Setup guide

Dedicated Micros ©2006
104
DS2 Network Guide
Note: If you are not prompted ensure you upload the le to the unit for the conguration to take
affect.
Structure of the Files
Each of the following les usually has an explanation at the beginning of the le describing what the
feature command set is and how they can be edit.
If any of the conguration commands have a comment (#) at the beginning of the line then this
has been disabled, remove the comment (#) enables the feature and allows you to congure the
settings.
Headings will be included when more that one feature can be congured within the le to identify the
command string within that section, e.g. [unlock], [watermarking].
hosts
This le contains the IP address of the remote monitoring PC that is the point of contact when an
alarm is received on the unit.
The le allows you to identify the name and IP address of the PC.
Note: There is a corresponding web page that is the usual interface for conguring this
information; however this le has also be supplied.
An example of the information contained in this le is shown.
# DS2 Hosts Table 23-January-2004
# The Host is the IP address of the PC the DS2 connects to on alarm.
# <Label/Remote PC Description><IP Address of Alarm Receiving PC>