www.acti.com
NVR 2.2 SP3 (V2.2.57) User’s Manual
26
3. For the Server IP address, you need to add the port number after the IP address. If your
workstation and server are located on the same computer, you may either use 127.0.0.1 or
the actual network address of your Network card. The port to use is the HTTP port. If your
HTTP port used is the default port 80, you can just enter the IP address and omit the port
number. If you are logging in to NVR server from a workstation located on a separate PC,
please make sure the IP and the HTTP port are correct, and that the router or firewall
allows traffic at this port.
Workstation for NVR and CMS (Central management System) use the same client. The
workstation can choose the type of server to login to. You may also select the language to
use here.
4. Preview Mode: There are two different levels of complexities in the live preview available.
For NVR Workstation, you will always use the
“Advanced” mode that comes with the full
features. For NVR Web Client, you may also choose to login with the basic preview mode.
5. You may choose to check the box
“Auto login with this account”. NVR will then remember
the settings you used to login this time, and automatically login in future startups, saving
you valuable time. Please note that if your workstation will be accessed by more than one
individual, then you may not want everyone to be able to auto-login with the default
account. In this case you should use the Save as Default as described below.
If you decide to cancel auto-login in the future, you may press Ctrl-F10 during login
process. The NVR will still start automatically that time. But when you login again, it will
again require you to type in your information manually.
6. Selecting
“Save as Default” will store the parameters you used this time for Language,
server IP, Port, User Name, application and Preview mode for future use. The next time you
login, everything except the password will be filled in automatically. This is useful if there is
a main user for this PC, but others may also gain access to this PC. In such cases you do
not want to breach security protocols by automatically logging in without verifying if the
user has permission to use this account. This method provides convenience with proper
security safeguard