Digitus IP67 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Digitus IP67, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Digitus IP67 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Digitus IP67. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Digitus IP67 should contain:
- informations concerning technical data of Digitus IP67
- name of the manufacturer and a year of construction of the Digitus IP67 item
- rules of operation, control and maintenance of the Digitus IP67 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Digitus IP67 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Digitus IP67, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Digitus service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Digitus IP67.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Digitus IP67 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    OUTDOOR IR NETWORK CAMERA Series User Manual Please read instructions thorou ghly before operation and ret ain it for future reference.[...]

  • Page 2

    IMPORT ANT SAFEGU ARD All lead-free products offered by the comp any comply with the requirements of the European law on the Restriction of Hazardous Substances (RoHS) directive, which means our manufacture processes and products are strictly “lead-free” and without the hazardous substances cited in the directive. The crossed-out wheeled bin ma[...]

  • Page 3

    T ABLE OF CONTENTS 1. OVER VIEW ............................................................................................................................... .......... 1 1.1 Product Features .......................................................................................................... ............................. 1 1.2 Package Conte[...]

  • Page 4

    1 1. O VER VIEW 1.1 Product Features  T rue Day & Night surveillance & large aperture lens (F1.4)  The best cost / performance outdoor solution wit h IP67  IR effective dist ance up to 40 meters with 56 IR LEDs  Smart Light Control to avoid overexposure  Excellent outdoor ID design with cable management  Low-latency video [...]

  • Page 5

    2 2. BEFORE USING Y OUR NETW ORK CAMERA Before using the network camera, make sure: 1) Y ou have installed the supplied CMS sof tware, “Video Vi ewer”. 2) Y ou have configured the network settings , and the network connection is fine. If not, please refer to your the installation guide. This network camera can be accessed via our supp lied CMS [...]

  • Page 6

    3 3. A CCESSING THE CAMERA VIA VIDEO VIEWER 3.1 Accessing the camera Step1: Double-click “ ” on your PC desktop to open Video Vi ewer. By defaults, the “Address Book” panel will be displayed on the right side of the control panel. Step2: Click “ ” to select the IP address of the came ra you intend to connect, and double-click it. Step3:[...]

  • Page 7

    4 3.2.2 Full Function V ersion 3.2.3 Main Button Overview Button Function Description Simplified Full Function Address Book Click to show the predefined IP address(es). You can add, remove or search the IP address to log in the DVR remotely. Miscellaneous Control Remote Config Click to go to the detailed system configur ation. For details, please r[...]

  • Page 8

    5 3.3 Frequently-used functions 3.3.1 Record T o record remotely , click “ ” or “ ” → “ ” to go to the “Record Setting” page. In the “Record Setting” page, yo u can set the following items: ‧ Record type ‧ Pre- / post-event reco rd time (0~10 seconds) ‧ Record time setting ‧ Record path Note: The record function will b[...]

  • Page 9

    6 3.3.3 Firmware Upgrade This function is used when users need to upgrade t he network camera for function scalability . Note: Before using this function, make sure yo u hav e the correct upgrade files provided by y our install er or distributor . S tep1: Click “ ”, and select the IP address of your network camera in the address book. S tep2: C[...]

  • Page 10

    7 STEP2: Right-click to show the shortc ut menu on the top-left p anel, and select the E-Map group yo u want to add. There are three E-Map groups you can add: Googl e E-MAP , Single E-MAP , and Building E-MAP .[...]

  • Page 11

    8 STEP3: When the E-Map group is created, you will see the tree on the top-left pa nel, showing all the devices you’ve added to this group. Icon Description The connected device is ca mera. When it’s selected, it will become red. The connected device is DVR. When it’s selected, it will become red. For any motion or alarm event, it will appear[...]

  • Page 12

    9 How to Edit / Remove an Existing E-Map Group  For Google E-Map Group Right-click on the group name to show the shortcut menu list, and select “Edit E-MAP” or “Remove E-MAP” as needed. Y ou can also add a single E-Map group (Add Single E-MAP) or Building E-Map group (Add Building E-MAP) into the existing Google E-Map group.  For Sing[...]

  • Page 13

    10  For Building E-Map Group Right-click on the group name to show the shortcut menu list, and select “Edit Building E-MAP” or “Remove E-MAP” as needed.[...]

  • Page 14

    11 4. SY STEM CONFIGURA TION Before using the network camera, make sure y ou have installed the supplied sof t ware, “V ideo V iewer”, and configure network settings . If not, please refer to your i nstaller or the inst allation guide. Note: It’ s recommended to consult with yo ur installer before changing system configur ations. Note: Y ou n[...]

  • Page 15

    12 4.1 General In “General”, you can check the general information for your network camera, such as the firmware version and MAC address, and also modify the ident ification name of your camera (up to 15 alphanumeric characters). 4.1.1 Log T o quickly search the system log you want by event type, click the drop-down list to select the system lo[...]

  • Page 16

    13 Column Description User Name Set a user name that will be used for camera a ccess. The user name allows up to 16 alphanum eric characters. Password Set the password that will be used for remote login. The password allows up to 16 alphanumeric characters. User Level Set the security level of an account to give the permission to control different [...]

  • Page 17

    14 4.1.3 OnLineUser Y ou can check the current online user(s) with res pective online information. T o refresh the list, click “Refresh”. 4.1.4 T rigger Y ou can set the motion or alarm detecti on and select the notification function.  T rigger Setting In this section, you can select to enable or disable the alarm or motion detection. Item D[...]

  • Page 18

    15  Notification Setting In this section, you can select to enable e -mail and/or FTP notificat ion when an alarm or a motion happened. Item Description Method ‧ Email When this option is checked, the net work camera will upload the captured video clip to th e assigned e-mail address(s) once motio n or alarm recording happene d. ‧ FTP When t[...]

  • Page 19

    16 4.2.3 SNTP SNTP (Simple Network Time Protocol) is used to synchronize your camera time with the networked computer systems. Function Description GMT (Greenwich Mean T ime) Once users choose the time z one, the net work camera will adjust the local area time of the system automatically . Server Name Simply use the default SNTP server (For example[...]

  • Page 20

    17 Function Description Server Enter the SMTP server address provided from your e-mail system supplier . Port Enter the port number provided from your e- mail sy stem supplier . If this colu mn is left blank, the e-mail server will use port 25 to send e-m ails. Mail From Enter the entire mail address to ens ure e-mails will not be blocked by SMTP .[...]

  • Page 21

    18 When this function is activated, the other PC within the same domain as this camera will be able to search this camera in “Network Nei ghbor” with the identification name set in “Fri endly name”. Double-click it to quickly open t he web browser for camera access. For details about camera access via your web browser , please refer to “5[...]

  • Page 22

    19 Note: T o preview the changes, click “ Apply” . Item Descriptio n Backlight It is the function to adjust the image to compensat e for an area that is over powered by brightness becau se of excessive light. The image will be properl y exposed for cl earness. Select to activate (ON) or disable (OFF) this function. Note: T his function is av ai[...]

  • Page 23

    20 4.4.2 T ime Set daylight saving time and the current time. Function Description Daylight Saving S pecif y whether to use daylight saving time ( ON / OFF). If this function is enabled, set the time period (ST A RT / END), and adjust the daylight saving time in hours (ADJUST). T ime Set the current time.[...]

  • Page 24

    21 5. A CCESSING THE CAMERA VIA Y OUR WEB BRO WSER Users can also access the network camera via a web browser , such as Microsoft Internet Explorer or Mozilla Firefox. However , the web browser is only available for si ngle device access. If users want to access more than two devices through one interface, it’s reco mmended to use our supplied CM[...]

  • Page 25

    22 5.2 Control p anel overview 5.2.1 Live V iew Panel Function Icon User Lev el Descriptio n Media T ype -- Supervisor / Power User / Normal User / Guest Select the web transmission format from the drop-down list: H.264 / MPEG-4 / Motion JPEG / QuickT ime For users using Mozilla Firefox, onl y “QuickT ime” is selectable. QuickT ime is Apple Inc[...]

  • Page 26

    23 Function Icon User Lev el Descriptio n captured image. Flip Supervisor / Power User / Normal User Click to rotate the image 180 0 counterclockwise when necessary . Full Screen Supervisor / Power User / Normal User Click to display the image in full screen. 5.2.2 System Configuration Panel Click “Configuration” to enter the configuration page[...]

  • Page 27

    24 Main Menu Sub-menu Ref erence Network Net work  Remote Config  Network QoS  Remote Config  Network  QoS DDNS  Remote Config  Network  DDNS SNTP  Remote Config  Network  SNTP FTP  Remote Config  Network  FTP Mail  Remote Config  Network  MAIL Filter  Remote Config  Network  Filter UPnP ?[...]

  • Page 28

    25 6. A CCESSING THE CAMERA VIA Y OUR MOBILE PHONE 6.1 Checklist Before Using Make sure your PDA or mobile phone c onform to the follow ing requirement s: Device Make sure … WinCE-Based PDA The operating system is Windows Mobile 5.0 Packet PC / 6.0 Professional*. Windows Mobile 5.0 Smartphone / 6.0 S tandard is NOT suppo rted. J2ME MIDP2.0 is sup[...]

  • Page 29

    26 Y ou will see the following f our programs available: STEP2: Download the pr ogram as instructed:  Select “ EagleEyes (J2M E New version) ” if you’re using the J2ME-based mobile phone.  Select “ EagleEyes (For WinCE New V ersion) ” if you’re using the WinCE-Based PDA phone. STEP3: Follow the on-screen inst ructions after downlo[...]

  • Page 30

    27 APPENDIX PR ODUC T SPECIFICA TIONS ▓ Network Network Compressi on H.264 LAN Port YES LAN S peed 10/100 Based-T Ethernet Supported Protocols DDNS, PPPoE, DHCP , NTP , SNTP , TCP/IP , ICMP , SMTP , FTP , HTTP , RTP , RTSP Frame Rate NTSC:30, P AL:25 Number of Online Users 10 Security Multiple user access lev els with p assword Web manag ement (1[...]