73
Installation
Introduction
How to Use
Configuration
Definitions
Appendix
Glossary (Index)
A
Accessories ...................................................... 11
Access list ......................................................... 44
Administrator .................................................... 30
Alarm setting .................................................... 52
Audio output ...................................................... 12
Audio setting .................................................... 51
B
Browser .................................................................. 3
Software to browse Web screens.
Microsoft
®
Corporation Internet Explorer
TM
only.
C
Camera control .................................... .......... ... 54
The network camera's Pan/Tilt/Zoom
operation by connecting with a PTZ driver
or scanner via RS485 interface.
Camera name .................................... ............. ... 28
Certificate .................................... ................... ... 32
This is a certificate for HTTPS. There
are a self-signed certificate and a signed
certificate. The certificate can be created
by using the network camera.
Configuration ....................................... .............. 28
Contents ......................... ...................... .............. 11
D
Daylight Saving Time (DST) ................. 29, 67
T h i s n e t w o r k c a m e r a a u t o m a t i c a l l y
c o n f i g u r e t h e D a y l i g h t S a v i n g T i m e .
Clicking Export to export an XML file from
the network camera allows you to set the
starting and ending time of DST.
DDNS ......................................... ............. ............. 43
(Dynamic Domain Name System)
This is the technique to overwrite the
i n f o r m a t i o n o f D N S(D o m a i n N a m e
System)server dynamically and forward
only different informations between DNS
servers.
Because of this, it enables to reduce
forwarding data which are needed to renew
information of DNS server, and reduce
overhead of the network. When combined
with DHCP (Dynamic Host Configuration
Protocol), it is possible to assign IP
address and host name right away as the
host on the LAN changes.
Default gateway ...................................... 16, 35
Network devices cannot communicate
directly with devices in other networks.
In this case, communication becomes
possible by using devices like a router.
Default gateway is the IP address of the
router.
DHCP ................................................................... 35
(Dynamic Host Configuration Protocol)
This is the protocol to assign IP address
dynamically to each client on TCP/IP
network. DHCP server controls information
of IP address, gateway address, domain
name and subnet mask and can assign
these to client.
Digital In/Out .................................................... 29
(Digital input/output)
Digital zoom ....................................................... 23
DNS ...................................................................... 16
(Domain Name System)
Domain Name Systems translates IP
addresses into names making it easier to
manage hosts.
E
Ethernet cable .................................................. 17
E-mail ................................................................... 60
F
Firmware ............................................................. 69
Program to run this product. It is installed
in the flash memory, and can be updated
from PC by using PC upload function of
the WEB.
Frame rate .................................................. 49, 50
The rate of number of pictures that are
translated in a second.
Frame size .................................................. 49, 50
FTP ....................................................................... 40
(File Transfer Protocol)
A protocol to transfer file(s) to and from
o t h e r n e t w o r k d e v i c e s . T h e n e t w o r k
camera supports both active.
H
HTTP port number ........................................... 38
HTTPS .................................................................. 31
It enables authentication and encrypted
communication to protect streaming data
over the Internet.
㪐㪏㩷㪆㩷㪈㪍㪇