Edge To Edge - Axis P1455-LE-3 User Manual

License plate verifier kit
Hide thumbs Also See for P1455-LE-3:
Table of Contents

Advertisement

AXIS P1455-LE-3 License Plate Verifier Kit
The web interface
Edge-to-edge
Pairing
Pairing allows you to use a compatible Axis network speaker or microphone as if it's part of the camera. Once paired, the network
speaker acts as an audio out device where you can play audio clips and transmit sound through the camera. The network microphone
will take up sounds from the surrounding area and make it available as an audio input device, usable in media streams and recordings.
Important
For this feature to work with a video management software (VMS), you must first pair the camera with the speaker or
microphone, then add the camera to your VMS.
Set a 'Wait between actions (hh:mm:ss)' limit in the event rule when you use a network paired audio device in an event
rule with 'Audio detection' as condition and 'Play audio clip' as action. This will help you avoid a looping detection if the
capturing microphone picks up audio from the speaker.
Address: Enter host name or IP address to the network speaker.
Username: Enter username.
Password: Enter password for the user.
Speaker pairing: Select to pair a network speaker.
Microphone pairing: Select to pair a microphone.
Clear fields: Click to clear all fields.
Connect: Click to establish connection to the speaker or microphone.
Logs
Reports and logs
Reports
• View the device server report: View information about the product status in a pop-up window. The Access Log is
automatically included in the Server Report.
• Download the device server report: It creates a .zip file that contains a complete server report text file in UTF–8
format, as well as a snapshot of the current live view image. Always include the server report .zip file when you
contact support.
• Download the crash report: Download an archive with detailed information about the server's status. The crash report
contains information that is in the server report as well as detailed debug information. This report might contain
sensitive information such as network traces. It can take several minutes to generate the report.
Logs
• View the system log: Click to show information about system events such as device startup, warnings, and critical
messages.
• View the access log: Click to show all failed attempts to access the device, for example, when a wrong login
password is used.
Network trace
Important
A network trace file might contain sensitive information, for example certificates or passwords.
A network trace file can help you troubleshoot problems by recording activity on the network.
Trace time: Select the duration of the trace in seconds or minutes, and click Download.
58

Advertisement

Table of Contents
loading

Table of Contents