background image

 

Security 

Security System 

Select the desired option, and then enter the settings for the selected 
method:  

• 

Disabled

 - No security is used. Anyone using the correct SSID 

can connect to your network.  

• 

WEP

 - The 802.11b standard. Data is encrypted before 

transmission, but the encryption system is not very strong.  

• 

WPA/WPA2 Personal

 - Like WEP, data is encrypted before 

transmission. WPA is more secure than WEP, and should be 
used if possible. WPA Personal is the version of WPA which 
does NOT require a Radius Server on your LAN. 

WEP 

Authentication Type

Normally this can be left at the default value of "Automatic." If that 
fails, select the appropriate value - "Open System" or "Shared 
Key." Check your wireless card's documentation to see what 
method to use. 

Note:

 In 

Infrastructure

 mode, either setting will normally work, 

since most Access Points can use both methods. 

WEP Encryption

 

Select the WEP Encryption level:  

• 

64 Bit Keys (10 Hex chars)  

• 

128 Bit Keys  (26 Hex chars) 

• 

64 Bit Keys (5 ASCII chars) 

• 

128 Bit Keys  (13 ASCII chars) 

Passphrase 

Enter a word or group of printable characters in the Passphrase box 
and click the "Generate Keys" button to automatically configure the 
WEP Key(s). If encryption strength is set to 64-bit, then each of the 
four key fields will be populated with key values. If encryption 
strength is set to 128-bit, then only the selected WEP key field will 
be given a key value. 

WEP Keys 

• 

Use the radio buttons to select the default key.  

• 

Enter the key value you wish to use. Other stations must have 
the same key values.  

• 

Keys must be entered in Hex. Hex characters are the digits (0 ~ 
9) and the letters A ~ F.  

• 

Click 

Clear Keys

 to set the Keys to be blank.  

WPA/WPA2 Personal 

Shared Key 

Enter the key value. Data is encrypted using a key derived from the 
network key. Other Wireless Stations must use the same network 
key. The PSK must be from 8 to 63 characters in length. 

 

 

 

36 

Summary of Contents for CIC-930W

Page 1: ...CNet CIC 930W User s Guide...

Page 2: ...Video Stream 21 Making Video available from the Internet 22 Viewing Live Video via the Internet 24 Motion Detection Alerts 26 CHAPTER 5 WEB BASED MANAGEMENT 28 Introduction 28 Connecting to Network Ca...

Page 3: ...amera 72 Regulatory Approvals 72 Copyright Notice 74 APPENDIX B STREAMING VIDEO AUDIO SOLUTION 90 Overview 90 Streaming Video Audio through Internet Camera 90 P N 956YFF0007 Copyright 2008 All Rights...

Page 4: ...ideo and audio directly to your PC The high compression capabilities of MPEG 4 reduce network bandwidth requirements to amazingly low levels A convenient and user friendly Windows program is provided...

Page 5: ...sensitivity of the CMOS sensor When motion is detection an E mail alert can be sent or some other action may be triggered Flexible Scheduling You can limit access to the video stream to specified tim...

Page 6: ...rted Wired and Wireless Network Support The Network Camera supports either wired or wireless transmission WEP Support Full WEP support 64 128 Bit on the Wireless interface is provided WPA WPA2 Support...

Page 7: ...ly SPKR out If required an external speaker can be plugged in here Power Input Connect the supplied 5V power adapter here Do not use other power adapters doing so may damage the camera LAN port Use a...

Page 8: ...blink three times to confirm that the reset was completed successfully Package Contents The following items should be included If any of these items are damaged or missing please contact your dealer i...

Page 9: ...00BaseT hub or switch and network cable is required To use the Wireless interface on the Network Camera other Wireless devices must be compliant with the IEEE802 11b or IEEE802 11g specifications All...

Page 10: ...between wired and wireless The first time you connect to the camera you should connect the LAN cable and configure the Network Camera with appropriate settings Then you can unplug the LAN cable and p...

Page 11: ...Subsequent administration can be performed with your Web browser as explained in Chapter 5 Web based Management Setup Procedure 1 Insert the supplied CD ROM into your drive If the setup program does n...

Page 12: ...ult values enter administrator for the name and leave the password blank Otherwise enter the Administrator Name and Administrator Password set on the Maintenance screen Figure 4 Password Dialog 4 This...

Page 13: ...unused IP Address from within the address range used on your LAN The Subnet Mask and Default Gateway fields must match the values used by PCs on your LAN The Primary DNS address is required in order...

Page 14: ...Back to modify any incorrect values Figure 8 Save Settings 8 Click OK to confirm that you want to save the new settings If you want to cancel your changes click Cancel Figure 9 Confirm Screen 9 After...

Page 15: ...0 Final Screen Clicking the Install Utility button will install the Viewing Recording utility described in Chapter 6 Windows Viewing Recording Utility 10 Click Exit to end the Wizard Setup is now comp...

Page 16: ...trict access to the video stream to known users by requiring viewers to supply a username and password See Chapter 4 Advanced Viewing Setup for details To make Live Video from the camera available via...

Page 17: ...first time you connect to the camera you will be prompted to install an ActiveX component OCX or CAB file as in the example below You must install this ActiveX component OCX or CAB file in order to vi...

Page 18: ...rmation from the Administrator of the camera you wish to connect to Internet IP Address or Domain Name of the camera Port number for HTTP connections Login username password if required 2 Start Intern...

Page 19: ...k Camera administrator 7 The first time you connect to the camera you will be prompted to install an ActiveX component OCX or CAB file as in the example below You must install this ActiveX component O...

Page 20: ...lect the desired video size Zoom A digital zoom feature is available To zoom in on a section of the window click this icon Then use your mouse to select the section you want to magnify Click the icon...

Page 21: ...djusting the video image Controlling user access to the live video stream Making video available from the Internet Using the Motion Detection feature Adjusting the Video Image If necessary the Network...

Page 22: ...ou can specify EITHER the Bandwidth OR the Frame Rate not both If the Bandwidth is defined the frame rate will be adjusted as necessary to achieve the specified frame rate The default value for bandwi...

Page 23: ...he bandwidth requirements slightly Speaker Enable speaker sound by checking this checkbox Time Stamp If enabled the current time will be displayed on the Video image Text Display Enable this setting i...

Page 24: ...face of the Network Camera See Chapter 5 Web based Management for details 2 Select Administration then Video Access 3 Set the desired options for Access Access If the Video Access is disabled users ca...

Page 25: ...Network Camera The Router Gateway uses the Port Number to determine which incoming connections are intended for the Network Camera This feature is normally called Port Forwarding or Virtual Servers an...

Page 26: ...Network Screen See Chapter 5 Web based Management for further details on using the Network screen Viewers need to know this port number in order to connect and view live Video so you must inform viewe...

Page 27: ...need a broadband connection dial up connections are NOT recommended Viewing Live Video Using your Web Browser If using your Web browser you need to know the Internet IP address or the Domain name of...

Page 28: ...ewing Live Video with the Viewing Recording Utility If using the Windows Viewing Recording Utility the details of the Network Camera must be entered on the Camera Setup screen Figure 21 Add Camera See...

Page 29: ...he CMOS sensor To Use Motion Detection Alerts Using the Web based interface on the Network Camera select the Motion Detection screen then configure this screen as described below Figure 22 Motion Dete...

Page 30: ...If the Motion Detection feature is enabled but E Mail is not enabled then the only action when motion is detected is to log this event in the system log 27...

Page 31: ...mera If using only your Web Browser use the following procedure to establish a connection from your PC to the Network Camera Once connected you can add the Network Camera to your Browser s Favorites o...

Page 32: ...g screen will be displayed Figure 23 Welcome Screen The menu options available from this screen are View Video View live Video using your Web Browser See Chapter 3 Viewing Live Video for details Admin...

Page 33: ...o all the settings for the Network Camera The Administration menu contains the following options Setup System Network Wireless DDNS Video Audio Video Audio Video Access User Database Event Motion Dete...

Page 34: ...te Time Date Format Select the desired date format it will also be used to display the date and time as an overlay on the video image The abbreviations used to predefine the date formats are list as f...

Page 35: ...s Network Time Protocol Enable or disable the Time Server feature as required If Enabled the Network Camera will contact a Network Time Server at regular intervals and update its internal timer NTP Se...

Page 36: ...rver Use the following IP Address If selected you must assign the following data to the Network Camera IP Address Enter an unused IP address from the address range used on your LAN Subnet Mask Use the...

Page 37: ...net protocol for transmitting real time data such as audio and video Max RTP Data Packet field will let users limit the size of the file Enter the desired value between 400 and 1400 Multicast RTP RTSP...

Page 38: ...se select Ad hoc SSID This must match the value used by other devices on your wireless LAN Note The SSID is case sensitive Domain Select your region from the drop down list Channel No In Infrastructur...

Page 39: ...n use both methods WEP Encryption Select the WEP Encryption level 64 Bit Keys 10 Hex chars 128 Bit Keys 26 Hex chars 64 Bit Keys 5 ASCII chars 128 Bit Keys 13 ASCII chars Passphrase Enter a word or gr...

Page 40: ...d inform the DDNS server of the new IP address The Check WAN IP Address determines how often the Network Camera checks if the Internet IP address has changed This system allows other internet users to...

Page 41: ...AN IP Address Set the schedule for checking if the Internet IP address has changed If the IP address has changed the DDNS Server will be notified NOTE If the DDNS Service provided some software to per...

Page 42: ...a Video Audion Screen MPEG 4 Settings Resolution Select the desired video resolution format The default resolution is set to 320 240 Video Quality Control Constant Bit Rate Select the desired bit rate...

Page 43: ...ed fix bit rate Fixed Quality Select the desired option The default fix quality is set to Normal Max Frame Rate Select the desired Maximum bandwidth for the video stream Access Code Enter the code for...

Page 44: ...to right If the camera is mounted upside down on the ceiling check both the Flip and Mirror settings to have the image rotated to the correct position Time Stamp If enabled the current time will be di...

Page 45: ...base menu option to create the desired users Video Access Enable Scheduled Video Access If enabled Camera is available during the scheduled periods and unavailable at other times If this option is sel...

Page 46: ...New Schedule Day Choose the desired option for the period Start Time Enter the start time using a 24 hr clock End Time Enter the end time using a 24 hr clock Add Click this button to add a new period...

Page 47: ...se buttons to manage the user database User Properties User Name Enter the name for the user here Spaces punctuation and special characters must NOT be used in the name The name is case insensitive ca...

Page 48: ...Motion Detection Set Detection Areas You can set the full screen or areas of the video image to be examined Note Motion detection can be triggered by rapid changes in lighting condition as well as by...

Page 49: ...the Port of the SMTP Server to be connected Authentication Select the desired Authentication type for the SMTP Server SMTP Login name Enter your login name for the SMTP Server SMTP Password Enter your...

Page 50: ...the 2nd and 3rd addresses are optional The E Mail alert will be sent to the E Mail address or addresses specified here Subject Enter the desired text to be shown as the Subject for the E Mail when it...

Page 51: ...rt Enter the Port of the FTP Server to be connected Login name Enter your login name for the FTP Server Password Enter your password for the FTP Server Enable Passive Mode Check the box to enable the...

Page 52: ...rovided field if the camera needs to pass through a Proxy Server to do the HTTP notification Port Number Enter the port number for the proxy server Method Select the desired method of form data encodi...

Page 53: ...rmation about their configuration as listed below Name the descriptive event name set by the user Effective Time Frame shows when the event at a set time will be triggered Trigger by shows what kind t...

Page 54: ...ured on the FTP page HTTP If checked an Instant Messaging IM will be delivered to the Jabber server Jabber server must be configured on the Instant Messaging page Attachment Type JPEG Image Frame Rate...

Page 55: ...ministrator Verify Password Re enter the password for the Administrator to ensure it is correct Firmware Upgrade Upgrade File Click the Browse button and browse to the location on your PC where you st...

Page 56: ...lize the camera to load the new updated software Do this after loading the upgrade file Clear File Name This does NOT stop the Restore process if it has started It only clears the input for the Restor...

Page 57: ...ion of the Network Camera such as location F W version The version of the current firmware installed Network MAC Address The current IP address of the Network Camera IP Address The IP Address of the N...

Page 58: ...Video Quality This displays the image quality of the video stream Frame Rate This displays the frame rate of the video stream 55...

Page 59: ...og System Log This is a log of system activity Enable Syslog Service Check the box to enable the System Log Server feature Syslog Server Address Enter the address of the Syslog Server Refresh Button C...

Page 60: ...ng utility This utility also allows you to record the video streams either interactively or using a schedule Installation 1 Insert the supplied CD ROM into your drive If the setup program does not sta...

Page 61: ...ill provides a menu which allows you to view program details view the main screen or terminate the program Main Screen When started a screen like the example below will be displayed Figure 41 Main Scr...

Page 62: ...your LAN This list can be updated by clicking the Refresh button The Camera Data panel on the right displays the data for the selected camera 4 To associate a camera with the current Channel Select a...

Page 63: ...can be left blank Otherwise you must enter the username and password allocated to your by Administrator Setup Camera Pages Click this button to connect the Web based interface of the Camera Enable Tri...

Page 64: ...ection or the remote camera is not on line the test will fail because no connection is possible 3 Click the Add button The camera will now appear in the Channel List Camera Data Internet Local ID This...

Page 65: ...by the Camera Administrator Stream Type Select the desired video stream type There might be either MPEG4 or Motion JPG streaming type Setup Camera Pages Click this button to connect the Web based inte...

Page 66: ...llow indicates I O port is in On mode Alert Log List It displays the list of alert logs if any Setup Click this button to open the Setup Window Playback Click this button to open the Playback which al...

Page 67: ...ream which can be heard Only one audio stream can be selected at any time If the camera does not support audio or if audio is disabled on the camera this option is unavailable Microphone On Off For Ca...

Page 68: ...ill see a screen like the example below Figure 44 Recording Schedule If necessary change these settings to suit your environment Local ID This is the name you gave to this camera This field must be en...

Page 69: ...the Browse button to select the drive and folder Note that file names are automatically assigned using the date and time Instant Recording Time Limit Maximum time limit for Instant Recording This sets...

Page 70: ...the disk space used by video recordings Maximum Allowed Space Enter the maximum amount of disk space which can be used for video recordings When allowed space is full Select the desired option for the...

Page 71: ...be ended Load other Cameras Click this button to load other cameras from the network Submit Click this button then it will display the list of files according to the search criteria Play Use this to...

Page 72: ...on Print Click this to print the current video stream Playback Speed To play a recorded file select the desired speed Audio Control To play a recorded file select the desired volume Delete Video To de...

Page 73: ...etwork Camera are on the same network segment If you don t have a router this must be the case Ensure that your PC has the TCP IP network protocol loaded In Windows this is done by using Control Panel...

Page 74: ...It may be that the SMTP Simple Mail Transport Protocol server used by the camera to send the E Mail will not accept mail This is to prevent span being sent from the server Try using a different SMTP s...

Page 75: ...sed in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equip...

Page 76: ...device may not cause harmful interference and 2 This device must accept any interference received including interference that may cause undesired operation This transmitter must not be co located or...

Page 77: ...DING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABIL...

Page 78: ...her materials provided with the distribution THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF...

Page 79: ...ce this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documenta...

Page 80: ...and that any documentation advertising materials and other materials related to such distribution and use acknowledge that the software was developed by the University of California Berkeley The name...

Page 81: ...bute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must sho...

Page 82: ...arted running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that...

Page 83: ...liance 5 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions a...

Page 84: ...ion ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask fo...

Page 85: ...END OF TERMS AND CONDITIONS 82...

Page 86: ...ies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and th...

Page 87: ...widest possible use of a certain library so that it becomes a de facto standard To achieve this non free programs must be allowed to use the library A more frequent case is that a free library does t...

Page 88: ...y and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a software library b You...

Page 89: ...es the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the...

Page 90: ...version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more...

Page 91: ...ou then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any...

Page 92: ...F ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF...

Page 93: ...io through Internet Camera To snapshot a JPEG image from the Internet Camera with specified resolution and quality http ip img snapshot cgi size value quality value Size 1 160 120 2 320 240 3 640 480...

Page 94: ...Contact Information for CNet USA www cnetusa com Tel 408 934 0800 Tel 800 486 2638 Fax 408 934 0900 91...

Reviews: