HIKVISION DS-PW32-H Series User Manual

HIKVISION DS-PW32-H Series User Manual

Ax security control panels
Hide thumbs Also See for DS-PW32-H Series:

Advertisement

Quick Links

AX Security Control Panel
User Manual
UD11739B

Advertisement

Table of Contents
loading

Summary of Contents for HIKVISION DS-PW32-H Series

  • Page 1 AX Security Control Panel User Manual UD11739B...
  • Page 2 Hikvision marks are the property of Hikvision and are registered trademarks or the subject of applications for the same by Hikvision and/or its affiliates. Other trademarks mentioned in this manual are the properties of their respective owners. No right of license is given to use such trademarks without express permission.
  • Page 3 Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicates a hazardous situation which, if not avoided, Danger will or could result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data Caution loss, performance degradation, or unexpected...
  • Page 4 Regulatory Information EN 50131-1:2009+A2:2017 EN 50131-3:2009 EN 50131-6:2017 EN 50131-5-3:2017 Security Grade: 2 Environmental Class: II EU Conformity Statement This product and - if applicable - the supplied accessories too are marked with "CE" and comply therefore with the applicable harmonized European standards listed under the EMC Directive 2014/30/EU, RE Directive 2014/53/EU,the RoHS Directive 2011/65/EU...
  • Page 5: Table Of Contents

    Contents 1 Installation Guide ............. 1 1.1 Overview ............... 1 1.1.1 System Description ........1 1.1.2 Specification ..........1 1.2 Appearance ............2 1.3 Connection ............4 1.4 Installation ............6 1.5 Activation .............. 7 1.5.1 Activate Device via Web Browser ....7 1.5.2 Activate Device via iVMS-4200 ....
  • Page 6 2.2.6 Use the Client Software ......61 2.2.7 Use the Web Client ........62 2.3 Configuration ............66 2.3.1 Activation ........... 66 2.3.2 Network Settings ........68 2.3.3 Alarm Settings ..........72 2.3.4 Video Management ........79 2.3.5 System Settings .......... 81 A.
  • Page 7 A.6 Mail Delivery Failure ........... 86 A.6.1 Failed to Send Test Mail ......86 A.6.2 Failed to Send Mail during Use ....86 A.6.3 Failed to Send Mails to Gmail ....86 A.6.4 Failed to Send Mails to QQ or Foxmail ..86 A.6.5 Failed to Send Mails to Yahoo ....
  • Page 8: Installation Guide

    1 Installation Guide 1.1 Overview 1.1.1 System Description AX wireless security control panel, containing 32 wireless zones, supports Wi-Fi, TCP/IP, and 3G/4G communication methods. It also supports ISAPI, Hik-Connect, DC09, and NAL2300, which is applicable to the scenarios of market, store, house, factory, warehouse, office, etc.
  • Page 9: Appearance

    DS-PW32-H(R)(S)(G) Interaction Audio Output 1, 1.5W 433/868MHz RF Frequency (depends on the model) RF Modulation 2GFSK RF Distance 800m (Open Area) 10M/100M Self- Wired Network Ethernet adaptive Supports reporting push-​ n otification to ARC & Cloud, text Cellular Network GPRS, 3/4G notification via SMS, and audio notification via phone call...
  • Page 10 Figure 1-1 Front Panel Table 1-1 Front Panel Description Indicator Description Name Solid Green: Power on AC Power Off: Power off Solid Orange: System disarmed Off: System armed Note Fault You can set to indicate fault when arming in the web client. Not compliant the EN requirement.
  • Page 11: Connection

    Figure 1-2 Component and Interface Table 1-2 Rear Panel Description Description SIM Card Slot Note The function of GPRS or 3G/4G (implemented with built-in SIM card slot) varies depends on the model of the device. TAMPER Reset Button AP&STA Switch Battery Connector Network Interface Power Interface...
  • Page 12 Note Check the RF signal strentch before connection and peripheral device installation.While the control panel is not in the configuration mode, double press the function button, and trigger the wireless device (event alarm or tampering alarm). you can view the RF signal strength indication on the peripheral device.
  • Page 13: Installation

    Connect via Mobile Client Add a control panel to the mobile client. On the control panel settings page, Click +, scan the QR code on the wirless device or enter the serial No. of the device. Note for details, refer to the chapter ofConfiguration-Configuration via Mobile Client-Add Peripheral to the Control Panel.
  • Page 14: Activation

    Figure 1-7 Power On 5. Connect the Ethernet cable to an internet outlet. While the device is added to a Hik-Connect account, the Link indicator turns green. Figure 1-8 Connect to the Ethernet 6. Secure the rear cover to the installation position with the supplied screws.
  • Page 15: Activate Device Via Ivms-4200

    Before You Start • Get the client software from the supplied disk or the official website http://www.hikvision.com/en/ . Install the software by following the prompts. • The device and the PC that runs the software should be in the same subnet.
  • Page 16: Activate Via Sadp

    Before You Start • Get the SADP software from the supplied disk or the official website http://www.hikvision.com/en/ , and install the SADP according to the prompts. • The device and the PC that runs the SADP tool should be within the same subnet.
  • Page 17: Configuration

    3) Input the admin password and click Modify to activate your IP address modification. 1.6 Configuration Configure the security control panel in the web client or the remote configuration page in client software. 1.6.1 Use the Client Software Steps 1. Download, install and register to the client software. 2.
  • Page 18 2. Select the radar in the Device for Management list, click Remote Configuration. 3. Click Communication Parameters → Wired Network Parameters to enter the Wired Network Parameters page. Figure 1-10 Wired Network Settings Page 4. Set the parameters. - Automatic Settings: Enable DHCP and set the HTTP port. - Manual Settings: Disabled DHCP and set IP Address, Subnet Mask, Gateway Address, DNS Server Address.
  • Page 19 Figure 1-12 WLAN Settings Page 5. Set IP Address, Subnet Mask, Gateway Address, and DNS Server Address. Note If enable DHCP, the device will gain the Wi-Fi parameters automatically. 6. Click Save. Cellular Network Set the cellular network parameters if you insert a SIM card inside the device.
  • Page 20 Ask the network carrier to get the APN information and input the APN information. Data Usage Limit You can enable the function and set the data threshold every month. If data usage is more than the configured threshold, an alarm will be triggered and uploaded to the alarm center. Data Used This Month The used data will be accumulated and displayed in this text box.
  • Page 21 Wi-Fi network, and cellular data network. Only when the current network is disconnected, will the device connect to other network. Wired Network Priority The system will select wired network only. Note When the device supports cellular data network connection and the wired network is disconnected, it will connect to the cellular data network.
  • Page 22 Note By default, the port number for EHome is 7660. 6. Set an account, including the Device ID and Ehome Login Password. 7. Click Save. Alarm Settings Alarm Center You can set the alarm center's parameters and all alarms will be sent to the configured alarm center.
  • Page 23 Notification Push When an alarm is triggered, if you want the send the alarm notification to the client, alarm center, cloud or mobile client, you can set the notification push parameters. Steps 1. Click Communication Parameters → Message Notification . 2.
  • Page 24 The system will immediately trigger an alarm when it detects triggering event after system armed. Detectors can be set as this type, which can be used in places such as supermarket. Delayed Zone Exit Delay: Exit Delay provides you time to leave through the defense area without alarm.
  • Page 25 The zone activates all the time. It alarms when the event you defined does happen throughout a configurable period. It is usually used in places equipped with magnetic contacts (e.g., fire hydrant box's door). Shield Zone Alarms will not be activated when the zone is triggered or tampered.
  • Page 26 If you have set the delayed zone, you can set the delayed time duration here. Note The available time duration rage is from 5s to 600s. Exit Delay If the you want to exit the zone without triggering the alarm, you can set the exit delay duration.
  • Page 27 4. Click Save. Output If you want to the link the device with a relay output to output the alarm, set the output parameters. Steps 1. Click Wireless Device → Output to enter the Output page. Figure 1-19 Output Page 2.
  • Page 28 Note If the relay has linked to the wireless output module, the wireless output module information will be displayed in the Link Wireless Output Module area. 5. Click OK. Note After the relay is configured, you can click Status → Relay to view the output status.
  • Page 29 2. Click to set the repeater parameters. Figure 1-24 Repeater Settings 3. Edit the repeater's name. 4. Enable Link Wireless Repeater and input the repeater serial 5. Click OK. Note After setting the repeater, you can enter Status → Repeater to view the repeater status.
  • Page 30 Figure 1-26 Zone Management 2. Select a zone needs video monitoring, and click the Settingsicon. Figure 1-27 Zone Configuration 3. Select the Linked Camera No.. 4. ClickOK. Set Email to Receive Alarm Video You can send the alarm video or event to the configured email. Steps 1.
  • Page 31 Figure 1-29 Video Settings 2. Select a camera and set the video parameters. Stream Type Main Stream: Being used in recording and HD preview, it has a high resolution, code rate and picture quality.. Sub-Stream: It is used to transmit network and preview pictures as a video streaming with features of lower resolution, bit rate and picture quality.
  • Page 32 Note The default password of the setter is setter12345, and the default password of the manufactuer is hik12345. 3. Click Add. 4. Set the new user's information in the pop-up window, including the user type, the user name, and the password. Figure 1-31 Add User Page 5.
  • Page 33 Figure 1-32 Card Management 2. Click Add and place a card on the card swiping area. 3. Customize a name for the card in the pop-up window. 4. Click OK and the card information will be displayed in the list. 5.
  • Page 34 5. Optional: Click to edit the keyfob information. 6. Optional: Delete a single keyfob or check multiple keyfobs and click Delete to delete the keyfobs in batch. Maintenance Test The security control panel supports walk test function. Steps 1. Enter Maintenance → Test → to enable the function. 2.
  • Page 35 Note You should disable the arming function in the Advanced Settings page. Or the forced arming function cannot be valid. System Fault Report If the option is enabled, the device will upload the system fault report automatically. Disable Function Key If the option is enabled, all function keys will be disabled.
  • Page 36 You can enable the DST and set the DST bias, DST start time, and DST end time. SSH Settings Enable or disable SSH (Secure Shell) according to your actual needs. Click System → Security → SSH Settings to enter the SSH Settings page and you can enable or disable the SSH function.
  • Page 37 Select the device and click Remote Configuration in iVMS-4200, or enter the device IP address in the address bar of the web browser. Click System → System Maintenance to enter the Upgrade and Maintenance page. Figure 1-36 System Maintenance Restart Click Reboot to reboot the device.
  • Page 38 Figure 1-37 Local Log Search Page Select a major type and a minor type from the drop-down list, set the log start time and end time and click Filter. All filtered log information will be displayed in the list. You can also click Reset to reset all search conditions. Authority Advanced Settings Set advanced authority parameters.
  • Page 39: Configuration Via Mobile Client

    Delay When the early alarm function is enabled, you should set the delay time. The alarm will be triggered after the configured delay time. Check Status After setting the zone, repeater, and other parameters, you can view their status. Click Status. You can view the status of zone, relay, siren, battery, communication, and repeater.
  • Page 40 Figure 1-38 Connect to a Network Page 2) Tap Wireless Connect on the Select Connection Type page. 3) Follow the instructions on the Turn on Hotspot page and change the control panel to the AP mode. Tap Next. Note You need to remove the rear panel of the device and the AP/STA switch is on the back of the device.
  • Page 41 Note You need to remove the rear panel of the device and the AP/STA switch is on the back of the device. 8. When the control panel is adding completed, tap Finish. The control panel is listed on the Hik-Connect page. AddPeripheral to the Control Panel It is required to enter the activation name and the password login the control panel after it being added.
  • Page 42 Figure 1-39 Zone Settings Page 2. Set the following parameters as you desired. Zone Type Select a zone type from the zone type list. You can tap ? to view each zones' definition. Zone Bypass Enable the function and the zone will be bypassed. No alarm will be received while the zone is bypassed.
  • Page 43 Figure 1-40 Link Camera Page 4. Select a camera in the available cameras, and tap Link. The selected camera will be linked to the zone. The icon will be displayed on the right of the zone in the zone list. Tap the icon to view the zone live video.
  • Page 44 Figure 1-42 Control Panel Management Page 2. Tap → Card/Tag Management to enter the Card/Tag Management page. 3. Tap 4. When hearing the voice prompt "Swipe Card", you should present the card on the control panel card presenting area. When hearing a beep sound, the card is recognized. 5.
  • Page 45: Input Types

    1.7 Input Types Table 1-3 Input Types Input Types Operations The system will immediately alarm when it detects triggering event after system armed. Instant Zone Audible Response Trigger the system sound and siren. Voice Prompt: Zone X alarm. The system will immediately alarm when it detects triggering event after system armed.
  • Page 46 Input Types Operations The zone activates all the time with sound/siren output when alarm occurs. Fire Zone Audible Response: Trigger the system sound and siren. Voice Prompt: Zone X fire alarm. The zone activates all the time with sound/siren output when alarm occurs.
  • Page 47 Input Types Operations Trigger the linked device when event occurs. Link e.g. The output expander linked relays will be enabled when the control panel is armed. When aremed: Voice prompt for fault.You can handle the fault according to the voice prompt. •System sound for arming with card or keyfob.
  • Page 48: Output Types

    1.8 Output Types Table 1-4 Output Types Output Types Active Restore after the Arm the control Arming configured panel output delay after the Disarm the Disarming configured control panel output delay When alarm after the event occurs. configured The alarm output delay, Alarm output will be...
  • Page 49: Event Types

    1.9 Event Types Table 1-5 Event Types Default Default Default Default (client (alarm Evnet Custo softwa receivi (mobil Types (teleph one) notific center client) ation) 1/2) Alarm ×/√ √ √ √ √ Tamper Life Safety ×/√ √ √ √ √ Event System ×/√...
  • Page 50: Access Levels

    1.10 Access Levels Level Description Access by any person; for example the general public. User access by an operator; for example customers (systems users). User access by an engineer; for example an alarm company professional. User access by the manufacturer of the equipment. Table 1-6 Permission of the Access Level Permission Function...
  • Page 51 • When the controller is bypassed, the user level 3 can login the controller without the permission assignment of the user level • The user level 4 can login the controller only when the user level 2 or level 3 has assigned permissions to the user level 4.
  • Page 52: Sia And Cid Code

    1.11 SIA and CID Code Table 1-7 SIA and CID Code SIA Code CID Code Description 1130 Burglary Alarm Burglary Alarm 3130 Restored Silent Panic 1122 Alarm Silent Panic 3122 Alarm Restored 1780 Timeout Alarm Timeout Alarm 3780 Restored 1120 Panic Alarm Panic Alarm 3120...
  • Page 53 SIA Code CID Code Description Wireless 3334 Repeater Tamper Restored Expander 1341 Tampered Expander 3341 Tamper Restored Keypad/Keyfob 1810 Panic Alarm 1100 Medical Alarm Medical Alarm 3100 Restored Gas Leakage 1151 Alarm Gas Leakage 3151 Alarm Restored 1110 Fire Alarm Fire Alarm 3110 Restored...
  • Page 54 SIA Code CID Code Description Low System 3302 Battery Restored Low Keyfob 1925 Battery Low Keyfob 3925 Battery Restored 1311 Battery Fault Battery Fault 3311 Restored 1862 Keypad Locked Keypad 3862 Unlocked Test Mode 1607 Entered 3607 Test Mode Exited Control Panel 1305 Reset...
  • Page 55 SIA Code CID Code Description Wireless 1334 Repeater Disconnected Wireless 3334 Repeater Connected Cellular Data 1352 Network Disconnected Cellular Data 3352 Network Connected SIM Card 1352 Exception SIM Card 3352 Restored Network Flow 1352 Exceeded IP Address 1352 Conflicted Normal IP 3352 address Wired Network...
  • Page 56: User Guide

    SIA Code CID Code Description Wireless 1306 Repeater Deleted Wireless 3306 Repeater Added Wireless Siren 1306 Deleted Wireless Siren 3306 Added 2 User Guide 2.1 System Description AX wireless security control panel, containing 32 wireless zones, supports Wi-Fi, TCP/IP, and 3G/4G communication methods. It also supports ISAPI, Hik-Connect, DC09, and NAL2300, which is applicable to the scenarios of market, store, house, factory, warehouse, office, etc.
  • Page 57: Operations

    Note To compliant the EN requirement, the system will only record the same log and CID report 3 times continuously. 2.2 Operations You can use the client keyfob, card, client software, or mobile client to do arming, disarming, bypass, and zone disabling. 2.2.1 Arming You can use keyfob, card, client software, mobile client to arm your system.
  • Page 58: Disarming

    Arming with Fault While the arming is stopped with fault, user in level 2 has the permission to arm the system with fault (forced arming). Fored arming only taks effect on the current arming operation. The forced arming operation will be record in the event log. 2.2.2 Disarming You can disarm the system with keyfob, card, client software, or mobile client.
  • Page 59: Use The Card

    Description Indicator Green: Successful Operation Red: Press the Key Away Arming Clearing Alarm Stay Arming Disarming Panic Alarm (Hold for 2 s) The following table shows the keyfob operation and responded indications. Keyfob Operation Voice Prompt Indication Result Armed Away/Stay Arming Red LED Flashes Once Green LED Flashes Arming Failed...
  • Page 60: Use Mobile Client

    While the system is not armed, present a valid card to the control panel to arm the system. While the system is armed, present a valid card to the control panel to disarm the system. The card operations and responding voice prompts are shown below.
  • Page 61 Note • When the adding peripheral is a detector, the detector will be linked to the zone. You can view the detector information in the Zone tab. • Up to 32 detectors can be linked to the zone. The added peripheral will be listed in the Zone tab or the Wireless Device tab.
  • Page 62 3) Follow the instructions on the Turn on Hotspot page and change the control panel to the AP mode. Tap Next. Note You need to remove the rear panel of the device and the AP/STA switch is on the back of the device. 4) Select a stable Wi-Fi for the device to connect and tap Next.
  • Page 63 Figure 2-3 Control Panel Management Page 2. Tap → Card/Tag Management to enter the Card/Tag Management page. 3. Tap 4. When hearing the voice prompt "Swipe Card", you should present the card on the control panel card presenting area. When hearing a beep sound, the card is recognized. 5.
  • Page 64 On the Hik-Connect page, tap a security control device to enter the control panel management page. Tap Away/Stay/Disarm to control the partition's status. You can also tap Clear Alarm to clear the alarm when an alarm is triggered. Figure 2-4 Control Panel Management Page Bypass Zone When the partition is armed, you can bypass a particular zone as you desired.
  • Page 65 The detector in the zone does not detect anything and you will not receive any alarm from the zone. Set Zone After the detector is added, you can set the zone, including the zone name, the zone type, zone bypass, linked camera, stay/away status, the siren, and the silent zone.
  • Page 66 Set the arming/disarming schedule to arm/disarm a particular zone automatically. Tap a security control panel to enter the control page and tap to enter the Settings page. Enable the auto arm/disarm function and set the auto arm time/ auto disarm time. You can also set the late to disarm time, entry delay time, exit delay time, and siren delay time.
  • Page 67 Figure 2-8 Message Page All alarm notifications are listed in Message page. 2. Select an alarm and you can view the alarm details. Figure 2-9 Alarm Notification Page 3. Optional: If the zone has linked a camera, you can view the playback when the alarm is triggered.
  • Page 68: Use The Client Software

    Figure 2-10 Link Camera Page 4. Select a camera in the available cameras, and tap Link. The selected camera will be linked to the zone. The icon will be displayed on the right of the zone in the zone list. Tap the icon to view the zone live video.
  • Page 69: Use The Web Client

    Figure 2-11 Partition Operation ClickEditto edit the partition name and display options. Figure 2-12 Editing Partition Information Zone Operating Click Linked Zonein the partition list of the Security Control Module. You can control the selected partition related zones, such as arming, disarming, bypass, or bypass restoring. Figure 2-13 Zone Operation 2.2.7 Use the Web Client Steps...
  • Page 70 Note When connectiing the network cable with computer directly, the default IP Address is 192.0.0.64 4. Use the activation user name and password to login. Note Refer to Activation chapter for the details. Add/Edit/Delete Card You can add card to the security control panel and you can use the card to arm/disarm the zone.
  • Page 71 Figure 2-15 Keyfob Management 2. Click Add and press any key on the keyfob. 3. Set the keyfob parameters. Name Customize a name for the keyfob. Permission Settings Check different items to assign permissions. Single Key Settings Select from the drop-down list to set I key and II key's functions Combination Keys Settings Select from the drop-down list to set combination keys'...
  • Page 72 Note The default password of the setter is setter12345, and the default password of the manufactuer is hik12345. 3. Click Add. 4. Set the new user's information in the pop-up window, including the user type, the user name, and the password. Figure 2-17 Add User Page 5.
  • Page 73: Configuration

    Before You Start • Get the client software from the supplied disk or the official website http://www.hikvision.com/en/ . Install the software by following the prompts. • The device and the PC that runs the software should be in the same subnet.
  • Page 74 Before You Start • Get the SADP software from the supplied disk or the official website http://www.hikvision.com/en/ , and install the SADP according to the prompts. • The device and the PC that runs the SADP tool should be within the same subnet.
  • Page 75: Network Settings

    Note If you connect the device with the PC directly, you need to change the IP address of your PC to the same subnet as the device. The default IP address of the device is 192.0.0.64. 2. Create and confirm the admin password. Caution STRONG PASSWORD RECOMMENDED-We highly recommend you create a strong password of your own choosing (using a...
  • Page 76 - Automatic Settings: Enable DHCP and set the HTTP port. - Manual Settings: Disabled DHCP and set IP Address, Subnet Mask, Gateway Address, DNS Server Address. Note By default, the HTTP port is 80, which is not editable. 5. Optional: Set correct DNS server address if the device needs to visit Hik-Connect server via a domain name.
  • Page 77 Note If enable DHCP, the device will gain the Wi-Fi parameters automatically. 6. Click Save. Cellular Network Set the cellular network parameters if you insert a SIM card inside the device. By using the cellular network, the device can upload alarm notifications to the alarm center.
  • Page 78 If you want to register the device to the Hik-Connect mobile client for remote configuration, you should set the Hik-Connect registration parameters. Before You Start • Connect the device to the network via wired connection, dial- up connection, or Wi-Fi connection. •...
  • Page 79: Alarm Settings

    The system will select wired network first. If no wired network detected, it will select Wi-Fi network. Cellular Data Network The system will select cellular data network only. 5. Optional: Change the authentication password. Note • By default, the authentication password is displayed in the text box.
  • Page 80 You should select the Alarm Receiver Type as IP or Domain name, and enter the IP/domain name, port number, account code, timeout, re-upload times, heartbeat interval, encryption arithmetic, password length and secret key. Note You should check Enable on the right of Heartbeat Interval line to edit the heartbeat interval.
  • Page 81 Figure 2-24 Zone Page 2. Select a zone and click to enter the Zone Settings page. 3. Edit the zone name. 4. Select a zone type. Instant Zone The system will immediately trigger an alarm when it detects triggering event after system armed. Detectors can be set as this type, which can be used in places such as supermarket.
  • Page 82 The zone activates all the time. It is usually used in the sites equipped with panic button, smoke detector and glass-break detector. Fire Zone The zone activates all the time with sound/siren output when alarm occurs. It is usually used in fire hazardous areas equipped with smoke detectors and temperature sensors.
  • Page 83 Figure 2-25 Schedule & Timer Page 2. Set time duration of Delay 1, Delay 2, or Exit Delay respectively. Delay 1/Delay 2 If you have set the delayed zone, you can set the delayed time duration here. Note The available time duration rage is from 5s to 600s. Exit Delay If the you want to exit the zone without triggering the alarm, you can set the exit delay duration.
  • Page 84 Note You should enable the Operation Event Notification function in Communication Parameters → Message Notification before enabling the Late to Disarm function. Weekend Exception Enable the function and the zone will not be armed in the weekend. Perimeter Alarm Delayed Time If you have set the perimeter zone, you can set the delayed time for the zone.
  • Page 85 2) Select a wireless output module number from the drop- down list. 3) Input the serial No. of the wireless output module. 4) Click Add. 3. Click and the Relay Settings window will pop up. Figure 2-28 Relay Settings Page 4.
  • Page 86: Video Management

    Note Some detectors may not support this function. 5. Click OK. Note After the siren is configured, you can click Status → Siren to view the siren status. Repeater If the detector is far away from the control panel, set the repeater parameters to enlarge the signal.
  • Page 87 Figure 2-32 Network Camera Management 2. ClickAdd, and enter the basic information of the camera, such as camera name, IP address, and port No.. 3. Enter the user name and password of the camera. 4. Click Save. Note You can add two network cameras for a wireless securty control panel.
  • Page 88: System Settings

    Figure 2-35 Event Video Transfer via Email 2. Click the block to enable the function. 3. Enter the sender's information. 4. Enter the receiver's information. 5. Click Receiver Address Test and make sure the address is correct. 6. Click Save. Set Video Parameters Steps 1.
  • Page 89 Time Settings You can set the device time zone, synchronize device time, and set the DST time. Time Management Click System → Device Time → Time Management to enter the Time Management page. Figure 2-37 Time Management You can select a time zone form the drop-down list. You can synchronize the device time manually.
  • Page 90 Figure 2-39 Local Log Search Page Select a major type and a minor type from the drop-down list, set the log start time and end time and click Filter. All filtered log information will be displayed in the list. You can also click Reset to reset all search conditions.
  • Page 91: Trouble Shooting

    A. Trouble Shooting A.1 Communication Fault A.1.1 IP Conflict Fault Description: IP that the panel automatically acquired or set is same as other devices, resulting in IP conflicts. Solution: Search the current available IP through ping. Change the IP address and log in again. A.1.2 Web Page is Not Accessible Fault Description: Use browser to access web pages and display Unaccessible.
  • Page 92: Mutual Exclusion Of Functions

    A.2 Mutual Exclusion of Functions A.2.1 Unable to Enter Registration Mode Fault Description: Click the panel function key, and prompt key invalid. Solution: The panel is in "AP" mode. Switch the panel to "station" mode, and then try to enter the registration mode again. A.2.2 Unable to Enter RF Signal Query Mode Fault Description: Double-click the host function key, and the prompt button invalid.
  • Page 93: The Alarm Clearing Operation On The Panel Does Not Produce The Alarm Clearing Report

    Zone status, alarm status or zone power is abnormal. A.5.2 The Alarm Clearing Operation on the Panel Does Not Produce the Alarm Clearing Report Fault Description: The alarm clearing operation on the panel does not produce the alarm clearing report. Solution: In the absence of alarm, no report will be uploaded for arm clearing.
  • Page 94 Fault Description: The receiver's mailbox is yahoo. Click "test inbox" and prompt test fails. 1. The security level of mailbox is too high. Solution: Go to your mail account and turn on "less secure sign-in". A.6.6 Mail Configuration Table A-1 Mail Configuration Protocols Mail Type Mail Server...

This manual is also suitable for:

Ds-pw32-hrDs-pw32-hsDs-pw32-hgAxiom ds-pw32-h seriesAxiom ds-pw32-hrAxiom ds-pw32-hs ... Show all

Table of Contents