Safety Instructions - Eneo IND-58F0028MTLA Quick Installation Manual

Network camera, ultra low light, 3840x2160, day/night, wdr, ai, 2,8mm, 12vdc, poe, ip67
Table of Contents

Advertisement

Available languages

Available languages

SAFETY INSTRUCTIONS

Read the safety instructions and the operating instructions carefully before installing the
product. Depending on the product type, individual points may be omitted.
Mounting & Installation
• Ensure that the intended mounting location is suitable for the respective product (e.g. in terms of weight).
• Securely fasten the products to the locations and surfaces recommended by the manufacturer to ensure
stability and safety.
• Ensure that the products are weatherproof when installed outdoors, e.g. protect cameras from direct sunlight or
extreme temperatures.
• Make sure that any ventilation slots are not blocked to ensure sufficient air circulation and cooling.
• Make sure that cameras, switches, etc. are installed with sufficient safety distance to flammable materials, power
sources, running water, etc.
• Assembly, commissioning and maintenance may only be carried out by authorized specialist personnel in
compliance with the relevant standards and guidelines.
Power supply & wiring
• To ensure a safe power supply, use only power supplies and cables recommended by the manufacturer.
• Make sure that the cables are properly routed and protected from tampering and damage (e.g. kinking) to avoid
power failures or short circuits (e.g. due to moisture ingress).
• Make sure that the cables are not routed through doors, windows or other moving parts to avoid damage and
tripping hazards.
• To disconnect the system from the power supply, pull the cable only by the plug and never directly by the cable.
• When shortening flexible connection cables, use wire end ferrules.
Security
• Use strong passwords for all cameras and devices to prevent unauthorized access.
• Keep device firmware up to date to minimize security vulnerabilities.
• Protect (remote) access to the devices using secure methods such as encrypted connections or VPN.
10

Advertisement

Chapters

Table of Contents
loading

Table of Contents