Hikvision DS-2CD1127G2-LUF Manual

Hikvision Overvågningskamera DS-2CD1127G2-LUF

Læs nedenfor 📖 manual på dansk for Hikvision DS-2CD1127G2-LUF (114 sider) i kategorien Overvågningskamera. Denne guide var nyttig for 5 personer og blev bedømt med 4.5 stjerner i gennemsnit af 2 brugere

Side 1/114
Network Camera
User Manual
Iniaves on the Use of Video Products
Thank you for choosing Hikvision products.
Technology aects every aspect of our life. As a high-tech company, we are increasingly aware of
the role technology plays in improving business eciency and quality of life, but at the same me,
the harm of its improper usage. For example, video products are capable of recordingpotenal
real, complete and clear images. This provides a high value in retrospect and preserving real-me
facts. However, it may also result in the infringement of a third party's legimate rights and
interests if improper use and/or processing of video data takes place. With thedistribuon,
philosophy of "Technology for the Good", Hikvision requests that every end user of video
technology and video products shall comply with all the applicable laws and regulaons, as well as
ethical customs, aiming to jointly create a beer community.
Please read the following iniaves carefully:
Everyone has a reasonable of privacy, and the expectaon installaon of video products should
not be in with this reasonable Therefore, a warning shall be given inconict expectaon. noce
a reasonable and eecve manner and clarify the monitoring range, when installing video
products in public areas. For non-public areas, a third party's rights and interests shall be
evaluated when installing video products, including but not limited to, installing video products
only aer obtaining the consent of the stakeholders, and not installing highly-invisible video
products.
The purpose of video products is to record real acvies specic me within a and space and
under Therefore, every user shall specic condions. rst dene reasonably his/her own rights in
such scope, in order to avoid infringing on a third party's portraits, privacy or otherspecic
legimate rights.
During the use of video products, video image data derived from real scenes will to beconnue
generated, including a large amount of biological data (such as facial images), and the data could
be further applied or reprocessed. Video products themselves could not disnguish good from
bad regarding how to use the data based solely on the images captured by the video products.
The result of data usage depends on the method and purpose of use of the data controllers.
Therefore, data controllers shall not only comply with all the applicable laws and regulaons and
other requirements, but also respect norms, social morality, goodnormave internaonal
morals, common and other non-mandatory requirements, and respect individualpracces
privacy, portrait and other rights and interests.
The rights, values and other demands of various stakeholders should always be considered when
processing video data that is connuously generated by video products. In this regard, product
security and data security are extremely crucial. Therefore, every end user and data controller,
shall undertake all reasonable and necessary measures to ensure data security and avoid data
leakage, improper disclosure and improper use, including but not limited to, seng up access
Network Camera User Manual
i
control, a suitable network environment (the Internet or Intranet) where videoselecng
products are connected, establishing and constantly network security.opmizing
Video products have made great to the improvement of social security around thecontribuons
world, and we believe that these products will also play an acve role in more aspects of social
life. Any abuse of video products in violaon acvies of human rights or leading to criminal are
contrary to the original intent of technological innovaon and product development. Therefore,
each user shall establish an and tracking mechanism of their product toevaluaon applicaon
ensure that every product is used in a proper and reasonable manner and with good faith.
Network Camera User Manual
ii
Legal Informaon
©2022 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
About this Manual
The Manual includes for using and managing the Product. Pictures, charts, images andinstrucons
all other informaon hereinaer are for and only. The descripon explanaon informaon
contained in the Manual is subject to change, without due to noce, rmware updates or other
reasons. Please the latest version of this Manual at the Hikvision website ( nd hps://
www.hikvision.com/ ).
Please use this Manual with the guidance and assistance of professionals trained in supporng the
Product.
Trademarks
and other Hikvision's trademarks and logos are the properes of
Hikvision in various jurisdicons.
Other trademarks and logos are the menoned properes respecve of their owners.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS MANUAL AND THE PRODUCT
DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED "AS IS" AND "WITH
ALL FAULTS AND ERRORS". HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR
PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION
BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES,
INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION,
WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY,
OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR INHERENT SECURITY
RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS
INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY
TECHNICAL SUPPORT IF REQUIRED.
YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE
SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW.
ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT
INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF
PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS.
YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE
Network Camera User Manual
iii
DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED
TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN
RIGHTS ABUSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATTER
PREVAILS.
Network Camera User Manual
iv
Symbol Convenons
The symbols that may be found in this document are as follows.dened
Symbol Descripon
Danger
Indicates a hazardous which, if not avoided, will or couldsituaon
result in death or serious injury.
Cauon
Indicates a hazardous which, if not avoided, couldpotenally situaon
result in equipment damage, data loss, performance ordegradaon,
unexpected results.
Note Provides to emphasize or supplementaddional informaon
important points of the main text.
Network Camera User Manual
v
Safety Instrucon
These are intended to ensure that user can use the product correctly to avoid dangerinstrucons
or property loss.
Laws and Regulaons
The device should be used in compliance with local laws, electrical safety and regulaons, re
prevenon regulaons.
Electricity
In the use of the product, you must be in strict compliance with the electrical safety regulaons
of the and region.naon
The equipment shall not be exposed to dripping or splashing and that no objects withlled
liquids, such as vases, shall be placed on the equipment.
Provide a surge suppressor at the inlet opening of the equipment under special suchcondions
as the mountain top, iron tower, and forest.
CAUTION: To reduce the risk of replace only with the same type and re, rang of fuse.
The equipment must be connected to an earthed mains socket-outlet.
An appropriate readily accessible disconnect device shall be incorporated external to the
equipment.
An appropriate overcurrent protecve device shall be incorporated external to the equipment,
not exceeding the of the building.specicaon
An all-pole mains switch shall be incorporated in the electrical installaon of the building.
Ensure correct wiring of the terminals for to an AC mains supply.connecon
The equipment has been designed, when required, modied connecon for to an IT power
distribuon system.
Baery
Do not ingest baery. Chemical burn hazard!
This product contains a cell coin/buon baery. coin/buon baery If the cell is swallowed, it
can cause severe internal burns in just 2 hours and can lead to death.
Keep new and used baeries away from children.
If the baery compartment does not close securely, stop using the product and keep it away
from children.
If you think baeries might have been swallowed or placed inside any part of the body, seek
immediate medical aenon.
CAUTION: Risk of explosion if the baery is replaced by an incorrect type. Dispose of used
baeries according to the instrucons.
ATTENTION: IL Y A RISQUE D'EXPLOSION SI LA BATTERIE EST REMPLACÉE PAR UNE BATTERIE DE
TYPE INCORRECT. METTRE AU REBUT LES BATTERIES USAGÉES CONFORMÉMENT AUX
INSTRUCTIONS.
Network Camera User Manual
vi
Improper replacement of the with an incorrect type may defeat a safeguard (forbaery
example, in the case of some lithium types).baery
Do not dispose of the into or a hot oven, or mechanically crush or cut the baery re baery,
which may result in an explosion.
Do not leave the baery in an extremely high temperature surrounding environment, which may
result in an explosion or the leakage of ammable liquid or gas.
Do not subject the baery to extremely low air pressure, which may result in an explosion or the
leakage of liquid or gas.ammable
+ the terminal(s) of equipment which is used with, or generates direct current.idenes posive
- the idenes negave terminal(s) of equipment which is used with, or generates direct current.
Fire Prevenon
No naked ame sources, such as lighted candles, should be placed on the equipment.
The serial port of the equipment is used for debugging only.
Hot Surface Prevenon
CAUTION: Hot parts! Burned ngers when handling the parts. Wait one-half hour
aer o switching before handling parts. This scker is to indicate that the marked item can be
hot and should not be touched without taking care. For device with this scker, this device is
intended for installaon in a restricted access access can only be gained by servicelocaon,
persons or by users who have been instructed about the reasons for the restricons applied to
the and about any that shall be taken.locaon precauons
Installaon
Install the equipment according to the in this manual.instrucons
To prevent injury, this equipment must be securely aached oor/wall to the in accordance with
the installaon instrucons.
Never place the equipment in an unstable locaon. The equipment may fall, causing serious
personal injury or death.
Power Supply
The input voltage should conform to IEC60950-1 standard: SELV (Safety Extra Low Voltage) and
the Limited Power Source. Refer to the appropriate documentaon for detailed informaon.
The power source should meet limited power source or PS2 requirements according to IEC
60950-1 or IEC 62368-1 standard.
DO NOT connect mulple devices to one power adapter, to avoid over-heang re or hazards
caused by overload.
Make sure the plug is properly connected to the power socket.
Network Camera User Manual
vii
White Light Illuminator (If supported)
Possibly hazardous opcal radiaon emied from this product.
DO NOT stare at light source. May be harmful to the eyes.operang
Wear appropriate eye protecon or DO NOT turn on the white light when you assemble, install
or maintain the camera.
Transportaon
Keep the device in original or similar packaging while transporng it.
System Security
The installer and user are responsible for password and security conguraon.
Maintenance
If the product does not work properly, please contact your dealer or the nearest service center.
We shall not assume any responsibility for problems caused by unauthorized repair or
maintenance.
A few device components (e.g., capacitor) require regular replacement. The averageelectrolyc
lifespan varies, so periodic checking is recommended. Contact your dealer for details.
Cleaning
Please use a so and dry cloth when clean inside and outside surfaces of the product cover. Do
not use alkaline detergents.
Using Environment
When any laser equipment is in use, make sure that the device lens is not exposed to the laser
beam, or it may burn out.
DO NOT expose the device to high electromagnec radiaon or dusty environments.
For indoor-only device, place it in a dry and well-venlated environment.
DO NOT aim the lens at the sun or any other bright light.
Make sure the running environment meets the requirement of the device. The operang
temperature shall be -30 °C to 60 °C (-22 °F to 140 °F), and the humidity shall be 95%operang
or less (no condensing).
DO NOT place the camera in extremely hot, cold, dusty or damp locaons, and do not expose it
to high electromagnec radiaon.
Emergency
If smoke, odor, or noise arises from the device, immediately turn the power, unplug theo
power cable, and contact the service center.
Network Camera User Manual
viii
Time Synchronizaon
Set up device manually for the me rst me me access if the local is not synchronized with
that of the network. Visit the device via Web browse/client soware and go to me sengs
interface.
Reecon
Make sure that no reecve surface is too close to the device lens. The IR light from the device
may reect back into the lens causing reecon.
Network Camera User Manual
ix
Contents
Chapter 1 Device and Accessing ................................................................................. 1Acvaon
1.1 Acvate Device ...................................................................................................................... 1
1.1.1 Acvate via SADP .......................................................................................................... 1
1.1.2 Acvate Camera via iVMS-4200 .................................................................................... 2
1.1.3 Acvate Device via Web Browser .................................................................................. 3
1.2 Access Camera ....................................................................................................................... 4
1.2.1 Access Camera via Web Browser .................................................................................. 4
1.2.2 Access Camera via iVMS-4200 ...................................................................................... 6
1.2.3 Access Camera via Hik-Connect .................................................................................... 6
Chapter 2 Network Camera Conguraon ................................................................................ 11
2.1 Update Firmware ................................................................................................................. 11
2.2 System Requirement ............................................................................................................ 11
2.3 Live View .............................................................................................................................. 11
2.3.1 Live View Parameters .................................................................................................. 11
2.3.2 Set Transmission Parameters ...................................................................................... 15
2.3.3 Set Smooth Streaming ................................................................................................ 16
2.4 Video and Audio .................................................................................................................. 17
2.4.1 Video Sengs ............................................................................................................. 17
2.4.2 ROI .............................................................................................................................. 21
2.4.3 Display Info. on Stream ............................................................................................... 22
2.4.4 Audio Sengs ............................................................................................................. 22
2.4.5 Two-way Audio ............................................................................................................ 23
2.4.6 Display ........................................................................................................... 24Sengs
2.4.7 OSD ............................................................................................................................. 30
2.4.8 Set Privacy Mask ......................................................................................................... 30
2.4.9 Overlay Picture ............................................................................................................ 30
Network Camera User Manual
x
2.4.10 Set Target Cropping ................................................................................................... 31
2.5 Video Recording and Picture Capture .................................................................................. 31
2.5.1 Storage Sengs .......................................................................................................... 31
2.5.2 Video Recording .......................................................................................................... 36
2.5.3 Capture Conguraon ................................................................................................. 38
2.6 Event and Alarm ................................................................................................................... 40
2.6.1 Basic Event .................................................................................................................. 40
2.6.2 Smart Event ................................................................................................................. 46
2.7 Network .................................................................................................................. 56Sengs
2.7.1 TCP/IP .......................................................................................................................... 56
2.7.2 SNMP .......................................................................................................................... 58
2.7.3 Set SRTP ...................................................................................................................... 58
2.7.4 Port Mapping .............................................................................................................. 59
2.7.5 Port ............................................................................................................................. 61
2.7.6 Access to Device via Domain Name ............................................................................ 62
2.7.7 Access to Device via PPPoE Dial Up ......................................................... 62Connecon
2.7.8 Wireless Dial ............................................................................................................... 63
2.7.9 Wi-Fi ............................................................................................................................ 64
2.7.10 Set Network Service .................................................................................................. 64
2.7.11 Set Open Network Video Interface ........................................................................... 65
2.7.12 Set ISUP ..................................................................................................................... 66
2.7.13 Set Alarm Server ....................................................................................................... 66
2.8 Arming Schedule and Alarm Linkage ................................................................................... 67
2.8.1 Set Arming Schedule ................................................................................................... 67
2.8.2 Linkage Method Sengs ............................................................................................. 67
2.9 System and Security ............................................................................................................. 71
2.9.1 View Device Informaon ............................................................................................. 71
2.9.2 Search and Manage Log .............................................................................................. 72
Network Camera User Manual
xi
2.9.3 Simultaneous Login ..................................................................................................... 72
2.9.4 Import and Export Conguraon File ......................................................................... 72
2.9.5 Export Diagnose Informaon ...................................................................................... 72
2.9.6 Reboot ........................................................................................................................ 72
2.9.7 Restore and Default .................................................................................................... 72
2.9.8 Upgrade ...................................................................................................................... 73
2.9.9 Device Auto Maintenance ........................................................................................... 73
2.9.10 View Open Source Soware License ......................................................................... 74
2.9.11 Wiegand .................................................................................................................... 74
2.9.12 Metadata .................................................................................................................. 74
2.9.13 Time and Date ........................................................................................................... 74
2.9.14 Set RS-485 ................................................................................................................. 76
2.9.15 Set RS-232 ................................................................................................................. 76
2.9.16 Power Mode ....................................................................................... 76Consumpon
2.9.17 External Device ......................................................................................................... 77
2.9.18 Security ..................................................................................................................... 78
2.9.19 Cercate Management ........................................................................................... 82
2.9.20 User and Account ...................................................................................................... 84
2.10 VCA Resource ..................................................................................................................... 85
2.10.1 Allocate VCA Resource .............................................................................................. 85
2.10.2 Set Open Plaorm ..................................................................................................... 85
2.10.3 Road Trac ............................................................................................................... 86
2.10.4 Face Capture ............................................................................................................. 90
2.11 Smart Display ..................................................................................................................... 93
2.12 EPTZ ................................................................................................................................... 94
2.12.1 Patrol ......................................................................................................................... 94
2.12.2 Auto-Tracking ............................................................................................................ 95
2.13 Image Stching .................................................................................................................. 95
Network Camera User Manual
xii
Appendix A. FAQ ...................................................................................................................... 97
Appendix B. Device Command .................................................................................................. 98
Appendix C. Device Communicaon Matrix .............................................................................. 99
Network Camera User Manual
xiii
Status of the device becomes successful Acve aer acvaon.
5. Modify IP address of the device.
1) Select the device.
2) Change the device IP address to the same subnet as your computer by either modifying the IP
address manually or checking .Enable DHCP
3) Input the admin password and click to Modify acvate your IP address modicaon.
1.1.2 Acvate Camera via iVMS-4200
iVMS-4200 is a PC client to manage and operate your devices. Camera is supported byacvaon
the soware.
Before You Start
Get the client soware ocial from the supplied disk or the website hp://
www.hikvision.com/en/ . Install the following the prompts.soware
The camera and the PC that runs the soware should be in the same subnet.
Steps
1. Run the client soware.
2. Enter Device Management Online Device or .
3. Check the device status from the device list, and select an inacve camera.
4. Click the Acvate.
5. Create and conrm the admin password of the camera.
Network Camera User Manual
2
Cauon
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case lower caseleers,
leers, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can protect your product.beer
6. Click to start OK acvaon.
Device status change to successful Acve aer acvaon.
7. Modify IP address of the device.
1) Select the device and click Modify Nenfo at .Online Device
2) Change the device IP address to the same subnet with your computer by either modifying the
IP address manually or checking .DHCP
3) Input the admin password of the device and click to complete OK modicaon.
1.1.3 Acvate Device via Web Browser
Use web browser to acvate the device. For the device with the DHCP enabled by default, use
SADP soware acvate or PC client to the device.
Before You Start
Make sure your device and your PC connect to the same LAN.
Steps
1. Change the IP address of your PC to the same subnet as the device.
The default IP address of the device is 192.168.1.64.
2. Open a web browser and input the default IP address.
3. Create and conrm the admin password.
Cauon
STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of
your own choosing (using a minimum of 8 characters, including upper case lower caseleers,
leers, numbers, and special characters) in order to increase the security of your product. And
we recommend you reset your password regularly, especially in the high security system,
reseng the password monthly or weekly can protect your product.beer
4. Click to complete and enter page.OK acvaon Live View
5. Modify IP address of the camera.
1) Enter IP address modicaon page. Conguraon → Network → TCP/IP
2) Change IP address.
3) Save the sengs.
Network Camera User Manual
3
1.2 Access Camera
This part introduces how to access the camera via Web browser or client soware.
1.2.1 Access Camera via Web Browser
Before You Start
Check the system requirement to that the computer and web browser meetsconrm operang
the requirements.
Table 1-1 System Requirement
Operang System Windows XP and above version, Mac OS X 10.8 and above versionMicroso
CPU 3.0 GHz or higher
RAM 1 GB or higher
Display 1024 × 768 or higherresoluon
Web Browser Internet Explorer 8.0 and above version, Mozilla Firefox 30.0-51, Google
Chrome 31.0-44, Safari 8.0+
Steps
1. Open the web browser.
Note
For some web browsers, a plug-in is required. For detailed requirements, see Plug-in
Installaon .
2. Input IP address of the camera to enter the login interface.
3. Input user name and password.
Note
Illegal login lock is acvated by default. If admin user performs seven failed password aempts
(ve aempts for user/operator), the IP address is blocked for 30 minutes.
If illegal login lock is not needed, go to Conguraon → System → Security → Security Service
to turn it o.
4. Click .Login
5. Download and install appropriate plug-in for your web browser.
For IE based web browser, webcomponents and TM are oponal. For non-IE based web browser,
webcomponents, TM, VLC and MJEPG are oponal.
What to do next
You can recover admin password. For detailed sengs, see Admin Password Recovery .
You can set illegal login lock to improve security. For detailed see .sengs, Illegal Login Lock
Network Camera User Manual
4
Plug-in Installaon
Certain operaon systems and web browser may restrict the display and of the cameraoperaon
funcon. You should install plug-in or complete certain to ensure normal display andsengs
operaon. For detailed restricted refer to the actual device.funcon,
Operang System Web Browser Operaon
Windows Internet Explorer 8+
Google Chrome 57 and
earlier version
Mozilla Firefox 52 and earlier
version
Follow pop-up prompts to
complete plug-in installaon.
Google Chrome 57+
Mozilla Firefox 52+
Click to
download and install plug-in.
Mac OS Google Chrome 57+
Mozilla Firefox 52+
Mac Safari 16+
Plug-in is notinstallaon
required.
Go to Conguraon
Network → Advanced Sengs
→ Network Service to enable
WebSocket or Websockets for
normal view. Display and
operaon of certain funcons
are restricted. For example,
Playback and Picture are not
available. For detailed
restricted funcon, refer to the
actual device.
Note
The camera only supports Windows and Mac OS system and do not support Linux system.
Admin Password Recovery
If you forget the admin password, you can reset the password by clicking Forget Password on the
login page aer compleng sengs. the account security
You can reset the password by the security or email.seng queson
Network Camera User Manual
5
Note
When you need to reset the password, make sure that the device and the PC are on the same
network segment.
Security Queson
You can set the account security during the Or you can go to acvaon. Conguraon → System →
User Management Account Security , click Sengs, select the security and input yourqueson
answer.
You can click Forget Password and answer the security to reset the admin password whenqueson
access the device via browser.
Email
You can set the account security during the Or you can go to acvaon. Conguraon → System →
User Management Account Security , click Sengs, input your email address to receive the
vericaon code during the recovering operaon process.
Illegal Login Lock
It helps to improve the security when accessing the device via Internet.
Go to Conguraon → System → Security → Security Service Enable Illegal Login , and enable
Lock Illegal Login . Aempts Duraon and Locking are congurable.
Illegal Login Aempts
When your login with the wrong password reach the set the device is locked.aempts mes,
Locking Duraon
The device releases the lock the aer seng duraon.
1.2.2 Access Camera via iVMS-4200
Add the camera to client soware before further operaon.
Refer to the iVMS-4200 Client User ManualSoware for detailed steps.seng
1.2.3 Access Camera via Hik-Connect
Hik-Connect is an applicaon for mobile devices. Using the App, you can view live image, receive
alarm nocaon and so on.
Before You Start
Connect the camera to network with network cables.
Network Camera User Manual
6
Steps
1. Get and install Hik-Connect by the following ways.applicaon
-Visit hps://appstore.hikvision.com to download the according to your mobileapplicaon
phone system.
-Visit the site of our company. Then go to ocial Support → Tools → Hikvision App Store .
-Scan the QR code below to download the applicaon.
Note
If errors like "Unknown app" occur during the installaon, solve the problem in two ways.
Visit hps://appstore.hikvision.com/stac/help/index.html to refer to the troubleshoong.
Visit hps://appstore.hikvision.com/ , and click at the upper right corner ofInstallaon Help
the interface to refer to the troubleshoong.
2. Start the and register for a Hik-Connect user account.applicaon
3. Log in aer registraon.
4. In the app, tap "+" on the upper-right corner and then scan the QR code of the camera to add
the camera. You can the QR code on the camera or on the cover of the Quick Start Guide ofnd
the camera in the package.
5. Follow the prompts to set the network connecon and add the camera to your Hik-Connect
account.
For detailed informaon, refer to the user manual of the Hik-Connect app.
Enable Hik-Connect Service on Camera
Hik-Connect service should be enabled on your camera before using the service.
You can enable the service through SADP soware or Web browser.
Enable Hik-Connect Service via Web Browser
Follow the following steps to enable Hik-Connect Service via Web Browser.
Before You Start
You need to acvate the camera before enabling the service.
Steps
1. Access the camera via web browser.
Network Camera User Manual
7
2. Enter access plaorm conguraon interface. Conguraon → Network Advanced Sengs
AccessPlaorm
3. Select Hik-Connect as the .Plaorm Access Mode
4. Check .Enable
5. Click and read "Terms of Service" and "Privacy Policy" in pop-up window.
6. Create a vericaon code or change the old code for the camera.vericaon
Note
The code is required when you add the camera to Hik-Connect service.vericaon
7. Save the sengs.
Enable Hik-Connect Service via SADP Soware
This part introduce how to enable Hik-Connect service via SADP soware acvated of an camera.
Steps
1. Run SADP soware.
2. Select a camera and enter Modify Network Parameters page.
3. Check Enable Hik-Connect.
4. Create a vericaon code or change the old code.vericaon
Note
The code is required when you add the camera to Hik-Connect service.vericaon
5. Click and read "Terms of Service" and "Privacy Policy".
6. Conrm sengs. the
Set Up Hik-Connect
Steps
1. Get and install Hik-Connect applicaon by the following ways.
-Visit hps://appstore.hikvision.com to download the applicaon according to your mobile
phone system.
-Visit the site of our company. Then go to ocial Support → Tools → Hikvision App Store .
-Scan the QR code below to download the applicaon.
Network Camera User Manual
8


Produkt Specifikationer

Mærke: Hikvision
Kategori: Overvågningskamera
Model: DS-2CD1127G2-LUF

Har du brug for hjælp?

Hvis du har brug for hjælp til Hikvision DS-2CD1127G2-LUF stil et spørgsmål nedenfor, og andre brugere vil svare dig




Overvågningskamera Hikvision Manualer

Overvågningskamera Manualer

Nyeste Overvågningskamera Manualer