast, large light
level variations, or when the autofocus is slightly off. This can affect the
image quality, for example, by increasing the contrast. Furthermore, too much
light can negatively impact the image quality when defog is active.
Stream
General
Resolution: Select the image resolution suitable for the surveillance scene. A
higher resolution increases bandwidth and storage.
Frame rate: To avoid bandwidth problems on the network or reduce storage size,
you can limit the frame rate to a fixed amount. If you leave the frame rate at
zero, the frame rate is kept at the highest possible rate under the current
conditions. A higher frame rate requires more bandwidth and storage capacity.
Compression: Use the slider to adjust the image compression. High compression
results in a lower bitrate and lower image quality. Low compression improves
the image quality, but uses more bandwidth and storage when you record.
Signed video
: Turn on to add the signed video feature to the video. Signed video protects the video from tampering by
adding cryptographic signatures to the video.
Zipstream
Zipstream is a bitrate reduction technology, optimized for video surveillance,
that reduces the average bitrate in an H.264 or H.265 stream in real time.
Axis Zipstream applies a high bitrate in scenes where there are multiple
regions of interest, for example, in scenes with moving objects. When the
scene is more static, Zipstream applies a lower bitrate, and thereby reduces
the required storage. To learn more, see Reducing the bit rate with Axis
Zipstream
23
AXIS I8116-E Network Video Intercom
The web interface
Select the bitrate reduction Strength:
· Off: No bitrate reduction. · Low: No visible quality degradation in most
scenes. This is the default option and it can be used in all types
of scenes to reduce the bitrate. · Medium: Visible effects in some scenes
through less noise and a slightly lower level of detail in regions of lower
interest, for example, where there’s no movement. · High: Visible effects in
some scenes through less noise and a lower level of detail in regions of lower
interest, for
example, where there’s no movement. We recommend this level for cloud-
connected devices and devices that use local storage. · Higher: Visible
effects in some scenes through less noise and a lower level of detail in
regions of lower interest, for example, where there’s no movement. · Extreme:
Visible effects in most scenes. The bitrate is optimized for smallest possible
storage. Optimize for storage: Turn on to minimize the bitrate while
maintaining quality. The optimization does not apply to the stream shown in
the web client. Turning on Optimize for storage also turns on Dynamic GOP.
Dynamic FPS (frames per second): Turn on to allow the bandwidth to vary based
on the level of activity in the scene. More activity requires more bandwidth.
Lower limit: Enter a value to adjust the frame rate between minimal fps and
the stream default fps based on scene motion. We recommend you to use lower
limit in scenes with very little motion, where the fps could drop to 1 or
lower.
Dynamic GOP (Group of Pictures): Turn on to dynamically adjust the interval
between I-frames based on the level of activity in the scene.
Upper limit: Enter a maximum GOP length, that is, the maximum number of
P-frames between two I-frames. An I-frame is a self-contained image frame that
is independent of other frames.
P-frames: A P-frame is a predicted image that shows only the changes in the
image from the previous frame. Enter the desired number of P-frames. The
higher the number, the less bandwidth is required. However, if there is
network congestion, there could be a noticeable deterioration in the video
quality.
Bitrate control
· Average: Select to automatically adjust the bitrate over a longer time period and provide the best possible image quality based on the available storage.
–
Click to calculate the target bitrate based on available storage, retention time, and bitrate limit.
– Target bitrate: Enter desired target bitrate.
– Retention time: Enter the number of days to keep the recordings.
– Storage: Shows the estimated storage that can be used for the stream.
– Maximum bitrate: Turn on to set a bitrate limit.
– Bitrate limit: Enter a bitrate limit that is higher than the target bitrate.
· Maximum: Select to set a maximum instant bitrate of the stream based on your network bandwidth.
– Maximum: Enter the maximum bitrate.
· Variable: Select to allow the bitrate to vary based on the level of activity in the scene. More activity requires more
bandwidth. We recommend this option for most situations.
Orientation
Mirror: Turn on to mirror the image.
Audio
24
AXIS I8116-E Network Video Intercom
The web interface
Include: Turn on to use audio in the video stream.
Source
: Select what audio source to use.
Stereo
: Turn on to include built-in audio as well as audio from an external microphone.
Overlays
: Click to add an overlay. Select the type of overlay from the dropdown list:
· Text: Select to show a text that is integrated in the live view image and
visible in all views, recordings and snapshots. You can enter your own text,
and you can also include pre-configured modifiers to automatically show, for
example, time, date, and frame rate.
–
: Click to add the date modifier %F to show yyyy-mm-dd.
–
: Click to add the time modifier %X to show hh:mm:ss (24-hour clock).
– Modifiers: Click to select any of the modifiers shown in the list to add them to the text box. For example,
%a shows the day of the week.
– Size: Select the desired font size.
– Appearance: Select the text color and background color, for example, white text on a black background
(default).
–
: Select the position of the overlay in the image.
· Image: Select to show a static image superimposed over the video stream. You can use .bmp, .png, .jpeg, or .svg files.
To upload an image, click Images. Before you upload an image, you can choose to:
– Scale with resolution: Select to automatically scale the overlay image to fit the video resolution.
– Use transparency: Select and enter the RGB hexadecimal value for that color. Use the format RRGGBB.
Examples of hexadecimal values: FFFFFF for white, 000000 for black, FF0000 for red, 6633FF for blue, and
669900 for green. Only for .bmp images.
· Streaming indicator
: Select to show an animation superimposed over the video stream. The animation
indicates that the video stream is live, even if the scene doesn’t contain any motion.
– Appearance: Select the animation color and background color, for example, red animation on a transparent
background (default).
– Size: Select the desired font size.
–
: Select the position of the overlay in the image.
Privacy masks
: Click to create a new privacy mask. Privacy masks: Click to change the color
of all privacy masks, or to delete all privacy masks permanently.
Mask x: Click to rename, disable, or permanently delete the mask.
25
AXIS I8116-E Network Video Intercom
The web interface
Reader
Reader protocol
Reader protocol type: Select the protocol to use for the reader functionality.
· VAPIX reader: Can only be used with an Axis door controller. – Protocol:
Select HTTPS or HTTP. – Door controller address: Enter the IP address for the
door controller. – User name: Enter the username of the door controller. –
Password: Enter the password of the door controller. – Connect: Click to
connect to the door controller. – Select reader: Select the entrance reader
for the appropriate door.
· OSDP: – OSDP address: Enter the OSDP reader address. 0 is the default and
most common address for single readers.
· Wiegand
:
– Beeper: Turn on to activate the beeper input.
– Input for beeper: Select the I/O port used for the beeper.
– Input used for LED control: Select how many I/O ports to use for controlling LED feedback on the device.
– Input for LED1/LED2: Select which I/O ports to use for LED input.
– Idle color: If no I/O port is used to control the LED, you can select a static color to show on the card reader
indicator stripe.
– Color for state low/high: If one I/O port is used for LED control, select the color to show for state low and
state high respectively.
– Idle color/LED1 color/LED2 color/LED1 + LED2 color: If two I/O ports are used for LED control, select the
colors to show for idle, LED1, LED2, and LED1 + LED2 respectively.
– Keypress format: Select how to format the PIN when it’s sent to the access control unit.
– FourBit: PIN 1234 is encoded and sent as 0x1 0x2 0x3 0x4. This is the default and most common behaviour.
– EightBitZeroPadded: PIN 1234 is encoded and sent as 0x01 0x02 0x03 0x04.
– EightBitInvertPadded: PIN 1234 is encoded and sent as 0xE1 0xD2 0xC3 0xB4.
– Wiegand26: The PIN is encoded in Wiegand26 format with an 8 bit facility code and a 16 bit id.
– Wiegand34: The PIN is encoded in a Wiegand34 format with a 16 bit facility code and a 16 bit id.
– Wiegand37: The PIN is encoded in a Wiegand37 format (H10302) with a 35 bit id.
– Wiegand37FacilityCode: The PIN is encoded in a Wiegand37 format (H10304) with a 16 bit facility code and
a 19 bit id.
– Facility code: Enter the facility code to be sent. This option is only available for some keypress formats.
Output format
Select data format: Select in which format to send card data to the access
control unit.
· Raw: Transmits the card data as it is. · Wiegand26: Encodes the card data in
Wiegand26 format with an 8 bit facility code and a 16 bit id. · Wiegand34:
Encodes the card data in Wiegand34 format with a 16 bit facility code and a 16
bit id. · Wiegand37: Encodes the card data in Wiegand37 format (H10302) with a
35 bit id. · Wiegand37FacilityCode: Encodes the card data in Wiegand37 format
(H10304) with a 16 bit facility code and
a 19 bit id. · Custom: Define your own formatting. Facility code override
mode: Select an option for overriding the facility code.
· Auto: Doesn’t override the facility code, and creates a facility code from
the input data auto detection. Either uses the card’s original facility code,
or forges it from excess bits of a card number.
· Optional: Uses the facility code from the input data, or overrides with a
configured optional value. · Override: Always overrides with a specified
facility code.
PIN
The PIN settings must match the ones configured in the access control unit.
26
AXIS I8116-E Network Video Intercom
The web interface
Length (032): Enter the number of digits in the PIN. If users aren’t required
to use a PIN when they use the reader, set the length to 0.
Timeout (seconds, 350): Enter the number of seconds that need to pass before
the device returns to idle mode when no PIN is received.
External reader
OSDP: Turn on to use the device with an external reader. Connect the reader to
the reader connector.
Status:
· Connected: The device is connected to the active external reader. ·
Connecting: The device is trying to connect to the external reader. · Not
connected: OSDP is turned off.
Audio
Device settings
Input: Turn on or off audio input. Shows the type of input. Noise
cancellation: Turn on to improve audio quality by removing background noise.
Input type
: Select the type of input, for instance, if it’s internal microphone or line.
Power type
: Select power type for your input.
Apply changes
: Apply your selection.
Separate gain controls
: Turn on to adjust the gain separately for the different input types.
Automatic gain control
: Turn on to dynamically adapt the gain to changes in the sound.
Gain: Use the slider to change the gain. Click the microphone icon to mute or unmute.
Output: Shows the type of output.
Gain: Use the slider to change the gain. Click the speaker icon to mute or unmute.
Stream
Echo cancellation: Turn on to remove echoes during two-way communication.
27
AXIS I8116-E Network Video Intercom
The web interface
Audio clips
Add clip: Add a new audio clip. You can use .au, .mp3, .opus, .vorbis, .wav
files. Play the audio clip. Stop playing the audio clip. The context menu
contains:
· Rename: Change the name of the audio clip. · Create link: Create a URL that,
when used, plays the audio clip on the device. Specify the volume and number
of times to play the clip. · Download: Download the audio clip to your
computer. · Delete: Delete the audio clip from the device.
Recordings
Ongoing recordings: Show all ongoing recordings on the camera. Start a
recording on the camera. Choose which storage device to save to. Stop a
recording on the camera.
Triggered recordings will end when manually stopped or when the camera is shut
down. Continuous recordings will continue until manually stopped. Even if the
camera is shut down, the recording will continue when the camera starts up
again.
Play the recording. Stop playing the recording.
Show or hide information and options about the recording. Set export range: If
you only want to export part of the recording, enter a time span. Encrypt:
Select to set a password for exported recordings. It will not be possible to
open the exported file without the password.
Click to delete a recording. Export: Export the whole or a part of the
recording.
28
AXIS I8116-E Network Video Intercom
The web interface
Click to filter the recordings. From: Show recordings done after a certain
point in time. To: Show recordings up until a certain point in time. Source :
Show recordings based on source. The source refers to the sensor. Event: Show
recordings based on events. Storage: Show recordings based on storage type.
Apps
Add app: Install a new app. Find more apps: Find more apps to install. You
will be taken to an overview page of Axis apps. Allow unsigned apps: Turn on
to allow installation of unsigned apps. Allow root-privileged apps: Turn on to
allow apps with root privileges full access to the device. Note
The device’s performance might be affected if you run several apps at the same
time.
Use the switch next to the app name to start or stop the app. Open: Access the
app’s settings. The available settings depend on the application. Some
applications don’t have any settings.
The context menu can contain one or more of the following options: · Open-
source license: View information about open-source licenses used in the app. ·
App log: View a log of the app events. The log is helpful when you contact
support. · Activate license with a key: If the app requires a license, you
need to activate it. Use this option if your device doesn’t have internet
access. If you don’t have a license key, go to axis.com/products/analytics.
You need a license code and the Axis product serial number to generate a
license key. · Activate license automatically: If the app requires a license,
you need to activate it. Use this option if your device has internet access.
You need a license code to activate the license. · Deactivate the license:
Deactivate the license to use it in another device. If you deactivate the
license, you also remove it from the device. To deactivate the license
requires internet access. · Settings: Configure the parameters. · Delete:
Delete the app permanently from the device. If you don’t deactivate the
license first, it remains active.
System
Date and time
The time format depends on the web browser’s language settings. Note
We recommend you synchronize the device’s date and time with an NTP server.
29
AXIS I8116-E Network Video Intercom
The web interface
Synchronization: Select an option for the device’s date and time
synchronization.
· Automatic date and time (manual NTS KE servers): Synchronize with the secure
NTP key establishment servers connected to the DHCP server. – Manual NTS KE
servers: Enter the IP address of one or two NTP servers. When you use two NTP
servers, the device synchronizes and adapts its time based on input from both.
· Automatic date and time (NTP servers using DHCP): Synchronize with the NTP
servers connected to the DHCP server. – Fallback NTP servers: Enter the IP
address of one or two fallback servers.
· Automatic date and time (manual NTP servers): Synchronize with NTP servers
of your choice. – Manual NTP servers: Enter the IP address of one or two NTP
servers. When you use two NTP servers, the device synchronizes and adapts its
time based on input from both.
· Custom date and time: Manually set the date and time. Click Get from system
to fetch the date and time settings once from your computer or mobile device.
Time zone: Select which time zone to use. Time will automatically adjust to
daylight saving time and standard time.
Note
The system uses the date and time settings in all recordings, logs, and system
settings.
Configuration check
Click the buttons in the image to simulate real key presses. This allows you
to try out configurations or troubleshoot the hardware without having physical
access to the device.
Interactive device image: Click the buttons in the image to simulate real key
presses. This allows you to try out configurations or troubleshoot the
hardware without having physical access to the device.
Latest credentials
: Shows information about the credentials that were last registered.
Invert the byte order of the card number and UID respectively.
Show the latest credentials data.
Check credentials
: Enter a UID or a PIN and submit to check the credentials. The system will respond in the same way as
if you used the credentials at the device. If both UID and PIN is required, start by entering the UID.
Network
IPv4
Assign IPv4 automatically: Select to let the network router assign an IP
address to the device automatically. We recommend automatic IP (DHCP) for most
networks.
IP address: Enter a unique IP address for the device. Static IP addresses can
be assigned at random within isolated networks, provided that each address is
unique. To avoid conflicts, we recommend you contact your network
administrator before you assign a static IP address.
Subnet mask: Enter the subnet mask to define what addresses are inside the
local area network. Any address outside the local area network goes through
the router.
Router: Enter the IP address of the default router (gateway) used to connect
devices that are attached to different networks and network segments.
Fallback to static IP address if DHCP isn’t available: Select if you want to
add a static IP address to use as fallback if DHCP is unavailable and can’t
assign an IP address automatically.
IPv6
30
AXIS I8116-E Network Video Intercom
The web interface
Assign IPv6 automatically: Select to turn on IPv6 and to let the network
router assign an IP address to the device automatically.
Hostname Assign hostname automatically: Select to let the network router
assign a hostname to the device automatically. Hostname: Enter the hostname
manually to use as an alternative way of accessing the device. The server
report and system log use the hostname. Allowed characters are AZ, az, 09
and -.
DNS servers Assign DNS automatically: Select to let the DHCP server assign
search domains and DNS server addresses to the device automatically. We
recommend automatic DNS (DHCP) for most networks. Search domains: When you use
a hostname that is not fully qualified, click Add search domain and enter a
domain in which to search for the hostname the device uses. DNS servers: Click
Add DNS server and enter the IP address of the DNS server. This provides the
translation of hostnames to IP addresses on your network.
HTTP and HTTPS HTTPS is a protocol that provides encryption for page requests
from users and for the pages returned by the web server. The encrypted
exchange of information is governed by the use of an HTTPS certificate, which
guarantees the authenticity of the server. To use HTTPS on the device, you
must install an HTTPS certificate. Go to System > Security to create and
install certificates.
Allow access through: Select if a user is allowed to connect to the device
through the HTTP, HTTPS, or both HTTP and HTTPS protocols. Note
If you view encrypted web pages through HTTPS, you might experience a drop in
performance, especially when you request a page for the first time.
HTTP port: Enter the HTTP port to use. The device allows port 80 or any port
in the range 1024-65535. If you are logged in as an administrator, you can
also enter any port in the range 1-1023. If you use a port in this range, you
get a warning. HTTPS port: Enter the HTTPS port to use. The device allows port
443 or any port in the range 1024-65535. If you are logged in as an
administrator, you can also enter any port in the range 1-1023. If you use a
port in this range, you get a warning. Certificate: Select a certificate to
enable HTTPS for the device.
Network discovery protocols Bonjour®: Turn on to allow automatic discovery on
the network. Bonjour name: Enter a friendly name to be visible on the network.
The default name is the device name and MAC address. UPnP®: Turn on to allow
automatic discovery on the network. UPnP name: Enter a friendly name to be
visible on the network. The default name is the device name and MAC address.
WS-Discovery: Turn on to allow automatic discovery on the network.
One-click cloud connection One-click cloud connection (O3C) together with an
O3C service provides easy and secure internet access to live and recorded
video from any location. For more information, see axis.com/end-to-end-
solutions/hosted-services.
31
AXIS I8116-E Network Video Intercom
The web interface
Allow O3C:
· One-click: This is the default setting. Press and hold the control button on
the device to connect to an O3C service over the internet. You need to
register the device with the O3C service within 24 hours after you press the
control button. Otherwise, the device disconnects from the O3C service. Once
you register the device, Always is enabled and the device stays connected to
the O3C service.
· Always: The device constantly attempts to connect to an O3C service over the
internet. Once you register the device, it stays connected to the O3C service.
Use this option if the control button on the device is out of reach.
· No: Disables the O3C service. Proxy settings: If needed, enter the proxy
settings to connect to the proxy server.
Host: Enter the proxy server’s address.
Port: Enter the port number used for access.
Login and Password: If needed, enter username and password for the proxy
server.
Authentication method:
· Basic: This method is the most compatible authentication scheme for HTTP.
It’s less secure than the Digest method because it sends the username and
password unencrypted to the server.
· Digest: This method is more secure because it always transfers the password
encrypted across the network. · Auto: This option lets the device select the
authentication method depending on the supported methods. It prioritizes
the Digest method over the Basic method. Owner authentication key (OAK): Click
Get key to fetch the owner authentication key. This is only possible if the
device is connected to the internet without a firewall or proxy.
SNMP
The Simple Network Management Protocol (SNMP) allows remote management of
network devices.
SNMP: Select the version of SNMP to use.
· v1 and v2c: – Read community: Enter the community name that has read-only
access to all supported SNMP objects. The default value is public. – Write
community: Enter the community name that has read or write access to all
supported SNMP objects (except read-only objects). The default value is write.
– Activate traps: Turn on to activate trap reporting. The device uses traps to
send messages for important events or status changes to a management system.
In the web interface, you can set up traps for SNMP v1 and v2c. Traps are
automatically turned off if you change to SNMP v3 or turn off SNMP. If you use
SNMP v3, you can set up traps through the SNMP v3 management application. –
Trap address: Enter the IP address or host name of the management server. –
Trap community: Enter the community to use when the device sends a trap
message to the management system. – Traps: – Cold start: Sends a trap message
when the device starts. – Warm start: Sends a trap message when you change an
SNMP setting. – Link up: Sends a trap message when a link changes from down to
up. – Authentication failed: Sends a trap message when an authentication
attempt fails.
Note All Axis Video MIB traps are enabled when you turn on SNMP v1 and v2c
traps. For more information, see AXIS OS Portal > SNMP.
· v3: SNMP v3 is a more secure version, which provides encryption and secure
passwords. To use SNMP v3, we recommend you to activate HTTPS, as the password
is then sent through HTTPS. This also prevents unauthorized parties’ access to
unencrypted SNMP v1 and v2c traps. If you use SNMP v3, you can set up traps
through the SNMP v3 management application. – Password for the account
“initial”: Enter the SNMP password for the account named “initial”. Although
the password can be sent without activating HTTPS, we don’t recommend it. The
SNMP v3 password can only
32
AXIS I8116-E Network Video Intercom
The web interface
be set once, and preferably only when HTTPS is enabled. Once the password is
set, the password field is no longer displayed. To set the password again, you
must reset the device to factory default settings.
Security
Certificates
Certificates are used to authenticate devices on a network. The device
supports two types of certificates: · Client/server certificates A
client/server certificate validates the device’s identity, and can be self-
signed or issued by a Certificate Authority (CA). A self-signed certificate
offers limited protection and can be used before you obtain a CA-issued
certificate. · CA certificates You can use a CA certificate to authenticate a
peer certificate, for example, to validate the identity of an authentication
server when the device connects to a network protected by IEEE 802.1X. The
device has several pre-installed CA certificates.
These formats are supported: · Certificate formats: .PEM, .CER, and .PFX ·
Private key formats: PKCS#1 and PKCS#12
Important If you reset the device to factory default, all certificates are
deleted. Any pre-installed CA certificates are reinstalled.
Filter the certificates in the list.
Add certificate : Click to add a certificate.
The context menu contains: · Certificate information: View an installed
certificate’s properties. · Delete certificate: Delete the certificate. ·
Create certificate signing request: Create a certificate signing request to
send to a registration authority to apply for a digital identity certificate.
IEEE 802.1x
IEEE 802.1x is an IEEE standard for port-based network admission control
providing secure authentication of wired and wireless network devices. IEEE
802.1x is based on EAP (Extensible Authentication Protocol). To access a
network protected by IEEE 802.1x, network devices must authenticate
themselves. The authentication is performed by an authentication server,
typically a RADIUS server (for example, FreeRADIUS and Microsoft Internet
Authentication Server). Certificates When configured without a CA certificate,
server certificate validation is disabled and the device tries to authenticate
itself regardless of what network it is connected to. When using a
certificate, in Axis’ implementation, the device and the authentication server
authenticate themselves with digital certificates using EAP-TLS (Extensible
Authentication Protocol – Transport Layer Security). To allow the device to
access a network protected through certificates, you must install a signed
client certificate on the device. Client certificate: Select a client
certificate to use IEEE 802.1x. The authentication server uses the certificate
to validate the client’s identity. CA certificate: Select a CA certificate to
validate the authentication server’s identity. When no certificate is
selected, the device tries to authenticate itself regardless of what network
it is connected to.
33
AXIS I8116-E Network Video Intercom
The web interface
EAP identity: Enter the user identity associated with the client certificate.
EAPOL version: Select the EAPOL version that is used in the network switch.
Use IEEE 802.1x: Select to use the IEEE 802.1x protocol.
Prevent brute-force attacks
Blocking: Turn on to block brute-force attacks. A brute-force attack uses
trial-and-error to guess login info or encryption keys. Blocking period: Enter
the number of seconds to block a brute-force attack. Blocking conditions:
Enter the number of authentication failures allowed per second before the
block starts. You can set the number of failures allowed both on page level
and device level.
IP address filter
Use filter: Select to filter which IP addresses are allowed to access the
device. Policy: Choose whether to Allow access or Deny access for certain IP
addresses. Addresses: Enter the IP numbers that are either allowed or denied
access to the device. You can also use the CIDR format.
Custom-signed firmware certificate
To install test firmware or other custom firmware from Axis on the device, you
need a custom-signed firmware certificate. The certificate verifies that the
firmware is approved by both the device owner and Axis. The firmware can only
run on a specific device which is identified by its unique serial number and
chip ID. Custom-signed firmware certificates can only be created by Axis,
since Axis holds the key to sign them. Click Install to install the
certificate. You need to install the certificate before you install the
firmware.
Users
Users
Add user: Click to add a new user. You can add up to 100 users. Username:
Enter a unique username. New password: Enter a password for the user.
Passwords must be 1 to 64 characters long. Only ASCII printable characters
(code 32 to 126) are allowed in the password, for example letters, numbers,
punctuation, and some symbols. Repeat password: Enter the same password again.
Role:
· Administrator: Has full access to all settings. Administrators can also add,
update, and remove other users. · Operator: Has access to all settings except:
– All System settings. – Adding apps. · Viewer: Has access to: – Watch and
take snapshots of a video stream. – Watch and export recordings. – With PTZ
user access: pan, tilt, and zoom.
The context menu contains: Update user: Edit the user’s properties.
34
AXIS I8116-E Network Video Intercom
The web interface
Delete user: Delete the user. You can’t delete the root user.
Anonymous users Allow anonymous viewers: Turn on to allow anyone to access the
device as a viewer without having to log in with a user account. Allow
anonymous PTZ operators: Turn on to allow anonymous users to pan, tilt, and
zoom the image.
Events
Rules A rule defines the conditions that must be met for the product to
perform an action. The list shows all the currently configured rules in the
product. Note You can create up to 256 action rules.
Add a rule: Click to create a rule. Name: Enter a name for the rule. Wait
between actions: Enter the minimum time (hh:mm:ss) that must pass between rule
activations. It is useful if the rule is activated by for example day-night
mode conditions, to avoid that small light changes during sunrise and sunset
activate the rule repeatedly. Condition: Select a condition from the list. A
condition must be met for the device to perform an action. If multiple
conditions are defined, all of them must be met to trigger the action. For
information about specific conditions, see Get started with rules for events.
Use this condition as a trigger: Select to make this first condition function
only as a starting trigger. It means that once the rule is activated it
remains active for as long as all the other conditions are met, no matter the
state of the first condition. If you don’t select this option, the rule will
simply be active whenever all the conditions are met. Invert this condition:
Select if you want the condition to be the opposite of your selection.
Add a condition: Click to add an additional condition. Action: Select an
action from the list and enter its required information. For information about
specific actions, see Get started with rules for events.
Recipients You can set up your device to notify recipients about events or
send files. The list shows all the recipients currently configured in the
product, along with information about their configuration. Note You can create
up to 20 recipients.
Add a recipient: Click to add a recipient. Name: Enter a name for the
recipient. Type: Select from the list:
35
AXIS I8116-E Network Video Intercom
The web interface
· FTP – Host: Enter the server’s IP address or hostname. If you enter a
hostname, make sure that a DNS server is specified under System > Network >
IPv4 and IPv6. – Port: Enter the port number used by the FTP server. The
default is 21. – Folder: Enter the path to the directory where you want to
store files. If this directory doesn’t already exist on the FTP server, you
will get an error message when uploading files. – Username: Enter the username
for the login. – Password: Enter the password for the login. – Use temporary
file name: Select to upload files with temporary, automatically generated
filenames. The files get renamed to the desired names when the upload
completes. If the upload is aborted/interrupted, you don’t get any corrupt
files. However, you probably still get the temporary files. This way you know
that all files that have the desired name, are correct. – Use passive FTP:
Under normal circumstances the product simply requests the target FTP server
to open the data connection. The device actively initiates both the FTP
control and data connections to the target server. This is normally needed if
there is a firewall between the device and the target FTP server.
· HTTP – URL: Enter the network address to the HTTP server and the script that
will handle the request. For example: http://192.168.254.10/cgi-
bin/notify.cgi. – Username: Enter the username for the login. – Password:
Enter the password for the login. – Proxy: Turn on and enter the required
information if a proxy server must be passed to connect to the HTTP server.
· HTTPS – URL: Enter the network address to the HTTPS server and the script
that will handle the request. For example: https://192.168.254.10/cgi-
bin/notify.cgi. – Validate server certificate: Select to validate the
certificate that was created by HTTPS server. – Username: Enter the username
for the login. – Password: Enter the password for the login. – Proxy: Turn on
and enter the required information if a proxy server must be passed to connect
to the HTTPS server.
· Network storage You can add network storage such as a NAS (Network Attached
Storage) and use it as a recipient to store files. The files are stored in the
Matroska (MKV) file format. – Host: Enter the IP address or hostname for the
network storage. – Share: Enter the name of the share on the host. – Folder:
Enter the path to the directory where you want to store files. – Username:
Enter the username for the login. – Password: Enter the password for the
login.
· SFTP – Host: Enter the server’s IP address or hostname. If you enter a
hostname, make sure that a DNS server is specified under System > Network >
IPv4 and IPv6. – Port: Enter the port number used by the SFTP server. The
default is 22. – Folder: Enter the path to the directory where you want to
store files. If this directory doesn’t already exist on the SFTP server, you
will get an error message when uploading files. – Username: Enter the username
for the login. – Password: Enter the password for the login. – SSH host public
key type (MD5): Enter the fingerprint of the remote host’s public key (a
32-digit hexadecimal string). The SFTP client supports SFTP servers using
SSH-2 with RSA, DSA, ECDSA, and ED25519 host key types. RSA is the preferred
method during negotiation, followed by ECDSA, ED25519, and DSA. Make sure to
enter the right MD5 host key that is used by your SFTP server. While the Axis
device supports both MD5 and SHA-256 hash keys, we recommend using SHA-256 due
to stronger security over MD5. For more information on how to configure an
SFTP server with an Axis device, go to the AXIS OS Portal. – SSH host public
key type (SHA256): Enter the fingerprint of the remote host’s public key (a
43-digit Base64 encoded string). The SFTP client supports SFTP servers using
SSH-2 with RSA, DSA, ECDSA, and ED25519 host key types. RSA is the preferred
method during negotiation, followed by ECDSA, ED25519, and DSA. Make sure to
enter the right MD5 host key that is used by your SFTP server. While the Axis
device supports both MD5 and SHA-256 hash keys, we recommend using SHA-256 due
to stronger security over MD5. For more information on how to configure an
SFTP server with an Axis device, go to the AXIS OS Portal. – Use temporary
file name: Select to upload files with temporary, automatically generated
filenames. The files get renamed to the desired names when the upload
completes. If the upload is aborted/interrupted,
36
AXIS I8116-E Network Video Intercom
The web interface
you don’t get any corrupt files. However, you probably still get the temporary files. This way you know that all files that have the desired name, are correct.
· SIP or VMS
:
SIP: Select to make a SIP call.
VMS: Select to make a VMS call.
– From SIP account: Select from the list.
– To SIP address: Enter the SIP address.
– Test: Click to test that your call settings works.
– Send email to: Enter the email address to send emails to. To enter multiple addresses, use commas to
separate them.
– Send email from: Enter the email address of the sending server.
– Username: Enter the username for the mail server. Leave this field empty if the mail server does not
require authentication.
– Password: Enter the password for the mail server. Leave this field empty if the mail server does not require
authentication.
– Email server (SMTP): Enter the name of the SMTP server, for example smtp.gmail.com, smtp.mail.yahoo.com.
– Port: Enter the port number for the SMTP server, using values in the range 0-65535. The default value is 587.
– Encryption: To use encryption, select either SSL or TLS.
– Validate server certificate: If you use encryption, select to validate the identity of the device. The certificate
can be self-signed or issued by a Certificate Authority (CA).
– POP authentication: Turn on to enter the name of the POP server, for example pop.gmail.com.
Note
Some email providers have security filters that prevent users from receiving or viewing large amount of attachments, from receiving scheduled emails and similar. Check the email provider’s security policy to avoid your email account being locked or missing out on your expected emails.
· TCP – Host: Enter the server’s IP address or hostname. If you enter a
hostname, make sure that a DNS server is specified under System > Network >
IPv4 and IPv6. – Port: Enter the port number used to access the server.
Test: Click to test the setup.
The context menu contains: View recipient: Click to view all the recipient
details. Copy recipient: Click to copy a recipient. When you copy, you can
make changes to the new recipient. Delete recipient: Click to delete the
recipient permanently.
Schedules
Schedules and pulses can be used as conditions in rules. The list shows all
the schedules and pulses currently configured in the product, along with
information about their configuration.
Add schedule: Click to create a schedule or pulse.
Manual triggers
The manual trigger is used to manually trigger a rule. The manual trigger can
for example be used to validate actions during product installation and
configuration.
37
AXIS I8116-E Network Video Intercom
The web interface
MQTT
MQTT (Message Queuing Telemetry Transport) is a standard messaging protocol
for the Internet of Things (IoT). It was designed for simplified IoT
integration and is used in a wide variety of industries to connect remote
devices with a small code footprint and minimal network bandwidth. The MQTT
client in Axis device firmware can simplify integration of data and events
produced in the device to systems which are not video management software
(VMS). Set up the device as an MQTT client. MQTT communication is based on two
entities, the clients and the broker. The clients can send and receive
messages. The broker is responsible for routing messages between clients. You
can learn more about MQTT in AXIS OS Portal.
ALPN
ALPN is a TLS/SSL extension that allows for the selection of an application
protocol during the handshake phase of the connection between the client and
server. This is used to enable MQTT traffic over the same port that is used
for other protocols, such as HTTP. In some cases, there might not be a
dedicated port open for MQTT communication. A solution in such cases is to use
ALPN to negotiate the use of MQTT as the application protocol on a standard
port, allowed by the firewalls.
MQTT client
Connect: Turn on or off the MQTT client. Status: Shows the current status of
the MQTT client. Broker Host: Enter the hostname or IP address of the MQTT
server. Protocol: Select which protocol to use. Port: Enter the port number.
· 1883 is the default value for MQTT over TCP · 8883 is the default value for
MQTT over SSL · 80 is the default value for MQTT over WebSocket · 443 is the
default value for MQTT over WebSocket Secure ALPN protocol: Enter the ALPN
protocol name provided by your MQTT broker provider. This is only applicable
with MQTT over SSL and MQTT over WebSocket Secure. Username: Enter the
username that the client will use to access the server. Password: Enter a
password for the username. Client ID: Enter a client ID. The client identifier
is sent to the server when the client connects to it. Clean session: Controls
the behavior at connection and disconnection time. When selected, the state
information is discarded at connect and disconnect. Keep alive interval: The
keep alive interval enables the client to detect when the server is no longer
available without having to wait for the long TCP/IP timeout. Timeout: The
time interval in seconds to allow a connect to complete. Default value: 60
Device topic prefix: Used in the default values for the topic in the connect
message and LWT message on the MQTT client tab, and in the publication
conditions on the MQTT publication tab. Reconnect automatically: Specifies
whether the client should reconnect automatically after a disconnect. Connect
message Specifies if a message should be sent out when a connection is
established.
38
AXIS I8116-E Network Video Intercom
The web interface
Send message: Turn on to send messages. Use default: Turn off to enter your
own default message. Topic: Enter the topic for the default message. Payload:
Enter the content for the default message. Retain: Select to keep the state of
client on this Topic QoS: Change the QoS layer for the packet flow. Last Will
and Testament message The Last Will Testament (LWT) lets a client provide a
testament along with its credentials when connecting to the broker. If the
client disconnects ungracefully at some point later (maybe because his power
source died), it can let the broker deliver a message to other clients. This
LWT message has the same form as an ordinary message and gets routed via the
same mechanics. Send message: Turn on to send messages. Use default: Turn off
to enter your own default message. Topic: Enter the topic for the default
message. Payload: Enter the content for the default message. Retain: Select to
keep the state of client on this Topic QoS: Change the QoS layer for the
packet flow. MQTT publication Use default topic prefix: Select to use the
default topic prefix, that is defined in the device topic prefix in the MQTT
client tab. Include topic name: Select to include the topic that describes the
condition in the MQTT topic. Include topic namespaces: Select to include ONVIF
topic namespaces in the MQTT topic. Include serial number: Select to include
the device’s serial number in the MQTT payload.
Add condition: Click to add a condition. Retain: Defines which MQTT messages
are sent as retained.
· None: Send all messages as non-retained. · Property: Send only stateful
messages as retained. · All: Send both stateful and stateless messages as
retained. QoS: Select the desired level for the MQTT publication. MQTT
subscriptions
39
AXIS I8116-E Network Video Intercom
The web interface
Add subscription: Click to add a new MQTT subscription. Subscription filter:
Enter the MQTT topic that you want to subscribe to. Use device topic prefix:
Add the subscription filter as prefix to the MQTT topic. Subscription type:
· Stateless: Select to convert MQTT messages into a stateless message. ·
Stateful: Select to convert MQTT messages into a condition. The payload is
used as the state. QoS: Select the desired level for the MQTT subscription.
MQTT overlays
Note Connect to an MQTT broker before you add MQTT overlay modifiers.
Add overlay modifier: Click to add a new overlay modifier. Topic filter: Add
the MQTT topic that contains the data you want to show in the overlay. Data
field: Specify the key for the message payload that you want to show in the
overlay, assuming the message is in JSON format. Modifier: Use the resulting
modifier when you create the overlay.
· Modifiers that start with #XMP show all of the data received from the topic.
· Modifiers that start with #XMD show the data specified in the data field.
Storage
Network storage
Ignore: Turn on to ignore network storage. Add network storage: Click to add a
network share where you can save recordings.
· Address: Enter the IP address or host name of the host server, typically a
NAS (Network Attached Storage). We recommend you to configure the host to use
a fixed IP address (not DHCP since a dynamic IP address can change) or that
you use DNS. Windows SMB/CIFS names are not supported.
· Network share: Enter the name of the shared location on the host server.
Several Axis devices can use the same network share, since each device gets
its own folder.
· User: If the server requires a login, enter the username. To log in to a
specific domain server, type DOMAINusername.
· Password: If the server requires a login, enter the password. · SMB version:
Select the SMB storage protocol version to connect to the NAS. If you select
Auto, the device tries
to negotiate one of the secure versions SMB: 3.02, 3.0, or 2.1. Select 1.0 or
2.0 to connect to older NAS that don’t support higher versions. You can read
more about SMB support in Axis devices here. · Add share even if connection
test fails: Select to add the network share even if an error is discovered
during the connection test. The error can be, for example, that you didn’t
enter a password even though the server requires one. Remove network storage:
Click to unmount, unbind and remove the connection to the network share. This
removes all settings for the network share. Unbind: Click to unbind and
disconnect the network share. Bind: Click to bind and connect the network
share. Unmount: Click to unmount the network share. Mount: Click to mount the
network share.
40
AXIS I8116-E Network Video Intercom
The web interface
Write protect: Turn on to stop writing to the network share and protect
recordings from being removed. You can’t format a write-protected network
share. Retention time: Select how long to keep recordings, to limit the amount
of old recordings or to comply with regulations regarding data storage. If the
network storage becomes full, old recordings are removed before the selected
time period has passed. Tools
· Test connection: Test the connection to the network share. · Format: Format
the network share, for example when you need to quickly erase all data. CIFS
is the available
file system option. Click Use tool to activate the selected tool.
Onboard storage
Important Risk of data loss and corrupted recordings. Do not remove the SD
card while the device is running. Unmount the SD card before you remove it.
Unmount: Click to safely remove the SD card. Write protect: Turn on to stop
writing to the SD card and protect recordings from being removed. You can’t
format a write-protected SD card. Autoformat: Turn on to automatically format
a newly inserted SD card. It formats the file system into ext4. Ignore: Turn
on to stop storing recordings on the SD card. When you ignore the SD card, the
device no longer recognizes that the card exists. The setting is only
available for administrators. Retention time: Select how long to keep
recordings, to limit the amount of old recordings or to comply with
regulations regarding data storage. If the SD card becomes full, old
recordings are removed before the selected time period has passed. Tools
· Check: Check for errors on the SD card. This only works for the ext4 file
system. · Repair: Repair errors in the ext4 file system. To repair an SD card
with the VFAT file system, eject the SD card, insert it
in a computer and perform a disk repair. · Format: Format the SD card, for
example when you need to change the file system or quickly erase all data.
VFAT
and ext4 are the two available file system options. The recommended format is
ext4, due to its resilience against data loss if the card is ejected or if
there is an abrupt power loss. However, you need a third-party ext4 driver or
application to access the file system from Windows®. · Encrypt: Use this tool
to format the SD card and enable encryption. Encrypt deletes all data stored
on the SD card. After using Encrypt data that’s stored on the SD card is
protected using encryption. · Decrypt: Use this tool to format the SD card
without encryption. Decrypt deletes all data stored on the SD card. After
using Decrypt data that’s stored on the SD card is not protected using
encryption. · Change password: Change the password required to encrypt the SD
card. Click Use tool to activate the selected tool. Wear trigger: Set a value
for the SD card wear level at which you want to trigger an action. The wear
level ranges from 0200%. A new SD card that has never been used has a wear
level of 0%. A wear level of 100% indicates that the SD card is close to its
expected lifetime. When the wear-level reaches 200% there is a high risk of
the SD card malfunctioning. We recommend setting the wear trigger between
8090%. This gives you time to download any recordings as well as replace the
SD card in time before it potentially wears out. The wear trigger allows you
to set up an event and get a notification when the wear level reaches your set
value.
41
AXIS I8116-E Network Video Intercom
The web interface
Stream profiles
A stream profile is a group of settings that affect the video stream. You can
use stream profiles in different situations, for example when you create
events and use rules to record.
Click
to create a new stream profile.
Preview: A preview of the video stream with the stream profile settings you select. The preview updates when you change the settings on the page. If your device has different view areas, you can change the view area in the drop-down in the bottom left corner of the image.
Name: Add a name for your profile.
Description: Add a description of your profile.
Video codec: Select the video codec that should apply for the profile.
Resolution: See Stream on page 23 for a description of this setting.
Frame rate: See Stream on page 23 for a description of this setting.
Compression: See Stream on page 23 for a description of this setting.
Zipstream
: See Stream on page 23 for a description of this setting.
Optimize for storage
: See Stream on page 23 for a description of this setting.
Dynamic FPS
: See Stream on page 23 for a description of this setting.
Dynamic GOP
: See Stream on page 23 for a description of this setting.
Mirror
: See Stream on page 23 for a description of this setting.
GOP length
: See Stream on page 23 for a description of this setting.
Bitrate control: See Stream on page 23 for a description of this setting.
Include overlays: Select what type of overlays to include. See Overlays on page 25 for information about how to add overlays.
Include audio
: See Stream on page 23 for a description of this setting.
ONVIF
ONVIF users
42
AXIS I8116-E Network Video Intercom
The web interface
ONVIF (Open Network Video Interface Forum) is a global interface standard that
makes it easier for end-users, integrators, consultants, and manufacturers to
take advantage of the possibilities offered by network video technology. ONVIF
enables interoperability between different vendor products, increased
flexibility, reduced cost and future-proof systems. When you create an ONVIF
user, you automatically enable ONVIF communication. Use the username and
password for all ONVIF communication with the device. For more information see
the Axis Developer Community at axis.com.
Add user: Click to add a new ONVIF user. Username: Enter a unique username.
New password: Enter a password for the user. Passwords must be 1 to 64
characters long. Only ASCII printable characters (code 32 to 126) are allowed
in the password, for example letters, numbers, punctuation, and some symbols.
Repeat password: Enter the same password again Role:
· Administrator: Has full access to all settings. Administrators can also add,
update, and remove other users. · Operator: Has access to all settings except:
– All System settings. – Adding apps. · Media user: Allows access to the video
stream only. The context menu contains: Update user: Edit the user’s
properties. Delete user: Delete the user. You can’t delete the root user.
ONVIF media profiles An ONVIF media profile consists of a set of
configurations that you can use to change media stream settings.
Add media profile: Click to add a new ONVIF media profile. profile_x: Click a
profile to edit.
Analytics metadata
Metadata producers Metadata producers lists the channels used by apps and the
metadata they are streaming from the device. Producer: The app producing the
metadata. Channel: The channel used by the app. Check to enable the metadata
stream. Uncheck to disable the stream for compatibility or resources
management reasons.
Detectors
Camera tampering
43
AXIS I8116-E Network Video Intercom
The web interface
The camera tampering detector generates an alarm when the scene changes, for
example because the lens is covered, sprayed or severely put out of focus, and
the time in Trigger delay has passed. The tampering detector only activates
when the camera has not moved for at least 10 seconds. During this period the
detector sets up a scene model to use as a comparison to detect tampering in
current images. For the scene model to be set up properly, make sure that the
camera is in focus, the lighting conditions are correct, and the camera
doesn’t point at a scene that lacks contours, for example a blank wall. Camera
tampering can be used as a condition to trigger actions.
Trigger delay: Enter the minimum time that the tampering conditions must be
active before the alarm triggers. This can help prevent false alarms for known
conditions that affect the image.
Trigger on dark images: It is very difficult to generate alarms when the
camera lens is sprayed, since it is impossible to distinguish that event from
other situations where the image turns dark in a similar way, for example when
the lighting conditions change. Turn on this parameter to generate alarms for
all cases where the image turns dark. When it’s turned off, the device doesn’t
generate any alarm when the image turns dark.
Note For detection of tampering attempts in static and non-crowded scenes.
Audio detection
These settings are available for each audio input.
Sound level: Adjust the sound level to a value from 0100, where 0 is the most
sensitive and 100 the least sensitive. Use the activity indicator as a guide
when you set the sound level. When you create events, you can use the sound
level as a condition. You can choose to trigger an action if the sound level
rises above, falls below or passes the set value.
Shock detection
Shock detector: Turn on to generate an alarm if the device is hit by an object
or if it is tampered with.
Sensitivity level: Move the slider to adjust the sensitivity level at which
the device should generate an alarm. A low value means that the device only
generates an alarm if the hit is powerful. A high value means that the device
generates an alarm even with mild tampering.
Accessories
I/O ports
Use digital input to connect external devices that can toggle between an open
and closed circuit, for example PIR sensors, door or window contacts, and
glass break detectors.
Use digital output to connect external devices such as relays and LEDs. You
can activate connected devices through the VAPIX® Application Programming
Interface or in the web interface.
Port
Name: Edit the text to rename the port.
Direction:
indicates that the port is an input port.
indicates that it’s an output port. If the port is configurable,
you can click the icons to change between input and output.
Normal state: Click
open circuit, and
for closed circuit.
Current state: Shows the current state of the port. The input or output is activated when the current state is different from the normal state. An input on the device has an open circuit when it’s disconnected or when there is a voltage above 1 V DC.
44
AXIS I8116-E Network Video Intercom
The web interface
Note
During restart the output circuit is open. When the restart is complete, the
circuit goes back to the normal position. If you change any settings on this
page, the output circuits go back to their normal positions regardless of any
active triggers.
Supervised
: Turn on to make it possible to detect and trigger actions if someone tampers with the connection to digital
I/O devices. In addition to detecting if an input is open or closed, you can also detect if someone has tampered with it (that is, cut
or shorted). To supervise the connection requires additional hardware (end-of- line resistors) in the external I/O loop.
Logs
Reports and logs
Reports
· View the device server report: Click to show information about the product
status in a pop-up window. The Access Log is automatically included in the
Server Report.
· Download the device server report: Click to download the server report. It
creates a .zip file that contains a complete server report text file in UTF8
format, as well as a snapshot of the current live view image. Always include
the server report .zip file when you contact support.
· Download the crash report: Click to download an archive with detailed
information about the server’s status. The crash report contains information
that is in the server report as well as detailed debug information. This
report might contain sensitive information such as network traces. It can take
several minutes to generate the report.
Logs
· View the system log: Click to show information about system events such as
device startup, warnings and critical messages.
· View the access log: Click to show all failed attempts to access the device,
for example when a wrong login password is used.
Network trace
Important A network trace file might contain sensitive information, for
example certificates or passwords.
A network trace file can help you troubleshoot problems by recording activity
on the network. Trace time: Select the duration of the trace in seconds or
minutes, and click Download.
Remote system log
Syslog is a standard for message logging. It allows separation of the software
that generates messages, the system that stores them, and the software that
reports and analyzes them. Each message is labeled with a facility code, which
indicates the software type generating the message, and assigned a severity
level.
Server: Click to add a new server.
Host: Enter the hostname or IP address of the server.
Format: Select which syslog message format to use.
· RFC 3164 · RFC 5424 Protocol: Select the protocol and port to use:
· UDP (Default port is 514)
45
AXIS I8116-E Network Video Intercom
The web interface
· TCP (Default port is 601) · TLS (Default port is 6514) Severity: Select
which messages to send when triggered. CA certificate set: See the current
settings or add a certificate.
Plain config
Plain config is for advanced users with experience of Axis device
configuration. Most parameters can be set and edited from this page.
Maintenance
Restart: Restart the device. This does not affect any of the current settings.
Running applications restart automatically. Restore: Return most settings to
the factory default values. Afterwards you must reconfigure the device and
apps, reinstall any apps that didn’t come preinstalled, and recreate any
events and PTZ presets. Important
The only settings saved after restore are: · Boot protocol (DHCP or static) ·
Static IP address · Default router · Subnet mask · 802.1X settings · O3C
settings
Factory default: Return all settings to the factory default values. Afterwards
you must reset the IP address to make the device accessible. Note
All Axis device firmware is digitally signed to ensure that you only install
verified firmware on your device. This further increases the overall minimum
cybersecurity level of Axis devices. For more information, see the white paper
“Signed firmware, secure boot, and security of private keys” at axis.com.
Firmware upgrade: Upgrade to a new firmware version. New firmware releases can
contain improved functionality, bug fixes, and completely new features. We
recommend you to always use the latest release. To download the latest
release, go to axis.com/support. When you upgrade, you can choose between
three options:
· Standard upgrade: Upgrade to the new firmware version. · Factory default:
Upgrade and return all settings to the factory default values. When you choose
this option, you can’t
revert to the previous firmware version after the upgrade. · Autorollback:
Upgrade and confirm the upgrade within the set time. If you don’t confirm, the
device reverts to the
previous firmware version. Firmware rollback: Revert to the previously
installed firmware version.
46
AXIS I8116-E Network Video Intercom
Learn more
Learn more Voice over IP (VoIP)
Voice over IP (VoIP) is a group of technologies that enables voice
communication and multimedia sessions over IP networks, such as the internet.
In traditional phone calls, analog signals are sent through circuit
transmissions over the Public Switched Telephone Network (PSTN). In a VoIP
call, analog signals are turned into digital signals to make it possible to
send them in data packets across local IP networks or the internet. In the
Axis product, VoIP is enabled through the Session Initiation Protocol (SIP)
and Dual-Tone Multi-Frequency (DTMF) signaling. Example
When you press the call button on an Axis intercom, a call is initiated to one
or more predefined recipients. When a recipient replies, a call is
established. The voice and video is transferred through VoIP technologies.
Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is used to set up, maintain and
terminate VoIP calls. You can make calls between two or more parties, called
SIP user agents. To make a SIP call you can use, for example, SIP phones,
softphones or SIP-enabled Axis devices. The actual audio or video is exchanged
between the SIP user agents with a transport protocol, for example RTP (Real-
Time Transport Protocol). You can make calls on local networks using a peer-
to-peer setup, or across networks using a PBX.
Peer-to-peer SIP (P2PSIP)
The most basic type of SIP communication takes place directly between two or
more SIP user agents. This is called peer-to-peer SIP (P2PSIP). If it takes
place on a local network, all that’s needed are the SIP addresses of the user
agents. A typical SIP address in this case would be sip:
47
AXIS I8116-E Network Video Intercom
Learn more
SIP
1 User agent A – intercom. SIP address: sip:192.168.1.101 2 User agent B –
SIP-enabled phone. SIP address: sip:192.168.1.100 You can set up the Axis
intercom to call for example a SIP-enabled phone on the same network using a
peer-to-peer SIP setup.
Private Branch Exchange (PBX)
When you make SIP calls outside your local IP network, a Private Branch
Exchange (PBX) can act as a central hub. The main component of a PBX is a SIP
server, which is also referred to as a SIP proxy or a registrar. A PBX works
like a traditional switchboard, showing the client’s current status and
allowing for example call transfers, voicemail, and redirections. The PBX SIP
server can be set up as a local entity or offsite. It can be hosted on an
intranet or by a third party provider. When you make SIP calls between
networks, calls are routed through a set of PBXs, that query the location of
the SIP address to be reached. Each SIP user agent registers with the PBX, and
can then reach the others by dialing the correct extension. A typical SIP
address in this case would be sip:
SIP
SIP
SIP
1 sip:mydoor@company.com 2 sip:myspeaker@company.com 3 PBX sip.company.com 4
sip:office@company.com
When you press the call button on an Axis intercom, the call is forwarded
through one or more PBXs to a SIP address either on the local IP network or
over the internet.
48
AXIS I8116-E Network Video Intercom
Learn more
NAT traversal
Use NAT (Network Address Translation) traversal when the Axis device is
located on an private network (LAN) and you want to access it from outside of
that network. Note
The router must support NAT traversal and UPnP®.
Each NAT traversal protocol can be used separately or in different
combinations depending on the network environment. · ICE The ICE Interactive
Connectivity Establishment) protocol increases the chances of finding the most
efficient path to successful communication between peer devices. If you also
enable STUN and TURN, you improve the ICE protocol’s chances. · STUN – STUN
(Session Traversal Utilities for NAT) is a client-server network protocol that
lets the Axis device determine if it is located behind a NAT or firewall, and
if so obtain the mapped public IP address and port number allocated for
connections to remote hosts. Enter the STUN server address, for example, an IP
address. · TURN – TURN (Traversal Using Relays around NAT) is a protocol that
lets a device behind a NAT router or firewall receive incoming data from other
hosts over TCP or UDP. Enter TURN server address and the login information.
Overlays
Note Overlays are not included in the video stream when using SIP calls.
Overlays are superimposed over the video stream. They are used to provide
extra information during recordings, such as a timestamp, or during product
installation and configuration. You can add either text or an image.
Streaming and storage
Video compression formats
Decide which compression method to use based on your viewing requirements, and
on the properties of your network. The available options are: Motion JPEG
Motion JPEG, or MJPEG, is a digital video sequence that is made up of a series
of individual JPEG images. These images are then displayed and updated at a
rate sufficient to create a stream that shows constantly updated motion. For
the viewer to perceive motion video the rate must be at least 16 image frames
per second. Full motion video is perceived at 30 (NTSC) or 25 (PAL) frames per
second. The Motion JPEG stream uses considerable amounts of bandwidth, but
provides excellent image quality and access to every image contained in the
stream. H.264 or MPEG-4 Part 10/AVC Note
H.264 is a licensed technology. The Axis product includes one H.264 viewing
client license. To install additional unlicensed copies of the client is
prohibited. To purchase additional licenses, contact your Axis reseller.
H.264 can, without compromising image quality, reduce the size of a digital
video file by more than 80% compared to the Motion JPEG format and by as much
as 50% compared to older MPEG formats. This means that less network bandwidth
and storage space are required for a video file. Or seen another way, higher
video quality can be achieved for a given bitrate. H.265 or MPEG-H Part 2/HEVC
H.265 can, without compromising image quality, reduce the size of a digital
video file by more than 25% compared to H.264.
49
AXIS I8116-E Network Video Intercom
Learn more
Note · H.265 is licensed technology. The Axis product includes one H.265
viewing client license. Installing additional unlicensed copies of the client
is prohibited. To purchase additional licenses, contact your Axis reseller. ·
Most web browsers don’t support H.265 decoding and because of this the camera
doesn’t support it in its web interface. Instead you can use a video
management system or application supporting H.265 decoding.
Applications
With applications, you can get more out of your Axis device. AXIS Camera
Application Platform (ACAP) is an open platform that makes it possible for
third parties to develop analytics and other applications for Axis devices.
Applications can be preinstalled on the device, available for download for
free, or for a license fee. To find the user manuals for Axis applications, go
to help.axis.com. Note
· Several applications can run at the same time but some applications might
not be compatible with each other. Certain combinations of applications might
require too much processing power or memory resources when run in parallel.
Verify that the applications work together before deployment.
AXIS Object Analytics
AXIS Object Analytics is an analytic application that comes preinstalled on
the camera. It detects objects that move in the scene and classifies them as,
for example, humans or vehicles. You can set up the application to send alarms
for different types of objects. To find out more about how the application
works, see AXIS Object Analytics user manual.
Security
Signed firmware
Signed firmware is implemented by the software vendor signing the firmware
image with a private key. When a firmware has this signature attached to it, a
device will validate the firmware before accepting to install it. If the
device detects that the firmware integrity is compromised, the firmware
upgrade will be rejected.
Secure boot
Secure boot is a boot process that consists of an unbroken chain of
cryptographically validated software, starting in immutable memory (boot ROM).
Being based on the use of signed firmware, secure boot ensures that a device
can boot only with authorized firmware.
Axis Edge Vault
Axis Edge Vault provides a hardware-based cybersecurity platform that
safeguards the Axis device. It offers features to guarantee the device’s
identity and integrity and to protect your sensitive information from
unauthorized access. It builds on a strong foundation of cryptographic
computing modules (secure element and TPM) and SoC security (TEE and secure
boot), combined with expertise in edge device security.
Axis device ID
Being able to verify the origin of the device is key to establishing trust in
the device identity. During production, devices with Axis Edge Vault are
assigned a unique, factory-provisioned, and IEEE 802.1AR-compliant Axis device
ID certificate. This works like a passport to prove the origin of the device.
The device ID is securely and permanently stored in the secure keystore as a
certificate signed by Axis root certificate. The device ID can be leveraged by
the customer’s IT infrastructure for automated secure device onboarding and
secure device identification
50
AXIS I8116-E Network Video Intercom
Learn more
Signed video
Signed video ensures that video evidence can be verified as untampered without
proving the chain of custody of the video file. Each camera uses its unique
video signing key, which is securely stored in the secure keystore, to add a
signature into the video stream. When the video is played, the file player
shows whether the video is intact. Signed video makes it possible to trace the
video back to the camera origin and verifies that the video has not been
tampered with after it left the camera. To learn more about Axis Edge Vault
and cybersecurity features in Axis devices, go to axis.com/learning/white-
papers and search for cybersecurity.
51
AXIS I8116-E Network Video Intercom
Specifications Specifications Product overview
1 Gasket (2x) 2 Screw (TR20) 3 Microphone (2x) 4 Camera 5 Speaker 6 Call button 7 Network connector (PoE) 8 SD card slot 9 Status LED 10 Tamper button 11 Control button 12 I/O, relay, and reader connector
LED indicators
Status LED Green
Indication Steady green for normal operation.
SD card slot
NOTICE · Risk of damage to SD card. Don’t use sharp tools, metal objects, or
excessive force when inserting or removing the SD card. Use your fingers to
insert and remove the card. · Risk of data loss and corrupted recordings.
Unmount the SD card from the device’s web interface before removing it. Don’t
remove the SD card while the product is running.
This device supports microSD/microSDHC/microSDXC cards.
52
AXIS I8116-E Network Video Intercom
Specifications
For SD card recommendations, see axis.com.
microSD, microSDHC, and microSDXC Logos are trademarks of SD-3C LLC. microSD,
microSDHC, microSDXC are trademarks or registered trademarks of SD-3C, LLC in
the United States, other countries or both.
Buttons
Control button
The control button is used for: · Resetting the product to factory default
settings. See Reset to factory default settings on page 58. · Connecting to a
one-click cloud connection (O3C) service over the internet. To connect, press
and hold the button for about 3 seconds until the status LED flashes green.
Connectors
Network connector
RJ45 Ethernet connector with Power over Ethernet (PoE).
I/O, reader, and relay connector
You can use this connector for I/O and relay, or for reader connectivity.
6-pin terminal block
12 12V 3 A/IO1 4 B/IO2 5 NO/NC 6 CO
Function
Pin
DC ground
1
DC output
2
I/O: Configurable 3 (Input or Output) Reader: A
Notes
Specifications
0 V DC
Can be used to power auxiliary equipment. Note: This pin can only be used as power out.
12 V DC I/O : Max load = 50 mA Reader/relay : Max load = 350 mA
I/O: Digital input Connect to pin 1 to activate, or leave floating (unconnected) to deactivate. Digital output Internally connected to pin 1 (DC ground) when active, and floating (unconnected) when inactive. If used with an inductive load, e.g., a relay, connect a diode in parallel with the load, to protect against voltage transients. Reader: RS485 A
I/O : input 0 to max 30 V DC output 0 to max 30 V DC, open drain, 100 mA
53
AXIS I8116-E Network Video Intercom
Specifications
I/O: Configurable 4 (Input or Output) Reader: B
Relay: NO/NC
5
Relay: CO
6
I/O: same as pin 3 Reader: RS485 B
I/O: same as pin 3
Normally open/normally closed. For connecting relay devices. The two relay
pins are galvanically separated from the rest of the circuitry.
Common
Max current 700 mA, max voltage 30 V DC
I/O connector
One option is to use the connector as an I/O connector with external devices
in combination with, for example, motion detection, event triggering, and
alarm notifications. In addition to the 0 V DC reference point and power (12 V
DC output), the I/O connector provides the interface to:
Digital input – For connecting devices that can toggle between an open and
closed circuit, for example PIR sensors, door/window contacts, and glass break
detectors.
Digital output – For connecting external devices such as relays and LEDs.
Connected devices can be activated by the VAPIX® Application Programming
Interface, through an event or from the device interface.
Example
1 DC ground 2 DC output 12 V, max 50 mA 3 I/O configured as input 4 I/O
configured as output 5 Relay only 6 Relay only Relay connector In combination
with I/O, you can use the connector as a relay connector to connect a solid
state relay, and use it: · as a standard relay that opens and closes auxiliary
circuits, · to control a lock directly, · to control a lock through a safety
relay. Using a safety relay on the secure side of the door prevents hotwiring.
Reader connector A third option is to use the connector as a reader connector
to connect an external reader.
54
AXIS I8116-E Network Video Intercom
Connect equipment Connect equipment Axis reader
Relay powered by PoE (12V)
1. To check relay state, go to System > Accessories and find the relay port. 2. Set Normal state to:
–
for a fail-secure lock.
–
for a fail-safe lock.
Relay powered by separate power supply
1. To check relay state, go to System > Accessories and find the relay port. 2. Set Normal state to:
–
for a fail-secure lock.
55
AXIS I8116-E Network Video Intercom
Connect equipment
–
for a fail-safe lock.
Potential-free relay
1. To check relay state, go to System > Accessories and find the relay port. 2. Set Normal state to:
–
for a fail-secure lock.
–
for a fail-safe lock.
12V Fail-secure lock powered by PoE from intercom
1. To check relay state, go to System > Accessories and find the relay port. 2. Set Normal state to:
–
for a fail-secure lock.
–
for a fail-safe lock.
56
AXIS I8116-E Network Video Intercom
Connect equipment 12V Fail-secure lock powered by external power supply
1. To check relay state, go to System > Accessories and find the relay port. 2. Set Normal state to:
–
for a fail-secure lock.
–
for a fail-safe lock.
57
AXIS I8116-E Network Video Intercom
Troubleshooting
Troubleshooting
Reset to factory default settings
Important Reset to factory default should be used with caution. A reset to
factory default resets all settings, including the IP address, to the factory
default values.
To reset the product to the factory default settings: 1. Disconnect power from
the product. 2. Press and hold the control button while reconnecting power.
See Product overview on page 52. 3. Keep the control button pressed for 1530
seconds until the status LED indicator flashes amber. 4. Release the control
button. The process is complete when the status LED indicator turns green. The
product has been reset to the factory default settings. If no DHCP server is
available on the network, the default IP address is 192.168.0.90. 5. Use the
installation and management software tools to assign an IP address, set the
password, and access the device. The installation and management software
tools are available from the support pages on axis.com/support.
You can also reset parameters to factory default through the device’s web
interface. Go to Maintenance > Factory default and click Default.
Firmware options
Axis offers product firmware management according to either the active track
or the long-term support (LTS) tracks. Being on the active track means
continuously getting access to all the latest product features, while the LTS
tracks provide a fixed platform with periodic releases focused mainly on bug
fixes and security updates. Using firmware from the active track is
recommended if you want to access the newest features, or if you use Axis end-
to-end system offerings. The LTS tracks are recommended if you use third-party
integrations, which are not continuously validated against the latest active
track. With LTS, the products can maintain cybersecurity without introducing
any significant functional changes or affecting any existing integrations. For
more detailed information about Axis product firmware strategy, go to
axis.com/support/firmware.
Check the current firmware version
Firmware is the software that determines the functionality of network devices.
When you troubleshoot a problem, we recommend you to start by checking the
current firmware version. The latest firmware version might contain a
correction that fixes your particular problem. To check the current firmware:
1. Go to the device’s web interface > Status. 2. See the firmware version
under Device info.
Upgrade the firmware
Important · Preconfigured and customized settings are saved when you upgrade
the firmware (provided that the features are available in the new firmware)
although this is not guaranteed by Axis Communications AB. · Make sure the
device remains connected to the power source throughout the upgrade process.
58
AXIS I8116-E Network Video Intercom
Troubleshooting
Note When you upgrade the device with the latest firmware in the active track,
the product receives the latest functionality available. Always read the
upgrade instructions and release notes available with each new release before
you upgrade the firmware. To find the latest firmware and the release notes,
go to axis.com/support/firmware.
1. Download the firmware file to your computer, available free of charge at
axis.com/support/firmware.
2. Log in to the device as an administrator.
3. Go to Maintenance > Firmware upgrade and click Upgrade.
When the upgrade has finished, the product restarts automatically.
Technical issues, clues, and solutions
If you can’t find what you’re looking for here, try the troubleshooting
section at axis.com/support.
Problems upgrading the firmware
Firmware upgrade failure
If the firmware upgrade fails, the device reloads the previous firmware. The most common reason is that the wrong firmware file has been uploaded. Check that the name of the firmware file corresponds to your device and try again.
Problems after firmware upgrade
If you experience problems after a firmware upgrade, roll back to the previously installed version from the Maintenance page.
Problems setting the IP address
The device is located on a different subnet
If the IP address intended for the device and the IP address of the computer used to access the device are located on different subne
References
- Axis Communications - Leader in network cameras and other IP networking solutions | Axis Communications
- End-to-end solutions | Axis Communications
- White paper | Axis Communications
- Analytics | Axis Communications
- Welcome to Axis support | Axis Communications
- Download device software | Axis Communications
- Video management software | Axis Communications
- Axis documentation
- AXIS I8116-E Network Video Intercom User manual
- AXIS I8116-E Network Video Intercom User manual
- AXIS I8116-E Network Video Intercom User manual
- Axis documentation
- How to assign an IP address and access your device User manual
- AXIS OS Hardening Guide User manual
- AXIS OS Portal User manual
- Axis Communications - Leader in network cameras and other IP networking solutions | Axis Communications
- Axis Developer Community | Axis Communications
- End-to-end solutions | Axis Communications
- Analytics | Axis Communications
- Welcome to Axis support | Axis Communications
- Download device software | Axis Communications
- Video management software | Axis Communications
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>