This document provides Ai-Media's recommendations for configuring and using the iCap Alta ST 2110 virtual encoder. These recommendations are intended as a reference for best practices. Please follow these suggestions as best dictated by your environment, scenario and other applicable considerations. Please refer to
Additional Documentation
Recommendations
Topic | Recommendation |
Resource Scaling (CPU, RAM, networking) |
The Alta 2110 Scaling Guide provides helpful guidance on resource scaling. |
Firewall |
The server running the licensed software must be able to reach licensing.eegapis.com over HTTPS (TCP port 443). Computers with typical web browsing require no special licensing setup. However, if you are allowing this outbound connection through a special firewall exception, add licensing.eegapis.com to your allow list. If the allow list only supports fixed IP addresses or does not update DNS frequently enough for correct functionality, use proxy0.licensing.eegapis.com (23.21.205.168). For installations where no internet access at all is available, alternative licensing schemes such as hardware dongles for desktop software, or custom site licenses for other products may be available instead. |
Network Setup |
With the firewall exception created, confirm the networking on the TS is configured correctly, and is enabled:
|
UDP Setup | If you are using UDP, enter @udp (not RTP) in the Stream settings. |
Multicast Setup | Be sure to set the HD and SD input to use different multicast addresses. |
Log Level |
Available log levels:
Depending on your needs, set to |
PTP Sync | If you are using a virtual machine (VM), always disable time syncing from the host operating system to Alta in your hypervisor. This will interfere with Alta’s ability to control its own clock through PTP synchronization. To do this, [VMname] needs to be replaced with the name of the Alta VM on your local system. |
Managing Users | Other than changing the main password on the Alta UI, we strongly recommend against modifying or tampering with user info (including adding or deleting users) from the OS. This will likely result in negative consequences, such as being locked out of the OS. |