Table of Contents
1 Monitor images on a PC ..........................................................................8
1.1 Monitor images from a single camera .............................................................................8
1.2 About the “Live” page ....................................................................................................10
1.3 Monitor cropping images ...............................................................................................14
1.4 Monitor images from multiple cameras ........................................................................17
2 Monitor images on a cellular phone/mobile terminal .........................18
2.1 Monitor images on a cellular phone ..............................................................................18
2.2 Monitor images on a mobile terminal ............................................................................20
3 Record images on the SD memory card manually .............................25
4 Action at an alarm occurrence ..............................................................27
4.1 Alarm type ........................................................................................................................27
4.2 Action at an alarm occurrence .......................................................................................27
5 Transmit images onto an FTP server ...................................................29
5.1 Transmit an alarm image at an alarm occurrence (Alarm image
transmission) ...................................................................................................................29
5.2 Transmit images at a designated interval or period (FTP periodic image
transmission) ...................................................................................................................29
5.3 Save images on the SD memory card when images fail to transmit using the FTP
periodic image transmission function ..........................................................................30
6 Display the log list .................................................................................31
7 Playback of images on the SD memory card ......................................35
7.1 Playback “JPEG(1)”/“JPEG(2)”/“JPEG(3)” images saved to the SD memory
card ...................................................................................................................................35
7.2 Playback “H.264(1)”/“H.264(2)”/“H.264(3)”/“H.264(4)” images saved to the SD
memory card ....................................................................................................................38
8 About the network security ...................................................................41
8.1 Equipped security functions ..........................................................................................41
9 Display the setup menu from a PC .......................................................42
9.1 How to display the setup menu .....................................................................................42
9.2 How to operate the setup menu .....................................................................................44
9.3 About the setup menu window ......................................................................................46
10 Configure the basic settings of the camera [Basic] ...........................48
10.1 Configure the basic settings [Basic] .............................................................................48
10.2 Configure the Internet settings [Internet] .....................................................................53
10.3 Configure the settings relating to the SD memory card [SD memory card] ..............55
10.4 Configure the settings relating to alteration detection [Alteration detection] ..........63
10.5 How to configure alteration detection settings ............................................................64
10.5.1 Generation of the CRT key (encryption key) ..................................................................65
10.5.2 Generation of the self-signed certificate (security certificate) .........................................66
10.5.3 Generation of CSR (Certificate Signing Request) ..........................................................68
10.5.4 Installation of the certificate issued by CA ......................................................................70
10.5.5 Configuration of alteration detection ...............................................................................71
4 Operating Instructions
Table of Contents