Webcctv installation manual, Version 4.4 series – Quadrox WebCCTV Installation Manual User Manual
Page 3
![background image](/manuals/570968/3/background.png)
WebCCTV Installation Manual
3
Version 4.4 Series
4.2
V
IDEO
C
LIENT
C
OMPONENT
(A
CTIVE
X)............................................................................................................................................. 46
4.3
C
HANGING NETWORK PORTS
.............................................................................................................................................................. 48
4.3.1
Changing WebCCTV video ports ............................................................................................................................................... 48
4.3.2
Changing TCP port .................................................................................................................................................................... 48
4.3.3
Changing remote desktop port ................................................................................................................................................... 49
4.4
W
EB
CCTV
POWER ON AFTER POWER FAILURE
.................................................................................................................................. 49
4.5
C
ONFIGURING AUDIO OVER THE
I
NTERNET
......................................................................................................................................... 49
5
STORAGE / BANDWIDTH CONSIDERATIONS ........................................................................................................................... 51
5.1
T
ERMINOLOGY AND BASIC VIDEO TECHNOLOGY
................................................................................................................................ 51
5.2
F
ACTORS THAT INFLUENCE BIT RATE AND VIDEO QUALITY
................................................................................................................ 53
5.2.1
Compression technique (codec).................................................................................................................................................. 53
5.2.2
Resolution .................................................................................................................................................................................. 54
5.2.3
Frame rate ................................................................................................................................................................................. 55
5.2.4
“Differential” live streaming ..................................................................................................................................................... 56
5.2.5
Activity detection for storage...................................................................................................................................................... 56
6
SECURITY POLICY .......................................................................................................................................................................... 57
6.1
P
ROPER USE OF
W
EB
CCTV ................................................................................................................................................................ 58
6.2
S
ECURITY POLICY
............................................................................................................................................................................... 59
6.2.1
Password policy ......................................................................................................................................................................... 59
6.2.2
Operator mode ........................................................................................................................................................................... 61
6.2.3
Windows security updates .......................................................................................................................................................... 61
6.2.4
Network security ........................................................................................................................................................................ 61
6.2.4.1
Dedicated network versus integration with the corporate network ..................................................................................... 62
6.2.4.2
Internet Connection ............................................................................................................................................................ 62
6.2.4.3
Limiting the number of protocols ....................................................................................................................................... 62
6.2.4.4
Firewall .............................................................................................................................................................................. 63
6.2.4.5
Allowing only known clients.............................................................................................................................................. 63
6.2.4.6
Securing the applications.................................................................................................................................................... 63
6.2.4.7
VPN.................................................................................................................................................................................... 64
6.2.5
Other types of access.................................................................................................................................................................. 64
6.2.6
3
rd
party security tools................................................................................................................................................................ 64
6.3
E
RROR RECOVERY MECHANISMS
........................................................................................................................................................ 65
7
TROUBLESHOOTING ...................................................................................................................................................................... 66
7.1
P
ROBLEM SOLVING PROCESS
.............................................................................................................................................................. 66
7.1.1
Preliminary checklist.................................................................................................................................................................. 66
7.1.2
Analyzing the problem................................................................................................................................................................ 67
7.2
S
OLUTIONS FOR COMMON PROBLEMS
................................................................................................................................................. 68
7.2.1
Start up problems ....................................................................................................................................................................... 68
7.2.2
Monitor problems....................................................................................................................................................................... 70
7.2.3
Windows logon problems ........................................................................................................................................................... 70
7.2.4
Remote connection problems...................................................................................................................................................... 71
7.2.5
Camera problems....................................................................................................................................................................... 72
7.2.6
WebCCTV software problems .................................................................................................................................................... 72
7.3
I
F YOU NEED FURTHER ASSISTANCE
.................................................................................................................................................... 74
7.3.1
Before you call ........................................................................................................................................................................... 74
7.3.2
Collecting the necessary information ......................................................................................................................................... 74
7.3.3
How to contact Quadrox ............................................................................................................................................................ 75
7.3.4
How to allow remotely access to your WebCCTV by Quadrox support...................................................................................... 75
8
APPENDICES...................................................................................................................................................................................... 76