Table of Contents
1 Monitor images on a PC ..........................................................................7
1.1
Monitor images from a single camera .............................................................................7
1.2
About the “Live” page ......................................................................................................9
1.3
Monitor cropping images ...............................................................................................13
1.4
Monitor images from multiple cameras ........................................................................16
2 Monitor images on a cellular phone/mobile terminal .........................17
2.1
Monitor images on a cellular phone ..............................................................................17
2.2
Monitor images on a mobile terminal ............................................................................19
3 Record images on the SD memory card manually .............................24
4 Action at an alarm occurrence ..............................................................26
4.1
Alarm type ........................................................................................................................26
4.2
Action at an alarm occurrence .......................................................................................26
5 Transmit images onto an FTP server ...................................................28
5.1
Transmit an alarm image at an alarm occurrence (Alarm image
transmission) ...................................................................................................................28
5.2
Transmit images at a designated interval or period (FTP periodic image
transmission) ...................................................................................................................28
5.3
Save images on the SD memory card when images fail to transmit using the FTP
periodic image transmission function ..........................................................................29
6 Display the log list .................................................................................30
7 Playback of images on the SD memory card ......................................34
7.1
Playback “JPEG(1)”/“JPEG(2)”/“JPEG(3)” images saved to the SD memory
card ...................................................................................................................................34
7.2
Playback “H.264(1)”/“H.264(2)”/“H.264(3)”/“H.264(4)” images saved to the SD
memory card ....................................................................................................................37
8 About the network security ...................................................................40
8.1
Equipped security functions ..........................................................................................40
9 Display the setup menu from a PC .......................................................41
9.1
How to display the setup menu .....................................................................................41
9.2
How to operate the setup menu .....................................................................................43
9.3
About the setup menu window ......................................................................................45
10 Configure the basic settings of the camera [Basic] ...........................47
10.1
Configure the basic settings [Basic] .............................................................................47
10.2
Configure the Internet settings [Internet] .....................................................................51
10.3
Configure the settings relating to the SD memory card [SD memory card] ..............54
10.4
Configure the settings relating to alteration detection [Alteration detection] ..........62
10.5
How to configure alteration detection settings ............................................................63
10.5.1
Generation of the CRT key (encryption key) ..................................................................64
10.5.2
Generation of the self-signed certificate (security certificate) .........................................65
10.5.3
Generation of CSR (Certificate Signing Request) ..........................................................67
10.5.4
Installation of the certificate issued by CA ......................................................................69
10.5.5
Configuration of alteration detection ...............................................................................70
4
Operating Instructions
Table of Contents