Quick Start Guide
3
2 Structure
Figure 2-1 Structure (unit: mm [inch])
Table 2-1 Port description
No.
Name
1
Network connector
2
DC power connector
Powered port
Page 1: ...PoE Splitter Quick Start Guide ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD V1 0 0...
Page 2: ...might collect the personal data of others such as their face fingerprints and license plate number You need to be in compliance with your local privacy protection laws and regulations to protect the...
Page 3: ...erve the right of final explanation Upgrade the reader software or try other mainstream reader software if the manual in PDF format cannot be opened All trademarks registered trademarks and company na...
Page 4: ...e device away from dampness dust and soot Put the device in a well ventilated place and do not block its ventilation Use an adapter or cabinet power supply provided by the manufacturer The power suppl...
Page 5: ...umidity and temperature conditions Do not drop or splash liquid onto the device and make sure that there is no object filled with liquid on the device to prevent liquid from flowing into it This is a...
Page 6: ...Table of Contents Foreword I Important Safeguards and Warnings III 1 Overview 1 1 1 Introduction 1 1 2 Application Scenarios 1 1 3 Features 1 1 4 Specifications 1 2 Structure 3 Appendix 1 Cybersecurit...
Page 7: ...system and electronic snapshot system Large mine factories surveillance system and network multifunction system Remote multimedia teaching system school surveillance system and video conference syste...
Page 8: ...o 80 C 40 F to 176 F 5 95 RH non condensing Table 1 3 Electricity features Model Name Requirement TAS100 Input voltage 48 52 VDC Output voltage 12 VDC Output current 1 1 15 A Dimensions and Package Di...
Page 9: ...Quick Start Guide 3 2 Structure Figure 2 1 Structure unit mm inch Table 2 1 Port description No Name 1 Network connector 2 DC power connector 3 Powered port...
Page 10: ...mple place the device in a special computer room and cabinet and implement well done access control permission and key management to prevent unauthorized personnel from carrying out physical contacts...
Page 11: ...ssion efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in without authorization Check device log By viewing the logs you...
Page 12: ...Quick Start Guide...