Advertisement

Quick Links

Translated from Spanish to English - www.onlinedoctranslator.com
web 5.0 network camera
Operation Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V1.0.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the web 5.0 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Dahua web 5.0

  • Page 1 Translated from Spanish to English - www.onlinedoctranslator.com web 5.0 network camera Operation Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.0...
  • Page 2 Operation Manual Foreword General This manual covers the functions, configuration, general operation and maintenance of the network camera system. Security instructions The following classified signal words with defined meaning may appear in the manual. signal words Meaning Indicates a hazard of medium or low potential which, if not CAVEAT avoided, could result in minor injury or moderate.
  • Page 3 Operation Manual ● All trademarks, registered trademarks and company names in the manual are the property of their respective owners. ● Please visit our website, contact your dealer or customer service if you have problems using the device. ● If there are uncertainties or controversies, we reserve the right of final explanation.
  • Page 4 Operation Manual Safety Warnings and Precautions important electrical safety ● All instructions for use and installation must be carried out in accordance with the electrical safety regulations of your country. ● The power supply must comply with the Safety Low Voltage (SELV) standard and supply power with a nominal voltage that meets the limited power source requirement in accordance with IEC60950-1.
  • Page 5 Operation Manual ● Carefully follow the instructions in the manual when performing any device disassembly operations; Otherwise, it may cause water leakage or poor image quality due to unprofessional disassembly. Please contact after-sales service to replace the desiccant if there is condensation mist on the lens after taking the product out of the box or if the desiccant turns green.
  • Page 6: Table Of Contents

    Operation Manual Index of contents Foreword ....................................I Important Safety Warnings and Precautions................III 1 Overview..............................1 1.1 Introduction..............................1 1.2 Network connection ............................. 1 1.3 Configuration flow............................ 1 Device initialization ..........
  • Page 7 Operation Manual 5.3.3.1 Requirements........................... 33 5.3.3.2 Maintenance..........................3. 4 5.3.3.3 Import/Export........................35 5.3.3.4 Default..........................35 5.3.4 Update ............................36 Appendix 1 Cybersecurity recommendations................... 37...
  • Page 8: I Important Safety Warnings And Precautions

    Operation Manual Overview 1.1 Introduction An IP camera (Internet Protocol camera), is a type of digital video camera that receives control data and sends image data over the Internet. They are commonly used for surveillance and do not require a local recording device, just a local area network. The IP camera is divided into single-channel camera and multi-channel camera according to the number of channels.
  • Page 9 Operation Manual Figure 1:2 setup flow configure parameters configure parameters It has started? Access basic of events Nope set direction configuration of Initialize alarm input Set the time of establish pairing main task system alarm secondary task set mail electronic assessment task Table 1:1 flow description Setting...
  • Page 10: Two Device Initialization

    Operation Manual two device initialization It is necessary to start the device for the first use. This manual is based on the operation of the web interface. You can also start the device via ConfigTool or NVR. ● To ensure the security of the device, please keep the password properly after startup and change it regularly.
  • Page 11 Operation Manual Figure 2:2 Disclaimer Step 3: Select the check boxI have read and accept the terms of the Software License Agreement and the Privacy Policy(I have read and agree to the terms of the Software License Agreement and Privacy Policy), and then clickFollowing (Next). Figure 2:3 Time zone settings Step 4: Set the time parameters, and then clickFollowing(Next).
  • Page 12 Operation Manual Figure 2:4 password settings Step 5: Set the password for the administrator account. Table 2:1 description of password settings Description Parameter Username The default username is admin. Password Password must consist of 8 to 32 non-empty characters and contain at least two types of characters including uppercase, lowercase, numbers, and special characters (excluding ' "...
  • Page 13 Operation Manual Figure 2–5 P2P Scan the QR code on the actual screen.
  • Page 14: Access

    Operation Manual Access 3.1 Sign in to the device This section explains how to log in and out of the web interface. This section takes the Chrome browser as an example. ● You must start the camera before you can log in to the web interface. To know the details, ".
  • Page 15: Reset Password

    Operation Manual To log in for the first time, install the plugin by following the instructions on the screen. Figure 3–2 Main Screen ● Direct: view the monitoring image in real time. ● AI: Set the AI features of the camera. ●...
  • Page 16 Operation Manual Figure 3–3 Login Step 2: Click onForgot password?(Forgot password?) to reset the password via the email address that was set at startup. Figure 3–4 Login...
  • Page 17: Straight

    Operation Manual Straight This section introduces the interface design and function configuration. 4.1 Live interface Sign in or click the tabLive(live). The interface may vary according to different models, and the actual interface shall prevail. Figure 4:1 live (single channel) Figure 4:2 live (multi-channel) Table 4:1 description of the function bar Description...
  • Page 18 Operation Manual Description Function Adjustment operations in live viewing. image adjustment live viewing Display the monitoring image in real time. Live View Function Functions and operations in live viewing. 4.2 Encryption Settings Click on and then select the stream as needed. Figure 4:3 code bar ●...
  • Page 19: Config

    Operation Manual config. This section introduces the basic settings of the camera, including Network, Event, and System settings. 5.1 Network This section introduces the network settings. 5.1.1 TCP/IP You can set the IP address and DNS (Domain Name System) server and so on according to the network planning.
  • Page 20 Operation Manual Figure 5–1 TCP/IP Step 2: Configure the TCP/IP parameters. Table 5:1 description of TCP/IP parameters Description Parameter Enter the host name; the maximum length is 15 hostname characters.
  • Page 21 Operation Manual Description Parameter Click on to enable ARP/Ping and configure the service of IP address. Obtain the MAC address of the camera so that you can change and configure the IP address of the device with the ARP/ping command. This feature is enabled by default.
  • Page 22: Port

    Operation Manual Description Parameter The way the camera gets the IP: ● static set theIP adress(IP address), thesubnet mask(Subnet Mask) and theDefault Gateway(Default Gateway) manually, and then clickSave(save); The login interface Mode with the configured IP address will appear. ● DHCP When there is a DHCP server on the network, selectDHCPand the camera will get the IP address automatically.
  • Page 23 Operation Manual Figure 5:2 port Step 2: Configure the port parameters. ● 0–1024, 1900, 3800, 5000, 5050, 9999, 37776, 37780–37880, 39999, 42323 are occupied for specific uses. ● Do not use the same value of any other port during port configuration. Table 5:2 port parameter description Description Parameter...
  • Page 24: Email

    Operation Manual Description Parameter ● Streaming protocol port, and the default is 554. If you play the live view with QuickTime, VLC, or a Blackberry smartphone, the following URL format is available. ● When the URL format requires RTSP, you must specify the channel number and bit rate in the URL, and also the username and password if required.
  • Page 25 Operation Manual Figure 5:3 email Step 2: Click on to enable the function. Step 3: Configure email parameters Table 5:3 description of email parameters Description Parameter SMTP server SMTP server address The port number of the SMTP Port server. For details, see Username The SMTP server account.
  • Page 26: Basic Service

    Operation Manual Description Parameter ● Email address of the recipient. Supports 3 addresses at most. ● After entering the recipient's email address, the button will Addressee appear.Try(Test). Click on Try(Test) to test if emails can be sent and received correctly. The system sends a test email to verify that the connection has been configured correctly.
  • Page 27: Event

    Operation Manual Figure 5:4 basic service Step 2: Enable the basic service based on actual needs. Table 5:5 description of basic service parameters Description Function You can enable SSH authentication to manage security. Please enable this function, and then when multiple Search users are watching the video image of the device multicast/broadcast...
  • Page 28: Alarm Input Configuration

    Operation Manual Figure 5:5 alarm event configuration Establish configuration of Start linking of To finalize alarm input alarm add schedule recording linkage Linkage of snapshots main task secondary task output linking alarm mail linking electronic 5.2.1Alarm input configuration When the device connected to the alarm input port triggers an alarm, the system performs the set alarm linkage.
  • Page 29: Establish Alarm Linkage

    Operation Manual Figure 5–6 Alarm Linkage Step 3: Select an alarm input port and a sensor type. ● Sensor type: NO or NC. ● Anti-jitter: Only record an alarm event during the anti-dither period. Step 4: Select the schedule and arming periods and the alarm linkage action. For details, see "...
  • Page 30 Operation Manual Figure 5–7 Alarm Linkage 5.2.2.1Add schedule Set arming periods. The system only performs the corresponding binding action in the configured period. Step 1: Click onadd schedule(Add Schedule) next toProgramming (Schedule).
  • Page 31: Recording Linking

    Operation Manual Figure 5:8 programming Step 2: Click and drag the left mouse button on the timeline to set arming periods. Alarms will go off at the time period in green on the timeline. ● Click onCopy(Copy) next to a day, and select the days you want to copy in the request interface;...
  • Page 32: Linking Snapshots

    Operation Manual set alarm linkage and recording delay. Once thepost recording(Post-Record), alarm recording continues for a long period after the alarm ends. Figure 5:9 recording link 5.2.2.3 Linking Snapshots Once the snapshot linkage is set, the system can trigger the alarm and automatically take photos when an alarm is triggered.
  • Page 33: Email Linking

    Operation Manual Figure 5:11 alarm output link 5.2.2.5 Email linking When an alarm is triggered, the system will automatically send an email to users. Email binding takes effect only when SMTP is configured. For details, see " 5.1.3 Email." Figure 5:12 email link 5.3 System This section introduces the system settings, including general, date and time, account, security, PTZ setting, default, import/export, remote, auto maintenance, and update.
  • Page 34: Date And Time

    Operation Manual Table 5:6 description of general parameters Description Parameter Name Enter the device name Select the video standard fromPALYNTSC. video standard Step 3: click onApply(apply). 5.3.1.2 Date and time You can set the date and time format, time zone, current time, DST (summer time), or NTP server.
  • Page 35: Account

    Operation Manual Description Parameter ● Manual configuration:set the parameters manually. ● NTP:By selecting NTP, the system synchronizes the time with Hour the Internet server in real time. You can also enter the IP address, time zone, port and interval of a PC with NTP server to use NTP.
  • Page 36 Operation Manual > System(System) >Bill> (Account)User(user). Step 1: select Figure 5:15 user Step 2: click onAdd(add).
  • Page 37 Operation Manual Figure 5:16 add user (system) Figure 5:17 add user (login restricted) Step 3: Set user parameters Table 5:8 description of user parameters (1) Description Parameter Unique identification of the user. You cannot use the existing Username username. Password Enter the password and confirm it again.
  • Page 38: Reset Password

    Operation Manual Description Parameter Password must consist of 8 to 32 non-empty characters and contain at least two types of characters including uppercase, Confirm Password lowercase, numbers, and special characters (excluding ``&'). The group to which the users belong. Each group has Cluster different permissions.
  • Page 39: Onvif User

    Operation Manual > System(System) >Bill> (Account)User(user). Step 1: select Figure 5:18 user Step 2: Click besideEnable(Enable) onRestore password (Password Reset). If the function is not enabled, you can only reset the password by resetting the camera. Step 3: Enter the reserved email address. Step 4: click onApply(apply). 5.3.2.2 ONVIF user You can add, remove ONVIF users and change their passwords.
  • Page 40: Managers

    Operation Manual Figure 5:20 add ONVIF user Step 3: Set user parameters Table 5:9 description of ONVIF user parameters Description Parameter Unique identification of the user. You cannot use the Username existing username. Password Enter the password and confirm it again. The password must consist of 8 to 32 non-empty characters and contain at least two types of characters including uppercase, Confirm Password...
  • Page 41: Maintenance

    Operation Manual ● View and analyze system logs, and fix errors in a timely manner. ● Back up your system settings regularly. ● Reboot the device and remove old files regularly. ● Update the firmware accordingly. 5.3.3.2 Maintenance You can manually reboot the system and set the time for automatic reboot, as well as automatic deletion of old files.
  • Page 42: Import/Export

    Operation Manual 5.3.3.3Import/Export ● Export the system configuration file to back up your system configuration. ● Import system configuration file to perform quick configuration or recover system configuration. Step 1: Select > System(System)>Bill(Account) > Import/Export(Import/Export). Figure 5–22 Import/Export Step 2: Import and export. ●...
  • Page 43: Update

    Operation Manual Figure 5:23 default 5.3.4Update Updating to the latest version may improve camera features and stability. If the wrong update file was used, please reboot the device; otherwise, some functions may not work properly. Step 1: Select > System(System) >To update(Upgrade). Figure :24 update Step 2: Click onReview(Browse) and then upload the update file.
  • Page 44: Appendix 1 Cybersecurity Recommendations

    Operation Manual Appendix 1 Recommendations for cybersecurity Cybersecurity is more than just a buzzword – it is something that pertains to every device that is connected to the Internet. IP video surveillance is not immune to cyber risks, but taking basic steps to protect and harden networks and network-connected devices will make them less susceptible to attack.
  • Page 45 Operation Manual We recommend that you keep it enabled to ensure account security. If an attacker tries to log in with the wrong password multiple times, the corresponding account and source IP address will be locked. Change HTTP and other default service ports We suggest that you change the default HTTP and other service ports to any number series between 1024 and 65535, reducing the risk that outsiders can guess which ports you are using.
  • Page 46 Operation Manual ● Disable the port mapping feature of the router to prevent direct access to intranet devices from an external network. ● Partition and isolate the network according to the actual needs of the network. If there are no communication requirements between two subnets, we suggest that you use VLAN, network GAP and other technologies to partition the network, so as to achieve the effect of network isolation.
  • Page 47 HELPING CREATE A SAFER SOCIETY AND A MODE OF SMARTER LIVING ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. Address: No.1199 Bin'an Road, Binjiang District, Hangzhou, P. R. China | Website: www.dahuasecurity.com | Zip Code: 310053 Email: overseas@dahuatech.com | Fax: +86-571-87688815 | Phone:...

Table of Contents

Save PDF