User's Manual
Table Of Contents
- Chapter 1 Introduction
- 1.1 Front Panel
- 1.1.1 iDS-9600NXI-I8/8F(B), iDS-9600NXI-I8/X(B) and iDS-9600NXI-I8/16S(B) Series
- 1.1.2 iDS-9600NXI-I16/8F(B), iDS-9600NXI-I16/X(B) and iDS-9600NXI-I16/16S(B) Series
- 1.1.3 iDS-7700NXI-I4(/16P)/16S(B) and iDS-7700NXI-I4(/16P)/X(B) Series
- 1.1.4 iDS-6700NXI-I/8F(B) and iDS-6700NXI-I/16S(B) Series
- 1.1.5 iDS-9600NXI-I8/4F(B)
- 1.1.6 iDS-96000NXI-I16(B)
- 1.1.7 iDS-96000NXI-I24(B)
- 1.2 IR Remote Control Operations
- 1.3 USB Mouse Operation
- 1.4 Rear Panel
- 1.4.1 iDS-9600NXI-I8/8F(B), iDS-9600NXI-I8/X(B) and iDS-9600NXI-I8/16S(B) Series
- 1.4.2 iDS-9600NXI-I16/8F(B), iDS-9600NXI-I16/X(B) and iDS-9600NXI-I16/16S(B) Series
- 1.4.3 iDS-7700NXI-I4(/16P)/16S(B) and iDS-7700NXI-I4(/16P)/X(B) Series
- 1.4.4 iDS-6700NXI-I/16S(B) and iDS-6700NXI-I/8F(B) Series
- 1.4.5 iDS-9600NXI-I8/4F(B)
- 1.4.6 iDS-96000NXI-I16(B) and iDS-96000NXI-I24(B)
- 1.1 Front Panel
- Chapter 2 Getting Started
- Chapter 3 Camera Management
- Chapter 4 Camera Settings
- Chapter 5 Live View
- Chapter 6 PTZ Control
- Chapter 7 Storage
- 7.1 Storage Device Management
- 7.2 Storage Mode
- 7.3 Recording Parameters
- 7.4 Configure Recording Schedule
- 7.5 Configure Continuous Recording
- 7.6 Configure Motion Detection Triggered Recording
- 7.7 Configure Event Triggered Recording
- 7.8 Configure Alarm Triggered Recording
- 7.9 Configure Picture Capture
- 7.10 Configure Holiday Recording
- 7.11 Configure Redundant Recording
- Chapter 8 Disk Array
- Chapter 9 File Management
- Chapter 10 Playback
- Chapter 11 Event and Alarm Settings
- Chapter 12 VCA Event Alarm
- 12.1 Facial Detection
- 12.2 Vehicle Detection
- 12.3 Line Crossing Detection
- 12.4 Intrusion Detection
- 12.5 Region Entrance Detection
- 12.6 Region Exiting Detection
- 12.7 Unattended Baggage Detection
- 12.8 Object Removal Detection
- 12.9 Audio Exception Detection
- 12.10 Sudden Scene Change Detection
- 12.11 Defocus Detection
- 12.12 PIR Alarm
- 12.13 Thermal Camera Detection
- Chapter 13 Smart Analysis
- Chapter 14 Human Body Detection
- Chapter 15 Face Picture Comparison
- Chapter 16 People Frequency Alarm
- Chapter 17 Network Settings
- Chapter 18 Hot Spare Device Backup
- Chapter 19 System Maintenance
- Chapter 20 General System Settings
- Chapter 21 Appendix
Network Video Recorder User Manual
183
Configure Hik-Connect
Purpose
Hik-Connect provides mobile phone application and platform service to access and manage your
connected devices, which enables you to get a convenient remote access to the surveillance
system.
Go to System > Network > Advanced > Platform Access.
Check Enable to activate the function. Then the service terms will pop up.
1) Enter the verification code in Verification Code.
2) Scan the QR code to read the service terms and privacy statement.
3) Check The Hik-Connect service will require internet access. Please read Service Terms and
Privacy Statement before enabling the service if you agree the service terms and privacy
statement.
4) Click OK to save the settings.
●
Hik-Connect is disabled by default.
●
The verification code is empty by default. It must contain 6 to 12 letters or numbers, and it
is case sensitive.
(Optional) Check Custom to enter the server address as your desire.
(Optional) Check Enable Stream Encryption, verification code is required for remote access
and live view.
Click Apply.
What to do next:
After configuration, you can access and manage your devices through Hik-Connect app or
website.
Configure Ports
You can configure different types of ports to enable relevant functions.
Go to System > Network > Advanced > More Settings and configure port settings as needed.
● Alarm Host IP/Port: With a remote alarm host configured, the device will send the alarm
event or exception message to the host when an alarm is triggered. The remote alarm host
must have the client management system (CMS) software installed.
The Alarm Host IP refers to the IP address of the remote PC on which the CMS software (e.g.,
iVMS-4200) is installed, and the Alarm Host Port (7200 by default) must be the same as the
alarm monitoring port configured in the software.