Vicon KN30-250 Digital video recorder (DVR)
Technical Specification
- Make: Vicon
- Model code: KN30-250
- Series: KN Series
- Channels: 16 channels
- Recording Mode: Timelapse / Event recording
ViconNet uses an MD5 type video authentication algorithm. MD5 is a standard authentication that is based on a 128-bit message used to verify data integrity. Kollector Net server has a recording rate based on system settings, video scene content and selected hard drive size.
Read more| Make | Vicon |
|---|---|
| Manufacturer | Vicon Industries |
| Category | CCTV>Digital video recorders (DVRs) |
| Model code | KN30-250 |
| Channels | 16 channels |
| Recording Mode | Timelapse / Event recording |
| Monitor Outputs | 1 |
| Storage Capacity GB | 250 GB storage |
| Image per second (IPS) | 30 fps storage rate |
| Compression Type | MPEG4 |
| Resolution | 768 x 288 resolution |
| Signal Mode | PAL / NTSC |
| Recording System | HDD |
| Mount type | 16 in, 1 out |
| Network Type | RJ-45 |
| Physical Specifications |
Dimensions mm: 483 x 89 x 292 Weight kg: 16.3 Kg |
| Electrical Specifications | Power Consumption: 300 W |
| Environmental Specifications |
Operating Temp oC: 0 ~ 40 Operating Humidity %: 0 ~ 95% |
| Additional info | ViconNet uses an MD5 type video authentication algorithm. MD5 is a standard authentication that is based on a 128-bit message used to verify data integrity. Kollector Net server has a recording rate based on system settings, video scene content and selected hard drive size. |
Compare Vicon KN30-250 with Digital video recorders (DVRs) from other manufacturers
You might be interested in these products
Related Whitepapers
Sinaloa, Mexico: Connected cities are safer cities
Making sense of today’s security camera options
Designing video management systems using H.265
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download