User's Manual
Table Of Contents
- Legal Information
- Regulatory Information
- Safety Instruction
- Available Model
- Chapter 1 Overview
- Chapter 2 Appearance
- Chapter 3 Installation
- Chapter 4 Wiring
- Chapter 5 Activation
- Chapter 6 Quick Operation
- Chapter 7 Basic Operation
- Chapter 8 Operation via Web Browser
- 8.1 Login
- 8.2 Person Management
- 8.3 Configuration
- 8.3.1 View Device Information
- 8.3.2 Set Time
- 8.3.3 Set DST
- 8.3.4 View Open Source Software License
- 8.3.5 Upgrade and Maintenance
- 8.3.6 Security Mode Settings
- 8.3.7 Change Administrator's Password
- 8.3.8 View Device Arming/Disarming Information
- 8.3.9 Network Settings
- 8.3.10 Set Audio Parameters
- 8.3.11 Set Image Parameters
- 8.3.12 Set Authentication Parameters
- 8.3.13 Temperature Measurement Settings
- 8.3.14 Set Biometric Parameters
- 8.3.15 Visitor Settings
- 8.3.16 Set Screen Saver Picture
- Appendix A. Tips When Collecting/Comparing Face Picture
- Appendix B. Tips for Installation Environment
- Appendix C. Dimension
- Appendix D. Communication Matrix and Device Command
DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT RELATED
TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF HUMAN
RIGHTS ABUSES.
IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW, THE LATTER
PREVAILS.
Data Protecon
During the use of device, personal data will be collected, stored and processed. To protect data,
the development of Hikvision devices incorporates privacy by design principles. For example, for
device with facial recognion features, biometrics data is stored in your device with encrypon
method; for ngerprint device, only ngerprint template will be saved, which is impossible to
reconstruct a ngerprint image.
As data controller, you are advised to collect, store, process and transfer data in accordance with
the applicable data
protecon laws and regulaons, including without limitaon, conducng
security controls to safeguard personal data, such as, implemenng reasonable administrave and
physical security controls, conduct periodic reviews and assessments of the
eecveness of your
security controls.
DS-K5032-3XFD Visitor Terminal User Manual
ii










