Toshiba IK-WB02A manual Ventilation, Power Sources, Power-Cord Protection, Lightning, Overloading

Page 8

IMPORTANT SAFEGUARDS (Cont.)

9. Ventilation

This video product should never be placed near or over a radiator or heat register. This video product should not be placed in a built-in installation such as a bookcase or rack unless proper ventilation is provided or the manufacturer's instructions have been adhered to.

10. Power Sources

This video product should be operated only from the type of power source indicated on the marking label. If you are not sure of the type of power supply to your location, consult your product dealer.

11. Power-Cord Protection

Power-Supply cords should be routed so that they are not likely to be walked on or pinched by items placed upon or against them, paying particular attention to cords at plugs, screws and the point where they exit from the product.

12. Lightning

For added protection for this video product during a lightning storm, or when it is left unattended and unused for long periods of time, unplug it from the wall outlet and disconnect the power supply and cable system. This will prevent damage to the video product due to lightning and power-line surges.

13. Overloading

Do not overload power supply and extension cords as this can result in a risk of fire or electric shock.

14. Object and Liquid Entry

Never push objects of any kind into this video product through openings as they may touch dangerous voltage points or short-out parts that could result in a fire or electrical shock. Never spill liquid of any kind on the video product.

8

Image 8
Contents Model IK-WB02A Fccus Information Canadian Information Introduction Terms and TrademarksAccessories Table of Contents Cleaning AccessoriesRead Instructions Retain Instructions Heed Warnings Follow InstructionsPower Sources Power-Cord ProtectionVentilation LightningDamage Requiring service Replacement PartsSafety Check ServicingField Installation Marking Install the camera Where no video noise appears Check the ambient temperature and humidityDo not aim the camera at the sun Do not shoot intense lightPrecautions for Use About the SD Memory CardAbout the PoE Power Supply Device About the AC AdapterPrecautions for Use About the softwareCamera Installation Guide Toshiba America Information SYSTEMS. INC Network Camera Table of Contents Setting up Important Safety Instructions Names and Features of Parts Phase Controller LL switch BLC switch Iris switchPower Select switch Tripod Screw Hole Iris Jack 4PInstallation/Setup About Audio Input/Output Installing a LensConnecting to a Video Monitor CAMERA1 Monitor TV CAMERA2 Video Switcher Line-Lock controlAdjusting a Lens Adjusting the Back FocusAdjusting the Iris Set the iris switch on the right Side of the camera DefaultFixed iris lens Back Light CompensationAuto White Balance AWB Setting Up the Network Camera Environment Requirements for Network Camera Monitoring SystemEntering an IP Address Manually About the IP AddressObtaining an IP address automatically from the Dhcp server Structure of Connection Connecting Connect a LAN cable and then turn the power on Set the IP address of the personal computerUsing Camera Finder to Search for a Camera Click the camera you want to login from the list of camerasSetting up Camera Finder Click the User button Click Exit button to close Camera FinderChanging Administrator Login ID and Password Click Admin on the left side of the screenClick the Change button Click the browserSetting up Access Restriction Click User on the left side of the screenClick the Set/Change button Configuring the Network Manually Click Network on the left side of the screenSelect Manually Click the Save buttonPage Operation Viewing and Listening Viewing ImagesClose the browser to log off disconnect the camera Audio ListeningMenu that is displayed when right-clicking on the image Camera Window ScreenAdjusting Images on the Camera BLC1 BLC2 BLC3 BLC4BLC5 Adding Images About the Playback Operating Buttons Using Playback FunctionClick Playback on the left side of the Camera Window screen Alarm List Playing Alarm ImagesClick the button on the right side of the alarm list Normal List Playing Recorded Normal ImagesClick the button on the right side of the normal list Viewing Logs Click View log on the left side of the Camera Window screenSpeaking Click the Audio Out start button below the imagePage Recording Recordable Media Recordable Contents About Recording ImagesClick Recording on the left side of the screen Recording Settings Insert an SD memory cardRecording Images on an SD Memory Card Normal Configure each setting itemsAlarm Recording Recording Images on FTP Server Click FTP client on the left side of the screenFTP General Settings Click the Save Settings button below the setting Connect to FTP EnableConfigure recording schedule Configure timer patternConfigure Intervals Periodic FTP by ScheduleEnter Server Path Click Save Settings button to save configured itemsEnter File Name FTP by External Alarm/Motion Detection EX/MD FTP by EXT Control Recording Data by EXT Control HhmmssImage Accumulation to SD Memory Card File Transfer Order Setting up Recording Click Image RecordingRecording Images on a Personal Computer Click the Start buttonClick Save Current Picture As Specify the destination folder and file namePage Setting up How to Set up Configure each itemChanging the camera name System SettingsClick System on the left side of the screen Setting up a format to display date/time Setting the color of date/time displayChanging the time using an NTP server setting Adjusting the date and timeRebooting the network camera Click Firmware updateImporting the Settings Saved on a Personal Computer Updating the FirmwareUser Settings Displaying the screen asking a user name and passwordStoring the user name and password Deleting a user nameAdmin Settings Changing the Administrator ID and passwordSetting Sound Restarting the cameraConfiguring an external alarm Alarm SettingsClick Alarm on the left side of the screen Setting the motion detection Setting up EXT ControlNetwork Settings Configuring the connectionConfiguring the Http port number Mail Settings Click Mail on the left side of the screenSetting up FTP Client Settings FTP Server Settings Click FTP server on the left side of the screenDdns Settings Click Ddns on the left side of the screenRecording Settings Audio Settings Click Sound on the left side of the Camera Window screenUpdating the Firmware Before StartingClick Upload button on the screen shown in Step Click Firmware updateClick the Browse button Click Export current configurations Specify the destination and then save the fileSelect the file on settings you saved Click Import on the screen shown in StepOthers Alarm Terminals Specifications of Alarm Signals Example Circuit ConnectionAccessories Safety Precautions5 Index GlossaryFTP Smtp Wall bracket Safety Precautions15 Display of Logs FTP downaccumulation finish Before Calling Service Personnel Cannot login to BrowserTrying to login CapsLock of the PC is Before Calling Service Personnel... RAM Wrong way Gather sound Poor Cannot send Symptom Cause How to Manage Recorded Others Specifications IK-WB02AAppearance Diagram Toshiba America Information SYSTEMS. INC How to use EMI core EMIコアの使いかたWhen power is supplied from an AC24V or DC12V power source About the Power Select SwitchWhen power is supplied from a PoE compatible hub, etc
Related manuals
Manual 4 pages 24.98 Kb Manual 4 pages 31.62 Kb

IK-WB02A specifications

Toshiba has made significant strides in the realm of advanced surveillance technology with its series of camera models, including the IK-WB02A, FSM-3610, FB-3010HB, IK-WB15A, and IK-6420A. Each of these models carries unique features and functionalities designed to cater to various surveillance needs.

The Toshiba IK-WB02A is a compact yet powerful network camera that excels in providing high-definition video feeds. Notable for its 2 MP resolution, it offers sharp image clarity and detailed visuals, making it an ideal choice for any indoor surveillance application. Its PoE (Power over Ethernet) functionality simplifies installation, reducing the clutter of cables. The camera also supports H.264 compression technology, which allows for efficient video streaming while conserving bandwidth.

Moving on to the FSM-3610, this camera is celebrated for its enhanced low-light capabilities. Equipped with a wide dynamic range (WDR) feature, it can capture clear images even in challenging lighting conditions. The FSM-3610 is particularly suitable for outdoor surveillance, providing weather-resistant housing and a rugged design that withstands the elements. It also includes motion detection features, which trigger alerts when activity is detected in monitored areas.

The FB-3010HB model is designed for flexibility and discretion. With its compact size and high-definition video resolution, it is perfect for environments where space is limited. Its ability to seamlessly integrate with existing video management systems enhances its adaptability. The FB-3010HB also supports wireless connectivity, allowing for remote access and monitoring, which is paramount in today’s security landscape.

Toshiba's IK-WB15A is another innovative offering, featuring advanced image stabilization technology that ensures stable video feeds even in high-motion environments. This model includes multiple streaming capabilities, enabling simultaneous streaming for different resolutions. It is well-suited for both indoor and outdoor applications, providing versatile surveillance options.

Lastly, the IK-6420A is a high-performance camera equipped with robust analytics capabilities. It comes with built-in video analytics features that allow for intelligent monitoring, including face detection and line crossing detection. Its user-friendly interface facilitates easy management and configuration, making it accessible for various users, from businesses to residential applications.

In summary, Toshiba's range of cameras—including the IK-WB02A, FSM-3610, FB-3010HB, IK-WB15A, and IK-6420A—showcases a blend of innovative technologies, user-friendly features, and adaptability for diverse surveillance requirements. Each model brings distinct capabilities to the table, catering to an array of security challenges.