Dahua HAC-HDBW1200EA 2MP IR HDCVI Fixed-focal Vandal-proof Dome Camera

HDCVI Camera User's Manual V1.0.2 Eng - Page 6

For HAC-HDBW1200EA.

PDF File Manual, 39 pages, Read Online | Download pdf file

HAC-HDBW1200EA photo
Loading ...
Loading ...
Loading ...
V
9.2.1 Connecting Cable ........................................................................................................................... 24
9.2.2 Removing Cable ............................................................................................................................. 24
Device Installation ...................................................................................................................................... 24 9.3
10 Fisheye Camera Configuration ................................................................................................................. 26
Fisheye Dewarp on the Live Interface ...................................................................................................... 26 10.1
Fisheye Dewarp During Playback ............................................................................................................. 27 10.2
11 FAQ ........................................................................................................................................................ 28
PoC Power Supply .................................................................................................................................... 28 11.1
Long Distance Power Supply .................................................................................................................... 28 11.2
Centralized Power Supply ........................................................................................................................ 28 11.3
Connector Waterproof Protection ........................................................................................................... 29 11.4
Maintenance ............................................................................................................................................... 31
Appendix 1 Cybersecurity Recommendations ............................................................................................... 32
Loading ...
Loading ...
Loading ...