
User Manual of DS-6600 Audio/Video Encoder
11
Remote Web browser access by HTTP protocol;
Connectable with network HDD in NAS, IPSAN mode;
Send E-mail by SMTP protocol, and support attachment of captured JPEG image and SSL encryption;
Remote JPEG image capturing with user-defined image resolution and quality.
PTZ Control
Support Multiple PTZ Protocols
Different channels can be configured with protocol type, RS-485 address, baud rate, data bit, stop bit, even & odd
parity, stream control method, etc.; and remote configuration of presets, patrols and patterns.
Digital Zoom (with Speed Dome)
When connected with speed dome, digital zooming can be realized by clicking on the image through client
software.
PTZ linkage
Relay input alarm can be responded with PTZ linkage actions, e.g., callup of predefined presets, patrols or
patterns.
Alarm
Relay Alarm Input
Either NO mode or NC mode can be set;
Four different alarm arming periods are configurable;
Capabilities of triggering corresponding alarm handling methods, relay alarm output, buzzer alarm, upload to
control center, PTZ linkage, presets/patrols/patterns callup, etc.
Relay Alarm Output
Relay alarm output can be connected with alarm devices for alarm handling within arming period.
Exceptions
ExceptionAlarm Handling
Exception alarms include network disconnect alarm, IP address conflict alarm, illegal access alarm, etc.; multiple
alarm handling methods are supported, relay alarm output, buzzer alarm, upload to center, etc.
Exception Reboot
Software watchdog capability: for inspecting important tasks and system resources of device; in case of
exceptions detected, the device will be automatically rebooted.
Firmware watchdog: for inspecting the firmware of device; in case of exceptions in system task scheduling, the
device will be automatically rebooted.
UserAdministration
A maximum of 32 users can be created by the system, including 1 administrator and 31 users. The user name of
the administrator is admin, which cannot be modified, and the password is allowable to be modified by the
administrator only; no deletion of the administrator is allowed, and the administrator is authorized to set the
operation permissions for normal users.
Logs
The system logs can be classified into the operation logs, alarm logs, exception logs and information logs. User
may search and view all recorded system logs by date or type, as well as export the logs to the text format over
network.
SDK Interface
Available with SDK in Windows and Linux operating systems;
Available with application software source code for demo;
Available with development support and training service of the application system.