Product Manual
Page 4
...the picture from any time in Web-based interface offers easy integration to 20 user names and passwords are permitted, with privilege settings controlled by the administrator. 4 The DCS-2000 allows remote access from anywhere in CPU and Web server providing a low-cost solution capable ... browser for live video images over the Internet from your Internet Camera with a built-in the world. Introduction The D-Link SECURICAM NetworkTM DCS-2000 Internet Camera is a full featured surveillance system that is required is a computer with the Internet Explorer Web browser (version 6.x or ...
...the picture from any time in Web-based interface offers easy integration to 20 user names and passwords are permitted, with privilege settings controlled by the administrator. 4 The DCS-2000 allows remote access from anywhere in CPU and Web server providing a low-cost solution capable ... browser for live video images over the Internet from your Internet Camera with a built-in the world. Introduction The D-Link SECURICAM NetworkTM DCS-2000 Internet Camera is a full featured surveillance system that is required is a computer with the Internet Explorer Web browser (version 6.x or ...
Product Manual
Page 5
... recording the image or voice of a person without their knowledge and consent is suitable for the end-user's intended use of the D-Link product, which fails to External Devices Supporting auxiliary Input/Output connectors, you can modify the Internet Camera settings from the remote site via ..., record the image to a variety of his or her state. Combined with a pre-defined user ID and password who can develop a variety of security applications that the D-Link product provided herein is prohibited in /out external connector for any end-user use under the applicable laws of external...
... recording the image or voice of a person without their knowledge and consent is suitable for the end-user's intended use of the D-Link product, which fails to External Devices Supporting auxiliary Input/Output connectors, you can modify the Internet Camera settings from the remote site via ..., record the image to a variety of his or her state. Combined with a pre-defined user ID and password who can develop a variety of security applications that the D-Link product provided herein is prohibited in /out external connector for any end-user use under the applicable laws of external...
Product Manual
Page 14
A second window will appear, prompting you to the network. Links to Selected Devices Click to enter the camera's IP address or domain name. System Settings Enter a Camera Name and create a Root password for the camera. On the initial Setup Screen you can also be configured on the corresponding tab: Search Click to ...to configure Network settings for the camera. Uncheck All Click to uncheck all selected devices to the network. Setup - A window will appear, prompting you to link all selected cameras. Add Click to manually add a camera to enter the port number.
A second window will appear, prompting you to the network. Links to Selected Devices Click to enter the camera's IP address or domain name. System Settings Enter a Camera Name and create a Root password for the camera. On the initial Setup Screen you can also be configured on the corresponding tab: Search Click to ...to configure Network settings for the camera. Uncheck All Click to uncheck all selected devices to the network. Setup - A window will appear, prompting you to link all selected cameras. Add Click to manually add a camera to enter the port number.
Product Manual
Page 21
Installing IP surveillance Software The IP surveillance software on the CD included with the DCS-2000 Internet Camera converts the DCS-2000 into a powerful, yet flexible, surveillance system for home or business, with these features: Real-...time Monitoring Video Recording to hard disk High quality video High compression ratio Maximum of 16 cameras with different monitor layouts Smart playback Triggered event browsing Fast database searching Configurable automated alarms Account password...
Installing IP surveillance Software The IP surveillance software on the CD included with the DCS-2000 Internet Camera converts the DCS-2000 into a powerful, yet flexible, surveillance system for home or business, with these features: Real-...time Monitoring Video Recording to hard disk High quality video High compression ratio Maximum of 16 cameras with different monitor layouts Smart playback Triggered event browsing Fast database searching Configurable automated alarms Account password...
Product Manual
Page 26
..., the Administrator has the exclusive privilege to access the System Administration settings to view the image transmitted by the Administrator. Once the Password is defined, only the Administrator has access to defined users who have the right to allow users entry and authorize privileges for all... the Internet Camera is used for security purposes. Security At this point it is highly recommended that the Administrator set the Administrator's Password to constrain user access to the Admin screen. This procedure should be done as soon as possible since the Default settings are Null...
..., the Administrator has the exclusive privilege to access the System Administration settings to view the image transmitted by the Administrator. Once the Password is defined, only the Administrator has access to defined users who have the right to allow users entry and authorize privileges for all... the Internet Camera is used for security purposes. Security At this point it is highly recommended that the Administrator set the Administrator's Password to constrain user access to the Admin screen. This procedure should be done as soon as possible since the Default settings are Null...
Product Manual
Page 37
... unreachable. 37 The e-mail address of entered characters.) Recipient email address 1 - Using the DCS-2000 with an Internet browser (continued) Configuration > Advanced > Network Reset IP Address at all times. The router used to destinations in the same subnet. The password used to forward frames to log into your e-mail account (e.g. If the box...
... unreachable. 37 The e-mail address of entered characters.) Recipient email address 1 - Using the DCS-2000 with an Internet browser (continued) Configuration > Advanced > Network Reset IP Address at all times. The router used to destinations in the same subnet. The password used to forward frames to log into your e-mail account (e.g. If the box...
Product Manual
Page 38
....) FTP Settings Local FTP server port - 1st FTP server 1st FTP user name 1st FTP password 1st FTP remote folder - Granted folder on the external FTP server. Using the DCS-2000 with an Internet browser (continued) Configuration > Advanced >Network Settings (continued) SMTP account name ...2 - The password used to log into the second e-mail account. (The password will need to specify the port when connecting to ...
....) FTP Settings Local FTP server port - 1st FTP server 1st FTP user name 1st FTP password 1st FTP remote folder - Granted folder on the external FTP server. Using the DCS-2000 with an Internet browser (continued) Configuration > Advanced >Network Settings (continued) SMTP account name ...2 - The password used to log into the second e-mail account. (The password will need to specify the port when connecting to ...
Product Manual
Page 39
... changes the HTTP port of the DCS-2000 (which has an IP Address of 192.168.0.100) from 80 to make changes effective 39 Passive mode FTP can automatically attempt for the backup FTP server. Granted password on the backup FTP server. 2nd FTP password - HTTP Port- The domain name... or IP address of "http://192.168.0.100". Granted user name on the backup FTP server. 2nd FTP remote folder - Granted folder on the backup FTP server. If the DCS-2000 is unavailable. Using the DCS-2000 with an Internet browser (continued...
... changes the HTTP port of the DCS-2000 (which has an IP Address of 192.168.0.100) from 80 to make changes effective 39 Passive mode FTP can automatically attempt for the backup FTP server. Granted password on the backup FTP server. 2nd FTP password - HTTP Port- The domain name... or IP address of "http://192.168.0.100". Granted user name on the backup FTP server. 2nd FTP remote folder - Granted folder on the backup FTP server. If the DCS-2000 is unavailable. Using the DCS-2000 with an Internet browser (continued...
Product Manual
Page 42
... username or e-mail used to connect to the DDNS server. Enter the host name of the DDNS server. Select your password or key used to connect to the DDNS server. Using the DCS-2000 with an Internet browser (continued) Configuration > Advanced > DDNS & UPnP (Continued) Enable DDNS ProviderHost nameUsername/E-mailPassword/Key- Enter your Dynamic...
... username or e-mail used to connect to the DDNS server. Enter the host name of the DDNS server. Select your password or key used to connect to the DDNS server. Using the DCS-2000 with an Internet browser (continued) Configuration > Advanced > DDNS & UPnP (Continued) Enable DDNS ProviderHost nameUsername/E-mailPassword/Key- Enter your Dynamic...
Product Manual
Page 49
... share the same account of different levels. The DCS-2000 is used to identify the administrator. Some users may need to access 4 utility screens for each account. Using the DCS-2000 with User name and User Password for other users in Tools is known. Each account... allows the ability to enable protection, and then confirm the password in the New Password field to access the DCS-2000 (including the Configuration) by default. Type a password in Confirm Password field. It is recommended that you enter a password to twenty accounts for other users / visitors. You can ...
... share the same account of different levels. The DCS-2000 is used to identify the administrator. Some users may need to access 4 utility screens for each account. Using the DCS-2000 with User name and User Password for other users in Tools is known. Each account... allows the ability to enable protection, and then confirm the password in the New Password field to access the DCS-2000 (including the Configuration) by default. Type a password in Confirm Password field. It is recommended that you enter a password to twenty accounts for other users / visitors. You can ...
Product Manual
Page 50
No password is "demo". Configuration > Tools > System Click on the log-in IP surveillance (page 62) useless for demonstrations and keeps guests separate from observing the operation ... Internet Camera. 50 Illegal characters (*, /, &) are not allowed and may render the recording feature in screen (once a password has been set). The text will prevent anyone from users with view -only privileges. Using the DCS-2000 with an Internet browser (continued) Configuration > Tools > Admin (continued) Guest account: This option allows a user to connect...
No password is "demo". Configuration > Tools > System Click on the log-in IP surveillance (page 62) useless for demonstrations and keeps guests separate from observing the operation ... Internet Camera. 50 Illegal characters (*, /, &) are not allowed and may render the recording feature in screen (once a password has been set). The text will prevent anyone from users with view -only privileges. Using the DCS-2000 with an Internet browser (continued) Configuration > Tools > Admin (continued) Guest account: This option allows a user to connect...
Product Manual
Page 60
John Smith). 4 1st FTP password- Specify the user password to Configuration > Advanced > Network in the section titled "Using the DCS-2000 With an Internet Browser" (page 33). Specify the Domain name or IP address of your external backup FTP server. For detailed... mode will allow access to a second external FTP server if your FTP server with Motion Detection (continued) 3 1st FTP user name- Specify the password to access the external FTP server (e.g. This field is behind a router protected by a firewall. 2nd FTP server- Secondary FTP passive mode- Specify the...
John Smith). 4 1st FTP password- Specify the user password to Configuration > Advanced > Network in the section titled "Using the DCS-2000 With an Internet Browser" (page 33). Specify the Domain name or IP address of your external backup FTP server. For detailed... mode will allow access to a second external FTP server if your FTP server with Motion Detection (continued) 3 1st FTP user name- Specify the password to access the external FTP server (e.g. This field is behind a router protected by a firewall. 2nd FTP server- Secondary FTP passive mode- Specify the...
Product Manual
Page 64
Enter your password in the window shown in order to enter the user name and company name. Input and confirm your user name and company name and then click "Next" to continue. Using IP surveillance Software (continued) Installing the IP surveillance software (continued) Next, the "User information" window below . Click "Next" to continue. Click Next You must setup the administrator's password in below will prompt you to proceed. Click Next 64 This window will appear.
Enter your password in the window shown in order to enter the user name and company name. Input and confirm your user name and company name and then click "Next" to continue. Using IP surveillance Software (continued) Installing the IP surveillance software (continued) Next, the "User information" window below . Click "Next" to continue. Click Next You must setup the administrator's password in below will prompt you to proceed. Click Next 64 This window will appear.
Product Manual
Page 67
Security for Launcher When Launcher starts, there is no menu will show up a username/password dialog the first time for menu popup or when Launcher is locked. Using IP surveillance Software (continued) Launcher Launcher is a controller program that the IP ... out for security reason. Below is locked, the user will pop up . The icon in the system tray signifies that allows users to undergo a username/password check. If users want to click on the icon of IP surveillance.
Security for Launcher When Launcher starts, there is no menu will show up a username/password dialog the first time for menu popup or when Launcher is locked. Using IP surveillance Software (continued) Launcher Launcher is a controller program that the IP ... out for security reason. Below is locked, the user will pop up . The icon in the system tray signifies that allows users to undergo a username/password check. If users want to click on the icon of IP surveillance.
Product Manual
Page 68
...The menu items are listed below: Lock Launcher When this dialog is covered in order to invoke the menu, a dialog asking for ID and password will be grayed (disabled) for 60 seconds after 3 consecutive failures. The input area of the dialog will appear. Using IP surveillance Software (...continued) Launcher (continued) When Launcher is locked, the unlock window will appear, prompting for the user password in the previous section. 68 User Interface Below is the user interface for Launcher: The main user interface for Launcher is an icon on...
...The menu items are listed below: Lock Launcher When this dialog is covered in order to invoke the menu, a dialog asking for ID and password will be grayed (disabled) for 60 seconds after 3 consecutive failures. The input area of the dialog will appear. Using IP surveillance Software (...continued) Launcher (continued) When Launcher is locked, the unlock window will appear, prompting for the user password in the previous section. 68 User Interface Below is the user interface for Launcher: The main user interface for Launcher is an icon on...
Product Manual
Page 69
...Launcher (continued) Tools Contains many utilities. Monitor Starts up the Playback program. Logout Logs out user from IP surveillance. Currently only change password dialog looks like this option, Launcher will show a message box prompting to confirm if users really want to exit, and warn users that... exiting Launcher will appear prompting for username and password again. Playback Starts up the Monitor program. Exit Exits Launcher. After logging out, if the user wants to return to autorun ...
...Launcher (continued) Tools Contains many utilities. Monitor Starts up the Playback program. Logout Logs out user from IP surveillance. Currently only change password dialog looks like this option, Launcher will show a message box prompting to confirm if users really want to exit, and warn users that... exiting Launcher will appear prompting for username and password again. Playback Starts up the Monitor program. Exit Exits Launcher. After logging out, if the user wants to return to autorun ...
Product Manual
Page 70
... 16 cameras with 3 alert windows for each camera 70 Just-in-time snapshot Motion detection with different monitor layouts Auto alarm in multiple modes Account-password protection Multiple recording modes: Event-driven, Scheduled, and manual recording for each camera. Simultaneous real-time monitoring and recording audio and video High quality video...
... 16 cameras with 3 alert windows for each camera 70 Just-in-time snapshot Motion detection with different monitor layouts Auto alarm in multiple modes Account-password protection Multiple recording modes: Event-driven, Scheduled, and manual recording for each camera. Simultaneous real-time monitoring and recording audio and video High quality video...
Product Manual
Page 72
... and sends digital output signal to arrange the available storage size of layouts: 1, 4, 6, 9, 13, or 16 video display windows in the video area. Enter the password for the administrator. 72 The authentication window is shown below.
... and sends digital output signal to arrange the available storage size of layouts: 1, 4, 6, 9, 13, or 16 video display windows in the video area. Enter the password for the administrator. 72 The authentication window is shown below.
Product Manual
Page 73
... window popped up in for the first time, you should configure this application software and change the settings of the DCS-2000, you have the administrator's password for the Internet camera. Using IP surveillance Software (continued) Monitor Program (continued) The Admin Privilege In the monitor ...local settings Again, if you informed. 73 Camera Configurations When you log in advance to keep you need the admin (administrator) password for the Internet camera. Once you click "Configuration Menu > Camera Configurations" for setting each selected Internet camera from the monitor ...
... window popped up in for the first time, you should configure this application software and change the settings of the DCS-2000, you have the administrator's password for the Internet camera. Using IP surveillance Software (continued) Monitor Program (continued) The Admin Privilege In the monitor ...local settings Again, if you informed. 73 Camera Configurations When you log in advance to keep you need the admin (administrator) password for the Internet camera. Once you click "Configuration Menu > Camera Configurations" for setting each selected Internet camera from the monitor ...
Product Manual
Page 75
... try to connect to the selection list. 75 Using IP surveillance Software (continued) Monitor Program (continued) Insert - Specify the IP address, port, and admin password of the camera and also the port that is opened on the camera (port 80 in this example). Click the "Insert" button, an "Insert New... Channel" dialog will be inserted to the camera selection list. Specify the IP address, port, and admin password of the network camera, click the "Ok" button to the camera list. If the connection succeeds, the camera will popup, as shown below.
... try to connect to the selection list. 75 Using IP surveillance Software (continued) Monitor Program (continued) Insert - Specify the IP address, port, and admin password of the camera and also the port that is opened on the camera (port 80 in this example). Click the "Insert" button, an "Insert New... Channel" dialog will be inserted to the camera selection list. Specify the IP address, port, and admin password of the network camera, click the "Ok" button to the camera list. If the connection succeeds, the camera will popup, as shown below.