Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring SNMP Settings
- 6.3.6 Configuring 802.1X Settings
- 6.3.7 Configuring QoS Settings
- 6.3.8 Configuring UPnP™ Settings
- 6.3.9 Configuring Wireless Dial Settings
- 6.3.10 Email Sending Triggered by Alarm
- 6.3.11 Configuring NAT (Network Address Translation) Settings
- 6.3.12 Configuring FTP Settings
- 6.3.13 Platform Access
- 6.3.14 HTTPS Settings
 
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Parameters
- 6.6 Configuring and Handling Alarms- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Video Tampering Alarm
- 6.6.3 Configuring Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Configuring Other Alarm
- 6.6.7 Configuring Audio Exception Detection
- 6.6.8 Configuring Defocus Detection
- 6.6.9 Configuring Scene Change Detection
- 6.6.10 Configuring Face Detection
- 6.6.11 Configuring Line Crossing Detection
- 6.6.12 Configuring Intrusion Detection
- 6.6.13 Configuring Region Entrance Detection
- 6.6.14 Configuring Region Exiting Detection
- 6.6.15 Configuring Unattended Baggage Detection
- 6.6.16 Configuring Object Removal Detection
 
- 6.7 VCA Configuration
 
- Chapter 7 Storage Settings
- Chapter 8 Counting
- Chapter 9 Road Traffic
- Chapter 10 Playback
- Chapter 11 Log Searching
- Chapter 12 Others
- Appendix
User Manual of Network Camera 
3 
FITNESS  FOR  A  PARTICULAR  PURPOSE,  AND  NON-INFRINGEMENT  OF 
THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, 
EMPLOYEES,  OR  AGENTS  BE  LIABLE  TO  YOU  FOR  ANY  SPECIAL, 
CONSEQUENTIAL,  INCIDENTAL,  OR  INDIRECT  DAMAGES,  INCLUDING, 
AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS 
INTERRUPTION,  OR  LOSS  OF  DATA  OR  DOCUMENTATION,  IN 
CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS 
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 
REGARDING  TO  THE  PRODUCT  WITH  INTERNET  ACCESS,  THE  USE  OF 
PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL 
NOT  TAKE  ANY  RESPONSIBILITES  FOR  ABNORMAL  OPERATION, 
PRIVACY  LEAKAGE  OR  OTHER  DAMAGES  RESULTING  FROM  CYBER 
ATTACK,  HACKER  ATTACK,  VIRUS  INSPECTION,  OR  OTHER  INTERNET 
SECURITY  RISKS;  HOWEVER,  HIKVISION  WILL  PROVIDE  TIMELY 
TECHNICAL SUPPORT IF REQUIRED.   
SURVEILLANCE  LAWS  VARY  BY  JURISDICTION.  PLEASE  CHECK  ALL 
RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT 
IN  ORDER  TO  ENSURE  THAT  YOUR  USE  CONFORMS  THE  APPLICABLE 
LAW.  HIKVISION  SHALL  NOT  BE  LIABLE  IN  THE  EVENT  THAT  THIS 
PRODUCT IS USED WITH ILLEGITIMATE PURPOSES.   
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE 
APPLICABLE LAW, THE LATER PREVAILS. 
Regulatory Information 
FCC Information 
FCC  compliance:  This  equipment  has  been  tested  and  found  to  comply  with  the 
limits  for a digital  device, pursuant  to part  15  of  the FCC  Rules. These  limits  are 
designed  to  provide  reasonable  protection  against  harmful  interference  when  the 
equipment is operated in a commercial environment. This equipment generates, uses, 
and can radiate radio frequency energy and, if not installed and used in accordance 










