Table of Contents
1 Monitor images on a PC ..........................................................................7
1.1 Monitor images from a single camera .............................................................................7
1.2 About the “Live” page ......................................................................................................9
1.3 Monitor cropping images ...............................................................................................13
1.4 Monitor images from multiple cameras ........................................................................16
2 Monitor images on a cellular phone/mobile terminal .........................17
2.1 Monitor images on a cellular phone ..............................................................................17
2.2 Monitor images on a mobile terminal ............................................................................19
3 Record images on the SD memory card manually .............................24
4 Action at an alarm occurrence ..............................................................26
4.1 Alarm type ........................................................................................................................26
4.2 Action at an alarm occurrence .......................................................................................26
5 Transmit images onto an FTP server ...................................................28
5.1 Transmit an alarm image at an alarm occurrence (Alarm image
transmission) ...................................................................................................................28
5.2 Transmit images at a designated interval or period (FTP periodic image
transmission) ...................................................................................................................28
5.3 Save images on the SD memory card when images fail to transmit using the FTP
periodic image transmission function ..........................................................................29
6 Display the log list .................................................................................30
7 Playback of images on the SD memory card ......................................34
7.1 Playback “JPEG(1)”/“JPEG(2)”/“JPEG(3)” images saved to the SD memory
card ...................................................................................................................................34
7.2 Playback “H.264(1)”/“H.264(2)”/“H.264(3)”/“H.264(4)” images saved to the SD
memory card ....................................................................................................................37
8 About the network security ...................................................................40
8.1 Equipped security functions ..........................................................................................40
9 Display the setup menu from a PC .......................................................41
9.1 How to display the setup menu .....................................................................................41
9.2 How to operate the setup menu .....................................................................................43
9.3 About the setup menu window ......................................................................................45
10 Configure the basic settings of the camera [Basic] ...........................47
10.1 Configure the basic settings [Basic] .............................................................................47
10.2 Configure the Internet settings [Internet] .....................................................................51
10.3 Configure the settings relating to the SD memory card [SD memory card] ..............53
10.4 Configure the settings relating to alteration detection [Alteration detection] ..........61
10.5 How to configure alteration detection settings ............................................................63
10.5.1 Generation of the CRT key (encryption key) ..................................................................63
10.5.2 Generation of the self-signed certificate (security certificate) .........................................64
10.5.3 Generation of CSR (Certificate Signing Request) ..........................................................66
10.5.4 Installation of the certificate issued by CA ......................................................................68
10.5.5 Configuration of alteration detection ...............................................................................69
4 Operating Instructions
Table of Contents