Hikvision DS-2CD1083G0-I Handleiding

Hikvision Bewakingscamera DS-2CD1083G0-I

Lees hieronder de 📖 handleiding in het Nederlandse voor Hikvision DS-2CD1083G0-I (114 pagina's) in de categorie Bewakingscamera. Deze handleiding was nuttig voor 16 personen en werd door 2 gebruikers gemiddeld met 4.5 sterren beoordeeld

Pagina 1/114
Network Camera
User Manual
Iniaves on the Use of Video Products
Thank you for choosing Hikvision products.
Technology aects every aspect of our life. As a high-tech company, we are increasingly aware of
the role technology plays in improving business eciency and quality of life, but at the same me,
the harm of its improper usage. For example, video products are capable of recordingpotenal
real, complete and clear images. This provides a high value in retrospect and preserving real-me
facts. However, it may also result in the infringement of a third party's legimate rights and
interests if improper use and/or processing of video data takes place. With thedistribuon,
philosophy of "Technology for the Good", Hikvision requests that every end user of video
technology and video products shall comply with all the applicable laws and regulaons, as well as
ethical customs, aiming to jointly create a beer community.
Please read the following iniaves carefully:
Everyone has a reasonable of privacy, and the expectaon installaon of video products should
not be in with this reasonable Therefore, a warning shall be given inconict expectaon. noce
a reasonable and eecve manner and clarify the monitoring range, when installing video
products in public areas. For non-public areas, a third party's rights and interests shall be
evaluated when installing video products, including but not limited to, installing video products
only aer obtaining the consent of the stakeholders, and not installing highly-invisible video
products.
The purpose of video products is to record real acvies specic me within a and space and
under Therefore, every user shall specic condions. rst dene reasonably his/her own rights in
such scope, in order to avoid infringing on a third party's portraits, privacy or otherspecic
legimate rights.
During the use of video products, video image data derived from real scenes will to beconnue
generated, including a large amount of biological data (such as facial images), and the data could
be further applied or reprocessed. Video products themselves could not disnguish good from
bad regarding how to use the data based solely on the images captured by the video products.
The result of data usage depends on the method and purpose of use of the data controllers.
Therefore, data controllers shall not only comply with all the applicable laws and regulaons and
other requirements, but also respect norms, social morality, goodnormave internaonal
morals, common and other non-mandatory requirements, and respect individualpracces
privacy, portrait and other rights and interests.
The rights, values and other demands of various stakeholders should always be considered when
processing video data that is connuously generated by video products. In this regard, product
security and data security are extremely crucial. Therefore, every end user and data controller,
shall undertake all reasonable and necessary measures to ensure data security and avoid data
leakage, improper disclosure and improper use, including but not limited to, seng up access
Network Camera User Manual
i
control, a suitable network environment (the Internet or Intranet) where videoselecng
products are connected, establishing and constantly network security.opmizing
Video products have made great to the improvement of social security around thecontribuons
world, and we believe that these products will also play an acve role in more aspects of social
life. Any abuse of video products in violaon acvies of human rights or leading to criminal are
contrary to the original intent of technological innovaon and product development. Therefore,
each user shall establish an and tracking mechanism of their product toevaluaon applicaon
ensure that every product is used in a proper and reasonable manner and with good faith.
Network Camera User Manual
ii
Legal Informaon
©2022 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.
About this Manual
The Manual includes for using and managing the Product. Pictures, charts, images andinstrucons
all other informaon hereinaer are for and only. The descripon explanaon informaon
contained in the Manual is subject to change, without due to noce, rmware updates or other
reasons. Please the latest version of this Manual at the Hikvision website ( nd hps://
www.hikvision.com/ ).
Please use this Manual with the guidance and assistance of professionals trained in supporng the
Product.
Trademarks
and other Hikvision's trademarks and logos are the properes of
Hikvision in various jurisdicons.
Other trademarks and logos are the menoned properes respecve of their owners.
Disclaimer
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS MANUAL AND THE PRODUCT
DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED "AS IS" AND "WITH
ALL FAULTS AND ERRORS". HIKVISION MAKES NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR FITNESS FOR A PARTICULAR
PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK. IN NO EVENT WILL HIKVISION
BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES,
INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS
INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION,
WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), PRODUCT LIABILITY,
OR OTHERWISE, IN CONNECTION WITH THE USE OF THE PRODUCT, EVEN IF HIKVISION HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.
YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR INHERENT SECURITY
RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK, VIRUS
INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY
TECHNICAL SUPPORT IF REQUIRED.
YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE
SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW.
ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT
INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF
PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY RIGHTS.
YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE
Network Camera User Manual
iii
Time Synchronizaon
Set up device manually for the me rst me me access if the local is not synchronized with
that of the network. Visit the device via Web browse/client soware and go to me sengs
interface.
Reecon
Make sure that no reecve surface is too close to the device lens. The IR light from the device
may reect back into the lens causing reecon.
Network Camera User Manual
ix
Contents
Chapter 1 Device and Accessing ................................................................................. 1Acvaon
1.1 Acvate Device ...................................................................................................................... 1
1.1.1 Acvate via SADP .......................................................................................................... 1
1.1.2 Acvate Camera via iVMS-4200 .................................................................................... 2
1.1.3 Acvate Device via Web Browser .................................................................................. 3
1.2 Access Camera ....................................................................................................................... 4
1.2.1 Access Camera via Web Browser .................................................................................. 4
1.2.2 Access Camera via iVMS-4200 ...................................................................................... 6
1.2.3 Access Camera via Hik-Connect .................................................................................... 6
Chapter 2 Network Camera Conguraon ................................................................................ 11
2.1 Update Firmware ................................................................................................................. 11
2.2 System Requirement ............................................................................................................ 11
2.3 Live View .............................................................................................................................. 11
2.3.1 Live View Parameters .................................................................................................. 11
2.3.2 Set Transmission Parameters ...................................................................................... 15
2.3.3 Set Smooth Streaming ................................................................................................ 16
2.4 Video and Audio .................................................................................................................. 17
2.4.1 Video Sengs ............................................................................................................. 17
2.4.2 ROI .............................................................................................................................. 21
2.4.3 Display Info. on Stream ............................................................................................... 22
2.4.4 Audio Sengs ............................................................................................................. 22
2.4.5 Two-way Audio ............................................................................................................ 23
2.4.6 Display ........................................................................................................... 24Sengs
2.4.7 OSD ............................................................................................................................. 30
2.4.8 Set Privacy Mask ......................................................................................................... 30
2.4.9 Overlay Picture ............................................................................................................ 30
Network Camera User Manual
x
2.9.3 Simultaneous Login ..................................................................................................... 72
2.9.4 Import and Export Conguraon File ......................................................................... 72
2.9.5 Export Diagnose Informaon ...................................................................................... 72
2.9.6 Reboot ........................................................................................................................ 72
2.9.7 Restore and Default .................................................................................................... 72
2.9.8 Upgrade ...................................................................................................................... 73
2.9.9 Device Auto Maintenance ........................................................................................... 73
2.9.10 View Open Source Soware License ......................................................................... 74
2.9.11 Wiegand .................................................................................................................... 74
2.9.12 Metadata .................................................................................................................. 74
2.9.13 Time and Date ........................................................................................................... 74
2.9.14 Set RS-485 ................................................................................................................. 76
2.9.15 Set RS-232 ................................................................................................................. 76
2.9.16 Power Mode ....................................................................................... 76Consumpon
2.9.17 External Device ......................................................................................................... 77
2.9.18 Security ..................................................................................................................... 78
2.9.19 Cercate Management ........................................................................................... 82
2.9.20 User and Account ...................................................................................................... 84
2.10 VCA Resource ..................................................................................................................... 85
2.10.1 Allocate VCA Resource .............................................................................................. 85
2.10.2 Set Open Plaorm ..................................................................................................... 85
2.10.3 Road Trac ............................................................................................................... 86
2.10.4 Face Capture ............................................................................................................. 90
2.11 Smart Display ..................................................................................................................... 93
2.12 EPTZ ................................................................................................................................... 94
2.12.1 Patrol ......................................................................................................................... 94
2.12.2 Auto-Tracking ............................................................................................................ 95
2.13 Image Stching .................................................................................................................. 95
Network Camera User Manual
xii
1.2 Access Camera
This part introduces how to access the camera via Web browser or client soware.
1.2.1 Access Camera via Web Browser
Before You Start
Check the system requirement to that the computer and web browser meetsconrm operang
the requirements.
Table 1-1 System Requirement
Operang System Windows XP and above version, Mac OS X 10.8 and above versionMicroso
CPU 3.0 GHz or higher
RAM 1 GB or higher
Display 1024 × 768 or higherresoluon
Web Browser Internet Explorer 8.0 and above version, Mozilla Firefox 30.0-51, Google
Chrome 31.0-44, Safari 8.0+
Steps
1. Open the web browser.
Note
For some web browsers, a plug-in is required. For detailed requirements, see Plug-in
Installaon .
2. Input IP address of the camera to enter the login interface.
3. Input user name and password.
Note
Illegal login lock is acvated by default. If admin user performs seven failed password aempts
(ve aempts for user/operator), the IP address is blocked for 30 minutes.
If illegal login lock is not needed, go to Conguraon → System → Security → Security Service
to turn it o.
4. Click .Login
5. Download and install appropriate plug-in for your web browser.
For IE based web browser, webcomponents and TM are oponal. For non-IE based web browser,
webcomponents, TM, VLC and MJEPG are oponal.
What to do next
You can recover admin password. For detailed sengs, see Admin Password Recovery .
You can set illegal login lock to improve security. For detailed see .sengs, Illegal Login Lock
Network Camera User Manual
4
Note
When you need to reset the password, make sure that the device and the PC are on the same
network segment.
Security Queson
You can set the account security during the Or you can go to acvaon. Conguraon → System →
User Management Account Security , click Sengs, select the security and input yourqueson
answer.
You can click Forget Password and answer the security to reset the admin password whenqueson
access the device via browser.
Email
You can set the account security during the Or you can go to acvaon. Conguraon → System →
User Management Account Security , click Sengs, input your email address to receive the
vericaon code during the recovering operaon process.
Illegal Login Lock
It helps to improve the security when accessing the device via Internet.
Go to Conguraon → System → Security → Security Service Enable Illegal Login , and enable
Lock Illegal Login . Aempts Duraon and Locking are congurable.
Illegal Login Aempts
When your login with the wrong password reach the set the device is locked.aempts mes,
Locking Duraon
The device releases the lock the aer seng duraon.
1.2.2 Access Camera via iVMS-4200
Add the camera to client soware before further operaon.
Refer to the iVMS-4200 Client User ManualSoware for detailed steps.seng
1.2.3 Access Camera via Hik-Connect
Hik-Connect is an applicaon for mobile devices. Using the App, you can view live image, receive
alarm nocaon and so on.
Before You Start
Connect the camera to network with network cables.
Network Camera User Manual
6
Inialize Memory Card via Hik-Connect
Memory card requires inializaon before saving camera recordings and pictures.
Steps
1. Check the memory card status by tapping on Storage Status in the device interface.sengs
2. If the memory card status displays as Uninialized, tap to inialize it.
The status will change to Normal the successful aer inializaon.
Result
You can then start recording any event triggered video in the camera such as moon detecon.
Network Camera User Manual
10
Adjust Aspect Rao
Steps
1. Click .Live View
2. Click to select the aspect rao.
refers to 4:3 window size.
refers to 16:9 window size.
refers to original window size.
refers to self-adapve window size.
refers to original rao window size.
Live View Stream Type
Select the live view stream type according to your needs. For the detailed informaon about the
stream type refer to .selecon, Stream Type
Select the Third-Party Plug-in
When the live view cannot display via certain browsers, you can change the plug-in for live view
according to the browser.
Steps
1. Click .Live View
2. Click to select the plug-in.
-When you access the device via Internet Explorer, you can select Webcomponents or
QuickTime.
-When you access the device via the other browsers, you can select Webcomponents,
QuickTime, VLC or MJPEG.
Window Division
refers to 1 × 1 window division.
refers to 2 × 2 window division.
refers to 3 × 3 window division.
refers to 4 × 4 window division.
Light
Click to turn on or turn the illuminator.o
Network Camera User Manual
12
Go to Conguraon → System → Maintenance → Lens Correcon to enable this Youfuncon.
can set the arming schedule, and the device will correct lens during theautomacally
congured me periods.
Quick Set Live View
It oers a quick setup of PTZ, display OSD, video/audio on live view page.sengs, sengs
Steps
1. Click to show quick setup page.
2. Set PTZ, display sengs, OSD, video/audio parameters.
-For PTZ sengs, see Lens Parameters Adjustment .
-For display sengs, see .Display Sengs
-For OSD see .sengs, OSD
-For audio and video sengs, see .Video and Audio
Note
The is only supported by certain models.funcon
Lens Parameters Adjustment
It is used to adjust the lens focus, zoom and iris.
Zoom
Click , and the lens zooms in.
Click , and the lens zooms out.
Focus
Click , then the lens focuses far and the distant object gets clear.
Click , then the lens focuses near and the nearby object gets clear.
PTZ Speed
Slide to adjust the speed of the movement.pan/lt
Iris
When the image is too dark, click to enlarge the iris.
When the image is too bright, click to stop down the iris.
Network Camera User Manual
14


Product specificaties

Merk: Hikvision
Categorie: Bewakingscamera
Model: DS-2CD1083G0-I

Heb je hulp nodig?

Als je hulp nodig hebt met Hikvision DS-2CD1083G0-I stel dan hieronder een vraag en andere gebruikers zullen je antwoorden




Handleiding Bewakingscamera Hikvision

Handleiding Bewakingscamera

Nieuwste handleidingen voor Bewakingscamera