EnGenius EWS1025CAM User Manual
EnGenius EWS1025CAM User Manual

EnGenius EWS1025CAM User Manual

2-megapixel wireless cloud managed mesh camera
Table of Contents

Advertisement

Quick Links

1

Advertisement

Table of Contents
loading

Summary of Contents for EnGenius EWS1025CAM

  • Page 2: Table Of Contents

    Table of Contents Chapter 1 Product Overview ..............................6 Key Features ......................................7 Introduction ......................................8 System Requirements ....................................9 Package Contents ..................................... 9 Applications ......................................10 Technical Specifications ..................................11 Physical Interface ....................................12 Chapter 2 Before You Begin ..............................14 Considerations for Wireless Installation ..............................
  • Page 3 Spanning Tree Settings................................... 45 Chapter 7 Wireless ................................... 46 System Properties ....................................47 Operation mode ...................................... 48 2.4GHz/5GHz SSID Profile ................................... 51 Wireless Security ....................................53 Wireless MAC Filter ....................................56 Traffic Shaping ....................................... 57 Fast Roaming ......................................58 WDS Link Settings ....................................59 Guest Network .......................................
  • Page 4 SNMP Settings ....................................... 80 CLI/SSH Settings ....................................83 HTTPS Settings...................................... 84 Email Alert ......................................85 Date and Time Settings ..................................86 WiFi Scheduler ....................................... 87 Tools ........................................89 LED Control ......................................93 Device Discovery ....................................94 Chapter 13 System Manager ..............................95 Account Setting ......................................
  • Page 5 Audio Detection ....................................126 Tampering Detection .................................... 127 Event Action ......................................128 Chapter 17 Event Server ..............................130 Network Storage ....................................131 FTP(File Transfer Protocol) ................................. 134 E-Mail ........................................135 Chapter 17 Storage Info ............................... 136 Storage Info ......................................137 Appendix ....................................
  • Page 6: Chapter 1 Product Overview

    Product Overview Chapter 1...
  • Page 7: Key Features

     Provide true day/night functionality with 20 meter IR LEDs illuminator and IR cut filter.  H.264 high compression video with VLAN and prioritizing QoS for delivering easily.  EnGenius DDNS, P2P and Push Notification.  Free iOS & Android APP for view / record.
  • Page 8: Introduction

    Introduction EnGenius Indoor Mesh Access Point Camera is a new concept of dual band concurrent, high power, high sensitivity and strong reliability for enterprise solutions. Easy setup and installation for combination of two products – Access point and IP camera, one PoE or DC power solve the power input, and single UI interface for all configurations.
  • Page 9: System Requirements

     Web-Browsing Application (i.e. : Internet Explorer, Firefox, Safari, or another similar browser application) Package Contents The package contains the following items (all items must be in package to issue a refund):  EWS1025CAM Managed Indoor Mesh Camera  Power Adapter  RJ-45 Ethernet Cable ...
  • Page 10: Applications

    Applications Wireless LAN (WLAN) products are easy to install and highly efficient. The following list describes some of the many applications made possible through the power and flexibility of WLANs:  Difficult-to-Wire Environments: There are many situations where wires cannot be installed, deployed easily, or cannot be hidden from view.
  • Page 11: Technical Specifications

    Technical Specifications EWS1025CAM 2.4GHz IEEE802.11b/g/n Standard 5GHz IEEE802.11a/n/ac Antennas 4 x Internal 5dBi Omni-Directional Image Sensor Sony 2Megapixel 1920 x1080 Progressive Scan COMS sensor Lens Fixed Board Lens, f =2.8mm/F2.0, F.O.V=120 Degree(Diagonal) IR illuminator 20 Meter Range 1 x 10/100/1000 Gigabit Ethernet Port...
  • Page 12: Physical Interface

    Physical Interface 1. LAN Port (802.3af PoE): Ethernet port for RJ-45 cable. 2. Power Connector: 12V DC IN for Power Adapter. 3. Ceiling Mount Hole: Using the provided mounting kit, the Access Point can be attached to a ceiling or wall. 4.
  • Page 13 9. IR illuminator: 20 meter infrared for low lux environment.
  • Page 14: Chapter 2 Before You Begin

    Before You Begin Chapter 2...
  • Page 15: Considerations For Wireless Installation

    Before You Begin This section will guide you through the installation process. Placement of the EnGenius Access Point is essential to maximize the Access Point’s performance. Avoid placing the Access Point in an enclosed space such as a closet, cabinet, or stairwell.
  • Page 16: Computer Settings

    Computer Settings Windows XP/Windows 7 In order to use the Access Point, you must first configure the TCP/IPv4 connection of your Windows OS computer system. 1. Click the Start button and open the Control Panel. Windows XP Windows 7 2a. In Windows XP, click on Network Connections.
  • Page 17 2b. In Windows 7, click View network status and tasks in the Network and Internet section, then select Change adapter settings. 3. Right click on Local Area Connection and select Properties. 4. Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
  • Page 18 Access Point and Subnet mask, then click OK. Note: Ensure that the IP address and Subnet mask are on the same subnet as the device. For example: EWS1025CAM IP address: 192.168.1.1 PC IP address: 192.168.1.2 – 192.168.1.255 PC Subnet mask: 255.255.255.0...
  • Page 19 Subnet mask, then click OK. Note: Ensure that the IP address and Subnet mask are on the same subnet as the device. For example: EWS1025CAM IP address: 192.168.1.1 PC IP address: 192.168.1.2 – 192.168.1.255 PC Subnet mask: 255.255.255.0 6. Click Apply when finished.
  • Page 20: Hardware Installation

    Hardware Installation 1. Ensure that the computer in use has an Ethernet Controller port (RJ-45 Ethernet Port). For more information, verify with your computer’s user manual. 2. Connect one end of the Category 5e Ethernet cable into the RJ-45 port of the Access Point and the other end to the RJ-45 port of the computer.
  • Page 21: Mounting The Access Point

    Mounting the Access Point Using the provided hardware, the Access Point can be attached to a ceiling or wall. To attach the Access Point to a ceiling or wall using the mounting bracket: 1. Attach the mounting bracket to the wall or ceiling using the provided wall/ceiling mounting hardware kit. 2.
  • Page 22 3. Mount the Access Point on the mounting bracket by rotating the unit clockwise about 90 degrees to secure it in place. Attaching the Access Point to a ceiling using the provided T-Rail connectors: 1. Attach the T-Rail connectors to the bottom cover of the Access Point using the provided short screws. Note: Two sizes of T-Rail connectors are included in the mounting hardware kit: 15/16in (2.38cm) and 9/16in (1.43cm).
  • Page 24: Chapter 3 Configuring Your Access Point

    Configuring Your Chapter 3 Access Point...
  • Page 25: Default Settings

    Configuring Your Access Point This section will show you how to configure the device using the web-based configuration interface. Default Settings Please use your Ethernet port or wireless network adapter to connect the Access Point. IP Address 192.168.1.1/192.168.1.1200 Username/Password admin/admin...
  • Page 26: Web Configuration

    Web Configuration 1. Open a web browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.1.1. Note: If you have changed the default LAN IP Address of the Access Point, ensure you enter the correct IP Address. 2. The default username and password are: admin. Once you have entered the correct username and password, click the Login button to open the web-based configuration page.
  • Page 27 If prompted with the following question, click on Save (Internet Explorer). Save the downloaded file.
  • Page 28 Once download is completed, you MUST close all the browsers before install WebCMS. Double click on WebCMS to install the program. You may not have noticed, the installation is very fast, it only takes a few seconds for WebCMS to be installed. When installation is completed, open the browser and login into the camera again.
  • Page 29 NOTE: If you are seeing grey color in the viewer, it is because the camera has detected insufficient of light in the room and enabled night vision mode automatically. If you point your camera to a brighter area, you should be able to see it switched to normal color mode.
  • Page 30: Chapter 4 User Interface

    User Interface Chapter 4...
  • Page 31: Navigation Panel

    User Interface The User Interface section contains the following options: • Navigation Panel • Live View Management The following sections describe these options. Navigation Panel...
  • Page 32 The Navigation Panel is located at the top-right corner of the page. The descriptions are as follows: Navigate to home page for device information and connection status Navigate to Reboot/Reset device page Navigate to camera live view page Navigate to the main setting page Navigate to the Mesh tools page Logout...
  • Page 33: Live View Management

    Live View Management The Live View Management menu is located at the right side of the page. There are two streams running concurrently: Stream1 (1920x1080) and Stream2 (640x360). Stream1 has the higher resolution than stream2. Stream2 serves lower resolution for mobile devices which has smaller screens.
  • Page 34 This switch only applies to resolution 640 x 360. When enabled, the preview image will switched to 1:1 mode. By default the image will expand and fill the view screen if the actual image is smaller than the view. This switch will hide the browser and expand the view to full screen. You can press ESC button to cancel the full screen mode.
  • Page 35 This button takes a snap-shot on the real time view and store the image in the local folder. Toggle this button to start recording movie clip at real time. Click on the button to start recording. Please note that when icon changed to blue icon the camera is recording.
  • Page 36: Chapter 5 Access Point Settings

    Access Point Settings Chapter 5...
  • Page 37: Device Status

    Overview The Overview section contains the following options: • Device Status • Connections • Real Time The following sections describe these options. Device Status Clicking the Device Status link under the Overview menu shows the status information about the current operating mode. •...
  • Page 38 • The Memory Information section shows system memory information such as used and Total available, Free, Cached and Buffered  The LAN Information section shows the Local Area Network settings such as the LAN IP Address, Subnet mask, Gateway, DNS Address, DHCP Client, and STP status. ...
  • Page 40: Connections

    The UID/DDNS section shows each device is distributed with an exclusive unique identification (UID)/DDNS. You can find  the default UID/DDNS shown here. Connections Clicking the Connections link under the Overview menu displays the list of clients associated to the Access Point’s 2.4GHz/5GHz, along with the MAC address, TX, RX and signal strength for each client.
  • Page 41: Realtime

    Realtime Clicking the Realtime link under the Overview menu displays CPU load, Traffic and Connections CPU Load: 3 minutes CPU loading percentage information, it displays current loading, average loading and peak loading status. Left bar is loading percentage; button is time tracing. Interval is every 3 seconds. Realtime Traffic (kb/s): 2.4GHz and 5GHz and Ethernet port inbound and outbound traffic by current, average and peak time.
  • Page 42 Realtime Connection (Pkts): Overview on current active network connections. It displays UDP and TCP packets information and other connection status. UDP connections curve is in blue; TCP connection curve is in green; others curve is in red. Below of chart shows connections source and destination.
  • Page 43: Chapter 6 Network

    Network Chapter 6...
  • Page 44: Ipv4 Settings

    Basic This page allows you to modify the device’s IP settings and the Spanning Tree settings. Enabling Spanning Tree protocol will prevent network loops in your LAN network. IPv4 Settings IP Network Setting: Select whether the device IP address will use the static IP address specified in the IP Address field or be obtained automatically when the device connects to a DHCP server.
  • Page 45: Spanning Tree Settings

    Spanning Tree Settings Status: Enables or disables the Spanning Tree function. Hello Time: Specify Bridge Hello Time, in seconds. This value determines how often the device sends handshake packets to communicate information about the topology throughout the entire Bridged Local Area Network. Max Age: Specify Bridge Max Age, in seconds.
  • Page 46: Chapter 7 Wireless

    Wireless Chapter 7...
  • Page 47: System Properties

    Note: When enable band steering function, both 2.4GHz and 5GHz SSID and security setting must be the same. EnGenius Band Steering supports following advanced settings, *Prefer 5GHz: When band steering is configured to Prefer 5GHz mode, the AP will steer dual band capable client devices to 5GHz radio when the RSSI value of these client devices on 5GHz radio is more than set one.
  • Page 48: Operation Mode

    Operation mode The EWS1025CAM supports five operating modes:Access Point, Client Bridge, WDS AP, WDS Bridge, and WDS Station. 2.4GHz Access Point Client Bridge WDS AP WDS Bridge WDS Station 5GHz Access Point ● ● ● ● ● ● ● Client Bridge ●...
  • Page 49 2.4G/5G Wireless Network (Access Point / WDS AP mode) Wireless Mode Wireless mode supports 802.11b/g/n mixed mode in 2.4G and 802.11ac/a/n mixed mode in 5G. Channel HT Mode Scroll down this list to select bandwidth for operating under a frequency band. The default channel bandwidth is 20 MHz on 2.4GHz frequency radio and 40 MHz on 5GHz frequency radio.
  • Page 50 Channel / Frequency Select the channel and frequency appropriate. Auto Check this option to enable auto-channel selection. RTS/CTS Threshold Threshold packet size for RTC/CTS. A small number causes RTS/CTS packet to be sent more often and consumes more bandwidth. Client Limit Limits the total number of clients on this radio.
  • Page 51: 2.4Ghz/5Ghz Ssid Profile

    2.4GHz/5GHz SSID Profile Under Wireless Settings, you can edit the SSID profile to fit your needs. Click Edit under the SSID you would like to make changes...
  • Page 52 Enable: Check this option to enable this profile. SSID: Specifies the SSID for the current profile. Security: Displays the Security Mode the SSID uses. You can click Edit to change the security mode. For more details, see the next section. Hidden SSID: Check this option to hide the SSID from clients.
  • Page 53: Wireless Security

    Wireless Security The Wireless Security section lets you configure the Access Point’s security modes: WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed, WPA-Enterprise, WPA2-Enterprise and WPA Mixed Enterprise. It is strongly recommended that you use WPA2-PSK. Click on the Edit button under Wireless Settings next to the SSID to change the security settings.
  • Page 54 WPA-PSK/WPA2-PSK (Pre-Shared Key) Encryption: Select the WPA/WPA2 encryption type you would like to use. Available options are Both, TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard). Please ensure that your wireless clients use the same settings. Passphrase: Wireless clients must use the same Key to associate the device. If using ASCII format, the Key must be from 8 to 63 characters in length.
  • Page 55 Encryption: Select the WPA/WPA2 encryption type you would like to use. Available options are Both, TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard). Please ensure that your wireless clients use the same settings. Group Key Update Interval: Specify how often, in seconds, the group key changes. Radius Server: Enter the IP address of the Radius server.
  • Page 56: Wireless Mac Filter

    Wireless MAC Filter Wireless MAC Filter is used to allow or deny network access to wireless clients (computers, tablet PCs, NAS, smart phones, etc.) according to their MAC addresses. You can manually add a MAC address to restrict permission to access the Access Point. The default setting is: Disable Wireless MAC Filter.
  • Page 57: Traffic Shaping

    Traffic Shaping Traffic Shaping regulates the flow of packets leaving an interface to deliver improved Quality of Service. Enable Traffic Shaping: Select to Enable or Disable Wireless Traffic Shaping. Download Limit: Specifies the wireless transmission speed used for downloading. Upload Limit: Specifies the wireless transmission speed used for uploading. Per User: Check this option to enable wireless traffic shaping per user function.
  • Page 58: Fast Roaming

    Fast Roaming Enable the function to serve mobile client devices that roam from Access Point to Access Point. Some applications running on Client devices require fast re-association when they roam to a different Access Point Please enter the settings of the SSID and initialize the Security mode to WPA enterprise, as well as to set the Radius Server firstly.
  • Page 59: Wds Link Settings

    WDS Link Settings Using the WDS (Wireless Distribution System) feature will allow a network administrator or installer to connect to Access Points wirelessly. Doing so will extend the wired infrastructure to locations where cabling is not possible or inefficient to implement. Note: Compatibility between different brands and models of Access Points is not guaranteed.
  • Page 60 Security: Select None or AES from the drop-down list. AES Passphrase: Enter the Key Values you wish to use. Other Access Points must use the same Key to establish a WDS link. MAC Address: Enter the Access Point’s MAC address to where you want to extend the wireless area. Mode: Select to disable or enable from the drop-down list.
  • Page 61: Guest Network

    Guest Network The Guest Network function allows administrators to grant Internet connectivity to visitors or guests while keeping other networked devices (computers and hard drives) and sensitive personal or company information private and secure. Enable SSID: Select to Enable or Disable SSID broadcasting. SSID: Specify the SSID for the current profile.
  • Page 62 After enabling Guest Network in the SSID Config page, assign an IP Address, Subnet Mask and DHCP server IP address range for this Guest Network. Manual IP Settings IP Address: Specify an IP Address for the Guest Network Subnet Mask: Specify the the Subnet Mask IP Address for the Guest Network Automatic DHCP Server Settings Starting IP Address: Specify the starting IP Address range for the Guest Network.
  • Page 63: Rssi Threshold

    RSSI Threshold The RSSI value can be adjusted to allow more clients to stay associated to this AP. Note that setting the RSSI value too low may cause wireless clients to reconnect frequently. RSSI Threshold: Enable the RSSI Threshold feature by ensuring that each client is served by at least one Access Point at any time.
  • Page 64: Management Vlan Settings

    Management VLAN Settings This section allows you to assign a VLAN tag to the packets. A VLAN is a group of computers on a network whose software has been configured so that they behave as if they were on a separate Local Area Network (LAN). Computers on VLAN do not have to be physically located next to one another on the LAN.
  • Page 65: Chapter 8 Ddns

    DDNS Chapter 8...
  • Page 66 You must Enable EnGenius Cloud first and then choose the Type. A key part about EnGenius Cloud Service is DDNS. Dynamic DNS (DDNS) is a type of DNS that works with dynamic IP address. DDNS keeps update its mapping regularly and ensures a consistent matching so that your device can be accessed over the Internet using a fixed DDNS name.
  • Page 67 Alias DDNS Name: You may find that your DDNS is too difficult to remember. EnGenius provides free DDNS name registration as long as the alias is not yet been taken other EnGenius product users. You can check the availability by clicking on the button Availability Check for verification.
  • Page 68: Chapter 9 Upnp

    UPnP Chapter 9...
  • Page 69 Universal Plug and Play (UPnP) allows the other device to detect the presence of the camera so that communication becomes possible. You should enable UPnP if you wish your camera to be recognized by your router. UPnP Traversal makes camera remote access over the Internet possible using camera DDNS name.
  • Page 70: Chapter 10 Service Port

    Service Port Chapter 10...
  • Page 71 The default setting is as follows. This is only reserved for advanced users who want to keep certain ports for other particular services. Changing the ports will result in unexpected result. Unless necessary, please keep the default setting.
  • Page 72: Chapter 11 Mesh

    Mesh Chapter 11...
  • Page 73: Status

    Simple to deploy and create a mesh network by the EWS controller or EzMaster in minutes, but for standalone mode without these two applications, user needs to configure the same settings of Mesh network in each device, once EWS1025CAM plugged into any power source, the EnGenius mesh devices automatically optimizes routes between wireless mesh devices and creates a truly adaptive mesh infrastructure with all system.
  • Page 74: Settings

    Settings Each device must have the same settings in this setting page. Note: If you have changed the settings in Network Wireless page, please make sure all the settings must be the same in each device. Mesh: Enable or Disable the mesh function, system will save the settings even mesh function is disable. Operation Mode: The Mesh AP mode is mesh point with wireless AP function.
  • Page 75: Tools

    Mesh Device Name: You can click the hyper link to modify the Mesh device name from wireless setting page of device name. Mesh Band: Select the 2.4GHz or 5GHz for the mesh backbone connection. Mesh ID: The mesh ID should be maximum up to 8 characters in numbers 0 ~ 9. Password: The mesh password should be maximum up to 12 characters.
  • Page 76 All the connected Mesh nodes will be displayed in this page. Node: It shows the device name and MAC address. Type: There are two types of the node. The Root node uplink to the gateway by wire, and connect with other mesh node by wireless simultaneously.
  • Page 77: Link Status

    Link Status The Mesh network view is an overview for all mesh nodes. Mesh View: Mouse over on any Mesh node (black) for the linking status which is linking to other Mesh nodes (blue) with green line. Unreachable Mesh Node(s): The nodes which can't be connected to the mesh network, due to the weak signal detected by neighbor nodes.
  • Page 78: Trace Route

    This page allows you to analyze the connection quality of a mesh node to other mesh node in the mesh network. Trace Route This page allows you to analyze the routing table to a target from a mesh node to other mesh node in the mesh network. Throughput This page allows you to analyze the throughput from a mesh node to other mesh node in the mesh network.
  • Page 79: Chapter 12 Management

    Management Chapter 12...
  • Page 80: Controller Settings

    Controller Settings Adding EWS1025CAM to ezMaster Device Inventory, you must first bind the AP to ezMaster's Device Inventory by ‘registering’ the device. You can manually redirecting each AP to ezMaster, or skip this section if you are managing only local devices. You can test the ezMaster Device Inventory by IP address, and get the connection status between EWS1025CAM and ezMaster Device Inventory.
  • Page 81 Status: Enables or Disables the SNMP feature. Contact: Specifies the contact details of the device. Location: Specifies the location of the device. Community Name (Read Only): Specifies the password for the SNMP community for read only access. Community Name (Read/Write): Specifies the password for the SNMP community with read/write access. Trap Destination Address: Specifies the port and IP address of the computer that will receive the SNMP traps.
  • Page 82 Port: Displays the port number. Trap Destination Community Name: Specifies the password for the SNMP trap community. SNMPv3 Status: Enables or Disables the SNMPv3 feature. User Name: Specifies the username for the SNMPv3.feature Auth Protocol: Select the Authentication Protocol type: MDS or SHA. Auth Key: Specify the Authentication Key for authentication.
  • Page 83: Cli/Ssh Settings

    CLI/SSH Settings Most users will configure the device through the graphical user interface (GUI). However, for those who prefer an alternative method there is the command line interface (CLI). The CLI can be access through a command console, modem or Telnet connection. For security’s concern, you can enable SSH (Secure Shell) to establish a secure data communication.
  • Page 84: Https Settings

    HTTPS Settings Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with especially wide deployment on the Internet. Technically, it is not a protocol in and of itself; rather, it is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications.
  • Page 85: Email Alert

    Email Alert The Access Point will send email alerts when configurations have been changed. Status: Check Enable to enable Email Alert feature. From: Enter the address to show as the sender of the email. To: Enter the address to show as the receiver of the email. Subject: Enter the subject to show as the subject of the email.
  • Page 86: Date And Time Settings

    Apply: Click Apply to save the changes. Date and Time Settings This page allows you to set the internal clock of the Access Point. To access the Date and Time settings, click Time Zone under the Management tab on the side bar. Manually Set Date and Time: Manually specify the date and time.
  • Page 87: Wifi Scheduler

    WiFi Scheduler Use the schedule function to reboot the Access Point or control the wireless availability on a routine basis. The Schedule function relies on the GMT time setting acquired from a network time protocol (NTP) server. For details on how to connect the Access Point to an NTP server, see Date and Time Settings.
  • Page 88 WiFi Scheduler Status: Enables or disables the WiFi Scheduler function. Wireless Radio: Select 2.4GHz or 5GHz* to use WiFi Schedule. SSID Selection: Select a SSID to use WiFi Schedule. Schedule Templates: There are 3 templates available: Always available, Available 8-5 daily and Available 8-5 daily except weekends.
  • Page 89: Tools

    Tools This section allows you to analyze the connection quality of the Access Point and trace the routing table to a target in the network. Ping Test Parameters Target IP/Domain Name: Enter the IP address or Domain name you would like to search. Ping Packet Size: Enter the packet size of each ping.
  • Page 90 Traceroute Parameters Target IP/Domain Name: Enter an IP address or domain name you wish to trace. Start: Click Start to begin the trace route operation. Stop: Halts the traceroute test.
  • Page 91 Nslookup Parameters Target IP/Domain Name: Enter an IP address or domain name you wish to trace. Start: Click Start to begin the Nslookup operation.
  • Page 92 Speed Test Parameters Target IP/Domain Name: Enter an IP address or domain name you wish to run a Speed Test for. Time Period: Enter the time in seconds that you would like the test to run for and in how many intervals. Start: Starts the Speed Test.
  • Page 93: Led Control

    LED Control This section allows you to control the LED control functions: Power status, LAN interface and 2.4GHz/5GHz/Mesh WLAN interface. Click Apply to save the settings after selecting your choices from the boxes.
  • Page 94: Device Discovery

    Device Discovery Under Device Discovery, you can choose for the Access Point to automatically scan for local devices to connect to. Click Scan to begin the process.
  • Page 95: Chapter 13 System Manager

    System Manager Chapter 13...
  • Page 96: Account Setting

    Account Setting This page allows you to change the username and password of the device. There are three types of the account settings: 1. Web Account By default, the username is admin and the password is admin. The password can contain from 0 to 12 alphanumeric characters and is case sensitive.
  • Page 97 Apply: Click Apply to save the changes. Note: it is highly recommended that you change your password to something more unique for greater security. Push Message Mobile List Here will list the devices which enable the feature of push message on this camera. When an event triggered, camera will send the message to all the devices in this list.
  • Page 98: Firmware Upgrade

    Firmware Upgrade This page allows you to upgrade the Firmware of the Access Point. To Perform the Firmware Upgrade: 1. Click the Browse… button and navigate the OS File System to the location of the Firmware upgrade file. 2. Select the upgrade file. The name of the file will appear in the Upgrade File field. 3.
  • Page 99: Backup/Restore

    Backup/Restore This page allows you to save the current device configurations. When you save the configurations, you can also reload the saved configurations into the device through the Restore New Settings from a file folder. If extreme problems occur, or if you have set the device incorrectly, you can use the Reset button in the Reset to Default section to restore all the configurations of the device to the original default settings.
  • Page 100 User Setting Back Up Setting as Default: Click Backup to backup the user settings you would like to use as the default settings. Restore to User Default: Click Restore to restore the Access Point to user’s default settings. All the settings can be separated to “Camera only” or “Access Point only”...
  • Page 101: Reset/Reboot

    Reset/Reboot In some circumstances, you may be required to force the device to reboot. Click on Reboot the Device to reboot the device. System Log This page allows you to setup the System Log and local log functions of the Access Point. Click Log under the Systems Manager tab to open up the System Log page.
  • Page 102 Status: Enables or disables the System Log function. Log Type: Select the Log Type mode you would like to use. Remote Log: Enables or disables the Remote Log feature. If enabled, enter the IP address of the Log you would like to remote to.
  • Page 103: Chapter 14 Camera Overview

    Camera OverView Chapter 14...
  • Page 104: Camera Status

    Camera Status Status page displays the detail video streaming information on the page including Resolution, Video Codec, Frame Rate, Ethernet Bit Rate, WiFi Bit Rate and Audio Codec.
  • Page 105: Pc Storage Path

    PC Storage Path Folder Path: click “Browse” to change the path Snapshot File Type: support image format JPG, PNG & BMP Recording File Type: support format AVI & MP4 Compression rate comparison (High to Low): JPG > PNG > BMP MP4 >...
  • Page 106: Chapter 15 Media

    Media Chapter 15...
  • Page 107: Video

    Video Enable: it is recommended that you enable Time Stamp and Video Title; the timestamp will show on the top-left corner of your video as shown below.
  • Page 108: Camera

    Camera You can get better quality by tuning the lighting condition of the camera. For example, in a dark room you may want to set the Brightness higher to generate clearer result. When directly facing an outdoor window (too much light) you may want to lower the Brightness a bit.
  • Page 109 Light setting Brightness Contrast...
  • Page 110 Sturation Sharpness...
  • Page 111 De-noise Please note that some of the effects will be more obvious in higher resolution at real time. Flicker Control The supported options are: 60Hz & 50Hz Flicker Control is an anti-flicker feature setting. AC lamp can cause a flicker effect, which is a consequence of the AC power frequency (50 or 60 Hz). As the light can change from picture to picture, causing light flicker.
  • Page 112 Mirror Support Mirrors: None, Mirror, Flip and Both There are times that the camera will have to be mounted upside down for sideways. That is, the view become difficult to monitor when it is upside down. The Mirror setting does not reflect on the preview at real time (unlike lighting condition settings).
  • Page 113 Flip (Vertical) None Flip Both (Horizontal and Vertical) None Both...
  • Page 114 Day/Night Mode This controls Night Vision ON and OFF. Auto: auto detect light sufficiency and switch between Day and Night automatically. Day: force the camera to turn OFF Night Vision. Night: force the camera to turn Night Vision ON. Night...
  • Page 115: Advance

    Advance Exposure Settings Mode: Manual, Indoor, Outdoor For regular users, please choose indoor or outdoor, if you are not sure about the terms and behavior, the default values will the preconfigured. The areas are grey out for preconfigured settings when you choose Indoor or Outdoor.
  • Page 116 Manual Choose Manual if you would like to fine tune some of the settings that suits your application. Please be noted that these settings may have impacts on the image quality and performance.
  • Page 117: Privacy Mask

    Privacy Mask Choose Enable if you would like to put certain areas in private. Please use selected window to hide certain area for privacy purpose.
  • Page 118: Audio

    Audio Status If you audio is important to what you are monitoring, you need to set the audio status to Enable. So that the microphone can pick up sounds in the environment. On the other hand, if audio is not necessary (for instance an open space with a lot of noises), you are advised to disable the audio to reduce the clips file size.
  • Page 119: Chapter 16 Event Management

    Event Management Chapter 16...
  • Page 120: Event Control

    Event Control This camera supports many smart features that allow you to utilize the camera in many application scenarios. This section will introduce each of them in detail. When camera detects an event that matches the predefined condition an event will be triggered and proceed with the defined actions;...
  • Page 121 Enable/Disable the event control Schedule to set the camera to record video regularly based on a predefined schedule. Time of day can specify the time range for each schedule. Trigger Type by Time or Detectors, if you select the detectors, it can be trigger by Motion detection, Audio detection or Tampering detection.
  • Page 122 Record to SD Card, Network Storage or FTP, please remember to setup and enable the correlate settings of Network Storage and FTP. Snapshot to SD Card, Network Storage, FTP or E-Mail, please remember to setup and enable the correlate settings of Network Storage, FTP, E-mail.
  • Page 123: Motion Detection

    Motion Detection Enable: it is recommended that you enable Time Stamp and Video Motion Detection Window is a hot zone that the camera analyzes for motion (image changes). When a motion is detected within the zone an event will be triggered.
  • Page 124 When the window is selected, use your mouse to move the window to the area you intend to monitor. There can be 3 windows at the most. The Windows are differentiated by color; Window 1 is Green, Window 2 is Red and Window 3 is Blue. Video OSD Prompt displays the warning on the top lift of the live view page when motion triggered.
  • Page 125 Therefore, you can have a combination of three different detection window sizes.
  • Page 126: Audio Detection

    Audio Detection Sensitivity Level: 0% to 100% (with 100% being the most sensitive) Similar to motion detection, high sensitivity will trigger events more often than low sensitivity and produce more snapshots or videos. However, over-sensitive events will fill up the storage very quickly. Even if you have unlimited storage space, large amount of files can become a problem when you need to search through each of the files to find what you are really looking for.
  • Page 127: Tampering Detection

    Tampering Detection Tamper detection is a setting within your IP camera that will send you an alert when the camera is tampered with. Once an action has been detected, whether it’s someone trying to knock the camera down or blocking its view, the alert lets you know to log into the actions to see what happened.
  • Page 128: Event Action

    Event Action This page provides Event-related settings. Event Action/ can set 20sec(s), 30sec(s), 1min(s), 5min(s), 10min(s), if you set 20sec(s) for this Buffer Duration until Next Event: item, system will ignore any trigger during this 20sec(s). Event Snapshot/ can set 10sec(s), 20sec(s), if you set 10sec(s) for this item, system will send a snapshot in Snapshot Duration: every 10sec(s).
  • Page 129 Note: If setting to 30 seconds, the camera will keep recording for 30 seconds when event is triggered. Buffer Duration Until Next Event In this case, if the Video Length is 10 seconds, then 3 files will be generated for single instance of event. If Video Length is 30 seconds, then only 1 file will be generated.
  • Page 130: Chapter 17 Event Server

    Event Server Chapter 17...
  • Page 131: Network Storage

    Network Storage It is required for users to configure Event Server settings before setting camera Event or Schedule Recording. You will have to tell where the captured images or clips are going to be stored. The following concept diagram depicts the flow of the image file when and when captured.
  • Page 132 NFS (Network File System) Server: IP address of the NFS server Path: enter the initial path if applicable Folder Size: storage allocated for the camera; the default value 0 signifies infinity. Overwrite: when the defined folder is full, the oldest files will be overwritten to accommodate the new one. Click Apply when done.
  • Page 133 SAMBA Server: IP address of the SAMBA server Path: enter the initial path if applicable User Name: username for accessing SAMBA server Password: password for accessing SAMBA server Folder Size: storage allocated for the camera; the default value 0 signifies infinity. Overwrite: when the defined folder is full, the oldest files will be overwritten to accommodate the new one.
  • Page 134: Ftp(File Transfer Protocol)

    FTP(File Transfer Protocol) Server: IP address of the FTP server Port: the FTP server port; default 21 User Name: username for accessing FTP server Password: password for accessing FTP server FTP Path: enter the initial path if applicable Click Test to verify the connection with the server using the username and password. Click Apply when done...
  • Page 135: E-Mail

    E-Mail EWS1025CAM allows camera to send captured images to the predefined email box to notify about an event or alarm. SMTP is an email sender’s server. You need to check whether your email service provider supports SMTP and obtain the required information for this setting.
  • Page 136: Chapter 17 Storage Info

    Storage Info Chapter 17...
  • Page 137: Storage Info

    Storage Info System will display the storage information on this page; it includes the network storage status, total size and available size. User can click the “Refresh” button to get the latest information of these information. It depends on different browsers, user can double click the mouse on the records of .avi or .jpg file to save and view the video or snapshot.
  • Page 138 You can browse through the folder like any other file manager by clicking on the folder name. Click on the files to view it directly as shown below.
  • Page 139: Appendix

    Appendix...
  • Page 140: Appendix A - Fcc Interference Statement

    Appendix A - FCC Interference Statement Federal Communication Commission Interference Statement FCC Caution: IMPORTANT NOTE: Radiation Exposure Statement...
  • Page 142: Appendix B - Ce Interference Statement

    Appendix B - CE Interference Statement Europe – EU Declaration of Conformity...
  • Page 143 0560...

Table of Contents