Any and all information, including, among others, wordings, pictures, graphs are the properties of Hangzhou Hikvision Digital Technology Co., Ltd. or its
subsidiaries (hereinafter referred to be “Hikvision”). This user manual (hereinafter referred to be “the Manual”) cannot be reproduced, changed, translated, or
distributed, partially or wholly, by any means, without the prior written permission of Hikvision. Unless otherwise stipulated, Hikvision does not make any
warranties, guarantees or representations, express or implied, regarding to the Manual.
About this Manual: The Manual includes instructions for using and managing the product. Pictures, charts, images and all other information hereinafter are for
description and explanation only. The information contained in the Manual is subject to change, without notice, due to firmware updates or other reasons.
Please find the latest version in the company Website (http://overseas.hikvision.com/en/).
Please use this user manual under the guidance of professionals.
Manual Illustrations and Features: Graphics (screen shots, product pictures, etc.) in this document are for illustrative purposes only. Your actual product may
differ in appearance. Your product might not support all features discussed in this document.
Trademarks Acknowledgement: and other Hikvision trademarks and logos are the properties of Hikvision in various jurisdictions. Other
trademarks and logos mentioned below are the properties of their respective owners.
Legal Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, IS PROVIDED “AS IS,” WITH ALL
FAULTS AND ERRORS, AND HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY,
FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE
LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS,
BUSINESS INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES
FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY
RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR
USE CONFORMS TO THE APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED FOR ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATTER PREVAILS.
Regulatory Information
FCC Information: Please take attention that changes or modification not expressly approved by the party responsible for compliance could void the user’s
authority to operate the equipment.
FCC Compliance: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These
limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This
equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference in which case the user
will be required to correct the interference at his own expense.
FCC Conditions: This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
•
This device may not cause harmful interference.
•
This device must accept any interference received, including interference that may cause undesired operation.
EU Conformity Statement
This product and, if applicable, the supplied accessories too are marked with “CE” and comply therefore with the applicable harmonized European
standards listed under the EMC Directive 2014/30/EU, the LVD Directive 2014/35/EU, the RoHS Directive 2011/65/EU.
2012/19/EU (WEEE Directive): Products marked with this symbol cannot be disposed of as unsorted municipal waste in the European Union. For proper
recycling, return this product to your local supplier upon the purchase of equivalent new equipment, or dispose of it at designated collection points.
For more information see: www.recyclethis.info
2006/66/EC (Battery Directive): This product contains a battery that cannot be disposed of as unsorted municipal waste in the European Union. See the
product documentation for specific battery information. The battery is marked with this symbol, which may include lettering to indicate cadmium
(Cd), lead (Pb), or mercury (Hg). For proper recycling, return the battery to your supplier or to a designated collection point. For more information see:
www.recyclethis.info
Industry Canada ICES-003 Compliance: This device meets the CAN ICES-3 (A)/NMB-3(A) standards requirements.
Hikvision North America Privacy Policy
Last Updated: December 2018
Hikvision USA Inc. and Hikvision Canada Inc. and its affiliates (collectively “HIKVISION”) provide the following services for use in conjunction with various HIKVISION
Internet-connected products (“Products”): a HIKVISION user Website and user accounts that may be accessed at
and all associated sites connected with us.hikvision.com (the “Website”); and any services available on the Website, Web Apps, and Mobile Apps (“Available
UM IP Network Camera 071619NA 2
IP Network Camera User Manual
Services”). The term “HIKVISION Services” means the Website and Available Services.
This Privacy Policy explains how HIKVISION handles the collection, storage, and disclosure of information, including personal information, regarding our
HIKVISION Services. It also applies to any information we collect from the operation and use of Products we sell while connected to the HIKVISION Services (the
“Products), and any other HIKVISION Service that links to this Privacy Policy.
We may modify this Privacy Policy at any time, provided certain provisions of this Privacy Policy prove to be incomplete or outdated and further provided that
these changes are reasonable for you, taking into account your interests. If we make material changes to this Privacy Policy, we will notify you by the e-mail
address specified in your account or by means of notice on our Websites.
You can determine when this Privacy Policy was last revised by referring to the date it was “Last Updated” above.
What Information We Collect
In order to provide HIKVISION services to you, we will ask you to provide personal information that is necessary to provide those services to you. If you do not
provide your personal information, we may not be able to provide you with our products or services.
“Personal information” shall have the same meaning as “personal data” and shall include any information relating to an identified or identifiable natural person
(“data subject”); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or
more factors specific to his physical, physiological, mental, economic, cultural, or social identity. Examples of personal information include your name,
telephone number, e-mail address, and physical address.
Personal information also includes information that alone cannot directly identify you, but with other information we have access to can identify you such as
product serial numbers, log data that automatically records information about your visit such as your browser type, domains, page views, the URL of the page
that referred you, the URL of the page you next visit, your IP address, and page navigation, unique device ID collected from Products and your mobile devices, data
from cookies, pixel tags, and Web beacons, video content files that do not contain personal visual identity information, the country and time zone of the
connected Product, geo-location, mobile phone carrier identification, and device software platform and firmware information.
How We Collect and Use Your Information
Here are some examples of the personal information we may collect and how we may use it:
•
When you create your account to use HIKVISION Services (“Account”), we will collect information including your name, phone number, and e-mail and
physical address. In addition, when you install and activate Products, we will collect certain basic information via our HIKVISION Services such as your
product name, the product’s verification code, and serial number, which are unique to the Product connected to the HIKVISION Services and associated with
your Account.
•
When you respond to our e-mails, contact our customer service, or use other customer support tools, we collect your information to provide you with
support, verify your identity with your Account profile information, and confirm your Product.
We may also use the information we collect for the following purpose:
•
send you reminders, technical notices, updates, alerts, support and administrative messages, service bulletins, and requested information; and
•
pursuant to our legitimate business interests:
˗ operate, maintain, improve, and develop our HIKVISION Services and Products;
˗ personalize your experience with our HIKVISION Services and Products;
˗ increase the safety of our HIKVISION Services and Products – for example, for user authentication, security protection, fraud detection, filing, and
backups;
˗ perform analytics and conduct customer research;
˗ communicate and provide to existing customers additional information that may be of interest to you about our products and services;
˗ manage our everyday business needs such as auditing, administration of our HIKVISION Services, forum management, fulfillment, analytics, fraud
prevention, and enforcement of our corporate reporting obligations and Terms of Service;
˗ enhance other information we have about you to help us better understand you and determine your interests; and
˗ in the context of a corporate transaction (e.g., corporate restructuring, sale or assignment of assets, merger) and to protect our rights or property, to
enforce our Terms of Service and legal notices and for the establishment, exercise, and defense of legal claims;
with your express consent to
˗ send you electronic communications in order to inform you about new products and services, unless you choose to unsubscribe;
˗ use certain non-essential cookies to better understand user behavior, in order to optimize user experience, perfect function design, and offers for
products and services from us or to provide better services;
•
meet a legal obligation, a court order or other binding decision(s); and accomplish a purpose unrelated to those described in this Privacy Policy by first
notifying you and, where required, offering you a choice as to whether or not we may use your Personal Information in this different manner.
Cookies and Other Technologies
We also use cookies, Web beacons, pixel tags, and other technologies to keep records, store your preferences, improve our advertising, and collect
information such as log data and device data. This allows us to better understand how you use our HIKVISION Services and Products, diagnose and troubleshoot
any problems you have, and otherwise administer and improve our HIKVISION Services and Products. For more information about cookies, please refer to our Use
of Cookies (https://order-na.hikvision.com/helpCenter/useOfCookies).
How We Share Your Information
HIKVISION may disclose personal information to cloud service provider, network service provider, and other service providers on the basis of non-disclosure
agreements.
The following are the limited situations where we may share personal information:
•
We share your personal information with HIKVISION affiliates, who are required to use that information in accordance with the purposes described in this
Privacy Policy.
•
We use service providers, vendors, technicians, and other third-parties to help us process, store, and protect some of your data and otherwise help us
administer our Products and HIKVISION Services effectively, provide a better user experience, process your purchases, and increase the quality of our Products
and HIKVISION Services. These third-parties are forbidden from using your personal information for non-HIKVISION purposes and are required to protect your
UM IP Network Camera 071619NA 3
IP Network Camera User Manual
information in accordance with this Privacy Policy and applicable laws.
•
We may provide information to third-parties if we believe in good faith that we are required by mandatory law to do so. For example, to comply with legal orders
and government requests; response to a subpoena, or similar legal process, including to law enforcement agencies, regulators, and courts; to protect the
interests of our customers and users of the HIKVISION Service; to respond to claims that any content posted or displayed using the HIKVISION Service violates
the rights of third parties; in an emergency protect the health and safety of users of the HIKVISION Service or the general public; or to enforce compliance
with our Terms of Service.
•
If HIKVISION and/or all or part of our assets are ever sold or transferred, your personal information may be among the items sold or transferred. Under such
circumstance, we will notify you by the e-mail address specified in your account or by means of notice on us.hikvision.com and associated Websites of (i)
the identity and contact information of the purchaser or transferee, (ii) your right to revoke your consent to the provision of personal information, and (iii)
the means by which you may revoke such consent.
•
We share information to protect our own legitimate business interests when we believe in good faith that we are required or permitted by law to do so. For
example, we may share your personal information as needed to support auditing, compliance, and corporate governance functions; to combat fraud or
criminal activity; to protect our rights or those of our affiliates and users; or as part of legal proceedings affecting HIKVISION.
We may also disclose non-personal information (for example, aggregated or anonymized data) publicly or with third-parties, provided those data have been
rendered anonymous in such a way that the data subject is no longer identifiable. For example, we may share non-personal information:
•
for the same reasons we might share Personal information;
•
to better understand how our customers interact with our HIKVISION Services and Products, in order to optimize your experience, improve our products, or
provide better services;
•
for our own research and data analytics; or
•
to our vendors for their own analysis and research.
Securing Your Personal Information
HIKVISION has implemented commercially reasonable administrative, technical, and physical security controls that are designed to safeguard personal
information. We also conduct periodic reviews and assessments of the effectiveness of our security controls.
Notwithstanding the above, no method of transmission over the Internet, or method of electronic storage, is 100% secure. Therefore, HIKVISION cannot
guarantee that your personal information is under absolute security with the existing security technology. If you have any questions about the security of our
HIKVISION Services, you can contact us at the contact information below in Contact Us.
Accessing, Correcting, and Retention of Your Personal Information
HIKVISION generally stores your personal information on HIKVISION’s servers, which is established upon Amazon Servers, until you delete or edit it, or for as long
as you remain a HIKVISION customer in order to provide you with the most relevant offers.
Keeping your personal information current helps ensure that we provide you with the most relevant offers. You can access, update, or delete your personal
information via your Account profile. We are ready to assist you in managing your subscriptions, deactivating your account, and removing your active profile
and data. Your personal information might not be immediately deleted, as we are required to retain records relating to previous purchases through our HIKVISION
Services for financial reporting and compliance reasons pursuant to applicable laws. In addition, because of the way we maintain certain services, after you
delete certain information, we may temporarily retain backup copies of such information before it is permanently deleted.
We will retain your personal information for the period necessary to fulfill the purpose outlined in this Privacy Policy unless a longer retention period is required
or permitted by applicable law.
If you are located in the European Union, subject to limitations in applicable law, you have certain rights in respect to your personal information such as a right of
access, rectification, restriction, opposition, and portability. In order to exercise your rights please contact us at the contact information below in Contact Us.
You also have the right to withdraw your consent at all times, free of charge. You can do this by opting out from direct marketing and by rejecting the use of
cookies through your browser settings. If you have concerns about how we handle your personal information, you have the right to lodge a complaint with the
data protection authority in your country of residence.
Social Community Features and Social Networks
Social Community Features
Our HIKVISION Services may allow you to publicly post or share information, communicate with others, or otherwise make information accessible to others. Prior to
doing so, please read our Terms of Service carefully. All the information you post, share, or communicate may be accessible to anyone with Internet access, and
any personal information you include may be read, collected, and used by others.
Social Networks
You have the option to link social networks such as Facebook to your Account. You will be able to post HIKVISION activity to your social network. By proceeding
through any of the above steps, you grant HIKVISION permission to access elements of your social network profile information that you have made available to
be shared and to use it in accordance with the social network’s terms of use and this Privacy Policy.
Links to Other Websites
We may permit others to link to the HIKVISION services or to post a link to their Website. We do not endorse these Websites and are not responsible for other
Websites or their privacy practices. Please read their privacy policies before submitting information.
Your Choices
We think that you benefit from a more personalized experience when we know more about you and your preferences. However, you can limit the information you
provide to HIKVISION as well as the communications you receive from HIKVISION through your Account preferences.
Commercial E-mails
You will receive commercial e-mails from us only if you have granted prior express consent or if sending those e-mails is otherwise permitted, in accordance
with applicable laws.
You may choose not to receive commercial e-mails from us by following the instructions contained in any of the commercial e-mails we send or by logging into
your Account and adjusting your e-mail preferences. Please note that even if you unsubscribe from commercial e-mail messages, we may still e-mail you noncommercial e-mails related to your Account on the HIKVISION Services.
UM IP Network Camera 071619NA 4
IP Network Camera User Manual
Device Data
You may manage how your mobile device and mobile browser share certain device data with HIKVISION by adjusting the privacy and security settings on your
mobile device. Please refer to instructions provided by your mobile service provider or the manufacturer of your device to learn how to adjust your settings.
Children’s Privacy
HIKVISION does not intend that any portion of its HIKVISION Services will be accessed or used by children under the age of 18, or equivalent minimum age in the
relevant jurisdiction and such use is prohibited. Our HIKVISION Services are designed and intended for adults. By using the HIKVISION Services, you represent
that you are at least 18 years old, or above the equivalent minimum age in the relevant jurisdiction and understand that you must be at least 18 years old, or
above the equivalent minimum age in the relevant jurisdiction in order to create an account and purchase the goods or services advertised through our
HIKVISION Services. If we obtain actual knowledge that an account is associated with a registered user who is under the age of 18 years old, or equivalent
minimum age in the relevant jurisdiction, we will promptly delete information associated with that account. If you are a parent or guardian of a child under the
age of 18, or equivalent minimum age in the relevant jurisdiction and believe he or she has disclosed personal information to us please contact us at the
contact information below in Contact Us. A parent or guardian of a child under the age of 18, or equivalent minimum age in the relevant jurisdiction may review
and request deletion of such child’s personal information as well as prohibit the use thereof.
Global Operations
We transfer and process your information globally both in our own facilities and with service providers, or partners, regardless of where you use our Services.
The laws, regulations, and standards of the country in which your information is stored or processed may be different from those of your own country.
California Privacy Rights:
personal information that companies with whom they have an established business relationship have shared with third parties for direct marketing purposes
during the proceeding calendar year. In particular, the law provides that companies must inform consumers about the categories of personal information that
have been shared with third parties, the names and addresses of those third parties, and examples of the types of services or products marketed by those third
parties. To request a copy of the information disclosure provided by HIKVISION pursuant to Section 1798.83 of the California Civil Code, please contact us at the
contact information below in Contact Us. Please allow 30 days for a response.
Contact Us
Please contact us if you have any questions or comments about our privacy practices or this Privacy Policy. You can always reach us through the below contact
information:
Please provide: (i) your name (or nickname), your country or region of residence and your preferred method of contact; and (ii) the details of your request or
comment along with any corresponding Website links.
Pursuant to Section 1798.83 of the California Civil Code, residents of California can obtain certain information about the types of
UM IP Network Camera 071619NA 5
IP Network Camera User Manual
Symbol
Description
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
Warnings
Cautions
Mandatory Electrical Requirements
Hikvision requires the following conditions and equipment for all of its electronic equipment:
•
Grounding: Ensure good conductivity for all ground paths; examine ground path contact surfaces for defects, dirt, corrosion, or non-conductive coatings
that may impede conductivity. Repair or clean contact surfaces as necessary to assure good metal-to-metal contact. Ensure fasteners are properly
installed and tightened.
•
Electrical Wiring: Ensure your outlets are properly wired. They can be checked with an electrical outlet tester.
•
Surge Suppressor (Required): Hikvision is not responsible for any damage to equipment caused by power spikes in the electrical power grid. Use of a surge
suppressor meeting the following specifications is mandatory for all Hikvision electronic equipment:
˗ Specifications
> Listed by Underwriter’s Laboratories, meeting the UL 1449 Voltage Protection Rating (VPR)
> Minimum protection of 1,000 joules or higher
> Clamping voltage of 400 V or less
> Response time of 1 nanosecond or less
˗ Usage
> Surge suppressors must not be daisy chained with power strips or other surge suppressors
˗ Maintenance
> Replace after a serious electrical event (e.g., lighting blew out a transformer down the street)
> Replace yearly in storm-prone areas
> Replace every two years as routine maintenance
Symbol Conventions: The symbols that may be found in this document are defined as follows.
Safety Instructions
•
Proper configuration of all passwords and other security settings is the responsibility of the installer and/or end user.
•
In the use of the product, you must be in strict compliance with the electrical safety regulations of the nation and region. Please refer to technical
specifications for detailed information.
•
Input voltage should meet both the SELV (Safety Extra Low Voltage) and the Limited Power Source with 100-240 VAC or 12 VDC according to the IEC60950-1
standard. Please refer to technical specifications for detailed information.
•
Do not connect several devices to one power adapter as adapter overload may cause overheating or a fire hazard.
•
Please make sure that the plug is firmly connected into the power socket.
•
If smoke, odor, or noise rise from the device, turn off the power at once, unplug the power cable, and then contact the service center.
Preventive and Cautionary Tips: Before connecting and operating your device, please be advised of the following tips:
•
Ensure unit is installed in a well-ventilated, dust-free environment.
Ensure unit is properly secured. Major shocks or jolts to the unit as a result of dropping it may cause damage to the sensitive electronics within the unit.
•
Power down the unit before connecting and disconnecting accessories and peripherals.
The precaution measure is divided into “Warnings” and “Cautions”:
•
Warnings: Serious injury or death may be caused if any of these warnings are neglected.
•
Cautions: Injury or equipment damage may be caused if any of these cautions are neglected.
performance degradation, or unexpected results
Indicates a hazard with a high level of risk, which if not avoided, will result in death or serious injury
Follow these safeguards to prevent serious injury or death.
Warnings:
•
Use a power adapter that can meet the safety extra low voltage (SELV) standard, and source with 12 VDC or 24 VAC (depending on models) according to the
IEC60950-1 and Limited Power Source standard.
•
This installation should be made by a qualified service person and should conform to all the local codes.
•
Please install blackout equipment into the power supply circuit to avoid interruption.
UM IP Network Camera 071619NA 6
Follow these precautions to prevent potential injury or material damage.
IP Network Camera User Manual
•
Please make sure that the ceiling can support more than 50(N) Newton gravities if the camera is fixed to the ceiling.
•
If the product does not work properly, please contact your dealer or the nearest service center. Never attempt to disassemble the camera yourself. (We shall
not assume any responsibility for problems caused by unauthorized repair or maintenance.)
Cautions:
•
Make sure the power supply voltage is correct before using the camera.
•
Do not drop the camera or subject it to physical shock.
•
Do not touch sensor modules with fingers. If cleaning is necessary, use a clean cloth with a bit of ethanol and wipe it gently. If the camera will not be used
for an extended period of time, put on the lens cap to protect the sensor from dirt.
•
Do not aim the camera lens at a strong light such as the sun or an incandescent lamp. Strong light can cause fatal damage to the camera.
•
The sensor may be burned out by a laser beam, so when any laser equipment is being used, make sure that the surface of the sensor not be exposed to the
laser beam.
•
Do not place the camera in extremely hot, cold temperatures (refer to product specification for working temperature), dusty or damp environment, and do
not expose it to high electromagnetic radiation.
•
To avoid heat accumulation, ensure there is good ventilation to the device.
•
Keep the camera away from water and any liquids.
•
While shipping, pack the camera in its original, or equivalent, packing materials. Or packing the same texture.
•
Improper use or replacement of the battery may result in hazard of explosion. Please use the manufacturer recommended battery type.
NOTES: For cameras that support IR, you are required to pay attention to the following precautions to prevent IR reflection:
•
Dust or grease on the dome cover will cause IR reflection. Please do not remove the dome cover film until the installation is finished. If there is dust or
grease on the dome cover, clean the dome cover with clean soft cloth and isopropyl alcohol.
•
Make certain the installation location does not have reflective surfaces of objects too close to the camera. The IR light from the camera may reflect back
into the lens causing reflection.
•
The foam ring around the lens must be seated flush against the inner surface of the bubble to isolate the lens from the IR LEDs. Fasten the dome cover to
camera body so that the foam ring and the dome cover are attached seamlessly.
NOTE: If camera fails to synchronize local time with that of the network, you need to set up camera time manually. Visit the camera and enter system
setting interface for time setting.
UM IP Network Camera 071619NA 7
IP Network Camera User Manual
Table of Contents
Chapter 1.
Chapter 2.
2.1.
2.1.1.
2.1.2.
System Requirements .............................................................................................................. 13
9.1.1.6. White Balance .............................................................................................................................. 81
10.1.6.2. PIR Alarm ....................................................................................................................................... 96
Appendix 2 Port Mapping ........................................................................................................... 151
UM IP Network Camera 071619NA 11
IP Network Camera User Manual
UM IP Network Camera 071619NA 12
IP Network Camera User Manual
Chapter 1. System Requirements
• Operating System: Microsoft Windows XP SP1 and above version
• CPU: 2.0 GHz or higher
• RAM: 1 GB or higher
• Display: 1024×768 resolution or higher
• Web Browser
˗Cameras that Support Plug-In Free Live View: Internet Explorer 8–11, Mozilla Firefox 30.0 and
above, and Google Chrome 41.0 and above
NOTES: For Google Chrome 45 and above version or Mozilla Firefox 52 and above version, which are
plug-in free, Picture and Playback functions are hidden. To use mentioned functions via a Web
browser, change to a lower version or to Internet Explorer 8.0 and above version.
˗Cameras that Do NOT Support Plug-In Free Live View: Internet Explorer 8–11, Mozilla Firefox 30.0–
51, and Google Chrome 41.0–44.
UM IP Network Camera 071619NA 13
IP Network Camera User Manual
Chapter 2. Network Connection
You shall acknowledge that the use of the product with Internet access might be under network security
risks. For avoidance of any network attacks and information leakage, please strengthen your own
protection. If the product does not work properly, contact your dealer or the nearest service center.
To ensure the network security of the network camera, we recommend that you have the network camera
assessed and maintained periodically. Contact us if you need such service.
Before You Start
•If you want to set the network camera via a LAN (Local Area Network), refer to
Network Camera over the LAN.
Section 2.1, Setting the
•If you want to set the network camera via a WAN (Wide Area Network), refer to
Network Camera over the WAN
.
Section 2.2, Setting the
2.1. Setting the Network Camera over the LAN
Purpose
To view and configure the camera via a LAN, you need to connect the network camera to the same subnet
as your computer and install SADP or iVMS-4200 software to search and change the camera’s IP address.
NOTE: For detailed introduction to SADP, refer to
Appendix 1 SADP Software Introduction
.
2.1.1. Wiring over the LAN
The following figures show the two ways for a cable connection between a network camera and a
computer.
Purpose
•To test the network camera, you can directly connect the network camera to the computer with a
network cable as shown.
•Refer to figure to set a network camera over the LAN via a switch or a router.
Figure 1, Connecting Directly
UM IP Network Camera 071619NA 14
IP Network Camera User Manual
Figure 2, Connecting via a Switch or a Router
2.1.2. Activating the Camera
You are required to activate the camera first by setting a strong password for it before first use.
Activation via Web browser, activation via Hikvision’s SADP (Search Active Device Protocol) software, and
activation via client software are all supported.
2.1.2.1. Activation via Web Browser
1. Power on the camera and connect the camera to the network.
2. Input the IP address into the Web browser address bar, and click Enter to enter the activation
interface.
NOTES: The default IP address of the camera is 192.168.1.64.
The computer and the camera should belong to the same subnet.
For cameras that enable DHCP by default, you must use the SADP software to search for the IP
address.
UM IP Network Camera 071619NA 15
IP Network Camera User Manual
Figure 3, Activation via Web Browser
3. Create and input a password into the password field. A password containing the user name is not
allowed.
STRONG PASSWORD RECOMMENDED – We highly recommend that you create a strong password
of your own choosing (using a minimum of eight characters, including at least three of the
following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. We also recommend that you
reset your password regularly. Especially in high security systems, resetting the password
monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
4. Confirm the password.
5. Click OK to save the password and enter the live view interface.
2.1.2.2. Activation via SADP Software
SADP software is used to detect the online device, activate the camera, and reset the password.
Get the SADP software from the supplied disk or the official Website, and install the SADP according to the
prompts. Follow these steps to activate the camera:
1. Run the SADP software to search for online devices.
1. Check the device status from the device list, and select the inactive device.
UM IP Network Camera 071619NA 16
IP Network Camera User Manual
Figure 4, SADP Interface
NOTE: The SADP software supports activating the camera in batch. Refer to the SADP software user
manual for details.
2. Create and input the password in the password field, and confirm the password. A password
containing the user name is not allowed.
STRONG PASSWORD RECOMMENDED – We highly recommend that you create a strong password
of your own choosing (using a minimum of eight characters, including at least three of the
following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. We also recommend that you
reset your password regularly. Especially in high security systems, resetting the password
monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
NOTE: You can enable the Hik-Connect service for the device during activation.
3. Click Activate to start activation.
NOTE: You can check whether the activation is completed on the pop-up window. If activation failed,
please make sure that the password meets the requirement and try again.
4. Change the device IP address to the same subnet as your computer by either modifying the IP address
manually or checking the Enable DHCP checkbox.
UM IP Network Camera 071619NA 17
IP Network Camera User Manual
Figure 5, Modify the IP Address
5. Input the admin password and click Modify to activate your IP address modification.
NOTE: Batch IP address modification is supported by SADP. Refer to the SADP user manual for details.
2.1.2.3. Activation via Client Software
The client software is versatile video management software for multiple kinds of devices.
Get the client software from the supplied disk or the official Website, and install the software according
to the prompts. Follow the steps to activate the camera.
1. Run the client software, and the software control panel pops up, as shown below.
UM IP Network Camera 071619NA 18
IP Network Camera User Manual
Figure 6, Control Panel
2. Click the Device Management icon to enter the Device Management interface, as shown below.
Figure 7, Device Management Interface
3. Check the device status from the device list, and select an inactive device.
4. Click the Activate button to pop up the Activation interface.
UM IP Network Camera 071619NA 19
IP Network Camera User Manual
5. Create a password, input the password in the password field, and confirm the password.
NOTE: A password containing the user name is not allowed.
STRONG PASSWORD RECOMMENDED – We highly recommend that you create a strong password
of your own choosing (using a minimum of eight characters, including at least three of the
following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. We also recommend that you
reset your password regularly. Especially in high security systems, resetting the password
monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
Figure 8, Activation Interface (Client Software)
6. Click the OK button to start activation.
7. Click the Modify Netinfo button to pop up the Network Parameter Modification interface, as shown in
the figure below.
UM IP Network Camera 071619NA 20
IP Network Camera User Manual
Figure 9, Modifying the Network Parameters
8. Change the device IP address to the same subnet as your computer by either modifying the IP address
manually or checking the Enable DHCP checkbox.
9. Input the password to activate your IP address modification.
2.1.3. (Optional) Setting Security Question
Security question is used to reset the admin password when the admin user forgets the password.
Admin user can follow the pop-up window to complete the security question settings during camera
activation, or the admin user can go to the User Management interface to set up the function.
2.2. Setting the Network Camera over the WAN
Purpose
This section explains how to connect the network camera to the WAN with a static IP or a dynamic IP.
2.2.1. Static IP Connection
Before You Start
Apply a static IP from an ISP (Internet Service Provider). With a static IP address, you can connect the
network camera via a router or connect it to the WAN directly.
• Connecting the Network Camera via a Router
˗ Connect the network camera to the router.
˗ Assign a LAN IP address, the subnet mask, and the gateway.
˗ Save the static IP in the router.
UM IP Network Camera 071619NA 21
IP Network Camera User Manual
˗Set port mapping, e.g., 80, 8000, and 554 ports. The steps for port mapping vary by router. Please
call the router manufacturer for assistance with port mapping.
NOTE: Refer to
˗ Visit the network camera through a Web browser or the client software over the internet.
• Connecting Network Camera with Static IP Address Directly
You can also save the static IP address in the camera and directly connect it to the internet without
using a router. Refer to
Appendix 2
Figure 10, Accessing the Camera through a Router with a Static IP Address
for detailed information about port mapping.
Section 2.1.2
for detailed IP address configuration of the network camera.
Figure 11, Accessing a Camera with a Static IP Address Directly
2.2.2. Dynamic IP Address Connection
Before You Start
Apply a dynamic IP address from an ISP. With a dynamic IP address, you can connect the network camera
to a modem or a router.
2.2.2.1. Connecting Network Camera via a Router
1. Connect the network camera to the router.
2. In the camera, assign a LAN IP address, the subnet mask, and the gateway. Refer to
detailed IP address configuration of the network camera.
3. In the router, set the PPPoE user name, password, and confirm the password.
4. Set port mapping. E.g. 80, 8000, and 554 ports. The steps for port mapping vary by router. Contact your
router manufacturer for assistance with port mapping.
NOTE: Refer to
Appendix 2
for detailed information about port mapping.
Section 2.1.2
for
5. Apply a domain name from a domain name provider.
6. Configure the DDNS settings in the setting interface of the router.
7. Visit the camera via the applied domain name.
UM IP Network Camera 071619NA 22
IP Network Camera User Manual
2.2.2.2. Connecting Network Camera via a Modem
Purpose
This camera supports the PPPoE auto dial-up function. The camera gets a public IP address by ADSL dialup after the camera is connected to a modem. You need to configure the PPPoE parameters of the
network camera. Refer to
NOTE: The obtained IP address is dynamically assigned via PPPoE, so the IP address always changes
after rebooting the camera. To solve the inconvenience of a dynamic IP, you need to get a
domain name from the DDNS provider (E.g. DynDns.com). Please follow the steps below for
normal domain name resolution and private domain name resolution to solve the problem.
• Normal Domain Name Resolution
Section 7.1.3
Figure 12, Accessing a Camera with a Dynamic IP Address
Configuring PPPoE Settings for detailed configuration.
Figure 13, Normal Domain Name Resolution
˗ Apply a domain name from a domain name provider.
˗ Configure the DDNS settings in the DDNS Settings interface of the network camera. Refer to
7.1.1, Configuring DDNS Settings
˗Visit the camera via the applied domain name.
for details.
Section
UM IP Network Camera 071619NA 23
IP Network Camera User Manual
Chapter 3. Access to the Network Camera
3.1. Accessing by Web Browsers
NOTE: For certain camera models, HTTPS is enabled by default and the camera creates an unsigned
certificate automatically. When you access to the camera the first time, the Web browser
prompts a notification about the certificate issue.
To cancel the notification, install a signed-certificate to the camera. For detailed operation,
see
Section 7.2.6 HTTPS Settings.
1. Open the Web browser.
2. In the browser address bar, input the network camera’s IP address, and press the Enter key to enter
the login interface.
NOTE: The default IP address is 192.168.1.64. It is recommended that you change the IP address to the
same subnet as your computer.
3. Input the user name and password and click Login.
The admin user should configure the device accounts and user/operator permissions properly. Delete
unnecessary accounts and user/operator permissions.
NOTE: The IP address locks if the admin user performs seven failed password attempts (five attempts
by a user/operator).
Figure 14, Login Interface
4. Click Login.
5. (Optional) Install the plug-in before viewing the live video and operating the camera. Follow the
installation prompts to install the plug-in.
NOTE: For cameras that support plug-in free live view, if you are using Google Chrome 45 and above or
Mozilla Firefox 52 and above, plug-in installation is not required. But Picture and Playback
functions are hidden. To use these functions via a Web browser, change to their lower version,
or change to Internet Explorer 8.0 and above version.
UM IP Network Camera 071619NA 24
IP Network Camera User Manual
3.2. Accessing by Client Software
With iVMS-4200 client software (available on the Hikvision Website), you can view the live video and
manage the camera with the software.
Follow the installation prompts to install the software. The iVMS-4200 client software live view interface
and control panel are shown below.
Figure 15, iVMS-4200 Control Panel
Figure 16, iVMS-4200 Main View
UM IP Network Camera 071619NA 25
IP Network Camera User Manual
Chapter 4. Wi-Fi Settings
By connecting to the wireless network, you don’t need to use cables for the network connection, which is
very convenient for the actual surveillance application.
NOTE: This chapter is applicable only for cameras with a built-in Wi-Fi module.
4.1. Configuring Wi-Fi Connection in Manage and Ad-Hoc Modes
Purpose
Two connection modes are supported. Choose a mode as desired and perform the steps to configure the
Wi-Fi.
4.1.1. Wireless Connection in Manage Mode
1. Enter the Wi-Fi configuration interface, Configuration> Network> Advanced Settings> Wi-Fi.
Figure 17, Wi-Fi List
2. Click Search to search the online wireless connections.
3. Click to choose a wireless connection on the list.
UM IP Network Camera 071619NA 26
IP Network Camera User Manual
Figure 18, Wi-Fi Setting − Manage Mode
4. Check the radio button to set the Network Mode to Manage, and the network Security Mode is
automatically shown when you select the wireless network (don’t change it manually).
NOTE: These parameters are identical to those of the router.
5. Enter the key to connect the wireless network. The key should be that of the wireless network
connection you set on the router.
4.1.2. Wireless Connection in Ad-Hoc Mode
If you choose Ad-Hoc Mode, you don’t need to connect the wireless camera via a router. The scenario is
the same as connecting the camera and PC directly with a network cable.
Figure 19, Wi-Fi Setting − Ad-Hoc
1. Choose Ad-Hoc Network Mode.
2. Customize an SSID (Service Set IDentifier) to identify the camera access point (maximum 32
characters).
3. Choose the wireless connection Security Mode.
4. Enable Wi-Fi wireless network function on your PC.
5. On the PC, search the networks for the camera SSID.
UM IP Network Camera 071619NA 27
IP Network Camera User Manual
Figure 20, Ad-Hoc Connection Point
6. Choose the camera’s SSID and connect.
4.1.3. Security Mode Description:
Figure 21, Security Mode
You can choose the Security Mode as not-encrypted, WEP, WPA-personal, WPA-enterprise, WPA2personal, and WPA2-enterprise.
• WEP Mode
Figure 22, WEP Mode
˗Authentication − Select Open or Shared Key System Authentication, depending on the method used
by your access point. Not all access points have this option, in which case they probably use Open
System, which is sometimes known as SSID Authentication.
˗Key Length - This sets the length of the key used for the wireless encryption, 64 or 128 bits. The
encryption key length can sometimes be shown as 40/64 and 104/128.
UM IP Network Camera 071619NA 28
IP Network Camera User Manual
˗Key Type - The key types available depend on the access point being used. The following options
are available:
> HEX: Allows you to manually enter the hex key.
> ASCII: In this method the string must be exactly five characters for 64-bit WEP and 13
characters for 128-bit WEP.
>WPA-personal and WPA2-personal Mode: Enter the required Pre-Shared Key for the access
point, which can be a hexadecimal number or a passphrase.
Figure 23, Security Mode − WPA-Personal
>WPA- enterprise and WPA2-enterprise Mode: Choose the type of client/server authentication
being used by the access point, EAP-TLS or EAP-PEAP.
• EAP-TLS
˗
Identity
˗
Private Key Password
˗
EAPOL Version
Figure 24, EAP-TLS
− Enter the user ID to present to the network.
− Enter the password for your user ID.
− Select the version used (1 or 2) in your access point.
˗
CA Certificates
− Upload a CA certificate to present to the access point for authentication.
• EAP-PEAP
˗
User Name
˗
Password
˗
PEAP Version
UM IP Network Camera 071619NA 29
− Enter the user name to present to the network.
− Enter the network password.
− Select the PEAP version used at the access point.
IP Network Camera User Manual
˗
Label
− Select the label used by the access point.
˗
EAPOL Version
˗
CA Certificates
− Select version (1 or 2) depending on the version used at the access point.
− Upload a CA certificate to present to the access point for authentication.
STRONG PASSWORD RECOMMENDED – We highly recommend that you create a strong password
of your own choosing (using a minimum of eight characters, including at least three of the
following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. We also recommend that you
reset your password regularly. Especially in high security systems, resetting the password
monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
4.2. Easy Wi-Fi Connection with WPS Function
Purpose
Setting a wireless network connection is never easy. To avoid the complexity of setting up the wireless
connection, you can enable the WPS function.
WPS (Wi-Fi Protected Setup) refers to an easy procedure to configure an encrypted connection between a
device and a wireless router. WPS makes it easy to add new devices to an existing network without
entering long passphrases. There are two modes of WPS connection, PBC mode and PIN mode.
NOTE: If you enable the WPS function, you do not need to configure parameters such as encryption
type, and you don’t need to know the wireless connection key.
Figure 25, Wi-Fi Settings - WPS
PBC Mode
PBC stands for Push-Button-Configuration, in which the user simply has to push a button, either an actual
or virtual one (as the button on the Internet Explorer browser configuration interface), on both
the Access Point (and a registrar of the network) and the new wireless client device.
1. Check the checkbox to enable WPS.
UM IP Network Camera 071619NA 30
Loading...
+ 123 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.