NOTE

When selecting “Periodic”, network camera logs in to FTP server automatically a minute before the scheduled recording starts. When the scheduled recording stops, there may be some unsent image data left in the camera. The camera will not log out from the FTP server until all images have been transferred.

When not selecting “Periodic,” network camera logs in/out automatically each time an alarm goes off.

When there is more than one alarm at a time (receiving another alarm(s) while transferring a file), the camera logs out from the server after transferring last image data.

Connect to FTP Enable:

Select one of the following recordable images on an FTP server:

Periodic (periodic recording by schedule) (page 44)

Extern Alarm Detection (recording by an external alarm detection) (page 46)

Motion Detection (recording by motion detection) (page 46)

EXT Control (recording by EXT control) (page 48)

OFF (not to record on an FTP server)

You need to set up the configuration for the item you selected. For setup details on each item, refer to the section on the next page and after.

Click the “Save Settings” button below the setting.

Installation/Set up

and OperationViewing • Listening

Recording

Setting up

Others

43

Page 59
Image 59
Toshiba IK-WB02A manual Click the Save Settings button below the setting, Connect to FTP Enable

IK-WB02A specifications

Toshiba has made significant strides in the realm of advanced surveillance technology with its series of camera models, including the IK-WB02A, FSM-3610, FB-3010HB, IK-WB15A, and IK-6420A. Each of these models carries unique features and functionalities designed to cater to various surveillance needs.

The Toshiba IK-WB02A is a compact yet powerful network camera that excels in providing high-definition video feeds. Notable for its 2 MP resolution, it offers sharp image clarity and detailed visuals, making it an ideal choice for any indoor surveillance application. Its PoE (Power over Ethernet) functionality simplifies installation, reducing the clutter of cables. The camera also supports H.264 compression technology, which allows for efficient video streaming while conserving bandwidth.

Moving on to the FSM-3610, this camera is celebrated for its enhanced low-light capabilities. Equipped with a wide dynamic range (WDR) feature, it can capture clear images even in challenging lighting conditions. The FSM-3610 is particularly suitable for outdoor surveillance, providing weather-resistant housing and a rugged design that withstands the elements. It also includes motion detection features, which trigger alerts when activity is detected in monitored areas.

The FB-3010HB model is designed for flexibility and discretion. With its compact size and high-definition video resolution, it is perfect for environments where space is limited. Its ability to seamlessly integrate with existing video management systems enhances its adaptability. The FB-3010HB also supports wireless connectivity, allowing for remote access and monitoring, which is paramount in today’s security landscape.

Toshiba's IK-WB15A is another innovative offering, featuring advanced image stabilization technology that ensures stable video feeds even in high-motion environments. This model includes multiple streaming capabilities, enabling simultaneous streaming for different resolutions. It is well-suited for both indoor and outdoor applications, providing versatile surveillance options.

Lastly, the IK-6420A is a high-performance camera equipped with robust analytics capabilities. It comes with built-in video analytics features that allow for intelligent monitoring, including face detection and line crossing detection. Its user-friendly interface facilitates easy management and configuration, making it accessible for various users, from businesses to residential applications.

In summary, Toshiba's range of cameras—including the IK-WB02A, FSM-3610, FB-3010HB, IK-WB15A, and IK-6420A—showcases a blend of innovative technologies, user-friendly features, and adaptability for diverse surveillance requirements. Each model brings distinct capabilities to the table, catering to an array of security challenges.