background image

Cloud Camera user manuals

 

 

33

 

 

What

 

is

 

WEP?

 

WEP

 

means

 

Wired

 

Equivalent

 

Privacy.

 

It

 

is

 

based

 

on

 

the

 

IEEE

 

802.11

 

standard,

 

using

 

the

 

RC4

 

encryption

 

algorithm.

 

WEP

 

for

 

data

 

encryption

 

on

 

your

 

wireless

 

network

 

to

 

provide

 

security,

 

so

 

that

 

it

 

can

 

protect

 

the

 

security

 

of

 

transmission

 

from

 

one

 

wireless

 

device

 

to

 

another.

 

To

 

access

 

the

 

WEP

 

network,

 

you

 

must

 

know

 

the

 

key.

 

The

 

key

 

is

 

the

 

string

 

you

 

create.

 

Using

 

WEP,

 

you

 

must

 

specify

 

the

 

level

 

of

 

encryption.

 

The

 

type

 

of

 

encryption

 

determines

 

the

 

key

 

length.128

bit

 

encryption

 

key

 

is

 

longer

 

than

 

64.Key

 

input

 

HEX

 

(16

 

hex

 ‐

0

9,

 

AF)

 

or

 

ASCII

 

(American

 

Standard

 

Information

 

Interchange

 

Code

 ‐ 

alphanumeric

 

characters)

 

format

 

string

 

definition.

 

ASCII

 

format

 

allows

 

you

 

to

 

enter

 

the

 

easy

to

remember

 

string.

 

ASCII

 

string

 

used

 

on

 

the

 

network

 

transmitted

 

converted

 

into

 

HEX.

 

Righteousness

 

four

 

keys

 

can

 

be

 

given,

 

mainly

 

You

 

can

 

easily

 

change

 

the

 

key.

 

What

 

is

 

WPA?

 

WPA

 

or

 

Wi

Fi

 

Protected

 

Access,

 

is

 

a

 

Wi

Fi

 

standard,

 

designed

 

to

 

improve

 

the

 

security

 

features

 

of

 

WEP

 

(Wired

 

Equivalent

 

Privacy).

 

Compared

 

with

 

WEP,WPA

 

has

 

two

 

major

 

improvements:

 

Improve

 

data

 

encryption

 

through

 

the

 

Temporal

 

Key

 

Integrity

 

Protocol

 

(TKIP).TKIP

 

scrambles

 

the

 

keys

 

using

 

a

 

hashing

 

algorithm

 

and,

 

by

 

adding

 

integrity

checking

 

feature,

 

ensures

 

that

 

the

 

keys

 

have

 

not

 

been

 

tampered

 

with.WPA2

 

is

 

based

 

on

 

802.11i,

 

using

 

the

 

Advanced

 

Encryption

 

Standard

 

(AES)

 

instead

 

of

 

TKIP.

 

User

 

authentication

 

through

 

the

 

Extensible

 

Authentication

 

Protocol

 

(EAP),

   

usually

 

missing

 

in

 

WEP.WEP

based

 

computer

 

hardware

 

MAC

 

address

 

to

 

restrict

 

access

 

to

 

the

 

wireless

 

network

 

is

 

relatively

 

easy

 

listening

 

and

 

steal.

 

EAP

 

is

 

built

 

on

 

a

 

more

 

secure

 

public

 

key

 

encryption

 

system

 

to

 

ensure

 

that

 

only

 

through

 

authorized

 

network

 

users

 

can

 

access

 

the

 

network.

 

WPA

PSK/WPA2

PSK

 

uses

 

a

 

passphrase

 

or

 

key

 

to

 

authenticate

 

your

 

wireless

 

connection.

 

The

 

key

 

is

 

an

 

alphanumeric

 

password,

 

8

63

 

characters

 

long.

 

The

 

password

 

can

 

include

 

symbols

 

(!?*

 

&

 

_)

 

And

 

spaces.

 

This

 

key

 

must

 

be

 

entered

 

on

 

your

 

wireless

 

router

 

or

 

access

 

point

 

the

 

same

 

key.

 

Complete

 

the

 

quick

 

installation

 

the

 

IP

 

CAMERA

 

guide

 

installation,

 

you

 

can

 

use

 

the

 

IP

 

address

 

has

 

been

 

assigned

 

the

 

Camera.A

 

local

 

IP

 

address

 

for

 

your

 

PC

 

and

 

one

 

or

 

more

 

shared

 

network

 

through

 

a

 

router,

 

so

 

assigned

 

to

 

the

 

IP

 

address

 

of

 

the

 

network

 

Camera.At

 

this

 

time,

 

your

 

local

 

network

 

can

 

see

 

the

 

Camera,

 

configure

 

the

 

router

 

to

 

allow

 

the

 

Camera

 

from

 

a

 

remote

 

viewing

 

can

 

be

 

viewed

 

on

 

the

 

network.

 

  

 

Summary of Contents for IPC2

Page 1: ...se modify the default password after landing and please take good care of your username and password Manual version Version Dates Description V1 0 Sep 16 2012 V1 1 Nov 12 2012 Adjustment of interface Note in practical application it is possible that the instruction functions are a little different from the function of the machine ...

Page 2: ...epage 12 First Camera status bar 12 Second Image settings and PTZ control bar 13 THIRD Interface buttons 13 Playback 14 Management 16 1 Product information 16 2 Equipment 16 Equipment nickname 17 Password 17 3 Media stream 17 Stream 18 Image 18 Audio 18 4 Network 19 1 Ethernet 19 2 Wireless Network 20 5 OSD 21 Display Name 21 Show time 21 Display week 22 6 SD card 22 Status 22 Capacity 22 Usage 22...

Page 3: ...me server address 25 10 System maintenance 25 Online upgrade 26 Restore the default settings 26 Restart the device 26 11 Others 26 PTZ 26 Audio 26 Equipment flip 27 Troubleshooting 27 Wireless Infrastructure 30 Wireless Security 32 Technical parameters 34 ...

Page 4: ...ter CPU clocked at 1 3G or higher at least 128MB of RAM Internet Explorer 7 or higher Firefox 3 5 or higher Safari 4 and Chrome 8 0 or higher Introduction Congratulations on your purchase of the Cloud Camera The Cloud Camera has multiple functions is dedicated to the small office and home solutions Unlike traditional IP Camera Cloud Camera has a complete system with built in CPU and web server can...

Page 5: ... connectivity privacy features arm function 9 Intelligent transmission technology bandwidth adaptive code rate adjust dynamically the priority voice jitter buffer 9 Support two way voice intercom the use of carrier grade signal processing echo cancellation noise suppression voice equalizer comfort noise sound silence suppression 9 Support the SNS social networks openid QQ facebook landing 9 Suppor...

Page 6: ...ng support IRCUT day night filter switch Image unbiased color 9 Built in wifi modules and the flexibility to set up wireless monitoring environment 9 Maximum support 32G SD card storage alarm photographed and alarm video 9 Support the PIR human infrared thermal sensing Double insurance arm to prevent false triggering Overview of the Hardware view PIR human body thermal infrared Status Light STA1 P...

Page 7: ...ction Hold for 3 seconds STA1 green light long bright Into the WPS function easy to connect wifi Hold for 5 seconds STA1 green light shining Into the private function Visitors cannot see the image and cannot hear the sound Hold for 7 seconds STA1 Into the deployed function Start motion detection alarm function DC5V power interface Headset audio jack Ethernet interface Reset FN composite button Cam...

Page 8: ... AUDIO OUT Jack Camera Installation Wizard The first step connecting the network 1 Wired internet IPCAM connected to the power supply and cable network the front of the machine PWR light a long red light STA2 lights turn red Wait 20 seconds into a green light flashes flashing seven times every three seconds 2 Wi Fi You can use the WI FI Protected Setup WPS button for Camera to create wireless conn...

Page 9: ...address bar enter the following login screen enter the ID number and password of the machine each IPCAM is labeled with a unique ID number and password need to scratch off the squeegee Note In order to protect your privacy please modify the factory password after landing and take good care of the user name and password Note The user can click on the login screen Register button to register a user ...

Page 10: ...Cloud Camera user manuals 10 C install plug ins Registered users landing interface Use ID landing interface Click the play ...

Page 11: ...on will limit its scope Usually the change of coverage depends on your room or office type of building materials and environmental RF radio frequency noise Follow these basic guidelines can maximize the wireless range 1 The Wall ceiling between the routers and other network devices such as the network Cameras minimize the number each wall or ceiling will weaken adapter 3 90 feet 1 30 meters wirele...

Page 12: ...obviously deteriorated or completely dropped Put the 2 4GHz phone base away from the wireless device as far as possible Even if the phone is not using the dock will still transmit signals Homepage Logged in displays the home page click on the Play button and display real time video images First Camera status bar 1 Here you can see the online status of each Camera Online status for the following ca...

Page 13: ...IPCAM in the local LAN add the outer IPCAM and manage the Cameras have been added 3 The status bar to show and hide icons Second Image settings and PTZ control bar 1 Exit the video interface 2 Brightness adjust the brightness level of the video screen 3 Contrast adjust the video screen contrast level 4 Saturation adjust the video screen color saturation level 5 PTZ control IPCAM up down left right...

Page 14: ...time refers to the pre recorded trigger Video before the video can be directly input time second unit Duration refers to the reported the police recording time can be directly input time second unit The recorded single frequency When optioned sound recording when select the alarm recording 3 Snapshot button Click the button to capture images of the playing video Click on the inverted triangle butt...

Page 15: ...r will be displayed by color length query to the video file specify the video player can be selected directly by dragging with the mouse 4 Video file rewind playback video files can be realized by player image control keys to play pause play a video file fast forward Camera list Video file query and directory list Progress bar and queries to the video 数 fast reve Previ play paus next Fast ...

Page 16: ... basic information of the Camera Model The model of the Camera Firmware version the Camera software firmware version number Plug in version the Camera video viewing plug in version number Device serial number ID number of the Camera 2 Equipment Modify the Camera password Modify registered users password Quit returns to the landing ...

Page 17: ...ogin password of the current Camera New Password here the user can enter the current Camera landed a new password To protect your privacy after landing modify the default password and please take good care of the user name and password Confirm Password Re enter the password of the current Camera modified Click Apply to save your changes 3 Media stream Audio video stream bit rate settings ...

Page 18: ...ream corresponding to the different resolution Framerate the number of images per second use fps The larger the frame rate the more fluent image Bit rate use bps The higher the Bit rate image display more clear but the highest occupied network resources The user can set a maximum and minimum values I frame interval send each key frame interval Audio Encoding types audio encoding G 711 G 726 AMR AA...

Page 19: ...tomatically obtain an IP address Cameras default select Camera Machine automatically get connected to the router and it is automatically assigned to IP address gateway subnet mask information Use the following IP address Check the user manual allocation One IP address gateway subnet mask to the Camera Dns server address automatically exercised Check Camera Automatically get to be automatically ass...

Page 20: ...g address to the end of the address and gateway B Terminal As search equipment Connection Status Displays the status of the wireless network Select Network Wireless will automatically search for the Cameras surrounding the wireless choose the Network terminal in the drop down list Password Enter the password for the wireless network equipment Click the connect button to connect the selected wirele...

Page 21: ...ply to save your changes 5 OSD Image screen display menu settings Display Name Check the upper left corner of the screen will display the name of the Camera Name The user can modify the screen displays the name of the Camera can t have Chinese and symbol is only English and Allah hundred digital Display Check the upper left corner of the screen will display the date Date format User selectable yea...

Page 22: ...6 SD card Display the status of the Camera SD card Status Displays the current SD card plugged into the Camera and whether it has been read to the Camera Capacity Show the total size of the plug into the Camera s SD card Usage displays the current plug into the SD card in the Camera has been used in the situation Click Apply to save your changes ...

Page 23: ...of external alarm probe equipment IO linkage the alarm trigger signal output external alarm equipment such as speaker equipment When Checked the machine triggered the alarm linkage output alarm signal to trigger external alarm normally closed or normally open mode depending on the type of external alarm devices Click Apply to save your changes 8 Joural Record all operation to the IPCAM according t...

Page 24: ...Cloud Camera user manuals 24 1 Choose the camera in the camera list 2 Start time Choose the start time 3 Finish time Choose the finish time 4 Choose the station 5 Inquire Camera list refer ...

Page 25: ...modified Time Time of the Camera can be manually modified Automatically synchronized with the time server When checked Camera time is automatically synchronized with the server time Time server address the address of the time server Click Apply to save your changes 10 System maintenance ...

Page 26: ... the device Click the reset button to restart the Camera Click Apply to save your changes 11 Others PTZ Speed PTZ speed parameter settings the greater the value the faster the PTZ Audio Speaker Setting the sound size of the camera speakers using the mouse to drag the slide bar the greater the value the greater of the sound Microphone Setting the sensitivity of the camera microphone using the mouse...

Page 27: ... watch the Camera images and manage the Camera settings To enable remote access you can simply follow the Quick Installation Wizard If you are not connected on the camera make sure the following items The green LED Camera on SETATE2 green light flashes every three seconds shine 5 times Network connection is working properly Router s LAN WAN connection is working properly The router has enabled UPn...

Page 28: ...If the CMOS sensor is in the bright light for a long time do not transfer the network Camera to a dark area immediately so as not to damage the CMOS sensor 5 The Camera has blurred image how to solve it If the network Camera works in dim place the video image may become blurred Another possibility is that the Camera lens and CMOS sensor are not in good focus please align the object 5 meters away f...

Page 29: ... the lateral movement the longitudinal movement detecting capacity is relatively poor PIR White has a strong inhibitory function but not 100 inhibition should avoid installing at the glare interference The temperature of the object such as the people cats dogs etc have detected motion so the mounting height will affect the sensitivity of the detector and the effect of anti small animals To prevent...

Page 30: ...freedom of the wireless network Wireless LAN WLAN is a unit of the computer network by a wireless signal instead of wires to transmit and receive data WLAN is more and more used in home and office environments as well as public places such as airports coffee shops and universities WLAN technology in innovative ways to help the communicate more effectively No cabling and other fixed infrastructure ...

Page 31: ...Indoor access point shown in the drawing the signal can reach a distance of 300 feet In outdoor the signal distance of access point can reach 30 miles at most can be used such as a factory floor industrial areas college and high school campuses airports golf courses as well as many outdoor occasions Which kind of person are suitable for wireless network Wireless network technology be more and more...

Page 32: ...enter position of the network in order to get the best results Try to place the router access point to the highest point in the room so that the signal can be distributed to your room If your home is a two story building you need to install the repeater signal expanding coverage Eliminate interference Household appliances such as cordless phones microwaves and televisions as far as possible from t...

Page 33: ...gh the Temporal Key Integrity Protocol TKIP TKIP scrambles the keys using a hashing algorithm and by adding integrity checking feature ensures that the keys have not been tampered with WPA2 is based on 802 11i using the Advanced Encryption Standard AES instead of TKIP User authentication through the Extensible Authentication Protocol EAP usually missing in WEP WEP based computer hardware MAC addre...

Page 34: ...cklight compensation Automatic Video Night Vision 12 IR LED IR distance 10 meters Ethernet A 10 100Mbps RJ 45 interface Support Agreement TCP IP UDP IP HTTP SMTP FTP DHCP DDNS UPNP RTSP And RTMP MUTP Wireless standards WIFI IEEE802 11b g n Network Support IP addresses Static IP address and dynamic IP address Alarm detection Motion Detection Alarm notification Support E mail FTP SMS alarm alarm not...

Page 35: ...F 131 F Operating Humidity 10 80 RH non condensing Environment Storage temperature 10 C 60 14 F 140 F Dimensions L W H 112 L 114 W 157mm H Specification Weight 400g Containing rack Central processor 2 0GHz or above recommended 3 0GHz Memory 256MB or more Recommended 1 0GB Graphics 64MB or more Operating system Microsoft Windows 2000 XP Vista Windows7 Mac OS Linux Computer Requirements Browser IE6 ...

Reviews: