Before You Use This Product The use of surveillance devices may be prohibited by law in your country. The Network Camera is not only a high-performance web-ready camera but also can be part of a flexible surveillance system. It is the user’s responsibility to ensure that the operation of such devices is legal before installing this unit for its intended use.
Table of Contents Before You Use This Product ... 2 Package Contents ... 5 Installation ... 6 Hardware installation... 6 Software installation... 7 Initial Access to the Network Camera ... 8 Check Network Settings ... 8 Add Password to prevent Unauthorized Access ... 8 How to Use ...
Package Contents FCS-1030 or WCS-2030 (Wireless) IP Network Camera Dipole Antenna (WCS-2030 Only) Power Adapter Camera Stand CD Manual/Utility Quick Installation Guide...
Installation In this manual, "User" refers to whoever has access to the Network Camera, and "Administrator" refers to the person who can configure the Network Camera and grant user access to the camera. Hardware installation Camera before plugging in to the power socket. This will reduce the risk of accidental electric shock.
To install in Ethernet Make sure the Ethernet is firmly connected to a switch hub. After attaching the Ethernet cable plug in the power adapter. If the LED turns out to be steady blue, go to next paragraph “Software installation”. If the Ethernet is not available, Network Camera will switch to wireless LAN mode. To install in wireless LAN If the Ethernet is not available while power on, the Network Camera will search for any access point with the SSID “default”.
Initial Access to the Network Camera Check Network Settings The Network Camera can be connected either before or immediately after software installation onto the Local Area Network. The Administrator should complete the network settings on the configuration page, including the correct subnet mask and IP address of gateway and DNS. Ask your network administrator or Internet service provider for the detail information.
How to Use Authentication After opening the Web browser and typing in the URL of the Network Camera, a dialogue window pops up to request a username and password. Upon successful authentication, the following figure is displayed. The foreground is the login window and the background shows the message if authentication fails. The user may check the option box to save the password for future convenience.
Installing plug-in For the initial access to the Network Camera in Windows, the web browser may prompt for permission to install a new plug-in for the Network Camera. Permission request depends on the Internet security settings of the user’s PC or notebook. If the highest security level is set, the computer may prohibit any installation and execution attempt.
Primary user’s capability Main Screen with Camera View The main page layout has two parts: Configuration functions: The camera can be configured using these user interfaces. Camera View: What the camera sees. Click on the configuration link to the left of the image window to enter the configuration page.
Digital Zoom Click on the magnifier icon under the camera view then the digital zoom control panel will be shown. Uncheck “Disable digital zoom” and use the slider control to change the zoom factors. Snapshot Click on “Snapshot”, web browser will pop up a new window to show the snapshot. Users can point at the snapshot and click the right button of mouse to save it.
Client settings At the initial access to the “Connection type” page in Windows, the web browser will ask for a new plug-in installation, the plug-in being the Network Camera. This plug-in has been registered for certification and can be used to change the parameters at the client’s site. The user may click on to install the plug-in.
Page 14
There are two settings for the client side. One is “Media Options” for users to determine the type of media to be streaming. The other is “Protocol Options” which allows choices on connection protocol between client and server. There are two protocols choices to optimize your usage – UDP and TCP.
Administrator’s capability Fine-tuning for Best Performance Best performance generally equates to the fastest image refresh rate with the best video quality, and at the lowest network bandwidth as possible. The three factors, “Maximum frame rate”, “Constant bit rate”, and “Fix quality” on the Audio and Video Configuration page, are correlative to allow for achieving the best performance possible.
Page 16
* This feature depends on local telecom system and the model of mobile phone; LevelOne do not guarantee this feature works in all area. For Best Real-time Video Images To achieve good real-time visual effect, the network bandwidth should be large enough to allow a transmission rate of greater than 20 image frames per second.
Opening accounts for new users Protect Network Camera by passwords The Network Camera is shipped without any password by default. That means everyone can access the Network Camera including the configuration as long as the IP address is known. It is necessary to assign a password if the Network Camera is intended to be accessed by others.
Check the way to upload snapshot, Click on save to validate. Software revision upgrade Customers can obtain the up-to-date software from the web site of LevelOne at www.level1.com. An easy-to-use Upgrade Wizard is provided to upgrade the Network Camera with just a few clicks.
Page 19
2. Run the Upgrade Wizard and proceed following the prompts. 3. Or upgrade firmware from HTTP web page directly 4. The whole process will finish in a few minutes and it will automatically restart the system. If power fails during the writing process of Flash memory, the program in the memory of the Network Camera may be destroyed permanently.
Definitions in Configuration Only the Administrator can access system configuration. Each category in the left column will be explained in the following pages. The bold texts are the specific phrases on the Option pages. The Administrator may type the URL below the figure to directly enter the frame page of configuration. If the Administrator also wants to set certain options through the URL, read the reference appendix for details.
System parameters "Host name" The text displays the title at the top of the main page. “Turn off the LED indicator” Check this option to shut off the LED on the rear. It can prevent the camera’s operation being noticed. "Keep current date and time"...
Security settings “Root password” Change the Administrator’s password by typing in the new password identically in both text boxes. The typed entries will be displayed as asterisks for security purposes. After pressing , the web browser will ask the Administrator for the new password for access.
Network settings Any changes made on this page will restart the system in order to validate the changes. Make sure every field is entered correctly before clicking on Network type “LAN” & “PPPoE” The default type is LAN. Select PPPoE if using ADSL "Get IP address automatically"...
8080, the users must type in the web browser “http://192.168.0.100:8080” instead of “http://192.168.0.100”. RTSP Streaming “Access name” This is the access URL for making connection from client software. Using rtsp://<ip address>/<access name> to make connection “RTSP port” This can be other than the default Port 554 <url>...
WLAN Configuration (WCS-2030 only) “SSID” (Service Set Identifier), it is a name that identifies a wireless network. Access Points and wireless clients attempting to connect to a specific WLAN (Wireless Local Area Network) must use the same SSID. The default setting is default. Note: The maximum length of SSID is 32 single-byte characters and SSID can’t be any of “, <, >...
Page 26
Note: When 22(“), 3C(<) or 3E(>) are input in network key, the key format can’t be changed to ASCII format. “Algorithm” Choosing one of the following algorithm for WPA-PSK modes ▶ “TKIP” ▶ “AES” “Pre-shared Key” Entering a key in ASCII format. The length of the key is 8 ~ 63 Some invalid settings may cause the system failing to respond.
DDNS “Enable DDNS” This option turns on the DDNS function. “Provider” The provider list contains four hosts that provide DDNS services. Please connect to the service provider’s website to make sure the service charges. “Host Name” If the User wants to use DDNS service, this field must be filled. Please input the hostname that is registered in the DDNS server.
Access List The access list is to control the access permission of clients by checking the client IP address. There are two lists for permission control: Allow List and Deny List. Only those clients whose IP address is in the Allow List and not in the Deny List can connect to the Network Camera for receiving the audio/video streaming.
Audio and Video General “Configure for computer viewing” To make quick setting for computer viewing “Configure for mobile viewing” To make quick setting for cell phone viewing Video Settings “Video title” The text string can be displayed on video “Color” Select either for color or monochrome video display. “Frame Size”...
Page 30
“Audio type” Select audio codec “AAC” or “GSM-AMR” and the bit rate <url> http://<Network Camera>/setup/audiovideo.html <Network Camera> is the domain name or original IP address of the Network Camera.
Image Settings Click on this button to pop up another window to tune “Brightness”, “Contrast”, “Hue” and “Saturation” for video compensation. Each field has eleven levels ranged from -5 to +5. In “Brightness” and “Contrast” fields the value 0 indicates auto tuning.
Email & FTP Email When the SMTP server support SMTP authentication, users need to give the valid user name and password to send email via the server. “Sender email address”, the email address of the sender. There are two external mail server can be configured, primary and secondary email server, The network camera will use primary server as default , and use secondary server when primary server is unreachable.
that of the external FTP server. Some FTP servers cannot accept preceding slash symbol before the path without virtual path mapping. Refer to the instructions for the external FTP server for details. The folder privilege must be open for upload. <url>...
Page 34
"Window Name" The text will show at the top of the window. “Sensitivity” This sets the endurable difference between two sequential images. “Percentage” This sets the space ratio of moving objects in the monitoring window. Higher sensitivity and small percentage will allow easier motion detection. The following figure shows the screen when is clicked.
Application settings The server provides two kinds of applications, snapshot and videoclip. There are two independent snapshot items to set, and they are named as Snapshot #1 and Snapshot #2. The status, schedule, trigger condition, and action of three applications are summarized in the application page.
Send out the snapshot while motion detection There are three windows for motion detection each can be assigned a name. Select the windows which need to be monitored. If motion detection has not been set up, “undefined” will be shown instead of the window title.
Video Clip The setting for video clip is mostly the same as snapshot. “Video clip max file size” This indicates the maximum file size for video clip (Kbytes).
System log The Network camera support log the system messages on remote server. The protocol is compliant to RFC 3164. If you have external Linux server with syslogd service, use “-r” option to turn on the facility for receiving log from remote machine. Or you can use some software on Windows which is compliant to RFC 3164.
Viewing system parameters Click on this link on the configuration page to view the entire system’s parameter set. The content is the same as those in CONFIG.INI.
Maintenance Three actions can be selected “reboot” click the reboot button to restart system “factory default” Click on Factory default button on the configuration page to restore the factory default settings. Any changes made so far will be lost and the system will be reset to the initial factory settings.
Appendix A. Troubleshooting Status LED The following table lists the LED patterns in general. Condition Loading system after power on During booting procedure Detecting and setting network After network is setup (system up) During the upgrade firmware process Reset and restore LED color Steady blue Steady blue and red...
There is a button in the back of the Network Camera. It is used to reset the system or restore the factory default settings. Sometimes resetting the system sets the system back to normal state. If the system problems remain after reset, restore the factory settings and install again.
Context-Length: <length>\r\n \r\n <parameter pair> where <parameter pair> is <parameter>=<value>\r\n [<parameter pair>] <length> is the actual length of content. Example: request IP address and it’s response Request: http://192.168.0.123/cgi-bin/admin/getparam.cgi?network_ipaddress Response: HTTP/1.0 200 OK\r\n Content-Type: text/html\r\n Context-Length: 33\r\n \r\n network.ipaddress=192.168.0.123\r\n Set server parameter values Note: This request require administrator access Method: GET/POST Syntax:...
<text string shorter than 40 host name of server (note: The return page can be a general HTML file(.htm, .html) or a LevelOne server script executable (.vspx) file. It can not be a CGI command. It can not have any extra parameters. This parameter must be put at end of...
Page 47
(r/w) 14 characters> userattr_<1~20> [conf] usercount 1 ~ 21 Group: Network NAME VALUE type (r/w) pppoeuser <text string shorter than 80 (r/w) characters> pppoepass <text string shorter than 15 (r/w) characters> resetip (r/w)(restart) ipaddress <IP address> (r/w) (restart) subnet <IP address> (r/w) (restart) router <IP address>...
Page 48
(r/w) characters> smtp2 <domain name (r/w) address, string shorter than 40 characters> mailto2 <text string shorter than 80 (r/w) characters> mailuser2 <text string shorter than 63 (r/w) characters> mailpass2 <text string shorter than 15 (r/w) characters> returnemail <text string shorter than 80 (r/w) characters>...
Page 49
ftppasvmode2 (r/w) httpport <positive number less than (r/w) (restart) 65535> rtspport <positive number less than (r/w) (restart) 65535> videoport <positive number less than 65535> audioport <positive number less than 65535> accessname <text string shorter than 20 (r/w) characters> Group: Wireless (restart) ssid <text string shorter than 32 (r/w)
Return: HTTP/1.0 200 OK\r\n Content-Type: text/plain\r\n Content-Length: <configuration file length>\r\n \r\n <configuration data>\r\n Upgrade firmware Note: This request requires administrator privilege Method: POST Syntax: http://<servername>/cgi-bin/admin/upgrade.cgi Post data: fimage=<file name>[&return=<return page>]\r\n \r\n <multipart encoded form data> Server will accept the upload file named <file name> to be upgraded the firmware and return with <return page>...
Technology License Notice AMR Technology This product includes AMR narrowband speech coding technology licensed by VoiceAge. Please refer to http://www.voiceage.com/ MPEG-4 AAC Technology This product includes MPEG-4 AAC audio coding technology licensed by Via Licensing. Please refer to http://www.vialicensing.com/ MPEG-4 Visual Technology This product includes one MPEG-4 encoder and one MPEG-4 decoder license.
Page 63
Digital Data Communication Asia Co., Ltd cannot be held responsible for any technical or typographical errors and reserves the right to make changes to the product and manuals without prior notice. LevelOne Inc. makes no warranty of any kind with regard to the material contained within this document, including, but not limited to, the implied...
Page 64
GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Page 65
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.
Page 66
c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License.
Page 67
compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
Page 68
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
Page 69
If you would like a copy of the GPL or other open source code in this software on a physical CD medium, LevelOne (Digital Data Communications) offers to mail this CD to you upon request, for a price of US$9.99 plus the cost of shipping.
Need help?
Do you have a question about the CamCon FCS-1030 and is the answer not in the manual?
Questions and answers