Инструкция для PANASONIC WV-ASC970E, WV-ASC970

(скачивание инструкции бесплатно)
Формат файла: PDF
Доступность: Бесплатно как и все руководства на сайте. Без регистрации и SMS.
Дополнительно: Чтение инструкции онлайн
background image

4

Introduction

Overview

The WV-ASC970 is distributed video security system software capable of supporting up to 64 security system 
domains. The WV-ASC970 system domain can work as a standalone system or together with other domains to 
form a large-scale video security system.

The WV-ASC970 can be installed with a specified standard Server PC running specified Linux OS.  

For each Server PC based domain, it not only manages i-Pro devices based IP video switch node, but also sup-
ports SX650 matrix-based analog video switch node

WV-ASC970 CD-R includes both system software and administration console software (Admin Console). The 
Administration Console software is installed on Windows based PC and can creates both local and global database 
for Domain Servers.

Trademarks and Registered Trademarks

 •  Microsoft, Windows, and Internet Explorer are either registered trademarks or trademarks of Microsoft

Corporation in the United States and/or other countries.

 •  Other names of companies and products contained in these operating instructions may be trademarks or regis-

tered trademarks of their respective owners.

Network Security

As you will use this product connected to a network, your attention is called to the following security risks.
 1.  Leakage or theft of information through this product
 2.  Use of this product for illegal operations by persons with malicious intent
 3.  Interference with or stoppage of this product by persons with malicious intent
It is your responsibility to take precautions such as those described below to protect yourself against the above 
network security risks.
 •  Use this product in a secured network.
 •  If this product is connected to a network that includes PCs, make sure that the system is not infected by com-

puter viruses or other malicious entities (using a regularly updated anti-virus program, anti-spyware program, 
etc.).

 •  Protect your network against unauthorized access by restricting users to those who log in with an authorized

user name and password.

 •  Apply measures such as user authentication to protect your network against leakage or theft of information,

including image data, and authentication information (user names and passwords).

     

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
Оглавление инструкции

Document Outline