Fortinet FortiCam 20A Quick Start Manual Download Page 23

Page 20

Version 2.1, February 1999
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder 
or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called “this 
License”). Each licensee is addressed as “you”.
A “library” means a collection of software functions and/or data prepared so as to be conveniently linked with application 
programs (which use some of those functions and data) to form executables.
The “Library”, below, refers to any such software library or work which has been distributed under these terms. A “work based on 
the Library” means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a 
portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, transla-
tion is included without limitation in the term “modification”.)
“Source code” for a work means the preferred form of the work for making modifications to it. For a library, complete source code 
means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control 
compilation and installation of the library.
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of 
running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a 
work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the 
Library does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library’s complete source code as you receive it, in any medium, provided 
that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep 
intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with 
the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection 
in exchange for a fee.
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and 
distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a) The modified work must itself be a software library.
b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change.
c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the 
facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, 
in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its 
purpose remains meaningful.
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, 
and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply 
to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole 
which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for 
other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of 
this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control 

Summary of Contents for FortiCam 20A

Page 1: ...FortiCam 20A QuickStart Guide...

Page 2: ...t enters a binding written contract signed by Fortinet s General Counsel with a purchaser that expressly warrants that the identified product will perform according to the performance metrics herein F...

Page 3: ...Table of contents Package contents 1 Hardware installation 2 Technical specifications 8 Compliance 10 License agreement 12...

Page 4: ...Mounting screws Mounting base Drilling template Weatherproofing shell for male RJ 45 connector Extra silica gel packet dry bag for very humid areas FortiCam 20A QuickStart Guide QuickStart Guide Secur...

Page 5: ...the cables in conduit Caution In many countries surveillance is restricted by law Before installing if you are uncertain of applicable privacy security laws consult your legal advisor Environmental sp...

Page 6: ...not use PoE injectors that are not IEEE 802 3af compliant To weatherproof your PoE connection 1 Disassemble the gasket and RJ 45 connector from waterproofing shell 2 Cut off the your network cable s...

Page 7: ...r more secure mounting omit the anchors instead pre drill holes into a framing stud 4 If your network cables are inside the wall ceiling drill a hole large enough to pass the camera s cable through th...

Page 8: ...ole in the camera base and optionally mounting base then twist the screws into the wall anchors or stud Tighten the screws with a screwdriver until the camera base is firmly in place If using the moun...

Page 9: ...ently grip the lens orb between two fingers and move it to adjust the orientation 9 Replace the cover Tighten the 4 security Torx screws to secure the housing 10 Connect your camera with your NVR and...

Page 10: ...amera unplug the PoE cable or press the reset button for 1 second To reset to factory default settings Press and hold the reset button for 10 seconds until the blue LED lights turn off When successful...

Page 11: ...nical specifications Interface Connector Protocol Description Ethernet Power RJ 45 10 100 Mbps Ethernet Ethernet port for connection to your network Power over Ethernet IEEE 802 3af 5 5 watts maximum...

Page 12: ...Iris F1 6 View Angle H 40 2 V 32 D 52 Wide Camera Angle Adjustment Pan 35 Tilt 0 90 Rotation 180 Vandal proof IK10 housing with security screws Weather proof IP66 Thickness 53 70 mm 2 11 in Diameter 1...

Page 13: ...es uses and can radiate radio frequency energy and if it is not installed and used in accordance with the instruction manual it may cause harmful interference to radio communications However there is...

Page 14: ...e must accept any interference received including interference that may cause undesired operation Ce dispositif est conforme la norme CNR 210 d Industrie Canada applicable aux appareils radio exempts...

Page 15: ...ed in section 5 Transfer and section 13 Open Source Software below non exclusive license to use the Software solely for your internal business purposes in accordance with the terms set forth in this A...

Page 16: ...ts product only to the single end user person or entity that originally purchased the Product from Fortinet or its authorized reseller or distributor and paid for such Product The warranty is only val...

Page 17: ...n conformance is incapable of correction or that it is not practical to repair or replace the non conforming Software the price paid by the original licensee for the non conforming Soft ware will be r...

Page 18: ...AMAGES THE SOLE REMEDY FOR A BREACH OF THE LIMITED WARRANTY IS REPAIR REPLACEMENT OR REFUND OF THE DEFECTIVE OR NON CONFORMING PRODUCT AS SPECIFICALLY STATED IN SECTION 6 ABOVE 10 Export Control FCPA...

Page 19: ...roduct functionality to end users Fortinet may also use personal information for ad ditional communication subject to an opt out indication in writing not to accept such communications from Fortinet a...

Page 20: ...Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is...

Page 21: ...ion and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major...

Page 22: ...ut may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any...

Page 23: ...eceive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this...

Page 24: ...re falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the L...

Page 25: ...ans you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library toge...

Page 26: ...nce of the rest of this License 12 If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who pla...

Page 27: ...Page 24...

Page 28: ......

Reviews: