Hikvision DS-2CD2012-I-12MM, DS-2CD2012-I-4MM, DS-2CD2032-I-12MM, DS-2CD2032-I-4MM, DS-2CD2032-I-6MM User Manual

...
0 (0)
Hikvision DS-2CD2012-I-12MM, DS-2CD2012-I-4MM, DS-2CD2032-I-12MM, DS-2CD2032-I-4MM, DS-2CD2032-I-6MM User Manual

Network Camera

User Manual

UD.6L0201D1673A01

User Manual of Network Camera

User Manual

©2015 Hangzhou Hikvision Digital Technology Co., Ltd.

This user manual is intended for users of Network Camera (V5.2.6). It includes instructions on how to use the Product. The software embodied in the Product is governed by the user license agreement covering that Product.

About this Manual

This Manual is subject to domestic and international copyright protection.

Hangzhou Hikvision Digital Technology Co., Ltd. (“Hikvision”) reserves all rights to this manual. This manual cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision.

Trademarks

and other Hikvision marks are the property of Hikvision and are registered trademarks or the subject of applications for the same by Hikvision and/or its affiliates. Other trademarks mentioned in this manual are the properties of their respective owners. No right of license is given to use such trademarks without express permission.

Disclaimer

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, REGARDING THIS MANUAL. HIKVISION DOES NOT WARRANT, GUARANTEE, OR MAKE ANY REPRESENTATIONS REGARDING THE USE OF THE MANUAL, OR THE CORRECTNESS, ACCURACY, OR RELIABILITY OF INFORMATION CONTAINED HEREIN. YOUR USE OF THIS MANUAL AND ANY RELIANCE ON THIS MANUAL SHALL BE WHOLLY AT YOUR OWN RISK AND RESPONSIBILITY.

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, SECURITY BREACHES, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF OR RELIANCE ON THIS MANUAL, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

1

User Manual of Network Camera

SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY OR CERTAIN DAMAGES, SO SOME OR ALL OF THE ABOVE EXCLUSIONS OR LIMITATIONS MAY NOT APPLY TO YOU.

Privacy Notice

Surveillance laws vary by jurisdiction. Check all relevant laws in your jurisdiction before using this product for surveillance purposes to ensure that your use of this product conforms.

Support

Should you have any questions, please do not hesitate to contact your local dealer.

2

User Manual of Network Camera

Regulatory Information

FCC Information

FCC compliance: This equipment has been tested and found to comply with the limits for a digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense.

FCC Conditions

This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:

1.This device may not cause harmful interference.

2.This device must accept any interference received, including interference that may cause undesired operation.

EU Conformity Statement

This product and - if applicable - the supplied accessories too are marked with “CE” and comply therefore with the applicable harmonized European standards listed under the Low Voltage Directive 2006/95/EC, the EMC Directive 2004/108/EC, the RoHS

Directive 2011/65/EU.

2012/19/EU (WEEE directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points. For more information, see www.recyclethis.info.

2006/66/EC (battery directive): This product contains a battery that cannot be disposed of as unsorted municipal waste in the European Union. See the product documentation for specific battery information. The battery is marked with this symbol, which may include lettering to indicate cadmium (Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to

a designated collection point. For more information, see www.recyclethis.info.

3

User Manual of Network Camera

Safety Instruction

These instructions are intended to ensure that the user can use the product correctly to avoid danger or property loss.

The precaution measure is divided into ‘Warnings’ and ‘Cautions’:

Warnings: Serious injury or death may be caused if any of these warnings are neglected.

Cautions: Injury or equipment damage may be caused if any of these cautions are neglected.

 

 

Follow these safeguards to prevent

Follow these precautions to prevent

serious injury or death.

potential injury or material damage.

 

 

Warnings:

Please adopt the power adapter which can meet the safety extra low voltage (SELV) standard. And source with 12 VDC or 24 VAC (depending on models) according to the IEC60950-1 and Limited Power Source standard.

If the product does not work properly, please contact your dealer or the nearest service center. Never attempt to disassemble the camera yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)

To reduce the risk of fire or electrical shock, do not expose this product to rain or moisture.

This installation should be made by a qualified service person and should conform to all the local codes.

Please install blackouts equipment into the power supply circuit for convenient supply interruption.

Please make sure that the ceiling can support more than 50(N) Newton gravities if the camera is fixed to the ceiling.

If the product does not work properly, please contact your dealer or the nearest service center. Never attempt to disassemble the camera yourself. (We shall not assume any responsibility for problems caused by unauthorized repair or maintenance.)

4

User Manual of Network Camera

Cautions:

Make sure the power supply voltage is proper before using the camera.

Do not drop the camera or subject it to physical shock.

Do not touch sensor modules with fingers. If cleaning is necessary, use a clean cloth with a bit of ethanol and wipe it gently. If the camera will not be used for an extended period of time, put on the lens cap to protect the sensor from dirt.

Do not aim the camera lens at the strong light such as sun or incandescent lamp. The strong light can cause fatal damage to the camera.

The sensor may be burned out by a laser beam, so when any laser equipment is being used, make sure that the surface of the sensor not be exposed to it.

Do not place the camera in extremely hot, cold temperatures (the operating temperature should be between -30°C to 60°C, or -40°C to 60°C if the camera model has an “H” in its suffix), dusty or damp environment, and do not expose it to high electromagnetic radiation.

To avoid heat accumulation, good ventilation is required.

Keep the camera away from water and any liquid.

While shipping, the camera should be packed in its original packing.

Improper use or replacement of the battery may result in hazard of explosion. Please use the manufacturer recommended battery type.

CHANGE THE DEFAULT PASSWORD

The default password (12345) for the Admin account is is for first-time log-in purposes only. You must change this default password to better protect against security risks, such as the unauthorized access by others to the

product that may prevent the product from functioning properly and/or lead to other undesirable consequences.

For your privacy, we strongly recommend changing the password to something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers, and special characters) in order to increase the security of your product.

Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end-user.

5

User Manual of Network Camera

Notes:

For the camera supports IR, you are required to pay attention to the following precautions to prevent IR reflection:

Dust or grease on the dome cover will cause IR reflection. Please do not remove the dome cover film until the installation is finished. If there is dust or grease on the dome cover, clean the dome cover with clean soft cloth and isopropyl alcohol.

Make certain the installation location does not have reflective surfaces of objects too close to the camera. The IR light from the camera may reflect back into the lens causing reflection.

The foam ring around the lens must be seated flush against the inner surface of the bubble to isolate the lens from the IR LEDS. Fasten the dome cover to camera body so that the foam ring and the dome cover are attached seamlessly.

6

User Manual of Network Camera

 

 

Table of Contents

 

Chapter 1

System Requirement ......................................................................

10

Chapter 2

Network Connection ......................................................................

11

2.1

Setting the Network Camera over the LAN......................................................

11

2.1.1 Wiring over the LAN .......................................................................................................

11

2.1.2 Detecting and Changing the IP Address..........................................................................

12

2.2

Setting the Network Camera over the WAN ....................................................

13

2.2.1

 

Static IP Connection........................................................................................................

13

2.2.2

 

Dynamic IP Connection...................................................................................................

14

Chapter 3

Access to the Network Camera.......................................................

17

3.1

Accessing by Web Browsers............................................................................

17

3.2

Accessing by Client Software ..........................................................................

18

Chapter 4

Wi-Fi Settings................................................................................

20

4.1

Configuring Wi-Fi Connection in Manage and Ad-hoc Modes ..........................

20

4.2

Easy Wi-Fi Connection with WPS function ......................................................

25

4.3

IP Property Settings for Wireless Network Connection ....................................

27

Chapter 5

Live View.......................................................................................

29

5.1

Live View Page...............................................................................................

29

5.2

Starting Live View ..........................................................................................

30

5.3

Recording and Capturing Pictures Manually ....................................................

31

5.4

Operating PTZ Control ....................................................................................

31

5.4.1

 

PTZ Control Panel............................................................................................................

31

5.4.2 Setting / Calling a Preset .................................................................................................

32

5.4.3 Setting / Calling a Patrol..................................................................................................

34

Chapter 6

Network Camera Configuration.....................................................

35

6.1

Configuring Local Parameters .........................................................................

35

6.2

Configuring Time Settings ..............................................................................

37

6.3

Configuring Network Settings .........................................................................

39

6.3.1

 

Configuring TCP/IP Settings ............................................................................................

39

6.3.2

 

Configuring Port Settings ................................................................................................

40

6.3.3

 

Configuring PPPoE Settings.............................................................................................

41

6.3.4

 

Configuring DDNS Settings..............................................................................................

42

6.3.5

 

Configuring SNMP Settings .............................................................................................

45

6.3.6

 

Configuring 802.1X Settings............................................................................................

47

 

 

 

7

User Manual of Network Camera

6.3.7

Configuring QoS Settings ................................................................................................

48

6.3.8

Configuring UPnP™ Settings ...........................................................................................

48

6.3.9

Configuring Wireless Dial Settings..................................................................................

49

6.3.10

Email Sending Triggered by Alarm .............................................................................

52

6.3.11

Configuring NAT (Network Address Translation) Settings ..........................................

54

6.3.12

Configuring FTP Settings ............................................................................................

55

6.3.13

Platform Access..........................................................................................................

56

6.3.14

HTTPS Settings ...........................................................................................................

57

6.4

Configuring Video and Audio Settings.............................................................

59

6.4.1

Configuring Video Settings .............................................................................................

59

6.4.2

Configuring Audio Settings .............................................................................................

61

6.4.3

Configuring ROI Encoding ...............................................................................................

62

6.4.4

Display Information on Stream .......................................................................................

64

6.4.5

Configuring Target Cropping ...........................................................................................

64

6.5

Configuring Image Parameters........................................................................

65

6.5.1

Configuring Display Settings ...........................................................................................

65

6.5.2

Configuring OSD Settings ................................................................................................

71

6.5.3

Configuring Text Overlay Settings ...................................................................................

72

6.5.4

Configuring Privacy Mask................................................................................................

73

6.5.5

Configuring Picture Overlay ............................................................................................

74

6.6

Configuring and Handling Alarms ...................................................................

75

6.6.1

 

Configuring Motion Detection ........................................................................................

76

6.6.2

 

Configuring Video Tampering Alarm ..............................................................................

82

6.6.3

 

Configuring Alarm Input .................................................................................................

83

6.6.4

 

Configuring Alarm Output ..............................................................................................

84

6.6.5

 

Handling Exception .........................................................................................................

85

6.6.6

 

Configuring Other Alarm.................................................................................................

86

6.6.7

 

Configuring Audio Exception Detection..........................................................................

88

6.6.8

 

Configuring Defocus Detection .......................................................................................

90

6.6.9

 

Configuring Scene Change Detection .............................................................................

90

6.6.10

Configuring Face Detection........................................................................................

91

6.6.11

Configuring Line Crossing Detection ..........................................................................

93

6.6.12

Configuring Intrusion Detection.................................................................................

95

6.6.13

Configuring Region Entrance Detection .....................................................................

97

6.6.14

Configuring Region Exiting Detection ........................................................................

98

6.6.15

Configuring Loitering Detection.................................................................................

99

6.6.16

Configuring People Gathering Detection .................................................................

101

6.6.17

Configuring Fast Moving Detection..........................................................................

102

6.6.18

Configuring Parking Detection .................................................................................

104

6.6.19

Configuring Unattended Baggage Detection............................................................

105

6.6.20

Configuring Object Removal Detection....................................................................

107

 

 

 

8

User Manual of Network Camera

6.7

VCA Configuration........................................................................................

109

6.7.1

 

Behavior Analysis..........................................................................................................

109

6.7.2

 

Face Capture .................................................................................................................

115

6.7.3

 

Heat Map ......................................................................................................................

119

6.7.4

 

People Counting............................................................................................................

121

Chapter 7

Storage Settings ...........................................................................

125

7.1

Configuring NAS Settings..............................................................................

125

7.2

Configuring Recording Schedule ...................................................................

127

7.3

Configuring Snapshot Settings ......................................................................

131

7.4

Configuring Lite Storage ...............................................................................

133

7.5

Configuring Cloud Storage ............................................................................

134

Chapter 8

People Counting..........................................................................

136

Chapter 9

Road Traffic ................................................................................

139

Chapter 10

Playback......................................................................................

143

Chapter 11

Log Searching .............................................................................

145

Chapter 12

Others .........................................................................................

146

12.1

Managing User Accounts ..............................................................................

146

12.2

Authentication.............................................................................................

149

12.3

Anonymous Visit..........................................................................................

150

12.4

IP Address Filter...........................................................................................

151

12.5

Security Service ...........................................................................................

153

12.6

Viewing Device Information .........................................................................

154

12.7

Maintenance ...............................................................................................

154

12.7.1

Rebooting the Camera .............................................................................................

154

12.7.2

Restoring Default Settings........................................................................................

155

12.7.3

Exporting / Importing Configuration File .................................................................

155

12.7.4

Upgrading the System ..............................................................................................

156

12.8

RS-232 Settings ............................................................................................

156

12.9

RS-485 Settings ............................................................................................

157

12.10

 

Service Settings........................................................................................

158

Appendix

...........................................................................................................

 

159

Appendix 1 SADP Software Introduction ...............................................................

159

Appendix 2 Port Mapping ......................................................................................

162

 

 

 

9

User Manual of Network Camera

Chapter 1System Requirement

Operating System: Microsoft Windows XP SP1 and above version / Vista / Win7 / Server 2003 / Server 2008 32bits

CPU: Intel Pentium IV 3.0 GHz to Core i7-4000 series or higher, depending on different video resolutions

RAM: 1G or higher

Display: 1024×768 resolution or higher

Web Browser: Internet Explorer 7.0 and above version, Safari 5.02 and above version, Mozilla Firefox 3.5 and above version and Google Chrome8 and above versions.

10

User Manual of Network Camera

Chapter 2 Network Connection

Before you start:

If you want to set the network camera via a LAN (Local Area Network), please refer to Section 2.1 Setting the Network Camera over the LAN.

If you want to set the network camera via a WAN (Wide Area Network), please refer to Section 2.2 Setting the Network Camera over the WAN.

2.1 Setting the Network Camera over the LAN

Purpose:

To view and configure the camera via a LAN, you need to connect the network camera in the same subnet with your computer, and install the SADP or iVMS-4200 software to search and change the IP of the network camera.

Note: For the detailed introduction of SADP, please refer to Appendix 1.

2.1.1 Wiring over the LAN

The following figures show the two ways of cable connection of a network camera and a computer:

Purpose:

To test the network camera, you can directly connect the network camera to the computer with a network cable as shown in Figure 2-1.

Refer to the Figure 2-2 to set network camera over the LAN via a switch or a router.

Figure 2-1 Connecting Directly

11

User Manual of Network Camera

Figure 2-2 Connecting via a Switch or a Router

2.1.2Detecting and Changing the IP Address

You need the IP address to visit the network camera.

Steps:

1.To get the IP address, you can choose either of the following methods:

Use SADP, a software tool which can automatically detect the online network cameras in the LAN and list the device information including IP address, subnet mask, port number, device serial number, device version, etc., shown in Figure 2-3.

Use the iVMS-4200 client software to list the online devices. Please refer to the user manual of iVMS-4200 client software for detailed information.

2.Change the IP address and subnet mask to the same subnet as that of your computer.

3.Enter the IP address of network camera in the address field of the web browser to view the live video.

Notes:

The default IP address is 192.0.0.64 and the port number is 8000.

YOU MUST CHANGE THE DEFAULT PASSWORD – The default Admin account password (12345) is for first-time log-in purposes only. See Section 12.1, Managing User Accounts.

For accessing the network camera from different subnets, please set the

gateway for the network camera after you logged in. For detailed

12

User Manual of Network Camera

information, please refer to Section 6.3.1 Configuring TCP/IP Settings.

Figure 2-3 SADP Interface

2.2 Setting the Network Camera over the WAN

Purpose:

This section explains how to connect the network camera to the WAN with a static IP or a dynamic IP.

2.2.1 Static IP Connection

Before you start:

Please apply a static IP from an ISP (Internet Service Provider). With the static IP address, you can connect the network camera via a router or connect it to the WAN directly.

Connecting the network camera via a router

Steps:

1.Connect the network camera to the router.

2.Assign a LAN IP address, the subnet mask and the gateway. Refer to Section

2.1.2 Detecting and Changing the IP Address for detailed IP address

13

User Manual of Network Camera

configuration of the camera.

3.Save the static IP in the router.

4.Set port mapping, e.g., 80, 8000, and 554 ports. The steps for port mapping

vary according to the different routers. Please call the router manufacturer

for assistance with port mapping.

Note: Refer to Appendix 2 for detailed information about port mapping.

5.Visit the network camera through a web browser or the client software over the internet.

Figure 2-4 Accessing the Camera through Router with Static IP

Connecting the network camera with static IP directly

You can also save the static IP in the camera and directly connect it to the internet without using a router. Refer to Section 2.1.2 Detecting and Changing the IP Address for detailed IP address configuration of the camera.

Figure 2-5 Accessing the Camera with Static IP Directly

2.2.2 Dynamic IP Connection

Before you start:

Please apply a dynamic IP from an ISP. With the dynamic IP address, you can connect the network camera to a modem or a router.

Connecting the network camera via a router

Steps:

1.Connect the network camera to the router.

2.In the camera, assign a LAN IP address, the subnet mask and the gateway. Refer to Section 2.1.2 Detecting and Changing the IP Address for detailed

14

User Manual of Network Camera

LAN configuration.

3. In the router, set the PPPoE user name, password and confirm the password.

For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters, numbers and special characters) in order to increase the security of your product.

4. Set port mapping. E.g. 80, 8000, and 554 ports. The steps for port mapping

vary depending on different routers. Please call the router manufacturer for

assistance with port mapping.

Note: Refer to Appendix 2 for detailed information about port mapping.

5.Apply a domain name from a domain name provider.

6.Configure the DDNS settings in the setting interface of the router.

7.Visit the camera via the applied domain name.

Connecting the network camera via a modem

Purpose:

This camera supports the PPPoE auto dial-up function. The camera gets a public

IP address by ADSL dial-up after the camera is connected to a modem. You

need to configure the PPPoE parameters of the network camera. Refer to

Section 6.3.3 Configuring PPPoE Settings for detailed configuration.

Figure 2-6 Accessing the Camera with Dynamic IP

Note: The obtained IP address is dynamically assigned via PPPoE, so the IP

address always changes after rebooting the camera. To solve the inconvenience

of the dynamic IP, you need to get a domain name from the DDNS provider (E.g.

DynDns.com). Please follow the steps below for normal domain name

resolution and private domain name resolution to solve the problem.

15

User Manual of Network Camera

Normal Domain Name Resolution

Figure 2-7 Normal Domain Name Resolution

Steps:

1.Apply a domain name from a domain name provider.

2.Configure the DDNS settings in the DDNS Settings interface of the network camera. Refer to Section 6.3.4 Configuring DDNS Settings for detailed configuration.

3.Visit the camera via the applied domain name.

Private Domain Name Resolution

Figure 2-8 Private Domain Name Resolution

Steps:

1.Install and run the IP Server software in a computer with a static IP.

2.Access the network camera through the LAN with a web browser or the client software.

3.Enable DDNS and select IP Server as the protocol type. Refer to Section 6.3.4 Configuring DDNS Settings for detailed configuration.

16

User Manual of Network Camera

Chapter 3 Access to the Network Camera

3.1 Accessing by Web Browsers

Steps:

1.Open the web browser.

2.Input the IP address of the network camera in the address bar, e.g., 192.0.0.64 and press the Enter key to enter the login interface.

3.Input the user name and password and click Login.

Figure 3-1 Login Interface

Note:

YOU MUST CHANGE THE DEFAULT PASSWORD -- The default Admin account password (12345) is for first-time log-in purposes only. See Section 12.1, Managing User Accounts.

4. Install the plug-in before viewing the live video and operating the camera. Please

follow the installation prompts to install the plug-in.

Figure 3-2 Download and Install Plug-in

17

User Manual of Network Camera

Figure 3-3 Install Plug-in (1)

Figure 3-4 Install Plug-in (2)

Note: You may have to close the web browser to install the plug-in. Please reopen the web browser and log in again after installing the plug-in.

3.2 Accessing by Client Software

The product CD contains the iVMS-4200 client software. You can view the live video and manage the camera with the software.

Follow the installation prompts to install the software. The control panel and live view interface of iVMS-4200 client software are shown as below.

18

User Manual of Network Camera

Figure 3-5 iVMS-4200 Control Panel

Figure 3-6 iVMS-4200 Main View

Note: For detailed information about the software, please refer to the user manual of the iVMS-4200.

19

User Manual of Network Camera

Chapter 4 Wi-Fi Settings

Purpose:

By connecting to the wireless network, you don’t need to use cable of any kind for

network connection, which is very convenient for the actual surveillance application. Note: This chapter is only applicable for the cameras with the built-in Wi-Fi module.

4.1 Configuring Wi-Fi Connection in Manage and

Ad-hoc Modes

Before you start:

A wireless network must be configured.

Wireless Connection in Manage Mode

Steps:

1. Enter the Wi-Fi configuration interface.

Configuration> Advanced Configuration> Network> Wi-Fi

Figure 4-1 Wireless Network List

2.Click Search to search the online wireless connections.

3.Click to choose a wireless connection on the list.

Figure 4-2 Wi-Fi SettingManage Mode

20

User Manual of Network Camera

4. Check the checkbox to select the Network mode as Manage, and the Security mode of the network is automatically shown when you select the wireless network, please don’t change it manually.

Note: These parameters are exactly identical with those of the router.

5.Enter the key to connect the wireless network. The key should be that of the wireless network connection you set on the router.

Wireless Connection in Ad-hoc Mode

If you choose the Ad-hoc mode, you don’t need to connect the wireless camera via a router. The scenario is the same as you connect the camera and the PC directly with a network cable.

Steps:

1. Choose Ad-hoc mode.

Figure 4-3 Wi-Fi Setting- Ad-hoc

2.Customize a SSID for the camera.

3.Choose the Security Mode of the wireless connection.

Figure 4-4 Security Mode- Ad-hoc Mode

4.Enable the wireless connection function for your PC.

5.On the PC side, search the network and you can see the SSID of the camera

listed.

21

User Manual of Network Camera

Figure 4-5 Ad-hoc Connection Point

6. Choose the SSID and connect.

Security Mode Description:

Figure 4-6 Security Mode

You can choose the Security Mode as not-encrypted, WEP, WPA-personal, WPA-enterprise, WPA2-personal, and WPA2-enterprise.

WEP mode:

Figure 4-7 WEP Mode

Authentication - Select Open or Shared Key System Authentication, depending on

22

User Manual of Network Camera

the method used by your access point. Not all access points have this option, in which case they probably use Open System, which is sometimes known as SSID Authentication.

Key length - This sets the length of the key used for the wireless encryption, 64 or 128 bit. The encryption key length can sometimes be shown as 40/64 and 104/128.

Key type - The key types available depend on the access point being used. The following options are available:

HEX - Allows you to manually enter the hex key.

ASCII - In this method the string must be exactly 5 characters for 64-bit WEP and 13 characters for 128-bit WEP.

WPA-personal and WPA2-personal Mode:

Enter the required Pre-shared Key for the access point, which can be a hexadecimal number or a passphrase.

Figure 4-8 Security Mode- WPA-personal

WPAenterprise and WPA2-enterprise Mode:

Choose the type of client/server authentication being used by the access point; EAP-TLS or EAP-PEAP.

EAP-TLS

23

User Manual of Network Camera

Figure 4-9 EAP-TLS

Identity - Enter the user ID to present to the network.

Private key password – Enter the password for your user ID.

EAPOL version - Select the version used (1 or 2) in your access point.

CA Certificates - Upload a CA certificate to present to the access point for authentication.

EAP-PEAP:

User Name - Enter the user name to present to the network

Password - Enter the password of the network

PEAP Version - Select the PEAP version used at the access point.

Label - Select the label used by the access point.

EAPOL version - Select version (1 or 2) depending on the version used at the access point

CA Certificates - Upload a CA certificate to present to the access point for authentication

For your privacy and to better protect your system against security risks, we strongly recommend the use of strong passwords for all functions and network devices. The password should be something of your own choosing (using a minimum of 8 characters, including upper case letters, lower case letters,

numbers and special characters) in order to increase the security of your product.

.

24

User Manual of Network Camera

4.2 Easy Wi-Fi Connection with WPS function

Purpose:

The setting of the wireless network connection is never easy. To avoid the complex setting of the wireless connection you can enable the WPS function.

WPS (Wi-Fi Protected Setup) refers to the easy configuration of the encrypted connection between the device and the wireless router. The WPS makes it easy to add new devices to an existing network without entering long passphrases. There are two modes of the WPS connection, the PBC mode and the PIN mode.

Note: If you enable the WPS function, you do not need to configure the parameters such as the encryption type and you don’t need to know the key of the wireless connection.

Steps:

Figure 4-10 Wi-Fi Settings - WPS

PBC Mode:

PBC refers to the Push-Button-Configuration, in which the user simply has to push a button, either an actual or virtual one (as the button on the configuration interface of the IE browser), on both the Access Point (and a registrar of the network) and the new wireless client device.

1.Check the checkbox of to enable WPS.

2.Choose the connection mode as PBC.

Note: Support of this mode is mandatory for both the Access Points and the

25

User Manual of Network Camera

connecting devices.

3.Check on the Wi-Fi router to see if there is a WPS button. If yes push the button and you can see the indicator near the button start flashing, which means the WPS function of the router is enabled. For detailed operation, please see the user guide of the router.

4.Push the WPS button to enable the function on the camera.

If there is not a WPS button on the camera, you can also click the virtual button to enable the PBC function on the web interface.

5.Click Connect button.

When the PBC mode is both enabled in the router and the camera, the camera and the wireless network is connected automatically.

PIN Mode:

The PIN mode requires a Personal Identification Number (PIN) to be read from either a sticker or the display on the new wireless device. This PIN must then be entered to connect the network, usually the Access Point of the network.

Steps:

1.Choose a wireless connection on the list and the SSID is shown.

26

User Manual of Network Camera

Figure 4-11 Wi-Fi Settings – WPS PIN Mode

2.Choose Use route PIN code.

If the PIN code is generated from the router side, you should enter the PIN code you get from the router side in the Router PIN code field.

3. Click Connect. Or

You can generate the PIN code on the camera side. And the expired time for the PIN code is 120 seconds.

1.Click Generate.

2.Enter the code to the router, in the example, enter 48167581 to the router.

4.3 IP Property Settings for Wireless Network

Connection

The default IP address of wireless network interface controller is 192.168.1.64. When

you connect the wireless network you can change the default IP.

Steps:

27

User Manual of Network Camera

1. Enter the TCP/IP configuration interface. Configuration> Advanced Configuration> Network> TCP/IP Or

Configuration> Basic Configuration> Network> TCP/IP

Figure 4-12 TCP/IP Settings

2.Select the NIC as wlan.

3.Customize the IPv4 address, the IPv4 Subnet Mask and the Default Gateway. The setting procedure is the same with that of LAN.

If you want to be assigned the IP address you can check the checkbox to enable the DHCP.

28

User Manual of Network Camera

Chapter 5 Live View

5.1 Live View Page

Purpose:

The live view page allows you to view the real-time video, capture images, realize PTZ control, set/call presets and configure video parameters.

Log in the network camera to enter the live view page, or you can click Live View on the menu bar of the main page to enter the live view page.

Descriptions of the live view page:

Figure 5-1 Live View Page

Camera Model:

It lists the camera model you are connecting to.

Online Help:

Click to get the online help, which will guide you through the basic operations for each function.

Menu Bar:

Click each tab to enter Live View, Playback, Log and Configuration page respectively.

29

Loading...
+ 135 hidden pages