Guardnvr installation manual, Version 4.4 series – Quadrox QGuard Installation Manual User Manual
Page 3
GuardNVR Installation Manual
3
Version 4.4 Series
5.1
T
ERMINOLOGY AND BASIC VIDEO TECHNOLOGY
................................................................................................................................ 51
5.2
F
ACTORS THAT INFLUENCE BIT RATE AND VIDEO QUALITY
................................................................................................................ 53
5.2.1
Compression technique (codec).................................................................................................................................................. 53
5.2.2
Resolution .................................................................................................................................................................................. 54
5.2.3
Frame rate ................................................................................................................................................................................. 55
5.2.4
“Differential” live streaming ..................................................................................................................................................... 56
5.2.5
Activity detection for storage...................................................................................................................................................... 56
6
SECURITY POLICY .......................................................................................................................................................................... 57
6.1
P
ROPER USE OF
G
UARD
NVR .............................................................................................................................................................. 57
6.2
S
ECURITY POLICY
............................................................................................................................................................................... 58
6.2.1
Password policy ......................................................................................................................................................................... 58
6.2.2
Windows security updates .......................................................................................................................................................... 60
6.2.3
Network security ........................................................................................................................................................................ 60
6.2.3.1
Dedicated network versus integration with the corporate network ..................................................................................... 60
6.2.3.2
Connecting GuardNVR to the Internet ............................................................................................................................... 61
6.2.3.3
Limiting the number of protocols ....................................................................................................................................... 61
6.2.3.4
Firewall .............................................................................................................................................................................. 61
6.2.3.5
Allowing only known clients.............................................................................................................................................. 62
6.2.3.6
Securing the applications.................................................................................................................................................... 62
6.2.3.7
VPN.................................................................................................................................................................................... 62
6.2.4
Other types of access.................................................................................................................................................................. 63
6.2.5
3
rd
party security tools................................................................................................................................................................ 63
6.3
E
RROR RECOVERY MECHANISMS
........................................................................................................................................................ 63
7
TROUBLESHOOTING ...................................................................................................................................................................... 64
7.1
P
ROBLEM SOLVING PROCESS
.............................................................................................................................................................. 64
7.1.1
Preliminary checklist.................................................................................................................................................................. 64
7.1.2
Analyzing the problem................................................................................................................................................................ 65
7.2
S
OLUTIONS FOR COMMON PROBLEMS
................................................................................................................................................. 66
7.2.1
Start up problems ....................................................................................................................................................................... 66
7.2.2
Monitor problems....................................................................................................................................................................... 68
7.2.3
Windows logon problems ........................................................................................................................................................... 68
7.2.4
Remote connection problems...................................................................................................................................................... 69
7.2.5
Camera problems....................................................................................................................................................................... 70
7.2.6
GuardNVR software problems ................................................................................................................................................... 70
7.3
I
F YOU NEED FURTHER ASSISTANCE
.................................................................................................................................................... 72
7.3.1
Before you call ........................................................................................................................................................................... 72
7.3.2
Collecting the necessary information ......................................................................................................................................... 72
7.3.3
How to contact Quadrox ............................................................................................................................................................ 73
7.3.4
How to allow remotely access to your GuardNVR by Quadrox support..................................................................................... 73
8
APPENDICES...................................................................................................................................................................................... 74