Introduction
2
Trademarks
2
Software License Agreement
2
Third Party Software
2
User Manuals
5
Types Of User Manuals
5
How To Use This Document
5
Examples Of System Configuration
11
Security Checking/Settings
14
Checking The Firewall Settings (Windows)
14
Initial Camera Settings
15
Settings Using The Camera Search Tool
15
Camera's Settings Page From The Web Browser
17
Overview
19
Accessing From A Web Browser
19
Configuration Of The Settings Page
19
Camera Operation
23
Operation By Clicking On The Video Display Area Or By Slider
23
Exposure Settings
25
Wb/Color Settings
29
Image Quality Settings
31
Image Quality Details Settings
32
Focus Settings
34
Autofocus
34
Manual Focus
36
Ptz/Is Settings
37
Preset Settings
38
Registering Presets
38
Calling Presets And Speed Specification
39
Deleting Presets
40
Other Functions
41
System Settings
42
Screen Configuration
42
Setting Items
43
Common Operations
43
[System] > [Video And Audio] > [Hdmi]
45
Hdmi
45
[System] > [Video And Audio] > [Ip Streaming Video]
46
Mainstream
46
Substream 1
47
Substream 2
47
[System] > [Video And Audio] > [Audio]
48
General Audio
48
Ip Audio Streaming
49
[System] > [Video And Audio] > [Movement Range]
50
Pan/Tilt
50
Zoom
50
[System] > [Server] > [Http/Video]
51
Http Server
51
Video Server
51
[System] > [Server] > [Rtp]
52
Rtp Server
52
Audio Settings
52
Rtp Mainstream, Rtp Substream 1, Rtp Substream 2
53
[System] > [Communication] > [Network]
54
Lan
54
Ipv4
54
Ipv6
55
Dns
55
Mdns
56
Update Firmware
56
[System] > [Communication] > [External Connection (Ip)]
57
Standard Communication (Ip)
57
Ndi|Hx
57
Rtmp
58
Srt
59
[System] > [Communication] > [External Connection (Serial)]
60
Serial Port
60
Standard Communication (Serial)
61
[System] > [Security] > [Certificate Management]
62
Server Certificate Management
62
Create Certificate
62
Ca Certificate Management
63
Crl Management
63
[System] > [Security] > [Ssl/Tls]
64
Encrypted Communications
64
Server Certificate
64
[System] > [Security] > [User Management]
65
Administrator Account
66
Authorized User Account
66
User Authority
66
[System] > [Security] > [Host Access Restrictions]
67
Ipv4 Host Access Restrictions
67
Ipv6 Host Access Restrictions
67
[System] > [System] > [Camera]
68
Camera Name
68
Installation Conditions
68
Camera Control
68
Color Bars
69
Tally Lamp
69
Ir Remote Controller
69
[System] > [System] > [Add-On]
70
Add-On Management
70
Information About The Selected Application
71
Auto Tracking Application (Lite)
71
[System] > [System] > [Date And Time]
72
Current Date And Time
72
Settings
72
[System] > [System] > [Environment]
74
Environment
74
Usb Camera
74
[System] > [Maintenance] > [General]
75
Device Information
75
Tool
75
Initialization
75
[System] > [Maintenance] > [Backup/Restore]
77
Backup
77
Restore
77
[System] > [Maintenance] > [Update Firmware]
78
Device Information
78
Online Update
78
Offline Update
78
[System] > [Maintenance] > [Log]
79
View Logs
79
Names And Functions Of Parts
81
Handling The Remote Controller
83
Usb Camera Functions
85
Image Adjustment/Camera Control Functions
85
Troubleshooting
86
List Of Log Messages
88
Log Messages On The Camera
88
Error Log
88
Warning Log
91
Notification Log
94
Restoring To The Factory Default Settings
98
Restoring To The Initial Settings From A Web Browser
98
Restoring To The Factory Default Settings With The Reset Switch On The Camera
98
List Of Factory Default Settings
99
Routine Maintenance
103
Cleaning The External Surface
103
Cleaning The Lens
103
Specifications
104
Cr-N100 Main Unit
104
Accessories
106
Operating Environment
107
Security Measures
108
Basic Measure 1: Setting Administrator Name And Password
109
Basic Measure 2: Using The Latest Firmware
109
Basic Measure 3: Setting Date And Time
109
Basic Measure 4: Monitoring The Log
109
Measures Suitable To The Users' Environment 1: User Management
110
Measures Suitable To The Users' Environment 2: Host Access Restrictions
110
Measures Suitable To The Users' Environment 3: Setting To The Digest Authentication
110
Measures Suitable To The Users' Environment 4: Changing The Port Number
111
Measures Suitable To The Users' Environment 5: Encrypting Communication
111
Measures Suitable To The Users' Environment 6: Disabling Unused Functions
111
Precautions When Disposing The Camera
112
Encrypting Backup Information
112
Index
113
Diskussion
Hinterlassen Sie einen Kommentar oder stellen Sie eine Frage
An der Diskussion teilnehmen
Stellen Sie eine Frage zum Handbuch oder fügen Sie eine hilfreiche Antwort für andere Nutzer hinzu.