HRP-N3 - серия источников питания с максимальной пиковой мощностью в 350% от MEAN WELL

User manual of Network Camera UD.6L0201D1919A01 (Hikvision) - 3

ПроизводительHikvision
ОписаниеNetwork Camera User Manual
Страниц / Страница165 / 3 — Regulatory Information. FCC Information. FCC compliance:
Версия5.3.0
Формат / Размер файлаPDF / 4.1 Мб
Язык документаанглийский

Regulatory Information. FCC Information. FCC compliance:

Regulatory Information FCC Information FCC compliance:

Выбираем схему BMS для заряда литий-железофосфатных (LiFePO4) аккумуляторов

Текстовая версия документа

User Manual of Network Camera FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF THIRD PARTY. IN NO EVENT WILL HIKVISION, ITS DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA OR DOCUMENTATION, IN CONNECTION WITH THE USE OF THIS PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. REGARDING TO THE PRODUCT WITH INTERNET ACCESS, THE USE OF PRODUCT SHALL BE WHOLLY AT YOUR OWN RISKS. HIKVISION SHALL NOT TAKE ANY RESPONSIBILITES FOR ABNORMAL OPERATION, PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER ATTACK, HACKER ATTACK, VIRUS INSPECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE TIMELY TECHNICAL SUPPORT IF REQUIRED. SURVEILLANCE LAWS VARY BY JURISDICTION. PLEASE CHECK ALL RELEVANT LAWS IN YOUR JURISDICTION BEFORE USING THIS PRODUCT IN ORDER TO ENSURE THAT YOUR USE CONFORMS THE APPLICABLE LAW. HIKVISION SHALL NOT BE LIABLE IN THE EVENT THAT THIS PRODUCT IS USED WITH ILLEGITIMATE PURPOSES. IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATER PREVAILS.
Regulatory Information FCC Information FCC compliance:
This equipment has been tested and found to comply with the limits for a digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance 3 Document Outline Chapter 1 System Requirement Chapter 2 Network Connection 2.1 Setting the Network Camera over the LAN 2.1.1 Wiring over the LAN 2.1.2 Activating the Camera 2.2 Setting the Network Camera over the WAN 2.2.1 Static IP Connection 2.2.2 Dynamic IP Connection Chapter 3 Access to the Network Camera 3.1 Accessing by Web Browsers 3.2 Accessing by Client Software Chapter 4 Wi-Fi Settings 4.1 Configuring Wi-Fi Connection in Manage and Ad-hoc Modes 4.2 Easy Wi-Fi Connection with WPS function 4.3 IP Property Settings for Wireless Network Connection Chapter 5 Live View 5.1 Live View Page 5.2 Starting Live View 5.3 Recording and Capturing Pictures Manually 5.4 Operating PTZ Control 5.4.1 PTZ Control Panel 5.4.2 Setting / Calling a Preset 5.4.3 Setting / Calling a Patrol Chapter 6 Network Camera Configuration 6.1 Configuring Local Parameters 6.2 Configuring Time Settings 6.3 Configuring Network Settings 6.3.1 Configuring TCP/IP Settings 6.3.2 Configuring Port Settings 6.3.3 Configuring PPPoE Settings 6.3.4 Configuring DDNS Settings 6.3.5 Configuring SNMP Settings 6.3.6 Configuring 802.1X Settings 6.3.7 Configuring QoS Settings 6.3.8 Configuring UPnP™ Settings 6.3.9 Configuring Wireless Dial Settings 6.3.10 Email Sending Triggered by Alarm 6.3.11 Configuring NAT (Network Address Translation) Settings 6.3.12 Configuring FTP Settings 6.3.13 Platform Access 6.3.14 HTTPS Settings 6.4 Configuring Video and Audio Settings 6.4.1 Configuring Video Settings 6.4.2 Configuring Audio Settings 6.4.3 Configuring ROI Encoding 6.4.4 Display Information on Stream 6.4.5 Configuring Target Cropping 6.5 Configuring Image Parameters 6.5.1 Configuring Display Settings 6.5.2 Configuring OSD Settings 6.5.3 Configuring Text Overlay Settings 6.5.4 Configuring Privacy Mask 6.5.5 Configuring Picture Overlay 6.6 Configuring and Handling Alarms 6.6.1 Configuring Motion Detection 6.6.2 Configuring Video Tampering Alarm 6.6.3 Configuring Alarm Input 6.6.4 Configuring Alarm Output 6.6.5 Handling Exception 6.6.6 Configuring Other Alarm 6.6.7 Configuring Audio Exception Detection 6.6.8 Configuring Defocus Detection 6.6.9 Configuring Scene Change Detection 6.6.10 Configuring Face Detection 6.6.11 Configuring Line Crossing Detection 6.6.12 Configuring Intrusion Detection 6.6.13 Configuring Region Entrance Detection 6.6.14 Configuring Region Exiting Detection 6.6.15 Configuring Unattended Baggage Detection 6.6.16 Configuring Object Removal Detection 6.7 VCA Configuration 6.7.1 Behavior Analysis 6.7.2 Face Capture 6.7.3 Heat Map 6.7.4 People Counting Chapter 7 Storage Settings 7.1 Configuring NAS Settings 7.2 Configuring Recording Schedule 7.3 Configuring Snapshot Settings 7.4 Configuring Lite Storage 7.5 Configuring Cloud Storage Chapter 8 Counting Chapter 9 Road Traffic Chapter 10 Playback Chapter 11 Log Searching Chapter 12 Others 12.1 Managing User Accounts 12.2 Authentication 12.3 Anonymous Visit 12.4 IP Address Filter 12.5 Security Service 12.6 Viewing Device Information 12.7 Maintenance 12.7.1 Rebooting the Camera 12.7.2 Restoring Default Settings 12.7.3 Exporting / Importing Configuration File 12.7.4 Upgrading the System 12.8 RS-232 Settings 12.9 RS-485 Settings 12.10 Service Settings Appendix Appendix 1 SADP Software Introduction Appendix 2 Port Mapping
Электронные компоненты. Бесплатная доставка по России