Instrukcja obsługi Hikvision DS-2CD1343G2-LIUF

Hikvision Kamera monitorująca DS-2CD1343G2-LIUF

Przeczytaj poniżej 📖 instrukcję obsługi w języku polskim dla Hikvision DS-2CD1343G2-LIUF (114 stron) w kategorii Kamera monitorująca. Ta instrukcja była pomocna dla 4 osób i została oceniona przez 2 użytkowników na średnio 4.5 gwiazdek

Strona 1/114
Network Camera
User Manual
Iniaves on the Use of Video Products
Thank you for choosing Hikvision products.
Technology aects every aspect of our life. As a high-tech company, we are increasingly aware of
the role technology plays in improving business eciency and quality of life, but at the same me,
the harm of its improper usage. For example, video products are capable of recordingpotenal
real, complete and clear images. This provides a high value in retrospect and preserving real-me
facts. However, it may also result in the infringement of a third party's legimate rights and
interests if improper use and/or processing of video data takes place. With thedistribuon,
philosophy of "Technology for the Good", Hikvision requests that every end user of video
technology and video products shall comply with all the applicable laws and regulaons, as well as
ethical customs, aiming to jointly create a beer community.
Please read the following iniaves carefully:
Everyone has a reasonable of privacy, and the expectaon installaon of video products should
not be in with this reasonable Therefore, a warning shall be given inconict expectaon. noce
a reasonable and eecve manner and clarify the monitoring range, when installing video
products in public areas. For non-public areas, a third party's rights and interests shall be
evaluated when installing video products, including but not limited to, installing video products
only aer obtaining the consent of the stakeholders, and not installing highly-invisible video
products.
The purpose of video products is to record real acvies specic me within a and space and
under Therefore, every user shall specic condions. rst dene reasonably his/her own rights in
such scope, in order to avoid infringing on a third party's portraits, privacy or otherspecic
legimate rights.
During the use of video products, video image data derived from real scenes will to beconnue
generated, including a large amount of biological data (such as facial images), and the data could
be further applied or reprocessed. Video products themselves could not disnguish good from
bad regarding how to use the data based solely on the images captured by the video products.
The result of data usage depends on the method and purpose of use of the data controllers.
Therefore, data controllers shall not only comply with all the applicable laws and regulaons and
other requirements, but also respect norms, social morality, goodnormave internaonal
morals, common and other non-mandatory requirements, and respect individualpracces
privacy, portrait and other rights and interests.
The rights, values and other demands of various stakeholders should always be considered when
processing video data that is connuously generated by video products. In this regard, product
security and data security are extremely crucial. Therefore, every end user and data controller,
shall undertake all reasonable and necessary measures to ensure data security and avoid data
leakage, improper disclosure and improper use, including but not limited to, seng up access
Network Camera User Manual
i
control, a suitable network environment (the Internet or Intranet) where videoselecng
products are connected, establishing and constantly network security.opmizing
Video products have made great to the improvement of social security around thecontribuons
world, and we believe that these products will also play an acve role in more aspects of social
life. Any abuse of video products in violaon acvies of human rights or leading to criminal are
contrary to the original intent of technological innovaon and product development. Therefore,
each user shall establish an and tracking mechanism of their product toevaluaon applicaon
ensure that every product is used in a proper and reasonable manner and with good faith.
Network Camera User Manual
ii
Legal Informaon
©2022 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
About this Manual
The Manual includes for using and managing the Product. Pictures, charts, images andinstrucons
all other informaon hereinaer are for and only. The descripon explanaon informaon
contained in the Manual is subject to change, without due to noce, rmware updates or other
reasons. Please the latest version of this Manual at the Hikvision website ( nd hps://
www.hikvision.com/ ).
Please use this Manual with the guidance and assistance of professionals trained in supporng the
Product.
Trademarks
and other Hikvision's trademarks and logos are the properes of
Hikvision in various jurisdicons.
Other trademarks and logos are the menoned properes respecve of their owners.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS MANUAL AND THE PRODUCT
DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED "AS IS" AND "WITH
ALL FAULTS AND ERRORS". HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR
PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION
BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES,
INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION,
WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY,
OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR INHERENT SECURITY
RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS
INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY
TECHNICAL SUPPORT IF REQUIRED.
YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE
SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW.
ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT
INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF
PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS.
YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE
Network Camera User Manual
iii
DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED
TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN
RIGHTS ABUSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATTER
PREVAILS.
Network Camera User Manual
iv
Symbol Convenons
The symbols that may be found in this document are as follows.dened
Symbol Descripon
Danger
Indicates a hazardous which, if not avoided, will or couldsituaon
result in death or serious injury.
Cauon
Indicates a hazardous which, if not avoided, couldpotenally situaon
result in equipment damage, data loss, performance ordegradaon,
unexpected results.
Note Provides to emphasize or supplementaddional informaon
important points of the main text.
Network Camera User Manual
v
Safety Instrucon
These are intended to ensure that user can use the product correctly to avoid dangerinstrucons
or property loss.
Laws and Regulaons
The device should be used in compliance with local laws, electrical safety and regulaons, re
prevenon regulaons.
Electricity
In the use of the product, you must be in strict compliance with the electrical safety regulaons
of the and region.naon
The equipment shall not be exposed to dripping or splashing and that no objects withlled
liquids, such as vases, shall be placed on the equipment.
Provide a surge suppressor at the inlet opening of the equipment under special suchcondions
as the mountain top, iron tower, and forest.
CAUTION: To reduce the risk of replace only with the same type and re, rang of fuse.
The equipment must be connected to an earthed mains socket-outlet.
An appropriate readily accessible disconnect device shall be incorporated external to the
equipment.
An appropriate overcurrent protecve device shall be incorporated external to the equipment,
not exceeding the of the building.specicaon
An all-pole mains switch shall be incorporated in the electrical installaon of the building.
Ensure correct wiring of the terminals for to an AC mains supply.connecon
The equipment has been designed, when required, modied connecon for to an IT power
distribuon system.
Baery
Do not ingest baery. Chemical burn hazard!
This product contains a cell coin/buon baery. coin/buon baery If the cell is swallowed, it
can cause severe internal burns in just 2 hours and can lead to death.
Keep new and used baeries away from children.
If the baery compartment does not close securely, stop using the product and keep it away
from children.
If you think baeries might have been swallowed or placed inside any part of the body, seek
immediate medical aenon.
CAUTION: Risk of explosion if the baery is replaced by an incorrect type. Dispose of used
baeries according to the instrucons.
ATTENTION: IL Y A RISQUE D'EXPLOSION SI LA BATTERIE EST REMPLACÉE PAR UNE BATTERIE DE
TYPE INCORRECT. METTRE AU REBUT LES BATTERIES USAGÉES CONFORMÉMENT AUX
INSTRUCTIONS.
Network Camera User Manual
vi
White Light Illuminator (If supported)
Possibly hazardous opcal radiaon emied from this product.
DO NOT stare at light source. May be harmful to the eyes.operang
Wear appropriate eye protecon or DO NOT turn on the white light when you assemble, install
or maintain the camera.
Transportaon
Keep the device in original or similar packaging while transporng it.
System Security
The installer and user are responsible for password and security conguraon.
Maintenance
If the product does not work properly, please contact your dealer or the nearest service center.
We shall not assume any responsibility for problems caused by unauthorized repair or
maintenance.
A few device components (e.g., capacitor) require regular replacement. The averageelectrolyc
lifespan varies, so periodic checking is recommended. Contact your dealer for details.
Cleaning
Please use a so and dry cloth when clean inside and outside surfaces of the product cover. Do
not use alkaline detergents.
Using Environment
When any laser equipment is in use, make sure that the device lens is not exposed to the laser
beam, or it may burn out.
DO NOT expose the device to high electromagnec radiaon or dusty environments.
For indoor-only device, place it in a dry and well-venlated environment.
DO NOT aim the lens at the sun or any other bright light.
Make sure the running environment meets the requirement of the device. The operang
temperature shall be -30 °C to 60 °C (-22 °F to 140 °F), and the humidity shall be 95%operang
or less (no condensing).
DO NOT place the camera in extremely hot, cold, dusty or damp locaons, and do not expose it
to high electromagnec radiaon.
Emergency
If smoke, odor, or noise arises from the device, immediately turn the power, unplug theo
power cable, and contact the service center.
Network Camera User Manual
viii
Time Synchronizaon
Set up device manually for the me rst me me access if the local is not synchronized with
that of the network. Visit the device via Web browse/client soware and go to me sengs
interface.
Reecon
Make sure that no reecve surface is too close to the device lens. The IR light from the device
may reect back into the lens causing reecon.
Network Camera User Manual
ix
2.4.10 Set Target Cropping ................................................................................................... 31
2.5 Video Recording and Picture Capture .................................................................................. 31
2.5.1 Storage Sengs .......................................................................................................... 31
2.5.2 Video Recording .......................................................................................................... 36
2.5.3 Capture Conguraon ................................................................................................. 38
2.6 Event and Alarm ................................................................................................................... 40
2.6.1 Basic Event .................................................................................................................. 40
2.6.2 Smart Event ................................................................................................................. 46
2.7 Network .................................................................................................................. 56Sengs
2.7.1 TCP/IP .......................................................................................................................... 56
2.7.2 SNMP .......................................................................................................................... 58
2.7.3 Set SRTP ...................................................................................................................... 58
2.7.4 Port Mapping .............................................................................................................. 59
2.7.5 Port ............................................................................................................................. 61
2.7.6 Access to Device via Domain Name ............................................................................ 62
2.7.7 Access to Device via PPPoE Dial Up ......................................................... 62Connecon
2.7.8 Wireless Dial ............................................................................................................... 63
2.7.9 Wi-Fi ............................................................................................................................ 64
2.7.10 Set Network Service .................................................................................................. 64
2.7.11 Set Open Network Video Interface ........................................................................... 65
2.7.12 Set ISUP ..................................................................................................................... 66
2.7.13 Set Alarm Server ....................................................................................................... 66
2.8 Arming Schedule and Alarm Linkage ................................................................................... 67
2.8.1 Set Arming Schedule ................................................................................................... 67
2.8.2 Linkage Method Sengs ............................................................................................. 67
2.9 System and Security ............................................................................................................. 71
2.9.1 View Device Informaon ............................................................................................. 71
2.9.2 Search and Manage Log .............................................................................................. 72
Network Camera User Manual
xi
2.9.3 Simultaneous Login ..................................................................................................... 72
2.9.4 Import and Export Conguraon File ......................................................................... 72
2.9.5 Export Diagnose Informaon ...................................................................................... 72
2.9.6 Reboot ........................................................................................................................ 72
2.9.7 Restore and Default .................................................................................................... 72
2.9.8 Upgrade ...................................................................................................................... 73
2.9.9 Device Auto Maintenance ........................................................................................... 73
2.9.10 View Open Source Soware License ......................................................................... 74
2.9.11 Wiegand .................................................................................................................... 74
2.9.12 Metadata .................................................................................................................. 74
2.9.13 Time and Date ........................................................................................................... 74
2.9.14 Set RS-485 ................................................................................................................. 76
2.9.15 Set RS-232 ................................................................................................................. 76
2.9.16 Power Mode ....................................................................................... 76Consumpon
2.9.17 External Device ......................................................................................................... 77
2.9.18 Security ..................................................................................................................... 78
2.9.19 Cercate Management ........................................................................................... 82
2.9.20 User and Account ...................................................................................................... 84
2.10 VCA Resource ..................................................................................................................... 85
2.10.1 Allocate VCA Resource .............................................................................................. 85
2.10.2 Set Open Plaorm ..................................................................................................... 85
2.10.3 Road Trac ............................................................................................................... 86
2.10.4 Face Capture ............................................................................................................. 90
2.11 Smart Display ..................................................................................................................... 93
2.12 EPTZ ................................................................................................................................... 94
2.12.1 Patrol ......................................................................................................................... 94
2.12.2 Auto-Tracking ............................................................................................................ 95
2.13 Image Stching .................................................................................................................. 95
Network Camera User Manual
xii
Appendix A. FAQ ...................................................................................................................... 97
Appendix B. Device Command .................................................................................................. 98
Appendix C. Device Communicaon Matrix .............................................................................. 99
Network Camera User Manual
xiii
Chapter 1 Device Acvaon and Accessing
To protect the security and privacy of the user account and data, you should set a login password
to acvate the device when access the device via network.
Note
Refer to the user manual of the soware client for the detailed informaon about the client
soware acvaon.
1.1 Acvate Device
The device needs to be acvated seng by a strong password before use. This part introduces
acvaon dierent using client tools.
1.1.1 Acvate via SADP
SADP is a tool to detect, acvate and modify the IP address of the device over the LAN.
Before You Start
Get the SADP soware from the supplied disk or the website ocial hp://
www.hikvision.com/ , and install the SADP according to the prompts.
The device and the PC that runs the SADP tool should belong to the same subnet.
The following steps show how to acvate one device and modify its IP address. For batch acvaon
and IP address refer to for details.modicaon, User Manual of SADP
Steps
1. Run the SADP soware and search the online devices.
2. Find and select your device in online device list.
3. Input new password (admin password) and conrm the password.
Cauon
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case leers, lower case
leers, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can protect your product.beer
4. Click Acvate to start acvaon.
Network Camera User Manual
1
Status of the device becomes successful Acve aer acvaon.
5. Modify IP address of the device.
1) Select the device.
2) Change the device IP address to the same subnet as your computer by either modifying the IP
address manually or checking .Enable DHCP
3) Input the admin password and click to Modify acvate your IP address modicaon.
1.1.2 Acvate Camera via iVMS-4200
iVMS-4200 is a PC client to manage and operate your devices. Camera is supported byacvaon
the soware.
Before You Start
Get the client soware ocial from the supplied disk or the website hp://
www.hikvision.com/en/ . Install the following the prompts.soware
The camera and the PC that runs the soware should be in the same subnet.
Steps
1. Run the client soware.
2. Enter Device Management Online Device or .
3. Check the device status from the device list, and select an inacve camera.
4. Click the Acvate.
5. Create and conrm the admin password of the camera.
Network Camera User Manual
2
Cauon
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case lower caseleers,
leers, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can protect your product.beer
6. Click to start OK acvaon.
Device status change to successful Acve aer acvaon.
7. Modify IP address of the device.
1) Select the device and click Modify Nenfo at .Online Device
2) Change the device IP address to the same subnet with your computer by either modifying the
IP address manually or checking .DHCP
3) Input the admin password of the device and click to complete OK modicaon.
1.1.3 Acvate Device via Web Browser
Use web browser to acvate the device. For the device with the DHCP enabled by default, use
SADP soware acvate or PC client to the device.
Before You Start
Make sure your device and your PC connect to the same LAN.
Steps
1. Change the IP address of your PC to the same subnet as the device.
The default IP address of the device is 192.168.1.64.
2. Open a web browser and input the default IP address.
3. Create and conrm the admin password.
Cauon
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case lower caseleers,
leers, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can protect your product.beer
4. Click to complete and enter page.OK acvaon Live View
5. Modify IP address of the camera.
1) Enter IP address modicaon page. Conguraon → Network → TCP/IP
2) Change IP address.
3) Save the sengs.
Network Camera User Manual
3


Specyfikacje produktu

Marka: Hikvision
Kategoria: Kamera monitorująca
Model: DS-2CD1343G2-LIUF

Potrzebujesz pomocy?

Jeśli potrzebujesz pomocy z Hikvision DS-2CD1343G2-LIUF, zadaj pytanie poniżej, a inni użytkownicy Ci odpowiedzą




Instrukcje Kamera monitorująca Hikvision

Instrukcje Kamera monitorująca

Najnowsze instrukcje dla Kamera monitorująca