manuals.online logo
Brands
  1. Home
  2. •
  3. Brands
  4. •
  5. ICRealtime
  6. •
  7. Network Hardware
  8. •
  9. ICRealtime Mini 1U Series User manual

ICRealtime Mini 1U Series User manual

Quick Start Guide V.1.01
Network Video
Recorder 1U/ Mini 1U
Getting Started
A. Inspecting the Components
B. Rear Panel Identification
Device Setup
A. Booting Up
B. Device Initialization
C. Startup Wizard
Web Operation
A. Accessing Web Interface
Remote Access
A. P2P setup to Phone App
Appendices
A. FAQ
B. Toxic or Hazardous materials or
Elements
C. Cybersecurity Recommendations
1
2
3
3
4-5
5
6
7
7
8-9
Table Of Contents
MARGIN
GUIDES
To see the guides to go:
View / Guides / Show
Guides
www.icrealtime.com
IMPORTANT SAFEGUARDS AND WARNINGS
Operating Requirement
●Install the PoE front-end device indoors.
●The Device does not support wall mount.
●Do not place and install the device in an area exposed to direct sunlight or near heat
generating devices.
●Do not install the device in a humid, dusty or fuliginous area
●Keep its horizontal installation, or install it at stable places, and prevent it from falling.
●Do not drip or splash liquids onto the device; don’t put on the device anything filled
with liquids, in order to prevent liquids from flowing into the device.
●Install the device at well-ventilated places; don’t block its ventilation opening.
●Use the device only within rated input and output range
●Do not dismantle the device arbitrarily.
●Transport, use and store the device within allowed humidity and temperature range.
Electrical Safety
●Improper battery use might result in fire, explosion, or inflammation.
●When replacing battery, make sure the same model is used.
●Use the recommended power cables in the region and conform to the rated power
specification
●Use the power adapter provided otherwise, it may result in injury and device damage.
●The power source shall conform to the requirement of the Safety Extra Low Voltage
(SELV) standard, and supply power with rated voltage which conforms to Limited
power Source requirement according to IEC60950-1. Please note that the power
supply requirement is subject to the device label.
●Connect the device (I-type structure)to the power socket with protective earthing.
1A. Inspecting the Components
Items Detail Inspect
Package ●Appearance
●Packing Materials
●Accessories
●Any obvious damage on box
●Broken or distorted positions due to physical abuse
●The accessory box should have all materials (ie: extra
SATA cables, Remote, Power cord)
Labels ●Labels Containing the
Serial Number are
located on Device and
in box
●The serial numbers on the Labels are in vital in
tracking the device in our database. Ensure they are
not torn or lost.
Device ●Appearance
●Data, power, and fan
cables, mainboard
●Any obvious damage
●Loose connections
MARGIN
GUIDES
To see the guides to go:
View / Guides / Show
Guides
2 | www.icrealtime.com
1B. Rear Panel Identification
The actual appearance may differ depending on the model purchased.
1. Power Input Port
2. Power On/Off Switch
3. PoE ports (for IP camera connection)
4. Ethernet Port (to local network)
5. VGA Port
6. HDMI Port
7. Audio Input/ Output (for 2 way talk)
8. RS232 port
9. Alarm Input/ Output Panel
10. USB Port
11. Ground
3 | www.icrealtime.com
MARGIN
GUIDES
Stay within the yellow
box. Do not let text go
beyond, instead move
to the next column or
start a new page.
2A. BOOTING UP
1.1 - Prerequisites
●System is being supplied appropriate power.
●A network cable is connected to a router for local and remote access.
●A mouse and display are connected to the machine to interact with the menus.
2B. DEVICE INITIALIZATION
1.1 - Region Settings
●Select region and appropriate language then click next.
DEVICE INITIALIZATION (cont.)
●Draw an unlock pattern to use in place of a password.
●Click skip if you do not want to use an unlock pattern.
Figure 4.2-2
1.2 - Security
●Create a password at least 8 characters long and has at least two character types,
●A prompt question can act as a password hint.
●Answer security questions to reset password in case password is lost.
●A factory reset will be necessary if the password was forgotten at a later date and
security questions were not answered.
MARGIN
GUIDES
Stay within the yellow
box. Do not let text go
beyond, instead move
to the next column or
start a new page.
4 | www.icrealtime.com
STARTUP WIZARD (cont.)
1.3 - Network
●Leave machine on DHCP so it gets assigned an IP address from the router. You
may set on static after it has acquired an IP from the local network.
●Disable DHCP and program IP address manually if using a static IP address.
1.4 - P2P
●Keep P2P enabled for easy remote access.
2C STARTUP WIZARD
1.1 - General Settings
●General settings can be left at default.
●Change Auto Logout to 0 minutes to always stay logged in.
1.2 - Timezone
●Select appropriate time zone (UTC/GMT).
●Enable Daylight Savings Time (DST) if applicable. DST settings should be set
to week with a start time of Mar 2nd Sun and an end time of Nov 1st Sun.
MARGIN
GUIDES
Stay within the yellow
box. Do not let text go
beyond, instead move
to the next column or
start a new page.
5 | www.icrealtime.com
STARTUP WIZARD (cont)
1.7- Record & Snapshot Schedule (optional)
●Click any of the setup icons to the right of the timeline
●Select the checkbox for Motion/MD within period 1 then copy settings to every
day of the week.
●Use the copy button to apply settings to appropriate channels.
3A. Accessing Web Interface:
●Open the browser and enter the IP address of the Device into the address bar.
Press Enter key. The Login interface is displayed.
● Enter the username (admin) and the password that was set up.
●Click Login.
STARTUP WIZARD (cont)
1.5 - Encode Settings (optional)
●Lower encode settings to optimize maximum recording time.
●Recommended values are: H.265, 15FPS, VBR, 6(Best).
1.6 - Basic (optional)
●Basic settings can be left on default.
●Auto delete old files only applies to system logs.
MARGIN
GUIDES
Stay within the yellow
box. Do not let text go
beyond, instead move
to the next column or
start a new page.
6 | www.icrealtime.com
4A. P2P setup to Phone App:
●Log in to the local or web interface and select Main Menu> NETWORK>P2P.
● Enable the P2P checkbox. The Status should be: Online or Connect Success.
●Open the phone app (ICRSS Pro or IC VIew) and go to the Main Menu > Device Manager.
●Tap on the “+” icon on the upper right. Select Wired Device then tap on P2P.
●Input a name, tap on the QR code icon to enable the app to use your camera. Scan the
QR code.
●Input the correct username and password. Tap on Start Live Preview to connect to your
Recorder.
MARGIN
GUIDES
Stay within the yellow
box. Do not let text go
beyond, instead move
to the next column or
start a new page.
7 | www.icrealtime.com
P2P says Offline even
though I followed the
steps in the guide
The machine may not have pulled an IP
address from the router. Verify all cables are
secure and there is link light activity on the
Ethernet Port. You can also change the DNS
servers to DHCP instead of the default
8.8.8.8
I want to access my
recorder from my
phone
You can download our free or premium
version of the app from the Play Store or the
App Store. Search IC Realtime and you’ll get
results for IC View (free) and ICRSS Pro
(premium).
Can I set up the
machine without a
display connected?
Yes. You can access the machine’s
configuration page from a computer by
typing its IP address into a web browser.
I can not login
through the web
browser
IC Realtime recorders that are not HTML5
compatible have to use Internet Explorer to
initialize the plugin. If you’re already using
Internet Explorer, reinstall the plugin by
deleting the “webrec” and “webplugin.exe”
folders within C:\Program Files and/or
C:\Program Files (x86)
My IP cameras won’t
connect/ show image
You may need to Initialize the camera before
the NVR can connect to it. This is done in the
Registration section or by logging into the
camera Web GUI. See here for more camera
registration information:
Remote Device Registration
I need more in-depth
help regarding
configuration
IC Realtime has a Help Center that covers a
variety of topics:
https://icrealtime.zendesk.com/hc/en-us
5A. FAQ 5B. APPENDIX: TOXIC OR HAZARDOUS MATERIALS OR ELEMENTS
Component Name Pb Hg Cd Cr VI PBB PBDE
Circuit Board
Component • • • • • •
Device Case • • • • • •
Wire and Cable • • • • • •
Packing Components • • • • • •
Accessories • • • • • •
O: Indicates that the concentration of the hazardous substance in all
homogeneous materials in the parts is below the relevant threshold
of the SJ/T11363-2006 standard.
MARGIN
GUIDES
Stay within the yellow
box. Do not let text go
beyond, instead move
to the next column or
start a new page.
8 | www.icrealtime.com
5C. Appendix: Cybersecurity Recommendations
Cybersecurity is more than just a buzzword: it’s something that pertains to
every device that is connected to the internet. IP video surveillance is not
immune to cyber risks, but taking basic steps toward protecting and
strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on
how to create a more secured security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords.
Here are some recommendations:
●The length should not be less than 8 characters
●Include at least two types of characters; character types include
upper and lower case letters, numbers and symbols
●Do not include the account name or the account name in reverse
order
●Do not use continuous characters such as 123, abc, etc.
●Do not use repeated characters such as 111, aaa, etc
2. Update Firmware and Client Software in Time
●According to the standard procedure in Tech-industry, we
recommend to keep your equipment (such as NVR, DVR, IP
camera, etc.) firmware up-to-date to ensure the system is
equipped with the latest security patches and fixes. When the
equipment is connected to the public network, it is recommended to
enable the “auto-check for updates” function to obtain timely
information of firmware updates released by the manufacturer
●We suggest that you download and use the latest version of client
software.
"Nice to have" recommendations to improve your equipment
network security:
●Physical Protection. We suggest that you ensure physical
protection to equipment, especially storage devices. For
example, place the equipment in a special computer room
and rack cabinet, as well as implementing strong access
control permission and key management to prevent
unauthorized personnel from carrying out physical
contacts such as damaging hardware, unauthorized
connection of removable equipment (such as USB flash
disk, serial port), etc.
○
●Change Passwords Regularly. We suggest that you
change passwords regularly to reduce the risk of being
guessed or cracked.
●Maintain and Update Password Reset Information. The
equipment supports password reset function. Please
set up related information for password reset, including
the end user’s mailbox and password protection
questions. If the information changes, please modify it
accordingly. When setting password protection
questions, it is suggested not to use those that can be
easily guessed.
○
●Enable Account Lock. The account lock feature is enabled
by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to
log in with the wrong password several times, the
corresponding account and the source IP address will be
locked
MARGIN
GUIDES
Stay within the yellow
box. Do not let text go
beyond, instead move
to the next column or
start a new page.
9 | www.icrealtime.com
●Change Default HTTP and Other Service Ports. It is
recommended to change default HTTP and other service
ports into any set of numbers between 1024~65535,
reducing the risk of outsiders being able to guess which
ports you are using.
●Enable HTTPS. It is recommended to enable HTTPS, so
that you visit Web service through a secure
communication channel.
●Enable Whitelist. It is recommended to enable whitelist
function to prevent everyone, except those with
specified IP addresses, from accessing the system.
Therefore, please be sure to add your computer’s IP
address and the accompanying equipment’s IP address to
the whitelist.
●MAC Address Reservation/ Binding. It is recommended
to bind the IP and MAC address of the gateway to
the equipment, thus reducing the risk of ARP spoofing.
●Assign Accounts and Privileges Responsibly. In
accordance to business and management requirements,
add users and assign a minimum set of permissions to
them.
●Disable Unnecessary Services and Choose Secure Modes.
If not needed, it is recommended to turn off some services
such as SNMP, SMTP, UPnP, etc., to reduce risks. If
necessary, it is highly recommended that you use safe
modes, including but not limited to the following services:
SNMP: Choose SNMP v3, and set up strong encryption
passwords and authentication passwords. SMTP: Choose
TLS to access mailbox server. FTP: Choose SFTP, and set
up strong passwords. AP hotspot: Choose WPA2-PSK
encryption mode, and set up strong passwords
●Audio and Video Encrypted Transmission. If your audio
and video data contents are very important or sensitive,
we recommend that you use encrypted transmission
function to reduce the risk of audio and video data being
stolen during transmission. Reminder: encrypted
transmission will cause some loss in transmission
efficiency.
●Secure Auditing. Check online users: we suggest that
you check online users regularly to see if the device is
logged in without authorization. Check equipment log: By
viewing the logs, you can know the IP addresses that were
used to log in to your devices and their key operations.
●Network Log. Due to the limited storage capacity of the
equipment, the stored log is limited. If you need to save the
log for a long time, it is recommended that you enable the
network log function to ensure that the critical logs are
synchronized to the network log server for tracing
●Construct a Safe Network Environment. In order to
better ensure the safety of equipment and reduce
potential cyber risks, we recommend:
○Disable the port mapping function of the router to
avoid direct access to the intranet devices from
external network.
○The network should be partitioned and isolated
according to the actual network needs. If there are
no communication requirements between two
sub networks, it is suggested to use VLAN,
network GAP and other technologies to partition
the network, so as to achieve the network isolation
effect.
○Establish the 802.1x access authentication system
to reduce the risk of unauthorized access to private
networks.

Other manuals for Mini 1U Series

3

This manual suits for next models

1

Other ICRealtime Network Hardware manuals

ICRealtime NVR-7508K User manual

ICRealtime

ICRealtime NVR-7508K User manual

ICRealtime Mobile Network Video Recorder User manual

ICRealtime

ICRealtime Mobile Network Video Recorder User manual

ICRealtime 1U POE NVR Series User manual

ICRealtime

ICRealtime 1U POE NVR Series User manual

ICRealtime Network Video Recorder User manual

ICRealtime

ICRealtime Network Video Recorder User manual

ICRealtime ClearView NVR 34/34E User manual

ICRealtime

ICRealtime ClearView NVR 34/34E User manual

ICRealtime nvr700ns User manual

ICRealtime

ICRealtime nvr700ns User manual

ICRealtime NVR4i Series User manual

ICRealtime

ICRealtime NVR4i Series User manual

Popular Network Hardware manuals by other brands

NEC Aspire Series Networking manual

NEC

NEC Aspire Series Networking manual

Cisco Content Delivery Engine 100/200/300/400 Hardware installation guide

Cisco

Cisco Content Delivery Engine 100/200/300/400 Hardware installation guide

TP-Link TL-EP110 Quick installation guide

TP-Link

TP-Link TL-EP110 Quick installation guide

Wizard ON-XD2704 User instruction

Wizard

Wizard ON-XD2704 User instruction

CORNING CCH-01U manual

CORNING

CORNING CCH-01U manual

Solstice SLS-ENVR Series user manual

Solstice

Solstice SLS-ENVR Series user manual

Forcepoint N60 Series Hardware guide

Forcepoint

Forcepoint N60 Series Hardware guide

D-Link MYDLINK DNR-322L user manual

D-Link

D-Link MYDLINK DNR-322L user manual

IndigoVision Enterprise NVR-AS 4000 G3 2U quick start guide

IndigoVision

IndigoVision Enterprise NVR-AS 4000 G3 2U quick start guide

Cisco IAD1101 installation guide

Cisco

Cisco IAD1101 installation guide

Verilink TAC 2010 user manual

Verilink

Verilink TAC 2010 user manual

Asus AAEON BOXER-8256AI user manual

Asus

Asus AAEON BOXER-8256AI user manual

D-Link mydlink DNR-312L Quick install guide

D-Link

D-Link mydlink DNR-312L Quick install guide

Interlogix TruVision NVR 50 quick start guide

Interlogix

Interlogix TruVision NVR 50 quick start guide

Nice HubNetworklink quick start guide

Nice

Nice HubNetworklink quick start guide

ADC Migration Modules DSX-3 Quick reference guide

ADC

ADC Migration Modules DSX-3 Quick reference guide

ZyXEL Communications GS1900 Series user guide

ZyXEL Communications

ZyXEL Communications GS1900 Series user guide

Patton electronics 2450 user manual

Patton electronics

Patton electronics 2450 user manual

manuals.online logo
manuals.online logoBrands
  • About & Mission
  • Contact us
  • Privacy Policy
  • Terms and Conditions

Copyright 2025 Manuals.Online. All Rights Reserved.