User Manual
Table Of Contents
- Chapter One Hardware Installation and Initial Configuration
- Section One
- Management over a
- Local Console
- Chapter Two
- Introduction to the Local Console Interface
- Chapter Three
- Configuation Using the Local Console
- The Main Control Portal
- 3-3-1. Basic Search
- 3-3-2. Advanced Search
- 3-3-3. Storyboard
- 3-4-1. Settings - Overview
- 3-4-2. Settings - Camera - Management
- 3-4-3. Settings - Camera - Recording
- 3-4-4. Settings - Camera - Media
- 3-4-5. Settings - Camera - Image
- 3-4-6. Settings - Camera - Motion Detection
- 3-4-7. Settings - Camera - PTZ settings
- 3-4-8. Settings - Alarm - Alarm
- 3-4-9. Settings - Alarm - Email
- 3-4-10. Settings - System - Information
- 3-4-11. Settings - System - Maintenance
- 3-4-12. Settings - System - Display
- 3-4-13. Settings - System - UPS
- 3-4-14. Settings - System - Log
- 3-4-15. Settings - System - EZConnect service
- 3-4-16. Settings - User
- 3-4-17. Settings - Storage
- 3-4-17. Settings - Network
- Settings - Network - IP
- Settings - DDNS
- Settings - Service
- Section Two
- Management over a Web Console
- Chapter Four Login and Getting Started
- Chapter Five System Settings
- Chapter Six Operation
- Technical Specifications
- Safety and Compatibility
VIVOTEK - Built with Reliability
162 - User's Manual
The access control applies to the access from a web client over HTTP and RTSP protocols.
Three access conguration options are available:
1. Allow all: Allows access from all IP addresses.
2. Allow only: Allows access only from the listed IPs. You should manually enter the IPs for
computers that need to access the NVR.
Note that you can use the asterisk (*) mark to represent all decimal numbers in each
individual octet of the range of IP address: such as using 172.16.0.* for addresses ranging
from 172.16.0.1 to 172.16.0.254.
A decimal number between two asterisks, e.g., <172.*.10.*>, is considered as invalid.
5-5-2. Access list
3. Deny only: Denies the access from the listed IPs. You should manually enter the IPs for
computers that will be blocked out from the access. The conguration details is the same as
those for the Allow only methodology.