Instrukcja obsługi Hikvision DS-2CD5A46G1-IZ(H)S

Hikvision Kamera monitorująca DS-2CD5A46G1-IZ(H)S

Przeczytaj poniżej 📖 instrukcję obsługi w języku polskim dla Hikvision DS-2CD5A46G1-IZ(H)S (190 stron) w kategorii Kamera monitorująca. Ta instrukcja była pomocna dla 3 osób i została oceniona przez 2 użytkowników na średnio 4.5 gwiazdek

Strona 1/190
Network Camera User Manual
0
User Manual
UD12963B
Network Camera
Network Camera User Manual
1
User Manual
COPYRIGHT ©2018 Hangzhou Hikvision Digital Technology Co., Ltd.
ALL RIGHTS RESERVED.
Any and all information, including, among others, wordings, pictures, graphs are the
properties of Hangzhou Hikvision Digital Technology Co., Ltd. or its subsidiaries
(hereinafter referred to be “Hikvision”). This user manual (hereinafter referred to be
“the Manual”) cannot be reproduced, changed, translated, or distributed, partially or
wholly, by any means, without the prior written permission of Hikvision. Unless
otherwise stipulated, Hikvision does not make any warranties, guarantees or
representations, express or implied, regarding to the Manual.
About this Manual
This Manual is applicable to Network Camera.
The Manual includes instructions for using and managing the product. Pictures, charts,
images and all other information hereinafter are for description and explanation only.
The information contained in the Manual is subject to change, without notice, due to
firmware updates or other reasons. Please find the latest version in the company
website ( ). http://overseas.hikvision.com/en/
Please use this user manual under the guidance of professionals.
Trademarks Acknowledgement
and other Hikvision's trademarks and logos are the properties of
Hikvision in various jurisdictions. Other trademarks and logos mentioned below are
the properties of their respective owners.
Legal Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE
PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND
FIRMWARE, IS PROVIDED AS IS”, WITH ALL FAULTS AND ERRORS, AND
HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY,
Network Camera User Manual
2
FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF
THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS,
EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL,
CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING,
AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN
CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF
PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL
NOT TAKE ANY RESPONSIBILITES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER
ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET
SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY
TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL
RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT
IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE
LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS
PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE
APPLICABLE LAW, THE LATER PREVAILS .
Safety Instruction
These instructions are intended to ensure that the user can use the product correctly to
avoid danger or property loss.
Notice:
If camera fails to synchronize local time with that of the network, you need to set
up camera time manually. Visit the camera and enter system setting interface for
time setting.
Network Camera User Manual
3
The precaution measure is divided into ‘Warnings’ and ‘Cautions’:
Warnings: Serious injury or death may be caused if any of these warnings are
neglected.
Cautions: Injury or equipment damage may be caused if any of these cautions are
neglected.
Warnings Follow these safeguards to
prevent serious injury or death.
Cautions Follow these precautions to
prevent potential injury or material
damage.
Warnings:
Please adopt the power adapter which can meet the safety extra low voltage
(SELV) standard. And source with 12 V or 24 VDC AC (depending on models)
according to the IEC60950 1 and Limited Power Source standard.-
To reduce the risk of fire or electrical shock, do not expose this product to rain or
moisture.
This installation should be made by a qualified service person and should conform
to all the local codes.
Please install blackouts equipment into the power supply circuit for convenient
supply interruption.
Please make sure that the ceiling can support more than 50(N) Newton gravities if
the camera is fixed to the ceiling.
If the product does not work properly, please contact your dealer or the nearest
service center. Never attempt to disassemble the camera yourself. (We shall not
assume any responsibility for problems caused by unauthorized repair or
maintenance.)
Cautions:
Network Camera User Manual
4
Make sure the power supply voltage is correct before using the camera.
Do not drop the camera or subject it to physical shock.
Do not touch sensor modules with fingers. If cleaning is necessary, use a clean
cloth with a bit of ethanol and wipe it gently. If the camera will not be used for an
extended period of time, put on the lens cap to protect the sensor from dirt.
Do not aim the camera lens at the strong light such as sun or incandescent lamp.
The strong light can cause fatal damage to the camera.
The sensor may be burned out by a laser beam, so when any laser equipment is
being used, make sure that the surface of the sensor not be exposed to the laser
beam.
Do not place the camera in extremely hot, cold temperatures (refer to product
specification for working temperature), dusty or damp environment, and do not
expose it to high electromagnetic radiation.
To avoid heat accumulation, ensure there is good ventilation to the device.
Keep the camera away from water and any liquids.
While shipping, pack the camera in its original, or equivalent, packing materials.
Or packing the same texture.
Improper use or replacement of the battery may result in hazard of explosion.
Please use the manufacturer recommended battery type.
Notes:
For the camera supports IR, you are required to pay attention to the following
precautions to prevent IR reflection:
Dust or grease on the dome cover will cause IR reflection. Please do not remove
the dome cover film until the installation is finished. If there is dust or grease on
the dome cover, clean the dome cover with clean soft cloth and isopropyl alcohol.
Make certain the installation location does not have reflective surfaces of objects
too close to the camera. The IR light from the camera may reflect back into the
lens causing reflection.
The foam ring around the lens must be seated flush against the inner surface of
the bubble to isolate the lens from the IR LEDS. Fasten the dome cover to camera
Network Camera User Manual
5
body so that the foam ring and the dome cover are attached seamlessly.
Network Camera User Manual
6
Table of Contents
Chapter 1 System Requirement .......................................................................... 10
Chapter 2 Network Connection .......................................................................... 11
Setng the Network Camera over the LAN ...................................................... 11
Wiring over the LAN........................................................................................................ 11
Acvang the Camera .................................................................................................... 12
(Oponal) Seng Security Queson .............................................................................. 19
Setng the Network Camera over the WAN .................................................... 19
Stac IP Connecon ........................................................................................................ 19
Dynamic IP Connecon ................................................................................................... 20
Chapter 3 Access to the Network Camera ........................................................... 23
Accessing by Web Browsers ............................................................................ 23
Accessing by Client Soware .......................................................................... 24
Chapter 4 Fi Settings Wi- ................................................................................... 26
Conguring Wi Fi Connecon in Manage and Ad hoc Modes- - ........................... 26
Easy Wi Fi Connecon with WPS funcon- ....................................................... 31
IP Property Sengs for Wireless Network Connecon .................................... 33
Chapter 5 Live View ..........................................................................................35
Live View Page ............................................................................................... 35
Starng Live View .......................................................................................... 36
Recording and Capturing Pictures Manually .................................................... 37
Operang PTZ Control .................................................................................... 37
PTZ Control Panel ............................................................................................................ 38
Seng/Calling a Preset ..................................................................................................39
Seng/Calling a Patrol ................................................................................................... 40
Chapter 6 Network Camera Configuration ........................................................42
Conguring Local Parameters ......................................................................... 42
Congure System Sengs .............................................................................. 44
Conguring Basic Informaon ........................................................................................44
Conguring Time Sengs ............................................................................................... 44
Conguring RS232 Sengs ............................................................................................. 46
Conguring RS485 Sengs ............................................................................................. 47
Conguring DST Sengs ................................................................................................. 48
Conguring External Devices .......................................................................................... 49
Conguring VCA Resource .............................................................................................. 50
Open Source Soware License .......................................................................................50
Network Camera User Manual
7
Maintenance . ................................................................................................ 51
Upgrade & Maintenance ................................................................................................ 51
Log .................................................................................................................................. 52
System Service ................................................................................................................ 53
Security Sengs ............................................................................................ 54
Authencaon ................................................................................................................ 55
IP Address Filter .............................................................................................................. 55
Security Service............................................................................................................... 57
User Management ......................................................................................... 59
User Management .......................................................................................................... 59
Security Queson ........................................................................................................... 61
Online Users .................................................................................................................... 63
Chapter 7 Network Settings ............................................................................... 64
Conguring Basic Setngs .............................................................................. 64
Conguring TCP/IP Sengs ............................................................................................ 64
Conguring DDNS Sengs .............................................................................................. 66
Conguring PPPoE Sengs ............................................................................................. 68
Conguring Port Sengs ................................................................................................ 68
Congure NAT (Network Address Translaon) Sengs .................................................. 70
Congure Advanced Sengs .......................................................................... 71
Conguring SNMP Sengs ............................................................................................. 71
7.2.2 Conguring FTP Sengs ................................................................................................. 74
7.2.3 Conguring Email Sengs .............................................................................................. 76
Plaorm Access .............................................................................................................. 78
Wireless Dial ................................................................................................................... 79
HTTPS Sengs ................................................................................................................ 80
Conguring QoS Sengs ................................................................................................ 83
Conguring 802.1X Sengs ............................................................................................ 84
Integraon Protocol ........................................................................................................ 85
Bandwidth Adaptaon .................................................................................................... 86
Network Service .............................................................................................................. 86
Smooth Streaming .......................................................................................................... 87
Chapter 8 Video/Audio Settings ......................................................................... 90
Conguring Video Sengs ............................................................................. 90
Video Sengs ................................................................................................................. 90
Custom Video.................................................................................................................. 93
Conguring Audio Seings ............................................................................. 95
Conguring ROI Encoding ............................................................................... 95
Display Info. on Stream .................................................................................. 97
Conguring Target Cropping ........................................................................... 98
Network Camera User Manual
23
Chapter 3 Access to the Network
Camera
Accessing by Web Browsers
Note:
For certain camera models, HTTPS is enabled by default and the camera creates an
unsigned certificate automatically. When you access to the camera the first time, the
web browser prompts a notification about the certificate issue.
To cancel the notification, install a signed-certificate to the camera. For detailed
operation, see 7.2.6 HTTPS Settings.
Steps:
1. Open the web browser.
2. In the browser address bar, input the IP address of the network camera, and press
the key to enter the login interface.Enter
Note:
The default IP address is 192.168.1.64. You are recommended to change the IP
address to the same subnet with your computer.
3. Input the user name and password and click . Login
The admin user should configure the device accounts and user/operator permissions
properly. Delete the unnecessary accounts and user/operator permissions.
Note:
The IP address gets locked if the admin user performs 7 failed password attempts
(5 attempts for the user/operator).
Login Interface
Network Camera User Manual
24
4. Click . Login
5. (Optional) Install the plug-in before viewing the live video and operating the
camera. Follow the installation prompts to install the plug- in
Note:
For camera that supports plug-in free live view, if you are using Google Chrome 45
and its above version or Mozilla Firefox 52 and its above version, plug-in
installation is not required. But Picture Playback and functions are hidden. To use
mentioned function via web browser, change to their lower version, or change to
Internet Explorer 8.0 and above version.
Accessing by Client Software
The product CD contains the iVMS 4200 client software-. You can view the live video
and manage the camera with the software.
Follow the installation prompts to install the software. The control panel and live view
interface of - are shown as below. iVMS 4200 client software
Network Camera User Manual
25
iVMS 4200 Control Panel-
iVMS 4200 Main View-
Network Camera User Manual
26
Chapter 4 Fi SettingsWi-
Purpose:
By connecting to the wireless network, you don’t need to use cable of any kind for
network connection, which is very convenient for the actual surveillance application.
Note: This chapter is only applicable for the cameras with the built in Wi Fi module.- -
Configuring Wi Fi Connection in Manage and -
Ad- hoc Modes
Purpose:
Two connection modes are supported. Choose a mode as desired and perform the
steps to configure the Wi Fi.-
Wireless Connection in Manage Mode
Steps:
1. Enter the Wi Fi configuration interface.-
Configuration> Network> Advanced Settings> Wi-Fi
2. Click Search to search the online wireless connections.
Wi- Fi List
Network Camera User Manual
27
3. Click to choose a wireless connection on the list.
Wi- - Fi Setting Manage Mode
4. Check the radio button to select the and the Network mode as Manage,
Security mode of the network is automatically shown when you select the
wireless network, please don’t change it manually.
Note: These parameters are exactly identical with those of the router.
5. Enter the key to connect the wireless network. The key should be that of the
wireless network connection you set on the router.
Wireless Connection in Ad hoc Mode-
If you choose the Ad hoc mode, you don’t need to connect the wireless camera via a -
router. The scenario is the same as you connect the camera and the PC directly with a
network cable.
Steps:
1. Choose Ad hoc mode.-
Wi- -Fi Setting Ad- hoc
Network Camera User Manual
28
2. Customize a SSID for the camera.
3. Choose the Security Mode of the wireless connection.
4. Enable the wireless connection function for your PC.
5. On the PC side, search the network and you can see the SSID of the camera
listed.
Ad- hoc Connection Point
6. Choose the SSID and connect.
Security Mode Description:
Security Mode
You can choose the Security Mode as not encrypted, WEP, WPA personal, - -
WPA enterprise, WPA2 personal, and WPA2 enterprise.- - -
WEP mode:
Network Camera User Manual
29
WEP Mode
Authentication Select Open or Shared Key System Authentication, depending on -
the method used by your access point. Not all access points have this option, in
which case they probably use Open System, which is sometimes known as SSID
Authentication.
Key length This sets the length of the key used for the wireless encryption, 64 or -
128 bit. The encryption key length can sometimes be shown as 40/64 and
104/128.
Key type The key types available depend on the access point being used. The -
following options are available:
HEX Allows you to manually enter the hex key.-
ASCII In this method the string must be exactly 5 characters for 64 bit WEP and - -
13 characters for 128 bit WEP.-
WPA personal and WPA2 personal Mode: - -
Enter the required Pre shared Key for the access point, which can be a hexadecimal -
number or a passphrase.
Security Mode WPA personal- -
WPA enterprise and WPA2 enterprise Mode: - -
Network Camera User Manual
31
strongly recommend the use of strong passwords for all functions and network
devices. The password should be something of your own choosing (using a
minimum of 8 characters, including at least three of the following categories:
upper case letters, lower case letters, numbers and special characters) in order to
increase the security of your product.
Proper configuration of all passwords and other security settings is the
responsibility of the installer and/or end user.-
Easy Wi Fi Connection with WPS function-
Purpose:
The setting of the wireless network connection is never easy. To avoid the complex
setting of the wireless connection you can enable the WPS function.
WPS (Wi Fi Protected Setup) refers to the easy configuration of the encrypted -
connection between the device and the wireless router. The WPS makes it easy to add
new devices to an existing network without entering long passphrases. There are two
modes of the WPS connection, the PBC mode and the PIN mode.
Note: If you enable the WPS function, you do not need to configure the parameters
such as the encryption type and you don’t need to know the key of the wireless
connection.
Steps:
Wi- - Fi Settings WPS
Network Camera User Manual
44
3. Click to save the settings.Save
Configure System Settings
Purpose:
Follow the instructions below to configure the system settings, include System
Settings, Maintenance, Security, and User Management, etc.
Configuring Basic Information
Enter the Device Information interface: Configuration > System > System Settings >
Basic Information.
In the interface, you can edit the Device Name and Device No. Basic Information
Other information of the network camera, such as Model, Serial No., Firmware
Version, Encoding Version, Number of Channels, Number of HDDs, Number of
Alarm Input and Number of Alarm Output are displayed. The information cannot be
changed in this menu. It is the reference for maintenance or modification in future.
Configuring Time Settings
Purpose:
You can follow the instructions in this section to configure the time synchronization
and DST settings.
Steps:
1. Enter the Time Settings interface, Configuration > System> System Settings >
Time Settings.
Network Camera User Manual
45
Time Settings
2. Select the Time Zone of your location from the drop down menu.-
3. Configure the NTP settings.
(1) Click to enable the function. NTP
(2) Configure the following settings:
Server Address: IP address of NTP server.
NTP Port: Port of NTP server.
Interval: The time interval between the two synchronizing actions with NTP
server.
(3) (Optional) You can click the Test button to test the time synchronization
function via NTP server.
Time Sync by NTP Server
Network Camera User Manual
46
Note: If the camera is connected to a public network, you should use a NTP server
that has a time synchronization function, such as the server at the National Time
Center (IP Address: 210.72.145.44). If the camera is set in a customized network,
NTP software can be used to establish a NTP server for time synchronization.
Configure the manual time synchronization.
(1) Check the Manual Time Sync. item to enable the manual time
synchronization function.
(2) - Click the icon to select the date, time from the pop up calendar.
(3) (Optional) You can check Sync. with computer time item to synchronize the
time of the device with that of the local PC.
Time Sync Manually
Click to save the settings.Save
Configuring RS232 Settings
The RS232 port can be used in two ways:
Consolo: Connect a computer to the camera through the serial port. Device
parameters can be configured by using software such as HyperTerminal. The
serial port parameters must be the same as the serial port parameters of the
camera.
Transparent Channel: Connect a serial device directly to the camera. The serial
device will be controlled remotely by the computer through the network.
Steps:
Network Camera User Manual
47
1. Enter RS232 Port Setting interface: Configuration > System > System Settings >
RS232.
2. Configure the Baud Rate, Data Bit, Stop Bit, Parity, Flow Control, and Usage.
RS232 Settings
Note: If you want to connect the camera by the RS232 port, the parameters of the
RS232 should be exactly the same with the parameters you configured here.
3. Click to save the settings.Save
Configuring RS485 Settings
Purpose:
The RS485 serial port is used to control the PTZ of the camera. The configuring of
the PTZ parameters should be done before you control the PTZ unit.
Steps:
1. - Enter RS 485 Port Setting interface: Configuration > System > System Settings >
RS485.
Network Camera User Manual
48
RS- 485 Settings
2. Set the RS485 parameters and click to save the settings.Save
By default, the Baud Rate is set as 9600 bps, the Data Bit is 8, the stop bit is 1 and
the Parity and Flow Control is None.
Note: The Baud Rate, PTZ Protocol and PTZ Address parameters should be exactly
the same as the PTZ camera parameters.
Configuring DST Settings
Purpose:
Daylight Saving Time (DST) is a way of making better use of the natural daylight by
setting your clock forward one hour during the summer months, and back again in the
fall.
Configure the DST according to your actual demand.
Steps:
1. Enter the DST configuration interface.
Configuration System System Settings DST> > >
Network Camera User Manual
49
DST Settings
2. Select the start time and the end time.
3. Select the DST Bias.
4. Click to activate the settings.Save
Configuring External Devices
Purpose:
For the device supported external devices, including the wiper on the housing or the
LED light, you can control them via the Web browser. External devices vary
according to the different camera models.
Steps:
1. Enter the External Device configuration interface.
Configuration System System Settings External Device> > >
External Device Settings
2. Check the Enable Supplement Light checkbox to enable the LED Light.
3. Move the slider to adjust the low beam brightness and high bean brightness.
4. Select the mode for LED light. Timing and Auto are selectable.
Timing: The LED will be turned on by the schedule you set. You should set
Network Camera User Manual
50
the Start Time and End Time.
Set Schedule
Auto: The LED will be turned on according to the environment illumination.
5. Click Save to save the settings.
Configuring VCA Resource
Purpose:
VCA resource offers you options to enable certain VCA functions according to actual
need when several VCA functions are available. It helps allocate more resources to
the desired functions.
Steps:
1. Enter VCA Resource configuration interface:
Configuration > System > System Settings > VCA Resource
2. Select a desired VCA combination. Available VCA combination varies according
to different camera models.
3. Click to save the settings. A reboot is required after setting the VCA Save
Resource.
Notes:
VCA combinations are mutually exclusive. When you activate one combination,
the others are hidden.
The function may not be supported by some camera models.
Open Source Software License
Information about the open source software that applies to the IP camera can be
checked if required. Go to Configuration > System Settings > About.
Network Camera User Manual
51
Maintenance
Upgrade & Maintenance
Purpose:
The upgrade & maintenance interface allows you to process the operations, including
reboot, partly restore, restore to default, export/import the configuration files, and
upgrade the device.
Enter the Maintenance interface: Configuration > System > Maintenance >
Upgrade & Maintenance.
Reboot: Restart the device.
Restore: Reset all the parameters, except the IP parameters and user information,
to the default settings.
Default: Restore all the parameters to the factory default.
Notes:
After restoring the default settings, the IP address is also restored to the
default IP address, please be careful for this action.
For camera that supports Wi Fi, wireless dial, or wlan function, -Restore
action does not restore the related settings of mentioned functions to default.
Information Export
Device Parameters: click to export the current configuration file of the camera.
This operation requires admin password to proceed.
For the exported file, you also have to create an encryption password. The
encryption password is required when you import the file to other cameras.
Diagnose Information: click to download log and system information.
Import Config. File
Configuration file is used for the batch configuration of the camera s.
Steps:
1. Click Browse to select the saved configuration file.
2. Click and input the encryption password that you set during Import
Network Camera User Manual
52
exporting.
Note: You need to reboot the camera after importing configuration file.
Upgrade: Upgrade the device to a certain version.
Steps:
1. Select firmware or firmware directory to locate the upgrade file.
Firmware: Locate the exact path of the upgrade file.
Firmware Directory: Only the directory the upgrade file belongs to is
required.
2. Click Browse Upgradeto select the local upgrade file and then click to start
remote upgrade.
Note: e upgrading process will take 1 to 10 minutes. Please don't disconnect Th
power of the camera during the process, and the camera reboots automatically
after upgrade.
Log
Purpose:
The operation, alarm, exception and information of the camera can be stored in log
files. You can also export the log files on your demand.
Before you start:
Please configure network storage for the camera or insert a SD card in the camera.
Steps:
1. Enter log searching interface: .Configuration > System > Maintenance > Log
Log Searching Interface
Network Camera User Manual
53
2. Set the log search conditions to specify the search, including the Major Type,
Minor Type, Start Time and End Time.
3. Click Search to search log files. The matched log files will be displayed on the
log list interface.
Log Searching
4. To export the log files, click to save the log files.Export
System Service
Purpose:
System service settings refer to the hardware service the camera supports. Supported
functions vary according to the different cameras. For the cameras support IR Light,
ABF (Auto Back Focus), Auto Defog, or Status LED, you can select to enable or
disable the corresponding service according to the actual demands.
ABF: When ABF function is enabled, you can click on PTZ control panel to
realize auxiliary focus.
Third Stream: For some models, third stream is not enabled by default. Check
Enable Third Stream enable the function.to
Network Camera User Manual
54
Security Audit Log
Purpose:
The security audit logs refer to the security operation logs. You can search and
analyze the security log files of the camera so that to find out the illegal intrusion and
troubleshooting the security events.
Steps:
1. Enter log searching interface: Configuration > System > Maintenance >
Security Audit Log.
Security Audit Log Searching Interface
2. Set the log search conditions to specify the search, including the Major Type,
Minor Type, Start Time and End Time.
3. Click Search to search log files. The matched log files will be displayed on the
log list interface.
Log Searching
Network Camera User Manual
55
4. To export the log files, click to save the log files.Export
Security Settings
Configure the parameters, including Authentication, IP Address Filter, and Security
Service from security interface.
Authentication
Purpose:
You can specifically secure the stream data of live view.
Steps:
1. Enter the Authentication interface: Configuration > System > Security >
Authentication.
Authentication
2. Set up authentication method for RTSP authentication and WEB authentication.
Caution:
Digest is the recommended authentication method for better data security. You
must be aware of the risk if you adopt basic as the authentication method.
3. Click to save the settings. Save
IP Address Filter
Purpose:
This function makes it possible for access control.
Steps:
1. Enter the IP Address Filter interface: Configuration > System > Security > IP
Network Camera User Manual
58
Steps:
1. Enter the security service configuration interface: Configuration > System >
Security Advanced Security > .
Advance Security
2. Check the checkbox of .Enable Security Reinforce
Note:
If Security Reinforce is enabled, certain functions are enabled by default, such as
Enable HTTPS, Enable HTTPS Browsing, TLS1.2 and websockets; certain
functions are disabled by default, such as websocket, ONVIF and 802.1x. For
802.1x, only TLS is supported. SHA256 algorithm is supported, MD5 algorithm
and SDK service are not supported.
3. Check the checkbox of Control Timeout Settings to enable control timeout
settings.
4. Slide to set the timeout as required.
5. Click .Save
Network Camera User Manual
59
User Management
User Management
As Administrator
The admin user can add, delete or modify user accounts, and grant them different
permissions. We highly recommend you manage the user accounts and
permissions properly.
Enter the User Management interface: > > Configuration System User
Management
Note:
Admin password if required for adding and modifying a user account.
User Management Interface
Adding a User
The user has all permissions by default and can create/modify/delete other admin
accounts.
The user cannot be deleted and you can only change the password.admin admin
Steps:
1. Click to add a user.Add
2. Input the Admin Password User Name Level Password., , select and input
Notes:
Up to 31 user accounts can be created.
Users of different levels own different default permissions. Operator and
user are selectable.
Network Camera User Manual
60
STRONG PASSWORD RECOMMENDED–We highly recommend you
create a strong password of your own choosing (using a minimum of 8
characters, including at least three of the following categories: upper case
letters, lower case letters, numbers, and special characters) in order to
increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the
password monthly or weekly can better protect your product.
3. You can check or uncheck the permissions for the new user.
4. Click to finish the user addition.OK
Modifying a User
Steps:
1. - Left click to select the user from the list and click . Modify
2. Modify the User Name Level Password, and .
STRONG PASSWORD RECOMMENDED–We highly recommend you
create a strong password of your own choosing (using a minimum of 8
characters, including at least three of the following categories: upper case
letters, lower case letters, numbers, and special characters) in order to
increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the
password monthly or weekly can better protect your product.
3. You can check or uncheck the permissions.
4. Click to finish the user modification.OK
Deleting a User
Steps:
1. Click to select the user you want to delete and click .Delete
2. - Click on the popOK up dialogue box to confirm the deletion.
Setting Simultaneous Login
Network Camera User Manual
61
Steps:
1. Click .General
2. Slide the slide bar to set the simultaneous login. If the number of the illegal
login attempts exceeds the set threshold, your access will be denied.
As Operator or User
Operator or user can modify password. Old password is required for this action.
Security Question
Purpose:
Security question is used to recover the admin password when admin user forgets the
password. Recovering the password via the security questions and via the email are
available.
Set Account Security:
You can set the security questions during camera activation. Or you can set the
function at user management interface.
Security question setting is not cleared when you restore the camera (not to default).
Steps:
1. Enter setting interface:
Configuration > System > User Management > User Management
2. Click Account Security Settings.
3. Select questions and input answers.
4. - Enter the E mail address to receive the verification code for password recovery.
5. Click to save the settings. OK
Reset Admin Password:
Before you start:
The PC used to reset password and the camera should belong to the same IP address
segment of the same LAN.
Steps:
1. Enter login interface via web browser.
Network Camera User Manual
62
2. Click .Forget Password
3. Select the verification mode to E mail Verification- .
4. Read the Privacy Policy and click .OK
5. Click and save the code to local.Export QR Code
6. Send the code to pw_recovery@hikvision.com as an attachment. Your email
account for password recovery will receive a verification code in 5 minutes.
Note:
The verification code is valid within 48 hours.
7. Input the verification code in the text field below.
Reset Password
8. Click .Next
9. Input the password and confirm.
10. Follow the instructions to create new password.a
Note:
User IP address is locked for 30 minutes after 7 failed attempts of answering security
questions.
Network Camera User Manual
63
Online Users
Purpose:
You can see the current users who are visiting the device through this interface. User
information, such as user name, level, IP address, and operation time, is displayed in
the User List.
Click Refresh to refresh the list.
View the Online Users
Network Camera User Manual
64
Chapter 7 Network Settings
Purpose:
Follow the instructions in this chapter to configure the basic settings and advanced
settings.
Configuring Basic Settings
Purpose:
You can configure the parameters, including TCP/IP, DDNS, PPPoE, Port, and NAT,
etc., by following the instructions in this section.
Configuring TCP/IP Settings
Purpose:
TCP/IP settings must be properly configured before you operate the camera over
network. The camera supports both the IPv4 and IPv6. Both versions can be
configured simultaneously without conflicting to each other, and at least one IP
version should be configured.
Steps:
1. Enter TCP/IP Settings interface: Configuration > Network > Basic
Settings > TCP/IP
Network Camera User Manual
65
TCP/IP Settings
2. NIC Type, IPv4 or IPv6 Configure the basic network settings, including the
Address, IPv4 or IPv6 Subnet Mask, IPv4 or IPv6 Default Gateway, MTU settings
and Multicast Address.
3. (Optional) Check the checkbox of , and then the Enable Multicast Discovery
online network camera can be automatically detected by client software via
private multicast protocol in the LAN.
4. Configure the DNS server. Input the preferred DNS server, and alternate DNS
server.
5. Click to save the above settings Save .
Notes:
The valid value range of MTU is 1280 1500. to
The Multicast sends a stream to the multicast group address and allows multiple
clients to acquire the stream at the same time by requesting a copy from the
Network Camera User Manual
66
multicast group address. Before utilizing this function, you have to enable the
Multicast function of your router.
A reboot is required for the settings to take effect.
Configuring DDNS Settings
Purpose:
If your camera is set to use PPPoE as its default network connection, you can use the
Dynamic DNS (DDNS) for network access.
Before you start:
Registration on the DDNS server is required before configuring the DDNS settings of
the camera.
Steps:
1. Enter the DDNS Settings interface: Configuration > Network > Basic Settings >
DDNS.
2. Check the checkbox to enable this feature. Enable DDNS
3. Select . Two DDNS types are selectable: DynDNS and NO-IP. DDNS Type
DynDNS:
Steps:
(1) Enter of DynDNS (e.g. members.dyndns.org). Server Address
(2) In the text field, enter the domain name obtained from the DynDNS Domain
website.
(3) Enter the and registered on the DynDNS website. User Name Password
(4) Click to save the settings. Save
Network Camera User Manual
67
Figure 7-2 DynDNS Settings
NO-IP:
Steps:
(1) Choose the DDNS Type as NO-IP.
Figure 7-3 - NO IP DNS Settings
(2) Enter the Server Address as www.noip.com
(3) Enter the Domain name you registered.
(4) Enter the User Name and Password.
(5) Click and then you can view the camera with the domain name. Save
Note: Reboot the device to make the settings take effect.
Network Camera User Manual
70
Note:
WebSocket and WebSockets protocol are used for plug in free live view. For -
detailed information, see 7.2.11.
3. Click to save the settings.Save
Note: A reboot is required for the settings to take effect.
Configure NAT (Network Address Translation) Settings
Purpose:
NAT interface allows you to configure the UPnP™ parameters.
Universal Plug and Play (UPnP™) is a networking architecture that provides
compatibility among networking equipment, software and other hardware devices.
The UPnP protocol allows devices to connect seamlessly and to simplify the
implementation of networks in the home and corporate environments.
With the function enabled, you don’t need to configure the port mapping for each port,
and the camera is connected to the Wide Area Network via the router.
UPnP Settings
Steps:
1. Enter the NAT settings interface. Configuration > Network > Basic Settings >
NAT.
2. Check the checkbox to enable the UPnP™ function.
Note:
Only when the UPnP™ function is enabled, ports of the camera are active.
Network Camera User Manual
71
3. Choose a friendly name for the camera, or you can use the default name.
4. Select the port mapping mode. Manual and Auto are selectable.
Note:
If you select Auto, you should enable UPnP™ function on the router.
If you select Manual, you can customize the value of the external port and
complete port mapping settings on router manually.
5. Click to save the settings.Save
Configure Advanced Settings
Purpose:
You can configure the parameters, including SNMP, FTP, Email, HTTPS, QoS,
802.1x, etc., by following the instructions in this section.
Configuring SNMP Settings
Purpose:
You can set the SNMP function to get camera status, parameters and alarm related
information, and manage the camera remotely when it is connected to the network.
Before you start:
Before setting the SNMP, please download the SNMP software and manage to
receive the camera information via SNMP port. By setting the Trap Address, the
camera can send the alarm event and exception messages to the surveillance center.
Note: The SNMP version you select should be the same as that of the SNMP software.
And you also need to use the different version according to the security level you
required. SNMP v1 provides no security and SNMP v2 requires password for access.
And SNMP v3 provides encryption and if you use the third version, HTTPS protocol
must be enabled.
For your privacy and to better protect your system against security risks, we
Network Camera User Manual
72
strongly recommend the use of strong passwords for all functions and network
devices. The password should be something of your own choosing (using a
minimum of 8 characters, including at least three of the following categories:
upper case letters, lower case letters, numbers and special characters) in order to
increase the security of your product.
Proper configuration of all passwords and other security settings is the
responsibility of the installer and/or end user.-
Steps:
1. Enter the SNMP Settings interface: Configuration > Network > Advanced
Settings > SNMP.
Network Camera User Manual
73
SNMP Settings
2. Check the checkbox of Enable SNMPv1, Enable SNMP v2c, Enable SNMPv3 to
enable the feature correspondingly.
3. Configure the SNMP settings.
Note: The settings of the SNMP software should be the same as the settings you


Specyfikacje produktu

Marka: Hikvision
Kategoria: Kamera monitorująca
Model: DS-2CD5A46G1-IZ(H)S

Potrzebujesz pomocy?

Jeśli potrzebujesz pomocy z Hikvision DS-2CD5A46G1-IZ(H)S, zadaj pytanie poniżej, a inni użytkownicy Ci odpowiedzą




Instrukcje Kamera monitorująca Hikvision

Instrukcje Kamera monitorująca

Najnowsze instrukcje dla Kamera monitorująca