Dahua MAE-D200 Docking Base

MPT320 Accessories Quick Start Guide V1.0.0 - Page 5

For MAE-D200.

PDF File Manual, 15 pages, Read Online | Download pdf file

MAE-D200 photo
Loading ...
Loading ...
Loading ...
IV
Table of Contents
Foreword .................................................................................................................................................... I
Important Safeguards and Warnings ..................................................................................................... II
1 Camera ................................................................................................................................................... 1
Appearance ................................................................................................................................... 1 1.1
Installation ..................................................................................................................................... 2 1.2
Video/Capture ............................................................................................................................... 3 1.3
2 Charging base ....................................................................................................................................... 5
Appearance ................................................................................................................................... 5 2.1
Functions ....................................................................................................................................... 6 2.2
3 Leather Holster ...................................................................................................................................... 7
Appearance ................................................................................................................................... 7 3.1
Installation ..................................................................................................................................... 7 3.2
Cybersecurity Recommendations ..................................................................................... 8 Appendix 1
Loading ...
Loading ...
Loading ...