DW DWC-MB95Wi28T User manual

User’s Manual Ver. 10/22
Before installing and using the camera, please read this manual carefully.
Be sure to keep it handy for future reference.
MEGApix® 5MP Bullet IP Camera
DWC-MB95Wi28T - 2.8mm fixed lens, gray housing
DWC-MB95Wi28TW - 2.8mm fixed lens, white housing
DWC-MB95Wi36T - 3.5mm fixed lens, gray housing
DWC-MB95Wi36TW - 3.5mm fixed lens, white housing

Safety Notes
This product is intended to be supplied by a Listed Power Unit, marked with 'Limited Power Source', 'LPS' on the unit,
output rated minimum 12V/2 A or POE 48V/ 350mA or AC24V (depending on models), no more than 2000m
altitude of operation and 60 degrees C.
As for the modes with PoE function, the function of the ITE being investigated to IEC 60950-1 standard is considered
not likely to require connection to an Ethernet network with outside plant routing, including campus environment and
the ITE is to be connected only to PoE networks without routing to the outside plant.
Do not try to disassemble the camera; to prevent electric shock, do not remove screws or covers.
There are no user-serviceable parts inside. Please contact the nearest service center as soon as possible if there is any
failure.
Avoid incorrect operation, shock vibration, heavy pressing which can cause damage to the product.
Do not use a corrosive detergent to clean the main body of the camera. If necessary, please use a soft dry cloth to
wipe dirt; for hard contamination, use neutral detergent. Any cleanser for high-grade furniture is applicable.
Avoid aiming the camera directly towards extremely bright objects, such as the sun, as this may damage the image
sensor.
Please follow the instructions to install the camera. Do not reverse the camera, or the reversing image will be received.
Do not work the camera in case temperature, humidity and power supply are beyond the limited stipulations.
Keep away from heat sources such as radiators, heat registers, stoves, etc.
Do not expose the product to the direct airflow from an air conditioner.
This manual is for using and managing the product. We may reserve the right of amending the typographical errors,
inconsistencies with the latest version, software upgrades and product improvements, interpretation and modification.
These changes will be published in the latest version without special notification.
All pictures, charts, images in this manual are only for description and explanation of our products. In this manual, the
trademarks, product names, service names, company names, products that are not owned by our company are the
properties of their respective owners.
Disclaimer
Concerning the product with internet access, the use of the product shall be wholly at your own risk. Our company
shall be irresponsible for abnormal operation, privacy leakage, or other damages resulting from cyber-attack, hacker
attacks, virus inspection, or other internet security risks; however, our company will supply timely technical support if
necessary.
Surveillance laws vary from country to country. Check all laws in your local region before using this product for
surveillance purposes. We shall not take the responsibility for any consequences resulting from illegal operations.
Cybersecurity Recommendations
Use a strong password. At least 8 characters or a combination of characters, numbers and upper- and lower-case
letters should be used in your password.
Change the passwords periodically to ensure that only authorized users can access the system (recommended time is
90 days).
It is recommended to change the service default ports (like HTTP-80, HTTPS-443, etc.) to reduce the risk of outsiders
being able to access.
It is recommended to set a security system for your router. Important ports such as HTTP, HTTPS and dual ports
cannot be closed.
It is not recommended to expose the device to the public network. When it is necessary to be exposed to the public
network, please set the external hardware security system and the corresponding security system policy.
It is not recommended to use the v1 and v2 functions of SNMP.
To enhance the security of WEB client access, please create a TLS certificate to enable HTTPS.
Use black- and white- lists to filter the IP address. This will prevent everyone, except those specified IP addresses from
accessing the system.
If you add multiple users, limit the functions of guest accounts.
If you enable UPnP, it will automatically try to forward ports in your router or modem. It is very convenient for users,
but this will increase the risk of data leakage when the system automatically forwards ports. Disabling UPnP is
recommended when the function is not used in real applications.
Check the log. If you want to know whether your device has been accessed by unauthorized users or not, you can
check the log. The system log will show you which IP addresses were used to log in to your system and what was
accessed.

Regulatory Information
FCC Information
1. FCC compliance
The products have been tested and found in compliance with the council FCC rules and regulation’s part 15 subpart B. These
limits are designed to provide reasonable protection against harmful interference. This equipment generates uses and can
radiate radio frequency energy and, if not installed and used following the instruction manual, may cause harmful interference
to radio communication. However, there is no guarantee that interference will not occur in a particular installation. The user
will be required to correct the interface at his own expense in case harmful interference occurs.
2. FCC conditions:
The operation of this product is subject to the following two conditions: (1) this device may not cause a harmful interface and
(2) this device must accept any interference received, including interference that may cause undesired operation.
CE Information
The products have been manufactured to comply with the following directives.
EMC Directive 2014/30/EU
RoHS
The products have been designed and manufactured following Directive EU RoHS Directive 2011/65/EU and its amendment
Directive EU 2015/863 on the restriction of the use of certain hazardous substances in electrical and electronic equipment.
2012/19/EU (WEEE directive): The Directive on waste electrical and electronic equipment (WEEE Directive). To
improve the environmental management of WEEE, the improvement of collection, treatment and recycling of
electronics at the end of their life is essential. Therefore, the product marked with this symbol must be
disposed of responsibly.
Directive 94/62/EC: The Directive aims at the management of packaging and packaging waste and
environmental protection. The packaging and packaging waste of the product in this manual refers to must be
disposed of at designated collection points for proper recycling and environmental protection.
REACH(EC1907/2006): REACH concerns the Registration, Evaluation, Authorization and Restriction of Chemicals, which
aims to ensure a high level of protection of human health and the environment through better and earlier identification of the
intrinsic properties of chemical substances. The product in this manual refers to conforms to the rules and regulations of
REACH. For more information on REACH, please refer to DG GROWTH or ECHA websites.

Table of Contents
1Introduction........................................................................................................................ 1
1.1 Product and Accessories ..................................................................................................................................... 1
1.2 Parts identification................................................................................................................................................... 1
2Installation.......................................................................................................................... 2
2.1 Installation ...................................................................................................................................................................2
2.2 Cabling .........................................................................................................................................................................3
2.3 Managing the SD Card........................................................................................................................................3
3Network Setup................................................................................................................. 4
3.1 IP Finder ...................................................................................................................................................................... 4
4Live View ............................................................................................................................ 6
5Network Camera Configuration ................................................................................ 9
5.1 Camera Configuration .......................................................................................................................................9
5.1.1 Camera Parameters .......................................................................................................................9
5.1.2 Video Configuration ..................................................................................................................... 11
5.1.3 Audio Configuration.................................................................................................................... 13
5.1.4 OSD Configuration....................................................................................................................... 13
5.1.5 Privacy Mask..................................................................................................................................... 14
5.1.6 ROI Configuration......................................................................................................................... 16
5.1.7 Zoom/Focus..................................................................................................................................... 17
5.2 Network Configuration................................................................................................................................... 18
5.2.1 IPv4 and IPv6................................................................................................................................... 18
5.2.2 Port......................................................................................................................................................... 18
5.2.3 ONVIF ................................................................................................................................................... 19
5.2.4 DDNS................................................................................................................................................... 20
5.2.5 SNMP.................................................................................................................................................... 22
5.2.6 802.1x ...................................................................................................................................................24
5.2.7 RTSP .....................................................................................................................................................24
5.2.8 RTMP ....................................................................................................................................................26
5.2.9 UPNP .................................................................................................................................................... 27
5.2.10 SMTP..................................................................................................................................................... 28
5.2.11 FTP........................................................................................................................................................ 30
5.2.12 HTTPS................................................................................................................................................... 31
5.2.13 QoS........................................................................................................................................................ 33
5.3 Event Configuration.........................................................................................................................................34
5.3.1 Video Tampering Detection..................................................................................................35
5.3.2 Line Crossing...................................................................................................................................36
5.3.3 Perimeter Intrusion......................................................................................................................39
5.4 Alarm Configuration......................................................................................................................................... 41
5.4.1 Motion Detection...........................................................................................................................41
5.4.2 Other Alarms...................................................................................................................................43
5.4.3 Alarm In ..............................................................................................................................................45
5.4.4 Alarm Out......................................................................................................................................... 46

5.5 Security Configuration...................................................................................................................................48
5.5.1 User Configuration ......................................................................................................................48
5.5.2 Online User ...................................................................................................................................... 50
5.5.3 Block and Allow Lists ............................................................................................................... 50
5.5.4 Security Service ............................................................................................................................. 51
5.6 System Configuration..................................................................................................................................... 53
5.6.1 Basic Information ......................................................................................................................... 53
5.6.2 Time Zone&DST ............................................................................................................................54
5.6.3 Date and Time ................................................................................................................................54
5.6.4 Storage................................................................................................................................................ 55
5.7 Maintenance Configuration......................................................................................................................... 57
5.7.1 Backup and Restore ................................................................................................................... 57
5.7.2 Reboot................................................................................................................................................. 58
5.7.3 Upgrade..............................................................................................................................................59
5.7.4 Operation Log............................................................................................................................... 60
6Playback ............................................................................................................................61
6.1 Image Playback ................................................................................................................................................... 61
6.2 Video Search ........................................................................................................................................................63
7Appendix..........................................................................................................................65
7.1 Troubleshooting ....................................................................................................................................................65
7.2 Dimensions .............................................................................................................................................................67
7.3 Specifications........................................................................................................................................................68
Warranty Information............................................................................................................70
Limits and exclusions .............................................................................................................71

1
1Introduction
1.1 Product and Accessories
1.2 Parts identification
Number
Description
Number
Description
1 Tilting Arm 5 Power Cable
2 Mounting Base 6 SD Card Slot
3 Network Cable 7 Reset Button
4 Audio Input 8 Sunshield Cover

2
2Installation
2.1 Installation
1. The mounting surface must be able to bear at least five times the weight of your
camera.
2. Do not let the cables get caught in improper places or the electric line cover be
damaged. This may cause a breakdown or fire.
3. Using the mounting template sheet or the camera itself, mark and drill the
necessary holes in the wall or ceiling.
4. Pass wires through and make all necessary connections. See 2.2 Cabling for more
information.
5. Attach the main body to the mount bracket by tightening the lock screw.
6. To use the camera’s waterproof wiring:
a. Install the LAN cable into (a).
b. (b) will be assembled to (a) with a 1/4
turn.
c. Thread (c) tightly to (b).
7. Adjust the camera’s tilt and angle
using its bracket.
a. Pan: 360°
b. Tilt: 90°
c. Rotation: 360°

3
2.2 Cabling
1. When using a PoE Switch or PoE Injector, connect the camera using an Ethernet
cable for both data and power.
2. When not using PoE Switch or PoE Injector, connect the camera to the switch
using an Ethernet cable for data transmission and use a power adapter to power
the camera.
Power requirements
Power consumption
DC12V, PoE (IEEE 802.3af class 3).
Adapter not Included.
<9W
3. Use the diagram below to connect power, network and audio to the camera.
2.3 Managing the SD Card
1. To install the camera’s SD Card, locate the
SD card slot at the base of the camera
module by removing the cover dome.
2. Insert class 10 SD/SDHC/SDXC card into the
SD card slot by pressing the SD card until
clicks.
3. To remove the SD card, press the card
inward until it clicks to release from the card
slot then pull out from the slot.

4
3Network Setup
3.1 IP Finder
Use the DW® IP Finder™ software to scan the network and detect all MEGApix® cameras, set
the camera’s network settings or access the camera’s web client.
Network Setup
1. To install the DW IP Finder, go to http://www.digital-watchdog.com.
2. Enter “DW IP Finder” on the search box at the top of the page.
3. Go to the “Software” tab on the DW IP Finder page to download the installation
file.
4. Follow the installation Wizard to install DW IP
Finder. Launch DW IP Finder, enter the camera
login, then click the “Scan Devices” button. The
software will scan the selected network for
ONVIF compliant devices and will list the results
in the table. Double-click on a detected camera in
the search results to configure the
Camera
Settings
using DW IP Finder.

5
5. When connecting to the camera for the first time, a password must be set. To set
up a password for your new camera:
a. Check the box next to your new camera from the IP Finder’s search
results. You can select multiple cameras.
b. Click “Bulk Password Assign” on the left.
c. In the pop-up window, enter admin/
admin in the current username and
password fields. Enter a new username
and password to the right.
d. Press “change” to apply all changes.
6. Select a camera from the list by double-clicking
on the camera’s image or clicking on the ‘Click’
button under the IP Conf. column. The pop-up
window will show the camera’s current network
settings, allowing admin users to adjust the
settings as needed.
7. To access the camera’s web page, go to the IP
Config page and click on the ‘View Camera
Website’. To save the changes made to the
camera’s setting, input the username and
password of the camera and click Apply.

6
4Live View
Once the camera’s network settings have been setup properly, you can access
the camera’s web viewer.
To open the camera Web Menu using the DW IP Finder application:
1. Scan the network for the IP camera using DW IP Finder.
2. Double-click on the camera’s view in the results table.
3. Press the ‘View Camera Website’ button. The camera’s web viewer will
open up in your default web browser.
4. Enter the camera’s username and password to log in to the camera.
To open the camera Web Menu using a web browser:
1. Open a web browser.
2. Enter the camera’s IP address and port into the address bar. Example:
http://<ipaddress>:<port>. Port forwarding may be necessary to access
the camera from a different network. Contact your network
administrator for more information.
3. Enter the camera’s username and password to log in to the camera.
Note: If you are accessing the camera with a web browser for the first time, you
must set an Admin password for the camera. After logging in, the following
window will be shown:

7
Icon
Description
Icon
Description
Fullscreen SD card recording indicator
ALARM OUT-1 Enable/disable alarm output
Sensor alarm (on supported
models)
START/STOP
TWO-WAY
AUDIO
Start/stop two-
way audio
(on supported models)
Motion alarm (on supported
models)
AUDIO
ON/OFF
Enable/disable audio (on
supported models) Color abnormal
SNAPSHOT Snapshot
Abnormal clarity
START
RECORD
Start/stop local recording
(on supported models) Scene change
D-ZOOM IN
Digital zoom in the live
image
Line crossing
D-ZOOM OUT
Digital zoom out the live
image Alarm output
ZOOM/FOCUS
AZ control (only available
for cam models with
motorized zoom lens)
Perimeter Intrusion
IVA EVENT
INFO
Event rule information
display
Smart alarm indicators will flash only when the camera supports those functions

8
and events are enabled.
In fullscreen mode, you can double-click with the mouse or press the ESC key on
the keyboard to exit the fullscreen view.
Click the ZOOM/FOCUS button to show the AZ control panel. This is available on
supported models.
Icon
Description
Icon
Description
Zoom - Zoom +
Focus - Focus +
One key focus (use after manual lens adjustment and the image is
out of focus)

9
5Network Camera Configuration
In the camera’s web client, click on the “Setup” tab on the top right to go to the
setup menu.
Note: Click the “Save” button to save any changes to the settings before
changing menus.
5.1 Camera Configuration
Camera Configuration includes Display, Video/Audio, OSD, Video Mask and ROI
(region of interest) setup.
5.1.1 Camera Parameters
Go to Setup>Camera>Camera Parameters interface as shown below. The
image’s brightness, contrast, hue and saturation settings for Common, Day mode,
and Night Mode can be set up separately. Changes to the image can be quickly
seen by switching the Configuration File type.
Brightness: Set the brightness level of the camera’s image.
Contrast: Set the color gradient between the brightest/darkest parts of the
image.
Hue: Set the total color degree of the image.

10
Saturation: Set the degree of color purity. A high
Saturation
will make the image
appear more vibrant.
Sharpness: Set the resolution level of the image plane and the sharpness level of
the image edge.
Noise Reduction: Decrease the visual noise to make the image appear less
grainy due to electronic interference. Increasing this value will make the image
clearer but will also reduce the image resolution.
Defog: Clear the camera’s image in a foggy, dusty, smoggy, or rainy
environment.
Auto Iris: If your camera is using a motorized auto-focus iris lens, enable this
setting to allow the camera to automatically focus the image after zooming
in/out.
Backlight Compensation (BLC):
Off (default): disables the backlight compensation function.
HWDR: when enabled, a wide dynamic range will automatically adjust the
camera to provide a better image by balancing highly contrasted areas
simultaneously in the field of view by lowering the brightness of the bright area
and increasing the brightness of the dark area.
The stream will temporarily stop for a few seconds while the mode is changing
from non-WDR to WDR mode.
HLC: highlight compensation will lower the brightness of the entire image by
suppressing overexposed areas of the image and will reduce the size of the light
halo effect.
BLC: backlight compensation will adjust camera auto-exposure to increase
light exposure in the darkest areas of an image.
Antiflicker:
Off (default): disables the anti-flicker function. This is used mostly in outdoor
installations.
50Hz: reduces flicker in 50Hz lighting conditions.
60Hz: reduces flicker in 60Hz lighting conditions.
Smart IR: Select “ON” or “OFF”. This function will automatically prevent image
overexposure and underexposure by controlling the brightness of the IR lights.
White Balance: Adjusts the color temperature to match the color of the
environmental light source to give white objects a white coloration and a more
natural appearance.
Day/Night Mode:
•Auto: automatically change between Day mode and Night mode; depends
upon
Sensitivity
setting
•Day: forces camera to remain in the full-color mode
•Night: forces camera to remain in black/white image and

11
•Timing: the camera will switch day/night mode following a schedule.
Shutter Mode: Choose “Auto” or “Manual”. If “Manual” is selected, the digital
shutter speed can be adjusted.
Gain Mode: Choose “Auto” or “Manual”. If “Auto” is selected, the gain value will
be automatically adjusted according to the environment. If “Manual” is selected,
the gain value shall be set manually. A higher value will result in a brighter image.
Lens Distortion Correction: If the image appears warped, enable this function
and adjust the level to correct the distortion. (available for fisheye models only)
HFR: High Frame Rate. If “ON” is selected, the maximum frame rate of the Main
stream can be set to 60 fps /50fps.
Frequency: Select either 50Hz (EU/Asia) or 60Hz (N/S America).
Infra-red Mode:
•Auto: the camera will automatically turn IR lights ON/OFF when switching
between Day/Night modes.
•ON: forces camera IR lights to remain ON.
•OFF: forces camera IR lights to remain OFF.
Corridor Pattern: Corridor viewing modes can be used for situations such as
long hallways. 0 (default), 90, 180 and 270-degree options are available. The
video resolution should remain at 1080p or below if this function is used.
Image Mirror: invert the current video image horizontally.
Image Flip: invert the current video image vertically.
5.1.2 Video Configuration
Go to Setup>Camera >Video interface as shown below. In this interface, set the
resolution, frame rate, bitrate type, and video quality of the camera, depending
on network conditions.

12
Three video streams can be adjusted.
Resolution: Adjusts the camera stream resolution.
Frame rate: Adjusts image FPS (frames per second). A high frame rate results in
a smoother video.
Bitrate type:
•CBR: constant bitrate; compression bitrate is kept constant and allows video
quality to vary.
•VBR: variable bitrate; compression bitrate will be adjusted according to
scene changes. For example, for scenes that do not have much movement,
the bitrate will be kept at a lower value. This can help optimize network
bandwidth usage.
Bitrate: (CBR must be enabled); determines processing power for video
streaming where higher bitrate results in better image quality.
Video Quality: (VBR must be enabled); The higher the image quality, the more
bitrate will be required.
I-Frame interval: Determines how many partial frames (P-frames) may be
inserted between full frames (group of pictures) in the video stream. If there is
not much movement in the scene, setting the value higher than the frame rate
may potentially result in less bandwidth usage. However, if the value is set too
high and there is a high frequency of movement in the video there is a risk of
frame skipping.
Video Compression: Determines max data rate and video resolution for a video
stream. Select H.264, H.265, or MJPEG (unavailable for the Main stream)

13
according to system storage requirements.
Profile: (H.264) Baseline, main and high profiles are selectable.
Send Snapshot: Select how many snapshots to generate when sending event
notifications.
Videos encode slice split: Enable this function to improve camera image when
using a low-performance PC.
Watermark: Enable to display of a watermark when viewing locally recorded
video playback in the search interface. Tex t e ntered into
Watermark content
will
display.
5.1.3 Audio Configuration
Go to Setup>Camera>Audio as shown below. In this interface, set the audio
settings required for your setup. (availability varies by model).
The audio can be enabled or disabled as needed.
Audio Encoding: G711A and G711U are selectable.
Audio Type: LIN. And MIC (available for camera models with built-in
microphones only) is selectable.
5.1.4 OSD Configuration
Go to Setup>Camera>OSD interface as shown below. In this interface, set the
onscreen display that will overlay the camera video.

14
Date Format: Set how the calendar date will appear; enable “
Show Timestamp
”
to include the current time.
Device Name: Enable “
Show Device Name
” to display the model number in the
overlay.
OSD Content: Add additional lines of text to the overlay.
After enabling the OSD settings, you may drag and drop to reposition the
overlay items. Click the “Save” button to save any setting changes.
5.1.5 Privacy Mask
Go to Setup>Camera>Privacy Mask interface as shown below. A maximum of 4
zones can be set up. In this interface, you can create privacy mask zones to
blackout areas of the camera image.

15
To set up a video mask:
1. Enable Video Mask.
2. Click the “Draw Area” button and draw the video mask area.
3. Click the “Save” button to save the settings.
4. Return to viewing the live video to verify that the area masking appears
correctly.
This manual suits for next models
3
Table of contents
Other DW Security Camera manuals

DW
DW DWC-VSTB04Bi User manual

DW
DW DWC-MT95Wi28TW User manual

DW
DW DWC-MD44WA User manual

DW
DW DWC-PVF5M1TIRC6 User manual

DW
DW DWC-MB74Wi4 User manual

DW
DW DWC-V7253WTIR User manual

DW
DW DWC-LPR650 User manual

DW
DW Snapit DWC-V4363DB User manual

DW
DW Snapit DWC-V4363D User manual

DW
DW DWC-MB72I4V User manual

DW
DW DWC-PTZ20X User manual

DW
DW MEGApix CaaS DWC-MB44WiAWC5 User manual

DW
DW DWC-MPTZ30X User manual

DW
DW DWC-V6563D User manual

DW
DW MEGApix DWC-VSBD04Bi User manual

DW
DW DWC-MV95WiATW User manual

DW
DW DWC-C261T User manual

DW
DW DWC-HF21M4TIR User manual

DW
DW MEGApix DWC-MVA2Wi28T User manual

DW
DW MEGApix DWC-MBH2I4WV User manual