Brickcom FB-130Ap Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 88 Seiten
- N/A
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Security camera
Brickcom MD-100AP
63 Seiten -
Security camera
Brickcom MB-200AP
28 Seiten -
Security camera
Brickcom FB-100AE
14 Seiten -
Security camera
Brickcom VD-130Ae
37 Seiten -
Security camera
Brickcom VD-300NP
63 Seiten -
Security camera
Brickcom FD-130Ap
35 Seiten -
Security camera
Brickcom MB-300AP
63 Seiten -
Security camera
Brickcom VD-302NP
63 Seiten
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Brickcom FB-130Ap an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Brickcom FB-130Ap, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Brickcom FB-130Ap die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Brickcom FB-130Ap. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Brickcom FB-130Ap sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Brickcom FB-130Ap
- Den Namen des Produzenten und das Produktionsjahr des Geräts Brickcom FB-130Ap
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Brickcom FB-130Ap
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Brickcom FB-130Ap zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Brickcom FB-130Ap und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Brickcom finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Brickcom FB-130Ap zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Brickcom FB-130Ap, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Brickcom FB-130Ap widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
Megapixel Day & Night Fixed Box Net work Camera Fixed B ox Series FB -100A/FB-130A/FB- 131A / FB - 130N/ FB -300A User ’ s Manual Quality Service Group[...]
-
Seite 2
Product name: Network Camera (Fixed Box Series) Release Date: 20 11 /03 Manual Revi sion: V2.9 Web site: www .brickcom.com Email: technical@bric kcom.com info@brick com.com © 2010 Brickcom Corporation. All Rights Reserv ed[...]
-
Seite 3
[...]
-
Seite 4
T able of Conte nt s Before Y ou Use This Product ........................................................................ 0 Regulatory Information ............................................................................. 1 Package Contents ..................................................................................... 0 Fixed Box Network[...]
-
Seite 5
Sto rage Management (*) ................................................................ 75 Maintenance ................................................................................................................ 77 User Management ........................................................................ 77 Language .............................[...]
-
Seite 6
0 Before Y ou Use Thi s Product In many co untries, there are laws prohibiting o r restricting the use of surveillance devices. This Network Camera is a high-performance, web-ready camera which can be part of a flexible surveillance system. It is the user ’ s responsibility to e nsure tha t the operation of this camera is legal before installing [...]
-
Seite 7
Regulatory Information Federal Commu nication Commission I nterference Stateme nt This e quipment ha s been tested and found to compl y w ith the limi ts for a Cl ass B di g ital devi ce, pursuant to Pa r t 15 o f the FC C Rules. These limits are desi gned to provide r easonable protection against harmful interference in a residential installation.[...]
-
Seite 8
0 Package Content s Please check to make sure that the product package contains all th e accessories listed below . a. Network Ca mera (FB-100A/FB-130A /FB-131A/FB-300A) b. CS mount Lens (Option al ) c. Product CD d. Camera S tand e. Warranty C ard f. Easy Installation Guide g. Detachab le Antenna ( Option al ) h. Power Adapter (Option al ) i. BNC [...]
-
Seite 9
1 Fixed Box Net w ork Camera Overvi ew The Brickco m Fixed B ox series offers a reliable and efficient solution for 24-hour video surveillance. T he Fixed Box series of fers highly efficient H.264 video compression, w hich reduces bandwidth and storag e requirements w ithout compromising image quality . M-JPEG and MPEG-4 are also supported for flex[...]
-
Seite 10
2[...]
-
Seite 11
3 Device Appearance Description <Front Pane l> <Rear Panel> NOT E 1. The W PS b uttons m ust f irst be enabled through the web GU I in orde r to work. See page 54 for details on how to enable the WPS Button. 2. (*) T hese are optional f eatures. Please refer to the Product List f or the full list of optional features available for the p[...]
-
Seite 12
4 <CS Mount Lens> <Optional Lens> <V ari -focal Lens with Manual Iris> --- CS Mount <Optional Lens> <V ari -focal Lens with Auto Iris (DC Drive)> --- CS Mount Zoom Controller (*) Focus Controll er Zoom Controller Focus Controll er Iris Controller (*)[...]
-
Seite 13
5 LED Behavior Function LED Behavior Description Remark WPS WPS in progress W irel ess Fixed Box Front Right (Blue) WPS WPS Connection Error W irel ess Fixed Box Front Right (Blue) WPS Session overlap detected W irel ess Fixed Box Front Right (Blue) WPS Steady on WPS Successfully Connected W irel ess Fixed Box Front Right (Blue) St atus Hardware fa[...]
-
Seite 14
6 Extension I/O T erminal Block The Network Camera prov ides an extension I/O ter minal block which is used to connect the camera with external input/output devices. The pin definitions are listed as below . DI/DO Diagram Pin Function 1 Power +4.5V 2 Digital Output 3 Digital Input 4 Ground 5 RS - 485 - 6 RS -485 +[...]
-
Seite 15
7 Hardware Reset The Reset B utton can be used to r eb oot the camera or restore it to factory default se ttings. If the camera experiences a problem, rebooting the camera may correct the p roblem. If the problem remains, please restore the camera to factory default settings and reinstall the software. T o Reboot - Press and hold the Reset Button f[...]
-
Seite 16
8 Inst allation Hardware Inst all ation Mounting the CS-Mount Lens to the Camera <V ari-focal Lens with Manual Iris> --- Optional Lens 1. Connect the CS-mount len s to the camera by turning it clockwise on to the camera mount until it stops. 2. If necessary , adjust the iris controller , focus controller , and zoom controller to get the best [...]
-
Seite 17
9 <V ari -focal Lens with Auto Iris> --- Optional Le ns 1. Connect the CS-mount len s to the camera by turning it clockwise on to the camera mount until it stops. 2. If necessary , adjust focus controller , and zoom controller to get the best resolution. 3. Connect the lens cable plug (DC Iris control cable) to the camera sid e connector . T [...]
-
Seite 18
10 T o adjust the CS-ring: If t he fixed box is still not focusing correctly on t he target, use an Allen Key to adjust the location of the CS-ring, then try focusing again. NOTE - For further information of vari-focal lens with auto iris, please refer to the supp lied lens ’ instruction manual .[...]
-
Seite 19
11 Connect monitor with Camera: (FB-130 A onl y) 1. Mounting BNC adapter to the camera. 2. Connect monitor with camera for easy install ation.[...]
-
Seite 20
12 System Requirement s Operating System: Microsoft Windows XP Home Edition SP2 Microsoft Windows XP Professional SP2 Computer: IBM PC/AT Compatible CPU: Pentium 3GHz or faster Memory: 1024 MB or more Monitor: 1024 x 768 pixels or more, 24-bit True color or bette r Network Interface: 10/100Mbps Network interface card must be installed W eb Brow se [...]
-
Seite 21
13 Camera Connection Basic Connection (Without PoE) 1. T o attach external devices, su ch a s sen sors and alarms , connect them to the extension I/O terminal block. 2. Connect the camera to a switch using an Ethernet cable. 3. Connect the supplied power cable to the camera and plug it into a power outle t. Depending on the user ’s application, a[...]
-
Seite 22
14 Power over Ethernet (PoE) Connection The Fixed B ox is PoE compliant, so th ere are two options for connecting the camera to a power and Ethernet source. T he camera can either be connected to a P oE -enabled switch or a non-PoE switch. A. If using a PoE-enabled switch: 1. Use a single Ethernet cable to connect the camera to the PoE-enabled swit[...]
-
Seite 23
15 Sof tware Inst allation In this man ual, "User" refers to whoever ha s a ccess to the Network Camera, and "Administrator" refers to the pe rson who can co nfigure th e camera an d grant user access to the camera. After checking the hardware connection , run the Installation W izard program included on the product’s CDROM to[...]
-
Seite 24
16 2. In the Install Shield W iz ard dialog box, click <Next> to continue. 3. Rea d the End- User Lic ense Agreement and check the option “I accept the terms of the license agreement”. Click <Next> to contin ue .[...]
-
Seite 25
17 4. Se lect either “Complete” setup or “Custom” setup to install the system. a. If COMPLETE SETUP is selected: i. All program features will be installed into th e default directory. Check the option “ Complete ” and then click <Next>. ii. Select to create shortcut s . Click < Next > to continue.[...]
-
Seite 26
18 iii. The installation information will be displayed. Click <Next> to contin ue . b. If CUSTOM SETUP is selected: i. This option is recommended for advanced users. It can be used to install the system to a prefe rred directory or to se lect specific program feature(s). ii. Check the option “ Custom ”, and then click <Next>.[...]
-
Seite 27
19 iii. Select the features to install. Click <Next> to continue. iv. Click < Change > to change the appointed folde r where installation and program files will be stored. Click <Next> to contin ue.[...]
-
Seite 28
20 v. Select programs to create shortcuts. Click <Next> to continue. vi. The installation information will be display ed. Click <Next> to contin ue .[...]
-
Seite 29
21 5. T o launch EasyConfig or PC-NVR S tandard, select t he application and click < Finish > . W hen launching the PC-NVR program, please refer to the PC -NVR user manual.[...]
-
Seite 30
22 EasyConfig T o launch EasyConfig, select EasyConfig from the start menu. If Com plete Setup type was used in the softw are installation, an EasyConfig icon was installed on the desktop. Double click to open the icon. If Custom Setup type was used in the software installation and an EasyConfig icon was not installed on the desktop, the program w [...]
-
Seite 31
23[...]
-
Seite 32
24 2. Se lect either “S imple M ode ” or “P rofessional M ode ” to obtain the camera ’s IP settings. If “S imple Mode ” is select ed, EasyConfig will se t up the connection automatically . I f “P r ofessional M ode ” is s elected, the user will need to configure the IP settings manually .[...]
-
Seite 33
25 3. T here may be many cameras in the local network. Differentiate the cameras using th eir UPnP n ame. Dou ble click on the camera from the survey list to connect. 4. En ter the username and password of the camera. For first time use, the defaul t username and passw ord are “ admin/admin .”[...]
-
Seite 34
26 5. For configuring the IP a ddress settings, select either <Settings remain the same>, <Automatically o btain an IP Address (DHCP)> or <Set IP A ddress configuration manually>. The DHCP setting is recommend ed . a. If <Set IP Address con figuration manually> is selected, the following pages will be displayed.[...]
-
Seite 35
27[...]
-
Seite 36
28 6. If the camera supports the EasyLink TM function , the fo llowing page w ill be displayed. Otherwise, th is page will not be shown. *If desired, click <Skip> to skip this setting. EasyLink TM is a unique B rickcom fun ction which allows users to assig n a unique doma in name to their network camera’ s IP address. There is no need to co[...]
-
Seite 37
29 7. W hen t he IP address settings have b een con figur ed , the screen will eith er display a successful or failed co nnection m essage. I f t he c onnection fa iled, either try again or quit the installation. a. If “ DH CP IP add ress settings ” w as selected, th e failure page will be displayed as below: b. If “S tatic IP address set tin[...]
-
Seite 38
30 c. If the connection was successful, the user wil l see the message: “Congratulations. The installation of the camera is comple te.” W hen t his window is displayed, click < PC -NVR > to start t he PC-NVR program, < Live Vie w > to view th e liv e video from the connected IP c amera, or < X > in the to p right corner of the[...]
-
Seite 39
31 Accessing the Net work Camera Check Net w ork Settings The came ra can be connected either before or immediately after the software installation. The Administrator should complete the n etwork settings on the configuration page, including entering the correct sub net m ask and IP address of gateway and DNS. Ask the network administrator or Inter[...]
-
Seite 40
32 A uthenti cation T o access the camera’s live view , open a web browser and enter the IP a ddress of the camera. A dialog window will pop requesting a username and password. As stated on the previous page, for the default u sername and password for the Administrator are assigned as “ admin/admin ”. For accounts other than the a dministrato[...]
-
Seite 41
33 Inst alling the Plug - In For the initial access to the camera in W i ndows, th e web browser may prom pt the administrator fo r permission to inst all a new plug -in for on Internet Explorer. Permission request depends on the Internet security settings of the user ’s PC or NOTEbook. If the highest security level is set, the computer may prohi[...]
-
Seite 42
34 Live V iew Note - (*) T hese are optional fe atures. Please refer to the Product List for the full li st of optional features available for the product. Live View is the default page that opens when accessing th e camera. Live video is displayed directly in the browser window . Stream 1/Stream 2 Channels The netw ork camera offers simultaneo[...]
-
Seite 43
35 / Recording o n/off - Displays the status of recording video / MIC on /off - Displays the status of the MIC volume / Speaker on/of f - Display s the status of the Speaker / MD on/off - Displays the status of Motion Detection Brightness - Drag the slider bar to adjust the image brightness level. Mic volume - Drag the slider bar to adjust [...]
-
Seite 44
36 T alk – To c ommunicate through the camera using the computer MIC. Set Default – Reset to default settings. NOTE The <Camera Control Panel > f unctions have no effect on the recorded video. W hatever changes are made to the < Camera Control Panel > will not b e applied to the recorded video.[...]
-
Seite 45
37 Configuration Click < Configuration > on the main page to change the camera settings pages. Note: Only Administrators can access the Configuration page. Camera/V ideo/ Audio Ca mera Brightness - Dr ag the slider bar to adjust the image brightness level from -5 to +5. Contrast - Drag the slider bar to adjust the image contrast level from -5[...]
-
Seite 46
38 Exposure Control Sport – Select this option wh en monitoring rapid moving objects. Normal – Select this option for normal monitoring conditions . Night Vision – Select this option wh en monitoring at night or in low light conditions. User Defined – Select this option to define the exposure manually. A GC (Auto Ga in Control) - The AGC ca[...]
-
Seite 47
39 True Day & Night A uto - T he Network Cam era automatically r emoves the filte r by judging th e level of ambient light. Manual - In day mode, enable the IR CUT to keep the IR cut f ilter active at all times so the infrared light does n ot rea ch the sensor and distort the color. In night mode, disable the IR CUT to deactivate the IR cut f i[...]
-
Seite 48
40 Video The Network Camera offers two separate streams for different viewing options. Stream 1 & Stream 2 Video Codec - The Network Camera offers three choices of video codec standards for real-time viewing: H.264, MPEG -4 and MJ PEG. Video Resolution - Select from the drop-dow n menu to choose the best resolution recording settings. Frame Rat[...]
-
Seite 49
41 NOTE - a higher bitrate w il l use higher network bandwidth. The video quality can be set between Level 1 to Level 6, with Level 6 producing the best image quality. HTTP Transport – If MJPEG is use d f or Video Codec, users can enable HTTP Transport p ro tocol for video communication. NOTE – HTTP Transport is for non-IE browser used only. Cl[...]
-
Seite 50
42 Video Overlay Timestamp To display the date and time o n the screen during live view, check “ Enable ” to enable the timestamp function and select the display position from the drop-down menu . Text To m ake a NOTE about the camera, check “ Ena ble ” and select the display p osition from the drop-down menu. Enter a video description in t[...]
-
Seite 51
43 RTSP Server To utilize RTSP authe ntication, the user must first set a password for the c amera. RTSP (Real-Time Streaming Proto col) controls the de livery of streaming me dia. By defau lt the port number is set to 554. A uthentic ation - Depending o n the network se curity requirements, the camera p rovides two types of security settings for s[...]
-
Seite 52
44 A udio The administrator can set up two separate stream s for the camera for different viewin g devices. T he administrator can enable or disable the audio function on either stream. If audio enable is selected, select the Audio codec from the drop -down menu . A d vanced Settings Camera MIC – The Network Cam era supports two way audio communi[...]
-
Seite 53
45 Multic ast Multicast sends a video stream to the multicast group address and a llows m ultiple clients to acquire th e stream at the same time by requesting a copy from the multicast group address. Therefore, mu lticast ca n effectively save Inte rnet ba ndwidth. The R T SP (Real-Time Streaming Protocol) controls the delivery of streaming media.[...]
-
Seite 54
46 Net w ork IP Settings This section explains how to configure a wired network connection for the camera. T here are sev eral ways to setup the camera over the Internet: (1) o btain an av ailable dynamic IP address a ssigned by a DHCP server, (2) use a static IP, or use PPPoE (Point - to -point over Ethernet). Select the desire setup mode from the[...]
-
Seite 55
47 3. PP PoE (Point- to -point over Ethernet) : Use this mode i f connec ting to the Internet through a DSL L ine. NOTE - To u tilize this fe ature, it requires an account provided by an Internet Service Provider. E nter the user name and pa ssword provided by the ISP. Click Apply to apply settings or Cancel to cancel changes. UP nP Universal Plug [...]
-
Seite 56
48 DDNS (dynamic domain name service) DD NS li nks a domain name t o an IP address, allowing u sers to easi ly a ccess their camera even with a changing IP a dd ress. Brickcom network came ras are co mpatible with two DDNS se rvice provid ers (1 ) DynDNS, and (2) T ZO. NOTE - B efore utilizing th is function; please apply for a dynamic domain accou[...]
-
Seite 57
49 EasyLink TM EasyLink TM is a unique B rickcom fun ction which allows users to assig n a unique doma in name to their network camera’ s IP address. There is no need to configure the router to open up ports or remember hard- to -memoriz e IP addresses. W hen this function is enabled, users can log onto [un iquedomainn ame].mybrickcom.com to view[...]
-
Seite 58
50 Wireless These settings control how a Network Camera interacts with a wireless network. Users can identify the wireless network and enable w ir eless encryption. NOTE – T his function is only av ailable for WFB models. Basic Settings Network Name (SSID) - T he Se rvice Se t Identifier (SSID) is the network name u sed to identify the wireless s[...]
-
Seite 59
51 Security - Encryption protects data transmitted over a wirele ss network. W i-Fi Protected Access ( W PA-Personal/ W PA2-personal) an d W ired E quivalent Privacy ( W EP) o ffer different lev els of security f or wireless co mmunication. A network encrypted with W PA-P ersonal/WPA2-personal is more sec ure than a network encrypted wi th W EP bec[...]
-
Seite 60
52 WEP - W ired Equivalent Privacy (WEP) is a b asic encry ption method which tran smits network broadcast messages using radio signals. It is not as secure as W PA. Tx Key - Select a key from the drop-down menu. WEP Encr ypt ion - Select a level of W EP encryption: 64 bits 10 hex digits or 1 28 bits 26 hex digits. The default is 64 bits 10 hex dig[...]
-
Seite 61
53 WP A -Pers onal - WiFi Protected Acce ss ( W P A)-Person al Encryption - Supp ort s two encryption m ethods with dynamic encryption ke ys: T em p oral Key Integrity Proto col (T KIP) and Advanced E ncryption S tandard (AES). Select th e algorithm type from the drop down menu: TKIP or AES. The default is TKIP. Shared Key - En ter the key shared b[...]
-
Seite 62
54 WP A 2-Pe rsonal - W iFi P rotected Access (WP A2 -Personal) Encryption - W PA2 supports AES encryption method with dynamic encryption keys. Shared Key - En ter the key shared betw een the Router and the server keys. En ter a password of 8-63 characters. NOTE - If using W PA or W PA2, each device in the wireless n etw ork must use the same W PA [...]
-
Seite 63
55 A d vanced Settings Network Mode - From the drop-down menu, select the wireless standards running on the network. If there are W ireless-B, W ireless-G and W ireless-N (2.4GHz ) devices on t he network, use the default setting, BGN-Mixed . If t here are W ireless-B and W ireless-G devices on the network, select BG-Mixed . If t here a[...]
-
Seite 64
56 Wi -Fi Protected Setup Use this method if the client device has a Wi-Fi Protected Setup PIN number. 1. En ter the network name from the device in the field. 2. Click <Register> to st art W PS. 3. Click “ Ena ble ” to enable the W PS Button. If this feature is not enabled, the user will not be able to use the WPS button Click Apply to a[...]
-
Seite 65
57 HTTP/HTTPS HTTP – (HyperText Transfer P rotocol) - Th is protocol allows for T CP protocol quality without having to open specific ports fo r streaming. Users insid e a firewall can utilize this protocol to allow streaming data through. HTTPS - (Hypertext Transfer Protocol over SSL) - This protocol allows authentication and encrypted communica[...]
-
Seite 66
58 2. En ter the User name and Passw ord of the camera . 3. Click “ Certificat e Error ” on the top right corner of the window to view the certif icate. 4. Click “ Install Certificate ” and follow the steps to finish the inst allation.[...]
-
Seite 67
59 Event Event Settings W hen an e vent (such a s unauthoriz ed movement) occurs, the camera can be schedul ed to perform certain actions. An Event T ype is a set of parameters t hat d efines these actions. This section describes how to co nfigure the camera t o p erform certain actions when events occur. Click <Add Event> on the Event Settin[...]
-
Seite 68
60 How to Set Up an Event Schedule Event Schedule describes how and when the camera performs certain actions. 1. Check “ Enable ” and enter a descriptive name for the event schedule. 2. Set Event Schedule to define when the event is activated by selecting f rom Always (24 hours), Schedule or Recurrence pattern. a. If Schedule is selected f rom [...]
-
Seite 69
61 b. If Recurrence Pattern is selected, the following pag e will be displayed. i. An event schedule can be p rogrammed to recur at different times according to the user’s needs. Select the days for the ev ent schedule to occur. Select a start time and specify the duration. 3. Def ine what will trigger an event to occur by selecting an option fro[...]
-
Seite 70
62 a. W hen <Send to Email> is selected, the following page w ill be shown: i. From - E nter the email address of the sender. ii. To - Enter the email address of the recipient. To enter multiple recipients, separate each using a comma. iii. My Name - Enter the sender ’ s name that will appear in the recipient ’ s inbox. iv. Subject - Ente[...]
-
Seite 71
63 Motion Detection Motion can be detected by me asuring changes in the speed or vector of an object or objects in the monitored area. This section explains how to co nfigure th e Netw ork Camera to enable motion detection. Detection Setting – Use this setting to enable and define the motion detection windows. The user can defined up to three are[...]
-
Seite 72
64 6. The chart below the L ive View window ind icates the activity level of the M o tion Detection window. W hen motion is detected b y the camera and exc ee ds the defined threshold, a red bar will appear. Users can use this fe ature as a trigger source to send photos or videos to a remote serv er via email or FTP. Click Apply to apply settings o[...]
-
Seite 73
65 Digital Input (DI) The DI socket allows the IP camera to receive input from an external device. The external device sho uld have the ability to drive voltage on the co nnected DI wire to the trigg ering v oltage level in order to notify t he IP camera of any event o f interest. The IP camera will then process the event notification according to [...]
-
Seite 74
66 Notifications Use the tools in this section to specify what typ e of notification will be se nt when an event occurs. The camera can send bu ffered images to an FTP server, Samba, Email, or HTTP. FTP Settings File Trans fer Protocol (FTP) is used as an ap plication component to automatically transfer files for program internal functions. Select [...]
-
Seite 75
67 E-mail Settings Select “Primary Ema il Server” option f rom the S erver S election drop do wn menu to send media files to an email server when an ev ent is triggered. SMTP Server - Enter the server host name of the email server. SMTP Po rt - Enter the port number of the email server ; by default, the SMTP port is set to 2 5. Authentication -[...]
-
Seite 76
68 Samba Settings Select this op tion to send the med ia f iles vi a a network neighborhood when an event is triggered. Server Address - Enter the IP address of the Samba server. User Name - Enter the user name of the Samba server. Password - Enter the password of the Samba server. W orkg roup - Enter the workgroup of the Samba server. Shared Folde[...]
-
Seite 77
69 HTTP Settings Select th is option to se nd the media f iles via an HTTP notification when an event is triggered. URL – Specify the URL to send HTTP requests . T he URL is normally written as: http://ip_address/ notification.cgi?parameter ip_address – type the IP address or host name of th e HTTP hos t. Parameter – type the notification par[...]
-
Seite 78
70 Digital Output (DO ) The DO socket a llows the IP came ra to se nd o utput to a n external device. W hile ex ecuting the DO notification action, the IP camera drives voltage on the connected DO wir e to the triggering v oltage level for X nu mber of seconds. The c onnected external device w ill then be triggered for X number of seconds. Triggere[...]
-
Seite 79
71 System System Log Log – Set up the camera to record a system log when an event is triggered. This page displays the system’s log in chronological order. The syste m log is stored in t he camera’s buffer area and will be overwritten when the buffer area is full. Click Retrieve to retrieve the log or click Save to file to save the system log[...]
-
Seite 80
72 Remote Logging The user can configure th e camera to send the system log file to a remote server as a log backup. Click to enable remote log and enter the IP address of the remote server. Enter the port number of the remote server. Click Apply to apply settings or Cancel to cancel changes.[...]
-
Seite 81
73 Date and Time Manual – Manually enter the d ate and time. Clone from PC – The camera will s ync with the time , date and time zone of the computer used to modify the camera settings. Check “Clone” to utilize this option. The read-only date and time of the PC will be displayed. NTP – (Network T ime Protoco l) - NTP is a protocol fo r sy[...]
-
Seite 82
74 Device Information System Information – Displays the complete system information of the camera. Network Setting s – Displays the complete network settings information of the came ra. Video/Audio Setting s – Displays the complete video/audio settings in formation of the camera.[...]
-
Seite 83
75 Sto rage Management (*) S torage Management is used to view all the recorded files on the SD/SDHC card. Click Reload to refresh the list of recorded files. Click Remove to safely remove the SD/SDHC memory card. Left click on the f older to list th e recorded files. The user can either play th e snapshot of the recorded files by moving th e mouse[...]
-
Seite 84
76 A d vanced Settings (*) A utoma tic Rec y cle(*) – Enable to a utomatically overwrite olde r files when the available space remaining on the Micro- SD /SDHC ca rd is less than 100MB. If the Automatic Recycle function is disabled, there m ust be at least 5 0MB hard drive spa ce a vailable f or the camera to be able to record video files. Offlin[...]
-
Seite 85
77 Maintenance User Management This section explains how to enable password protection and create multiple accounts. The administrator account name is “admin”, which is permanent and cannot be deleted. Click Add to create an account. Enter th e new user’s name , password and confirm password . Administrators can add up to 10 user accounts. Se[...]
-
Seite 86
78 Administrator - user has a ccess to view and change the Con figuration page . Users with a dministrator privilege can ch ange other user’s access rights and delete user accounts. Click Delete or Update to delete o r modif y a user’s account. Viewer - user can only access the main page for live viewing. Remote V iewer - user can o[...]
-
Seite 87
79 Language Select the desired language from the drop-down menu. Click Apply to apply settings or Cancel to cancel changes. IP Filt er The IP Filter is use d to f ilter the IP addresses which are able to acce ss the network camera. Enable the IP Filter and select to a llow or deny a range of IP addresses access to the server. Click Add to list to a[...]
-
Seite 88
80 Configuration This feature allow s the user to export/import the c onfiguration files of the network camera. Import/Export - Click export to pop up a dialog to indicate the location and file to export. Click browse to indicate the location and file of the camera configuration and click import to import the configuration file back into the networ[...]