LevelOne FCS-5067 Manual


Læs nedenfor 📖 manual på dansk for LevelOne FCS-5067 (163 sider) i kategorien Overvågningskamera. Denne guide var nyttig for 57 personer og blev bedømt med 4.5 stjerner i gennemsnit af 2 brugere

Side 1/163
User Manual of Network Camera
1
User Manual
Network Camera
User Manual of Network Camera
2
About this Manual
This Manual is applicable to Network Camera (V5.3.2 ).
The Manual includes instructions for using and managing the product. Pictures, charts,
images and all other information hereinafter are for description and explanation only.
The information contained in the Manual is subject to change, without notice, due to
firmware updates or other reasons. Please find the latest version in the company
website.
Please use this user manual under the guidance of professionals.
Legal Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE
PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND
FIRMWARE, IS PROVIDED “AS IS”, WITH ALL FAULTS AND ERRORS, AND
OUR COMPANY MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING WITHOUT LIMITATION, MERCHANTABILITY,
SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, AND
NON-INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL OUR
COMPANY, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE
LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR
INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR
LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF
DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS
PRODUCT, EVEN IF OUR COMPANY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF
PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. OUR COMPANY
SHALL NOT TAKE ANY RESPONSIBILITES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER
ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET
SECURITY RISKS; HOWEVER, OUR COMPANY WILL PROVIDE TIMELY
User Manual of Network Camera
3
TECHNICAL SUPPORT IF REQUIRED.
SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL
RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT
IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE
LAW. OUR COMPANY SHALL NOT BE LIABLE IN THE EVENT THAT THIS
PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE
APPLICABLE LAW, THE LATER PREVAILS.
Regulatory Information
FCC Information
FCC compliance: This equipment has been tested and found to comply with the
limits for a digital device, pursuant to part 15 of the FCC Rules. These limits are
designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. This equipment generates, uses,
and can radiate radio frequency energy and, if not installed and used in accordance
with the instruction manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause harmful
interference in which case the user will be required to correct the interference at his
own expense.
FCC Conditions
This device complies with part 15 of the FCC Rules. Operation is subject to the
following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may
cause undesired operation.
EU Conformity Statement
This product and - if applicable - the supplied accessories too are
marked with "CE" and comply therefore with the applicable
User Manual of Network Camera
4
harmonized European standards listed under the EMC Directive 2004/108/EC, the
RoHS Directive 2011/65/EU.
2012/19/EU (WEEE directive): Products marked with this symbol
cannot be disposed of as unsorted municipal waste in the European
Union. For proper recycling, return this product to your local
supplier upon the purchase of equivalent new equipment, or dispose
of it at designated collection points. For more information see:
www.recyclethis.info.
2006/66/EC (battery directive): This product contains a battery that
cannot be disposed of as unsorted municipal waste in the European
Union. See the product documentation for specific battery
information. The battery is marked with this symbol, which may
include lettering to indicate cadmium (Cd), lead (Pb), or mercury
(Hg). For proper recycling, return the battery to your supplier or to a designated
collection point. For more information see: www.recyclethis.info.
Industry Canada ICES-003 Compliance
This device meets the CAN ICES-3 (A)/NMB- A) standards requirements. 3(
Safety Instruction
These instructions are intended to ensure that the user can use the product correctly to
avoid danger or property loss.
The precaution measure is divided into „Warnings‟ and „Cautions‟:
Warnings: Serious injury or death may be caused if any of these warnings are
neglected.
Cautions: Injury or equipment damage may be caused if any of these cautions are
neglected.
Warnings Follow these safeguards to
prevent serious injury or death.
Cautions Follow these precautions to
prevent potential injury or material
damage.
User Manual of Network Camera
5
Warnings:
Please adopt the power adapter which can meet the safety extra low voltage
(SELV) standard. And source with 12 V or 24 VDC AC (depending on models)
according to the IEC60950-1 and Limited Power Source standard.
To reduce the risk of fire or electrical shock, do not expose this product to rain or
moisture.
This installation should be made by a qualified service person and should conform
to all the local codes.
Please install blackouts equipment into the power supply circuit for convenient
supply interruption.
Please make sure that the ceiling can support more than 50(N) Newton gravities if
the camera is fixed to the ceiling.
If the product does not work properly, please contact your dealer or the nearest
service center. Never attempt to disassemble the camera yourself. (We shall not
assume any responsibility for problems caused by unauthorized repair or
maintenance.)
User Manual of Network Camera
6
Cautions:
Make sure the power supply voltage is correct before using the camera.
Do not drop the camera or subject it to physical shock.
Do not touch sensor modules with fingers. If cleaning is necessary, use a clean
cloth with a bit of ethanol and wipe it gently. If the camera will not be used for an
extended period of time, put on the lens cap to protect the sensor from dirt.
Do not aim the camera lens at the strong light such as sun or incandescent lamp.
The strong light can cause fatal damage to the camera.
The sensor may be burned out by a laser beam, so when any laser equipment is
being used, make sure that the surface of the sensor not be exposed to the laser
beam.
Do not place the camera in extremely hot, cold temperatures (the operating
temperature should be between -30°C ~ 60°C, or -40°C ~ 60°C if the camera
model has an “H” in its suffix), dusty or damp environment, and do not expose it
to high electromagnetic radiation.
To avoid heat accumulation, good ventilation is required for a proper operating
environment.
Keep the camera away from water and any liquid.
While shipping, the camera should be packed in its original packing.
Improper use or replacement of the battery may result in hazard of explosion.
Please use the manufacturer recommended battery type.
Notes:
For the camera supports IR, you are required to pay attention to the following
precautions to prevent IR reflection:
Dust or grease on the dome cover will cause IR reflection. Please do not remove
the dome cover film until the installation is nished. If there is dust or grease on
the dome cover, clean the dome cover with clean soft cloth and isopropyl alcoho l.
Make certain the installation location does not have reflective surfaces of objects
too close to the camera. The IR light from the camera may reflect back into the
lens causing reflection.
The foam ring around the lens must be seated ush against the inner surface of
the bubble to isolate the lens from the IR LEDS. Fasten the dome cover to camera
body so that the foam ring and the dome cover are attached seamlessly.
,k
User Manual of Network Camera
7
Table of Contents
Chapter 1 System Requirement ................................................................................ 10
Chapter 2 Network Connection ............................................................................... 11
2.1 Setting the Network Camera over the LAN........................................................ 11
2.1.1 Wiring over the LAN ...................................................................................................... 11
2.1.2 Creating a Password ....................................................................................................... 12
2.2 Setting the Network Camera over the WAN ...................................................... 16
2.2.1 Static IP Connection ....................................................................................................... 16
2.2.2 Dynamic IP Connection .................................................................................................. 17
Chapter 3 Access to the Network Camera ............................................................... 20
3.1 Accessing by Web Browsers ................................................................................ 20
Chapter 4 -Fi Settings .......................................................................................... 23 Wi
4.1 Configuring Wi-Fi Connection in Manage and Ad-hoc Modes ....................... 23
4.2 Easy Wi-Fi Connection with WPS function ....................................................... 28
4.3 IP Property Settings for Wireless Network Connection ................................... 30
Chapter 5 Live View ................................................................................................. 32
5.1 Live View Page ..................................................................................................... 32
5.2 Starting Live View ................................................................................................ 33
5.3 Recording and Capturing Pictures Manually ................................................... 34
5.4 Operating PTZ Control ....................................................................................... 34
5.4.1 PTZ Control Panel .......................................................................................................... 34
5.4.2 Setting / Calling a Preset . ................................................................................................ 35
5.4.3 Setting / Calling a Patrol ................................................................................................. 37
Chapter 6 Network Camera Configuration ............................................................. 38
6.1 Configuring Local Parameters............................................................................ 38
6.2 Configuring Time Settings .................................................................................. 40
6.3 Configuring Network Settings ............................................................................ 42
6.3.1 Configuring TCP/IP Settings .......................................................................................... 42
6.3.2 Configuring Port Settings ............................................................................................... 43
6.3.3 Configuring PPPoE Settings ........................................................................................... 44
6.3.4 Configuring DDNS Settings ........................................................................................... 45
6.3.5 Configuring SNMP Settings ........................................................................................... 47
6.3.6 Configuring 802.1X Settings .......................................................................................... 49
6.3.7 Configuring QoS Settings ............................................................................................... 50
6.3.8 ngs Configuring UPnP™ Setti ......................................................................................... 51
6.3.9 Configuring Wireless Dial Settings ................................................................................ 51
User Manual of Network Camera
8
6.3.10 Email Sending Triggered by Alarm ................................................................................ 54
6.3.11 Configuring NAT (Network Address Translation) Settings ............................................ 56
6.3.12 Configuring FTP Settings ............................................................................................... 57
6.3.13 Platform Access .............................................................................................................. 58
6.3.14 HTTPS Settings .............................................................................................................. 59
6.4 Configuring Video and Audio Settings ............................................................... 61
6.4.1 Configuring Video Settings ............................................................................................61
6.4.2 Configuring Audio Settings ............................................................................................ 64
6.4.3 Configuring ROI Encoding ............................................................................................. 65
6.4.4 Display Information on Stream ....................................................................................... 67
6.4.5 Configuring Target Cropping .......................................................................................... 67
6.5 Configuring Image Parameters .......................................................................... 68
6.5.1 Configuring Display Settings .........................................................................................68
6.5.2 Configuring OSD Settings .............................................................................................. 74
6.5.3 Configuring Text Overlay Settings ................................................................................. 75
6.5.4 Configuring Privacy Mask .............................................................................................. 76
6.5.5 Configuring Picture Overlay ........................................................................................... 77
6.6 Configuring and Handling Basic Events ............................................................ 78
6.6.1 Configuring Motion Detection ........................................................................................78
6.6.2 Configuring Video Tampering Alarm ............................................................................. 85
6.6.3 Configuring Alarm Input ................................................................................................ 86
6.6.4 Configuring Alarm Output .............................................................................................. 87
6.6.5 Handling Exception ........................................................................................................ 88
6.6.6 Configuring Other Alarm ................................................................................................ 89
6.7 Configuring and Handling Smart Events .......................................................... 92
6.7.1 Configuring Audio Exception Detection ........................................................................92
6.7.2 Configuring Defocus Detection ...................................................................................... 94
6.7.3 Configuring Scene Change Detection ............................................................................. 94
6.7.4 Configuring Face Detecti on............................................................................................ 95
6.7.5 Configuring Line Crossing Detection ............................................................................. 97
6.7.6 Configuring Intrusion Detection ..................................................................................... 99
6.7.7 Configuring Region Entrance Detection ....................................................................... 101
6.7.8 Configuring Region Exiting Detection ......................................................................... 102
6.7.9 Configuring Unattended Baggage Detection ................................................................ 103
6.7.10 Configuring Object Removal Detection ....................................................................... 105
6.8 VCA Configuration ............................................................................................ 107
6.8.1 Behavior Analysis ......................................................................................................... 107
6.8.2 Face Capture ................................................................................................................. 114
6.8.3 People Counting 117 ...........................................................................................................
6.8.4 Heat Map ...................................................................................................................... 120
6.8.5 Counting ....................................................................................................................... 123
Chapter 7 Storage Settings ..................................................................................... 127
User Manual of Network Camera
9
7.1 Configuring NAS Settings ................................................................................. 127
7.2 Configuring Recording Schedule ...................................................................... 129
7.3 Configuring Snapshot Settings ......................................................................... 133
7.4 Configuring Lite Storage ................................................................................... 135
7.5 Configuring Cloud Storage ............................................................................... 136
Chapter 8 Road Traffic ........................................................................................... 138
Chapter 9 Playback ................................................................................................ 142
Chapter 10 Log Searching ................................................................................... 144
Chapter 11 Others ................................................................................................ 146
11.1 Managing User Accounts ................................................................................... 146
11.2 Authentication .................................................................................................... 148
11.3 Anonymous Visit ................................................................................................ 149
11.4 IP Address Filter ................................................................................................. 150
11.5 Security Service .................................................................................................. 151
11.6 Viewing Device Information .............................................................................. 152
11.7 Maintenance ....................................................................................................... 153
11.7.1 Rebooting the Camera .................................................................................................. 153
11.7.2 Restoring Default Settings ............................................................................................ 153
11.7.3 Exporting / Importing Configuration File ..................................................................... 154
11.7.4 Upgrading the System ...................................................................................................155
11.8 -232 Settings ................................................................................................... 155 RS
11.9 -485 Settings ................................................................................................... 156 RS
11.10 Service Settings ................................................................................................... 157
Appendix .................................................................................................................... 158
Appendix 1 SADP Software Introduction ..................................................................... 158
Appendix 2 Port Mapping .............................................................................................. 161
User Manual of Network Camera
10
Chapter 1 System Requirement
Operating System: Microsoft Windows XP SP1 and above version / Vista / Win7 /
Server 2003 / Server 2008 32bits
CPU: Intel Pentium IV 3.0 GHz or higher
RAM: 1G or higher
Display: 1024×768 resolution or higher
Web Browser: Internet Explorer 6.0 and above version, Apple Safari 5.02 and above
version, Mozilla Firefox 3.5 and above version and Google Chrome8 and above
version.
User Manual of Network Camera
11
Chapter 2 Network Connection
Note:
You shall acknowledge that the use of the product with Internet access might be
under network security risks. For avoidance of any network attacks and
information leakage, please strengthen your own protection. If the product does
not work properly, please contact with your dealer or the nearest service center.
To ensure the network security of the network camera, we recommend you to
have the network camera assessed and maintained termly. You can contact us if
you need such service.
Before you start:
If you want to set the network camera via LAN (Local Area Network), please a
refer to Section 2.1 Setting the Network Camera over the LAN.
If you want to set the network camera via WAN (Wide Area Network), please a
refer to Section 2.2 Setting the Network Camera over the WAN.
2.1 Setting the Network Camera over the LAN
Purpose:
To view and configure the camera via LAN, you need to connect the network a
camera in the same subnet with your computer, and install the SADP or iVMS-4200
software to search and change the IP of the network camera.
Note: For the detailed introduction of SADP, please refer to Appendix 1.
2.1.1 Wiring over the LAN
The following figures show the two ways of cable connection of network camera a
and computer: a
Purpose:
To test the network camera, you can directly connect the network camera to the
computer with a network cable as shown in Figure 2-1.
User Manual of Network Camera
12
Refer to the Figure 2-2 to set network camera over the LAN via a switch or a
router.
Figure 2-1 Connecting Directly
Figure 2-2 Connecting via a Switch or Router a
2.1.2 Creating a Password
You are required to activate the camera first by setting a strong password for it before
you can use the camera.
Creating a Password via Web Browser, Creating a Password via SADP, and Creating a
Password via Client Software are all supported.
Creating a Password via Web Browser
Steps:
1. Power on the camera, and connect the camera to the network.
2. Input the IP address into the address bar of the web browser, and click Enter to
enter the activation interface.
Notes:
The default IP address of the camera is 192.168.1.64.
For the camera enables the DHCP by default, the IP address is allocated
automatically. And you need to activate the camera via SADP software. Please refer to
the following chapter for Activation via SADP.
User Manual of Network Camera
13
Figure 2-3 Creating a Password via Web Browser
3. Create a password and input the password into the password field.
STRONG PASSWORD RECOMMENDED– We highly recommend you
create a strong password of your own choosing (using a minimum of 8
characters, including at least three of the following categories: upper case letters,
lower case letters, numbers, and special characters) in order to increase the
security of your product. And we recommend you reset your password regularly,
especially in the high security system, resetting the password monthly or weekly
can better protect your product.
4. Confirm the password.
5. Click OK to save the password and enter the live view interface.
Creating a Password via SADP Software
SADP software is used for detecting the online device, activating the camera, and
resetting the password.
Get the SADP software from the supplied disk or the official website, and install the
SADP according to the prompts. Follow the steps to activate the camera.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select the inactive device.
User Manual of Network Camera
14
Figure 2-4 SADP Interface
3. Create a password and input the password in the password field, and confirm the
password.
STRONG PASSWORD RECOMMENDED– We highly recommend
you create a strong password of your own choosing (using a minimum
of 8 characters, including at least three of the following categories:
upper case letters, lower case letters, numbers, and special characters) in
order to increase the security of your product. And we recommend you
reset your password regularly, especially in the high security system,
resetting the password monthly or weekly can better protect your
product.
4. Click to save the password. OK
You can check whether the activation is completed on the popup window. If activation
failed, please make sure that the password meets the requirement and try again.
5. Change the device IP address to the same subnet with your computer by either
modifying the IP address manually or checking the checkbox of Enable DHCP.
User Manual of Network Camera
15
Figure 2-5 Modify the IP Address
6. Input the password and click the button to activate your IP address Save
modification.
Figure 2-6 Creating a Password via Client Software
1. Click button to start activation. OK
2. Click the Modify Netinfo button to pop up the Network Parameter Modification
interface, as shown in the figure below.
User Manual of Network Camera
16
Figure 2-7 Modifying the Network Parameters
3. Change the device IP address to the same subnet with your computer by either
modifying the IP address manually or checking the checkbox of Enable DHCP.
4. Input the password to activate your IP address modification.
2.2 Setting the Network Camera over the WAN
Purpose:
This section explains how to connect the network camera to the WAN with a static IP
or a dynamic IP.
2.2.1 Static IP Connection
Before you start:
Please apply a static IP from an ISP (Internet Service Provider). With the static IP
address, you can connect the network camera via a router or connect it to the WAN
directly.
Connecting the network camera via a router
User Manual of Network Camera
20
Chapter 3 Access to the Network
Camera
3.1 Accessing by Web Browsers
Steps:
1. Open the web browser.
2. In the browser address bar, input the IP address of the network camera, and press
the key to enter the login interface. Enter
3. Activate the network camera for the first time using, refer to the section 2.1.2 for
details..
Note:
The default IP address is 192.168.1.64.
If the camera is not activated, please activate the camera first according to
Chapter 3.1 or Chapter 3.2.
4. Select English as the interface language on the top-right of login interface.
5. Input the user name and password and click .
The admin user should configure the device accounts and user/operator permissions
properly. Delete the unnecessary accounts and user/operator permissions.
Note:
The IP address gets locked if the admin user performs 7 failed password attempts
(5 attempts for the user/operator).
Figure 3-1 Login Interface
User Manual of Network Camera
21
6. Install the plug-in before viewing the live video and operating the camera. Please
follow the installation prompts to install the plug- . in
Figure 3-2 Download and Install Plug- in
Figure 3-3 Install Plug-in (1)
Figure 3-4 Install Plug-in (2)
Note: You may have to close the web browser to install the plug-in. Please reopen the
User Manual of Network Camera
23
Chapter 4 -Fi Settings Wi
Purpose:
By connecting to the wireless network, you dont need to use cable of any kind for
network connection, which is very convenient for the actual surveillance application.
Note: This chapter is only applicable for the cameras with the built-in -Fi module.Wi
4.1 Configuring Wi-Fi Connection in Manage and
Ad-hoc Modes
Before you start:
A wireless network must be configured.
Wireless Connection in Manage Mode
Steps:
1. Enter the Wi-Fi configuration interface.
Configuration> Advanced Configuration> Network> Wi- Fi
Figure 4-1 Wireless Network List
2. Click Search to search the online wireless connections.
3. Click to choose a wireless connection on the list.
Figure 4-2 -Fi Setting- Manage Mode Wi
User Manual of Network Camera
24
4. Check the checkbox to select the and the Network mode as Manage, Security
mode of the network is automatically shown when you select the wireless
network, please dont change it manually.
Note: These parameters are exactly identical with those of the router.
5. Enter the key to connect the wireless network. The key should be that of the
wireless network connection you set on the router.
Wireless Connection in Ad-hoc Mode
If you choose the Ad-hoc mode, you dont need to connect the wireless camera via a
router. The scenario is the same as you connect the camera and the PC directly with a
network cable.
Steps:
1. Choose Ad-hoc mode.
Figure 4-3 -Fi Setting- Wi Ad-hoc
2. Customize a SSID for the camera.
3. Choose the Security Mode of the wireless connection.
Figure 4-4 Security Mode- Ad-hoc Mode
4. Enable the wireless connection function for your PC.
5. On the PC side, search the network and you can see the SSID of the camera
listed.
User Manual of Network Camera
25
Figure 4-5 -hoc Connection Point Ad
6. Choose the SSID and connect.
Security Mode Description:
Figure 4-6 Security Mode
You can choose the Security Mode as not-encrypted, WEP, WPA-personal,
WPA-enterprise, WPA2-personal, and WPA2-enterprise.
WEP mode:
Figure 4-7 WEP Mode
Authentication - Select Open or Shared Key System Authentication, depending on
User Manual of Network Camera
27
Figure 4-9 EAP-TLS
Identity - Enter the user ID to present to the network.
Private key password Enter the password for your user ID.
EAPOL version - Select the version used (1 or 2) in your access point.
CA Certificates - Upload a CA certificate to present to the access point for
authentication.
EAP-PEAP:
User Name - Enter the user name to present to the network
Password - Enter the password of the network
PEAP Version - Select the PEAP version used at the access point.
Label - Select the label used by the access point.
EAPOL version - Select version (1 or 2) depending on the version used at the
access point
CA Certificates - Upload a CA certificate to present to the access point for
authentication
For your privacy and to better protect your system against security risks, we
strongly recommend the use of strong passwords for all functions and network
devices. The password should be something of your own choosing (using a
minimum of 8 characters, including at least three of the following categories:
User Manual of Network Camera
28
upper case letters, lower case letters, numbers and special characters) in order to
increase the security of your product.
Proper configuration of all passwords and other security settings is the
responsibility of the installer and/or end-user.
4.2 Easy Wi-Fi Connection with WPS function
Purpose:
The setting of the wireless network connection is never easy. To avoid the complex
setting of the wireless connection you can enable the WPS function.
WPS (Wi-Fi Protected Setup) refers to the easy configuration of the encrypted
connection between the device and the wireless router. The WPS makes it easy to add
new devices to an existing network without entering long passphrases. There are two
modes of the WPS connection, the PBC mode and the PIN mode.
Note: If you enable the WPS function, you do not need to configure the parameters
such as the encryption type and you dont need to know the key of the wireless
connection.
Steps:
Figure 4-10 -Fi Settings - WPS Wi
PBC Mode:
PBC refers to the Push-Button-Configuration, in which the user simply has to push a
button, either an actual or virtual one (as the button on the configuration
interface of the IE browser), on both the Access Point (and a registrar of the network)
and the new wireless client device.
User Manual of Network Camera
30
Figure 4-11 -Fi Settings WPS PIN Mode Wi –
2. Choose Use route PIN code.
If the PIN code is generated from the router side, you should enter the PIN code you
get from the router side in the Router PIN code field.
3. Click . Connect
Or
You can generate the PIN code on the camera side. And the expired time for the PIN
code is 120 seconds.
1. Click . Generate
2. Enter the code to the router, in the example, enter 48167581 to the router.
4.3 IP Property Settings for Wireless Network
Connection
The default IP address of wireless network interface controller is 192.168.1.64. When
you connect the wireless network you can change the default IP.
Steps:


Produkt Specifikationer

Mærke: LevelOne
Kategori: Overvågningskamera
Model: FCS-5067

Har du brug for hjælp?

Hvis du har brug for hjælp til LevelOne FCS-5067 stil et spørgsmål nedenfor, og andre brugere vil svare dig




Overvågningskamera LevelOne Manualer

LevelOne

LevelOne FCS-3056 Manual

23 September 2024
LevelOne

LevelOne FCS-0051 Manual

14 September 2024
LevelOne

LevelOne FCS-5056 Manual

20 August 2024
LevelOne

LevelOne FCS-5044 Manual

16 August 2024
LevelOne

LevelOne FCS-4042 Manual

10 August 2024
LevelOne

LevelOne FCS-4047 Manual

6 August 2024
LevelOne

LevelOne FCS-6020 Manual

6 August 2024
LevelOne

LevelOne FCS-4043 Manual

4 August 2024
LevelOne

LevelOne FCS-4051 Manual

4 August 2024
LevelOne

LevelOne FCS-3102 Manual

4 August 2024

Overvågningskamera Manualer

Nyeste Overvågningskamera Manualer