Installation Manual
Table Of Contents
- Chapter 1 Overview
- Chapter 2 Network Connection
- Chapter 3 Accessing to the Network Speed Dome
- Chapter 4 Basic Operations
- Chapter 5 System Configuration
- 5.1 Storage Settings
- 5.2 Basic Event Configuration
- 5.3 Smart Event Configuration
- 5.4 PTZ Configuration
- 5.4.1 Configuring Basic PTZ Parameters
- 5.4.2 Configuring PTZ Limits
- 5.4.3 Configuring Initial Position
- 5.4.4 Configuring Park Action
- 5.4.5 Configuring Privacy Mask
- 5.4.6 Configuring Scheduled Tasks
- 5.4.7 Clearing PTZ Configurations
- 5.4.8 Configuring Smart Tracking
- 5.4.9 Prioritize PTZ
- 5.4.10 Position Settings
- 5.4.11 Rapid Focus
- Chapter 6 Camera Configuration
- Appendix
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
4. Confirm the password.
5. Click OK to activate the camera and enter the live view interface.
Activation via SADP Software
SADP software is used for detecting the online device, activating the device, and resetting the
password.
Get the SADP software from the supplied disk or the official website, and install the SADP
according to the prompts. Follow the steps to activate the camera.
Steps:
1. Run the SADP software to search the online devices.
2. Check the device status from the device list, and select an inactive device.
Select inactive device.
Input and confirm
password.
Figure 2-4 SADP Interface
Note:
The SADP software supports activating the camera in batch. Refer to the user manual of
SADP software for details.
3. Create a password and input the password in the password field, and confirm the password.
For your privacy and to better protect your system against security risks, we strongly
recommend the use of strong passwords for all functions and network devices. The
password should be something of your own choosing (using a minimum of 8 characters,
including upper case letters, lower case letters, numbers and special characters) in order
to increase the security of your product.
Proper configuration of all passwords and other security settings is the responsibility of
the installer and/or end-user.
Note: