beautypg.com

Guardnvr installation manual, Version 4.4 series – Quadrox QGuard Installation Manual User Manual

Page 3

background image

GuardNVR Installation Manual

3


Version 4.4 Series

5.1

T

ERMINOLOGY AND BASIC VIDEO TECHNOLOGY

................................................................................................................................ 51

5.2

F

ACTORS THAT INFLUENCE BIT RATE AND VIDEO QUALITY

................................................................................................................ 53

5.2.1

Compression technique (codec).................................................................................................................................................. 53

5.2.2

Resolution .................................................................................................................................................................................. 54

5.2.3

Frame rate ................................................................................................................................................................................. 55

5.2.4

“Differential” live streaming ..................................................................................................................................................... 56

5.2.5

Activity detection for storage...................................................................................................................................................... 56

6

SECURITY POLICY .......................................................................................................................................................................... 57

6.1

P

ROPER USE OF

G

UARD

NVR .............................................................................................................................................................. 57

6.2

S

ECURITY POLICY

............................................................................................................................................................................... 58

6.2.1

Password policy ......................................................................................................................................................................... 58

6.2.2

Windows security updates .......................................................................................................................................................... 60

6.2.3

Network security ........................................................................................................................................................................ 60

6.2.3.1

Dedicated network versus integration with the corporate network ..................................................................................... 60

6.2.3.2

Connecting GuardNVR to the Internet ............................................................................................................................... 61

6.2.3.3

Limiting the number of protocols ....................................................................................................................................... 61

6.2.3.4

Firewall .............................................................................................................................................................................. 61

6.2.3.5

Allowing only known clients.............................................................................................................................................. 62

6.2.3.6

Securing the applications.................................................................................................................................................... 62

6.2.3.7

VPN.................................................................................................................................................................................... 62

6.2.4

Other types of access.................................................................................................................................................................. 63

6.2.5

3

rd

party security tools................................................................................................................................................................ 63

6.3

E

RROR RECOVERY MECHANISMS

........................................................................................................................................................ 63

7

TROUBLESHOOTING ...................................................................................................................................................................... 64

7.1

P

ROBLEM SOLVING PROCESS

.............................................................................................................................................................. 64

7.1.1

Preliminary checklist.................................................................................................................................................................. 64

7.1.2

Analyzing the problem................................................................................................................................................................ 65

7.2

S

OLUTIONS FOR COMMON PROBLEMS

................................................................................................................................................. 66

7.2.1

Start up problems ....................................................................................................................................................................... 66

7.2.2

Monitor problems....................................................................................................................................................................... 68

7.2.3

Windows logon problems ........................................................................................................................................................... 68

7.2.4

Remote connection problems...................................................................................................................................................... 69

7.2.5

Camera problems....................................................................................................................................................................... 70

7.2.6

GuardNVR software problems ................................................................................................................................................... 70

7.3

I

F YOU NEED FURTHER ASSISTANCE

.................................................................................................................................................... 72

7.3.1

Before you call ........................................................................................................................................................................... 72

7.3.2

Collecting the necessary information ......................................................................................................................................... 72

7.3.3

How to contact Quadrox ............................................................................................................................................................ 73

7.3.4

How to allow remotely access to your GuardNVR by Quadrox support..................................................................................... 73

8

APPENDICES...................................................................................................................................................................................... 74