background image

Caution

The password strength of the device can be automatically checked. We highly recommend you

change the password of your own choosing (using a minimum of 8 characters, including at least

three kinds of following categories: upper case letters, lower case letters, numbers, and special

characters) in order to increase the security of your product. And we recommend you change

your password regularly, especially in the high security system, changing the password monthly

or weekly can better protect your product.

Proper configuration of all passwords and other security settings is the responsibility of the

installer and/or end-user.

7. Click OK to activate the device.

2.2 Adding Devices

The client provides various device adding modes including IP/domain, IP segment, cloud P2P, ISUP

protocol, and HiDDNS. The client also supports importing multiple devices in a batch when there

are large amount of devices to be added. The section only introduces one mode, namely, adding a

detected online device.
Steps

1. Enter the Device Management module.

2. Click Device tab on the top of the right panel.

3. Click Online Device to show the online device area.

The searched online devices are displayed in the list.

4. Select an online device in the Online Device area, and click Add to open the device adding

window.

Note

For the inactive device, you need to create the password for it before you can add the device

properly. For detailed steps, refer to Activating Devices .

5. Enter the required information.

Name

Enter a descriptive name for the device.

IP Address

Enter the device's IP address. The IP address of the device is obtained automatically in this

adding mode.

Port

You can customize the port number. The port number of the device is obtained automatically

in this adding mode.

User Name

Gigabit PoE Switch Client User Manual

3

Summary of Contents for DS-3E15 P Series

Page 1: ...Gigabit PoE Switch Client User Manual...

Page 2: ...T WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL CONSEQUENTIAL INCIDENTAL OR INDIRECT DAMAGES INCLUDING AMONG OTHERS DAMAGES FOR LOSS OF BUSINESS PROFITS BUSINESS INTERRUPTION OR LOSS OF DATA CORRUPT...

Page 3: ...VITIES IN THE CONTEXT RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL CYCLE OR IN SUPPORT OF HUMAN RIGHTS ABUSES IN THE EVENT OF ANY CONFLICTS BETWEEN THIS MANUAL AND THE APPLICABLE LAW THE LA...

Page 4: ...use harmful interference 2 This device must accept any interference received including interference that may cause undesired operation EU Conformity Statement This product and if applicable the suppli...

Page 5: ...Industry Canada ICES 003 Compliance This device meets the CAN ICES 3 A NMB 3 A standards requirements Gigabit PoE Switch Client User Manual iv...

Page 6: ...es powered via the PoE port have their shells protected and fire proofed because the switches are not compliant with the Limited Power Source LPS standard In the use of the product you must be in stri...

Page 7: ...operation of the fuse parts of the device that remain energized might represent a hazard during servicing The device has been designed when required modified for connection to an IT power distributio...

Page 8: ...4 2 Typology Settings 7 Chapter 5 Network Configuration 9 Chapter 6 Port Configuration 10 6 1 Attribute Configuration 10 6 2 PoE Port Configuration 10 Chapter 7 Link Aggregation Configuration 12 Chapt...

Page 9: ...oE switches providing advanced PoE power supply technology on the basis of high performance access The switches support client management network topology management link aggregation port management a...

Page 10: ...create a password to activate them before they can be added to the software and work properly Before You Start Make sure the device to be activated is connected to the network and is in the same subn...

Page 11: ...client also supports importing multiple devices in a batch when there are large amount of devices to be added The section only introduces one mode namely adding a detected online device Steps 1 Enter...

Page 12: ...rs and special characters in order to increase the security of your product And we recommend you change your password regularly especially in the high security system changing the password monthly or...

Page 13: ...and port information Port Status You can view the bitrate duplex and flow control of ports Port Statistics You can view the number of bytes sent or received the number of packets sent or received sen...

Page 14: ...ce to view the corresponding typology On the upper right corner you can view the icon of lines and the meaning of different colors select two device to show the flash of the signal transmission betwee...

Page 15: ...Set the device as root node Edit the device name Select the path and format to export the typology Select IPC and current devices to show the flash of the signal transmission between them 4 2 Typology...

Page 16: ...Figure 4 2 Typology Settings Note After changing the typology settings you need to click to view the latest typology Gigabit PoE Switch Client User Manual 8...

Page 17: ...ess device port and HTTP port No Figure 5 1 Network Configuration Note After the IPv4 address is reset the device IP may not be in the same network segment as the computer IP of the client so it canno...

Page 18: ...tiation The configurable rate varies with different ports Duplex The duplex mode of the port Only Auto Negotiation is available for the current version Flow Control Enabling the flow control can preve...

Page 19: ...Figure 6 1 PoE Port Configuration Gigabit PoE Switch Client User Manual 11...

Page 20: ...eps 1 Select Link Aggregation Load Balancing Configuration Figure 7 1 Load Balancing Configuration Source and Destination MAC Load balancing is performed based on source and destination MAC addresses...

Page 21: ...be Configured list Note You can delete the ports from the Ports to be Configured by clicking Delete Up to 4 ports can be added a link aggregation group The rate duplex flow control and long range con...

Page 22: ...information Figure 8 1 Device Information 8 2 User Management The device only supports one admin user Users cannot be added or deleted You can only edit the passwords IP addresses and permissions of...

Page 23: ...restore the defaults upload the upgrade file to upgrade your device Steps 1 Select System System Maintenance 2 Select function button to realize different functions Reboot Click Reboot to remotely res...

Page 24: ...you select the search mode as by time the major type cannot be set Minor Type Minor type is different under different major type If you select the search mode as by time the major type cannot be set S...

Page 25: ...unlock icon to unlock single IP Click Unlock All to unlock all of the IPs Note If the admin user is locked you need to change the IP to log in admin again and unlock the locked IP The maximum number o...

Page 26: ...UD18632B...

Reviews: