Do you have a question about the Dahua Technology DHI-ITC413-PW4D-IZ3 and is the answer not in the manual?
| Effective Pixels | 4 MP |
|---|---|
| Lens Type | Motorized vari-focal |
| Video Compression | H.265/H.264/MJPEG |
| WDR | 120dB |
| Protection Grade | IP67 |
| Day/Night | ICR |
| Digital Noise Reduction | 3D DNR |
| Max. Resolution | 2688 x 1520 |
| Focal Length | 2.7mm ~ 12mm |
| Aperture | F1.4 |
| Angle Adjustment | Pan: 0° to 360°, Tilt: 0° to 90°, Rotation: 0° to 360° |
| IR Range | 30 m (98.4 ft) |
| Power Supply | PoE (802.3af) or 12V DC |
| Minimum Illumination | 0.002 Lux @F1.4 |
| Network Interface | 1 RJ-45 port (10/100 Base-T) |
| Image Sensor | 1/2.8" CMOS |
| Operating Conditions | Humidity 95% or less (non-condensing) |
Transport the device under allowed humidity and temperature conditions, ensuring safety.
Store the device under allowed humidity and temperature conditions for optimal performance.
Guidelines for safe and proper installation, including electrical safety and environmental considerations.
Instructions for safe operation, including power supply, environmental conditions, and handling.
Procedures for maintaining the device, including cleaning, repairs, and accessory usage.
Introduces the camera's intelligent deep learning algorithm and its applications.
Details key features like permission management, storage, alarm, network monitoring, capture, and auto adjustment.
Provides detailed physical dimensions of the camera in mm and inches.
Illustrates the overall structure of the device with labeled components.
Details the components and ports located on the rear panel of the device.
Describes the various cables connected to the device and their functions.
Step-by-step procedure for mounting the camera on a pole.
Step-by-step procedure for mounting the camera on a wall.
Step-by-step procedure for mounting the camera on a ceiling.
Essential steps for basic network security, including strong passwords and software updates.
Optional security enhancements like physical protection, account locking, and secure protocols.