User Manual
Table Of Contents
- Chapter 1 Overview
 - Chapter 2 Network Connection
 - Chapter 3 Accessing to the Network Speed Dome
 - Chapter 4 Basic Operations
 - Chapter 5 System Configuration
- 5.1 Storage Settings
 - 5.2 Basic Event Configuration
 - 5.3 Smart Event Configuration
- 5.3.1 Configuring Intrusion
 - 5.3.2 Configuring Line Crossing Detection
 - 5.3.3 Configuring Region Entrance Detection
 - 5.3.4 Configuring Region Exiting Detection
 - 5.3.5 Configuring Unattended Baggage Detection
 - 5.3.6 Configuring Object Removal Detection
 - 5.3.7 Configuring Face Detection
 - 5.3.8 Configuring Audio Exception Detection
 
 - 5.4 PTZ Configuration
 
 - Chapter 6 Speed Dome Configuration
 - Appendix
 
User Manual of Network Speed Dome 
5 
  Proper configuration of all passwords and other security settings is the responsibility of 
the installer and/or end-user. 
4.  Confirm the password. 
5.  Click OK to activate the camera and enter the live view interface.   
  Activation via SADP Software 
SADP software is used for  detecting the  online  device,  activating  the  device,  and  resetting the 
password.   
Get  the  SADP  software  from  the  supplied  disk  or  the  official  website,  and  install  the  SADP 
according to the prompts. Follow the steps to activate the camera. 
Steps: 
1.  Run the SADP software to search the online devices. 
2.  Check the device status from the device list, and select an inactive device. 
Select inactive device.
Input and confirm 
password.
Figure 2-4 SADP Interface 
The  SADP  software  supports  activating  the  camera  in  batch.  Refer  to  the  user  manual  of 
SADP software for details. 
3.  Create a password and input the password in the password field, and confirm the password. 
  For your privacy and to better protect your system against security risks, we strongly 
recommend the use of strong passwords for all functions and network devices. The 
password should be something of your own choosing (using a minimum of 8 characters, 
including upper case letters, lower case letters, numbers and special characters) in order 
to increase the security of your product. 
  Proper configuration of all passwords and other security settings is the responsibility of 
the installer and/or end-user. 










