User Manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Live View
- Chapter 5 Network Camera Configuration
- Chapter 6 Network Settings
- Chapter 7 Video/Audio Settings
- Chapter 8 Configuring Image Parameters
- Chapter 9 Configuring Event Settings- 9.1 Configuring Motion Detection
- 9.2 Configuring Video Tampering Alarm
- 9.3 Configuring Alarm Input
- 9.4 Configuring Alarm Output
- 9.5 Handling Exception
- 9.6 Configuring Audio Exception Detection
- 9.7 Configuring Intrusion Detection
- 9.8 Configuring Line Crossing Detection
- 9.9 Configuring Region Entrance Detection
- 9.10 Configuring Region Exiting Detection
- 9.11 Configuring Unattended Baggage Detection
- 9.12 Configuring Object Removal Detection
 
- Chapter 10 Storage Settings
- Chapter 11 People Counting
- Chapter 12 Heat Map
- Chapter 13 Intersection Analysis
- Chapter 14 Playback
- Chapter 15 Picture
- Chapter 16 Application
- Appendix
User Manual of Network Fisheye Camera 
13 
Chapter 3   Access  to  the  Network 
Camera 
3.1  Accessing by Web Browsers 
Note: 
For certain camera models, HTTPS is enabled by default and the camera creates an 
unsigned certificate automatically. When you access to the camera the first time, the 
web browser prompts a notification about the certificate issue. 
To  cancel  the  notification,  install  a  signed-certificate  to  the  camera.  For  detailed 
operation, see 6.2.5 HTTPS Settings. 
Steps: 
1.  Open the web browser. 
2.  In the browser address bar, input the IP address of the network camera, and press 
the Enter key to enter the login interface. 
Note:   
The default  IP  address  is 192.168.1.64.  You  are  recommended to  change  the IP 
address to the same subnet with your computer. 
3.  Input the user name and password and click Login. 
The admin user should configure the device accounts and user/operator permissions 
properly. Delete the unnecessary accounts and user/operator permissions. 
Note: 
The IP address gets locked if the admin user performs 7 failed password attempts 
(5 attempts for the user/operator). 
Figure 3-1 Login Interface 










