Product Overview Chapter 1 Chapter 1: WARNING: Resetting the Camera will erase all of your settings, such as encryption information, Product Overview and replace them with the factory defaults. Do not reset the Camera if you want to retain your settings.
Installing and Using the Camera Utility Chapter 2 Chapter 2: 4. The Choose Destination screen appears. Click Browse and choose the folder where you would like the Utility Installing and Using the installed. Click Next. Camera Utility Overview This chapter will instruct you on how to install and use the Camera Utility.
Double-click the icon on your desktop • Right-click the icon in the system tray, then click • Linksys by Cisco Wireless-N Internet Home Monitoring Camera. Desktop Icon System Tray Icon When you are finished using the Camera Utility, close the Utility window by clicking the X button in the upper-right corner.
Page 8
Installing and Using the Camera Utility Chapter 2 Multiple-Camera Layouts Viewing Area The viewing area takes up most of the LiveView window. In a multiple-Camera layout, one of the video windows The viewing area can have four different layouts, with is always outlined in green.
Microphone This feature is not available on the WVC80N. Quality Move the slider to the left to decrease the video quality or to the right to increase the video quality.**...
Installing and Using the Camera Utility Chapter 2 Video Playback The controls and their functions are described below. The section at the bottom of the View Recordings window Control Function is used to locate video for playback. Play/Pause Click this button to toggle the video between play and pause.
Page 11
Installing and Using the Camera Utility Chapter 2 Setup > Recording Options My Camera List The My camera list section of the Setup > Cameras screen Click on the Recording Options tab to set the recording contains a list of all Cameras that have been added (up to schedule for a network Camera.
Page 12
Installing and Using the Camera Utility Chapter 2 Instant Recording Time Limit To delete a scheduled recording, check the box to the left of the recording, and click Delete. To delete all scheduled Maximum Time Limit for Instant Recording This is the recordings, check the box in the upper left corner of the maximum length of a recording started by clicking the table and click Delete.
Advanced Configuration with the Web-based Utility Chapter 3 Chapter 3: Help – Select this tab to display the Help screen. Go to • the “Help” section for more information. Advanced Configuration • Exit – Select this tab to close the Utility. with the Web-based Utility View Video Follow these instructions to view the Camera’s video.
Page 14
Advanced Configuration with the Web-based Utility Chapter 3 Resolution (cycles through 1x, 2x, and 4x). Position the cursor over the part of the image you want to magnify and click once. Use the Resolution drop-down menu to select the display Snapshot resolution.
Advanced Configuration with the Web-based Utility Chapter 3 Video Format Current Date/Time This displays the Camera’s current • date and time. If it is incorrect, click Sync with PC to To select the video format, click the Video Format button, use your computer’s date and time.
Advanced Configuration with the Web-based Utility Chapter 3 and the fields that accompany them are described in Shared Key Enter the shared key of 8 to 63 • detail below. characters that will be used to access the wireless network. isable •...
Advanced Configuration with the Web-based Utility Chapter 3 Options Max Frame Rate Select the maximum frame rate for the camera. Reducing this lowers the amount of bandwidth Enable Microphone Select this to enable audio. Using required by the camera. The range is from 1 to 30. Audio increases the bandwidth requirements slightly.
Advanced Configuration with the Web-based Utility Chapter 3 Firmware Upgrade Editing the Database To add a user to the database: Upgrade Firmware New firmware versions are posted at www.linksysbycisco.com and can be downloaded for 1. Enter the user’s name in the User Name field. free.
Page 19
Advanced Configuration with the Web-based Utility Chapter 3 Domain Name Enter the domain name assigned to you or using a mobile phone that supports RTSP. To do this, by your DDNS service provider. first configure the RTSP/RTP settings in this section as needed, then open the multimedia player, then point E-Mail Address Enter the E-mail address used to register...
Advanced Configuration with the Web-based Utility Chapter 3 Audio Port To change the Audio Port, enter the new Post-Capture Length Select how many seconds’ worth port number (even values only, from 1024 to 65534) in of video will be saved starting from the moment motion the field provided.
Advanced Configuration with the Web-based Utility Chapter 3 Set Sensitivity Area Trigger Motion Detection Specify how often this trigger event occurs: Every day, Weekdays (Mon - Fri), or on Set Sensitivity Area If you want to specify the sensitivity specific days of the week (Sunday to Saturday). area settings for motion detection, click this button to Start Time and End Time Specify the start and end times...
Advanced Configuration with the Web-based Utility Chapter 3 Setup > Status Browse Click Browse to select the Samba server where your video files will be saved. Browse to the location where you wish to save your video files and click Apply. The Setup >...
Advanced Configuration with the Web-based Utility Chapter 3 System Log This shows the Camera’s activities. To empty the log, click Clear Log. To get the Camera’s most up-to-date information, click Refresh. To get additional information about the screen’s features, click Help. Help Through the Help screen, you’ll find links to additional resources for the Camera and its Utility.
Troubleshooting Appendix A Appendix A: The next time you click View Video from the web • browser, you will be prompted to re-install the Troubleshooting OCX plug-in. When powering on the Camera, I can’t immediately This appendix consists of two parts: “Common Problems access the Camera from my computer.
Troubleshooting Appendix A Frequently Asked Questions entered in the database. See “Chapter 4: Advanced Configuration with the Web-based Utility. ” Can I view video using a Macintosh or Netscape Can I add a time stamp to the video? Navigator? Yes. Access the Camera’s Web-based Utility, and The Camera is designed for computers running a click the Setup tab.
Page 26
Troubleshooting Appendix A What IEEE 802.11g features are supported? The product supports the following IEEE 802.11g functions: • CSMA/CA plus Acknowledge protocol • OFDM protocol • Multi-Channel Roaming Automatic Rate Selection • • RTS/CTS feature • Fragmentation • Power Management What is ad-hoc mode? When a wireless network is set to ad-hoc mode, the wireless-equipped computers are configured to...
Wireless Security Checklist Appendix B Appendix B: 4. Enable encryption Wireless Security Checklist Encryption protects data transmitted over a wireless network. Wi-Fi Protected Access (WPA/WPA2) and Wired Wireless networks are convenient and easy to install, so Equivalent Privacy (WEP) offer different levels of security homes with high-speed Internet access are adopting them for wireless communication.
3.54” x 4.72” x 1.46” Specifications (90 x 120 x 37 mm) Weight 4.59 oz (130 g) Specifications Power 5V, 1A Model WVC80N Certification FCC, UL/cUL, ICES-003, Standards IEEE 802.3u, 802.11g, RSS210 802.11b, draft 802.11n Operating Temp. 32 to 95°F (0 to 35°C)
CGI (Common Gateway Interface) is a simple method to send or receive data from a program or application through a web interface. The WVC80N supports a multitude of CGI commands that can be passed to it via HTTP from your client PC or mobile phone.
Page 30
CGI Commands Appendix D Snapshot Method: URL: http://<ip>/img/snapshot.cgi?[size=<value>][&quality=<value>] Parameter Value and description Image resolution 1: 160x120 size 2: 320x240 3: 640x480 Quality level 1: Very high 2: High quality 3: Normal 4: Low 5: Very low Snapshot (continued) Example 1: To snapshot a 640x480 very high quality JPEG image from network Camera 192.168.0.99, http://192.168.0.99/img/snapshot.cgi?size=3&quality=1 Example 2: To snapshot a JPEG image from network Camera 192.168.0.99 (with current resolution and quality), http://192.168.0.99/img/snapshot.cgi...
Page 31
CGI Commands Appendix D If the client player is the QuickTime player, the latency is always approximately 3 second. If there is no audio content in the streaming, you can use the extension parameter “[?|&]latency=no” to push the QuickTime player to play the streaming video without any latency, but this method causes the frame rate to be unstable. Example: rtsp://<ip>/img/video.sav?latency=no Note that the camera is able to support the following four RTP protocols, but the user needs to specify the desired RTP protocol in the player.
Page 32
Camrea default name, example: default name Camera’s MAC address, example: 00C002123456 company_name Camera’s comany name, example: Cisco model_number Camera’s model number, example: WVC80N resolutions The resolutions camera support, valid values: [640*480,320*240,160*120] mpeg4_resolution Current MPEG-4 resolution setting, valid values: [640|320|160] mjpeg_resolution...
CGI Commands Appendix D Admin-Level CGI Commands (Administrator level privilege) Query FW Version Method: URL: http://<ip>/adm/sysinfo.cgi Return: The Camera returns a Web page that contains the following messages: HTTP/1.0 200 OK \r\n … content-type: text/plain\r\n \r\n Firmware Version: v1.0.00 build 01 \r\n Serial Number: SQJ00G100001\r\n Reboot Method:...
Page 34
CGI Commands Appendix D Parameter Value and description 1. To get all group settings group_name (The group name is not case sensitive.) 2. To get a specific setting from a group group group_name.parameter_name 3. To get the settings from multiple groups group_name&group_name...
Page 35
CGI Commands Appendix D Get/Set System Date and Time Method: http://<ip>/adm/date.cgi?action=<value>[&<parameter pair>…] URL: Parameter Value and description Get/Set the system date and time action get= Get the system date and time set= Set the system date and time time_zone The index value in time zone table (Read-only) year Year (2005~2037) month...
Page 36
CGI Commands Appendix D Upload/Download Configuration Download Configuration Content Method: URL: http://<ip>/adm/admcfg.cfg Return: HTTP/1.0 200 OK \r\n … content-type: application/configuration\r\n \r\n <configuration content encoded in Base64 format> All data in the configuration is encoded in a Base64 format. Please refer to the encoder/decoder sample codes at the end of this appendix.
Page 37
CGI Commands Appendix D Download Logs Method: http://<ip>/adm/log.cgi URL: Return: HTTP/1.0 200 OK \r\n … content-type: text/plain\r\n\r\n … <log data> Motion Detection Commands You can configure the motion detection sensitivity area to be either the entire screen or up to three specific areas. Each area can have its own name and threshold setting.
Page 38
CGI Commands Appendix D Return: All group settings or one group setting is returned as below: HTTP/1.0 200 OK\r\n … content-type: text/plain \r\n \r\n [MOTION] ← 0=Off, 1=On md_mode=[0|1] \r\n md_point=X,Y\r\n ← 0=Off, 1=On md_switch1=[0|1] \r\n ← 12 ASCII characters md_name1=Window_1 \r\n ←...
Page 39
CGI Commands Appendix D Parameter Value and description md_name1 Name of the motion detection area 1 ~ 4 (12 ASCII characters) md_name4 md_window1 The coordinates of motion detection window N (relative to resolution 640x480) X1, Y1, X2, Y2 md_window4 md_threshold1 The threshold of motion detection window N (0 - 255) md_threshold4...
Page 40
CGI Commands Appendix D SMB/CIFS Server/SharedFolder Commands SMB/CIFS Server Survey Method: URL: http://<ip>/adm/smb_survey.cgi[?parameter=value[¶meter=value...]] Parameter Value and description (Optional) The timeout in seconds of the CGI timeout The CGI will stop surveying and return the result if it times out. Valid values: 5-120 (default is 30) (Optional) This CGI will terminate survey action.
Page 41
CGI Commands Appendix D SMB/CIFS SharedFolder Command Method: URL: http://<ip>/adm/smb_dirctrl.cgi?server=value[¶meter=value...] Parameter Value and description server Server address (up to 64 characters) path (Optional, depends on the parameter “cmd”) The operation folder (up to 128 characters) (Optional) Valid values are: mkdir: create a new folder, given by the “path” parameter rmdir: delete a folder, given by the “path”...
Warranty Information Appendix E Appendix E: Exclusions and Limitations Warranty Information This limited warranty does not apply if: (a) the product assembly seal has been removed or damaged, (b) the product has been altered or modified, except by Linksys, Limited Warranty (c) the product damage was caused by use with non- Linksys products, (d) the product has not been installed, operated, repaired, or maintained in accordance with...
Page 46
Warranty Information Appendix E OF SUCH DAMAGES. TO THE EXTENT NOT PROHIBITED BY APPLICABLE LAW, IN NO EVENT WILL LINKSYS’ LIABILITY EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. The foregoing limitations will apply even if any warranty or remedy provided under this limited warranty fails of its essential purpose.
Regulatory Information Appendix F Safety Notices Appendix F: Regulatory Information WARNING: Do not use this product near water, for example, in a wet basement or near a swimming pool. FCC Statement This device complies with Part 15 of the FCC Rules. WARNING: Avoid using this product during an Operation is subject to the following two conditions: (1)
Regulatory Information Appendix F Industry Canada Statement Wireless Disclaimer This Class B digital apparatus complies with Canadian The maximum performance for wireless is derived from ICES-003 and RSS210. IEEE Standard 802.11 specifications. Actual performance can vary, including lower wireless network capacity, Operation is subject to the following two conditions: data throughput rate, range and coverage.
Regulatory Information Appendix F User Information for Consumer Products Čeština (Czech) - Informace o ochraně životního prostředí pro zákazníky v zemích Evropské unie Covered by EU Directive 2002/96/EC on Evropská směrnice 2002/96/ES zakazuje, aby zařízení označené Waste Electric and Electronic Equipment tímto symbolem na produktu anebo na obalu bylo likvidováno s netříděným komunálním odpadem.
Page 50
Regulatory Information Appendix F Eesti (Estonian) - Keskkonnaalane informatsioon Français (French) - Informations environnementales Euroopa Liidus asuvatele klientidele pour les clients de l’Union européenne Euroopa Liidu direktiivi 2002/96/EÜ nõuete kohaselt on La directive européenne 2002/96/CE exige que l’équipement seadmeid, millel on tootel või pakendil käesolev sümbol sur lequel est apposé...
Page 51
Regulatory Information Appendix F Lietuvškai (Lithuanian) - Aplinkosaugos informacija, Nederlands (Dutch) - Milieu-informatie voor klanten skirta Europos Sąjungos vartotojams in de Europese Unie Europos direktyva 2002/96/EC numato, kad įrangos, kuri ir De Europese Richtlijn 2002/96/EC schrijft voor dat apparatuur die kurios pakuotė...
Page 52
Regulatory Information Appendix F Português (Portuguese) - Informação ambiental para Slovenščina (Slovene) - Okoljske informacije za stranke clientes da União Europeia v Evropski uniji A Directiva Europeia 2002/96/CE exige que o equipamento Evropska direktiva 2002/96/ES prepoveduje odlaganje opreme s que exibe este símbolo no produto e/ou na sua embalagem tem simbolom –...
If you would like a copy of the GPL or certain to a person or entity to which you transfer ownership of other open source code in this Software on a CD, Cisco will the complete Cisco product containing the Software or mail to you a CD with such code for $9.99 plus the cost of...
Page 54
You permitted by law notwithstanding this provision); (iii) agree that Cisco is not responsible or liable for any loss share, sell, rent, lease, or sublicense the Software or or damage of any sort incurred as the result of any such related Documentation;...
Page 55
Cisco product and/or Software indicates your acceptance ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND. of the terms of the Cisco Privacy Policy, so please review Without limiting the foregoing, Cisco does not warrant the policy carefully and check the Web site above to that the operation of the product, software or services will review updates to it.
Page 56
Disclaimer of Liabilities. TO THE EXTENT NOT PROHIBITED supersedes any conflicting or additional terms contained BY APPLICABLE LAW, IN NO EVENT WILL CISCO BE LIABLE in any purchase order or elsewhere. FOR ANY LOST DATA, REVENUE OR PROFIT, OR FOR SPECIAL,...
Page 57
If this Cisco product contains open source software any problems introduced by others will not reflect on the licensed under Version 2 of the “GNU General Public...
Page 58
Software End User License Agreement Appendix G 1. You may copy and distribute verbatim copies of the distribution of derivative or collective works based on Program’s source code as you receive it, in any medium, the Program. provided that you conspicuously and appropriately In addition, mere aggregation of another work not publish on each copy an appropriate copyright notice based on the Program with the Program (or with a...
Page 59
Software End User License Agreement Appendix G 4. You may not copy, modify, sublicense, or distribute on consistent application of that system; it is up to the Program except as expressly provided under the author/donor to decide if he or she is willing to this License.
Page 60
If this Cisco product contains open source software licensed with the library after making changes to the library and under Version 2.1 of the “GNU Lesser General Public recompiling it.
Page 61
Software End User License Agreement Appendix G Public License permits more lax criteria for linking other either verbatim or with modifications and/or translated code with the library. straightforwardly into another language. (Hereinafter, translation is included without limitation in the term We call this license the “Lesser”...
Page 62
Software End User License Agreement Appendix G (For example, a function in a library to compute square If distribution of object code is made by offering roots has a purpose that is entirely well-defined access to copy from a designated place, then offering independent of the application.
Page 63
Software End User License Agreement Appendix G a) Accompany work with complete 7. You may place library facilities that are a work based corresponding machine-readable source code on the Library side-by-side in a single library together for the Library including whatever changes were with other library facilities not covered by this License, used in the work (which must be distributed and distribute such a combined library, provided that...
Page 64
Software End User License Agreement Appendix G 11. If, as a consequence of a court judgment or allegation license version number, you may choose any version of patent infringement or for any other reason (not ever published by the Free Software Foundation. limited to patent issues), conditions are imposed on 14.
Page 65
(tjh@cryptsoft.com). BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; In addition, if this Cisco product contains open source OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND software licensed under the OpenSSL license then the...
Page 66
Software End User License Agreement Appendix G 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: “This product includes cryptographic software written...