Axis P32 Series Manual page 53

Hide thumbs Also See for P32 Series:
Table of Contents

Advertisement

AXIS P32 Dome Camera Series
The web interface
Port
Name: Edit the text to rename the port.
Direction:
indicates that the port is an input port.
you can click the icons to change between input and output.
Normal state: Click
Current state: Shows the current state of the port. The input or output is activated when the current state is different from the
normal state. An input on the device has an open circuit when it's disconnected or when there is a voltage above 1 V DC.
Note
During restart, the output circuit is open. When the restart is complete, the circuit goes back to the normal position. If you
change any settings on this page, the output circuits go back to their normal positions regardless of any active triggers.
Supervised
: Turn on to make it possible to detect and trigger actions if someone tampers with the connection to digital
I/O devices. In addition to detecting if an input is open or closed, you can also detect if someone has tampered with it (that is, cut
or shorted). To supervise the connection requires additional hardware (end-of-line resistors) in the external I/O loop.
Logs
Reports and logs
Reports
• View the device server report: View information about the product status in a pop-up window. The Access Log is
automatically included in the Server Report.
• Download the device server report: It creates a .zip file that contains a complete server report text file in UTF–8
format, as well as a snapshot of the current live view image. Always include the server report .zip file when you
contact support.
• Download the crash report: Download an archive with detailed information about the server's status. The crash report
contains information that is in the server report as well as detailed debug information. This report might contain
sensitive information such as network traces. It can take several minutes to generate the report.
Logs
• View the system log: Click to show information about system events such as device startup, warnings, and critical
messages.
• View the access log: Click to show all failed attempts to access the device, for example, when a wrong login
password is used.
Network trace
Important
A network trace file might contain sensitive information, for example certificates or passwords.
A network trace file can help you troubleshoot problems by recording activity on the network.
Trace time: Select the duration of the trace in seconds or minutes, and click Download.
Remote system log
Syslog is a standard for message logging. It allows separation of the software that generates messages, the system that stores them,
and the software that reports and analyzes them. Each message is labeled with a facility code, which indicates the software
type generating the message, and assigned a severity level.
for open circuit, and
indicates that it's an output port. If the port is configurable,
for closed circuit.
53

Advertisement

Table of Contents
loading

This manual is also suitable for:

P3265-lvP3265-lve

Table of Contents