Dahua HAC-ME1509TQ-A-PV 5MP Smart Dual Light Active Deterrence HDCVI Eyeball Camera

HDCVI Camera User's Manual V1.0.2 Eng - Page 6

For HAC-ME1509TQ-A-PV.

PDF File Manual, 39 pages, Read Online | Download pdf file

HAC-ME1509TQ-A-PV photo
Loading ...
Loading ...
Loading ...
V
9.2.1 Connecting Cable ........................................................................................................................... 24
9.2.2 Removing Cable ............................................................................................................................. 24
Device Installation ...................................................................................................................................... 24 9.3
10 Fisheye Camera Configuration ................................................................................................................. 26
Fisheye Dewarp on the Live Interface ...................................................................................................... 26 10.1
Fisheye Dewarp During Playback ............................................................................................................. 27 10.2
11 FAQ ........................................................................................................................................................ 28
PoC Power Supply .................................................................................................................................... 28 11.1
Long Distance Power Supply .................................................................................................................... 28 11.2
Centralized Power Supply ........................................................................................................................ 28 11.3
Connector Waterproof Protection ........................................................................................................... 29 11.4
Maintenance ............................................................................................................................................... 31
Appendix 1 Cybersecurity Recommendations ............................................................................................... 32
Loading ...
Loading ...
Loading ...