beautypg.com

Webcctv installation manual, Version 4.4 series – Quadrox WebCCTV Installation Manual User Manual

Page 3

background image

WebCCTV Installation Manual

3


Version 4.4 Series

4.2

V

IDEO

C

LIENT

C

OMPONENT

(A

CTIVE

X)............................................................................................................................................. 46

4.3

C

HANGING NETWORK PORTS

.............................................................................................................................................................. 48

4.3.1

Changing WebCCTV video ports ............................................................................................................................................... 48

4.3.2

Changing TCP port .................................................................................................................................................................... 48

4.3.3

Changing remote desktop port ................................................................................................................................................... 49

4.4

W

EB

CCTV

POWER ON AFTER POWER FAILURE

.................................................................................................................................. 49

4.5

C

ONFIGURING AUDIO OVER THE

I

NTERNET

......................................................................................................................................... 49

5

STORAGE / BANDWIDTH CONSIDERATIONS ........................................................................................................................... 51

5.1

T

ERMINOLOGY AND BASIC VIDEO TECHNOLOGY

................................................................................................................................ 51

5.2

F

ACTORS THAT INFLUENCE BIT RATE AND VIDEO QUALITY

................................................................................................................ 53

5.2.1

Compression technique (codec).................................................................................................................................................. 53

5.2.2

Resolution .................................................................................................................................................................................. 54

5.2.3

Frame rate ................................................................................................................................................................................. 55

5.2.4

“Differential” live streaming ..................................................................................................................................................... 56

5.2.5

Activity detection for storage...................................................................................................................................................... 56

6

SECURITY POLICY .......................................................................................................................................................................... 57

6.1

P

ROPER USE OF

W

EB

CCTV ................................................................................................................................................................ 58

6.2

S

ECURITY POLICY

............................................................................................................................................................................... 59

6.2.1

Password policy ......................................................................................................................................................................... 59

6.2.2

Operator mode ........................................................................................................................................................................... 61

6.2.3

Windows security updates .......................................................................................................................................................... 61

6.2.4

Network security ........................................................................................................................................................................ 61

6.2.4.1

Dedicated network versus integration with the corporate network ..................................................................................... 62

6.2.4.2

Internet Connection ............................................................................................................................................................ 62

6.2.4.3

Limiting the number of protocols ....................................................................................................................................... 62

6.2.4.4

Firewall .............................................................................................................................................................................. 63

6.2.4.5

Allowing only known clients.............................................................................................................................................. 63

6.2.4.6

Securing the applications.................................................................................................................................................... 63

6.2.4.7

VPN.................................................................................................................................................................................... 64

6.2.5

Other types of access.................................................................................................................................................................. 64

6.2.6

3

rd

party security tools................................................................................................................................................................ 64

6.3

E

RROR RECOVERY MECHANISMS

........................................................................................................................................................ 65

7

TROUBLESHOOTING ...................................................................................................................................................................... 66

7.1

P

ROBLEM SOLVING PROCESS

.............................................................................................................................................................. 66

7.1.1

Preliminary checklist.................................................................................................................................................................. 66

7.1.2

Analyzing the problem................................................................................................................................................................ 67

7.2

S

OLUTIONS FOR COMMON PROBLEMS

................................................................................................................................................. 68

7.2.1

Start up problems ....................................................................................................................................................................... 68

7.2.2

Monitor problems....................................................................................................................................................................... 70

7.2.3

Windows logon problems ........................................................................................................................................................... 70

7.2.4

Remote connection problems...................................................................................................................................................... 71

7.2.5

Camera problems....................................................................................................................................................................... 72

7.2.6

WebCCTV software problems .................................................................................................................................................... 72

7.3

I

F YOU NEED FURTHER ASSISTANCE

.................................................................................................................................................... 74

7.3.1

Before you call ........................................................................................................................................................................... 74

7.3.2

Collecting the necessary information ......................................................................................................................................... 74

7.3.3

How to contact Quadrox ............................................................................................................................................................ 75

7.3.4

How to allow remotely access to your WebCCTV by Quadrox support...................................................................................... 75

8

APPENDICES...................................................................................................................................................................................... 76