User manual

4
*1 (W): maximum wide angle, (T): maximum telephoto
*2 35mm equivalent focal length is derived by using the proportional calculation based on the diameter of the
image circle. As a result, actual viewing angle may differ from the imagined angle of a 35mm equivalent focal
length, depending on the properties of the lens.
*3 Brightens shaded areas of a video.
*4 When the horizontal direction of the camera is 0°
*5 When the tilt angle is between angles below, the dome cover can cause a line to appear in the video, as well as
a decline in the video quality.
0° – 12° (168° – 180°) (W)
0° – 5° (175° – 180°) (T)
*6 Camera is at 0° when attached to the ceiling and facing straight down, and 90° when at a horizontal position.
Server
Pan Angle Range 360° continuous panning
350° (±175°)
344° (±172°)
Tilt Angle Range 180° (ceiling-mounted position: 0° – 180°)
*4 *5
150° (±75°)
93° (-3° – +90°)
*6
Rotation Angle Range 350° (±175°)
344° (±172°)
Moving Speed
Pan: Max. 450°/sec.
Tilt: Max. 450°/sec.
(When using the camera angle in the Setting Page)
Pan: 20.1°/sec.
Tilt: 20.7°/sec.
Rotation: 40.0°/sec.
R11 R10
M641
M640
M741 M740
R11 R10
M641 M640
M741 M740
M641 M640
M741
M740
R11
R10
M641 M640
Video Compression
Method
JPEG, H.264
Video Size JPEG, H.264: 1280 x 720, 640 x 360, 320 x 180
1280 x 960, 640 x 480, 320 x 240
Video Quality JPEG, H.264: 10 levels
Frame Rate
*7
JPEG: 0.1 – 30 fps
H.264: 1/2/3/5/6/10/15/30 fps
Maximum frame rate when used in the following combinations:
When streaming H.264(1) (1280 x 960) and H.264(2) (1280 x 960) simultaneously:
15 fps
When streaming H.264(1) (1280 x 720) and H.264(2) (1280 x 720) simultaneously:
15 fps
I-Frame Interval 0.5/1/1.5/2/3/4/5 sec.
Simultaneous Client
Access
Max. 30 Clients + 1 Admin Client
H.264: Max. 10 clients
Bit Rate Control Target bit rate:
64/128/256/384/512/768/1024/1536/2048/3072/4096/6144/8192/10240/12288/14336/
16384 kbps
ADSR
*8
Number of specified area: Max. 8 areas
Data Size Reduction Level: 3 levels
Security Camera Control: Administrator, Authorized user, Guest user (level of control varies
depending on user)
Access Control: User authority (user name and password), Host Access Restrictions
(IPv4, IPv6)
IEEE802.1X: EAP-MD5, EAP-TLS, EAP-TTLS, EAP-PEAP
Encrypted Communications: SSL/TLS, IPsec