The method used for connecting to an exacqVision system from outside the LAN it resides on will depend on your network configuration and use case. Examples are provided below based on each method. Remote Connections Remote Connections are supported by exacqVision Server/Client 24.09 and above to facilitate connections from the exacqVision Mobile app. When considering… Continue reading Remote exacqVision Connection Diagrams
Tag: Port Forwarding
Tunneling to a Cloudvue Gateway From a Local Windows Machine
Description At times it may be necessary to access either the Gateways local Cloudvue interface and/or a connected cameras web interface. PuTTY Portable can establish an SSH connection with or without port forwarding from a local Windows machine which once established will allow access to these resources from a web browser on the local machine.… Continue reading Tunneling to a Cloudvue Gateway From a Local Windows Machine
Exacq Software/Service Connections Diagram
This diagram illustrates how the various Exacq applications work together and the ports used to communicate. Internal (LAN) Remote (WAN) In cases where external users plan to connect for remote monitoring, you will may need to configure port forwarding on your router to allow traffic on those ports to pass through. exacqVision provides several ways… Continue reading Exacq Software/Service Connections Diagram
Using exacqVision Web Service with Edge Cameras
Edge cameras cannot run the exacqVision Web Service. If you want to connect to an Edge camera using the Web Client or the Exacq Mobile 3 app you will need to install the exacqVision Web Service on another machine. The web service can be run on other machines but you will need to enter the… Continue reading Using exacqVision Web Service with Edge Cameras
Example Network Diagram for Multi-NIC Systems
Best practice for servers with more than one NIC includes isolating camera traffic to a separate scheme. This practice not only isolates camera bandwidth consumption from other network traffic, but also adds an additional layer of security to prevent workstation users from accessing cameras and video streams directly. Whether using separate network switches or creating… Continue reading Example Network Diagram for Multi-NIC Systems