Cisco WVC80N User Manual

Cisco WVC80N User Manual

Wireless-n internet home monitoring camera
Hide thumbs Also See for WVC80N:

Advertisement

Wireless-N Internet Home Monitoring Camera
User Guide
WVC80N
Model:

Advertisement

Table of Contents
loading

Summary of Contents for Cisco WVC80N

  • Page 1 Wireless-N Internet Home Monitoring Camera User Guide WVC80N Model:...
  • Page 2: About This Guide

    Glossary www.linksysbycisco.com/glossary Network Security www.linksysbycisco.com/security Copyright and Trademarks © 2009 Cisco Systems, Inc. All rights reserved. Cisco, the Cisco logo, and Linksys are trademarks or registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
  • Page 3: Table Of Contents

    Table of Contents Chapter 1: Product Overview Front Panel..........4 Bottom Panel .
  • Page 4 Cisco Products ........
  • Page 5: Chapter 1: Product Overview

    Product Overview Chapter 1 Chapter 1: WARNING: Resetting the Camera will erase all of your settings, such as encryption information, Product Overview and replace them with the factory defaults. Do not reset the Camera if you want to retain your settings.
  • Page 6: Chapter 2: Installing And Using The Camera Utility

    Installing and Using the Camera Utility Chapter 2 Chapter 2: 4. The Choose Destination screen appears. Click Browse and choose the folder where you would like the Utility Installing and Using the installed. Click Next. Camera Utility Overview This chapter will instruct you on how to install and use the Camera Utility.
  • Page 7: Using The Camera Utility For The First Time

    Double-click the icon on your desktop • Right-click the icon in the system tray, then click • Linksys by Cisco Wireless-N Internet Home Monitoring Camera. Desktop Icon System Tray Icon When you are finished using the Camera Utility, close the Utility window by clicking the X button in the upper-right corner.
  • Page 8 Installing and Using the Camera Utility Chapter 2 Multiple-Camera Layouts Viewing Area The viewing area takes up most of the LiveView window. In a multiple-Camera layout, one of the video windows The viewing area can have four different layouts, with is always outlined in green.
  • Page 9: View Recordings

    Microphone This feature is not available on the WVC80N. Quality Move the slider to the left to decrease the video quality or to the right to increase the video quality.**...
  • Page 10: Setup

    Installing and Using the Camera Utility Chapter 2 Video Playback The controls and their functions are described below. The section at the bottom of the View Recordings window Control Function is used to locate video for playback. Play/Pause Click this button to toggle the video between play and pause.
  • Page 11 Installing and Using the Camera Utility Chapter 2 Setup > Recording Options My Camera List The My camera list section of the Setup > Cameras screen Click on the Recording Options tab to set the recording contains a list of all Cameras that have been added (up to schedule for a network Camera.
  • Page 12 Installing and Using the Camera Utility Chapter 2 Instant Recording Time Limit To delete a scheduled recording, check the box to the left of the recording, and click Delete. To delete all scheduled Maximum Time Limit for Instant Recording This is the recordings, check the box in the upper left corner of the maximum length of a recording started by clicking the table and click Delete.
  • Page 13: Chapter 3: Advanced Configuration With The Web-Based Utility

    Advanced Configuration with the Web-based Utility Chapter 3 Chapter 3: Help – Select this tab to display the Help screen. Go to • the “Help” section for more information. Advanced Configuration • Exit – Select this tab to close the Utility. with the Web-based Utility View Video Follow these instructions to view the Camera’s video.
  • Page 14 Advanced Configuration with the Web-based Utility Chapter 3 Resolution (cycles through 1x, 2x, and 4x). Position the cursor over the part of the image you want to magnify and click once. Use the Resolution drop-down menu to select the display Snapshot resolution.
  • Page 15: Setup > Basic

    Advanced Configuration with the Web-based Utility Chapter 3 Video Format Current Date/Time This displays the Camera’s current • date and time. If it is incorrect, click Sync with PC to To select the video format, click the Video Format button, use your computer’s date and time.
  • Page 16: Setup > Image

    Advanced Configuration with the Web-based Utility Chapter 3 and the fields that accompany them are described in Shared Key Enter the shared key of 8 to 63 • detail below. characters that will be used to access the wireless network. isable •...
  • Page 17: Setup > Administration

    Advanced Configuration with the Web-based Utility Chapter 3 Options Max Frame Rate Select the maximum frame rate for the camera. Reducing this lowers the amount of bandwidth Enable Microphone Select this to enable audio. Using required by the camera. The range is from 1 to 30. Audio increases the bandwidth requirements slightly.
  • Page 18: Setup > Users

    Advanced Configuration with the Web-based Utility Chapter 3 Firmware Upgrade Editing the Database To add a user to the database: Upgrade Firmware New firmware versions are posted at www.linksysbycisco.com and can be downloaded for 1. Enter the user’s name in the User Name field. free.
  • Page 19 Advanced Configuration with the Web-based Utility Chapter 3 Domain Name Enter the domain name assigned to you or using a mobile phone that supports RTSP. To do this, by your DDNS service provider. first configure the RTSP/RTP settings in this section as needed, then open the multimedia player, then point E-Mail Address Enter the E-mail address used to register...
  • Page 20: Setup > Motion Detection

    Advanced Configuration with the Web-based Utility Chapter 3 Audio Port To change the Audio Port, enter the new Post-Capture Length Select how many seconds’ worth port number (even values only, from 1024 to 65534) in of video will be saved starting from the moment motion the field provided.
  • Page 21: Setup > Recording

    Advanced Configuration with the Web-based Utility Chapter 3 Set Sensitivity Area Trigger Motion Detection Specify how often this trigger event occurs: Every day, Weekdays (Mon - Fri), or on Set Sensitivity Area If you want to specify the sensitivity specific days of the week (Sunday to Saturday). area settings for motion detection, click this button to Start Time and End Time Specify the start and end times...
  • Page 22: Setup > Status

    Advanced Configuration with the Web-based Utility Chapter 3 Setup > Status Browse Click Browse to select the Samba server where your video files will be saved. Browse to the location where you wish to save your video files and click Apply. The Setup >...
  • Page 23: Help

    Advanced Configuration with the Web-based Utility Chapter 3 System Log This shows the Camera’s activities. To empty the log, click Clear Log. To get the Camera’s most up-to-date information, click Refresh. To get additional information about the screen’s features, click Help. Help Through the Help screen, you’ll find links to additional resources for the Camera and its Utility.
  • Page 24: Appendix A: Troubleshooting

    Troubleshooting Appendix A Appendix A: The next time you click View Video from the web • browser, you will be prompted to re-install the Troubleshooting OCX plug-in. When powering on the Camera, I can’t immediately This appendix consists of two parts: “Common Problems access the Camera from my computer.
  • Page 25: Frequently Asked Questions

    Troubleshooting Appendix A Frequently Asked Questions entered in the database. See “Chapter 4: Advanced Configuration with the Web-based Utility. ” Can I view video using a Macintosh or Netscape Can I add a time stamp to the video? Navigator? Yes. Access the Camera’s Web-based Utility, and The Camera is designed for computers running a click the Setup tab.
  • Page 26 Troubleshooting Appendix A What IEEE 802.11g features are supported? The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming Automatic Rate Selection • • RTS/CTS feature • Fragmentation • Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to...
  • Page 27: Appendix B: Wireless Security Checklist

    Wireless Security Checklist Appendix B Appendix B: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
  • Page 28: Appendix C: Specifications

    3.54” x 4.72” x 1.46” Specifications (90 x 120 x 37 mm) Weight 4.59 oz (130 g) Specifications Power 5V, 1A Model WVC80N Certification FCC, UL/cUL, ICES-003, Standards IEEE 802.3u, 802.11g, RSS210 802.11b, draft 802.11n Operating Temp. 32 to 95°F (0 to 35°C)
  • Page 29: Appendix D: Common Gateway Interface (Cgi) Commands

    CGI (Common Gateway Interface) is a simple method to send or receive data from a program or application through a web interface. The WVC80N supports a multitude of CGI commands that can be passed to it via HTTP from your client PC or mobile phone.
  • Page 30 CGI Commands Appendix D Snapshot Method: URL: http://<ip>/img/snapshot.cgi?[size=<value>][&quality=<value>] Parameter Value and description Image resolution 1: 160x120 size 2: 320x240 3: 640x480 Quality level 1: Very high 2: High quality 3: Normal 4: Low 5: Very low Snapshot (continued) Example 1: To snapshot a 640x480 very high quality JPEG image from network Camera 192.168.0.99, http://192.168.0.99/img/snapshot.cgi?size=3&quality=1 Example 2: To snapshot a JPEG image from network Camera 192.168.0.99 (with current resolution and quality), http://192.168.0.99/img/snapshot.cgi...
  • Page 31 CGI Commands Appendix D If the client player is the QuickTime player, the latency is always approximately 3 second. If there is no audio content in the streaming, you can use the extension parameter “[?|&]latency=no” to push the QuickTime player to play the streaming video without any latency, but this method causes the frame rate to be unstable. Example: rtsp://<ip>/img/video.sav?latency=no Note that the camera is able to support the following four RTP protocols, but the user needs to specify the desired RTP protocol in the player.
  • Page 32 Camrea default name, example: default name Camera’s MAC address, example: 00C002123456 company_name Camera’s comany name, example: Cisco model_number Camera’s model number, example: WVC80N resolutions The resolutions camera support, valid values: [640*480,320*240,160*120] mpeg4_resolution Current MPEG-4 resolution setting, valid values: [640|320|160] mjpeg_resolution...
  • Page 33: Admin-Level Cgi Commands (Administrator Level Privilege)

    CGI Commands Appendix D Admin-Level CGI Commands (Administrator level privilege) Query FW Version Method: URL: http://<ip>/adm/sysinfo.cgi Return: The Camera returns a Web page that contains the following messages: HTTP/1.0 200 OK \r\n … content-type: text/plain\r\n \r\n Firmware Version: v1.0.00 build 01 \r\n Serial Number: SQJ00G100001\r\n Reboot Method:...
  • Page 34 CGI Commands Appendix D Parameter Value and description 1. To get all group settings group_name (The group name is not case sensitive.) 2. To get a specific setting from a group group group_name.parameter_name 3. To get the settings from multiple groups group_name&group_name...
  • Page 35 CGI Commands Appendix D Get/Set System Date and Time Method: http://<ip>/adm/date.cgi?action=<value>[&<parameter pair>…] URL: Parameter Value and description Get/Set the system date and time action get= Get the system date and time set= Set the system date and time time_zone The index value in time zone table (Read-only) year Year (2005~2037) month...
  • Page 36 CGI Commands Appendix D Upload/Download Configuration Download Configuration Content Method: URL: http://<ip>/adm/admcfg.cfg Return: HTTP/1.0 200 OK \r\n … content-type: application/configuration\r\n \r\n <configuration content encoded in Base64 format> All data in the configuration is encoded in a Base64 format. Please refer to the encoder/decoder sample codes at the end of this appendix.
  • Page 37 CGI Commands Appendix D Download Logs Method: http://<ip>/adm/log.cgi URL: Return: HTTP/1.0 200 OK \r\n … content-type: text/plain\r\n\r\n … <log data> Motion Detection Commands You can configure the motion detection sensitivity area to be either the entire screen or up to three specific areas. Each area can have its own name and threshold setting.
  • Page 38 CGI Commands Appendix D Return: All group settings or one group setting is returned as below: HTTP/1.0 200 OK\r\n … content-type: text/plain \r\n \r\n [MOTION] ← 0=Off, 1=On md_mode=[0|1] \r\n md_point=X,Y\r\n ← 0=Off, 1=On md_switch1=[0|1] \r\n ← 12 ASCII characters md_name1=Window_1 \r\n ←...
  • Page 39 CGI Commands Appendix D Parameter Value and description md_name1 Name of the motion detection area 1 ~ 4 (12 ASCII characters) md_name4 md_window1 The coordinates of motion detection window N (relative to resolution 640x480) X1, Y1, X2, Y2 md_window4 md_threshold1 The threshold of motion detection window N (0 - 255) md_threshold4...
  • Page 40 CGI Commands Appendix D SMB/CIFS Server/SharedFolder Commands SMB/CIFS Server Survey Method: URL: http://<ip>/adm/smb_survey.cgi[?parameter=value[&parameter=value...]] Parameter Value and description (Optional) The timeout in seconds of the CGI timeout The CGI will stop surveying and return the result if it times out. Valid values: 5-120 (default is 30) (Optional) This CGI will terminate survey action.
  • Page 41 CGI Commands Appendix D SMB/CIFS SharedFolder Command Method: URL: http://<ip>/adm/smb_dirctrl.cgi?server=value[&parameter=value...] Parameter Value and description server Server address (up to 64 characters) path (Optional, depends on the parameter “cmd”) The operation folder (up to 128 characters) (Optional) Valid values are: mkdir: create a new folder, given by the “path” parameter rmdir: delete a folder, given by the “path”...
  • Page 42: Base-64 Encoder/Decoder Sample Codes

    CGI Commands Appendix D Base-64 Encoder/Decoder Sample Codes // Standard BASE64 table // char keyStr[] = “ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=”; // SerComm BASE64 table char keyStr[] = “ACEGIKMOQSUWYBDFHJLNPRTVXZacegikmoqsuwybdfhjlnprtvxz0246813579=+/”; //-------------------------------------------------------------------- // Description: Encrypt the input data with the base64 // Input: char i_buf[] - input buffer // Output: char o_buf[] - output buffer...
  • Page 43 CGI Commands Appendix D else if(chr3 == (char)0) { enc4 = 64; o_buf[j++] = keyStr[enc1]; o_buf[j++] = keyStr[enc2]; o_buf[j++] = keyStr[enc3]; o_buf[j++] = keyStr[enc4]; // OK, now clean out the variables used. chr1 = chr2 = chr3 = (char)0; enc1 = enc2 = enc3 = enc4 = (char)0; } while (i <...
  • Page 44 CGI Commands Appendix D //Heres the decode part. There’s really only one way to do it. chr1 = (enc1 << 2) | (enc2 >> 4); chr2 = ((enc2 & 15) << 4) | (enc3 >> 2); chr3 = ((enc3 & 3) << 6) | enc4; o_buf[j++] = (char)chr1;...
  • Page 45: Appendix E: Warranty Information

    Warranty Information Appendix E Appendix E: Exclusions and Limitations Warranty Information This limited warranty does not apply if: (a) the product assembly seal has been removed or damaged, (b) the product has been altered or modified, except by Linksys, Limited Warranty (c) the product damage was caused by use with non- Linksys products, (d) the product has not been installed, operated, repaired, or maintained in accordance with...
  • Page 46 Warranty Information Appendix E OF SUCH DAMAGES. TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW, IN NO EVENT WILL LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. The foregoing limitations will apply even if any warranty or remedy provided under this limited warranty fails of its essential purpose.
  • Page 47: Appendix F: Regulatory Information

    Regulatory Information Appendix F Safety Notices Appendix F: Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
  • Page 48: Industry Canada Statement

    Regulatory Information Appendix F Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian The maximum performance for wireless is derived from ICES-003 and RSS210. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, Operation is subject to the following two conditions: data throughput rate, range and coverage.
  • Page 49: User Information For Consumer Products Covered By Eu Directive 2002/96/Ec On Waste Electric And Electronic Equipment (Weee)

    Regulatory Information Appendix F User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené Waste Electric and Electronic Equipment tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem.
  • Page 50 Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
  • Page 51 Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
  • Page 52 Regulatory Information Appendix F Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
  • Page 53: Appendix G: Software End User License Agreement

    If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
  • Page 54 You permitted by law notwithstanding this provision); (iii) agree that Cisco is not responsible or liable for any loss share, sell, rent, lease, or sublicense the Software or or damage of any sort incurred as the result of any such related Documentation;...
  • Page 55 Cisco product and/or Software indicates your acceptance ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. of the terms of the Cisco Privacy Policy, so please review Without limiting the foregoing, Cisco does not warrant the policy carefully and check the Web site above to that the operation of the product, software or services will review updates to it.
  • Page 56 Disclaimer of Liabilities. TO THE EXTENT NOT PROHIBITED supersedes any conflicting or additional terms contained BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL,...
  • Page 57 If this Cisco product contains open source software any problems introduced by others will not reflect on the licensed under Version 2 of the “GNU General Public...
  • Page 58 Software End User License Agreement Appendix G 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
  • Page 59 Software End User License Agreement Appendix G 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
  • Page 60 If this Cisco product contains open source software licensed with the library after making changes to the library and under Version 2.1 of the “GNU Lesser General Public recompiling it.
  • Page 61 Software End User License Agreement Appendix G Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
  • Page 62 Software End User License Agreement Appendix G (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
  • Page 63 Software End User License Agreement Appendix G a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
  • Page 64 Software End User License Agreement Appendix G 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
  • Page 65 (tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Cisco product contains open source OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND software licensed under the OpenSSL license then the...
  • Page 66 Software End User License Agreement Appendix G 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...

Table of Contents