EWS Series - EnGenius Networks Europe BV

1
Table of Contents
Chapter 1 Product Overview .................................................................................................................................................... 6
Key Features ............................................................................................................................................................................................ 7
Introduction .............................................................................................................................................................................................. 8
System Requirements ............................................................................................................................................................................. 10
Package Contents ................................................................................................................................................................................... 10
Applications ............................................................................................................................................................................................11
Technical Specifications ........................................................................................................................................................................ 12
Physical Interface ................................................................................................................................................................................... 13
Chapter 2 Before You Begin ................................................................................................................................................... 15
Considerations for Wireless Installation ................................................................................................................................................ 16
Computer Settings .................................................................................................................................................................................. 17
Hardware Installation ............................................................................................................................................................................. 21
Mounting the Access Point .................................................................................................................................................................... 22
Chapter 3 Configuring Your Access Point ............................................................................................................................. 25
Default Settings ...................................................................................................................................................................................... 26
Web Configuration ................................................................................................................................................................................. 27
Chapter 4 User Interface ......................................................................................................................................................... 31
Navigation Panel..................................................................................................................................................................................... 32
Live View Management .......................................................................................................................................................................... 35
Chapter 5 Access Point Settings ............................................................................................................................................ 38
Device Status .......................................................................................................................................................................................... 39
Connections ............................................................................................................................................................................................ 42
Realtime ................................................................................................................................................................................................. 43
Chapter 6 Network ................................................................................................................................................................... 45
IPv4 Settings .......................................................................................................................................................................................... 47
2
Spanning Tree Settings........................................................................................................................................................................... 49
Chapter 7 Wireless ................................................................................................................................................................... 51
System Properties ................................................................................................................................................................................... 52
Operation mode ...................................................................................................................................................................................... 53
2.4GHz/5GHz SSID Profile ................................................................................................................................................................... 56
Wireless Security ................................................................................................................................................................................... 58
Wireless MAC Filter .............................................................................................................................................................................. 61
Traffic Shaping ....................................................................................................................................................................................... 62
Fast Roaming ......................................................................................................................................................................................... 63
WDS Link Settings ................................................................................................................................................................................ 64
Guest Network ....................................................................................................................................................................................... 66
RSSI Threshold ...................................................................................................................................................................................... 68
Management VLAN Settings ................................................................................................................................................................. 69
Chapter 8 DDNS ........................................................................................................................................................................ 70
Chapter 9 UPnP ........................................................................................................................................................................ 74
Chapter 10 Service Port .......................................................................................................................................................... 76
Chapter 11 Mesh ...................................................................................................................................................................... 78
Status ...................................................................................................................................................................................................... 79
Settings ................................................................................................................................................................................................... 80
Tools ....................................................................................................................................................................................................... 81
Node List ................................................................................................................................................................................................ 81
Link Status ............................................................................................................................................................................................. 83
Ping ........................................................................................................................................................................................................ 83
Trace Route ............................................................................................................................................................................................ 84
Throughput ............................................................................................................................................................................................. 84
Chapter 12 Management......................................................................................................................................................... 85
Controller Settings ................................................................................................................................................................................. 86
3
SNMP Settings ....................................................................................................................................................................................... 86
CLI/SSH Settings ................................................................................................................................................................................... 89
HTTPS Settings...................................................................................................................................................................................... 90
Email Alert ............................................................................................................................................................................................. 91
Date and Time Settings .......................................................................................................................................................................... 92
WiFi Scheduler....................................................................................................................................................................................... 94
Tools ....................................................................................................................................................................................................... 96
LED Control ......................................................................................................................................................................................... 100
Device Discovery ................................................................................................................................................................................. 101
Chapter 13 System Manager ............................................................................................................................................... 102
Account Setting .................................................................................................................................................................................... 103
Firmware Upgrade ............................................................................................................................................................................... 105
Backup/Restore .................................................................................................................................................................................... 106
Reset/Reboot ........................................................................................................................................................................................ 108
System Log .......................................................................................................................................................................................... 108
Chapter 14 Camera OverView ............................................................................................................................................. 110
Camera Status .......................................................................................................................................................................................111
PC Storage Path ....................................................................................................................................................................................112
Chapter 15 Media .................................................................................................................................................................. 113
Video .....................................................................................................................................................................................................114
Camera ..................................................................................................................................................................................................115
Advance ............................................................................................................................................................................................... 121
Privacy Mask........................................................................................................................................................................................ 124
Audio .................................................................................................................................................................................................... 125
Chapter 16 Event Management .......................................................................................................................................... 126
Event Control ....................................................................................................................................................................................... 127
Motion Detection ................................................................................................................................................................................. 130
4
Audio Detection ................................................................................................................................................................................... 133
Tampering Detection ............................................................................................................................................................................ 134
Event Action ......................................................................................................................................................................................... 135
Chapter 17 Event Server ...................................................................................................................................................... 137
Network Storage .................................................................................................................................................................................. 138
FTP(File Transfer Protocol) ................................................................................................................................................................. 141
E-Mail .................................................................................................................................................................................................. 142
Chapter 17 Storage Info ....................................................................................................................................................... 143
Storage Info .......................................................................................................................................................................................... 144
Appendix ................................................................................................................................................................................... 146
Appendix A - FCC Interference Statement .......................................................................................................................................... 147
Appendix B - CE Interference Statement............................................................................................................................................. 149
5
Chapter 1
Product Overview
6
Introduction
Key Features
 Deploy and manage with ease using EWS Series Wireless Management Switches.
 Advance Access Point mode with mesh network support.
 Dual Concurrent 2.4GHz and 5GHz architecture with max transfer rates of up to 300+867 Mbps.
 Internal 5dBi Omni-Directional MIMO antennas optimized for maximum RF performance.
 Backward compatible with IEEE802.11a/b/g/n wireless devices.
 Integrated Power over Ethernet (IEEE802.3af) for lowering deploying costs. Can be powered using either the included power
adapter or via PoE with PoE 802.3af capable Switches or Injectors.
 Band Steering to load balance clients between 2.4GHz and 5 GHz for better throughput performance.
 Secure Guest Network option available.
 Stylish low profile design with easy ceiling mounting kit.
 Full HD Sony CMOS image sensor delivers 30fps in 1080P resolution.
 Provide true day/night functionality with 20 meter IR LEDs illuminator and IR cut filter.
 H.264 high compression video with VLAN and prioritizing QoS for delivering easily.
 EnGenius DDNS, P2P and Push Notification.
 Free iOS & Android APP for view / record.
 Free bundle Video Management Software.
 ONVIF compatible (Profile S).
7
Introduction
EnGenius Indoor Mesh Access Point Camera is a new concept of dual band concurrent, high power, high sensitivity and strong reliability
for enterprise solutions. Easy setup and installation for combination of two products – Access point and IP camera, one PoE or DC power
solve the power input, and single UI interface for all configurations. To integrate the hotspot service and surveillance, EWS1025CAM not
only wireless mesh access point extends wireless access over large, metro scale areas, eliminates costly Ethernet cabling to every Wi-Fi
access point, but also provides high resolution video streaming for security. It can be easily deployed and maintained with no
configuration deployment and recovery capacity. Extended signal range from high-gain antenna arrays reduce the number of mesh
nodes typically required. The EWS1025CAM is a component of the EWS Neutron Series Switches, delivering a robust wireless network
with maximum capacity and uptime, the wireless mesh can be seamlessly deployed as an extension of wired and wireless networks,
with central management through controllers. No IT experts required for installation, system automatically determines the optimal
network topology and maintains the best connections between mesh nodes. The centralize functions of the wireless LAN to provide
scalable management, advanced security, seamless mobility, and proven reliability.
This device is an enhanced-powered, long-range wireless access point. It is designed to operate in numerous environments; from large
homes, small and medium-sized businesses, multiple-floor offices, hotels, and other venues, to larger enterprise deployments. Its
enhanced-powered, long-range characteristics make it a cost-effective alternative to ordinary Access Points that don’t have the range
and reach to connect to a growing number of wireless users who wish to connect to a large hotspot or business network.
To protect sensitive data during wireless transmissions, the device offers different encryption settings for wireless transmissions,
including industry standard WPA and WPA2 encryption. The device also includes MAC address filtering to allow network
administrators to offer network access only to known computers and other devices based on their MAC addresses.
8
9
System Requirements
The following are the Minimum System Requirements in order to configure the device:
 Computer with an Ethernet interface or wireless network capability
 Windows OS (XP, Vista, 7, 10), Mac OS, or Linux-based operating systems
 Web-Browsing Application (i.e. : Internet Explorer, Firefox, Safari, or another similar browser application)
Package Contents
The package contains the following items (all items must be in package to issue a refund):
 EWS1025CAM Managed Indoor Mesh Camera
 Power Adapter
 RJ-45 Ethernet Cable
 Quick Installation Guide
 Mounting Bracket
 Mount Screw kit
10
Applications
Wireless LAN (WLAN) products are easy to install and highly efficient. The following list describes some of the many applications
made possible through the power and flexibility of WLANs:
 Difficult-to-Wire Environments: There are many situations where wires cannot be installed, deployed easily, or cannot be
hidden from view. Older buildings, sites with multiple buildings, and/or areas that make the installation of a Ethernet-based
LAN impossible, impractical or expensive are sites where WLAN can be a network solution.
 Temporary Workgroups: Create temporary workgroups/networks in more open areas within a building; auditoriums,
amphitheaters classrooms, ballrooms, arenas, exhibition centers, or temporary offices where one wants either a permanent or
temporary Wireless LAN established.
 The Ability to Access Real-Time Information: Doctors/Nurses, Point-of-Sale Employees, and/or Warehouse Workers can access
real-time information while dealing with patients, serving customers, and/or processing information.
 Frequently Changing Environments: Set up networks in environments that change frequently (i.e.: Show Rooms, Exhibits, etc.).
 Small Office and Home Office (SOHO) Networks: SOHO users require a cost-effective, easy, and quick installation of a small
network.
 Training/Educational Facilities: Training sites at corporations or students at universities use wireless connectivity to exchange
information between peers and easily access information for learning purposes.
11
Technical Specifications
EWS1025CAM
Standard
2.4GHz
IEEE802.11b/g/n
5GHz
IEEE802.11a/n/ac
Antennas
4 x Internal 5dBi Omni-Directional
Image Sensor
Sony 2Megapixel 1920 x1080 Progressive Scan COMS sensor
Lens
Fixed Board Lens, f =2.8mm/F2.0, F.O.V=120 Degree(Diagonal)
IR illuminator
Interface
20 Meter Range
1 x 10/100/1000 Gigabit Ethernet Port
1 x Reset Button
1 x Power Connector
1 x Micro SDXC card slot
LED Indicator
5GHz, 2.4GHz, Power, LAN, Mesh
PoE Support
IEEE802.3af
External Power Adapter
DC IN, 12V/1.5A
Power Requirement
Environment
Operating:
Temperature: 32°F to 122°F (0°C to 50°C)
Humidity (Non-condensing): 90% or less
Storage:
Temperature: -4°F to 140°F (-20°C to 60°C)
Humidity (Non-condensing): 90% or less
Dimensions
5.24 x 3.82 in./134 x 97mm
Weight
1.05lbs/478g
12
Physical Interface
5
1
2
4
6
3
7
9
8
1. LAN Port (802.3af PoE): Ethernet port for RJ-45 cable.
2. Power Connector: 12V DC IN for Power Adapter.
3. Ceiling Mount Hole: Using the provided mounting kit, the Access Point can be attached to a ceiling or wall.
4. Micro SD card slot: Supported SDXC card for local storage.
5. Reset Button: Press and hold for over 10 seconds to reset to factory default settings.
6. LED Indicators: LED lights for Mesh, WLAN 5GHz, WLAN 2.4GHz, LAN, and Power.
7. Lens: 2 Megapixel wind angle fixed board lens.
8. Built-in Microphone: One way audio for recording.
13
9. IR illuminator: 20 meter infrared for low lux environment.
14
Chapter 2
Before You Begin
15
Before You Begin
This section will guide you through the installation process. Placement of the EnGenius Access Point is essential to maximize the
Access Point’s performance. Avoid placing the Access Point in an enclosed space such as a closet, cabinet, or stairwell.
Considerations for Wireless Installation
The operating distance of all wireless devices can often not be pre-determined due to a number of unknown obstacles in
the environment in which the device is deployed. Obstacles such as the number, thickness, and location of walls, ceilings,
or other objects that the Access Point’s wireless signals must pass through can weaken the signal. Here are some key
guidelines for allowing the Access Point to have an optimal wireless range during setup.
 Keep the number of walls and/or ceilings between the Access Point and other network devices to a minimum. Each wall and/or
ceiling can reduce the signal strength, resulting in a lower overall signal strength.
 Building materials make a difference. A solid metal door and/or aluminum stubs may have a significant negative effect on the
signal strength of the Access Point. Locate your wireless devices carefully so the signal can pass through drywall and/or open
doorways. Materials such as glass, steel, metal, concrete, water (example: fish tanks), mirrors, file cabinets, and/or brick can
also diminish wireless signal strength.
 Interference from your other electrical devices and/or appliances that generate RF noise can also diminish the Access Point’s
signal strength. The most common types of devices are microwaves or cordless phones.
16
Computer Settings
Windows XP/Windows 7
In order to use the Access Point, you must first configure the TCP/IPv4 connection of your Windows OS computer system.
1. Click the Start button and open the Control Panel.
Windows XP
Windows 7
2a. In Windows XP, click on Network Connections.
17
2b. In Windows 7, click View network status and tasks in the Network and Internet section, then select Change adapter
settings.
3. Right click on Local Area Connection and select Properties.
4. Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
18
5. Select Use the following IP address and enter an IP address that is different from the
Access Point and Subnet mask, then click OK.
Note: Ensure that the IP address and Subnet mask are on the same subnet as the
device.
For example: EWS1025CAM IP address: 192.168.1.1
PC IP address: 192.168.1.2 – 192.168.1.255
PC Subnet mask: 255.255.255.0
19
Apple Mac OS X
1. Go to System Preferences (it can be opened in the Applications folder or by selecting it in the Apple Menu).
2. Select Network in the Internet & Network section.
3. Highlight Ethernet.
4. In Configure IPv4, select Manually.
5. Enter an IP address that is different from the Access Point and
Subnet mask, then click OK.
Note: Ensure that the IP address and Subnet mask are on the same
subnet as the device.
For example: EWS1025CAM IP address: 192.168.1.1
PC IP address: 192.168.1.2 – 192.168.1.255
PC Subnet mask: 255.255.255.0
6. Click Apply when finished.
20
Hardware Installation
1. Ensure that the computer in use has an Ethernet Controller port (RJ-45 Ethernet Port). For more information, verify with your
computer’s user manual.
2. Connect one end of the Category 5e Ethernet cable into the RJ-45 port of the Access Point and the other end to the RJ-45
port of the computer. Ensure that the cable is securely connected to both the Access Point and the computer.
3. Connect the Power Adapter DC connector to the DC-IN port of the Access Point and the Power Adapter to an available
electrical outlet. Once both connections are secure, verify the following:
a) Ensure that the POWER light is on (it will be orange).
b) Ensure that the 2.4 GHz/5 GHz WLAN light is on (it will be blue for 2.4G, and green for 5G).
c) Ensure that the LAN (Computer/ Access Point Connection) light is on (it will be blue).
d) Once all three lights are on, proceed to set up the Access Point using the computer.
21
Mounting the Access Point
Using the provided hardware, the Access Point can be attached to a ceiling or wall.
To attach the Access Point to a ceiling or wall using the mounting bracket:
1. Attach the mounting bracket to the wall or ceiling using the provided wall/ceiling mounting hardware kit.
2. Insert the provided short screws into the bottom cover of the Access Point.
Leave enough of the screws exposed to ensure that the unit can be attached to the mounting bracket.
If extra space is required, use the provided spacers and long screws from the T-Rail mounting hardware kit to increase the space
between the unit and the mounting bracket.
22
3. Mount the Access Point on the mounting bracket by rotating the unit clockwise about 90 degrees to secure it in place.
Attaching the Access Point to a ceiling using the provided T-Rail connectors:
1. Attach the T-Rail connectors to the bottom cover of the Access Point using the provided short screws.
Note: Two sizes of T-Rail connectors are included in the mounting hardware kit: 15/16in (2.38cm) and 9/16in (1.43cm). If extra
space is required to accommodate drop ceiling tiles, use the provided spacers and long screws.
2. Line up the connected T-Rail connectors with an appropriately sized rail and press the unit onto the rail until it snaps into
place.
23
24
Chapter 3
Configuring Your
Access Point
25
Configuring Your Access Point
This section will show you how to configure the device using the web-based configuration interface.
Default Settings
Please use your Ethernet port or wireless network adapter to connect the Access Point.
IP Address 192.168.1.1/192.168.1.1200
Username/Password admin/admin
26
Web Configuration
1. Open a web browser (Internet Explorer/Firefox/Safari) and enter the IP Address http://192.168.1.1.
Note: If you have changed the default LAN IP Address of the Access Point, ensure you enter the correct IP Address.
2. The default username and password are: admin. Once you have entered the correct username and password, click the Login
button to open the web-based configuration page.
3. For the first time of login, you will be informed to download and install “WebCMS”. Please click on “Download WebCMS“ to start
download (you will be required to have Internet connection on your router). WebCMS enables browsers to support camera
feature. Don’t worry if you are prompted with a different version number because the software upgrades from time to time.
27
If prompted with the following question, click on Save (Internet Explorer).
Save the downloaded file.
28
Once download is completed, you MUST close all the browsers before install WebCMS.
Double click on WebCMS to install the program. You may not have noticed, the installation is very fast, it only takes a few
seconds for WebCMS to be installed.
When installation is completed, open the browser and login into the camera again. You should be able to see the camera
viewer in live as shown below. If you do not see the viewer that means you did not install WebCMS properly or try login using
other browsers.
29
NOTE: If you are seeing grey color in the viewer, it is because the camera has detected insufficient of light in the room and
enabled night vision mode automatically. If you point your camera to a brighter area, you should be able to see it switched to
normal color mode. Try a few places to get a feeling on how it works. If listening closely, you may hear the click sound from the
camera when night vision is switched on and off.
4. If successful, you will be logged in and see the Access Point User Interface.
30
Chapter 4
User Interface
31
User Interface
The User Interface section contains the following options:
• Navigation Panel
• Live View Management
The following sections describe these options.
Navigation Panel
32
The Navigation Panel is located at the top-right corner of the page.
The descriptions are as follows:
Navigate to home page for device information and connection status
33
Navigate to Reboot/Reset device page
Navigate to camera live view page
Navigate to the main setting page
Navigate to the Mesh tools page
Logout
34
Live View Management
The Live View Management menu is located at the right side of the page.
There are two streams running concurrently: Stream1 (1920x1080) and Stream2 (640x360).
Stream1 has the higher resolution than stream2. Stream2 serves lower resolution for mobile devices
which has smaller screens. You can preview each stream at real time by selecting it from the list.
This opens the local folder where the real time captured images and clips are stored. You may
change the folder path at Main Menu  System  PC Storage Path
35
This switch only applies to resolution 640 x 360. When enabled, the preview image will switched to
1:1 mode. By default the image will expand and fill the view screen if the actual image is smaller
than the view.
This switch will hide the browser and expand the view to full screen. You can press ESC button to
cancel the full screen mode.
ePTZ display the digital zoom in for the region of interest, use your mouse to move the green
window at the left bottom to the area you intend to monitor.
36
This button takes a snap-shot on the real time view and store the image in the local folder.
Toggle this button to start recording movie clip at real time. Click on the button to start recording.
Please note that when icon changed to blue
icon the camera is recording. To stop
recording, simply click the button again.
Toggle this button to turn PC audio from the camera ON and OFF. The default is ON, click the
button to turn it ON; the icon should change to
37
to signify OFF state.
Chapter 5
Access Point Settings
38
Overview
The Overview section contains the following options:
• Device Status
• Connections
• Real Time
The following sections describe these options.
Device Status
Clicking the Device Status link under the Overview menu shows the status information about the current operating mode.
• The Device Information section shows general system information such as Device Name, MAC address, Current Time, Firmware
Version, and Management VLAN ID
39
• The Memory Information section shows system memory information such as used and Total available, Free, Cached and
Buffered
 The LAN Information section shows the Local Area Network settings such as the LAN IP Address, Subnet mask, Gateway,
DNS Address, DHCP Client, and STP status.
 The Wirelesss LAN Information 2.4 GHz/5GHz section shows wireless information such as Operating Mode, Frequency, and
Channel. Since the Access Point supports multiple-SSIDs, information about each SSID and security settings are displayed.
40
41

The UID/DDNS section shows each device is distributed with an exclusive unique identification (UID)/DDNS. You can find
the default UID/DDNS shown here.
Connections
Clicking the Connections link under the Overview menu displays the list of clients associated to the Access Point’s
2.4GHz/5GHz, along with the MAC address, TX, RX and signal strength for each client. Clicking Kick in the Block column removes
42
this client.
Click Refresh to refresh the Connection List page.
Realtime
Clicking the Realtime link under the Overview menu displays CPU load, Traffic and Connections
CPU Load:
3 minutes CPU loading percentage information, it displays current loading, average loading and peak loading status. Left bar is
loading percentage; button is time tracing. Interval is every 3 seconds.
43
Realtime Traffic (kb/s):
2.4GHz and 5GHz and Ethernet port inbound and outbound traffic by current, average and peak time.
Realtime Connection (Pkts):
44
Overview on current active network connections. It displays UDP and TCP packets information and other connection status. UDP
connections curve is in blue; TCP connection curve is in green; others curve is in red. Below of chart shows connections source
and destination.
Chapter 6
Network
45
46
Basic
This page allows you to modify the device’s IP settings and the Spanning Tree settings. Enabling Spanning Tree protocol will
prevent network loops in your LAN network.
IPv4 Settings
IP Network Setting: Select whether the device IP address will use the static IP address specified in the IP Address field or be
obtained automatically when the device connects to a DHCP server.
IP Address: The IP Address of this device.
IP Subnet Mask: The IP Subnet mask of this device.
Gateway: The Default Gateway of this device. Leave it blank if you are unsure of this setting.
Primary/Secondary DNS: The primary/secondary DNS address for this device.
47
48
Spanning Tree Settings
Status: Enables or disables the Spanning Tree function.
Hello Time: Specify Bridge Hello Time, in seconds. This value determines how often the device sends handshake packets to
communicate information about the topology throughout the entire Bridged Local Area Network.
Max Age: Specify Bridge Max Age, in seconds. If another bridge in the spanning tree does not send a hello packet for a long period
of time, it is assumed to be inactive.
Forward Delay: Specifies Bridge Forward Delay, in seconds. Forwarding Delay Time is the time spent in each of the Listening and
Learning states before the Forwarding state is entered. This delay is provided so that when a new bridge comes onto a busy
network, it analyzes data traffic before participating.
Priority: Specify the Priority Number. A smaller number has greater priority.
Apply: Click Apply to save the changes.
49
50
Chapter 7
Wireless
51
System Properties
Device Name: Enter a name for the device. The name you type appears in SNMP management. This name is not the SSID and is not
broadcast to other devices.
Region: Select Region to conform to local regulations.
Band Steering: Send 802.11n client to the 5GHz band, where 802.11b/g clients cannot go and leave 802.11b/g clients in 2.4GHz
to operate their slower rate. Band Steering works within the Access Point by directing 5GHz-capable clients to the band.
Note: When enable band steering function, both 2.4GHz and 5GHz SSID and security setting must be the same.
EnGenius Band Steering supports following advanced settings,
*Prefer 5GHz: When band steering is configured to Prefer 5GHz mode, the AP will steer dual band capable client devices to 5GHz
radio when the RSSI value of these client devices on 5GHz radio is more than set one. The allowed RSSI value for default setting is
-75dBm.
*Force 5GHz: When band steering is configured to Force 5GHz mode, the AP will not dual band capable client devices to network to
the 2.4GHz band only if the client devices are not currently associated on 2.4GHz radio in this AP.
*Band Balance: When band steering is configured to Band Balance mode, the AP will steer dual band capable client devices to 5GHz
when the RSSI value of these client devices on 5GHz radio is more than set one. To evenly allocate RF resource on the both 2.4GHz
and 5GHz radios, users also can set the portion of client devices on 5GHz radio to assure smoothly connection. The default value of
the 5GHz radio is 75%.
Save: Click Save to confirm the changes.
52
Operation mode
The EWS1025CAM supports five operating modes:Access Point, Client Bridge, WDS AP, WDS Bridge, and WDS Station.
2.4GHz
Access Point
Client Bridge
WDS AP
WDS Bridge
WDS Station
Access Point
●
●
●
●
●
Client Bridge
●
X
●
X
X
WDS AP
●
●
●
●
●
WDS Bridge
●
X
●
X
X
WDS Station
●
X
●
X
X
5GHz
This page displays the current status of the Wireless settings of the EWS1025CAM.
53
2.4G/5G Wireless Network (Access Point / WDS AP mode)
Wireless Mode
Wireless mode supports 802.11b/g/n mixed mode in 2.4G and 802.11ac/a/n mixed mode
in 5G.
Channel HT Mode
Scroll down this list to select bandwidth for operating under a frequency band. The default
channel bandwidth is 20 MHz on 2.4GHz frequency radio and 40 MHz on 5GHz frequency
radio. Considering the different applications, users can decide to implement a channel
bandwidth to fulfill real applications. The larger the channel, the greater the transmission
quality and speed.
54
Channel / Frequency
Select the channel and frequency appropriate.
Auto
Check this option to enable auto-channel selection.
RTS/CTS Threshold
Threshold packet size for RTC/CTS. A small number causes RTS/CTS packet to be sent
more often and consumes more bandwidth.
Client Limit
Limits the total number of clients on this radio. Once setting the ceiling of client numbers,
the maximum associated client devices will be restricted at this number.
Aggregation
Merges data packets into one packet. This option reduces the number of packets, but also
increases packet size.
AP Detection
AP Detection can select the best channel to use by scanning nearby areas for Access
Points.
Current Profile
Configure up to eight different SSIDs (four in WDS AP mode). If many client devices will be
accessing the network, you can arrange the devices into SSID groups. Click Edit to
configure the profile and check whether you want to enable extra SSID.
Save
Click Save to confirm the changes.
Note: Only support four SSID in WDS AP mode.
55
2.4GHz/5GHz SSID Profile
Under Wireless Settings, you can edit the SSID profile to fit your needs. Click Edit under the SSID you would like to make changes
to.
56
Enable: Check this option to enable this profile.
SSID: Specifies the SSID for the current profile.
Security: Displays the Security Mode the SSID uses. You can click Edit to change the security mode. For more details, see the next
section.
Hidden SSID: Check this option to hide the SSID from clients. If checked, the SSID will not appear in the site survey.
Client Isolation: Check this option to prevent communication between client devices.
VLAN Isolation: Check this option to enable VLAN Isolation feature.
L2 Isolation: Check this option to enable L2 Isolation feature.
VLAN ID: Specifies the VLAN ID for the SSID profile.
57
Wireless Security
The Wireless Security section lets you configure the Access Point’s security modes: WEP, WPA-PSK, WPA2-PSK, WPA-PSK Mixed,
WPA-Enterprise, WPA2-Enterprise and WPA Mixed Enterprise.
It is strongly recommended that you use WPA2-PSK. Click on the Edit button under Wireless Settings next to the SSID to change
the security settings.
WEP
Auth Type: Select Open System or Shared Key.
Input Type: ASCII: Regular Text (Recommended) or HEX: Hexadecimal Numbers (For advanced users).
Key Length: Select the desired option and ensure the wireless clients use the same setting. Your choices are: 64, 128, and 152-bit
password lengths.
Default Key: Select the key you wish to be default. Transmitted data is ALWAYS encrypted using the Default Key; the other Keys
are for decryption only. You must enter a Key Value for the Default Key.
Encryption Key: Enter the Key Value or values you wish to use. The default is none.
58
WPA-PSK/WPA2-PSK (Pre-Shared Key)
Encryption: Select the WPA/WPA2 encryption type you would like to use. Available options are Both, TKIP (Temporal Key Integrity
Protocol) and AES (Advanced Encryption Standard). Please ensure that your wireless clients use the same settings.
Passphrase: Wireless clients must use the same Key to associate the device. If using ASCII format, the Key must be from 8 to 63
characters in length. If using HEX format, the Key must be 64 HEX characters in length.
Group Key Update Interval: Specify how often, in seconds, the Group Key changes.
WPA/WPA2-Enterprise
59
Encryption: Select the WPA/WPA2 encryption type you would like to use. Available options are Both, TKIP (Temporal Key Integrity
Protocol) and AES (Advanced Encryption Standard). Please ensure that your wireless clients use the same settings.
Group Key Update Interval: Specify how often, in seconds, the group key changes.
Radius Server: Enter the IP address of the Radius server.
Radius Port: Enter the port number used for connections to the Radius server.
Radius Secret: Enter the secret required to connect to the Radius server.
Radius Accounting: Enables or disables the accounting feature.
Radius Accounting Server: Enter the IP address of the Radius accounting server.
Radius Accounting Port: Enter the port number used for connections to the Radius accounting server.
Radius Accounting Secret: Enter the secret required to connect to the Radius accounting server.
Interim Accounting Interval: Specify how often, in seconds, the accounting data sends.
Note: 802.11n does not allow WEP/WPA-PSK TKIP/WPA2-PSK TKIP security mode. The connection mode will automatically change
from 802.11n to 802.11g.
60
Wireless MAC Filter
Wireless MAC Filter is used to allow or deny network access to wireless clients (computers, tablet PCs, NAS, smart phones, etc.)
according to their MAC addresses. You can manually add a MAC address to restrict permission to access the Access Point. The
default setting is: Disable Wireless MAC Filter.
ACL (Access Control List) Mode: Determines whether network access is granted or denied to clients whose MAC addresses appear
in the MAC address table on this page. Choices given are: Disabled, Deny MAC in the list, or Allow MAC in the list.
MAC Address: Enter the MAC address of the wireless client.
Add: Click Add to add the MAC address to the MAC Address table.
Delete: Deletes the selected entries.
61
Traffic Shaping
Traffic Shaping regulates the flow of packets leaving an interface to deliver improved Quality of Service.
Enable Traffic Shaping: Select to Enable or Disable Wireless Traffic Shaping.
Download Limit: Specifies the wireless transmission speed used for downloading.
Upload Limit: Specifies the wireless transmission speed used for uploading.
Per User: Check this option to enable wireless traffic shaping per user function. This function allow users to limit the maximum
download / upload bandwidth for each client devices on this SSID.
Save: Click Save to apply the changes.
62
Fast Roaming
Enable the function to serve mobile client devices that roam from Access Point to Access Point. Some applications running on
Client devices require fast re-association when they roam to a different Access Point
Please enter the settings of the SSID and initialize the Security mode to WPA enterprise, as well as to set the Radius Server
firstly. Users can enable the Fast Roaming and implement the advanced search.
Please also set the same enterprise Encryption under the same SSID on other Access Points and enable the Fast Roaming. When
the configuration is realized on different Access Point, the mobile client devices can run the voice service and require seamless
roaming to prevent delay in conversation from Access Point to Access Point.
Enable Fast Roaming: Enable or disable fast roaming feature.
Enable Advanced Search: Enable or disable advanced search feature.
63
WDS Link Settings
Using the WDS (Wireless Distribution System) feature will allow a network administrator or installer to connect to Access Points
wirelessly. Doing so will extend the wired infrastructure to locations where cabling is not possible or inefficient to implement.
Note: Compatibility between different brands and models of Access Points is not guaranteed. It is recommended that the WDS
network be created using the same models for maximum compatibility.
Also note: All Access Points in the WDS network need to use the same Channel and Security settings.
To create a WDS network, please enter the MAC addresses of the Access Points that you want included in the WDS.
There can be a maximum of four Access Points.
Note: Only applicable in WDS AP and WDS Bridge modes.
2.4 GHz/5 GHz WDS Link Settings
64
Security: Select None or AES from the drop-down list.
AES Passphrase: Enter the Key Values you wish to use.
Other Access Points must use the same Key to establish a WDS link.
MAC Address: Enter the Access Point’s MAC address to where you want to extend the wireless area.
Mode: Select to disable or enable from the drop-down list.
Save: Click Save to confirm the changes.
65
Guest Network
The Guest Network function allows administrators to grant Internet connectivity to visitors or guests while keeping other
networked devices (computers and hard drives) and sensitive personal or company information private and secure.
Enable SSID: Select to Enable or Disable SSID broadcasting.
SSID: Specify the SSID for the current profile. This is the name visible on the network to wireless clients.
Security: You can use None or WPA-PSK / WPA2-PSK security for this guest network.
Hidden SSID: Check this option to hide the SSID from broadcasting to discourage wireless users from connecting to a particular
SSID.
Client Isolation: Check this option to prevent wireless clients associated with your access point to communicate with other
wireless devices connected to the AP.
66
After enabling Guest Network in the SSID Config page, assign an IP Address, Subnet Mask and DHCP server IP address range for
this Guest Network.
Manual IP Settings
IP Address: Specify an IP Address for the Guest Network
Subnet Mask: Specify the the Subnet Mask IP Address for the Guest Network
Automatic DHCP Server Settings
Starting IP Address: Specify the starting IP Address range for the Guest Network.
Ending IP Address: Specify the ending IP Address range for the Guest Network.
WINS Server IP: Specify the WINS Server IP Address for the Guest Network. WINS means Windows Internet Name Service. It is
Microsoft's implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names.
67
RSSI Threshold
The RSSI value can be adjusted to allow more clients to stay associated to this AP. Note that setting the RSSI value too low may
cause wireless clients to reconnect frequently.
RSSI Threshold: Enable the RSSI Threshold feature by ensuring that each client is served by at least one Access Point at any
time. Access Points continuously monitor the connectivity quality of any client in their range and efficiently share this
information with other Access Points in the vincinity of that client to coordinate which of them should serve the client best.
RSSI: Enter the RSSI (Received Signal Strength Index) in order to determine the handover procedure which the current wireless
link will terminate. RSSI is an indication of the power level being received by the antenna. Therefore, the higher the RSSI number,
the stronger the signal.
68
Management VLAN Settings
This section allows you to assign a VLAN tag to the packets. A VLAN is a group of computers on a network whose software has
been configured so that they behave as if they were on a separate Local Area Network (LAN). Computers on VLAN do not have
to be physically located next to one another on the LAN.
Status: If your network includes VLANs and if tagged packets need to pass through the Access Point, select Enable and enter
the VLAN ID. Otherwise, click Disable.
Save: Click Save to apply the changes.
Note: If you reconfigure the Management VLAN ID, you may lose your connection to the Access Point. Verify that the DHCP
server supports the reconfigured VLAN ID and then reconnect to the Access Point using the new IP address.
69
Chapter 8
DDNS
70
You must Enable EnGenius Cloud first and then choose the Type.
A key part about EnGenius Cloud Service is DDNS. Dynamic DNS (DDNS) is a type of DNS that works with dynamic IP address. DDNS
keeps update its mapping regularly and ensures a consistent matching so that your device can be accessed over the Internet using a
fixed DDNS name. You can either use the default EnGenius DDNS Service or other 3rd party Service you prefer.
Users are recommended to use the free DDNS address printed on the label enclosed in the package. This is because ISP often leases
dynamic WAN IP address that changes from time to time. DDNS domain name will always be the same even if the WAN IP address
changes.
Default UID: default UID
UID Status: when working properly, it should show “Connected”.
Default DDNS: shows the default DDNS
71
Alias DDNS Name: You may find that your DDNS is too difficult to remember. EnGenius provides free DDNS name registration as
long as the alias is not yet been taken other EnGenius product users. You can check the availability by clicking on the button
Availability Check for verification. In this example, “superman.engeniusddns.com” is available. That is, when the setting is
activated, both DDNS name “superman.engeniusddns.com” and “0e95c28.engeniusddns.com” can be used to access this
camera.
Refresh Time: options are 3HR, 6HR, 9HR, 12HR and 24HR. DDNS server needs to synchronize with your IP address often so
that you can access your device over the Internet with DDNS name. Depends on your Internet Service provider, your WAN IP
address lease time will be different. You can check with your local Internet Service provider for WAN IP address refresh time. The
default setting is 24HR (which means DDNS server will check the synchronization every 24 hours). Normally, the default
setting 24HR is okay for most cases.
DDNS Status: when working properly, it should show “Connected”.
Note: DDNS will only work only if your router is connected to the Internet. If router is not connected to the Internet, your DDNS
status will show “Disconnected”.
If you prefer to use third-party DDNS server, you can choose this option.
The current supported third-party DDNS services are 3322(qdns), DHS, DynDNS, ZoneEdit and CyberGate. Choose the one that
best suits your purpose. You should provide your account information so that the camera can communicate with the selected
DDNS vendor.
Your third-party DDNS service account credential should include the following information.
Host Name: please enter your registered Host Name
Username: please enter your registered Username
Password: please enter the password for this
Click Apply when configuration is done to activate new settings.
72
73
Chapter 9
UPnP
74
Universal Plug and Play (UPnP) allows the other device to detect the presence of the camera so that communication becomes
possible. You should enable UPnP if you wish your camera to be recognized by your router. UPnP Traversal makes camera remote
access over the Internet possible using camera DDNS name. You won’t be able to access the camera if you disable UPnP feature.
Please keep it Enable if you are not sure.
Hostname: You may rename your camera to other meaningful names such as storage room, lobby, or any other descriptions you
find suitable to describe the space being monitored.
UPnP: Enable or Disable
UPnP Traversal: Enable or Disable
Click Apply when configuration is done to activate new settings.
75
Chapter 10
Service Port
76
The default setting is as follows. This is only reserved for advanced users who want to keep certain ports for other particular
services. Changing the ports will result in unexpected result. Unless necessary, please keep the default setting.
77
Chapter 11
Mesh
78
Simple to deploy and create a mesh network by the EWS controller or EzMaster in minutes, but for standalone mode without
these two applications, user needs to configure the same settings of Mesh network in each device, once EWS1025CAM plugged
into any power source, the EnGenius mesh devices automatically optimizes routes between wireless mesh devices and creates a
truly adaptive mesh infrastructure with all system. As the wireless environment changes, such as the addition of a new node or
link broken, data paths are re-evaluated, and the mesh network self-tunes automatically to maintain its performance. All
self-tuning processes are dynamic, occurring in the background and in real time.
Status
It shows the current status of mesh network, such as Enable/Disable, Interface, ID, Channel, and Type.
For this mesh device list, system will display the information as device name, MAC address and IP address which connect to the mesh
network. You can click the “Refresh” button to get the new status again.
79
Settings
Each device must have the same settings in this setting page.
Note: If you have changed the settings in Network Wireless page, please make sure all the settings must be the same in each device.
Mesh: Enable or Disable the mesh function, system will save the settings even mesh function is disable.
Operation Mode: The Mesh AP mode is mesh point with wireless AP function. And system will auto disable the wireless AP function
when user selected the Mesh Point mode.
80
Mesh Device Name: You can click the hyper link to modify the Mesh device name from wireless setting page of device name.
Mesh Band: Select the 2.4GHz or 5GHz for the mesh backbone connection.
Mesh ID: The mesh ID should be maximum up to 8 characters in numbers 0 ~ 9.
Password: The mesh password should be maximum up to 12 characters.
Mesh RSSI: Enter the Mesh RSSI in order to determine the connection procedure which the current wireless link will terminate.
The higher the RSSI number, the stronger the signal.
Tools
This diagnostic tools page provides easy ways to check the current status of the mesh network. This section contains the following
options:
Node List
81
All the connected Mesh nodes will be displayed in this page.
Node: It shows the device name and MAC address.
Type: There are two types of the node. The Root node uplink to the gateway by wire, and connect with other mesh node by wireless
simultaneously.
Hops Count: The hops count refers to the number of intermediate devices through which data must pass between the Mesh node itself
and Root node. If the Hops Count number is more than 3, we recommend that you have to optimize your deployment of the device
location. System shows “—“ when the node is Root or alone node
Neighbor Nodes: Display all the neighbor nodes which discovered by individually mesh node, no matter with its signal strength allowed
to link or not.
RSSI: The current signal strength of the node.
Signal Strength: There are four levels signal bar to display the RSSI, if the RSSI is below -76db, then it will display a red bar.
82
Link Status
The Mesh network view is an overview for all mesh nodes.
Mesh View: Mouse over on any Mesh node (black) for the linking status which is linking to other Mesh nodes (blue) with green line.
Unreachable Mesh Node(s): The nodes which can't be connected to the mesh network, due to the weak signal detected by neighbor
nodes.
RSSI: The node is not allowed to link with mesh if its current signal strength is continuously lower than the Mesh RSSI which is in the
mesh settings page.
Detector Nodes: The neighbor node(s) which detected the unreachable mesh node.
Ping
83
This page allows you to analyze the connection quality of a mesh node to other mesh node in the mesh network.
Trace Route
This page allows you to analyze the routing table to a target from a mesh node to other mesh node in the mesh network.
Throughput
This page allows you to analyze the throughput from a mesh node to other mesh node in the mesh network.
84
Chapter 12
Management
85
Controller Settings
Adding EWS1025CAM to ezMaster Device Inventory, you must first bind the AP to ezMaster's Device Inventory by ‘registering’ the device.
You can manually redirecting each AP to ezMaster, or skip this section if you are managing only local devices. You can test the ezMaster
Device Inventory by IP address, and get the connection status between EWS1025CAM and ezMaster Device Inventory.
SNMP Settings
This page allows you to assign the Contact Details, Location, Community Name, and Trap Settings for Simple Network Management
Protocol (SNMP). This is a networking management protocol used to monitor network attached devices. SNMP allows messages (called
protocol data units) to be sent to various parts of the network. Upon receiving these messages, SNMP compatible devices (called agents)
returns the data stored in their Management Information Bases. To configure SNMP Settings, click under the Advanced tab on the side
bar under Management.
86
Status: Enables or Disables the SNMP feature.
Contact: Specifies the contact details of the device.
Location: Specifies the location of the device.
Community Name (Read Only): Specifies the password for the SNMP community for read only access.
Community Name (Read/Write): Specifies the password for the SNMP community with read/write access.
Trap Destination Address: Specifies the port and IP address of the computer that will receive the SNMP traps.
87
Port: Displays the port number.
Trap Destination Community Name: Specifies the password for the SNMP trap community.
SNMPv3 Status: Enables or Disables the SNMPv3 feature.
User Name: Specifies the username for the SNMPv3.feature
Auth Protocol: Select the Authentication Protocol type: MDS or SHA.
Auth Key: Specify the Authentication Key for authentication.
Priv Protocol: Select the Privacy Protocol type: DES.
Priv Key: Specifies the privacy key for privacy.
Engine ID: Specifies the Engine ID for SNMPv3.
88
CLI/SSH Settings
Most users will configure the device through the graphical user interface (GUI). However, for those who prefer an alternative
method there is the command line interface (CLI). The CLI can be access through a command console, modem or Telnet connection.
For security’s concern, you can enable SSH (Secure Shell) to establish a secure data communication.
CLI Status: Select Enable or Disable to enable or disable the ability to modify the Access Point via a command line interface (CLI).
SSH Status: Select Enable or Disable to enable or disable the ability to modify the Access Point via a command line interface (CLI)
with a secure channel.
89
HTTPS Settings
Hypertext Transfer Protocol Secure (HTTPS) is a communications protocol for secure communication over a computer network, with
especially wide deployment on the Internet. Technically, it is not a protocol in and of itself; rather, it is the result of simply layering
the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard
HTTP communications.
Status: Select Enable or Disable to enable or disable the ability to modify the Access Point via a HTTPS.
HTTPS forward: Enable this option; it will be forwarded to HTTPS if user uses HTTP to access the Access Point.
90
Email Alert
The Access Point will send email alerts when configurations have been changed.
Status: Check Enable to enable Email Alert feature.
From: Enter the address to show as the sender of the email.
To: Enter the address to show as the receiver of the email.
Subject: Enter the subject to show as the subject of the email.
Email Account
Username/Password: Enter the username and password required to connect to the SMTP server.
SMTP Server/Port: Enter the IP address/domain name and port of the SMTP server. The default port of SMTP Server is port 25.
Security Mode: Select the mode of security for the Email alert. The options are None, SSL/TLS and STARTTLS.
Send Test Mail: Click Send Test Mail button to test the Email Alert setup.
91
Apply: Click Apply to save the changes.
Date and Time Settings
This page allows you to set the internal clock of the Access Point. To access the Date and Time settings, click Time Zone
under the Management tab on the side bar.
Manually Set Date and Time: Manually specify the date and time.
Synchronize with PC: Click to synchronize the Access Point’s internal clock with the computer’s time.
Automatically Get Date and Time: Enter the IP address of an NTP server or use the default NTP server to have the
internal clock set automatically.
Time Zone: Choose the time zone you would like to use from the drop-down list.
Enable Daylight Savings: Check the box to enable or disable daylight savings time for the Access Point. Next, enter the
dates that correspond to the present year’s daylight savings time.
92
Click Apply to save the changes.
93
WiFi Scheduler
Use the schedule function to reboot the Access Point or control the wireless availability on a routine basis. The Schedule
function relies on the GMT time setting acquired from a network time protocol (NTP) server. For details on how to connect
the Access Point to an NTP server, see Date and Time Settings.
Auto Reboot Settings
You can specify how often you would like to reboot the Access Point.
Status: Enables or disables the Auto Reboot function.
Timer: Specifies the time and frequency in rebooting the Access Point by Min, Hour and Day.
94
WiFi Scheduler
Status: Enables or disables the WiFi Scheduler function.
Wireless Radio: Select 2.4GHz or 5GHz* to use WiFi Schedule.
SSID Selection: Select a SSID to use WiFi Schedule.
Schedule Templates: There are 3 templates available: Always available, Available 8-5 daily and Available 8-5 daily except
weekends. Select Custom schedule if you want to set the schedule manually.
Schedule Table: Set the schedule manually.
*5GHz radio settings only available for dual radio models.
95
Tools
This section allows you to analyze the connection quality of the Access Point and trace the routing table to a target in the
network.
Ping Test Parameters
Target IP/Domain Name: Enter the IP address or Domain name you would like to search.
Ping Packet Size: Enter the packet size of each ping.
Number of Pings: Enter the number of times you wish to ping.
Start: Click Start to begin pinging target device (via IP).
96
Traceroute Parameters
Target IP/Domain Name: Enter an IP address or domain name you wish to trace.
Start: Click Start to begin the trace route operation.
Stop: Halts the traceroute test.
97
Nslookup Parameters
Target IP/Domain Name: Enter an IP address or domain name you wish to trace.
Start: Click Start to begin the Nslookup operation.
98
Speed Test Parameters
Target IP/Domain Name: Enter an IP address or domain name you wish to run a Speed Test for.
Time Period: Enter the time in seconds that you would like the test to run for and in how many intervals.
Start: Starts the Speed Test.
IPv4: The Access Point uses IPv4 port 5001 for the speed test.
99
LED Control
This section allows you to control the LED control functions: Power status, LAN interface and 2.4GHz/5GHz/Mesh WLAN interface.
Click Apply to save the settings after selecting your choices from the boxes.
100
Device Discovery
Under Device Discovery, you can choose for the Access Point to automatically scan for local devices to connect to. Click Scan to
begin the process.
101
Chapter 13
System Manager
102
Account Setting
This page allows you to change the username and password of the device. There are three types of the account settings:
1. Web Account By default, the username is admin and the password is admin. The password can contain from 0 to 12
alphanumeric characters and is case sensitive.
2. Onvif Account By default, the username is onvif and the password is admin. The password can contain from 0 to 12
alphanumeric characters and is case sensitive.
3. Viewer Account By default, the username is guest and the password is guest. The password can contain from 0 to 12
alphanumeric characters and is case sensitive. You can add four different accounts for viewer account.
Administrator Username: Enter a new username for logging in to the Administrator Username entry box.
Current Password: Enter the old password for logging in to the Current Password entry box.
New Password: Enter the new password for logging in to the New Password entry box.
Verify Password: Re-enter the new password in the Verify Password entry box for confirmation.
103
Apply: Click Apply to save the changes.
Note: it is highly recommended that you change your password to something more unique for greater security.
Push Message Mobile List
Here will list the devices which enable the feature of push message on this camera. When an event triggered, camera will send the
message to all the devices in this list. You can click “Delete” to disable the feature of the mobile device.
104
Firmware Upgrade
This page allows you to upgrade the Firmware of the Access Point.
To Perform the Firmware Upgrade:
1. Click the Browse… button and navigate the OS File System to the location of the Firmware upgrade file.
2. Select the upgrade file. The name of the file will appear in the Upgrade File field.
3. Click the Upload button to commence the Firmware upgrade.
Note: The device is unavailable during the upgrade process and must restart when the upgrade is completed. Any connections
to or through the device will be lost.
105
Backup/Restore
This page allows you to save the current device configurations. When you save the configurations, you can also reload the
saved configurations into the device through the Restore New Settings from a file folder. If extreme problems occur, or
if you have set the device incorrectly, you can use the Reset button in the Reset to Default section to restore all the
configurations of the device to the original default settings. To Configure the Backup/Restore Settings, click
Backup/Restore under the Systems Manager tab. All the settings can be separated to “Camera only” or “Access Point
only”.
Factory Setting
Backup Setting: Click Export to save the current device configurations to a file.
Restore New Setting: Choose the file you wish restore for settings and click Import.
Reset to Default: Click the Reset button to restore the Access Point to its factory default settings.
106
User Setting
Back Up Setting as Default: Click Backup to backup the user settings you would like to use as the default settings.
Restore to User Default: Click Restore to restore the Access Point to user’s default settings.
All the settings can be separated to “Camera only” or “Access Point only”
107
Reset/Reboot
In some circumstances, you may be required to force the device to reboot. Click on Reboot the Device to reboot the device.
System Log
This page allows you to setup the System Log and local log functions of the Access Point. Click Log under the Systems
Manager tab to open up the System Log page.
108
Status: Enables or disables the System Log function.
Log Type: Select the Log Type mode you would like to use.
Remote Log: Enables or disables the Remote Log feature. If enabled, enter the IP address of the Log you would like to
remote to.
Log Server IP Address: Enter the IP address of the log server.
Apply: Click Apply to save the changes.
109
Chapter 14
Camera OverView
110
Camera Status
Status page displays the detail video streaming information on the page including Resolution, Video Codec, Frame Rate, Ethernet Bit
Rate, WiFi Bit Rate and Audio Codec.
111
PC Storage Path
Folder Path: click “Browse” to change the path
Snapshot File Type: support image format JPG, PNG & BMP
Recording File Type: support format AVI & MP4
Compression rate comparison (High to Low):
JPG > PNG > BMP
MP4 > AVI
You should consider keeping the default setting because it reduces image or clip file size.
112
Chapter 15
Media
113
Video
Enable: it is recommended that you enable Time Stamp and Video Title; the timestamp will show on the top-left corner of your
video as shown below.
114
Camera
You can get better quality by tuning the lighting condition of the camera. For example, in a dark room you may want to set the
Brightness higher to generate clearer result. When directly facing an outdoor window (too much light) you may want to lower the
Brightness a bit. There may be different settings under different circumstance; therefore, you should tune the setting if the image
quality has become too low to serve its purpose. Please refer to the following examples for comparison between low and high for
each of the light settings.
Light setting
115
Brightness
Contrast
Sturation
116
Sharpness
117
De-noise
Please note that some of the effects will be more obvious in higher resolution at real time.
Flicker Control
The supported options are: 60Hz & 50Hz
Flicker Control is an anti-flicker feature setting.
AC lamp can cause a flicker effect, which is a consequence of the AC power frequency (50 or 60 Hz). As the light can change from
picture to picture, causing light flicker. This will lead to inconsistent light source between each snapshot. To eliminate flicker,
configure your camera to PAL (60Hz) or NTSC (50Hz) modes to compensate the effects. Check the power supply of your region for
proper setting.
118
Mirror
Support Mirrors: None, Mirror, Flip and Both
There are times that the camera will have to be mounted upside down for sideways. That is, the view become difficult to
monitor when it is upside down. The Mirror setting does not reflect on the preview at real time (unlike lighting condition
settings). Therefore, you have to click on Apply to see the result.
The following examples compare none with a chosen mirror effect.
Mirror (Horizontal)
119
None
Mirror
None
Flip
Flip (Vertical)
Both (Horizontal and Vertical)
120
None
Both
Day/Night Mode
This controls Night Vision ON and OFF.
Auto: auto detect light sufficiency and switch between Day and Night automatically.
Day: force the camera to turn OFF Night Vision.
Night: force the camera to turn Night Vision ON.
Day
Night
Advance
121
Exposure Settings
Mode: Manual, Indoor, Outdoor
For regular users, please choose indoor or outdoor, if you are not sure about the terms and behavior, the default values will the
preconfigured. The areas are grey out for preconfigured settings when you choose Indoor or Outdoor.
Manual
122
Choose Manual if you would like to fine tune some of the settings that suits your application. Please be noted that these
settings may have impacts on the image quality and performance.
123
Privacy Mask
Choose Enable if you would like to put certain areas in private. Please use selected window to hide certain area for privacy
purpose.
124
Audio
Status
If you audio is important to what you are monitoring, you need to set the audio status to Enable. So that the microphone can
pick up sounds in the environment. On the other hand, if audio is not necessary (for instance an open space with a lot of noises),
you are advised to disable the audio to reduce the clips file size. The default sample rate is 8k, and the bit rate is 16 bit.
Input Gain: setting the sensitivity of the microphone. High gain will result in higher volume and but picks up more noise.
Encoding: supports G711A, AAC and G711U.
125
Chapter 16
Event Management
126
Event Control
This camera supports many smart features that allow you to utilize the camera in many application scenarios. This section will
introduce each of them in detail.
When camera detects an event that matches the predefined condition an event will be triggered and proceed with the defined
actions; for instance, taking snapshots or recording videos for the specified length of time and interval. There are two profiles
for default setting, you can click “Edit” for detail settings or create a new profile by “Add”.
127
.
Enable/Disable the event control
Schedule to set the camera to record video regularly based on a predefined schedule.
Time of day can specify the time range for each schedule.
Trigger Type by Time or Detectors, if you select the detectors, it can be trigger by Motion detection, Audio detection or
Tampering detection.
Event Notification can send the message to user when event triggered, you can select Push message, E-mail and VMS at the
same time.
Event Action includes two types of the action when event triggered.
128
Record to SD Card, Network Storage or FTP, please remember to setup and enable the correlate settings of Network Storage
and FTP.
Snapshot to SD Card, Network Storage, FTP or E-Mail, please remember to setup and enable the correlate settings of Network
Storage, FTP, E-mail.
129
Motion Detection
Enable: it is recommended that you enable Time Stamp and Video
Motion Detection Window is a hot zone that the camera analyzes for motion (image changes). When a motion is detected
within the zone an event will be triggered.
130
When the window is selected, use your mouse to move the window to the area you intend to monitor. There can be 3 windows
at the most. The Windows are differentiated by color; Window 1 is Green, Window 2 is Red and Window 3 is Blue.
Video OSD Prompt displays the warning on the top lift of the live view page when motion triggered.
Uncheck the window to remove the window from the view.
Sensitivity: Level 0% to Level 100% (with Level 100% being the most sensitive)
Depends on your application, high sensitivity will trigger event more often than low sensitivity and produce more snapshots or
videos. However, overly sensitive events will fill up the storage very quickly. Even if you have unlimited storage space, large
amount of files can become a problem when you need search through each of the files to find what you are really looking for. It
may take some time for you to fine tune the optimal sensitivity for your application.
You can adjust the motion detecting area by dragging the four corners to resize the window.
131
Therefore, you can have a combination of three different detection window sizes.
132
Audio Detection
Sensitivity Level: 0% to 100% (with 100% being the most sensitive)
Similar to motion detection, high sensitivity will trigger events more often than low sensitivity and produce more snapshots or
videos. However, over-sensitive events will fill up the storage very quickly. Even if you have unlimited storage space, large
amount of files can become a problem when you need to search through each of the files to find what you are really looking for.
It may take some time for you to fine tune the optimal sensitivity for your application.
133
Tampering Detection
Tamper detection is a setting within your IP camera that will send you an alert when the camera is tampered with. Once an
action has been detected, whether it’s someone trying to knock the camera down or blocking its view, the alert lets you know to
log into the actions to see what happened.
Video OSD Prompt displays the warning on the top lift of the live view page when motion triggered.
Sensitivity Level: Level 0% to Level 100% (with Level 100% being the most sensitive)
Depends on your application, high sensitivity will trigger event more often than low sensitivity and produce more snapshots or
videos. However, overly sensitive events will fill up the storage very quickly. Even if you have unlimited storage space, large
amount of files can become a problem when you need search through each of the files to find what you are really looking for. It
may take some time for you to fine tune the optimal sensitivity for your application
134
Event Action
This page provides Event-related settings.
Event Action/Buffer Duration until Next Event: can set 20sec(s), 30sec(s), 1min(s), 5min(s), 10min(s), if you set 20sec(s) for this
item, system will ignore any trigger during this 20sec(s).
Event Snapshot/Snapshot Duration: can set 10sec(s), 20sec(s), if you set 10sec(s) for this item, system will send a snapshot in
every 10sec(s).
Event Recording Stream Type: H.264 (1920x1080) or H.264 (640x360)
Video Length: the maximum video length of time per file
Detectors Pre-event Buffer: the length of pre-event time (0~5 seconds)
Record Duration: the length of recording time when alarm is triggered.
135
Note:
If setting Buffer Duration Until Next Event to 30 seconds, the camera will keep recording for 30 seconds when event is triggered.
In this case, if the Video Length is 10 seconds, then 3 files will be generated for single instance of event. If Video Length is 30
seconds, then only 1 file will be generated. Please note that pre-event buffer will extend the length of the video clip for the
chosen extra length of time.
136
Chapter 17
Event Server
137
Network Storage
It is required for users to configure Event Server settings before setting camera Event or Schedule Recording. You will have
to tell where the captured images or clips are going to be stored. The following concept diagram depicts the flow of the image
file when and when captured. The file is stored at one of the predefine storage locations.
Network Storage and FTP are required to have existing servers ready for upload. SMTP is good for small image capture since it
sends the file through email. You should choose what is best for your application.
This camera supports two types of Network Storage: NFS and SAMBA.
Before going further, you need to Enable to configure the network storage first.
Please refer to the following sections for NFS and SMABA.
138
NFS (Network File System)
Server: IP address of the NFS server
Path: enter the initial path if applicable
Folder Size: storage allocated for the camera; the default value 0 signifies infinity.
Overwrite: when the defined folder is full, the oldest files will be overwritten to accommodate the new one.
Click Apply when done.
139
SAMBA
Server: IP address of the SAMBA server
Path: enter the initial path if applicable
User Name: username for accessing SAMBA server
Password: password for accessing SAMBA server
Folder Size: storage allocated for the camera; the default value 0 signifies infinity.
Overwrite: when the defined folder is full, the oldest files will be overwritten to accommodate the new one.
Click Test to verify the connection with the server using the username and password. Click Apply when done.
140
FTP(File Transfer Protocol)
Server: IP address of the FTP server
Port: the FTP server port; default 21
User Name: username for accessing FTP server
Password: password for accessing FTP server
FTP Path: enter the initial path if applicable
Click Test to verify the connection with the server using the username and password.
Click Apply when done
141
E-Mail
EWS1025CAM allows camera to send captured images to the predefined email box to notify about an event or alarm.
SMTP is an email sender’s server. You need to check whether your email service provider supports SMTP and obtain the required
information for this setting.
Email Server Provider: supported Gmail, Yahoo and Hotmail.
SSL/TSL: select the type of the authentication as Transport Layer Security (TLS) protocol or Secure Sockets Layer (SSL) protocol
SMTP Server: enter the SMTP server address (e.g. smtp.gmail.com).
Port: enter SMTP server port (normally 587 or 465)
Account: the email account name; if your email is myemail@gmail.com, myemail is the account name.
Password: the password you use to login into your email box.
From: you can type in your email address or other address if you would like the receiver to reply the email to.
To: enter the receiver email here (usually your or the administrator’s email).
Subject: enter the email subject here.
142
Chapter 17
Storage Info
143
Storage Info
System will display the storage information on this page; it includes the network storage status, total size and available size.
User can click the “Refresh” button to get the latest information of these information.
It depends on different browsers, user can double click the mouse on the records of .avi or .jpg file to save and view the video or
snapshot.
This camera supports MicroSD card slot. Please be careful when choosing the SD card type. You need to insert a blank SD card
into the slot as shown below. It may take a few seconds for the camera to recognize the inserted SD card.
You will be seeing the file list after inserted the SD card. If not, refresh the page by clicking on Refresh button and double check
if the Micro SD card has been properly inserted into the slot.
Dismount: you should dismount the SD card before physically removing it from the slot to avoid file damage.
Format: You can clean a SD card by formatting it (all data will be erased).
144
You can browse through the folder like any other file manager by clicking on the folder name.
Click on the files to view it directly as shown below.
145
Appendix
146
Appendix A - FCC Interference Statement
Federal Communication Commission Interference Statement
FCC Caution:
IMPORTANT NOTE:
Radiation Exposure Statement
147
148
Appendix B - CE Interference Statement
Europe – EU Declaration of Conformity
149
0560
150
151
152
Download PDF
Similar pages