User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- Chapter 7 Network Settings
- Chapter 8 Video/Audio Settings
- Chapter 9 Image Settings
- Chapter 10 Event Settings- 10.1 Basic Events
- 10.2 Smart Events- 10.2.1 Configuring Audio Exception Detection
- 10.2.2 Configuring Defocus Detection
- 10.2.3 Configuring Scene Change Detection
- 10.2.4 Configuring Face Detection
- 10.2.5 Configuring Intrusion Detection
- 10.2.6 Configuring Line Crossing Detection
- 10.2.7 Configuring Region Entrance Detection
- 10.2.8 Configuring Region Exiting Detection
- 10.2.9 Configuring Unattended Baggage Detection
- 10.2.10 Configuring Object Removal Detection
 
- 10.3 VCA Configuration
 
- Chapter 11 Storage Settings
- Chapter 12 Playback
- Chapter 13 Picture
- Chapter 14 Application
- Appendix
Network Camera User Manual 
160 
You can also click    to refresh the online device list manually. The 
newly searched devices will be added to the list.   
  You  can click    or    on each column heading to  order the  information; 
you can click    to expand the device table and hide the network parameter panel on 
the right side, or click    to show the network parameter panel. 
  Modify network parameters 
Steps: 
1.  Select the device to be modified in the device list and the network parameters of 
the device will be displayed in the  Modify Network Parameters panel  on  the 
right side. 
2.  Edit the modifiable network parameters, e.g. IP address and port number. 
3.  Enter the password of the admin account of the device in the Admin Password 
field and click    to save the changes.   
  For your privacy and to better protect your system against security risks, we 
strongly recommend the use of strong passwords for all functions and network 
devices. The password should be something of your own choosing (using a 
minimum of 8 characters, including at least three of the following categories: 
upper case letters, lower case letters, numbers and special characters) in 
order to increase the security of your product. 
  Proper configuration of all passwords and other security settings is the 
responsibility of the installer and/or end-user. 










