Milestone Federated Architecture TM

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Milestone Federated Architecture TM"

Transcription

1 Milestone Systems White Paper Milestone Federated Architecture TM Prepared by: John Rasmussen, Product Manager, Milestone XProtect Corporate Milestone Systems 30 November 2010 Page 1 of 15

2 Table of Contents Introduction... 3 Target audience and white paper purpose... 3 Technical overview... 4 Creating a Milestone Federated Architecture hierarchy... 4 Required user credentials for the Management Server service... 6 Network traffic between sites in the federated hierarchy... 6 Milestone Federated Architecture examples... 7 Corporation with regional and branch offices... 7 City Surveillance... 8 Benefits of using Milestone Federated Architecture... 9 Domain authentication and trusted domains User Experience Management Client Smart Client Maps Bookmarks Alarm Manager Smart Wall Milestone Federated Architecture Licensing Within the same legal entity Between different legal entities Summary Page 2 of 15

3 Introduction With the Milestone XProtect Corporate 4.0 release, Milestone Systems introduces Milestone Federated Architecture TM. This new technology allows multiple individual XProtect Corporate 4.0 systems to be interconnected in a parent/child hierarchy of federated sites. Each individual site in the federated hierarchy is a standard XProtect Corporate system, complete with management server, SQL server, recording server(s), failover server(s), and a number of cameras. Once individual XProtect Corporate systems are added to a federated hierarchy, the individual systems appear as one complete system to administrators and users, while still being as manageable as independent XProtect Corporate systems. Through the Milestone Federated Architecture, users have access to video, audio and other resources across all the individual XProtect Corporate systems in the federated hierarchy based on their user rights in each individual system. In addition, administrators have the ability to centrally manage all systems within the hierarchy via remote access to the individual XProtect Corporate systems - again based on administration rights in the individual systems. With no limit to the number of sites you can add to the federated hierarchy and how you link them together, Milestone Federated Architecture is the perfect solution for large installations covering multiple buildings, campuses, or an entire metropolis. It provides large operations with unlimited scaling, flexibility and accessibility for more efficient, costeffective video surveillance over multiple sites. Target audience and white paper purpose The primary audience for this white paper is surveillance system architects/designers, and large-scale surveillance project consultants, as well as companies, organizations, universities, and governments with large-scale surveillance projects/installations. The purpose of this white paper is to give a general overview of Milestone Federated Architecture, the technology behind it, its implementation, its benefits, and the problems it solves. This white paper should enable the reader to understand the architecture and technology behind Milestone Federated Architecture, as well as how to design and implement a large-scale surveillance system by utilizing Milestone Federated Architecture. It is assumed that the reader has a general understanding of Milestone XProtect Corporate and its Management Client and Smart Client, as well as a general understanding of network infrastructure and Microsoft Active Directory. Page 3 of 15

4 Technical overview A Milestone Federated Architecture hierarchy consists of two or more independent XProtect Corporate systems that are linked together. Each independent system functions as a stand-alone XProtect Corporate system with the following standard components: Management server SQL server Recording server(s) with hardware devices (cameras/encoders) Failover recording server(s) Event server Each system in the federated hierarchy is still configured as a standard stand-alone system with rules, time schedules, users and rights for administrators and users. In essence, each system is installed and configured as a standard XProtect Corporate system as done in version 3.1 and older. By interconnecting these independent XProtect Corporate systems, Milestone Federated Architecture allows users and administrators logged in on a connected system to access other sites and resources beyond their own system. Access to systems further down in the hierarchy is not gained automatically. It is dependent on appropriate user and administrator rights. Existing 3.1 and earlier XProtect Corporate installations can easily implement Milestone Federated Architecture or be included in a federated hierarchy by upgrading to XProtect Corporate 4.0. Milestone Federated Architecture does not require any new software or hardware components. The functionality is included in XProtect Corporate 4.0 s standard Management Server, Management Client and Smart Client. Creating a Milestone Federated Architecture hierarchy Creating a Milestone Federated Architecture hierarchy is done simply by adding a sub-site to your current system. This is done in the XProtect Corporate Management Client: Page 4 of 15

5 1. Right-click on the current server in the Federated Site Hierarchy tree 2. Select Add Site to Hierarchy in the right-click menu 3. Enter the address of the new site and click OK 4. The Management Client will now connect to the site and add it to the hierarchy 5. Once added, the site will be listed in the Federated Site Hierarchy tree and the site is now ready to be used The screenshots below illustrate the described steps for adding a site to the federated hierarchy To administrate the different sites, simply click on the desired site in the hierarchy tree and the management client will connect to it and show the configuration of this site this of course requires that the current administrator also is an administrator on the other system. Page 5 of 15

6 Required user credentials for the Management Server service When creating a federated hierarchy, there are a few things to pay attention to when adding sites to the federated hierarchy. In the example below, the administrator of the Federating Site wants to add the New Federated Site to the hierarchy. To add the New Federated Site under the Federating Site, the account under which the Management Server service is running on the Federating Site must be a member of the Administrators group on the Windows server running the Management Server service on the New Federated Site. Per default, the Management Server service is set to run under the Network Service account. This account is a local server account that is not recognized by other servers, so it is recommended to install the Management Server service using a Windows Domain user account and add this user account to the Administrator group on all the Windows servers running the management servers in your federated hierarchy. This ensures that it is possible to add all servers to the federated hierarchy without any further administrator actions. If the administrator logged in to the Federating Site with the Management Client isn t an administrator on the linked to New Federated Site, the inclusion in the hierarchy can still be made, but requires the acceptance of the administrator on the New Federated Site. Network traffic between sites in the federated hierarchy A federated hierarchy will have a scheduled site configuration synchronization task running every 10 minutes, as well as every time a site is added or removed. This synchronization contains only site identity information data and each time will send less than 1MB. In addition to the data sent during synchronization, video or configuration data will also be sent when a user or administrator views live or recorded video or configures the system. The amount of data in this case depends on what and how much is being viewed. Page 6 of 15

7 Milestone Federated Architecture examples Milestone Federated Architecture can be used in several different ways to allow for scalability, centralized management, and seamless video sharing between geographically distributed sites within one large corporation or between installations belonging to different operational entities. The sub-sections below describe two typical usage scenarios. Corporation with regional and branch offices A typical example for implementing Milestone Federated Architecture is a corporation with regional and branch offices as shown below. In corporations with multiple offices, it is generally desirable for each installation to be tied into the overall corporate surveillance installation for central administration and monitoring, yet at the same time to allow each office to have operational control over their own surveillance installation. Milestone Federated Architecture makes it possible to monitor and manage distributed surveillance systems centrally from headquarters or regional offices, but also enables local management and monitoring - a key advantage whenever a site is temporarily offline from the corporate network. Milestone Federated Architecture also allows a corporation to house surveillance operations in separate premises for monitoring during off hours or to perform more advanced system administration from headquarters. Page 7 of 15

8 Milestone Federated Architecture offers surveillance system administrators the ability to configure the system so different entities or users can access different cameras depending on a defined schedule. For instance, an administrator might want to give surveillance guards access to outdoor cameras on sub-sites during working hours, but allow them to access all cameras during off hours. Another example is giving users on a local site access to cameras only during working hours. City Surveillance In city surveillance installations, integrators and administrators often face the challenge of integrating several independent surveillance entities into a large scale system that provides monitoring and administration access to the entire system while still allowing for local management and monitoring. Limestone City, a fictional city surveillance installation Imagine that all entities in Limestone City wish to be connected to the city s video surveillance so that city hall officials and police officers can monitor live feeds or review recordings from all the business and residential areas to investigate break-ins, thefts, vandalism, or other crimes and emergencies. To do that, A.C.M.E. Industries Inc., Downtown Residential, and Limestone Centre Shopping Mall all implement Milestone Federated Architecture in conjunction with city hall and police headquarters. This allows the independent video surveillance systems or entire surveillance hierarchies of the various entities to tie seamlessly into the city s surveillance hierarchy and form a city-wide surveillance system. Page 8 of 15

9 The diagram below illustrates the structure possible once each entity is tied into Limestone City s surveillance hierarchy. Central Station City Hall Streets & Intersections MB Industries Parks Police Headquarter Limestone City Limestone Center Shopping Downtown Residential A.C.M.E Indistries Inc. Limestone Transportation Ltd. Residential area shops Regional Office Branch Office 1 Branch Office 2 Benefits of using Milestone Federated Architecture Milestone Federated Architecture offers benefits in a number of areas. 1. Scalability Milestone Federated Architecture allows surveillance system architects, designers and integrators to design, implement and grow a large-scale surveillance system in manageable parts with multiple sites and tens of thousands of devices and users. Milestone Federated Architecture provides the flexibility to create, add and delete sites depending on: Organizational structure Network infrastructure Usage Security Political or legal requirements 2. Manageability and user privileges The user rights structure in Milestone Federated Architecture is so flexible that users and administrators can be granted access to any combination of sites - from a single system to all systems in the federated hierarchy. Page 9 of 15

10 While Milestone Federated Architecture allows the creation of very large surveillance systems, it does not compromise the accessibility and management features known from the stand-alone XProtect Corporate. 3. Performance Each site in a Milestone Federated Architecture hierarchy can be designed with the performance of the single system and network in mind. This makes the design task easier - the designer does not have to consider a large, complex network with access between every single client PC, server and camera. To be a part of the hierarchy, each system only needs a network connection to the rest of the hierarchy. This connection can be through a firewall or a router with Network Address Translation (NAT). 4. Server and network simplicity Milestone Federated Architecture does not require extra servers on each federated site in order for each site to be part of the federated hierarchy, nor does it require servers working as gateways to handle multicast traffic. All traffic by default is unicast, though multicast is also supported if needed. Milestone Federated Architecture does not require any special features in network equipment. Routers, switches, ADSL routers, fiber connections, etc., as well as all traffic, are by default standard TCP/IP unicast traffic. 5. Redundancy and fault tolerance XProtect Corporate is in itself highly fault tolerant. All servers in the system have failover support and inherently support standard redundancy/failover methods and equipment for servers, storage and network. Milestone Federated Architecture adds extra redundancy and fault tolerance to the already high fault tolerance of XProtect Corporate by allowing the surveillance system designers and integrators to divide the XProtect Corporate system into logical/physical sites. Each site can run independently giving the site s local administrators and users access to log in, view video from cameras, and manage the site even when the network connection to the federated hierarchy is broken. If the connection to a site in the federated hierarchy is lost, the global users in the hierarchy will still be able to log in and access cameras from all the other sites in the hierarchy that still are online. The only experienced fault will be the inability to see cameras from the disconnected site. To minimize the risk of losing network connection to the different sites in the hierarchy, standard methods for implementing network redundancy can be used. Page 10 of 15

11 Domain authentication and trusted domains In a standard Milestone Federated Architecture system configuration, all users on all federated sites must be a member of the same domain and each site must have access to a domain server for authentication of the users. Should a system wish to enable users on individual sites to log in even when the connection is broken to the main domain controller, a distributed domain architecture can be used. In this type of setup, each site must have its own domain controller, which must be synchronized with the main domain controller. See Microsoft s TechNet for more information on domains with multiple sites: Alternatively, see Wikipedia for a more general description of Active Directory and Domains: In Milestone Federated Architecture hierarchies that involve separate independent domains (e.g., between different government or company entities), a domain trust is needed. This trust can be either for the whole domain or more likely for groups of users - so called Selective Authentication. Once the trust is established between the domains, the addition of sites to the hierarchy and the addition of users on these sites can be done in the standard way. See Microsoft s TechNet for more information on domain trusts: User Experience Management Client Milestone Federated Architecture gives administrators the experience of one big system with easy access to all sites with servers and devices in the hierarchy, but frees them from the challenges of managing everything in one extremely large system. Administrators using the Management Client logged in on a Federated Architecture system will notice a new tab in the bottom of the Navigation pane, called Federated Site Hierarchy. This tab will display the site hierarchy as seen from the site that the administrator is logged in on and down in the hierarchy. Administration of the different sites in the federated hierarchy is done by selecting the site in the hierarchy tree list. The Management Client will then connect to this site Page 11 of 15

12 and show the settings from it as if logged in directly to the site. This is done without the administrator being presented with a new login dialog - the credentials from the current login are re-used. Smart Client Smart Client users logged in on a Milestone Federated Architecture hierarchy will experience little difference from what they are used to seeing when logging in on a stand-alone system. The one notable difference will be hierarchy tree lists in dialogs where resources can be picked or used. (See the depicted example of the System Overview dialog from the Setup tab). Views in federated hierarchy When creating views it is possible to mix cameras and other view items from different sites in the hierarchy in the same view. Just as in stand-alone systems, the views will be stored on the site where the user logged in. Only views available on the site from which the user is currently logged in can be accessed. Views created on other sites in the hierarchy will not be accessible. Once views have been configured for users, they will not experience any changes compared to accessing views and cameras on a stand-alone system. The system will appear to them just as one large system. Maps Integration of the Smart Client s map feature is fully supported in Milestone Federated Architecture. If the map feature in the Smart Client is used in a federated hierarchy, each site in the hierarchy must have its own map server installed. It is then possible to link the maps from the different sites together by using hot zones. Instead of linking to a sub-map, the map feature will link to a map on another site s map server. In other words, selecting such a hot zone in the Smart Client will redirect the client to connect to another site s map server and show the map. This gives the user the experience of one big, integrated system. Note: One limitation to this is that a map can only contain devices from the local system. It is not possible to mix cameras from separate sites on the same map. Page 12 of 15

13 Bookmarks The bookmark feature is fully supported in Milestone Federated Architecture. Each bookmark is stored per camera on the individual sites in the hierarchy. Adding and viewing bookmarks works in the same way as it does on a stand-alone system. Similarly, access to adding, deleting, editing and viewing the bookmarks is dependent on user rights per camera in the different sites. Alarm Manager The Alarm Management feature is fully supported in the Smart Client running in a Milestone Federated Architecture hierarchy. The component handling the maps and alarm events is called the Event Server and is installed on each site in the federated hierarchy. In the Smart Client, there is a new view item called Alarm list that lists the alarms on the system. The alarm list contains a tree view of the federated hierarchy where each site is listed. To show and handle alarms from a different site than the parent site, the operator simply selects the desired site in the tree. The operator then sees the alarm list from that site. Smart Wall Integration and user control of the Milestone Smart Wall is fully supported in Milestone Federated Architecture with the addition of the following requirements: The Smart Wall to view and control must be installed on the same site where the users controlling it are logging in. The user account used when logging in on the Smart Client powering the Smart Wall monitors must have sufficient user rights on all sub-sites in the hierarchy in order to display live images from the cameras. Milestone Federated Architecture Licensing Milestone Federated Architecture is licensed differently depending on whether it is used within the same legal entity or between different legal entities. Within the same legal entity Milestone Federated Architecture can freely be deployed within the same legal entity. This implies that unlimited sites and cameras can be included in the federated hierarchy, without the need for additional or special licenses. Between different legal entities Deployment of Milestone Federated Architecture between two or more XProtect Corporate systems owned by different legal entities is subject to the following licensing: Each legal entity must have an XProtect Corporate license (SLC) and device Page 13 of 15

14 licenses for all the cameras in the respective system. On the federating site, an XProtect Corporate Milestone Federated Architecture Device License is required for each camera that shall be accessible in the federated site. Summary Milestone Federated Architecture offers surveillance system architects, designers and administrators the architecture to implement large-scale surveillance systems that span multiple physical locations, as well as legal and government entities. Key features of Milestone Federated Architecture are: Versatile architecture with unlimited scalability and operational flexibility Easy deployment and management with very few steps to add sites to the hierarchy The ability to bring geographically dispersed installations into one centrally managed system A unified and seamless management and operator interface throughout the hierarchy Flexible user and administrator rights with both global and local access Graphical overview of the entire surveillance installation via the map function Integrated alarm management Page 14 of 15

15 About Milestone Systems Founded in 1998, Milestone Systems is the global industry leader in true open platform IP video management software, according to IMS Research six years in a row. The XProtect platform delivers powerful surveillance that is easy to manage, reliable and proven in thousands of customer installations around the world. With support for the widest choice in network hardware and integration with other systems, XProtect provides best-of-breed solutions to video enable organizations managing risks, protecting people and assets, optimizing processes, and reducing costs. Milestone software is sold through authorized and certified partners in more than 100 countries. For more information please visit Milestone Systems Headquarters, DK Tel: Milestone Systems US Tel: Page 15 of 15

Milestone Federated Architecture TM

Milestone Federated Architecture TM White paper Milestone Federated Architecture TM Prepared by: John Rasmussen, Senior Technical Product Manager, Corporate Business Unit, Milestone Systems Date: June 22, 2015 Table of Contents Introduction...

More information

Milestone Edge Storage with flexible retrieval

Milestone Edge Storage with flexible retrieval White paper Milestone Edge Storage with flexible retrieval Prepared by: John Rasmussen, Senior Technical Product Manager, Milestone XProtect Corporate Business Unit Milestone Systems Date: July 8, 2015

More information

Large-Scale VMS Design and Management

Large-Scale VMS Design and Management Whitepaper Large-Scale VMS Design and Management How to design and manage a video surveillance system with 100,000 highly-available cameras Prepared by: John Rasmussen, Senior Product Manager, Corporate

More information

XProtect Corporate Advanced Security Management

XProtect Corporate Advanced Security Management White paper XProtect Corporate Advanced Security Management Prepared by: John Rasmussen, Senior Technical Product Manager, Corporate Business Unit, Milestone Systems Date: November 17, 2014 Table of Contents

More information

Milestone Interconnect TM

Milestone Interconnect TM White paper Milestone Interconnect TM Prepared by: John Rasmussen, Senior Technical Product Manager, Corporate Business Unit, Milestone Systems Date: May 29, 2015 Table of Contents Introduction... 3 Purpose

More information

Remote Connect Services - Axis One-Click Camera Connection

Remote Connect Services - Axis One-Click Camera Connection White paper Remote Connect Services - Axis One-Click Camera Connection Prepared by: John Rasmussen, Product Manager, Milestone XProtect Corporate Milestone Systems August 22, 2012 Milestone Systems Remote

More information

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software.

Please check www.milestonesys.com for updates to make sure you install the most recent version of our software. Guide Contents Dear Milestone Customer, With the purchase of Milestone XProtect Central you have chosen a very powerful central monitoring solution, providing instant overview of any number of Milestone

More information

Guidelines and recommendations for using Milestone XProtect in a virtual server environment

Guidelines and recommendations for using Milestone XProtect in a virtual server environment White paper Guidelines and recommendations for using Milestone XProtect in a virtual server environment Prepared by: John Rasmussen, Senior Technical Product Manager, Corporate Business Unit Milestone

More information

Vess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0

Vess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0 Vess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Purpose 1 Scope 1 Audience 1 What is High Availability?

More information

XProtect Expert and XProtect Corporate - System Architecture Guide for IT Professionals

XProtect Expert and XProtect Corporate - System Architecture Guide for IT Professionals White paper XProtect Expert and XProtect Corporate - System Architecture Guide for IT Professionals Prepared by: John Rasmussen, Senior Technical Product Manager, Corporate Business Unit Milestone Systems

More information

Introduction. There are several bits of information that must be moved:

Introduction. There are several bits of information that must be moved: Backup and restore on new hardware XProtect Professional VMS Products 2014: XProtect Enterprise 2014, XProtect Professional 2014, XProtect Express 2014, XProtect Essential 2014 Introduction This document

More information

Milestone Systems Software Manager 1.5. Administrator's Manual

Milestone Systems Software Manager 1.5. Administrator's Manual Milestone Systems Software Manager 1.5 Contents INTRODUCTION... 4 PREREQUISITES... 5 SUPPORTED OPERATING SYSTEMS... 5 PREREQUISITES FOR ALL REMOTE SERVERS... 5 IMPORTANT INFORMATION... 5 VERSION SPECIFIC

More information

XProtect Product Overview

XProtect Product Overview Milestone Systems Product Overview 8 cameras 26 cameras 64 cameras 250+ cameras unlimited number of cameras Functionality It s not just video management software. It s. Milestone Systems is the world s

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

XProtect Corporate 2013

XProtect Corporate 2013 Release note Milestone XProtect Corporate 2013 May 21, 2013 It is with great pleasure that we announce the release of: XProtect Corporate 2013 High performance for high security XProtect Corporate is powerful

More information

Security Center Unified Security Platform

Security Center Unified Security Platform Security Center Unified Security Platform License Plate Recognition Video Surveillance Access Control Innovative Solutions Simply Powerful. The Security Center is a unified security platform. It seamlessly

More information

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014

Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch Access Professional Edition 3.0 Access Control Module Certification Evaluation Made by Milestone 12-15-2014 Bosch - Milestone Certified Solution Summary document 1 Table of Contents Products Tested

More information

Milestone Systems XProtect Advanced VMS 2014. Administrator's Getting Started Guide

Milestone Systems XProtect Advanced VMS 2014. Administrator's Getting Started Guide Milestone Systems XProtect Advanced Started Guide Contents ABOUT THIS GUIDE... 5 PRODUCT OVERVIEW... 6 ABOUT LICENSES... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OVERVIEW... 9 INSTALLATION PRECONDITIONS...

More information

Secure Web Appliance. Reverse Proxy

Secure Web Appliance. Reverse Proxy Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

File Auditor for NAS, Net App Edition

File Auditor for NAS, Net App Edition File Auditor for NAS, Net App Edition Installation Guide Revision 1.2 - July 2015 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for

More information

Cloud Services ADM. Agent Deployment Guide

Cloud Services ADM. Agent Deployment Guide Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License

More information

Central Management System

Central Management System Central Management System Software Installation Guide Ver. 1.5.0.101115.001 ... ii System Introduction... 3 Client/Server Architecture...3 System Requirements... 4 System Setup...4 Multiple Monitor Configuration...5

More information

Milestone Systems XProtect Access Control Module AXIS A1001 Network Door Controller Plug-in. Getting Started Guide

Milestone Systems XProtect Access Control Module AXIS A1001 Network Door Controller Plug-in. Getting Started Guide Milestone Systems XProtect Access Control Contents GENERAL DESCRIPTION... 4 COMPATIBILITY... 4 INSTALLATION... 5 SYSTEM OVERVIEW... 5 INSTALL THE PLUG-IN... 5 CONFIGURATION AND MAINTENANCE... 7 FIRST TIME

More information

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003

MailMarshal SMTP in a Load Balanced Array of Servers Technical White Paper September 29, 2003 Contents Introduction... 1 Network Load Balancing... 2 Example Environment... 5 Microsoft Network Load Balancing (Configuration)... 6 Validating your NLB configuration... 13 MailMarshal Specific Configuration...

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance 5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance DEPLOYMENT GUIDE Prepared by: Jim Puchbauer Coyote Point Systems Inc. The idea of load balancing

More information

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server DCOM Configuration Introduction This document is intended to provide a check-list of

More information

Using a VPN with Niagara Systems. v0.3 6, July 2013

Using a VPN with Niagara Systems. v0.3 6, July 2013 v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel

More information

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper!

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper! Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

Milestone XProtect Corporate 3.1 Step-by-Step Guide How to Back Up, Move and Restore the Management Server

Milestone XProtect Corporate 3.1 Step-by-Step Guide How to Back Up, Move and Restore the Management Server Milestone XProtect Corporate 3.1 Step-by-Step Guide How to Back Up, Move and Restore the Management Server This guide is relevant if you want to move an XProtect Corporate Management Server installation

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3

More information

pcanywhere Advanced Configuration Guide

pcanywhere Advanced Configuration Guide Introduction The pcanywhere Solution Advanced Configuration Guide is provided to assist customers with advanced features once they have the Symantec Management Platform with pcanywhere Solution installed.

More information

Pharos Uniprint 8.4. Maintenance Guide. Document Version: UP84-Maintenance-1.0. Distribution Date: July 2013

Pharos Uniprint 8.4. Maintenance Guide. Document Version: UP84-Maintenance-1.0. Distribution Date: July 2013 Pharos Uniprint 8.4 Maintenance Guide Document Version: UP84-Maintenance-1.0 Distribution Date: July 2013 Pharos Systems International Suite 310, 80 Linden Oaks Rochester, New York 14625 Phone: 1-585-939-7000

More information

4cast Server Specification and Installation

4cast Server Specification and Installation 4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Coyote Point Systems White Paper

Coyote Point Systems White Paper Five Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance. Coyote Point Systems White Paper Load Balancing Guide for Application Server Administrators

More information

IEI emerge and Milestone Systems Network Video Recorder. Setup and Integration Guide. Milestone Version 6.5 and emerge Version 3.

IEI emerge and Milestone Systems Network Video Recorder. Setup and Integration Guide. Milestone Version 6.5 and emerge Version 3. IEI emerge and Milestone Systems Network Video Recorder Setup and Integration Guide Milestone Version 6.5 and emerge Version 3.2 and above CONTENTS Requirements for Milestone NVR/IEI emerge Integration...

More information

v. 2.4.1 v. 3.4.1 Alarm Notifications: [Y] Bounding boxes for analytics: [N]

v. 2.4.1 v. 3.4.1 Alarm Notifications: [Y] Bounding boxes for analytics: [N] VideoIQ Milestone Integration CCTV Systems AB, Nordic Agent for VideoIQ has together with VideoIQ and Milestone created this document. This document explains the different parts of software in Milestone

More information

White Paper. Recording Server Virtualization

White Paper. Recording Server Virtualization White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...

More information

XProtect Corporate 4.1 Administrator s Manual

XProtect Corporate 4.1 Administrator s Manual XProtect Corporate 4.1 Administrator s Manual Target Audience for this Document This document is aimed at surveillance system administrators installing and/or managing an XProtect Corporate surveillance

More information

Storage Architecture in XProtect Corporate

Storage Architecture in XProtect Corporate Milestone Systems White Paper Storage Architecture in XProtect Corporate Prepared by: John Rasmussen Product Manager XProtect Corporate Milestone Systems Date: 7 February, 2011 Page 1 of 20 Table of Contents

More information

ivms-4200 Client Software Quick Start Guide V1.02

ivms-4200 Client Software Quick Start Guide V1.02 ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...

More information

Windows 7 Hula POS Server Installation Guide

Windows 7 Hula POS Server Installation Guide Windows 7 Hula POS Server Installation Guide Step-by-step instructions for installing the Hula POS Server on a PC running Microsoft Windows 7 1 Table of Contents Introduction... 3 Getting Started... 3

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

Installation Guide: Delta Module Manager Launcher

Installation Guide: Delta Module Manager Launcher Installation Guide: Delta Module Manager Launcher Overview... 2 Delta Module Manager Launcher... 2 Pre-Installation Considerations... 3 Hardware Requirements... 3 Software Requirements... 3 Virtualisation...

More information

Version 3.8. Installation Guide

Version 3.8. Installation Guide Version 3.8 Installation Guide Copyright 2007 Jetro Platforms, Ltd. All rights reserved. This document is being furnished by Jetro Platforms for information purposes only to licensed users of the Jetro

More information

Milestone Systems XProtect Screen Recorder 1.5. Administrator's Manual

Milestone Systems XProtect Screen Recorder 1.5. Administrator's Manual Milestone Systems XProtect Screen Recorder 1.5 Contents INTRODUCTION... 4 HOW XPROTECT SCREEN RECORDER WORKS... 5 LICENSING... 6 INSTALLING AND CONFIGURING ON COMPUTER... 7 SET PASSWORD... 8 SET PORT NUMBER...

More information

SAFETICA INSIGHT INSTALLATION MANUAL

SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Using a VPN with CentraLine AX Systems

Using a VPN with CentraLine AX Systems Using a VPN with CentraLine AX Systems User Guide TABLE OF CONTENTS Introduction 2 What Is a VPN? 2 Why Use a VPN? 2 How Can I Set Up a VPN? 2 Important 2 Network Diagrams 2 Network Set-Up with a VPN 2

More information

SolarWinds Migrating SolarWinds NPM Technical Reference

SolarWinds Migrating SolarWinds NPM Technical Reference SolarWinds Migrating SolarWinds NPM Technical Reference Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified,

More information

LOAD BALANCING 2X APPLICATIONSERVER XG SECURE CLIENT GATEWAYS THROUGH MICROSOFT NETWORK LOAD BALANCING

LOAD BALANCING 2X APPLICATIONSERVER XG SECURE CLIENT GATEWAYS THROUGH MICROSOFT NETWORK LOAD BALANCING SECURE CLIENT GATEWAYS THROUGH MICROSOFT NETWORK LOAD BALANCING Contents Introduction... 3 Network Diagram... 3 Installing NLB... 3-4 Configuring NLB... 4-8 Configuring 2X Secure Client Gateway... 9 About

More information

Microsoft Dynamics CRM Clients

Microsoft Dynamics CRM Clients Microsoft Dynamics CRM Clients A user can work with Microsoft Dynamics CRM in two ways: By accessing the Microsoft Dynamics CRM application using Microsoft Internet Explorer, Google Chrome, FireFox, and

More information

Milestone Systems. Activating Licenses Quick Guide for XProtect Professional VMS Products

Milestone Systems. Activating Licenses Quick Guide for XProtect Professional VMS Products Milestone Systems Activating Licenses Quick Guide for XProtect Professional VMS Products XProtect Enterprise 2016, XProtect Professional 2016, XProtect Express 2016, XProtect Essential 2016 Before you

More information

Milestone Systems XProtect Advanced VMS 2014. Administrator's Manual

Milestone Systems XProtect Advanced VMS 2014. Administrator's Manual Milestone Systems XProtect Advanced Contents COPYRIGHT, TRADEMARKS AND DISCLAIMER... 11 BEFORE YOU START... 12 INTRODUCTION TO THE HELP... 12 NAVIGATE THE BUILT-IN HELP SYSTEM... 12 SYSTEM OVERVIEW...

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Multi-Domain Security Management

Multi-Domain Security Management Multi-Domain Security Management R77 Versions Administration Guide 20 May 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

This means that any user from the testing domain can now logon to Cognos 8 (and therefore Controller 8 etc.).

This means that any user from the testing domain can now logon to Cognos 8 (and therefore Controller 8 etc.). ChaseReferrals and multidomaintrees Graphical explanation of the difference Imagine your Active Directory network looked as follows: Then imagine that you have installed your Controller report server inside

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

Directory Integration in LANDesk Management Suite

Directory Integration in LANDesk Management Suite Directory Integration in LANDesk Management Suite A white-paper detailing the use of an LDAP Directory in an LANDesk Management Suite environment LANDesk Software Inc. Sam Merrill Technical Marketing Engineer

More information

Industry White Paper. Ensuring system availability in RSView Supervisory Edition applications

Industry White Paper. Ensuring system availability in RSView Supervisory Edition applications Industry White Paper Ensuring system availability in RSView Supervisory Edition applications White Paper Ensuring system availability in RSView Supervisory Edition applications Rockwell Software, Visualization

More information

Site Monitor. Version 5.3

Site Monitor. Version 5.3 Site Monitor Version 5.3 1 1 Table of contents 1 Table of contents... 2 2 Installation... 3 2.1 Components... 3 2.1.1 Monitoring Service... 3 2.1.2 Desktop User Interface... 3 2.1.3 Web User Interface...

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Network Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

System Center Configuration Manager 2007

System Center Configuration Manager 2007 System Center Configuration Manager 2007 Software Distribution Guide Friday, 26 February 2010 Version 1.0.0.0 Baseline Prepared by Microsoft Copyright This document and/or software ( this Content ) has

More information

TRBOnet Enterprise 3.0

TRBOnet Enterprise 3.0 TRBOnet Enterprise 3.0 Installation and Configuration Guide TRBOnet Enterprise Installation and Configuration Guide 2 Contents: Architecture Overview 1 1.1. Architecture Overview 1 1.2. System Diagram

More information

DreamFactory on Microsoft SQL Azure

DreamFactory on Microsoft SQL Azure DreamFactory on Microsoft SQL Azure Account Setup and Installation Guide For general information about the Azure platform, go to http://www.microsoft.com/windowsazure/. For general information about the

More information

Active Directory integration with CloudByte ElastiStor

Active Directory integration with CloudByte ElastiStor Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level

More information

Best Practices: Pass-Through w/bypass (Bridge Mode)

Best Practices: Pass-Through w/bypass (Bridge Mode) Best Practices: Pass-Through w/bypass (Bridge Mode) EdgeXOS Deployment Scenario: Bridge Pass-Through This document is designed to provide an example as to how the EdgeXOS appliance is configured based

More information

Raytec Milestone Plug-in User Guide Raytec Ltd 2013

Raytec Milestone Plug-in User Guide Raytec Ltd 2013 Raytec Milestone Plug-in User Guide Raytec Ltd 2013 1 1 Contents 2 Introduction 3 System Requirements 4 Raytec Milestone Plug-in Installation Instructions 5 Using the Raytec Discovery Tool 6 Configuring

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications RSA SecurID Two-Factor Authentication with Genetec Omnicast Client Applications A Detailed Review EMC Information Infrastructure Solutions Abstract This white paper provides the reader with an overall

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Deployment Guide: Unidesk and Hyper- V

Deployment Guide: Unidesk and Hyper- V TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview

More information

LogMeIn Network Console Version 8 Getting Started Guide

LogMeIn Network Console Version 8 Getting Started Guide LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...

More information

Symantec AntiVirus Corporate Edition Patch Update

Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Patch Update Symantec AntiVirus Corporate Edition Update Documentation version 10.0.1.1007 Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

NTP Software QFS for NAS, NetApp Edition Installation Guide

NTP Software QFS for NAS, NetApp Edition Installation Guide NTP Software QFS for NAS, NetApp Edition Installation Guide This Installation Guide applies to all NTP Software QFS for NAS, NetApp filer editions. Abstract This guide provides a short introduction to

More information

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide

Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure.

MM8000 safety and security with smart danger management. A scalable and flexible management station for any requirement. Answers for infrastructure. MM8000 safety and security with smart danger management A scalable and flexible management station for any requirement Answers for infrastructure. Sophisticated technology for comprehensive safety Safety

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white

More information

Using Cisco UC320W with Windows Small Business Server

Using Cisco UC320W with Windows Small Business Server Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following

More information

138 Configuration Wizards

138 Configuration Wizards 9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP

More information

ACP ThinManager Tech Notes What's New, or Why Upgrade ThinManager?

ACP ThinManager Tech Notes What's New, or Why Upgrade ThinManager? ACP ThinManager Tech Notes What's New, or Why Upgrade ThinManager? Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the

More information

CompleteView Admin Console Users Guide. Version 3.0.0 Revised: 02/15/2008

CompleteView Admin Console Users Guide. Version 3.0.0 Revised: 02/15/2008 CompleteView Admin Console Users Guide Version 3.0.0 Revised: 02/15/2008 Table Of Contents Configuration... 3 Starting the Admin Console... 3 Adding a Server... 4 Monitoring Server Status... 6 Menus...

More information

intertrax Suite resource MGR Web

intertrax Suite resource MGR Web intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;

More information

Application Note 116: Gauntlet System High Availability Using Replication

Application Note 116: Gauntlet System High Availability Using Replication Customer Service: 425-487-1515 Technical Support: 425-951-3390 Fax: 425-487-2288 Email: info@teltone.com support@teltone.com Website: www.teltone.com Application Note 116: Gauntlet System High Availability

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Lab 5 Managing Access to Shared Folders

Lab 5 Managing Access to Shared Folders Islamic University of Gaza Computer Network Lab Faculty of engineering ECOM 4121 Computer Department. Prepared by : Eng. Eman R. Al-Kurdi Managing Access to Shared Folders Objective: Manage access to shared

More information

Product Manual. Administration and Configuration Manual

Product Manual. Administration and Configuration Manual Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with

More information

NTP Software File Auditor for NAS, EMC Edition

NTP Software File Auditor for NAS, EMC Edition NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,

More information

Kentico CMS 7.0 Intranet Administrator's Guide

Kentico CMS 7.0 Intranet Administrator's Guide Kentico CMS 7.0 Intranet Administrator's Guide 2 Kentico CMS 7.0 Intranet Administrator's Guide Table of Contents Introduction 5... 5 About this guide Getting started 7... 7 Installation... 11 Accessing

More information

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products 1.0 Overview By default, Windows XP Service Pack 2 (SP2) enables Windows Firewall, previously known as Internet

More information

Administrator s Guide

Administrator s Guide MAPILab Disclaimers for Exchange Administrator s Guide document version 1.8 MAPILab, December 2015 Table of contents Intro... 3 1. Product Overview... 4 2. Product Architecture and Basic Concepts... 4

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

IEI emerge and On-Net Surveillance Systems (OnSSI) Network Video Recorder Setup and Integration Guide

IEI emerge and On-Net Surveillance Systems (OnSSI) Network Video Recorder Setup and Integration Guide IEI emerge and On-Net Surveillance Systems (OnSSI) Network Video Recorder Setup and Integration Guide OnSSI Version 6.5 and IEI emerge Version 3.2 and above CONTENTS Requirements for OnSSI NVR/IEI emerge

More information