Hikvision DS-2CD6D52G0-IHS-2-8mm User Manual

Network Camera User Manual
0
User Manual
Network Camera
Network Camera User Manual
1
User Manual
© 2019 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
This Manual is the property of Hangzhou Hikvision Digital Technology Co., Ltd. or its
affiliates (hereinafter referred to as "Hikvision"), and it cannot be reproduced,
changed, translated, or distributed, partially or wholly, by any means, without the
prior written permission of Hikvision. Unless otherwise expressly stated herein,
Hikvision does not make any warranties, guarantees or representations, express or
implied, regarding to the Manual, any information contained herein.
About this Manual
The Manual includes instructions for using and managing the Product. Pictures,
charts, images and all other information hereinafter are for description and
explanation only. The information contained in the Manual is subject to change,
without notice, due to firmware updates or other reasons. Please find the latest
version of this Manual at the Hikvision website (http://www.hikvision.com/en/).
Please use this Manual with the guidance and assistance of professionals trained in
supporting the Product.
Trademarks Acknowledgement
and other Hikvision’s trademarks and logos are the properties of
Hikvision in various jurisdictions.
Other trademarks and logos mentioned are the properties of their respective
owners.
The terms HDMI and HDMI High-Definition Multimedia Interface, and
the HDMI Logo are trademarks or registered trademarks of HDMI Licensing
Administrator, Inc. in the United States and other countries.
LEGAL DISCLAIMER
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS MANUAL AND
Network Camera User Manual
2
THE PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE
PROVIDED "AS IS" AND "WITH ALL FAULTS AND ERRORS". HIKVISION MAKES NO
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION,
MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR
PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT
WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL,
OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF
BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF
SYSTEMS, OR LOSS OF DOCUMENTATION, WHETHER BASED ON BREACH OF
CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY, OR OTHERWISE,
IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
YOU ACKNOWLEDGE THAT THE NATURE OF INTERNET PROVIDES FOR INHERENT
SECURITY RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR
ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM
CYBER-ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY
RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF
REQUIRED.
YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS,
AND YOU ARE SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO
THE APPLICABLE LAW. ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS
PRODUCT IN A MANNER THAT DOES NOT INFRINGE ON THE RIGHTS OF THIRD
PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF PUBLICITY, INTELLECTUAL
PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS. YOU SHALL
NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE
DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE
DEVELOPMENT OR PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY
ACTIVITIES IN THE CONTEXT RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE
NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN RIGHTS ABUSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE
Network Camera User Manual
3
LAW, THE LATER PREVAILS.
Safety Instruction
These instructions are intended to ensure that the user can use the product correctly
to avoid danger or property loss.
The precaution measure is divided into "Warnings" and "Cautions":
Warnings: Serious injury or death may be caused if any of these warnings are
neglected.
Cautions: Injury or equipment damage may be caused if any of these cautions are
neglected.
Warnings Follow these safeguards to
prevent serious injury or death.
Cautions Follow these precautions to
prevent potential injury or material damage.
Warnings:
If camera fails to synchronize local time with that of the network, you need to set
up camera time manually. Visit the camera and enter system settings interface for
time setting.
Please adopt the power adapter which can meet the safety extra low voltage
(SELV) standard. And source with 12 VDC or 24 VAC (depending on models)
according to the IEC60950-1 and Limited Power Source standard.
To reduce the risk of fire or electrical shock, do not expose this product to rain or
moisture.
This installation should be made by a qualified service person and should
conform to all the local codes.
Please install blackouts equipment into the power supply circuit for convenient
Network Camera User Manual
4
supply interruption.
Please make sure that the ceiling can support more than 50(N) Newton gravities
if the camera is fixed to the ceiling.
If the product does not work properly, please contact your dealer or the nearest
service center. Never attempt to disassemble the camera yourself. (We shall not
assume any responsibility for problems caused by unauthorized repair or
maintenance.)
Cautions:
Make sure the power supply voltage is correct before using the camera. Do not drop the camera or subject it to physical shock. Do not touch sensor modules with fingers. If cleaning is necessary, use a clean
cloth with a bit of ethanol and wipe it gently. If the camera will not be used for
an extended period of time, put on the lens cap to protect the sensor from dirt.
Do not aim the camera lens at the strong light such as sun or incandescent lamp.
The strong light can cause fatal damage to the camera.
The sensor may be burned out by a laser beam, so when any laser equipment is
being used, make sure that the surface of the sensor not be exposed to the laser
beam.
Do not place the camera in extremely hot, cold temperatures (refer to product
specification for working temperature), dusty or damp environment, and do not
expose it to high electromagnetic radiation.
To avoid heat accumulation, ensure there is good ventilation to the device. Keep the camera away from water and any liquids. While shipping, pack the camera in its original, or equivalent, packing materials.
Or packing the same texture.
Improper use or replacement of the battery may result in hazard of explosion.
Please use the manufacturer recommended battery type.
Notes:
Network Camera User Manual
5
For the camera supports IR, you are required to pay attention to the following
precautions to prevent IR reflection:
Dust or grease on the dome cover will cause IR reflection. Please do not remove
the dome cover film until the installation is finished. If there is dust or grease on
the dome cover, clean the dome cover with clean soft cloth and isopropyl
alcohol.
Make certain the installation location does not have reflective surfaces of objects
too close to the camera. The IR light from the camera may reflect back into the
lens causing reflection.
The foam ring around the lens must be seated flush against the inner surface of
the bubble to isolate the lens from the IR LEDS. Fasten the dome cover to
camera body so that the foam ring and the dome cover are attached seamlessly.
Network Camera User Manual
6
Table of Contents
System Requirement .............................................................................. 10
Network Connection .............................................................................. 11
Setting the Network Camera over the LAN ...................................................... 11
2.1.1 Wiring over the LAN........................................................................................................ 11
2.1.2 Activating the Camera .................................................................................................... 12
2.1.3 (Optional) Setting Security Question .............................................................................. 19
Setting the Network Camera over the WAN .................................................... 19
Static IP Connection ........................................................................................................ 19
2.2.2 Dynamic IP Connection ................................................................................................... 20
Access to the Network Camera ............................................................. 23
Accessing by Web Browsers ............................................................................ 23
Accessing by Client Software .......................................................................... 24
Wi-Fi Settings ......................................................................................... 26
Configuring Wi-Fi Connection in Manage and Ad-hoc Modes ........................... 26
Easy Wi-Fi Connection with WPS function ....................................................... 31
IP Property Settings for Wireless Network Connection .................................... 34
Live View ................................................................................................ 35
Live View Page ............................................................................................... 35
Live Operation ............................................................................................... 36
Recording and Capturing Pictures Manually .................................................... 37
Quick Setup ................................................................................................... 38
5.4.1 Operating PTZ Control .................................................................................................... 38
5.4.2 General Settings .............................................................................................................. 41
5.4.3 VCA Resource .................................................................................................................. 42
Install Plug-in ................................................................................................. 42
Network Camera Configuration ........................................................... 44
Configuring Local Parameters ......................................................................... 44
Configure System Settings .............................................................................. 46
6.2.1 Configuring Basic Information ........................................................................................ 46
6.2.2 Configuring Time Settings ............................................................................................... 46
6.2.3 Configuring RS-232 Settings ............................................................................................ 48
6.2.4 Configuring RS-485 Settings ............................................................................................ 49
6.2.5 Configuring DST Settings ................................................................................................. 50
6.2.6 Configuring External Devices .......................................................................................... 51
Network Camera User Manual
7
6.2.7 Configuring VCA Resource .............................................................................................. 52
6.2.8 Configuring Metadata Settings ....................................................................................... 52
6.2.9 Open Source Software License ....................................................................................... 53
Maintenance ................................................................................................. 53
Upgrade & Maintenance ................................................................................................ 53
6.3.2 Log .................................................................................................................................. 55
6.3.3 System Service ................................................................................................................ 56
6.3.4 Security Audit Log ........................................................................................................... 57
Security Settings ............................................................................................ 59
Authentication ................................................................................................................ 59
6.4.2 IP Address Filter .............................................................................................................. 59
6.4.3 Security Service............................................................................................................... 61
6.4.4 Advanced Security .......................................................................................................... 62
6.4.5 Certificate Management ................................................................................................. 62
User Management ......................................................................................... 65
User Management .......................................................................................................... 65
6.5.2 Security Question ........................................................................................................... 67
Online Users .................................................................................................................... 69
Network Settings .................................................................................... 70
Configuring Basic Settings .............................................................................. 70
7.1.1 Configuring TCP/IP Settings ............................................................................................ 70
7.1.2 Configuring DDNS Settings .............................................................................................. 72
7.1.3 Configuring PPPoE Settings ............................................................................................. 74
7.1.4 Configuring Port Settings ................................................................................................ 74
7.1.5 Configure NAT (Network Address Translation) Settings .................................................. 76
7.1.6 Configuring Multicast ..................................................................................................... 77
Configure Advanced Settings .......................................................................... 78
Configuring SNMP Settings ............................................................................................. 78
7.2.2 Configuring FTP Settings ................................................................................................. 81
7.2.3 Configuring Email Settings .............................................................................................. 83
7.2.4 Platform Access .............................................................................................................. 85
7.2.5 Wireless Dial ................................................................................................................... 86
7.2.6 HTTPS Settings ................................................................................................................ 88
7.2.7 Configuring QoS Settings ................................................................................................ 89
7.2.8 Configuring 802.1X Settings ............................................................................................ 89
7.2.9 Integration Protocol ........................................................................................................ 91
7.2.10 Bandwidth Adaptation .................................................................................................... 92
7.2.11 Network Service .............................................................................................................. 92
7.2.12 Smooth Streaming .......................................................................................................... 93
7.2.13 Configuring HTTP Listening ............................................................................................. 94
7.2.14 Configuring SRTP Settings ............................................................................................... 95
Video/Audio Settings ............................................................................. 96
Network Camera User Manual
8
Configuring Video Settings ............................................................................. 96
8.1.1 Video Settings ................................................................................................................. 96
8.1.2 Custom Video................................................................................................................ 100
Configuring Audio Settings ........................................................................... 101
Configuring ROI Encoding ............................................................................. 102
Display Info. on Stream ................................................................................ 104
Configuring Target Cropping ......................................................................... 104
Image Settings ...................................................................................... 106
Configuring Display Settings ......................................................................... 106
Configuring OSD Settings .............................................................................. 110
Configuring Privacy Mask ............................................................................. 112
Configuring Picture Overlay .......................................................................... 113
Configuring Image Parameters Switch ........................................................... 114
Event Settings ....................................................................................... 116
Basic Events ................................................................................................. 116
10.1.1 Configuring Motion Detection ...................................................................................... 116
10.1.2 Configuring Video Tampering Alarm ............................................................................. 122
10.1.3 Configuring Alarm Input ............................................................................................... 123
10.1.4 Configuring Alarm Output ............................................................................................ 125
10.1.5 Handling Exception ....................................................................................................... 126
10.1.6 Configuring Flashing Alarm Light Output ...................................................................... 126
10.1.7 Configuring Audible Alarm Output ............................................................................... 127
10.1.8 Configuring Other Alarm ............................................................................................... 128
Smart Events ................................................................................................ 131
Configuring Audio Exception Detection ........................................................................ 131
10.2.2 Configuring Defocus Detection ..................................................................................... 133
10.2.3 Configuring Scene Change Detection ........................................................................... 134
10.2.4 Configuring Face Detection ........................................................................................... 135
10.2.5 Configuring Intrusion Detection ................................................................................... 136
10.2.6 Configuring Line Crossing Detection ............................................................................. 139
10.2.7 Configuring Region Entrance Detection ........................................................................ 141
10.2.8 Configuring Region Exiting Detection ........................................................................... 143
10.2.9 Configuring Unattended Baggage Detection ................................................................ 145
10.2.10 Configuring Object Removal Detection ........................................................................ 147
VCA Configuration ........................................................................................ 149
10.3.1 Face Capture ................................................................................................................. 149
10.3.2 People Counting ............................................................................................................ 154
10.3.3 Counting ....................................................................................................................... 157
10.3.4 Heat Map ...................................................................................................................... 158
Network Camera User Manual
9
10.3.5 Road Traffic ................................................................................................................... 160
10.3.6 Queue Management ..................................................................................................... 162
10.3.7 Hard Hat Detection ....................................................................................................... 165
10.3.8 Behavior Analysis .......................................................................................................... 165
10.3.9 EPTZ .............................................................................................................................. 172
Storage Settings .................................................................................... 175
Configuring Record Schedule ........................................................................ 175
Configure Capture Schedule ......................................................................... 178
Configure HDD Management ........................................................................ 180
Configuring Net HDD .................................................................................... 182
Memory Card Detection ............................................................................... 183
Configuring Lite Storage ............................................................................... 185
Configuring Cloud Storage ............................................................................ 186
Playback ................................................................................................ 188
Picture ................................................................................................... 190
Application ........................................................................................... 191
Face Capture Statistics.................................................................................. 191
People Counting Statistics ............................................................................ 192
Heat Map Statistics ...................................................................................... 192
Counting Statistics ....................................................................................... 194
Queue Management Statistics ...................................................................... 194
14.5.1 Queuing-Up Time Analysis ............................................................................................ 195
14.5.2 Queue Status Analysis................................................................................................... 196
14.5.3 Raw Data ....................................................................................................................... 197
Open Platform ...................................................................................... 198
Smart Display ....................................................................................... 201
Appendix ................................................................................................................. 202
Appendix 1 SADP Software Introduction ................................................................... 202
Appendix 2 Port Mapping ......................................................................................... 205
Appendix 3 .............................................................................................................. 207
Device Communication Matrix ................................................................................. 207
Device Command ..................................................................................................... 207
Network Camera User Manual
10
System Requirement
Operating System
Microsoft Windows XP SP1 and above version
CPU
2.0 GHz or higher
RAM
1G or higher
Display
1024×768 resolution or higher
Web Browser
For camera that supports plug-in free live view
Internet Explorer 8 – 11, Mozilla Firefox 30.0 and above version and Google
Chrome 41.0 and above version.
Note:
For Google Chrome 45 and its above version or Mozilla Firefox 52 and its above
version that are plug-in free, Picture and Playback functions are hidden.
To use mentioned functions via web browser, change to their lower version, or
change to Internet Explorer 8.0 and above version.
For camera that does NOT support plug-in free live view
Internet Explorer 8 – 11, Mozilla Firefox 30.0 – 51, and Google Chrome 41.0 –
44.
Network Camera User Manual
11
Network Connection
Note:
You shall acknowledge that the use of the product with Internet access might be
under network security risks. For avoidance of any network attacks and
information leakage, please strengthen your own protection. If the product does
not work properly, please contact with your dealer or the nearest service center.
To ensure the network security of the network camera, we recommend you to
have the network camera assessed and maintained termly. You can contact us if
you need such service.
Before you start:
If you want to set the network camera via a LAN (Local Area Network), please
refer to 2.1 Setting the Network Camera over the LAN.
If you want to set the network camera via a WAN (Wide Area Network), please
refer to 2.2 Setting the Network Camera over the WAN.

Setting the Network Camera over the LAN

Purpose:
To view and configure the camera via a LAN, you need to connect the network
camera in the same subnet with your computer, and install the SADP or iVMS-4200
software to search and change the IP of the network camera.
Note: For the detailed introduction of SADP, please refer to Appendix 1.

2.1.1 Wiring over the LAN

The following figures show the two ways of cable connection of a network camera
and a computer:
Purpose:
To test the network camera, you can directly connect the network camera to the
Network Camera User Manual
12
computer with a network cable as shown in Figure 2-1.
Refer to the Figure 2-2 to set network camera over the LAN via a switch or a
router.
Network Cable
or
Network Camera
Computer
Connecting Directly
Network Cable
Network Cable
or
or
Network Camera Computer
Connecting via a Switch or a Router

2.1.2 Activating the Camera

You are required to activate the camera first by setting a strong password for it
before you can use the camera.
Activation via Web Browser, Activation via SADP, and Activation via Client Software
are all supported.
Activation via Web Browser
Steps:
1. Power on the camera, and connect the camera to the network.
2. Input the IP address into the address bar of the web browser, and click Enter to
enter the activation interface.
Notes:
The default IP address of the camera is 192.168.1.64. The computer and the camera should belong to the same subnet.
Network Camera User Manual
13
For the camera enables the DHCP by default, you need to use the SADP software
to search the IP address.
Activation via Web Browser
3. Create and input a password into the password field.
A password with user name in it is not allowed.
STRONG PASSWORD RECOMMENDED–We highly recommend you create a
strong password of your own choosing (using a minimum of 8 characters,
including at least three of the following categories: upper case letters, lower
case letters, numbers, and special characters) in order to increase the security
of your product. And we recommend you reset your password regularly,
especially in the high security system, resetting the password monthly or
weekly can better protect your product.
4. Confirm the password.
5. Click OK to save the password and enter the live view interface.
Activation via SADP Software
SADP software is used for detecting the online device, activating the camera, and
resetting the password.
Get the SADP software from the supplied disk or the official website, and install the
SADP according to the prompts. Follow the steps to activate the camera.
Network Camera User Manual
14
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select the inactive device.
SADP Interface
Note:
The SADP software supports activating the camera in batch. Refer to the user manual
of SADP software for details.
3. Create and input the password in the password field, and confirm the password.
A password with user name in it is not allowed.
STRONG PASSWORD RECOMMENDEDWe highly recommend you
create a strong password of your own choosing (using a minimum of 8
characters, including at least three of the following categories: upper
case letters, lower case letters, numbers, and special characters) in
order to increase the security of your product. And we recommend you
reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your
product.
Note:
You can enable the Hik-Connect service for the device during activation.
Select inactive device.
Input and confirm password.
Network Camera User Manual
15
4. Click Activate to start activation.
You can check whether the activation is completed on the popup window. If
activation failed, please make sure that the password meets the requirement and try
again.
5. Change the device IP address to the same subnet with your computer by either
modifying the IP address manually or checking the checkbox of Enable DHCP.
Modify the IP Address
6. Input the admin password and click Modify to activate your IP address
modification.
The batch IP address modification is supported by the SADP. Refer to the user manual
of SADP for details.
Activation via Client Software
The client software is versatile video management software for multiple kinds of
devices.
Get the client software from the supplied disk or the official website, and install the
Network Camera User Manual
16
software according to the prompts. Follow the steps to activate the camera.
Steps:
1. Run the client software and the control panel of the software pops up, as shown
in the figure below.
Control Panel
2. Click the Device Management icon to enter the Device Management interface, as
shown in the figure below.
Network Camera User Manual
17
Device Management Interface
3. Check the device status from the device list, and select an inactive device.
4. Click the Activate button to pop up the Activation interface.
5. Create a password and input the password in the password field, and confirm the
password.
A password with user name in it is not allowed.
STRONG PASSWORD RECOMMENDEDWe highly recommend you
create a strong password of your own choosing (using a minimum of 8
characters, including at least three of the following categories: upper
case letters, lower case letters, numbers, and special characters) in order
to increase the security of your product. We recommend you reset your
password regularly, especially in the high security system, resetting the
password monthly or weekly can better protect your product.
Network Camera User Manual
18
Activation Interface (Client Software)
6. Click OK button to start activation.
7. Click the Modify Netinfo button to pop up the Network Parameter Modification
interface, as shown in the figure below.
Modifying the Network Parameters
8. Change the device IP address to the same subnet with your computer by either
modifying the IP address manually or checking the checkbox of Enable DHCP.
9. Input the password to activate your IP address modification.
Network Camera User Manual
19

2.1.3 (Optional) Setting Security Question

Security question is used to reset the admin password when admin user forgets the
password.
Admin user can follow the pop-up window to complete security question settings
during camera activation. Or, admin user can go to User Management interface to
set up the function.

Setting the Network Camera over the WAN

Purpose:
This section explains how to connect the network camera to the WAN with a static IP
or a dynamic IP.

Static IP Connection

Before you start:
Please apply a static IP from an ISP (Internet Service Provider). With the static IP
address, you can connect the network camera via a router or connect it to the WAN
directly.
Connecting the network camera via a router
Steps:
1. Connect the network camera to the router.
2. Assign a LAN IP address, the subnet mask and the gateway. Refer to 2.1.2
Activating the Camera for detailed IP address configuration of the network
camera.
3. Save the static IP in the router.
4. Set port mapping, e.g., 80, 8000, and 554 ports. The steps for port mapping vary
according to the different routers. Please call the router manufacturer for
assistance with port mapping.
Network Camera User Manual
20
Note: Refer to Appendix 2 for detailed information about port mapping.
5. Visit the network camera through a web browser or the client software over the
internet.
Accessing the Camera through Router with Static IP
Connecting the network camera with static IP directly
You can also save the static IP in the camera and directly connect it to the internet
without using a router. Refer to 2.1.2 Activating the Camera for detailed IP address
configuration of the network camera.
Accessing the Camera with Static IP Directly

2.2.2 Dynamic IP Connection

Before you start:
Please apply a dynamic IP from an ISP. With the dynamic IP address, you can connect
the network camera to a modem or a router.
Connecting the network camera via a router
Steps:
1. Connect the network camera to the router.
2. In the camera, assign a LAN IP address, the subnet mask and the gateway. Refer
to 2.1.2 Activating the Camera for detailed IP address configuration of the
network camera.
3. In the router, set the PPPoE user name, password and confirm the password.
4. Set port mapping. E.g. 80, 8000, and 554 ports. The steps for port mapping vary
depending on different routers. Please call the router manufacturer for assistance
Network Camera User Manual
21
with port mapping.
Note: Refer to Appendix 2 for detailed information about port mapping.
5. Apply a domain name from a domain name provider.
6. Configure the DDNS settings in the setting interface of the router.
7. Visit the camera via the applied domain name.
Connecting the network camera via a modem
Purpose:
This camera supports the PPPoE auto dial-up function. The camera gets a public IP
address by ADSL dial-up after the camera is connected to a modem. You need to
configure the PPPoE parameters of the network camera. Refer to 7.1.3 Configuring
PPPoE Settings for detailed configuration.
Accessing the Camera with Dynamic IP
Note: The obtained IP address is dynamically assigned via PPPoE, so the IP address
always changes after rebooting the camera. To solve the inconvenience of the
dynamic IP, you need to get a domain name from the DDNS provider (E.g.
DynDns.com). Please follow the steps below for normal domain name resolution and
private domain name resolution to solve the problem.
Normal Domain Name Resolution
Normal Domain Name Resolution
Steps:
Network Camera User Manual
22
1. Apply a domain name from a domain name provider.
2. Configure the DDNS settings in the DDNS Settings interface of the network
camera. Refer to 7.1.2 Configuring DDNS Settings for detailed configuration.
3. Visit the camera via the applied domain name.
Network Camera User Manual
23
Access to the Network
Camera

Accessing by Web Browsers

Note:
For certain camera models, HTTPS is enabled by default and the camera creates an
unsigned certificate automatically. When you access to the camera the first time, the
web browser prompts a notification about the certificate issue.
To cancel the notification, install a signed-certificate to the camera. For detailed
operation, see 0 HTTPS Settings.
Steps:
1. Open the web browser.
2. In the browser address bar, input the IP address of the network camera, and press
the Enter key to enter the login interface.
Note:
The default IP address is 192.168.1.64. You are recommended to change the IP
address to the same subnet with your computer.
3. Input the user name and password and click Login.
The admin user should configure the device accounts and user/operator
permissions properly. Delete the unnecessary accounts and user/operator
permissions.
Note:
The IP address is locked if the admin user performs 7 failed password attempts (5
attempts for the user/operator).
Network Camera User Manual
24
Login Interface
4. Click Login.
5. (Optional) Install the plug-in before viewing the live video and operating the
camera. Follow the installation prompts to install the plug-in
Note:
For camera that supports plug-in free live view, if you are using Google Chrome 45
and its above version or Mozilla Firefox 52 and its above version, plug-in
installation is not required. But Picture and Playback functions are hidden. To use
mentioned function via web browser, change to their lower version, or change to
Internet Explorer 8.0 and above version.

Accessing by Client Software

The product CD contains the iVMS-4200 client software. You can view the live video
and manage the camera with the software.
Follow the installation prompts to install the software. The control panel and live
view interface of iVMS-4200 client software are shown as below.
Network Camera User Manual
25
iVMS-4200 Control Panel
iVMS-4200 Main View
Network Camera User Manual
26
Wi-Fi Settings
Purpose:
By connecting to the wireless network, you do not need to use cable of any kind for
network connection, which is very convenient for the actual surveillance application.
Note: This chapter is only applicable for the cameras with the built-in Wi-Fi module.
Configuring Wi-Fi Connection in Manage and
Ad-hoc Modes
Purpose:
Two connection modes are supported. Choose a mode as desired and perform the
steps to configure the Wi-Fi.
Wireless Connection in Manage Mode
Steps:
1. Enter the Wi-Fi configuration interface.
Configuration> Network> Advanced Settings> Wi-Fi
2. Click Search to search the online wireless connections.
Wi-Fi List
Network Camera User Manual
27
3. Click to choose a wireless connection on the list.
Wi-Fi Setting- Manage Mode
4. Check the radio button to select the Network mode as Manage, and the
Security mode of the network is automatically shown when you select the
wireless network, please do not change it manually.
Note: These parameters are exactly identical with those of the router.
5. Enter the key to connect the wireless network. The key should be that of the
wireless network connection you set on the router.
Wireless Connection in Ad-hoc Mode
If you choose the Ad-hoc mode, you do not need to connect the wireless camera via
a router. The scenario is the same as you connect the camera and the PC directly
with a network cable.
Steps:
1. Choose Ad-hoc mode.
Wi-Fi Setting- Ad-hoc
Network Camera User Manual
28
2. Customize a SSID for the camera.
3. Choose the Security Mode of the wireless connection.
4. Enable the wireless connection function for your PC.
5. On the PC side, search the network and you can see the SSID of the camera
listed.
Ad-hoc Connection Point
6. Choose the SSID and connect.
Security Mode Description:
Security Mode
You can choose the Security Mode as not-encrypted, WEP, WPA-personal,
WPA-enterprise, WPA2-personal, and WPA2-enterprise.
WEP mode:
Network Camera User Manual
29
WEP Mode
Authentication - Select Open or Shared Key System Authentication, depending on
the method used by your access point. Not all access points have this option, in
which case they probably use Open System, which is sometimes known as SSID
Authentication.
Key length - This sets the length of the key used for the wireless encryption, 64 or
128 bit. The encryption key length can sometimes be shown as 40/64 and
104/128.
Key type - The key types available depend on the access point being used. The
following options are available:
HEX - Allows you to manually enter the hex key.
ASCII - In this method, the string must be exactly 5 characters for 64-bit WEP and
13 characters for 128-bit WEP.
WPA-personal and WPA2-personal Mode:
Enter the required Pre-shared Key for the access point, which can be a hexadecimal
number or a passphrase.
Security Mode- WPA-personal
WPA- enterprise and WPA2-enterprise Mode:
Loading...
+ 179 hidden pages