TRENDnet TV-IP862IC User Manual page 42

Hd wireless day/night ptz cloud camera
Hide thumbs Also See for TV-IP862IC:
Table of Contents

Advertisement

TRENDnet User's Guide
After the camera has restarted, the wireless configuration options become available.
1.
Check the Wireless checkbox. The camera automatically starts scanning your
wireless area.
2.
Enter a name in the Network Name field manually, or select a wireless network
router from the drop-down list under Site Survey.
3.
Under Wireless Mode select between Infrastructure and Ad-hoc mode.
Infrastructure Mode - An 802.11 networking framework in which devices communicate
with each other by first going through an Access Point (AP). In infrastructure mode,
wireless devices can communicate with each other or can communicate with a wired
network.
Ad-Hoc - An 802.11 networking framework in which devices or stations communicate
directly with each other, without the use of an access point (AP).
Under Security Mode select between None, WEP, WPA-PSK, and WPA2-PSK.
None – means no security
WEP - a security protocol for wireless local area networks (WLANs) defined in the
802.11b standard. WEP is designed to provide the same level of security as that of a
© Copyright 2013 TRENDnet. All Rights Reserved.
wired LAN. LANs are inherently more secure than WLANs because LANs are somewhat
protected by the physicalities of their structure, having some or all part of the network
inside a building that can be protected from unauthorized access. WLANs, which are
over radio waves, do not have the same physical structure and therefore are more
vulnerable to tampering. WEP aims to provide security by encrypting data over radio
waves so that it is protected as it is transmitted from one end point to another.
WPA-PSK - uses a pass-phrase, which is between 8 and 63 characters long. This pass-
phrase is created and entered by the user into any client station's configuration utility,
as well as into the AP. (A recommendation: do not pick a password already in use within
the network, and do not use a variation of your office address.) Generally, when
creating or setting up a wireless LAN, the first thing to be configured is the AP, which is
then followed by the configuration of client stations. Configuring an AP depends largely
upon the manufacturer's instructions; client station configuration is where the real
choices about security come into play.
WPA2-PSK - it is a method of securing your network using WPA2 with the use of the
optional Pre-Shared Key (PSK) authentication, which was designed for home users
without an enterprise authentication server. To encrypt a network with WPA2-PSK you
provide your router not with an encryption key, but rather with a plain-English
passphrase between 8 and 63 characters long.
Depending on what Security Mode you are using, enter the Key in the key field next to
Key. Click the Show Hidden Key if you wish to see what you are typing.
.
Click Apply to continue
TV-IP862IC
40

Advertisement

Table of Contents
loading

Table of Contents