Page 1
Network Panoramic Cameras XX314-00-01 Vicon Industries Inc. Vicon Industries Inc. does not warrant that the functions contained in this equipment will Tel: 631-952-2288) Fax: 631-951-2288 meet your requirements or that the operation will be entirely error free or perform precisely as Toll Free: 800-645-9116 described in the documentation.
Page 2
WARNING TO REDUCE THE RISK OF FIRE OR ELECTRIC SHOCK, DO NOT EXPOSE THIS PRODUCT TO RAIN OR MOISTURE. DO NOT INSERT ANY METALLIC OBJECT THROUGH THE VENTILATION GRILLS OR OTHER OPENNINGS ON THE EQUIPMENT. CAUTION CAUTION RISK OF ELECTRIC SHOCK DO NOT OPEN WARNING: TO REDUCE THE RISK OF ELECTRIC SHOCK, DO NOT REMOVE COVER (OR BACK).
Page 3
FCC COMPLIANCE STATEMENT This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful inter- ference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
Page 4
IMPORTANT SAFETY INSTRUCTIONS Read these instructions. Keep these instructions. Heed all warnings. Follow all instructions. Do not use this apparatus near water. Clean only with dry cloth. Do not block any ventilation openings. Install in accordance with the manufacturer’s instructions. Do not install near any heat sources such as radiators, heat registers, stoves, or other apparatus (including amplifiers) that produce heat.
Contents 1 Introduction 1.1 Components 1.2 Key Features 2 Installation 2.1 Overview 2.2 Connection 2.3 Resetting to the factory default settings 2.4 Network Connection & IP assignment 3 Operation 3.1 Access from a browser 3.2 Access from the internet 3.3 Setting the admin password over a secure connection 3.4 Live View Page 3.5 Playback 3.6 Network Camera Setup...
1 Introduction The V8360W panoramic camera is a fisheye 360° IP dome camera that is state-of-the-art in visual quality and supports a suite of unique and impressive features. This 360-degree dome camera can be mounted on a ceiling or wall where it can truly make use of the incredible range of its fisheye lens to capture a wide view;...
1.2 Key Features • Brilliant video quality The network camera offers the highly efficient H.265 or H.264 video compression, which drastically reduces bandwidth and storage requirements without compromising image quality. Motion JPEG is also supported for increased flexibility. • Quad streams The network camera can deliver f o u r video streams simultaneously using H.264/H.265 and Motion JPEG.
2 Installation For the operation of the n etwork camera, it is necessary to connect a network cable for data transmission, power connection from power adapter. Depending on operation methods, it is possible to connect an alarm cable additionally. 2.1 Overview •...
Page 9
Item Description 12 VDC 12 VDC Power input (2-pin terminal block) Ethernet, RJ-45 port compatible RJ-45 with 10/100Mbps PoE Modular Jack CVBS Analog test video out (2-pin connector) ① ② ③ ④ ⑤ ⑥ ⑦ ⑧ ⑨ ⑩ ① NC: No Connection ②...
Page 10
• Installing Camera 2. Remove the rubber grommet from the 1. Open the top cover using L-wrench cable access hole. Drill a hole in the provided. rubber grommet and insert a UTP (Ethernet) cable through it. 3. Assemble the RJ-45 connector and UTP cable using a crimping tool. Pin Color Orange-White Orange...
Page 11
5. Secure the rubber grommet back in hole (①) to assure a water-tight seal. 6. Select an appropriate mounting location for the camera. When surface mounting, be sure to select a location that is smooth. Orient the cut-out on the camera base downward to assure a watertight installation.
Page 12
9) Using a surface type conduit box of (V932EZ-BOX-2). Fix the conduit box to the ceiling using anchor screw. Be sure to use the supplied rubber O-ring on the screws on the inside of the base plate to ensure the base is waterproofed. Assemble the gasket and then attach the dome housing using the supplied 4 mm machine screws.
Page 13
10) Using a ceiling type conduit box of (V670-PMB-1). Fix the conduit box to the ceiling using pipe. Note: Pipe thread specification: Female PF 1”. Assemble the gasket and then attach the dome housing using the supplied 4 mm machine screws. V670-PMB-1...
2.2 Connections • Micro SD memory card Insert an SD card into the slot on the bottom of the dome. See figure below. • Connecting to the RJ-45 Connect a standard RJ-45 cable to the network port of the network camera. Generally a cross-over cable is used for directly connection to PC, while a direct cable is used for connection to a hub.
2.3 Resetting to the factory default settings To reset the network camera to the original factory settings, go to the Setup > System > Maintenance web page (described in “System > Maintenance” of User Manual) or use the Reset button on the network camera inside the bottom cap. •...
IP address to your products, or reset the product to the factory default settings and then perform the installation again. The utility can be found on the Vicon website www.vicon-security.com, on the Software Downloads page for Vicon cameras.
3 Operation The network camera can be used with Windows operating system and browsers. The recommended browsers are Explorer®, Safari®, Firefox®, Opera® and Google® Chrome® with Windows. NOTE: Internet Explorer is required for full web interface functionality. To view streaming video in Microsoft®...
3.2 Access from the internet Once connected, the network camera is accessible on your local network (LAN). To access the network camera from the Internet you must configure your broadband router to allow incoming data traffic to the network camera. To do this, enable the NAT traversal feature, which will attempt to automatically configure the router to allow access to the network cam- era.
3.4 Live View Page The Live View page provides several screen modes. Select the most suitable mode in accordance with your PC specifications and monitoring purposes. 1) General controls Live View Page Playback Page Setup Page Help Page The video drop-down list allows you to select a customized or preprogrammed video stream on the Live View page.
Page 20
Use the Speaker icon scale to control the volume of the speakers. Use the Microphone icon scale to control the volume of the microphone. 3) Video Streams The network camera provides several images and video stream formats. Your requirements and the properties of your network will determine the type you use.
Page 21
• Fisheye View Mode: This camera provides the following five filter options, one toggle filter and choice among 5 filters. Menu View Description Two horizontal dewarped images for ceiling Double Panorama mount. User can change FoV by dragging Ceiling mouse on the image, which pans image. Panorama Wall Single dewarped image for wall mount.
3.5 Playback The Playback window contains a list of recordings made to the memory card. It shows each recording’s start time, length, the event type used to start the recording, calendar and time slice bar indicates if the recording is existed or not. The description of playback window follows.
Page 23
3) Time Chart Display an hour-based search screen for the chosen date. If there is recording data, a blue section will be displayed on a 24-hour basis. If you select a particular hour in the chart, a yellow square on the hour will be displayed. 4) Speaker Control Bar Use this scale to control the volume of the speakers.
3.6 Network Camera Setup This section describes how to configure the network camera. Administrator has unrestricted access to all the Setup tools, whereas Operators have access to the settings of Basic Configuration, which are Live View, Video & Image, Audio and Event. You can configure the network camera by clicking Setup either in the first connection page or the top second-right button of the Live View page.
Page 25
1) Users User access control is enabled by default. The administrator can set up other users, by giving user names and passwords. It is also possible to allow anonymous viewer login, which means that anybody may access the Live View page, as described below: The user list displays the authorized users and user groups (levels): User Group Authority...
Page 26
2) Network The network camera supports both IP version 4 and IP version 6. Both versions may be enabled simultaneously, and at least one version must always be enabled. When using IPv4, the IP address for the network camera can be set automatically via DHCP, or a static IP address can be set manually.
Page 27
3) Video & Image User can setup and change settings of individual video stream in this page. Please refer to “Video & Image > Basic” for more details about Video & Image setup.
Page 28
4) Audio The network camera can transmit audio to other clients using an external microphone and can play audio received from other clients by attaching a speaker. User can setup and change setting of Audio in this page. Please refer to “Audio” for more details about Audio setup. 5) Date &...
3.6.2 Video & Image 1) Basic • Sensor Setting: – Capture mode: User can select sensor capture mode resolution/fps and NTSC/PAL (some models are fixed to NTSC or PAL). • Stream 1 Setting: – Codec: The codec types supported in Stream 1 is H.264 and H.265. Select the radio button for the type of your choice.
Page 30
For the purpose of general monitoring, please do not change a basic value. Such act may cause a problem to the system performance. Vicon recommends that GOP be the same as the fps. •...
Page 31
2) Privacy Masking The privacy masking function allows selected parts of the video image being transmitted to be masked from view. Up to eight privacy masks can be set. NOTE: The masking is displayed only when the “Enable privacy masking” box is selected. The privacy masks are configured by Mask windows.
Page 32
4) Hi-Stream The Hi-Stream function allows reduction of bandwidth by using compression and frame rate control. • Enable ROI: Select “Enable ROI” to activate Hi-Stream function. Video mode will be fixed to CVBR. Create region: Click the right button of mouse and select New ROI Area. Click the left button of mouse and drag to make window Delete Region: Click the right button of mouse and select the region.
Page 33
5) Camera Setup In this page, user can setup Fisheye Capture Mode, Exposure Control, White Balance Mode/ Image Appearance, Enhance Control, Day & Night Control and IR Control.
Page 34
• Video Preview: User can check the setting via video preview pop-up window. • Fisheye Capture Mode – Enable Fisheye Capture Mode: Check to enable and set fisheye capture mode. – Mount Type: User can set the capture mode depending on the mount type. •...
Page 35
– Max. shutter: Users can set the limit for slow shutter speeds used in dark environments. – Min. shutter: Users can set the limit for fast shutter speeds used in bright environments. • Image Appearance This provides access to the advanced image settings for the network camera. –...
Page 36
– Enable defog: Check this box to activate the defog function. – Metering Mode: Users can change the metering mode. * Metering Mode: Method of measuring the intensity of the light hitting and reflected by a subject in order to determine the exposure required. •...
Page 37
6) OSD This camera provides two OSDs (on screen display) for each stream, title and date & time. User can drag green “OSD Title” and “Date & Time” to the desired position and check in preview window. • Video Preview: User can check the position of OSD on actual video via preview pop-up window.
3.6.3 Audio The network camera can transmit audio to other clients using an external microphone and can play audio received from other clients by attaching a speaker. The Setup page has an additional menu item called Audio, which allows different audio configurations, such as full duplex and simplex. •...
– Output volume: If the sound from the speaker is too low or high it is possible to adjust the output gain for the active speaker attached to the network camera. – Mute: User can disable the output audio transmission by checking the box. When the settings are complete, click Save button to save the settings, or click Reset button to clear all of the information you entered without saving it.
Page 40
∇ Alarm In This camera provides 1 Alarm In port and user can set the port. The Port can be given as Normally Open or Normally Close state, and its Normal state can be configured. In order to use the alarm port, first check the “Enable alarm port 1.”...
Page 41
∇ Manual Trigger This option makes use of the manual trigger button provided on the Live View page, which is used to start or stop the event type manually. Alternatively, the event can be triggered via the product’s API (Application Programming Interface). Select “Enable manual trigger”...
Page 42
∇ Motion Motion detection is used to generate an alarm whenever movement occurs (or stops) in the video image. This option makes use of the motion detection function with 16 programmable areas, 8 Include and Exclude zones each. Clicking the right mouse button on the preview window shows selection pop-up of New Motion, New Mask, Select, Delete, and Freeze.
Page 43
– ID: Identification number generated in the order of creation, Include 1-8, Exclude 9-16. – Name: User definable zone name. – Type: Shows zone type and cannot be changed. – Threshold: Determines the amount of change in the zone that will trigger event (percentage, 1-100);...
Page 44
▽ Museum Search Museum Search is used to find video where a defined amount of change in a region of interest is detected. The amount of change in a scene’s region of interest that will be searched for is defined using the Threshold and Sensitivity, as described below.
Page 45
∇ Network Loss This is used to trigger an event every time the network connection fails. Select “Enable network loss” to activate the Network Loss event. Select a dwell time for how long the event will last from the point of detection. When the settings are complete, click Save button to save the settings, or click Reset button to clear all of the information you entered without saving it.
Page 46
∇ AIHM AIHM (Advanced Intelligent Health Monitoring) triggers an event when the camera failed to record or could not be formatted. It is a service that provides Health Information about the camera. The AIHM event alarm trigger on Event-In makes running the feature of the Event-Out that connected with AHIM by Event-Map.
Page 47
∇ Time Trigger Time Trigger is used to set alarms at specific time. User can set up to four time triggers and each time trigger can be set to specific date in the calendar, every day, day of the week, or date of every month.
Page 48
Click the “Enable video content analysis” check box. NOTE: The VA function is limited to the events that can be used depending on the camera type. Both the 6 MP and 12 MP models of the V8360W offer Advanced Type analytics.
Page 49
Standard Type: Intelligent Motion Detection, Intrusion Detection, Tampering Advanced Type: Intelligent Motion, Intrusion Detection, Tampering, Line Cross/Counting, Loitering, Object Left/Removed. Wrong Direction, Crowd Detection. Includes Human/Vehicle classification. • View Rule: In setting VA Event, users can select events to be displayed in Video Preview window.
Page 50
object. High Some scenes contain To minimize the Users can ignore the amount of large amounts of noise, noise, reducing the noise in the image and noise in which can have an sensitivity will only still detect the object in image undesirable effect on detect visible...
Page 51
Select Event (default: None). When Event is selected, a menu for setting Rule Name and Event will be displayed. Users can set Event in Video Preview with on/off toggle switch. Enable the VA type to allow settings. NOTE: The number of Detection Rule differs depending on camera type. Standard Type: 3 Advanced Type: 8 •...
Page 52
2. Enter the Rule Name. Loitering generates an event if an object enters a set area and walks or stays for more than the set time. 3. Enable the on/off toggle switch to On and set the Loitering area in Video Preview window.
Page 53
• Exclusive Area: User can set up an area to be excluded from Object detection. This will reduce false alarms and CPU usage of the camera by cutting down unnecessary operation. Please note that Exclusive Area only effects Object-based events. Motion and Tampering event will operate regardless of Exclusive Area setting.
Page 54
Horizontal should only be used for home security. Input Resolution: The resolution of the captured image used for analytics processing. Process Quality (Resolution): The resolution used when the analytics is processing (scale down/up) the input source form the camera. 320x180: Tampering; 320x240: Intelligent Motion, Intrusion, Loitering, Line Detector, Classification, Object Left/Removed, Wrong Direction, Crowd Detection.
Page 55
2) Event Out ∇ SMTP (E-Mail) The network camera can be configured to send event and error email messages via SMTP (Simple Mail Transfer Protocol). • SMTP (E-Mail) Setting: Select “Enable” to activate the SMTP operation. – Sender: Enter an email address to be used as the sender for all messages sent by the network camera.
Page 56
• SMTP (E-Mail) Test: User can check the SMTP setting via a sample email. – Receiver: Enter an email address and click the Test button to test that the mail servers are functioning and that the email address is valid. When the settings are complete, click Save button to save the settings, or click Reset button to clear all of the information you entered without saving it.
Page 57
Anonymous login: Check the box if you want to use anonymous login method and the server supports it. • Enable time folder: Create the folder in the FTP Server. Time type: The name of the folder where the uploaded image will be saved can be set as the date, time, and minute of the event.
Page 58
∇ Audio Alert When the network camera detects an event, it can output a predefined audio data to external speaker. Check the “Enable audio alert” box to enable the service. • Audio Alert Setting To use the audio alert with the network camera, an audio data file made by user must be uploaded from your PC.
Page 59
∇ Record When the network camera detects an event, it can record the video stream onto the Micro SD Memory (not supplied) or NAS (Network Attached Device) as a storage device. Check the “Enable Record” box to enable the service. •...
Page 60
• Device Setting Select the device type to be recorded in the drop-down list. The screen changes according to selection. – SD: Mounted SD card. – CIFS: A file format for a NAS device. – NFS: A file format for a NAS device. NOTE 1: Common Internet File System (CIFS) is a remote file access protocol that forms the basis for Windows file sharing, network printing, and various other network services.
Page 61
∇ XML Notification When the network camera detects an event, Notification server is used to receive notification messages as a type of XML data format. Check the box to enable the service. • XML Notification Setting: – Notification server URL: The network address to the server and the script that will handle the request.
Page 62
∇ Notification Server When the network camera detects an event, the Notification Server is used to receive uploaded image files and/or notification messages. Check the box to enable the service. • Notification Server Setting: – Type: User can select message transmission type among HTTP, HTTPS, TCP and UTP. –...
Page 63
∇ Hi-Link When the network camera detects an event, the Hi-Link is used to operate preset event of PTZ camera • Enable Hi-Link Click the check box Hi-Link Enable to set the status (enable or disable) of Hi-Link. • Hi-Link List Setting. To add a new camera, click the Add button.
Page 64
• Name The maximum length of the Camera name is 14 characters. It must start with an alphabet letter (A-Z, a-z); the other characters can be alpha-numeric or underscore. • Address PTZ camera IP address to operate preset event. For example: 192.168.12.244 •...
Page 65
3) Event Map The event map allows you to change the settings and establish a schedule for each event trigger from the network camera; up to a max. 15 events can be registered. Click the Add button to make a new event map; a popup window displays as below. To change an existing event, select that event and click the Modify button;...
Page 66
• General: Enter the name for a new event map. • Event In: Select an event type in the drop-down list. • Event Out: – E-mail: Select the email addresses you want to notify via email that an event has occurred.
Page 67
– Audio Alert: Select an Audio Alert file as the Network Transmitter output when audio alert event triggered. The Audio Alert file must first be configured on the Event In page. – XML Notification: It sends XML messages to a Notification server that listens for these. The destination server must first be configured on the Event In page.
3.6.5 System 1) Information You can enter the system information. This page is very useful when you require device information after installation. • Device Name Configuration: Enter the device name. • Location Configuration: Enter the location information. You can enter up to four locations. When the settings are complete, click Save button to save the settings, or click Reset button to clear all of the information you entered without saving it.
Page 69
2) Security ∇ Users User access control is enabled by default when the administrator sets the root password on first access. New users are authorized with user names and passwords, or the administrator can choose to allow anonymous viewer login to the Live View page, as described below: •...
Page 70
∇ HTTPS For greater security, the network camera can be configured to use HTTPS [Hypertext Transfer Protocol over SSL (Secure Socket Layer)]. Then all communication that would otherwise go via HTTP will instead go via an encrypted HTTPS connection. • HTTPS Connection Policy: Choose the form of connection you wish to use from the drop- down list for the administrator, Operator and Viewer to enable HTTPS connection (set to HTTP by default).
Page 71
∇ IP Filtering Checking the Enable IP address filtering box enables the IP address filtering function. Up to 256 IP address entries may be specified (a single entry can contain multiple IP addresses). Click the Add button to add new filtered addresses. When the IP address filter is enabled, addresses added to the list are set as allowed or denied addresses.
Page 72
∇ OpenVPN OpenVPN is a Virtual Private Network using OpenSSL authentication. User can set the camera in either Server mode or Client mode. • OpenVPN Server Mode Checking the “Enable openVPN” box activates mode selection buttons. Choose Server mode; the Server Mode Configuration fields appear so Server Mode Settings can be configured.
Page 73
• OpenVPN Client Mode Checking the “Enable openVPN” box activates mode selection buttons. Choose Client mode; the Client Mode Configuration f i e l d s appear so Client Mode Settings can be configured. In Client Mode Configuration, setup Server URL, Protocol type, Port number, LZO usage and Renegotiation time.
Page 74
3) Date & Time • Current Server Time This displays the current date and time (24h clock). The time can be displayed in 12h clock format (see below). • New Server Time – Time zone Select your time zone from the drop-down list. If you want the server clock to automatically adjust for daylight savings time, check the box “Automatically adjust for daylight saving time changes”.
Page 75
4) Network ∇ Basic • IP Address Configuration: – Obtain IP address via DHCP: Dynamic Host Configuration Protocol (DHCP) is a protocol that lets network administrators centrally manage and automate the assignment of IP addresses on a network. DHCP is enabled by default. Although a DHCP server is mostly used to set an IP address dynamically, it is also possible to use it to set a static, known IP address for a particular MAC address.
Page 76
• DNS Configuration DNS (Domain Name Service) provides the translation of host names to IP addresses on your network. Check the radio button to obtain DNS server via DHCP or set the DNS server. – Obtain DNS Server via DHCP: Automatically use the DNS server settings provided by the DHCP server.
Page 77
∇ DDNS • Internet DDNS (Dynamic Domain Name Service) When using the high-speed Internet with the telephone or cable network, users can operate the network camera on the floating IP environment in which IPs are changed at every access. Users should receive an account and password by visiting a DDNS service like http://www.dyndns.com/.
Page 78
∇ RTP Create a setting for sending and receiving an audio or video on a real-time basis. These settings are the IP address, port number, and Time-To-Live value (TTL) to use for the media stream(s) in multicast H.264 format. Only certain IP addresses and port numbers should be used for multicast streams.
Page 79
– RTP TTL: Enter a value between 1 and 255. If a network status is smooth, enter a lower value. However, if a network status is poor, enter a higher value. When there are many network cameras or users, a higher value may cause a heavy load to the network. Consult with a network manager for detailed information.
Page 80
∇ QoS Quality of Service (QoS) provides the means to guarantee a certain level of a specified resource to selected traffic on a network. Quality can be defined as a maintained level of bandwidth, low latency, and no packet losses. The main benefits of a QoS-aware network are: The ability to prioritize traffic and thus allow critical flows to be served before flows with lesser priority.
Page 81
– Maximum bandwidth: When sharing other network programs or equipment, it is possible to set a limitation on the maximum bandwidth in the unit of Mbit/s. – Priority: When the maximum bandwidth is exceeded, prioritize the data to be reduced. When the settings are complete, click Save button to save the settings, or click Reset button to clear all of the information you entered without saving it.
Page 82
∇ Zeroconf Zero configuration networking (zeroconf) is a set of techniques that automatically creates a usable Internet Protocol (IP) network without manual operator intervention or special configuration servers. Zero configuration networking allows devices such as computers and printers to connect to a network automatically.
Page 83
∇ Bonjour The network camera includes support for Bonjour. When enabled, the network camera is automatically detected by operating systems and clients that support this protocol. Click the check box to enable Bonjour. Enter a name in the Friendly name field. NOTE: Also known as zero-configuration networking, Bonjour enables devices to automatically discover each other on a network, without having to enter IP addresses or configure DNS servers.
Page 84
5) Language Select a user language. The language choices are English, Korean, French, German, Russian and Chinese. When the settings are complete, click Save button to save the settings, or click Reset button to clear all of the information you entered without saving it.
Page 85
6) Maintenance • Maintenance: – Restart: The unit is restarted without changing any of the settings. Use this method if the unit is not behaving as expected. – Reset: The unit is restarted and most current settings are reset to factory default values.
Page 86
7) Support The support page provides valuable information on troubleshooting and contact information, should you require technical assistance. • Logs: The network camera supports system and event log information. Click the Log Search button to search the Access, Event, Setup or Control log data. •...
Page 87
• Health Check: – System Check: Click the System Check button to get the important information about the cameras system resources. The pop-up window below displays. – Media Check: Click the Media Check button to get the information about the cameras video and audio stream.
3.7 Help The Help information window will be provided as a popup window so that users can open and read it without needing to log-in. It will offer a description of the setting and Help page so that users can manipulate the network camera without a reference to the manual.
A Appendix Troubleshooting Troubleshooting if problems occur, verify the installation of the network camera with the instructions in this manual and with other operating equipment. Isolate the problem to the specific piece of equipment in the system and refer to the equipment manual for further information. Problems/Symptoms Possible Causes or Corrective Actions The camera cannot be...
Alarm Connection The following connection diagram gives an example of how to connect a network camera. Preventive Maintenance Preventive maintenance allows detection and correction of minor that faults before they become serious and cause equipment failure. Every three-month, perform the following maintenance. Inspect all connection cables for deterioration or other damage.
System Requirement for Web Browser Item Recommended Minimum Microsoft® Windows 10 Microsoft® Windows 7(x86, x64) (Home, Professional) (Home Premium) intel® Core™ i5-6500 intel® Core™ i3-6100 8GB or Higher 4GB or Higher NVIDIA GeForce GTX 960 or NVIDIA GeForce GTX 670 or Radeon AMD Radeon R9 280X HD 7970 Gigabit Ethernet...
Product Specification NETWORK CAMERA Model 4K Fisheye Fixed 1.29mm, F2.4 Lens 180°(H) Angle of View 1/1.7” Sony STARVIS CMOS Image Sensor Color: 0.09 Lux @F2.4 (40IRE) Min. Illumination BW: 0 Lux (IR LED On) Progressive Scan Scanning Mode True WDR Wide Dynamic Range True D/N (Auto, Day, Night) Day and Night Mode...
Page 93
Security Multi User Authority, IP Filtering, HTTPS, SSL Network Time Sync NTP Server, Synchronized Computer, Manual Software Reset Restart, Reset, Factory Default Hardware Factory Reset Auto Recovery Backup, Restore Remote Upgrade Web Browsing (IE, Chrome, Safari, Firefox), SmartManager SD Recording Mode Event, Continuous NETWORK TCP/IP, UDP, IPv4/v6, HTTP, HTTPS, QoS, FTP, UPnP, RTP, RTSP,...
Need help?
Do you have a question about the V8360W and is the answer not in the manual?
Questions and answers