These instructions are intended to ensure that the user can use the product correctly to avoid
danger or property loss.
The precaution measure is divided into ‘Warnings’ and ‘Cautions’:
Warnings: Serious injury or death may be caused if any of these warnings are neglected.
Cautions: Injury or equipment damage may be caused if any of these cautions are neglected.
Warnings:
Adopt the power adapter which can meet the safety extra low voltage (SELV) standard. The
power consumption cannot be less than the required value.
Do not connect several devices to one power adapter as an adapter overload may cause
over-heating and can be a fire hazard.
When the product is installed on a wall or ceiling, the device should be firmly fixed.
To reduce the risk of fire or electrical shock, do not expose the indoor used product to rain or
moisture.
This installation should be made by a qualified service person and should conform to all the
local codes.
Install blackouts equipment into the power supply circuit for convenient supply interruption.
If the product does not work properly, contact your dealer or the nearest service center.
Never attempt to disassemble the product yourself. (We shall not assume any responsibility
for problems caused by unauthorized repair or maintenance.)
Cautions:
If the camera fails to synchronize local time with that of the network, you need to set up
camera time manually. Visit the camera (via web browser or client software) and enter
system settings interface for time settings.
Make sure the power supply voltage is correct before using the product.
Do not drop the product or subject it to physical shock. Do not install the product on
vibratory surface or places.
Do not expose it to high electromagnetic radiating environment.
Do not aim the lens at the strong light such as sun or incandescent lamp. The strong light can
cause fatal damage to the product.
The sensor may be burned out by a laser beam, so when any laser equipment is being used,
make sure that the surface of the sensor not be exposed to the laser beam.
For working temperature, refer to the specification manual for details.
To avoid heat accumulation, good ventilation is required for a proper operating environment.
While shipping, the product should be packed in its original packing.
Use the provided glove when open up the product cover. Do not touch the product cover
with fingers directly, because the acidic sweat of the fingers may erode the surface coating of
the product cover.
Use a soft and dry cloth when clean inside and outside surfaces of the product cover. Do not
use alkaline detergents.
Improper use or replacement of the battery may result in hazard of explosion. Use the
You are required to activate the camera first before you can use the camera.
Activation via web browser, activation via SADP, and activation via client software are supported.
Activation via Web Browser
Steps:
1. Power on the camera, and connect the camera to the network.
2. Input the IP address into the address bar of the web browser, and click Enter to enter the
activation interface.
The default IP address of the camera is 192.168.1.64.
Figure 2-3 Activation Interface (Web)
3. Create a password and input the password into the password field.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
4. Confirm the password.
5. Click OK to activate the camera and enter the live view interface.
Activation via SADP Software
SADP software is used for detecting the online device, activating the device, and resetting the
password.
Get the SADP software from the supplied disk or the official website, and install the SADP
according to the prompts. Follow the steps to activate the camera.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select an inactive device.
Figure 2-4 SADP Interface
The SADP software supports activating the camera in batch. Refer to the user manual of
SADP software for details.
3. Create a password and input the password in the password field, and confirm the password.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
Figure 2-8 Activation Interface
6. Click OK to start activation.
7. Click Modify Netinfo to pop up the Network Parameter Modification interface, as shown in
Figure 2-9.
Figure 2-9 Modifying the Network Parameters
8. Change the device IP address to the same subnet with your computer by either modifying
the IP address manually or checking the checkbox of Enable DHCP.
9. Input the password to activate your IP address modification.
Figure 2-11 Accessing the Camera with Static IP Directly
2.2.2 Dynamic IP Connection
Before you start:
Apply a dynamic IP from an ISP. With the dynamic IP address, you can connect the network
camera to a modem or a router.
Connecting the network camera via a router
Steps:
1. Connect the network camera to the router.
2. In the camera, assign a LAN IP address, the subnet mask and the gateway. Refer to Section
2.1.2 for detailed LAN configuration.
3. In the router, set the PPPoE user name, password and confirm the password.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
4. Set port mapping. E.g. 80, 8000 and 554 ports. The steps for port mapping vary depending on
different routers. Call the router manufacturer for assistance with port mapping.
5. Apply a domain name from a domain name provider.
6. Configure the DDNS settings in the setting interface of the router.
7. Visit the camera via the applied domain name.
Connecting the network camera via a modem
Purpose:
This camera supports the PPPoE auto dial-up function. The camera gets a public IP address by
ADSL dial-up after the camera is connected to a modem. You need to configure the PPPoE
parameters of the network camera. Refer to Section 6.1.1 Configuring PPPoE Settings for
In this and the following chapters, operation of the camera by the web browser will be taken as
an example.
4.1 Configuring Local Parameters
The local configuration refers to the parameters of the live view and other operations using the
web browser.
Steps:
1. Enter the Local Configuration interface:
Configuration > Local
Figure 4-1 Local Configuration Interface
2. Configure the following settings:
Live View Parameters: Set the protocol type, play performance, rules and image format.
Protocol Type: TCP, UDP, MULTICAST and HTTP are selectable.
TCP: Ensures complete delivery of streaming data and better video quality, yet the
real-time transmission will be affected.
UDP: Provides real-time audio and video streams.
MULTICAST: It’s recommended to select the protocol type to MULTICAST when using
the Multicast function.
HTTP: Allows the same quality as of TCP without setting specific ports for streaming
under some network environments.
Play Performance: Set the play performance to Shortest Delay, Balanced, or Fluent.
Rules: You can enable or disable the rules of dynamic analysis for motion here.
Image Format: The captured pictures can be saved as different format. JPEG and BMP are
available.
Record File Settings: Set the saving path of the video files.
Record File Size: Select the packed size of manually recorded and downloaded video files.
The size can be set to 256M, 512M or 1G.
Save record files to: Set the saving path for the manually recorded video files.
Save downloaded files to: Set the saving path for the downloaded video files in
interface.
Picture and Clip Settings: Set the saving paths of the captured pictures and clipped video
files.
Save snapshots in live view to: Set the saving path of the manually captured pictures in
interface.
Save snapshots when playback to: Set the saving path of the captured pictures in
interface.
Save clips to: Set the saving path of the clipped video files in interface.
You can click Browse to change the directory for saving video files, clips and pictures.
You can click Open to directly open the video files, clips and pictures.
3. Click to save the settings.
4.2 Live View Page
Purpose:
The live video page allows you to view live video, capture images, realize PTZ control, set/call
presets and configure video parameters.
Log in the network camera to enter the live view page, or you can click on the menu
bar of the main page to enter the live view page.
The functions vary depeding on different camera models. Refer to the actual interface as
For some certain camera models, disable the third stream first and then the true WDR function is
valid.
Click to select between and play the live video via player Webcomponents
or Quick Time. The live video is played via webcomponents by default, and other types of
players are supported for the browser, such as MJPEG, and VLC. You are required to download
and install the player to play the live video.
Click and it displays . Click to enable two-way audio and the icon turns
into. Click the icon again to stop two-way audio.
Click to start live view and the icon turns into . Click the icon again to stop live view.
Click to capture the picture.
Click to start recording and the icon turns into . Click the icon again to stop
recording.
Click to enable digital zoom function and the icon turns into . Then drag the mouse
towards low right direction to draw a rectangle on the image as the desired zoom. After
viewing it you can click any place of the picture to get back to normal picture.
Click the on the toolbar to enter the regional exposure operation mode and the icon
turns into . Then drag the mouse to draw a rectangle on the image as the desired
exposure region.
Click the on the toolbar to enter the regional focus operation mode and the icon turns
into . Then drag the mouse to draw a rectangle on the image as the desired focus region.
Click to display the . Drag the slider to adjust the volume.
Before using the two-way audio or recording with audio functions, set the Stream Type to Video
& Audio referring to Section 6.2.1 Configuring Video Settings.
Refer to the following sections for more information:
Configuring remote recording in Section 5.1.1 Configuring Recording Schedule.
Setting the image quality of the live video in Section 6.3 Configuring Image Settings and
Section 6.2.1 Configuring Video Settings.
Setting the OSD text on live video in Section 6.3.2 Configuring OSD Settings.
4.4 Operating PTZ Control
Purpose:
In the live view interface, you can use the PTZ control buttons to control panning, tilting and
These 4 patterns can be operated separately and with no priority level.
When configuring and calling the pattern, proportional pan is valid; the limit stops and auto
flip will be invalid; and the 3D positioning operation is not supported.
4.5 Playback
Purpose:
This section explains how to view the video files stored in the network disks or memory cards.
4.5.1 Play Back Video Files
Steps:
1. Click on the menu bar to enter playback interface.
The network disk should be available within the network and properly configured to store the
recorded files, log files, etc.
Steps:
Add the network disk
1. Enter the NAS (Network-Attached Storage) settings interface:
Configuration > Storage > Storage Management > Net HDD
Figure 5-5 Select Net HDD Type
2. Enter the IP address and the file path of the network disk.
3. Select the mounting type. NFS and SMB/CIFS are selectable. You can set the user name and
password to guarantee the security if SMB/CIFS is selected.
Refer to the NAS User Manual for creating the file path.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
4. Click to add the network disk.
After having saved successfully, you need to reboot the camera to activate the settings.
This section explains how to configure the network camera to respond to alarm events, including
motion detection, video tampering alarm input, alarm output and exception. These events can
trigger the alarm actions, such as Send Email, Notify Surveillance Center, etc.
For example, when motion detection is triggered, the network camera sends a notification to an
e-mail address.
On the event configuration page, click to show the PTZ control panel or click to hide it.
Click the direction buttons to control the pan/tilt movements.
Click the zoom/iris/focus buttons to realize lens control.
The functions vary depending on different camera models.
5.2.1 Configuring Motion Detection
Purpose:
Motion detection is a feature which can trigger alarm actions and actions of recording videos
when the motion occurred in the surveillance scene.
detection. Refer to Section 5.2.1 Configuring Motion Detection.
6. Click tab to select the linkage method taken for the audio input exception,
Notify Surveillance Center, Send Email, Trigger Alarm Output and Trigger Recording are
selectable. Refer to Section 5.2.1 Configuring Motion Detection.
7. Click to save the settings.
5.3.2 Configuring Face Detection
Purpose:
After the face detection is enabled, a face appears in the surveillance area, it will be detected and
certain actions may be triggered by the detection.
Steps:
1. Check the Enable Face Detection checkbox.
2. (Optional) You can check the Enable Dynamic Analysis for Face Detection checkbox if you
want the detected face get marked with rectangle in the live view.
Figure 5-21 Configuring Face Detection
3. Configure the sensitivity for face detection.
Sensitivity: Range [1-5]. The value of the sensitivity defines the size of the object which can
trigger the alarm, when the sensitivity is high, a very small object can trigger the alarm.
4. Click tab to enter the arming schedule setting interface. The time
schedule configuration is the same as the settings of the arming schedule for motion
detection. Refer to Section 5.2.1 Configuring Motion Detection.
5. Click tab to select the linkage method taken for the video loss alarm, Notify
surveillance center, send email, upload to FTP, trigger channel, smart tracking and trigger
alarm output are selectable. Refer to Section 5.2.1 Configuring Motion Detection.
6. Click to save the settings.
5.3.3 Configuring Intrusion Detection
Intrusion detection can set an area in the surveillance scene and once the area is entered, a set
of alarm action is triggered.
3. The event triggered and park action related PTZ movement will be locked for 180 seconds
after you enter the intrusion detection interface. Optionally, you can click the
button to manually activate the movement, or lock the movement
when the button turns to by clicking it.
4. Draw area.
1) Select the Region No.in dropdown list.
2) Click to draw a rectangle on the image as a defense region.
3) Click on the image to specify a corner of the rectangle, and right-click the mouse after
four corners are configured.
5. Configure the parameters for each defense region separately. Threshold: Range [0-10s], the threshold for the time of the object loitering in the region. If
you set the value as 0, alarm is triggered immediately after the object entering the region.
Sensitivity: Range [1-100]. The value of the sensitivity defines the size of the object which
can trigger the alarm, when the sensitivity is high, a very small object can trigger the
alarm.
6. Click tab to enter the arming schedule setting interface. The time
schedule configuration is the same as the settings of the arming schedule for motion
detection. Refer to Section 5.2.1 Configuring Motion Detection.
7. Click tab to select the linkage method taken for intrusion detection, Notify
Surveillance Center, Send Email, Upload to FTP/Memory Card/NAS, Trigger Alarm Output and
Trigger Recording are selectable. Refer to Section 5.2.1 Configuring Motion Detection.
8. Click to save the settings.
5.3.4 Configuring Line Crossing Detection
The virtual plane detection can be adopted for the intrusion detection. Once the virtual plane is
detected being traversed according to the configured direction, a set of alarm action is triggered.
Steps:
1.Enter the Line Crossing Detection interface:
Configuration >Event > Smart Event > Line Crossing Detection
2. Check the Enable checkbox to enable the line crossing detection function.
3. Select the Line in dropdown list to configure.
4. The event triggered and park action related PTZ movement will be locked for 180 seconds
after you enter the line crossing detection interface. Optionally, you can click the
button to manually activate the movement, or lock the movement
Drag an end to the desired place to adjust the length and angle of the line. And drag the
line to adjust the location.
6. Configure the parameters for each defense region separately. Direction: Select the detection direction in the dropdown list, there are A<->B, A->B and
B->A selectable.
Sensitivity: Range [1-100]. The value of the sensitivity defines the size of the object which
can trigger the alarm, when the sensitivity is high, a very small object can trigger the
alarm.
7. Click tab to enter the arming schedule setting interface. The time
schedule configuration is the same as the settings of the arming schedule for motion
detection. Refer to Section 5.2.1 Configuring Motion Detection.
8. Click tab to select the linkage method taken for the line crossing detection,
Notify Surveillance Center, Send Email, Upload to FTP/Memory Card/NAS, Trigger Alarm
Output and Trigger Recording are selectable. Refer to Section 5.2.1 Configuring Motion
Detection.
9. Click to save the settings.
5.3.5 Configuring Region Entrance Detection
Purpose:
Region entrance detection function detects people, vehicle or other objects which enter a
pre-defined virtual region from the outside place, and some certain actions can be taken when
the alarm is triggered.
Steps:
1. Enter the Region Entrance Detection settings interface:
Configuration> Event > Smart Event> Region Entrance Detection
2.Check the checkbox of Enable to enable the Region Entrance Detection function.
3. Select the region from the dropdown list for detection settings.
4. Click the button to start the region drawing.
5. Click on the live video to specify the four vertexes of the detection region, and right click to
complete drawing.
Repeat the step to configure other regions. You can click the button to clear all
pre-defined regions.
6. Set the detection target for the region entrance detection. You can select human, vehicle, or
all (human &vehicle) as the detection target from the dropdown list. If Human is selected,
only human beings will be identified as detection objects and as well as Vehicle.
7. Click tab to enter the arming schedule setting interface. The time
schedule configuration is the same as the settings of the arming schedule for motion
detection. Refer to Section 5.2.1 Configuring Motion Detection.
8. Click tab to select the linkage method taken for the video loss alarm,
Notify surveillance center, send email, upload to FTP, trigger channel, smart tracking and
trigger alarm output are selectable. Refer to Section 5.2.1 Configuring Motion Detection.
9. Click to save the settings.
5.3.6 Configuring Region Exiting Detection
Purpose:
Region exiting detection function detects people, vehicle or other objects which exit from a
pre-defined virtual region, and some certain actions can be taken when the alarm is triggered.
1. Enter the Region Exiting Detection settings interface:
Configuration> Event > Smart Event> Region Exiting Detection
2. Check the checkbox of Enable to enable the Region Exiting Detection function.
Figure 5-25 Configuring Region Exiting Detection
3. Select the region from the dropdown list for detection settings.
4. Click the button to start the region drawing.
5. Click on the live video to specify the four vertexes of the detection region, and right click to
complete drawing.
Repeat the step to configure other regions. Up to 4 regions can be set. You can click the
button to clear all pre-defined regions.
6. Set the detection target for the region entrance detection. You can select human, vehicle, or
all (human &vehicle) as the detection target from the dropdown list. If Human is selected,
only human beings will be identified as detection objects and as well as Vehicle.
7. Click tab to enter the arming schedule setting interface. The time
schedule configuration is the same as the settings of the arming schedule for motion
detection. Refer to Section 5.2.1 Configuring Motion Detection.
8. Click tab to select the linkage method taken for the video loss alarm,
Notify surveillance center, send email, upload to FTP, trigger channel, smart tracking and
trigger alarm output are selectable. Refer to Section 5.2.1 Configuring Motion Detection.
On the event configuration page, click to show the PTZ control panel or click to hide it.
Click the direction buttons to control the pan/tilt movements.
Click the zoom/iris/focus buttons to realize lens control.
The functions vary depending on different camera models.
5.4.1 Configuring Basic PTZ Parameters
You can configure the basic PTZ parameters, including proportional pan, preset freezing, preset
speed, etc.
1. Enter the Basic Settings interface:
Configuration > PTZ > Basic Settings
Figure 5-26 Basic Settings
2. Configure the following settings:
Basic Parameters: Set the basic parameters of PTZ.
Proportional Pan: If you enable this function, the pan/tilt speeds change according to
the amount of zoom. When there is a large amount of zoom, the pan/tilt speed will be
slower for keeping the image from moving too fast on the live view image.
Preset Freezing: This function enables the live view to switch directly from one scene
defined by a preset to another, without showing the middle areas between these two, to
ensure the surveillance efficiency. It can also reduce the use of bandwidth in a digital
network system.
Preset freezing function is invalid when you calling a pattern.
Preset Speed: You can set the speed of a defined preset from 1 to 8.
Manual Control Speed: The manual control speed can be set as Compatible, Pedestrian,
Non-motor Vehicle, Motor Vehicle or Auto.
Compatible: The control speed is same as the Keyboard Control Speed.
Pedestrian: Choose the Pedestrian when you monitor the pedestrians.
Non-motor Vehicle: Choose the Non-motor Vehicle when you monitor the non-motor
vehicles.
Motor Vehicle: Choose the Motor Vehicle when you monitor the motor vehicles.
Auto: You are recommended to set it as Auto when the application scene of the speed
dome is complicated.
Keyboard Control Speed: Define the speed of PTZ control by a keyboard as Low, Medium
or High.
Auto Scan Speed: The scan speed can be set from level 1 to 40.
Max. Tilt-angle: Set the tilt-angle of the speed dome from the dropdown list.
Zooming Speed: The zoom speed is adjustable from level 1 to 3.
PTZ OSD: Set the on-screen display duration of the PTZ status.
Zoom Status: Set the OSD duration of zooming status as 2 seconds, 5 seconds, 10
seconds, NC (Normally Closed), or NO (Normally Open).
PT Status: Set the azimuth angle display duration while panning and tilting as 2 seconds,
5 seconds, 10 seconds, NC (Normally Closed), or NO (Normally Open).
Preset Status: Set the preset name display duration while calling the preset as 2 seconds,
5 seconds, 10 seconds, NC (Normally Closed), or NO (Normally Open).
Power-off Memory: The speed dome can resume its previous PTZ status or actions after it
restarted from a power-off. You can set the time point of which the dome resumes its PTZ
status. You can set it to resume the status of 30 seconds, 60 seconds, 300 seconds or 600
seconds before power-off.
3. Click to save the settings.
5.4.2 Configuring PTZ Limits
Purpose:
The speed dome can be programmed to move within the configurable PTZ limits (left/right,
up/down).
For some certain camera models, disable PTZ limit and then the pan angle reaches 330°.
You can click Test to make sure that the IP address is valid.
If the DHCP server is available, you can check to automatically obtain an IP
address and other network settings from that server.
The valid value range of Maximum Transmission Unit (MTU) is 1280 to 1500.
The Multicast sends a stream to the multicast group address and allows multiple clients to
acquire the stream at the same time by requesting a copy from the multicast group address.
Before utilizing this function, you have to enable the Multicast function of your router and
configure the gateway of the network camera.
If the DNS server settings are required for some applications (e.g., sending email), you
should properly configure the Preferred DNS Server and Alternate DNS server.
Figure 6-2 DNS Server Settings
The router must support the route advertisement function if you select Route
Advertisement as the IPv6 mode.
Configuring DDNS Settings
Purpose:
If your camera is set to use PPPoE as its default network connection, you can use the Dynamic
DNS (DDNS) for network access.
Before you start:
Registration on the DDNS server is required before configuring the DDNS settings of the camera.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The password
should be something of your own choosing (using a minimum of 8 characters, including
upper case letters, lower case letters, numbers and special characters) in order to increase
the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
Steps:
1. Enter the DDNS settings interface:
Configuration >Network > Basic Settings > DDNS
2. Check the EnableDDNS checkbox to enable this feature.
3. Select DDNS Type. Two DDNS types are selectable: DynDNS and NO-IP.
DynDNS:
Steps:
(1) Enter Server Address of DynDNS (e.g. members.dyndns.org).
(2) In the Domain text field, enter the domain name obtained from the DynDNS website.
(3) Enter the Port of DynDNS server.
(4) Enter the User Name and Password registered on the DynDNS website.
(5) Click to save the settings.
Figure 6-3 DynDNS Settings
NO-IP:
Steps:
(1) Enter Server Address of NO-IP.
(2) In the Domain text field, enter the domain name obtained from the NO-IP website.
(3) Enter the Port of NO-IP server.
(4) Enter the User Name and Password registered on the NO-IP website.
(5) Click to save the settings.
Configuring PPPoE Settings
Purpose:
If you have no router but only a modem, you can use Point-to-Point Protocol over Ethernet
2. Check the EnablePPPoE checkbox to enable this feature.
3. Enter User Name, Password, and Confirm password for PPPoE access.
The User Name and Password should be assigned by your ISP.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
4. Click to save and exit the interface.
Configuring Port Settings
Purpose:
If there is a router and you want to access the camera through Wide Area Network (WAN), you
need to forward the 3 ports for the camera.
Steps:
1. Enter the Port settings interface:
Configuration > Network > Basic Settings > Port
Figure 6-5 Port Settings
2. Set the HTTP port, RTSP port and port of the camera.
2. Configure the FTP settings, including server address, port, user name, password, directory,
and upload type.
The server address supports both the domain name and IP address formats.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
Setting the directory in FTP server for saving files:
In the Directory Structure field, you can select the root directory, parent directory and
child directory.
Root directory: The files will be saved in the root of FTP server.
Parent directory: The files will be saved in a folder in FTP server. The name of folder can
Sender’s Address: The email address of the sender.
SMTP Server: The SMTP Server IP address or host name (e.g., smtp.263xmail.com).
SMTP Port: The SMTP port. The default TCP/IP port for SMTP is 25.
E-mail encryption: None, SSL, and TLS are selectable. When you select SSL or TLS and disable
STARTTLS, e-mails will be sent after encrypted by SSL or TLS. The SMTP port should be set as
465 for this encryption method. When you select SSL or TLS and enable STARTTLS, emails will
be sent after encrypted by STARTTLS, and the SMTP port should be set as 25.
STARTTLS protocol must be supported by the email server for e-mail encryption with
STARTTLS. When it is not supported by the email server and the checkbox of Enable STARTTLS
is checked, the email will not be encrypted.
Attached Image: Check the checkbox of Attached Image if you want to send emails with
attached alarm images.
Interval: The interval refers to the time between two actions of sending attached pictures.
Authentication (optional): If your email server requires authentication, check this checkbox to
use authentication to log in to this server and enter the login user name and password.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
Receiver: Select the receiver to which the email is sent. Up to 2 receivers can be configured.
Receiver: The name of the user to be notified.
Receiver’s Address: The email address of user to be notified. (Optional: click Test to make sure
that the email server can send email out.)
3. Click to save the settings.
Configuring Platform Settings
Purpose:
Platform access provides you an option to manage the devices via platform.
This function varies depending on different speed dome models.
2. Check the Enable checkbox to enable the platform access function of the device.
3. Select the Platform Access Mode.
If you select Platform Access Mode as Hik-Connect,
1) Click and read "Terms of Service" and "Privacy Policy" in pop-up window.
2) Create a verification code or change the verification code for the camera.
The verification code is required when you add the camera to Hik-Connect app.
For more information about the Hik-Connect app, refer to Hik-Connect Mobile Client
User Manual.
4. You can use the default server address. Or you can check the Custom checkbox on the right
and input a desired server address.
5. Click to save the settings.
Hik-Connect is an application for mobile devices. With the App, you can view live image of the
camera, receive alarm notification and so on.
Configuring HTTPS Settings
Purpose:
HTTPS is consisted by SSL&HTTP. It is used for encryption transmission, identity authentication
network protocol which enhances the security of WEB accessing.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The password
should be something of your own choosing (using a minimum of 8 characters, including
upper case letters, lower case letters, numbers and special characters) in order to increase
the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of the
3. There will be the certificate information after you successfully create and install the
certificate.
Figure 6-15 Installed Certificate Property
The default port number of HTTPS is 443. The port value ranges from 1 to 65535.
When the port number is the default number 443, the format of the URL is https://IP address,
eg., https://192.168.1.64.
When the port number is not the default number 443, the format of the URL is https://IP
IEEE 802.1X is a port-based network access control. It enhances the security level of the LAN.
When devices connect to this network with IEEE 802.1X standard, the authentication is needed. If
the authentication fails, the devices don’t connect to the network.
The protected LAN with 802.1X standard is shown in Figure 6-17.
Figure 6-17 Protected LAN
Before connecting the Network Camera to the protected LAN, apply a digital certificate
from a Certificate Authority.
The network camera requests access to the protected LAN via the authenticator (a
switch).
The switch forwards the identity and password to the authentication server (RADIUS
server).
The switch forwards the certificate of authentication server to the network camera.
If all the information is validated, the switch allows the network access to the protected
network.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The password
should be something of your own choosing (using a minimum of 8 characters, including
upper case letters, lower case letters, numbers and special characters) in order to increase
the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
Steps:
1. Connect the network camera to your PC directly with a network cable.
On the event configuration page, click to show the PTZ control panel or click to hide it.
Click the direction buttons to control the pan/tilt movements.
Click the zoom/iris/focus buttons to realize lens control.
The functions vary depending on different camera models.
6.3.1 Configuring Display Settings
Purpose:
Configure the image adjustment, exposure settings, day/night switch, backlight settings, white
balance, image enhancement, video adjustment, and other parameters in display settings.
The parameters in Display Settings interface vary depending on different camera models.
You can double click the live view to enter full screen mode and double click it again to exit.
Steps:
1. Enter the Display settings interface:
Configuration > Image> Display Settings
2. You can select the Scene in the dropdown list with different predefined image parameters.
3. Set the image parameters of the speed dome.
Figure 6-24 Display Settings
Image Adjustment
Brightness
This feature is used to adjust brightness of the image. The value ranges from 0 to 100.
Contrast
This feature enhances the difference in color and light between parts of an image. The value
ranges from 0 to 100.
Saturation
This feature is used to adjust color saturation of the image. The value ranges from 0 to 100.