Digitus IP67 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Digitus IP67. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Digitus IP67 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Digitus IP67 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation Digitus IP67 devrait contenir:
- informations sur les caractéristiques techniques du dispositif Digitus IP67
- nom du fabricant et année de fabrication Digitus IP67
- instructions d'utilisation, de réglage et d’entretien de l'équipement Digitus IP67
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Digitus IP67 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Digitus IP67 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Digitus en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Digitus IP67, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Digitus IP67, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Digitus IP67. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    OUTDOOR IR NETWORK CAMERA Series User Manual Please read instructions thorou ghly before operation and ret ain it for future reference.[...]

  • Page 2

    IMPORT ANT SAFEGU ARD All lead-free products offered by the comp any comply with the requirements of the European law on the Restriction of Hazardous Substances (RoHS) directive, which means our manufacture processes and products are strictly “lead-free” and without the hazardous substances cited in the directive. The crossed-out wheeled bin ma[...]

  • Page 3

    T ABLE OF CONTENTS 1. OVER VIEW ............................................................................................................................... .......... 1 1.1 Product Features .......................................................................................................... ............................. 1 1.2 Package Conte[...]

  • Page 4

    1 1. O VER VIEW 1.1 Product Features  T rue Day & Night surveillance & large aperture lens (F1.4)  The best cost / performance outdoor solution wit h IP67  IR effective dist ance up to 40 meters with 56 IR LEDs  Smart Light Control to avoid overexposure  Excellent outdoor ID design with cable management  Low-latency video [...]

  • Page 5

    2 2. BEFORE USING Y OUR NETW ORK CAMERA Before using the network camera, make sure: 1) Y ou have installed the supplied CMS sof tware, “Video Vi ewer”. 2) Y ou have configured the network settings , and the network connection is fine. If not, please refer to your the installation guide. This network camera can be accessed via our supp lied CMS [...]

  • Page 6

    3 3. A CCESSING THE CAMERA VIA VIDEO VIEWER 3.1 Accessing the camera Step1: Double-click “ ” on your PC desktop to open Video Vi ewer. By defaults, the “Address Book” panel will be displayed on the right side of the control panel. Step2: Click “ ” to select the IP address of the came ra you intend to connect, and double-click it. Step3:[...]

  • Page 7

    4 3.2.2 Full Function V ersion 3.2.3 Main Button Overview Button Function Description Simplified Full Function Address Book Click to show the predefined IP address(es). You can add, remove or search the IP address to log in the DVR remotely. Miscellaneous Control Remote Config Click to go to the detailed system configur ation. For details, please r[...]

  • Page 8

    5 3.3 Frequently-used functions 3.3.1 Record T o record remotely , click “ ” or “ ” → “ ” to go to the “Record Setting” page. In the “Record Setting” page, yo u can set the following items: ‧ Record type ‧ Pre- / post-event reco rd time (0~10 seconds) ‧ Record time setting ‧ Record path Note: The record function will b[...]

  • Page 9

    6 3.3.3 Firmware Upgrade This function is used when users need to upgrade t he network camera for function scalability . Note: Before using this function, make sure yo u hav e the correct upgrade files provided by y our install er or distributor . S tep1: Click “ ”, and select the IP address of your network camera in the address book. S tep2: C[...]

  • Page 10

    7 STEP2: Right-click to show the shortc ut menu on the top-left p anel, and select the E-Map group yo u want to add. There are three E-Map groups you can add: Googl e E-MAP , Single E-MAP , and Building E-MAP .[...]

  • Page 11

    8 STEP3: When the E-Map group is created, you will see the tree on the top-left pa nel, showing all the devices you’ve added to this group. Icon Description The connected device is ca mera. When it’s selected, it will become red. The connected device is DVR. When it’s selected, it will become red. For any motion or alarm event, it will appear[...]

  • Page 12

    9 How to Edit / Remove an Existing E-Map Group  For Google E-Map Group Right-click on the group name to show the shortcut menu list, and select “Edit E-MAP” or “Remove E-MAP” as needed. Y ou can also add a single E-Map group (Add Single E-MAP) or Building E-Map group (Add Building E-MAP) into the existing Google E-Map group.  For Sing[...]

  • Page 13

    10  For Building E-Map Group Right-click on the group name to show the shortcut menu list, and select “Edit Building E-MAP” or “Remove E-MAP” as needed.[...]

  • Page 14

    11 4. SY STEM CONFIGURA TION Before using the network camera, make sure y ou have installed the supplied sof t ware, “V ideo V iewer”, and configure network settings . If not, please refer to your i nstaller or the inst allation guide. Note: It’ s recommended to consult with yo ur installer before changing system configur ations. Note: Y ou n[...]

  • Page 15

    12 4.1 General In “General”, you can check the general information for your network camera, such as the firmware version and MAC address, and also modify the ident ification name of your camera (up to 15 alphanumeric characters). 4.1.1 Log T o quickly search the system log you want by event type, click the drop-down list to select the system lo[...]

  • Page 16

    13 Column Description User Name Set a user name that will be used for camera a ccess. The user name allows up to 16 alphanum eric characters. Password Set the password that will be used for remote login. The password allows up to 16 alphanumeric characters. User Level Set the security level of an account to give the permission to control different [...]

  • Page 17

    14 4.1.3 OnLineUser Y ou can check the current online user(s) with res pective online information. T o refresh the list, click “Refresh”. 4.1.4 T rigger Y ou can set the motion or alarm detecti on and select the notification function.  T rigger Setting In this section, you can select to enable or disable the alarm or motion detection. Item D[...]

  • Page 18

    15  Notification Setting In this section, you can select to enable e -mail and/or FTP notificat ion when an alarm or a motion happened. Item Description Method ‧ Email When this option is checked, the net work camera will upload the captured video clip to th e assigned e-mail address(s) once motio n or alarm recording happene d. ‧ FTP When t[...]

  • Page 19

    16 4.2.3 SNTP SNTP (Simple Network Time Protocol) is used to synchronize your camera time with the networked computer systems. Function Description GMT (Greenwich Mean T ime) Once users choose the time z one, the net work camera will adjust the local area time of the system automatically . Server Name Simply use the default SNTP server (For example[...]

  • Page 20

    17 Function Description Server Enter the SMTP server address provided from your e-mail system supplier . Port Enter the port number provided from your e- mail sy stem supplier . If this colu mn is left blank, the e-mail server will use port 25 to send e-m ails. Mail From Enter the entire mail address to ens ure e-mails will not be blocked by SMTP .[...]

  • Page 21

    18 When this function is activated, the other PC within the same domain as this camera will be able to search this camera in “Network Nei ghbor” with the identification name set in “Fri endly name”. Double-click it to quickly open t he web browser for camera access. For details about camera access via your web browser , please refer to “5[...]

  • Page 22

    19 Note: T o preview the changes, click “ Apply” . Item Descriptio n Backlight It is the function to adjust the image to compensat e for an area that is over powered by brightness becau se of excessive light. The image will be properl y exposed for cl earness. Select to activate (ON) or disable (OFF) this function. Note: T his function is av ai[...]

  • Page 23

    20 4.4.2 T ime Set daylight saving time and the current time. Function Description Daylight Saving S pecif y whether to use daylight saving time ( ON / OFF). If this function is enabled, set the time period (ST A RT / END), and adjust the daylight saving time in hours (ADJUST). T ime Set the current time.[...]

  • Page 24

    21 5. A CCESSING THE CAMERA VIA Y OUR WEB BRO WSER Users can also access the network camera via a web browser , such as Microsoft Internet Explorer or Mozilla Firefox. However , the web browser is only available for si ngle device access. If users want to access more than two devices through one interface, it’s reco mmended to use our supplied CM[...]

  • Page 25

    22 5.2 Control p anel overview 5.2.1 Live V iew Panel Function Icon User Lev el Descriptio n Media T ype -- Supervisor / Power User / Normal User / Guest Select the web transmission format from the drop-down list: H.264 / MPEG-4 / Motion JPEG / QuickT ime For users using Mozilla Firefox, onl y “QuickT ime” is selectable. QuickT ime is Apple Inc[...]

  • Page 26

    23 Function Icon User Lev el Descriptio n captured image. Flip Supervisor / Power User / Normal User Click to rotate the image 180 0 counterclockwise when necessary . Full Screen Supervisor / Power User / Normal User Click to display the image in full screen. 5.2.2 System Configuration Panel Click “Configuration” to enter the configuration page[...]

  • Page 27

    24 Main Menu Sub-menu Ref erence Network Net work  Remote Config  Network QoS  Remote Config  Network  QoS DDNS  Remote Config  Network  DDNS SNTP  Remote Config  Network  SNTP FTP  Remote Config  Network  FTP Mail  Remote Config  Network  MAIL Filter  Remote Config  Network  Filter UPnP ?[...]

  • Page 28

    25 6. A CCESSING THE CAMERA VIA Y OUR MOBILE PHONE 6.1 Checklist Before Using Make sure your PDA or mobile phone c onform to the follow ing requirement s: Device Make sure … WinCE-Based PDA The operating system is Windows Mobile 5.0 Packet PC / 6.0 Professional*. Windows Mobile 5.0 Smartphone / 6.0 S tandard is NOT suppo rted. J2ME MIDP2.0 is sup[...]

  • Page 29

    26 Y ou will see the following f our programs available: STEP2: Download the pr ogram as instructed:  Select “ EagleEyes (J2M E New version) ” if you’re using the J2ME-based mobile phone.  Select “ EagleEyes (For WinCE New V ersion) ” if you’re using the WinCE-Based PDA phone. STEP3: Follow the on-screen inst ructions after downlo[...]

  • Page 30

    27 APPENDIX PR ODUC T SPECIFICA TIONS ▓ Network Network Compressi on H.264 LAN Port YES LAN S peed 10/100 Based-T Ethernet Supported Protocols DDNS, PPPoE, DHCP , NTP , SNTP , TCP/IP , ICMP , SMTP , FTP , HTTP , RTP , RTSP Frame Rate NTSC:30, P AL:25 Number of Online Users 10 Security Multiple user access lev els with p assword Web manag ement (1[...]