User Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Speed Dome
- Chapter 4 Live View
- Chapter 5 PTZ Configuration
- Chapter 6 Speed Dome Configuration
- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings
- 6.3.1 Configuring TCP/IP Settings
- 6.3.2 Configuring Port Settings
- 6.3.3 Configuring PPPoE Settings
- 6.3.4 Configuring DDNS Settings
- 6.3.5 Configuring SNMP Settings
- 6.3.6 Configuring 802.1X Settings
- 6.3.7 Configuring QoS Settings
- 6.3.8 Configuring FTP Settings
- 6.3.9 Configuring UPnP™ Settings
- 6.3.10 Configuring NAT (Network Address Translation) Settings
- 6.3.11 Configuring Email Settings
- 6.3.12 Configuring Platform Access Settings
- 6.3.13 Configuring HTTPS Settings
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Settings
- 6.6 Configuring and Handling Alarms
- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Video Tampering Alarm
- 6.6.3 Configuring External Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Detecting Audio Exception
- 6.6.7 Configuring Dual-VCA
- 6.6.8 Configuring Intrusion Detection
- 6.6.9 Configuring Line Crossing Detection
- Chapter 7 Record Settings
- Chapter 8 Playback
- Chapter 9 Log Searching
- Chapter 10 Others
- Appendix
User Manual of E Series Network Speed Dome
© Hikvision
42
1. Enter the SNMP Settings interface:
Configuration > Advanced Configuration > Network > SNMP
Figure 6-15 SNMP Settings
2. Check the corresponding version checkbox ( , ,
) to enable the feature.
3. Configure the SNMP settings.
The configuration of the SNMP software should be the same as the settings you
configure here.
4. Click to save and finish the settings.
6.3.6 Configuring 802.1X Settings
Purpose:
The speed dome supports IEEE 802.1X standard.
IEEE 802.1X is a port-based network access control. It enhances the security level of the LAN.
When devices connect to this network with IEEE 802.1X standard, the authentication is needed. If
the authentication fails, the devices don’t connect to the network.