Nat Traversal; Applications; Cybersecurity - Axis C1410 Mk II User Manual

Network mini speaker
Hide thumbs Also See for C1410 Mk II:
Table of Contents

Advertisement

AXIS C1410 Mk II Network Mini Speaker
Learn more
sip:myspeaker@company.com
sip:myspeaker@company.com

NAT traversal

Use NAT (Network Address Translation) traversal when the Axis device is located on an private network (LAN) and you want to
access it from outside of that network.
Note
The router must support NAT traversal and UPnP®.
Each NAT traversal protocol can be used separately or in different combinations depending on the network environment.
ICE The ICE Interactive Connectivity Establishment) protocol increases the chances of finding the most efficient path to
successful communication between peer devices. If you also enable STUN and TURN, you improve the ICE protocol's
chances.
STUN - STUN (Session Traversal Utilities for NAT) is a client-server network protocol that lets the Axis device determine if
it is located behind a NAT or firewall, and if so obtain the mapped public IP address and port number allocated for
connections to remote hosts. Enter the STUN server address, for example, an IP address.
TURN - TURN (Traversal Using Relays around NAT) is a protocol that lets a device behind a NAT router or firewall receive
incoming data from other hosts over TCP or UDP. Enter TURN server address and the login information.

Applications

With applications, you can get more out of your Axis device. AXIS Camera Application Platform (ACAP) is an open platform that
makes it possible for third parties to develop analytics and other applications for Axis devices. Applications can be preinstalled on the
device, available for download for free, or for a license fee.
To find the user manuals for Axis applications, go to help.axis.com.

Cybersecurity

Axis Edge Vault
Axis Edge Vault provides a hardware-based cybersecurity platform that safeguards the Axis device. It offers features to guarantee the
device's identity and integrity and to protect your sensitive information from unauthorized access. It builds on a strong foundation of
PBX
sip.company.com
SIP
SIP
40
sip:office@company.com
SIP

Advertisement

Table of Contents
loading

Table of Contents